AU4341499A - A key control method - Google Patents

A key control method Download PDF

Info

Publication number
AU4341499A
AU4341499A AU43414/99A AU4341499A AU4341499A AU 4341499 A AU4341499 A AU 4341499A AU 43414/99 A AU43414/99 A AU 43414/99A AU 4341499 A AU4341499 A AU 4341499A AU 4341499 A AU4341499 A AU 4341499A
Authority
AU
Australia
Prior art keywords
key
vehicle
valid
security system
control method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU43414/99A
Other versions
AU756414B2 (en
Inventor
Walter Strohbeck
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Robert Bosch GmbH
Original Assignee
Robert Bosch GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AUPP5763A external-priority patent/AUPP576398A0/en
Application filed by Robert Bosch GmbH filed Critical Robert Bosch GmbH
Priority to AU43414/99A priority Critical patent/AU756414B2/en
Priority to PCT/DE1999/002811 priority patent/WO2000014369A2/en
Priority to DE59911105T priority patent/DE59911105D1/en
Priority to EP99955665A priority patent/EP1112430B1/en
Priority to ES99955665T priority patent/ES2232186T3/en
Publication of AU4341499A publication Critical patent/AU4341499A/en
Application granted granted Critical
Publication of AU756414B2 publication Critical patent/AU756414B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00365Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
    • G07C2009/00373Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit whereby the wake-up circuit is situated in the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00968Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)
  • Communication Control (AREA)

