ACCESSING A VEHICLE USING PORTABLE DEVICES
First Claim
Patent Images
1. A method for accessing a vehicle, the method comprising:
- establishing, by a primary portable device, a first connection between the primary portable device and a vehicle;
receiving, by the primary portable device, a first vehicle access credential from the vehicle via the first connection, wherein receiving the first vehicle access credential from the vehicle enables the primary portable device to use the first vehicle access credential to enable access to the vehicle;
establishing, by the primary portable device, a second connection between the primary portable device and a secondary portable device; and
transmitting, by the primary portable device, a second vehicle access credential to the secondary portable device via the second connection, wherein the second vehicle access credential is used by the secondary portable device to enable access to the vehicle.
2 Assignments
0 Petitions
Accused Products
Abstract
A primary portable device can access a vehicle by transmitting an activation message including a vehicle access credential to the vehicle. The primary portable device can additionally enable a secondary portable device to access the vehicle by transmitting the vehicle access credential to the secondary portable device. The connections between the primary portable device, secondary portable device, and vehicle can be based on a short-range wireless protocol, such as Bluetooth or Bluetooth LE.
-
Citations
27 Claims
-
1. A method for accessing a vehicle, the method comprising:
-
establishing, by a primary portable device, a first connection between the primary portable device and a vehicle; receiving, by the primary portable device, a first vehicle access credential from the vehicle via the first connection, wherein receiving the first vehicle access credential from the vehicle enables the primary portable device to use the first vehicle access credential to enable access to the vehicle; establishing, by the primary portable device, a second connection between the primary portable device and a secondary portable device; and transmitting, by the primary portable device, a second vehicle access credential to the secondary portable device via the second connection, wherein the second vehicle access credential is used by the secondary portable device to enable access to the vehicle. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for accessing a vehicle, the method comprising:
-
receiving, by a secondary portable device, a vehicle access credential transmitted from a primary portable device; establishing, by the secondary portable device, a first connection between the secondary portable device and a vehicle; transmitting, by the secondary portable device, the vehicle access credential to the vehicle via the first connection, wherein access to the vehicle is enabled based on the vehicle access credential. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for accessing a vehicle, the method comprising:
-
establishing, by the vehicle, a first connection between the vehicle and a primary portable device; transmitting, by the vehicle, a first vehicle access credential to the primary portable device over the first connection; establishing, by the vehicle, a second connection between the vehicle and a secondary portable device; receiving, by the vehicle, a second vehicle access credential from the secondary portable device over the second connection; determining, by the vehicle, authenticity of the second vehicle access credential, wherein the determining includes identifying whether the second vehicle access credential was obtained by the secondary portable device from the primary portable device; and enabling, by the vehicle, access to the vehicle, based at least in part on the authenticity determination. - View Dependent Claims (14, 15)
-
-
16. A portable device comprising:
-
a wireless sensor configured to; establish a first pairing between the wireless sensor and a sensor in a vehicle, wherein the first pairing provides a first wireless connection; establish a second pairing between the wireless sensor and a sensor in a secondary portable device, wherein the second pairing provides a second wireless connection; and a processor coupled to the wireless sensor, the processor configured to; establish verification data with the vehicle via the first wireless connection; and transmit access information based on the verification data to the secondary portable device via the second wireless connection, wherein the access information is usable by the secondary portable device to enable access to the vehicle. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A portable device comprising:
-
a wireless sensor configured to; establish a first pairing between the wireless sensor and a wireless sensor in a primary portable device, wherein the first pairing provides a first wireless connection; establish a second pairing between the wireless sensor and a wireless sensor in a vehicle, wherein the second pairing provides a second wireless connection; and a processor coupled to the wireless sensor, the processor configured to; receive access information from the primary portable device via the first wireless connection; and transmit the access information to the vehicle via the second wireless connection, wherein access to the vehicle is enabled based on the access information. - View Dependent Claims (22, 23)
-
-
24. A vehicle comprising:
-
a wireless sensor configured to; establish a first pairing between the wireless sensor and a wireless sensor in a primary portable device, wherein the first pairing provides a first wireless connection; establish a second pairing between the wireless sensor and a wireless sensor in a secondary portable device, wherein the second pairing provides a second wireless connection; and a processor coupled to the wireless sensor, the processor configured to; establish verification data with the primary portable device via the first wireless connection; receive access information from the secondary portable device via the second wireless connection; determine the authenticity of the access information, wherein the determining includes authenticating the access information based on the verification data; and enable access to the vehicle. - View Dependent Claims (25, 26, 27)
-
Specification