US20180154865A1 - Authentication of mobile devices for vehicle communication - Google Patents
Authentication of mobile devices for vehicle communication Download PDFInfo
- Publication number
- US20180154865A1 US20180154865A1 US15/372,369 US201615372369A US2018154865A1 US 20180154865 A1 US20180154865 A1 US 20180154865A1 US 201615372369 A US201615372369 A US 201615372369A US 2018154865 A1 US2018154865 A1 US 2018154865A1
- Authority
- US
- United States
- Prior art keywords
- mobile device
- key
- vehicle
- application
- communication module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 103
- 238000000034 method Methods 0.000 claims abstract description 23
- 230000004044 response Effects 0.000 claims abstract description 10
- 230000003993 interaction Effects 0.000 claims description 11
- 230000003213 activating effect Effects 0.000 claims description 5
- 230000006870 function Effects 0.000 description 5
- 230000037452 priming Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 239000000446 fuel Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/09—Arrangements for giving variable traffic instructions
- G08G1/0962—Arrangements for giving variable traffic instructions having an indicator mounted inside the vehicle, e.g. giving voice messages
- G08G1/0968—Systems involving transmission of navigation instructions to the vehicle
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00365—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00507—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function
- G07C2009/00531—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function immobilizer
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00507—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function
- G07C2009/00547—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function starting ignition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Definitions
- the present disclosure generally relates to communication authentication and, more specifically, authentication of mobile devices for vehicle communication.
- a vehicle utilizes a remote keyless entry system to enable a user (e.g., a driver) to unlock and/or open a door without inserting a key into a lock.
- the remote keyless entry system includes a key fob that is carried by the user.
- the key fob includes a wireless transducer that communicates with the vehicle to unlock and/or open the door of the vehicle.
- Some remote keyless entry systems are passive entry systems that unlock and/or open the door of the vehicle upon detecting that the key fob is within a proximity of the vehicle.
- An example disclosed mobile device for vehicle communication authentication includes a communication module to receive a signal from a vehicle, memory including an application for accessing digital keys, and key accessor.
- the example key accessor is to activate, in response to determining the application is inactive, the application utilizing the signal.
- the example key accessor also is to access a key via the application and send, via the communication module, the key to the vehicle.
- An example disclosed method for mobile device authentication for vehicle communication includes receiving, via a mobile device, a signal that is associated with a vehicle and determining, via a processor, whether an application for accessing a key is active on the mobile device.
- the example disclosed method also includes activating, in response to determining the application is inactive, the application utilizing the signal.
- the example disclosed method also includes accessing the key via the application and sending the key to the vehicle via a communication module.
- An example disclosed system for mobile device authentication for vehicle communication includes a mobile device to receive a signal and activate, in response to determining an application for accessing digital keys is inactive, the application on the mobile device utilizing the signal.
- the example mobile device also is to access a key via the application.
- the example disclosed system also includes a vehicle to broadcast the signal, receive the key from the mobile device, and determine whether to authenticate the mobile device based on the key.
- FIG. 1 illustrates an example vehicle and an example mobile device in accordance with the teachings herein.
- FIG. 2 is a block diagram of electronic components of the mobile device of FIG. 1 .
- FIG. 3 is a block diagram of electronic components of the vehicle of FIG. 1 .
- FIG. 4 is a flowchart of an example method to authenticate the mobile device of FIG. 1 for communication with the vehicle of FIG. 1 .
- Vehicles oftentimes include remote keyless entry systems to enable a user (e.g., a driver) to unlock and/or open a vehicle door without inserting a key into a lock.
- Some remote keyless entry systems are passive entry systems in which the vehicle unlocks and/or opens the vehicle door upon detecting that the user is within proximity of the vehicle.
- the passive entry system utilizes a key fob that is carried by the user and in communication with the vehicle to detect the proximity of the user to the vehicle.
- the passive entry system utilizes an application operating on a mobile device (e.g., a smart phone) of the user that communicates with the vehicle to detect the proximity of the user to the vehicle.
- a mobile device e.g., a smart phone
- the passive entry system may require that the mobile device is authenticated by the vehicle to prevent unauthorized users from accessing the vehicle.
- the vehicle may be unable to authenticate the mobile device if the application is not operating on the mobile device, thereby preventing the passive entry system from unlocking and/or opening the vehicle door for the user.
- Examples disclosed herein include a passive entry system in which an inactive passive entry application of a mobile device (e.g., a smart phone, a tablet, a smart watch, a wearable, etc.) is activated as a user approaches a vehicle without user interaction to enable a vehicle to authenticate, via the application, communication between the mobile device and the vehicle.
- a mobile device e.g., a smart phone, a tablet, a smart watch, a wearable, etc.
- an “application” and an “app” refer to a program installed on a device (e.g., a mobile device) that is designed to perform a particular set of functions, tasks, or activities.
- an “inactive” application refers to an application that is installed on a device for which an operating system of the device is not currently running or executing instructions.
- an “active” application refers to an application installed on a device for which an operating system of the device is currently running or executing instructions. Active applications include foreground applications and background application.
- a “foreground application” refers to an active application that is providing an interface with a user (i.e., the application is running on a foreground of the device).
- a “background application” refers to an active application that is not providing an interface with a user (i.e., the application is running in a background of the device).
- activating or “to activate” an application refers to causing an operating system of a device to start performing or executing instructions for the application.
- authentication or “to authenticate” refers to validating or permitting one device (e.g., a mobile device) to communicate with another device (e.g., a vehicle).
- the mobile device of the examples disclosed herein receives a signal when the mobile device is nearby or proximate to the vehicle.
- the mobile device includes memory that includes an application for accessing digital keys (e.g., encryption keys).
- the mobile device also includes a key accessor that determines whether the application is active and, in response to determining that the application is inactive, activates the application utilizing the signal as a prompt. Further, the key accessor accesses a key via the application and sends the key to the vehicle via a communication module of the mobile device.
- the key accessor activates the application, the key accessor accesses the key and/or the communication module sends the key to the vehicle when the mobile device is in a locked mode.
- a “locked mode” refers to a mode of a mobile device in which a user must unlock the mobile device (e.g., via a password, fingerprint and/or any other verification user-verification means) to interact with an application of the mobile device.
- the key accessor of the mobile device may access the key from a database.
- the database is stored on the mobile device.
- the key accessor accesses the key from a network (e.g., the Internet) via a second communication module of the mobile device.
- the vehicle of the examples disclosed herein includes a communication module that receives the key sent from the mobile device and a device authenticator that determines whether to authenticate the mobile device by evaluating the key.
- the device authenticator compares the key to key entries of a vehicle database and authenticates the mobile device when the key received from the mobile device matches one of the key entries of the vehicle database. Additionally or alternatively, the device authenticator hashes the key received from the mobile device to produce a hashed key, compares the hashed key to key entries of a vehicle database, and authenticates the mobile device when the hashed key matches one of the key entries of the vehicle database.
- the device authenticator permits the communication module of the vehicle to receive a message from the mobile device, for example, to prime the vehicle for passive entry by an approaching user.
- prime a vehicle and “to prime a vehicle” refer to initiating one or more systems and/or devices of a vehicle to facilitate entry of the vehicle by a user.
- priming the vehicle includes unlocking, opening, and/or priming one or more doors of the vehicle and/or activating lighting of the vehicle for an approaching user.
- priming a door refers to instructing an electronic latch to unlock a corresponding door upon detection that a user has attempted to open a door (e.g., by touching a handle of the door).
- the communication module of the mobile device receives the signal that is utilized to activate the application when the mobile device is within a proximity range of the vehicle.
- the communication module of the mobile device is a short-range wireless module
- the communication module of the vehicle is a short-range wireless module
- the signal is a low-energy beacon (e.g., a Bluetooth® low-energy beacon) that is broadcasted by the short-range wireless module of the vehicle and received by the short-range wireless module of the mobile device.
- a “beacon” is a signal that is intermittently broadcasted by a source.
- the vehicle includes a GPS receiver that identifies a location of the vehicle
- the mobile device includes a GPS receiver that identifies a location of the vehicle.
- the GPS receiver of the mobile device receives the signal that is utilized to activate the application when the mobile device is within a proximity range of the vehicle.
- the GPS receiver of the mobile device may receive the signal when the location identified by the GPS receiver of the mobile device is near or proximate to the location identified by the GPS receiver of the vehicle.
- FIG. 1 illustrates an example vehicle 100 and a user 102 with an example mobile device 104 (e.g., a smart phone, a tablet, a smart watch, a wearable, etc.) in accordance with the teachings herein.
- the vehicle 100 may be a standard gasoline powered vehicle, a hybrid vehicle, an electric vehicle, a fuel cell vehicle, and/or any other mobility implement type of vehicle.
- the vehicle 100 includes parts related to mobility, such as a powertrain with an engine, a transmission, a suspension, a driveshaft, and/or wheels, etc.
- the vehicle 100 may be non-autonomous, semi-autonomous (e.g., some routine motive functions controlled by the vehicle 100 ), or autonomous (e.g., motive functions are controlled by the vehicle 100 without direct driver input).
- the vehicle 100 of the illustrated example includes a communication module 106 that is to communicatively couple to the mobile device 104 .
- the communication module 106 is a short-range wireless module that includes a wireless transducer to wirelessly communicate with the mobile device 104 and/or another device that is within a broadcast range or distance of the communication module 106 .
- the short-range wireless module includes hardware and firmware to establish a connection with the mobile device 104 .
- the short-range wireless module implements the Bluetooth® and/or Bluetooth® Low Energy (BLE) protocols.
- BLE Bluetooth® and BLE protocols are set forth in Volume 6 of the Bluetooth® Specification 4.0 (and subsequent revisions) maintained by the Bluetooth® Special Interest Group.
- the vehicle 100 includes one communication module (e.g., the communication module 106 ).
- the vehicle 100 includes a plurality of communication modules that are to communication with the mobile device 104 and are positioned at different locations throughout the vehicle 100 .
- the broadcast range of the communication module 106 defines a proximity range 108 of the vehicle 100 in which the communication module 106 is capable of communicating with the mobile device 104 and/or another device.
- the mobile device 104 is able to receive a beacon 110 (e.g., a low-energy beacon such as Bluetooth® low-energy (BLE) beacon) that is broadcasted intermittently by the communication module 106 of the vehicle 100 .
- a beacon 110 e.g., a low-energy beacon such as Bluetooth® low-energy (BLE) beacon
- BLE Bluetooth® low-energy
- the communication module 106 of the vehicle 100 utilizes the beacon 110 to determine whether the mobile device 104 is proximate to (e.g., within the proximity range 108 of) the vehicle 100 .
- the beacon 110 is broadcasted by the communication module 106 at a constant rate (e.g., one broadcast per second).
- a rate at which the communication module 106 broadcasts the beacon 110 is dependent upon a distance between the communication module 106 and the mobile device 104 .
- the communication module 106 may broadcast the beacon 110 at a greater rate the closer the mobile device 104 is to the vehicle 100 .
- the communication module 106 of the illustrated example also is capable of receiving a key 112 (e.g., a digital key, an encryption key) from the mobile device 104 when the mobile device 104 is within the proximity range 108 of the vehicle 100 .
- the mobile device 104 sends the key 112 to the communication module 106 of the vehicle upon receiving the beacon 110 to enable the vehicle 100 to authenticate the mobile device 104 for further communication with the vehicle 100 .
- the mobile device 104 upon being authenticated by the vehicle 100 , the mobile device 104 sends a message 114 that is received by the vehicle 100 as the user 102 approaches the vehicle 100 .
- the message 114 may instruct the vehicle 100 to prime the vehicle 100 for passive entry by the user 102 .
- the vehicle 100 of the illustrated example also includes a global positioning sensor (GPS) receiver 116 to identify a location of the vehicle 100 .
