Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection against a relay attack

A technology of communication equipment and frequency spectrum, applied in instruments, direction finders using radio waves, using re-radiation, etc., can solve the problems of unauthorized opening and starting, etc., achieve the effect of low cost, prevent attacks, and improve protection

Active Publication Date: 2019-10-18
捷德移动安全有限责任公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The problem with "clickers" and keyless entry systems is that in this system the data transmitted between the motor vehicle and the vehicle key can be remotely read without authorization by means of a relay attack, and thus can be opened and opened without authorization. Start the corresponding motor vehicle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection against a relay attack
  • Protection against a relay attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 A first embodiment of the invention is shown, in which the motor vehicle 2 is used as the first communication device and the vehicle key 4 is used as the second communication device to determine the transmitter 1, the transmitter 2 and the spectrum of the signal to be received by the transmitter 3. The motor vehicle 2 sends a trigger signal "trigger" to the vehicle key 4 in order to inform the vehicle key 4 that the frequency spectrum should be determined. As soon as the vehicle key 4 has determined the spectrum, it is transmitted to the motor vehicle 2 with the reply “spectrum”. Motor vehicle 2 compares the two frequency spectra in order to determine whether vehicle key 4 is located at the location of motor vehicle 2 .

[0021] The motor vehicle 2 and the vehicle key 4 each have a transmitter and a receiver, not shown for reasons of clarity, in order to exchange data wirelessly. What is important for the invention is that the motor vehicle 2 and the vehicle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for protecting against a relay attack on a system which consists of at least one first 2 and a second communication device 4. Data is transmitted wirelessly between the first 2 and the second communication device 4. The first communication device 2 determines a first spectrum of all wirelessly transmitted signals to be received at the location of the first communication device 2 within a frequency band. The second communication device 4 likewise determines a second spectrum of all wirelessly transmitted signals to be received at the location of the second communication device 4 within the frequency band. The frequency band is delimited by a minimum and a maximum frequency. The second communication device 4 transmits the second spectrum to the first communication device 2, and the first communication device 2 compares the first spectrum with the second spectrum in order to ascertain whether the second communication device 4 is located at the location ofthe first communication device 2.

Description

technical field [0001] The invention relates to a method for preventing relay attacks on a system of at least one first and second communication device, wherein data is transmitted wirelessly between the first and second communication device. Background technique [0002] So-called "clickers" and keyless entry systems are known from the prior art as entry systems for motor vehicles. In the case of "clickers", after actuation of a key, a rolling code is usually generated and transmitted to the motor vehicle at a frequency of 433.975 MHz or 867 MHz in the UHF frequency band. In a keyless entry system, an RFID reader is additionally located in the motor vehicle and a tag is located in the vehicle key, so that the doors can be opened when the motor vehicle is approached. In this method, it is also possible to detect whether the vehicle key is located inside or outside the motor vehicle, so that, for example, the ignition of the motor vehicle can be deactivated or released accor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G01S5/02H04W12/08H04W4/02H04W4/40H04W12/00
CPCH04W4/023H04W12/08G07C2009/00555G01S3/14G01S5/0027G01S5/0284G01S11/06H04W4/40G07C9/00309G07C2009/00412G07C2009/00793H04W12/63H04W12/122G01S5/0252G06F21/56G06F21/62H04W12/121H04W12/12G06F21/35
Inventor K.芬肯泽勒V.斯托尔
Owner 捷德移动安全有限责任公司