B60R2325/108

POWER MANAGEMENT BASED ON FRAME SLICING
20240029488 · 2024-01-25 ·

Systems, apparatuses, and methods for implementing efficient power optimization in a computing system are disclosed. A system management unit configured to track computing activity of a computing device while processing each frame of a plurality of frames. The computing activity is tracked at least for a given period of time comprising a plurality of time slices. The system management unit further correlates a time slice associated with a given frame with a time slice associated with at least one previously processed frame from the plurality of frames, based at least in part on the tracked computing activity. The system management unit predicts a clock frequency to render the given frame, based at least in part on the correlation and renders the given frame using the predicted clock frequency.

Passive Entry/Passive Start Access Systems Including Round Trip Time Sniffing

A system for includes master and sniffer devices. The master device includes: first antennas with different polarized axes; a transmitter transmitting a challenge signal via the first antennas from the vehicle to a slave device, where the slave device is a portable access device; and a receiver receiving a response signal in response to the challenge signal from the slave device. The sniffer device includes: second antennas with different polarized axes; and a receiver receiving, via the second antennas, the challenge signal from the transmitter and the response signal from the slave device. The sniffer device measures when the challenge signal and the response signal arrive at the sniffer device to provide arrival times. The master or sniffer device estimates at least one of a distance from the vehicle to the slave device or a location of the slave device relative to the vehicle based on the arrival times.

AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD

An authentication system includes a first controller that performs wireless communication with a mobile terminal and a first authentication unit that executes authentication of the mobile terminal including ID authentication and code authentication through the wireless communication performed between the first controller and the mobile terminal. The first authentication unit executes the code authentication by determining whether a terminal-side calculation result obtained by the mobile terminal matches a controller-side calculation result obtained by the first controller. The authentication system further includes a second controller that communicates with the mobile terminal and a second authentication unit that applies encryption communication using a portion of the terminal-side calculation result and a portion of the controller-side calculation result to communication performed between the second controller and the mobile terminal and authenticates the encryption communication.

Method for exchanging data between a vehicle and an infrastructure or a further vehicle

Method for the encrypted exchange of data between a vehicle and an infrastructure or a further vehicle using headlamp light of the vehicle, wherein the data are encrypted and modulated onto the headlamp light in order to identify the user and/or the vehicle, wherein the key for encrypting the data is generated by user-controlled transformation.

METHOD FOR USER AUTHENTICATION OF VEHICLE IN AUTONOMOUS DRIVING SYSTEM AND APPARATUS THEREOF
20200074061 · 2020-03-05 · ·

A method and an apparatus for user authentication of a vehicle in an autonomous driving system are disclosed. The method includes determining an authentication value indicating matching accuracy of authentication data entered for a passenger of the vehicle and authentication information of a caller of the vehicle, determining a driving setting of the vehicle based on the authentication value, driving on a pre-driving route according to the driving setting, performing decryption for encrypted data blocks related to the passenger received from an infra apparatus located on the pre-driving route, using a key value of the passenger, determining a destination of the vehicle based on whether the decryption for the encrypted data blocks succeeds or fails, and controlling the vehicle to drive to the destination. An autonomous vehicle of the present invention can be associated with artificial intelligence modules, drones (unmanned aerial vehicles (UAVs)), robots, augmented reality (AR) devices, virtual reality (VR) devices, devices related to 5G service, etc.

MOBILE DEVICE FOR COMMUNICATING AND RANGING WITH ACCESS CONTROL SYSTEM FOR AUTOMATIC FUNCTIONALITY

Two different wireless protocols can be used for ranging between a mobile device and an access control system (e.g., a vehicle). The first wireless protocol (e.g., Bluetooth) can be used to perform authentication of the vehicle and exchange ranging capabilities between a mobile device (e.g., a phone or watch) and the vehicle. The second wireless protocol (e.g., ultra-wideband, UWB) can use a pulse width that is less than a pulse width used by the first wireless protocol (e.g., 1 ns v. 1 s). The narrower pulse width can provide greater accuracy for distance (ranging) measurements.

Virtual keyfob for vehicle sharing

A system and method of managing virtual vehicle keys includes: receiving at a central facility a request to use a vehicle; receiving an identifier of a handheld wireless device at the central facility; generating at the central facility a virtual vehicle key that permits vehicle access using the handheld wireless device; and wirelessly transmitting the virtual vehicle key to the handheld wireless device and a vehicle the handheld wireless device has authorization to access.

Remote controller, vehicle for communicating with the same and method for controlling the vehicle

A vehicle communicating with a remote controller is provided. A vehicle includes a plurality of car antennas; a storage configured to store a distance value between the first and second key antennas; and a controller configured to select at least two of the plurality of car antennas, control transmission of signals through the selected at least two car antennas, obtain a distance value between the first and second key antennas of the remote controller based on the received signal strength and the transmission strength of the at least two car antennas when a received signal strength of at least two signals received by the first key antenna and a received signal strength value of at least two signals received by the second key antenna are received from the remote controller, and authenticate the remote controller based on the obtained distance value and the distance value stored in the storage.

ADAPTATION IN TRANSMITTER DEVICES AND RADIO FREQUENCY RECEIVER AND METHOD OF TEMPORARY DATA CRYPTOGRAPHY FOR SYNCHRONY COMPARISON
20200055488 · 2020-02-20 ·

In order to achieve a secure and inviolable encryption method of data to be transmitted via RF. To this end, a transmitting device (TD) and a receiving device (RD) each receive a high-precision real-time clock (RTC). The receiving device (RD) receives the registration of the transmitting devices (TD) through specific commands, opening a recording window in its firmware for the registration of a transmitting device (TD), performing automatic comparison of the difference between the received datadate, time, etc.of this transmitting device (TD) with the data of its own RTC, storing it in the memory of the microprocessor (M) together with the serial number of the transmitting device (TD) compared. When the transmitting device (TD) is triggered to perform an action, the microprocessor (M) reads its RTC and encrypts the date and time data (D) (year, month, day, hour, minute, second) in single binary code, this being transmitted to the receiving device (RD), which microprocessor M performs the decoding of data D and compares it with the date and time (D data) of its own RTC by performing or canceling the action of the transmitting device (TD).

REMOTE CONTROLLER, VEHICLE FOR COMMUNICATING WITH THE SAME AND METHOD FOR CONTROLLING THE VEHICLE

A vehicle communicating with a remote controller is provided. A vehicle includes a plurality of car antennas; a storage configured to store a distance value between the first and second key antennas; and a controller configured to select at least two of the plurality of car antennas, control transmission of signals through the selected at least two car antennas, obtain a distance value between the first and second key antennas of the remote controller based on the received signal strength and the transmission strength of the at least two car antennas when a received signal strength of at least two signals received by the first key antenna and a received signal strength value of at least two signals received by the second key antenna are received from the remote controller, and authenticate the remote controller based on the obtained distance value and the distance value stored in the storage.