AU4341499A - A key control method - Google Patents
A key control method Download PDFInfo
- Publication number
- AU4341499A AU4341499A AU43414/99A AU4341499A AU4341499A AU 4341499 A AU4341499 A AU 4341499A AU 43414/99 A AU43414/99 A AU 43414/99A AU 4341499 A AU4341499 A AU 4341499A AU 4341499 A AU4341499 A AU 4341499A
- Authority
- AU
- Australia
- Prior art keywords
- key
- vehicle
- valid
- security system
- control method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims description 50
- 238000010200 validation analysis Methods 0.000 claims description 23
- 230000003213 activating effect Effects 0.000 claims description 4
- 230000000717 retained effect Effects 0.000 claims description 2
- 238000010561 standard procedure Methods 0.000 claims 2
- 238000004891 communication Methods 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 230000000881 depressing effect Effects 0.000 description 1
- 230000000994 depressogenic effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00365—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
- G07C2009/00373—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit whereby the wake-up circuit is situated in the lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00793—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00968—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mechanical Engineering (AREA)
- Lock And Its Accessories (AREA)
- Communication Control (AREA)
Description
Regulation 3.2
AUSTRALIA
Patents Act 1990 COMPLETE SPECIFICATION FOR A STANDARD PATENT
(ORIGINAL)
Name of Applicant: ROBERT BOSCH GmbH of Postfach 30 02 20, D-70442 Stuttgart, Germany Actual Inventor(s): Address for Service: DAVIES COLLISON CAVE, Patent Attorneys, of 1 Little Collins Street, Melbourne, Victoria 3000, Australia Invention Title: "A KEY CONTROL METHOD" Details of Associated Provisional Application No: PP5763/98 The following statement is a full description of this invention, including the best method of performing it known to us: P \OPERDBWPP5763.98 5/8/99 -2- A KEY CONTROL METHOD The present invention relates to a key control method and a security system.
Passive security systems are available for vehicles which use remote keys having transponders that communicate with a transceiver of a vehicle, when the transponder is within range of the transceiver. Provided communication between a key and the transceiver follows a predetermined communications protocol, and unique authentication data is exchanged and validated, the key is considered a valid key and the system allows entry to and/or use of the 10 vehicle. When the valid key subsequently moves out of range of the transceiver, the security See• system secures the vehicle by locking and immobilising the vehicle.
When a valid key for a vehicle becomes lost, the key needs to be deactivated so it can no longer be used to gain access to the vehicle. Accordingly, it is desired to a provide simple technique for deactivating lost keys and reactivating found valid keys, particularly when the keys are buttonless.
In accordance with the present invention there is provided a key control method for a security system having at least one valid key and electronic control means with a transceiver for communicating with said at least one valid key, said control means generating an authority for a secure object when authentication data is received from said at least one valid key and storing unique identification data for said at least one valid key, said method including accessing said unique identification data for said at least one valid key in a mode of said system; characterised by storing enable data corresponding to said unique identification data for said at least one valid key, a user executing a predetermined procedure to enter a key validation mode of said system, and in said validation mode retaining said enable data for valid keys within range of said transceiver and deleting said enable data for valid keys which are out of range of said transceiver, whereby keys without said enable data are deactivated for said system.
The present invention also provides a security system including at least one valid key and electronic control means with a transceiver for communicating with said at least one valid P XOPER\DWMPP5763 98 518/W9 -3key, said control means generating an authority for a secure object when authentication data is received from said at least one valid key, and storing unique identification data for said at least one valid key, said system having a mode for accessing said unique identification data for said at least one valid key; characterised in that said control means stores enable data corresponding to said unique identification data for said at least one valid key when activated for said system, and said control means enters a key validation mode when a user executes a predetermined procedure, and in said validation mode said enable data is retained for valid keys within range of said transceiver and deleted for valid keys out of range of said transceiver.
A preferred embodiment of the present invention is hereinafter described, by way of example only, with reference to the accompanying drawing, wherein: Figure 1 is a block diagram of a preferred embodiment of a security system.
A security system, as shown in Figure 1, includes an electronic control unit (ECU) 2 which is mounted in a vehicle and includes processing circuitry to communicate with other electrical and electronic components of the vehicle and the security system. In particular, the ECU 2 includes an rf transceiver 14 for generating an rf signal which excites the transponder of a remote key 4 of the security system, when the key 4 is within the vicinity of the vehicle.
The key 4 may comprise a card or fob. Once excited, the key 4 uses rf transmission :techniques to communicate with the transceiver 14, in accordance with a secure communications protocol, in order to pass authentication data from the key 4 to the ECU 2.
Once received, the ECU 2 compares the authentication data with security data that it holds in its memory, being security codes and enable flags stored in an FEPROM 12. When the ECU 2 finds a match between the received authentication data and its own security data, the ECU 2 issues signals to other components of the vehicle to enable access to and/or operation of the vehicle by a holder of the key 4. When the key 4 is removed form the immediate vicinity of the vehicle, this is detected by the transceiver 14, which causes the ECU 2 to generate signals to secure the vehicle, for example by locking and immobilising the vehicle.
N4ormally, a number of valid keys can be used with the security system to gain access to the vehicle. The keys 4 each include a unique serial or identification number and this is communicated to the ECU 2 as pant of the authentication data. The ECU 2 stores the serial P:\OPER\DBWMPP5763.98 518/99 -4numbers for each valid key in its EEPROM 12, and against each serial number an enable flag is stored. As an alternative to the enable flag, the system may store a control byte, which may be an encrypted version of the identification number. During the authentication procedure when the ECU 2 verifies the authentication data, the ECU 2 checks to determine if the received serial number of the communicating key 4 is stored in the EEPROM 12 and whether its enable flag is set or reset. If the serial number is found and the enable flag is set, then the communicating key constitutes a valid key which can be used to gain access to the vehicle.
If however the serial number is found and the enable flag is not set, then the communicating key is no longer a valid key which can be used. The ECU 2 is able to execute a key 10 deactivation and activation procedure which resets and sets the enable flag for keys 4. This allows an owner of the vehicle to deal with lost or stolen keys in a simple manner, as described below.
When a valid key is lost or stolen, the holder of at least one remaining valid key can place the ECU 2 in a key validation mode to validate all of the remaining keys. The holder of the remaining keys simply enters the vehicle, places all of the remaining keys within range of the transceiver 14, and executes a predetermined procedure to place the ECU 2 in the key validation mode. Once placed in the key validation mode, the ECU 2 energises all of the keys S 4 within its range, to receive their serial numbers, and sets the enable flags in the EEPROM 12 for the serial numbers received, whilst resetting the enable flags for any other key serial numbers stored in the EEPROM 12. The keys that are therefore within range of the transceiver 14 will then constitute valid keys, and the lost or stolen key will no longer be a valid key, as its enable flag is reset. Completion of the key validation procedure is indicated by the ECU 2 which generates a completion signal for a message unit 6. The message unit simply indicates either visually or audibly that the key validation procedure is completed. The message unit 6 may be an LED in the vehicle or the vehicle's horn or siren. The message unit 6 may also be a display unit in the vehicle which receives and is able to display data indicating the keys which are valid for the vehicle. The display unit would also display other messages, such as "key validation completed" and can include controls which allows a user of the vehicle to recall a display indicating the valid keys, such as keys A, B and C.
When the lost or stolen key 4 is recovered, the key 4 can be revalidated or activated by again taking all of the keys into the vehicle, and placing the ECU 2 into the key validation P \OPEMDBW\PP5763 98 5181W9 mode, to execute the above key validation procedure. The enable flag for the found key 4 will then be set in the FEPROM 12.
To avoid the requirement for any additional hardware components to be added to the vehicle, the predetermined procedure used to place the ECU 2 in the key validation mode needs to be executed using existing vehicle components. The predetermined procedure should advantageously involve using components and operations which are normally involved in a start or entry procedure for the vehicle. Most vehicles have a start procedure which involves pressing a pedal 8, which may be the brake or clutch pedal, and then simultaneously turning on an ignition start switch 10 of the vehicle. The ECU 2 is connected to the electrical network or wire looms of the vehicle so as to receive signals generated when the pedal 8 is depressed and the start switch 10 is turned on. The predetermined procedure to enter the key validation mode can then involve a holder of the keys simply depressing the pedal 8 and turning on the start switch 10 alternately a number of times, say three times, instead of simultaneously. The ECU 2 on detecting depression of the pedal 8 and the start switch 10 alternately can then generate a message for the message unit 6 to confirm entry into the key validation mode when the predetermined procedure has been executed. The ECU 2 can also issue cues on the message unit 6 to follow the time sequence for depression of the pedal 8 and turning on the ****start switch 8, to assist a holder of the keys in correctly executing the procedure to enter the key validation mode. Alternatively the steps and components used for an entry procedure for the vehicle can be used. For example, in some passive security systems the key is excited on lifting of a door handle 16. The predetermined procedure required to enter the key validation mode may require a holder of the keys to lift the door handle 16 a number of times within a period of time, say four times in two seconds.
The ECU 2 can be provided by or divided into a number of ECUs, and similarly the vehicle can include a number of transceivers and antennas to communicate with remote keys 4. The keys 4 may be passive entry keys which require energy from the vehicle in order to communicate with the ECU 2 or the keys may have their own battery power supply. Also, whilst the present invention is particularly advantageous for keys which have no activating buttons, the keys 4 can include activating buttons and the security system may be a combination active and passive security system. For example, the security system may be such that the key 4 is able to conmmunicate over a distance, of say 30 m, with the vehicle when P 'OPER\DBWPP5763 98 58/99 -6activated, and is also able to be energised or excited when closer to the vehicle by lifting of a door handle, or some other activation device, when in the vicinity of the vehicle.
Many modifications will be apparent to those skilled in the art without departing from the scope of the present invention as herein described with reference to the accompanying drawing.
*ooo *o *o* *o*o* o *e
Claims (29)
1. A key control method for a security system having at least one valid key and electronic control means with a transceiver for communicating with said at least one valid key, said control means generating an authority for a secure object when authentication data is received from said at least one valid key and storing unique identification data for said at least one valid key, said method including accessing said unique identification data for said at least one valid key in a mode of said system; tid unique identification data characterised by storing enable data corresponding to said unique identification data 10 for said at least one valid key, a user executing a predetermined procedure to enter a key validation mode of said system, and in said validation mode retaining said enable data for valid keys within range of said transceiver and deleting said enable data for valid keys which are out of range of said transceiver, whereby keys without said enable data are deactivated for said system.
S2. A key control method as claimed in claim i, wherein said predetermined procedure includes steps of a start procedure of a vehicle.
3. A key control method as claimed in claim 1, wherein said predetermined procedure includes steps of an entry procedure of a vehicle.
4. A key control method as claimed in claim 1, wherein said predetermined procedure includes executing steps using standard controls of a vehicle.
5. A key control method as claimed in claim 4, wherein said standard controls include a brake pedal, a clutch pedal, an ignition switch, and/or a door handle.
6. A key control method as claimed in any one of claims 2 to 5, wherein said steps are executed at times relative to one another which differ from said times for standard procedures for said vehicle.
7. A key control method as claimed in any one of the preceding claims, including indicating completion of said key validation mode. P:\OPERfDBW\PP576 3 9 8 5/8/99 -8-
8. A key control method as claimed in claim 7, wherein said indicating includes generating a display of the activated valid keys for said system.
9. A key control method as claimed in any one of the preceding claims, wherein said keys are without activating buttons. A key control method as claimed in any one of the preceding claims, wherein said enable data is a control byte.
10
11. A key control method as claimed in any one of claims 1 to 10, wherein said authority allows access to said secure object.
12. A key control method as claimed in claim 11, wherein said secure object is a vehicle. 15
13. A key control method as claimed in any one of claims 1 to 10, wherein said secure object is a vehicle and said authority allows operation of said vehicle.
14. A key control method as claimed in claim 13, wherein said operation includes starting 2* said vehicle.
15. A security system including at least one valid key and electronic control means with a transceiver for communicating with said at least one valid key, said control means generating an authority for a secure object when authentication data is received from said at least one valid key, and storing unique identification data for said at least one valid key, said system having a mode for accessing said unique identification data for said at least one valid key; characterised in that said control means stores enable data corresponding to said unique identification data for said at least one valid key when activated for said system, and said control means enters a key validation mode when a user executes a predetermined procedure, and in said validation mode said enable data is retained for valid keys within range of said transceiver and deleted for valid keys out of range of said transceiver.
16. A security system as claimed in claim 15, wherein said predetermined procedure P \OPERXDBW\PP5763.98 5/8/99 -9- includes steps of a start procedure of a vehicle.
17. A security system as claimed in claim 15, wherein said predetermined procedure includes steps of an entry procedure of a vehicle.
18. A security system as claimed in claim 15, wherein said predetermined procedure includes executing steps using standard controls of a vehicle.
19. A security system as claimed in claim 18, wherein said standard controls include a brake pedal, a clutch pedal, an ignition switch, and/or a door handle.
A security system as claimed in any one of claims 16 to 19, wherein said steps are executed at times relative to one another which differ from said times for standard procedures for said vehicle.
21. A security system as claimed in any one of claims 15 to 20, including means for indicating completion of said key validation mode.
22. A security system as claimed in claim 21, wherein said indicating means includes a display of the current valid keys for said system.
23. A security system as claimed in any one of claims 15 to 22, wherein said keys are without activating buttons.
24. A security system as claimed in any one of claims 15 to 23, wherein said enable data is a control byte.
A security system as claimed in any one of claims 15 to 24, wherein said authority allows access to said secure object.
26. A security system as claimed in claim 25, wherein said secure object is a vehicle.
27. A security system as claimed in any one of claims 15 to 24, wherein said secure object P.\OPER\DBWVPP5763 9 5/8/99 is a vehicle and said authority allows operation of said vehicle.
28. A security system as claimed in claim 27, wherein said operation includes starting said vehicle.
29. A vehicle including a security system as claimed in any one of claims 15 to 28. DATED this 5th day of August, 1999 ROBERT BOSCH GmbH By its Patent Attorneys DAVIES COLLISON CAVE
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU43414/99A AU756414B2 (en) | 1998-09-09 | 1999-08-05 | A key control method |
PCT/DE1999/002811 WO2000014369A2 (en) | 1998-09-09 | 1999-09-04 | Method for controlling a code |
EP99955665A EP1112430B1 (en) | 1998-09-09 | 1999-09-04 | Method for controlling a code |
DE59911105T DE59911105D1 (en) | 1998-09-09 | 1999-09-04 | A KEY CONTROL PROCEDURE |
ES99955665T ES2232186T3 (en) | 1998-09-09 | 1999-09-04 | KEY CONTROL PROCEDURE. |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPP5763 | 1998-09-09 | ||
AUPP5763A AUPP576398A0 (en) | 1998-09-09 | 1998-09-09 | A key deactivation method |
AU43414/99A AU756414B2 (en) | 1998-09-09 | 1999-08-05 | A key control method |
Publications (2)
Publication Number | Publication Date |
---|---|
AU4341499A true AU4341499A (en) | 2000-03-16 |
AU756414B2 AU756414B2 (en) | 2003-01-09 |
Family
ID=25626356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU43414/99A Ceased AU756414B2 (en) | 1998-09-09 | 1999-08-05 | A key control method |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1112430B1 (en) |
AU (1) | AU756414B2 (en) |
DE (1) | DE59911105D1 (en) |
ES (1) | ES2232186T3 (en) |
WO (1) | WO2000014369A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110164005A (en) * | 2019-05-16 | 2019-08-23 | 东风小康汽车有限公司重庆分公司 | A kind of cancellation method and device of Intelligent key |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007331712A (en) * | 2006-06-19 | 2007-12-27 | Denso Corp | Vehicle control system |
US7965170B2 (en) | 2006-07-14 | 2011-06-21 | Lear Corporation | Supervised and unsupervised seat folding |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5508691A (en) * | 1992-06-22 | 1996-04-16 | Lynx Systems, Inc. | Self-contained electronic lock with changeable master and slave codes |
JP3312405B2 (en) * | 1992-11-30 | 2002-08-05 | 株式会社デンソー | Keyless entry device |
DE4317114C2 (en) * | 1993-05-21 | 1997-03-20 | Audi Ag | Anti-theft device as immobilization device on a motor vehicle |
US5513105A (en) * | 1994-05-31 | 1996-04-30 | Krones; Daniel K. | Vehicle security system |
JP3441177B2 (en) * | 1994-08-02 | 2003-08-25 | マツダ株式会社 | Vehicle anti-theft device |
JP3005175B2 (en) * | 1994-09-28 | 2000-01-31 | 本田技研工業株式会社 | Vehicle anti-theft device |
JP3380368B2 (en) * | 1995-06-05 | 2003-02-24 | 三菱電機株式会社 | Vehicle anti-theft device |
-
1999
- 1999-08-05 AU AU43414/99A patent/AU756414B2/en not_active Ceased
- 1999-09-04 EP EP99955665A patent/EP1112430B1/en not_active Expired - Lifetime
- 1999-09-04 WO PCT/DE1999/002811 patent/WO2000014369A2/en active IP Right Grant
- 1999-09-04 ES ES99955665T patent/ES2232186T3/en not_active Expired - Lifetime
- 1999-09-04 DE DE59911105T patent/DE59911105D1/en not_active Expired - Lifetime
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110164005A (en) * | 2019-05-16 | 2019-08-23 | 东风小康汽车有限公司重庆分公司 | A kind of cancellation method and device of Intelligent key |
Also Published As
Publication number | Publication date |
---|---|
EP1112430B1 (en) | 2004-11-17 |
DE59911105D1 (en) | 2004-12-23 |
WO2000014369A3 (en) | 2000-04-20 |
EP1112430A2 (en) | 2001-07-04 |
AU756414B2 (en) | 2003-01-09 |
ES2232186T3 (en) | 2005-05-16 |
WO2000014369A2 (en) | 2000-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5736935A (en) | Keyless vehicle entry and engine starting system | |
US6127922A (en) | Vehicle security system with remote systems control | |
KR101378784B1 (en) | Method for the Protection of a Movable Object, especially a Vehicle, against Unauthorized Use | |
EP1376481B1 (en) | Electronic key system | |
JP4598567B2 (en) | Vehicle anti-theft system | |
US7388466B2 (en) | Integrated passive entry and remote keyless entry system | |
US6204570B1 (en) | Method for initializing an anti-theft system of a motor vehicle | |
US6332572B1 (en) | Key code correlation security | |
CN103380445A (en) | Method for activating a motor vehicle lock system using a mobile communication device | |
JP2004187096A (en) | Keyless entry system and keyless entry method | |
JP4723352B2 (en) | Electronic key system and communication unit | |
CN104851161A (en) | Method for enabling PEPS key to operate multiple vehicles | |
US6140935A (en) | Audio device security system | |
CN113596627B (en) | Authorization control method and device for power equipment, electronic equipment and storage medium | |
US6870459B1 (en) | Theft protection system for an automobile and method for initializing the theft protection system | |
JP2001502627A (en) | Vehicle security system-security equipment | |
JP3299532B2 (en) | Electronic safety system with authentication element range determination means, especially vehicle lock system | |
US7328044B2 (en) | Mobile device registration system | |
AU756414B2 (en) | A key control method | |
US20040204796A1 (en) | Method and apparatus for validating vehicle operators and management of validation information | |
JP2000509590A (en) | Operation method of remote control device and remote control device | |
EP1800975B1 (en) | Improved key and access system | |
US20020149469A1 (en) | Single point failure avoidance for a keyless passive entry and immobilizer system | |
JP2002339612A (en) | Electronic key device for vehicle | |
US20060082447A1 (en) | System and method for data communication with a control device having an adapter for reflashing control device software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGA | Letters patent sealed or granted (standard patent) |