US20140064488A1 - One-Way Key Fob and Vehicle Pairing - Google Patents
One-Way Key Fob and Vehicle Pairing Download PDFInfo
- Publication number
- US20140064488A1 US20140064488A1 US13/969,154 US201313969154A US2014064488A1 US 20140064488 A1 US20140064488 A1 US 20140064488A1 US 201313969154 A US201313969154 A US 201313969154A US 2014064488 A1 US2014064488 A1 US 2014064488A1
- Authority
- US
- United States
- Prior art keywords
- key
- control unit
- key fob
- fob
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 22
- 230000015654 memory Effects 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 8
- 238000004891 communication Methods 0.000 abstract description 4
- 238000012546 transfer Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000007423 decrease Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Definitions
- Embodiments of the invention are directed, in general, to vehicle security and, more specifically, to pairing a key fob that is capable of transmitting to, but not receiving from, a vehicle control unit with the unit.
- Identifiers are assigned to a wireless key fob and a vehicle control unit by their respective manufacturers or by a vehicle manufacturer.
- the identifiers are used for authentication and/or trust transfer to achieve a secured initial pairing.
- the devices For the key fob and the vehicle control unit to be able to communicate, the devices must be paired at some point in either the manufacturing or the sales process.
- the pairing of wireless key fobs and their respective vehicles conventionally requires the vehicle manufacturer to deliver a secret key associated with each key fob to the various vehicle dealers.
- the secret key is a cryptographic key that is used to associate or pair the key fob with a vehicle.
- Multiple key fobs are typically paired with each vehicle. To simplify design and reduce cost, a key fob may be capable of secured pairing by performing wireless transmission, to but not receiving from, the vehicle.
- Embodiments of the invention provide methods for vehicle and key fob pairing using the identifiers of the key fob and a vehicle control unit.
- the identifiers are assigned by their respective manufacturers or by a vehicle manufacturer.
- the identifiers may be used for entity authentication and trust transfer to achieve secured initial pairing.
- Embodiments use device identifiers (IDs) to reduce message communications among the vehicle manufacturer, vehicle dealer, vehicle control unit, and key fob before, during, and after the vehicle-key fob pairing. This substantially decreases security vulnerabilities that could be otherwise exploited by hackers.
- IDs device identifiers
- the key fob and vehicle control unit IDs are assigned by their respective manufacturers, or by a vehicle manufacturer, and are used for entity authentication or trust transfer to achieve secured initial pairing.
- the key fob is capable of transmitting only (not receiving) and is paired with a control unit in a vehicle or with any other control device.
- Use of the key fob and control unit IDs prevents unauthorized pairing and access to the operation key (OpKey) that is later used for communications between the devices.
- OpKey operation key
- ECC elliptical curve cryptography
- device IDs are used for entity authentication and public key cryptography is used for easy key management.
- Symmetric encryption is used for fast normal operation and to accommodate key fob addition or revocation after key fob loss.
- FIG. 1 is a block diagram illustrating an initial configuration and exchange of information in a system for pairing a vehicle to one or more key fobs.
- FIGS. 2A-E illustrate steps for an initial pairing between a control unit and a selected key fob using a pairing device.
- FIG. 3 is a flowchart illustrating steps performed by a pairing device according to one embodiment.
- FIG. 4 is a flowchart illustrating steps performed by a key fob according to one embodiment.
- FIG. 5 is a flowchart illustrating steps performed by a control unit according to one embodiment.
- FIG. 6 is a block diagram of an example pairing device in accordance with one embodiment.
- FIG. 7 is a block diagram of an example key fob in accordance with one embodiment.
- FIG. 8 is a block diagram of an example control unit in accordance with one embodiment.
- a key fob that is capable of transmitting but not receiving is paired with a control unit in a vehicle.
- the control unit allows a user to perform certain operations, such as opening/closing or locking/unlocking vehicle doors through remotely using the key fob.
- FIG. 1 is a block diagram illustrating an initial configuration and exchange of information in a system for pairing a vehicle to one or more key fobs.
- a vehicle manufacturer 101 provides a unique, secret control unit identifier (ID) 102 to a control unit 103 .
- the control unit 103 may be any control device located inside or outside a vehicle, such as a control unit that locks/unlocks vehicle doors, opens/closes vehicle windows, turns on/off vehicle lights, etc.
- Vehicle manufacturer 101 also provides the control unit ID 104 to a dealer 105 .
- the control unit ID exchange 104 is performed in a secure or non-public manner.
- the dealer 105 should also maintain the secrecy of the control unit ID for system security.
- control unit 103 may be used to control non-vehicle operations, such as opening/closing a garage door, gate, hotel entrance, remote home entry, etc.
- other parties such as a third party manufacturers, dealers, or resellers, may provide the control unit ID in place of vehicle manufacturer 101 .
- a key fob manufacturer 106 provides, loads, or installs a unique key fob ID 107 to a key fob 108 .
- the key fob ID does not need to be kept secret, which allows users, such as dealer 105 , to easily determine the key fob ID for a particular key fob 108 , while completely eliminating the procedure and cost that would otherwise incur for maintaining the secrecy and authenticity.
- the dealer may obtain the key fob ID directly from the key fob manufacturer 106 in transaction 109 .
- dealer 105 may obtain the key fob ID directly from the key fob 108 in transaction 110 .
- the key fob 108 may be marked with the key fob ID.
- dealer 105 obtains both the secret control unit ID and the non-secret key fob ID.
- dealer 105 may be a franchisee or licensee that sells, services, or repairs vehicles provided by manufacturer 101 .
- Manufacturer 101 has a trusted relationship with dealer 105 that allows for exchange of the control unit ID while maintaining it as a secret.
- Dealer 105 may obtain key fobs and key fob IDs from any third-party manufacturer 106 without needing to maintain secrecy of the key fob ID.
- the key fob ID and control unit ID may be eight character hexadecimal words.
