Method for authenticating a first object to at least one further object, especially the vehicle to at least one key
First Claim
Patent Images
1. Method for authenticating a first object to at least one further object, in particular a vehicle to a key, comprising the steps of:
- a) transmitting an item of information unidirectionally between the first object and the at least one further object, b) calculating a computation result in the relevant receiving object from parts of the transmitted information, c) comparing the calculated computation result with a computation result transferred with the information, and d) if there is a match authenticating the vehicle, declaring the computation result as invalid for further transmissions.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating a first object to at least one further object, especially a vehicle to a key, is disclosed in which information is transmitted unidirectionally between the first object and at least one further object, the computation result is calculated from parts of the transmitted information in the receiving object in each case, the calculated computation result is compared with a computation result transmitted with the information, and only if these match is the sending object viewed as authenticated and the computation result declared invalid for further transmissions.
-
Citations
17 Claims
-
1. Method for authenticating a first object to at least one further object, in particular a vehicle to a key, comprising the steps of:
-
a) transmitting an item of information unidirectionally between the first object and the at least one further object, b) calculating a computation result in the relevant receiving object from parts of the transmitted information, c) comparing the calculated computation result with a computation result transferred with the information, and d) if there is a match authenticating the vehicle, declaring the computation result as invalid for further transmissions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. Method for authenticating a vehicle to at a key comprising the steps of:
-
a) transmitting an item of information unidirectionally between the vehicle and the key, b) calculating a computation result in the key from parts of the transmitted information, c) comparing the calculated computation result with a computation result transferred with the information, and d) if there is a match authenticating the vehicle, declaring the computation result as invalid for further transmissions. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification