Patent classifications
B60R25/246
Securing a vehicle on authorized user change
A memory stores telemetry data for a vehicle. A processor is programmed to send an authorization confirmation request to the vehicle responsive to pattern matching on the telemetry data indicating a potential change in authorization of the vehicle, and send a deauthorization request to an authorization server to deauthorize tokens for the vehicle responsive to a lack of an affirmative response to the authorization confirmation request being received within a predefined time period.
SERVER DEVICE, CAR SHARING SYSTEM, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM
A server device for a car sharing system includes an image request device, a use permission request device, and an authentication information issue device. The image request device is configured to transmit an image request signal to the user terminal when a use request signal for the vehicle is received. The image request signal requires transmission of a user face image. The use permission request device is configured to transmit a use permission request signal including the user face image transmitted from the user terminal to the owner terminal. The authentication information issue device is configured to transmit predetermined authentication information to the user terminal when a use permission signal transmitted from the owner terminal in response to the use permission request signal is received. The predetermined authentication information is information for enabling an operation of the vehicle.
Mobile electronic key device and electronic key system
A portable electronic key device starts up only when movement of the portable electronic key device is present on the basis of detection signal Sac of a motion detector. A communication monitoring unit monitors whether or not radio waves Swk periodically transmitted from a vehicle are received. When there is no movement of the portable electronic key device but the portable electronic key device has received or is receiving radio waves from the vehicle, an operation controller maintains the start-up state of the portable electronic key device.
SYSTEM FOR PROTECTING COMMUNICATION BETWEEN VEHICLE AND SMART KEY AND CONTROL METHOD THEREOF
A vehicle includes: a communicator configured to transmit security data to a smart key and configured to receive response data from the smart key based on the security data; and a controller configured to determine whether the smart key matches the vehicle based on the response data, and configured to unlock the vehicle when it is determined that the smart key matches the vehicle.
Method for preventing relay attack on vehicle smart key system
A method for preventing a relay attack of a smart key system for a vehicle according to the present invention accurately calculates a current spaced distance between an SMK unit and a fob key by using an RSSI included in a response signal and a current voltage level in a process of decoding the response signal when the fob key carried by a user receives a signal applied from the SMK unit installed in a vehicle and then transmits the response signal having at least two kinds of information to the SMK unit, and detects a challenge signal applied from the SMK unit installed in the vehicle and a noise signal included in the response signal, thereby enabling an operation of the vehicle only in a state where the carrier of the fob key secures a predetermined visual distance from the vehicle, and more definitely preventing a third party from breaking into the vehicle through RF bi-directional authentication.
Vehicle door control device
A vehicle door control device controls opening/closing of door members provided in entrances of a vehicle. The vehicle door control device includes a selective instruction portion that is provided on a vehicle exterior side of each of the door members and that is configured to selectively issue a closing instruction to close the door members and a closing and locking instruction to close and lock the door members.
METHOD FOR CONTROLLING ACCESS TO A VEHICLE ACCORDING TO DIFFERENT STRATEGIES
A method for controlling access to a vehicle, the vehicle being equipped with an access module and a keypad, an user having a portable device configured to communicate with said access module, the access module being designed to determine a relative position of the portable device with respect to the vehicle, the keypad being positioned outside the vehicle, wherein when the access module detects that the portable device is inside the vehicle and is in an inactive state, wherein said portable device is unable to authorize user access to the vehicle and start of the vehicle, then vehicle unlocking is authorized by a multiple switch operation in a predetermined sequence on the keypad, and wherein after vehicle unlocking, the access module puts the portable device in an active state, wherein said portable device is able to authorize user access to the vehicle.
SECURITY SYSTEM, VEHICLE DEVICE, AND COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM
A security system unlocks a locked state, which limits a use of a vehicle device attached to a vehicle, by inputting a preset genuine password. The security system may generate key information by converting the genuine password based on a predetermined rule. The key information is used for generating an alternative password that unlocks the locked state instead of the genuine password. The security system may generate the alternative password based on the key information. The security system may unlock the locked state when the alternative password is input.
MOBILE DEVICE FOR COMMUNICATING AND RANGING WITH ACCESS CONTROL SYSTEM FOR AUTOMATIC FUNCTIONALITY
Two different wireless protocols can be used for ranging between a mobile device and an access control system (e.g., a vehicle). The first wireless protocol (e.g., Bluetooth?) can be used to perform authentication of the vehicle and exchange ranging capabilities between a mobile device (e.g., a phone or watch) and the vehicle. The second wireless protocol (e.g., ultra-wideband, UWB) can use a pulse width that is less than a pulse width used by the first wireless protocol (e.g., 1 ns v. 1 ?s). The narrower pulse width can provide greater accuracy for distance (ranging) measurements.
Method for assisting in determining the position of an identifier in relation to a vehicle
The invention relates to a method (METH) for assisting in determining the position of an identifier (I) for accessing and starting a vehicle (V), relative to the vehicle (V), comprising: transmission (Em_TS.sub.vp), from a first device, either the vehicle (V) or the identifier (I) to a second device, different from the first, either the vehicle (V) or the identifier (I), at a transmission time t0, of an initial train (TS.sub.vp) of N sinusoidal signals, having identical amplitudes and respective frequencies f.sub.p, p[1;N], for any p between 1 and N1; reception (Rec_TS.sub.vp) by the second device of an image train (TS.sub.vp) corresponding to the initial train (TS.sub.vp, TS.sub.ip) altered by the transmission (Em_TS.sub.vp); construction (Cons_Sp.sub.v) of a frequency spectrum (Sp.sub.v) for the image train (TS.sub.vp); inverse Fourier transformation (TFI_Sp.sub.v) of the spectrum (Sp.sub.v), allowing a time signature (Sg.sub.v) to be obtained; first integration (Int1_Sg.sub.v) of the time signature (Sg.sub.v), between the transmission time t.sub.0 and a pre-determined intermediate time t.sub.int, producing a first result (Rlt1); second integration (Int2_Sg v) of the time signature (Sg.sub.v) between the intermediate time t.sub.int and a pre-determined end time t.sub.f, producing a second result (Rlt2); comparison (Comp_1/2) of a ratio (R) of the first result (Rlt1) to the second result (Rlt2) with a threshold value (S), so that it is possible to determine if the identifier (I) is positioned inside the vehicle (V).