SYSTEM AND METHOD TO ENABLE PASSIVE ENTRY
First Claim
1. A passive entry system comprising:
- an unlocking module configured to perform a key operation in a keyless environment, the unlocking module comprising;
a control module that determines a range of identification values, including a start of range value and an end of range value, that generates an authentication request packet based on the range of identification values, and that broadcasts the request packet; and
a plurality of fobs configured to trigger the unlocking module to perform the key operation, each fob having a unique identification value associated thereto, each fob comprising;
a fob transceiver that receives the request packet; and
a response module that determines whether the unique identification value of the corresponding fob falls within the range of identification values and that generates a response packet if the unique identification value falls within the range of identification values, wherein the fob transceiver transmits the response packet to the first transceiver;
wherein the control module is configured to receive response packets from the plurality of fobs, and to perform the key operation based on one of the received response packets.
8 Assignments
0 Petitions
Accused Products
Abstract
A passive entry system is disclosed. The system comprises an unlocking module that performs a key operation in a keyless environment and a plurality of fobs configured to trigger the unlocking module to perform the key operation. each fob has a unique value associated thereto. The unlocking module determines a range of identification values, generates an authentication request packet based on the range, of identification values, and broadcasts the request packet. Each fob receives the request packet; and determines whether the unique identification value of the corresponding fob falls within the range of identification values. The fob also generates a response packet if the unique identification value falls within the range of identification values and transmits the response packet to the unlocking module. The unlocking module receives the response packets from the fobs, and performs the key operation based on one of the received response packets.
29 Citations
20 Claims
-
1. A passive entry system comprising:
-
an unlocking module configured to perform a key operation in a keyless environment, the unlocking module comprising; a control module that determines a range of identification values, including a start of range value and an end of range value, that generates an authentication request packet based on the range of identification values, and that broadcasts the request packet; and a plurality of fobs configured to trigger the unlocking module to perform the key operation, each fob having a unique identification value associated thereto, each fob comprising; a fob transceiver that receives the request packet; and a response module that determines whether the unique identification value of the corresponding fob falls within the range of identification values and that generates a response packet if the unique identification value falls within the range of identification values, wherein the fob transceiver transmits the response packet to the first transceiver; wherein the control module is configured to receive response packets from the plurality of fobs, and to perform the key operation based on one of the received response packets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A passive entry method comprising:
-
determining, at an unlocking module, a range of identification values, including a start of range value and an end of range value; generating, at the unlocking module, an authentication request packet based on the range of identification values; broadcasting, from the unlocking module, the request packet to a plurality of fobs, each fob having a unique identification value associated thereto; receiving, at one of the fobs of the plurality of fobs, the request packet; determining, at the fob, whether the unique identification value of the corresponding fob falls within the range of identification values; generating, at the fob, a response packet if the unique identification value falls range of identification values; transmitting, from the fob, the response packet to unlocking module; and receiving, at the unlocking module, response packets from the plurality of fobs, and to perform a key operation based on one of the received response packets. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification