Patent classifications
G07C2009/00555
Key fob isolator
A keysafe includes a housing, a door, a locking mechanism, a wireless communications interface, and an inhibitor system. The housing defines an internal compartment structured to receive a key fob for a vehicle. The door is positioned to enclose the internal compartment. The locking mechanism is positioned to selectively lock the door to prevent access to the internal compartment. The wireless communications interface is configured to facilitate wireless communication with an external device. The inhibitor system includes a coil disposed around the internal compartment, a battery disposed within the housing and coupled to the coil, and a controller. The controller is configured to energize the coil with the battery to inhibit communication between the key fob and the vehicle, receive a deactivation signal from the external device via the wireless communications interface, and de-energize the coil in response to receiving the deactivation signal to permit the communication.
Method for operating a functional unit of a motor vehicle by means of an identification system, in which two authorizations are necessary, and an identification system
A method for operating functional unit of a motor vehicle using an identification system, in which at least a first authorization is requested for operating the functional unit and an identification signal is transmitted to an identification device by an identification element of the identification system. The functional unit is operated after receiving and the functional unit is only operated in a second authorization. The second authorization is generated by the identification device. Using the identification device, a first signal duration of the identification signal is determined for determining a first spacing of the identification element at a first point in time, and a second signal duration of the identification signal is determined for determining a second spacing of the identification element at a second point in time, and the second authorization is generated depending on a comparison.
Distance measurement device and distance measurement method
A first device includes: a first reference signal source; a first transmitting/receiving unit which transmits two or more first carrier signals and receives two or more second carrier signals using an output of the first reference signal source; and a calculating unit. A second device includes: a second reference signal source configured to be operated independently from the first reference signal source; and a second transmitting/receiving unit configured to transmit two or more second carrier signals and receive two or more first carrier signals using an output of the second reference signal source. A frequency group of two or more first carrier signals and a frequency group of two or more second carrier signals differ from each other. The calculating unit calculates a distance between the first device and the second device based on a phase detection result obtained by receiving the first and second carrier signals.
Relay attack determination device
A portable device includes a reception antenna and a strength meter. The reception antenna includes antennas of three axes each receiving a first signal and a second signal. The strength meter measures a reception strength of the request signal and the request signal received by each of the three axes of the LF receiver. A relay attack determination device is provided with a comparator that executes a comparative process of strength ratios of the request signal and the request signal based upon a measurement value of the reception strength. In a case where the three axes include an ineffective axis, in which the measurement value of the reception strength of the request signal or the request signal deviates from a usable range, the comparator excludes the ineffective axis and executes the comparative process.
METHOD AND VEHICLE DOOR LOCK SYSTEM FOR MANAGING ACCESS TO THE VEHICLE
A vehicle door lock system includes: a door lock; a vehicle event sensor; and a processing circuitry, the processing circuitry is configured to cause the vehicle door lock system to generate first triggering event data, indicative of a first triggering event detected by the vehicle event sensor, caused by a movement of an object onto, or in the vicinity of, the vehicle, at a first time, obtain, from a portable electronic device, second triggering event data, indicative of a second triggering event caused by a movement of the portable electronic device, at a second time, determine if the first triggering event and the second triggering event both occurs within a predetermined time period by comparing the first triggering event data and the second triggering event data.
SECURITY SYSTEM
A security system includes a portable terminal, a communication device communicating with the portable terminal, and a determination unit determining validity of the portable terminal. Phase data acquired from distance measuring radio wave is used to determine validity of communication between the portable terminal and the communication device. The received phase data of the distance measuring radio wave varies according to the distance from a transmission source. When the communication device and the portable terminal are fixed, and the communication device and the portable terminal have transmitted and received distance measuring radio waves having the same specific frequency, vehicle acquisition phase data and terminal acquisition phase data are the same. The determination unit determines, by using this two types of phase data, the validity of communication between the communication device and the portable terminal is determined.
NFC ANTI-RELAY PROTECTION
Systems and methods for detecting and preventing a relay attack in a channel on which a near field communication (NFC) action between a key holder device and a reader is attempted are disclosed. A time limit is established for polling communications between the key holder device and the reader. Each of the reader and the key holder device generates a reader random value and a device random value respectively. The reader sends to the key holder device the reader random value, which includes the time limit for a response from the key holder device, the response including the device random value and the reader random value. The reader receives the response from the key holder device and can then determine whether the response from the key holder device is received within the time limit, to detect whether a relay attack can be made on the channel for the NFC action.
Smart key storage case for vehicle
A smart key storage case includes a storage case main body that can shield a signal, a transmission path through which a call signal from an in-vehicle device is radiated into the storage case main body, a switch that conducts/cuts off the transmission path, a radio communication unit that performs data communication with a radio communication terminal, a controller that controls the switch, and a response signal relay section that radiates a response signal from the smart key inside the storage case main body to the outside. When the radio communication terminal is present outside the vehicle, the controller controls the switch so that the call signal transmitted from the in-vehicle device to the inside of the cabin is cut off and the call signal transmitted to the outside of the vehicle is transmitted.
Method and system for relay attack prevention incorporating motion
A method and system for detecting if a relay is present in a PEPS system for a vehicle is provided by (a) determining whether movement of an authentication device was detected within a predefined time period after the authentication device enters a PEPS entry operational region; and (b) determining if the authentication device was stationary for a predetermined time period during a PEPS entry triggering event.
Relay Attack Determination Device
A strength meter in a relay attack determination device is disposed on a portable device and measures a reception strength by a plurality of times in each of a request signal and a request signal received from an in-vehicle device. A comparator executes a comparative process of the request signal and the request signal by using average values of the reception strength measured by the strength meter. A variation calculator calculates variation in the reception strength measured by a plurality of times in the strength meter regarding the request signal. The comparator, in a case where the variation in the reception strength exceeds a threshold value indicating a communication failure in the request signal, determines the relay attack regardless of a result of the comparative process.