- FIG. 2 illustrates an initial pairing between a control unit 201 and a selected key fob 202 using a pairing device 203 , which may communicate with control unit 201 and/or key fob 202 wirelessly.
- pairing unit 203 may be capable of directly connecting to one or both of control unit 201 and key fob 202 , such as by connecting using a USB cable or other link, during a pairing process.
- control unit 201 and key fob 202 may communicate wirelessly or directly.
- key fob 202 has a public key and a private key that can be used for a password scrambled key agreement protocol, with the key fob ID serving as the password.
- the key agreement protocol may be based on elliptical curve cryptography (ECC).
- the dealer may select key fob 202 out of many available unused key fobs, which renders the actual key fob ID being used for pairing secret to others.
- the dealer also determines the control unit ID for control unit 201 , which is maintained as a secret.
- the dealer then enters the control unit ID ( 204 ) and key fob ID ( 205 ) in pairing device 203 .
- key fob 202 sends its public key scrambled with the key fob ID ( 206 ) to pairing device 203 .
- the pairing device 203 uses the key fob ID, which has already been provided, the pairing device 203 recovers the key fob's public key by unscrambling message 206 .
- An unauthorized, fraudulent, or malevolent party may attempt to introduce a fake key fob 212 into the pairing process by transmitting message 216 to pairing device 203 .
- This attempt will be futile because that party does not know the ID of the key fob 202 selected by the dealer for pairing and hence will need to use a different ID to scramble the public key of the fake key fob 212 .
- pairing device 203 would not be able to unscramble the fake key fob's public key. Accordingly, a fake key fob 212 would not be able to inject itself into the pairing process.
- pairing device 203 and control unit 201 execute an ECC-based key agreement protocol, such as a Diffie-Hellman key exchange ( 207 ), authenticated by a password taken or derived from the control unit ID.
- the pairing device 203 and control unit 201 authenticate each other with the control unit ID and generate an encryption key (DHkey) through the authenticated exchange 207 .
- Pairing device 203 encrypts the key fob's public key recovered earlier from message 206 with the DHkey generated in exchange 207 .
- Pairing device 203 then sends the encrypted key fob public key ( 208 ) to control unit 201 , which recovers the key fob's public key using the DHkey that is shared with pairing device 203 .
- fake pairing device 213 An unauthorized, fraudulent, or malevolent party may attempt to use a fake pairing device 213 .
- fake pairing device 213 does not know the secret control unit ID for control unit 201 , its authentication with the control unit 201 will fail, thus generating no shared DHKey. Accordingly, a fake pairing device cannot be used to pair a key fob to the control unit 201 .
- key fob 202 selects an OpKey for use with control unit 201 .
- Key fob 202 encrypts the OpKey with its private key.
- Key fob 202 also creates an AES-128 OpKey-encrypted value of OpKey.
- Key fob 202 extracts a number of bits (verification bits), such as the 8, 16, or 32 lowest-order bits, from the AES-128 OpKey-encrypted value of OpKey for use in verifying exchanges with the control unit.
- Key fob 202 sends ( 209 ) the private-key-encrypted OpKey and the AES-128 verification bits to control unit 201 .
- Control unit 201 decrypts the OpKey using the key fob's public key, which was provided by pairing device 203 in message 208 .
- Control unit 201 computes an AES-128 OpKey-encrypted value of the extracted OpKey and extracts a number of bits from the AES-128 OpKey-encrypted value of OpKey. These bits created by control unit 201 are compared to the verification bits received from key fob 202 to verify that the decrypted value of OpKey was correct.
- the key fob 202 may delete its key fob ID and private key after the initial pairing with control unit 201 . This prevents unauthorized third-parties from accessing those values and using them to attempt to pair an unauthorized key fob with control unit 201 . Additionally, this prevents the key fob 202 from pairing with other devices.
- FIG. 3 is a flowchart illustrating steps performed by a pairing device according to one embodiment.
- the pairing device receives a control unit ID.
- the control unit ID should be kept secret to the maximum extent practicable so that unauthorized users cannot pair key fobs to the control unit.
- the control unit ID is available from a manufacturer or vendor, but cannot be determined directly from the control unit itself.
- the pairing device receives a key fob ID.
- the key fob ID may be provided by the key fob device itself or by a key fob manufacturer or vendor.
- step 303 the pairing device receives the key fob's public key, which has been scrambled with the key fob ID.
- step 304 the pairing device recovers the key fob's public key by unscrambling the information received in step 303 using the key fob ID received in step 302 . Only a device that has the key fob's ID can recover scrambled public key. If the pairing device selects the key fob at random and/or selects the key fob from a large group of key fobs, then unauthorized receivers of the scrambled public key will not know which key fob ID to use to recover the public key.
- the pairing device In step 305 , the pairing device generates a shared key with the control unit using the control unit ID for authentication.
- the shared key is generated using the Diffie-Hellman key exchange.
- the pairing device encrypts the key fob's public key with the shared key and sends it to the control unit. Because the key fob only sends its public key to the pairing device, the control unit can only get the public key via the pairing device. Additionally, because the key fob's public key is scrambled with the key fob ID when sent to the pairing device and encrypted with the shared key when sent to the control unit, an outside observer is not able to obtain the key fob's public key without knowing this additional information.
- FIG. 4 is a flowchart illustrating steps performed by a key fob according to one embodiment.
- the key fob scrambles its public key with the key fob ID.
- the key fob sends the scrambled public key to the pairing device.
- the pairing device then unscrambles the public key and passes it to the control unit as described herein.
- step 403 the key fob selects an OpKey and, in step 404 , encrypts the OpKey with the key fob's private key.
- step 405 the key fob generates an AES-128 OpKey encrypted value of the OpKey.
- step 406 the key fob sends the encrypted OpKey and selected bits of the AES-128 OpKey encrypted value of the OpKey to the control unit.
