专利摘要:
The invention relates to a method for controlling access to at least one functionality of a motor vehicle (10), comprising: - an action step during which an electronic control unit (11) embedded in the vehicle automobile detects a user's interaction with the motor vehicle, - a verification step during which the electronic control unit verifies that the user is authorized to access said functionality, and - an authorization step during the of which the electronic control unit allows access to said functionality. According to the invention, said verification step comprises the sending by said electronic control unit of an interrogation message on a mobile terminal (20) carried by the user or by a person accompanying the user, and said step authorization is implemented only if the electronic control unit receives from the mobile terminal, in response to the interrogation message, a validation message of the access right.
公开号:FR3030850A1
申请号:FR1402999
申请日:2014-12-23
公开日:2016-06-24
发明作者:Eric Menard;Jerome Baumann;Fabienne Masson
申请人:Valeo Comfort and Driving Assistance SAS;
IPC主号:
专利说明:

[0001] BACKGROUND OF THE INVENTION The present invention generally relates to the control of functionalities of a motor vehicle by means of a mobile terminal. It relates more particularly to a method of controlling access to at least one functionality of a motor vehicle, comprising: an action step in the course of which an on-board electronic control unit in the motor vehicle detects an interaction of 'a user with the motor vehicle, - a verification step during which the electronic control unit verifies that the user is authorized to access said functionality, and - an authorization step in which, when The interaction is detected by the electronic control unit and the electronic control unit has verified that the user is authorized to access said functionality, the electronic control unit allows access to said functionality. The invention is particularly advantageous in the case where the controlled functionality is the unlocking of the doors of the vehicle or the starting of the vehicle. BACKGROUND OF THE ART It is known to control certain motor vehicle functionalities, such as unlocking the vehicle doors or starting the vehicle, by means of a remote control in the form of a magnetic card serving contactless key. The request for access to the functionalities of the motor vehicle is then initiated by a user action, for example by pressing a button on the magnetic card or by touching one of the door handles of the motor vehicle. When this access request is initiated, it is expected that the electronic control unit on board the vehicle checks if the magnetic card holder is in the immediate vicinity of the motor vehicle. The solution is to start a magnetic card detection operation, using a low frequency technology. The advantage of this low frequency technology is that it can detect the magnetic card only if the latter is in the immediate vicinity of the vehicle (its range is less than two meters). Another advantage of this technology is that it allows to locate the magnetic card holder inside or outside the vehicle. Thus, if the user deviates from his vehicle and a malicious person tries to access by touching one of the door handles, this access will be prohibited because of the distance between the vehicle carrier of the magnetic card.
[0002] The disadvantage of this solution is that it requires the user to be equipped with a card adapted to communicate with the motor vehicle by means of a low frequency technology. Indeed, the majority of communication technologies used (for example in mobile phones) have a range greater than 2 meters, which does not allow to check with sufficient security if the user is in the immediate vicinity of the vehicle. OBJECT OF THE INVENTION The present invention proposes to allow access to the functionalities of the vehicle to a person equipped with a mobile terminal devoid of low-frequency communication means, without affecting the safety of access to the vehicle. More particularly, the invention proposes a control method as defined in the introduction, wherein: said verification step comprises the sending by said electronic control unit of an interrogation message on a mobile terminal carried by the user or a person accompanying the user, and - said authorization step is implemented only if the electronic control unit receives from the mobile terminal, in response to the interrogation message, a validation message the right of access. Therefore, any action initiated by the user to obtain access to a motor vehicle functionality must be validated by the holder of the mobile terminal. Thus, thanks to the invention, it is possible to ensure that the person at the origin of the action carries the mobile terminal or that it is authorized by the latter to access the functionality of the motor vehicle.
[0003] The solution proposed by the invention is therefore perfectly secure even though the mobile terminal does not necessarily include means for the motor vehicle to verify that the mobile terminal is in the immediate vicinity of the vehicle.
[0004] Other advantageous and nonlimiting characteristics of the control method according to the invention are the following: - prior to the sending of the interrogation message, there is provided a step of authentication of the mobile terminal by the electronic unit of command, during which the electronic control unit interrogates the mobile terminal to verify that the mobile terminal is carrying a virtual key access to the motor vehicle and / or to verify that the mobile terminal is registered in the unit control electronics as entitled to access the motor vehicle; prior to the sending of the interrogation message, there is provided a control step during which the electronic control unit controls that the mobile terminal is located at short or medium distance from the motor vehicle; in the control step, the mobile terminal is considered at short or medium distance from the motor vehicle when the electronic control unit detects the mobile terminal via a communication means which is adapted to communicate with the mobile terminal according to a protocol medium or short range communication; the interrogation message and the validation message are exchanged between the mobile terminal and the electronic control unit via communication means adapted to communicate together according to a medium or short-range communication protocol; during said action step, the electronic control unit detects the input of the mobile terminal in an area close to the motor vehicle in which the mobile terminal and the electronic control unit are adapted to communicate together via communication means operating according to a medium or short-range communication protocol; said communication protocol is Bluetooth; during said action step, the electronic control unit detects a support exerted by the user on a part of the motor vehicle; - Upon receipt of the interrogation message, the mobile terminal emits a sound or generates a vibration perceptible by said user or said person accompanying the user; said authorization step comprises the transmission by said electronic control unit of a door unlocking or vehicle starting signal; said mobile terminal being a mobile telephone equipped with a display screen, during said verification step, said interrogation message is directly transmitted by the electronic control unit to the mobile telephone so that a message is displayed on the display screen of the mobile phone, and during said authorization step, said validation message is directly transmitted by the mobile phone to the electronic control unit; said mobile terminal being a mobile watch equipped with a display screen, during said verification step, said interrogation message is directly transmitted by the electronic control unit to the mobile watch in such a way that message is displayed on the display screen of the mobile watch, and during said authorization step, said validation message is directly transmitted by the mobile watch to the electronic control unit; said mobile terminal being a mobile telephone adapted to communicate with a connected watch equipped with a display screen, during said verification step, said interrogation message is transmitted by the electronic control unit to said watch connected via the mobile phone such that a message is displayed on the display screen of the connected watch; During said authorization step, said validation message is directly transmitted by the watch connected to the electronic control unit; or - during said authorization step, said validation message is transmitted by the watch connected to the electronic control unit via the mobile telephone. DETAILED DESCRIPTION OF AN EXEMPLARY EMBODIMENT The following description with reference to the accompanying drawings, given as non-limiting examples, will make it clear what the invention consists of and how it can be achieved. FIG. 1 represents an exemplary context in which the invention may be implemented, comprising a motor vehicle and a mobile terminal; - Figure 2 schematically shows components useful for understanding the invention, the motor vehicle and the mobile terminal of Figure 1; and - Figure 3 shows the main steps of a control method according to the invention. FIG. 1 represents an example of context in which the invention can be implemented. In this context, a motor vehicle 10 comprises an electronic control unit 11 (or ECU for "Electronic Control Unit") which is adapted to control the functionalities of the motor vehicle 10 and which can communicate via a wireless link with a mobile terminal 20. It can be a mobile phone (or cell phone), preferably of the type "smart phone" or "smartphone" according to the English name commonly used. It could also be a connected watch (associated with a mobile phone), a mobile watch (which can communicate with other devices independently of any mobile phone), a pair of connected glasses. The electronic control unit 11 is adapted to communicate with this mobile terminal 20 in order to exchange data, for example with a view to controlling the functionalities of the motor vehicle 10 by means of the mobile terminal 20 (such a function can be example the unlocking of the doors of the motor vehicle 10 or the starting of the motor vehicle engine 10), as explained below. The wireless link used to communicate between the electronic control unit 11 and the mobile terminal 20 operates according to a technology other than low frequency. It therefore does not allow the electronic control unit 11 to precisely determine the distance between the motor vehicle 10 and the mobile terminal 20. The wireless link used could be of any other type. It could, for example, use a WIFI protocol (typically a protocol governed by the IEEE 802.11 group standards) or a 3G or 4G type mobile telephony protocol.
[0005] However, here and preferably, the wireless link used to communicate between the electronic control unit 11 and the mobile terminal 20 is ultra-high frequency. It is more precisely here a connection type Bluetooth.
[0006] The interest of this technology compared to those mentioned above and that it consumes little energy and that its proper functioning is not subject to the proper functioning of a global network architecture (typically the mobile network). FIG. 2 diagrammatically represents components useful for understanding the invention of the motor vehicle 10 and the mobile terminal 20. It can be seen that the motor vehicle 10 comprises in particular the electronic control unit 11 already mentioned, an actuator 15 (designed here to allow the unlocking of the doors of the motor vehicle 10), a wireless communication module 16 and a user interface 18.
