B60R2325/108

Electronic car key and communication system

An electronic vehicle key and a communication system wherein the cryptographic material stored in the secure memory of the electronic vehicle key is alterable by a command received from a first communication device or a second communication device to provide multiple vehicles flexibly using personal electronic vehicle key without being dependent, during use, on access to an external database.

DEVICES, METHODS, AND COMPUTER PROGRAM FOR RELEASING TRANSPORTATION VEHICLE COMPONENTS, AND VEHICLE-TO-VEHICLE COMMUNICATION MODULE

Devices, methods, and a computer program for releasing transportation vehicle components and a vehicle-to-vehicle communication module. The device for releasing a vehicle component of a transportation vehicle includes at least one interface for communication with further vehicle components of the transportation vehicle and a control module for controlling the at least one interface to receive messages from the further vehicle components of the transportation vehicle and to verify the identity of the further vehicle components based on the received messages and the stored identification data of the further vehicle components. The messages on which the verification of the identity of the further vehicle components is based are messages used in regular operation of the vehicle component. The control module also releases the vehicle component in response to the identity of the further transportation vehicle components being consistent with the stored identification data of the further vehicle components.

Systems and methods for creating key backups by identifying and storing unique key information and for replicating unique keys from key backups

The present invention provides a service and supporting technology for backing up and restoring or replacing OEM vehicle keys. The system works by storing a copy of the data from an OEM key along with other information necessary to replace the OEM key in a key bank. The data collected is processed and stored such that a customer can order a universal replacement from the key bank programmed with the stored data to emulate the prior paired OEM key. No further pairing or programming is required by the customer.

Radio frequency tag relay attack prevention and notification

Remote devices have replaced keys as a means to access a secure feature of a vehicle. Remote door locks, starters, climate control, trunk openers, etc., have allowed vehicles to be more welcoming and easier to use. However, such functions often rely on radio frequency transmissions that can merely relay signals coming from an authorized device that may allow a nefarious user to access the vehicle or contents therein. By encoding sequence numbers and timestamps within an exchange, a vehicle may determine that an authorized user is too far away to be granted access to the secure feature, thereby denying access to the nefarious user implementing a relay attack on the vehicle.

Systems and methods for creating a password and/or a keypad code for executing keyless operations upon a vehicle

Exemplary embodiments described in this disclosure are generally directed to systems and methods for securely creating passwords for performing various keyless operations upon a vehicle. In an exemplary method, a computer receives a request for creating a password for a phone-as-a-key (PaaK) device. The computer determines that the PaaK device is present inside the vehicle and that the vehicle engine has been placed in an accessory state or a run state by an authorized PaaK device located in the vehicle. The computer further determines that a passive entry passive start (PEPS) key fob is present inside the vehicle. A prompt is provided for entry of a password. The computer checks to determine if an entered password has been already assigned to another PaaK device. If unassigned, the computer links the password to the PaaK device and authorizes the entered password as a valid keyless starting password for the vehicle.

ID-BASED CONTROL UNIT-KEY FOB PAIRING
20210114556 · 2021-04-22 ·

A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.

PASSIVE ENTRY/PASSIVE START ACCESS SYSTEMS INCLUDING ROUND TRIP TIME SNIFFING
20210166509 · 2021-06-03 ·

A system for includes master and sniffer devices. The master device includes: first antennas with different polarized axes; a transmitter transmitting a challenge signal via the first antennas from the vehicle to a slave device, where the slave device is a portable access device; and a receiver receiving a response signal in response to the challenge signal from the slave device. The sniffer device includes: second antennas with different polarized axes; and a receiver receiving, via the second antennas, the challenge signal from the transmitter and the response signal from the slave device. The sniffer device measures when the challenge signal and the response signal arrive at the sniffer device to provide arrival times. The master or sniffer device estimates at least one of a distance from the vehicle to the slave device or a location of the slave device relative to the vehicle based on the arrival times.

Remote access of transports

An example operation may include one or more of connecting, by a processor of a transport, to a network comprised of a plurality of transports, receiving, by the processor of the transport, an access key request to the transport from a device, broadcasting, by the processor of the transport, the request to the network, collecting, by the processor of the transport, authorizations from a subset of the plurality of the transports, and sending a one-time access key to the device, if the authorizations are received from a minimal required number of the transports.

System and method for connected vehicle control

A system and method for connected vehicle control are provided. The system may include a communicator configured to connect, though a wireless communication, with a user application of a user terminal within a predetermined sensing distance, and perform a first authentication and a second authentication, a vehicle speaker, a body controller configured to control the vehicle based on a remote control signal transmitted by the user application, a start button formed inside the vehicle and configured to generate a start-on signal by pushing the start button, and a controller configured to control a start of the vehicle.

METHOD FOR OPERATING AUTHENTICATION SYSTEM AND AUTHENTICATION SYSTEM

A vehicle authentication system for authenticating a portable ID transmitter with respect to an authentication arrangement of a vehicle in order to release vehicle functions for an operator, includes a portable ID transmitter that has at least one ID transmitter-UWB-antenna. The authentication device has at least one first vehicle-UWB-interface having one first UWB antenna and a second vehicle-UWB interface with a second UWB-antenna. Control for the authentication device are also provided so that an authentication method can be carried out. Optionally, the authentication system can also include LF interfaces with LF antennas and proximity sensors.