×

System and method to enable passive entry

  • US 9,129,455 B2
  • Filed: 02/21/2012
  • Issued: 09/08/2015
  • Est. Priority Date: 02/21/2012
  • Status: Active Grant
First Claim
Patent Images

1. A passive entry system comprising:

  • an unlocking module that is integrated in a vehicle of a first group of vehicles and configured to perform a key operation in a keyless environment, the unlocking module comprising;

    a control module that determines a range of identification values, including a start of range value and an end of range value, that generates an authentication request packet based on the range of identification values and a first group identification value, and that broadcasts the request packet, wherein the first group identification value is common to the first group of vehicles; and

    a plurality of fobs that are in communication with the first group of vehicles and configured to trigger the unlocking module to perform the key operation, each fob having a unique identification value associated thereto and a second group identification value associated thereto, each fob comprising;

    a fob transceiver that receives the request packet; and

    a response module that determines if the first group identification value corresponds to the second group identification value, and that determines whether the unique identification value of the corresponding fob falls within the range of identification values only if the first group identification value corresponds to the second group identification value, and that generates a response packet if the unique identification value falls within the range of identification values, wherein the fob transceiver transmits the response packet to the control module;

    wherein the control module is configured to receive response packets from the plurality of fobs, analyze response packets received from fobs having even unique identification values separately from response packets received from fobs having odd unique identification values, and to perform the key operation based on one of the received response packets.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×