Description

Regulation 3.2
AUSTRALIA
Patents Act 1990 COMPLETE SPECIFICATION FOR A STANDARD PATENT
(ORIGINAL)
Name of Applicant: ROBERT BOSCH GmbH of Postfach 30 02 20, D-70442 Stuttgart, Germany Actual Inventor(s): Address for Service: DAVIES COLLISON CAVE, Patent Attorneys, of 1 Little Collins Street, Melbourne, Victoria 3000, Australia Invention Title: "A KEY CONTROL METHOD" Details of Associated Provisional Application No: PP5763/98 The following statement is a full description of this invention, including the best method of performing it known to us: P \OPERDBWPP5763.98 5/8/99 -2- A KEY CONTROL METHOD The present invention relates to a key control method and a security system.
Passive security systems are available for vehicles which use remote keys having transponders that communicate with a transceiver of a vehicle, when the transponder is within range of the transceiver. Provided communication between a key and the transceiver follows a predetermined communications protocol, and unique authentication data is exchanged and validated, the key is considered a valid key and the system allows entry to and/or use of the 10 vehicle. When the valid key subsequently moves out of range of the transceiver, the security See• system secures the vehicle by locking and immobilising the vehicle.
When a valid key for a vehicle becomes lost, the key needs to be deactivated so it can no longer be used to gain access to the vehicle. Accordingly, it is desired to a provide simple technique for deactivating lost keys and reactivating found valid keys, particularly when the keys are buttonless.
In accordance with the present invention there is provided a key control method for a security system having at least one valid key and electronic control means with a transceiver for communicating with said at least one valid key, said control means generating an authority for a secure object when authentication data is received from said at least one valid key and storing unique identification data for said at least one valid key, said method including accessing said unique identification data for said at least one valid key in a mode of said system; characterised by storing enable data corresponding to said unique identification data for said at least one valid key, a user executing a predetermined procedure to enter a key validation mode of said system, and in said validation mode retaining said enable data for valid keys within range of said transceiver and deleting said enable data for valid keys which are out of range of said transceiver, whereby keys without said enable data are deactivated for said system.
The present invention also provides a security system including at least one valid key and electronic control means with a transceiver for communicating with said at least one valid P XOPER\DWMPP5763 98 518/W9 -3key, said control means generating an authority for a secure object when authentication data is received from said at least one valid key, and storing unique identification data for said at least one valid key, said system having a mode for accessing said unique identification data for said at least one valid key; characterised in that said control means stores enable data corresponding to said unique identification data for said at least one valid key when activated for said system, and said control means enters a key validation mode when a user executes a predetermined procedure, and in said validation mode said enable data is retained for valid keys within range of said transceiver and deleted for valid keys out of range of said transceiver.
A preferred embodiment of the present invention is hereinafter described, by way of example only, with reference to the accompanying drawing, wherein: Figure 1 is a block diagram of a preferred embodiment of a security system.
A security system, as shown in Figure 1, includes an electronic control unit (ECU) 2 which is mounted in a vehicle and includes processing circuitry to communicate with other electrical and electronic components of the vehicle and the security system. In particular, the ECU 2 includes an rf transceiver 14 for generating an rf signal which excites the transponder of a remote key 4 of the security system, when the key 4 is within the vicinity of the vehicle.
The key 4 may comprise a card or fob. Once excited, the key 4 uses rf transmission :techniques to communicate with the transceiver 14, in accordance with a secure communications protocol, in order to pass authentication data from the key 4 to the ECU 2.
Once received, the ECU 2 compares the authentication data with security data that it holds in its memory, being security codes and enable flags stored in an FEPROM 12. When the ECU 2 finds a match between the received authentication data and its own security data, the ECU 2 issues signals to other components of the vehicle to enable access to and/or operation of the vehicle by a holder of the key 4. When the key 4 is removed form the immediate vicinity of the vehicle, this is detected by the transceiver 14, which causes the ECU 2 to generate signals to secure the vehicle, for example by locking and immobilising the vehicle.
N4ormally, a number of valid keys can be used with the security system to gain access to the vehicle. The keys 4 each include a unique serial or identification number and this is communicated to the ECU 2 as pant of the authentication data. The ECU 2 stores the serial P:\OPER\DBWMPP5763.98 518/99 -4numbers for each valid key in its EEPROM 12, and against each serial number an enable flag is stored. As an alternative to the enable flag, the system may store a control byte, which may be an encrypted version of the identification number. During the authentication procedure when the ECU 2 verifies the authentication data, the ECU 2 checks to determine if the received serial number of the communicating key 4 is stored in the EEPROM 12 and whether its enable flag is set or reset. If the serial number is found and the enable flag is set, then the communicating key constitutes a valid key which can be used to gain access to the vehicle.
