B60R25/246

Vehicle key for passive access systems and corresponding method

A radio key for an access system of a motor vehicle includes a receiver circuit with at least three LF receiver coils for reception of a low frequency signal. The receiver coils are oriented in different spatial directions. A central control circuit includes a microcontroller coupled to the receiver circuit. The control circuit with the microcontroller can assume an energy-reduced resting state and an active operating state. The receiver circuit is configured to awaken the control circuit from the resting state when a signal is received by the LF receiver coils. The central control circuit is configured to activate each of the LF receiver coils separately and to query a received signal strength. The central control circuit then selects the LF receiver coil with the highest signal strength for a subsequent signal reception.

Digital key relay attack prevention systems and methods

Systems and methods for preventing digital key relay attacks are provided. A method includes determining a threshold response time for a wireless communications device to process a challenge. Determining the threshold response time may include determining a benchmark response time for the wireless communications device to respond to the challenge based on one or more conditions of the wireless communications device, and setting the threshold response time to the benchmark response time. The method further includes sending the challenge to the wireless communications device. The method further includes receiving a response to the challenge from the wireless communications device within a response time. The method further includes authenticating the wireless communications device based on the response time being less than the threshold response time. Associated systems are also provided.

Vehicle control device, vehicle control method, and recording medium

A vehicle control device includes: an on-vehicle-user-number recognizing unit that performs recognition of an on-vehicle-user-number, and stores the on-vehicle-user-number in a storage unit, the on-vehicle-user-number being a number of users who have got on a vehicle; an off-vehicle-user-number recognizing unit that recognizes an off-vehicle-user-number, the off-vehicle-user-number being a number of the users who have got off the vehicle after the recognition of the on-vehicle-user-number by the on-vehicle-user-number recognizing unit; and a power door control unit that causes at least one power door to perform closing operation when the on-vehicle-user-number stored in the storage unit equals the off-vehicle-user-number recognized by the off-vehicle-user-number recognizing unit, the at least one power door being a power door that the user has used at a time of getting off the vehicle.

Method and system for relay attack prevention incorporating channel coherence
11945402 · 2024-04-02 · ·

A method/system of detecting if a relay is present in a vehicle PEPS system, including transmitting from antenna(s) of a vehicle, a first/second LF signals and determining a minimum time-gap between the signal transmissions so that the time-gap exceeds the channel-coherence-time of a high-frequency wireless-relay. A maximum time between the signals is determined by a timing requirement of the PEPS system and the maximum allowable change in a key-fob position. A time gap between the minimum/maximum times is determined. Depending on the time-gap, the system timing requirement is increased to provide a predetermined-time. At the predetermined-time, separately transmitting between the first/second LF signals, which have a known signal ratio, from a vehicle antenna to a key-fob as part of an LF challenge; measuring, at the key-fob, the signal-levels of the first/second LF signals; and determining if the ratio of the first/second LF signals are within a predefined range.

SYSTEM FOR DETECTING THE INTENTION OF A USER TO OPEN A HATCH OF A VEHICLE

A system for detecting an intent to open a hatch of a vehicle includes an identifier having means for recording the intent to open a hatch, where the identifier authenticates itself with an electronic control unit, and receives from the ECU a request for confirmation of intent to open a hatch. Following receipt of the request for confirmation of intent to open a hatch, the existence of a command confirming intent to open a hatch in a memory in the identifier is verified. When the command is initiated, a command signal is sent corresponding to the command confirming intention to open a hatch. The electronic control unit is integrated in the vehicle and authenticates the identifier, locates the identifier in proximity to the hatch, sends the request for confirmation of intent to open a hatch, and receives the command signal corresponding to the command confirming intent to open a hatch.

Cloud Based Cognitive Radio Frequency Intrusion Detection Audit and Reporting
20190375374 · 2019-12-12 ·

An approach is provided that logs radio frequency (RF) activity detected by a vehicle-based intrusion detection system. The logged activity is ingested at a machine learning system. The approach receives, by a conversational agent with access to the machine learning system, natural language (NL) user queries pertaining to the detected RF activity and presents, by the conversational agent, natural language system responses answering the NL user queries.

SYSTEMS AND METHODS FOR NETWORKED DEVICE SECURITY

A networked device includes a network input/output and an access control list with a plurality of different available levels of access for entities communicating with the networked device through the network input/output. An access manager is configured to update the access control list from a blockchain via communication with the blockchain through the network input/output.

Vehicle and method for controlling thereof

A vehicle may include a detector to detect and obtain biometric information, a first storage to store encrypted user biometric information, a second storage to store identification information of a user, and a first controller to decrypt the encrypted user biometric information when the detector detects the encrypted user biometric information based on the identification information received from the second storage. The first controller authenticates the user based on whether the detected biometric information is identical to the decrypted user biometric information.

Passive keyless entry system
10486648 · 2019-11-26 · ·

A passive keyless entry system for an electronic lock, comprises a lock installation including a lock controller, and an RF transmitter and receiver, and a fob with a controller, and an RF transmitter and receiver. The fob generates messages to unlock the lock in an unlock event. The controllers share a secret specifying parameters for a sequence of messages to be exchanged bidirectionally between the installation and the fob, the parameters changing between each unlock event and an immediately subsequent unlock event. For each unlock event one of the controllers generates and sends a first message of the message sequence, in accordance with the specified parameters. The other controller causes transmission of a second message of the sequence in accordance with the specified parameters, in response to receiving the first message. At least one message of the sequence comprises a plurality of frames, each frame including a particular sequence of bits, adjacent frames being separated by an inter-frame interval. Adjacent messages in the sequence being separated by an inter-message interval. The specified parameters are such that a given message of the sequence includes a first inter-frame interval, and the inter-message interval between said given message of the sequence and the immediately preceding or immediately subsequent message is no longer than said first inter-frame interval.

Mobile device for communicating and ranging with access control system for automatic functionality

Two different wireless protocols can be used for ranging between a mobile device and an access control system (e.g., a vehicle). The first wireless protocol (e.g., Bluetooth) can be used to perform authentication of the vehicle and exchange ranging capabilities between a mobile device (e.g., a phone or watch) and the vehicle. The second wireless protocol (e.g., ultra-wideband, UWB) can use a pulse width that is less than a pulse width used by the first wireless protocol (e.g., 1 ns v. 1 s). The narrower pulse width can provide greater accuracy for distance (ranging) measurements.