B60R2325/108

METHODS, SYSTEMS, AND MEDIA FOR TRANSMITTING ACTION INFORMATION USING QR CODES
20200262391 · 2020-08-20 ·

Methods, systems, and media for performing actions using Quick Response (QR) codes are provided. In some embodiments, the method comprises: generating, at a secondary user device, a unique identifier (UID) and a Public Key Infrastructure (PKI) key pair, wherein the PKI key pair includes a public key and a private key; generating a QR code using the UID, wherein the QR code includes an indication of an action to be performed by the secondary device; causing the QR code to be presented on a display associated with the secondary user device; receiving, from a primary device, encrypted action data that corresponds to the indication of the action to be performed by the secondary device; decrypting the encrypted action data using the private key of the PKI key pair; and causing the action to be performed by the secondary device using the decrypted action data.

Secure communication between a vehicle and a remote device

The present disclosure includes secure communication between a vehicle and a remote device. An embodiment includes a processing resource, memory, and a vehicular communication component configured to, in response to receiving a request from a remote communication component to switch a state of a lock, calculate a challenge count for the request, generate a vehicular private key and a vehicular public key, perform a number of verification iterations, each respective verification iteration including providing the public key to the remote communication component, receiving, from the remote communication component, code for switching the lock state, verifying the remote communication component's identity, and incrementing a counter in response to verifying the remote communication component's identity, and decrypt the code using the private key and switch the lock state in response to the counter being incremented to a value equal to or greater than the challenge count.

FRUNK DELIVERY SYSTEM FOR VEHICLES
20200254969 · 2020-08-13 ·

A front trunk (frunk) delivery system is disclosure for a vehicle. For one embodiment, the delivery system includes a vehicle trunk at a front portion of the vehicle. The system includes a vehicle trunk lid covering the vehicle trunk. The system includes a bar code at the vehicle. The bar code is to be captured by a mobile device of a first user to remotely operate the vehicle trunk lid for the vehicle trunk to deliver or retrieve (for returns) a delivery parcel/package. The first user can be a third party delivery operator such as a USPS or an Amazon delivery operator.

Access key transmission over personal area networks in vehicles

A vehicle includes a controller. The controller is configured to send a nonce encrypted according to a symmetric encryption key. The nonce is sent responsive to receiving a pair request over a personal area network from a nomadic device outside the vehicle. The controller is further configured to initialize a secure connection using a random key and permit vehicle access according to data received via the secure connection. The initialization is responsive to receiving a concatenation of the random key and an incrementation of the nonce encrypted with the symmetric encryption key.

METHOD FOR DELEGATING ACCESS RIGHTS

A method for delegating access rights to a secured object includes generating a first-order data packet in a trusted central management device. The data packet contains a first identifier, a first data set having access rights to a secured device and a first data secret key for encryption and signature. A second-order data packet is signed via the first data secret key and is created in the first mobile communication device and contains a unique identifier, reference data, a second data set having access rights, a second data secret key for encryption and a first data container. The first data container is encrypted via the first data secret key and contains the first identifier and the second data secret key. The signed second-order data packet is transmitted to a second mobile communication device of a second user.

Vehicle passive entry protocol with ultra wide band ranging
10723317 · 2020-07-28 · ·

A passive entry system for a vehicle includes a portable fob and a communication and control unit disposed on the vehicle, the communication and control unit configured to control a function of the vehicle. The portable fob and the communication and control unit are configured to communicate ultra-wideband (UWB) signals therebetween. When the function of the vehicle is triggered, the communication and control unit initiates a double-sided UWB ranging session with the portable fob where (i) the portable fob determines a first distance between the portable fob and the communication and control unit, and (ii) the communication and control unit determines a second distance between the portable fob and the communication and control unit. The communication and control unit is configured to prevent control of the function of the vehicle if a final distance, determined from the first and second distances, is greater than the predetermined distance.

Method for a two-stage authorization of a charging process on a charging post
10717409 · 2020-07-21 ·

The method for a two-stage authorization of a charging operation includes a first stage and a second stage. In the first stage, a control device allocated to the charging station receives a terminal-side proof of authorization transmitted from a mobile terminal device. The first personal authorization of the charging station user is verified on the basis of the terminal-side proof of authorization, without any action of the charging station user being required. With the given first authorization, the charging cable is released. In the second stage, the vehicle-side proof of authorization is received and verified after the vehicle has been connected to the charging cable, whereupon in response to verification of the vehicle-side proof of authorization, a second authorization is carried out, due to which the charging operation is approved.

PASSENGER AND VEHICLE MUTUAL AUTHENTICATION
20200223396 · 2020-07-16 ·

Disclosed are techniques for mutual authentication between a passenger that has requested a transportation service and a dispatched vehicle for providing the requested transportation service. A user device associated with the passenger verifies the dispatched vehicle using a vehicle access token generated by a transportation service platform and sends a secret key to the dispatched vehicle. The dispatched vehicle uses the secret key to recover passenger biometric information from a passenger secret received from the user device through the transportation service platform, captures passenger biometric information on-site, and compares the recovered passenger biometric information and the passenger biometric information collected on-site to verify the passenger.

UP-SAMPLING AND CROSS-CORRELATION FOR TIME OF ARRIVAL DETERMINATIONS IN PASSIVE ENTRY/PASSIVE START SYSTEMS
20200217947 · 2020-07-09 ·

An access system for a vehicle includes a receiver and an access module. The receiver is configured to receive a signal transmitted from a portable access device to the vehicle. The access module is configured to: generate a differentiated signal based on the received signal; up-sample the differentiated signal to generate a first up-sampled signal; obtain or generate an expected signal; up-sample the expected signal to generate a second up-sampled signal; cross-correlate the first up-sampled signal and the second up-sampled signal to generate a cross-correlation signal; based on the cross-correlation signal, determine a phase difference between the first up-sampled signal and the second up-sampled signal; determine a round trip time of the signal received by the receiver; and permit access to the vehicle based on the round trip time.

Motor vehicle having at least one flap
10703289 · 2020-07-07 · ·

The disclosure relates to a motor vehicle having at least one flap, which can be moved between an open and a closed position, an encodable locking device for locking the flap, an unlocking device for unlocking the encodable locking device, and at least one further access opening which is adapted to the size of a specific postal article and can be closed by at least one additional flap. The access opening can be locked by an encodable locking device and can be unlocked by an unlocking device.