EP1152108A2 - Système d'accès dit mains libres pour véhicule automobile - Google Patents
Système d'accès dit mains libres pour véhicule automobile Download PDFInfo
- Publication number
- EP1152108A2 EP1152108A2 EP01401095A EP01401095A EP1152108A2 EP 1152108 A2 EP1152108 A2 EP 1152108A2 EP 01401095 A EP01401095 A EP 01401095A EP 01401095 A EP01401095 A EP 01401095A EP 1152108 A2 EP1152108 A2 EP 1152108A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- signal
- identification device
- bit
- piracy
- vehicle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 claims abstract description 33
- 230000005540 biological transmission Effects 0.000 claims description 30
- 230000015654 memory Effects 0.000 claims description 16
- 230000004044 response Effects 0.000 claims description 14
- 230000000630 rising effect Effects 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 3
- 230000002457 bidirectional effect Effects 0.000 claims description 2
- 230000006870 function Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 12
- 230000008054 signal transmission Effects 0.000 description 6
- 238000001228 spectrum Methods 0.000 description 5
- 238000007726 management method Methods 0.000 description 4
- 238000000034 method Methods 0.000 description 4
- 230000003111 delayed effect Effects 0.000 description 3
- 230000033228 biological regulation Effects 0.000 description 2
- 230000001934 delay Effects 0.000 description 2
- 238000002592 echocardiography Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000010453 quartz Substances 0.000 description 1
- VYPSYNLAJGMNEJ-UHFFFAOYSA-N silicon dioxide Inorganic materials O=[Si]=O VYPSYNLAJGMNEJ-UHFFFAOYSA-N 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000004804 winding Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00555—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks comprising means to detect or avoid relay attacks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00793—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/06—Involving synchronization or resynchronization between transmitter and receiver; reordering of codes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
Definitions
- the present invention relates to a so-called hand access system free for motor vehicle, i.e. a system of wireless communication allowing entry into the vehicle without key.
- This system can also be applied to hands-free starting of the vehicle, i.e. when starting without a key.
- Such a system generally includes a device identification intended to be worn by a user and capable of establishing wireless two-way remote communication with a unit control unit on board the vehicle to authenticate the user and order locking means / unlocking the door locks when the user has been recognized as authentic.
- Communication protocol initialization can be activated by operating the exterior door handle, to hands-free access, or by pressing a start button, in hands-free start mode.
- the system is able to establish said two-way communication when the identification device is located at a distance less than a predetermined limit distance from the vehicle, generally of the order of a few meters, to avoid, on the one hand, interference with other signal sources from the environment, and, on the other hand, to avoid the functioning of the system at a distance such that the user is too far from the vehicle to be aware of the operations carried out by said system.
- a such a system allows communication only at very short distance from the vehicle in the order of a few cm.
- Another commonly used system proposed is to use low frequency carrier waves, around 125 kHz for communication from the vehicle to the identification device, and ultra high carrier waves frequency, for example of the order of 434 or 868 MHz, for the area Europe, and 315 or 902 MHz for the USA zone.
- the identification device must include a battery to power its own electronic circuits. To minimize consumption electric, we can provide, for example, that the device identification is dormant for 9 ms and awake 1 ms, during periods of 10 ms.
- FIG. 1 of the accompanying drawings there is shown a example of an already known encryption system.
- a vehicle V which comprises in its central unit a memory 1 containing a secret key K and a number generator 2, the generated random numbers R having, for example, a length of 56 bits.
- This random number R is transmitted towards the identification device I, as indicated by arrow 3.
- this same random number R is mixed with the key secret K following a complex associative function f, in a mixer 4 which is connected to its input to memory 1 and to the generator of random numbers 2.
- Mixer 4 outputs a signal representative of the mixture of the secret key K and the random number R, namely the signal f (R, K).
- This signal is stored in a memory 5 connected to the output of mixer 4.
- This signal is sent to the device of identification I, in the form of a signal of length by 28-bit example, as indicated by arrow 6.
- the signal f (R, K) is mixed again with the secret key K in a mixer 7, which is connected at its input to memories 1 and 5 above.
- This mixer 7 mixes the two signals according to a function complex associative g.
- Vehicle V then stores in a memory 8 connected to the mixer output 7 the signal representative of the mixture, namely the signal g (R, f, K).
- the same secret key K is stored in a memory 11 and a mixer 14 having the same associative function f receives as input the secret key provided by the memory 11 of the identification device I and the random number R received by the identification device from the vehicle.
- the identification device I stores the signal at the mixer output 14 in a memory 15 and compare this signal in a comparator 16 with the signal received according to arrow 6 from vehicle V. If the two signals are not identical, subject to the time of hardware and signal transmission delay in the area of authorized transmission, the identification device interrupts the communication as unauthorized. On the other hand, if the two signals match, the signal is mixed in a mixer 17 with the secret key provided by memory 11 of the device identification I, following the same associative function g above.
- the mixer 17 output signal is stored in memory 18 of the identification device to be then sent to the vehicle according to arrow 9 in the form of a signal having a length by 20 bit example.
- the signal received by arrow 9 is compared with the signal received from the vehicle memory 8 in a comparator 10. If these two signals match, subject to delays due to hardware response time and signal transmission in the authorized zone, the rest of the communication is authorized and the unit vehicle center may, if necessary, order the condemnation or unlocking of the door locks of the vehicle.
- another encryption protocol could be used to secure data transmission.
- This signal 21 sent by the vehicle is received by a coil 22 of the relay box 20, which is connected to a receiver 23 at 125 kHz.
- This receiver 23 is connected to a transmitter at broadband at high frequency, of the order of several MHz.
- the transmitter 24 transmits via its antenna 25, as represented by the arrow 26, towards a second relay box 30, which is carried by another hacker who closely follows user U.
- the exchange of information between the two relay boxes 20 and 30 being carried out at very high frequency, it communication is possible from a long distance.
- the second relay box 30 includes an antenna 31 for receiving the signal 26 emitted by the relay box 20.
- the antenna 31 is connected to a broadband receiver at the same frequency as transmitter 24 of the first relay box 20.
