Method and system for opening and/or using at least one vehicle

ABSTRACT

A method for opening and/or using at least one vehicle may include receiving, by a mobile terminal, an identifier assigned to a target vehicle. The identifier may be transmitted to a server, and a key data set may be received from the server. The key data set and/or a code based on the key data set may be transmitted as a remote code to the target vehicle. The target vehicle may generate at least one local code after receiving the remote code, and may compare the remote code to the local code(s). The target vehicle may be opened and/or released, or a vehicle command may be executed if at least one of the local codes corresponds to the remote code.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a U.S. national-stage application, under 35 U.S.C. §371, of PCT International Patent Application No. PCT/EP2017/071016,filed on Aug. 21, 2017, which claims priority from German PatentApplication 10 2016 116 042.3, filed on Aug. 29, 2016. The entirecontents of these applications are incorporated herein by reference intheir entirety.

BACKGROUND OF THE INVENTION

The invention relates to a method and a system for opening and/or usingat least one vehicle.

Battery operated vehicles, in particular electric bicycles (so-calledE-bikes) and passenger automobiles or electrically driven scooters areenjoying great popularity.

In motor vehicles, keyless go systems having an electronic bit-free keyhave become widespread. In this case, the bit-free key can open and locka vehicle contactlessly. The vehicle can also be released for startingvia radio.

In common keyless go systems, pseudorandom number generators, which areinitialized with an equal seed value, are located on the bit-free keyand on the vehicle. A seed value represents a starting value for arandom number generator, with which it is initialized. The pseudorandomnumber generators thus generate the same numeric sequence on thebit-free key and on the vehicle.

To open the vehicle, the bit-free key generates a remote code which istransmitted via radio to the vehicle. The vehicle generates a local codeusing the seed value stored on the vehicle upon receipt and compares itto the received remote code. If the two codes are identical, the vehicleis thus opened.

One disadvantage of the bit-free key is that the seed key is permanentlyprogrammed therein upon delivery of the vehicle and/or the key to thecustomer.

The bit-free key therefore may not be used in car sharing services, inwhich a plurality of customers shares the same vehicle.

Car sharing providers use, on the one hand, an RFID-based solution, inwhich the driver has to hold a card having integrated RFID chip to aread device on the vehicle. The card transmits a code to the vehicle,which is transmitted from the vehicle via an Internet connection to aserver and is checked thereby. If the code is known, the server thustransmits a corresponding command to the vehicle and the vehicle isopened.

On the other hand, car sharing providers use applications on mobileterminals, for example, smart phones, to open the vehicle. In this case,the user transmits, for example, a request to open a vehicle to aserver, which carries out a user authentication and, upon successfulauthentication, transmits a command to open the vehicle to the vehicle.

To use car sharing services, it is therefore necessary to either carryalong an additional card or to have an Internet connection, which isprovided by a smart phone and the vehicle.

An offline communication between mobile terminal and vehicle hasheretofore not been possible.

Proceeding from the prior art, it is the object of the present inventionto provide a system and a method which address the above-describeddisadvantages. In particular, it is the object of the present inventionto provide a system and method which enable a driver to open a vehiclewithout existing Internet connection by way of a mobile terminal.Furthermore, fleet operators are to be enabled to carry out utilizationplans, even if the drivers do not have an Internet connection.

BRIEF SUMMARY OF THE INVENTION

The object is achieved by a method comprising the following steps:

a) receiving, by a mobile terminal, in particular a smart phone, of anidentifier, which is assigned to a target vehicle;

b) transmitting the identifier, in particular via a mobile wirelessnetwork, to a server;

c) receiving of a key data set from the server, in particular by amobile terminal;

d) transmitting the key data set and/or a generated code based on thekey data set as a remote code to the target vehicle, in particular via adirect connection and/or ad hoc network between the target vehicle andthe mobile terminal;

e) receiving of the remote code by the target vehicle;

f) generating of at least one local code by the target vehicle;

g) comparing of the remote code to at least one local code by the targetvehicle;

h) opening and/or releasing the target vehicle and/or executing avehicle command on the target vehicle if at least one of the local codescorresponds to the remote code.

