SINGLE USE DONGLE VEHICLE KEY PROGRAMMING SYSTEM AND METHOD

20260017999 ยท 2026-01-15

Assignee

Inventors

Cpc classification

International classification

Abstract

A system and method for a single use device for customer vehicle key programming. The device takes the form of a so-called dongle that plugs into the vehicle OBD. The customer uses an application on a smartphone to communicate with the vehicle through the dongle on one end and with the system servers on the other.

Claims

1. A method for remotely supporting vehicle key programming, comprising: providing a programming device configured to interface with a vehicle via an on-board diagnostics (OBD) port; providing a mobile application on a personal communication device (PCD) configured to communicate with the programming device and a remote server; establishing a secure socket connection between the remote server and the programming device through the mobile application; enabling remote support personnel to access and control the mobile application functions via the server connection; and allowing the support personnel to monitor and intervene in the key programming process in real-time.

2. The method of claim 1, wherein the secure socket connection is initiated upon user entry of a unique access code provided by a support service.

3. The method of claim 1, wherein the remote support personnel are enabled to: view the current programming step; transmit commands to the programming device; and complete or correct programming steps on behalf of the user.

4. The method of claim 1, wherein the connection between the server and the programming device is encrypted and includes a designated identifier to ensure secure and limited access.

5. The method of claim 1, wherein the remote support feature is restricted to the scope of the application and does not permit access to unrelated data or functions on the personal communication device.

6. A system for remote vehicle key programming support, comprising: a dongle configured to connect to a vehicle OBD port; a mobile application installed on a user device, communicatively coupled to the dongle and a remote server; a server configured to establish a secure, real-time connection with the dongle via the mobile application; and a support interface enabling authorized personnel to remotely access and control the key programming process through the server.

7. The system of claim 6, wherein the server is configured to authenticate support access using a user-provided access code.

8. The system of claim 6, wherein the server is further configured to log all remote interactions for security and audit purposes.

9. The system of claim 6, wherein the remote support functionality is limited to a predefined number of uses based on the dongle's serial number and purchase record.

10. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause a system to: establish a secure connection between a mobile application and a remote server; receive an access code from a user; authenticate a support session; enable remote control of application functions related to vehicle key programming; and restrict access to only those functions necessary for programming.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0020] The present disclosure will be more fully understood by reference to the following detailed description of one or more preferred embodiments when read in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout the views and in which:

[0021] FIG. 1 is a practical user overview diagram of the vehicle key programming system and method of the present disclosure.

[0022] FIG. 2 is an exploded view of an exemplar dongle enclosure of the key programming system and method of the present disclosure.

[0023] FIG. 3 is a simplified logic diagram of a process of obtaining the correct dongle.

[0024] FIG. 4 is a workflow diagram of the dongle logic flow of the key programming system and method of the present disclosure.

[0025] FIG. 5 is a simplified logic diagram of the key programming of the vehicle key programming system and method of the present disclosure.

[0026] FIG. 6 is a workflow diagram of a support feature of the key programming system and method of the present disclosure.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0027] One or more embodiments of the subject disclosure will now be described with the aid of numerous drawings. Turning first to FIG. 1, a practical user overview of an embodiment of the present vehicle key programming system and method is shown. In particular, the system 10 includes a programming device (dongle) 12 and system application (software) 14 in which a user 16 can communicate with a vehicle 18 through a personal communication device (PCD) (e.g. smartphone) 20 and the vehicle on-board diagnostics (OBD) port 22.

[0028] FIG. 2 illustrates an exemplar unique dongle 12 with a housing 24 that includes a top casing 26, a bottom casing 28 and a connector casing 30. The dongle 12 also includes a processor and a circuit board 32, an LED 34 and a connector 36 that sits within the housing 24. The housing preferably also includes speaker apertures 38 and an LED aperture 40.

[0029] The system and method is initiated upon a user becoming aware of a missing or inoperable key. See FIG. 3, depicting the logic 42 of obtaining the correct dongle. Once aware of the need for a new key 44, the user ordered same 46. If 48 the key was ordered through the subject system, then the key and associated dongle are sent 50 to the user and this logic ends 52. If not, then the procurement third party 54 provides the key and the user or the third party notifies the system of same so that the appropriate vehicle specific dongle can be provided to the user 50 before the logic ends 52.

[0030] Turning now to FIG. 4, in order for the user to now program the new key they need to first download the application 14 on their smartphone 20. The app 14 will then connect to the programming device or dongle 12 and through the dongle 12 to the vehicle 18. The app 14 will then also connect to the system servers 56. The server has all vehicle algorithms (e.g., immobilizers), sequences, calculations, security information and the like-essentially whatever is needed to successfully program a key to a vehicle. The currently preferred app communication protocols include Bluetooth 58 between the smartphone 20 and the dongle 12, and internet (cellular or Wifi) 60 between the smartphone 20 and the servers 56. It will be appreciated that the system and method can use other protocols and is not limited therein.

[0031] The user, via app 14, selects 62 the make/model/year or simply enters or scans the VIN. The request is sent to the server 56 to retrieve the algorithm that pertains to the selected vehicle. The specific algorithm and all other necessary firmware files, etc. are downloaded 64. The dongle 12 then changes its state into a programming mode 66.

[0032] It will be appreciated that while the system preferably utilizes slightly different and separate technology that makes it possible to program different types of vehicles, and as such has different types of dongles (e.g., Dongle A, Dongle B, Dongle C, etc.) 68, it is not limited thereto. Indeed, while there may be a plethora of different vehicle specific dongles available, under this system and method, there may also be a universal dongle 70 that can be used for most or perhaps all vehicles. In any event, the vehicle specific dongle is downloaded with the current data/information for key programming.

[0033] FIG. 5 illustrates a simplified logic flow 72 of the key programming of the system and method of the present invention. The general flow starts 74 and user obtains the key and dongle 76. The user then downloads 78 the system app 14 onto their smartphone 20. They insert 80 the dongle 12 into the vehicle 18 OBD port 22 and provides 82 the VIN or enters the make/model/year of the vehicle. The system responds to this request and the correct immobilizer algorithm (IMMO) is downloaded 84 to the smartphone 20. The user then proceeds through the specific steps 86 of the IMMO to program the key. If there are any issues 88 with the programming phase the user is prompted to contact customer service 90 which will remote in 92 through the application and program 94 the key. If there are no issues 88 the user programs 94 the key and the flow stops 96. Throughout the programming process, the system server(s) not only provide the correct IMMO but are also available for calculation purposes as may be needed.

[0034] The system includes a remote support, which is shown with a simplified workflow diagram of FIG. 6. Essentially, the app 14 on the smartphone 20 has the ability to allow the server(s) 56 to have a socket connection to the vehicle 18 through the dongle 12 via OBD port 22. As such the functions are directly controlled from the server within milliseconds. By way of example, when a user needs support, he simply calls the support line 90 to retrieve an access code 98. Once the access code is entered by the user, support personnel has the ability to connect to the app 14 and is ready to control app functions. This is done internally, through app source code. Communication is transmitted to the servers 56 and a two-way communication is created to allow the support team to not only see and monitor the programming steps, but also take action in any particular step of the sequence. Each of these connections has an encrypted and designated identifier 100 which allows for unlimited connections to be established as well as refrain from accessing personal user devices 20 at a deeper level. Indeed, high security is guaranteed on all ends.

[0035] The system and method is for a single use. In other words, one dongle for one programmed key. If a user purchases two keys, then the system will allow two uses. When the user purchases the keys, the dongle to be shipped is designated for either one or two uses. This is assigned and locked within the system by dongle 12 serial number. The system has numerous safeguards in place to prevent unauthorized programming. By way of example, if there are more download attempts from a particular IP address than are authorized, then the system will locate the IP and lock the phone.

[0036] The foregoing detailed description has been given for clearness of understanding only and no unnecessary limitations should be understood therefrom. Accordingly, while one or more particular embodiments of the disclosure have been shown and described, it will be apparent to those skilled in the art that changes and modifications may be made therein without departing from the invention if its broader aspects, and, therefore, the aim in the appended claims is to cover all such changes and modifications as fall within the true spirit and scope of the present disclosure.