If however the serial number is found and the enable flag is not set, then the communicating key is no longer a valid key which can be used. The ECU 2 is able to execute a key 10 deactivation and activation procedure which resets and sets the enable flag for keys 4. This allows an owner of the vehicle to deal with lost or stolen keys in a simple manner, as described below.
When a valid key is lost or stolen, the holder of at least one remaining valid key can place the ECU 2 in a key validation mode to validate all of the remaining keys. The holder of the remaining keys simply enters the vehicle, places all of the remaining keys within range of the transceiver 14, and executes a predetermined procedure to place the ECU 2 in the key validation mode. Once placed in the key validation mode, the ECU 2 energises all of the keys S 4 within its range, to receive their serial numbers, and sets the enable flags in the EEPROM 12 for the serial numbers received, whilst resetting the enable flags for any other key serial numbers stored in the EEPROM 12. The keys that are therefore within range of the transceiver 14 will then constitute valid keys, and the lost or stolen key will no longer be a valid key, as its enable flag is reset. Completion of the key validation procedure is indicated by the ECU 2 which generates a completion signal for a message unit 6. The message unit simply indicates either visually or audibly that the key validation procedure is completed. The message unit 6 may be an LED in the vehicle or the vehicle's horn or siren. The message unit 6 may also be a display unit in the vehicle which receives and is able to display data indicating the keys which are valid for the vehicle. The display unit would also display other messages, such as "key validation completed" and can include controls which allows a user of the vehicle to recall a display indicating the valid keys, such as keys A, B and C.
When the lost or stolen key 4 is recovered, the key 4 can be revalidated or activated by again taking all of the keys into the vehicle, and placing the ECU 2 into the key validation P \OPEMDBW\PP5763 98 5181W9 mode, to execute the above key validation procedure. The enable flag for the found key 4 will then be set in the FEPROM 12.
To avoid the requirement for any additional hardware components to be added to the vehicle, the predetermined procedure used to place the ECU 2 in the key validation mode needs to be executed using existing vehicle components. The predetermined procedure should advantageously involve using components and operations which are normally involved in a start or entry procedure for the vehicle. Most vehicles have a start procedure which involves pressing a pedal 8, which may be the brake or clutch pedal, and then simultaneously turning on an ignition start switch 10 of the vehicle. The ECU 2 is connected to the electrical network or wire looms of the vehicle so as to receive signals generated when the pedal 8 is depressed and the start switch 10 is turned on. The predetermined procedure to enter the key validation mode can then involve a holder of the keys simply depressing the pedal 8 and turning on the start switch 10 alternately a number of times, say three times, instead of simultaneously. The ECU 2 on detecting depression of the pedal 8 and the start switch 10 alternately can then generate a message for the message unit 6 to confirm entry into the key validation mode when the predetermined procedure has been executed. The ECU 2 can also issue cues on the message unit 6 to follow the time sequence for depression of the pedal 8 and turning on the ****start switch 8, to assist a holder of the keys in correctly executing the procedure to enter the key validation mode. Alternatively the steps and components used for an entry procedure for the vehicle can be used. For example, in some passive security systems the key is excited on lifting of a door handle 16. The predetermined procedure required to enter the key validation mode may require a holder of the keys to lift the door handle 16 a number of times within a period of time, say four times in two seconds.
The ECU 2 can be provided by or divided into a number of ECUs, and similarly the vehicle can include a number of transceivers and antennas to communicate with remote keys 4. The keys 4 may be passive entry keys which require energy from the vehicle in order to communicate with the ECU 2 or the keys may have their own battery power supply. Also, whilst the present invention is particularly advantageous for keys which have no activating buttons, the keys 4 can include activating buttons and the security system may be a combination active and passive security system. For example, the security system may be such that the key 4 is able to conmmunicate over a distance, of say 30 m, with the vehicle when P 'OPER\DBWPP5763 98 58/99 -6activated, and is also able to be energised or excited when closer to the vehicle by lifting of a door handle, or some other activation device, when in the vicinity of the vehicle.
Many modifications will be apparent to those skilled in the art without departing from the scope of the present invention as herein described with reference to the accompanying drawing.
*ooo *o *o* *o*o* o *e

Claims (29)

1. A key control method for a security system having at least one valid key and electronic control means with a transceiver for communicating with said at least one valid key, said control means generating an authority for a secure object when authentication data is received from said at least one valid key and storing unique identification data for said at least one valid key, said method including accessing said unique identification data for said at least one valid key in a mode of said system; tid unique identification data characterised by storing enable data corresponding to said unique identification data 10 for said at least one valid key, a user executing a predetermined procedure to enter a key validation mode of said system, and in said validation mode retaining said enable data for valid keys within range of said transceiver and deleting said enable data for valid keys which are out of range of said transceiver, whereby keys without said enable data are deactivated for said system.
S2. A key control method as claimed in claim i, wherein said predetermined procedure includes steps of a start procedure of a vehicle.
3. A key control method as claimed in claim 1, wherein said predetermined procedure includes steps of an entry procedure of a vehicle.
4. A key control method as claimed in claim 1, wherein said predetermined procedure includes executing steps using standard controls of a vehicle.
5. A key control method as claimed in claim 4, wherein said standard controls include a brake pedal, a clutch pedal, an ignition switch, and/or a door handle.
6. A key control method as claimed in any one of claims 2 to 5, wherein said steps are executed at times relative to one another which differ from said times for standard procedures for said vehicle.
7. A key control method as claimed in any one of the preceding claims, including indicating completion of said key validation mode. P:\OPERfDBW\PP576 3 9 8 5/8/99 -8-
8. A key control method as claimed in claim 7, wherein said indicating includes generating a display of the activated valid keys for said system.
9. A key control method as claimed in any one of the preceding claims, wherein said keys are without activating buttons. A key control method as claimed in any one of the preceding claims, wherein said enable data is a control byte.
10
11. A key control method as claimed in any one of claims 1 to 10, wherein said authority allows access to said secure object.
12. A key control method as claimed in claim 11, wherein said secure object is a vehicle. 15
13. A key control method as claimed in any one of claims 1 to 10, wherein said secure object is a vehicle and said authority allows operation of said vehicle.
14. A key control method as claimed in claim 13, wherein said operation includes starting 2* said vehicle.
15. A security system including at least one valid key and electronic control means with a transceiver for communicating with said at least one valid key, said control means generating an authority for a secure object when authentication data is received from said at least one valid key, and storing unique identification data for said at least one valid key, said system having a mode for accessing said unique identification data for said at least one valid key; characterised in that said control means stores enable data corresponding to said unique identification data for said at least one valid key when activated for said system, and said control means enters a key validation mode when a user executes a predetermined procedure, and in said validation mode said enable data is retained for valid keys within range of said transceiver and deleted for valid keys out of range of said transceiver.
16. A security system as claimed in claim 15, wherein said predetermined procedure P \OPERXDBW\PP5763.98 5/8/99 -9- includes steps of a start procedure of a vehicle.
17. A security system as claimed in claim 15, wherein said predetermined procedure includes steps of an entry procedure of a vehicle.
18. A security system as claimed in claim 15, wherein said predetermined procedure includes executing steps using standard controls of a vehicle.
19. A security system as claimed in claim 18, wherein said standard controls include a brake pedal, a clutch pedal, an ignition switch, and/or a door handle.
A security system as claimed in any one of claims 16 to 19, wherein said steps are executed at times relative to one another which differ from said times for standard procedures for said vehicle.
21. A security system as claimed in any one of claims 15 to 20, including means for indicating completion of said key validation mode.
22. A security system as claimed in claim 21, wherein said indicating means includes a display of the current valid keys for said system.
23. A security system as claimed in any one of claims 15 to 22, wherein said keys are without activating buttons.
24. A security system as claimed in any one of claims 15 to 23, wherein said enable data is a control byte.
A security system as claimed in any one of claims 15 to 24, wherein said authority allows access to said secure object.
26. A security system as claimed in claim 25, wherein said secure object is a vehicle.
27. A security system as claimed in any one of claims 15 to 24, wherein said secure object P.\OPER\DBWVPP5763 9 5/8/99 is a vehicle and said authority allows operation of said vehicle.
28. A security system as claimed in claim 27, wherein said operation includes starting said vehicle.
29. A vehicle including a security system as claimed in any one of claims 15 to 28. DATED this 5th day of August, 1999 ROBERT BOSCH GmbH By its Patent Attorneys DAVIES COLLISON CAVE
AU43414/99A 1998-09-09 1999-08-05 A key control method Ceased AU756414B2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
AU43414/99A AU756414B2 (en) 1998-09-09 1999-08-05 A key control method
PCT/DE1999/002811 WO2000014369A2 (en) 1998-09-09 1999-09-04 Method for controlling a code
DE59911105T DE59911105D1 (en) 1998-09-09 1999-09-04 A KEY CONTROL PROCEDURE
EP99955665A EP1112430B1 (en) 1998-09-09 1999-09-04 Method for controlling a code
ES99955665T ES2232186T3 (en) 1998-09-09 1999-09-04 KEY CONTROL PROCEDURE.

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AUPP5763A AUPP576398A0 (en) 1998-09-09 1998-09-09 A key deactivation method
AUPP5763 1998-09-09
AU43414/99A AU756414B2 (en) 1998-09-09 1999-08-05 A key control method

Publications (2)

Publication Number Publication Date
AU4341499A true AU4341499A (en) 2000-03-16
AU756414B2 AU756414B2 (en) 2003-01-09

Family

ID=25626356

Family Applications (1)

Application Number Title Priority Date Filing Date
AU43414/99A Ceased AU756414B2 (en) 1998-09-09 1999-08-05 A key control method

Country Status (5)

Country Link
EP (1) EP1112430B1 (en)
AU (1) AU756414B2 (en)
DE (1) DE59911105D1 (en)
ES (1) ES2232186T3 (en)
WO (1) WO2000014369A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110164005A (en) * 2019-05-16 2019-08-23 东风小康汽车有限公司重庆分公司 A kind of cancellation method and device of Intelligent key

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007331712A (en) * 2006-06-19 2007-12-27 Denso Corp Vehicle control system
US7965170B2 (en) 2006-07-14 2011-06-21 Lear Corporation Supervised and unsupervised seat folding

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5508691A (en) * 1992-06-22 1996-04-16 Lynx Systems, Inc. Self-contained electronic lock with changeable master and slave codes
JP3312405B2 (en) * 1992-11-30 2002-08-05 株式会社デンソー Keyless entry device
DE4317114C2 (en) * 1993-05-21 1997-03-20 Audi Ag Anti-theft device as immobilization device on a motor vehicle
US5513105A (en) * 1994-05-31 1996-04-30 Krones; Daniel K. Vehicle security system
JP3441177B2 (en) * 1994-08-02 2003-08-25 マツダ株式会社 Vehicle anti-theft device
JP3005175B2 (en) * 1994-09-28 2000-01-31 本田技研工業株式会社 Vehicle anti-theft device
JP3380368B2 (en) * 1995-06-05 2003-02-24 三菱電機株式会社 Vehicle anti-theft device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110164005A (en) * 2019-05-16 2019-08-23 东风小康汽车有限公司重庆分公司 A kind of cancellation method and device of Intelligent key

Also Published As

Publication number Publication date
EP1112430A2 (en) 2001-07-04
WO2000014369A3 (en) 2000-04-20
DE59911105D1 (en) 2004-12-23
WO2000014369A2 (en) 2000-03-16
AU756414B2 (en) 2003-01-09
EP1112430B1 (en) 2004-11-17
ES2232186T3 (en) 2005-05-16

Similar Documents

Publication Publication Date Title
JP6626565B2 (en) Starting the vehicle
US5736935A (en) Keyless vehicle entry and engine starting system
JP4598567B2 (en) Vehicle anti-theft system
US6127922A (en) Vehicle security system with remote systems control
EP1376481B1 (en) Electronic key system
US7388466B2 (en) Integrated passive entry and remote keyless entry system
US6204570B1 (en) Method for initializing an anti-theft system of a motor vehicle
JP4723352B2 (en) Electronic key system and communication unit
US6332572B1 (en) Key code correlation security
CN103380445A (en) Method for activating a motor vehicle lock system using a mobile communication device
KR20080106954A (en) Method for the protection of a movable object, especially a vehicle, against unauthorized use
JP2004187096A (en) Keyless entry system and keyless entry method
US7328044B2 (en) Mobile device registration system
CN104851161A (en) Method for enabling PEPS key to operate multiple vehicles
US6140935A (en) Audio device security system
US6870459B1 (en) Theft protection system for an automobile and method for initializing the theft protection system
JP2001502627A (en) Vehicle security system-security equipment
JP2000289573A (en) Electronic security system with authentication element range determining means, particularly vehicle locking system
AU756414B2 (en) A key control method
US20040204796A1 (en) Method and apparatus for validating vehicle operators and management of validation information
EP1800975B1 (en) Improved key and access system
CN113596627B (en) Authorization control method and device for power equipment, electronic equipment and storage medium
US20020149469A1 (en) Single point failure avoidance for a keyless passive entry and immobilizer system
JP2000509590A (en) Operation method of remote control device and remote control device
US20060082447A1 (en) System and method for data communication with a control device having an adapter for reflashing control device software

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)