WO1995010432A1 - Vehicle security arrangement - Google Patents

Vehicle security arrangement Download PDF

Info

Publication number
WO1995010432A1
WO1995010432A1 PCT/GB1994/002202 GB9402202W WO9510432A1 WO 1995010432 A1 WO1995010432 A1 WO 1995010432A1 GB 9402202 W GB9402202 W GB 9402202W WO 9510432 A1 WO9510432 A1 WO 9510432A1
Authority
WO
WIPO (PCT)
Prior art keywords
value
vehicle
signal
key
lock
Prior art date
Application number
PCT/GB1994/002202
Other languages
French (fr)
Inventor
Thomas Mark Angus Lomas
Original Assignee
British Technology Group Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Technology Group Limited filed Critical British Technology Group Limited
Priority to AU78177/94A priority Critical patent/AU7817794A/en
Publication of WO1995010432A1 publication Critical patent/WO1995010432A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means

Definitions

  • This invention relates to the improvement of the protection of vehicles against theft or other unauthorised use.
  • the protection of a vehicle against theft and other unauthorised use has developed from simple door locks and keys on the doors to extensive systems of sensors based on ultrasonics, microwaves, vehicle voltage change or vibration which cause an alarm to be sounded.
  • Complicated door locks and keys resist unauthorised entry and a lock 1s used on the steering column. Theft by driving away of a car after "hot-wiring" to bypass switches in the ignition circuit is still frequent despite these precautions.
  • a vehicle security arrangement including a first part for incorporation in a vehicle and a second part for use as a key to allow operation of the vehicle, in which arrangement both the first part and the second part include signal processing means and signal receiving and sending means, the signal processing means being responsive to an input signal of a first value to generate an output signal of a second value in accordance with a one-way hash function performed with a stored value on the first value, the stored value being computationally unfeasible to determine from the first and second values, the first part including means to produce a first value signal and in operation send this first value signal for the second part in operation in the key position for the vehicle, to receive as a said Input signal therefor and form a said second value output signal therefrom, the first part also including means to receive said output signal of the second part sent therefrom together with means to compare the received said output signal with a check value generated from the produced first value by the signal processing means of the first part and permit or prevent operation of the vehicle in accordance with the result of the comparison
  • the first part may be incorporated in a vehicle part vital to the integrity or operation of the vehicle.
  • the vehicle part may be the engine management device.
  • the one-way hash function may be of the American Secure Hash Standard type, abbreviated as SHS.
  • the arrangement may generate a fresh first value at least on each use of the second part with the first part.
  • the fresh value may be unpredictable.
  • the stored value may be held concealed. The stored value and the first value may, when concatenated, exceed three hundred bits.
  • a lock and key method of vehicle security including causing the lock to provide an identical first value to both the lock and the key, storing in the lock and the key an identical concealed value, causing or permitting the lock and the key to separately calculate in an identical manner from their respective first and second stored values an output value, returning the output value of the key calculation to the lock, comparing the output values to permit enabling of the lock on satisfactory comparison, the stored concealed value being computationally infeasible to determine from the first or output values.
  • a method of providing vehicle security including providing a source of a first signal value, providing first and second one way hash function signal processors each having the same concealed stored value, positioning said first processor on a vehicle to be provided with security, positioning said second processor on a key to said vehicle, connecting said source to said first processor and linking said source to said second processor to permit the performance of the hash function in both processors to produce respective outputs providing comparator means connected to the first processor and linked to the second processor to compare the outputs to produce a vehicle-enabling output on satisfactory comparison.
  • Figure 1 is a schematic of the security arrangement for a passenger car and Figure 2 shows in more detail parts of the arrangement in Figure 1.
  • vehicle V includes but is not limited to cars, lorries, trains, boats and aircraft.
  • a key K for an arrangement exemplifying the invention includes in a portion P2 of the arrangement a computation device, such as a microchip SP2, with an appropriate in-built power source or means to receive power from an external source (not shown).
  • the computation device is formed to perform a one-way hash function F# on a supplied signal value V- j ' at input IP' and also contain a concealed secret stored value SV as the source of the other value for performance of the hash function.
  • the key also includes means Rx2 for the reception of a signal value V-
  • the means for reception may be direct connection, by electrical contacts, or indirect connection, for example by magnetic coupling, electromagnetic radiation and other techniques.
  • the key also includes means for transmission Tx2 of the result V 2 of the hash function from the output OP' of device SP2.
  • the key of the arrangement is for co-operative use with a lock of the arrangement, for example the lock receives the key.
  • the lock includes appropriate transmission Txl and reception Rxl means for use with the key.
  • the lock supplies to the key the above-mentioned supplied value, which value is produced in a further portion PI of the arrangement for supply to the lock and is preferably a fresh and unpredictable value V at each use.
  • the further portion is incorporated in the vehicle engine management system EMS so as not to be removable or interrogated without destruction or disabling damage.
  • the further portion includes a computation device SP1 to perform the one-way hash function on the value V 1 supplied at input IP and contains the identical stored valued SV concealed therein.
  • the key transmits the result V 2 of the hash function to the lock via Rxl for application, V 2 ', to the further portion and comparison CM with a check value at output OP of device SP1 , the result of the hash function applied in the further portion to the identical stored value SV and the supplied value V .
  • a satisfactory result G of the comparison will allow the use of the vehicle.
  • the turning of the key in the lock may be prevented until the satisfactory result or may be permitted to a certain amount thereuntil, a satisfactory result then permitting operation of the engine management system.
  • a failure of the comparison is indicated as an inhibition of use, NG.
  • SHS American Secure Hash Standard
  • the generated and stored values are concatenated and the SHS applied to the result. Provided the sum of the lengths of the values is large enough, typically some 380 bits, the result is effective for the "question-and-answer" exchange. Details of the SHS are given in Federal Information Processing Standards Publication: "Secure Hash Standard” Draft, National Institute of Standards and Technology, January 22, 1992. In an exemplary installation in a private car the lock is on the steering column as at present and the further portion to produce the supplied value is included in the engine management system computer.
  • connections to the key are by electrical contacts. These contacts transfer signals and, if required, power for the computation device in the key.
  • the produced value is provided to the key where the one-way hash function is performed using the stored value and the result returned via the lock to the engine management system computer.
  • the received result is compared with the result of the local performance of the one-way hash function on the stored value and the produced value. If the results of the "question-and-answer" exchange match the key has operated the lock and the vehicle can be put into use. If the results do not match the vehicle remains immobilized. If required the engine management can be inhibited, alternatively or additionally the steering lock can be kept locked.
  • an unpredictable value V ⁇ generated in the part PI is supplied both for transmission to part P2 and as an input IP to the hash function computation device SP1 , the other input to which is stored value SV, where output OP is calculated in accordance with the hash function.
  • the value V ⁇ transmitted to part P2 is received and supplied as the same value, but identified as V ' for convenience, as input IP' to computation device SP2 where the same hash function calculation using also stored value SV is performed to produce an output OP of value V 2 .
  • Outputs OP and OP' should have the same value.
  • Value V 2 is transmitted to part PI for comparison, as value V ', with OP in a comparison means CM.
  • the engine management system is not the only element of the vehicle which could be used, the fuel supply or starter motor could include a device to inhibit its operation.
  • question-and-answer sequence could be repeated at intervals during use of the vehicle to prevent attempts to defeat the security arrangement by bypassing the lock once the vehicle has started.
  • the invention also provides a checking arrangement. If a key which operates a vehicle is to be checked as the correct one, for example to defeat change of engine management computer and key and lock in a stolen vehicle, the checking arrangement is used. The key is placed in the arrangement and the arrangement causes the key to calculate a value. The manufacturer of the vehicle has a record of the correct value for a specific Vehicle Identification Number and on approved request provides this for comparison with the calculated value as a check on the correctness of the key for the vehicle, without the concealed stored value being revealed.
  • the key may have a rechargeable battery charged by inductive or other direct or indirect means. Solar energisation or recharging is also possible.
  • the part of the arrangement in the vehicle may include suitable power back-up to cope with vehicle battery failure or removal and to help resist attempts to interfere with the proper operation of the arrangement.
  • a suitable number of chips may be provided by the manufacturer to provide extra keys for delivery with a new vehicle.
  • the users must ensure that the keys are not acquired by unauthorised users.
  • the techniques described above provide a vehicle security arrangement which is of little inconvenience to an authorised user while providing great deterrent to unauthorised use or theft of the vehicle. Even if a vehicle is stolen by towing or placing on a trailer the need to replace the engine management system is a very significant problem and makes profitable disposal very difficult.

Abstract

A vehicle security arrangement including a first part for incorporation in a vehicle and a second part for use as a key to allow operation of the vehicle, in which arrangement both the first part and the second part include signal processing means and signal receiving and sending means, the signal processing means being responsive to an input signal of a first value to generate an output signal of a second value in accordance with a one-way hash function performed with a stored value on the first value, the stored value being computationally unfeasible to determine from the first and second values, the first part including means to produce a first value signal and in operation send this first value signal for the second part, in operation in the key position for the vehicle, to receive as a said input signal therefor and form a said second value output signal therefrom, the first part also including means to receive said output signal of the second part sent therefrom together with means to compare the received said output signal with a check value generated from the produced first value by the signal processing means of the first part and permit or prevent operation of the vehicle in accordance with the result of the comparison following the signal exchange.

Description

VEHICLE SECURITY ARRANGEMENT
This invention relates to the improvement of the protection of vehicles against theft or other unauthorised use. The protection of a vehicle against theft and other unauthorised use has developed from simple door locks and keys on the doors to extensive systems of sensors based on ultrasonics, microwaves, vehicle voltage change or vibration which cause an alarm to be sounded. Complicated door locks and keys resist unauthorised entry and a lock 1s used on the steering column. Theft by driving away of a car after "hot-wiring" to bypass switches in the ignition circuit is still frequent despite these precautions.
The cost of precautions against theft and the insurance claims for stolen vehicles is now so large as to be of great concern to insurers and the motor industry, also significantly increasing insurance costs.
There is a great need for an effective technique for the protection of a vehicle against unauthorised removal or use, that is theft in general terms, which does not make authorised use of a vehicle too cumbersome.
It is an object of the invention to provide a vehicle security arrangement effective to immobilize a vehicle apart from authorised use which arrangement is not obstructive of authorised use.
According to the invention there is provided a vehicle security arrangement including a first part for incorporation in a vehicle and a second part for use as a key to allow operation of the vehicle, in which arrangement both the first part and the second part include signal processing means and signal receiving and sending means, the signal processing means being responsive to an input signal of a first value to generate an output signal of a second value in accordance with a one-way hash function performed with a stored value on the first value, the stored value being computationally unfeasible to determine from the first and second values, the first part including means to produce a first value signal and in operation send this first value signal for the second part in operation in the key position for the vehicle, to receive as a said Input signal therefor and form a said second value output signal therefrom, the first part also including means to receive said output signal of the second part sent therefrom together with means to compare the received said output signal with a check value generated from the produced first value by the signal processing means of the first part and permit or prevent operation of the vehicle in accordance with the result of the comparison following the signal exchange.
The first part may be incorporated in a vehicle part vital to the integrity or operation of the vehicle. The vehicle part may be the engine management device. The one-way hash function may be of the American Secure Hash Standard type, abbreviated as SHS.
The arrangement may generate a fresh first value at least on each use of the second part with the first part. The fresh value may be unpredictable. The stored value may be held concealed. The stored value and the first value may, when concatenated, exceed three hundred bits.
