WO2015033527A1 - Dispositif de commande et système de clé électronique - Google Patents

Dispositif de commande et système de clé électronique Download PDF

Info

Publication number
WO2015033527A1
WO2015033527A1 PCT/JP2014/004292 JP2014004292W WO2015033527A1 WO 2015033527 A1 WO2015033527 A1 WO 2015033527A1 JP 2014004292 W JP2014004292 W JP 2014004292W WO 2015033527 A1 WO2015033527 A1 WO 2015033527A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
electronic key
unit
authentication
invalidation
Prior art date
Application number
PCT/JP2014/004292
Other languages
English (en)
Japanese (ja)
Inventor
宜隆 平尾
加藤 達矢
健一郎 三治
傑 松下
亘司 仲尾
Original Assignee
株式会社デンソー
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社デンソー filed Critical 株式会社デンソー
Publication of WO2015033527A1 publication Critical patent/WO2015033527A1/fr

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Definitions

  • the present disclosure relates to a control device that performs wireless communication with an electronic key including a mobile communication device, authenticates the electronic key by collating key information, and permits operation of the device, and the control device and the electronic key It is related with the electronic key system comprised by these.
  • Patent Documents 1 and 2 disclose using a mobile communication terminal possessed by a user, such as a mobile phone, as an electronic key.
  • Patent Document 3 by sending an invalidation command from the center device, the key information (ID code) of the electronic key stored on the control device side and the key information (ID code) on the electronic key side are invalidated. It is disclosed that the electronic key cannot be used.
  • Patent Document 4 discloses that an electronic key that can be operated by a vehicle can be added by storing key information (ID code) of an electronic key in a control device on the vehicle side.
  • ID code key information
  • Patent Document 4 can be used for additional registration of key information to the control device on the vehicle side.
  • the control device needs to perform wireless communication with a large number of electronic keys corresponding to each key information. It becomes complicated. For this reason, the communication time between the control device and the electronic key (mobile communication terminal) is prolonged, and in some cases, connection failure due to the limited number of connections may occur.
  • the present disclosure relates to key information of an electronic key that is temporarily enabled in a control device that authenticates the electronic key and permits operation of the device by performing wireless communication with the electronic key including the mobile communication device. It is an object of the present invention to be able to invalidate a user without bothering the user.
  • the control device includes a communication unit, an authentication unit, a storage unit, and an invalidation unit.
  • the communication unit performs wireless communication with a mobile communication terminal having a function as an electronic key.
  • the authentication unit collates key information of the electronic key by performing wireless communication with the mobile communication terminal via the communication unit, and when the key information collation is established, the communication unit
  • the communication terminal that has performed wireless communication is determined to be an electronic key that can be operated by the device, and operation of the device is permitted.
  • the storage unit stores key information of the main electronic key for operating the device as the key information used by the authenticating unit for authentication of the electronic key, and the sub-electronic device that is temporarily permitted to operate the device. Key information of keys can be stored.
  • the invalidation unit authenticates the sub electronic key based on the key information stored in the storage unit, and permits the operation of the device by the sub electronic key. Thereafter, the invalidation unit invalidates the sub electronic key.
  • the authentication unit invalidates the key information necessary for authenticating the sub electronic key, and prohibits the operation of the device by the sub electronic key after waiting for the activation condition to be established.
  • the invalidation unit invalidates the key information of the sub electronic key. Can be automatically prohibited.
  • the key information of the secondary electronic key can be invalidated without bothering the user, preventing unauthorized use of the device by the secondary electronic key, Security can be improved.
  • the control device does not need to continue communication with the invalidated electronic key, so that the control device can perform wireless communication for device operation.
  • the number can be minimized and communication management for the wireless communication can be simplified.
  • the drawing It is a schematic structure figure showing the composition of the whole electronic key system of a 1st embodiment of this indication. It is a block diagram showing the structure of the vehicle and portable terminal which are shown in FIG. It is a flowchart showing the authentication determination process of 1st Embodiment. 14 is a flowchart illustrating an authentication determination process according to the second embodiment of the present disclosure. It is a flowchart showing the separate key authentication cancellation
  • the electronic key system of the present embodiment includes an authentication ECU 20 mounted on a vehicle 2 and a portable communication terminal having key information (ID code) necessary for allowing the authentication ECU 20 to permit vehicle operation. 4 and 6.
  • ID code key information
  • the mobile communication terminals 4 and 6 are electronic devices having a function as an electronic key for unlocking / locking the door of the vehicle 2 and starting an engine.
  • the mobile communication terminals 4 and 6 are high-function mobile phones called mobile phones or so-called smartphones. Etc.
  • the mobile communication terminal 4 is a main electronic key (hereinafter referred to as a master key) that is owned by the owner of the vehicle 2 and pre-registered with key information for vehicle operation, and the mobile communication terminal 6 is a lender.
  • This is a secondary electronic key (hereinafter referred to as another key) possessed by a borrower who borrows a vehicle from the owner of a certain vehicle 2.
