Search

US-12623630-B2 - Controlling access of a vehicle based on local clock timings and a digital key interface

US12623630B2US 12623630 B2US12623630 B2US 12623630B2US-12623630-B2

Abstract

Various systems and methods are presented regarding controlling access to a vehicle. Access of the vehicle, by a second device, can be controlled by a first device utilizing authentication keys, access duration, and/or generation of access confirmations and access revocations. Respective timing of operations can be based on one or more timings generated by a real-time clock located on the vehicle. Further, in the event of an access confirmation not being received from the first device at a defined time, access of the second vehicle can be revoked. Communications between the respective devices can utilize short-range wireless communications. Access to the vehicle can be via controlling a digital/electronic interface, which can be further connected to a smart key configured to control operation of a vehicle door, engine/motor, and suchlike. The first device and the second device can be portable/mobile devices (e.g., one or more cellphones).

Inventors

  • Christoffer Carlsson
  • Alfons Massey

Assignees

  • VOLVO CAR CORPORATION

Dates

Publication Date
20260512
Application Date
20240216

Claims (20)

  1. 1 . A system located on a vehicle, comprising: a key interface configured to control at least one operation of the vehicle; a memory that stores computer executable components; and a processor that executes at least one of the computer executable components that: receives a synchronization request from a first device associated with a first user that is authorized to grant access to the key interface, wherein the first device is not part of the vehicle; accesses a real-time clock located onboard the vehicle; determines, in response to the synchronization request, a base time from a current state of the real-time clock; and transmits the base time to the first device, wherein the base time is utilized to control access of a second device to the key interface, wherein the second device is associated with a second user that wants access to the key interface, and wherein the second device is not part of the vehicle; receives, from the first device, a public cryptographic key associated with granting access to the key interface, a start time for granting the access to the key interface based on the public cryptographic key, and an end time for ending the granted access to the key interface based on the public cryptographic key; receives, from the second device, an access request comprising a digital signature; determines whether the second device is permitted to access the key interface, comprising: in response to determining that the digital signature is paired with the public cryptographic key, and a current time of the real-time clock is between the start time and end time, grant access of the second device to the key interface; and in response to determining that at least one of the digital signature is not paired with the public cryptographic key or the current time is not between the start time and end time, deny access of the second device to the key interface.
  2. 2 . The system of claim 1 , wherein the at least one of the computer executable components: receive, from the first device, a defined periodicity for reauthenticating access of the second device to the key interface between the start time and end time; and in response to having granted access of the second device to the key interface, and not receiving, from the first device, a reauthentication message within the defined periodicity, revoking access of the second device to the key interface.
  3. 3 . The system of claim 1 , wherein the private cryptographic key is generated by the first device based on the public cryptographic key, wherein the digital signature is generated by the first device based on the private cryptographic key, and wherein the first device transmits the digital signature to the second device.
  4. 4 . The system of claim 1 , wherein communication between the first device and the system is via short range wireless communication technology.
  5. 5 . The system of claim 1 , wherein the key interface is configured to control operation of a physical key located on the vehicle, wherein the physical key is a smart key.
  6. 6 . The system of claim 5 , wherein the physical key is configured to perform at least one of unlock a door on the vehicle, lock the door on the vehicle, start an engine located on board the vehicle, stop operation of the engine located on board the vehicle, unlock a tailgate on the vehicle, or lock the tailgate on the vehicle.
  7. 7 . The system of claim 1 , wherein at least one of the first device or the second device is one of a smartphone, a mobile phone, a cellphone, a personal digital assistant (PDA), a handheld computing device, a smartwatch, a tablet computer, or a laptop computer.
  8. 8 . A computer-implemented method, comprising: receiving, by a system of a vehicle, a synchronization request from a first device associated with a first user that is authorized to grant access to the key interface, wherein the first device is not part of the vehicle, and wherein the vehicle comprises a key interface configured to control at least one operation of the vehicle; accessing, by the system, a real-time clock located onboard the vehicle; determining, by the system, in response to the synchronization request, a base time from a current state of the real-time clock; transmitting, by the system, the base time to the first device, wherein the base time is utilized to control access of the key interface by a second device, wherein the second device is associated with a second user that wants access to the key interface, and wherein the second device is not part of the vehicle; receiving, by the system, from the first device, a public cryptographic key associated with granting access to the key interface, a start time for granting the access to the key interface based on the public cryptographic key, and an end time for ending the granted access to the key interface based on the public cryptographic key; receiving, by the system, from the second device, an access request comprising a digital signature; determining, by the system, whether the second device is permitted to access the key interface, comprising: in response to determining that the digital signature is paired with the public cryptographic key, and a current time of the real-time clock is between the start time and end time, grant access of the second device to the key interface; and in response to determining that at least one of the digital signature is not paired with the public cryptographic key or the current time is not between the start time and end time, deny access of the second device to the key interface.
  9. 9 . The computer-implemented method of claim 8 , further comprising: receiving, by the system, from the first device, a defined periodicity for reauthenticating access of the second device to the key interface between the start time and end time; and in response to having granted access of the second device to the key interface, and not receiving a reauthentication message within the defined periodicity, revoking, by the system, access of the second device to the key interface.
  10. 10 . The computer-implemented method of claim 8 , wherein the private cryptographic key is generated by the first device based on the public cryptographic key, wherein the digital signature is generated by the first device based on the private cryptographic key, and wherein the first device transmits the digital signature to the second device.
  11. 11 . The computer-implemented method of claim 8 , wherein communication between the system and the first device is via short range wireless communication technology.
  12. 12 . The computer-implemented method of claim 8 , wherein the key interface is configured to control operation of a physical key located on a vehicle, and wherein the physical key is configured to perform at least one of unlock a door on the vehicle, lock the door on the vehicle, start an engine located on board the vehicle, stop operation of the engine located on board the vehicle, unlock a tailgate on the vehicle, or lock the tailgate on the vehicle.
  13. 13 . The computer-implemented method of claim 8 , wherein at least one of the first device or the second device is one of a smartphone, a mobile phone, a cellphone, a personal digital assistant (PDA), a handheld computing device, a smartwatch, a tablet computer, or a laptop computer.
  14. 14 . A computer program product stored on a non-transitory computer-readable medium and comprising machine-executable instructions, wherein, in response to being executed, the machine-executable instructions cause computing equipment of a vehicle to perform operations, comprising: receiving a synchronization request from a first device associated with a first user that is authorized to grant access to the key interface, wherein the first device is not part of the vehicle, and wherein the vehicle comprises a key interface configured to control at least one operation of the vehicle; accessing a real-time clock located onboard the vehicle; determining in response to the synchronization request, a base time from a current state of the real-time clock; transmitting the base time to the first device, wherein the base time is utilized to control access of the key interface by a second device, wherein the second device is associated with a second user that wants access to the key interface, and wherein the second device is not part of the vehicle; receiving, from the first device, a public cryptographic key associated with granting access to the key interface, a start time for granting the access to the key interface based on the public cryptographic key, and an end time for ending the granted access to the key interface based on the public cryptographic key; receiving, from the second device, an access request comprising a digital signature; determining, by the system, whether the second device is permitted to access the key interface, comprising: in response to determining that the digital signature is paired with the public cryptographic key, and a current time of the real-time clock is between the start time and end time, grant access of the second device to the key interface; and in response to determining that at least one of the digital signature is not paired with the public cryptographic key or the current time is not between the start time and end time, deny access of the second device to the key interface.
  15. 15 . The computer program product according to claim 14 , further comprising: receiving from the first device, a defined periodicity for reauthenticating access of the second device to the key interface between the start time and end time; and in response to having granted access of the second device to the key interface, and not receiving a reauthentication message within the defined periodicity, revoking, by the system, access of the second device to the key interface.
  16. 16 . The computer program product according to claim 14 , wherein communication between the computing equipment and the first device is via short range wireless communication technology.
  17. 17 . The computer program product according to claim 14 , wherein communication the second device and the system is via short range wireless communication technology.
  18. 18 . The computer program product according to claim 14 , wherein the private cryptographic key is generated by the first device based on the public cryptographic key, wherein the digital signature is generated by the first device based on the private cryptographic key, and wherein the first device transmits the digital signature to the second device.
  19. 19 . The computer program product according to claim 14 , wherein the key interface is configured to control operation of a physical key located on a vehicle.
  20. 20 . The computer program product according to claim 14 , wherein at least one of the first device or the second device is one of a smartphone, a mobile phone, a cellphone, a personal digital assistant (PDA), a handheld computing device, a smartwatch, a tablet computer, or a laptop computer.

Description

TECHNICAL FIELD This application relates to techniques facilitating access and operation of a vehicle without having access to a physical key configured to operate the vehicle. BACKGROUND A plethora of applications designed to assist with day-to-day activities are available on portable devices, such as cellphones. Such applications can enable a person to access a vehicle without having the physical key for that vehicle available. Further, vehicles can now be accessed without a key, e.g., via a touch sensor, code entry via a keypad, a fingerprint sensor, and the like. However, there are still many vehicles in use that do not have such built-in, “smart” access technologies available. Many vehicles utilize what might be considered legacy technology, e.g., requiring a physical key to access the vehicle, such as a smart key. The key can include various buttons configured to respectively perform various functions such as lock/unlock a door(s), lock/unlock the trunk, start/stop engine, and the like. However, such legacy systems limit access and operation of a vehicle to only those who have a physical key in their possession. The above-described background is merely intended to provide a contextual overview of some current issues and is not intended to be exhaustive. Other contextual information may become further apparent upon review of the following detailed description. SUMMARY The following presents a summary to provide a basic understanding of one or more embodiments described herein. This summary is not intended to identify key or critical elements, or delineate any scope of the different embodiments and/or any scope of the claims. The sole purpose of the Summary is to present some concepts in a simplified form as a prelude to the more detailed description presented herein. In one or more embodiments described herein, systems, devices, computer-implemented methods, methods, apparatus and/or computer program products are presented that facilitate accessing and/or operating a vehicle without having to have access to a physical key configured for the vehicle. According to one or more embodiments, a system is provided which can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a key interface configured to control at least one operation of the vehicle. The components can further include an access component configured to control operation of the key interface, and further configured to receive a synchronization request from a first device, and in response thereto, access a real-time clock co-located onboard the vehicle. The access component can be further configured to, determine, in response to the synchronization request, a base time from a current state of the real-time clock, and further transmit the base time to the first device, wherein the base time is utilized to control access of a second device to the key interface. In a further embodiment, the access component can be further configured to receive an access request from the second device, wherein the access request includes a timestamp, the timestamp is generated by the first device based on the base time generated by the access component prior to generation of the timestamp, and in response to a determination that the timestamp has a value that is the same or subsequent to the base time, provisionally grant access of the second device to the key interface. In another embodiment, the access component can be further configured to, in response to a determination that the timestamp has a value that is not the same or subsequent to the base time, deny access of the second device to the key interface. In a further embodiment, the access component can be further configured to receive, from the first device, a public cryptographic key, further receive, from the second device, a digital signature further included in the access request, determine whether the digital signature is paired with the public cryptographic key, and in response to a determination that the digital signature is paired with the public cryptographic key and the value of the timestamp is the same or subsequent to the base time, grant access of the second device to the key interface, and in response to a determination that the digital signature is not paired with the public cryptographic key, deny access of the second device to the key interface. In an embodiment, the digital signature can be forwarded by the second device based on a private cryptographic key, wherein the private cryptographic key can be generated by the first device based on the public cryptographic key, and the signature is generated by the first device based on the private cryptographic key. In an embodiment, the key interface can be configured to control operation of a physical key located on the vehicle, wherein the physical key is a smart key. In a further embodiment, the physic