According to a further aspect of the invention there is provided a lock and key method of vehicle security including causing the lock to provide an identical first value to both the lock and the key, storing in the lock and the key an identical concealed value, causing or permitting the lock and the key to separately calculate in an identical manner from their respective first and second stored values an output value, returning the output value of the key calculation to the lock, comparing the output values to permit enabling of the lock on satisfactory comparison, the stored concealed value being computationally infeasible to determine from the first or output values. According to another aspect of the invention there is provided a method of providing vehicle security including providing a source of a first signal value, providing first and second one way hash function signal processors each having the same concealed stored value, positioning said first processor on a vehicle to be provided with security, positioning said second processor on a key to said vehicle, connecting said source to said first processor and linking said source to said second processor to permit the performance of the hash function in both processors to produce respective outputs providing comparator means connected to the first processor and linked to the second processor to compare the outputs to produce a vehicle-enabling output on satisfactory comparison.
Embodiments of the invention will now be described with reference to the drawing said by way of examples including that of a lock and key for a vehicle.
In the drawings Figure 1 is a schematic of the security arrangement for a passenger car and Figure 2 shows in more detail parts of the arrangement in Figure 1. In this document the term vehicle V includes but is not limited to cars, lorries, trains, boats and aircraft.
A key K for an arrangement exemplifying the invention includes in a portion P2 of the arrangement a computation device, such as a microchip SP2, with an appropriate in-built power source or means to receive power from an external source (not shown). The computation device is formed to perform a one-way hash function F# on a supplied signal value V-j ' at input IP' and also contain a concealed secret stored value SV as the source of the other value for performance of the hash function. The key also includes means Rx2 for the reception of a signal value V-| ' as the supplied value for performance of the hash function. The means for reception may be direct connection, by electrical contacts, or indirect connection, for example by magnetic coupling, electromagnetic radiation and other techniques. The key also includes means for transmission Tx2 of the result V2 of the hash function from the output OP' of device SP2. The key of the arrangement is for co-operative use with a lock of the arrangement, for example the lock receives the key. The lock includes appropriate transmission Txl and reception Rxl means for use with the key. The lock supplies to the key the above-mentioned supplied value, which value is produced in a further portion PI of the arrangement for supply to the lock and is preferably a fresh and unpredictable value V at each use. Preferably the further portion is incorporated in the vehicle engine management system EMS so as not to be removable or interrogated without destruction or disabling damage. The further portion includes a computation device SP1 to perform the one-way hash function on the value V1 supplied at input IP and contains the identical stored valued SV concealed therein. The key transmits the result V2 of the hash function to the lock via Rxl for application, V2', to the further portion and comparison CM with a check value at output OP of device SP1 , the result of the hash function applied in the further portion to the identical stored value SV and the supplied value V . A satisfactory result G of the comparison will allow the use of the vehicle. The turning of the key in the lock may be prevented until the satisfactory result or may be permitted to a certain amount thereuntil, a satisfactory result then permitting operation of the engine management system. A failure of the comparison is indicated as an inhibition of use, NG. Various one-way hash functions are known and may be used, provided the requirement of computational unfeasibi lity is met. One example is the American Secure Hash Standard (SHS) originally intended for e-mail message signing. The generated and stored values are concatenated and the SHS applied to the result. Provided the sum of the lengths of the values is large enough, typically some 380 bits, the result is effective for the "question-and-answer" exchange. Details of the SHS are given in Federal Information Processing Standards Publication: "Secure Hash Standard" Draft, National Institute of Standards and Technology, January 22, 1992. In an exemplary installation in a private car the lock is on the steering column as at present and the further portion to produce the supplied value is included in the engine management system computer. The connections to the key are by electrical contacts. These contacts transfer signals and, if required, power for the computation device in the key. On introducing the key into the lock the produced value is provided to the key where the one-way hash function is performed using the stored value and the result returned via the lock to the engine management system computer. Here the received result is compared with the result of the local performance of the one-way hash function on the stored value and the produced value. If the results of the "question-and-answer" exchange match the key has operated the lock and the vehicle can be put into use. If the results do not match the vehicle remains immobilized. If required the engine management can be inhibited, alternatively or additionally the steering lock can be kept locked.
To summarise the exemplary arrangement described an unpredictable value V^ generated in the part PI is supplied both for transmission to part P2 and as an input IP to the hash function computation device SP1 , the other input to which is stored value SV, where output OP is calculated in accordance with the hash function. The value V^ transmitted to part P2 is received and supplied as the same value, but identified as V ' for convenience, as input IP' to computation device SP2 where the same hash function calculation using also stored value SV is performed to produce an output OP of value V2. Outputs OP and OP' should have the same value. Value V2 is transmitted to part PI for comparison, as value V ', with OP in a comparison means CM. If the comparison is satisfactory enabling output G is produced, if not the inhibiting output NG is produced. Conveniently a portion of part PI is in the engine management system EMS. The key cannot be duplicated without knowledge of the hash function and the concealed stored secret value. This would incur considerable expense, even if possible. Similarly the engine management system further portion could not be imitated easily. The arrangement described is not susceptible to being breached by "capturing" one sequence of question-and-answer and replaying it later when the other vlue is a fresh and unpredictable one.
Clearly the engine management system is not the only element of the vehicle which could be used, the fuel supply or starter motor could include a device to inhibit its operation.
If required the question-and-answer sequence could be repeated at intervals during use of the vehicle to prevent attempts to defeat the security arrangement by bypassing the lock once the vehicle has started.
The invention also provides a checking arrangement. If a key which operates a vehicle is to be checked as the correct one, for example to defeat change of engine management computer and key and lock in a stolen vehicle, the checking arrangement is used. The key is placed in the arrangement and the arrangement causes the key to calculate a value. The manufacturer of the vehicle has a record of the correct value for a specific Vehicle Identification Number and on approved request provides this for comparison with the calculated value as a check on the correctness of the key for the vehicle, without the concealed stored value being revealed.
Tight security of the keys and other components by the manufacturer is important. A supply of pairs of "chips", each pair holding an identical secret stored value, is needed but this is not a serious problem if "burn-in" techniques are used tc insert the stored value. "Chips" can also be provided in sets of more than two to permit more than one authorised user. It is not essential that the second part, that for use as a key, is of conventional key form nor that a conventional lock for the key be provided. The arrangement may be of "wireless" form using for example visible light, infra red, radio or other transmission methods. The key may be of "lay-on" form and not actually inserted in the lock. Power-supply may be of any suitable form. The key may have a rechargeable battery charged by inductive or other direct or indirect means. Solar energisation or recharging is also possible. The part of the arrangement in the vehicle may include suitable power back-up to cope with vehicle battery failure or removal and to help resist attempts to interfere with the proper operation of the arrangement.
To permit multiple authorised users a suitable number of chips, not just a pair, may be provided by the manufacturer to provide extra keys for delivery with a new vehicle. Clearly the users must ensure that the keys are not acquired by unauthorised users.
Suitable circuits and components r the production of arrangements according to the invention for a particular construction will be apparent to those skilled in the art, as with transmission/reception procedures to avoid break-through, cross-talk and other other-interference problems.
The techniques described above provide a vehicle security arrangement which is of little inconvenience to an authorised user while providing great deterrent to unauthorised use or theft of the vehicle. Even if a vehicle is stolen by towing or placing on a trailer the need to replace the engine management system is a very significant problem and makes profitable disposal very difficult.

Claims

1. A vehicle security arrangement including a first part for incorporation in a vehicle and a second part for use as a key to allow operation of the vehicle, in which arrangement both the first part and the second part include signal processing means and signal receiving and sending means, the signal processing means being responsive to an input signal of a first value to generate an output signal of a second value in accordance with a one-way hash function performed with a stored value on the first value, the stored value being computationally unfeasible to determine from the first and second values, the first part including means to produce a first value signal and in operation send this first value signal for the second part, in operation in the key position for the vehicle, to receive as a said input signal therefor and form a said second value output signal therefrom, the first part also including means to receive said output signal of the second part sent therefrom together with means to compare the received said output signal with a check value generated from the produced first value by the signal processing means of the first part and permit or prevent operation of the vehicle in accordance with the result of the comparison following the signal exchange.
2. An arrangement according to Claim 1 in which the first part is incorporated in a vehicle part vital to the integrity or operation of the vehicle.
3. An arrangement according to Claim 2 in which the vehicle part is the engine management device.
4. An arrangement according to Claim 1 in which the one-way hash function is of the American Secure Hash Standard.
5. An arrangement according to Claim 1 to generate a fresh first value at least on each use of the second part with the first part.
6. An arrangement according to Claim 2 in which the fresh value is unpredictable.
7. An arrangement according to Claim 2 in which the stored value is held concealed.
8. An arrangement according to Claim 1 in which the stored value and the first value, when concatenated, exceed three hundred bits.
9. A lock and key method of vehicle security including causing the lock to provide an identical first value to both the lock and the key, storing in the lock and the key an identical concealed value, causing or permitting the lock and the key to separately calculate in an identical manner from their respective first and stored values an output value, returning the output value of the key calculation to the lock, comparing the output values to permit enabling of the lock on satisfactory comparison, the stored concealed value being computationally infeasible to determine from the first or output values.
PCT/GB1994/002202 1993-10-08 1994-10-10 Vehicle security arrangement WO1995010432A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU78177/94A AU7817794A (en) 1993-10-08 1994-10-10 Vehicle security arrangement

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9320767.8 1993-10-08
GB9320767A GB9320767D0 (en) 1993-10-08 1993-10-08 Vehicle security

Publications (1)

Publication Number Publication Date
WO1995010432A1 true WO1995010432A1 (en) 1995-04-20

Family

ID=10743220

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1994/002202 WO1995010432A1 (en) 1993-10-08 1994-10-10 Vehicle security arrangement

Country Status (3)

Country Link
AU (1) AU7817794A (en)
GB (2) GB9320767D0 (en)
WO (1) WO1995010432A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1000823A1 (en) * 1993-10-29 2000-05-17 Robert Bosch Gmbh Vehicle security device
DE10354517A1 (en) * 2003-11-21 2005-06-16 Daimlerchrysler Ag Operating process for a security lock system especially for a motor vehicle produces transmits and stores random values and determines their correspondence
DE102004033393A1 (en) * 2004-07-09 2006-02-02 Siemens Ag Transmission and reception devices authenticating method for vehicle, involves transmitting constant recursive sequence value to one device, where value is compared with pre-stored value, and valid authentication is given upon confirmation

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4411449C1 (en) * 1994-04-01 1995-03-16 Daimler Benz Ag Vehicle security device with electronic use-authorisation coding
FR2720703B1 (en) * 1994-06-06 1996-07-12 Sagem Vehicle anti-theft system.
DE19516992C1 (en) * 1995-05-09 1996-04-04 Siemens Ag Operating system for automobile anti-theft device
DE19523009C2 (en) * 1995-06-24 1998-03-12 Megamos F & G Sicherheit Authentication system
DE19531219C1 (en) * 1995-08-24 1996-12-05 Siemens Ag Vehicle anti-theft arrangement
EP0835790B1 (en) * 1996-10-14 2003-12-10 Denso Corporation Anti-theft device using code type transponder
JP3427694B2 (en) * 1997-09-19 2003-07-22 日産自動車株式会社 Vehicle security device
EP0923054B1 (en) * 1997-12-10 2003-06-04 Delphi Automotive Systems Deutschland GmbH Method and device for checking the usage right for access control devices
FR2801153B1 (en) * 1999-11-15 2001-12-21 Valeo Securite Habitacle SECURE BIDIRECTIONAL TRANSMISSION OF DATA, AND SYSTEM FOR IMPLEMENTING SAME
DE10134837A1 (en) * 2001-07-17 2003-01-30 Hella Kg Hueck & Co Method for remotely locking and / or unlocking a vehicle

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2051442A (en) * 1979-03-30 1981-01-14 Howard J A A security system
US4509093A (en) * 1982-07-09 1985-04-02 Hulsbeck & Furst Gmbh & Co. Kg Electronic locking device having key and lock parts interacting via electrical pulses
US5055701A (en) * 1988-08-16 1991-10-08 Nissan Motor Company, Limited Operator responsive keyless entry system with variable random codes
WO1992002911A1 (en) * 1990-08-10 1992-02-20 Pietro Girotto Automatic control device for an anti-theft system
EP0521547A1 (en) * 1991-07-01 1993-01-07 Medardo Reggiani Passive action antitheft device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2051442A (en) * 1979-03-30 1981-01-14 Howard J A A security system
US4509093A (en) * 1982-07-09 1985-04-02 Hulsbeck & Furst Gmbh & Co. Kg Electronic locking device having key and lock parts interacting via electrical pulses
US5055701A (en) * 1988-08-16 1991-10-08 Nissan Motor Company, Limited Operator responsive keyless entry system with variable random codes
WO1992002911A1 (en) * 1990-08-10 1992-02-20 Pietro Girotto Automatic control device for an anti-theft system
EP0521547A1 (en) * 1991-07-01 1993-01-07 Medardo Reggiani Passive action antitheft device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1000823A1 (en) * 1993-10-29 2000-05-17 Robert Bosch Gmbh Vehicle security device
DE10354517A1 (en) * 2003-11-21 2005-06-16 Daimlerchrysler Ag Operating process for a security lock system especially for a motor vehicle produces transmits and stores random values and determines their correspondence
DE10354517B4 (en) * 2003-11-21 2008-11-27 Daimler Ag Method for operating a safety locking system
DE102004033393A1 (en) * 2004-07-09 2006-02-02 Siemens Ag Transmission and reception devices authenticating method for vehicle, involves transmitting constant recursive sequence value to one device, where value is compared with pre-stored value, and valid authentication is given upon confirmation
DE102004033393B4 (en) * 2004-07-09 2007-03-15 Siemens Ag Method for authenticating at least one first mobile transmitting and receiving device to at least one base station

Also Published As

Publication number Publication date
GB9320767D0 (en) 1993-12-01
GB9420363D0 (en) 1994-11-23
AU7817794A (en) 1995-05-04
GB2282687A (en) 1995-04-12

Similar Documents

Publication Publication Date Title
EP0835790B1 (en) Anti-theft device using code type transponder
WO1995010432A1 (en) Vehicle security arrangement
CN101113647B (en) Key system
US7545255B2 (en) Electronic key system
EP0372741B1 (en) Security system for a vehicle
JP5170177B2 (en) Vehicle anti-theft device
US5600723A (en) Cryptographically secure electric fuel pump system
US20070067632A1 (en) Vehicle antitheft system
US6611193B1 (en) Vehicle security device
JPH10175512A (en) Theft-proofing device using code type transponder
US6366197B1 (en) Transponder system
EP4180279A1 (en) Method and system for vehicle anti-theft authentication, storage medium, and vehicle
JP4406189B2 (en) Engine start control system
JP3779731B2 (en) Anti-theft device and anti-theft method for automobile
US6107695A (en) Drive-away blocking device
US6744148B2 (en) Theft resistant system for vehicles equipped with combined starter-alternators
JP3930385B2 (en) Electronic key system
JP3309676B2 (en) Vehicle anti-theft device
JP2008273520A (en) Engine start controlling system
JP2966297B2 (en) Vehicle anti-theft device
JPH1082224A (en) Car control system and car control method
CN114179750B (en) Vehicle control method, device, electronic equipment and storage medium
JP2981142B2 (en) Vehicle anti-theft device
WO2000073106A1 (en) Theft protection device
JP2006273239A (en) Vehicular control device, and vehicle stopping method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AM AT AU BB BG BR BY CA CH CN CZ DE DK ES FI GB GE HU JP KE KG KP KR KZ LK LT LU LV MD MG MN MW NL NO NZ PL PT RO RU SD SE SI SK TJ TT UA US UZ VN

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE MW SD SZ AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA