AUTOMATIC ACCESS AND STARTING SYSTEM FOR MOTOR VEHICLE AND METHOD FOR MANAGING ACCESS TO A VEHICLE
20210245709 ยท 2021-08-12
Inventors
Cpc classification
G07C9/00309
PHYSICS
G07C2009/00357
PHYSICS
B60R25/2072
PERFORMING OPERATIONS; TRANSPORTING
B60R25/01
PERFORMING OPERATIONS; TRANSPORTING
B60R25/245
PERFORMING OPERATIONS; TRANSPORTING
International classification
B60R25/24
PERFORMING OPERATIONS; TRANSPORTING
B60R25/01
PERFORMING OPERATIONS; TRANSPORTING
Abstract
The invention concerns an automatic access and starting system for a motor vehicle, comprising an on-board access management system and at least one identifier (3) such as an electronic key, the access management system being configured to detect and authenticate the identifier (3) when it is close to the vehicle (1), the identifier (3) being configured to emit an authentication signal in response to an interrogation signal emitted by the management and access system, the identifier (3) comprising a memory for storing an instruction relative to a command issued by the carrier of the identifier (3) if this command is issued during the phase of detection and authentication by the on-board system, the instruction being stored temporarily in order for the identifier to be able to emit a signal related to the command when the detection and authentication phase is complete.
Claims
1. An automatic access and starting system for a motor vehicle, comprising an on-board access management system and at least one identifier, such as an electronic key, the access management system being configured to detect and authenticate the identifier when it is in proximity to the vehicle, the identifier being configured to emit an authentication signal in response to an interrogation signal emitted by the access management system, the identifier comprising a memory for storing an instruction relating to a command issued by the carrier of the identifier if this command is issued during a phase of detection and authentication by the on-board access management system, said instruction being stored temporarily in order for the identifier to be able to emit a signal related to said command when the detection and authentication phase is complete.
2. The automatic access and starting system according to claim 1, wherein the access management system is configured to activate a function such as a courtesy light if the identifier is detected within a first zone including the vehicle, called courtesy zone.
3. The automatic access and starting system according to claim 2, wherein the access management system is configured to unlock the vehicle if the identifier is detected within a second zone including the vehicle, called unlocking zone, the unlocking zone for example being more restricted than the courtesy zone.
4. The automatic access and starting system according to claim 3, wherein the access management system is configured to lock the vehicle if the identifier is detected as having left a third zone including the vehicle, called locking zone, the locking zone for example being more restricted than the courtesy zone and/or more extensive than the unlocking zone.
5. A method of managing access to a motor vehicle comprising an access management system, the method including a procedure for detecting and authenticating an identifier, the method comprising the following steps: storing, in a memory of the identifier, an instruction relating to a command issued by a carrier of the identifier during the detection and authentication procedure; and emitting, via the identifier, a signal relating to said command when the detection and authentication procedure is completed.
6. The method according to claim 5, wherein the detection and authentication procedure comprises the following steps: emitting a first interrogation signal via the access management system; and receiving the first interrogation signal by the identifier and emitting a location signal by the identifier.
7. The method according to claim 6, wherein the detection and authentication procedure further comprises the following steps: emitting a second interrogation signal via the access management system; and receiving the second interrogation signal by the identifier and emitting an authentication signal by the identifier.
8. The method according to claim 7, wherein the detection and authentication procedure comprises a step of authenticating the authentication signal emitted by the identifier.
9. A motor vehicle comprising an automatic system for accessing and starting a motor vehicle according to claim 1.
10. A motor vehicle comprising an automatic system for accessing and starting a motor vehicle according to claim 5.
Description
DESCRIPTION OF THE FIGURES
[0029] The present invention will be better understood upon reading the detailed description which follows, done in reference to the appended drawings, in which
DETAILED DESCRIPTION
[0030]
[0031] The access management system 2 comprises a wireless communication module 10, which is capable of exchanging data via a wireless link with a portable electronic device such as an electronic key, an electronic card, such as the electronic key 3 shown in
[0032] The access management system 2 comprises a plurality of antennas arranged in different areas of the vehicle 1. Advantageously, as shown in
[0033] In the example of the figures, all of the remote antennas described above are of the low frequency type. Each antenna is able to emit, at regular intervals, a first interrogation signal which is specific to it. When this first interrogation signal is picked up by a hands-free identifier such as the identifier 3, the identifier in return emits a location signal, in the example a high-frequency signal, that the communication module 10 can receive by means of an internal high-frequency antenna. The location signal received from the identifier allows the access management system to locate the identifier 3, that is to say, to determine that it is near the vehicle, and more precisely what the position of the identifier 3 is, depending on the remote antenna whose identifier is closest.
[0034] The access management system 2 then sends a second interrogation signal. When the identifier 3 captures this second interrogation signal, the identifier 3 sends an authentication signal in response which allows the access management system 2 to authenticate the identifier, that is to say to recognize it as an authorized identifier.
[0035] The access management system 2 is thus able to detect any penetration of an authorized identifier 3 (and therefore of its carrier) inside a delimited zone around the vehicle, and, in response to this detection, to command the activation of one or more functions such as unlocking the vehicle 1.
[0036] In the example, the access management system 2 is able to determine the position of the identifier 3 (and therefore its carrier) in relation to several zones including the vehicle and which partially overlap.
[0037] Thus, the access management system 2 is able to determine whether the identifier 3 is located within a first zone including the vehicle, called courtesy zone 4. The edge of the courtesy zone 4, in the example of a generally elliptical shape, is for example at a distance from the vehicle of between 2 and 4 meters, and in particular equal to approximately 3 meters. The detection of an authorized identifier 3 in this first zone can for example trigger the activation of a courtesy light function. This activation notably involves the illumination of the headlights of the vehicle 1 and of various auxiliary lights, such as lights making it possible to illuminate the ground near the doors of the vehicle.
[0038] The access management system is also able to determine whether the identifier 3 is located in one or more particular zone(s) in addition to the courtesy zone 4. For example, as can be seen in
[0039] Of course, a single zone could be provided, for example constituting an unlocking zone and/or a locking zone. Two or more zones could also be provided.
[0040] As explained above, the access management system 2 implements a hands-free identifier detection and authentication procedure. Such a protocol involves data exchanges between the access management system 2 and the identifier 3. Thus, the access management system emits a first interrogation signal at regular intervals, at a relatively long interval so as not to consume too much energy, for example every 1200 milliseconds. When an identifier is detected, a second interrogation signal can be emitted at significantly shorter intervals, for example every 300 milliseconds.
[0041] According to the method, as long as the data exchanges relating to the detection and authentication of the identifier 3 are not complete, the identifier 3 is able to store any command issued by its carrier, by pressing one of the control buttons equipping the identifier 3. These command buttons are used for various functions, including locking and unlocking the vehicle, and possibly opening the trunk or switching on the dipped beam headlights. Thus, if the carrier of an identifier presses one or other of the identifier's command buttons during the detection and authentication phase, the corresponding command will be stored by the identifier 3. Indeed, an instruction relating to this command will be stored temporarily in a memory of the identifier 3, for the time needed for the data exchanges relating to the detection and authentication of the identifier to finish. The stored instruction will then be emitted by the identifier after the end of these exchanges, so that the corresponding command is taken into account by the access management system 2 of the vehicle. Thus, the carrier of the identifier will not be forced to repeat his command until it has an effect, and will therefore not have the impression of a failure of the identifier or of the vehicle.