US 11,926,284 B2
Preventing replay/relay attacks in keyless entry systems
Chrysanthi Paschou, Bristol (GB); Ziming Zhu, Bristol (GB); and Magnus Stig Torsten Sandell, Bristol (GB)
Assigned to Kabushiki Kaisha Toshiba, Tokyo (JP)
Filed by Kabushiki Kaisha Toshiba, Tokyo (JP)
Filed on May 20, 2022, as Appl. No. 17/749,680.
Prior Publication US 2023/0373436 A1, Nov. 23, 2023
Int. Cl. B60R 25/24 (2013.01); B60R 25/102 (2013.01); G07C 9/00 (2020.01); H04B 17/318 (2015.01); H04L 9/00 (2022.01)
CPC B60R 25/1025 (2013.01) [B60R 25/245 (2013.01); G07C 9/00309 (2013.01); H04B 17/318 (2015.01); H04L 9/50 (2022.05); G07C 2009/00412 (2013.01); G07C 2009/00555 (2013.01); G07C 2009/00769 (2013.01); G07C 2209/08 (2013.01); G07C 2209/64 (2013.01); H04L 2209/84 (2013.01)] 20 Claims
OG exemplary drawing
 
12. A system for controlling access to a resource, the system comprising a first component, a second component and a third component, wherein:
the first component comprises a first cryptographic key;
the second component comprises a second cryptographic key; and
wherein:
the third component is configured to:
transmit a signal;
the second component is configured to:
generate a second channel observation;
generate a first data value based on the second channel observation and the second cryptographic key; and
transmit to the first component, the second channel observation and the first data value; and
the first component is configured to:
generate a first channel observation;
verify the second component based on the second channel observation, the first cryptographic key and the first data value; and
allow access to the resource in response to determining that the second component is: 1) permitted to gain access to the resource; and 2) located proximate to the first component.