Security system
First Claim
1. A security system (4, 8), including an electronic key (4) having a transmitter (6) and a secure object having a base station (8) which has a receiver (10), the transmitter (6) and the receiver (10) being designed so that they communicate to exchange authentication data, wherein the key (4) transmits the data in a message which includes parts each having predetermined periods (T0, . . . , T4) having transmission signal variations;
- and the base station (8) detects distortion in the transmission signal variations due to a relay station.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system (4, 8), including an electronic key (4) having a transmitter (6) and a secure object having a base station (8) which has a receiver (10) is described, the transmitter (6) and the receiver (10) being designed so that they communicate to exchange authentication data, the key (4) transmitting the data in a message which includes parts having predetermined periods (T0, . . . , T4) having transmission signal variations; and the base station (8) detecting distortion in the transmission signal variations due to a relay station.
30 Citations
37 Claims
-
1. A security system (4, 8), including an electronic key (4) having a transmitter (6) and a secure object having a base station (8) which has a receiver (10), the transmitter (6) and the receiver (10) being designed so that they communicate to exchange authentication data, wherein the key (4) transmits the data in a message which includes parts each having predetermined periods (T0, . . . , T4) having transmission signal variations;
- and the base station (8) detects distortion in the transmission signal variations due to a relay station.
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
20. A communication method which is implemented by a security system, including an electronic key (4) having a transmitter (6) and a secure object having a base station (8) which has a receiver (10), the method including the transmission of authentication data from the transmitter (6) to the receiver (10), characterized by transmission of data in a message which includes parts each having predetermined periods having transmission signal variations;
- and detection at the base station (8) of distortion in the transmission signal variations due to a relay station.
- View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
Specification