专利摘要:
Passive keyless entry system for an electronic lock, comprising a lock installation comprising a lock controller, and an RF transmitter and an RF receiver; and a keychain comprising a controller, and an RF transmitter and an RF receiver. The keychain generates messages to unlock the lock during an unlocking event. The controllers share a secret which specifies parameters for a sequence of messages to be exchanged bidirectionally between the installation and the key chain, the parameters varying between each unlocking event and an immediately subsequent unlocking event. For each unlocking event, one of the controllers generates and sends a first message in the message sequence in accordance with the parameters specified. The other controller causes a second message in the sequence to be transmitted in accordance with the parameters specified in response to receipt of the first message. At least one message in the message sequence comprises a plurality of frames, each frame comprising a particular bit sequence, adjacent frames being separated by an inter-frame interval. Adjacent messages in the sequence are separated by an inter-message interval. The parameters specified are such that a given message of the sequence includes a first inter-frame interval, and the inter-message interval between the given message of the sequence and an immediately preceding message or an immediately subsequent message is not more as long as the first inter-frame interval. Figure 1
公开号:FR3084495A1
申请号:FR1908387
申请日:2019-07-24
公开日:2020-01-31
发明作者:Xing Ping Lin
申请人:Bcs Access Systems Us LLC;
IPC主号:
专利说明:

Title of the invention: Passive keyless entry system
Technical Field [0001] The present invention relates to a passive keyless entry system, and in particular to a passive keyless entry system for a vehicle.
Background Keyless entry systems, in which a keychain or key includes an RL transmitter which is used to communicate with a corresponding receiver in the vehicle to lock or unlock the doors of the vehicle have proved to be a very popular option for motor vehicles. Initially, these systems required actuation of a push button or other actuator on the key holder in order to lock or unlock the vehicle doors. Subsequently, so-called passive keyless entry systems have been designed, in which no interaction of the user with the key chain is necessary to unlock or lock the doors of the vehicle when the user is at proximity to the vehicle. Such systems operate either by detecting the proximity of the key chain to the vehicle transmitter and by sending, by the vehicle, periodic beacon signals which, when detected by a key chain , causes the keychain to wake up and provide an answer. If the answer comes from a paired keychain, the vehicle doors are unlocked. Other passive keyless entry systems require the user to touch or approach a door handle on the car, with capacitive sensing used to detect presence, which causes the vehicle to send a message. alarm clock at the key chain. The key fob provides an answer, and if the key fob is a paired key fob, the vehicle doors are unlocked. Key fobs in such systems can also include push buttons or equivalent actuators to allow the user to have the key fob transmit a signal to the vehicle at a greater distance, to lock or unlock the car - or even start the vehicle remotely.
Although keyless entry systems have generally improved vehicle security compared to the use of conventional mechanical keys, it has been found that passive keyless entry systems are insufficient in terms of security. This deficiency is known as a "relay attack". In a relay attack, two potential thieves work together. One of the thieves is standing near the vehicle, while the other thief is standing near the owner of the vehicle wearing the key fob. Each of the thieves has a radiofrequency device, the two devices being connected either by a physical cable or, more commonly, by another radiofrequency link. The thief at vehicle level approaches the vehicle and, if necessary, lifts or touches the door handle. This action triggers a low frequency transmitter inside the car which sends a wake-up signal. The thief's radio frequency device receives the wake-up signal and transmits it to the other thief's device. The wake-up signal is then transmitted by the second thief's radio frequency device, which is within range of the key holder. The key chain, which receives the transmitted wake-up signal, responds, and the signal from the key chain is received by the RL device of the second thief and is transmitted to the device of the first thief. The device of the first thief emits the response transmitted by the key chain, making the system mounted in the car believe that the key chain is located close enough to the car, so that the doors of the car are unlocked. The same process is effective in deceiving car systems into believing that the key fob is present, thus allowing the car to be started and taken away.
The present invention aims to make such relay attacks less effective.
Summary of the invention [0005] In a first embodiment, the present invention provides a passive keyless entry system for an electronic lock, the system comprising: a lock installation comprising a first controller, a first RL transmitter and a first RL receiver; and a key chain comprising a key chain controller, a second RL transmitter and a second RL receiver, the key chain being configured to generate messages to unlock the lock during an unlocking event; in which: the first controller and the keychain controller share a secret which specifies parameters for a sequence of messages to be exchanged bidirectionally between the lock installation and the keychain using the first RL transmitter and the second RL receiver, and the second RL transmitter and the first RL receiver, the parameters varying between each unlocking event and an immediately subsequent unlocking event; wherein, for each unlocking event, the first controller or the keychain controller is configured to generate a first message of the message sequence according to the specified parameters, and so as to bring the first or second RL transmitter transmitting the first message of the sequence in accordance with the specified parameters; and the other from the first controller and the keychain controller is configured to control the other from the first RL transmitter and the second RL transmitter so that it transmits a second message of the sequence in accordance with the specified parameters in response to receipt of the first message in the sequence; and the first controller is further configured to unlock the electronic lock only in the event that the or each message transmitted by the key chain as required by the sequence is correctly received by the first receiver; and wherein at least one message of the message sequence comprises a plurality of frames, each frame comprising a particular bit sequence, adjacent frames of the plurality of frames being separated from each other by an inter-frame interval; adjacent messages in the message sequence being separated from each other by an intermessage interval; and the parameters specified are such that a given message of the sequence comprises a first inter-frame interval, and the inter-message interval between the given message of the sequence and an immediately preceding message and / or an immediately subsequent message does not is no longer than the first interframe interval.
By introducing inter-frame intervals in messages of the sequence, it becomes more difficult for an attacker to say if a break in the transmission means a change in the direction of transmission. The attacker cannot therefore safely change the direction of transmission of his equipment when he detects a break in the transmission. It is therefore likely that the attacker created a feedback loop. Making at least certain inter-frame and inter-message intervals comparable in duration makes the attacker's task even more difficult.
The message given in the message sequence can optionally include at least three frames, and different pairs of adjacent frames are separated by inter-frame intervals having different durations. This aggravates the difficulties encountered by an attacker.
An inter-message interval between the given message of the sequence and an immediately preceding or immediately subsequent message of the sequence optionally has an intermediate duration between the durations of the inter-frame intervals of the given message of the message sequence. This further aggravates the difficulties encountered by an attacker.
The first controller is advantageously configured so as to share the secret between the first controller and the keychain controller by controlling the first RF transmitter so that it sends to the second RF receiver a first encrypted message specifying the parameters for the sequence of messages. Providing or updating the shared secret in this way means that it will likely be more difficult for attackers to discover the secrets that control message sequences. Security is further improved.
The first and second RF transmitters optionally operate on the same RF carrier frequency, which makes it more difficult for attackers to distinguish between signals from the lock installation and those from the key chain.
The first controller is preferably configured so as to specify a different set of parameters for each attempt to unlock the electronic lock. In this way, it is more difficult for attackers to predict the details of the sequence, and therefore more difficult to defeat the system.
The parameters specified in the encrypted message optionally include at least one of the following:
An indication whether the first or the second RE transmitter must transmit a first message of the sequence; a start time for each message in the sequence; a duration for each message in the sequence; a duration for an interval between adjacent messages in the sequence. By being able to choose between these different parameters, it is possible to make the system more difficult to master for an attacker.
The parameters specified in the encrypted message can include an indication whether the first or the second RF transmitter must transmit a first message in the sequence, and a start time for each message in the sequence and / or a duration for each message. in the sequence. Having a system in which the source of the first message in the sequence varies, and varying the start time and / or duration of each message in the sequence, can also increase the difficulty of defeating the system.
The first controller can be configured to control the first RF transmitter so that it sends the second RF receiver the encrypted message specifying parameters for a sequence of messages only after detection by the first controller as the carrier. keys was paired with the first controller. Such an approach improves system security by preventing the transmission of encrypted messages when no pair of key chains is detected. With such an arrangement, the lock installation may further comprise a low frequency transmitter for transmitting a wake-up message to the key chain.
The first RF transmitter and the first RF receiver can be made in the form of a first RF transceiver, which can allow a more compact installation and reduce costs by avoiding the duplication of certain components. Likewise, the second RF transmitter and the second RF receiver can be produced in the form of a second RF transceiver.
By encrypting the message used to transmit the parameters of the lock installation to the key chain, the key chain having a key allowing the key chain to decrypt the message, the security of the systems according to embodiments of the invention can be improved by making it more difficult for attackers to anticipate the behavior of the system.
The electronic lock can be the lock of a vehicle, but also the lock of a room, a building or any other structure or any other equipment.
In another embodiment of the invention, there is provided an electronic lock installation configured for the passive keyless entry, the lock installation comprising:
An electronic lock, an RF transmitter and an RF receiver for communication with a keychain which is configured to generate messages to unlock the lock during an unlocking event, and an operatively coupled controller at the lock, the RF transmitter and the RF receiver; in which the controller shares a secret with the keychain, the secret specifying parameters for a sequence of messages to be exchanged bidirectionally between the lock installation and the keychain using the RF transmitter and the RF receiver, the parameters varying between each unlocking event and an immediately subsequent unlocking event; controlling the RF transmitter so that it sends at least one sequence message to the key chain in accordance with the specified parameters; controlling the RF receiver so that it receives at least one sequence message transmitted by the key chain in accordance with the specified parameters; and wherein at least one message of the message sequence comprises a plurality of frames, each frame comprising a particular bit sequence, adjacent frames of the plurality of frames being separated from each other by an inter-frame interval; adjacent messages in the message sequence being separated from each other by an inter-message interval; and the parameters specified are such that a given message of the sequence comprises a first inter-frame interval, and the inter-message interval between the given message of the sequence and an immediately preceding message and / or an immediately subsequent message does not is no longer than the first inter-frame interval, and the controller is further configured to unlock the electronic lock only in the event that the or each message transmitted by the key fob as required by the sequence is correctly received by the RF receiver.
In such an installation, the secret can be shared between the first controller and the keychain controller in that the first controller controls the first RF transmitter so that it sends an encrypted message to the second RF receiver specifying the parameters for the message sequence. Providing or updating the shared secret in this way means that it will likely be more difficult for attackers to discover the secrets that control message sequences. Security is further improved.
In such an installation, the controller can be configured to send a new encrypted message, specify a different set of parameters for each attempt to unlock the electronic lock. While a message can be used to update parameters that can be used for a series of lock unlock attempts, multiple sets of parameters being provided in a single message, it is preferable, at least in terms of length of the message, to provide only one set of parameters in a single message. Changing the settings for each unlock attempt makes it more difficult for an attacker to launch a successful relay attack.
In such an installation, the controller can be configured so as to specify a set of different parameters for each attempt to unlock the electronic lock. In this way, it is more difficult for attackers to predict the details of the sequence, and therefore more difficult to overcome the security of the lock installation.
The parameters specified in the encrypted message can optionally include at least one of the following elements: an indication whether the key chain or the RF transmitter must transmit a first message of the sequence; a start time for each message in the sequence; a duration for each message in the sequence; a duration for an interval between adjacent messages in the sequence. By being able to choose between these different parameters, it is possible to make the installation more difficult for an attacker to master.
The parameters specified in the encrypted message can optionally include an indication whether the key chain or the RF transmitter must transmit a first message of the sequence, and a start time for each message in the sequence and / or a duration for each message in the sequence. Having a system in which the source of the first message in the sequence varies, and varying the start time and / or duration of each message in the sequence can also increase the difficulty of defeating the system.
In another embodiment of the invention, there is provided a key chain for a passive keyless entry system for an electronic lock, the key chain comprising a key chain controller, a low receiver frequency, an RF transmitter and an RF receiver, the keychain being configured to generate messages to unlock the lock during an unlocking event; in which: the keychain controller and a lock installation of the electronic lock share a secret specifying parameters for a sequence of messages to be exchanged bidirectionally between the lock installation and the keychain using the transmitter RF and the RF receiver, at least one of the messages of the sequence being specified as coming from the key chain, the parameters varying between each unlocking event and an immediately subsequent unlocking event; at least one message of the message sequence comprises a plurality of frames, each frame comprising a particular bit sequence, adjacent frames of the plurality of frames being separated from each other by an inter-frame interval; adjacent messages in the message sequence being separated from each other by an inter-message interval; the parameters specified are such that a given message of the sequence comprises a first inter-frame interval, and the inter-message interval between the given message of the sequence and an immediately preceding message and / or an immediately subsequent message is no longer than the first interframe interval; the keychain controller is configured to wake up in the event that the low frequency receiver receives a low frequency wake up message from the lock facility, and to cause the RF transmitter to transmit a response to the installation, the response comprising a key chain identifier; and the controller is subsequently configured to control the RF transmitter so that it sends the lock installation the or each message of the sequence specified as coming from the key chain in accordance with the parameters specified.
By ensuring that the key chain and the lock installation transmit messages in a sequence in accordance with specified parameters, and since the attackers do not know the switching time of the direction of communication, the attackers may be forced to continuously pick up and relay signals at both ends of the system, which is likely to cause feedback loops, which makes it likely that the feedback covers signals and / or distorts the bit symbol of the signals from the keychain or vehicle side during the relay attack. However, it is less likely that the relay attack will be successful.
The keychain can optionally be configured so as to receive the parameters specified in an encrypted message from the lock installation. Providing or updating the shared secret in this way means that it will likely be more difficult for attackers to discover the secrets that control message sequences. Security is further improved.
The keychain controller can be configured to apply the specified parameters provided in an encrypted message given to a single unlock event. Changing the settings for each unlock attempt makes it more difficult for an attacker to launch a successful relay attack.
The controller can optionally be configured so as to control a start time and / or a duration of a message to be transmitted by the RE transmitter as part of the sequence. By being able to choose between these different parameters, it is possible to make the system more difficult to master for an attacker.
In another embodiment of the invention, there is provided a method for preventing a successful relay attack on a passive keyless entry system for an electronic lock of a lock installation, the system comprising a keychain configured to generate messages to unlock the lock during an unlocking event, the method comprising:
For each unlocking event, the command of a first RF transmitter associated with the lock or of a second RF transmitter of the key ring so that it generates a first message of a sequence of messages in accordance with parameters specified in a secret shared between a key chain controller and a first lock installation controller; controlling the other of the first RF transmitter and the second RF transmitter so that it transmits a second message of the sequence according to the parameters specified in response to the reception of the first message of the sequence; modifying the sequence of sequence parameters for each iteration of the process, each sequence however interleaving transmissions from the first and second RF transmitters; and unlocking the electronic lock only in the event that the or each message transmitted by the key holder as required by the sequence is correctly received by an RF receiver of the lock installation; wherein the specified parameters are such that a given message in the sequence includes a first inter-frame interval, and the intermessage interval between the given message in the sequence and an immediately preceding message and / or an immediately subsequent message is not no longer than the first inter-frame interval.
By having the keychain and the lock facility both transmit messages and interleaving them in a sequence according to the specified parameters, attackers may be forced to pick up continuous signals at both ends of the system, which is likely to cause feedback loops, whereby it is likely that the feedback will cover signals and / or distort a bit symbol obtained from the keychain side during the relay attack. It is therefore less likely that the relay attack will be successful.
The method can optionally comprise the command of the first RF transmitter so that it sends to the key chain an encrypted message specifying the parameters for the sequence of messages. Providing or updating the shared secret in this way means that it will likely be more difficult for attackers to discover the secrets that control message sequences. Security is further improved.
The method can optionally include sending a new encrypted message, specifying a different set of parameters for each attempt to unlock the electronic lock. Changing the settings for each unlock attempt makes it more difficult for an attacker to launch a successful relay attack.
The parameters specified in the encrypted message can optionally include at least one of the following elements: an indication whether the key chain or the RF transmitter must transmit a first message of the sequence; a start time for each message in the sequence; a duration for each message in the sequence; a duration for an interval between adjacent messages in the sequence.
The parameters specified in the encrypted message can optionally include an indication whether the key chain or the RF transmitter must transmit a first message of the sequence; and a start time for each message in the sequence and / or a duration for each message in the sequence. By being able to choose between these different parameters, in particular by allowing the system to choose different start times for the bidirectional transmission sequence, it is possible to make the process more difficult for an attacker to master.
In another embodiment, the present invention provides a passive keyless entry system for an electronic lock, the system comprising:
A lock installation comprising a first controller, a first RF transmitter and a first RF receiver; and a key chain comprising a key chain controller, a second RF transmitter and a second RF receiver; wherein the first controller is configured to control the first RF transmitter so that it sends the second RF receiver a first message specifying parameters for a sequence of messages to be exchanged bidirectionally between the lock installation and the keychain using the first RF transmitter and the second RF receiver, and the second RF transmitter and the first RF receiver;
The keychain controller is configured to respond to the reception of the first message by controlling the second RF transmitter so that it sends to the first RF receiver at least one message of the sequence in accordance with the parameters specified;
The first controller is configured so as to control the first RF transmitter so that it sends to the second RF receiver at least one message of the sequence in accordance with the parameters specified, and the first controller is further configured so as to unlock the electronic lock only in the case where the or each message transmitted by the key chain as required by the sequence is correctly received by the first receiver;
At least one message of the message sequence comprises a plurality of frames, each frame comprising a particular bit sequence, adjacent frames of the plurality of frames being separated from each other by an inter-frame interval;
Adjacent messages in the message sequence being separated from each other by an inter-message interval;
Wherein the parameters specified are such that a given message of the sequence comprises a first inter-frame interval, and the inter-message interval between the given message of the sequence and a subsequent message adjacent to the given message of the sequence is no longer than the first inter-frame interval.
The first message in the message sequence optionally comprises at least three frames, and different pairs of adjacent frames are separated by inter-frame intervals having different durations. The inter-message interval between the first message in the sequence and the subsequent message adjacent to the first message in the sequence optionally has an intermediate length between the durations of the inter-frame intervals of the first message in the message sequence.
In an alternative embodiment, the present invention provides a passive keyless entry system for an electronic lock, the system comprising: a lock installation comprising a first controller, a first RE transmitter and a first RE receiver; and a key chain comprising a key chain controller, a second RE transmitter and a second RE receiver; in which the first controller is configured to control the first RE transmitter so that it sends to the second RE receiver a first message specifying parameters for a sequence of messages to be exchanged bidirectionally between the lock installation and the door -keyed using the first RE transmitter and the second RE receiver, and the second RE transmitter and the first RF receiver;
The keychain controller is configured to respond to the reception of the first message by controlling the second RF transmitter so that it sends to the first RF receiver at least one message of the sequence in accordance with the parameters specified;
The first controller is configured so as to control the first RF transmitter so that it sends to the second RF receiver at least one message of the sequence in accordance with the parameters specified, and the first controller is further configured so as to unlock the electronic lock only if the or each message transmitted by the key chain as required by the sequence is correctly received by the first receiver.
By having the keychain and the lock facility transmit messages in a sequence according to specified parameters which are not known to potential attackers by relay attack, attackers may be forced to pick up and continuously relaying signals at both ends of the system, which is likely to cause feedback loops, whereby it is likely that the feedback will cover signals and / or distort the bit symbol obtained from the key fob during relay attack. However, it is less likely that the relay attack will be successful.
Brief Description of the Drawings Embodiments of the invention will now be described only by way of example with reference to the accompanying drawings. These show:
[Fig.l] the conventional relay attack method;
[Fig.2] a schematic drawing showing the main characteristics of the system according to a first embodiment of the invention;
[Fig.3] a schematic drawing illustrating a possible example of communication synchronization in a system according to an embodiment of the invention;
[Fig.4] a schematic drawing illustrating how a relay attack could work with the system according to an embodiment of the invention;
[Fig.5] a schematic drawing illustrating how a feedback loop could occur during the relay attack as shown in Figure 4;
[Fig.6] a schematic drawing illustrating how several feedback loops such as those that may occur during an attack according to Figure 4 could distort RF transmissions of the key chain detected at the vehicle; and [fig.7] a schematic drawing illustrating another example of communication synchronization in a system according to an embodiment of the invention.
Description of embodiments FIG. 1 diagrammatically illustrates the conventional relay attack on a vehicle equipped with a passive keyless entry system. The car 10 includes a low frequency transmitter 12 and a radio frequency receiver 14. A driver having a key chain 20 which includes a low frequency receiver 22 and a radio frequency transmitter 24 has moved away from the vehicle so that the key chain and the car are no longer in range of each other. Two thieves will try to steal the car. The first thief takes a position near the car, while the second thief takes a position near the owner of the car wearing the key fob. When the two thieves are in position, the first thief touches the door handle of the driver of the car, so that a controller in the car activates the low frequency transmitter which sends a wake-up signal for the key chain . The first thief has equipment 30 which includes a low frequency receiver 32 which can receive the wake-up signal. The equipment of the first thief also includes a high frequency RF transceiver 34 for transmitting the wake-up signal to the second thief. The second thief has equipment 40 which includes an RF transceiver 44 for communication with the RF transceiver 34 of the first equipment. The second thief's equipment 40 also includes a low frequency transmitter 22. The second thief's equipment receives the wakeup signal transmitted, converts it to low frequency and then transmits it so that it is received by low frequency receiver 22 of the door -clés. The key chain 20 reacts to the wakeup signal transmitted by transmitting the appropriate response from the RF transmitter 24. The RF transceiver 44 of the equipment 40 of the second thief receives the response from the key chain and then transmits it to the first thief's RF 34 transceiver and the controller's equipment. The first thief’s RF transceiver receives the transmitted control signal and forwards it to the RF receiver 14 inside the vehicle. The car receiver recognizes the command and unlocks the car door. The first thief thus obtains successful access to the car.
Figure 2 is a schematic drawing showing the main characteristics of a system according to a first embodiment of the invention.
A vehicle 10 includes an electronic lock control system comprising a low frequency transmitter 12, a radio frequency transmitter and a radio frequency receiver which are shown here combined to form an RF transceiver 16, and a controller or ECU 18. The transmitter Low frequency usually operates at 125 kHz or around 125 kHz, although other suitable low frequencies may be used provided they comply with the radio regulations of the country or territory in which the vehicle is used. RF transceivers usually operate on an appropriate UHF carrier frequency, such as 315 MHz in the United States / Japan, or around 433/434 MHz (eg 433.92 MHz) in Europe. Signals can be modulated on these carriers using amplitude shift modulation (MDA) - (Amplitude Shift Keying - ASK), and the amplitude is usually modulated between two levels. To save energy, the lower level of the MDA modulation scheme can be zero or close to zero, which gives rise to what is called all-nothing modulation, OOK (English On-Off Keying). For some countries like Japan, it may be better to use frequency shift modulation rather than the MDA function.
The RF transmitter and receiver, or the transceiver if used instead of separate devices, preferably use an oscillator controlled by quartz rather than a SAW device, for example, because i ' Using quartz controlled oscillators tends to provide much better frequency stability which is beneficial in many ways.
The vehicle also includes sensors 17 for each of the door handles and a sensor 19 for the handle of the trunk which are connected to the controller 18. It may be capacitive sensors which react to the touch or to the immediate proximity of the hand of the user for example, or it can be mechanical sensors which react to the action of a grip or a pressed button, for example.
A keychain 20 which is paired with the vehicle 10 comprises a low frequency receiver 22, an RF transmitter and an RF receiver, which are here shown combined in the form of an RF transceiver 26, and a door controller 28. The RF transmitters in the key chain and the vehicle preferably operate at the same frequency, so that attackers cannot distinguish between the signals from the key holder and those from the vehicle on the basis of frequency. Again, it is best to use crystal-controlled oscillators in the RF transmitter and receiver, or a transceiver if used instead of a pair of devices.
In normal operation, when the vehicle owner approaches the vehicle and lifts the door handle, the door handle sensor 17 responds by sending a signal to the controller 18. The controller 18, recognizing the signal from the sensor door 17 as a door unlock trigger, activates the low-frequency transmitter 12 to transmit a wake-up signal to the key chain 20. The low-frequency receiver 22 of the key chain receives the wake-up signal which is supplied to the door controller -key 28. Upon receipt of the wake-up signal, the keychain controller activates the RF transceiver 26 of the keychain to transmit a response to the vehicle. This response signal is received by the vehicle's radio frequency receiver and transmitted to the vehicle controller 18. If the keychain is paired with the vehicle, the controller 18 recognizes a code sequence in the response signal - and is usually also a counter or drop-down code with an appropriate value, and responds to receipt of the response signal from the keyring. But at this point, the controller does not unlock the door.
Instead, the controller 18 of the electronic lock sends an encrypted message to the controller 28 of the key chain using the vehicle's RF transmitter and the key chain's RF receiver. This encrypted message specifies parameters for a two-way RF communication sequence to be performed between the key chain and the vehicle. The controller 28 of the key chain and the controller 18 of the vehicle each have appropriate encryption keys or secrets in order to be able to exchange encrypted messages. The encryption keys are preferably specific to a given vehicle rather than being shared between several vehicles, since this can considerably improve overall security.
Before unlocking the door, the vehicle controller participates in this bidirectional RF communication sequence. It is only if this communication sequence is successfully completed that the vehicle controller unlocks the electronic door lock. For the purposes of the description, communications from the key chain to the vehicle are considered as forward communications, while communications from the vehicle to the key chain, the key chain being in reception mode, are considered as back communications . FIG. 3 illustrates an example of a communication sequence between the key chain and the vehicle after reception, by the key chain, of the encrypted instructions concerning the parameters of the bidirectional communication sequence.
In FIG. 3, the upper part represents the behavior of the key chain 20, the highest line being a chronology, and the adjacent line representing signals transmitted and received by the key chain 20. In the line of the signal, the solid line represents signals transmitted by the key chain, while the dotted line represents signals transmitted by the vehicle and received by the key chain. The lower part of FIG. 3 represents the behavior of the vehicle's RF transmitter and receiver 16. In the example shown in FIG. 3, the first communication is shown as being carried out from the key chain to the vehicle, the first communication of the sequence, however, being able as well to come from the controller 18 of the lock.
In Figure 3, the key holder is shown transmitting a message comprising a frame which comprises a particular sequence of bits. In this example, MDA is used, but other types of modulation can be used instead. In this example, the MDA modulation is represented as all-or-nothing modulation (OOK), the bits representing the binary ones and the zeros, the zeros being signaled by a break in the transmission. Since in this case, the message has only one frame, the length of the frame determines the duration of the Txl message. The lock installation, shown here as a vehicle, responds to the reception of the first message in the sequence with the second message in the sequence - shown here as a set of three frames T_fml, T_fm2, T_fm3, separated by inter- T_intl and T_int2 frames. In this example, the inter-frame intervals are uneven, the first interval being more than twice as long as the shortest interval. Intervals can be made the same or similar in length, but it is generally preferable to use interframe intervals of different lengths in a given message, since this makes it more difficult for thieves to launch an effective relay attack. There can be more than three frames in a message, and the inter-frame intervals can all be the same length (duration) or all be of different lengths (durations), or the same length (duration) can be used for longer of an interframe interval of a different length, longer or shorter, used for another or for others of said intervals. It is also possible to make launching an effective relay attack more difficult if the inter-frame intervals in different messages in the sequence are also different.
The identity of the source of the first transmission of the sequence is one (Fl) of the parameters defined when the controller 18 of the electric lock sends an encrypted message to the controller 28 of the keychain.
Other parameters which can be specified include:
F2: Start time of the transmission: tO, t4 and t8. In FIG. 3, for a passive system, the command BF coming from the vehicle side allows the clock of the key chain to start and the key chain begins to transmit a first message to tO. For a normal two-way Remote Keyless Entry (RKE) unlocking system, pressing a button triggers the sequence and ends it at tl. The length of the first transmission message could contain encrypted information on variable synchronization such as the beginnings and lengths of all incoming messages, the intervals between frames in each unidirectional message, the switching times of changes in the direction of communication, etc. . This length of the first message is indicated by Txl, and this length can vary between different sessions. After tl, the key chain goes into reception mode and waits for the signal from the vehicle to arrive after Tgapl. There is a delay between the start of the transmission tO on the key chain side and the output of the receiver on the vehicle side t2. This delay (t2-t0) is due to the signal propagation time in the air and to the hardware delay on the receiver side (if tO is counted as the start of the transmission of the key fob at its output). The same goes for the delay from t4 to t6 (from the vehicle side to the key chain side).
F3: T_sw switching time and T_gap cut-off time: the vehicle side ends reception of the first message from the key chain Txl to t3. Then the vehicle-side device begins transmitting to t4. The difference between (t4-t3) is called the switching time of the communication direction T_swl = (t4-t3). The time Tgapl is linked to (t4-t3). Tgapl is greater than T_swl due to the signal path in the air and the delay in processing the material, but their difference is almost constant in number when the key chain is not too far from the vehicle (time of very short air travel). The values of the end time t3 and the start time t4 obviously determine the communication switching time and Tgapl. These numbers are variables for each event and form a secret known only by the key chain and the vehicle paired by means of pre-arrangements or encrypted information included in the Txl transmission or in a previous LF message. This is to prevent the attacker from predicting the start of the communication direction switching time. T_swl can be made as short as possible, which doesn't give attackers too much time to access synchronization. This is likely to force the attacker to relay both sides within a certain amount of time, resulting in signal distortion or the risk of missing part of the transmission if switching is done too early or too late.
F4: Number of transmission frames, durations and intervals between frames: In the Tx2 message transmitted by the vehicle, there are three transmission frames: T_frml, T_frm2 and Tfrm3 and two silent intervals (inter-frame intervals) between the frames: T_intl and T_int2. The lengths of these frames and intervals are preferably always changing, differing from one event to another so that attackers cannot, on the basis of previous data, predict the end of the current direction of transmission. As a result, the attacker may not have enough time to change the direction of the information relay. The intervals between the different frames can be different. The length of one of the intervals could be designed to be comparable to the switching time of the communication direction T_sw so that the attacker cannot, based on the length of the silence time, determine whether there is yet another frame coming in the transmission message in the same direction or if the system will change the direction of communication.
L5: The number of frames. In FIG. 3, there is only one frame in the transmission from the key chain to the vehicle (Txl). There are three frames from the vehicle to the key holder during time Tx2. These numbers may vary for different events. In this way, another level of difficulty is introduced, which makes it more difficult for attackers to guess when the transmission in one direction will end and when they must be ready to change the direction of the relay.
In embodiments of the invention, the switching synchronization from one direction of communication (for example from a key chain to the vehicle) to the other direction (such as from the vehicle to a key chain ) is preferably modified for each unlocking event. This synchronization is known only by the key chain and the vehicle which are paired, either by a predetermined arrangement, or by an initial encrypted communication. It is therefore more difficult for attackers to succeed if they relay information only in one direction at a time. Since the communication switching time is further arranged so that the magnitude of the switching time is comparable to the interval between frames of each transmission message, attackers cannot tell whether the silence time on one side of the communication is simply a brief pause in transmission (an inter-frame interval) or the start of switching the direction of transmission (an inter-message interval). This can force attackers to relay information on both sides of the system until they are certain that the direction of transmission has changed.
The system is preferably configured so that the lock is successfully unlocked only if all of the loop communication is correct, that is to say if the vehicle side receives the information from the door side correctly. -key and if the key chain side correctly receives the transmission from the vehicle side. Correct here can mean that there are no detection errors with an acceptable low bit error rate in both directions to confirm that it is a legitimate key chain and that 'there is no relay or there is very little possibility of attack by relay. With such a configuration, if there is a failure in the loop, the system can retry the procedure. After another failure, the system can adopt a blocked state in which no unlocking of the system is possible using the passive keyless entry for a given period - for example 10 minutes - and / or an alarm can trigger. The alarm may require the vehicle horn and the flashing of the flashing lights and / or a silent alarm in which the event is reported to a security service provider. The internal information systems of the vehicle can in each case be arranged so as to display an intrusion attempt message when the owner returns and unlocks the vehicle.
(F5) the number of transmissions, or messages, which will constitute the sequence even if it may rather be a fixed number in certain embodiments, which therefore does not need to be specified in a message .
These functions, F1, F2, F3, F4 and F5, or an appropriate subset thereof, can be specified in the initial encrypted message, and one or more of them change by an event ( access to one vehicle) to another. To activate the lock and thus gain access to the vehicle, communication between the key chain and the vehicle according to the specified communication sequence must be terminated. Any interruption in communication results in the impossibility of accessing the vehicle (or anything protected by the electronic lock that the keychain controls).
Transmissions from the vehicle can be used to confirm the successful receipt of messages from the key chain. If the initial message in the message sequence is sent by the vehicle, the initial message can act as a handshake message to trigger the keychain and warn it of the start of transmission. The keychain controller can be configured to stop the message sequence if the keychain does not receive the expected messages from the vehicle at the right time and with a sufficiently low bit error rate. Referring to FIG. 3, after the time Tswl (Tgapl), for a successful sequence of messages, the key chain must for example correctly receive the transmission Tx2 from the vehicle, in particular the start of the message Tx2. The Tx2 message can work here to confirm that the vehicle has recognized the key fob. The attacker will not know when the vehicle will start transmission due to the lack of knowledge of the length of Txl, and when the key chain transmission will end. (F4: variable frame lengths and F5: number of frames. Txl could have 3 frames in the next event). Consequently, attackers can (1) end the relay too early from the key chain side to the vehicle side, in order to prepare to switch from the vehicle to the key chain, and miss the end of the first transmission of the key chain, or (2) finish a relay from the key-chain side to the vehicle side too late and not be ready for vehicle-side transmission, which causes the first part of the Tx2 message to be missed, or (3) start relaying both sides at the same time time, which causes signal symbols to distort or overlap.
Synchronizations can be based on absolute time, the key chain and the lock installation comprising clocks which are synchronized periodically - for example during the key chain wake-up procedure. Synchronization can also be based on relative times - the keychain can for example determine the synchronization of its own actions by referring to its detection of events or characteristics in messages or other signals received from the 'lock installation (vehicle).
Now consider how thieves could attempt a relay attack on the system as shown in Figure 2. Figure 4 shows a situation in which a relay attack is attempted. For the sake of simplicity, the attacker's equipment is shown without a set of low frequency components, although in practice this is present to allow the transmission of the low frequency wake-up signal from the vehicle to the remote key fob, unless the low frequency signal from the vehicle is transmitted to the second attacker by means of a cable. Once again, a first attacker stands near the vehicle to pick up signals from the vehicle and to provide the vehicle with key fob signals. The equipment of the first attacker comprises two pairs of transmitters and receivers (represented by the transceivers 34 and 36), one pair making it possible to receive signals from the vehicle to be transmitted to the second attacker, the other pair being used for receive signals received and retransmitted by the other attacker and transmit them to the vehicle. The second attacker's equipment 40 is similar, with two pairs of transmitters and receivers (represented by transceivers 44 and 46). If the attackers knew when the vehicle and the key chain were transmitting respectively, the equipment of each attacker would only need a single pair of transmitter / receiver which would be put on the appropriate mode depending on whether the signals came from the vehicle or the key holder. But since the sequence of forward and backward transmissions and its synchronizations change with each vehicle access event, attackers must be able to receive forward and backward transmissions at any time and retransmit these transmissions. which means that their equipment has to be more complex. Since the attackers do not know when the forward and backward transmissions will take place, the first attacker must receive signals transmitted by the vehicle while also transmitting the signals received from the second attacker which correspond to the forward transmissions received by the carrier -clés. Likewise, the second attacker must receive signals transmitted by the key chain, transmissions in front, while also transmitting the signals received from the first attacker, representing the transmissions in reverse. The consequence in creating a feedback loop.
Figure 5 schematically illustrates the creation of such a feedback loop. When the key chain 20 transmits a signal from its transceiver 26, a forward transmission, the second attacker receives this signal with a pair of transceiver 46 and then transmits the information of the key chain to the first attacker who receives information via the transceiver 36. The first attacker receives the signal transmitted by the second attacker and transmits the received signal to the vehicle, imitating the transmission in front of the key ring 20. The transceiver 34 of the first attacker, who listens to vehicle transmissions, also receives transmissions from the other transceiver 36 of the attacker's device 30. Since the device of the first attacker cannot differentiate between the transmissions of its own transceiver 36 and possible transmissions on the vehicle side, it transmits and relays this return signal to the receiver of the device 44 of the second attacker. The second attacker's device 40 cannot distinguish between the return signal and a transmission behind the vehicle, and therefore retransmits it to the key ring 20. This return signal transmitted by the transmitter of the device 44 is received by the receiver of the device 46 which listens to the transmissions in front of the key ring. This procedure continues as long as the equipment of the two attackers listens and transmits. The effect of this repeated feedback is illustrated schematically in Figure 6.
In Figure 6, the key holder 20 transmits an initial pulse 60 and a subsequent pulse 62, as shown in the upper line of the diagram. The equipment 40 of the second attacker receives the initial pulse 60 and relays it as pulse 80 to the equipment 30 of the first attacker. The equipment 30 of the first attacker then transmits the received pulse in the form of a pulse 90. The pulse 90 is sent back from the equipment 30 of the first attacker to the second attacker, the equipment of which then retransmits this pulse which is received by the second attacker's equipment like another forward transmission. The equipment of the second attacker therefore transmits this pulse in the form of pulse 82 which is relayed to the equipment of the first attacker where it is retransmitted in the form of pulse 92. Consequently, the vehicle receiver sees a composite pulse which is propagates further than the original key chain pulse, so that the vehicle controller 18 will not recognize the signals received as corresponding to those required by the sequence which has been established for this event. Consequently, the controller 18 of the electronic lock will not unlock the lock and thieves will not have access to the vehicle.
Taking into account the durations of the frames, messages, inter-frame intervals and transmission switches, the processing will generally be easier if the various durations are each chosen from a known set of durations - rather than being freely chosen from the continuum of time possible. In a system according to an embodiment of the invention, the quickest realization of a change in system mode can for example be 1 ms: thus the set of possible durations of T_swl and / or T_sw2 can be {1ms, 1.1 ms, 1.2 ms, 1.3 ms} - each set of sequence parameters for a key chain / lock installation pairing given specifying T_swl and / or T_sw2 as the values chosen from this set.
Likewise, the set of frame lengths could be chosen to be {2 ms, 2.2 ms, 2.5 ms, 3 ms, 4.2 ms, 4.5 ms, 5 ms, 7 ms, 10 ms] Likewise , the set of inter-frame intervals can be T_intl among {1 ms; 1.2ms, 1.3s, 1.4ms, 1.5ms, 2.2ms, 3ms, 4ms} T_int2 among {1ms; 1.2 ms, 1.3 s, 1.4 ms, 1.5 ms, 2.2 ms, 3 ms, 4 ms} although it may be decided that different sets of durations could be chosen for different inter-frame intervals. As noted above, it is generally preferable that the durations of the inter-frame intervals of a message containing two or more of these intervals include different values.
As already indicated, it is much more difficult to launch a successful relay attack if the parameters specified for the message sequence ensure that the interval between messages, the inter-message interval, is d '' a length comparable to the inter-frame intervals used. For this reason, it is preferable that the parameters to be specified give an inter-message interval less than at least one of the inter-frame intervals in one or more messages of the sequence.
Usually, the data transmission rate will be of the order of 20kbits / s (50ps / bit) - and the controllers of the keychain and of the lock installation can be arranged so as to accept an error of maximum bit width of 10% - 55ps for example. Thus, if a bit length received is greater than 55 ps, the controller concerned can be arranged so as not to accept the signal received as corresponding. Obviously, this requires fairly high cadence accuracy on the electronics of the keychain and lock installation - since a cadence error in the transmission of more than 5ps would result in the unlocking failure even in the absence of a relay attack. The cost of providing high-speed electronics in the keychain and installing a lock to ensure this level of accuracy will usually be justified because these same time constraints make it much more difficult for them. thieves launch an effective relay attack.
Figure 7 generally corresponds to Figure 3, but shows the first message in the sequence of messages from the lock installation (vehicle) rather than the key chain. It will be noted that the first message comprises three frames separated by two inter-frame intervals, that the time in mode_Tx (the duration of a message of the sequence) is determined by the parameters specified for the sequence and variable and unpredictable; the inter-message interval T_sw_mode is less than the inter-message interval T_off_2.
Preferably, in the embodiments of the invention, the sequence of messages to be exchanged between the lock installation and the key chain comprises at least two messages from the lock installation and the key chain. A second message exchange in the message sequence may take place using a carrier frequency different from that used for a first message exchange - the change in the carrier frequency being one of the parameters specified for this sequence. If more than two message exchanges take place, one of them can be at a different power from another (change in the power of the keychain or the lock installation, or both).
In general, as described with reference to the figures, the secret which specifies the parameters of the sequence of messages to be exchanged bidirectionally between the lock installation and the key ring, is transmitted from the lock installation to carried in the first message of the lock installation sequence or in a previous message - transmitted for example using a low frequency transmitter of the lock installation. It is however possible to design a system in which the secret is introduced into a lock installation and into the paired keychain before installation, for example as part of the manufacturing process or during commissioning. This is generally a less preferred option, but which avoids having to pass on the secret of the lock installation to the key fob for each unlocking event.
权利要求:
Claims (1)
[1" id="c-fr-0001]
[Claim 1]
claims
Passive keyless entry system for an electronic lock, the system comprising:
a lock installation comprising a first controller, a first RF transmitter and a first RF receiver; and a key chain comprising a key chain controller, a second RF transmitter and a second RF receiver, the key chain being configured to generate messages for unlocking the lock during an unlocking event;
in which :
the first controller and the keychain controller share a secret which specifies parameters for a sequence of messages to be exchanged bidirectionally between the lock installation and the keychain using the first RF transmitter and the second RF receiver, and the second RF transmitter and the first RF receiver, the parameters varying between each unlocking event and an immediately subsequent unlocking event;
wherein, for each unlocking event, the first controller or the keychain controller is configured to generate a first message of the message sequence according to the specified parameters, and so as to bring the first or second RF transmitter transmitting the first message of the sequence in accordance with the specified parameters;
and the other from the first controller and the keychain controller is configured to control the other from the first RF transmitter and the second RF transmitter so that it transmits a second message of the sequence according to the specified parameters in response to receipt of the first message in the sequence; and the first controller is further constructed so as to unlock the electronic lock only in the case where the or each message transmitted by the key chain as required by the sequence is correctly received by the first receiver; and wherein at least one message of the message sequence comprises a plurality of frames, each frame comprising a particular bit sequence, adjacent frames of the plurality of frames being separated from each other by an inter-frame interval;
adjacent messages in the message sequence being separated the
each other by an inter-message interval;and the parameters specified are such that a given message of the sequence comprises a first inter-frame interval, and the intermessage interval between the given message of the sequence and an immediately preceding message and / or an immediately subsequent message is not longer than the first interframe interval. [Claim 2] The passive keyless entry system of claim 1, wherein the given message of the message sequence comprises at least three frames, and different pairs of adjacent frames are separated by inter-frame intervals having different durations. [Claim 3] The passive keyless entry system of claim 2, wherein an inter-message interval between the given message of the sequence and an immediately preceding or immediately subsequent message of the sequence has an intermediate duration between the durations of the interframe intervals of the given message of the message sequence. [Claim 4] Passive keyless entry system according to one of the preceding claims, wherein the first controller is configured to share the secret between the first controller and the keychain controller by controlling the first RF transmitter so that it sends to the second RF receiver a first encrypted message specifying the parameters for the message sequence. [Claim 5] The passive keyless entry system of claim 4, wherein the first controller is configured to specify a different set of parameters for each attempt to unlock the electronic lock. [Claim 6] The passive keyless entry system of claim 4, wherein the parameters specified in the given message include at least one of the following:an indication whether the first or the second RF transmitter should transmit a first message of the sequence; a start time for each message in the sequence; a duration for each message in the sequence; a duration for an inter-frame interval between adjacent messages in the sequence. [Claim 7] The passive keyless entry system of claim 6, wherein the parameters specified in the given message include an indication whether the first or second RF transmitter should transmit a first message of the sequence; and a start time for each message in the sequence and / or a duration for each message in the
sequence. [Claim 8] The passive keyless entry system of claim 4, wherein the first controller is configured to control the first RF transmitter such that it sends the given message to the second RF receiver specifying parameters for a sequence of messages only after detection by the first controller that the keychain has been paired with the first controller. [Claim 9] The passive keyless entry system of claim 8, wherein the lock facility further comprises a low frequency transmitter for transmitting a wake-up message to the key fob. [Claim 10] Passive keyless entry system according to one of the preceding claims, in which the first RF transmitter and the first RF receiver are in the form of a first RF transceiver. [Claim 11] Passive keyless entry system according to one of the preceding claims, in which the second RF transmitter and the second RF receiver are designed as a second RF transceiver. [Claim 12] Passive keyless entry system according to one of the preceding claims, in which the electronic lock is a vehicle lock. [Claim 13] Passive keyless entry system according to one of the preceding claims, wherein the first and second RF transmitters operate on the same RF carrier frequency. [Claim 14] Electronic lock installation configured for passive keyless entry, the lock installation comprising:an electronic lock, an RF transmitter and an RF receiver for communication with a key chain that is configured to generate messages to unlock the lock during an unlock event, and a controller operatively coupled to the lock , the RF transmitter and the RF receiver; in which the controller shares a secret with the key chain, the secret specifying parameters for a sequence of messages to be exchanged bidirectionally between the lock installation and the key chain using the RF transmitter and the RF receiver, the parameters varying between each unlocking event and an immediately subsequent unlocking event;controlling the RF transmitter so that it sends at least one sequence message to the key chain in accordance with the specified parameters;
[Claim 15] [Claim 16] [Claim 17] [Claim 18] controlling the RF receiver so that it receives at least one sequence message transmitted by the key chain in accordance with the parameters specified;
and wherein at least one message of the message sequence comprises a plurality of frames, each frame comprising a particular bit sequence, adjacent frames of the plurality of frames being separated from each other by an inter-frame interval; adjacent messages in the message sequence being separated from each other by an inter-message interval;
and the parameters specified are such that a given message of the sequence comprises a first inter-frame interval, and the intermessage interval between the given message of the sequence and an immediately preceding message and / or an immediately subsequent message is not longer than the first inter-frame interval, and the controller is further configured to unlock the electronic lock only in the event that the or each message transmitted by the key fob as required by the sequence is correctly received by the receiver RF.
Electronic lock installation according to claim 14, in which the secret is shared between the first controller and the keychain controller in that the first controller controls the first RF transmitter so that it sends an encrypted message to the second RF receiver specifying parameters for the message sequence. An electronic lock installation according to claim 15, wherein the controller is configured to specify a different set of parameters for each attempt to unlock the electronic lock.
Electronic lock installation according to claim 15 or claim 16, in which the controller is configured to send a new encrypted message, specifying a different set of parameters for each attempt to unlock the electronic lock.
Installation of an electronic lock according to one of claims 15 to 17, in which the parameters specified in the first message include at least one of the following:
an indication whether the key chain or the RF transmitter should transmit a first message of the sequence; a start time for each message in the sequence; a duration for each message in the [Claim 19] [Claim 20] sequence; a duration for an interval between adjacent messages in the sequence.
An electronic lock installation according to claim 18, wherein the parameters specified in the first message include an indication whether the key chain or the RF transmitter should transmit a first message of the sequence; and a start time for each message in the sequence and / or a duration for each message in the sequence.
Key fob for a passive keyless entry system for an electronic lock, the key fob comprising a key fob controller, a low frequency receiver, an RF transmitter and an RF receiver, the key fob being configured to generate messages to unlock the lock during an unlocking event; in which: the keychain controller and a lock installation of the electronic lock share a secret specifying parameters for a sequence of messages to be exchanged bidirectionally between the lock installation and the keychain using the transmitter RF and the RF receiver, at least one of the messages of the sequence being specified as coming from the key chain, the parameters varying between each unlocking event and an immediately subsequent unlocking event;
at least one message of the message sequence comprises a plurality of frames, each frame comprising a particular bit sequence, adjacent frames of the plurality of frames being separated from each other by an inter-frame interval;
adjacent messages in the message sequence being separated from each other by an inter-message interval;
the parameters specified are such that a given message of the sequence comprises a first inter-frame interval, and the intermessage interval between the given message of the sequence and an immediately preceding message and / or an immediately subsequent message is not more as long as the first inter-frame interval;
the keychain controller is configured to wake up in the event that the low frequency receiver receives a low frequency wake up message from the lock facility, and to cause the RF transmitter to transmit a response to the installation, the response comprising a key chain identifier;
and
the controller is subsequently configured to control the RF transmitter so that it sends the lock installation the or each message of the specified sequence as coming from the key chain in accordance with the parameters specified. [Claim 21] The key chain of claim 20, wherein the key chain is configured to receive the parameters specified in an encrypted message from the lock facility. [Claim 22] The keychain of claim 21, wherein the keychain controller is configured to apply the specified parameters provided in an encrypted message given to a single unlock event. [Claim 23] A method of preventing a successful relay attack on a passive keyless entry system for an electronic lock of a lock installation, the system comprising a keychain configured to generate messages to unlock the lock during a unlocking event, the method comprising:for each unlocking event, the command of the first RF transmitter associated with the lock or of the second RF transmitter of the key holder so that it generates a first message of a sequence of messages in accordance with parameters specified in a secret shared between a key chain controller and a first lock installation controller;controlling the other of the first RF transmitter and the second RF transmitter so that it transmits a second message of the sequence according to the parameters specified in response to the reception of the first message of the sequence;modifying the sequence of sequence parameters for each iteration of the process, each sequence however interleaving transmissions from the first and second RF transmitters;and unlocking the electronic lock only in the event that the or each message transmitted by the key chain as required by the sequence is correctly received by an RF receiver of the lock installation;wherein the parameters specified are such that a given message of the sequence comprises a first inter-frame interval, and the inter-message interval between the given message of the sequence and an immediately preceding message and / or an immediately subsequent message n is no longer than the first inter-frame interval.
[Claim 24] The method of claim 23, wherein the given message of the message sequence comprises at least three frames, and different pairs of adjacent frames are separated by inter-frame intervals having different durations. [Claim 25] The method of claim 24, wherein an intermessage interval between the given message of the sequence and an immediately preceding or immediately subsequent message of the sequence has an intermediate duration between the durations of the inter-frame intervals of the given message of the message sequence. [Claim 26] Method according to one of claims 23 to 25, comprising:controlling the first RF transmitter so that it sends an encrypted message to the keychain specifying the parameters for the message sequence. [Claim 27] Method according to claim 26, comprising:sending a new encrypted message, specify a different set of parameters for each attempt to unlock the electronic lock. [Claim 28] The method of claim 26, wherein the parameters specified in the encrypted message include at least one of the following:an indication whether the first or the second RF transmitter should transmit a first message of the sequence; a start time for each message in the sequence; a duration for each message in the sequence; a duration for an interval between adjacent messages in the sequence. [Claim 29] The method of claim 26, wherein the parameters specified in the encrypted message include an indication whether the key chain or the RF transmitter should transmit a first message of the sequence; and a start time for each message in the sequence and / or a duration for each message in the sequence.
1/3
类似技术:
公开号 | 公开日 | 专利标题
FR3084495A1|2020-01-31|Passive keyless entry system
EP3083343B1|2019-02-06|Command execution method for a motor vehcle through data exchange between a control unit and an identifier
FR2858347A1|2005-02-04|METHOD FOR CONFIRMING AUTHORIZATION TO LOCK AND UNLOCK AND / OR USE A SECURITY OBJECT AND DEVICE
EP3306576A1|2018-04-11|Method and system for secure access to a determined space by means of a portable object
FR2709512A1|1995-03-10|Remote control device for access control.
EP1821261A1|2007-08-22|Method and device for automatically locking the doors of a vehicle
FR2808365A1|2001-11-02|Car entry/function authorization remote control system having transmitter sending signal function and receiver detecting signal/controller activating response and selecting remote control frequency for transmission
FR2706934A1|1994-12-30|
WO2016102889A1|2016-06-30|Method for controlling access to at least one function of a motor vehicle
FR2745539A1|1997-09-05|METHOD FOR CONTROLLING AN ANTI-THEFT DEVICE AND ANTI-THEFT DEVICE CONTROLLED BY SUCH A METHOD
EP1407426A1|2004-04-14|Method for keyless unlocking of an access door to a closed space
EP3350030A1|2018-07-25|Method for controlling a functionality of a vehicle by means of a user terminal and associated control system
FR2774120A1|1999-07-30|Remote security lock for vehicles
EP1152109A2|2001-11-07|Hand-free access and/or starting system for a motor vehicle
FR2891519A1|2007-04-06|Vehicle state information e.g. vehicle closing state, adjustment system for vehicle access device, has reception and transmission unit to send vehicle state with reference time to mobile identification transmitter
EP1421561A1|2004-05-26|Method for authorising locking and/or starting a motor vehicle and associated device
EP1152108B1|2005-10-05|Hand-free access system for a motor vehicle
EP1051556B1|2004-12-01|Motor vehicle locking system with open-ended code and identification
FR2797727A1|2001-02-23|Electronic lock for car has a base unit which emits a signal, this signal is coded by the key then sent back and analyzed by base in order to open the lock or not
CA2297797A1|1999-12-23|Portable object with contactless communication through two communication channels, inductive and radio wave
EP2455263B1|2013-07-17|Remote-control device for an automobile
EP1093101B1|2008-12-03|Method for automatic synchronization of a remote control key and an associated calculator
WO2021254936A1|2021-12-23|Method for activating a function of a vehicle by ultra high frequency with an item of portable user equipment and device for activating an associated function
WO2020161325A1|2020-08-13|Method for locating a smartphone in a placement area
WO2020188017A1|2020-09-24|Method for remote control of an activation of a command in a wheel unit
同族专利:
公开号 | 公开日
CN110853188A|2020-02-28|
DE102019120207A1|2020-01-30|
JP2020045757A|2020-03-26|
US10486648B1|2019-11-26|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

FR2823167B1|2001-03-30|2005-06-24|Siemens Ag|DEVICE FOR CONTROLLING A SAFETY DEVICE|
DE10255880A1|2002-11-29|2004-06-09|Philips Intellectual Property & Standards Gmbh|Electronic communication system and method for detecting a relay attack on the same|
US9386181B2|2014-03-31|2016-07-05|Google Inc.|Device proximity detection|
US20180288092A1|2017-03-30|2018-10-04|Qualcomm Incorporated|Protection from relay attacks in wireless communication systems|US11037386B2|2018-10-12|2021-06-15|Denso International America, Inc.|Passive entry/passive start systems detecting range extender type relay station attacks|
US11217049B2|2019-11-07|2022-01-04|Afero, Inc.|Secure wireless key system and method with dynamically adjustable modulation|
WO2022032700A1|2020-08-13|2022-02-17|Nanjing Easthouse Electrical Co., Ltd.|Passive electronic locks and methods of using the same|
法律状态:
2021-04-09| ST| Notification of lapse|Effective date: 20210306 |
优先权:
申请号 | 申请日 | 专利标题
US16/044,647|US10486648B1|2018-07-25|2018-07-25|Passive keyless entry system|
US16/044,647|2018-07-25|
[返回顶部]