Abstract:
A locking system comprising a first subsystem (1) and a second subsystem (2). The first subsystem comprises a controller (26) for generating a sequence of lock codes, a memory (32) for storing the current lock code, and a display (60) for presenting the current lock code to a user. The second subsystem comprises a keypad (80) for permitting entry by a user of the lock code provided by the first subsystem, a real-time clock (72) for generating a first real-time clock signal, a processor (62) for applying a predetermined code-transforming algorithm to the received lock code and the first real-time clock signal to produce a release code, and a display (78) for presenting the release code to the user. The first subsystem further comprises a keypad (62) to permit entry by a user of the release code provided by the second subsystem, and a real-time clock (34) for generating a second real-time clock signal. The controller is operable to apply a predetermined correspondence-checking algorithm to the stored lock code, the received release code and the second real-time clock signal to produce a result, and to provide an unlocking signal in dependence upon the result.
Abstract:
A dongle module to be installed in a vehicle is discussed. The dongle module has memory buffers and processors. The dongle module also has a first transceiver that couples the on-board diagnostic (OBD) port of the vehicle to communicate with a fault and diagnostic module of the vehicle. A second transceiver uses wireless communications to communicate with one or more client devices. An RF transmitter transmits RF signals to Remote Keyless Entry (RKE) module of the vehicle. A mapping module either include a first map calculating chip to calculate map coordinates of the vehicle, or periodically receive map coordinates from a client device. A security module is configured either to receive, or to implement an algorithm to determine, a rolling security key of the RKE module of the vehicle. The security module also receives commands to be transmitted by the RF transmitter to the RKE module to be executed.
Abstract:
A system and method for training a learning transceiver to a movable barrier system includes a learning transceiver that is configured for being trained to the movable barrier system. To provide ease of use to consumers, a user is able to train the learning transceiver to the movable barrier system without needing to push a button on a movable barrier operator or use a pretrained transmitter. To this end, a movable barrier operator is configured to transmit a transmission signal to the learning transceiver including a rolling access code, which is used to train the learning transceiver. To maintain the security of the movable barrier system and to restrict unauthorized users from accessing the movable barrier system, the movable barrier operator waits to transmit the transmission signal, including the rolling access code, to the learning transceiver until it has received an indication that a predetermined event occurred.
Abstract:
A barrier movement operator system having a receiver for receiving (80), learning and responding to transmitted rolling code type access codes; at least one trained transmitter (30) for operation the system by transmitting a rolling code type access code to the receiver; at least one learning transmitter (31) for learning the rolling code type access code from said trained transmitter in order to operate the system; a controller (70) for evaluating the relationship between the learning transmitter rolling type access code and the trained transmitter rolling type access code; and a device for providing a barrier movement in response to access codes received by the receiver.
Abstract:
A key fob simulator for sending actuation commnad to a vehicle is discussed. The key fob has memory buffers, processors, and a transceiver that uses wireless communications to communicate with a backend cloud-based system. A RF transmitter of the key fob can transmit RF signals to Remote Keyless Entry (RKE) module of the vehicle. A mapping module includes a map-calculating circuit to calculate map coordinates of the key fob. A security module can receive a rolling security key of the RKE module of the vehicle. The key fob includs buttons that can be pushed by a user of the key fob to generate actuation commands by the security module. Using the RF transmitter, an actuation command and the rolling security key can be sent from security module to the RKE module of the vehicle. The RKE module then executes the actuation command after validating the rolling security key.
Abstract:
The present disclosure provides an access-code-activated locking system for at least one asset/s comprising, for each asset, a pre-programmed apparatus which uses at least one processor to trigger imposed advancement at predefined intervals, to predetermined imposed positions in a sequence of expected access codes and a lock which unlocks and provides access to at least one asset responsive to recognition of an access code presented by an access seeker. The disclosure further provides a locking method and a computer program product.
Abstract:
Rollcodes are efficiently used within an interval for precomputed command sets by generating a first set of remote-cloud-key commands, the first set of remote-cloud- key commands including a plurality of remote-cloud-key commands each of which starts with a first roll code; determining a maximum number of roll codes used per command within the first set of remote-cloud-key commands; and generating a second set of remote-cloud-key commands, the second set of remote-cloud-key commands including a plurality of remote-cloud-key commands each of which starts with a second roll code that is determined by adding the maximum number of roll codes used per command within the first set of remote-cloud-key commands to the first roll code.
Abstract:
Verfahren zum Betreiben eines Schließsystems umfassend einen elektronischen Schlüssel und ein elektronisches Schloss sowie eine im Schließbetrieb lokal getrennt vom elektronischen Schlüssel und vom elektronischen Schloss eingesetzte Zentraleinheit, wobei bei dem Verfahren von der Zentraleinheit mittels eines Berechtigungscodeermittlungsprogramms ein externer Berechtigungscode erzeugt wird, der externe Berechtigungscode dem elektronischen Schlüssel übermittelt wird, der externe Berechtigungscode vom elektronischen Schlüssel in einem Speicher abgelegt wird, wobei bei Zusammenwirken des elektronischen Schlüssels mit dem elektronischen Schloss vom elektronischen Schloss der externe Berechtigungscode aus dem Speicher ausgelesen und von einem Prozessor des elektronischen Schlosses dadurch überprüft wird, dass der Prozessor mit einem eigenen Berechtigungscodeermittlungsprogramm selbst einen eigenen Berechtigungscode ermittelt und mit dem vom elektronischen Schlüssel erhaltenen externen Berechtigungscode vergleicht und wobei der Prozessor bei Identität des ermittelten eigenen Berechtigungscodes mit dem übermittelten externen Berechtigungscode einen Öffnungsvorgang ermöglicht.