[0007] The electronic control unit 11 comprises a processor 12 and a storage unit 14, for example a rewritable non-volatile memory or a hard disk. The storage unit 14 stores in particular computer programs comprising instructions whose execution by the processor 12 20 allows the implementation by the electronic control unit 11 of the methods described below. The storage unit 14 also stores data used in the context of the methods described below, in particular a root key (or master key) VK0 and a cryptographic function, denoted by f hereinafter, used as it will be. explained in the following. The root key VK0 and the cryptographic function f are for example written in the storage unit 14 during the manufacture of the electronic control unit 11, before mounting of this electronic control unit 11 in the motor vehicle 10. mobile terminal 20, here formed by a mobile phone, comprises a processor 22, a memory 24 (for example a non-volatile rewritable memory), a wireless communication module 26, a communication module 28 on the mobile telephone network and a user interface 29. The wireless communication module 26 of the mobile terminal 20 makes it possible to establish a wireless link (here Bluetooth type as already indicated) with the wireless communication module 16 of the motor vehicle 10 through which the processor 12 of the electronic control unit 11 and the processor 22 of the mobile terminal 20 can exchange data, especially as explained below. The memory 24 stores applications comprising instructions whose execution by the processor 22 allows the implementation by the mobile terminal 20 of the method described below. The memory 24 also stores data used in the context of the method described below. The user interface 29 is here formed by a touch screen on which the user can classically enter information or press buttons. It could alternatively be presented differently (for example in the form of a keyboard associated with a screen).
[0008] FIG. 3 presents the main steps of a method for controlling access to at least one functionality of the motor vehicle 10, using the mobile terminal 20. For the sake of clarity, in the following description, reference will be made to FIG. that the person who carries the mobile terminal 20 and who wishes to access the functionality 20 of the motor vehicle is one and the same person called "user". Alternatively, one could provide that the person who wishes to access the functionality of the motor vehicle is a separate person from the holder of the mobile terminal, in which case this person must be authorized by the holder of the mobile terminal to access the functionality of the motor vehicle. It will be considered here that the desired functionality is the unlocking of the doors. It will also be considered here that prior to the implementation of the control method, the mobile terminal 20 has been specifically prepared for the control of functionalities of the motor vehicle 10. It will thus be considered that the mobile terminal 20 comprises a physical security element ( SIM card, eSE module ...) in which are stored the cryptographic function f and a virtual key VK access to the motor vehicle 10. It will further be considered that the mobile terminal 20 embeds in its memory 24 public DP branching parameters , as well as a user application. The public DP derivation parameters are those that calculate the virtual key VK from the root key VK0. The user application is in turn designed to allow the user to communicate with the electronic control unit 11, as will be described later in this presentation. According to a particularly advantageous characteristic of the invention, the method for controlling the access to the functionality of the motor vehicle comprises three main steps, including: an action step in which the electronic control unit 11 detects an interaction of the user with the motor vehicle 10, - a verification step during which the electronic control unit 11 verifies that the user is authorized to access said functionality, by sending an IM interrogation message to the terminal mobile 20, and - an authorization step during which, when the electronic control unit 11 receives from the mobile terminal 20, in response to the IM interrogation message, a validation message VM, the electronic control unit 11 allows access to said functionality.
[0009] Preferably, these three steps are implemented according to this chronology. The IM, VM message exchange between the electronic control unit 11 and the mobile terminal 20 allows the motor vehicle 10 to make sure, when it detects an interaction with a person, that the user actually wants to unlock the doors. of the vehicle. Thus, to illustrate this, we can first consider the case where the user is the owner of the motor vehicle and the holder of the mobile terminal 20. In this case, when he interacts with the vehicle (for example by touching a door handle), the electronic control unit 11 sends on its mobile terminal 20 a message that it must validate so that the door unlocks. We can now consider the case where the person who interacts with the motor vehicle is not authorized to access it. In this case, when it interacts with the vehicle (for example by touching a door handle), the electronic control unit 11 sends or attempts to send to the mobile terminal 20 of the owner of the vehicle a message that the latter does not not valid, so the door remains locked. The exchange of messages can be done using various means of communication. However, here, as explained above, the protocol used is of the Bluetooth type. FIG. 3 details the implementation of an exemplary embodiment of this control method. In this FIG. 3, step E2 represents the above-mentioned action step, that is to say the step during which the electronic control unit 11 detects an interaction with the user U. step E1 represents the interaction caused by the user U. In this case, this interaction can take various forms.
[0010] Here, it will be considered that this interaction is constituted when the user U touches a part of the motor vehicle 10, for example a handle of the vehicle which is for this purpose equipped with a detector connected to the electronic control unit 11. As a variant it could be expected that this interaction is formed when the user U, equipped with his mobile terminal 20, enters an area sufficiently close to the motor vehicle 10 for the electronic control unit 11 to detect and can establish a communication with the terminal mobile 20 by Bluetooth connection (in this case, step E3 described below will not be implemented).
[0011] One could still consider other interactions (facial recognition of the user by means of a camera equipping the vehicle, ...). In any case, in step E2, the electronic control unit 11 detects this interaction. Before sending a message to the mobile terminal 20 of the user, the electronic control unit 11 here will carry out various preliminary tests, which are not mandatory in the context of the present invention, but whose implementation is preferable in order to better secure access to the motor vehicle 10. Thus, after the user has touched the handle of the door, there is provided a step E3 for monitoring the presence of the mobile terminal 20 in the short or medium distance of the motor vehicle 10. This step will prevent the sending of an IM interrogation message if the electronic control unit 11 does not detect the mobile terminal 20.
[0012] During this step, the electronic control unit 11 attempts to establish a Bluetooth connection with the mobile terminal 20. As explained above, this type of connection has a short range (less than 10 meters) or average ( less than 100 meters) depending on the Bluetooth technology used.
[0013] If no Bluetooth connection with a known mobile terminal can be established, the process is interrupted (step E4). It will be specified here that a known mobile terminal is a terminal whose Bluetooth profile (for example its Bluetooth identifier) is already known and stored in the storage unit 14 of the electronic control unit 11.
[0014] On the contrary, if a Bluetooth connection is established with the mobile terminal 20, the electronic control unit 11 considers that the user U is close to the motor vehicle 10, so that the process continues. Here, for the reasons that will be detailed below, it is expected that the mobile terminal 20 takes advantage of this Bluetooth link to transmit to the electronic control unit 11 the DP derivation parameters (it is recalled that these derivation parameters allow calculate the virtual key VK from the root key VK0 stored in the storage unit 14 of the electronic control unit 11). An authentication operation of the mobile terminal 20 is then provided by the electronic control unit 11, during which the electronic control unit 11 will interrogate the mobile terminal 20 to verify that the latter has a right of access. to the motor vehicle 10. This authentication operation could consist in verifying that the Bluetooth profile of the mobile terminal 20 is already known and stored in the storage unit 14 of the electronic control unit 11. This authentication operation could therefore to be performed concomitantly with the previous step E3. However, here, for greater security, this authentication operation is distinct from the previous step E3. It is then formed of a plurality of steps E5 to E14, to verify that the mobile terminal 20 is carrying a virtual key VK access to the motor vehicle 10. These steps are as follows. The first step E5 consists, for the electronic control unit 11, to generate a challenge, in the form of a random number RND. The electronic control unit 11 then calculates a response RESP associated with this challenge RND by application of the cryptographic function f using the virtual key VK (step E6), which can be written: RESP = f (RND, VK) .
[0015] Indeed, the electronic control unit 11 having in memory the root key VK0 and having received DP derivation parameters, it is adapted to calculate beforehand the virtual key VK. The electronic control unit 11 of the motor vehicle then issues the RND challenge to the mobile terminal 20, through the established Bluetooth connection (step E7). The mobile terminal 20 receives the RND challenge (step E8), then calculates in turn the expected response RESP 'by application to the RND challenge received from the cryptographic function f (step E9), which can be written: RESP' = f (RND, VK).
[0016] During the step E10, the mobile terminal 20 sends the electronic control unit 11 this expected answer RESP ', thanks to the Bluetooth link. The electronic control unit 11 of the motor vehicle 10 then receives this expected response RESP '(step El 1) and compares it with the response 25 RESP, verifying whether these two responses are equal (step E12). If the equality is not verified, the electronic control unit 11 terminates the authentication process (step E13). This means that the virtual key VK used by the mobile terminal 20 differs from that used by the electronic control unit 11. An error message can then for example be displayed on the screen of the mobile terminal 20. If the equality is verified, the electronic control unit 11 validates the authentication of the mobile terminal 20 (step E14), so that the control method can continue. In the next step E15, the electronic control unit 11 sends the interrogation message IM to the mobile terminal 20, so that a message can be displayed on the touch screen 29 of the mobile terminal 20 (step E16). This interrogation message IM will be developed in such a way that it can be interpreted by the user application stored in the memory 24 of the mobile terminal 20 so that this user application controls the display, on the touch screen 29, of a pop-up window (or "pop-up" in English). The user application will be programmed so that this pop-up window will display, on the one hand, a message asking the user if he wishes to unlock the doors of his vehicle, and on the other hand, two buttons allowing him to accept or refuse. Preferably, the user application will also control, upon receipt of the IM interrogation message, the emission of a sound or a vibration perceptible by the user, to attract the attention of the latter.
[0017] Once pressing either of the two buttons (step E17), a response message is returned by the mobile terminal 20 to the electronic control unit 11, again by Bluetooth link (step E18) . This response message will be developed in such a way that it can be interpreted by the electronic control unit 11 as a VM validation message if the user has validated the request, or as an invalidation message in the opposite case. . After receiving this response message (step E19), the electronic control unit 11 processes it in the following manner. If it is a VM validation message, it transmits to the actuator 25 a door unlock signal (step E20). On the other hand, if it is an invalidation message, the process is interrupted (step E21). If, after a predetermined duration (for example 10 seconds), the electronic control unit 11 has not received a response message from the mobile terminal 20, it also interrupts the process. Alternatively, it can be provided that it retends to transmit an interrogation message to the mobile terminal 20. The present invention is not limited to the embodiment described and shown.
[0018] In particular, it can be provided that the user must act differently to validate the polling message received on his mobile terminal. For example, he can validate this message simply by unlocking his mobile terminal or by drawing with his finger a predetermined shape on the screen of his mobile terminal (which will prevent a person having stolen the mobile terminal can not validate the message). According to another variant embodiment of the invention, provision may be made for the mobile terminal and the electronic control unit to communicate together via a public network, for example via the mobile telephone network (and not via Bluetooth). In this variant, the protocol used is long-range, so that it does not allow to implement step E3 which consists in checking that the mobile terminal is in the vicinity of the motor vehicle. In this variant, if it is desired to implement this step E3, it is then necessary to use other means equipping the mobile terminal, for example its GPS chip if equipped. In another variant, the functionality of the motor vehicle for which it is desired to control access may be the starting of the engine of the motor vehicle. In this variant, the action step may consist, for the user, in pressing a starter button of the motor vehicle. The other steps will however be identical to those described above. This variant will be particularly advantageous in the case where it will apply to a convertible type vehicle (or ("convertible"). In the embodiment described above with reference to FIGS. 1 to 3, the mobile terminal was therefore a mobile telephone. equipped with a display screen, the IM interrogation message was then directly transmitted by the electronic control unit 11 to the mobile phone so that a message is displayed on the display screen of the mobile phone, and the validation message VM was directly transmitted by the mobile phone to the electronic control unit 11, via a Bluetooth link.
[0019] In another embodiment, it could be provided that the mobile terminal is a mobile watch equipped with a display screen. By mobile watch is meant a watch which is adapted to communicate with other devices (especially with the electronic control unit 11), independently of a mobile phone, for example via a Bluetooth link.
[0020] In this embodiment, the interrogation message IM can be directly transmitted by the electronic control unit 11 to the mobile watch and the validation message VM can be directly transmitted by the mobile watch to the electronic control unit 11. .
[0021] In yet another embodiment, one could provide that the mobile terminal is a mobile phone adapted to communicate with a connected watch worn by the wearer of the mobile phone. Connected watch means a watch which is adapted to communicate with the mobile telephone and which, in order to communicate with other devices (in particular with the electronic control unit 11) must necessarily establish, at least for a moment, a gateway thanks to the mobile phone. In this embodiment, the IM interrogation message may be transmitted by the electronic control unit 11 to the watch connected via the mobile phone. The validation message VM may, however, either be directly transmitted by the watch connected to the electronic control unit 11, or be transmitted to it via the mobile phone.
权利要求:
Claims (15)
[0001]
REVENDICATIONS1. A method of controlling access to at least one functionality of a motor vehicle (10), comprising: - an action step during which an electronic control unit (11) on board the motor vehicle (10) detects an interaction of a user with the motor vehicle (10), - a verification step during which the electronic control unit (11) verifies that the user is authorized to access said functionality, and - a step of in which, when the interaction is detected by the electronic control unit (11) and the electronic control unit (11) has verified that the user is authorized to access said functionality, the electronic control unit (11) allows access to said functionality, characterized in that said verification step comprises the sending by said electronic control unit (11) of an interrogation message (IM) on a mobile terminal (20) carried by the user or by a person accompanying the user, and in that said authorization step is implemented only if the electronic control unit (11) receives from the mobile terminal (20) in response to the interrogation message (IM), a validation message (VM) of the access right.
[0002]
2. Control method according to the preceding claim, wherein, prior to sending the interrogation message (IM), there is provided a step of authentication of the mobile terminal (20) by the electronic control unit (11). ), during which the electronic control unit (11) interrogates the mobile terminal (20) to verify that the mobile terminal (20) carries a virtual access key (VK) to the motor vehicle (10) and / or to verify that the mobile terminal (20) is registered in the electronic control unit (11) as being entitled to access the motor vehicle (10).
[0003]
3. Control method according to one of the preceding claims, wherein, prior to sending the interrogation message (IM), there is provided a control step during which the electronic control unit (11) controls that the mobile terminal (20) is located at short or medium distance from the automobile vehicle (10).
[0004]
4. Control method according to the preceding claim, wherein, in the control step, the mobile terminal (20) is considered at short or medium distance from the motor vehicle (10) when the electronic control unit (11) detects the mobile terminal (20) via a communication means (16) which is adapted to communicate with the mobile terminal (20) according to a medium or short-range communication protocol.
[0005]
5. Control method according to one of the preceding claims, wherein the interrogation message (IM) and the validation message (VM) are exchanged between the mobile terminal (20) and the electronic control unit (11). ) via communication means (16, 26) adapted to communicate together according to a medium or short-range communication protocol.
[0006]
6. Control method according to one of the preceding claims, wherein, during said action step, the electronic control unit (11) detects the input of the mobile terminal (20) in an area near the motor vehicle (10), wherein the mobile terminal (20) and the electronic control unit (11) are adapted to communicate together via communication means (16, 26) operating according to a medium or short-range communication protocol . 20
[0007]
7. Control method according to one of the three preceding claims, wherein said communication protocol is Bluetooth.
[0008]
8. Control method according to one of the preceding claims, wherein, during said action step, the electronic control unit (11) detects a support exerted by the user on a part of the motor vehicle ( 10).
[0009]
9. Control method according to one of the preceding claims, wherein, upon receipt of the interrogation message (1M), the mobile terminal (20) emits a sound or generates a vibration perceptible by said user or said person accompanying the user. 30
[0010]
10. Control method according to one of the preceding claims, wherein said authorization step comprises the transmission by said electronic control unit (11) of a door unlock signal or vehicle start.
[0011]
11. Control method according to one of claims 1 to 10, wherein said mobile terminal (20) being a mobile phone equipped with a display screen: - during said verification step, said interrogation message ( IM) is directly transmitted by the electronic control unit (11) to the mobile telephone so that a message is displayed on the display screen of the mobile telephone, and - during said authorization step, said validation message (VM) is directly transmitted by the mobile telephone to the electronic control unit (11). 10
[0012]
12. Control method according to one of claims 1 to 10, wherein said mobile terminal (20) being a mobile watch equipped with a display screen: - during said verification step, said interrogation message (IM) is directly transmitted by the electronic control unit (11) to the mobile watch so that a message is displayed on the display screen of the mobile watch, and - during said step d authorization, said validation message (VM) is directly transmitted by the mobile watch to the electronic control unit (11). 20
[0013]
13. Control method according to one of claims 1 to 10, wherein said mobile terminal (20) being a mobile phone adapted to communicate with a connected watch equipped with a display screen, during said verification step said interrogation message (IM) is transmitted by the electronic control unit (11) to said connected watch via the mobile telephone 25 so that a message is displayed on the display screen of the watch connected.
[0014]
14. Control method according to claim 13, wherein, during said authorization step, said validation message (VM) is directly transmitted by the watch connected to the electronic control unit (11). 30
[0015]
15. Control method according to claim 13, wherein, during said authorization step, said validation message (VM) is transmitted by the watch connected to the electronic control unit (11) via the mobile phone.
类似技术:
公开号 | 公开日 | 专利标题
FR3030850A1|2016-06-24|METHOD FOR CONTROLLING ACCESS TO AT LEAST ONE FUNCTIONALITY OF A MOTOR VEHICLE
EP3083343B1|2019-02-06|Command execution method for a motor vehcle through data exchange between a control unit and an identifier
WO2016102888A1|2016-06-30|Method for secure transmission of a virtual key and method for authentication of a mobile terminal
EP3066648B1|2021-01-27|Authentication of a user provided with a mobile device by a vehicle
WO2016102887A1|2016-06-30|Method for automatic recognition between a mobile device and a motor vehicle, capable of functioning according to the ble protocol
WO2016198780A1|2016-12-15|Secure access control method with reader and mobile terminal, in particular such as a telephone terminal
FR3067136A1|2018-12-07|METHOD FOR UPDATING A VEHICLE ONBOARD COMPUTER
EP3350030A1|2018-07-25|Method for controlling a functionality of a vehicle by means of a user terminal and associated control system
WO2018109330A1|2018-06-21|Method of personalizing a secure transaction during a radio communication
EP3195553B1|2018-12-12|Pairing method between a mobile device and an electronic module of a vehicle
WO2016132078A1|2016-08-25|Method of securing access to at least one functionality of a motor vehicle by a mobile terminal
FR3044145A1|2017-05-26|METHOD FOR CONTROLLING A FUNCTIONALITY OF A MOTOR VEHICLE USING A MOBILE TERMINAL
WO2017005644A1|2017-01-12|Method and system for controlling access to a service via a mobile media without a trusted intermediary
WO2015144635A2|2015-10-01|An activation and deactivation method for an application in a telecommunications terminal comprising a secure element and a biometric reader, and corresponding server
FR3082039A1|2019-12-06|VEHICLE PROPERTY VERIFICATION METHOD.
FR3082040A1|2019-12-06|METHOD FOR VERIFYING THE PROPERTY OF A VEHICLE BY SYNCHRONIZING TIMERS.
EP3024197A1|2016-05-25|Method for collecting biometric data
FR3107487A1|2021-08-27|Method of locking a motor vehicle using a smartphone.
FR2980014A1|2013-03-15|Near field electronic tag reader for use in car's control panel to exchange e.g. seat adjustment information, with e.g. mobile phone, has communication unit exchanging information with external logic controller by multiplexed link
EP3195641A1|2017-07-26|Pairing method
WO2016051059A1|2016-04-07|Method of protecting a mobile terminal against attacks
FR2985129A1|2013-06-28|System for controlling execution of e.g. protected function, in cellular phone, has electronic label including user interface for receiving personal identification number input by user, and for transmitting number to secure module of phone
FR2982397A1|2013-05-10|Method for electronic signature of set of documents within computer system, involves verifying stored authentication code in response to subsequent command, and sending authorization signal to computer in case of positive verification
同族专利:
公开号 | 公开日
WO2016102889A1|2016-06-30|
CN107251107A|2017-10-13|
US10479320B2|2019-11-19|
EP3266003A1|2018-01-10|
FR3030850B1|2020-01-24|
US20170334394A1|2017-11-23|
JP6768665B2|2020-10-14|
JP2018506663A|2018-03-08|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US20040066092A1|2000-12-22|2004-04-08|Ulrich Muller|Closing system for motor vehicles|
US20050285724A1|2004-06-25|2005-12-29|Schmidt Robert M|Integrated passive entry transmitter/receiver|
US20140049361A1|2012-08-16|2014-02-20|Schlage Lock Company Llc|Wireless reader system|
US20140181954A1|2012-12-26|2014-06-26|Charles Cameron Robertson|System for conveying an identity and method of doing the same|
US20140210592A1|2013-01-25|2014-07-31|Ford Global Technologies, Llc|Apparatus and method for interfacing a wireless communication device to a communication device keypad in a vehicle|FR3107155A1|2020-02-12|2021-08-13|Psa Automobiles Sa|Method of unlocking a motor vehicle using a smartphone notification.|
FR3107546A1|2020-02-21|2021-08-27|Psa Automobiles Sa|Method for unlocking a compartment of a motor vehicle using a smartphone notification|
FR3107545A1|2020-02-26|2021-08-27|Psa Automobiles Sa|Method of selective unlocking of a motor vehicle using a smartphone notification|US20150310680A1|2010-06-01|2015-10-29|Peter Lablans|Method and Apparatus for Wirelessly Activating a Remote Mechanism|
FR2975561B1|2011-05-20|2015-11-13|Renault Sas|ACCESS AND CUSTOMIZATION OF A MOTOR VEHICLE BY TELEPHONE|
JP2013036251A|2011-08-09|2013-02-21|Aisin Seiki Co Ltd|Vehicle opening/closing body operation device and system with on-vehicle camera and portable information terminal, and control method thereof|
ITBO20120712A1|2012-12-28|2014-06-29|Trw Automotive Italia S R L|IMPROVED ACCESS AND START-UP SYSTEM FOR LIABILITIES FOR A MOTOR VEHICLE|
JP5763110B2|2013-01-08|2015-08-12|ビッグローブ株式会社|Transmission / reception system, computer, transmission / reception apparatus, transmission / reception method, and program|
JP6201835B2|2014-03-14|2017-09-27|ソニー株式会社|Information processing apparatus, information processing method, and computer program|
CN104980274A|2014-04-09|2015-10-14|海拉胡克双合有限公司|Smart phone, vehicle control system with the smart phone and control method|
US9445248B2|2014-07-25|2016-09-13|Qualcomm Incorporated|Radio-agnostic message translation service|
US20160125412A1|2014-11-05|2016-05-05|Royce E. Cannon|Method and system for preventing identity theft and increasing security on all systems|
US9656633B2|2014-11-24|2017-05-23|Ford Global Technologies, Llc|Methods and systems for a vehicle computing system to communicate with a device|
US9626814B2|2014-12-23|2017-04-18|Vivint, Inc.|Smart door lock|US10600270B2|2017-08-28|2020-03-24|Ford Global Technologies, Llc|Biometric authentication for a vehicle without prior registration|
WO2019152836A1|2018-02-01|2019-08-08|Strattec Security Corporation|Methods and systems for providing bluetooth -based passive entry and passive startfor a vehicle|
US10717413B2|2018-12-05|2020-07-21|Valeo Comfort And Driving Assistance|Actuation of vehicle systems using device-as-key and computer vision techniques|
FR3103657B1|2019-11-27|2021-10-15|Valeo Comfort & Driving Assistance|Method of communication between a primary radio frequency unit and a secondary radio frequency unit|
法律状态:
2015-12-31| PLFP| Fee payment|Year of fee payment: 2 |
2016-06-24| PLSC| Publication of the preliminary search report|Effective date: 20160624 |
2016-12-29| PLFP| Fee payment|Year of fee payment: 3 |
2018-01-02| PLFP| Fee payment|Year of fee payment: 4 |
2018-12-31| PLFP| Fee payment|Year of fee payment: 5 |
2019-12-31| PLFP| Fee payment|Year of fee payment: 6 |
2020-12-31| PLFP| Fee payment|Year of fee payment: 7 |
2021-12-31| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
申请号 | 申请日 | 专利标题
FR1402999|2014-12-23|
FR1402999A|FR3030850B1|2014-12-23|2014-12-23|METHOD FOR CONTROLLING ACCESS TO AT LEAST ONE FUNCTIONALITY OF A MOTOR VEHICLE|FR1402999A| FR3030850B1|2014-12-23|2014-12-23|METHOD FOR CONTROLLING ACCESS TO AT LEAST ONE FUNCTIONALITY OF A MOTOR VEHICLE|
PCT/FR2015/053721| WO2016102889A1|2014-12-23|2015-12-22|Method for controlling access to at least one function of a motor vehicle|
US15/532,393| US10479320B2|2014-12-23|2015-12-22|Method for controlling access to at least one function of a motor vehicle|
JP2017533890A| JP6768665B2|2014-12-23|2015-12-22|How to control access to at least one function of an automated vehicle|
CN201580070011.XA| CN107251107A|2014-12-23|2015-12-22|Method for controlling the access at least one function of motor vehicles|
EP15823703.2A| EP3266003A1|2014-12-23|2015-12-22|Method for controlling access to at least one function of a motor vehicle|
[返回顶部]