- GPS global positioning sensor
- the GPS receiver 116 if the GPS receiver 116 is active (e.g., the vehicle 100 is powered on), the GPS receiver 116 identifies a current location of the vehicle 100 . Otherwise, if the GPS receiver 116 is inactive (e.g., the vehicle 100 is powered off), the GPS receiver 116 may identify a last-known parked location of the vehicle 100 .
- the GPS receiver 116 is utilized to determine whether the mobile device 104 is proximate to the vehicle 100 , for example, by comparing a location of the mobile device (e.g., identified via a GPS receiver 212 of the mobile device 104 of FIG.
- an assisted GPS system and/or a received signal strength indicator is utilized to determine a distance between the mobile device 104 and the vehicle 100 .
- the communication module 106 receives the RSSI from the mobile device 104 when the mobile device 104 is within the proximity range 108 of the vehicle 100 .
- the vehicle 100 also includes a device authenticator 118 that authenticates the mobile device 104 and/or any other device to facilitate further communication between the vehicle 100 and the mobile device 104 and/or the other device.
- the device authenticator 118 is communicatively coupled to the communication module 106 to receive the key 112 and/or the message 114 sent by the mobile device 104 .
- the vehicle 100 sends a signal that the mobile device 104 is to receive when the mobile device 104 is proximate to the vehicle 100 .
- the communication module 106 e.g., a short-range wireless module
- broadcasts a low-energy beacon that is received by a communication module (e.g., a communication module 210 of FIG. 2 ) of the mobile device 104 when the mobile device 104 is within the proximity range 108 of the vehicle 100 .
- the mobile device 104 receives a geosense signal associated with the vehicle 100 when the mobile device 104 is proximate to the vehicle 100 .
- the geosense signal is a global-positioning signal that is sent to a device (e.g., the mobile device 104 ) when that device is within a proximity range of another device (e.g., within the proximity range 108 of the vehicle 100 ).
- the mobile device 104 Upon receiving the signal from the vehicle 100 , the mobile device 104 determines whether an application for accessing securely-stored, digital keys is active on the mobile device 104 .
- the application may be inactive as the user 102 approaches the vehicle 100 , for example, if the user 102 turned off the mobile device, the mobile device 104 ran out of battery, the user 102 closed the application, etc. without subsequently reactivating the application.
- the mobile device 104 activates the application utilizing the received signal that is associated with the mobile device 104 being proximate to the vehicle 100 (e.g., the beacon 110 ) as a prompt. For example, the mobile device 104 utilizes the signal associated with the vehicle 100 to activate the application without user interaction between the user 102 and the application of the mobile device 104 . The mobile device 104 may activate the application utilizing the received signal when the mobile device 104 is in a locked mode to facilitate activation of the application without user interaction between the user 102 and the mobile device 104 .
- the mobile device 104 accesses the key 112 via the application and sends the key 112 to the communication module 106 of the vehicle 100 to enable the device authenticator 118 to authenticate the mobile device 104 for further communication.
- the application may access and send the key 112 to the vehicle 100 when the application is operating as a background application or a foreground application on the mobile device 104 . Additionally or alternatively, the application accesses and send the key 112 to the vehicle 100 without user interaction between the user 102 and the mobile device 104 .
- the mobile device 104 may activate the application, accesses the key 112 , and sends the key 112 to the communication module 106 of the vehicle 100 while the mobile device 104 remains in the locked mode.
- the application of the mobile device 104 enables the mobile device to operate as a wireless key in a passive entry system of the vehicle 100 .
- the communication module 106 of the vehicle 100 receives the key 112 sent from the mobile device 104 , and the device authenticator 118 determines whether to authenticate the mobile device 104 for further communication with the vehicle 100 .
- the device authenticator 118 evaluates the key 112 received from the mobile device 104 to determine whether to authenticate the mobile device 104 .
- the device authenticator 118 authenticates the mobile device 104 for communication with the vehicle 100 by comparing the key 112 sent by the mobile device 104 to key entries of a database (e.g., a database 314 of FIG. 3 ) that is accessible to the device authenticator 118 .
- a database e.g., a database 314 of FIG. 3
- the device authenticator 118 authenticates the mobile device 104 for further communication with the vehicle 100 when the key 112 received from the mobile device 104 matches one of the key entries of the database.
- the device authenticator 118 hashes, via a hash function, the key 112 received from the mobile device 104 into a hashed key.
- the device authenticator 118 compares the hashed key to the key entries of the database and authenticates the mobile device 104 when the hashed key matches one of the key entries of the database.
- the device authenticator 118 When the device authenticator 118 authenticates the mobile device 104 , the device authenticator 118 enables the communication module 106 of the vehicle 100 to receive the message 114 from the mobile device 104 .
- the communication module 106 of the vehicle 100 receives the message 114 to receive instructions from the mobile device 104 to prime the vehicle 100 for passive entry by the user 102 approaching the vehicle 100 .
- FIG. 2 is a block diagram of electronic components 200 of the mobile device 104 .
- the electronic components 200 include a microcontroller unit, controller, or processor 202 .
- the electronic components 200 include memory 204 , a database 206 , a communication module 208 , a communication module 210 , and a GPS receiver 212 .
- the processor 202 of the mobile device 104 is structured to include a key accessor 214 .
- the processor 202 may be any suitable processing device or set of processing devices such as, but not limited to, a microprocessor, a microcontroller-based platform, an integrated circuit, one or more field programmable gate arrays (FPGAs), and/or one or more application-specific integrated circuits (ASICs).
- FPGAs field programmable gate arrays
- ASICs application-specific integrated circuits
- the memory 204 may be volatile memory (e.g., RAM including non-volatile RAM, magnetic RAM, ferroelectric RAM, etc.), non-volatile memory (e.g., disk memory, FLASH memory, EPROMs, EEPROMs, memristor-based non-volatile solid-state memory, etc.), unalterable memory (e.g., EPROMs), read-only memory, and/or high-capacity storage devices (e.g., hard drives, solid state drives, etc).
- the memory 204 includes multiple kinds of memory, particularly volatile memory and non-volatile memory.
- the memory 204 is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure, can be embedded.
- the instructions may embody one or more of the methods or logic as described herein.
- the memory 204 includes computer readable memory on which instructions for the application for accessing digital keys are embedded.
- the instructions may reside completely, or at least partially, within any one or more of the memory 204 , the computer readable medium, and/or within the processor 202 during execution of the instructions.
- non-transitory computer-readable medium and “computer-readable medium” include a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. Further, the terms “non-transitory computer-readable medium” and “computer-readable medium” include any tangible medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor or that cause a system to perform any one or more of the methods or operations disclosed herein. As used herein, the term “computer readable medium” is expressly defined to include any type of computer readable storage device and/or storage disk and to exclude propagating signals.
- the electronic components 200 of the illustrated example includes the database 206 that securely stores a plurality of keys that may be utilized to authenticate the mobile device 104 for communication with the vehicle 100 . Additionally or alternatively, the electronic components 200 include the communication module 208 that is communicatively coupled to a network (e.g., the Internet). In some such examples, the network includes a database that securely stores a plurality of keys for authentication of the mobile device 104 by the vehicle 100 .
- a network e.g., the Internet
- the electronic components 200 also includes the communication module 210 that is to communicatively couple to the communication module 106 of the vehicle 100 .
- the communication module 210 receives the beacon 110 (e.g., a low-energy beacon) broadcasted by the communication module 106 of the vehicle 100 and sends the key 112 and the message 114 to the communication module 106 .
- the communication module 106 is a short-range wireless module that includes a wireless transducer to wirelessly communicate with the communication module 106 of the vehicle 100 .
- the short-range wireless module includes hardware and firmware to establish a connection with the mobile device 104 .
- the short-range wireless module implements the Bluetooth® and/or Bluetooth® Low Energy (BLE) protocols.
- BLE Bluetooth® and/or Bluetooth® Low Energy
- the GPS receiver 212 of the electronic components identifies a location of the mobile device 104 . Additionally, the GPS receiver 116 may be utilized to determine whether the mobile device 104 is proximate to the vehicle 100 . For example, when the mobile device 104 is proximate to the vehicle 100 , the mobile device 104 receives a geosense signal associated with the vehicle 100 that indicates the mobile device 104 is within the proximity range 108 of the vehicle 100 .
- the mobile device 104 receives the signal associated with the vehicle 100 when the mobile device 104 is proximate to the vehicle 100 .
- the communication module 210 receives the beacon 110 that is broadcasted by the communication module 106 of the vehicle 100 .
- the GPS receiver 212 of the mobile device 104 receives the geosense signal when the mobile device 104 is proximate to the vehicle 100 .
- the key accessor 214 of the processor 202 determines whether the application for accessing digital keys is active. In response to determining that the application is inactive, the key accessor 214 activates the application utilizing the signal as a prompt.
- the key accessor 214 utilizes the application to access the key 112 .
- the key accessor 214 accesses, via the application, the key 112 from the database 206 .
- the key accessor 214 utilizes the application and the communication module 208 to access the key 112 from a database stored on a network (e.g., the Internet).
- the key accessor 214 sends the key 112 to the communication module 106 of the vehicle 100 via the communication module 210 of the mobile device 104 .
- the key accessor 214 activates the application, accesses the key 112 , and/or sends the key 112 to the vehicle 100 when the mobile device is in a locked mode.
- the communication module 210 of the mobile device 104 sends the message 114 to the communication module 106 of the vehicle 100 .
- the communication module 210 sends the message 114 to the communication module 106 to prime the vehicle 100 for the user 102 .
- FIG. 3 is a block diagram of electronic components 300 of the vehicle 100 .
- the electronic components 300 include a body control module 302 , the communication module 106 , the GPS receiver 116 , sensors 304 , electronic control units (ECUs) 306 , and a vehicle data bus 308 .
- ECUs electronice control units
- the body control module 302 controls one or more subsystems throughout the vehicle 100 , such as external lighting, power windows, an immobilizer system, power mirrors, etc.
- the body control module 302 includes circuits that drive one or more of relays (e.g., to control wiper fluid, etc.), brushed direct current (DC) motors (e.g., to control power seats, power windows, wipers, etc.), stepper motors, LEDs, etc.
- the body control module 302 includes a microcontroller unit, controller or processor 310 and memory 312 .
- the body control module 302 is structured to include the device authenticator 118 .
- the device authenticator 118 is incorporated into another electronic control unit (ECU) with its own processor 310 and memory 312 .
- the processor 310 may be any suitable processing device or set of processing devices such as, but not limited to, a microprocessor, a microcontroller-based platform, an integrated circuit, one or more field programmable gate arrays (FPGAs), and/or one or more application-specific integrated circuits (ASICs).
- the memory 312 may be volatile memory (e.g., RAM including non-volatile RAM, magnetic RAM, ferroelectric RAM, etc.), non-volatile memory (e.g., disk memory, FLASH memory, EPROMs, EEPROMs, memristor-based non-volatile solid-state memory, etc.), unalterable memory (e.g., EPROMs), read-only memory, and/or high-capacity storage devices (e.g., hard drives, solid state drives, etc).
- the memory 312 includes multiple kinds of memory, particularly volatile memory and non-volatile memory.
- the memory 312 is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure, can be embedded.
- the instructions may embody one or more of the methods or logic as described herein.
- the instructions reside completely, or at least partially, within any one or more of the memory 312 , the computer readable medium, and/or within the processor 310 during execution of the instructions.
- the body control module 302 of the illustrated example includes a database 314 that includes a plurality of key entries.
- the device authenticator 118 compares the key entries of the database 314 to the key 112 and/or the hashed key to determine whether to authenticate the mobile device 104 for further communication with the vehicle 100 .
- the sensors 304 are arranged in and around the vehicle 100 to monitor properties of the vehicle 100 and/or an environment in which the vehicle 100 is located.
- One or more of the sensors 304 may be mounted to measure properties around an exterior of the vehicle 100 .
- one or more of the sensors 304 may be mounted inside a cabin of the vehicle 100 or in a body of the vehicle 100 (e.g., an engine compartment, wheel wells, etc.) to measure properties in an interior of the vehicle 100 .
