EP1152107B1 - Anti-fraud system for hands-free access to an automobile - Google Patents

Anti-fraud system for hands-free access to an automobile Download PDF

Info

Publication number
EP1152107B1
EP1152107B1 EP20010400875 EP01400875A EP1152107B1 EP 1152107 B1 EP1152107 B1 EP 1152107B1 EP 20010400875 EP20010400875 EP 20010400875 EP 01400875 A EP01400875 A EP 01400875A EP 1152107 B1 EP1152107 B1 EP 1152107B1
Authority
EP
European Patent Office
Prior art keywords
signal
identification device
vehicle
output
fact
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP20010400875
Other languages
German (de)
French (fr)
Other versions
EP1152107A1 (en
Inventor
Guy Lelandais
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Delphi Technologies Inc
Original Assignee
Delphi Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Delphi Technologies Inc filed Critical Delphi Technologies Inc
Publication of EP1152107A1 publication Critical patent/EP1152107A1/en
Application granted granted Critical
Publication of EP1152107B1 publication Critical patent/EP1152107B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Definitions

  • the present invention relates to a so-called hand access system free for motor vehicle, i.e. a system of wireless communication allowing entry into the vehicle without key.
  • This system can also be applied to hands-free starting of the vehicle, i.e. when starting without a key.
  • Such a system generally includes a device identification intended to be worn by a user and capable of establishing wireless two-way remote communication with a unit control unit on board the vehicle to authenticate the user and order locking / unlocking means door locks when the user has been recognized as authentic.
  • Communication protocol initialization can be activated by operating the exterior door handle, to hands-free access, or by pressing a start button, in hands-free start mode.
  • the system is able to establish said two-way communication when the identification device is located at a distance less than a predetermined limit distance from the vehicle, generally of the order of a few meters, to avoid, on the one hand, interference with other signal sources from the environment, and, on the other hand, to avoid the functioning of the system at a distance such that the user is too far from the vehicle to be aware of the operations carried out by said system.
  • a such a system allows communication only at very short distance from the vehicle in the order of a few cm.
  • Another commonly used system proposed consists in using low frequency carrier waves, around 125 kHz for communication from the vehicle to the identification device, and ultra high carrier waves frequency, for example of the order of 434 or 868 MHz, for the area Europe, and 315 or 902 MHz for the USA zone.
  • the identification device must include a battery to power its own electronic circuits. To minimize consumption electric, we can provide, for example, that the device identification is dormant for 9 ms and awake 1 ms, during periods of 10 ms.
  • FIG. 1 of the accompanying drawings there is shown a example of an already known encryption system.
  • a vehicle V which has in its central unit a memory 1 containing a secret key K and a number generator 2, the generated random numbers R having, for example, a length of 56 bits.
  • This random number R is transmitted towards the identification device I, as indicated by arrow 3.
  • this same random number R is mixed with the key secret K following a complex associative function f, in a mixer 4 which is connected to its input to memory 1 and to the generator of random numbers 2.
  • Mixer 4 outputs a signal representative of the mixture of the secret key K and the random number R, at know the signal f (R, K). This signal is stored in a memory 5 connected to the output of mixer 4. This signal is sent to the device of identification I, in the form of a signal of length by 28-bit example, as shown by arrow 6.
  • the signal f (R, K) is mixed again with the secret key K in a mixer 7, which is connected at its input to memories 1 and 5 above.
  • This mixer 7 mixes the two signals according to a function complex associative g.
  • Vehicle V then stores in a memory 8 connected to the mixer output 7 the signal representative of the mixture, namely the signal g (R, f, K).
  • the same secret key K is stored in a memory 11 and a mixer 14 having the same associative function f receives as input the secret key provided by the memory 11 of the identification device I and the random number R received by the identification device from the vehicle.
  • the identification device I stores the signal at the mixer output 14 in a memory 15 and compare this signal in a comparator 16 with the signal received according to arrow 6 from vehicle V. If the two signals are not identical, subject to the time of hardware and signal transmission delay in the area of authorized transmission, the identification device interrupts the communication as being unauthorized. On the other hand, if the two signals match, the signal is mixed in a mixer 17 with the secret key provided by the memory 11 of the device identification I, according to the same associative function g above.
  • the mixer 17 output signal is stored in memory 18 of the identification device to then be sent to the vehicle according to arrow 9 in the form of a signal having a length by 20 bit example.
  • the signal received by arrow 9 is compared with the signal received from the vehicle memory 8 in a comparator 10. If these two signals match, subject to delays due to hardware response time and signal transmission in the authorized zone, the rest of the communication is authorized and the unit vehicle center may, if necessary, order the condemnation or unlocking of the locks of the doors of the vehicle.
  • another encryption protocol could be used to secure data transmission.
  • This signal 21 sent by the vehicle is received by a coil 22 of the relay box 20, which is connected to a receiver 23 at 125 kHz.
  • This receiver 23 is connected to a transmitter at broadband at high frequency, of the order of several MHz.
  • the transmitter 24 transmits via its antenna 25, as represented by the arrow 26, to a second relay box 30, which is carried by another pirate which closely follows user U.
  • the exchange of information between the two relay boxes 20 and 30 being carried out at very high frequency, it is this communication can be carried out from a long distance.
  • the second relay box 30 includes an antenna 31 for receiving the signal 26 emitted by the relay box 20.
  • the antenna 31 is connected to a broadband receiver at the same frequency as transmitter 24 of the first relay box 20.
  • the signal thus received is retransmitted at low frequency at 125 kHz by a transmitter 33 which is connected to a coil 34 to send a signal 35 to the device identification I which conforms to signal 21 emitted by the vehicle.
  • the signal 35 being the repetition of the authentic signal of the vehicle, the identification device I will recognize it and in turn issue its response signal 36, said response signal 36 being sent at high frequency and received by an antenna 37 of the second relay box 30, by example at 434 MHz.
  • the antenna 37 is connected to a receiver 38, which goes convert the signal at 434 MHz to a signal at a different frequency, for example at 315 MHz.
  • the signal is then emitted by a transmitter at broadband 39 via an antenna 40 to the first relay box 20, this difference in frequency being necessary for the different signals do not interfere with each other.
  • the frequency of signal 41 sent back by the second relay box 30 is different both the frequency of signal 26 and signal 36.
  • This signal 41 is received by an antenna 27 of the first relay box 20, said antenna 27 being connected to a broadband receiver 28 of the same frequency as the transmitter 39.
  • the receiver 28 is connected to a transmitter 29 which transforms the 315 MHz signal into a 434 MHz signal which is sent via the antenna 42 of the first relay box 20 to the vehicle V, as represented by the zigzag arrow 43.
  • the hackers use relay boxes having broadband links, for example greater than 50 MHz, which is possible because pirate systems do not have to comply with regulations; additional transit time due to distance can be of the order of a few nanoseconds, which is negligible compared to the necessary time constants for normal transmission allowed.
  • the total communication can be of the order of 20 to 40 ms, and the duration total operation of the system to trigger the unlocking or locking electric locks can be of the order of 100 ms.
  • one solution could be to measure the propagation time of UHF radio waves, comparing this measured time with a time predetermined corresponding to a communication in an area limited allowed around the vehicle.
  • a time predetermined corresponding to a communication in an area limited allowed around the vehicle For example, to detect the time delay due to distance, compared to communication time overall, it is necessary to have broad bandwidth, which corresponds to a fast communication rate, for example of around 20 to 40 Mb / s. With such a communication rate, it is necessary to operate at very high frequency, for example at 2.4 GHz. But to measure very short times, it is necessary to have a very high bandwidth, which comes up against applicable regulations that severely limit bandwidths allowed, to avoid saturation of the environment with waves electromagnetic.
  • the object of the invention is to eliminate the aforementioned drawbacks and to propose a so-called hands-free access system for a motor vehicle, allowing to detect a hacking of the system, in particular by through relay boxes, taking into account the time of propagation of the signal between the vehicle and the identification device.
  • the invention relates to an access system called hands free for motor vehicle, comprising a device identification intended to be worn by a user and capable of establishing wireless two-way remote communication with a unit control unit on board the vehicle to authenticate the user and order locking / unlocking means door locks when the user has been recognized as authentic, said system being capable of establishing said two-way communication when the identification device is located at a distance less than a predetermined limit distance from the vehicle, characterized in that said central unit is able to generate, at a predetermined high clock rate, when communication, an anti-piracy bit stream, each bit of said train being transmitted to the identification device in the form of a signal radio frequency interrogation representative of said bit, so only after reception of said interrogation signal by the device identification, the latter transmits, with a delay at least equal to one useful bit time, a response signal to the central control unit, the latter comprising at least one mixer capable of mixing, on the one hand, the response signal received from the device identification and, on the other hand, the anti-piracy bit stream
  • “Useful transmission time” means the transmission time of the binary information of said bit with respect to the total time of the cell at which is associated with said bit which generally includes said time useful and a time of silence to allow reception of the signal retransmitted by the identification device during said time of silence.
  • the sum of the response times performed by the integrator is stopped when the central control unit detects receiving the last bit of the anti-piracy train.
  • the output of the integrator is linked to at least a second comparator to compare said sum response time with another predetermined threshold value lower than said first predetermined threshold value, beyond which communication is detected beyond said distance predetermined limit.
  • the device identification includes a digital signal timer capable of delay the interrogation signal received by a useful bit time from the vehicle, a carrier wave oscillator in radio frequency, connected at output to a phase modulator or amplitude, which is controlled by the signal at the output of said retarder, for outputting said response signal at the output of said modulator to be issued to the vehicle.
  • the identification device may have a falling edge detector to detect the edge descending from the interrogation signal received from the vehicle, said detector being able to tilt said oscillator of the device of identification between a stop state corresponding to the reception mode of the identification device and a corresponding operating state to its mode of transmission.
  • the anti-piracy bit stream is generated by the central processing unit after sending the data authentication methods encrypted to the identification device.
  • the identification device may include a mixer for mix the signal at the output of said self-timer with a digital signal of encrypted authentication in response to the identification device, to a slower than the anti-piracy bitstream, the signal output of this mixer being able to control the aforementioned modulator of the identification device.
  • the central unit of the vehicle comprises a phase or amplitude demodulator to demodulate the signal received by the vehicle from the identification device, a exclusive OR logic gate whose inputs are connected respectively said phase demodulator and a digital signal retarder, said retarder being capable of delaying by bit useful time each bit of the anti-piracy train generated by the central unit, said logic gate being able to output a digital signal representative of the encrypted identification device response signal.
  • the signal delivered in output of the aforementioned exclusive OR logic gate is compared by the unit central to an encrypted digital authentication signal generated by the central unit, in order to authenticate the identification device.
  • the exit from said door exclusive OR logic is connected to an input of a second door exclusive OR logic whose other input receives a digital signal encrypted authentication generated by the central unit, in order to deliver at output said signal representative of successive time offsets of every bit of the anti-piracy train.
  • the central unit is able to alternately control the stop and start of the oscillator the central unit according to said predetermined high clock rate to switch the central unit respectively to reception mode and program. Since a very high oscillator is used frequency, for example around 2.4 GHz, it is possible to stop and restart the oscillator for each bit of the anti-piracy train, because the relaxation time of this type of oscillator is short.
  • the central control unit has a radio carrier wave oscillator frequency, connected to a phase or amplitude modulator, which is controlled by the anti-piracy bit stream generated by the unit vehicle center.
  • the identification device may include a unit of measurement of average length of the bits received, for measure, after demodulation of the interrogation signal received in source of the vehicle, the average length of the anti-piracy bits received, said measurement unit being capable of causing the interruption of the communication when said average length is less than one predetermined value, for example 90% of the useful bit length emitted by the vehicle.
  • the purpose of this unit is to prevent a pirate bypasses the anti-piracy device constituted by the integrator, by shortening the reception of the signal sent from the vehicle, so cause an early response signal from the device of identification, this anticipated response intended to compensate for the duration of signal propagation due to distance.
  • the central unit is able to control the stop or operation of a receiver at said high clock rate, so that said receiver delivers to the mixer from the central unit a digital signal representative of the interpretation the start of the response signal received from the vehicle.
  • the end of the response signal is not processed by the central unit, because said end overlaps with the emission of the anti-piracy bit next, due to the delay due to signal propagation.
  • the useful bit time can be between 50 ns and 1 ⁇ s, for example of the order of 200 ns.
  • the motor vehicle V has in its central unit a microcontroller 50, which is usually in a semi-sleep state or waiting for an alarm clock.
  • a microcontroller 50 which is usually in a semi-sleep state or waiting for an alarm clock.
  • an activation signal is sent to the micro-controller 50, as indicated by arrow 51.
  • the microcontroller sends a general power signal, as shown by arrow 52, to supply the various electronic components of the central unit.
  • the microcontroller 50 generates a series of low rate signals sk, for example of the order of 2 to 100 Kb / s on line V5.
  • the data carried on line V5 is successively an awakening signal, a signal representative of a number random R with a length for example of 56 bits, a signal representative of the function f (R, K) with a length for example of 28 bits, and of a signal representative of service data s, for example with a length of 100 to 5,000 bits, for example data on the maintenance, vehicle adjustment, etc. (see Figure 5).
  • Line V5 is connected to a transmitter 53 to transmit signals via an antenna 54 towards the identification device I as represented by the arrow E.
  • the transmitter 53 includes, as best seen in FIG. 4, a oscillator 55 to generate an ultra high carrier wave frequency, for example at 2.4 GHz, said oscillator being powered by line 52.
  • the oscillator 55 is connected to a phase modulator 56 or an amplitude modulator of the 50% and 100% modulation type depending on whether the value of the transmitted bit is 0 or 1, the output of which is linked to the above-mentioned antenna 54.
  • the signal emitted E for example with an amplitude of the order of 2V efficient, is received by an antenna 100 of the identification device I with an attenuation of the order of -40 dBm, which represents a attenuation coefficient of 100 times, i.e. the signal received by the identification device has an amplitude of the order of 20 mV.
  • the antenna 100 is connected to a radio frequency filter 101 (only shown in Figure 4) to eliminate frequencies parasites.
  • the output of the filter 101 is connected to a branch, of a hand, to a low-speed, low-consumption receiver 102 and, on the other hand, to a logarithmic amplifier 103 which allows output an effective signal of the order of 2V, and serves as high frequency receiver.
  • the receiver 102 successively includes a radio frequency envelope detector 104 to reconstruct the low cadence signals on line I5, which correspond to those of line V5.
  • Detector output envelope 104 is connected to a low frequency amplifier 105, of which the output is connected in parallel, on the one hand, to a sequence decoder awakening 106 and, on the other hand, to a microcontroller 107 of the device identification I via line 108.
  • the decoder 106 is permanently supplied by the battery of the identification device.
  • the awakening data e are decoded by the decoder 106, in order to send an awakening command to the micro-controller 107, at the output of decoder 106.
  • the micro-controller 107 then awakens all the other electronic components of the device Identification.
  • the following data namely the signals R, f and s, are transmitted directly to the microcontroller 107 via the line in parallel 108.
  • the microcontroller 50 of vehicle V After transmission of the service data s, the microcontroller 50 of vehicle V generates anti-piracy bits h at slow rate sk of the microprocessor, said anti-piracy bits being received by a 58 random binary sequence generator buffer output the high-speed anti-piracy bits fk, on a line V7.
  • the output of buffer memory 58 is connected to a branch, on the one hand, with the phase modulator or amplitude 56 to phase-modulate the carrier wave generated by oscillator 55, and on the other hand, with a digital self-timer useful bit time 59, the function of which will be explained later. Every bit anti-piracy is transmitted as a radio frequency signal via antenna 54 towards the identification device I.
  • each anti-piracy bit is carried by a very high oscillating wave frequency having a bit time Ta for example of the order of 200 ns.
  • the transmission of the anti-piracy bits h1, h2 ... hn is authorized or prohibited, as a function of a control signal V1 which is emitted by a vehicle V time base management unit 60, which unit 60 is capable of delivering clock signals at low cad rate sk, at medium cadence mk and high cadence fk.
  • the unit 60 is connected to the microcontroller 50, as indicated by the double arrow 61.
  • the signal V1 is generated at the predetermined high rate fk and controls alternatively, on the one hand, stopping and starting the oscillator 55 and, on the other hand, a receiver 62 of the central unit.
  • the identification device I receives via its antenna 100 on the line I1 (see figure 6) a signal which corresponds to the anti-piracy bit h1 emitted by vehicle V, with a delay time ⁇ which corresponds to signal propagation time between vehicle and device Identification.
  • the signal then passes through the amplifier 103, the output is connected to a branch between, on the one hand, a unit of measurement of average bit length 124 and, on the other hand, a timer digital 125 to delay the signal by a useful bit time Tb, at the frequency fk.
  • FIG. 8 shows the signal I2 which corresponds to the digital signal at the output of the self-timer 125, said signal being delayed by a useful bit time Tb, Tb possibly being equal or different from Ta.
  • the output of the self-timer 125 is connected to an input an exclusive OR logic gate 109, the other input of which receives a encrypted authentication control signal g, the frame of which is shown on line I6.
  • the bit rate of the signals g is at medium rate mk, lower than the high rate fk of the anti-piracy bits h.
  • the microcontroller 107 of the device identification transmits signal g at low speed sk to a memory buffer 110 which outputs the signal g at the average rate mk to mixer 109.
  • the mixer 109 outputs a digital signal of control shown in 17.
  • the output of the mixer 109 is connected to a transmitter 111 for transmitting a response signal R via an antenna 112, at an amplitude on the order of 2V effective, towards vehicle V, as represented by arrow R.
  • the identification device When receiving each signal representative of a bit anti-piracy, the identification device is able to detect the front descending F of the signal at the output of amplifier 103, in a Falling edge detector 113, as visible in FIG. 4. This last one is able to command a scale 114 with a slight delay of safety ⁇ to avoid any overlap between reception and the emission of the signal at the identification device.
  • This flip-flop 114 controls the start of a high frequency oscillator 115 of the transmitter 111, after the slight delay ⁇ , which oscillator 115 is connected at output to a phase or amplitude modulator 118 of said transmitter 111, said modulator 118 being controlled by signal 17 in mixer 109 output.
  • detector 113 sends a bit synchronization signal via line 119 to a time base management unit 116 which delivers the aforementioned clock signals sk, mk and fk, said unit 116 being connected to microcontroller 107 via line 117.
  • Said unit 116 is suitable for command rocker 114 to switch it to its stop state of oscillator 115, at the end of time bit Tb, as visible on the Figure 4.
  • close from 0 s.
  • the duration of transmission of the signals is of the order of 3 ns per meter of distance between the vehicle and the identification device I.
  • the propagation time ⁇ would be around 30 ns.
  • the response time of the electronic circuits which could be of the order of a few ns, or tens of ns, depending on the bandwidth allocated to the carrier.
  • the signal retransmitted by the identification device is received by a receiver 62 via an antenna 63, with an attenuation of the order of - 40 dBm, which represents an attenuation coefficient of 100 times, that is, the signal received by the vehicle has an amplitude of around 20 mV.
  • the receiver 62 includes a radio frequency filter 64 connected to the antenna 63, whose output signal is represented by line V3, this signal being delivered to the input of a logarithmic amplifier 65 which has a gain of 80 dB, which achieves a coefficient of multiplication of up to 10,000 times, and in particular to deliver in output of said amplifier 65 a signal of the order of 2V effective.
  • Amplifier 65 is controlled by signal V1 and is connected at output to a phase or amplitude demodulator 67.
  • the amplifier 65 Since the amplifier 65 is controlled by the signal V1, said amplifier switches to its inactive state when it starts the transmission of the second bit of anti-piracy h2, as indicated on the line V1 in figure 6.
  • the central unit receives the response signal from the identification device I with a delay equal to 2 ⁇ + ⁇ , only the start of the response signal is processed by the receiver 65 and therefore demodulated by demodulator 67, as indicated on line V9, whose demodulated signal has a duration Tc which is less than the duration Ta of the transmission bit and the duration Tb of the transmission bit reply.
  • the duration Tc of the bit analyzed in response by the central unit is of the order of 150 ns, which corresponds to 75% of the initial signal.
  • the phase demodulator 67 delivers a signal representative of the hog function on line V9 which is connected to an input of a door exclusive OR logic 70.
  • This logic gate 70 receives on its other input a signal V8 representative of the function h, delivered at the output of the digital self-timer 59.
  • Logic gate 70 could be replaced by another type of mixer, as shown in Figure 3.
  • the signal V8 corresponds to signal V7 with a delay corresponding to Tb offset of digital self-timer 125 of the identification device I.
  • the logic gate 70 outputs a signal V10, which is representative of the offset between the V8 and V9 signals, i.e. a signal representative of the encrypted authentication signal g emitted by the identification device I, with a small offset corresponding to the signal propagation time which is equal to 2 ⁇ , as visible on the figure 8.
  • the output of logic gate 70 is connected to a branch between, on the one hand, a low-pass filter 71 at the average rate mk which is the cadence corresponding to the signal g and, on the other hand, another exclusive OR logic gate 73.
  • the low-pass filter 71 is connected to a buffer 72, which transforms said signal from cadence mk to cadence sk before sending it to the microcontroller 50 which will compare the signal g received from the authentication device with the g signal generated at vehicle level, for authentication of communication, which corresponds to the last step 10 illustrated on the diagram in Figure 1. Note that this comparison between the two functions g are performed by auto-correlation between the signals, the acceptable auto-correlation threshold being for example set at 90%, knowing that a level of autocorrelation of 50% corresponds to the comparison of two random signals.
  • the microcontroller 50 delivers the signal g specific to the vehicle to a buffer memory 74 at the rate sk, so that it sends it back to the cadence mk at the other input of the above logic gate 73.
  • a buffer memory 74 at the rate sk, so that it sends it back to the cadence mk at the other input of the above logic gate 73.
  • the logic gate 73 mixes the V10 and V11 signals in order to output only the offsets due at the signal propagation time between vehicle V and the device identification I, as shown on line V12. Leaving the logic gate 73 is connected to the input of an integrator 75, which goes output a V13 signal which will go up by stairs in function of time, for each slot C representative of the propagation time of the signal.
  • Line V13 is connected to a branch line between, share, a first comparator 76 receiving on another input a threshold limit value 76a which corresponds to the propagation time maximum acceptable, for example 50 ns x n, n being the number of bits anti-piracy, and, on the other hand, a second comparator 77 receiving on another entry another threshold limit value 77a lower than the value 76a and which corresponds to the propagation time over the distance authorized.
  • a threshold limit value 76a which corresponds to the propagation time maximum acceptable, for example 50 ns x n, n being the number of bits anti-piracy
  • a second comparator 77 receiving on another entry another threshold limit value 77a lower than the value 76a and which corresponds to the propagation time over the distance authorized.
  • an attempt to hack will be sent or not via line 78 by the first comparator 76 to the microcontroller 50.
  • the second comparator 77 will send to the microcontroller 50 via line 79, a signal indicating that communication is done outside the authorized distance, without however constituting a hacking attempt.
  • the integrator 75 will sum the elementary time shifts until the end of the anti-piracy frame, as indicated by arrow 75a, unless the communication is interrupted beforehand by the first and second comparators 76 and 77 above.
  • microcontroller 50 can deliver different signals from output to other vehicle components via track 80 shown on Figures 3 and 4.
  • the invention by shortening the reception of the signal emitted by the vehicle. AT as an example, as soon as the hacker detects with a relay box the vehicle transmitting an anti-piracy bit, it can re-issue to the other relay box only the start of said signal, in order to cause the device to send the response signal early Identification.
  • the signal is shortened by a duration which would correspond to the duration of propagation of the signal over the distance between the identification device and the vehicle, for example compared to the maximum distance allowed.
  • the detector 113 of the identification device I is able to detect the front descending from the signal received from the vehicle, shortening the signal emitted by the vehicle makes it possible to anticipate the emission by the response signal identification device, thereby removing any unauthorized delay between sending and receiving the signal anti-piracy by the vehicle, which can thus trap the system.
  • the measurement of average bit length 124 of the identification device I allows to measure the average length of the bits received by the device identification from the vehicle. For example if the average length thus measured is less than 90% of the length expected from the bit sent by the vehicle, the unit 124 will then send a hacking attempt signal via line 131 to the microcontroller 107 and a stop signal via line 130 to the basic management unit of time 116. In other words, the unit 124 makes it possible to verify the integrity of the bit received by the identification device and thus makes it possible to detect a hacking attempt, even if the hacker shortens the re-transmission of the signal to the identification device. Indeed, if this shortened signal can trap the integrator 75 of the central processing unit vehicle control, however unit 124 will interpret this signal shortened as an erroneous signal and will thus interrupt the communication.
  • the intermediate clock rate mk is between 20 and 60 times lower than the rate fk.
  • the antennas 54 and 63 of the vehicle V by a single antenna 82 shown in broken lines in FIG. 4, which antenna 82 would be connected to a diplexer 81 shown in broken lines in Figure 4, to switch between the reception mode and the transmission mode as appropriate.
  • the diplexers 81 and 120 could thus communicate with each other, as indicated by the double arrow T.
  • the vehicle V receives from the device identifying a hos signal where s represents service data which come to modulate the signal h by phase inversion, as it was the case for signal g whose length is less than that of signal h.

Description

La présente invention concerne un système d'accès dit mains libres pour véhicule automobile, c'est à dire un système de communication non filaire permettant d'entrer dans le véhicule sans clé. Ce système peut également s'appliquer au démarrage mains libres du véhicule, c'est à dire au démarrage sans clé.The present invention relates to a so-called hand access system free for motor vehicle, i.e. a system of wireless communication allowing entry into the vehicle without key. This system can also be applied to hands-free starting of the vehicle, i.e. when starting without a key.

Un tel système comporte généralement un dispositif d'identification destiné à être porté par un utilisateur et apte à établir une communication bidirectionnelle à distance et sans fil avec une unité centrale de commande embarquée sur le véhicule, pour authentifier l'utilisateur et commander des moyens de condamnation/décondamnation des serrures des ouvrants lorsque l'utilisateur a été reconnu authentique. L'initialisation du protocole de communication peut être activée en actionnant la poignée extérieure de porte, pour l'accès mains libres, ou en appuyant sur un bouton de démarrage, dans le mode démarrage mains libres. Le système est apte à établir ladite communication bidirectionnelle lorsque le dispositif d'identification est situé à une distance inférieure à une distance limite prédéterminée du véhicule, généralement de l'ordre de quelques mètres, pour éviter, d'une part, les interférences avec d'autres sources de signaux de l'environnement, et, d'autre part, pour éviter le fonctionnement du système à une distance telle que l'utilisateur est trop éloigné du véhicule pour être conscient des opérations effectuées par ledit système.Such a system generally includes a device identification intended to be worn by a user and capable of establishing wireless two-way remote communication with a unit control unit on board the vehicle to authenticate the user and order locking / unlocking means door locks when the user has been recognized as authentic. Communication protocol initialization can be activated by operating the exterior door handle, to hands-free access, or by pressing a start button, in hands-free start mode. The system is able to establish said two-way communication when the identification device is located at a distance less than a predetermined limit distance from the vehicle, generally of the order of a few meters, to avoid, on the one hand, interference with other signal sources from the environment, and, on the other hand, to avoid the functioning of the system at a distance such that the user is too far from the vehicle to be aware of the operations carried out by said system.

Certains systèmes actuellement proposés utilisent des systèmes à induction magnétique à très courte portée, pour à la fois alimenter en énergie et transporter les informations depuis l'unité centrale du véhicule vers le dispositif d'identification qui se trouve dans le champ électromagnétique engendré par les antennes du véhicule. Toutefois, un tel système ne permet une communication qu'à très courte distance du véhicule de l'ordre de quelques cm. Un autre système couramment proposé consiste à utiliser des ondes porteuses à basse fréquence, de l'ordre de 125 kHz pour la communication depuis le véhicule vers le dispositif d'identification, et des ondes porteuses à ultra haute fréquence, par exemple de l'ordre de 434 ou 868 MHz, pour la zone Europe, et de 315 ou 902 MHz pour la zone USA. Toutefois, dans ce cas, le dispositif d'identification doit comporter une pile pour alimenter ses circuits électroniques propres. Pour minimiser la consommation électrique, on peut prévoir, à titre d'exemple, que le dispositif d'identification soit en sommeil pendant 9 ms et en éveil 1 ms, pendant des périodes de 10 ms.Certain systems currently proposed use systems with Very short-range magnetic induction, for both supplying energy and transport information from the central unit of the vehicle to the identification device in the field electromagnetic generated by the vehicle's antennas. However, a such a system allows communication only at very short distance from the vehicle in the order of a few cm. Another commonly used system proposed consists in using low frequency carrier waves, around 125 kHz for communication from the vehicle to the identification device, and ultra high carrier waves frequency, for example of the order of 434 or 868 MHz, for the area Europe, and 315 or 902 MHz for the USA zone. However, in this case, the identification device must include a battery to power its own electronic circuits. To minimize consumption electric, we can provide, for example, that the device identification is dormant for 9 ms and awake 1 ms, during periods of 10 ms.

Bien entendu, la communication bidirectionnelle entre le véhicule et le dispositif d'identification est cryptée, afin d'éviter tout fonctionnement intempestif du système et pour le sécuriser vis à vis des malfaiteurs. Sur la figure 1 des dessins annexés, on a représenté un exemple de système d'encryptage déjà connu. Sur cette figure 1, on a représenté un véhicule V qui comporte dans son unité centrale une mémoire 1 contenant une clé secrète K et un générateur de nombres aléatoires 2, les nombres aléatoires R engendrés ayant, par exemple, une longueur de 56 bits. Ce nombre aléatoire R est émis vers le dispositif d'identification I, comme indiqué par la flèche 3. Simultanément, ce même nombre aléatoire R est mélangé avec la clé secrète K suivant une fonction associative complexe f, dans un mélangeur 4 qui est relié à son entrée à la mémoire 1 et au générateur de nombres aléatoires 2. Le mélangeur 4 délivre, en sortie, un signal représentatif du mélange de la clé secrète K et du nombre aléatoire R, à savoir le signal f(R, K). Ce signal est mémorisé dans une mémoire 5 reliée à la sortie du mélangeur 4. Ce signal est envoyé au dispositif d'identification I, sous la forme d'un signal d'une longueur par exemple de 28 bits, comme indiqué par la flèche 6. Dans le véhicule V, le signal f(R, K) est mélangé à nouveau à la clé secrète K dans un mélangeur 7, qui est relié à son entrée aux mémoires 1 et 5 précitées. Ce mélangeur 7 mélange les deux signaux suivant une fonction associative complexe g. Le véhicule V mémorise alors dans une mémoire 8 reliée à la sortie du mélangeur 7 le signal représentatif du mélange, à savoir le signal g(R, f, K).Of course, two-way communication between the vehicle and the identification device is encrypted, in order to avoid any untimely operation of the system and to secure it from malefactors. In Figure 1 of the accompanying drawings, there is shown a example of an already known encryption system. In this figure 1, we have represented a vehicle V which has in its central unit a memory 1 containing a secret key K and a number generator 2, the generated random numbers R having, for example, a length of 56 bits. This random number R is transmitted towards the identification device I, as indicated by arrow 3. Simultaneously, this same random number R is mixed with the key secret K following a complex associative function f, in a mixer 4 which is connected to its input to memory 1 and to the generator of random numbers 2. Mixer 4 outputs a signal representative of the mixture of the secret key K and the random number R, at know the signal f (R, K). This signal is stored in a memory 5 connected to the output of mixer 4. This signal is sent to the device of identification I, in the form of a signal of length by 28-bit example, as shown by arrow 6. In vehicle V, the signal f (R, K) is mixed again with the secret key K in a mixer 7, which is connected at its input to memories 1 and 5 above. This mixer 7 mixes the two signals according to a function complex associative g. Vehicle V then stores in a memory 8 connected to the mixer output 7 the signal representative of the mixture, namely the signal g (R, f, K).

Du côté du dispositif d'identification, la même clé secrète K est mémorisée dans une mémoire 11 et un mélangeur 14 ayant la même fonction associative f reçoit en entrée la clé secrète fournie par la mémoire 11 du dispositif d'identification I et le nombre aléatoire R reçu par le dispositif d'identification en provenance du véhicule. Le dispositif d'identification I mémorise le signal en sortie du mélangeur 14 dans une mémoire 15 et compare ce signal dans un comparateur 16 avec le signal reçu suivant la flèche 6 en provenance du véhicule V. Si les deux signaux ne sont pas identiques, sous réserve du temps de retard propre au matériel et à la transmission du signal dans la zone de transmission autorisée, le dispositif d'identification interrompt la communication comme étant non-autorisée. En revanche, si les deux signaux correspondent, le signal est mélangé dans un mélangeur 17 avec la clé secrète fournie par la mémoire 11 du dispositif d'identification I, suivant la même fonction associative g précitée. Le signal de sortie du mélangeur 17 est mémorisé dans une mémoire 18 du dispositif d'identification pour être ensuite envoyé vers le véhicule suivant la flèche 9 sous la forme d'un signal ayant une longueur par exemple de 20 bits. Enfin, le signal reçu par la flèche 9 est comparé avec le signal reçu de la mémoire 8 du véhicule dans un comparateur 10. Si ces deux signaux correspondent, sous réserve des retards dus au temps de réponse du matériel et de la transmission du signal dans la zone autorisée, le reste de la communication est autorisé et l'unité centrale du véhicule pourra, le cas échéant, commander la condamnation ou la décondamnation des serrures des ouvrants du véhicule. Bien entendu, un autre protocole de cryptage pourra être utilisé pour sécuriser la transmission des données.On the identification device side, the same secret key K is stored in a memory 11 and a mixer 14 having the same associative function f receives as input the secret key provided by the memory 11 of the identification device I and the random number R received by the identification device from the vehicle. The identification device I stores the signal at the mixer output 14 in a memory 15 and compare this signal in a comparator 16 with the signal received according to arrow 6 from vehicle V. If the two signals are not identical, subject to the time of hardware and signal transmission delay in the area of authorized transmission, the identification device interrupts the communication as being unauthorized. On the other hand, if the two signals match, the signal is mixed in a mixer 17 with the secret key provided by the memory 11 of the device identification I, according to the same associative function g above. The mixer 17 output signal is stored in memory 18 of the identification device to then be sent to the vehicle according to arrow 9 in the form of a signal having a length by 20 bit example. Finally, the signal received by arrow 9 is compared with the signal received from the vehicle memory 8 in a comparator 10. If these two signals match, subject to delays due to hardware response time and signal transmission in the authorized zone, the rest of the communication is authorized and the unit vehicle center may, if necessary, order the condemnation or unlocking of the locks of the doors of the vehicle. Of course, another encryption protocol could be used to secure data transmission.

Toutefois, malgré ce protocole de cryptage, il existe une façon de pirater le système, sans connaítre ni la clé secrète, ni les différentes fonctions associatives du protocole d'encryptage. Ce procédé de piratage est représenté sur la figure 2. Selon ce procédé, on suppose que l'utilisateur U qui porte le dispositif d'identification I est situé à une distance du véhicule V supérieure à la distance autorisée de communication, par exemple de 10 à 100 m de distance du véhicule. Dans ce cas, un pirate équipé d'un premier boítier relais 20 peut s'approcher du véhicule V à une distance suffisante pour communiquer avec celui-ci, par exemple à une distance de l'ordre de 1 à 5 m. Ce pirate actionne le début de la communication, par exemple en tirant sur la poignée extérieure de portière. Ceci déclenche l'émission des signaux basse fréquence par le véhicule vers le boítier relais 20, comme indiqué par la flèche en zig-zag 21. Ce signal 21 envoyé par le véhicule est reçu par une bobine 22 du boítier relais 20, qui est reliée à un récepteur 23 à 125 kHz. Ce récepteur 23 est relié à un émetteur à large bande à haute fréquence, de l'ordre de plusieurs MHz. L'émetteur 24 émet via son antenne 25, comme représenté par la flèche 26, vers un deuxième boítier relais 30, qui est porté par un autre pirate qui suit de près l'utilisateur U. L'échange d'informations entre les deux boítiers relais 20 et 30 s'effectuant à très haute fréquence, il est possible d'effectuer cette communication à grande distance. Le deuxième boítier relais 30 comporte une antenne 31 pour recevoir le signal 26 émis par le boítier relais 20. L'antenne 31 est reliée à un récepteur large bande à la même fréquence que l'émetteur 24 du premier boítier relais 20. Le signal ainsi reçu est retransmis à basse fréquence à 125 kHz par un émetteur 33 qui est relié à une bobine d'émission 34 afin d'envoyer un signal 35 vers le dispositif d'identification I qui soit conforme au signal 21 émis par le véhicule. Le signal 35 étant la répétition du signal authentique du véhicule, le dispositif d'identification I va le reconnaítre et émettre à son tour son signal de réponse 36, ledit signal de réponse 36 étant envoyé à haute fréquence et reçu par une antenne 37 du deuxième boítier relais 30, par exemple à 434 MHz. L'antenne 37 est reliée à un récepteur 38, qui va convertir le signal à 434 MHz en un signal à une fréquence différente, par exemple à 315 MHz. Le signal est alors émis par un émetteur à large bande 39 via une antenne 40 vers le premier boítier relais 20, cette différence de fréquence étant nécessaire pour que les différents signaux n'interfèrent pas entre eux. Bien entendu, la fréquence du signal 41 émis en retour par le deuxième boítier relais 30 est différente à la fois de la fréquence du signal 26 et du signal 36. Ce signal 41 est capté par une antenne 27 du premier boítier relais 20, ladite antenne 27 étant reliée à un récepteur large bande 28 de la même fréquence que l'émetteur 39. Le récepteur 28 est relié à un émetteur 29 qui transforme le signal à 315 MHz en un signal à 434 MHz qui est envoyé via l'antenne 42 du premier boítier relais 20 vers le véhicule V, comme représenté par la flèche en zig-zag 43.However, despite this encryption protocol, there is a way to hack the system, without knowing either the secret key or the different associative functions of the encryption protocol. This process of piracy is shown in Figure 2. According to this method, we assume that the user U who is wearing the identification device I is located at a distance from vehicle V greater than the authorized distance of communication, for example from 10 to 100 m from the vehicle. In this case, a pirate equipped with a first relay box 20 can approach vehicle V a sufficient distance to communicate with it, for example at a distance of the order of 1 to 5 m. This hacker activates the start of the communication, for example by pulling on the exterior door handle. This triggers the emission of low frequency signals by the vehicle to the relay box 20, as indicated by the zigzag arrow 21. This signal 21 sent by the vehicle is received by a coil 22 of the relay box 20, which is connected to a receiver 23 at 125 kHz. This receiver 23 is connected to a transmitter at broadband at high frequency, of the order of several MHz. The transmitter 24 transmits via its antenna 25, as represented by the arrow 26, to a second relay box 30, which is carried by another pirate which closely follows user U. The exchange of information between the two relay boxes 20 and 30 being carried out at very high frequency, it is this communication can be carried out from a long distance. The second relay box 30 includes an antenna 31 for receiving the signal 26 emitted by the relay box 20. The antenna 31 is connected to a broadband receiver at the same frequency as transmitter 24 of the first relay box 20. The signal thus received is retransmitted at low frequency at 125 kHz by a transmitter 33 which is connected to a coil 34 to send a signal 35 to the device identification I which conforms to signal 21 emitted by the vehicle. The signal 35 being the repetition of the authentic signal of the vehicle, the identification device I will recognize it and in turn issue its response signal 36, said response signal 36 being sent at high frequency and received by an antenna 37 of the second relay box 30, by example at 434 MHz. The antenna 37 is connected to a receiver 38, which goes convert the signal at 434 MHz to a signal at a different frequency, for example at 315 MHz. The signal is then emitted by a transmitter at broadband 39 via an antenna 40 to the first relay box 20, this difference in frequency being necessary for the different signals do not interfere with each other. Of course, the frequency of signal 41 sent back by the second relay box 30 is different both the frequency of signal 26 and signal 36. This signal 41 is received by an antenna 27 of the first relay box 20, said antenna 27 being connected to a broadband receiver 28 of the same frequency as the transmitter 39. The receiver 28 is connected to a transmitter 29 which transforms the 315 MHz signal into a 434 MHz signal which is sent via the antenna 42 of the first relay box 20 to the vehicle V, as represented by the zigzag arrow 43.

Il suffit que les pirates utilisent des boítiers relais ayant des liaisons à large bande, par exemple supérieure à 50 MHz, ce qui est possible car les systèmes pirates n'ont pas à respecter les réglementations ; le temps de transit supplémentaire dû à la distance peut être alors de l'ordre de quelques nanosecondes, ce qui est négligeable en comparaison avec les constantes de temps nécessaires pour la transmission normale autorisée. A titre d'exemple, la communication totale peut être de l'ordre de 20 à 40 ms, et la durée totale du fonctionnement du système pour déclencher la décondamnation ou la condamnation des serrures électriques peut être de l'ordre de 100 ms.It is enough that the hackers use relay boxes having broadband links, for example greater than 50 MHz, which is possible because pirate systems do not have to comply with regulations; additional transit time due to distance can be of the order of a few nanoseconds, which is negligible compared to the necessary time constants for normal transmission allowed. For example, the total communication can be of the order of 20 to 40 ms, and the duration total operation of the system to trigger the unlocking or locking electric locks can be of the order of 100 ms.

Pour détecter un tel piratage et interrompre la communication, une solution pourrait consister à mesurer le temps de propagation des ondes radio UHF, en comparant ce temps mesuré avec un temps prédéterminé correspondant à une communication dans une zone limitée autorisée autour du véhicule. Toutefois, pour détecter le temps de retard dû à la distance, par rapport à un temps de communication global, il est nécessaire de disposer de large bande passante, ce qui correspond à une cadence de communication rapide, par exemple de l'ordre de 20 à 40 Mb/s. Avec une telle cadence de communication, il est nécessaire d'opérer à très haute fréquence, par exemple à 2,4 GHz. Mais pour mesurer des temps très courts, il est nécessaire d'avoir une bande passante très importante, ce qui vient se heurter aux réglementations applicables qui limitent fortement les bandes passantes autorisées, pour éviter une saturation de l'environnement par des ondes électromagnétiques.To detect such hacking and interrupt communication, one solution could be to measure the propagation time of UHF radio waves, comparing this measured time with a time predetermined corresponding to a communication in an area limited allowed around the vehicle. However, to detect the time delay due to distance, compared to communication time overall, it is necessary to have broad bandwidth, which corresponds to a fast communication rate, for example of around 20 to 40 Mb / s. With such a communication rate, it is necessary to operate at very high frequency, for example at 2.4 GHz. But to measure very short times, it is necessary to have a very high bandwidth, which comes up against applicable regulations that severely limit bandwidths allowed, to avoid saturation of the environment with waves electromagnetic.

L'invention a pour but d'éliminer les inconvénients précités et de proposer un système d'accès dit mains libres pour véhicule automobile, permettant de détecter un piratage du système, notamment par l'intermédiaire de boítiers relais, en prenant compte du temps de propagation du signal entre le véhicule et le dispositif d'identification.The object of the invention is to eliminate the aforementioned drawbacks and to propose a so-called hands-free access system for a motor vehicle, allowing to detect a hacking of the system, in particular by through relay boxes, taking into account the time of propagation of the signal between the vehicle and the identification device.

A cet effet, l'invention a pour objet un système d'accès dit mains libres pour véhicule automobile, comportant un dispositif d'identification destiné à être porté par un utilisateur et apte à établir une communication bidirectionnelle à distance et sans fil avec une unité centrale de commande embarquée sur le véhicule, pour authentifier l'utilisateur et commander des moyens de condamnation/décondamnation des serrures des ouvrants lorsque l'utilisateur a été reconnu authentique, ledit système étant apte à établir ladite communication bidirectionnelle lorsque le dispositif d'identification est situé à une distance inférieure à une distance limite prédéterminée du véhicule, caractérisé par le fait que ladite unité centrale est apte à engendrer, à une cadence d'horloge haute prédéterminée, lors de la communication, un train de bits d'anti-piratage, chaque bit dudit train étant émis vers le dispositif d'identification sous la forme d'un signal d'interrogation radio-fréquence représentatif dudit bit, de façon qu'après réception dudit signal d'interrogation par le dispositif d'identification, ce dernier émet, avec un retard au moins égal à un temps bit utile, un signal de réponse vers l'unité centrale de commande, cette dernière comportant au moins un mélangeur apte à mélanger, d'une part, le signal de réponse reçu en provenance du dispositif d'identification et, d'autre part, le train de bits d'anti-piratage engendré par l'unité centrale et retardé d'un temps bit utile, pour délivrer en sortie dudit mélangeur un signal représentatif des décalages temporels successifs de chaque bit dudit train d'anti-piratage, ce dernier signal étant reçu à l'entrée d'un intégrateur pour faire la somme des temps de réponse liés à chaque créneau de décalage temporel de bit d'anti-piratage, la sortie dudit intégrateur étant reliée à au moins un premier comparateur pour comparer ladite somme de temps de réponse avec une première valeur de seuil prédéterminée, au-delà de laquelle est détectée une tentative de piratage provoquant l'arrêt de ladite communication.To this end, the invention relates to an access system called hands free for motor vehicle, comprising a device identification intended to be worn by a user and capable of establishing wireless two-way remote communication with a unit control unit on board the vehicle to authenticate the user and order locking / unlocking means door locks when the user has been recognized as authentic, said system being capable of establishing said two-way communication when the identification device is located at a distance less than a predetermined limit distance from the vehicle, characterized in that said central unit is able to generate, at a predetermined high clock rate, when communication, an anti-piracy bit stream, each bit of said train being transmitted to the identification device in the form of a signal radio frequency interrogation representative of said bit, so only after reception of said interrogation signal by the device identification, the latter transmits, with a delay at least equal to one useful bit time, a response signal to the central control unit, the latter comprising at least one mixer capable of mixing, on the one hand, the response signal received from the device identification and, on the other hand, the anti-piracy bit stream generated by the central unit and delayed by a useful bit time, to deliver in output of said mixer a signal representative of the time offsets successive of each bit of said anti-piracy train, this last signal being received at the input of an integrator to sum the times of response related to each time shift bit slot of anti-piracy, the output of said integrator being connected to at least one first comparator to compare said sum of response times with a first predetermined threshold value, beyond which is detected a hacking attempt causing said halt communication.

On entend par "temps d'émission utile" le temps d'émission de l'information binaire dudit bit par rapport au temps total de la cellule à laquelle est associé ledit bit qui comprend généralement ledit temps utile et un temps de silence pour permettre la réception du signal réémis par le dispositif d'identification pendant ledit temps de silence."Useful transmission time" means the transmission time of the binary information of said bit with respect to the total time of the cell at which is associated with said bit which generally includes said time useful and a time of silence to allow reception of the signal retransmitted by the identification device during said time of silence.

Avantageusement, la somme des temps de réponse effectuée par l'intégrateur, est arrêtée lorsque l'unité centrale de commande détecte la réception du dernier bit du train d'anti-piratage.Advantageously, the sum of the response times performed by the integrator, is stopped when the central control unit detects receiving the last bit of the anti-piracy train.

Selon une autre caractéristique, la sortie de l'intégrateur est reliée à au moins un second comparateur pour comparer ladite somme de temps de réponse avec une autre valeur de seuil prédéterminée inférieure à ladite première valeur de seuil prédéterminée, au-delà de laquelle est détectée une communication au-delà de ladite distance limite prédéterminée. According to another characteristic, the output of the integrator is linked to at least a second comparator to compare said sum response time with another predetermined threshold value lower than said first predetermined threshold value, beyond which communication is detected beyond said distance predetermined limit.

Selon encore une autre caractéristique, le dispositif d'identification comporte un retardateur de signal numérique apte à retarder d'un temps bit utile le signal d'interrogation reçu en provenance du véhicule, un oscillateur générateur d'ondes porteuses en radio fréquence, relié en sortie à un modulateur de phase ou d'amplitude, qui est commandé par le signal en sortie dudit retardateur, pour délivrer en sortie dudit modulateur ledit signal de réponse destiné à être émis vers le véhicule. Dans ce cas, le dispositif d'identification peut comporter un détecteur de front descendant pour détecter le front descendant du signal d'interrogation reçu en provenance du véhicule, ledit détecteur étant apte à faire basculer ledit oscillateur du dispositif d'identification entre un état d'arrêt correspondant au mode réception du dispositif d'identification et un état de fonctionnement correspondant à son mode d'émission.According to yet another characteristic, the device identification includes a digital signal timer capable of delay the interrogation signal received by a useful bit time from the vehicle, a carrier wave oscillator in radio frequency, connected at output to a phase modulator or amplitude, which is controlled by the signal at the output of said retarder, for outputting said response signal at the output of said modulator to be issued to the vehicle. In this case, the identification device may have a falling edge detector to detect the edge descending from the interrogation signal received from the vehicle, said detector being able to tilt said oscillator of the device of identification between a stop state corresponding to the reception mode of the identification device and a corresponding operating state to its mode of transmission.

Selon encore une autre caractéristique, le train de bits d'anti-piratage est engendré par l'unité centrale après l'émission des données d'authentification cryptées vers le dispositif d'identification. Dans ce cas, le dispositif d'identification peut comporter un mélangeur pour mélanger le signal en sortie dudit retardateur avec un signal numérique d'authentification crypté de réponse du dispositif d'identification, à une cadence plus lente que celle du train de bits d'anti-piratage, le signal de sortie de ce mélangeur étant apte à commander le modulateur précité du dispositif d'identification.According to yet another characteristic, the anti-piracy bit stream is generated by the central processing unit after sending the data authentication methods encrypted to the identification device. In this case, the identification device may include a mixer for mix the signal at the output of said self-timer with a digital signal of encrypted authentication in response to the identification device, to a slower than the anti-piracy bitstream, the signal output of this mixer being able to control the aforementioned modulator of the identification device.

On peut prévoir alors que l'unité centrale du véhicule comporte un démodulateur de phase ou d'amplitude pour démoduler le signal reçu par le véhicule en provenance du dispositif d'identification, une porte logique OU exclusif dont les entrées sont reliées respectivement audit démodulateur de phase et à un retardateur de signal numérique, ledit retardateur étant apte à retarder d'un temps bit utile chaque bit du train d'anti-piratage engendré par l'unité centrale, ladite porte logique étant apte à délivrer en sortie un signal numérique représentatif du signal crypté de réponse du dispositif d'identification.It can then be foreseen that the central unit of the vehicle comprises a phase or amplitude demodulator to demodulate the signal received by the vehicle from the identification device, a exclusive OR logic gate whose inputs are connected respectively said phase demodulator and a digital signal retarder, said retarder being capable of delaying by bit useful time each bit of the anti-piracy train generated by the central unit, said logic gate being able to output a digital signal representative of the encrypted identification device response signal.

Dans une première forme de réalisation, le signal délivré en sortie de la porte logique OU exclusif précitée est comparé par l'unité centrale à un signal numérique crypté d'authentification engendré par l'unité centrale, afin d'authentifier le dispositif d'identification. In a first embodiment, the signal delivered in output of the aforementioned exclusive OR logic gate is compared by the unit central to an encrypted digital authentication signal generated by the central unit, in order to authenticate the identification device.

Dans une autre forme de réalisation, la sortie de ladite porte logique OU exclusif est reliée à une entrée d'une deuxième porte logique OU exclusif dont l'autre entrée reçoit un signal numérique crypté d'authentification engendré par l'unité centrale, afin de délivrer en sortie ledit signal représentatif des décalages temporels successifs de chaque bit du train d'anti-piratage.In another embodiment, the exit from said door exclusive OR logic is connected to an input of a second door exclusive OR logic whose other input receives a digital signal encrypted authentication generated by the central unit, in order to deliver at output said signal representative of successive time offsets of every bit of the anti-piracy train.

On peut également prévoir que l'unité centrale est apte à commander alternativement l'arrêt et le démarrage de l'oscillateur de l'unité centrale suivant ladite haute cadence d'horloge prédéterminée pour faire basculer l'unité centrale respectivement en mode réception et émission. Etant donné que l'on utilise un oscillateur à très haute fréquence, par exemple de l'ordre de 2,4 GHz, il est possible d'arrêter et de redémarrer l'oscillateur pour chaque bit du train d'anti-piratage, car le temps de relaxation de ce type d'oscillateur est faible.It can also be provided that the central unit is able to alternately control the stop and start of the oscillator the central unit according to said predetermined high clock rate to switch the central unit respectively to reception mode and program. Since a very high oscillator is used frequency, for example around 2.4 GHz, it is possible to stop and restart the oscillator for each bit of the anti-piracy train, because the relaxation time of this type of oscillator is short.

Selon une autre caractéristique, l'unité centrale de commande comporte un oscillateur générateur d'ondes porteuses en radio fréquence, relié à un modulateur de phase ou d'amplitude, qui est commandé par le train de bits d'anti-piratage engendré par l'unité centrale du véhicule.According to another characteristic, the central control unit has a radio carrier wave oscillator frequency, connected to a phase or amplitude modulator, which is controlled by the anti-piracy bit stream generated by the unit vehicle center.

Dans une variante, le dispositif d'identification peut comporter une unité de mesure de longueur moyenne des bits reçus, pour mesurer, après démodulation du signal d'interrogation reçu en provenance du véhicule, la longueur moyenne des bits d'anti-piratage reçus, ladite unité de mesure étant apte à provoquer l'interruption de la communication lorsque ladite longueur moyenne est inférieure à une valeur prédéterminée, par exemple 90 % de la longueur utile du bit émis par le véhicule. Cette unité a pour but d'éviter qu'un pirate contourne le dispositif d'anti-piratage constitué par l'intégrateur, en écourtant la réception du signal émis en provenance du véhicule, afin de provoquer un signal de réponse anticipé de la part du dispositif d'identification, cette réponse anticipée ayant pour but de compenser la durée de propagation du signal due à l'éloignement.Alternatively, the identification device may include a unit of measurement of average length of the bits received, for measure, after demodulation of the interrogation signal received in source of the vehicle, the average length of the anti-piracy bits received, said measurement unit being capable of causing the interruption of the communication when said average length is less than one predetermined value, for example 90% of the useful bit length emitted by the vehicle. The purpose of this unit is to prevent a pirate bypasses the anti-piracy device constituted by the integrator, by shortening the reception of the signal sent from the vehicle, so cause an early response signal from the device of identification, this anticipated response intended to compensate for the duration of signal propagation due to distance.

Selon encore une autre caractéristique, l'unité centrale est apte à commander l'arrêt ou le fonctionnement d'un récepteur à ladite haute cadence d'horloge, de façon que ledit récepteur délivre au mélangeur de l'unité centrale un signal numérique représentatif de l'interprétation du début du signal de réponse reçu en provenance du véhicule. En effet, la fin du signal de réponse n'est pas traitée par l'unité centrale, car ladite fin vient se chevaucher avec l'émission du bit d'anti-piratage suivant, en raison du retard dû à la propagation du signal.According to yet another characteristic, the central unit is able to control the stop or operation of a receiver at said high clock rate, so that said receiver delivers to the mixer from the central unit a digital signal representative of the interpretation the start of the response signal received from the vehicle. In Indeed, the end of the response signal is not processed by the central unit, because said end overlaps with the emission of the anti-piracy bit next, due to the delay due to signal propagation.

A titre d'exemple, le temps bit utile peut être compris entre 50 ns et 1µs, par exemple de l'ordre de 200 ns.For example, the useful bit time can be between 50 ns and 1µs, for example of the order of 200 ns.

L'invention sera mieux comprise, et d'autres buts, détails, caractéristiques et avantages de celle-ci apparaítront plus clairement au cours de la description explicative détaillée qui va suivre d'un mode de réalisation particulier de l'invention, donné uniquement à titre illustratif et non limitatif, en référence au dessin schématique annexé, dans lequel :

  • la figure 1 est un schéma synoptique fonctionnel représentant le protocole d'encryptage pour sécuriser la transmission bidirectionnelle de données entre un véhicule et un dispositif d'identification ;
  • la figure 2 est un schéma synoptique fonctionnel illustrant un moyen de piratage du système d'encryptage par l'intermédiaire de deux boítiers relais ;
  • la figure 3 est un schéma synoptique fonctionnel simplifié d'un système d'accès mains libres conforme à l'invention ;
  • la figure 4 est un schéma synoptique fonctionnel plus détaillé correspondant au schéma de la figure 3 ;
  • la figure 5 représente plusieurs chronogrammes illustrant les trames complètes d'interrogation émises par le véhicule et reçues en réponse par le véhicule ;
  • la figure 6 est une vue partielle et agrandie d'une portion des chronogrammes de la figure 5, indiquée par la flèche VI, correspondant au début de la séquence d'anti-piratage ;
  • la figure 7 reprend les deux premiers chronogrammes de la figure 5 ; et
  • la figure 8 est une vue partielle et agrandie d'une portion des chronogrammes de la figure 7, indiquée par la flèche VIII, au cours de la séquence d' anti-piratage.
The invention will be better understood, and other objects, details, characteristics and advantages thereof will appear more clearly during the detailed explanatory description which follows of a particular embodiment of the invention, given only to Illustrative and non-limiting title, with reference to the attached schematic drawing, in which:
  • FIG. 1 is a functional block diagram representing the encryption protocol for securing the bidirectional transmission of data between a vehicle and an identification device;
  • Figure 2 is a functional block diagram illustrating a means of hacking the encryption system via two relay boxes;
  • FIG. 3 is a simplified functional block diagram of a hands-free access system according to the invention;
  • Figure 4 is a more detailed block diagram corresponding to the diagram of Figure 3;
  • FIG. 5 represents several timing diagrams illustrating the complete interrogation frames sent by the vehicle and received in response by the vehicle;
  • FIG. 6 is a partial and enlarged view of a portion of the timing diagrams of FIG. 5, indicated by the arrow VI, corresponding to the start of the anti-piracy sequence;
  • Figure 7 shows the first two timing diagrams of Figure 5; and
  • Figure 8 is a partial and enlarged view of a portion of the timing diagrams of Figure 7, indicated by arrow VIII, during the anti-piracy sequence.

On va maintenant se référer aux figures 3 et 4, qui représentent le système d'accès mains libres selon l'invention respectivement sous forme simplifiée et plus détaillée.We will now refer to Figures 3 and 4, which represent the hands-free access system according to the invention respectively under simplified and more detailed form.

Le véhicule automobile V comporte dans son unité centrale un micro-contrôleur 50, qui est généralement dans un état de semi-sommeil ou d'attente d'un réveil. Lorsque l'utilisateur actionne la poignée extérieure de porte, un signal d'activation est envoyé au micro-contrôleur 50, comme indiqué par la flèche 51. En réponse, le micro-contrôleur envoie un signal d'alimentation général, comme représenté par la flèche 52, pour alimenter les différents composants électroniques de l'unité centrale. Puis, le micro-contrôleur 50 engendre une série de signaux à faible cadence sk, par exemple de l'ordre de 2 à 100 Kb/s sur la ligne V5. Les données véhiculées sur la ligne V5 sont successivement un signal d'éveil e, un signal représentatif d'un nombre aléatoire R d'une longueur par exemple de 56 bits, un signal représentatif de la fonction f (R,K) d'une longueur par exemple de 28 bits, et d'un signal représentatif de données de service s, par exemple d'une longueur de 100 à 5 000 bits, par exemple des données sur la maintenance, le réglage du véhicule, etc (voir figure 5). La ligne V5 est reliée à un émetteur 53 pour émettre via une antenne 54 les signaux vers le dispositif d'identification I comme représenté par la flèche E. L'émetteur 53 comporte, comme mieux visible sur la figure 4, un oscillateur 55 pour engendrer une onde porteuse à ultra haute fréquence, par exemple à 2,4 GHz, ledit oscillateur étant alimenté par la ligne 52. L'oscillateur 55 est relié à un modulateur de phase 56 ou un modulateur d'amplitude du type à modulation à 50 % et à 100 % selon que la valeur du bit transmis est à 0 ou 1, dont la sortie est reliée à l'antenne 54 précitée.The motor vehicle V has in its central unit a microcontroller 50, which is usually in a semi-sleep state or waiting for an alarm clock. When the user activates the external door handle, an activation signal is sent to the micro-controller 50, as indicated by arrow 51. In response, the microcontroller sends a general power signal, as shown by arrow 52, to supply the various electronic components of the central unit. Then, the microcontroller 50 generates a series of low rate signals sk, for example of the order of 2 to 100 Kb / s on line V5. The data carried on line V5 is successively an awakening signal, a signal representative of a number random R with a length for example of 56 bits, a signal representative of the function f (R, K) with a length for example of 28 bits, and of a signal representative of service data s, for example with a length of 100 to 5,000 bits, for example data on the maintenance, vehicle adjustment, etc. (see Figure 5). Line V5 is connected to a transmitter 53 to transmit signals via an antenna 54 towards the identification device I as represented by the arrow E. The transmitter 53 includes, as best seen in FIG. 4, a oscillator 55 to generate an ultra high carrier wave frequency, for example at 2.4 GHz, said oscillator being powered by line 52. The oscillator 55 is connected to a phase modulator 56 or an amplitude modulator of the 50% and 100% modulation type depending on whether the value of the transmitted bit is 0 or 1, the output of which is linked to the above-mentioned antenna 54.

Le signal émis E, par exemple avec une amplitude de l'ordre de 2V efficace, est reçu par une antenne 100 du dispositif d'identification I avec une atténuation de l'ordre de -40 dBm, ce qui représente un coefficient d'atténuation de 100 fois, c'est à dire que le signal reçu par le dispositif d'identification présente une amplitude de l'ordre de 20 mV. L'antenne 100 est reliée à un filtre radio-fréquence 101 (uniquement représenté sur la figure 4) pour éliminer les fréquences parasites. La sortie du filtre 101 est reliée à un embranchement, d'une part, vers un récepteur à faible cadence et à faible consommation 102 et, d'autre, part à un amplificateur logarithmique 103 qui permet de délivrer en sortie un signal de l'ordre de 2V efficace, et sert de récepteur haute fréquence. Les signaux à faible cadence sk ne sont pas transmis par l'amplificateur 103, mais passent essentiellement via le récepteur 102. Comme mieux visible sur la figure 4, le récepteur 102 comprend successivement un détecteur d'enveloppe radio-fréquence 104 pour reconstituer les signaux à faible cadence sur la ligne I5, qui correspondent à ceux de la ligne V5. La sortie du détecteur d'enveloppe 104 est reliée à un amplificateur basse fréquence 105, dont la sortie est reliée en parallèle, d'une part, à un décodeur de séquence d'éveil 106 et, d'autre part, à un micro-contrôleur 107 du dispositif d'identification I via une ligne 108. Au démarrage de la communication avec le véhicule, seul le décodeur 106 est alimenté en permanence par la pile du dispositif d'identification. Autrement dit, les données d'éveil e sont décodées par le décodeur 106, afin d'envoyer un ordre d'éveil au micro-contrôleur 107, à la sortie du décodeur 106. Le micro-contrôleur 107 éveille alors tous les autres composants électroniques du dispositif d'identification. Ainsi, les données suivantes, à savoir les signaux R, f et s, sont transmis directement au micro-contrôleur 107 via la ligne en parallèle 108.The signal emitted E, for example with an amplitude of the order of 2V efficient, is received by an antenna 100 of the identification device I with an attenuation of the order of -40 dBm, which represents a attenuation coefficient of 100 times, i.e. the signal received by the identification device has an amplitude of the order of 20 mV. The antenna 100 is connected to a radio frequency filter 101 (only shown in Figure 4) to eliminate frequencies parasites. The output of the filter 101 is connected to a branch, of a hand, to a low-speed, low-consumption receiver 102 and, on the other hand, to a logarithmic amplifier 103 which allows output an effective signal of the order of 2V, and serves as high frequency receiver. Signals at low cadence sk are not transmitted by the amplifier 103, but pass essentially via the receiver 102. As best seen in FIG. 4, the receiver 102 successively includes a radio frequency envelope detector 104 to reconstruct the low cadence signals on line I5, which correspond to those of line V5. Detector output envelope 104 is connected to a low frequency amplifier 105, of which the output is connected in parallel, on the one hand, to a sequence decoder awakening 106 and, on the other hand, to a microcontroller 107 of the device identification I via line 108. When communication starts with the vehicle, only the decoder 106 is permanently supplied by the battery of the identification device. In other words, the awakening data e are decoded by the decoder 106, in order to send an awakening command to the micro-controller 107, at the output of decoder 106. The micro-controller 107 then awakens all the other electronic components of the device Identification. Thus, the following data, namely the signals R, f and s, are transmitted directly to the microcontroller 107 via the line in parallel 108.

