Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for safeguarding access

A technology of radio signals and transmitters, applied in the field of keyless access, which can solve problems such as being unable to resist relay attacks

Active Publication Date: 2019-09-03
BAYERISCHE MOTOREN WERKE AG
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This access feature may not be immune to so-called relay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safeguarding access
  • Method for safeguarding access
  • Method for safeguarding access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] As stated at the outset, the present document is aimed at providing a keyless access function which reliably prevents relay attacks. Figure 1a An exemplary vehicle 100 is shown and Figure 1b An exemplary ID transmitter 120 is shown, which vehicle and ID transmitter can provide keyless access functionality. The keyless access function allows the driver of vehicle 100 to open vehicle door 110 or start the motor of vehicle 100 without using the key-and-lock principle. To open the door 110 , the driver grabs the door handle 111 . A proximity sensor 112 on or near the door handle 111 detects this movement. A specific radio signal (for example in the LF (Low Frequency) range or using the Bluetooth Low Energy (BLE) radio protocol) is then transmitted by one or more transmitting units 101 of the vehicle 100 . The radio signal can also be called a request signal. In other words, the one or more transmitting units 101 may be configured to transmit an electromagnetic field, i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method (300) is described for controlling the access to a system (100) by means of an ID transmitter (120). In this method, to authenticate the ID transmitter (120), a distance between the ID transmitter (120) and a reference point of the system (100) is checked by transmitting a radio signal (231, 232). The method (300) comprises receiving (301) a first version of the radio signal (231, 232) ata first point in time and a second version of the radio signal (231, 232) at a second point in time. The method (300) also comprises determining (302), on the basis of the first point in time and onthe basis of the second point in time, whether the second version of the radio signal (231, 232) is a relay signal (241, 242) generated from the radio signal (231, 232) during a relay attack. The method (300) also comprises taking (303) a measure to prevent access to the system (100) if it is determined that the second version of the radio signal (231, 232) is a relay signal (241, 242).

Description

technical field [0001] The invention relates to a method for securing keyless access, in particular to a motor vehicle. Background technique [0002] The keyless access function to a system (eg to a motor vehicle) is usually based on authenticating an ID transmitter within a locally restricted range. The user carries the ID transmitter (such as a key) with him. The ID transmitter is authenticated via a radio connection with respect to the access control unit of the system. Furthermore, the distance from the ID transmitter to one or more reference points of the system is measured via a suitable radio protocol. Access to the system is then allowed or denied based on the correct authentication key and based on a defined distance to one or more reference points of the system. [0003] This access function may not be immune to so-called relay attacks. If the ID transmitter is not located within the defined distance to the one or more reference points, an attacker may place a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00B60R25/24G01S5/14
CPCG07C9/00309G07C2009/00555G07C2009/00793G07C2209/08B60R25/245B60R25/24B60R25/34B60R25/04B60Y2200/10B60R25/209B60R2325/105
Inventor H·瓦加塔D·克诺布洛赫F·霍克
Owner BAYERISCHE MOTOREN WERKE AG