专利摘要:
A method of controlling access to a vehicle (12) includes: storing, in the vehicle-based system (14), a GPS location (V) of the vehicle (12) associated with the location in which the vehicle (12) is parked; communicating, via the vehicle-based system (14), with a mobile device (16) to obtain a GPS location (M) of the mobile device (16); and - blocking, via the vehicle-based system (14), entry into the vehicle (12) if the GPS location (M) of the mobile device (16) is outside a predetermined distance the stored GPS location (V) of the vehicle (12). A system (10) for controlling access to the vehicle (12) is further shown. Figure 2
公开号:FR3076970A1
申请号:FR1872050
申请日:2018-11-29
公开日:2019-07-19
发明作者:Mark Baker;Xing Ping Lin
申请人:TRW Automotive US LLC;
IPC主号:
专利说明:

Description
Title of the invention: Method for controlling access to a vehicle and system for controlling access to a vehicle [0001] The invention relates to a method for controlling access to a vehicle, in particular keyless entry into a vehicle, as well as a vehicle access control system, in particular a vehicle keyless entry system.
It is known that remote keyless entry systems (English: Remote Keyless Entry - RKE) or passive keyless entry systems (English: Passive Keyless Entry - PKE) for vehicles can be subject to attacks called relay attack flights. Such a scenario known from the state of the art is shown in FIG. 1.
The keyless entry system for a vehicle 1 comprises a low frequency base station 2 (LF) and a radio frequency receiver (RF) 3 in the vehicle 1.
In addition, the system includes a security token 4, for example a keychain having an LF receiver 5 and an RF transmitter 6.
Under normal circumstances, when a user carrying the security token 4 approaches his vehicle 1 and lifts the door handle, the door handle triggers the base station 2 low frequency to create an LF field with specific information. The LF field leads to the receiver BF 5 of the security token 4 being switched on and receiving the information from the base station 2 via the LF field.
The information or an appropriate response to the information is / is transmitted (s) by the RF transmitter 6 as a message to the RF receiver 3 of the vehicle 1. After checking the message, that is to say from information or response, access is granted and the vehicle is unlocked.
As shown in Figure 1, a relay attack with two thieves T1, T2 can be performed. The two thieves T1, T2 have LF / RF devices 7, 8 which communicate with each other.
The first thief Tl is close to the vehicle 1 and the second thief T2 is close to the user U of the vehicle.
The first Tl thief approaches vehicle 1 and lifts the door handle to initiate the usual entry procedure. The LF / RF device 7 of the first thief Tl receives the information transmitted by the base station LF 2 in the LF field and sends this message to the corresponding LF / RF device 8 of the second thief T2.
The LF / RF device 8 of the second thief T2 in turn generates the same LF field with the same information as the vehicle 1, but close to the user U so that the security token 4 of the user U performs the same steps as if it were close to vehicle 1.
The second thief T2 with his LL / RL device 8 receives the information or the RL response transmitted by the transmitter RL 6 of the security token 4 and retransmits this information to the LL / RL device 7 of the first thief Tl.
The LL / RL 7 device of the first thief Tl then sends the same information or the same RL response to the receiver RL 3 of the vehicle 1.
For vehicle 1, it seems that the security token 4 is located near the vehicle 1, and therefore the vehicle is unlocked even if the user U is far from the vehicle 1.
The object of the invention therefore consists in providing a method and a system for controlling access to a vehicle which prevent a relay attack on a vehicle, without limiting the comfort of the keyless entry system.
For this purpose, there is provided a method of controlling access to a vehicle, in particular the keyless entry into the vehicle. The process includes:
- providing a vehicle-based system comprising a transceiver operatively connected to a vehicle control module; and [0017] - providing a mobile device having a GPS module and a wireless communication module;
- store, in the vehicle-based system, a GPS location of the vehicle associated with the location in which the vehicle is parked;
- communicate, via the vehicle-based system, with the mobile device via the transceiver and the wireless communication module to obtain a GPS location of the mobile device; and - blocking, via the vehicle-based system, entry into the vehicle if the GPS location of the mobile device is outside a predetermined distance from the stored GPS location of the vehicle.
By blocking access to the vehicle when the mobile device is outside the predetermined distance, relay attacks can be successfully avoided. Even if the transmission between the vehicle and the mobile device were relayed, the location of the mobile device would still be outside the predetermined distance. Thus, relay attacks are effectively prevented.
The mobile device can be a cell phone for GPS and Bluetooth, a tablet, a laptop or the like. In addition, the mobile device can belong to an authorized user of the vehicle.
The predetermined distance can be the distance from the operating range of the transceiver and / or the base station.
The process steps mentioned are for example carried out by the vehicle control module.
In order to determine the location of the mobile device with precision, the method comprises the following additional steps:
- send instructions to the mobile device via the transceiver and the wireless communication module requesting the GPS location of the mobile device, [0027] - determine the GPS location of the mobile device using the GPS module, and [0028] - transmitting the GPS location of the mobile device to the vehicle control module via the wireless communication module and the transceiver.
The method includes, for example, also determining, via the vehicle-based system, when the vehicle is parked, so that the GPS location of the vehicle associated with the location in which the vehicle parked can be determined immediately.
In one embodiment of the invention, the method comprises the following additional steps to ensure rapid access to the car:
- receive an input request from the vehicle control module;
- authorize entry into the vehicle if at least the GPS location of the mobile device is at a distance less than the predetermined distance from the stored GPS location of the vehicle.
Communication to obtain a GPS location of the mobile device can be initiated during the entry request in order to reduce the time required to grant access.
In another embodiment of the invention, the method comprises the following additional steps:
- the vehicle-based system has a base station in the vehicle made so as to generate an electromagnetic field having a first frequency, and having a receiver for receiving transmissions having a second frequency;
- Providing a security token, in particular a keychain, comprising a receiver for the electromagnetic field having the first frequency and a transmitter for transmissions having the second frequency;
- Generate the electromagnetic field having the first frequency by means of the base station and receive the electromagnetic field by means of the security token;
- transmitting, by means of the security token, a message to the vehicle-based system via the transmitter of the security token and the receiver of the vehicle-based system;
- check the message through the vehicle control module; and [0040] - authorize entry into the vehicle if at least the verification has been successful and if the GPS location of the mobile device is at a distance less than the predetermined distance from the stored GPS location of the vehicle.
Thus, access to the vehicle can be granted without a key.
The first frequency and the second frequency may be the same.
The security token can for example be a keychain, in particular a remote keyless entry system (RKE) or a passive keyless entry system (PKE).
Communication to obtain the GPS location of the mobile device can also be initiated after a successful verification of the message in order to reduce unnecessary requests to the mobile device.
The first frequency is preferably lower than the second frequency, the first frequency being in particular a low frequency and the second frequency being a radiofrequency, which provides a robust method.
The low frequency can be between 20 kHz and 150 kHz, in particular be 125 kHz or 130 kHz. The radiofrequency is for example a UHE frequency, in particular of 315 MHz, 433 MHz or 868 MHz.
The security token receiver is for example a REID receiver or a REID transponder, so that a power source is not necessary for the security token.
In one aspect of the invention, the input request is generated when using a vehicle door handle or when a proximity sensor detects the proximity of a person at a vehicle door, so no further action by the vehicle user is required.
To further improve the safety of the process, the process includes the following additional steps:
- check if the mobile device is authenticated with the vehicle control module, and - block entry into the vehicle if the mobile device is not authenticated with the vehicle control module.
To this end, there is further provided a system for controlling access to a vehicle, in particular a vehicle keyless entry system. The system includes a vehicle-based system comprising a transceiver operatively connected to a vehicle control module, a mobile device and optionally a security token, the mobile device, the vehicle-based system and the token optional security being carried out so as to jointly execute a method as described above.
The characteristics and advantages discussed in the context of the method also apply to the system.
Other features and advantages of the invention will emerge from the description which follows and from the accompanying drawings to which reference is made. In the drawings:
- Figure 1 shows schematically a vehicle keyless entry system according to the prior art, - Figure 2 schematically shows a system for controlling access to a vehicle according to the invention , and [0057] - Figure 3 shows a flow diagram of a method of controlling access to a vehicle according to the invention.
FIG. 1 shows a system 10 for controlling access to a vehicle 12, comprising a system 14 based on a vehicle, a mobile device 16 and a security token 18.
The vehicle 12 can be a passenger car, a truck, a bus or the like. In the embodiment shown, the vehicle 12 is a passenger car having doors 20 with door locks 22, a navigation system 24, an infotainment system 26 and the system 14 based on the vehicle.
The navigation system 24 may include a GPS receiver 28.
The infotainment system 26 may include a transceiver 30, for example a Bluetooth transceiver capable of communicating through the Bluetooth protocol.
The system 14 based on a vehicle comprises a vehicle control module 32, a base station 34 and a receiver 36.
The vehicle control module 32 is connected to the door locks 22 of the doors
20, the transceiver 30 of the infotainment system 26, the GPS receiver 28 of the navigation system 24, the base station 34 and the receiver 36. The connection is functional so that the vehicle control module 32 is made so as to control the components mentioned.
The GPS receiver 28 and the transceiver 30 can thus also be considered as part of the system 14 based on a vehicle.
The GPS receiver 28 and the transceiver 30 of the system 14 based on a vehicle can of course be separated from the navigation system 24 and the infotainment system 26, respectively.
The base station 34 is for example a low frequency base station capable of generating a low frequency field near the vehicle 12. The low frequency field can have a first frequency fp [0068] The receiver 36 is made so to receive transmissions at a second frequency f 2 . The receiver 36 is for example a radio frequency receiver.
The first frequency f b, that is to say the low frequency, can be between 12 kHz and 150 kHz, the first frequency fi can in particular be 125 kHz or 130 kHz.
The second frequency f 2 , for example the radiofrequency, can be a UHE frequency, in particular of 315 MHz, 433 MHz or 868 MHz.
It is of course also possible that the first frequency fi and the second frequency f 2 are identical frequencies. In this case, the base station 34 and the receiver 36 can be an individual transceiver.
The security token 18 can be a key chain, in particular a key chain for a remote keyless entry system (RKE) or a passive keyless entry system (PKE).
The security token 18 comprises a receiver 38 for the electromagnetic field having the first frequency f b and a transmitter for transmitting a signal having the second frequency f 2 .
In the embodiment shown, the receiver 38 is therefore a low frequency receiver and the transmitter 40 a radio frequency transmitter.
The receiver 38 is for example an RFID receiver or an RFID transponder.
The mobile device 16 is for example a mobile phone, a tablet, a laptop or the like. The mobile device 16 comprises a wireless communication module 42, for example a Bluetooth module, and a GPS module 44.
In addition, the mobile device 16 may belong to an authorized user of the vehicle.
The mobile device 16 is authenticated with the vehicle control module
32, that is to say that this specific mobile device 16 has been registered as a reliable device with the vehicle control module 32.
The vehicle 12 may further include a proximity sensor 46 as part of the system 14 based on a vehicle, which is made so as to detect the proximity of a person to one of the doors 20 of the vehicle 12 .
When a user wishes to have access to the vehicle 12, he approaches the vehicle 12 carrying the security token 18 and the mobile device 16 previously authenticated with the vehicle control module 32.
The method for obtaining access to vehicle 12 is shown in the form of a flow diagram in FIG. 3.
When the user uses a door handle from one of the doors 20, an input request is generated and received by the vehicle control module 32 (step SI).
As an alternative or in addition, the entry request can also be generated by the proximity sensor 46 when the proximity sensor detects that the user is near one of the doors 20 of the vehicle 12.
When receiving the entry request, the vehicle control module 32 performs two actions.
On the one hand, in step S2, communication with the mobile device 16 is initiated, and instructions are sent by the vehicle control module 32 to the mobile device 16 through Γ through the transceiver 30 and the wireless communication module 42, for example using the Bluetooth protocol.
With the instructions, the mobile device 16 is responsible for determining its GPS location, that is to say the GPS location M of the mobile device using the GPS module 44 of the mobile device 16 (step S3).
In step S4, the mobile device transmits the GPS location M of the mobile device to the vehicle control module 32 via the wireless communication module 42 and the transceiver 30 (step S4 ).
In step S5, the GPS location V of the vehicle 12 is determined, for example using the GPS receiver 28.
Step S5 may already have been executed beforehand, for example, as soon as it has been determined by the system 14 based on a vehicle that the vehicle 12 is parked.
In step S6, the vehicle control module 32 compares the GPS location V of the vehicle 12 with the GPS location M of the mobile device 16 and determines if the mobile device 16 is outside the predetermined distance of vehicle 12 or not.
The predetermined distance can be the same as the operating range of the transceiver 30 and / or of the base station 34.
If the mobile device 16 is outside the predetermined distance, the vehicle control module 32 blocks the access or entry of the user to / into the vehicle 12 because it is assumed that the actual user of the vehicle 12 is not the person trying to access vehicle 12.
If the mobile device 16 is located at a distance less than the predetermined distance from the GPS V location of the vehicle 12, access or entry can be authorized.
During steps SI to S6, the vehicle control module 32 can also check whether the mobile device 16 which has been asked to send its GPS location or which will be asked to send its GPS location is authenticated with the control module of vehicle 32 (step S7).
If this specific mobile device 16 is not authenticated, that is to say if the mobile device 16 is not listed as a reliable device with the vehicle control module 32, entry into the vehicle 12 is blocked.
If the mobile device 16 is authenticated, entry into the vehicle 12 can then be granted.
After determining that access can be granted, or immediately after receipt of the entry request, the vehicle control module 32 controls the base station 34 so that it creates an electromagnetic field at the first frequency fi which includes specific information (step S8).
The electromagnetic field is received by the security token 18, more precisely the receiver 38 of the security token 18, and in response to the reception of the electromagnetic field, the security token 18 transmits a message to the system 14 based on a vehicle (step S9).
The message can include information relating to the electromagnetic field or an appropriate response to this information.
The message is sent via the transmitter 40 of the security token 18 as a signal at the second frequency f 2 , for example as a radio frequency transmission.
The message is received by the receiver 36 of the vehicle-based system 14 and is sent to the vehicle control module 32.
In the following step S10, the message is checked by the vehicle control module 32, and access to the vehicle can be granted if the check has been successful. Otherwise, the access, that is to say the entry into the vehicle 12 is blocked by the vehicle control module 32.
The method of generating the electromagnetic field at the first frequency f b for generating a message in response by means of the security token 18 and for verifying this message, is in itself known in the state of the art concerning keyless entry systems or passive entry systems and may include cryptographic steps which are omitted in this description for reasons of clarity.
In the next step SI 1, the vehicle control module 32 determines that access to the vehicle 12 must be granted if it has been determined in the preceding steps that the GPS location M of a mobile device 16 authenticated is located at a distance less than the predetermined distance from the stored GPS location V of the vehicle 12, and if the message from the security token 18 has been successfully verified.
Then, in step S12, the vehicle control module 32 controls the door locks 22 so as to unlock the doors 20 of the vehicle 12. The user can then access and enter the vehicle 12.
Thus, the relay attacks explained above are avoided by requiring that the mobile device be close to the vehicle.
权利要求:
Claims (1)
[1" id="c-fr-0001]
[Claim 4]
claims
Method for controlling access to a vehicle (12), in particular the keyless entry into a vehicle, comprising:
- providing a vehicle-based system (14) comprising a transceiver (30) operatively connected to a vehicle control module (32); and
- providing a mobile device (16) having a GPS module (44) and a wireless communication module (42);
- memorize, in the system (14) based on a vehicle, a GPS location (V) of the vehicle (12) associated with the location in which the vehicle (12) is parked;
- communicating, via the system (14) based on a vehicle, with the mobile device (16) via the transceiver (30) and the wireless communication module (42) to obtain a GPS location (M) of the mobile device (16); and
- blocking, via the vehicle-based system (14), entry into the vehicle (12) if the GPS location (M) of the mobile device (16) is outside a predetermined distance of the stored GPS location (V) of the vehicle (12).
Method according to claim 1, comprising the following additional steps:
- send instructions to the mobile device (16) via the transceiver (30) and the wireless communication module (42) requesting the GPS location (M) of the mobile device (16),
- determine the GPS location (M) of the mobile device (16) using the GPS module (44), and
- transmit the GPS location (M) of the mobile device (16) to the vehicle control module (32) via the wireless communication module (42) and the transceiver (30).
The method of claim 1 or 2, comprising the step of determining, via the vehicle-based system (14), when the vehicle (12) is parked.
Method according to one of the preceding claims, comprising the following additional steps:
- receive an input request from the vehicle control module (32);
- authorize entry into the vehicle (12) if at least the GPS location [Claim 5] [Claim 6] [Claim 7] [Claim 8] [Claim 9] (M) of the mobile device (16) is a distance less than the predetermined distance from the stored GPS location (V) of the vehicle (12).
The method of claim 4, wherein the communication to obtain the GPS location (M) of the mobile device (16) is initiated upon the request for entry.
Method according to claim 4 or 5, comprising the following additional steps:
- the system (14) based on a vehicle has a base station (34) in the vehicle (12) produced so as to generate an electromagnetic field having a first frequency (fi), and having a receiver (36) for receiving transmissions having a second frequency (f 2 );
- providing a security token (18), in particular a keychain, comprising a receiver (38) for the electromagnetic field having the first frequency (f x ) and a transmitter (40) for transmissions having the second frequency (f 2 );
- generating the electromagnetic field having the first frequency (fi) by means of the base station (34) and receiving the electromagnetic field by means of the security token (18);
- transmitting, by means of the security token (18), a message to the system (14) based on a vehicle via the transmitter (40) of the security token (18) and the receiver (36) of the system (14) based on a vehicle;
- check the message via the vehicle control module (32); and
- authorize entry into the vehicle (12) if at least the verification has been successful and if the GPS location (M) of the mobile device (16) is at a distance less than the predetermined distance from the GPS location (V ) stored in the vehicle (12).
Method according to claim 6, in which the first frequency (f J is less than the second frequency (f 2 ), in particular in which the first frequency (f J is a low frequency and the second frequency (f 2 ) is a radio frequency .
The method of claim 6 or 7, wherein the receiver (38) of the security token (18) is an RFID receiver or an RFID transponder. Method according to one of Claims 6 to 8, in which the entry request is generated when a door handle of the [Claim 10] [Claim 11] vehicle (12) is used or when a proximity (46) detects the proximity of a person at a door (20) of the vehicle (12).
Method according to one of the preceding claims, comprising the following additional steps:
- check whether the mobile device (16) is authenticated with the vehicle control module (32), and
- block entry into the vehicle (12) if the mobile device (16) is not authenticated with the vehicle control module (32). Vehicle access control system (12), in particular vehicle keyless entry system, comprising:
a vehicle-based system (14) comprising a transceiver (30) operatively connected to a vehicle control module (32), a mobile device (16) and optionally a security token (18), the mobile device (16), the vehicle-based system (14) and the optional security token (18) being produced so as to jointly execute a method according to one of the preceding claims.
类似技术:
公开号 | 公开日 | 专利标题
FR3076970A1|2019-07-19|Method of controlling access to a vehicle and system for controlling access to a vehicle
US9710983B2|2017-07-18|Method and system for authenticating vehicle equipped with passive keyless system
EP2621769B1|2020-09-02|Method of pairing of a mobile phone with a motor vehicle and a lock / unlock set
US10885731B2|2021-01-05|Mobile telephone capable of automatically pairing with a motor vehicle, and automatic pairing method
EP2969667B1|2017-09-20|Method of making a vehicle available and corresponding system for making a vehicle available
US9783158B2|2017-10-10|System and method for on-demand passive entry disable
EP2381392B1|2015-11-04|Device for locking and immobilising an automobile
FR3021798A1|2015-12-04|MOBILE TELEPHONE FOR ACCESSING AND / OR STARTING A MOTOR VEHICLE
US20100148923A1|2010-06-17|Vehicle on-board biometric authentication system
JP5626627B2|2014-11-19|Control system
FR2905817A1|2008-03-14|METHOD AND SERVICE CENTER FOR UPDATING AUTHORIZATION DATA IN AN ACCESS DEVICE.
US10399543B2|2019-09-03|Method for releasing one or more functions in a vehicle
FR2857316A1|2005-01-14|ELECTRONIC ANTI-THEFT SYSTEM
EP3350030B1|2019-11-06|Method for controlling a functionality of a vehicle by means of a user terminal and associated control system
EP1382500B1|2005-05-04|Method for executing keyless entry and immobilizer authentication
EP3463994A1|2019-04-10|Apparatus, system and method for vehicle access and function control utilizing a portable device
CN112106389A|2020-12-18|Communication in a mobile communication network
CN111163977A|2020-05-15|Access system and access verification method
CN106671936A|2017-05-17|Car starting method and device
US10391975B2|2019-08-27|Method to provide warning to relay attacks on keyless entry and start systems
US10493956B2|2019-12-03|Control device and method for unlocking a motor vehicle with integrated NFC-control device
DE102015223345A1|2017-06-01|A method of operating an authorization device for a vehicle, an authorization device for a vehicle, a method of operating a system for authorizing operation of a vehicle, and a system for authorizing operation of a vehicle
US10464527B2|2019-11-05|Access and driving authentication system with increased security against relay attacks on the transponding interface
FR3076937A1|2019-07-19|Method of locating a vehicle, method of implementing a vehicle, and system
EP3503044A1|2019-06-26|Method of getting access to a vehicle
同族专利:
公开号 | 公开日
US10604114B2|2020-03-31|
MX2018014794A|2019-08-21|
CN110001576A|2019-07-12|
JP2019108787A|2019-07-04|
US20190161058A1|2019-05-30|
KR20190064520A|2019-06-10|
CZ2018655A3|2019-07-03|
DE102018130200A1|2019-06-06|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US20100075656A1|2008-09-24|2010-03-25|Embarq Holdings Company, Llc|System and method for key free access to a vehicle|
US20140067161A1|2012-09-05|2014-03-06|GM Global Technology Operations LLC|System for preventing relay attack for vehicle entry|
US20160078700A1|2014-09-11|2016-03-17|Hon Hai Precision Industry Co., Ltd.|Control system and control method for vehicle anti-theft|
US8611919B2|2002-05-23|2013-12-17|Wounder Gmbh., Llc|System, method, and computer program product for providing location based services and mobile e-commerce|
US9442888B2|2012-03-07|2016-09-13|Zipcar, Inc.|Apparatus and methods for renting and controlling occupancy of a vehicle|
US9842445B2|2013-07-15|2017-12-12|Trw Automotive U.S. Llc|Passive remote keyless entry system with time-based anti-theft feature|
US9355551B2|2014-10-21|2016-05-31|Toyota Motor Engineering & Manufacturing North America, Inc.|Smart key locator|
US9803391B2|2015-09-11|2017-10-31|Ford Global Technologies, Llc|Vehicle unlocking systems and methods|
US9865113B2|2016-06-03|2018-01-09|Volkswagen Aktiengesellschaft|Apparatus, system and method for dynamic identification and key management for vehicle access|
KR101842436B1|2016-09-07|2018-03-28|현대자동차주식회사|Vehicle and control method thereof|
JP2019116809A|2017-12-27|2019-07-18|トヨタ自動車株式会社|Information processing device, information processing method, and information processing program|FR3054510B1|2016-07-29|2019-04-19|Continental Automotive France|METHOD FOR DEFENSE AGAINST ATTACK RELAY ACTION ON REMOTE ACTIVATION OF A FUNCTION PRESENT IN A MOTOR VEHICLE|
US10919493B2|2018-02-08|2021-02-16|Ford Global Technologies, Llc|Mobile device relay attack detection and power management for vehicles|
CN110979254B|2018-10-03|2021-12-17|本田技研工业株式会社|Vehicle control device|
法律状态:
2019-09-06| PLSC| Search report ready|Effective date: 20190906 |
2019-11-20| PLFP| Fee payment|Year of fee payment: 2 |
2021-08-06| ST| Notification of lapse|Effective date: 20210706 |
优先权:
申请号 | 申请日 | 专利标题
US201762592511P| true| 2017-11-30|2017-11-30|
US62/592,511|2017-11-30|
[返回顶部]