Securing access to vehicles
First Claim
1. A method for securing an access method for vehicles, wherein the access method has at least one mobile device and one remote control system for administration of access rights, having the steps,repeated autonomous connection of the mobile device to the remote control system,generation of characteristic new synchronization data for each connection in the remote control system and transmitting the characteristic new synchronization data from the remote control system to the mobile device,storing at least part of the characteristic new synchronization data in the mobile device and in the remote control system,transmission of characteristic prior synchronization data of a preceding connection of the mobile device to the remote control system,checking for consistency in the remote control system between the prior synchronization data received from the mobile device and the prior synchronization data stored in the remote control system, wherein,in the event that the data are consistent, interrupting the connection, and waiting a synchronization interval, before resuming the connection for the next synchronization;
- andin the event that the data are inconsistent, blocking the mobile device from further access to vehicles.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for securing an access method for vehicles includes a mobile device and a remote control device for administration of access rights. The mobile device is repeatedly connected to the remote control device and characteristic synchronizing data are generated for each connection. One part of the synchronization data is stored in the mobile device and in the remote control device. Characteristic prior synchronization data of a preceding connection is transmitted from the mobile device to the remote control device. A consistency check is performed in the remote control device between the prior synchronization data received from the mobile device and the prior synchronization data stored in the remote control device. If the data are consistent, the connection is terminated and a synchronization interval is waited before the connection is restored for the next synchronization. If the data are inconsistent, the mobile device is blocked from further access to vehicles.
25 Citations
3 Claims
-
1. A method for securing an access method for vehicles, wherein the access method has at least one mobile device and one remote control system for administration of access rights, having the steps,
repeated autonomous connection of the mobile device to the remote control system, generation of characteristic new synchronization data for each connection in the remote control system and transmitting the characteristic new synchronization data from the remote control system to the mobile device, storing at least part of the characteristic new synchronization data in the mobile device and in the remote control system, transmission of characteristic prior synchronization data of a preceding connection of the mobile device to the remote control system, checking for consistency in the remote control system between the prior synchronization data received from the mobile device and the prior synchronization data stored in the remote control system, wherein, in the event that the data are consistent, interrupting the connection, and waiting a synchronization interval, before resuming the connection for the next synchronization; - and
in the event that the data are inconsistent, blocking the mobile device from further access to vehicles. - View Dependent Claims (2, 3)
- and
Specification