System and method to enable passive entry
First Claim
1. A passive entry system comprising:
- an unlocking module that is integrated in a vehicle of a first group of vehicles and configured to perform a key operation in a keyless environment, the unlocking module comprising;
a control module that determines a range of identification values, including a start of range value and an end of range value, that generates an authentication request packet based on the range of identification values and a first group identification value, and that broadcasts the request packet, wherein the first group identification value is common to the first group of vehicles; and
a plurality of fobs that are in communication with the first group of vehicles and configured to trigger the unlocking module to perform the key operation, each fob having a unique identification value associated thereto and a second group identification value associated thereto, each fob comprising;
a fob transceiver that receives the request packet; and
a response module that determines if the first group identification value corresponds to the second group identification value, and that determines whether the unique identification value of the corresponding fob falls within the range of identification values only if the first group identification value corresponds to the second group identification value, and that generates a response packet if the unique identification value falls within the range of identification values, wherein the fob transceiver transmits the response packet to the control module;
wherein the control module is configured to receive response packets from the plurality of fobs, analyze response packets received from fobs having even unique identification values separately from response packets received from fobs having odd unique identification values, and to perform the key operation based on one of the received response packets.
8 Assignments
0 Petitions
Accused Products
Abstract
A passive entry system is disclosed. The system comprises an unlocking module that performs a key operation in a keyless environment and a plurality of fobs configured to trigger the unlocking module to perform the key operation. each fob has a unique value associated thereto. The unlocking module determines a range of identification values, generates an authentication request packet based on the range, of identification values, and broadcasts the request packet. Each fob receives the request packet; and determines whether the unique identification value of the corresponding fob falls within the range of identification values. The fob also generates a response packet if the unique identification value falls within the range of identification values and transmits the response packet to the unlocking module. The unlocking module receives the response packets from the fobs, and performs the key operation based on one of the received response packets.
-
Citations
20 Claims
-
1. A passive entry system comprising:
-
an unlocking module that is integrated in a vehicle of a first group of vehicles and configured to perform a key operation in a keyless environment, the unlocking module comprising; a control module that determines a range of identification values, including a start of range value and an end of range value, that generates an authentication request packet based on the range of identification values and a first group identification value, and that broadcasts the request packet, wherein the first group identification value is common to the first group of vehicles; and a plurality of fobs that are in communication with the first group of vehicles and configured to trigger the unlocking module to perform the key operation, each fob having a unique identification value associated thereto and a second group identification value associated thereto, each fob comprising; a fob transceiver that receives the request packet; and a response module that determines if the first group identification value corresponds to the second group identification value, and that determines whether the unique identification value of the corresponding fob falls within the range of identification values only if the first group identification value corresponds to the second group identification value, and that generates a response packet if the unique identification value falls within the range of identification values, wherein the fob transceiver transmits the response packet to the control module; wherein the control module is configured to receive response packets from the plurality of fobs, analyze response packets received from fobs having even unique identification values separately from response packets received from fobs having odd unique identification values, and to perform the key operation based on one of the received response packets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A passive entry method comprising:
-
determining, at an unlocking module, a range of identification values, including a start of range value and an end of range value; determining, at an unlocking module that is integrated in a vehicle of a first group of vehicles, a first group identification value that is common to the first group of vehicles; generating, at the unlocking module, an authentication request packet based on the range of identification values and the first group identification value; broadcasting, from the unlocking module, the request packet to a plurality of fobs, each fob having a unique identification value and a second group identification value associated thereto and being in communication with the first group of vehicles; receiving, at one of the fobs of the plurality of fobs, the request packet; determining, at the fob, whether the first group identification value corresponds to the second group identification value; determining, at the fob, whether the unique identification value of the corresponding fob falls within the range of identification values only if the first group identification value corresponds to the second group identification value; generating, at the fob, a response packet if the unique identification value falls within the range of identification values; transmitting, from the fob, the response packet to the unlocking module; receiving, at the unlocking module, response packets from the plurality of fobs; analyzing, at the unlocking module, response packets corresponding to even unique identification values separately from response packets corresponding to odd unique identification values; and performing a key operation, at the unlocking module, based on one of the received response packets. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification