B60R25/246

Method and device for authenticating vehicle smart key

Disclosed are a communication method for merging, with IoT technology, a 5G communication system for supporting a data transmission rate higher than that of a 4G system, and a system therefor. The disclosure can be applied to intelligent services (for example, smart home, smart building, smart city, smart car or connected car, health care, digital education, retail business, security and safety related services, and the like) on the basis of 5G communication technology and IoT-related technologies. According to various embodiments of the disclosure, a method for authenticating a smart key of an electronic device comprises the steps of: transmitting an authentication request in a predetermined cycle; receiving authentication responses from a smart key device; determining whether there is a relay attack on the basis of the interval of the received authentication responses; and authenticating the smart key device when it is determined that there is no relay attack. However, the disclosure is not delimited to the embodiment above, and other embodiments are possible.

Passive entry/passive start access systems including round trip time sniffing

A system for includes master and sniffer devices. The master device includes: first antennas with different polarized axes; a transmitter transmitting a challenge signal via the first antennas from the vehicle to a slave device, where the slave device is a portable access device; and a receiver receiving a response signal in response to the challenge signal from the slave device. The sniffer device includes: second antennas with different polarized axes; and a receiver receiving, via the second antennas, the challenge signal from the transmitter and the response signal from the slave device. The sniffer device measures when the challenge signal and the response signal arrive at the sniffer device to provide arrival times. The master or sniffer device estimates at least one of a distance from the vehicle to the slave device or a location of the slave device relative to the vehicle based on the arrival times.

METHODS FOR USING A SURFACE ACOUSTIC WAVE RESONATOR FOR AUTOMOBILE SECURITY

Remote keyless entry (RKE) systems and devices are described. The RKE devices include one or more passive radios that respond to an interrogation signal from an interrogating device such as a vehicle. The passive radio sends a responsive signal that can include a decaying portion representing a ringdown signal. The passive radio includes a SAW resonator in some situations.

Vehicle display system and vehicle

A display system is provided in a vehicle and includes: an HUD positioned inside the vehicle and configured so as to display, on the vehicle window, a surrounding environment video indicating the environment surrounding the vehicle; and a display control unit controlling the HUD such that the surrounding environment video is displayed on the window in accordance with prescribed conditions associated to the vehicle or the environment surrounding the vehicle and configured so as to reduce the transmittance of the window.

Remote login processing method, apparatus, device and storage medium for unmanned vehicle

The present disclosure discloses a remote login processing method, apparatus, device and storage medium for an unmanned vehicle, and relates to the technical field of remote control. The implementation method of the specific method includes: sending a login request to an unmanned vehicle terminal through a first communication channel in response to a the login request received from an operator, and waiting to receive a reply instruction returned by the unmanned vehicle terminal; returning the reply instruction to the operator through the second communication channel in response to the reply instruction received from the unmanned vehicle terminal, so that the operator logs in the unmanned vehicle terminal according to the reply instruction, where there is a persistent connection state that unidirectionally authenticated between the second communication channel and the unmanned vehicle terminal.

VEHICLE DOOR HANDLE ASSEMBLY WITH LIGHT SENSING MODULE
20220410794 · 2022-12-29 ·

A vehicular exterior door handle assembly includes a base portion configured to mount at an exterior door handle region of a vehicular door of a vehicle, a handle portion, and a sensing module that includes a light emitter and a light sensor. With the base portion of the handle assembly mounted at the exterior door handle region of the vehicular door, the light emitter is episodically energized to emit light. When the light emitter is not energized to emit light, the light sensor senses ambient light at the handle portion, and when the light emitter is energized to emit light, the light sensor senses emitted light emitted by the light emitter. The sensing module determines presence of a person's hand at the handle portion based at least in part on a difference between the sensed ambient light and the sensed emitted light being below a threshold light level.

Gesture-based remote keyless entry for NFC keys

Utilizing an access device is provided. A command mapping of user input to RKE commands is utilized to identify a RKE command based on the user input to one or more motion or orientation sensor of the access device. Responsive to the environmental input from one or more environmental sensors of the access device being indicative of command entry, a transceiver of the access device is activated, the RKE command is sent, and the transceiver is deactivated. Otherwise, the user input of the RKE command is ignored.

Authentication system and authentication method

An authentication system is provided with: a first input unit and a second input unit into which authentication information can be input; a first computing unit which performs computation on the basis of the authentication information input into the first input unit and a communication counterpart-side authentication parameter registered in a communication counterpart; a second computing unit which performs computation on the basis of the authentication information input into the second input unit and a portable terminal-side authentication parameter registered in a portable terminal; and authentication units which, if the authentication information has been input into the first or the second input unit, perform authentication on the basis of the result of computation by corresponding computing unit and the portable terminal-side authentication parameter.

Handle assembly for vehicular closure panels having integrated antenna and force sensor configuration

A vehicular door handle assembly includes a handle portion, and first and second sensors disposed within the handle portion. The first sensor is configured to communicate with a remote device. The second sensor is configured to sense force applied at a deformable portion of an outer wall of the handle portion. The first sensor, responsive to communication with the remote device, communicates a first signal to an electronic control unit. The second sensor communicates a second signal to the electronic control unit for controlling the vehicular door handle assembly responsive to sensing by the second sensor of force applied by a user at the deformable portion of the outer wall. Responsive to the first signal and responsive to the second signal, the electronic control unit allows the door of the vehicle to be opened by the user.

DIGITAL KEY RELAY ATTACK PREVENTION SYSTEMS AND METHODS

Systems and methods for preventing digital key relay attacks are provided. A method includes determining a threshold response time for a wireless communications device to process a challenge. Determining the threshold response time may include determining a benchmark response time for the wireless communications device to respond to the challenge based on one or more conditions of the wireless communications device, and setting the threshold response time to the benchmark response time. The method further includes sending the challenge to the wireless communications device. The method further includes receiving a response to the challenge from the wireless communications device within a response time. The method further includes authenticating the wireless communications device based on the response time being less than the threshold response time. Associated systems are also provided.