- the signal thus received is retransmitted at low frequency at 125 kHz by a transmitter 33 which is connected to a coil 34 to send a signal 35 to the device identification I which conforms to signal 21 emitted by the vehicle.
- the signal 35 being the repetition of the authentic signal of the vehicle, the identification device I will recognize it and in turn issue its response signal 36, said response signal 36 being sent at high frequency and received by an antenna 37 of the second relay box 30, by example at 434 MHz.
- the antenna 37 is connected to a receiver 38, which goes convert the signal at 434 MHz to a signal at a different frequency, for example at 315 MHz.
- the signal is then transmitted by a transmitter at broadband 39 via an antenna 40 to the first relay box 20, this difference in frequency being necessary for the different signals do not interfere with each other.
- the frequency of signal 41 sent back by the second relay box 30 is different both the frequency of signal 26 and signal 36.
- This signal 41 is received by an antenna 27 of the first relay box 20, said antenna 27 being connected to a broadband receiver 28 of the same frequency as the transmitter 39.
- the receiver 28 is connected to a transmitter 29 which transforms the 315 MHz signal into a 434 MHz signal which is sent via the antenna 42 of the first relay box 20 to the vehicle V, as represented by the zigzag arrow 43.
- the hackers use relay boxes having broadband links, for example greater than 50 MHz, which is possible because pirate systems do not have to respect regulations; additional transit time due to distance can be of the order of a few nanoseconds, which is negligible compared to the necessary time constants for normal transmission allowed.
- the total communication can be of the order of 20 to 40 ms, and the duration total operation of the system to trigger the unlocking or locking electric locks can be of the order of 100 ms.
- one solution could be to measure the propagation time of UHF radio waves, comparing this measured time with a time predetermined corresponding to a communication in an area limited allowed around the vehicle.
- a time predetermined corresponding to a communication in an area limited allowed around the vehicle For example, to detect the time delay due to distance, compared to communication time overall, it is necessary to have broad bandwidth, which corresponds to a rapid communication rate, for example of in the range of 20 to 40 Mb / s. With such a communication rate, it is necessary to operate at very high frequency, for example at 2.4 GHz. But to measure very short times, it is necessary to have a very high bandwidth, which comes up against applicable regulations that severely limit bandwidths allowed, to avoid saturation of the environment with waves electromagnetic.
- the object of the invention is to eliminate the aforementioned drawbacks and to propose a so-called hands-free access system for a motor vehicle, allowing to detect a hacking of the system, in particular by through relay boxes, taking into account the time of propagation of the signal between the vehicle and the identification device.
- the invention relates to an access system called hands free for motor vehicle, comprising a device identification intended to be worn by a user and capable of establishing wireless two-way remote communication with a unit control unit on board the vehicle to authenticate the user and order locking means / unlocking the door locks when the user has been recognized as authentic, said system being capable of establishing said two-way communication when the identification device is located at a distance less than a predetermined limit distance from the vehicle, characterized in that said central unit is able to generate, during communication, an anti-piracy bit stream, each bit of said train being transmitted to the identification device under the form of a radio frequency signal representative of said bit, so that when the identification device receives said signal, the latter is re-issued by the identification device with a delay time greater than or equal to the useful transmission time of the bit, and that reception by the central control unit of said re-emitted signal triggers the central unit transmitting the signal representative of the next bit in said train, the number of bits transmitted or received from said train, being counted by a
- Transmission time means useful "the transmission time of the binary information of said bit compared the total time of the cell with which said bit is associated, which includes generally said useful time and a time of silence to allow the reception of the signal re-emitted by the identification device during said time of silence.
- said predetermined threshold value is given by a time window which corresponds to the total duration theoretical emission of the anti-piracy bit stream, when the identification device is at a distance less than or equal to the predetermined limit distance.
- This time window is a constant precise generated for example by an oscillator controlled by quartz associated with a counter controlled by the micro-controller which indicates the number of periods to count.
- the central control unit is suitable to determine said hacking attempt when the total number of bits of the anti-piracy train was not issued or received by the central processing unit command in said window.
- the central unit can include in memory a double entry correspondence table, namely the number of bits transmitted and the corresponding actual transmission time, for output the actual distance between the identification device and the central unit, the data from said table having been acquired beforehand by experimentation and which can be periodically updated, when the user wearing the identification device is seated on the driver's seat of the vehicle, the distance from the identification device to the central unit of the vehicle then being substantially constant.
- a double entry correspondence table namely the number of bits transmitted and the corresponding actual transmission time
- the counting of the number of bits transmitted is stopped when the central unit detects the reception of the last bit of the train anti-piracy.
- the identification device comprises a line to analog delay to retransmit the signal received from the vehicle to the vehicle with a predetermined delay time.
- the central control unit includes a radio carrier wave oscillator frequency, connected to a phase modulator, which is controlled by the Anti-piracy bit stream generated by the central unit of the vehicle.
- the anti-piracy bit stream is generated by the central processing unit after the data transmission authentication methods encrypted to the identification device.
- the identification device may include a phase inverter to selectively reverse the phase of the signal representative of the bits anti-piracy received by the identification device from the vehicle, said inverter being controlled, for each bit of anti-piracy, by an encrypted digital authentication response signal of the identification device, at a slower rate than that of the anti-piracy bit stream.
- the central unit of the vehicle comprising a phase demodulator for demodulating the signal received by the vehicle from the identification device, a logic gate Exclusive OR whose inputs are respectively linked to said audit phase demodulator and a digital signal retarder, said retarder being able to delay by bit useful time each bit of the train of anti-piracy generated by the central unit, said logic gate being able to output a digital signal representative of the signal encrypted response from the identification device.
- the signal delivered in output of the aforementioned exclusive OR logic gate is compared by the unit central to an encrypted digital authentication signal generated by the central unit, in order to authenticate the identification device.
- the exit from said door exclusive OR logic is connected to an input of a second door exclusive OR logic whose other input receives a digital signal encrypted authentication generated by the central unit, in order to deliver at output a signal representative of the successive time offsets of each bit of the anti-piracy train, this last signal being received at the input of an integrator to sum the response times linked at each anti-piracy bit shift slot, the output of said integrator being connected to a comparator to compare said sum response time with a predetermined time limit value, beyond which a hacking attempt is detected.
- the signal from of the identification device is received by the central unit and transmitted to the input of an envelope detector to detect the rising edge of said signal, the detection of this rising edge being able to trigger, of a hand, incrementing the number of bits by one and, on the other hand, the transmission of the next bit in the anti-piracy bit stream, after a predetermined duration which corresponds to a bit time useful possibly increased by additional time to avoid any interference between the transmission and reception of the signal by the unit central.
- the central unit includes a modulator says all or nothing to switch the central unit in the transmission or reception mode of signals to or from identification device, said all-or-nothing modulator being controlled by the detection of the rising edge of the signal received in origin of the identification device.
- the identification device comprises a receiver for receiving low cadence wake-up signals, receiver successively comprising a static envelope detector low threshold radio frequency and low frequency amplifier.
- the useful bit time can be between 50 and 200 ns.
- the motor vehicle V has in its central unit a microcontroller 50, which is usually in a semi-sleep state or waiting for an alarm clock.
- a microcontroller 50 which is usually in a semi-sleep state or waiting for an alarm clock.
- an activation signal is sent to the microcontroller 50, as indicated by arrow 51.
- the microcontroller sends a general power signal, such as represented by arrow 52, to supply the various components central unit electronics.
- the microcontroller 50 generates a series of signals at low cadence sk, for example of the order of 2 to 100 Kb / s on line V5.
- the data carried on line V5 is successively an awakening signal, a signal representative of a number random R with a length for example of 56 bits, a signal representative of the function f (R, K) of a length for example of 28 bits, and of a signal representative of service data s, for example with a length of 100 to 5,000 bits, for example data on the maintenance, vehicle adjustment, etc. (see Figure 5).
- Line V5 is connected to a transmitter 53 to transmit signals via an antenna 54 towards the identification device I as represented by the arrow E.
- the transmitter 53 includes, as best seen in FIG. 4, a oscillator 55 to generate an ultra high carrier wave frequency, said oscillator being supplied by line 52.
- the oscillator 55 is connected to a phase modulator 56, which in turn is connected to a all-or-nothing modulator 57, the latter having an input connected to the line V5 and its output connected to the above-mentioned antenna 54.
- the phase modulator When issuing data at low rate sk on line V5, the phase modulator is inactive.
- the all or nothing modulator 57 is intended for alternately allow the transmission of a signal and the reception of a signal by the unit center of the vehicle, as explained below.
- the amplitude of the transmitted signal is of the order of 2 V rms.
- the signal emitted E is received by an antenna 100 of the device identification I with an attenuation of the order of -40 dBm, which represents an attenuation coefficient of 100 times, i.e. the signal received by the identification device has an amplitude of around 20 mV.
- the antenna 100 is connected to a radio frequency filter 101 (only shown in Figure 4) to eliminate the spurious frequencies.
- the output of filter 101 is connected to a branching, on the one hand, to a receiver at low cadence and at low consumption 102 and, on the other hand, to a delay line analog 103. Low speed signals sk are not transmitted via delay line 103, but mainly via the receiver 102. As best seen in FIG.
- the receiver 102 includes successively a radio frequency envelope detector 104 for reconstitute the signals at low cadence on line I5, which correspond to those of line V5.
- Detector output envelope 104 is connected to a low frequency amplifier 105, of which the output is connected in parallel, on the one hand, to a sequence decoder awakening 106 and, on the other hand, to a microcontroller 107 of the device identification I via line 108.
- the decoder 106 is supplied with permanently by the battery of the identification device.
- the awakening data are decoded by the decoder 106, in order to send a wake-up command to the microcontroller 107, at the output of the decoder 106.
- the microcontroller 107 then awakens all the other components of the identification device. So the data following, namely the signals R, f and s, are transmitted directly to the microcontroller 107 via the parallel line 108.
- the microcontroller 50 of vehicle V After transmission of the service data s, the microcontroller 50 of vehicle V generates anti-piracy bits h at the slow rate sk of the microprocessor, said anti-piracy bits being received by a 58 random binary sequence generator buffer output the high-speed anti-piracy bits fk, on a line V7.
- the output of buffer memory 58 is connected to a branch, on the one hand, with the phase modulator 56 for modulate in phase the carrier wave generated by the oscillator 55, and on the other hand, with a digital timer with a useful bit time 59, whose function will be explained later. Every bit of anti-piracy is transmitted in the form of a radio-frequency signal via the antenna 54 in direction of the identification device I.
- the global transmission frame V2 of the signals by the antenna 54 is illustrated in FIGS. 5 and 7.
- the beginning has been represented of the interrogation frame of the anti-piracy bits h on the line V2.
- each bit of anti-piracy is carried by a very high frequency oscillating wave having a bit time Tb of, for example, between 50 and 200 ns.
- Tb bit time
- hn is authorized by the modulator while or nothing 57, as a function of a control signal V1 which is emitted by a time base management unit 60 of vehicle V, which unit 60 is capable of delivering the clock signals at low cadence sk, at medium cadence mk and high cadence fk.
- unit 60 is connected to the microcontroller 50, as indicated by the double arrow 61. The generation of signal V1 will be explained later.
- the identification device I receives via its antenna 100 on the line I1 (see figure 6) a signal which corresponds to the anti-piracy bit h1 emitted by vehicle V, with a delay time ⁇ which corresponds to signal propagation time between vehicle and device identification.
- the signal then passes through the analog delay line 103, which can for example be constituted by a copper winding, which reduces the energy consumption by the device identification, because this delay line does not need to be powered in energy.
- FIG. 8 shows the signal I2v which corresponds to the virtual signal at the output of the analog delay line 103, it is tell the envelope of said analog signal, said signal being delayed with a predetermined duration Dl.
- the delay line 103 output is connected to the input of a phase inverter 109 to reverse the phase of the analog signal transmitted by the delay line 103, according to a encrypted authentication control signal g, the frame of which is shown on line I6.
- a encrypted authentication control signal g the frame of which is shown on line I6.
- the bit rate of the signals g is at medium rate mk, lower than the high rate fk of the anti-piracy bits h.
- the microcontroller 107 of the device identification transmits signal g at low speed sk to a memory buffer 110 which outputs the signal g at the average rate mk to the phase inverter 109.
- the phase inverter 109 outputs an analog signal, whose virtual signal is represented in I7v which represents the envelope of said signal.
- the output of the phase inverter 109 is connected to a amplifier 111 having a gain of + 20 dB to transmit the signal with an amplitude of the order of 200 mV.
- This amplified signal is represented on line I4 and corresponds to transmission bit h1 with the delay ⁇ due to signal propagation and analog delay Dl due to the delay line 103.
- This signal 14 is retransmitted by an antenna 112 towards vehicle V, as represented by the arrow RE.
- this first bit of anti-piracy will trigger the generation of the encrypted signal authentication g by the identification device with a view to control the phase inverter 109.
- the output of amplifier 111 is also connected to a trigger line 113 which comprises in series a diode 114 and a trigger 115 for activate a basic time management unit 116 which delivers clock signals at low cadence sk and at medium cadence mk, said unit 116 being connected to microcontroller 107, as indicated by the double arrow 117.
- the duration of signal transmission is of the order of 3 ns per meter of distance between the vehicle and the identification device I.
- the propagation time ⁇ would be around 30 ns.
- the response time of the electronic circuits which could be of the order of a few ns or tens of ns, depending on the bandwidth allocated to the carrier.
- the signal re-emitted RE by the identification device is received by a receiver 62 via an antenna 63, with an attenuation of the order of - 40 dBm, which represents an attenuation coefficient of 100 times, that is, the signal received by the vehicle has an amplitude of around 2 mV.
- the receiver 62 includes a radio frequency filter 64 connected to the antenna 63, the output signal is represented by line V3, this signal being delivered to the input of a logarithmic amplifier 65 which has a gain of 80 dB, which makes it possible to reach a multiplication coefficient ranging up to 10,000 times, and in particular to issue at the output of said amplifier 65 a signal of the order of 2V effective.
- the amplifier 65 is connected at the outlet to a branch between, on the one hand, a amplitude demodulator 66, which detects the envelope of the signal received, and, on the other hand, a phase demodulator 67.
- the envelope detector 66 outputs a digital signal shown on line V4, said signal being delivered to the input of the unit of the aforementioned time base management 60.
- the time base management unit 60 On reception of the anti-piracy bit received in return, the time base management unit 60 triggers the transmission of the following anti-piracy bit h2 with an offset corresponding to the useful bit time Tb + ⁇ , ⁇ corresponding to a low safety delay in order to avoid any overlap between the transmission and reception of signals by the vehicle.
- the reception of the anti-piracy bit in return by the vehicle triggers the next clock stroke at the rate fk as well as the switching of the all-or-nothing modulator 57, via the line V1.
- the small delay ⁇ is close to 0s.
- Each new clock stroke at the rate fk triggered by the reception of the previous anti-piracy bit causes the incrementation of a unit in a counter 68, which counter 68 counts the number of bits received as a function of time.
- the unit 60 sends a signal Fr to stop counting anti-piracy bits and to cause the counter 68 to send a representative signal the number of bits counted at the microcontroller 50, as indicated by arrow 69.
- the microcontroller 50 can calculate the real distance between the vehicle V and the identification device I, according to a table of correspondence previously memorized. If this distance exceeds the authorized distance, the communication is interrupted as being result of a hacking attempt or simply as being communication too far from the vehicle.
- This counter thus makes it possible to detect a hacking using relay boxes between the vehicle and the identification device.
- a hacker could try to trap this system by anticipating on the signal to be emitted by the identification device.
- the hacker detects the transmission with a relay box by the vehicle of an anti-piracy bit, it can cause the emission anticipation of a heel signal, as a preamble to the signal retransmission delayed by the delay line of the identification device.
- this heel signal would have a duration which would correspond to the signal propagation time over the additional distance between the identification device and the vehicle, in relation to the distance maximum allowed.
- the envelope detector 66 of the vehicle V would detect, first, the reception of this heel signal, causing in turn the early issuance of the second anti-piracy bit.
- the system according to the invention also allows, thanks to the counter 68, to determine whether the total number of anti-piracy bits has received successfully during a maximum reception window Fm, shown in Figure 5.
- the timing diagrams of Figures 5 to 9 correspond to a non-pirated signal transmission.
- the real end En of the reception of the anti-piracy bit stream is, in these figures, well located in the maximum reception window Fm, as represented in FIG. 5.
- the phase demodulator 67 delivers a signal representative of the goh function on line V9 which is connected to an input of a door exclusive OR logic 70.
- This logic gate 70 receives on its other input a signal V8 representative of the function h, delivered at the output of the digital self-timer 59.
- Logic gate 70 could be replaced by another type of mixer, as shown in Figure 3.
- the signal V8 corresponds to signal V7 with a delay corresponding to offset Dl of the analog retarder 103 of the identification device I.
- the logic gate 70 outputs a signal V10, which is representative of the offset between the V8 and V9 signals, i.e. a signal representative of the encrypted authentication signal g emitted by the identification device I, with a small offset corresponding to the signal propagation time which is equal to 2 ⁇ , as visible on the figure 8.
- the output of logic gate 70 is connected to a branch between, on the one hand, a low-pass filter 71 at the average rate mk which is the cadence corresponding to the signal g and, on the other hand, another exclusive OR logic gate 73.
- the low-pass filter 71 is connected to a buffer 72, which transforms said signal from cadence mk to cadence sk before sending it to the microcontroller 50 which will compare the signal g received from the authentication device with the g signal generated at vehicle level, for authentication of communication, which corresponds to the last step 10 illustrated on the diagram of figure 1.
- the microcontroller 50 delivers the signal g specific to the vehicle to a buffer memory 74 at the rate sk, so that it sends it back to the cadence mk at the other input of the aforementioned logic gate 73.
