18615700. VEHICULAR DIGITAL KEY SYSTEM, VEHICULAR DIGITAL KEY MANAGEMENT METHOD, VEHICULAR DEVICE, AND MOBILE TERMINAL simplified abstract (DENSO CORPORATION)

From WikiPatents
Jump to navigation Jump to search

VEHICULAR DIGITAL KEY SYSTEM, VEHICULAR DIGITAL KEY MANAGEMENT METHOD, VEHICULAR DEVICE, AND MOBILE TERMINAL

Organization Name

DENSO CORPORATION

Inventor(s)

Suguru Matsushita of Kariya-city (JP)

Marek Kociecki of Courbevole (FR)

Michal Wasilewski of Courbevole (FR)

Filip Later of Courbevole (FR)

Bartlomiej Lewinski of Courbevole (FR)

VEHICULAR DIGITAL KEY SYSTEM, VEHICULAR DIGITAL KEY MANAGEMENT METHOD, VEHICULAR DEVICE, AND MOBILE TERMINAL - A simplified explanation of the abstract

This abstract first appeared for US patent application 18615700 titled 'VEHICULAR DIGITAL KEY SYSTEM, VEHICULAR DIGITAL KEY MANAGEMENT METHOD, VEHICULAR DEVICE, AND MOBILE TERMINAL

Simplified Explanation

An owner terminal is configured to delete a guest key by selecting it from a guest list screen. The terminal sends a signal to the server to delete the key data, which then transmits a deletion instruction to the corresponding mobile terminal. The server also sends a data set to delete the key from an authentication ECU, which is then transferred from the terminal to the ECU via short-range communication.

Key Features and Innovation

  • Deletion of guest keys via owner terminal selection
  • Signal sent to server for key deletion
  • Deletion instruction transmitted to mobile terminal
  • Data set sent to delete key from authentication ECU
  • Short-range communication for key deletion

Potential Applications

This technology can be used in access control systems, security systems, and key management solutions.

Problems Solved

This technology streamlines the process of deleting guest keys, enhances security, and improves key management efficiency.

Benefits

  • Simplified and efficient deletion of guest keys
  • Enhanced security measures
  • Improved key management processes

Commercial Applications

  • Access control systems for buildings and facilities
  • Security systems for homes and businesses
  • Key management solutions for hotels and rental properties

Prior Art

Readers can explore prior art related to key management systems, access control technologies, and security systems for further insights.

Frequently Updated Research

Stay informed about advancements in access control technologies, key management solutions, and security systems for the latest developments in the field.

Questions about the Technology

How does this technology improve key management processes?

This technology allows for efficient deletion of guest keys, enhancing security and streamlining key management operations.

What are the potential applications of this technology beyond access control systems?

This technology can also be applied in security systems for homes, businesses, and other facilities to improve overall security measures.


Original Abstract Submitted

An owner terminal is configured so that a deletion target key, which is a guest key to be deleted, can be selected via a guest list screen. When the key to be deleted is selected, the owner terminal sends a signal requesting the deletion of the guest key to the server. The server deletes the key data from the corresponding terminal by transmitting a deletion instruction command to the mobile terminal corresponding to the key to be deleted. Further, the server transmits a data set for deleting the key to be deleted from an authentication ECU to each of the corresponding terminal and the owner terminal. When the data set is transferred from the corresponding terminal or the owner terminal to the authentication ECU by short-range communication, the key to be deleted is also deleted from the authentication ECU.