B60R2325/205

ELECTRONICS UNIT, METHOD CARRIED OUT IN AN ELECTRONICS UNIT OF SAID TYPE, METHOD FOR SHARING A TIME FRAME BETWEEN A SERVER AND AN ELECTRONICS UNIT, AND METHOD FOR SYNCHRONIZING A SERVER AND AN ELECTRONICS UNIT

The invention relates to an electronics unit (11) to be fit in a vehicle (10) and designed to control a functionality of the vehicle (10) upon receipt of a request from a user terminal (20), characterized in that same comprises:—a memory unit designed to store a counter and data representing a duration;—means for periodically modifying the value of the counter, the period of time being equal to said duration;—control means for controlling said functionality only when the counter is within a given range of values. Also disclosed are a method carried out in an electronics unit of said type, a method for sharing a time frame between a server and an electronics unit, and a method for synchronizing a server and an electronics unit.

METHOD FOR TRANSFERRING RECENTLY BOUGHT GOODS
20170352124 · 2017-12-07 ·

A method for transferring shipments in vehicles, including: a first communications module (M1) for establishing a communication connection to a communications terminal of a supplier which receives authorization data via a communication network (N1); a first identification routine for clearly identifying a supplier; a second communication module (M2) for establishing a communication connection via a wireless communication network (N2) to a communication device of a control device of the access assembly of a vehicle; a second identification routine for clearly identifying the system by the access assembly; a third communication module (M3) for receiving update request information from the driver; and an update routine for updating authorization data in a memory of the system.

KEYLESS VEHICLE SYSTEM THAT ENABLES SERVICING
20170349146 · 2017-12-07 · ·

A method and system for servicing keyless vehicles is provided. The keyless vehicles include security systems that permit operation of the keyless vehicles if the security system receives a unique security signal from a smartphone. The method includes receiving a service request and unique first security data information from a customer concerning a location of a first keyless vehicle that requires service. An authorized person is transported to the first keyless vehicle in a second keyless vehicle. A customer's smartphone is provided with unique second security data whereby a customer can enter and operate the second keyless vehicle utilizing the customer's smartphone. The authorized person drives the first keyless vehicle to a service facility utilizing a second smartphone that is configured to generate a security signal to permit operation of the first keyless vehicle.

METHOD FOR AUTOMATIC RECOGNITION BETWEEN A MOBILE DEVICE AND A MOTOR VEHICLE, CAPABLE OF FUNCTIONING ACCORDING TO THE BLE PROTOCOL
20170347266 · 2017-11-30 · ·

The invention relates to a method for automatic recognition between a mobile electronic device (SP) and a motor vehicle (Vi) equipped with an electronic communication module (120), said mobile electronic device (SP) and the electronic module (120) of the vehicle (Vi) being capable of operating according to the BLE protocol, the mobile electronic device (SP) being in a “scanning”mode and the electronic communication module (120) of the vehicle (Vi) being in an “advertising” mode characterised in that it comprises various steps consisting of:—in the electronic module (120) of the vehicle (Vi), obtaining identification data (RPAi) of the vehicle (Vi);—transmitting at least one data frame (Td) comprising the identification data (RPAi) of the vehicle (Vi), from the electronic module (120) of the vehicle (Vi) to the mobile electronic device (SP);—receiving the at least one data frame (Td) containing the identification data (RPAi) of the vehicle (Vi), in the mobile electronic device (SP) set in “scanning” mode;—checking, in the mobile electronic device (SP), that the transmitted identification data (RPAi) is valid, then transmitting a connection request (110) from the mobile electronic device (SP) to the electronic module (120) of the vehicle (Vi).

SMARTPHONE WITH INTEGRATED MULTI-TRANSPONDER MODE KEY DEVICE
20170345240 · 2017-11-30 ·

A smartphone having: a configurable radio frequency transmitter; a configurable low frequency transponder with at least one low frequency coil; and a smartphone application program that is controlled by a cloud service and that is configured to configure the radio frequency transmitter and the low frequency transponder with protocol parameters and initial data values such that the low frequency transponder mimics a virgin key device that can be programmed to a particular vehicle model.

Portable electronic devices for accessing remotely controllable devices
11676479 · 2023-06-13 · ·

Multiple portable electronic devices within an exemplary system functionally cooperate amongst themselves to access a remotely controllable device. These portable electronic devices execute exemplary prioritization routines to identify a preferred portable electronic device from among the portable electronic devices to access the remotely controllable device. Thereafter, the exemplary system transfers ownership of a software implemented access token to the preferred portable electronic device to allow the preferred portable electronic device to access the remotely controllable device.

Authenticating privilege elevation on a transportation service

The present disclosure is directed to an automotive computer in communication with a mobile device using an authentication manager to increase and/or reduce user privileges that determine a level of vehicle control or feature access that is granted to the user. The authentication manager may increase or decrease the user privilege to standard rider status until the authentication manager has confirmed elevated status for that user via a cloud security challenge question or via a local identification method such as using the mobile device authentication features. This process may be additionally triggered based on environmental or context-based use cases, such as a high traffic condition, local cyber-attack, or transportation of sensitive goods. The system may utilize the authentication to perform out of band pairing of the mobile device and the vehicle, which may add additional security.

METHOD FOR CONTROLLING ACCESS TO AT LEAST ONE FUNCTION OF A MOTOR VEHICLE

The invention relates to a method for controlling access to at least one function of a motor vehicle (10), comprising:—an action step during which an electronic control unit (11) on board the motor vehicle detects an interaction of a user with the motor vehicle,—a verification step during which the electronic control unit verifies that the user is authorised to access said function, and—an authorisation step during which the electronic control unit authorises access to said function. According to the invention, said verification step comprises sending of a query message by said electronic control unit to a mobile terminal (20) carried by the user or by a person accompanying the user, and said authorisation step is only implemented if, in response to the query message, the electronic control unit receives an access-right validation message from the mobile terminal.

METHOD FOR SECURELY CONNECTING VEHICLE AND BLUETOOTH KEY, AND BLUETOOTH MODULE AND BLUETOOTH KEY
20230180010 · 2023-06-08 ·

The present invention relates to a method for securely connecting a vehicle and a Bluetooth key, a vehicle Bluetooth module and a Bluetooth key. The method comprises: when a vehicle Bluetooth module successfully establishes a Bluetooth communication connection with a mobile terminal installed with a Bluetooth key, the vehicle Bluetooth module receiving an authentication request from the Bluetooth key, wherein an authentication manner of the authentication request is simple authentication or common authentication; when the authentication manner of the authentication request is simple authentication, the vehicle Bluetooth module performing security authentication on the Bluetooth key according to the simple authentication manner, and sending an authentication result to the Bluetooth key; and when the authentication result indicates that authentication fails, or the authentication manner of the authentication request is common authentication, the vehicle Bluetooth module performing security authentication on the Bluetooth key according to the common authentication manner.

SYSTEMS AND METHODS FOR ROUTING PERSONAL MOBILITY VEHICLES BASED ON ROAD CONDITIONS
20220363161 · 2022-11-17 ·

In one embodiment, a computer-implemented method includes receiving a transportation request from a transportation requestor device to travel from a first location to a second location. The computer-implemented method also includes determining one or more routes from the first location to the second location and a characteristic associated with each route of the one or more routes. The computer-implemented method also includes selecting, based on the characteristic associated with each route of the one or more routes, a personal mobility vehicle from a fleet of personal mobility vehicles. The fleet of personal mobility vehicles includes different types of personal mobility vehicles. The computer-implemented method also includes providing instructions to a device associated with the personal mobility vehicle to direct the personal mobility vehicle to traverse a particular route of the one or more routes.