Cellular phone Entry Techniques
First Claim
Patent Images
1. A method, comprising:
- storing information in a vehicle, said information being indicative of at least a first cellular phone, wherein said information includes unique information indicative of said first cellular phone;
detecting a proximity of said first cellular phone; and
allowing access to said vehicle responsive to said detecting said proximity of said cellular phone.
1 Assignment
0 Petitions
Accused Products
Abstract
A cell phone is mated with the vehicle system and thereafter used to obtain access to the vehicle. A user who has a cell phone automatically can obtain access to the vehicle. An embodiment describes a USB key that provides access to the vehicle, and in an emergency, either a complete or partial version of the key can be downloaded from a server.
50 Citations
20 Claims
-
1. A method, comprising:
-
storing information in a vehicle, said information being indicative of at least a first cellular phone, wherein said information includes unique information indicative of said first cellular phone; detecting a proximity of said first cellular phone; and allowing access to said vehicle responsive to said detecting said proximity of said cellular phone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An automobile access system, comprising:
-
a wireless detection part, that determines presence of wireless phones, and allows connection with said wireless phones and exchanging information with said wireless phones; a processor, that controls access to at least one of entry to the vehicle and/or starting of the vehicle, and accesses a list of authorized cellular phones, and determines if information indicative of one of said cellular phones is on said list, detects proximity of said one cellular phone, and allows said access to the vehicle based on said proximity of said cellular phone. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method, comprising:
-
using an electronic key, which includes an electronic code thereon to provide access to a secured part; allowing the user to access a server, and to download a new electronic code; and using said new electronic code to access said part. - View Dependent Claims (17, 18, 19, 20)
-
Specification