(19)
(11)EP 3 683 775 A1

(12)EUROPEAN PATENT APPLICATION

(43)Date of publication:
22.07.2020 Bulletin 2020/30

(21)Application number: 19152466.9

(22)Date of filing:  18.01.2019
(51)International Patent Classification (IPC): 
G07C 9/00(2020.01)
B60R 25/24(2013.01)
(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
KH MA MD TN

(71)Applicant: CM Ventures AB
116 22 Stockholm (SE)

(72)Inventors:
  • GRANBERG, Björn
    170 71 Solna (SE)
  • MARTINSSON, Carl
    116 22 Stockholm (SE)
  • PÖLJÖ, Kristoffer
    124 33 Bandhagen (SE)

(74)Representative: Kransell & Wennborg KB 
P.O. Box 27834
115 93 Stockholm
115 93 Stockholm (SE)

  


(54)PROTECTION DEVICE FOR BEING PROVIDED INSIDE A KEY FOB


(57) It is provided a protection device for being provided inside a key fob to selectively inactivate the key fob. The protection device comprises: a first conductive layer; a second conductive layer; an insulator layer between the first conductive layer and the second conductive layer, the insulator layer preventing conductive contact between the first conductive layer and the second conductive layer; and a switch conductively coupled between the first conductive layer and the second conductive layer, the switch being wirelessly controllable to be in a conductive state or a blocking state.




Description

TECHNICAL FIELD



[0001] The present disclosure relates to a protection device for protecting a key fob, and in particular to a protection device, and key fob comprising a switch being wirelessly controllable.

BACKGROUND



[0002] Access control has greatly improved both in security and in convenience for users in recent years. For instance, in the automotive industry, key fobs are typically provided with push buttons for remote control of locking and unlocking the car. The remote control removes the need for a mechanical key to open doors of a car.

[0003] A fairly recent improvement is passive access control by the car, sometimes known as the use of a smart key. In passive access control, the user keeps the key fob in a pocket or handbag and the car detects the presence of the key fob of the user and causes an access control system in the car to communicate wirelessly with the key fob. As long as the correct key fob is in the vicinity of the car and is authorised, the access control system grants access and unlocks the car. In this way, the user does not even need to handle the key fob for unlocking the car and can conveniently keep the key fob hidden.

[0004] In passive access control, the initial communication between the car and the key fob can be based on magnetic, i.e. inductive, signals which have a very limited range. In this way, it is prevented that an attacker could gain access of a car in a driveway when a key is located a few metres away, e.g. inside a front door or when a user walks away from the car. It is thus of great importance to have full control of communication range between car and key fob.

[0005] Recently, relay attacks are used to attempt to gain access where passive access control is employed. In relay attacks, one person is located by the car with a first relay device. Another person attempts to be close to a key fob (e.g. by a front door) with a second relay device. If successful, the car communicates, via the relay devices, with the key fob whereby access to the car is granted even without the attackers having physical access to the key fob.

[0006] One known way to reduce the risk of relay attacks is to place the key fob inside a metal enclosure, to block signals from the car or relay device to reach the key fob. However, such metal enclosures are bulky and inconvenient.

SUMMARY



[0007] It is an object to prevent relay attacks of an attacker attempting to gain access to a protected object which is more convenient than prior art solutions.

[0008] According to a first aspect, it is provided a protection device for being provided inside a key fob to selectively inactivate the key fob. The protection device comprises: a first conductive layer; a second conductive layer; an insulator layer between the first conductive layer and the second conductive layer, the insulator layer preventing conductive contact between the first conductive layer and the second conductive layer; and a switch conductively coupled between the first conductive layer and the second conductive layer, the switch being wirelessly controllable to be in a conductive state or a blocking state.

[0009] The switch may be a reed switch.

[0010] The protective device may further comprise a wireless communication module connected to the switch. In such a case, the communication module is configured to receive commands to control the state of the switch.

[0011] The wireless communication module may support communication using any one of Near Field Communication, NFC, Bluetooth or Bluetooth Low Energy, BLE.

[0012] The protection device may be configured to be provided between a pole of a battery of the key fob and a power connector of the key fob.

[0013] The protective device may further comprise a battery, in which case the protective device being provided in contact with one pole of the battery and a corresponding power connector.

[0014] According to a second aspect, it is provided a key fob comprising a battery and the protective device according to any one of the preceding claims. The protective device is then provided in contact with one pole of the battery and a corresponding power connector.

[0015] Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the element, apparatus, component, means, step, etc." are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.

BRIEF DESCRIPTION OF THE DRAWINGS



[0016] Aspects and embodiments are now described, by way of example, with reference to the accompanying drawings, in which:

Fig 1 is a schematic diagram illustrating the use of passive access control in an environment in which embodiments presented herein can be applied;

Fig 2 is a schematic diagram illustrating a relay attack in the environment of Fig 1;

Fig 3 is a schematic diagram illustrating an embodiment of a protection device for preventing a relay attack provided in the key fob of Fig 1 or Fig 2;

Fig 4 is a schematic diagram illustrating components of the protection device of Fig 3 according to one embodiment; and

Fig 5 is a schematic diagram illustrating components of the protection device of Fig 3 according to one embodiment.


DETAILED DESCRIPTION



[0017] The aspects of the present disclosure will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. These aspects may, however, be embodied in many different forms and should not be construed as limiting; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and to fully convey the scope of all aspects of invention to those skilled in the art. Like numbers refer to like elements throughout the description.

[0018] According to embodiments presented herein, a protection device is provided which can be installed inside a key fob between its battery and a power connector. The protection device can be controlled wirelessly to be in a conductive or blocking state to thereby control whether the key fob is active and usable or not. Optionally, the protection device comprises the battery.

[0019] Fig 1 is a schematic diagram illustrating the use of passive access control in an environment in which embodiments presented herein can be applied. A protected object 3 is here in the form of a car. It is to be noted that the protected object can be any other suitable object to which access is controlled, such as any other vehicle, a building, or other secure physical space. Hence, whenever a car is mentioned herein as a protected object, the same principles can be applied to any other protected object.

[0020] The car 3 is secured by locks which are controlled using passive access control. A user 5 keeps a key fob 2 in a pocket or bag, etc. When the car detects the presence of the user, e.g. by the user 5 touching a handle 22 of the car or the key fob 2 coming within communication rage of the car 3, access control is initiated. An access controller 20 of the car receives a signal when the presence of the user or key fob 2 is detected and attempts to communicate wirelessly with any key fob 2 in the vicinity of the car 3. Specifically, the access controller 20 here communicates with the key fob 2 of the user 5 and determines whether the key fob 2 is authorised to unlock the car 3. If this is the case, the access controller 20 unlocks the car 3 and the user can open the door 21.

[0021] As known in the art per se, the communication between the access controller 20 and the key 2 occurs at least initially using inductive (magnetic) signals to thereby effectively control communication range, since the range of inductive signals is very short. RF (Radio Frequency) communication can be used after the initial inductive communication. The inductive interface is thus configured to be short range e.g. to prevent an attacker from unlocking the car when the user is walking away from the car or when a key fob is located a few metres away from the car 3 (e.g. inside a building close to a driveway).

[0022] The passive access control can also be used for starting the car.

[0023] Fig 2 is a schematic diagram illustrating a relay attack in the environment of Fig 1. A first person 30a is located by the car and carries a first relay device 31a. A second person 30b is located close to a key fob 2 with a second relay device 31b. The key fob 2 is physically secured inside a building wall 12 (e.g. by a front door).

[0024] The car 3 sends out a first inductive signal to communicate with any nearby key fobs. The first relay device 31a receives the inductive signal and transmits the signal to the second relay device 32a. In one embodiment, the first inductive signal is transformed the signal to an RF signal and transmitted to the second relay device 32a In one embodiment, the first inductive signal is transformed to an electric signal and is transmitted to the second relay device 32a over a cable. The second relay device 32a receives the signal from the first relay device, converts received signal back to an inductive signal, to which the key fob 2 responds, since the second relay device 32a is sufficiently close. The response from the key fob 2 is picked up by the second relay device 32a transferred in the same way (e.g. via an RF signal or cable) to the first relay device 31a, which transmits a corresponding response to the car 3. The car 3 continues the access control process and will thus unlock the car 3. The car 3 can be started in the same manner.

[0025] Fig 3 is a schematic diagram illustrating an embodiment of a protection device for preventing a relay attack provided in the key fob of Fig 1 or Fig 2.

[0026] The key fob 2 comprises a battery 13 comprising a positive pole 14a and a negative pole 14b. There is a first power connector 15a for connection with the positive pole 14a and a second power connector 15b for connection with the negative pole 14b. The power connectors 15a-b are connected with circuitry 16 to thereby power the circuitry 16. The circuitry 16 comprises components of the key fob to allow it to function as known in the art per se, e.g. for communication and authentication with the car 3.

[0027] According to embodiments presented herein, it is provided a protection device 1 which can be provided between one of the poles 14a-b of the battery 13 and the respective power connector 15a-b, such that any power from the battery to the power connector needs to flow through the protection device 1. In other words, the protective device 1 is provided between the positive pole 14a and the first power connector 15a or the protective device 1 is provided between the negative pole 14b and the second power connector 15b. The protection device 1 is galvanically connected to one of the poles 14a-b and the power connector 15a-b. Optionally, the protection device 1 comprises the battery, which simplifies installation as well as distribution of the protection device 1.

[0028] As explained in more detail below, the protective device 1 can be controlled wirelessly, i.e. through the housing of the key fob, to be in either a conductive state or a blocking state. When in the conductive state, the protection device 1 allows the battery 13 to supply power to the circuitry 16 of the key fob 2, enabling the key fob 2 to function normally. When in the blocking state, the protection device 1 prevents the battery 13 from supplying power to the circuitry 16 of the key fob 2, whereby the key fob is effectively powered off. Hence, when the protective device 1 is in a blocking state, the key fob 2 is incommunicable, effectively preventing any relay attack.

[0029] Fig 4 is a schematic diagram illustrating components of the protection device 1 of Fig 3 according to one embodiment.

[0030] The protection device comprises a first conductive layer 30, a second conductive layer 32 and an insulator layer 31 between the first conductive layer 30 and the second conductive layer 32. The insulator layer 31 prevents conductive contact between the first conductive layer and the second conductive layer.

[0031] A switch 35 is provided, conductively coupled between the first conductive layer 30 and the second conductive layer 32. The switch 35 is wirelessly controllable to be in a conductive state or a blocking state. In this embodiment, the switch is implemented as a reed switch. In this way, the user can apply a magnetic field from a permanent magnet to close the switch, to set the protective device 1 in a conductive state, whenever the key fob should be used. When the magnetic field is not applied, the reed switch is open, whereby the protective device 1 is in the blocking state, preventing any relay attack. Alternatively, the default state is that the switch is closed (i.e. conductive state), and when a magnetic field is applied, the switch opens.

[0032] By using the reed switch, a simple and robust solution is provided which still allows external wireless control using the magnetic field; the protection device 1 does not need any powered circuitry in this embodiment.

[0033] Fig 5 is a schematic diagram illustrating components of the protection device 1 of Fig 3 according to one embodiment. In this embodiment, the protective device 1 comprises a communication module 37 is which configured to receive commands to control the state of the switch 35. The communication module 37 can e.g. support communication using any one or more of Near Field Communication (NFC), Bluetooth or Bluetooth Low Energy (BLE).

[0034] The communication module 37 comprises suitable circuitry and antennas for communication as well as to control the state of the switch 35 based on the communication. The communication module 37 can comprise processing capability, an application specific integrated circuit (ASIC) and/or a field programmable gate array (FPGA). In one embodiment, the communication module 37 is implemented using a microcontroller unit (MCU). The communication module 37 is powered by connecting to both poles of the battery of the key fob. In one embodiment, the communication module 37 is external to the key fob and the switch is a reed switch. The communication module 37 then controls the state of the switch by generating a magnetic field. In this case, the communication module 37 can have its own battery.

[0035] The commands can be received by the communication module 37 e.g. from an application (i.e. app) executing on a smartphone 7. In this way, the user can control the state of the protection device by using the application. The commands can directly control the switch to set the protection device 1 in blocking mode or conductive mode as desired, controlled by the user using the app.

[0036] Furthermore, the commands can cause the protection device 1 to adopt a schedule, controlling when to be in the blocking state and when to be in a conductive state. The schedule is stored in the communication module 37 and is applied to control the state of the protective state 1 accordingly. This allows the user to set a default schedule when the protection device should be in the conductive state, e.g. when the user typically uses the car to drive to or from work. At other times, the protection device is in the blocking state (unless manually changed using the application in the smartphone), during which relay attacks are prevented.

[0037] The aspects of the present disclosure have mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims. Thus, while various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.


Claims

1. A protection device (1) for being provided inside a key fob (2) to selectively inactivate the key fob (2), the protection device comprising:

a first conductive layer (30);

a second conductive layer (32);

an insulator layer (31) between the first conductive layer (30) and the second conductive layer (32), the insulator layer (31) preventing conductive contact between the first conductive layer and the second conductive layer; and

a switch (35) conductively coupled between the first conductive layer (30) and the second conductive layer (32), the switch (35) being wirelessly controllable to be in a conductive state or a blocking state.


 
2. The protection device (1) according to claim 1, wherein the switch (35) is a reed switch.
 
3. The protective device (1) according to claim 1, further comprising a wireless communication module (37) connected to the switch (35), wherein the communication module (37) is configured to receive commands to control the state of the switch (35).
 
4. The protective device (1) according to claim 3, wherein the wireless communication module (37) supports communication using any one of Near Field Communication, NFC, Bluetooth or Bluetooth Low Energy, BLE.
 
5. The protective device (1) according to any one of the preceding claims, wherein the protection device is configured to be provided between a pole (14a-b) of a battery (13) of the key fob (2) and a power connector (15a-b) of the key fob (2).
 
6. The protective device (1) according any one of the preceding claims, further comprising a battery, wherein the protective device (1) being provided in contact with one pole (14a-b) of the battery (13) and a corresponding power connector (15a-b).
 
7. A key fob (2) comprising a battery (13) and the protective device (1) according to any one of the preceding claims, the protective device (1) being provided in contact with one pole (14a-b) of the battery (13) and a corresponding power connector (15a-b).
 




Drawing










Search report









Search report