- the sensors 304 include accelerometers, odometers, tachometers, pitch and yaw sensors, wheel speed sensors, microphones, tire pressure sensors, biometric sensors and/or sensors of any other suitable type.
- the sensors 304 include a door-ajar sensor 316 , an ambient light sensor 318 , and a camera 320 .
- the door-ajar sensor 316 detects whether a door of the vehicle 100 is open before and/or after the vehicle 100 is primed for passive entry by the user 102 .
- the ambient light sensor 318 and/or the camera 320 may measure ambient light of the vehicle 100 to affect lighting (e.g., interior lighting, exterior lighting) of the vehicle 100 as the vehicle 100 is primed for entry by the user 102 .
- the ECUs 306 monitor and control the subsystems of the vehicle 100 .
- the ECUs 306 are discrete sets of electronics that include their own circuit(s) (e.g., integrated circuits, microprocessors, memory, storage, etc.) and firmware, sensors, actuators, and/or mounting hardware.
- the ECUs 306 communicate and exchange information via a vehicle data bus (e.g., the vehicle data bus 308 ). Additionally, the ECUs 306 may communicate properties (e.g., status of the ECUs 306 , sensor readings, control state, error and diagnostic codes, etc.) to and/or receive requests from each other.
- properties e.g., status of the ECUs 306 , sensor readings, control state, error and diagnostic codes, etc.
- the vehicle 100 may have seventy or more of the ECUs 306 that are positioned in various locations around the vehicle 100 and are communicatively coupled by the vehicle data bus 308 .
- the ECUs 306 include a lighting control module 322 , an engine control unit 324 , and a door control unit 326 .
- the lighting control module 322 operates the interior and/or exterior lights of the vehicle 100
- the engine control unit 324 may control remote starting of an engine of the vehicle 100
- the door control unit 326 operates (e.g., locks, unlocks, primes) power locks of doors of the vehicle 100 .
- the vehicle data bus 308 communicatively couples the communication module 106 , the GPS receiver 116 , the body control module 302 , the sensors 304 , and the ECUs 306 .
- the vehicle data bus 308 includes one or more data buses.
- the vehicle data bus 308 may be implemented in accordance with a controller area network (CAN) bus protocol as defined by International Standards Organization (ISO) 11898-1, a Media Oriented Systems Transport (MOST) bus protocol, a CAN flexible data (CAN-FD) bus protocol (ISO 11898-7) and/a K-line bus protocol (ISO 9141 and ISO 14230-1), and/or an EthernetTM bus protocol IEEE 802.3 (2002 onwards), etc.
- CAN controller area network
- FIG. 4 is a flowchart of an example method 400 to authenticate a mobile device for communication with a vehicle.
- the flowchart of FIG. 4 is representative of machine readable instructions that are stored in memory (such as the memory 204 of FIG. 2 and/or the memory 312 of FIG. 3 ) and include one or more programs which, when executed by a processor (such as the processor 202 of FIG. 2 and/or the processor 310 of FIG. 3 ), cause the vehicle 100 to implement the example key accessor 214 of FIG. 2 and/or the example device authenticator 118 of FIGS. 1 and 3 . While the example program is described with reference to the flowchart illustrated in FIG.
- the communication module 106 of the vehicle 100 broadcasts the signal (e.g., the beacon 110 ).
- the communication module 210 of the mobile device 104 receives the signal when the mobile device 104 is within the proximity range 108 of the vehicle 100 .
- the signal associated with the vehicle 100 is a geosense signal that the GPS receiver 212 of the mobile device 104 receives when the mobile device 104 is within the proximity range 108 of the vehicle 100 as determined via the GPS receiver 116 of the vehicle 100 .
- the key accessor 214 of the mobile device 104 determines whether the application for accessing digital keys is inactive. If the application is inactive, the key accessor 214 activates the application utilizing the signal associated with the vehicle as a prompt (block 408 ). If the application is activated at block 406 and/or upon activating the application at block 408 , the key accessor 214 accesses the key 112 from a database. In some examples, the key accessor 214 accesses the key 112 from the database 206 of the mobile device 104 . In other examples, the key accessor 214 accesses the key 112 from a database from a network (e.g., the Internet) via the communication module 208 .
- a network e.g., the Internet
- the key accessor 214 sends the key 112 , via the communication module 210 of the mobile device 104 , to the communication module 106 of the vehicle 100 .
- the key accessor 214 activates the application at block 406 , accesses the key 112 at block 410 , and/or sends the key 112 to the vehicle 100 without while the mobile device 104 remains in a locked mode without user interaction between the user 102 and the mobile device 104 .
- the communication module 106 of the vehicle 100 receives the key 112 from the communication module 210 of the mobile device 104 .
- the device authenticator 118 of the vehicle 100 evaluates the key 112 for authentication. For example, the device authenticator 118 evaluates the key 112 by comparing the key 112 to key entries of the database 314 that is accessible to the device authenticator 118 . In other examples, the device authenticator 118 evaluates the key 112 by hashing the key 112 into a hashed key and comparing the hashed key to the key entries of the database 314 .
- the device authenticator 118 determines whether the mobile device 104 is authenticated. If the key 112 sent by the mobile device 104 does not correspond to one of the key entries of the database 314 , the method 400 ends.
- the method continues to block 420 at which the communication module 210 of the mobile device 104 sends the message 114 to communication module 106 of the vehicle 100 .
- the message 114 includes instructions for priming the vehicle 100 for entry by the user 102 .
- the communication module 106 of the vehicle 100 receives the message 114 from the communication module 210 of the mobile device 104 .
- the vehicle 100 is primed for entry by the user 102 based on the instructions included in the message 114 .
- the use of the disjunctive is intended to include the conjunctive.
- the use of definite or indefinite articles is not intended to indicate cardinality.
- a reference to “the” object or “a” and “an” object is intended to denote also one of a possible plurality of such objects.
- the conjunction “or” may be used to convey features that are simultaneously present instead of mutually exclusive alternatives. In other words, the conjunction “or” should be understood to include “and/or”.
- the terms “includes,” “including,” and “include” are inclusive and have the same scope as “comprises,” “comprising,” and “comprise” respectively.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mechanical Engineering (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Methods and apparatus are disclosed for authentication of mobile devices for vehicle communication. An example mobile device for vehicle communication authentication a communication module to receive a signal from a vehicle, memory including an application for accessing digital keys, and key accessor. The example key accessor is to activate, in response to determining the application is inactive, the application utilizing the signal. The example key accessor also is to access a key via the application and send, via the communication module, the key to the vehicle.
Description
- This application is related to U.S. application Ser. No. ______, Docket No. 83739820 (NGE File No. 026780-8536), filed on Dec. 7, 2016, which is incorporated herein by reference in its entirety.
- The present disclosure generally relates to communication authentication and, more specifically, authentication of mobile devices for vehicle communication.
- Oftentimes, a vehicle utilizes a remote keyless entry system to enable a user (e.g., a driver) to unlock and/or open a door without inserting a key into a lock. In some instances, the remote keyless entry system includes a key fob that is carried by the user. The key fob includes a wireless transducer that communicates with the vehicle to unlock and/or open the door of the vehicle. Some remote keyless entry systems are passive entry systems that unlock and/or open the door of the vehicle upon detecting that the key fob is within a proximity of the vehicle.
- The appended claims define this application. The present disclosure summarizes aspects of the embodiments and should not be used to limit the claims. Other implementations are contemplated in accordance with the techniques described herein, as will be apparent to one having ordinary skill in the art upon examination of the following drawings and detailed description, and these implementations are intended to be within the scope of this application.
- Example embodiments are shown for authentication of mobile devices for vehicle communication. An example disclosed mobile device for vehicle communication authentication includes a communication module to receive a signal from a vehicle, memory including an application for accessing digital keys, and key accessor. The example key accessor is to activate, in response to determining the application is inactive, the application utilizing the signal. The example key accessor also is to access a key via the application and send, via the communication module, the key to the vehicle.
- An example disclosed method for mobile device authentication for vehicle communication includes receiving, via a mobile device, a signal that is associated with a vehicle and determining, via a processor, whether an application for accessing a key is active on the mobile device. The example disclosed method also includes activating, in response to determining the application is inactive, the application utilizing the signal. The example disclosed method also includes accessing the key via the application and sending the key to the vehicle via a communication module.
- An example disclosed system for mobile device authentication for vehicle communication includes a mobile device to receive a signal and activate, in response to determining an application for accessing digital keys is inactive, the application on the mobile device utilizing the signal. The example mobile device also is to access a key via the application. The example disclosed system also includes a vehicle to broadcast the signal, receive the key from the mobile device, and determine whether to authenticate the mobile device based on the key.
- For a better understanding of the invention, reference may be made to embodiments shown in the following drawings. The components in the drawings are not necessarily to scale and related elements may be omitted, or in some instances proportions may have been exaggerated, so as to emphasize and clearly illustrate the novel features described herein. In addition, system components can be variously arranged, as known in the art. Further, in the drawings, like reference numerals designate corresponding parts throughout the several views.
-
FIG. 1 illustrates an example vehicle and an example mobile device in accordance with the teachings herein. -
FIG. 2 is a block diagram of electronic components of the mobile device ofFIG. 1 . -
FIG. 3 is a block diagram of electronic components of the vehicle ofFIG. 1 . -
FIG. 4 is a flowchart of an example method to authenticate the mobile device ofFIG. 1 for communication with the vehicle ofFIG. 1 . - While the invention may be embodied in various forms, there are shown in the drawings, and will hereinafter be described, some exemplary and non-limiting embodiments, with the understanding that the present disclosure is to be considered an exemplification of the invention and is not intended to limit the invention to the specific embodiments illustrated.
- Vehicles oftentimes include remote keyless entry systems to enable a user (e.g., a driver) to unlock and/or open a vehicle door without inserting a key into a lock. Some remote keyless entry systems are passive entry systems in which the vehicle unlocks and/or opens the vehicle door upon detecting that the user is within proximity of the vehicle. In some instances, the passive entry system utilizes a key fob that is carried by the user and in communication with the vehicle to detect the proximity of the user to the vehicle. In other instances, the passive entry system utilizes an application operating on a mobile device (e.g., a smart phone) of the user that communicates with the vehicle to detect the proximity of the user to the vehicle. In some instances, the passive entry system may require that the mobile device is authenticated by the vehicle to prevent unauthorized users from accessing the vehicle. In some such instances, the vehicle may be unable to authenticate the mobile device if the application is not operating on the mobile device, thereby preventing the passive entry system from unlocking and/or opening the vehicle door for the user.
- Examples disclosed herein include a passive entry system in which an inactive passive entry application of a mobile device (e.g., a smart phone, a tablet, a smart watch, a wearable, etc.) is activated as a user approaches a vehicle without user interaction to enable a vehicle to authenticate, via the application, communication between the mobile device and the vehicle.
- As used herein, an “application” and an “app” refer to a program installed on a device (e.g., a mobile device) that is designed to perform a particular set of functions, tasks, or activities. As used herein, an “inactive” application refers to an application that is installed on a device for which an operating system of the device is not currently running or executing instructions. As used herein, an “active” application refers to an application installed on a device for which an operating system of the device is currently running or executing instructions. Active applications include foreground applications and background application. As used herein, a “foreground application” refers to an active application that is providing an interface with a user (i.e., the application is running on a foreground of the device). As used herein, a “background application” refers to an active application that is not providing an interface with a user (i.e., the application is running in a background of the device). As used herein, “activating” or “to activate” an application refers to causing an operating system of a device to start performing or executing instructions for the application. As used herein, “authenticating” or “to authenticate” refers to validating or permitting one device (e.g., a mobile device) to communicate with another device (e.g., a vehicle).
- The mobile device of the examples disclosed herein receives a signal when the mobile device is nearby or proximate to the vehicle. The mobile device includes memory that includes an application for accessing digital keys (e.g., encryption keys). The mobile device also includes a key accessor that determines whether the application is active and, in response to determining that the application is inactive, activates the application utilizing the signal as a prompt. Further, the key accessor accesses a key via the application and sends the key to the vehicle via a communication module of the mobile device.
- In some examples, the key accessor activates the application, the key accessor accesses the key and/or the communication module sends the key to the vehicle when the mobile device is in a locked mode. As used herein, a “locked mode” refers to a mode of a mobile device in which a user must unlock the mobile device (e.g., via a password, fingerprint and/or any other verification user-verification means) to interact with an application of the mobile device. Further, the key accessor of the mobile device may access the key from a database. In some examples, the database is stored on the mobile device. In other examples, the key accessor accesses the key from a network (e.g., the Internet) via a second communication module of the mobile device.
- The vehicle of the examples disclosed herein includes a communication module that receives the key sent from the mobile device and a device authenticator that determines whether to authenticate the mobile device by evaluating the key. In some examples, the device authenticator compares the key to key entries of a vehicle database and authenticates the mobile device when the key received from the mobile device matches one of the key entries of the vehicle database. Additionally or alternatively, the device authenticator hashes the key received from the mobile device to produce a hashed key, compares the hashed key to key entries of a vehicle database, and authenticates the mobile device when the hashed key matches one of the key entries of the vehicle database.
- In response to the device authenticator authenticating the mobile device, the device authenticator permits the communication module of the vehicle to receive a message from the mobile device, for example, to prime the vehicle for passive entry by an approaching user. As used herein, “priming a vehicle” and “to prime a vehicle” refer to initiating one or more systems and/or devices of a vehicle to facilitate entry of the vehicle by a user. For example, priming the vehicle includes unlocking, opening, and/or priming one or more doors of the vehicle and/or activating lighting of the vehicle for an approaching user. As used herein, “priming a door” refers to instructing an electronic latch to unlock a corresponding door upon detection that a user has attempted to open a door (e.g., by touching a handle of the door).
- In some examples, the communication module of the mobile device receives the signal that is utilized to activate the application when the mobile device is within a proximity range of the vehicle. In some such examples, the communication module of the mobile device is a short-range wireless module, the communication module of the vehicle is a short-range wireless module, and the signal is a low-energy beacon (e.g., a Bluetooth® low-energy beacon) that is broadcasted by the short-range wireless module of the vehicle and received by the short-range wireless module of the mobile device. As used herein, a “beacon” is a signal that is intermittently broadcasted by a source.
- In some examples, the vehicle includes a GPS receiver that identifies a location of the vehicle, and the mobile device includes a GPS receiver that identifies a location of the vehicle. In some such examples, the GPS receiver of the mobile device receives the signal that is utilized to activate the application when the mobile device is within a proximity range of the vehicle. The GPS receiver of the mobile device may receive the signal when the location identified by the GPS receiver of the mobile device is near or proximate to the location identified by the GPS receiver of the vehicle.
- Turning to the figures,
FIG. 1 illustrates anexample vehicle 100 and auser 102 with an example mobile device 104 (e.g., a smart phone, a tablet, a smart watch, a wearable, etc.) in accordance with the teachings herein. Thevehicle 100 may be a standard gasoline powered vehicle, a hybrid vehicle, an electric vehicle, a fuel cell vehicle, and/or any other mobility implement type of vehicle. Thevehicle 100 includes parts related to mobility, such as a powertrain with an engine, a transmission, a suspension, a driveshaft, and/or wheels, etc. Thevehicle 100 may be non-autonomous, semi-autonomous (e.g., some routine motive functions controlled by the vehicle 100), or autonomous (e.g., motive functions are controlled by thevehicle 100 without direct driver input). - The
vehicle 100 of the illustrated example includes acommunication module 106 that is to communicatively couple to themobile device 104. In the illustrated example, thecommunication module 106 is a short-range wireless module that includes a wireless transducer to wirelessly communicate with themobile device 104 and/or another device that is within a broadcast range or distance of thecommunication module 106. The short-range wireless module includes hardware and firmware to establish a connection with themobile device 104. In some examples, the short-range wireless module implements the Bluetooth® and/or Bluetooth® Low Energy (BLE) protocols. The Bluetooth® and BLE protocols are set forth in Volume 6 of the Bluetooth® Specification 4.0 (and subsequent revisions) maintained by the Bluetooth® Special Interest Group. In the illustrated example, thevehicle 100 includes one communication module (e.g., the communication module 106). In other examples, thevehicle 100 includes a plurality of communication modules that are to communication with themobile device 104 and are positioned at different locations throughout thevehicle 100. - As illustrated in
FIG. 1 , the broadcast range of thecommunication module 106 defines aproximity range 108 of thevehicle 100 in which thecommunication module 106 is capable of communicating with themobile device 104 and/or another device. For example, when themobile device 104 is within theproximity range 108 of thevehicle 100, themobile device 104 is able to receive a beacon 110 (e.g., a low-energy beacon such as Bluetooth® low-energy (BLE) beacon) that is broadcasted intermittently by thecommunication module 106 of thevehicle 100. When themobile device 104 is outside of theproximity range 108, themobile device 104 is unable to receive thebeacon 110 broadcasted by thecommunication module 106. Thus, thecommunication module 106 of thevehicle 100 utilizes thebeacon 110 to determine whether themobile device 104 is proximate to (e.g., within theproximity range 108 of) thevehicle 100. In some examples, thebeacon 110 is broadcasted by thecommunication module 106 at a constant rate (e.g., one broadcast per second). In other examples, a rate at which thecommunication module 106 broadcasts thebeacon 110 is dependent upon a distance between thecommunication module 106 and themobile device 104. For example, thecommunication module 106 may broadcast thebeacon 110 at a greater rate the closer themobile device 104 is to thevehicle 100. - The
communication module 106 of the illustrated example also is capable of receiving a key 112 (e.g., a digital key, an encryption key) from themobile device 104 when themobile device 104 is within theproximity range 108 of thevehicle 100. Themobile device 104 sends the key 112 to thecommunication module 106 of the vehicle upon receiving thebeacon 110 to enable thevehicle 100 to authenticate themobile device 104 for further communication with thevehicle 100. For example, upon being authenticated by thevehicle 100, themobile device 104 sends amessage 114 that is received by thevehicle 100 as theuser 102 approaches thevehicle 100. Themessage 114 may instruct thevehicle 100 to prime thevehicle 100 for passive entry by theuser 102. - The
vehicle 100 of the illustrated example also includes a global positioning sensor (GPS)receiver 116 to identify a location of thevehicle 100. For example, if theGPS receiver 116 is active (e.g., thevehicle 100 is powered on), theGPS receiver 116 identifies a current location of thevehicle 100. Otherwise, if theGPS receiver 116 is inactive (e.g., thevehicle 100 is powered off), theGPS receiver 116 may identify a last-known parked location of thevehicle 100. In some examples, theGPS receiver 116 is utilized to determine whether themobile device 104 is proximate to thevehicle 100, for example, by comparing a location of the mobile device (e.g., identified via aGPS receiver 212 of themobile device 104 ofFIG. 2 ) to a location of thevehicle 100. Additionally or alternatively, an assisted GPS system and/or a received signal strength indicator (RSSI) is utilized to determine a distance between themobile device 104 and thevehicle 100. For example, thecommunication module 106 receives the RSSI from themobile device 104 when themobile device 104 is within theproximity range 108 of thevehicle 100. - The
vehicle 100 also includes adevice authenticator 118 that authenticates themobile device 104 and/or any other device to facilitate further communication between thevehicle 100 and themobile device 104 and/or the other device. Thedevice authenticator 118 is communicatively coupled to thecommunication module 106 to receive the key 112 and/or themessage 114 sent by themobile device 104. - In operation, the
vehicle 100 sends a signal that themobile device 104 is to receive when themobile device 104 is proximate to thevehicle 100. In some examples, the communication module 106 (e.g., a short-range wireless module) broadcasts a low-energy beacon that is received by a communication module (e.g., acommunication module 210 ofFIG. 2 ) of themobile device 104 when themobile device 104 is within theproximity range 108 of thevehicle 100. Additionally or alternatively, themobile device 104 receives a geosense signal associated with thevehicle 100 when themobile device 104 is proximate to thevehicle 100. The geosense signal is a global-positioning signal that is sent to a device (e.g., the mobile device 104) when that device is within a proximity range of another device (e.g., within theproximity range 108 of the vehicle 100). - Upon receiving the signal from the
vehicle 100, themobile device 104 determines whether an application for accessing securely-stored, digital keys is active on themobile device 104. The application may be inactive as theuser 102 approaches thevehicle 100, for example, if theuser 102 turned off the mobile device, themobile device 104 ran out of battery, theuser 102 closed the application, etc. without subsequently reactivating the application. - In response to determining that the application is inactive, the
mobile device 104 activates the application utilizing the received signal that is associated with themobile device 104 being proximate to the vehicle 100 (e.g., the beacon 110) as a prompt. For example, themobile device 104 utilizes the signal associated with thevehicle 100 to activate the application without user interaction between theuser 102 and the application of themobile device 104. Themobile device 104 may activate the application utilizing the received signal when themobile device 104 is in a locked mode to facilitate activation of the application without user interaction between theuser 102 and themobile device 104. - After the application is activated, the
mobile device 104 accesses the key 112 via the application and sends the key 112 to thecommunication module 106 of thevehicle 100 to enable thedevice authenticator 118 to authenticate themobile device 104 for further communication. The application may access and send the key 112 to thevehicle 100 when the application is operating as a background application or a foreground application on themobile device 104. Additionally or alternatively, the application accesses and send the key 112 to thevehicle 100 without user interaction between theuser 102 and themobile device 104. For example, themobile device 104 may activate the application, accesses the key 112, and sends the key 112 to thecommunication module 106 of thevehicle 100 while themobile device 104 remains in the locked mode. By enabling themobile device 104 to access and send the key 112 without user interaction between theuser 102 and themobile device 104, the application of themobile device 104 enables the mobile device to operate as a wireless key in a passive entry system of thevehicle 100. - The
communication module 106 of thevehicle 100 receives the key 112 sent from themobile device 104, and thedevice authenticator 118 determines whether to authenticate themobile device 104 for further communication with thevehicle 100. For example, thedevice authenticator 118 evaluates the key 112 received from themobile device 104 to determine whether to authenticate themobile device 104. For example, thedevice authenticator 118 authenticates themobile device 104 for communication with thevehicle 100 by comparing the key 112 sent by themobile device 104 to key entries of a database (e.g., adatabase 314 ofFIG. 3 ) that is accessible to thedevice authenticator 118. Thedevice authenticator 118 authenticates themobile device 104 for further communication with thevehicle 100 when the key 112 received from themobile device 104 matches one of the key entries of the database. In some examples, thedevice authenticator 118 hashes, via a hash function, the key 112 received from themobile device 104 into a hashed key. In such examples, thedevice authenticator 118 compares the hashed key to the key entries of the database and authenticates themobile device 104 when the hashed key matches one of the key entries of the database. - When the
device authenticator 118 authenticates themobile device 104, thedevice authenticator 118 enables thecommunication module 106 of thevehicle 100 to receive themessage 114 from themobile device 104. For example, thecommunication module 106 of thevehicle 100 receives themessage 114 to receive instructions from themobile device 104 to prime thevehicle 100 for passive entry by theuser 102 approaching thevehicle 100. -
FIG. 2 is a block diagram ofelectronic components 200 of themobile device 104. As illustrated inFIG. 2 , theelectronic components 200 include a microcontroller unit, controller, orprocessor 202. Further, theelectronic components 200 includememory 204, adatabase 206, acommunication module 208, acommunication module 210, and aGPS receiver 212. - In the illustrated example, the
processor 202 of themobile device 104 is structured to include akey accessor 214. Theprocessor 202 may be any suitable processing device or set of processing devices such as, but not limited to, a microprocessor, a microcontroller-based platform, an integrated circuit, one or more field programmable gate arrays (FPGAs), and/or one or more application-specific integrated circuits (ASICs). - The
memory 204 may be volatile memory (e.g., RAM including non-volatile RAM, magnetic RAM, ferroelectric RAM, etc.), non-volatile memory (e.g., disk memory, FLASH memory, EPROMs, EEPROMs, memristor-based non-volatile solid-state memory, etc.), unalterable memory (e.g., EPROMs), read-only memory, and/or high-capacity storage devices (e.g., hard drives, solid state drives, etc). In some examples, thememory 204 includes multiple kinds of memory, particularly volatile memory and non-volatile memory. - The
memory 204 is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure, can be embedded. The instructions may embody one or more of the methods or logic as described herein. For example, thememory 204 includes computer readable memory on which instructions for the application for accessing digital keys are embedded. The instructions may reside completely, or at least partially, within any one or more of thememory 204, the computer readable medium, and/or within theprocessor 202 during execution of the instructions. - The terms “non-transitory computer-readable medium” and “computer-readable medium” include a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. Further, the terms “non-transitory computer-readable medium” and “computer-readable medium” include any tangible medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor or that cause a system to perform any one or more of the methods or operations disclosed herein. As used herein, the term “computer readable medium” is expressly defined to include any type of computer readable storage device and/or storage disk and to exclude propagating signals.
- The
electronic components 200 of the illustrated example includes thedatabase 206 that securely stores a plurality of keys that may be utilized to authenticate themobile device 104 for communication with thevehicle 100. Additionally or alternatively, theelectronic components 200 include thecommunication module 208 that is communicatively coupled to a network (e.g., the Internet). In some such examples, the network includes a database that securely stores a plurality of keys for authentication of themobile device 104 by thevehicle 100. - In the illustrated example, the
electronic components 200 also includes thecommunication module 210 that is to communicatively couple to thecommunication module 106 of thevehicle 100. For example, thecommunication module 210 receives the beacon 110 (e.g., a low-energy beacon) broadcasted by thecommunication module 106 of thevehicle 100 and sends the key 112 and themessage 114 to thecommunication module 106. In some examples, thecommunication module 106 is a short-range wireless module that includes a wireless transducer to wirelessly communicate with thecommunication module 106 of thevehicle 100. The short-range wireless module includes hardware and firmware to establish a connection with themobile device 104. In some examples, the short-range wireless module implements the Bluetooth® and/or Bluetooth® Low Energy (BLE) protocols. - The
GPS receiver 212 of the electronic components identifies a location of themobile device 104. Additionally, theGPS receiver 116 may be utilized to determine whether themobile device 104 is proximate to thevehicle 100. For example, when themobile device 104 is proximate to thevehicle 100, themobile device 104 receives a geosense signal associated with thevehicle 100 that indicates themobile device 104 is within theproximity range 108 of thevehicle 100. - In operation, the
mobile device 104 receives the signal associated with thevehicle 100 when themobile device 104 is proximate to thevehicle 100. For example, thecommunication module 210 receives thebeacon 110 that is broadcasted by thecommunication module 106 of thevehicle 100. Additionally or alternatively, theGPS receiver 212 of themobile device 104 receives the geosense signal when themobile device 104 is proximate to thevehicle 100. Upon receiving the signal associated with thevehicle 100, thekey accessor 214 of theprocessor 202 determines whether the application for accessing digital keys is active. In response to determining that the application is inactive, thekey accessor 214 activates the application utilizing the signal as a prompt. - Once the application is active, the
key accessor 214 utilizes the application to access the key 112. In some examples, thekey accessor 214 accesses, via the application, the key 112 from thedatabase 206. Alternatively, thekey accessor 214 utilizes the application and thecommunication module 208 to access the key 112 from a database stored on a network (e.g., the Internet). Subsequently, thekey accessor 214 sends the key 112 to thecommunication module 106 of thevehicle 100 via thecommunication module 210 of themobile device 104. In some examples, thekey accessor 214 activates the application, accesses the key 112, and/or sends the key 112 to thevehicle 100 when the mobile device is in a locked mode. Further, after thekey accessor 214 sends the key 112 to thecommunication module 106 of thevehicle 100, thecommunication module 210 of themobile device 104 sends themessage 114 to thecommunication module 106 of thevehicle 100. For example, thecommunication module 210 sends themessage 114 to thecommunication module 106 to prime thevehicle 100 for theuser 102. -
FIG. 3 is a block diagram ofelectronic components 300 of thevehicle 100. As illustrated inFIG. 3 , theelectronic components 300 include abody control module 302, thecommunication module 106, theGPS receiver 116,sensors 304, electronic control units (ECUs) 306, and avehicle data bus 308. - The
body control module 302 controls one or more subsystems throughout thevehicle 100, such as external lighting, power windows, an immobilizer system, power mirrors, etc. For example, thebody control module 302 includes circuits that drive one or more of relays (e.g., to control wiper fluid, etc.), brushed direct current (DC) motors (e.g., to control power seats, power windows, wipers, etc.), stepper motors, LEDs, etc. - The
body control module 302 includes a microcontroller unit, controller orprocessor 310 andmemory 312. In some examples, thebody control module 302 is structured to include thedevice authenticator 118. Alternatively, in some examples, thedevice authenticator 118 is incorporated into another electronic control unit (ECU) with itsown processor 310 andmemory 312. Theprocessor 310 may be any suitable processing device or set of processing devices such as, but not limited to, a microprocessor, a microcontroller-based platform, an integrated circuit, one or more field programmable gate arrays (FPGAs), and/or one or more application-specific integrated circuits (ASICs). Thememory 312 may be volatile memory (e.g., RAM including non-volatile RAM, magnetic RAM, ferroelectric RAM, etc.), non-volatile memory (e.g., disk memory, FLASH memory, EPROMs, EEPROMs, memristor-based non-volatile solid-state memory, etc.), unalterable memory (e.g., EPROMs), read-only memory, and/or high-capacity storage devices (e.g., hard drives, solid state drives, etc). In some examples, thememory 312 includes multiple kinds of memory, particularly volatile memory and non-volatile memory. - The
memory 312 is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure, can be embedded. The instructions may embody one or more of the methods or logic as described herein. For example, the instructions reside completely, or at least partially, within any one or more of thememory 312, the computer readable medium, and/or within theprocessor 310 during execution of the instructions. - Further, the
body control module 302 of the illustrated example includes adatabase 314 that includes a plurality of key entries. Thedevice authenticator 118 compares the key entries of thedatabase 314 to the key 112 and/or the hashed key to determine whether to authenticate themobile device 104 for further communication with thevehicle 100. - The
sensors 304 are arranged in and around thevehicle 100 to monitor properties of thevehicle 100 and/or an environment in which thevehicle 100 is located. One or more of thesensors 304 may be mounted to measure properties around an exterior of thevehicle 100. Additionally or alternatively, one or more of thesensors 304 may be mounted inside a cabin of thevehicle 100 or in a body of the vehicle 100 (e.g., an engine compartment, wheel wells, etc.) to measure properties in an interior of thevehicle 100. For example, thesensors 304 include accelerometers, odometers, tachometers, pitch and yaw sensors, wheel speed sensors, microphones, tire pressure sensors, biometric sensors and/or sensors of any other suitable type. In the illustrated example, thesensors 304 include a door-ajar sensor 316, an ambientlight sensor 318, and acamera 320. For example, the door-ajar sensor 316 detects whether a door of thevehicle 100 is open before and/or after thevehicle 100 is primed for passive entry by theuser 102. The ambientlight sensor 318 and/or thecamera 320 may measure ambient light of thevehicle 100 to affect lighting (e.g., interior lighting, exterior lighting) of thevehicle 100 as thevehicle 100 is primed for entry by theuser 102. - The
ECUs 306 monitor and control the subsystems of thevehicle 100. For example, theECUs 306 are discrete sets of electronics that include their own circuit(s) (e.g., integrated circuits, microprocessors, memory, storage, etc.) and firmware, sensors, actuators, and/or mounting hardware. TheECUs 306 communicate and exchange information via a vehicle data bus (e.g., the vehicle data bus 308). Additionally, theECUs 306 may communicate properties (e.g., status of theECUs 306, sensor readings, control state, error and diagnostic codes, etc.) to and/or receive requests from each other. For example, thevehicle 100 may have seventy or more of theECUs 306 that are positioned in various locations around thevehicle 100 and are communicatively coupled by thevehicle data bus 308. In the illustrated example, theECUs 306 include alighting control module 322, anengine control unit 324, and adoor control unit 326. Thelighting control module 322 operates the interior and/or exterior lights of thevehicle 100, theengine control unit 324 may control remote starting of an engine of thevehicle 100, and thedoor control unit 326 operates (e.g., locks, unlocks, primes) power locks of doors of thevehicle 100. - The
vehicle data bus 308 communicatively couples thecommunication module 106, theGPS receiver 116, thebody control module 302, thesensors 304, and theECUs 306. In some examples, thevehicle data bus 308 includes one or more data buses. Thevehicle data bus 308 may be implemented in accordance with a controller area network (CAN) bus protocol as defined by International Standards Organization (ISO) 11898-1, a Media Oriented Systems Transport (MOST) bus protocol, a CAN flexible data (CAN-FD) bus protocol (ISO 11898-7) and/a K-line bus protocol (ISO 9141 and ISO 14230-1), and/or an Ethernet™ bus protocol IEEE 802.3 (2002 onwards), etc. -
FIG. 4 is a flowchart of anexample method 400 to authenticate a mobile device for communication with a vehicle. The flowchart ofFIG. 4 is representative of machine readable instructions that are stored in memory (such as thememory 204 ofFIG. 2 and/or thememory 312 ofFIG. 3 ) and include one or more programs which, when executed by a processor (such as theprocessor 202 ofFIG. 2 and/or theprocessor 310 ofFIG. 3 ), cause thevehicle 100 to implement the examplekey accessor 214 ofFIG. 2 and/or theexample device authenticator 118 ofFIGS. 1 and 3 . While the example program is described with reference to the flowchart illustrated inFIG. 4 , many other methods of implementing the examplekey accessor 214 and/or thedevice authenticator 118 may alternatively be used. For example, the order of execution of the blocks may be rearranged, changed, eliminated, and/or combined to perform themethod 400. Further, because themethod 400 is disclosed in connection with the components ofFIGS. 1-3 , some functions of those components will not be described in detail below. - Initially, at
block 402, thecommunication module 106 of thevehicle 100 broadcasts the signal (e.g., the beacon 110). Atblock 404, thecommunication module 210 of themobile device 104 receives the signal when themobile device 104 is within theproximity range 108 of thevehicle 100. In other examples, the signal associated with thevehicle 100 is a geosense signal that theGPS receiver 212 of themobile device 104 receives when themobile device 104 is within theproximity range 108 of thevehicle 100 as determined via theGPS receiver 116 of thevehicle 100. - At
block 406, thekey accessor 214 of themobile device 104 determines whether the application for accessing digital keys is inactive. If the application is inactive, thekey accessor 214 activates the application utilizing the signal associated with the vehicle as a prompt (block 408). If the application is activated atblock 406 and/or upon activating the application atblock 408, thekey accessor 214 accesses the key 112 from a database. In some examples, thekey accessor 214 accesses the key 112 from thedatabase 206 of themobile device 104. In other examples, thekey accessor 214 accesses the key 112 from a database from a network (e.g., the Internet) via thecommunication module 208. Atblock 412, thekey accessor 214 sends the key 112, via thecommunication module 210 of themobile device 104, to thecommunication module 106 of thevehicle 100. In some examples, thekey accessor 214 activates the application atblock 406, accesses the key 112 atblock 410, and/or sends the key 112 to thevehicle 100 without while themobile device 104 remains in a locked mode without user interaction between theuser 102 and themobile device 104. - At
block 414, thecommunication module 106 of thevehicle 100 receives the key 112 from thecommunication module 210 of themobile device 104. At block 416, thedevice authenticator 118 of thevehicle 100 evaluates the key 112 for authentication. For example, thedevice authenticator 118 evaluates the key 112 by comparing the key 112 to key entries of thedatabase 314 that is accessible to thedevice authenticator 118. In other examples, thedevice authenticator 118 evaluates the key 112 by hashing the key 112 into a hashed key and comparing the hashed key to the key entries of thedatabase 314. Atblock 418, thedevice authenticator 118 determines whether themobile device 104 is authenticated. If the key 112 sent by themobile device 104 does not correspond to one of the key entries of thedatabase 314, themethod 400 ends. - If the key 112 corresponds to one of the key entries of the
database 314, the method continues to block 420 at which thecommunication module 210 of themobile device 104 sends themessage 114 tocommunication module 106 of thevehicle 100. For example, themessage 114 includes instructions for priming thevehicle 100 for entry by theuser 102. Atblock 422, thecommunication module 106 of thevehicle 100 receives themessage 114 from thecommunication module 210 of themobile device 104. Atblock 424, thevehicle 100 is primed for entry by theuser 102 based on the instructions included in themessage 114. - In this application, the use of the disjunctive is intended to include the conjunctive. The use of definite or indefinite articles is not intended to indicate cardinality. In particular, a reference to “the” object or “a” and “an” object is intended to denote also one of a possible plurality of such objects. Further, the conjunction “or” may be used to convey features that are simultaneously present instead of mutually exclusive alternatives. In other words, the conjunction “or” should be understood to include “and/or”. The terms “includes,” “including,” and “include” are inclusive and have the same scope as “comprises,” “comprising,” and “comprise” respectively.
- The above-described embodiments, and particularly any “preferred” embodiments, are possible examples of implementations and merely set forth for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above-described embodiment(s) without substantially departing from the spirit and principles of the techniques described herein. All modifications are intended to be included herein within the scope of this disclosure and protected by the following claims.
Claims (22)
1. A mobile device for vehicle communication authentication, the mobile device comprising:
a communication module to receive a signal from a vehicle;
memory including an application for accessing digital keys; and
a key accessor to:
activate, in response to determining the application is inactive, the application utilizing the signal;
access a key from a database via the application; and
send the key to the vehicle via the communication module.
2. (canceled)
3. The mobile device of claim 1 , wherein the key accessor accesses the key from a network via a second communication module.
4. The mobile device of claim 1 , wherein the signal is a low-energy beacon and the communication module is a short-range wireless module that receives the low-energy beacon when the mobile device is within a proximity range of the vehicle.
5. The mobile device of claim 1 , wherein the key accessor accesses and the communication module sends the key when the mobile device is in a locked mode.
6. The mobile device of claim 5 , wherein the key accessor activates the application when the mobile device is in the locked mode.
7. A method comprising:
receiving a signal associated with a vehicle on a mobile device;
determining, via a processor, whether an application for accessing a key is active on the mobile device;
activating, in response to determining the application is inactive, the application utilizing the signal without user interaction with the mobile device when the mobile device is in a locked mode;
accessing the key via the application; and
sending the key to the vehicle.
8. The method of claim 7 , wherein receiving the signal associated with the vehicle includes receiving a low-energy beacon broadcasted by the vehicle when the mobile device is within a proximity range of the vehicle.
9. The method of claim 7 , wherein receiving the signal associated with the vehicle includes receiving a received signal strength indicator from the mobile device when the mobile device is within a proximity range of the vehicle.
10. The method of claim 7 , wherein accessing the key includes accessing a database from a network via a communication module of the mobile device.
11. The method of claim 7 , wherein accessing and sending the key includes accessing and sending the key without user interaction with the mobile device when the mobile device is in the locked mode.
12. (canceled)
13. A system comprising:
a mobile device to:
receive a signal;
activate, responsive to determining an application for accessing keys is inactive, the application utilizing the signal without user interaction when in a locked mode; and
access a key via the application; and
a vehicle to:
broadcast the signal;
receive the key from the mobile device; and
determine whether to authenticate the mobile device based on the key.
14. The system of claim 13 , wherein the signal is a low-energy beacon that the mobile device receives when the mobile device is within a proximity range of the vehicle.
15. The system of claim 13 , wherein the mobile device activates the application without user interaction with when in an unlocked mode.
16. The system of claim 13 , wherein the vehicle authenticates the mobile device for communication between the mobile device and the vehicle.
17. The system of claim 16 , wherein, upon authenticating the mobile device, the vehicle receives a message from the mobile device to prime the vehicle for passive entry by an approaching user.
18. The system of claim 13 , wherein the vehicle includes a device authenticator that evaluates the key received from the mobile device to determine whether to authenticate the mobile device.
19. The system of claim 18 , wherein the device authenticator is to:
compare the key to key entries of a database; and
authenticate the mobile device when the key matches one of the key entries of the database.
20. The system of claim 18 , wherein the device authenticator is to:
hash the key received from the mobile device to produce a hashed key;
compare the hashed key to key entries of a database; and
authenticate the mobile device when the hashed key matches one of the key entries of the database.
21. The mobile device of claim 1 , further including the database, the database including key entries.
22. The system of claim 13 , wherein the mobile device is to access the key and send the key to the vehicle without user interaction when in the locked mode.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/372,369 US9988016B1 (en) | 2016-12-07 | 2016-12-07 | Authentication of mobile devices for vehicle communication |
RU2017135020A RU2684974C2 (en) | 2016-12-07 | 2017-10-05 | Mobile device for vehicle communication authentication, method and system for authentication of mobile device for communication with a vehicle |
GB1719926.6A GB2559248A (en) | 2016-12-07 | 2017-11-30 | Authentication of mobile devices for vehicle communication |
CN201711261666.2A CN108173809B (en) | 2016-12-07 | 2017-12-04 | Authentication of mobile devices for vehicular communication |
DE102017128922.4A DE102017128922A1 (en) | 2016-12-07 | 2017-12-05 | Authentication of mobile devices for vehicle communication |
MX2017015815A MX2017015815A (en) | 2016-12-07 | 2017-12-06 | Authentication of mobile devices for vehicle communication. |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/372,369 US9988016B1 (en) | 2016-12-07 | 2016-12-07 | Authentication of mobile devices for vehicle communication |
Publications (2)
Publication Number | Publication Date |
---|---|
US9988016B1 US9988016B1 (en) | 2018-06-05 |
US20180154865A1 true US20180154865A1 (en) | 2018-06-07 |
Family
ID=60950398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/372,369 Active US9988016B1 (en) | 2016-12-07 | 2016-12-07 | Authentication of mobile devices for vehicle communication |
Country Status (6)
Country | Link |
---|---|
US (1) | US9988016B1 (en) |
CN (1) | CN108173809B (en) |
DE (1) | DE102017128922A1 (en) |
GB (1) | GB2559248A (en) |
MX (1) | MX2017015815A (en) |
RU (1) | RU2684974C2 (en) |
Cited By (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10437745B2 (en) | 2018-01-05 | 2019-10-08 | Denso International America, Inc. | Mobile de-whitening |
US10647296B2 (en) | 2016-10-12 | 2020-05-12 | Denso International America, Inc. | Passive entry/passive start systems and methods for vehicles |
US10654446B2 (en) | 2016-10-12 | 2020-05-19 | Denso International America, Inc. | Localization and passive entry/passive start systems and methods for vehicles |
US10663569B2 (en) | 2017-09-19 | 2020-05-26 | Denso International America, Inc. | Localization systems and methods using communication protocols with open channels and secure communication connections |
US10674314B2 (en) | 2017-04-13 | 2020-06-02 | Denso Corporation | Mobile terminal position detection device and mobile terminal position detection method |
CN111262902A (en) * | 2018-11-14 | 2020-06-09 | 现代自动车株式会社 | Gateway device, vehicle including gateway device, and remote control system |
US10706651B2 (en) | 2018-03-28 | 2020-07-07 | Denso International America, Inc. | Systems and methods for communication bus security in a vehicle |
US10716068B2 (en) | 2017-10-13 | 2020-07-14 | Denso International America, Inc. | Power saving methods for communication in localization systems |
US10730479B2 (en) | 2018-03-28 | 2020-08-04 | Denso International America, Inc. | Tamper security systems and methods for vehicles |
US10839627B2 (en) | 2018-03-28 | 2020-11-17 | Denso International America, Inc. | Reflective environment detection systems and methods |
US10864888B2 (en) | 2019-03-21 | 2020-12-15 | Denso International America, Inc. | Systems and methods for activating vehicle functions |
US10885729B2 (en) | 2018-10-12 | 2021-01-05 | Denso International America, Inc. | Passive entry/passive start systems using continuous wave tones and synchronization words for detecting range extender type relay station attacks |
EP3736181A3 (en) * | 2019-05-07 | 2021-01-06 | T-Mobile USA, Inc. | Automobile driver biometric authentication and gps services |
US10917784B2 (en) | 2018-03-27 | 2021-02-09 | Denso International America, Inc. | Systems and methods of cloud bonding for vehicles |
US10967836B2 (en) | 2019-03-21 | 2021-04-06 | Denso International America, Inc. | Phone as a key vehicle access based on time policies, license information and validation and accuracy of a vehicle real time clock |
US10977884B2 (en) | 2018-07-09 | 2021-04-13 | Denso International America, Inc. | Half-hemisphere antennas for locating remote devices |
US11094150B2 (en) | 2020-01-06 | 2021-08-17 | Denso International America, Inc. | Vehicle controlled polling reduction at mobile device based on motion status reported by mobile device |
US11097689B2 (en) | 2018-03-27 | 2021-08-24 | Denso International America, Inc. | Passive entry and passive start system and method using temporary keys |
US11105883B2 (en) | 2018-07-25 | 2021-08-31 | Denso International America, Inc. | Circular polarized angle of arrival measurement system |
US11150317B2 (en) | 2018-06-20 | 2021-10-19 | Denso International America, Inc. | Circular polarized angle of arrival measuring system |
US11217048B2 (en) | 2018-10-12 | 2022-01-04 | Denso International America, Inc. | Passive entry/passive start systems implementing music algorithm based angle of arrival determinations for signals received via circular polarized antennas |
US11223136B2 (en) | 2019-05-24 | 2022-01-11 | Denso International America, Inc. | Feed circuit for antenna of angle of arrival measurement system |
US11227453B2 (en) | 2018-10-12 | 2022-01-18 | Denso International America, Inc. | Passive entry/passive start systems implementing carrier phase based ranging with music style eigenvalue decomposition for distance determinations |
US11230260B2 (en) | 2020-06-26 | 2022-01-25 | Denso International America, Inc. | Adaptive BLE and UWB based connection rate control for mobile access devices of vehicular passive access systems |
US11237244B2 (en) | 2018-07-13 | 2022-02-01 | Denso International America, Inc. | Measuring angle of arrival on a constant and/or pre-known part of a BLE packet |
US11265674B2 (en) * | 2016-12-14 | 2022-03-01 | Denso Corporation | Method and system for establishing microlocation zones |
US11269323B2 (en) | 2018-03-27 | 2022-03-08 | Denso International America, Inc. | Remote park assist message flow systems and methods |
US11270533B2 (en) | 2020-02-26 | 2022-03-08 | Denso International America, Inc. | Ultra-high frequency low energy based phone as a key access to a vehicle using two-way communication for multipath mitigation |
US11330431B2 (en) | 2018-03-28 | 2022-05-10 | Denso International America, Inc. | Targeted advertising with privacy and anti-replay protection |
US11428799B2 (en) | 2018-10-12 | 2022-08-30 | Denso International America, Inc. | Up-sampling and cross-correlation for time of arrival determinations in passive entry/passive start systems |
US11447099B2 (en) | 2019-08-30 | 2022-09-20 | Denso International America, Inc. | Multiplexed antenna circuit network for ultra-high frequency low energy based phone as a key access to a vehicle |
US11485318B2 (en) | 2019-09-13 | 2022-11-01 | Denso International America, Inc. | Queuing control for messages with de-whitened tones transmitted in phone-as-a-key systems |
US11498520B2 (en) | 2019-09-13 | 2022-11-15 | Denso International America, Inc. | Antenna switching control for AOA capturing in phone-as-a-key systems with de-whitened tone transmission, CRC based validation and event timing |
US11501228B2 (en) | 2020-07-30 | 2022-11-15 | Denso International America, Inc. | System and method for crowdsourced in-seat delivery of stadium concessions |
US11538331B2 (en) | 2020-07-30 | 2022-12-27 | Denso International America, Inc. | UWB and BLE based incident reporting and preventing system implemented using mobile access devices |
US11536581B2 (en) | 2019-10-11 | 2022-12-27 | Toyota Motor Engineering & Manufacturing North America, Inc. | Methods and systems for determining a usage preference of a vehicle operator |
US11548517B2 (en) | 2018-03-28 | 2023-01-10 | Denso International America, Inc. | Activating vehicle functions based on vehicle occupant location |
US11627656B2 (en) | 2020-12-10 | 2023-04-11 | Denso International America, Inc. | Slitted PCB for omni-directional like performance of off-center mounted antennas of passive access systems |
US11628846B2 (en) | 2020-07-30 | 2023-04-18 | Denso International America, Inc. | UWB based in-vehicle location and identity verification and behavior scoring via mobile access devices of vehicular passive access systems |
US11654863B2 (en) | 2020-07-30 | 2023-05-23 | Denso International America, Inc. | Vehicle control and identification systems and methods |
US11710975B2 (en) | 2020-07-30 | 2023-07-25 | Denso International America, Inc. | Battery charging systems and methods |
US11823096B2 (en) | 2020-07-30 | 2023-11-21 | Denso International America, Inc. | Rolling code based point of access system for event tickets stored in mobile access devices |
US11987208B2 (en) | 2021-03-15 | 2024-05-21 | Denso International America, Inc. | UWB module auto location in vehicle |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9988016B1 (en) * | 2016-12-07 | 2018-06-05 | Ford Global Technologies, Llc | Authentication of mobile devices for vehicle communication |
JP6685963B2 (en) * | 2017-03-27 | 2020-04-22 | 京セラ株式会社 | Electronic device, electronic device control method, and control program |
CA3054934A1 (en) * | 2018-09-20 | 2020-03-20 | Legic Identsystems Ag | Key fob |
DE102018217561B3 (en) * | 2018-10-13 | 2019-12-24 | Volkswagen Aktiengesellschaft | Method for operating a vehicle column and selection device for a user of a leading vehicle in a vehicle column |
US11084461B2 (en) * | 2019-02-15 | 2021-08-10 | Ford Global Technologies, Llc | Vehicle data protection |
US11062540B2 (en) | 2019-11-25 | 2021-07-13 | Ford Global Technologies, Llc | Phone as a key low latency vehicle access |
US11713022B1 (en) | 2020-11-20 | 2023-08-01 | Enterprise Electronics Llc | NFC-based enclosure access using passive energy harvesting |
CN114446069B (en) * | 2021-12-31 | 2022-12-20 | 陕西科技大学 | Vehicle restriction management system and control method |
Family Cites Families (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10064546C1 (en) | 2000-12-22 | 2002-07-04 | Huf Huelsbeck & Fuerst Gmbh | Locking system for motor vehicles |
US6658328B1 (en) * | 2002-01-17 | 2003-12-02 | Trw Inc. | Passive function control system for a motor vehicle |
WO2005018139A1 (en) | 2003-08-07 | 2005-02-24 | Georgia Tech Research Corporation | Secure authentication of a user to a system and secure operation thereafter |
JP4086018B2 (en) * | 2004-07-15 | 2008-05-14 | トヨタ自動車株式会社 | HYBRID VEHICLE, ITS CONTROL METHOD, AND POWER OUTPUT DEVICE |
US7446644B2 (en) | 2005-01-14 | 2008-11-04 | Secureall Corporation | Universal hands free key and lock system |
JP5476663B2 (en) | 2007-12-17 | 2014-04-23 | トヨタ自動車株式会社 | Code uneven key system |
US20100052931A1 (en) | 2008-08-26 | 2010-03-04 | Gm Global Technology Operations, Inc. | Gesture control key fob |
US20100304690A1 (en) | 2009-05-29 | 2010-12-02 | Gm Global Technology Operations, Inc. | Method of passively detecting an approach to a vehicle |
US8045961B2 (en) | 2009-06-22 | 2011-10-25 | Mourad Ben Ayed | Systems for wireless authentication based on bluetooth proximity |
US8811900B2 (en) | 2009-11-13 | 2014-08-19 | Honda Motor Co., Ltd. | System and method for hands free connect application for the automobile environment |
US8284020B2 (en) * | 2009-12-22 | 2012-10-09 | Lear Corporation | Passive entry system and method for a vehicle |
US9464905B2 (en) * | 2010-06-25 | 2016-10-11 | Toyota Motor Engineering & Manufacturing North America, Inc. | Over-the-air vehicle systems updating and associate security protocols |
TWI427882B (en) | 2010-11-30 | 2014-02-21 | Inventec Corp | Computer device |
CA2780393C (en) * | 2011-06-21 | 2016-06-07 | Dls Technology Corporation | Key based secure operating system with secure dongle and method, and cryptographic method |
US20130099940A1 (en) * | 2011-10-21 | 2013-04-25 | Ford Global Technologies, Llc | Method and Apparatus for User Authentication and Security |
US8868254B2 (en) | 2012-06-08 | 2014-10-21 | Apple Inc. | Accessory control with geo-fencing |
NZ706030A (en) | 2012-08-16 | 2016-01-29 | Schlage Lock Co Llc | Wireless reader system |
GB201219261D0 (en) | 2012-10-26 | 2012-12-12 | Jaguar Cars | Vehicle access system and method |
GB201219262D0 (en) | 2012-10-26 | 2012-12-12 | Jaguar Cars | Vehicle access system and method |
US9008917B2 (en) | 2012-12-27 | 2015-04-14 | GM Global Technology Operations LLC | Method and system for detecting proximity of an end device to a vehicle based on signal strength information received over a bluetooth low energy (BLE) advertising channel |
US9520939B2 (en) * | 2013-03-06 | 2016-12-13 | Qualcomm Incorporated | Methods and apparatus for using visible light communications for controlling access to an area |
US9679430B2 (en) | 2013-03-08 | 2017-06-13 | Lear Corporation | Vehicle remote function system and method for determining vehicle FOB locations using adaptive filtering |
US9241235B2 (en) * | 2013-03-14 | 2016-01-19 | Voxx International Corporation | Passive entry cell phone and method and system therefor |
US9002536B2 (en) * | 2013-03-14 | 2015-04-07 | Ford Global Technologies, Llc | Key fob security copy to a mobile phone |
US9462545B2 (en) | 2013-03-14 | 2016-10-04 | Ford Global Technologies, Llc | Method and apparatus for a battery saver utilizing a sleep and vacation strategy |
US20160004502A1 (en) * | 2013-07-16 | 2016-01-07 | Cloudcar, Inc. | System and method for correcting speech input |
TW201504927A (en) * | 2013-07-22 | 2015-02-01 | Byappy Digital Media Group Ltd | Method for triggering applications with a smart device |
US9086879B2 (en) | 2013-07-26 | 2015-07-21 | GM Global Technology Operations LLC | Methods and apparatus for optimizing battery life in a remote device |
US9858735B2 (en) | 2013-12-10 | 2018-01-02 | Ford Global Technologies, Llc | User proximity detection for activating vehicle convenience functions |
US9666005B2 (en) * | 2014-02-14 | 2017-05-30 | Infinitekey, Inc. | System and method for communicating with a vehicle |
EP3108460A1 (en) | 2014-02-18 | 2016-12-28 | Bekey A/S | Controlling access to a location |
WO2015155875A1 (en) * | 2014-04-10 | 2015-10-15 | 三菱電機株式会社 | Mobile device, vehicle remote control system, vehicle remote control method, and program |
US9357368B2 (en) * | 2014-05-23 | 2016-05-31 | Ford Global Technologies, Llc | Method and system for launching an application |
US20160063786A1 (en) | 2014-08-26 | 2016-03-03 | Hyundai America Technical Center, Inc. | Smartphone enabled passive entry go system |
CN105898706A (en) * | 2014-09-28 | 2016-08-24 | 上海快逸行信息科技有限公司 | Method for sensing vehicle owner and providing real-time information via Bluetooth communication technology |
US9656633B2 (en) * | 2014-11-24 | 2017-05-23 | Ford Global Technologies, Llc | Methods and systems for a vehicle computing system to communicate with a device |
US9495858B2 (en) | 2015-01-25 | 2016-11-15 | Toyota Motor Engineering & Manufacturing North America, Inc. | Smart key reminder system for a vehicle |
US9786108B2 (en) * | 2015-06-03 | 2017-10-10 | Nxp B.V. | NFC based secure car key |
CN105978923A (en) * | 2015-10-21 | 2016-09-28 | 乐卡汽车智能科技(北京)有限公司 | Remote wakeup method and system |
CN105398420B (en) * | 2015-11-09 | 2016-11-23 | 福建省汽车工业集团云度新能源汽车股份有限公司 | A kind of automotive keyless entering system detection method |
CN105979086A (en) * | 2016-05-04 | 2016-09-28 | 广西咪付网络技术有限公司 | Magnetic induction starting communication system based on mobile phone screen locking state |
CN106169236B (en) * | 2016-08-30 | 2022-10-21 | 上海酷一信息科技有限公司 | Electric vehicle wireless central control system based on low-power-consumption Bluetooth center network topology |
US9988016B1 (en) * | 2016-12-07 | 2018-06-05 | Ford Global Technologies, Llc | Authentication of mobile devices for vehicle communication |
-
2016
- 2016-12-07 US US15/372,369 patent/US9988016B1/en active Active
-
2017
- 2017-10-05 RU RU2017135020A patent/RU2684974C2/en not_active IP Right Cessation
- 2017-11-30 GB GB1719926.6A patent/GB2559248A/en not_active Withdrawn
- 2017-12-04 CN CN201711261666.2A patent/CN108173809B/en active Active
- 2017-12-05 DE DE102017128922.4A patent/DE102017128922A1/en active Pending
- 2017-12-06 MX MX2017015815A patent/MX2017015815A/en unknown
Cited By (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11597350B2 (en) | 2016-10-12 | 2023-03-07 | Denso International America, Inc. | Passive entry/passive start systems and methods for vehicles |
US10647296B2 (en) | 2016-10-12 | 2020-05-12 | Denso International America, Inc. | Passive entry/passive start systems and methods for vehicles |
US10654446B2 (en) | 2016-10-12 | 2020-05-19 | Denso International America, Inc. | Localization and passive entry/passive start systems and methods for vehicles |
US11001229B2 (en) | 2016-10-12 | 2021-05-11 | Denso International America, Inc. | Localization and passive entry/passive start systems and methods for vehicles |
US11007977B2 (en) | 2016-10-12 | 2021-05-18 | Denso International America, Inc. | Passive entry/passive start systems and methods for vehicles |
US11572038B2 (en) | 2016-10-12 | 2023-02-07 | Denso International America, Inc. | Localization and passive entry/passive start systems and methods for vehicles |
US11993228B2 (en) | 2016-10-12 | 2024-05-28 | Denso International America, Inc. | Passive entry/passive start systems and methods for vehicles |
US11951944B2 (en) | 2016-10-12 | 2024-04-09 | Denso International America, Inc. | Localization and passive entry/passive start systems and methods for vehicles |
US11889380B2 (en) * | 2016-12-14 | 2024-01-30 | Denso Corporation | Method and system for establishing microlocation zones |
US11265674B2 (en) * | 2016-12-14 | 2022-03-01 | Denso Corporation | Method and system for establishing microlocation zones |
US20220182781A1 (en) * | 2016-12-14 | 2022-06-09 | Denso Corporation | Method and system for establishing microlocation zones |
US10674314B2 (en) | 2017-04-13 | 2020-06-02 | Denso Corporation | Mobile terminal position detection device and mobile terminal position detection method |
US10838052B2 (en) | 2017-09-19 | 2020-11-17 | Denso International America, Inc. | Localization systems and methods using communication protocols with open channels and secure communication connections |
US10663569B2 (en) | 2017-09-19 | 2020-05-26 | Denso International America, Inc. | Localization systems and methods using communication protocols with open channels and secure communication connections |
US10716068B2 (en) | 2017-10-13 | 2020-07-14 | Denso International America, Inc. | Power saving methods for communication in localization systems |
US10437745B2 (en) | 2018-01-05 | 2019-10-08 | Denso International America, Inc. | Mobile de-whitening |
US11379386B2 (en) | 2018-01-05 | 2022-07-05 | Denso International America, Inc. | Mobile de-whitening |
US10956343B2 (en) | 2018-01-05 | 2021-03-23 | Denso International America, Inc. | Mobile de-whitening |
US11269323B2 (en) | 2018-03-27 | 2022-03-08 | Denso International America, Inc. | Remote park assist message flow systems and methods |
US10917784B2 (en) | 2018-03-27 | 2021-02-09 | Denso International America, Inc. | Systems and methods of cloud bonding for vehicles |
US11097689B2 (en) | 2018-03-27 | 2021-08-24 | Denso International America, Inc. | Passive entry and passive start system and method using temporary keys |
US10730479B2 (en) | 2018-03-28 | 2020-08-04 | Denso International America, Inc. | Tamper security systems and methods for vehicles |
US11330431B2 (en) | 2018-03-28 | 2022-05-10 | Denso International America, Inc. | Targeted advertising with privacy and anti-replay protection |
US10706651B2 (en) | 2018-03-28 | 2020-07-07 | Denso International America, Inc. | Systems and methods for communication bus security in a vehicle |
US11548517B2 (en) | 2018-03-28 | 2023-01-10 | Denso International America, Inc. | Activating vehicle functions based on vehicle occupant location |
US10839627B2 (en) | 2018-03-28 | 2020-11-17 | Denso International America, Inc. | Reflective environment detection systems and methods |
US11269043B2 (en) | 2018-06-20 | 2022-03-08 | Denso International America, Inc. | Circular polarized quadrifilar helix antennas |
US11150317B2 (en) | 2018-06-20 | 2021-10-19 | Denso International America, Inc. | Circular polarized angle of arrival measuring system |
US11353538B2 (en) | 2018-06-20 | 2022-06-07 | Denso International America, Inc. | Circular polarized quadrifilar helix antennas electronics |
US10977884B2 (en) | 2018-07-09 | 2021-04-13 | Denso International America, Inc. | Half-hemisphere antennas for locating remote devices |
US11237244B2 (en) | 2018-07-13 | 2022-02-01 | Denso International America, Inc. | Measuring angle of arrival on a constant and/or pre-known part of a BLE packet |
US11105883B2 (en) | 2018-07-25 | 2021-08-31 | Denso International America, Inc. | Circular polarized angle of arrival measurement system |
US10902691B2 (en) | 2018-10-12 | 2021-01-26 | Denso International America, Inc. | Passive entry/passive start access systems with bidirectional tone exchange |
US10984615B2 (en) | 2018-10-12 | 2021-04-20 | Denso International America, Inc. | Passive entry/passive start access systems with tone exchange sniffing |
US11227453B2 (en) | 2018-10-12 | 2022-01-18 | Denso International America, Inc. | Passive entry/passive start systems implementing carrier phase based ranging with music style eigenvalue decomposition for distance determinations |
US11714184B2 (en) | 2018-10-12 | 2023-08-01 | Denso International America, Inc. | Up-sampling and cross-correlation for time of arrival determinations in passive entry/passive start systems |
US11127234B2 (en) | 2018-10-12 | 2021-09-21 | Denso International America, Inc. | Passive entry/passive start communication systems with selected antennas having multiple polarized axes |
US12100251B2 (en) | 2018-10-12 | 2024-09-24 | Denso International America, Inc. | Passive entry/passive start access systems including round trip time sniffing |
US11037386B2 (en) | 2018-10-12 | 2021-06-15 | Denso International America, Inc. | Passive entry/passive start systems detecting range extender type relay station attacks |
US11010996B2 (en) | 2018-10-12 | 2021-05-18 | Denso International America, Inc. | Passive entry/passive start systems using I and Q data for detecting range extender type relay station attacks |
US10991182B2 (en) | 2018-10-12 | 2021-04-27 | Denso International America, Inc. | Multi-axis polarized RF antenna assemblies for passive entry/passive start systems |
US11217048B2 (en) | 2018-10-12 | 2022-01-04 | Denso International America, Inc. | Passive entry/passive start systems implementing music algorithm based angle of arrival determinations for signals received via circular polarized antennas |
US11776334B2 (en) | 2018-10-12 | 2023-10-03 | Denso International America, Inc. | Passive entry/passive start access systems including round trip time sniffing |
US10943417B2 (en) | 2018-10-12 | 2021-03-09 | Denso International America, Inc. | Passive entry/passive start access systems including round trip time sniffing |
US10885729B2 (en) | 2018-10-12 | 2021-01-05 | Denso International America, Inc. | Passive entry/passive start systems using continuous wave tones and synchronization words for detecting range extender type relay station attacks |
US11428799B2 (en) | 2018-10-12 | 2022-08-30 | Denso International America, Inc. | Up-sampling and cross-correlation for time of arrival determinations in passive entry/passive start systems |
US11390248B2 (en) * | 2018-11-14 | 2022-07-19 | Hyundai Motor Company | Gateway device, vehicle and remote control system including the same |
CN111262902A (en) * | 2018-11-14 | 2020-06-09 | 现代自动车株式会社 | Gateway device, vehicle including gateway device, and remote control system |
US10967836B2 (en) | 2019-03-21 | 2021-04-06 | Denso International America, Inc. | Phone as a key vehicle access based on time policies, license information and validation and accuracy of a vehicle real time clock |
US10864888B2 (en) | 2019-03-21 | 2020-12-15 | Denso International America, Inc. | Systems and methods for activating vehicle functions |
EP3736181A3 (en) * | 2019-05-07 | 2021-01-06 | T-Mobile USA, Inc. | Automobile driver biometric authentication and gps services |
US11186257B2 (en) | 2019-05-07 | 2021-11-30 | T-Mobile Usa, Inc. | Automobile driver biometric authentication and GPS services |
US11223136B2 (en) | 2019-05-24 | 2022-01-11 | Denso International America, Inc. | Feed circuit for antenna of angle of arrival measurement system |
US11447099B2 (en) | 2019-08-30 | 2022-09-20 | Denso International America, Inc. | Multiplexed antenna circuit network for ultra-high frequency low energy based phone as a key access to a vehicle |
US11498520B2 (en) | 2019-09-13 | 2022-11-15 | Denso International America, Inc. | Antenna switching control for AOA capturing in phone-as-a-key systems with de-whitened tone transmission, CRC based validation and event timing |
US11938899B2 (en) | 2019-09-13 | 2024-03-26 | Denso International America, Inc. | Antenna switching control for AOA capturing in phone-as-a-key systems with de-whitened tone transmission, CRC based validation and event timing |
US11485318B2 (en) | 2019-09-13 | 2022-11-01 | Denso International America, Inc. | Queuing control for messages with de-whitened tones transmitted in phone-as-a-key systems |
US11536581B2 (en) | 2019-10-11 | 2022-12-27 | Toyota Motor Engineering & Manufacturing North America, Inc. | Methods and systems for determining a usage preference of a vehicle operator |
US11094150B2 (en) | 2020-01-06 | 2021-08-17 | Denso International America, Inc. | Vehicle controlled polling reduction at mobile device based on motion status reported by mobile device |
US11270533B2 (en) | 2020-02-26 | 2022-03-08 | Denso International America, Inc. | Ultra-high frequency low energy based phone as a key access to a vehicle using two-way communication for multipath mitigation |
US11230260B2 (en) | 2020-06-26 | 2022-01-25 | Denso International America, Inc. | Adaptive BLE and UWB based connection rate control for mobile access devices of vehicular passive access systems |
US11710975B2 (en) | 2020-07-30 | 2023-07-25 | Denso International America, Inc. | Battery charging systems and methods |
US11654863B2 (en) | 2020-07-30 | 2023-05-23 | Denso International America, Inc. | Vehicle control and identification systems and methods |
US11823096B2 (en) | 2020-07-30 | 2023-11-21 | Denso International America, Inc. | Rolling code based point of access system for event tickets stored in mobile access devices |
US11628846B2 (en) | 2020-07-30 | 2023-04-18 | Denso International America, Inc. | UWB based in-vehicle location and identity verification and behavior scoring via mobile access devices of vehicular passive access systems |
US11501228B2 (en) | 2020-07-30 | 2022-11-15 | Denso International America, Inc. | System and method for crowdsourced in-seat delivery of stadium concessions |
US11538331B2 (en) | 2020-07-30 | 2022-12-27 | Denso International America, Inc. | UWB and BLE based incident reporting and preventing system implemented using mobile access devices |
US11627656B2 (en) | 2020-12-10 | 2023-04-11 | Denso International America, Inc. | Slitted PCB for omni-directional like performance of off-center mounted antennas of passive access systems |
US11987208B2 (en) | 2021-03-15 | 2024-05-21 | Denso International America, Inc. | UWB module auto location in vehicle |
Also Published As
Publication number | Publication date |
---|---|
CN108173809A (en) | 2018-06-15 |
RU2017135020A (en) | 2019-04-05 |
GB201719926D0 (en) | 2018-01-17 |
MX2017015815A (en) | 2018-11-09 |
RU2684974C2 (en) | 2019-04-16 |
RU2017135020A3 (en) | 2019-04-05 |
GB2559248A (en) | 2018-08-01 |
DE102017128922A1 (en) | 2018-06-07 |
US9988016B1 (en) | 2018-06-05 |
CN108173809B (en) | 2021-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9988016B1 (en) | Authentication of mobile devices for vehicle communication | |
US11180098B2 (en) | Monitoring of vehicle window vibrations for voice-command recognition | |
CN107454551B (en) | System and method for telephone key range expansion | |
US10377234B2 (en) | Vehicle ignition systems and methods | |
US9886805B1 (en) | Priming vehicle access based on wireless key velocity | |
US10919493B2 (en) | Mobile device relay attack detection and power management for vehicles | |
CN107042811B (en) | Vehicle security and authentication system | |
CN109302695B (en) | NFC-enabled systems, methods, and devices for wireless vehicle communication | |
US20220172530A1 (en) | Passive Entry Passive Start Verification With Two-Factor Authentication | |
CN108372841B (en) | Remote starting of an engine via a vehicle keypad | |
US10131321B1 (en) | System for keyless valet parking | |
GB2565219B (en) | Remote park-assist authentication for vehicles | |
US20160244022A1 (en) | Vehicle control action sequence for operator authentication | |
US11267439B2 (en) | Activation of valet mode for vehicles | |
US10155499B1 (en) | Methods and apparatus to facilitate vehicle locking | |
US11321576B2 (en) | Biometric wireless vehicle entry system | |
CN112644423A (en) | System and method for starting a vehicle using a secure password entry system | |
US11037388B2 (en) | Systems and methods for creating a password and/or a keypad code for executing keyless operations upon a vehicle | |
US10726649B1 (en) | System and method for pre-authenticating mobile device prior to performing vehicle function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FORD GLOBAL TECHNOLOGIES, LLC, MICHIGAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BIANCHI III, ARTHUR THOMAS;MILITELLO, KEVIN F.;VAN WIEMEERSCH, JOHN ROBERT;SIGNING DATES FROM 20161202 TO 20161206;REEL/FRAME:041459/0558 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |