G07C2009/005

VEHICLE SAFETY SYSTEM, DISTANCE DETERMINATION METHOD, AND VEHICLE
20220406109 · 2022-12-22 ·

A distance determination method has: detecting a first received signal strength indicator (RSSI) of a first electronic device by a second electronic device; detecting a second RSSI of the second electronic device by the first electronic device; obtaining the first RSSI from the second electronic device by the first electronic device; and calculating a motion direction and a distance of the second electronic device relative to the first electronic device according to the first RSSI and the second RSSI by the first electronic device.

ELECTRONIC LOCK AND METHOD OF OPERATION
20220375290 · 2022-11-24 ·

Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs more than 16 digits. The second step uses the more than 16 digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.

APPARATUS AND METHOD FOR REGISTRATION AND AUTHENTICATION OF USER EQUIPMENT FOR CONTROLLING VEHICLE

A device for registering and authenticating a user device for vehicle control includes: a communication unit connected to the user device to receive an authentication request from the user device; an interface configured to communicatively connect with at least one antenna included in the vehicle and communicating with a FOB of the vehicle; and a processor configured to detect whether the user device is registered based on at least one of user information and device information included in the received authentication request, to detect whether a user of the user device has the FOB by using the at least one antenna, and to control a registration process of the user device which is set differently depending on whether the user has the FOB when the user device is not registered.

Temporary password usage control method and system

A method and system for controlling the use of a temporary password is provided, and the method includes the steps: generating by a random code generator end a preset number of temporary passwords after successful matching between the random code generator end and the random code use end; sending by the random code generator end at least one temporary password among the preset number of temporary passwords to the random code use end for storage therein to form a preset temporary password; and receiving a current temporary password, comparing the current temporary password with each of the pre-stored temporary passwords, and indicating successful verification if the current temporary password is the same as one of the pre-stored temporary passwords. The method can generate multiple temporary passwords at once, and control and manage the use of temporary passwords by adding function codes to the temporary passwords.

MULTI-LOCKING DEVICE USING RANDOM PASSWORD
20220148353 · 2022-05-12 ·

Provided is a multi-locking device including a locking device management unit configured such that, when a user requests same to grant a right to open/close a door, same converts information regarding a granted right regarding the door into a QR code, outputs same, and provides same to the user, a door locking device configured to receive the information regarding a granted right regarding the door from the locking device management unit, and a QR code reader unit configured to receive the QR code from the user and provide same to the door locking device.

Cloud-based keyless entry system
11731585 · 2023-08-22 · ·

Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.

WIRELESS CHANNEL PIN KEY REVOCATION AND RENEWAL

The present disclosure includes a system for re-establishing a Bluetooth Low Energy (BLE) pairing PIN key to repair a secure connection between a mobile device and vehicle. The system may detect an error state, and provide a prompt to the user to determine if they wanted to intentionally remove their account. Responsive to an affirmative response from the user that the removal of the connection credentials was intentional, the system may send a revoke request to a server associated with the vehicle. Responsive to a user input that indicates that the removal of the credentials was unintentional, the vehicle may fetch an encrypted PIN seed of the BLE pairing PIN from memory or request the PIN seed from the server. The PIN seed re-establishes the secured pairing of the mobile device and the vehicle infotainment system without undergoing a new device setup procedure.

VEHICLE CONTROL USING SERVERLESS FUNCTIONS
20230138041 · 2023-05-04 ·

Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.

CLOUD-BASED KEYLESS ENTRY SYSTEM
20230133441 · 2023-05-04 ·

Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.

Electronic lock and method of operation
11823513 · 2023-11-21 · ·

Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs more than 16 digits. The second step uses the more than 16 digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.