Method, computer program and device for reducing an interference of temporary communication resources used for a wireless communication between a vehicle key and a vehicle
A technology of wireless communication and communication resources, applied in the field of reducing interference to time communication resources used for wireless communication between car keys and vehicles, computer programs and equipment, capable of solving problems such as high costs
Active Publication Date: 2018-10-26
VOLKSWAGEN AG
10 Cites 5 Cited by
AI-Extracted Technical Summary
Problems solved by technology
In order to prevent unauthorize...
Method used
[0048] Alternatively or additionally, said determining 10 may comprise: determining 12 a subset of time communication resources used by an interferer. For example, the determining 12 may comprise determining a periodicity of one or more disturbances. Then, based on this periodicity, the subset of time communication resources used by the interferer can be determined, for example by the control means 114 . The adapting 30 may include adapting 32 the transmission time point of the wireless communication between the car key 200 and the vehicle 100 , so that the subset of time communication resources used by the interference sourc...
Abstract
The invention relates to a method, a computer program and a device for reducing an interference of temporary communication resources that are used for a wireless communication between a vehicle key and a vehicle. The method comprises determining (10) whether an interference of the temporary communication resources is present. In the event that an interference is present, the method further comprises switching off (20) an interfering device causing the interference, or adjusting (30) the use of the temporary communication resources for the wireless communication between the vehicle key and thevehicle.
Application Domain
Anti-theft devicesCommunication jamming +2
Technology Topic
Real-time computingResource use +2
Image
Examples
- Experimental program(1)
Example Embodiment
[0025] Now, different embodiments are described in more detail with reference to the accompanying drawings, in which some embodiments are shown. In the drawings, the thickness of lines, layers and/or regions may be exaggerated for clarity.
[0026] In the subsequent description of the accompanying drawings that only show some exemplary embodiments, the same reference numerals may designate the same or similar components. In addition, general reference numerals may be used for components and objects that appear multiple times in the embodiments or in the drawings, but are collectively described about one or more features. As long as some other situations are not clearly or implicitly derived from the description, components or objects described with the same or general reference signs may be related to single, multiple or all features (such as the components or The size of the object) is the same, but if necessary differently.
[0027] Although the embodiment may be modified and changed in various ways, the embodiment is shown as an example in the drawings and described in detail in this regard. However, it should be clarified that the embodiments are not intended to be limited to the forms respectively disclosed, but rather the embodiments should cover all functional and/or structural modifications, equivalents, and replacements within the scope of the present invention Program. The same reference numerals refer to the same or similar elements throughout the description of the drawings.
[0028] Note that an element referred to as being "connected" or "coupled" to another element may be directly connected or coupled to the other element, or there may be elements between them. And if an element is said to be "directly connected" or "directly coupled" with another element, then the element between them does not exist. Other terms used to describe the relationship between elements should be interpreted in a similar way (eg "between" as opposed to "directly between", "adjacent" as opposed to "directly adjacent", etc. ).
[0029] The technical terms used in this regard are only used to describe certain embodiments and should not limit the embodiments. As used in this regard, the singular forms "a" and "the one" should also include plural forms as long as the context does not clearly state otherwise. In addition, it should be clarified that as used in this regard, terms (such as "including", "including", "having" and/or "having") describe the mentioned features, integers, The existence of steps, workflows, elements, and/or components does not exclude the existence or supplement of one or more features, integers, steps, workflows, elements, components, and/or their groups.
[0030] As long as there is no other limitation, all terms (including technical terms and scientific terms) used in this regard have the same meaning, and those of ordinary skill in the art arrange the meanings for the terms in the field to which the embodiments belong. In addition, it should be clarified that terms, such as those defined in commonly used dictionaries, are to be interpreted as if the terms have meaning consistent with their meaning in the context of the technology to which they belong, and as long as this is not clear in this regard When the land is limited, it should not be interpreted in an idealized or overly formal meaning.
[0031] Vehicles with a keyless system (Passive Entry-/Exit-/Start-Systems, that is, a system used for keyless access/leave/start) usually pass low frequency (also called LowFrequency in English, The LF frequency band and the high frequency (HF) frequency band communicate with their participating system members, such as car keys, so that the engine can be unlocked, locked or started. The communication between members of the keyless system in the LF frequency band may be interfered with by other systems (LF interference sources) communicating via LF during or at the beginning. These LF interference sources may be special accessories or other electronic components in the vehicle, such as a wireless charging device for mobile phones or a wireless charging device for wireless electromagnetic charging of the vehicle battery pack.
[0032] In a conventional system, for example, a signal inside the system can be provided as an interface for signaling the existing keyless communication of the keyless system. Here, the keyless system only signals that the vehicle should perform LF communication. As a result, potential sources of interference inside the vehicle are cut off within the duration of LF communication (such as wireless charging equipment, ventilation devices, etc.) inside the vehicle. This happens regardless of whether the system is actually disturbed. Here, the actual interference is not identified, the user may not be notified of the interference, and no countermeasures may be taken. Here, other functions are cut off preventively, regardless of whether there is interference.
[0033] The opposite embodiment can identify actual interference and only then can countermeasures be introduced. A radio receiver or an additional radio receiver that is always in the system can monitor whether there is interference. Only when interference is identified, countermeasures are taken. Therefore, at least some embodiments have the ability to identify the source of interference before communication.
[0034] figure 1 A flowchart illustrating an embodiment of a method of reducing interference to time communication resources used for wireless communication between the car key 200 and the vehicle 100 is illustrated. Here, the frequency range used for wireless communication between the car key 200 and the vehicle 100 may be interfered due to, for example, an interference signal of an interference source. Here, the source of the interference may be unfamiliar to the system: in some embodiments, the interference may not be based on the key signal or communication based on other key components, but may be based on, for example, a battery pack used in a mobile device or a vehicle. Radio emissions from wireless charging devices. In at least some embodiments, interference may correspond to the presence of interfering signals or noise, which may overlap and/or distort wireless communications. The interference source may, for example, correspond to a device or component that emits a signal in the frequency range of wireless communication. The wireless communication between the car key 200 and the vehicle 100 may be based on, for example, a key communication system, and the interference source causing the interference may be an interference source that the system is not familiar with. In at least some embodiments, the wireless communication may be bilateral, that is, there is data exchange from the car key 200 to the vehicle 100 and from the vehicle 100 to the car key 200. In at least some embodiments, wireless communication can be performed in a low frequency range, such as in the 20-22 kHz, 125 kHz, or 134 kHz frequency band. In at least some embodiments, wireless communication may be performed in a first frequency range, such as an LF frequency range, and for example, a response to the wireless communication by the car key 200 may be performed in a second frequency range, such as HF frequency range. . For example, wireless communication may be designed to activate the car key 200 or signal the car key 200 to provide the vehicle 100 with an authentication signal.
[0035] The method includes: determining 10 whether there is interference with time communication resources. In the case of interference, the method further includes: cutting off 20 the interference source causing the interference or adapting 30 the use of time communication resources for wireless communication between the car key and the vehicle 100.
[0036] In a preferred embodiment, the determination 10 may be performed before the communication between the wireless car key and the vehicle. For example, the determination 10 may include: checking time communication resources regarding whether there is interference or whether there may be wireless communication at this point in time. If there is no interference (or no interference can be expected), then wireless communication may be performed, otherwise the interference source may be cut off, or the transmission time point may be adapted.
[0037] figure 2 An exemplary implementation of the method caused by the device 110 reducing interference to the time communication resource used for the wireless communication between the car key 200 and the vehicle 100 is shown. The control device 114 is configured to implement method step determination 10, cut-off 20 and adaptation 30 and the sub-steps of these method steps. The device 110 includes a control device 114.
[0038] image 3 A block diagram illustrating an embodiment of a system composed of a car key 3200 and a vehicle 3100 is illustrated. The vehicle 3100 exemplarily includes a device 3110 having an LF transmitting device 3112, an HF receiving device 3114, an HF transmitting device 3116, and a control device 3118. The car key 3200 includes a device 3210 that has an LF receiving device 3212, an HF transmitting device 3214, an HF receiving device 3216, and a control device 3218. The car key 3200 may correspond to the vehicle 200, and/or the vehicle 3100 may correspond to the vehicle 100, for example. The device 3210 or 3110 may correspond to the device 110, for example, and the control device 3218 or 3118 may correspond to the control device 114. The HF frequency range can be lower than 1GHz (high frequency, ultra-high frequency) or higher than 1GHz (for example, in the ultra-wideband (English also called Ultra-Wideband, UWB)) or in the Bluetooth or wireless local area access network (English also Called Wireless Local Access Network (WLAN) within the frequency range used).
[0039] The vehicle 3100 may, for example, start wireless communication with the car key 3200 through the LF band or activate the car key 3200 based on the wireless communication. Based on this wireless communication, the control device 3218 can be configured to provide the HF receiving device 3114 with authentication information of the key system through the HF transmitting device 3214.
[0040] Figure 1a A detailed flowchart of an embodiment of the method is shown. The determination 10 includes, for example, identifying 14 interference based on a receiver based on wireless communication between the car key 200 and the vehicle 100 or based on other receivers. For example, the device 110 may include a receiver and/or other receivers for wireless communication between the car key 200 and the vehicle. The receiver may, for example, be configured to receive and/or analyze signals in the frequency range used for wireless communication between the car key 200 and the vehicle 100. The identification of interference 14 may, for example, correspond to performing a frequency analysis, for example in order to identify interference in this frequency range. For example, the identification 14 may also correspond to the identification of the interference source, such as based on the interference profile of the interference source or based on the determination of the location of the interference source (for example, in the vehicle), such as by analyzing the field strength or analyzing multiple channels. The effect of propagation to identify the source of interference. The identification 14 may also include identifying the periodicity of the interference, for example, to determine a subset of time communication resources used by the interference source, such as to predict the possible time point of the interference caused by the interference source.
[0041] For example, in the vehicle 100 or in the car key 200, the interference signal can be identified 14 by means of an existing LF receiver. In this case, the important LF band can be scanned (frequency range). In this case, it is advantageously possible to perform interference identification before the planned transmission process. For this reason, in at least some embodiments, no additional hardware is required, and the cost of searching for sources of interference can be minimal because the search is performed by the system components that also want to establish communication. Therefore, it is possible to reduce the search to an important point in time and thereby save processing cost and energy. Alternatively, the vehicle and/or the vehicle key may include an additional LF receiver, which is used, for example, only to identify 14 interference sources. The additional LF receiver can be improved for identifying 14 interference sources, for example, and can be configured to search for interference sources in parallel with existing systems, for example.
[0042] Alternatively or additionally, the determination 10 may include: obtaining 16 a message about the malfunction of the car key 200. The vehicle key 200 may be configured, for example, to provide the vehicle 100 with a message about a malfunction, for example, through another frequency range or by transmitting a shortened signal. For example, in wireless communication, the first frequency range may be used to transmit an activation signal between the vehicle 100 and the car key 200. Through the second frequency range that is different from the first frequency range, it is possible to obtain 16 messages about malfunction from the car key 200. For example, the first frequency range may correspond to the LF frequency range, and the second frequency range may correspond to the HF frequency range. For example, the car key 200 may be configured to determine and transmit a message about a malfunction based on unconfirmed wireless communication, or the car key 200 may include a receiver and be configured to be similar to the identification 14 for a message about a malfunction. To identify interference. For example, an LF receiver built into the key can be used to identify the source of interference. In the case where the interference source is detected, the car key 200 may be configured to notify the vehicle 100 of interference through another radio frequency, for example. Countermeasures can be taken in the car key 200 and/or the vehicle 100. For example, the car key 200 may be configured to adapt the transmission time point based on the identified interference, for example, if the periodicity of the interference is recognized. In some embodiments, the car key 200 may be configured to obtain advance notice about the upcoming wireless communication in another frequency range (such as HF). If the wireless communication is not received or the wireless communication is damaged after the advance notice, the car key 200 may be configured to recognize the interference and provide a message about the interference. The determination 10 may determine the interference based on information about the interference.
[0043] In an exemplary embodiment, the control device 3118 may be configured to wirelessly communicate with the car key 3200 through the first frequency range (for example, the LF frequency range). If the communication fails, the control device 3218 may be configured to recognize the stop or failure of wireless communication, for example. For example, the control device 3118 may be configured to provide the control device 3218 with information about the upcoming wireless communication through the HF transmitting device 3216 or the HF receiving device 3116 before the wireless communication. Next, the control device 3218 can recognize the failure of the wireless communication based on the message, for example. Alternatively or additionally, the control device 3218 may be configured to determine the interference in the LF band via the LF receiving device 3212 or other receiving devices, for example by identifying the interference signal to determine the interference in the LF band. The control device 3218 may also be configured to provide the HF receiving device 3114 with information about interference through the HF transmitting device 3214.
[0044] In an exemplary implementation solution, the device 110 may further include a receiving device 112. The control device 114 may be configured to control the receiving device 112. The control device 114 may be configured to determine whether there is interference via the receiving device 112 based on a receiver based on wireless communication between the car key 200 and the vehicle 100, based on other receivers, or based on a message about a malfunction of the car key 200. The receiving device 112 may, for example, be configured to obtain data packets or signals from the receiver, the other receivers, and/or from the car key.
[0045] Alternatively or additionally, the determining 10 may include determining 18 interference based on previous communications. For example, the determination 18 may include waiting for one or more communication attempts. If this communication attempt fails, the determination 18 can identify interference and react by disconnecting 20 or adapting 30. In some embodiments, the measurement of interference can be omitted in this case. After the communication is unsuccessful, countermeasures can be taken against the interference source. If the subsequent re-communication is successful, then it can be inferred that there has been interference. Then you can take additional measures (for example, cut off the 20 interference source and re-communication, alert the user). Here, in some embodiments, the function restriction caused by the countermeasure is performed only after one or more communication attempts have failed. In some embodiments, for example, if there is interference, the determination 18 may include: for example, providing advance notice about wireless communication in other (for example, HF) frequency ranges, for example, providing information about wireless communication through the HF transmitting device 3216. inform in advance. If the wireless communication is not received after the advance notice, interference can be identified.
[0046] In at least some embodiments, cutting 20 the interference source may correspond to cutting 22 the interference source included in the vehicle 100. For example, the disconnection 22 may correspond to deactivating one or more devices of the vehicle that are known to the devices that they may cause interference in the frequency range of wireless communication. The disconnection 22 can be triggered, for example, via a communication bus or via a vehicle network (for example, via a control network (also called Controller Area Network in English, CAN)) and/or via a local interconnection network (also called Local Interconnect in English). Network, LIN) or Ethernet), for example, triggered by one or more control devices of the vehicle. For example, the determination 10 may include: identifying the one or more devices based on, for example, eliminating the source of interference through a short-term disconnection or based on the interference profile of one or more devices of the vehicle; and the disconnection 22 may be based on the Logo.
[0047] Alternatively or additionally, cutting off 20 the source of interference may correspond to cutting off 24 the source of interference coupled to the vehicle, for example by a control command via a communication connection or by deactivating the power supply, such as a 12V interface, to cut off 24 the interference coupled to the vehicle source. For example, the determination 10 may include temporarily disabling the power supply to the device coupled through the 12V interface, so as to determine whether to cut off the source of interference by this. If this is the case, the device can be temporarily disabled during wireless communication, or it can be pointed out to the user that the device is causing interference by providing, for example, an alert with a request to disable the device.
[0048] Alternatively or additionally, the determining 10 may include determining 12 a subset of time communication resources used by the interference source. For example, the determining 12 may include determining the periodicity of one or more interferences. Then, based on the periodicity, for example, the control device 114 can determine the subset of time communication resources used by the interference source. The adaptation 30 may include adapting 32 the transmission time point of the wireless communication between the car key 200 and the vehicle 100, so that a subset of the time communication resources used by the interference source is used for the difference between the car key 200 and the vehicle 100. Conflicts between time and communication resources of wireless communication are reduced or eliminated. The adaptation 32 may, for example, correspond to delaying the transmission time point, so that wireless communication uses time communication resources that may not be interfered with. For example, the time communication resource may be divided into multiple parts (also called Slot in English), and wireless communication may be performed in the following Slot, for which no interference is obtained for the determination.
[0049] Alternatively or additionally, the adaptation 30 may further include: adapting the transmission power used for wireless communication. For example, the transmission power can be increased, for example, to realize usable wireless communication despite interference.
[0050] In some embodiments, the method may further include: if interference has been identified, providing an alert to the user. The alarm may correspond to, for example, displaying an alarm prompt, alarm sound, voice output, activating an alarm signal lamp, or displaying an alarm animation on the screen. The alarm can be configured to warn the user that the communication between the car key 200 and the vehicle 100 is disturbed, for example by cutting off the interference source inside the vehicle or inserting the car key for regular starting or bringing the car key to a predefined location, for example Used for emergency start prompts to warn users.
[0051] The control device 114 may be configured, for example, to provide an alarm to the user through an output device, such as a screen or a speaker. In some embodiments, the device 110 may include an output device.
[0052] In at least some embodiments, the vehicle 100 may correspond to, for example, a land vehicle, a ship, an aircraft, a rail vehicle, a road vehicle, an automobile, an off-road vehicle, a motor vehicle, or a truck.
[0053] In an embodiment, the vehicle key 200 may correspond to a key of the vehicle (such as an ignition key), the key including, for example, a tangible key assembly (such as a key bit) and/or an electronic key assembly. For example, the car key 200 may include a transmitting device to communicate with the vehicle 100 wirelessly. Additionally, a tangible key assembly may be used as a transmission medium, for example, to transmit the signal of the electronic key assembly. The electronic key component, for example, may be on a microchip and/or correspond to a programmable hardware component configured to provide an electronic key, such as a secret key (also referred to as SecureKey, SK in English). The electronic key assembly may be configured to provide the secret key or the processed secret key to the vehicle 100 via a wired or wireless communication connection, for example.
[0054] In an embodiment, the control device 114 may correspond to any controller or processor or programmable hardware component. For example, the control device 114 may also be implemented as software, which is programmed for corresponding hardware components. In this regard, the control device 114 may be implemented as programmable hardware with correspondingly adapted software. Here, any processor, such as a data signal processor (DSP), can be put into use. Here, the embodiment is not limited to a certain type of processor. It is conceivable that any processor or multiple processors are conceivable to realize the control device 114.
[0055] The receiving device 112 may, for example, correspond to one or more of receiving information within a module, between modules, or between modules of different entities, such as bit values, analog signals, magnetic fields, and code-based information. Input terminal. For example, the receiving device 112 may be configured to receive a signal in a frequency range used for communication between the car key 200 and the vehicle 100 or in another frequency range. For example, the receiving device may be configured to obtain data or signals from other modules, such as a receiver, via a bus system or via a direct wired line.
[0056] In some embodiments, the vehicle 100 may include a device 110. Alternatively or additionally, the car key 200 may include the device 110. The optional receiving device 112 is coupled with the control device 114. For example, the vehicle 100 and/or the car key 200 may include one or more control devices configured to implement figure 1 /1a method.
[0057] Another embodiment is a computer program for executing at least one of the methods described above when it runs on a computer, a processor, or a programmable hardware component. Another embodiment is also a digital storage medium. The digital storage medium is machine-readable or computer-readable, and the digital storage medium has electronically readable control signals. The electronically readable control signals can be Works with programmable hardware components to execute one of the methods described above.
[0058] The features disclosed in the above description, the following claims and the accompanying drawings can be not only individually but also in any combination. It is important and can be realized for realizing the embodiments with different design solutions of the features. .
[0059] Although some aspects have been described in relation to the device, it is easy to understand that these aspects are also the description of the corresponding method, so that the block or device of the device should also be understood as the corresponding method step or as Characteristics of method steps. Similarly, aspects that have been described in relation to method steps are also descriptions of corresponding blocks or details or features of the corresponding device.
[0060] According to the determined implementation requirements, the embodiments of the present invention can be implemented in hardware or in software. The implementation can be implemented using digital storage media (such as Floppy-Disk, DVD, Blu-Ray Disc), CD, ROM, PROM, EPROM, EEPROM or flash memory, hard disk or another magnetic or It is executed in the case of an optical memory, electronically readable control signals are stored on the digital storage medium, and the electronically readable control signals work together with programmable hardware components or can work together , So that the corresponding method is executed.
[0061] Programmable hardware components can be implemented through processors, computer processors (CPU = Central Processing Unit (Central Processing Unit)), graphics processing units (GPU = Graphics Processing Unit), computers, computer programs, and application-specific integrated circuits (ASICs). = Application-Specific Integrated Circuit), integrated circuit (IC = Integrated Circuit), system on chip (SOC = System on Chip), programmable logic element or field programmable gate array with microprocessor (FPGA = Field Programmable Gate) Array) to form.
[0062] Thus, the digital storage medium may be machine-readable or may be computer-readable. Therefore, some embodiments include a data carrier that has electronically readable control signals that can work with a programmable computer system or programmable hardware component so as to perform what is described in this regard One of the methods. Therefore, one embodiment is a data carrier (or a digital storage medium or a computer-readable medium) on which a program for performing one of the methods described in this respect is recorded.
[0063] Generally, the embodiments of the present invention can be implemented as a program, firmware, computer program, or computer program product with program code, or can be implemented as data, wherein the program code or the data effectively executes one of the methods as follows One: If the program runs on a processor or programmable hardware component. The program code or the data may also be stored on a machine-readable carrier or data carrier, for example. . The program code or the data can especially exist as source code, machine code or byte code and as other intermediate code.
[0064] In addition, another embodiment is a data stream, a signal sequence or a signal sequence, and the data stream, the signal sequence or the signal sequence is a program for performing one of the methods described in this respect. The data stream, the signal train or the signal sequence can be configured as follows, for example, in order to be transmitted via a data communication connection, for example via the Internet or another network. In this way, the embodiment is also a signal sequence representing data, and the signal sequence representing data is suitable for sending through a network or a data communication connection, wherein the data is a program.
[0065] A program according to an embodiment may, for example, implement one of the methods during its execution in the following manner: that is, the program reads storage locations or writes one or more data into these storage locations, thereby causing it to A switching process or other processes in a transistor structure, an amplifier structure, or other electrical components, optical components, magnetic components, or components that work according to another functional principle. Correspondingly, data, values, sensor values or other information can be detected, determined or measured by the program by reading the storage location. Therefore, the program can detect, determine, or measure parameters, values, measurement parameters, and other information by reading one or more storage locations, and cause, prompt, or perform operations by writing to one or more storage locations. Control other equipment, machines and components.
[0066] The embodiments described above are merely illustrative of the principle of the present invention. It is easy to understand that the arrangement and details of the modifications and variants described here will make other persons skilled in the art understand (einleuchten). Therefore, it is intended that the present invention should only be limited by the scope of protection of the following patent claims, rather than by specific details, which have been expressed in this respect based on the description and explanation of the embodiments .
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.