- a buffer memory 74 at the rate sk, so that it sends it back to the cadence mk at the other input of the aforementioned logic gate 73.
- the logic gate 73 mixes the V10 and V11 signals in order to output only the offsets due at the signal propagation time between vehicle V and the device identification I, as shown on line V12. Leaving the logic gate 73 is connected to the input of an integrator 75, which goes output a signal V13 which will go up by stairs in function of time, for each time slot C representative of the time of signal propagation.
- Line V13 is connected to the input of a unit 76 receiving on another input a threshold limit value 77 which corresponds to a maximum acceptable total propagation time n x 2 ⁇ ⁇ T max, with ⁇ corresponding to the propagation time over a authorized distance.
- a threshold limit value 77 which corresponds to a maximum acceptable total propagation time n x 2 ⁇ ⁇ T max, with ⁇ corresponding to the propagation time over a authorized distance.
- the integrator 75 makes it possible to detect a hacking attempt, even if the hacker adds a heel of anticipation to the signal re-issued by the identification device. Indeed, if this heel signal can trap the counter 68, however the logic gate 73 will interpret this signal-stub as a wrong signal at least with a chance on two, and therefore will output a slot equivalent to this heel signal, which niche will be added by the integrator 75 of the same so that for delays due to propagation time.
- microcontroller 50 can deliver different signals from output to the other vehicle components via track 80 shown on Figures 3 and 4.
- the intermediate clock rate mk is between 20 and 60 times lower than the rate fk.
- antennas 54 and 63 of the vehicle V could replace the antennas 54 and 63 of the vehicle V by a single antenna 82 shown in broken lines in FIG. 4, which antenna 82 would be connected to a diplexer 81 shown in broken lines in Figure 4, to switch between the reception mode and the transmission mode as appropriate.
- the diplexers 81 and 120 could thus communicate with each other, as indicated by the double arrow T.
- the central unit is connected to at least two, for example three, transmit / receive antennas such as the single antenna 82, arranged at several points in vehicle V. Distance measurements are then carried out sequentially between the identification device I and each of the vehicle's transmit / receive antennas V. These measurements distance are achieved via the propagation time ⁇ anti-piracy bits using the correspondence table mentioned above. In this variant, it is possible to locate precisely, for example a few centimeters or tens of centimeters, the position of the identification device I by a triangulation calculation performed by the central unit.
- the delay line 103 of the device of identification I allows to postpone the retransmission of each anti-piracy bit compared to its reception in order to use the same frequency radio for transmitting the corresponding signals in the direction from vehicle V to identification device I (arrow E or T) and in the direction from the identification device I to the vehicle V (arrow RE or T).
- the vehicle V receives from the device identification signal hos where s represents service data which modulate the signal h by phase inversion, like this was the case for the signal g whose length is less than that of signal h.
- the sequence of the anti-piracy bits h being a binary sequence random or pseudo-random, it results in a spread of the spectrum of radio frequency signals used to transmit it from the vehicle to the identification device and vice versa.
- This spread spectrum is all the more important as the modulation rate fk used for transmit the anti-piracy bit sequence h is high.
- Such spread spectrum is known to be advantageous from the point of view of signal robustness against interference and echoes multiple, which facilitates multiple signal transmissions, for example example the round trip of the signal between the vehicle and the device identification.
- the demodulation of the encrypted signal authentication level at the central unit of the vehicle is rendered all the more difficult as the spectrum of the signal RE is spread out.
- the arrangement of the delay line 103 for retransmitting the bits anti-piracy successive h delayed by a bit time useful as high rate modulation fk of the encrypted authentication signal g, itself being transmitted at the average rate mk, ensures as the corresponding demodulation key, i.e. the same random sequence of anti-piracy bits h, is always available at level of the central control unit upon reception of the signal RE, which allows the demodulation of the received RE signal regardless of the degree of spread of the spectrum of this signal.
- the robustness of the access system with respect to echoes multiples is ensured by the fact that the identification device I always reacts to the first signal received, which can only be the signal transmitted directly.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Selective Calling Equipment (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- la figure 1 est un schéma synoptique fonctionnel représentant le protocole d'encryptage pour sécuriser la transmission bidirectionnelle de données entre un véhicule et un dispositif d'identification ;
- la figure 2 est un schéma synoptique fonctionnel illustrant un moyen de piratage du système d'encryptage par l'intermédiaire de deux boítiers relais ;
- la figure 3 est un schéma synoptique fonctionnel simplifié d'un système d'accès mains libres conforme à l'invention ;
- la figure 4 est un schéma synoptique fonctionnel plus détaillé correspondant au schéma de la figure 3 ;
- la figure 5 représente plusieurs chronogrammes illustrant les trames complètes d'interrogation émises par le véhicule et reçues en réponse par le véhicule ;
- la figure 6 est une vue partielle et agrandie d'une portion des chronogrammes de la figure 5, indiquée par la flèche VI, correspondant au début de la séquence d'anti-piratage ;
- la figure 7 reprend les deux premiers chronogrammes de la figure 5 ;
- la figure 8 est une vue partielle et agrandie d'une portion des chronogrammes de la figure 7, indiquée par la flèche VIII, au cours de la séquence d'anti-piratage ; et
- la figure 9 est une vue partielle et agrandie d'une portion des chronogrammes de la figure 5, indiquée par la flèche IX, et correspondant à la fin de la procédure d'anti-piratage.
Claims (14)
- Système d'accès dit mains libres pour véhicule automobile (V), comportant un dispositif d'identification (I) destiné à être porté par un utilisateur (U) et apte à établir une communication bidirectionnelle à distance et sans fil avec une unité centrale de commande embarquée sur le véhicule, pour authentifier l'utilisateur et commander des moyens de condamnation/ décondamnation des serrures des ouvrants lorsque l'utilisateur a été reconnu authentique, ledit système étant apte à établir ladite communication bidirectionnelle lorsque le dispositif d'identification est situé à une distance inférieure à une distance limite prédéterminée du véhicule, caractérisé par le fait que ladite unité centrale est apte à engendrer, lors de la communication, un train de bits d'anti-piratage (h), chaque bit dudit train étant émis vers le dispositif d'identification (I) sous la forme d'un signal radio-fréquence représentatif dudit bit, de façon que lorsque le dispositif d'identification reçoit ledit signal, ce dernier est réémis par le dispositif d'identification avec un temps de retard (Dℓ) supérieur ou égal au temps d'émission utile (Tb) du bit, et que la réception par l'unité centrale de commande dudit signal réémis déclenche l'émission par l'unité centrale du signal représentatif du bit suivant dans ledit train, le nombre de bits émis ou reçus dudit train, étant compté par un compteur (68) de l'unité centrale, de façon que celle-ci compare ledit nombre et la durée réelle (Tt) correspondant à l'émission ou à la réception dudit nombre de bits, afin de déterminer, au-delà d'une valeur de seuil prédéterminée, une tentative de piratage provoquant l'arrêt de ladite communication.
- Système selon la revendication 1, caractérisé par le fait que ladite valeur de seuil prédéterminée est donnée par une fenêtre de temps (Fm) qui correspond à la durée totale théorique d'émission du train de bits d'anti-piratage, lorsque le dispositif d'identification (I) est à une distance inférieure ou égale à la distance limite prédéterminée, et l'unité centrale de commande est apte à déterminer ladite tentative de piratage lorsque le nombre total de bits du train d'anti-piratage n'a pas été émis ou reçu par l'unité centrale de commande dans ladite fenêtre.
- Système selon la revendication 1 ou 2, caractérisé par le fait que l'unité centrale comporte en mémoire une table de correspondance à double entrée, à savoir le nombre de bits émis et la durée d'émission réelle correspondante, pour donner en sortie la distance réelle entre le dispositif d'identification et l'unité centrale, les données de ladite table étant préalablement acquises par expérimentation et pouvant être périodiquement réactualisées.
- Système selon l'une des revendications 1 à 3, caractérisé par le fait que le comptage du nombre de bits émis est arrêté lorsque l'unité centrale détecte la réception du dernier bit (hn) du train d'anti-piratage.
- Système selon l'une des revendications 1 à 4, caractérisé par le fait que le dispositif d'identification (I) comporte une ligne à retard analogique (103) pour réémettre le signal reçu du véhicule (V) vers le véhicule avec un temps de retard prédéterminé (D ℓ).
- Système selon l'une des revendications 1 à 5, caractérisé par le fait que l'unité centrale de commande comporte un oscillateur (55) générateur d'ondes porteuses en radio fréquence, relié à un modulateur de phase (56), qui est commandé par le train de bits d'anti-piratage (h) engendré par l'unité centrale du véhicule (V).
- Système selon l'une des revendications 1 à 6, caractérisé par le fait que le train de bits d'anti-piratage (h) est engendré par l'unité centrale après l'émission des données d'authentification cryptées (R,f) vers le dispositif d'identification (I).
- Système selon la revendication 7, caractérisé par le fait que le dispositif d'identification I comporte un inverseur de phase (109) pour inverser sélectivement la phase du signal représentatif des bits d'anti-piratage reçu par le dispositif d'identification en provenance du véhicule (V), ledit inverseur étant commandé, pour chaque bit d'anti-piratage, par un signal numérique d'authentification crypté (g) de réponse du dispositif d'identification, à une cadence plus lente (mk) que celle (fk) du train de bits d'anti-piratage.
- Système selon la revendication 8, caractérisé par le fait que l'unité centrale du véhicule (V) comporte un démodulateur de phase (67) pour démoduler le signal reçu par le véhicule en provenance du dispositif d'identification (I), une porte logique OU exclusif (70) dont les entrées sont reliées respectivement audit démodulateur de phase et à un retardateur de signal numérique (59), ledit retardateur étant apte à retarder d'un temps bit utile (Tb) chaque bit du train d'anti-piratage (h) engendré par l'unité centrale, ladite porte logique étant apte à délivrer en sortie un signal numérique (V10) représentatif du signal crypté de réponse du dispositif d'identification.
- Système selon la revendication 9, caractérisé par le fait que le signal (V10) délivré en sortie de la porte logique OU exclusif (70) précitée est comparé par l'unité centrale à un signal numérique crypté d'authentification (g) engendré par l'unité centrale, afin d'authentifier le dispositif d'identification (I).
- Système selon la revendication 9 ou 10, caractérisé par le fait que la sortie de ladite porte logique OU exclusif (70) est reliée à une entrée d'une deuxième porte logique OU exclusif (73) dont l'autre entrée reçoit un signal numérique crypté d'authentification (g) engendré par l'unité centrale, afin de délivrer en sortie un signal (V12) représentatif des décalages temporels successifs de chaque bit du train d'anti-piratage, ce dernier signal étant reçu à l'entrée d'un intégrateur (75) pour faire la somme des temps de réponse liés à chaque créneau (C) de décalage de bit d'anti-piratage, la sortie dudit intégrateur étant reliée à un comparateur (76) pour comparer ladite somme de temps de réponse avec une valeur de durée limite prédéterminée (77), au-delà de laquelle est détectée une tentative de piratage.
- Système selon l'une des revendications 1 à 11, caractérisé par le fait que le signal en provenance du dispositif d'identification (I) est reçu par l'unité centrale et transmis à l'entrée d'un détecteur d'enveloppe (66) pour détecter le front montant dudit signal, la détection de ce front montant étant apte à déclencher, d'une part, l'incrémentation d'une unité du compteur de nombre de bits (68) et, d'autre part, l'émission du bit suivant dans le train de bits d'anti-piratage, après une durée prédéterminée qui correspond à un temps bit utile éventuellement augmenté d'un temps supplémentaire (ε) pour éviter toute interférence entre l'émission et la réception du signal par l'unité centrale.
- Système selon la revendication 12, caractérisé par le fait que l'unité centrale comporte un modulateur (57) dit tout ou rien pour faire basculer l'unité centrale dans le mode émission ou réception des signaux vers ou en provenance du dispositif d'identification (I), ledit modulateur tout ou rien étant commandé par la détection du front montant du signal reçu en provenance du dispositif d'identification.
- Système selon l'une des revendications 1 à 13, caractérisé par le fait que le dispositif d'identification comporte un récepteur (102) pour recevoir des signaux d'éveil (e) à faible cadence ( sk), ce récepteur comprenant successivement un détecteur d'enveloppe statique radio-fréquence à faible seuil (104) et un amplificateur basse fréquence (105).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0005626 | 2000-05-03 | ||
FR0005626A FR2808549B1 (fr) | 2000-05-03 | 2000-05-03 | Systeme d'acces dit mains libres pour vehicule automobile |
Publications (3)
Publication Number | Publication Date |
---|---|
EP1152108A2 true EP1152108A2 (fr) | 2001-11-07 |
EP1152108A3 EP1152108A3 (fr) | 2001-12-05 |
EP1152108B1 EP1152108B1 (fr) | 2005-10-05 |
Family
ID=8849829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20010401095 Expired - Lifetime EP1152108B1 (fr) | 2000-05-03 | 2001-04-27 | Système d'accès dit mains libres pour véhicule automobile |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1152108B1 (fr) |
DE (1) | DE60113762T2 (fr) |
FR (1) | FR2808549B1 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10158200A1 (de) * | 2001-11-28 | 2003-06-12 | Kostal Leopold Gmbh & Co Kg | Verfahren zum Durchführen einer schlüssellosen Zugangsberechtigungskontrolle bei einem Kraftfahrzeug |
WO2004036242A1 (fr) * | 2002-10-12 | 2004-04-29 | Conti Temic Microelectronic Gmbh | Procede de determination de la distance entre deux stations emettrices-receptrices et stations emettrices-receptrices correspondantes |
WO2006035361A1 (fr) | 2004-09-30 | 2006-04-06 | Koninklijke Philips Electronics N. V. | Systeme de communication electronique, en particulier systeme de controle d'acces pour entree passive sans cle, et procede de detection d'une attaque a relais dans le systeme |
EP3306576A1 (fr) * | 2016-10-05 | 2018-04-11 | The Swatch Group Research and Development Ltd | Procede et systeme d'acces securise a un espace determine au moyen d'un objet portable |
WO2021021025A1 (fr) * | 2019-07-30 | 2021-02-04 | Ams Sensors Singapore Pte. Ltd. | Authentification de proximité par l'intermédiaire d'un temps de vol |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AT516569A1 (de) * | 2014-11-20 | 2016-06-15 | Evva Sicherheitstechnologie | Verfahren und Vorrichtung zur Zutrittskontrolle |
US10933867B2 (en) * | 2019-05-10 | 2021-03-02 | Arnouse Digital Devices Corporation | Artificial intelligence based collision avoidance system and method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0676650A2 (fr) * | 1994-04-06 | 1995-10-11 | Daimler-Benz Aerospace Aktiengesellschaft | Méthode de mesure de distance à l'aide d'une liaison radio, et appareil de mise en oeuvre de la méthode |
FR2781076A1 (fr) * | 1998-07-09 | 2000-01-14 | Valeo Securite Habitacle | Systeme de securite pour un vehicule automobile comportant des moyens de mesure de la duree d'un echange de donnees |
WO2000012848A1 (fr) * | 1998-09-01 | 2000-03-09 | Leopold Kostal Gmbh & Co. Kg | Procede pour effectuer un controle d'autorisation d'acces sans cle, et unite de controle d'autorisation d'acces sans cle |
EP0992408A2 (fr) * | 1998-10-10 | 2000-04-12 | DaimlerChrysler AG | Procédé permettant de réaliser l'autorisation d'accès pour un véhicule à moteur |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4003280C5 (de) * | 1990-02-03 | 2007-06-28 | Bayerische Motoren Werke Ag | Sicherheitseinrichtung für Kraftfahrzeuge |
-
2000
- 2000-05-03 FR FR0005626A patent/FR2808549B1/fr not_active Expired - Fee Related
-
2001
- 2001-04-27 EP EP20010401095 patent/EP1152108B1/fr not_active Expired - Lifetime
- 2001-04-27 DE DE2001613762 patent/DE60113762T2/de not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0676650A2 (fr) * | 1994-04-06 | 1995-10-11 | Daimler-Benz Aerospace Aktiengesellschaft | Méthode de mesure de distance à l'aide d'une liaison radio, et appareil de mise en oeuvre de la méthode |
FR2781076A1 (fr) * | 1998-07-09 | 2000-01-14 | Valeo Securite Habitacle | Systeme de securite pour un vehicule automobile comportant des moyens de mesure de la duree d'un echange de donnees |
WO2000012848A1 (fr) * | 1998-09-01 | 2000-03-09 | Leopold Kostal Gmbh & Co. Kg | Procede pour effectuer un controle d'autorisation d'acces sans cle, et unite de controle d'autorisation d'acces sans cle |
EP0992408A2 (fr) * | 1998-10-10 | 2000-04-12 | DaimlerChrysler AG | Procédé permettant de réaliser l'autorisation d'accès pour un véhicule à moteur |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10158200A1 (de) * | 2001-11-28 | 2003-06-12 | Kostal Leopold Gmbh & Co Kg | Verfahren zum Durchführen einer schlüssellosen Zugangsberechtigungskontrolle bei einem Kraftfahrzeug |
WO2004036242A1 (fr) * | 2002-10-12 | 2004-04-29 | Conti Temic Microelectronic Gmbh | Procede de determination de la distance entre deux stations emettrices-receptrices et stations emettrices-receptrices correspondantes |
WO2006035361A1 (fr) | 2004-09-30 | 2006-04-06 | Koninklijke Philips Electronics N. V. | Systeme de communication electronique, en particulier systeme de controle d'acces pour entree passive sans cle, et procede de detection d'une attaque a relais dans le systeme |
JP2008515315A (ja) * | 2004-09-30 | 2008-05-08 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 電子通信システム、特に受動キーレスエントリ用のアクセス制御システム、並びにこれに対する中継攻撃の検出方法 |
EP3306576A1 (fr) * | 2016-10-05 | 2018-04-11 | The Swatch Group Research and Development Ltd | Procede et systeme d'acces securise a un espace determine au moyen d'un objet portable |
JP2018059395A (ja) * | 2016-10-05 | 2018-04-12 | ザ・スウォッチ・グループ・リサーチ・アンド・ディベロップメント・リミテッド | 装着可能物体により決定空間へ安全にアクセスする方法及びシステム |
US10227059B2 (en) | 2016-10-05 | 2019-03-12 | The Swatch Group Research And Development Ltd | Process and system for secure access to a determined space by means of a wearable object |
WO2021021025A1 (fr) * | 2019-07-30 | 2021-02-04 | Ams Sensors Singapore Pte. Ltd. | Authentification de proximité par l'intermédiaire d'un temps de vol |
KR20220012914A (ko) * | 2019-07-30 | 2022-02-04 | 에이엠에스 센서스 싱가포르 피티이. 리미티드. | 비행 시간을 통한 근접의 인증 |
CN114026901A (zh) * | 2019-07-30 | 2022-02-08 | ams传感器新加坡私人有限公司 | 通过飞行时间认证邻近性 |
TWI756762B (zh) * | 2019-07-30 | 2022-03-01 | 新加坡商Ams傳感器新加坡私人有限公司 | 透過飛行時間鑑認一第一裝置與一第二裝置之間鄰近性的系統及方法 |
CN114026901B (zh) * | 2019-07-30 | 2023-12-19 | 艾迈斯-欧司朗亚太私人有限公司 | 通过飞行时间认证邻近性 |
US12013925B2 (en) | 2019-07-30 | 2024-06-18 | Ams Sensors Singapore Pte. Ltd. | Authenticating proximity via time-of-flight |
Also Published As
Publication number | Publication date |
---|---|
EP1152108B1 (fr) | 2005-10-05 |
EP1152108A3 (fr) | 2001-12-05 |
FR2808549A1 (fr) | 2001-11-09 |
DE60113762T2 (de) | 2006-07-13 |
DE60113762D1 (de) | 2006-02-16 |
FR2808549B1 (fr) | 2003-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3306576B1 (fr) | Procédé et système d'accès securisé à un espace déterminé au moyen d'un objet portable | |
EP1001117B1 (fr) | Système pour sécuriser une transmission bidirectionnelle de données pour l'accès a un espace clos, en particulier pour l'accès a un véhicule | |
EP2517147B1 (fr) | Procede de protection dans une communication radiofrequence sans contact | |
EP1152109B1 (fr) | Système pour le démarrage et/ou l'accès mains libres d'un véhicule automobile | |
FR2794603A1 (fr) | Procede de transmission bidirectionnelle de donnees, et systeme pour sa mise en oeuvre | |
EP1152108B1 (fr) | Système d'accès dit mains libres pour véhicule automobile | |
WO2018154211A1 (fr) | Détection de présence d'une main humaine sur un ouvrant de véhicule | |
FR2745539A1 (fr) | Procede de commande d'un dispositif antivol et dispositif antivol commande par un tel procede | |
WO2006082310A1 (fr) | Procede de pre-authentification rapide par reconnaissance de la distance | |
EP1407426A1 (fr) | Procede de deverrouillage "sans cle" d'une porte d'acces a un espace clos | |
EP1152107B1 (fr) | Systéme a anti-piratage pour l'accès mains libres d'un véhicule automobile | |
EP3301838B1 (fr) | Procédé et système de determination d'une distance entre un objet portable et une station de base | |
FR2793562A1 (fr) | Systeme securise pour la commande du deverrouillage d'au moins un ouvrant de vehicule automobile | |
EP1348204B1 (fr) | Systeme de detection du passage d'individus ou objets par une entree-sortie a un espace delimite | |
EP1378865B1 (fr) | Procédé de contrôle d'accès d'un objet portable personnalisé à un espace déterminé, et objet portable pour la mise en oeuvre du procédé | |
EP1378864A1 (fr) | Procédé de controle d'accès d'un objet portable personnalisé à un espace déterminé, et objet portable pour la mise en oeuvre du procédé | |
WO1999066451A1 (fr) | Objet portatif a communication sans contact suivant deux voies de communication, inductive et hertzienne | |
EP1178169B1 (fr) | Procédé anti-piratage de commande à distance pour véhicule automobile et système pour sa mise en oeuvre | |
EP1061211B1 (fr) | Procédé pour sécuriser une transmission bidirectionnelle de données avec un identifiant et système pour sa mise en oeuvre | |
EP0661853A1 (fr) | Procédé de démodulation de phase notamment pour péages automatiques | |
WO2025002995A1 (fr) | Système radar de localisation pour l'accès à un véhicule automobile | |
WO2021176006A1 (fr) | Procede de communication et de localisation en continu ultra haute fréquence d'un dispositif portable d'accès « mains libres » à un véhicule automobile | |
EP1326195A1 (fr) | Procédé d'émission d'une requête vers un badge | |
WO2020120445A1 (fr) | Procédé d'estimation de la distance séparant un dispositif d'authentification d'un véhicule automobile | |
CH693835A5 (fr) | Procédé de gestion de titres de transport électroniques et installation pour sa mise en oeuvre. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): DE FR GB IT SE Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
17P | Request for examination filed |
Effective date: 20011219 |
|
17Q | First examination report despatched |
Effective date: 20020502 |
|
AKX | Designation fees paid |
Free format text: DE FR GB IT SE |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB IT SE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20051005 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060105 |
|
REF | Corresponds to: |
Ref document number: 60113762 Country of ref document: DE Date of ref document: 20060216 Kind code of ref document: P |
|
GBV | Gb: ep patent (uk) treated as always having been void in accordance with gb section 77(7)/1977 [no translation filed] |
Effective date: 20051005 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20060706 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20090428 Year of fee payment: 9 Ref country code: FR Payment date: 20090417 Year of fee payment: 9 Ref country code: IT Payment date: 20090423 Year of fee payment: 9 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20101230 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101103 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100427 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100430 |