  • the mobile communication terminal 6 that is a separate key is operated by a vehicle operation by wireless communication with the mobile communication terminal 4 that is a master key, or communication with a center device that is a server for electronic key system management. Key information is provided.
  • the authentication ECU 20 also registers key information for collating key information with another key.
  • the authentication ECU 20 performs an authentication process using wireless communication with the mobile communication terminals 4 and 6 to determine whether the mobile communication terminals 4 and 6 are master keys or other keys that are permitted to operate the vehicle 2. And an electronic control unit (ECU) for electronic key authentication that permits the operation of the vehicle 2.
  • ECU electronice control unit
  • the authentication ECU 20 determines (authenticates) the mobile communication terminals 4 and 6 as regular electronic keys (master keys or other keys) in the authentication process, the authentication ECU 20 communicates with the vehicle 2 by wireless communication with the electronic keys. The distance is detected, and the lighting of the welcome light, the unlocking / locking of the door, the starting of the engine, etc. are permitted or executed according to the distance.
  • the authentication ECU 20 includes a control unit 22 composed of a microcomputer centered on a CPU, ROM, RAM, and the like, and a wireless communication unit 24.
  • the wireless communication unit 24 is for performing short-distance wireless communication with the mobile communication terminals 4 and 6 via the antenna 23 by a communication method compliant with, for example, the Bluetooth® (registered trademark) communication standard. is there.
  • the control unit 22 includes communication information (Bluetooth address) necessary for wireless communication with the mobile communication terminal 4 serving as a master key, and key information required for authenticating the mobile communication terminal 4 as a master key, Is stored in advance.
  • communication information Bluetooth address
  • key information required for authenticating the mobile communication terminal 4 as a master key Is stored in advance.
  • the memory 22a is composed of a nonvolatile memory capable of registering and deleting these various types of information, and communication information (Bluetooth address) necessary for wireless communication with the mobile communication terminal 6 as another key.
  • the key information for different key authentication is additionally registered as appropriate.
  • control unit 22 establishes a Bluetooth® wireless connection with the mobile communication terminals 4 and 6 that have entered the communication area, and thereafter communicates with the mobile communication terminals 4 and 6 at predetermined communication time intervals.
  • the distance between the vehicle 2 and the mobile communication terminals 4 and 6 is detected, and the operation of the vehicle 2 is permitted.
  • control unit 22 is connected to various sensors 26 such as touch sensors and button switches provided on the handle on the outside of the door of the vehicle 2. And the control part 22 is collated with key information by radio
  • an engine switch 28 provided in the vehicle 2 is also connected to the control unit 22.
  • the control part 22 is collated with key information by radio
  • a start command is transmitted to the engine ECU 34 to give permission to start the engine.
  • the body ECU 32 is an electronic control device that controls interior parts such as an electric door lock, lighting, and a power supply system
  • the engine ECU 34 is an electronic control device that controls an engine mounted on the vehicle.
  • the authentication ECU 20 is connected to the body ECU 32 and the engine ECU 34 via a communication bus 30 that is a communication path of the in-vehicle communication network.
  • the mobile communication terminals 4 and 6 are mainly composed of an operation unit 16 including a touch panel and operation switches, a display unit 18 including a liquid crystal display, and a control unit 12 including a microcomputer to which these units are connected. Has been.
  • the mobile communication terminals 4 and 6 comply with the Bluetooth® communication standard separately from a communication device (not shown) for connecting to other mobile communication terminals and servers via a mobile phone wireless communication network.
  • An antenna 13 and a wireless communication unit 14 for performing short-range wireless communication using the communication method described above are provided.
  • control unit 12 includes a memory 12a in which key information (ID code) for authentication is stored as information for causing the mobile communication terminals 4 and 6 to function as electronic keys.
  • ID code key information
  • the wireless communication unit 14 has transmission power set so as to be able to wirelessly communicate with the wireless communication unit 24 of the vehicle 2 within a radius range of several m to 100 m, and in accordance with the transmission command from the control unit 12, the transmission power Then, a signal including its own communication information (Bluetooth address) is transmitted at a predetermined cycle.
  • Bluetooth address its own communication information
  • the control unit 22 detects the mobile communication terminals 4 and 6 from the communication information (Bluetooth address) included in the reception signal received by the wireless communication unit 24. Further, the control unit 22 detects the distance from the mobile communication terminals 4 and 6 based on the power of the received signal received by the wireless communication unit 24.
  • the communication information Bluetooth address
  • control part 22 detects the mobile communication terminals 4 and 6, it will collate key information by performing wireless communication between the detected mobile communication terminals 4 and 6, and if collation of key information is materialized, The operation of the vehicle 2 is permitted.
  • the control unit 22 authenticates the mobile communication terminal 6 that is another key by collating the key information and permits the operation of the vehicle 2, and then the condition for invalidating the key information of the other key is satisfied. After that, the key information of another key is invalidated.
  • S100 S represents a step
  • the communication information Bluetooth address
  • the master key or another key stored in the memory 22a is stored in the wireless communication unit 24. It is determined whether or not the given signal has been received.
  • key information is acquired from the mobile communication terminals 4 and 6 by performing wireless communication with the mobile communication terminals 4 and 6 constituting the master key or another key detected in S100, and stored in the memory 22a. Check against the stored master key or key information of another key.
  • S140 If it is determined in S140 that the electronic key authenticated this time is not the master key, in other words, if the electronic key authenticated this time is another key, the process proceeds to S145.
  • S145 the fact that the other key has been authenticated is stored by setting another key authentication flag indicating that the other key has been authenticated after the communication information and key information of the other key are registered in the memory 22a. The authentication determination process ends.
  • S155 it is determined whether or not another key is currently being authenticated. If another key is currently being authenticated, the process proceeds to S170 after the authentication of the other key is completed in S160. If the other key is not currently being authenticated, the process proceeds to S170.
  • the other key authentication flag is reset.
  • the communication information of the other key is deleted from the memory 22a.
  • the key information of the different key is deleted from the memory 22a, and the authentication determination process is temporarily terminated. It should be noted that the authentication determination process is started once again after a predetermined time has elapsed.
  • the wireless communication unit 24 when the wireless communication unit 24 receives a signal from an electronic key (master key or another key) that is permitted to operate the vehicle 2, the control unit 22 By collating the information, it is determined whether or not the electronic key is authentic.
  • control unit 22 determines (authenticates) that the electronic key is authentic by collating the key information
  • the control unit 22 determines whether or not the electronic key authenticated this time is a master key. If it is a master key and another key has been authenticated in the past, then the communication information for communication with the other key and the key information for different key authentication are deleted so that the other key is not authenticated.
  • the authentication ECU 20 of the present embodiment after the other key is once authenticated based on the communication information and the key information stored in the memory 22a, the authentication ECU 20 simply authenticates the master key, and the key information of the other key. Can be disabled.
  • the owner of the vehicle 2 does not need to perform a special operation and can invalidate key information of another key very easily.
  • control unit 22 invalidates the key information of another key
  • the key information of the other key is deleted from the memory 22a. Therefore, after the invalidation condition of “master key authentication” is established, another key is stored in the memory 22a. It is possible to prevent another key from being mis-authenticated with the remaining key information.
  • the control unit 22 invalidates the key information of another key
  • the communication information necessary for performing wireless communication with the mobile communication terminal 6 that is another key is also stored in the memory. Delete from 22a.
  • the control unit 22 erroneously authenticates the other key, and the vehicle 2 is illegally operated by the other key. It can be surely prevented.
  • the authentication ECU 20 since the authentication ECU 20 does not need to communicate with another key in which the key information is invalidated, the authentication ECU 20 minimizes the number of portable communication terminals that perform wireless communication for vehicle operation. Communication management for communication can be simplified.
  • the number of electronic keys that perform wireless communication for vehicle operation increases, which causes problems such as longer communication time and inability to connect due to the limited number of connections. Can be prevented.
  • the electronic key system is configured to authenticate the electronic key by executing the authentication process of S110 each time a user operation or control based on the operation.
  • the authentication determination process of the present embodiment when it is determined in S140 that the electronic key authenticated this time is a master key, the authentication determination process is temporarily terminated, and in S140. When it is determined that the electronic key authenticated this time is another key, the process proceeds to S200, and another key authentication cancellation processing shown in FIG. 5 is executed.
  • the elapsed time since the last vehicle operation or the elapsed time after the separate key authentication is preliminarily stored. It is determined whether the set invalidation time T1 has elapsed.
  • the process of S210 and S220 is executed to wait for the invalidation condition for the separate key to be satisfied.
  • the communication information of another key is deleted from the memory 22a
  • the key information of the other key is deleted from the memory 22a, and the separate key authentication release process is terminated.
  • the authentication determination process is once ended after the completion of the separate key authentication release process, and is started again after a predetermined time has elapsed.
  • the authentication of another key is terminated when an invalidation condition different from the invalidation condition (master key authentication) in the first embodiment is satisfied. Then, the communication information and the key information are deleted from the memory 22a.
  • the owner of the vehicle 2 can invalidate the key information of another key without performing a special operation, and prevent the vehicle 2 from being illegally operated by the other key. .
  • examples of the invalidation condition for determining whether or not the condition is satisfied in S220 include the following conditions (1) to (3).
  • (1) When the number of operations of the vehicle 2 after the separate key authentication reaches the predetermined number of times such as the number of operations of the touch sensor and button switch detected by the various sensors 26, the number of operations of the engine switch 28, etc.
  • (2) After another key authentication, for example, when a predetermined vehicle operation such as unlocking the door, starting the engine, stopping the engine, or locking the door is completed.
  • an invalidation command for invalidating another key is transmitted from the mobile communication terminal 4 which is a master key.
  • S220 it is determined whether one or more of the above conditions (1) to (3) is satisfied, and one of the above conditions (1) to (3) is satisfied. In this case, it may be determined that the invalidation condition is satisfied. (Modification 1) In the invalidation condition determination process in S220, the processes in S222 to S226 shown in FIG. 6 may be executed.
  • the process proceeds to S222, and after the separate key authentication, a predetermined time T2 has elapsed. Determine whether or not.
  • the predetermined time T2 is set to be shorter than the invalidation time T1.
  • the current position may be acquired from an in-vehicle device such as a navigation device via, for example, the communication bus 30.
  • a GPS receiver is provided in the authentication ECU 20, and the current position is acquired from the GPS receiver. You may do it.
  • Modification 2 Next, in the separate key authentication release process of FIG. 5, after the authentication of the separate key is completed in S230, the processes of S240 and S250 are executed immediately. However, as shown in FIG. After the process is executed, a specific operation using another key may be permitted until a predetermined time T4 elapses.
  • the borrower can move the vehicle 2 freely, so that the position when the predetermined invalidation condition is satisfied and the authentication of another key is finished is a specific return such as a garage. Not necessarily a place.
  • S234 it is determined whether or not an authentication request is received from another key. If there is no authentication request from another key, the process proceeds to S232. If there is an authentication request from another key, the process proceeds to S236, and whether or not a lock control signal for instructing locking of the door of the vehicle 2 is transmitted from the other key as a control signal for vehicle operation together with the authentication request. Determine whether.
  • a lock command for locking the door of the vehicle is executed by transmitting a locking command for locking the door of the vehicle 2 to the body ECU 32, and the process proceeds to S240.
  • the door of the vehicle 2 can be locked using the separate key until the predetermined time T4 elapses even after the authentication of the separate key is completed. Can be improved.
  • this indication is not limited to the above-mentioned embodiment, and can take various modes within the range which does not deviate from the gist of this indication.
  • the key information stored in the memory 22a is deleted in the processing of S190 or S250 when the key information of another key is invalidated.
  • the mobile communication terminal 6 may delete the key information by transmitting a key information deletion command to the mobile communication terminal 6 constituting another key. Moreover, in S190 and S250, you may make it delete both the key information memorize
  • the key information is not deleted, but the key information is changed to an ID code different from the key information used so far, so that the mobile communication terminal 6 is not authenticated as another key. It may be.
  • the deletion command when a key information deletion command is transmitted to the mobile communication terminal 6 constituting another key, the deletion command is directly transmitted from the wireless communication unit 24 to the mobile communication terminal 6.
  • the deletion command may be transmitted using a center device that can be interconnected using a portable wireless line or the like.
  • the wireless communication between the authentication ECU of the vehicle 2 and the mobile communication terminals 4 and 6 that are electronic keys has been described as using Bluetooth®. May use other communication standards such as “Wi-Fi” or “NFC” (Near Field Communication) used in the wireless LAN.
  • the connection permission MAC address of “Wi-Fi” is stored in the memory 22a as communication information necessary for establishing a wireless communication connection. do it.
  • the unique ID of “NFC” ⁇ ⁇ may be stored in the memory 22a as communication information necessary for establishing a wireless communication connection.
  • the present disclosure is, for example, an electronic key system used to control access to a building such as a house. Even an electronic key system other than a vehicle can be applied.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Selon l'invention, dans un dispositif de commande, une unité de communication (24) réalise une communication sans fil entre des terminaux de communication portables (4, 6) ayant une fonction de clé électronique. Une unité d'authentification (22, S100-S130) compare les informations de clé de clés électroniques par l'intermédiaire d'une unité de communication et, lorsque la comparaison d'informations de clé a été établie, le terminal avec lequel l'unité de communication a réalisé une communication sans fil est déterminé comme étant une clé électronique permettant l'actionnement d'un appareil, et l'actionnement d'un appareil est autorisé. Une unité de stockage (22a) stocke les informations de clé d'une clé électronique principale pour l'actionnement d'un appareil, en tant qu'informations de clé utilisées par l'unité d'authentification lors de l'authentification d'une clé électronique, et stocke les informations de clé d'une clé électronique secondaire de telle sorte que l'actionnement d'un appareil est temporairement autorisé. Une unité de désactivation (22, S140-S190, S210-S250) désactive des informations de clé nécessaires pour que l'unité d'authentification authentifie la clé électronique secondaire après avoir attendu que des conditions de désactivation de la clé électronique secondaire soient satisfaites lorsque la clé électronique secondaire est authentifiée par l'unité d'authentification sur la base des informations de clé stockées dans l'unité de stockage, et l'actionnement de l'appareil est autorisé au moyen de la clé d'authentification secondaire.
PCT/JP2014/004292 2013-09-06 2014-08-21 Dispositif de commande et système de clé électronique WO2015033527A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2013185245A JP6229382B2 (ja) 2013-09-06 2013-09-06 制御装置及び電子キーシステム
JP2013-185245 2013-09-06

Publications (1)

Publication Number Publication Date
WO2015033527A1 true WO2015033527A1 (fr) 2015-03-12

Family

ID=52628028

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2014/004292 WO2015033527A1 (fr) 2013-09-06 2014-08-21 Dispositif de commande et système de clé électronique

Country Status (2)

Country Link
JP (1) JP6229382B2 (fr)
WO (1) WO2015033527A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112839040A (zh) * 2018-12-26 2021-05-25 上海银基信息安全技术股份有限公司 身份认证方法、装置和介质
CN112991581A (zh) * 2019-12-17 2021-06-18 本田技研工业株式会社 位置测定系统、位置测定方法和位置测定指示方法
CN113423905A (zh) * 2019-02-25 2021-09-21 本田技研工业株式会社 车辆、车载装置以及管理方法
CN113763602A (zh) * 2020-06-01 2021-12-07 丰田自动车株式会社 信息处理装置、信息处理方法以及非临时性存储介质

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6669014B2 (ja) * 2016-08-31 2020-03-18 アイシン・エィ・ダブリュ株式会社 車両操作キー付与システムおよび車両操作キー付与プログラム
JP6886262B2 (ja) * 2016-09-09 2021-06-16 三菱地所パークス株式会社 バレーパーキングシステム、自動車、プログラム
KR102427982B1 (ko) 2017-06-27 2022-08-02 현대자동차주식회사 차량 시스템 및 그 제어방법
JP6997557B2 (ja) * 2017-08-10 2022-01-17 三菱地所パークス株式会社 バレーパーキングシステム、プログラム
JP7131193B2 (ja) 2018-08-10 2022-09-06 株式会社Soken 位置判定システム
JP7302964B2 (ja) 2018-11-29 2023-07-04 株式会社東海理化電機製作所 運転者支援システム及び運転者支援方法
JP7243416B2 (ja) 2019-04-26 2023-03-22 株式会社Soken 位置判定システム
JP6968250B1 (ja) * 2020-10-21 2021-11-17 三菱電機株式会社 車両盗難防止システム
JP2023034660A (ja) * 2021-08-31 2023-03-13 トヨタ自動車株式会社 情報処理装置及びこれを備えた車両、情報処理方法、並びにプログラム

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009293283A (ja) * 2008-06-05 2009-12-17 Tokai Rika Co Ltd 車両の電子キーシステム
JP2012041709A (ja) * 2010-08-18 2012-03-01 Toyota Infotechnology Center Co Ltd 電子キー及び電子キーシステム
JP2012144899A (ja) * 2011-01-12 2012-08-02 Nec Casio Mobile Communications Ltd 電子鍵管理装置、施錠・開錠システム、電子鍵管理方法およびプログラム
JP2012149472A (ja) * 2011-01-21 2012-08-09 Tokai Rika Co Ltd 電子キー登録システム
JP2012215047A (ja) * 2011-04-01 2012-11-08 Tokai Rika Co Ltd 電子キーシステム

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8947202B2 (en) * 2011-10-20 2015-02-03 Apple Inc. Accessing a vehicle using portable devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009293283A (ja) * 2008-06-05 2009-12-17 Tokai Rika Co Ltd 車両の電子キーシステム
JP2012041709A (ja) * 2010-08-18 2012-03-01 Toyota Infotechnology Center Co Ltd 電子キー及び電子キーシステム
JP2012144899A (ja) * 2011-01-12 2012-08-02 Nec Casio Mobile Communications Ltd 電子鍵管理装置、施錠・開錠システム、電子鍵管理方法およびプログラム
JP2012149472A (ja) * 2011-01-21 2012-08-09 Tokai Rika Co Ltd 電子キー登録システム
JP2012215047A (ja) * 2011-04-01 2012-11-08 Tokai Rika Co Ltd 電子キーシステム

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112839040A (zh) * 2018-12-26 2021-05-25 上海银基信息安全技术股份有限公司 身份认证方法、装置和介质
CN112839040B (zh) * 2018-12-26 2023-08-04 上海银基信息安全技术股份有限公司 身份认证方法、装置和介质
CN113423905A (zh) * 2019-02-25 2021-09-21 本田技研工业株式会社 车辆、车载装置以及管理方法
CN112991581A (zh) * 2019-12-17 2021-06-18 本田技研工业株式会社 位置测定系统、位置测定方法和位置测定指示方法
CN113763602A (zh) * 2020-06-01 2021-12-07 丰田自动车株式会社 信息处理装置、信息处理方法以及非临时性存储介质
CN113763602B (zh) * 2020-06-01 2024-01-16 丰田自动车株式会社 信息处理装置、信息处理方法以及非临时性存储介质

Also Published As

Publication number Publication date
JP2015052223A (ja) 2015-03-19
JP6229382B2 (ja) 2017-11-15

Similar Documents

Publication Publication Date Title
JP6229382B2 (ja) 制御装置及び電子キーシステム
JP6585664B2 (ja) カーシェアリングシステム
JP6670801B2 (ja) カーシェアリングシステム及びカーシェアリング用プログラム
CN106416332B (zh) 能够与机动车辆自动配对的移动电话以及自动配对方法
US10661752B2 (en) Car sharing system
US20190110199A1 (en) Car sharing system
WO2014119225A1 (fr) Système de commande
KR102407870B1 (ko) 차량의 도어락 제어 시스템 및 그 방법
JP5421202B2 (ja) 携帯機
JP6595551B2 (ja) カーシェアリングシステム
KR20170075986A (ko) 이중 보안을 적용한 스마트키 시스템 및 이를 이용한 차량 이중 보안 방법
US11285917B1 (en) Vehicle control system
JP6015609B2 (ja) 電子キーシステム、制御装置及び電子キー
JP2014094680A (ja) 車両盗難防止装置および方法、並びにスマートエントリーシステム
US20190143940A1 (en) Valet key and method for controlling valet key
US20190143939A1 (en) Valet key and method for controlling valet key
WO2020080076A1 (fr) Dispositif de commande embarqué, procédé de commande embarqué et programme informatique
JP6414696B2 (ja) キー閉じ込み防止装置
JP2020113065A (ja) 情報管理システム
JP2004088337A (ja) キーレス制御方法、識別コード登録方法、通信機器及び制御プログラム
KR102327081B1 (ko) 차량용 디지털 스마트키 시스템 및 그에 의한 차량 관리 방법
JP2009293283A (ja) 車両の電子キーシステム
JP2016205001A (ja) 電子キーシステム
JP2020029715A (ja) 認証システム及び認証方法
JP2013126197A (ja) 盗難防止システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14841538

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14841538

Country of ref document: EP

Kind code of ref document: A1