- FIG. 5 is a flowchart illustrating steps performed by a control unit according to one embodiment.
- the control unit executes an ECC-based key agreement with the pairing device using the control unit ID for authentication.
- the control unit receives the key fob's public key from the pairing device, where the public key is encrypted with the shared key.
- step 503 the control unit receives the OpKey from the key fob, where the OpKey is encrypted using the key fob's private key.
- step 504 the control unit receives selected bits of an AES-128 OpKey-encrypted value of OpKey from the key fob.
- step 505 the control unit decrypts the OpKey using the key fob's public key, which was received from the pairing device in step 502 .
- step 506 using the decrypted OpKey, the control unit creates an AES-128 OpKey-encrypted value of Opkey.
- step 507 the control unit compares bits from the AES-128 OpKey-encrypted value of Opkey to the selected bits received from the key fob in step 504 .
- both the key fob and the control unit have the value of OpKey, which can be used for operations between the key fob and the control unit.
- OpKey can be used for operations between the key fob and the control unit.
- One example of the operations between the key fob and the control unit is disclosed in pending U.S. patent application Ser. No. 13,969/133, titled “One-Way Key Fob and Vehicle Pairing Verification, Retention, and Revocation,” filed on Aug. 16, 2013, the disclosure of which is hereby incorporated by reference herein in its entirety.
- FIGS. 6 , 7 , and 8 show block diagrams of an example pairing device 600 , key fob 700 , and control unit 800 , respectively, in accordance with various examples discussed herein.
- the processors of the devices may be used to perform the public key scrambling or descrambling computations, authentication computations, common secret key generation computations, public key or OpKey encryption or decryption computation, and OpKey verification value computations that take place during the pairing process.
- the processors may be a standard CPU, a microcontroller, a low-power digital signal processor, etc. and may be capable of performing complex calculations in a short time.
- the memories of the devices may be used to store the public and private key pairs associated with their respective. Alternatively or additionally, the memories of the three devices may be used to store the IDs of their own or the other devices.
- the pairing device 600 may store both the key fob ID and control unit ID before initiating a paring sequence.
- the memories may be a non-volatile storage device such as a flash memory or an EEPROM.
- the transceivers for the three devices may be wired (not shown), wireless, or capable of both.
- the transceivers may be used by the devices to communicate the device IDs, public keys, and/or scrambled or encrypted data during the initial configuration steps and the initial pairing steps.
- the key fob allows for remote entry and control of vehicles or other devices and may use wireless technology, such as Bluetooth, LF, or UHF, for those transmissions.
- the devices may also be able to communicate via a wire during the initial pairing process.
- the key fob transmitter 703 is capable of transmitting only and does not receive signals from the pairing device 600 or control unit 800 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
Key fob and vehicle control unit identifiers (IDs) are used for entity authentication or trust transfer to achieve a secured initial pairing. The key fob is capable of transmitting only (not receiving) and is paired with a control unit in a vehicle or with any other control device. Use of the key fob and control unit IDs prevents unauthorized pairing and access to the operation key (OpKey) that is later used for communications between the devices. Elliptical curve cryptography (ECC) is used for strong security and efficient implementation. In the pairing process, device IDs are used for entity authentication and public key cryptography is used for easy key management. Symmetric encryption is used for fast normal operation and to accommodate key fob addition or revocation after key fob loss.
Description
- This application claims the benefit of the filing date of U.S. Provisional Patent Application No. 61/695,145, which is titled “One-Way Keyfob-Car Pairing” and was filed on Aug. 30, 2012, the disclosure of which is hereby incorporated by reference herein in its entirety.
- Embodiments of the invention are directed, in general, to vehicle security and, more specifically, to pairing a key fob that is capable of transmitting to, but not receiving from, a vehicle control unit with the unit.
- Identifiers are assigned to a wireless key fob and a vehicle control unit by their respective manufacturers or by a vehicle manufacturer. The identifiers are used for authentication and/or trust transfer to achieve a secured initial pairing. For the key fob and the vehicle control unit to be able to communicate, the devices must be paired at some point in either the manufacturing or the sales process. The pairing of wireless key fobs and their respective vehicles conventionally requires the vehicle manufacturer to deliver a secret key associated with each key fob to the various vehicle dealers. The secret key is a cryptographic key that is used to associate or pair the key fob with a vehicle. Multiple key fobs are typically paired with each vehicle. To simplify design and reduce cost, a key fob may be capable of secured pairing by performing wireless transmission, to but not receiving from, the vehicle.
- Embodiments of the invention provide methods for vehicle and key fob pairing using the identifiers of the key fob and a vehicle control unit. The identifiers are assigned by their respective manufacturers or by a vehicle manufacturer. The identifiers may be used for entity authentication and trust transfer to achieve secured initial pairing. Embodiments use device identifiers (IDs) to reduce message communications among the vehicle manufacturer, vehicle dealer, vehicle control unit, and key fob before, during, and after the vehicle-key fob pairing. This substantially decreases security vulnerabilities that could be otherwise exploited by hackers.
- The key fob and vehicle control unit IDs are assigned by their respective manufacturers, or by a vehicle manufacturer, and are used for entity authentication or trust transfer to achieve secured initial pairing. The key fob is capable of transmitting only (not receiving) and is paired with a control unit in a vehicle or with any other control device. Use of the key fob and control unit IDs prevents unauthorized pairing and access to the operation key (OpKey) that is later used for communications between the devices. The embodiment described herein minimizes vulnerabilities before, during, and after pairing and reduces communication requirements and human involvement during pairing.
- In the example described herein, elliptical curve cryptography (ECC) is used for strong security and efficient implementation; however, other encryption techniques may also be used. In the pairing process, device IDs are used for entity authentication and public key cryptography is used for easy key management. Symmetric encryption is used for fast normal operation and to accommodate key fob addition or revocation after key fob loss.
- Having thus described the invention in general terms, reference will now be made to the accompanying drawings, wherein:
-
FIG. 1 is a block diagram illustrating an initial configuration and exchange of information in a system for pairing a vehicle to one or more key fobs. -
FIGS. 2A-E illustrate steps for an initial pairing between a control unit and a selected key fob using a pairing device. -
FIG. 3 is a flowchart illustrating steps performed by a pairing device according to one embodiment. -
FIG. 4 is a flowchart illustrating steps performed by a key fob according to one embodiment. -
FIG. 5 is a flowchart illustrating steps performed by a control unit according to one embodiment. -
FIG. 6 is a block diagram of an example pairing device in accordance with one embodiment. -
FIG. 7 is a block diagram of an example key fob in accordance with one embodiment. -
FIG. 8 is a block diagram of an example control unit in accordance with one embodiment. - The invention now will be described more fully hereinafter with reference to the accompanying drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. One skilled in the art may be able to use the various embodiments of the invention.
- In one embodiments, a key fob that is capable of transmitting but not receiving is paired with a control unit in a vehicle. The control unit allows a user to perform certain operations, such as opening/closing or locking/unlocking vehicle doors through remotely using the key fob.
-
FIG. 1 is a block diagram illustrating an initial configuration and exchange of information in a system for pairing a vehicle to one or more key fobs. Avehicle manufacturer 101 provides a unique, secret control unit identifier (ID) 102 to acontrol unit 103. Thecontrol unit 103 may be any control device located inside or outside a vehicle, such as a control unit that locks/unlocks vehicle doors, opens/closes vehicle windows, turns on/off vehicle lights, etc. -
Vehicle manufacturer 101 also provides thecontrol unit ID 104 to adealer 105. The controlunit ID exchange 104 is performed in a secure or non-public manner. Thedealer 105 should also maintain the secrecy of the control unit ID for system security. - Although the example used herein refers to a
vehicle manufacturer 101 and a vehicle control unit, it will be understood that thecontrol unit 103 may be used to control non-vehicle operations, such as opening/closing a garage door, gate, hotel entrance, remote home entry, etc. Similarly, other parties, such as a third party manufacturers, dealers, or resellers, may provide the control unit ID in place ofvehicle manufacturer 101. - A
key fob manufacturer 106 provides, loads, or installs a uniquekey fob ID 107 to akey fob 108. The key fob ID does not need to be kept secret, which allows users, such asdealer 105, to easily determine the key fob ID for aparticular key fob 108, while completely eliminating the procedure and cost that would otherwise incur for maintaining the secrecy and authenticity. The dealer may obtain the key fob ID directly from thekey fob manufacturer 106 intransaction 109. Alternatively,dealer 105 may obtain the key fob ID directly from thekey fob 108 intransaction 110. For example, thekey fob 108 may be marked with the key fob ID. - Using the process illustrated in
FIG. 1 or some other process, thedealer 105 obtains both the secret control unit ID and the non-secret key fob ID. For example,dealer 105 may be a franchisee or licensee that sells, services, or repairs vehicles provided bymanufacturer 101.Manufacturer 101 has a trusted relationship withdealer 105 that allows for exchange of the control unit ID while maintaining it as a secret.Dealer 105 may obtain key fobs and key fob IDs from any third-party manufacturer 106 without needing to maintain secrecy of the key fob ID. - In one embodiment, the key fob ID and control unit ID may be eight character hexadecimal words.
-
FIG. 2 illustrates an initial pairing between acontrol unit 201 and aselected key fob 202 using apairing device 203, which may communicate withcontrol unit 201 and/orkey fob 202 wirelessly. Alternatively,pairing unit 203 may be capable of directly connecting to one or both ofcontrol unit 201 andkey fob 202, such as by connecting using a USB cable or other link, during a pairing process. Additionally,control unit 201 andkey fob 202 may communicate wirelessly or directly. - In addition to the key fob ID,
key fob 202 has a public key and a private key that can be used for a password scrambled key agreement protocol, with the key fob ID serving as the password. The key agreement protocol may be based on elliptical curve cryptography (ECC). - In
FIG. 2A , during the pairing process, the dealer may selectkey fob 202 out of many available unused key fobs, which renders the actual key fob ID being used for pairing secret to others. The dealer also determines the control unit ID forcontrol unit 201, which is maintained as a secret. The dealer then enters the control unit ID (204) and key fob ID (205) inpairing device 203. - In
FIG. 2B ,key fob 202 sends its public key scrambled with the key fob ID (206) topairing device 203. Using the key fob ID, which has already been provided, thepairing device 203 recovers the key fob's public key by unscrambling message 206. - An unauthorized, fraudulent, or malevolent party may attempt to introduce a fake
key fob 212 into the pairing process by transmitting message 216 topairing device 203. This attempt will be futile because that party does not know the ID of thekey fob 202 selected by the dealer for pairing and hence will need to use a different ID to scramble the public key of the fakekey fob 212. As a result, even if pairingdevice 203 did receive message 216 from fakekey fob 212,pairing device 203 would not be able to unscramble the fake key fob's public key. Accordingly, a fakekey fob 212 would not be able to inject itself into the pairing process. - In
FIG. 2C ,pairing device 203 andcontrol unit 201 execute an ECC-based key agreement protocol, such as a Diffie-Hellman key exchange (207), authenticated by a password taken or derived from the control unit ID. Thepairing device 203 andcontrol unit 201 authenticate each other with the control unit ID and generate an encryption key (DHkey) through the authenticatedexchange 207.Pairing device 203 encrypts the key fob's public key recovered earlier from message 206 with the DHkey generated inexchange 207.Pairing device 203 then sends the encrypted key fob public key (208) to controlunit 201, which recovers the key fob's public key using the DHkey that is shared withpairing device 203. - An unauthorized, fraudulent, or malevolent party may attempt to use a
fake pairing device 213. However, becausefake pairing device 213 does not know the secret control unit ID forcontrol unit 201, its authentication with thecontrol unit 201 will fail, thus generating no shared DHKey. Accordingly, a fake pairing device cannot be used to pair a key fob to thecontrol unit 201. - In
FIG. 2D ,key fob 202 selects an OpKey for use withcontrol unit 201.Key fob 202 encrypts the OpKey with its private key.Key fob 202 also creates an AES-128 OpKey-encrypted value of OpKey.Key fob 202 extracts a number of bits (verification bits), such as the 8, 16, or 32 lowest-order bits, from the AES-128 OpKey-encrypted value of OpKey for use in verifying exchanges with the control unit.Key fob 202 sends (209) the private-key-encrypted OpKey and the AES-128 verification bits to controlunit 201. -
Control unit 201 decrypts the OpKey using the key fob's public key, which was provided by pairingdevice 203 inmessage 208.Control unit 201 computes an AES-128 OpKey-encrypted value of the extracted OpKey and extracts a number of bits from the AES-128 OpKey-encrypted value of OpKey. These bits created bycontrol unit 201 are compared to the verification bits received fromkey fob 202 to verify that the decrypted value of OpKey was correct. - An unauthorized, fraudulent, or malevolent party may attempt to use fake
key fob 212 to pair withcontrol unit 201. However, because fakekey fob 212 did not get its public key transferred topairing device 203, fakekey fob 212 never had its public key sent to controlunit 201. As a result, when fakekey fob 212 sends a fake OpKey encrypted with its private key,control unit 201 is not able to decrypt the fake OpKey without the proper corresponding public key. Accordingly, a fake key fob is not able to pair with thecontrol unit 201. - As illustrated in
FIG. 2E , thekey fob 202 may delete its key fob ID and private key after the initial pairing withcontrol unit 201. This prevents unauthorized third-parties from accessing those values and using them to attempt to pair an unauthorized key fob withcontrol unit 201. Additionally, this prevents thekey fob 202 from pairing with other devices. -
FIG. 3 is a flowchart illustrating steps performed by a pairing device according to one embodiment. Instep 301, the pairing device receives a control unit ID. The control unit ID should be kept secret to the maximum extent practicable so that unauthorized users cannot pair key fobs to the control unit. In one embodiment, the control unit ID is available from a manufacturer or vendor, but cannot be determined directly from the control unit itself. Instep 302, the pairing device receives a key fob ID. The key fob ID may be provided by the key fob device itself or by a key fob manufacturer or vendor. - In
step 303, the pairing device receives the key fob's public key, which has been scrambled with the key fob ID. Instep 304, the pairing device recovers the key fob's public key by unscrambling the information received instep 303 using the key fob ID received instep 302. Only a device that has the key fob's ID can recover scrambled public key. If the pairing device selects the key fob at random and/or selects the key fob from a large group of key fobs, then unauthorized receivers of the scrambled public key will not know which key fob ID to use to recover the public key. - In
step 305, the pairing device generates a shared key with the control unit using the control unit ID for authentication. In one embodiment, the shared key is generated using the Diffie-Hellman key exchange. Instep 306, the pairing device encrypts the key fob's public key with the shared key and sends it to the control unit. Because the key fob only sends its public key to the pairing device, the control unit can only get the public key via the pairing device. Additionally, because the key fob's public key is scrambled with the key fob ID when sent to the pairing device and encrypted with the shared key when sent to the control unit, an outside observer is not able to obtain the key fob's public key without knowing this additional information. -
FIG. 4 is a flowchart illustrating steps performed by a key fob according to one embodiment. Instep 401, the key fob scrambles its public key with the key fob ID. Instep 402, the key fob sends the scrambled public key to the pairing device. The pairing device then unscrambles the public key and passes it to the control unit as described herein. - In
step 403, the key fob selects an OpKey and, instep 404, encrypts the OpKey with the key fob's private key. Instep 405, the key fob generates an AES-128 OpKey encrypted value of the OpKey. Instep 406, the key fob sends the encrypted OpKey and selected bits of the AES-128 OpKey encrypted value of the OpKey to the control unit. -
FIG. 5 is a flowchart illustrating steps performed by a control unit according to one embodiment. Instep 501, the control unit executes an ECC-based key agreement with the pairing device using the control unit ID for authentication. Instep 502, the control unit receives the key fob's public key from the pairing device, where the public key is encrypted with the shared key. - In
step 503, the control unit receives the OpKey from the key fob, where the OpKey is encrypted using the key fob's private key. Instep 504, the control unit receives selected bits of an AES-128 OpKey-encrypted value of OpKey from the key fob. - In
step 505, the control unit decrypts the OpKey using the key fob's public key, which was received from the pairing device instep 502. Instep 506, using the decrypted OpKey, the control unit creates an AES-128 OpKey-encrypted value of Opkey. Finally, instep 507, the control unit compares bits from the AES-128 OpKey-encrypted value of Opkey to the selected bits received from the key fob instep 504. - Following the processes outlined in
FIGS. 4 and 5 , both the key fob and the control unit have the value of OpKey, which can be used for operations between the key fob and the control unit. One example of the operations between the key fob and the control unit is disclosed in pending U.S. patent application Ser. No. 13,969/133, titled “One-Way Key Fob and Vehicle Pairing Verification, Retention, and Revocation,” filed on Aug. 16, 2013, the disclosure of which is hereby incorporated by reference herein in its entirety. -
FIGS. 6 , 7, and 8 show block diagrams of anexample pairing device 600,key fob 700, andcontrol unit 800, respectively, in accordance with various examples discussed herein. The three devices—pairingdevice 600,key fob 700, andcontrol unit 800—may each comprise a processor (601, 701, 801), a memory (602, 702, 802), and a transceiver or transmitter (603, 703, 803). The processors of the devices may be used to perform the public key scrambling or descrambling computations, authentication computations, common secret key generation computations, public key or OpKey encryption or decryption computation, and OpKey verification value computations that take place during the pairing process. The processors may be a standard CPU, a microcontroller, a low-power digital signal processor, etc. and may be capable of performing complex calculations in a short time. - The memories of the devices may be used to store the public and private key pairs associated with their respective. Alternatively or additionally, the memories of the three devices may be used to store the IDs of their own or the other devices. For example, the
pairing device 600 may store both the key fob ID and control unit ID before initiating a paring sequence. The memories may be a non-volatile storage device such as a flash memory or an EEPROM. - The transceivers for the three devices may be wired (not shown), wireless, or capable of both. The transceivers may be used by the devices to communicate the device IDs, public keys, and/or scrambled or encrypted data during the initial configuration steps and the initial pairing steps. The key fob allows for remote entry and control of vehicles or other devices and may use wireless technology, such as Bluetooth, LF, or UHF, for those transmissions. The devices may also be able to communicate via a wire during the initial pairing process. The
key fob transmitter 703 is capable of transmitting only and does not receive signals from thepairing device 600 orcontrol unit 800. - Many modifications and other embodiments of the invention will come to mind to one skilled in the art to which this invention pertains having the benefit of the teachings presented in the foregoing descriptions, and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Claims (18)
1. A key fob-control unit pairing device, comprising:
a transceiver configured to transmit signals to a control unit and to receive signals from the control unit and a key fob;
a memory configured to store a key fob identification and a control unit identification; and
a processor coupled to said transceiver and memory, the processor configured to:
authenticate the control unit using a password authenticated key agreement protocol with the password taken or derived from the control unit identification; and
transmit an encrypted key fob public key to the control unit.
2. The device of claim 1 , wherein the password authenticated key agreement protocol performed by the processor is configured to generate a common secret key shared between the pairing device and the control unit.
3. The device of claim 2 , wherein the processor is further configured to generate the encrypted key fob public key with the common secret key.
4. The device of claim 1 , wherein the password authenticated key agreement protocol is based on elliptical curve cryptography.
5. The device of claim 1 , wherein the processor is further configured to receive a scrambled key fob public key from the key fob and to recover the key fob public key using the key fob identification.
6. A key fob, comprising:
a transmitter configured to transmit signals to a pairing device and a control unit;
a memory to store a key fob identification, a public key, a private key, and an operation key; and
a processor coupled to said transmitter and memory, the processor configured to:
generate a scrambled public key using the key fob identification;
transmit the scrambled public key to the pairing device;
generate an encrypted operation key using the private key; and
transmit the encrypted operation key to the control unit.
7. The key fob of claim 6 , wherein the processor is further configured to:
generate an AES-128 encrypted value of the operation key; and
transmit, along with the encrypted operation key, selected bits of the AES-128 encrypted value of the operation key to the control unit.
8. The key fob of claim 6 , wherein the processor is further configured to:
erase the key fob identification and the private key after transmitting the encrypted operation key to the control unit.
9. The key fob of claim 7 , wherein the selected bits of the AES-128 encrypted value of the operation key comprise a predetermined number of low-order bits.
10. The key fob of claim 7 , wherein the AES-128 encrypted value of the operation key is encrypted with the operation key.
11. The key fob of claim 7 , wherein the encrypted operation key and selected bits of the AES-128 encrypted value of the operation key are transmitted wirelessly to the control unit.
12. A method for pairing a key fob with a control unit, comprising:
executing, by a pairing device and the control unit, a password authenticated key agreement protocol with the password taken or derived from a control unit identification to authenticate each other and to generate a shared encryption key;
encrypting, by the pairing device, a key fob public key with the shared encryption key; and
transmitting, by the pairing device, the encrypted key fob public encryption key to the control unit.
13. The method of claim 12 , further comprising:
receiving a scrambled public key from a key fob at the pairing device; and
recovering the key fob public key from the scrambled public key using a key fob identification.
14. The method of claim 12 , further comprising:
receiving, by the control unit, the encrypted key fob public key from the pairing device; and
decrypting, by the control unit, the key fob public key with the shared encryption key.
15. The method of claim 12 , further comprising:
receiving an encrypted operation key from a key fob at the control unit, wherein the encrypted operation key is encrypted using a key fob private key; and
decrypting the encrypted operation key using the key fob public key received from the pairing device to obtain a decrypted operation key.
16. The method of claim 15 , further comprising:
receiving operation key verification bits at the control unit;
encrypting the decrypted operation key at the control unit to obtain an AES-128 operation key-encrypted value of the operation key; and
comparing selected bits of the AES-128 encrypted value of the operation key to the operation key verification bits to verify the decrypted operation key.
17. The method of claim 16 , wherein the operation key verification bits comprise a predetermined number of low-order bits from an AES-128 encrypted value of the operation key.
18. The method of claim 12 , wherein the password authenticated key agreement protocol is based on elliptical curve cryptography.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/969,154 US20140064488A1 (en) | 2012-08-30 | 2013-08-16 | One-Way Key Fob and Vehicle Pairing |
CN201380043164.6A CN104583028B (en) | 2012-08-30 | 2013-08-30 | One-way key fob and vehicle pairing |
CN201710144977.4A CN106912046B (en) | 2012-08-30 | 2013-08-30 | One-way key fob and vehicle pairing |
JP2015530108A JP6444304B2 (en) | 2012-08-30 | 2013-08-30 | One-way key fob and vehicle pairing |
PCT/US2013/057608 WO2014036454A1 (en) | 2012-08-30 | 2013-08-30 | One-way key fob and vehicle pairing |
US15/588,083 US10477402B2 (en) | 2012-08-30 | 2017-05-05 | One-way key fob and vehicle pairing |
JP2018171141A JP2019024209A (en) | 2012-08-30 | 2018-09-13 | One-way key fob and vehicle pairing |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261695145P | 2012-08-30 | 2012-08-30 | |
US13/969,154 US20140064488A1 (en) | 2012-08-30 | 2013-08-16 | One-Way Key Fob and Vehicle Pairing |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/588,083 Continuation US10477402B2 (en) | 2012-08-30 | 2017-05-05 | One-way key fob and vehicle pairing |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140064488A1 true US20140064488A1 (en) | 2014-03-06 |
Family
ID=50184439
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/969,154 Abandoned US20140064488A1 (en) | 2012-08-30 | 2013-08-16 | One-Way Key Fob and Vehicle Pairing |
US15/588,083 Active 2033-09-30 US10477402B2 (en) | 2012-08-30 | 2017-05-05 | One-way key fob and vehicle pairing |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/588,083 Active 2033-09-30 US10477402B2 (en) | 2012-08-30 | 2017-05-05 | One-way key fob and vehicle pairing |
Country Status (4)
Country | Link |
---|---|
US (2) | US20140064488A1 (en) |
JP (2) | JP6444304B2 (en) |
CN (2) | CN106912046B (en) |
WO (1) | WO2014036454A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170255581A1 (en) * | 2016-03-04 | 2017-09-07 | Facebook, Inc. | Mobile hardware fob with device ecosystem for modular i/o extension devices |
US20170353304A1 (en) * | 2014-12-23 | 2017-12-07 | Orange | Method for getting a user validation of a key |
US20210377261A1 (en) * | 2020-06-01 | 2021-12-02 | Fuding Precision Components (Shenzhen) Co., Ltd. | Vehicle control method and smart car key |
US20220156544A1 (en) * | 2018-09-20 | 2022-05-19 | Legic Identsystems Ag | Key Fob |
CN114978769A (en) * | 2022-07-19 | 2022-08-30 | 济南慧天云海信息技术有限公司 | Unidirectional lead-in device, method, medium, and apparatus |
US20230071702A1 (en) * | 2021-09-03 | 2023-03-09 | Rivian Ip Holdings, Llc | Managing communications between a vehicle and a user device |
US20240211582A1 (en) * | 2016-12-08 | 2024-06-27 | Gn Hearing A/S | Hearing device system, devices and method of creating a trusted bond between a hearing device and a user application |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018044146A1 (en) * | 2016-09-05 | 2018-03-08 | Lg Electronics Inc. | Lightweight and escrow-less authenticated key agreement for the internet of things |
WO2018081583A1 (en) * | 2016-10-27 | 2018-05-03 | Infinitekey, Inc. | System and method for authenticating and authorizing devices |
JP6717793B2 (en) * | 2017-10-10 | 2020-07-08 | 株式会社東海理化電機製作所 | Car sharing system and car sharing device |
KR102445514B1 (en) * | 2017-10-26 | 2022-09-21 | 현대자동차주식회사 | A vehicle and vehicle system |
CN108055235B (en) * | 2017-11-01 | 2020-09-18 | 华中科技大学 | A smart lock control method, related equipment and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080256365A1 (en) * | 2006-05-10 | 2008-10-16 | Andreas Eckleder | Apparatus for writing information on a data content on a storage medium |
US20100014671A1 (en) * | 2008-06-19 | 2010-01-21 | General Instrument Corporation | Secure interchip transport interface |
US20100199095A1 (en) * | 2009-01-30 | 2010-08-05 | Texas Instruments Inc. | Password-Authenticated Association Based on Public Key Scrambling |
WO2012041885A1 (en) * | 2010-09-28 | 2012-04-05 | Valeo Securite Habitacle | Method for pairing a mobile telephone with a motor vehicle and locking/unlocking set |
US20130179176A1 (en) * | 2010-03-11 | 2013-07-11 | CompuGroup Medical AG | Computer implemented method for determining the presence of a disease in a patient |
US20130182845A1 (en) * | 2012-01-18 | 2013-07-18 | Square, Inc. | Secure communications between devices using a trusted server |
US20140025951A1 (en) * | 2012-07-17 | 2014-01-23 | Texas Instruments Incorporated | Id-based control unit-key fob pairing |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6178506B1 (en) * | 1998-10-23 | 2001-01-23 | Qualcomm Inc. | Wireless subscription portability |
US6386007B1 (en) * | 1999-06-14 | 2002-05-14 | Siemens Automotive Corporation | Key fob with valet and car locator feature |
US6518880B2 (en) | 2000-06-28 | 2003-02-11 | Denso Corporation | Physical-quantity detection sensor |
GB0028278D0 (en) * | 2000-11-20 | 2001-01-03 | Tao Group Ltd | Personal authentication system |
US20030208753A1 (en) * | 2001-04-10 | 2003-11-06 | Silicon Light Machines | Method, system, and display apparatus for encrypted cinema |
US7805615B2 (en) * | 2005-07-15 | 2010-09-28 | Tyfone, Inc. | Asymmetric cryptography with user authentication |
JP2007096580A (en) * | 2005-09-28 | 2007-04-12 | Fujitsu Ltd | FAX communication system |
US9137012B2 (en) * | 2006-02-03 | 2015-09-15 | Emc Corporation | Wireless authentication methods and apparatus |
US8245052B2 (en) * | 2006-02-22 | 2012-08-14 | Digitalpersona, Inc. | Method and apparatus for a token |
US7881470B2 (en) * | 2006-03-09 | 2011-02-01 | Intel Corporation | Network mobility security management |
JP2007265090A (en) * | 2006-03-29 | 2007-10-11 | Itochu Techno-Solutions Corp | Information processor and information processing system |
CN100566460C (en) * | 2007-07-13 | 2009-12-02 | 北京工业大学 | Utilize authentication and cryptographic key negotiation method between the mobile entity that short message realizes |
US20090160607A1 (en) * | 2007-12-21 | 2009-06-25 | General Motors Corporation | Vehicle key fob having a communications circuit |
JP5356718B2 (en) | 2008-04-22 | 2013-12-04 | 株式会社 エヌティーアイ | Electronic key system |
JP5237707B2 (en) * | 2008-07-03 | 2013-07-17 | 株式会社東海理化電機製作所 | Cryptographic authentication system and cryptographic communication method |
JP2010226336A (en) * | 2009-03-23 | 2010-10-07 | Denso It Laboratory Inc | Authentication method and authentication apparatus |
US20110215899A1 (en) * | 2010-03-08 | 2011-09-08 | Ford Global Technologies, Llc | Method and system for authorizing a vehicle driveaway |
US8644515B2 (en) * | 2010-08-11 | 2014-02-04 | Texas Instruments Incorporated | Display authenticated security association |
JP5889525B2 (en) * | 2010-12-21 | 2016-03-22 | パナソニックIpマネジメント株式会社 | Authentication system |
-
2013
- 2013-08-16 US US13/969,154 patent/US20140064488A1/en not_active Abandoned
- 2013-08-30 WO PCT/US2013/057608 patent/WO2014036454A1/en active Application Filing
- 2013-08-30 CN CN201710144977.4A patent/CN106912046B/en active Active
- 2013-08-30 CN CN201380043164.6A patent/CN104583028B/en active Active
- 2013-08-30 JP JP2015530108A patent/JP6444304B2/en active Active
-
2017
- 2017-05-05 US US15/588,083 patent/US10477402B2/en active Active
-
2018
- 2018-09-13 JP JP2018171141A patent/JP2019024209A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080256365A1 (en) * | 2006-05-10 | 2008-10-16 | Andreas Eckleder | Apparatus for writing information on a data content on a storage medium |
US20100014671A1 (en) * | 2008-06-19 | 2010-01-21 | General Instrument Corporation | Secure interchip transport interface |
US20100199095A1 (en) * | 2009-01-30 | 2010-08-05 | Texas Instruments Inc. | Password-Authenticated Association Based on Public Key Scrambling |
US20130179176A1 (en) * | 2010-03-11 | 2013-07-11 | CompuGroup Medical AG | Computer implemented method for determining the presence of a disease in a patient |
WO2012041885A1 (en) * | 2010-09-28 | 2012-04-05 | Valeo Securite Habitacle | Method for pairing a mobile telephone with a motor vehicle and locking/unlocking set |
US20130259232A1 (en) * | 2010-09-28 | 2013-10-03 | Valeo Securite Habitacle | Method for pairing a mobile telephone with a motor vehicle and locking/unlocking set |
US20130182845A1 (en) * | 2012-01-18 | 2013-07-18 | Square, Inc. | Secure communications between devices using a trusted server |
US20140025951A1 (en) * | 2012-07-17 | 2014-01-23 | Texas Instruments Incorporated | Id-based control unit-key fob pairing |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170353304A1 (en) * | 2014-12-23 | 2017-12-07 | Orange | Method for getting a user validation of a key |
US20170255581A1 (en) * | 2016-03-04 | 2017-09-07 | Facebook, Inc. | Mobile hardware fob with device ecosystem for modular i/o extension devices |
US9892076B2 (en) * | 2016-03-04 | 2018-02-13 | Facebook, Inc. | Mobile hardware fob with device ecosystem for modular I/O extension devices |
US10521384B2 (en) | 2016-03-04 | 2019-12-31 | Facebook, Inc. | Mobile hardware fob with device ecosystem for modular I/O extension devices |
US20240211582A1 (en) * | 2016-12-08 | 2024-06-27 | Gn Hearing A/S | Hearing device system, devices and method of creating a trusted bond between a hearing device and a user application |
US12306927B2 (en) * | 2016-12-08 | 2025-05-20 | Gn Hearing A/S | Hearing device system, devices and method of creating a trusted bond between a hearing device and a user application |
US20220156544A1 (en) * | 2018-09-20 | 2022-05-19 | Legic Identsystems Ag | Key Fob |
US11714986B2 (en) * | 2018-09-20 | 2023-08-01 | Legic Identsystems Ag | Key fob |
US20210377261A1 (en) * | 2020-06-01 | 2021-12-02 | Fuding Precision Components (Shenzhen) Co., Ltd. | Vehicle control method and smart car key |
US11962581B2 (en) * | 2020-06-01 | 2024-04-16 | Fuding Precision Components (Shenzhen) Co., Ltd. | Vehicle control method and smart car key |
US20230071702A1 (en) * | 2021-09-03 | 2023-03-09 | Rivian Ip Holdings, Llc | Managing communications between a vehicle and a user device |
CN114978769A (en) * | 2022-07-19 | 2022-08-30 | 济南慧天云海信息技术有限公司 | Unidirectional lead-in device, method, medium, and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106912046B (en) | 2021-02-23 |
CN106912046A (en) | 2017-06-30 |
WO2014036454A1 (en) | 2014-03-06 |
CN104583028B (en) | 2017-04-12 |
JP6444304B2 (en) | 2018-12-26 |
JP2015532816A (en) | 2015-11-12 |
CN104583028A (en) | 2015-04-29 |
US20170303134A1 (en) | 2017-10-19 |
JP2019024209A (en) | 2019-02-14 |
US10477402B2 (en) | 2019-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10477402B2 (en) | One-way key fob and vehicle pairing | |
US20240106630A1 (en) | Id-based control unit-key fob pairing | |
CN107896147B (en) | Method and system for negotiating temporary session key based on national cryptographic algorithm | |
US20220368542A1 (en) | Key fob authentication, retention, and revocation | |
Patel et al. | On the security of remote key less entry for vehicles | |
US10805276B2 (en) | Device and methods for safe control of vehicle equipment secured by encrypted channel | |
JP5295999B2 (en) | Terminal initial setting method and initial setting device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TEXAS INSTRUMENTS INCORPORATED, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HO, JIN-MENG;REEL/FRAME:031028/0676 Effective date: 20130815 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |