WO1995008038A1 - Procede de filtrage ami/ennemi d'un signal de commande d'acces a distance - Google Patents
Procede de filtrage ami/ennemi d'un signal de commande d'acces a distance Download PDFInfo
- Publication number
- WO1995008038A1 WO1995008038A1 PCT/US1994/010143 US9410143W WO9508038A1 WO 1995008038 A1 WO1995008038 A1 WO 1995008038A1 US 9410143 W US9410143 W US 9410143W WO 9508038 A1 WO9508038 A1 WO 9508038A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- value
- answer
- transmitter
- receiver
- command
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract description 14
- 238000012216 screening Methods 0.000 title abstract description 5
- 238000012546 transfer Methods 0.000 claims abstract description 10
- 238000012360 testing method Methods 0.000 claims abstract description 8
- 230000006870 function Effects 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 5
- 238000005096 rolling process Methods 0.000 description 3
- 101100165533 Arabidopsis thaliana BLH2 gene Proteins 0.000 description 2
- 101100476710 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) SAW1 gene Proteins 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010897 surface acoustic wave method Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010355 oscillation Effects 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
- G07C2009/0023—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks with encription of the transmittted data signal
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
- G07C2009/00238—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
- G07C2009/00253—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed dynamically, e.g. variable code - rolling code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00793—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Definitions
- the present invention relates to a method and system for transmitting a signal to a remote device and implementing a respective command, and more particularly, wherein the system features a friend/foe screening technique which provides a signal which is resistant to copying and regeneration.
- the present invention relates to techniques to prevent duplication of a signal utilized to communicate an implementation command to provide remote vehicle access as well as to remotely control various functions on ⁇ board a vehicle.
- Vehicle access codes used to accomplish such communication are susceptible to unauthorized recordation and duplication. That is, the access code of a transmitter can be duplicated by unauthorized individuals permitting unauthorized access to the vehicle. Such is especially prevalent in radio frequency remote vehicle access devices as recordation can be made with conventional magnetic tape recording devices which may then readily reproduce the signal as desired permitting unauthorized access.
- An approach to prevent such duplication is to implement a rolling code.
- the transmitter and receiver each advance to identical new codes each time the unit is used. Therefore, if a code is recorded by an unauthorized individual, the next time the system is used, the receiver has changed to a new code ignoring the sequentially prior code.
- the increased security provided by use of a rolling code comes at the cost of some inconvenience. That is, the rolling code in the transmitter and the receiver may not stay synchronized, as the transmitter may be actuated beyond the range of the receiver resulting in an increment or roll of the code stored in the transmitter without a corresponding roll of the receiver code. In this case, if the transmitter is within the look ahead range of the receiver, the receiver code will be advanced until a match occurs. However, if the transmitter is beyond the look ahead range, user action will be required. Therein lies the inconvenience as complicated techniques must be utilized to resynchronize the transmitter and receiver pair. Therefore, there is a need for a remote vehicle access system that does not require resynchronization.
- the present invention includes a remote signal transmitter that is capable of producing a command comprising a signal including a first value and an answer calculated using the first value as an input variable in a transfer function.
- the transmitter broadcasts the signal to a receiver which receives the first value and the answer.
- the receiver then performs a second calculation using the first value to produce a second answer.
- the first answer incident upon the receiver is then compared with the second answer and if a predetermined comparison test is satisfied, the subsequent command is implemented.
- the preferred embodiment of the present invention includes a means to increment the first value each time the transmitter is utilized.
- the receiver includes a screening process in which the second calculation performed by the receiver will not be performed if a previously used first value is received.
- Figure 1 is a block diagram of the transmitter of the present invention
- Figure 2 is a schematic of the transmitter of the present invention
- Figure 3 is an equivalent model of the surface acoustic wave resonator of the present invention
- Figure 4 is a block diagram of the receiver of the present invention
- Figure 5 is a flow diagram of the process of the transmitter of the present invention
- FIG 6 is a flow diagram of the process of the receiver of the present invention
- Figure 7 is an illustration of a "S" box used with the present invention.
- Figure 8 is an example of a permuter table used with the present invention.
- microprocessor 14 comprises a MOTOROLA 68HCO5J2 having inputs 12 a, b, c and d which comprise conventional contact type switches. Closure of any of the contact switches produces an input signal which represents a command which causes memory 16 to produce a series of signals having a unique signature which corresponds to the respective input command. The series of signals is then supplied to oscillator 18 which implements the series of signals in the form of radio frequency signals suitable for broadcast by antenna 20.
- Oscillator circuit 18, shown in Figure 2 comprises a transistor Q1 , resistors R1 and R2, in addition to capacitors C1 and C2.
- SAW1 stabilizes the frequency of oscillation of circuit 18 to preferably 433.92 MHz.
- SAW1 is a SURFACE ACOUSTIC WAVE RESONATOR having an equivalent model illustrated schematically in Figure 3.
- Antenna 20 broadcasts the signal generated by circuit 18 for any duration which voltage is supplied to node N.
- a remote vehicle access command signal provided by transmitter 10 is intended to be incident upon a fixed vehicle antenna 22, as shown in Figure 4. Such a signal is amplified by radio frequency amplifier 24 by a magnitude of 10 dB.
- Oscillator 26 provides a signal which is mixed with the access command signal in mixer 28.
- microprocessor 38 is a MOTOROLA MC68HC05P1.
- Microprocessor 38 accesses memory 39, an XC2401 manufactured by XICOR. Access commands are stored in memory 39 and compared in microprocessor 38. Upon encountering a match of the stored command, microprocessor 38 implements the respective command. Commands from outputs of microprocessor 38 in parallel with manual command inputs 36 effect actuation of: a) driver door lock actuator; b) unlock all actuators 42; c) lock all actuators 44; or d) dome light actuator 46.
- the commands produced by the transmitter of the present invention are illustrated in Figure 5 and 6.
- the purpose of the transmitter is to provide a total of 3 signals which are representative of. three values.
- a first signal is a vehicle access command which is a 20 bit binary value uniquely assigned to each transmitter/receiver pair.
- the second signal is a seed value which is a 16 bit binary value.
- the seed value is incremented by one unit of magnitude each time the transmitter transmits a vehicle access command.
- the third signal is an answer which is calculated using the seed value.
- the calculation process involves selecting 4 bits of the 16 bit seed value to define a location in an array referred to herein as the "S" box.
- the 4 bits of the seed value are used to define a row of the "S" box.
- a 40 bit binary value stored in a memory of the transmitter and referred to herein as a Key is then used to define a column location in the "S" box. This is accomplished by selecting 5 bits of the 20 bit Key to identify a column in the "S” box. Once the row and column have been identified, a value is extracted from the "S" box.
- An example of an "S” box is illustrated in Figure 7.
- the preferred embodiment of the present invention uses an "S" box comprising a 16 x 32 array of 4 bit binary numbers.
- the numbers in the "S” box are binary values between 0 to 1 S without repeat in a column. In the preferred embodiment no two columns are identical.
- each bit of the "S" value is placed in one of 16 address locations which are defined using a permuter table.
- FIG. 8 An example of a permuter table is illustrated in Figure 8.
- a single bit of the "S" value is directed to one of 16 address locations by directing the bit to a location identified in the permuter table.
- Each sequential access of the permuter table references the next sequential directing unit of the permuter table.
- Permuter table is a one column array including binary values from 0 to 15 in random order without repeat. Ideally the "S" box values are selected so that the answer calculated by the process of the present invention is not predictable.
- An example is provided in Figure 6. This process is repeated three more times to provide sixteen bits of information, one at each address location. In this manner a new seed value is produced. This new seed value becomes a sixteen bit answer.
- the process may be varied by using a seed value less than 16 bit in size, or an answer less than 16 bit in size or by repeating the calculation of the answer by using the answer to update the seed value.
- the answer, the original seed value and the vehicle access command are broadcast to the transmitter.
- the received seed is compared to the next previous seed value to determine if the presently received seed value has been previously used.
- a second answer is calculated.
- the second answer calculated is then compared with the broadcasted answer.
- the seed value in the immediate transmission is stored and the respective command is implemented.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Selective Calling Equipment (AREA)
- Lock And Its Accessories (AREA)
Abstract
Un émetteur (10) de signaux à distance est apte à générer une commande comprenant un signal qui comporte une première valeur et une réponse calculée à l'aide de la première valeur comme une variable d'entrée dans une fonction de transfert. L'émetteur (10) transmet le signal à un récepteur qui reçoit la première valeur et la réponse. Le récepteur effectue ensuite un second calcul à l'aide de la première valeur afin d'obtenir une seconde réponse. La première réponse inhérente au récepteur est ensuite comparée à la seconde réponse, et si un test de comparaison prédéterminé est satisfait, la commande ultérieure est mise en place. Le mode de réalisation préféré de la présente invention comporte un moyen d'incrémenter la première valeur chaque fois que l'émetteur (10) est utilisé. De plus, le récepteur comprend un processus de filtrage dans lequel le second calcul effectué par le récepteur ne pourra être exécuté si une première valeur précédemment utilisée est réceptionnée.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU76847/94A AU7684794A (en) | 1993-09-13 | 1994-09-12 | Method for friend/foe screening of a remote access command signal |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12088193A | 1993-09-13 | 1993-09-13 | |
| US120,881 | 1993-09-13 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO1995008038A1 true WO1995008038A1 (fr) | 1995-03-23 |
Family
ID=22393078
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US1994/010143 WO1995008038A1 (fr) | 1993-09-13 | 1994-09-12 | Procede de filtrage ami/ennemi d'un signal de commande d'acces a distance |
Country Status (2)
| Country | Link |
|---|---|
| AU (1) | AU7684794A (fr) |
| WO (1) | WO1995008038A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110648443A (zh) * | 2019-10-08 | 2020-01-03 | 中国建设银行股份有限公司 | 一种门禁验证方法、装置、设备和介质 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0244332A1 (fr) * | 1986-04-22 | 1987-11-04 | René Soum | Système de très haute sécurité de télécommande sans fil permettant l'ouverture ou la fermeture inviolable de relais actionnant des systèmes tels que serrures |
| EP0459781A1 (fr) * | 1990-05-29 | 1991-12-04 | Microchip Technology Inc. | Circuits intégrés et dispositifs de commande à distance l'utilisant |
| DE4234822A1 (de) * | 1991-10-18 | 1993-04-22 | Trw Sipea Spa | Fernsteuerung fuer betaetigungsmittel, insbesondere fuer ein kraftfahrzeug |
-
1994
- 1994-09-12 WO PCT/US1994/010143 patent/WO1995008038A1/fr active Application Filing
- 1994-09-12 AU AU76847/94A patent/AU7684794A/en not_active Abandoned
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0244332A1 (fr) * | 1986-04-22 | 1987-11-04 | René Soum | Système de très haute sécurité de télécommande sans fil permettant l'ouverture ou la fermeture inviolable de relais actionnant des systèmes tels que serrures |
| EP0459781A1 (fr) * | 1990-05-29 | 1991-12-04 | Microchip Technology Inc. | Circuits intégrés et dispositifs de commande à distance l'utilisant |
| DE4234822A1 (de) * | 1991-10-18 | 1993-04-22 | Trw Sipea Spa | Fernsteuerung fuer betaetigungsmittel, insbesondere fuer ein kraftfahrzeug |
Non-Patent Citations (1)
| Title |
|---|
| SMID: "authentication using the federal data encryption standard", PROCEEDINGS OF THE NATIONAL ELECTRONICS CONFERENCE, vol. 35, 1 October 1981 (1981-10-01), OAK BROOK, ILLINOIS US, pages 296 - 301 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110648443A (zh) * | 2019-10-08 | 2020-01-03 | 中国建设银行股份有限公司 | 一种门禁验证方法、装置、设备和介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| AU7684794A (en) | 1995-04-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5594429A (en) | Transmission and reception system and signal generation method for same | |
| US5600324A (en) | Keyless entry system using a rolling code | |
| EP0570103B1 (fr) | Système de sécurité commandé à distance | |
| EP1260942B1 (fr) | Procédé de chiffrage par code roulant pour un système d'entrée sans clé commandé à distance | |
| US6181252B1 (en) | Remote control system and method having a system-specific code | |
| DE69914312T2 (de) | Mehrfrequenz programmiebarer sender | |
| US4758835A (en) | System for the locking and/or unlocking of a security device | |
| US5767784A (en) | Initialization method for keyless entry system | |
| DE69112191T2 (de) | Fernsteuerbares Zugangssystem. | |
| US5506905A (en) | Authentication method for keyless entry system | |
| US5844517A (en) | Portable transceiver for keyless vehicle entry system having phase delay | |
| GB2265482A (en) | Security system data transmission | |
| EP1314140B1 (fr) | Systeme de securite | |
| WO1995001685A3 (fr) | Procede d'authentification cryptographique de messages transmis utilisant des numeros pseudo-aleatoires | |
| US5319797A (en) | Remote vehicle access featuring high security | |
| US5579485A (en) | Apparatus for remote implementation of a command | |
| DE102008013792A1 (de) | Fahrzeuginternes Vorrichtungsfernsteuersystem und fahrzeuginternes Vorrichtungsfernsteuerverfahren | |
| US5631962A (en) | Circuit and method of encrypting key validation | |
| US5828317A (en) | Remote control method and remote control system | |
| WO1995008038A1 (fr) | Procede de filtrage ami/ennemi d'un signal de commande d'acces a distance | |
| DE19732157A1 (de) | Mehrfachfrequenzsender | |
| DE10004615C2 (de) | Berechtigungskontrollsystem, insbesondere für ein Kraftfahrzeug | |
| JP2000509590A (ja) | 遠隔制御装置の作動方法及び遠隔制御装置 | |
| EP0596401B1 (fr) | Procédé d'individualisation et de synchronisation d'un appareil de commande | |
| JPH06205474A (ja) | 送受信装置の信号生成方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU BR CA CZ HU JP KR NO PL RO SK |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE |
|
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| NENP | Non-entry into the national phase |
Ref country code: CA |
|
| 122 | Ep: pct application non-entry in european phase |