US20090184800A1 - Cellular phone Entry Techniques - Google Patents

Cellular phone Entry Techniques Download PDF

Info

Publication number
US20090184800A1
US20090184800A1 US12/017,343 US1734308A US2009184800A1 US 20090184800 A1 US20090184800 A1 US 20090184800A1 US 1734308 A US1734308 A US 1734308A US 2009184800 A1 US2009184800 A1 US 2009184800A1
Authority
US
United States
Prior art keywords
vehicle
cellular phone
access
information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/017,343
Inventor
Scott C. Harris
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harris Technology LLC
Original Assignee
Harris Technology LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harris Technology LLC filed Critical Harris Technology LLC
Priority to US12/017,343 priority Critical patent/US20090184800A1/en
Assigned to HARRIS TECHNOLOGY, LLC reassignment HARRIS TECHNOLOGY, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HARRIS, SCOTT C
Publication of US20090184800A1 publication Critical patent/US20090184800A1/en
Priority to US13/219,634 priority patent/US8299895B2/en
Priority to US13/663,573 priority patent/US9082295B1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/90Additional features
    • G08C2201/93Remote control using other portable devices, e.g. mobile phone, PDA, laptop

Definitions

  • a cellular-phone may have Bluetooth capabilities that allow mating between the cellular-phone and the automobile so that the user of cellular phone can communicate through the automobile subsystems, e.g., use an in-vehicle microphone and/or speaker.
  • a key it is conventional to use a key to enter and drive the automobile.
  • the key is for security, e.g., to prevent theft.
  • keys can be lost.
  • High security keys are often difficult to duplicate especially for the higher security keys. Keys are one more thing that a person needs to carry.
  • the present application describes new ways of controlling access to an automobile.
  • One aspect describes use of a cellular phone to control access to the automobile. Different aspects describe different ways in which the access can be granted.
  • FIG. 1 shows a an entry system and its access to a computer in an automobile
  • FIG. 2 shows a flowchart of operation . . .
  • a conventional way of obtaining access to an automobile is to use a key.
  • the key is put into a key slot, sometimes turned or otherwise clicked into place.
  • FIG. 1 illustrates an access control part 100 of an embodiment.
  • the part 100 may be within an automobile, e.g. on the dashboard of the automobile. However, it should be understood that this can also be in any other part of the automobile, such as the door to the automobile that allows entry to the automobile from the outside.
  • the access control part 100 includes a key slot 102 into which a key can be inserted.
  • the microprocessor 110 is shown communicating with the key slot 102 .
  • the key slot 102 may be sized and configured to accept and connect to a non volatile memory device, e.g., a USB key or other flash memory.
  • the key slot 102 includes inner surfaces with contacts 103 that allow connection to the USB stick.
  • a conventional key shown as 104 or other kind of keys such as laser cut key can also be fit into the same socket.
  • either a conventional key 104 , or the USB key 105 can be put into the same hole, and either can be used to provide access to the vehicle, as explained herein.
  • an indication of authorized access is the processor 110 .
  • the processor 10 also controls connection to a wireless module 120 .
  • This wireless module may be, for example, a Bluetooth module that communicates with a number of different Bluetooth telephones such as 125 . It may also be, however, any other format of wireless module.
  • the embodiment may also allow coupling with the different Bluetooth-enabled phones in a conventional way.
  • FIG. 2 illustrates a flowchart that is carried out by the microprocessor 110 .
  • the key is inserted. This enables communication with the different subsystems in the automobile, for example, to allow entry into the automobile, and/or allow other functions.
  • one option at 210 may be the selection of a phone scan. This scans for phones in the vicinity at 220 . When a phone is found at 220 , 230 questions the user whether they want to pair the phone with the automobile. This pairing can only be done when the key is inserted, and therefore during a time when there is security (by virtue of the key having been inserted) that the authorized user is operating the vehicle. If the user selects pairing, when the phone is paired to the key at 235 .
  • a limited function key may also be provided with the vehicle, for temporary uses such as valets and car loans.
  • the limited function key allows access to the vehicle systems, but does not allow pairing. Therefore, the valet or other vehicle user cannot set their own cell phone to allow access to the vehicle.
  • the phone After pairing has been carried out, the phone is detected to allow access to the vehicle even when the key is not inserted.
  • the proximity of the cellphone is detected, and that proximity allows access to the vehicle systems.
  • the vehicle may include sensors for the phone both inside and outside of the vehicle to allow the phone (once paired) to be used for, in essence, keyless entry.
  • One embodiment may require at least one additional security aspect to be carried out in order to grant the access via cell phone only (without a key).
  • Different alternative security techniques are described herein. Some are more conventional security techniques like biometrics and codes. Others are totally new security techniques that are specially adapted for use with a vehicle.
  • a first of these new techniques is shown as 245 .
  • the automatically-obtained location e.g., the GPS location from either the phone or the automobile is either sent or stored at 245 .
  • the location of the vehicle at the time of vehicle access is therefore logged by a remote server.
  • the remote server that logs the location may be for example the automobile manufacturer's server, or may be via cell phone carrier, or may be for example the user's personal computer or e-mail address.
  • a mobile server within the automobile sends an e-mail to the user's e-mail address any time the car is accessed using the mobile phone, including its location.
  • Another embodiment keeps a log of vehicle locations when the car is accessed using the mobile phone. This minimizes the possibility of improper access, since the user running the automobile location is automatically logged.
  • this technique of ensuring security using automatically-detected position is used for security verification of some other function, other than unlocking using a cell phone.
  • Another way of verifying at 250 uses a biometric and/or a pin in addition to the cell phone proximity.
  • Either the biometric or the pin can be entered using a keyboard associated with the vehicle, or on the keyboard or other entry device or part on the phone.
  • the user may be required to enter their pin on the phone, the digits of which are detected by the Bluetooth connection.
  • a user may be required to take a picture or scan of a body part, such as a finger.
  • This second layer of authentication can further identify the user, and can match with a prestored image or other information indicative of the user.
  • the car After detecting a matched phone, and, if selected, passing the additional security steps at 245 / 250 , the car is started or opened at 255 .
  • An advantage of this system is the capability of obtaining access to the automobile with their cellular phone. No additional key is necessary. Simply possessing the cellular phone, after the initial pairing, provides the user with the ability to enter the automobile without needing a special key.
  • the menu can be used to override electronic key (e.g., USB) access, for those who do not trust the USB key as a secure mode of access.
  • electronic key e.g., USB
  • Optional additional security embodiments may also be used.
  • a key exchange system may be used between the phone and the automobile, so that all communications between the phone and the automobile is encrypted. This prevents man in the middle or other kinds of techniques, whereby unauthorized users can intercept the communication between the phone and the automobile, clone the phone or otherwise provide simulated phone information and then obtain access to the automobile.
  • Another embodiment may use a token type system running as an application in the phone, e.g., using the RSA token encryption system.
  • the token type system often starts with a specified seed, and uses that seed and real time clock to produce a number.
  • the server here the car, also has the seed, and also has the real time. Therefore, the car is able to determine from the number whether the proper seed has been used, and hence, whether the provided token is authorized.
  • the automobile can hence determine if the token is correct.
  • part of the pairing may include transferring a unique token seed from the vehicle to the phone, or from the phone to the vehicle.
  • Another embodiment may require that the phone be connected via a wire to the vehicle for the initial pairing. Subsequent uses of the phone to obtain access can be wireless, but the initial pairing in this embodiment must be over a wire, e.g., a USB cable. This prevents a listener from obtaining the token information by eavesdropping.
  • an interceptor of the token obtains no information that could be used to create a token at any other time.
  • the token is only good for a few minutes.
  • the token system may allow 1-5 minutes of leeway in their system between the times of the two real-time clocks to allow for drift between the clocks. After that few minutes has elapsed, the token number cannot be used again.
  • the token that is sent to the vehicle may be determined within the cellular phone in a way that is transparent to the cell phone user. The user might not even know that the token is being created. Other techniques may also be used to ensure that the actual cellphone that was paired, is later the one used to However, a man in the middle cannot clone the phone and steal or otherwise obtain access to the vehicle. Access requires the actual cellular phone, with its token and its unique seed therein.
  • the key is a code on a non-volatile device such as a USB key 105 .
  • the code on that key is verified by the automobile to allow starting or other access to the vehicle.
  • This code can be a very large number, for example a 2048 byte number. If the code on the key matches to one or many codes within the automobile, then the car systems can be accessed; and the engine can be started.
  • This system may also use a biometric verification.
  • USB key when USB key is used as a key, it allows simplified copying of the key.
  • the key can simply be put into a computer, and copied to another USB key into the computer. Therefore, user can easily make many copies.
  • the USB key can store many different codes thereon.
  • the same key can be used to control many different vehicles. For example, the key can have five different codes thereon, one of which may start the vehicle. A different one of the codes can be used to control and start some other vehicle.
  • a single USB key therefore, acts as a key to many different vehicles.
  • the same key can also be used, for example, for entry to a house, or the like.
  • the USB key may have a number thereon, and the car can be trained to accept that number in the same way it is trained to detect to accept a matched phone.
  • the single number on the key can control many different vehicles.
  • the number on the key may be rewritable, or may be fixed.
  • the key can be purchased with a fixed code, and the vehicle trained to operate using that key.
  • USB key Another advantage of the USB key is that the code can be downloaded. If you lose or misplace your car key, you are not stranded: you can download a number that can be used to operate the vehicle. That can be either the actual number from the USB key, or a one time use temporary number.
  • the download may be from the user's own personal server, or from the automobile's server (run as a web appliance, for example), or from the automobile company's server.
  • the system allows download of a key that represents access to your vehicle.
  • the key may be the real key, or may be a temporary key.
  • Temporary keys may be made like tokens, where they are based on the unique seed in the server, and are valid for some limited period, e.g., 15 minutes or 2 hours.
  • Another embodiment teaches that when a lower security entry is obtained, for example when the key is downloaded, or when the cell phone is used for access, then the location of the vehicle is logged.
  • a limited location key to be downloaded.
  • This downloaded key is specific to a specific location.
  • a new key is requested including an indication of a location of the vehicle.
  • the request may indicate a location, or may be initiated from a location near the vehicle.
  • the downloaded key is only good to access the vehicle at or near that location.
  • the automobile has a GPS unit 140 therein.
  • the key that is downloaded has a location coded therein.
  • the vehicle checks its own location against the location in the downloaded key. The key cannot be used unless the location is correct or at least close to accurate. However, if the location is correct, then the key can be used for a certain period (e.g., one ride) even if the vehicle thereafter is moved.
  • FIG. 3 illustrates a flow chart of this embodiment.
  • the user identifies themselves to a server.
  • the server recognizes the credentials at 305 , and allows the user to get a new key.
  • the new key is limited in some way.
  • the new key may be limited in time and usable for only 3 to 15 minutes, for example, to start the vehicle.
  • the user provides their location information at 310 . This could be done via GPS over cell phone, or may be done using a map or by entering address information.
  • the location information is converted to GPS information.
  • a key is provided that is combined with location information and is limited in the location where it can be used.
  • the user takes the key and uses it in the vehicle.
  • the vehicle determines at 325 whether the actual location information correctly matches with the location information in the key. For example, in an embodiment, the user must be within 2000 feet of the entered location in order for the key to the accepted. This may use, for example, the GPS information in the automobile. If correct, access is granted at 330 . The user having requested this information provides, therefore, the vehicle location. Therefore, the key is only good if it starts the car at a known location, requiring, therefore, that the vehicle location becomes known.
  • the keys can simply be downloaded, and are usable for some short amount of time without the location information.
  • Another embodiment may allow the keys to be downloaded and to be maintained forever.
  • the communicator described herein may include any kind of computer, either general purpose, or some specific purpose computer such as a workstation.
  • the computer may be an Intel (e.g., Pentium or Core 2 duo) or AMD based computer, running Windows XP or Linux, or may be a Macintosh computer.
  • the programs may be written in C or Python, or Java, Brew or any other programming language.
  • the programs may be resident on a storage medium, e.g., magnetic or optical, e.g. the computer hard drive, a removable disk or media such as a memory stick or SD media, wired or wireless network based or Bluetooth based Network Attached Storage (NAS), or other removable medium or other removable medium.
  • the programs may also be run over a network, for example, with a server or other machine sending signals to the local machine, which allows the local machine to carry out the operations described herein.

Abstract

A cell phone is mated with the vehicle system and thereafter used to obtain access to the vehicle. A user who has a cell phone automatically can obtain access to the vehicle. An embodiment describes a USB key that provides access to the vehicle, and in an emergency, either a complete or partial version of the key can be downloaded from a server.

Description

    BACKGROUND
  • Many automobiles have the capability to communicate with a cellular phone. For example, a cellular-phone may have Bluetooth capabilities that allow mating between the cellular-phone and the automobile so that the user of cellular phone can communicate through the automobile subsystems, e.g., use an in-vehicle microphone and/or speaker.
  • In addition, it is conventional to use a key to enter and drive the automobile. The key is for security, e.g., to prevent theft. However, keys can be lost. High security keys are often difficult to duplicate especially for the higher security keys. Keys are one more thing that a person needs to carry.
  • SUMMARY
  • The present application describes new ways of controlling access to an automobile.
  • One aspect describes use of a cellular phone to control access to the automobile. Different aspects describe different ways in which the access can be granted.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other aspects will now be described in detail to the accompanying drawings in which:
  • FIG. 1 shows a an entry system and its access to a computer in an automobile;
  • FIG. 2 shows a flowchart of operation . . .
  • DETAILED DESCRIPTION
  • A conventional way of obtaining access to an automobile is to use a key. In order to do this, the key is put into a key slot, sometimes turned or otherwise clicked into place.
  • FIG. 1 illustrates an access control part 100 of an embodiment. The part 100 may be within an automobile, e.g. on the dashboard of the automobile. However, it should be understood that this can also be in any other part of the automobile, such as the door to the automobile that allows entry to the automobile from the outside. The access control part 100 includes a key slot 102 into which a key can be inserted.
  • Many automobiles operate using a controllable microprocessor. The microprocessor 110 is shown communicating with the key slot 102. In this embodiment, the key slot 102 may be sized and configured to accept and connect to a non volatile memory device, e.g., a USB key or other flash memory. The key slot 102 includes inner surfaces with contacts 103 that allow connection to the USB stick. In addition, however, a conventional key shown as 104 or other kind of keys such as laser cut key can also be fit into the same socket. In the embodiment, either a conventional key 104, or the USB key 105 can be put into the same hole, and either can be used to provide access to the vehicle, as explained herein.
  • Once either key is inserted in the proper way, an indication of authorized access is the processor 110. This allows access to the automobile systems. For example the access allows the automobile to be started, or the door to be opened, or different menus to be accessed. The processor 10 also controls connection to a wireless module 120. This wireless module may be, for example, a Bluetooth module that communicates with a number of different Bluetooth telephones such as 125. It may also be, however, any other format of wireless module.
  • The embodiment may also allow coupling with the different Bluetooth-enabled phones in a conventional way.
  • FIG. 2 illustrates a flowchart that is carried out by the microprocessor 110. At 200, the key is inserted. This enables communication with the different subsystems in the automobile, for example, to allow entry into the automobile, and/or allow other functions. After access is granted based on the key being inserted at 200, one option at 210 may be the selection of a phone scan. This scans for phones in the vicinity at 220. When a phone is found at 220, 230 questions the user whether they want to pair the phone with the automobile. This pairing can only be done when the key is inserted, and therefore during a time when there is security (by virtue of the key having been inserted) that the authorized user is operating the vehicle. If the user selects pairing, when the phone is paired to the key at 235.
  • A limited function key may also be provided with the vehicle, for temporary uses such as valets and car loans. The limited function key allows access to the vehicle systems, but does not allow pairing. Therefore, the valet or other vehicle user cannot set their own cell phone to allow access to the vehicle.
  • After pairing has been carried out, the phone is detected to allow access to the vehicle even when the key is not inserted. The proximity of the cellphone is detected, and that proximity allows access to the vehicle systems.
  • The vehicle may include sensors for the phone both inside and outside of the vehicle to allow the phone (once paired) to be used for, in essence, keyless entry.
  • One embodiment may require at least one additional security aspect to be carried out in order to grant the access via cell phone only (without a key). Different alternative security techniques are described herein. Some are more conventional security techniques like biometrics and codes. Others are totally new security techniques that are specially adapted for use with a vehicle.
  • A first of these new techniques is shown as 245. Many vehicles, and virtually all cellphones, have GPS capability that allows determination of their specific location. The inventor noticed that determining and logging the location of a vehicle is a very strong indicia of security—since the location of the vehicle provides the ability to reclaim the vehicle. The automatically-obtained location, e.g., the GPS location from either the phone or the automobile is either sent or stored at 245. The location of the vehicle at the time of vehicle access is therefore logged by a remote server. The remote server that logs the location may be for example the automobile manufacturer's server, or may be via cell phone carrier, or may be for example the user's personal computer or e-mail address.
  • In one embodiment, a mobile server within the automobile sends an e-mail to the user's e-mail address any time the car is accessed using the mobile phone, including its location. Another embodiment keeps a log of vehicle locations when the car is accessed using the mobile phone. This minimizes the possibility of improper access, since the user running the automobile location is automatically logged.
  • In another embodiment, this technique of ensuring security using automatically-detected position, is used for security verification of some other function, other than unlocking using a cell phone.
  • Another way of verifying at 250 uses a biometric and/or a pin in addition to the cell phone proximity. Either the biometric or the pin can be entered using a keyboard associated with the vehicle, or on the keyboard or other entry device or part on the phone. For example, the user may be required to enter their pin on the phone, the digits of which are detected by the Bluetooth connection. A user may be required to take a picture or scan of a body part, such as a finger. This second layer of authentication can further identify the user, and can match with a prestored image or other information indicative of the user.
  • After detecting a matched phone, and, if selected, passing the additional security steps at 245/250, the car is started or opened at 255.
  • An advantage of this system is the capability of obtaining access to the automobile with their cellular phone. No additional key is necessary. Simply possessing the cellular phone, after the initial pairing, provides the user with the ability to enter the automobile without needing a special key.
  • Other functions can also be carried out on the menu. For example, the menu can be used to override electronic key (e.g., USB) access, for those who do not trust the USB key as a secure mode of access.
  • Optional additional security embodiments may also be used. For example, a key exchange system may be used between the phone and the automobile, so that all communications between the phone and the automobile is encrypted. This prevents man in the middle or other kinds of techniques, whereby unauthorized users can intercept the communication between the phone and the automobile, clone the phone or otherwise provide simulated phone information and then obtain access to the automobile.
  • Another embodiment may use a token type system running as an application in the phone, e.g., using the RSA token encryption system. For example, the token type system often starts with a specified seed, and uses that seed and real time clock to produce a number. The server, here the car, also has the seed, and also has the real time. Therefore, the car is able to determine from the number whether the proper seed has been used, and hence, whether the provided token is authorized. The automobile can hence determine if the token is correct. In the embodiment, part of the pairing may include transferring a unique token seed from the vehicle to the phone, or from the phone to the vehicle.
  • Another embodiment may require that the phone be connected via a wire to the vehicle for the initial pairing. Subsequent uses of the phone to obtain access can be wireless, but the initial pairing in this embodiment must be over a wire, e.g., a USB cable. This prevents a listener from obtaining the token information by eavesdropping.
  • After pairing, an interceptor of the token obtains no information that could be used to create a token at any other time.
  • The token is only good for a few minutes. For example, the token system may allow 1-5 minutes of leeway in their system between the times of the two real-time clocks to allow for drift between the clocks. After that few minutes has elapsed, the token number cannot be used again.
  • The token that is sent to the vehicle may be determined within the cellular phone in a way that is transparent to the cell phone user. The user might not even know that the token is being created. Other techniques may also be used to ensure that the actual cellphone that was paired, is later the one used to However, a man in the middle cannot clone the phone and steal or otherwise obtain access to the vehicle. Access requires the actual cellular phone, with its token and its unique seed therein.
  • Other techniques beside a token can be used; for example, any technique that verifies the cellphone hardware can be used for this purpose. The technique is preferably encryption based, but can use other techniques.
  • In an embodiment, the key is a code on a non-volatile device such as a USB key 105. The code on that key is verified by the automobile to allow starting or other access to the vehicle. This code can be a very large number, for example a 2048 byte number. If the code on the key matches to one or many codes within the automobile, then the car systems can be accessed; and the engine can be started.
  • This system may also use a biometric verification.
  • One advantage of this system is that when USB key is used as a key, it allows simplified copying of the key. The key can simply be put into a computer, and copied to another USB key into the computer. Therefore, user can easily make many copies. Also, if many different automobiles use a USB key, the USB key can store many different codes thereon. The same key can be used to control many different vehicles. For example, the key can have five different codes thereon, one of which may start the vehicle. A different one of the codes can be used to control and start some other vehicle. A single USB key, therefore, acts as a key to many different vehicles. The same key can also be used, for example, for entry to a house, or the like.
  • In another embodiment, the USB key may have a number thereon, and the car can be trained to accept that number in the same way it is trained to detect to accept a matched phone. In this way, the single number on the key can control many different vehicles. The number on the key may be rewritable, or may be fixed. In this embodiment, the key can be purchased with a fixed code, and the vehicle trained to operate using that key.
  • Another advantage of the USB key is that the code can be downloaded. If you lose or misplace your car key, you are not stranded: you can download a number that can be used to operate the vehicle. That can be either the actual number from the USB key, or a one time use temporary number.
  • The download may be from the user's own personal server, or from the automobile's server (run as a web appliance, for example), or from the automobile company's server. Once identifying yourself, the system allows download of a key that represents access to your vehicle. The key may be the real key, or may be a temporary key. Temporary keys may be made like tokens, where they are based on the unique seed in the server, and are valid for some limited period, e.g., 15 minutes or 2 hours.
  • Another embodiment teaches that when a lower security entry is obtained, for example when the key is downloaded, or when the cell phone is used for access, then the location of the vehicle is logged. One embodiment allows a limited location key to be downloaded. This downloaded key is specific to a specific location. In this embodiment, for example, a new key is requested including an indication of a location of the vehicle. For example—the request may indicate a location, or may be initiated from a location near the vehicle. The downloaded key is only good to access the vehicle at or near that location. The automobile has a GPS unit 140 therein. The key that is downloaded has a location coded therein. The vehicle checks its own location against the location in the downloaded key. The key cannot be used unless the location is correct or at least close to accurate. However, if the location is correct, then the key can be used for a certain period (e.g., one ride) even if the vehicle thereafter is moved.
  • FIG. 3 illustrates a flow chart of this embodiment. At 300, the user identifies themselves to a server. The server recognizes the credentials at 305, and allows the user to get a new key. In one embodiment, the new key is limited in some way. The new key may be limited in time and usable for only 3 to 15 minutes, for example, to start the vehicle. In another embodiment, the user provides their location information at 310. This could be done via GPS over cell phone, or may be done using a map or by entering address information. The location information is converted to GPS information. At 315, a key is provided that is combined with location information and is limited in the location where it can be used.
  • At 320, the user takes the key and uses it in the vehicle. The vehicle determines at 325 whether the actual location information correctly matches with the location information in the key. For example, in an embodiment, the user must be within 2000 feet of the entered location in order for the key to the accepted. This may use, for example, the GPS information in the automobile. If correct, access is granted at 330. The user having requested this information provides, therefore, the vehicle location. Therefore, the key is only good if it starts the car at a known location, requiring, therefore, that the vehicle location becomes known.
  • According to another embodiment, the keys can simply be downloaded, and are usable for some short amount of time without the location information. Another embodiment may allow the keys to be downloaded and to be maintained forever.
  • In this way, simply walking up to the vehicle with a cell phone in your pocket or on your person allows access to the vehicle systems including but not limited to door opening, and ignition access.same slot, memory or key.
  • The general structure and techniques, and more specific embodiments which can be used to effect different ways of carrying out the more general goals are described herein.
  • Although only a few embodiments have been disclosed in detail above, other embodiments are possible and the inventor intends these to be encompassed within this specification. The specification describes specific examples to accomplish a more general goal that may be accomplished in another way. This disclosure is intended to be exemplary, and the claims are intended to cover any modification or alternative which might be predictable to a person having ordinary skill in the art. For example, other case sizes and shapes are intended to be encompassed. Other kinds of communicators beyond cell phones and blackberry type devices are contemplated. The electronic keys can be in any nonvolatile memory form—smart card, SD memory, FireWire memories, smart cards, as well as other flash memory, can be used for this purpose. Other vehicles beside automobiles may be controlled in this way.
  • Also, the inventor intends that only those claims which use the words “means for” are intended to be interpreted under 35 USC 112, sixth paragraph. Moreover, no limitations from the specification are intended to be read into any claims, unless those limitations are expressly included in the claims. The communicator described herein may include any kind of computer, either general purpose, or some specific purpose computer such as a workstation. The computer may be an Intel (e.g., Pentium or Core 2 duo) or AMD based computer, running Windows XP or Linux, or may be a Macintosh computer.
  • The programs may be written in C or Python, or Java, Brew or any other programming language. The programs may be resident on a storage medium, e.g., magnetic or optical, e.g. the computer hard drive, a removable disk or media such as a memory stick or SD media, wired or wireless network based or Bluetooth based Network Attached Storage (NAS), or other removable medium or other removable medium. The programs may also be run over a network, for example, with a server or other machine sending signals to the local machine, which allows the local machine to carry out the operations described herein.
  • Where a specific numerical value is mentioned herein, it should be considered that the value may be increased or decreased by 20%, while still staying within the teachings of the present application, unless some different range is specifically mentioned. Where a specified logical sense is used, the opposite logical sense is also intended to be encompassed.

Claims (20)

1. A method, comprising:
storing information in a vehicle, said information being indicative of at least a first cellular phone, wherein said information includes unique information indicative of said first cellular phone;
detecting a proximity of said first cellular phone; and
allowing access to said vehicle responsive to said detecting said proximity of said cellular phone.
2. A method as in claim 1, wherein said detecting wirelessly senses the cellular phone.
3. A method as in claim 1, further comprising an initial step of establishing authorization, and once establishing said authorization, to store said information indicative of said first cellular phone in said vehicle, and thereafter to use the first cellular phone to obtain access to said vehicle.
4. A method as in claim 1, wherein said obtaining access comprises allowing a user to enter the vehicle.
5. A method as in claim 1, wherein said obtaining access comprises allowing the user to start the vehicle.
6. A method as in claim 1, further comprising allow requiring at least one additional security aspect in addition to proximity of said cellular phone, prior to granting access to the vehicle.
7. A method as in claim 6, wherein said additional information is digits entered using said cellular phone.
8. A method as in claim 6, wherein said additional information is an automatically-obtained location.
from cell phone
9. A method as in claim 1, wherein said establishing authorization comprises reading a code from a non-volatile memory, and using said code to establish said access.
10. A method as in claim 2, further comprising requiring at least one cryptographic code from said cellular phone that cannot be provided by another cellular phone.
11. An automobile access system, comprising:
a wireless detection part, that determines presence of wireless phones, and allows connection with said wireless phones and exchanging information with said wireless phones;
a processor, that controls access to at least one of entry to the vehicle and/or starting of the vehicle, and accesses a list of authorized cellular phones, and determines if information indicative of one of said cellular phones is on said list, detects proximity of said one cellular phone, and allows said access to the vehicle based on said proximity of said cellular phone.
12. A system as in claim 11, wherein said processor also requires at least one additional security aspect prior to allowing said access to the vehicle.
13. A system as in claim 11, wherein said at least one additional item of information is entered on the cellular phone, and said vehicle detects said entry on the cellular phone and verifies said item of information as said at least one additional security aspect.
14. A system as in claim 11, wherein said at least one additional item of information is a determination of an automatically-detected location.
15. A system as in claim 12, wherein said at least one additional security aspect includes verifying a code produced by said cellular phone as having been created by said cellular phone.
16. A method, comprising:
using an electronic key, which includes an electronic code thereon to provide access to a secured part;
allowing the user to access a server, and to download a new electronic code; and
using said new electronic code to access said part.
17. A method as in claim 16, wherein said area is an automobile.
18. A method as in claim 17, further comprising requiring that the code includes location information, and allowing access to said automobile only if said location information agrees with an automatically-determined location information.
19. A method as in claim 17, wherein said key is usable only for a specified short period of time.
20. A method as in claim 18, further comprising determining location information using a GPS device in an automobile, and comparing said location information obtained said GPS device with location information included within said new electronics code.
US12/017,343 2008-01-22 2008-01-22 Cellular phone Entry Techniques Abandoned US20090184800A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US12/017,343 US20090184800A1 (en) 2008-01-22 2008-01-22 Cellular phone Entry Techniques
US13/219,634 US8299895B2 (en) 2008-01-22 2011-08-27 Cellular phone entry techniques
US13/663,573 US9082295B1 (en) 2008-01-22 2012-10-30 Cellular phone entry techniques

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/017,343 US20090184800A1 (en) 2008-01-22 2008-01-22 Cellular phone Entry Techniques

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/219,634 Continuation US8299895B2 (en) 2008-01-22 2011-08-27 Cellular phone entry techniques

Publications (1)

Publication Number Publication Date
US20090184800A1 true US20090184800A1 (en) 2009-07-23

Family

ID=40876018

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/017,343 Abandoned US20090184800A1 (en) 2008-01-22 2008-01-22 Cellular phone Entry Techniques
US13/219,634 Expired - Fee Related US8299895B2 (en) 2008-01-22 2011-08-27 Cellular phone entry techniques
US13/663,573 Expired - Fee Related US9082295B1 (en) 2008-01-22 2012-10-30 Cellular phone entry techniques

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/219,634 Expired - Fee Related US8299895B2 (en) 2008-01-22 2011-08-27 Cellular phone entry techniques
US13/663,573 Expired - Fee Related US9082295B1 (en) 2008-01-22 2012-10-30 Cellular phone entry techniques

Country Status (1)

Country Link
US (3) US20090184800A1 (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110086668A1 (en) * 2009-10-14 2011-04-14 Dipam Patel Mobile Telephone for Remote Operation
US8410898B1 (en) * 2012-08-16 2013-04-02 Google Inc. Near field communication based key sharing techniques
US20130278405A1 (en) * 2012-04-21 2013-10-24 Benjamin Bacal Inhibiting distracting operations of personal handheld devices by the operator of a vehicle
US8788113B2 (en) 2011-06-13 2014-07-22 Ford Global Technologies, Llc Vehicle driver advisory system and method
US8849519B2 (en) 2011-08-09 2014-09-30 Ford Global Technologies, Llc Method and apparatus for vehicle hardware theft prevention
US20150024686A1 (en) * 2013-07-16 2015-01-22 GM Global Technology Operations LLC Secure simple pairing through embedded vehicle network access device
US8947221B2 (en) 2013-02-26 2015-02-03 Ford Global Technologies, Llc Method and apparatus for tracking device connection and state change
US9002536B2 (en) 2013-03-14 2015-04-07 Ford Global Technologies, Llc Key fob security copy to a mobile phone
US9064101B2 (en) 2011-04-01 2015-06-23 Ford Global Technologies, Llc Methods and systems for authenticating one or more users of a vehicle communications and information system
US9141583B2 (en) 2013-03-13 2015-09-22 Ford Global Technologies, Llc Method and system for supervising information communication based on occupant and vehicle environment
US9207924B2 (en) 2010-08-04 2015-12-08 Premkumar Jonnala Apparatus for enabling delivery and access of applications and interactive services
US20160049033A1 (en) * 2014-08-18 2016-02-18 Myine Electronics, Inc. Method and system for a key fob base station enabling remote car access using a nomadic device
FR3030830A1 (en) * 2014-12-23 2016-06-24 Valeo Comfort & Driving Assistance METHOD OF SECURING ACCESS TO AT LEAST ONE FUNCTIONALITY OF A MOTOR VEHICLE BY A MOBILE TERMINAL
US9384613B2 (en) 2012-08-16 2016-07-05 Google Inc. Near field communication based key sharing techniques
WO2016132078A1 (en) * 2015-02-18 2016-08-25 Valeo Comfort And Driving Assistance Method of securing access to at least one functionality of a motor vehicle by a mobile terminal
US9452735B2 (en) 2011-02-10 2016-09-27 Ford Global Technologies, Llc System and method for controlling a restricted mode in a vehicle
DE102016106057A1 (en) 2015-04-09 2016-10-13 Ford Global Technologies, Llc SYSTEMS AND METHOD FOR MOBILE PHONE KEY-HANDBOOK MANAGEMENT
FR3037678A1 (en) * 2015-06-16 2016-12-23 Peugeot Motocycles Sa CONTROL SYSTEM WITH INTELLIGENT ELECTRONIC KEY HAVING A PHYSICAL CONNECTION INTERFACE FOR A TWO OR THREE-WHEEL MACHINE
US9569403B2 (en) 2012-05-03 2017-02-14 Ford Global Technologies, Llc Methods and systems for authenticating one or more users of a vehicle communications and information system
US9639688B2 (en) 2010-05-27 2017-05-02 Ford Global Technologies, Llc Methods and systems for implementing and enforcing security and resource policies for a vehicle
US20170142205A1 (en) * 2015-11-13 2017-05-18 Ford Global Technologies, Llc Method and apparatus for utilzing nfc to establish a secure connection
US9688246B2 (en) 2013-02-25 2017-06-27 Ford Global Technologies, Llc Method and apparatus for in-vehicle alarm activation and response handling
US10097993B2 (en) 2011-07-25 2018-10-09 Ford Global Technologies, Llc Method and apparatus for remote authentication
US10167837B2 (en) 2009-10-14 2019-01-01 Dipam Patel Mobile telephone for remote operation
US10187793B2 (en) * 2010-09-28 2019-01-22 Valeo Securite Habitacle Method for pairing a mobile telephone with a motor vehicle and locking/unlocking set
US20190066414A1 (en) * 2015-10-30 2019-02-28 Faraday&Future Inc. Authentication control system for a vehicle
US20200372735A1 (en) * 2019-05-20 2020-11-26 Pixart Imaging Inc. Scheme for setting/using electronic device as keyless device of vehicle and adjusting devices in the vehicle
US11015561B2 (en) * 2014-04-24 2021-05-25 Ford Global Technologies, Llc Method and apparatus for vehicle and mobile device coordination
US11945399B1 (en) * 2020-06-01 2024-04-02 Larry V. Ruthven Vehicle ignition interlock

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2206277A4 (en) * 2007-10-22 2013-02-13 Microlatch Pty Ltd A transmitter for transmitting a secure access signal
US8614622B2 (en) * 2010-03-08 2013-12-24 Ford Global Technologies, Llc Method and system for enabling an authorized vehicle driveaway
US9126545B2 (en) * 2011-02-25 2015-09-08 GM Global Technology Operations LLC Vehicle systems activation methods and applications
DE102011018749B4 (en) * 2011-04-27 2016-09-15 Audi Ag A method of activating a function of a vehicle from a long distance
US8947202B2 (en) * 2011-10-20 2015-02-03 Apple Inc. Accessing a vehicle using portable devices
US8995908B2 (en) * 2012-01-25 2015-03-31 Blackberry Limited Mobile communications system providing enhanced out of band (OOB) bluetooth pairing and related methods
US9330514B2 (en) 2012-07-25 2016-05-03 Utc Fire & Security Corporation Systems and methods for locking device management
DE102012022786A1 (en) * 2012-11-22 2014-05-22 Volkswagen Aktiengesellschaft Method for an access system for vehicle and for starting vehicle by mobile terminal, involves verifying identification information of identification device by control device, where control device checks based on identification information
WO2014153452A1 (en) 2013-03-22 2014-09-25 Utc Fire And Security Americas Corporation, Inc. Secure electronic lock
US9666005B2 (en) 2014-02-14 2017-05-30 Infinitekey, Inc. System and method for communicating with a vehicle
WO2015168459A1 (en) 2014-04-30 2015-11-05 Dura Operating Llc Vehicular keyless entry system
EP2945129B1 (en) 2014-05-14 2019-10-02 Volvo Car Corporation Methods and systems for enabling a temporary user to gain temporary access to a locked space of a vehicle
CN105100526B (en) * 2015-07-01 2018-01-19 北汽福田汽车股份有限公司 The long-range control method and system of vehicle
US20170080896A1 (en) * 2015-09-18 2017-03-23 Ford Global Technologies, Llc Method and apparatus for secure pairing based on fob presence
US10882493B2 (en) 2016-02-04 2021-01-05 Apple Inc. System and method for vehicle authorization
EP3734317B1 (en) 2016-04-15 2022-08-03 Denso Corporation System and method for establishing real-time location
US11113953B2 (en) * 2016-09-14 2021-09-07 Ford Global Technologies, Llc Vehicle-paired device range extension method and system
US10501053B2 (en) 2016-10-10 2019-12-10 Honda Motor Co., Ltd. System and method for providing access to a vehicle and enabling data off-boarding
CN113490147A (en) 2016-12-14 2021-10-08 株式会社电装 System and method for establishing location information about portable device and vehicle
US10412581B2 (en) 2017-02-14 2019-09-10 Ford Global Technologies, Llc Secure session communication between a mobile device and a base station
US11493348B2 (en) 2017-06-23 2022-11-08 Direct Current Capital LLC Methods for executing autonomous rideshare requests
US11106927B2 (en) 2017-12-27 2021-08-31 Direct Current Capital LLC Method for monitoring an interior state of an autonomous vehicle
US10853629B2 (en) 2018-02-20 2020-12-01 Direct Current Capital LLC Method for identifying a user entering an autonomous vehicle

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6381699B2 (en) * 1998-01-02 2002-04-30 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
US20030137398A1 (en) * 2001-04-05 2003-07-24 Koichi Shibata Security system of construction machinery
US6748541B1 (en) * 1999-10-05 2004-06-08 Aladdin Knowledge Systems, Ltd. User-computer interaction method for use by a population of flexibly connectable computer systems
US6763399B2 (en) * 1998-11-10 2004-07-13 Aladdin Knowledge Systems, Ltd. USB key apparatus for interacting with a USB host via a USB port
US20040263316A1 (en) * 2003-06-24 2004-12-30 Case, Llc Reprogrammable vehicle access control system
US20060208856A1 (en) * 2005-03-15 2006-09-21 Denso Corporation Remote control system and method
US20070200671A1 (en) * 2006-02-28 2007-08-30 Kelley Nia L Methods and apparatuses for remote control of vehicle devices and vehicle lock-out notification
US20070290792A1 (en) * 2006-06-12 2007-12-20 Nissan Motor Co., Ltd. Door lock mechanism controller and method of controlling door lock mechanism
US20090163140A1 (en) * 2005-01-25 2009-06-25 Packham Donald L Biochip electroporator and its use in multi-site, single-cell electroporation
US20100141381A1 (en) * 2006-12-20 2010-06-10 Olle Bliding Access control system, lock device, administration device, and associated methods and computer program products

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5774060A (en) * 1994-08-16 1998-06-30 Kiekert Ag Motor-vehicle central lock system with transponder in key
DE10064546C1 (en) * 2000-12-22 2002-07-04 Huf Huelsbeck & Fuerst Gmbh Locking system for motor vehicles
FI111494B (en) * 2001-06-29 2003-07-31 Nokia Corp Wireless interface extension
US7091857B2 (en) * 2004-02-12 2006-08-15 Mi-Jack Products, Inc. Electronic control system used in security system for cargo trailers
US8401588B2 (en) * 2004-10-28 2013-03-19 Broadcom Corporation Dual mode human interface device
US7636549B2 (en) * 2006-04-21 2009-12-22 Abbott Medical Optics Inc. Automated bonding for wireless devices
US8089339B2 (en) * 2006-12-21 2012-01-03 Cingular Wireless Ii, Llc Wireless device as programmable vehicle key

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6381699B2 (en) * 1998-01-02 2002-04-30 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
US6763399B2 (en) * 1998-11-10 2004-07-13 Aladdin Knowledge Systems, Ltd. USB key apparatus for interacting with a USB host via a USB port
US6748541B1 (en) * 1999-10-05 2004-06-08 Aladdin Knowledge Systems, Ltd. User-computer interaction method for use by a population of flexibly connectable computer systems
US20030137398A1 (en) * 2001-04-05 2003-07-24 Koichi Shibata Security system of construction machinery
US20040263316A1 (en) * 2003-06-24 2004-12-30 Case, Llc Reprogrammable vehicle access control system
US20090163140A1 (en) * 2005-01-25 2009-06-25 Packham Donald L Biochip electroporator and its use in multi-site, single-cell electroporation
US20060208856A1 (en) * 2005-03-15 2006-09-21 Denso Corporation Remote control system and method
US20070200671A1 (en) * 2006-02-28 2007-08-30 Kelley Nia L Methods and apparatuses for remote control of vehicle devices and vehicle lock-out notification
US20070290792A1 (en) * 2006-06-12 2007-12-20 Nissan Motor Co., Ltd. Door lock mechanism controller and method of controlling door lock mechanism
US20100141381A1 (en) * 2006-12-20 2010-06-10 Olle Bliding Access control system, lock device, administration device, and associated methods and computer program products

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8983534B2 (en) * 2009-10-14 2015-03-17 Dipam Patel Mobile telephone for remote operation
US10167837B2 (en) 2009-10-14 2019-01-01 Dipam Patel Mobile telephone for remote operation
US20110086668A1 (en) * 2009-10-14 2011-04-14 Dipam Patel Mobile Telephone for Remote Operation
US9639688B2 (en) 2010-05-27 2017-05-02 Ford Global Technologies, Llc Methods and systems for implementing and enforcing security and resource policies for a vehicle
US9215273B2 (en) 2010-08-04 2015-12-15 Premkumar Jonnala Apparatus for enabling delivery and access of applications and interactive services
US10255059B2 (en) 2010-08-04 2019-04-09 Premkumar Jonnala Method apparatus and systems for enabling delivery and access of applications and services
US11640287B2 (en) 2010-08-04 2023-05-02 Aprese Systems Texas Llc Method, apparatus and systems for enabling delivery and access of applications and services
US9207924B2 (en) 2010-08-04 2015-12-08 Premkumar Jonnala Apparatus for enabling delivery and access of applications and interactive services
US9210214B2 (en) 2010-08-04 2015-12-08 Keertikiran Gokul System, method and apparatus for enabling access to applications and interactive services
US10187793B2 (en) * 2010-09-28 2019-01-22 Valeo Securite Habitacle Method for pairing a mobile telephone with a motor vehicle and locking/unlocking set
US10486716B2 (en) 2011-02-10 2019-11-26 Ford Global Technologies, Llc System and method for controlling a restricted mode in a vehicle
US9452735B2 (en) 2011-02-10 2016-09-27 Ford Global Technologies, Llc System and method for controlling a restricted mode in a vehicle
US10692313B2 (en) 2011-04-01 2020-06-23 Ford Global Technologies, Llc Methods and systems for authenticating one or more users of a vehicle communications and information system
US9064101B2 (en) 2011-04-01 2015-06-23 Ford Global Technologies, Llc Methods and systems for authenticating one or more users of a vehicle communications and information system
US8788113B2 (en) 2011-06-13 2014-07-22 Ford Global Technologies, Llc Vehicle driver advisory system and method
US10097993B2 (en) 2011-07-25 2018-10-09 Ford Global Technologies, Llc Method and apparatus for remote authentication
US8849519B2 (en) 2011-08-09 2014-09-30 Ford Global Technologies, Llc Method and apparatus for vehicle hardware theft prevention
US9079554B2 (en) 2011-08-09 2015-07-14 Ford Global Technologies, Llc Method and apparatus for vehicle hardware theft prevention
US20130278405A1 (en) * 2012-04-21 2013-10-24 Benjamin Bacal Inhibiting distracting operations of personal handheld devices by the operator of a vehicle
US8884750B2 (en) * 2012-04-21 2014-11-11 Benjamin Bacal Inhibiting distracting operations of personal handheld devices by the operator of a vehicle
US9569403B2 (en) 2012-05-03 2017-02-14 Ford Global Technologies, Llc Methods and systems for authenticating one or more users of a vehicle communications and information system
US9384613B2 (en) 2012-08-16 2016-07-05 Google Inc. Near field communication based key sharing techniques
US8410898B1 (en) * 2012-08-16 2013-04-02 Google Inc. Near field communication based key sharing techniques
US9688246B2 (en) 2013-02-25 2017-06-27 Ford Global Technologies, Llc Method and apparatus for in-vehicle alarm activation and response handling
US8947221B2 (en) 2013-02-26 2015-02-03 Ford Global Technologies, Llc Method and apparatus for tracking device connection and state change
US9612999B2 (en) 2013-03-13 2017-04-04 Ford Global Technologies, Llc Method and system for supervising information communication based on occupant and vehicle environment
US9141583B2 (en) 2013-03-13 2015-09-22 Ford Global Technologies, Llc Method and system for supervising information communication based on occupant and vehicle environment
US9168895B2 (en) 2013-03-14 2015-10-27 Ford Global Technologies, Llc Key fob security copy to a mobile phone
US9002536B2 (en) 2013-03-14 2015-04-07 Ford Global Technologies, Llc Key fob security copy to a mobile phone
US20150024686A1 (en) * 2013-07-16 2015-01-22 GM Global Technology Operations LLC Secure simple pairing through embedded vehicle network access device
US11015561B2 (en) * 2014-04-24 2021-05-25 Ford Global Technologies, Llc Method and apparatus for vehicle and mobile device coordination
US20160049033A1 (en) * 2014-08-18 2016-02-18 Myine Electronics, Inc. Method and system for a key fob base station enabling remote car access using a nomadic device
US9754431B2 (en) * 2014-08-18 2017-09-05 Livio, Inc. Method and system for a key fob base station enabling remote car access using a nomadic device
FR3030830A1 (en) * 2014-12-23 2016-06-24 Valeo Comfort & Driving Assistance METHOD OF SECURING ACCESS TO AT LEAST ONE FUNCTIONALITY OF A MOTOR VEHICLE BY A MOBILE TERMINAL
WO2016132078A1 (en) * 2015-02-18 2016-08-25 Valeo Comfort And Driving Assistance Method of securing access to at least one functionality of a motor vehicle by a mobile terminal
DE102016106057A1 (en) 2015-04-09 2016-10-13 Ford Global Technologies, Llc SYSTEMS AND METHOD FOR MOBILE PHONE KEY-HANDBOOK MANAGEMENT
US10249123B2 (en) 2015-04-09 2019-04-02 Ford Global Technologies, Llc Systems and methods for mobile phone key fob management
FR3037678A1 (en) * 2015-06-16 2016-12-23 Peugeot Motocycles Sa CONTROL SYSTEM WITH INTELLIGENT ELECTRONIC KEY HAVING A PHYSICAL CONNECTION INTERFACE FOR A TWO OR THREE-WHEEL MACHINE
US20190066414A1 (en) * 2015-10-30 2019-02-28 Faraday&Future Inc. Authentication control system for a vehicle
US10284653B2 (en) * 2015-11-13 2019-05-07 Ford Global Technolgies, Llc Method and apparatus for utilizing NFC to establish a secure connection
US10812592B2 (en) * 2015-11-13 2020-10-20 Ford Global Technologies, Llc Method and apparatus for utilizing NFC to establish a secure connection
US20170142205A1 (en) * 2015-11-13 2017-05-18 Ford Global Technologies, Llc Method and apparatus for utilzing nfc to establish a secure connection
US20200372735A1 (en) * 2019-05-20 2020-11-26 Pixart Imaging Inc. Scheme for setting/using electronic device as keyless device of vehicle and adjusting devices in the vehicle
US11087573B2 (en) * 2019-05-20 2021-08-10 Pixart Imaging Inc. Scheme for setting/using electronic device as keyless device of vehicle and adjusting devices in the vehicle
US11945399B1 (en) * 2020-06-01 2024-04-02 Larry V. Ruthven Vehicle ignition interlock

Also Published As

Publication number Publication date
US9082295B1 (en) 2015-07-14
US20110312273A1 (en) 2011-12-22
US8299895B2 (en) 2012-10-30

Similar Documents

Publication Publication Date Title
US8299895B2 (en) Cellular phone entry techniques
US8269601B2 (en) Multiuser vehicle utilization system and electronic key thereof
US7664961B2 (en) Wireless handheld device with local biometric authentication
JP4593520B2 (en) Authentication system, electronic key, and authentication server
EP1583041B1 (en) Multi-user vehicle utilization system and electronic key therefor
US20140176301A1 (en) Remote Function Fob for Enabling Communication Between a Vehicle and a Device and Method for Same
CN110136306B (en) Vehicle key control method and system
KR102540090B1 (en) Electronic device and method for managing electronic key thereof
US20060176146A1 (en) Wireless universal serial bus memory key with fingerprint authentication
JP2007523283A (en) Authorization method
US11244036B2 (en) Authentication system and authentication device
US9111084B2 (en) Authentication platform and related method of operation
JP2011523726A (en) Method for temporarily personalizing a communication device
US20220180679A1 (en) Vehicle control system
US7671724B2 (en) Vehicle anti-theft apparatus and method
US8931080B2 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
KR102063569B1 (en) Method and apparatus for controlling a door opening using a portable terminal
JP5469018B2 (en) Mobile phone with electronic key function
US9769656B2 (en) Electronic device and communication method
KR101406192B1 (en) Car access control system using smart terminal and method thereof
US11285917B1 (en) Vehicle control system
KR20180079855A (en) Entrance managing system using of a mobile device
JP7389692B2 (en) Vehicle rental system
JP2006053808A (en) Operator authentication management system
JP4683880B2 (en) Authentication terminal device, authentication system, authentication method, and authentication program

Legal Events

Date Code Title Description
AS Assignment

Owner name: HARRIS TECHNOLOGY, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HARRIS, SCOTT C;REEL/FRAME:022050/0298

Effective date: 20090101

Owner name: HARRIS TECHNOLOGY, LLC,CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HARRIS, SCOTT C;REEL/FRAME:022050/0298

Effective date: 20090101

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION