Securing method, interrogation unit and securing system for implementing the securing method
First Claim
1. A securing method for securing an object against unauthorized use, comprising:
- transmitting an interrogation signal (s) by an interrogation unit (1) allocated to the object,by a response unit (2) allocated to a user, responding to the interrogation signal (s) by transmitting a response signal (r),testing whether the response signal contains as information an authorization code authorized for desecuring a security device (3), andevaluating a signal transit time of the interrogation signal transmitted by the interrogation unit and the response signal transmitted by the response unit and received by the interrogation unit during a monitoring time interval (t4–
t5), and preventing a desecuring of the security device (3) if the signal transit time is greater than a prescribed value,whereinthe interrogation signal (s) contains a first data bit sequence (Dl) as information and the response signal contains a second data bit sequence (D2) as information, wherein data bits of the first and second data bit sequences (D1, D2) are transmitted in bit cells of equal size, and the interrogation unit (1) simultaneously transmits data bits of the first data bit sequence (D1) and receives data bits of the second data bit sequence (D2) in the monitoring time interval (t4–
t5),the first data bit sequence (D1) is composed of an interrogation code and a filler code adjoining the interrogation code, andthe response unit, for generating the second data bit sequence (D2), generates a response code (AO) from the interrogation code, wherein the response code is encoded bitwise with simultaneously received bits of the filler code and transmitted.
2 Assignments
0 Petitions
Accused Products
Abstract
In a method for securing an object against unauthorized use, an interrogation unit (1) transmits an interrogation signal (s) and tests whether a response unit (2), which is to be carried by an authorized user, responds to the interrogation signal with a response signal (r) that contains as information a code authorized for desecuring a security device (3). If so, the security device is desecured. The securing method shall prevent unauthorized persons from establishing a radio link via relay stations between the interrogation unit (1) and the response unit (2) for providing the authorized code via this radio link without being noticed by the authorized user. The securing method prevents the desecuring of the security device (3) if the signal transit time of a signal transmitted as the interrogation signal (s) and received as the response signal (r) by the interrogation unit (1) during a monitoring time interval (t4–t5) is greater than a prescribed value. The method is carried out in a keyless security system for securing motor vehicles against unauthorized use.
-
Citations
11 Claims
-
1. A securing method for securing an object against unauthorized use, comprising:
-
transmitting an interrogation signal (s) by an interrogation unit (1) allocated to the object, by a response unit (2) allocated to a user, responding to the interrogation signal (s) by transmitting a response signal (r), testing whether the response signal contains as information an authorization code authorized for desecuring a security device (3), and evaluating a signal transit time of the interrogation signal transmitted by the interrogation unit and the response signal transmitted by the response unit and received by the interrogation unit during a monitoring time interval (t4–
t5), and preventing a desecuring of the security device (3) if the signal transit time is greater than a prescribed value,wherein the interrogation signal (s) contains a first data bit sequence (Dl) as information and the response signal contains a second data bit sequence (D2) as information, wherein data bits of the first and second data bit sequences (D1, D2) are transmitted in bit cells of equal size, and the interrogation unit (1) simultaneously transmits data bits of the first data bit sequence (D1) and receives data bits of the second data bit sequence (D2) in the monitoring time interval (t4–
t5),the first data bit sequence (D1) is composed of an interrogation code and a filler code adjoining the interrogation code, and the response unit, for generating the second data bit sequence (D2), generates a response code (AO) from the interrogation code, wherein the response code is encoded bitwise with simultaneously received bits of the filler code and transmitted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification