Unlock instant, AI-driven research and patent intelligence for your innovation.

Relay-attack resistant communications

A technology of timing information and synchronization signals, applied in wireless communication, duplex signal operation, instruments, etc., can solve problems such as theft and activation

Active Publication Date: 2019-04-16
TEXAS INSTR INC
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Car keyless entry systems (PEPS systems in particular) have faced relay attacks that allow the vehicle to be opened without the owner's awareness and possibly started and thus stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Relay-attack resistant communications
  • Relay-attack resistant communications
  • Relay-attack resistant communications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The drawings are not necessarily drawn to scale. In the drawings, the same reference numerals indicate similar or equivalent elements. Some illustrated acts or events may occur in different orders and / or concurrently with other acts or events. Furthermore, some of the illustrated acts or events may not be required to implement a methodology in accordance with the present description.

[0015] As used in this specification without further limitations, the terms "coupled to" or "coupled with" (etc.) describe an indirect or direct electrical connection. Thus, if a first device is "coupled" to a second device, that connection may be through a direct electrical connection with only parasitics in the path, or through an indirect electrical connection via intermediaries including other devices and connections. For indirect coupling, the intermediate term typically does not modify the signal's information, but may adjust its current level, voltage level, and / or power level. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In described examples of a method of relay-attack resistant communications in a wireless communication system (100), a master wireless device (Master) (110) sends a synchronization signal to a slave wireless device (Slave) (120). The synchronization signal includes timing information, including a common time reference and a timeslot duration for interlocking Master (110) communication timeslots for Master (110) and Slave (120) communication timeslots, so that an alternating TX and RX role pattern is provided. The Master (110) analyzes Slave (120) packet data received from the Slave (120) to identify overlaps of a transmission from the Master (110) and the Slave (120) packet data, and in a case of detecting overlap, suspends communications from Master (110) to Slave (120) to prevent a relay-attack.

Description

technical field [0001] The present application relates to protection against relay attacks involving the relaying of a signal from one wireless device to another by tricking a transmitting entity in the vicinity of the device intended to receive the relayed signal. Background technique [0002] One example wireless communication system that may be subject to a threat known as a "relay attack" involves modern vehicles. Modern vehicles often support a remote entry system, which may be referred to as Passive Keyless Entry (PKE), Passive Entry System (PES) or Passive Entry Passive Start (PEPS) (this will be the term used herein), which enables The user is able to gain access to the vehicle without pressing any buttons. PEPS systems use signals for transmission via modulated radio frequency (RF) or via infrared signals. A card, often referred to as a keyfob, is a radio used for this purpose that includes a small secure hardware device that communicates wirelessly with another r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): B60R25/24H04L29/06
CPCH04L63/1416H04L63/1441G07C9/00309H04L5/16H04L7/033H04L63/1466H04L67/12H04W56/001H04W84/20H04W12/122H04L63/08H04L63/1433
Inventor T·莫托斯K·T·勒
Owner TEXAS INSTR INC