Après émission des données de service s, le micro-contrôleur 50 du véhicule V engendre des bits d'anti-piratage h à la cadence lente sk du micro-processeur, lesdits bits d'anti-piratage étant reçus par une mémoire tampon à générateur de séquences binaires aléatoires 58, pour délivrer en sortie les bits d'anti-piratage à haute cadence fk, sur une ligne V7. La sortie de la mémoire tampon 58 est reliée à un embranchement, d'une part, avec le modulateur de phase ou d'amplitude 56 pour moduler en phase l'onde porteuse engendrée par l'oscillateur 55, et d'autre part, avec un retardateur numérique d'un temps bit utile 59, dont la fonction sera expliquée plus loin. Chaque bit d'anti-piratage est transmis sous la forme d'un signal radio-fréquence via l'antenne 54 en direction du dispositif d'identification I. La trame globale d'émission V2 des signaux par l'antenne 54 est illustrée sur les figures 5 et 7. En se référant plus particulièrement à la figure 6, on a représenté le début de la trame d'interrogation des bits d'anti-piratage h sur la ligne V2. Sur la ligne V2 de la figure 6, on constate que chaque bit d'anti-piratage est porté par une onde oscillante à très haute fréquence ayant un temps bit Ta par exemple de l'ordre de 200 ns. L'émission des bits d'anti-piratage h1, h2...hn est autorisée ou interdite, en fonction d'un signal de commande V1 qui est émis par une unité de gestion de base de temps 60 du véhicule V, laquelle unité 60 est apte à délivrer les signaux d'horloge à faible cadence sk, à moyenne cadence mk et à haute cadence fk. Bien entendu, l'unité 60 est reliée au micro-contrôleur 50, comme indiqué par la double flèche 61. Le signal V1 est engendré à la haute cadence fk prédéterminée et commande alternativement, d'une part, l'arrêt et le démarrage de l'oscillateur 55 et, d'autre part, un récepteur 62 de l'unité centrale.After transmission of the service data s, the microcontroller 50 of vehicle V generates anti-piracy bits h at slow rate sk of the microprocessor, said anti-piracy bits being received by a 58 random binary sequence generator buffer output the high-speed anti-piracy bits fk, on a line V7. The output of buffer memory 58 is connected to a branch, on the one hand, with the phase modulator or amplitude 56 to phase-modulate the carrier wave generated by oscillator 55, and on the other hand, with a digital self-timer useful bit time 59, the function of which will be explained later. Every bit anti-piracy is transmitted as a radio frequency signal via antenna 54 towards the identification device I. The frame overall emission V2 of the signals by the antenna 54 is illustrated on the Figures 5 and 7. With particular reference to Figure 6, we have shown the start of the anti-piracy bit interrogation frame h on line V2. On line V2 in Figure 6, we see that each anti-piracy bit is carried by a very high oscillating wave frequency having a bit time Ta for example of the order of 200 ns. The transmission of the anti-piracy bits h1, h2 ... hn is authorized or prohibited, as a function of a control signal V1 which is emitted by a vehicle V time base management unit 60, which unit 60 is capable of delivering clock signals at low cad rate sk, at medium cadence mk and high cadence fk. Of course, the unit 60 is connected to the microcontroller 50, as indicated by the double arrow 61. The signal V1 is generated at the predetermined high rate fk and controls alternatively, on the one hand, stopping and starting the oscillator 55 and, on the other hand, a receiver 62 of the central unit.

Le dispositif d'identification I reçoit via son antenne 100 sur la ligne I1 (voir figure 6) un signal qui correspond au bit d'anti-piratage h1 émis par le véhicule V, avec un temps retard δ qui correspond au temps de propagation du signal entre le véhicule et le dispositif d'identification. Le signal passe alors par l'amplificateur 103, dont la sortie est reliée à un embranchement entre, d'une part, une unité de mesure de longueur moyenne de bit 124 et, d'autre part, un retardateur numérique 125 pour retarder le signal d'un temps bit utile Tb, à la fréquence fk. On a représenté sur la figure 8 le signal I2 qui correspond au signal numérique en sortie du retardateur 125, ledit signal étant retardé d'un temps bit utile Tb, Tb pouvant être égal ou différent de Ta. La sortie du retardateur 125 est reliée à une entrée d'une porte logique OU exclusif 109, dont l'autre entrée reçoit un signal de commande crypté d'authentification g, dont la trame est représentée sur la ligne I6. Comme visible sur la ligne I6 représentée sur la figure 8, la cadence des bits du signal g est à moyenne cadence mk, plus faible que la haute cadence fk des bits d'anti-piratage h. A cet effet, on prévoit que le micro-contrôleur 107 du dispositif d'identification transmet à faible cadence sk le signal g à une mémoire tampon 110 qui délivre en sortie le signal g à la cadence moyenne mk vers le mélangeur 109.The identification device I receives via its antenna 100 on the line I1 (see figure 6) a signal which corresponds to the anti-piracy bit h1 emitted by vehicle V, with a delay time δ which corresponds to signal propagation time between vehicle and device Identification. The signal then passes through the amplifier 103, the output is connected to a branch between, on the one hand, a unit of measurement of average bit length 124 and, on the other hand, a timer digital 125 to delay the signal by a useful bit time Tb, at the frequency fk. FIG. 8 shows the signal I2 which corresponds to the digital signal at the output of the self-timer 125, said signal being delayed by a useful bit time Tb, Tb possibly being equal or different from Ta. The output of the self-timer 125 is connected to an input an exclusive OR logic gate 109, the other input of which receives a encrypted authentication control signal g, the frame of which is shown on line I6. As visible on line I6 shown in FIG. 8, the bit rate of the signals g is at medium rate mk, lower than the high rate fk of the anti-piracy bits h. In this indeed, it is expected that the microcontroller 107 of the device identification transmits signal g at low speed sk to a memory buffer 110 which outputs the signal g at the average rate mk to mixer 109.

Le mélangeur 109 délivre en sortie un signal numérique de commande représenté en 17. La sortie du mélangeur 109 est reliée à un émetteur 111 pour émettre un signal de réponse R via une antenne 112, à une amplitude de l'ordre de 2V efficace, vers le véhicule V, comme représenté par la flèche R.The mixer 109 outputs a digital signal of control shown in 17. The output of the mixer 109 is connected to a transmitter 111 for transmitting a response signal R via an antenna 112, at an amplitude on the order of 2V effective, towards vehicle V, as represented by arrow R.

Lors de la réception de chaque signal représentatif d'un bit d'anti-piratage, le dispositif d'identification est apte à détecter le front descendant F du signal à la sortie de l'amplificateur 103, dans un détecteur de front descendant 113, comme visible sur la figure 4. Ce dernier est apte à commander une bascule 114 avec un faible retard de sécurité ε pour éviter tout chevauchement entre la réception et l'émission du signal au niveau du dispositif d'identification. Cette bascule 114 commande le démarrage d'un oscillateur haute fréquence 115 de l'émetteur 111, après le léger retard ε, lequel oscillateur 115 est relié en sortie à un modulateur de phase ou d'amplitude 118 dudit émetteur 111, ledit modulateur 118 étant commandé par le signal 17 en sortie du mélangeur 109. Simultanément à la détection du front descendant, le détecteur 113 envoie un signal de synchronisation de bit via la ligne 119 à une unité de gestion de base de temps 116 qui délivre les signaux d'horloge sk, mk et fk précités, ladite unité 116 étant reliée au micro-contrôleur 107 via la ligne 117. Ladite unité 116 est apte à commander la bascule 114, pour la faire basculer dans son état d'arrêt de l'oscillateur 115, au bout du temps bit Tb, comme visible sur la figure 4. Bien entendu, on pourrait prévoir le léger retard ε proche de 0 s.When receiving each signal representative of a bit anti-piracy, the identification device is able to detect the front descending F of the signal at the output of amplifier 103, in a Falling edge detector 113, as visible in FIG. 4. This last one is able to command a scale 114 with a slight delay of safety ε to avoid any overlap between reception and the emission of the signal at the identification device. This flip-flop 114 controls the start of a high frequency oscillator 115 of the transmitter 111, after the slight delay ε, which oscillator 115 is connected at output to a phase or amplitude modulator 118 of said transmitter 111, said modulator 118 being controlled by signal 17 in mixer 109 output. Simultaneously with edge detection downlink, detector 113 sends a bit synchronization signal via line 119 to a time base management unit 116 which delivers the aforementioned clock signals sk, mk and fk, said unit 116 being connected to microcontroller 107 via line 117. Said unit 116 is suitable for command rocker 114 to switch it to its stop state of oscillator 115, at the end of time bit Tb, as visible on the Figure 4. Of course, we could predict the slight delay ε close from 0 s.

En partant de l'hypothèse que les signaux électromagnétiques transmis se propagent à la vitesse de la lumière, à savoir 3.108 m/s, on peut considérer que la durée de transmission des signaux est de l'ordre de 3 ns par mètre de distance entre le véhicule et le dispositif d'identification I. Autrement dit, pour un trajet aller-retour entre le véhicule V et le dispositif d'identification I, espacé d'une distance d'environ 5 mètres, la durée de propagation δ serait de l'ordre de 30 ns. A cette durée de propagation δ, on pourrait ajouter le temps de réponse des circuits électroniques, qui pourrait être de l'ordre de quelques ns, ou dizaines de ns, selon la bande passante attribuée à la porteuse.On the assumption that the electromagnetic signals transmitted propagate at the speed of light, namely 3.10 8 m / s, we can consider that the duration of transmission of the signals is of the order of 3 ns per meter of distance between the vehicle and the identification device I. In other words, for a round trip between the vehicle V and the identification device I, spaced a distance of about 5 meters, the propagation time δ would be around 30 ns. To this propagation time δ, one could add the response time of the electronic circuits, which could be of the order of a few ns, or tens of ns, depending on the bandwidth allocated to the carrier.

Le signal réémis R par le dispositif d'identification est reçu par un récepteur 62 via une antenne 63, avec une atténuation de l'ordre de - 40 dBm, ce qui représente un coefficient d'atténuation de 100 fois, c'est à dire que le signal reçu par le véhicule présente une amplitude de l'ordre de 20 mV. Comme mieux représenté sur la figure 4, le récepteur 62 comporte un filtre radio-fréquence 64 relié à l'antenne 63, dont le signal de sortie est représenté par la ligne V3, ce signal étant délivré à l'entrée d'un amplificateur logarithmique 65 qui présente un gain de 80 dB, ce qui permet d'atteindre un coefficient de multiplication allant jusqu'à 10 000 fois, et notamment de délivrer en sortie dudit amplificateur 65 un signal de l'ordre de 2V efficace. L'amplificateur 65 est commandé par le signal V1 et est relié en sortie à un démodulateur de phase ou d'amplitude 67.The signal retransmitted by the identification device is received by a receiver 62 via an antenna 63, with an attenuation of the order of - 40 dBm, which represents an attenuation coefficient of 100 times, that is, the signal received by the vehicle has an amplitude of around 20 mV. As best shown in Figure 4, the receiver 62 includes a radio frequency filter 64 connected to the antenna 63, whose output signal is represented by line V3, this signal being delivered to the input of a logarithmic amplifier 65 which has a gain of 80 dB, which achieves a coefficient of multiplication of up to 10,000 times, and in particular to deliver in output of said amplifier 65 a signal of the order of 2V effective. Amplifier 65 is controlled by signal V1 and is connected at output to a phase or amplitude demodulator 67.

Etant donné que l'amplificateur 65 est commandé par le signal V1, ledit amplificateur bascule dans son état inactif lorsque débute l'émission du deuxième bit d'anti-piratage h2, comme indiqué sur la ligne V1 de la figure 6. Toutefois, comme l'unité centrale reçoit le signal de réponse en provenance du dispositif d'identification I avec un retard égal à 2 δ + ε, seul le début du signal de réponse est traité par le récepteur 65 et donc démodulé par le démodulateur 67, comme indiqué sur la ligne V9, dont le signal démodulé présente une durée Tc qui est inférieure à la durée Ta du bit d'émission et à la durée Tb du bit de réponse. Par exemple, pour un temps bit Ta et Tb de l'ordre de 200 ns, et une durée de décalage normal de l'ordre de 50 ns, la durée Tc du bit analysé en réponse par l'unité centrale est de l'ordre de 150 ns, ce qui correspond à 75 % du signal initial.Since the amplifier 65 is controlled by the signal V1, said amplifier switches to its inactive state when it starts the transmission of the second bit of anti-piracy h2, as indicated on the line V1 in figure 6. However, as the central unit receives the response signal from the identification device I with a delay equal to 2 δ + ε, only the start of the response signal is processed by the receiver 65 and therefore demodulated by demodulator 67, as indicated on line V9, whose demodulated signal has a duration Tc which is less than the duration Ta of the transmission bit and the duration Tb of the transmission bit reply. For example, for a bit time Ta and Tb of the order of 200 ns, and a normal offset duration of the order of 50 ns, the duration Tc of the bit analyzed in response by the central unit is of the order of 150 ns, which corresponds to 75% of the initial signal.

Le démodulateur de phase 67 délivre un signal représentatif de la fonction hog sur la ligne V9 qui est reliée à une entrée d'une porte logique OU exclusif 70. Cette porte logique 70 reçoit sur son autre entrée un signal V8 représentatif de la fonction h, délivré en sortie du retardateur numérique 59. La porte logique 70 pourrait être remplacée par un autre type de mélangeur, comme représenté sur la figure 3. Le signal V8 correspond au signal V7 avec un retard correspondant au décalage Tb du retardateur numérique 125 du dispositif d'identification I. La porte logique 70 délivre en sortie un signal V10, qui est représentatif du décalage entre les signaux V8 et V9, c'est à dire un signal représentatif du signal encrypté d'authentification g émis par le dispositif d'identification I, avec un petit décalage correspondant au temps de propagation du signal qui est égal à 2δ, comme visible sur la figure 8.The phase demodulator 67 delivers a signal representative of the hog function on line V9 which is connected to an input of a door exclusive OR logic 70. This logic gate 70 receives on its other input a signal V8 representative of the function h, delivered at the output of the digital self-timer 59. Logic gate 70 could be replaced by another type of mixer, as shown in Figure 3. The signal V8 corresponds to signal V7 with a delay corresponding to Tb offset of digital self-timer 125 of the identification device I. The logic gate 70 outputs a signal V10, which is representative of the offset between the V8 and V9 signals, i.e. a signal representative of the encrypted authentication signal g emitted by the identification device I, with a small offset corresponding to the signal propagation time which is equal to 2δ, as visible on the figure 8.

La sortie de la porte logique 70 est reliée à un embranchement entre, d'une part, un filtre passe-bas 71 à la cadence moyenne mk qui est la cadence correspondant au signal g et, d'autre part, une autre porte logique OU exclusif 73. Le filtre passe-bas 71 est relié à une mémoire tampon 72, qui transforme ledit signal de la cadence mk à la cadence sk avant de l'envoyer au micro-contrôleur 50 qui va comparer le signal g reçu en provenance du dispositif d'authentification avec le signal g engendré au niveau du véhicule, en vue de l'authentification de la communication, ce qui correspond à la dernière étape 10 illustrée sur le schéma de la figure 1. Il est à noter que cette comparaison entre les deux fonctions g s'effectue par auto-corrélation entre les signaux, le seuil d'auto-corrélation acceptable étant par exemple fixé à 90 %, sachant qu'un niveau d'auto-corrélation de 50 % correspond à la comparaison de deux signaux aléatoires.The output of logic gate 70 is connected to a branch between, on the one hand, a low-pass filter 71 at the average rate mk which is the cadence corresponding to the signal g and, on the other hand, another exclusive OR logic gate 73. The low-pass filter 71 is connected to a buffer 72, which transforms said signal from cadence mk to cadence sk before sending it to the microcontroller 50 which will compare the signal g received from the authentication device with the g signal generated at vehicle level, for authentication of communication, which corresponds to the last step 10 illustrated on the diagram in Figure 1. Note that this comparison between the two functions g are performed by auto-correlation between the signals, the acceptable auto-correlation threshold being for example set at 90%, knowing that a level of autocorrelation of 50% corresponds to the comparison of two random signals.

Le micro-contrôleur 50 délivre le signal g propre au véhicule à une mémoire tampon 74 à la cadence sk, afin qu'il la renvoie à la cadence mk à l'autre entrée de la porte logique 73 précitée. On a représenté sur la ligne V11 le signal g qui correspond exactement au signal g engendré par le dispositif d'identification et émis sur la ligne I6, comme représenté sur la figure 8. La porte logique 73 mélange les signaux V10 et V11 afin de ne délivrer en sortie que les décalages dus au temps de propagation du signal entre le véhicule V et le dispositif d'identification I, comme représenté sur la ligne V12. La sortie de la porte logique 73 est reliée à l'entrée d'un intégrateur 75, qui va délivrer en sortie un signal V13 qui va monter par escalier en fonction du temps, pour chaque créneau C représentatif du temps de propagation du signal. La ligne V13 est reliée à un embranchement entre, d'une part, un premier comparateur 76 recevant sur une autre entrée une valeur limite de seuil 76a qui correspond à la durée de propagation maximale acceptable, par exemple 50 ns x n, n étant le nombre de bits d'anti-piratage, et, d'autre part, un second comparateur 77 recevant sur une autre entrée une autre valeur limite de seuil 77a inférieure à la valeur 76a et qui correspond au temps de propagation sur la distance autorisée. Selon que l'amplitude du signal de sortie sur la ligne V13 est supérieure ou non à cette valeur limite 76a, un signal de tentative de piratage sera envoyé ou non via la ligne 78 par le premier comparateur 76 au micro-contrôleur 50. De manière analogue, si l'amplitude du signal de sortie sur la ligne V13 est supérieure à la valeur 77a, mais inférieure à la valeur 76a, le second comparateur 77 enverra au micro-contrôleur 50 via la ligne 79, un signal indiquant que la communication se fait hors de la distance autorisée, sans toutefois constituer une tentative de piratage. L'intégrateur 75 va effectuer la somme des décalages temporels élémentaires jusqu'à la fin de la trame d'anti-piratage, comme indiqué par la flèche 75a, à moins que la communication soit interrompue préalablement par les premier et deuxième comparateurs 76 et 77 précités.The microcontroller 50 delivers the signal g specific to the vehicle to a buffer memory 74 at the rate sk, so that it sends it back to the cadence mk at the other input of the above logic gate 73. We have represented on line V11 the signal g which corresponds exactly to the signal g generated by the identification device and issued on the line I6, as shown in FIG. 8. The logic gate 73 mixes the V10 and V11 signals in order to output only the offsets due at the signal propagation time between vehicle V and the device identification I, as shown on line V12. Leaving the logic gate 73 is connected to the input of an integrator 75, which goes output a V13 signal which will go up by stairs in function of time, for each slot C representative of the propagation time of the signal. Line V13 is connected to a branch line between, share, a first comparator 76 receiving on another input a threshold limit value 76a which corresponds to the propagation time maximum acceptable, for example 50 ns x n, n being the number of bits anti-piracy, and, on the other hand, a second comparator 77 receiving on another entry another threshold limit value 77a lower than the value 76a and which corresponds to the propagation time over the distance authorized. Depending on whether the amplitude of the output signal on line V13 is or not greater than this limit value 76a, an attempt to hack will be sent or not via line 78 by the first comparator 76 to the microcontroller 50. Similarly, if the amplitude of the output signal on line V13 is greater than the value 77a, but lower than the value 76a, the second comparator 77 will send to the microcontroller 50 via line 79, a signal indicating that communication is done outside the authorized distance, without however constituting a hacking attempt. The integrator 75 will sum the elementary time shifts until the end of the anti-piracy frame, as indicated by arrow 75a, unless the communication is interrupted beforehand by the first and second comparators 76 and 77 above.

Enfin, le micro-contrôleur 50 peut délivrer différents signaux de sortie aux autres composants du véhicule par la voie 80 représentée sur les figures 3 et 4.Finally, the microcontroller 50 can deliver different signals from output to other vehicle components via track 80 shown on Figures 3 and 4.

Toutefois, un pirate pourrait essayer de pieger le système de l'invention en écourtant la réception du signal émis par le véhicule. A titre d'exemple, dès que le pirate détecte avec un boítier-relais l'émission par le véhicule d'un bit d'anti-piratage, il peut réémettre vers l'autre boítier-relais uniquement le début dudit signal, afin de provoquer l'émission anticipée du signal de réponse par le dispositif d'identification. Avantageusement, le signal est écourté d'une durée qui correspondrait à la durée de propagation du signal sur la distance supplémentaire entre le dispositif d'identification et le véhicule, par rapport à la distance maximale autorisée. Ainsi, comme le détecteur 113 du dispositif d'identification I est apte à détecter le front descendant du signal reçu en provenance du véhicule, le fait d'écourter le signal émis par le véhicule permet d'anticiper sur l'émission par le dispositif d'identification du signal de réponse, ce qui supprime ainsi tout décalage non autorisé entre l'émission et la réception du signal d'anti-piratage par le véhicule, ce qui peut ainsi piéger le système.However, a hacker could try to trap the system. the invention by shortening the reception of the signal emitted by the vehicle. AT as an example, as soon as the hacker detects with a relay box the vehicle transmitting an anti-piracy bit, it can re-issue to the other relay box only the start of said signal, in order to cause the device to send the response signal early Identification. Advantageously, the signal is shortened by a duration which would correspond to the duration of propagation of the signal over the distance between the identification device and the vehicle, for example compared to the maximum distance allowed. So like the detector 113 of the identification device I is able to detect the front descending from the signal received from the vehicle, shortening the signal emitted by the vehicle makes it possible to anticipate the emission by the response signal identification device, thereby removing any unauthorized delay between sending and receiving the signal anti-piracy by the vehicle, which can thus trap the system.

Pour éviter qu'un pirate puisse ainsi piéger le système, l'unité de mesure de longueur moyenne de bits 124 du dispositif d'identification I permet de mesurer la longueur moyenne des bits reçus par le dispositif d'identification en provenance du véhicule. A titre d'exemple si la longueur moyenne ainsi mesurée est inférieure à 90 % de la longueur attendue du bit émis par le véhicule, l'unité 124 va alors envoyer un signal de tentative de piratage via la ligne 131 vers le micro-contrôleur 107 et un signal d'arrêt via la ligne 130 à l'unité de gestion de base de temps 116. Autrement dit, l'unité 124 permet de vérifier l'intégrité du bit reçu par le dispositif d'identification et permet ainsi de détecter une tentative de piratage, même dans le cas où le pirate écourte la réémission du signal vers le dispositif d'identification. En effet, si ce signal écourté peut piéger l'intégrateur 75 de l'unité centrale de commande du véhicule, en revanche l'unité 124 interprétera ce signal écourté comme un signal erroné et provoquera ainsi l'interruption de la communication.To prevent a hacker from trapping the system, the measurement of average bit length 124 of the identification device I allows to measure the average length of the bits received by the device identification from the vehicle. For example if the average length thus measured is less than 90% of the length expected from the bit sent by the vehicle, the unit 124 will then send a hacking attempt signal via line 131 to the microcontroller 107 and a stop signal via line 130 to the basic management unit of time 116. In other words, the unit 124 makes it possible to verify the integrity of the bit received by the identification device and thus makes it possible to detect a hacking attempt, even if the hacker shortens the re-transmission of the signal to the identification device. Indeed, if this shortened signal can trap the integrator 75 of the central processing unit vehicle control, however unit 124 will interpret this signal shortened as an erroneous signal and will thus interrupt the communication.

A titre d'exemple, la cadence d'horloge intermédiaire mk est entre 20 et 60 fois inférieure à la cadence fk.For example, the intermediate clock rate mk is between 20 and 60 times lower than the rate fk.

En variante, on pourrait remplacer les antennes 54 et 63 du véhicule V par une antenne unique 82 représentée en traits interrompus sur la figure 4, laquelle antenne 82 serait reliée à un diplexeur 81 représenté en traits interrompus sur la figure 4, afin de commuter entre le mode de réception et le mode d'émission selon le cas. De manière analogue, on pourrait remplacer les antennes 100 et 112 du dispositif d'identification par une antenne unique 121 reliée à un diplexeur 120, représentés en traits interrompus sur la figure 4. Les diplexeurs 81 et 120 pourraient ainsi communiquer entre eux, comme indiqué par la double flèche T.Alternatively, the antennas 54 and 63 of the vehicle V by a single antenna 82 shown in broken lines in FIG. 4, which antenna 82 would be connected to a diplexer 81 shown in broken lines in Figure 4, to switch between the reception mode and the transmission mode as appropriate. So analogous, we could replace the antennas 100 and 112 of the device identification by a single antenna 121 connected to a diplexer 120, shown in broken lines in FIG. 4. The diplexers 81 and 120 could thus communicate with each other, as indicated by the double arrow T.

Comme visible sur la figure 5, sur la ligne V3, après la réception du signal hog, le véhicule V reçoit en provenance du dispositif d'identification un signal hos où s représente des données de service qui viennent moduler le signal h par inversion de phase, comme cela était le cas pour le signal g dont la longueur est inférieure à celle du signal h.As shown in Figure 5, on line V3, after receipt of the hog signal, the vehicle V receives from the device identifying a hos signal where s represents service data which come to modulate the signal h by phase inversion, as it was the case for signal g whose length is less than that of signal h.

Bien que l'invention ait été décrite en liaison avec un exemple particulier de réalisation, il est bien évident qu'elle n'y est nullement limitée et qu'elle comprend tous les équivalents techniques des moyens décrits ainsi que leurs combinaisons si celles-ci entrent dans le cadre de l'invention.Although the invention has been described in connection with an example particular achievement, it is obvious that it is not at all limited and that it includes all the technical equivalents of the means described as well as their combinations if these fall within the scope of the invention.

Claims (14)

  1. System for so-called hands-free access for a motor vehicle (V), including an identification device (I) intended to be carried by a user (U) and able to establish bidirectional remote and wireless communication with a central control unit on board the vehicle, to authenticate the user and the control means for locking/unlocking the locks of the opening leaves when the user had been recognised as authentic, the said system being able to establish the said bidirectional communication when the identification device is situated at a distance less then a predetermined limit distance from the vehicle, characterised by the fact that the said central unit is able to generate, at a predetermined high clock speed (fk), upon the communication, a string of anti-hacking bits (h), each bit (h1, h2, h3) of the said string being transmitted to the identification device (I) in the form of a radio-frequency interrogation signal (E) representing the said bit, in such a manner that after reception of the said interrogation signal by the identification device, the latter transmits, with a delay at least equal to one useful bit time (Tb), a response signal to the central control unit, the latter including at least one mixer (70) able to mix, on the one hand, the response signal (R) received from the identification device and, on the other, the string of anti-hacking bits (h) generated by the central unit and delayed by one useful bit time (Tb), to deliver at the output of the said mixer a signal (V12) representing the successive time shifts of each bit of the said anti-hacking string, this latter signal being received at the input of an integrator (75) to sum the response times linked to each anti-hacking bit time shift crenulation (C), the output of the said integrator being connected to at least a first comparator (76) to compare the said sum of response times with a first predetermined threshold value (76a), beyond which a hacking attempt is detected, causing stoppage of the said communication.
  2. System as described in claim 1, characterised by the fact that the summing of the response times performed by the integrator (75), is stopped when the central control unit detects reception of the last bit of the anti-hacking string (75a).
  3. System as described in claim 1 or 2, characterised by the fact that the output of the integrator (75) is connected to at least a second comparator (77) to compare the said sum of response times with another predetermined threshold value (77a) lower than the said first predetermined threshold value (76a), beyond which a communication beyond the said predetermined limit distance is detected.
  4. System as described in one of claims 1 to 3, characterised by the fact that the identification device (I) includes a digital signal delayer (125) able to delay by one useful bit time (Tb) the interrogation signal received from the vehicle (V), and an oscillator (115) generating radio frequency carrier waves, connected at its output to a phase or amplitude modulator (118), which is controlled by the output signal of the said delayer, to deliver at the output of the said modulator the said response signal (I4) intended to be transmitted to the vehicle.
  5. System as described in claim 4, characterised by the fact that the identification device (I) includes a falling edge detector (113) to detect the falling edge (F) of the interrogation signal received from the vehicle (V), the said detector being able to toggle the said oscillator (115) of the identification device between a stop state corresponding to the reception mode of the identification device and an operating state corresponding to its transmission mode.
  6. System as described in claim 4 or 5, characterised by the fact that the string of anti-hacking bits (h) is generated by the central unit after transmission of the encrypted authentication data (R, f) to the identification device (I).
  7. System as described in claim 6, characterised by the fact that the identification device includes a mixer (109) to mix the output signal of the said delayer (125) with an encrypted digital authentication response signal (g) from the identification device, at a speed (mk) slower than that of the string of anti-hacking bits (h), the output signal (17) of this mixer being able to control the above-mentioned modulator (118) of the identification device.
  8. System as described in claim 7, characterised by the fact that the central unit of the vehicle (V) includes a phase or amplitude demodulator (67) to demodulate the signal received by the vehicle from the identification device (I), and an XOR logic gate (70) the inputs of which are connected respectively to the said phase demodulator and to a digital signal delayer (59), the said delayer being able to delay by one useful bit time (Tb) each bit of the anti-hacking string (h) generated by the central unit, the said logic gate (70) being able to output a digital signal (V10) representing the encrypted response signal from the identification device.
  9. System as described in claim 8, characterised by the fact that the signal (V10) output by the above-mentioned XOR logic gate (70) is compared by the central unit with an encrypted digital authentication signal generated by the central unit, in order to authenticate the identification device.
  10. System as described in claim 8 or 9, characterised by the fact that the output of the said XOR logic gate (70) is connected to one input of a second XOR logic gate (73) the other input of which receives an encrypted digital authentication signal (g) generated by the central unit, in order to output the said signal (V12) representing the successive time shifts of each bit of the anti-hacking string.
  11. System as described in one of claims 1 to 10, characterised by the fact that the central control unit includes an oscillator (55) generating radio frequency carrier waves, connected to a phase or amplitude modulator (56), which is controlled by the string of anti-hacking bits (h) generated by the central unit of the vehicle (V).
  12. System as described in claim 11, characterised by the fact that the central unit is able to command alternatively the stopping and the starting of the oscillator (55) of the central unit at the said predetermined high clock speed (fk) to toggle the central unit into reception and transmission mode respectively.
  13. System as described in claim 12, characterised by the fact that the central unit is able to command the stopping or the operation of a receiver (62) at the said high clock speed (hk), so that the said receiver (62) delivers to the mixer (70) of the central unit a digital signal (V9) representing the interpretation of the start of the response signal received from the vehicle.
  14. System as described in one of claims 1 to 13, characterised by the fact that the identification device (I) includes a unit (124) for measuring the mean length of the bits received, to measure, after demodulation of the interrogation signal (E) received from the vehicle (V), the mean length of the anti-hacking bits received, the said measurement unit being able to cause the interruption of the communication when the said mean length is less than a predetermined value, for example 90% of the useful length Ta of the bit transmitted by the vehicle.
EP20010400875 2000-05-03 2001-04-05 Anti-fraud system for hands-free access to an automobile Expired - Lifetime EP1152107B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0005630A FR2808551B1 (en) 2000-05-03 2000-05-03 ANTI-PIRACY SYSTEM FOR HANDS-FREE ACCESS TO A MOTOR VEHICLE
FR0005630 2000-05-03

Publications (2)

Publication Number Publication Date
EP1152107A1 EP1152107A1 (en) 2001-11-07
EP1152107B1 true EP1152107B1 (en) 2004-06-16

Family

ID=8849832

Family Applications (1)

Application Number Title Priority Date Filing Date
EP20010400875 Expired - Lifetime EP1152107B1 (en) 2000-05-03 2001-04-05 Anti-fraud system for hands-free access to an automobile

Country Status (3)

Country Link
EP (1) EP1152107B1 (en)
DE (1) DE60103804T2 (en)
FR (1) FR2808551B1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10158200A1 (en) * 2001-11-28 2003-06-12 Kostal Leopold Gmbh & Co Kg Carrying out passive keyless access control for using motor vehicle, involves converting procedure characteristic identification in vehicle, transponder with same code key in crypto-code
DE10158202A1 (en) * 2001-11-28 2003-06-12 Kostal Leopold Gmbh & Co Kg Method for performing a keyless authorization check on a motor vehicle
FR2863989A1 (en) * 2003-12-22 2005-06-24 Thomas Dominique Leandr Buriez Vehicle e.g. car, protecting method, involves deactivating eventual finishing of counting operation and expecting new alert event, in case of occurrence of authorization event

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4003280C5 (en) * 1990-02-03 2007-06-28 Bayerische Motoren Werke Ag Safety device for motor vehicles
DE19632025C2 (en) * 1996-08-08 1998-07-23 Daimler Benz Ag Authentication device with electronic authentication communication
US6803851B1 (en) * 1998-09-01 2004-10-12 Leopold Kostal Gmbh & Co. Kg Method for carrying out a keyless access authorization check and keyless access authorization check device
DE19941428B4 (en) * 1998-09-02 2015-09-10 Marquardt Gmbh Locking system, in particular for a motor vehicle

Also Published As

Publication number Publication date
FR2808551A1 (en) 2001-11-09
FR2808551B1 (en) 2002-07-26
DE60103804T2 (en) 2005-07-14
DE60103804D1 (en) 2004-07-22
EP1152107A1 (en) 2001-11-07

Similar Documents

Publication Publication Date Title
EP3306576B1 (en) Method and system for secure access to a determined space by means of a portable object
EP1152109B1 (en) Hand-free access and/or starting system for a motor vehicle
EP1001117B1 (en) System for ensuring the security of a bidirectional data transmission for the access to an enclosed space, in particular for the access to a vehicle
FR3084495A1 (en) Passive keyless entry system
FR2552957A1 (en) TRANSCEIVER-RECEIVER STATION FOR A FREQUENCY EVASION INFORMATION TRANSMISSION SYSTEM
FR2794603A1 (en) BIDIRECTIONAL DATA TRANSMISSION METHOD, AND SYSTEM FOR IMPLEMENTING SAME
EP1152108B1 (en) Hand-free access system for a motor vehicle
FR2745539A1 (en) METHOD FOR CONTROLLING AN ANTI-THEFT DEVICE AND ANTI-THEFT DEVICE CONTROLLED BY SUCH A METHOD
EP1152107B1 (en) Anti-fraud system for hands-free access to an automobile
WO2018154211A1 (en) Detection of the presence of a human hand on an openable panel of a vehicle
EP1851901A1 (en) Method for fast pre-authentication by distance recognition
WO2003005309A1 (en) Method for keyless unlocking of an access door to a closed space
EP3301838B1 (en) Method and system for determining a distance between a portable object and a base station
FR2774120A1 (en) Remote security lock for vehicles
FR2891519A1 (en) Vehicle state information e.g. vehicle closing state, adjustment system for vehicle access device, has reception and transmission unit to send vehicle state with reference time to mobile identification transmitter
FR2797727A1 (en) Electronic lock for car has a base unit which emits a signal, this signal is coded by the key then sent back and analyzed by base in order to open the lock or not
EP1220163A1 (en) Passage detection system for individuals or objects through an entrance-exit with a limited space
EP1421561A1 (en) Method for authorising locking and/or starting a motor vehicle and associated device
EP1378864A1 (en) Method for controlling access to a determined space by a personalized portable object, and personalized portable object for carrying out the method
EP1378865B1 (en) Method for controlling access to a determined space by a personalized portable object, and personalized portable object for carrying out the method
EP1178169B1 (en) Anti-fraud remote control method for motor vehicle and system for carrying out this method
EP1061211B1 (en) Method for securing a bidirectionnal data transmission with an identifier and system for its implementation
EP0532409A1 (en) Spread spectrum bidirectional transmission system
FR2800783A1 (en) IMPROVEMENTS TO THE SECURE SYSTEMS FOR THE CONTROL OF THE RELEASE OF AT LEAST ONE MOTOR VEHICLE OPENER
FR2651941A1 (en) TWO MODES SYNCHRONIZATION DEVICE, IN PARTICULAR FOR RECOVERING THE PHASE OF THE FRAME CLOCK IN AN ALTERNATE TRANSMISSION SYSTEM.

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

Kind code of ref document: A1

Designated state(s): DE FR GB IT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

17P Request for examination filed

Effective date: 20011205

AKX Designation fees paid

Free format text: DE FR GB IT SE

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): DE FR GB IT SE

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 20040616

REF Corresponds to:

Ref document number: 60103804

Country of ref document: DE

Date of ref document: 20040722

Kind code of ref document: P

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20050317

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20090402

Year of fee payment: 9

Ref country code: FR

Payment date: 20090417

Year of fee payment: 9

Ref country code: IT

Payment date: 20090424

Year of fee payment: 9

Ref country code: SE

Payment date: 20090407

Year of fee payment: 9

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20090401

Year of fee payment: 9

EUG Se: european patent has lapsed
GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20100405

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20101230

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20101103

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20100405

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20100405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20100430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20100406