One essential advantage of the invention is that a connection forcommunication exists between the target vehicle and the mobile terminal,for example, a direct connection and/or an ad hoc network. The mobileterminal can therefore transmit a code for opening the target vehicle tothe target vehicle without requiring an Internet connection. The targetvehicle also does not have to have an Internet connection, whereby inparticular the power consumption of the vehicle in standby operation isreduced and no costs arise for establishing an Internet connection inthe vehicle.

According to the invention, the entire step b) can be optional. Theeffect according to the invention may also be achieved if only a groupselection of target vehicles is transmitted to the server instead of theidentifier and the server, based on the group selection, selects aspecific target vehicle having associated identifier. The groupselection can take place in the form of the specification/transmissionof a vehicle type (boat, bicycle, automobile) and/or a location (allvehicles, those which are stationed in Augsburg, Bremen, or Munich),and/or a chronological availability (available for rent on Friday). Themethod according to the invention can in this form comprise the step ofselecting a target vehicle in consideration of the transmitted groupselection. If multiple vehicles should be available which meet the groupcriteria, the selection can be performed within this group randomly orbased on further parameters, for example, utilization of the vehicle.The identifier is preferably then communicated to the mobile terminal.

A further advantage of the invention is that the mobile terminal has atan early time the code for opening or releasing the target vehicleand/or executing the vehicle command on the target vehicle. The drivercan thus, for example, receive the key data set from the server on themobile terminal at home, when he is connected via a WLAN connection tothe Internet.

The described method can be used for the purpose of operating a varietyof vehicles. In particular, fleet operators (for example, rental carcompanies, company pools consisting of passenger automobiles, bicycles,and E-bikes) can efficiently plan the utilization of their fleet bysupplying users of vehicles with corresponding codes early and the usagetime can be used beforehand in the utilization planning. In particularin environments in which users do not have a continuous Internetconnection, for example, on the water or golf clubs in rural areas, theuse of the described method is advantageous. For example, if a mobileterminal is used for the purpose of starting a boat, for example amotorboat, it is often not guaranteed that an Internet connectionexists.

Due to the early code transmission, the method can also reasonably beused for vacation resorts or golf clubs or family or social communitysharing models. Thus, a vacation resort can manage, for example, allrental travel objects in the water and on the ground and manage theallocation efficiently (for example, golf carts, boats, bicycles,E-bikes, rental cars, other electrically driven water vehicles) andreduce the management costs and maximize the utilization of the objectsby way of the model, since the allocation can take place automatically.Community sharing options for friends or club members also result, whojointly manage the usage of valuable vehicles in a pool. A community canthus jointly access, for example, golf carts, water vehicles, andE-bikes.

In one embodiment, the mobile terminal is a smart phone which can beequipped with an app, which provides the corresponding functionality.The vehicle command to be executed can involve a variety of differentcommands. For example, opening or locking the vehicle, starting themotor, opening or closing the luggage compartment or closed spaces of aboat, respectively, activating a heating/climate control system and/oractivating or deactivating an alarm system or activating electricalassemblies (for example, cable winch of a sailboat, outboard motor). Thedescribed method is therefore very flexibly usable.

In one embodiment, the local code and/or the remote code can begenerated by a rolling code method and/or can be generated based on arolling code method.

A rolling code method enables the prevention of so-called “replay”attacks. In replay attacks, an attacker intercepts the communicationbetween the mobile terminal and the vehicle. The attacker can then lateruse the recorded communication to open the vehicle. A rolling codemethod offers the advantage that a new remote code or local code is usedin every communication between mobile terminal and vehicle. For thispurpose, for example, the KeeLoq algorithm or the Dual KeeLoq algorithmcan be used.

In one embodiment, the key data set can comprise a seed key, wherein thekey data set can be received by a/the mobile terminal and the mobileterminal can generate the remote code using the seed key.

In the described embodiment, a seed key is thus communicated to themobile terminal. Using the seed key, in particular by means of apseudorandom number generator, the mobile terminal can generate aplurality of remote codes in a rolling code method. The server itselfthus does not provide a remote code, but rather the mobile terminalgenerates this itself. This has the advantage that the mobile terminalcan continuously generate new remote codes without a connection to theserver.

In one embodiment, a first and multiple further local codes can begenerated and opening and/or release of the target vehicle cannot takeplace only if none of the local codes corresponds to the remote code.

In the described embodiment, multiple local codes can thus be generated,which can be compared to the remote codes. The vehicle is opened and/orreleased or a command is executed on the vehicle, respectively, only ifnone of the generated local codes corresponds to the received remotecode. The described embodiment has the advantage that the susceptibilityto error of the method is reduced. It is thus possible, for example,that transmission errors during the transmission of the remote code canbe compensated for. For example, it can occur during use of a rollingcode method that the mobile terminal and the vehicle are notsynchronized. This means that the mobile terminal transmits a remotecode which the vehicle has not yet generated. This occurs if theconnection breaks off during the transmission of the remote code.

In the described embodiment, the vehicle can generate, for example, thenext 1000 local codes, preferably 256, more preferably 64 local codes,and compare them to the received remote code.

In one embodiment, the remote code can lose its validity after one-timeuse by the target vehicle. To ensure the restarting after shutdown ofthe vehicle, a time-limited coupling of the mobile terminal can then beused. In another or additional embodiment, the vehicle provides a(further) secret after the (first) opening/release via the directconnection and/or the ad hoc network, which is preferably stored on themobile terminal and is used for renewed opening/release. In oneembodiment, a vehicle embodies at least two states for implementing thismechanism. In a first state, the vehicle or an arbitrary component ofthe vehicle can only be opened or released by means of a remote code ofthe server. After the successful verification of this remote code, thevehicle assumes the second state, in which opening/release is possibleby means of the (further) secret. This state can be time-limited, forexample, to the booking timeslot, the validity of the remote code, etc.Alternatively or additionally, the vehicle implements a method in whichit leaves the second state after a user input or the receipt of acommand from the mobile terminal and returns back into the first state.The user can thus end the booking early via a manual input.

In (another) embodiment having enhanced security for the renewedopening/release, a further remote code is generated and transmitted bythe server. The further remote code can be time-limited (for example,1-10 minutes) and can ensure, for example, the restart of the vehicle.The chronological authorization of the user can be checked by the serverupon the renewed code generation. In another embodiment, multiple remotecodes, which are valid in succession, are already received in step c).These multiple remote codes are preferably stored on the mobileterminal, so that after the “consumption” of the first remote code, a(renewed) opening/release can be performed using a following remotecode, preferably already stored on the terminal.

It is advantageous if the received remote code or optionally allpreviously generated remote codes lose their validity as soon as aremote code has been used. It is thus further ensured that replayattacks are not possible.

In one embodiment, a remote code can lose its validity after a definedtime span.

It is thus possible in one embodiment that a remote code only has alimited validity. The remote code can either be valid for an infinitelylong time or, for example, can be valid less than 5 or 10 minutes,preferably less than 1 minute, and more preferably less than 10 seconds.It is possible by way of the described embodiment that the vehicleoperator restricts the time during which a driver can use the vehicle.The above-described mechanisms for (renewed) opening/release can also beused in this context.

The remote code (43, 43′, 43″) can alternatively or additionally only beusable for opening and/or releasing the target vehicle within apredefined time interval.

In one embodiment, the target vehicle and the server or the mobileterminal and the server can each have timers, which are in particularsynchronized with one another, wherein a remote code and a local codecan each be generated continuously at equal time intervals.

Mobile terminal, target vehicle, or server can thus have timers, whereina timer can be implemented by a clock according to the prior art. Thetimers are each synchronized with one another either between targetvehicle and server or between mobile terminal and server. The mobileterminal and the server or the target vehicle and the server accordinglyhave the same time perception in the described embodiment.

This can be used so that remote codes or local codes, respectively, caneach be generated at identical points in time. It is thus possible inthe described embodiment that new remote codes and/or local codes aregenerated every 5 or 10 minutes or every minute or every 10 seconds.This further enhances the security.

In one embodiment, the method can comprise the transmission of a commanddata set from the mobile terminal to the target vehicle, wherein thecommand data set can comprise at least one vehicle command. Furthermore,in one embodiment, the method can comprise the reception of the commanddata set by the target vehicle. Moreover, in one embodiment, the methodcan comprise the execution of the at least one vehicle command if thelocal code corresponds to the remote code.

It is thus possible using the described embodiment to execute anarbitrary number of vehicle commands using a single remote code. Thequantity of data to be transmitted is thus reduced by the describedembodiment.

In one embodiment, the direct connection can be designed as a Bluetoothconnection, an infrared connection, an NFC connection, or as a WLANconnection.

The mentioned connection types have the advantage that they representknown technologies which are supported by a variety of mobile terminals.

In one embodiment, step d) can comprise the transmission of a futurepoint in time, wherein the generated remote code is valid at the futurepoint in time.

It is thus possible to generate not only remote codes which are valid atthe point in time of the generation, but rather also remote codes whichonly acquire validity in the future. It is thus possible that a driver,for example, receives a remote code on an existing Internet connectionfrom the server and uses it at a later point in time when an Internetconnection no longer reliably exists. This enhances the transmissionreliability and also enables early usage planning of the vehicles by theoperator/owner.

In one embodiment, the remote code can be valid within a time window,for example, around the future point in time.

It is thus possible that the remote code is valid not only precisely ata future point in time, but rather that the remote code is valid withina time span, for example, every 60 or 30 or 5 minutes or 1 minute long.This has the advantage that only a single remote code has to begenerated for a certain duration. Alternatively, the time window canspecify a beginning of a release/opening and a maximum usage duration.It is possible to plan when which driver has access to a vehicle,wherein the remote codes can be assigned in arbitrary sequence. In thiscontext, the server is thus designed to generate multiple remote codesfor different usage time periods and/or users and/or mobile terminals.The corresponding remote codes can then have a one-time validity or anongoing validity in the time period. In the embodiment having theone-time validity, the above-described mechanisms for renewedopening/release can be used.

In one embodiment, the vehicle can have first and second key data forgenerating a first key sequence or second key sequence, respectively.The method can furthermore comprise:

-   -   receiving key information, in particular by the mobile terminal        at the vehicle;    -   selecting the first or second key data using the key        information;    -   generating at least one local code using the selected key data;    -   comparing the at least one generated local code to the received        remote code;    -   opening and/or releasing and/or executing a vehicle command if        the remote code corresponds to the at least one generated local        code of the selected key data.

When the items of key information are transmitted to the vehicle, thevehicle can select first or second key data using the items of keyinformation. On the basis of the key data, the vehicle can generate alocal code, which is then compared to the received remote code.

It is possible by way of the described embodiment that a drivertransmits, for example, a validity duration of the remote key as keyinformation to the vehicle. The vehicle can check whether a generatedlocal key, which corresponds to the validity duration, corresponds tothe remote key. A simple option is thus offered for communicating thevalidity duration of a key to the vehicle.

The object is furthermore achieved by a computer-readable storagemedium, which contains instructions which cause at least one processorto implement one of the above-described methods when the instructionsare executed by at least one processor.

Similar or identical advantages result as were already described withthe above method.

The object is furthermore achieved by a system for opening and/or usinga vehicle, comprising:

-   -   at least one server, which comprises a database and is designed        to receive at least one identifier from at least one mobile        terminal, wherein the server is designed to determine a target        vehicle using the database and the identifier;    -   a vehicle, having the following:    -   a storage unit;    -   a vehicle communication unit, which is designed to receive a key        data set and/or a code generated based on the key data set as a        remote code via a direct connection and/or via an ad hoc        network;    -   a vehicle processing unit, which is designed to generate a local        code and is furthermore designed to compare the remote code to        the local code. In this case, the vehicle processing unit is        furthermore designed to open and/or release the vehicle and/or        to execute a vehicle command if the remote code and the local        code correspond.

In one embodiment, the local code and/or the remote code can begenerated by a rolling code method, for example, by the KeeLoq algorithmor the Dual KeeLoq algorithm, and/or can be generated based on a rollingcode method.

In one embodiment, the key data set can comprise a seed key.Furthermore, the system can comprise a mobile terminal, wherein themobile terminal can comprise:

-   -   a terminal communication unit, which can be designed to receive        a key data set;    -   a terminal processing unit, which can be designed to generate        the remote code using the seed key, in particular by means of a        pseudorandom number generator.

Similar or identical advantages result as were already described inconjunction with the above-described methods.

The described system can be designed to implement the above-describedmethods.

Further embodiments result from the dependent claims.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The foregoing summary, as well as the following detailed description ofthe invention, will be better understood when read in conjunction withthe appended drawings. For the purpose of illustrating the invention,there are shown in the drawings embodiments which are presentlypreferred. It should be understood, however, that the invention is notlimited to the precise arrangements and instrumentalities shown. In thedrawings:

FIG. 1 shows a schematic view of the system according to the invention;

FIG. 2 shows a schematic view of a bicycle;

FIG. 3 shows a schematic view of a mobile terminal;

FIG. 4 shows a schematic view of a server;

FIG. 5 shows an exemplary database table;

FIG. 6 shows a flow chart for a method for opening a vehicle;

FIG. 7 shows a schematic view of the validity duration of remote codes;

FIG. 8 shows a chronological representation of the validity duration ofa remote code;

FIG. 9 shows a database table having various seed keys;

FIG. 10 shows a schematic illustration of various key sequences; and

FIG. 11 shows a schematic illustration of a vehicle and a mobileterminal without Internet connection.

DETAILED DESCRIPTION OF THE INVENTION

The same reference signs are used hereafter for identical or identicallyacting parts.

FIG. 1 shows a schematic illustration of a system 1 for opening avehicle 10 using a mobile terminal 20. The vehicle 10 is designed as abicycle 10 in the described exemplary embodiment. Furthermore, thesystem 1 has a mobile terminal 20, which is designed in the presentexemplary embodiment as a smart phone 20. The smart phone 20 isconnected via a mobile wireless connection 5 to a server 30.

The mobile wireless connection 5 can be a mobile wireless connectionaccording to the LTE, UMTS, or GSM standard. Furthermore, the connection5 can also be any further conceivable Internet connection. Theconnection 5 can be designed as wireless or wired.

To open the bicycle 10, the smart phone 20 requests an identifier 15from the bicycle 10. This identifier is transmitted via a directconnection 2 in the described exemplary embodiment. In this case, thisis a Bluetooth connection in the present example. The smart phone 20 istherefore located within a receiving radius of the bicycle 10 to requestthe identifier, since otherwise a Bluetooth connection 6 could not beestablished.

In other exemplary embodiments, the direct connection 2 can also be aWLAN connection 4 or an ad hoc network 3.

The identifier 15 ensures a unique identification of the bicycle 10. Theidentifier 15 can therefore be a global unique identifier (GUID). It isnot necessary to use a globally unique identifier. A number unique inthe described system is also possible.

The smart phone 20 transmits the received identifier 15 to the server 30and requests a remote code 43 from the server 30. In the presentexemplary embodiment, the smart phone 20 transmits the identifier 15 viaan LTE connection 5 to the server 30.

The server 30 thereupon executes a data query, wherein a remote code 43is generated using the received identifier 15. For this purpose, theserver 30 has a seed key stored in a database for every vehicle. Using apseudorandom number generator, the server 30 generates a remote code 43which can be used only by the bicycle 10.

The server 30 transmits the generated remote code 43 to the smart phone20.

In other exemplary embodiments, the server 30 can transmit a key dataset 40 to the smart phone 20 instead of the remote code 43. The key dataset 40 can comprise the seed key in this case. The smart phone 20 canthus also be used for the purpose of generating a remote code 43.

In a further exemplary embodiment, the server 30 transmits not only oneremote code 43 to the mobile terminal 20, but rather a plurality ofremote codes.

The communication between mobile terminal 20 and server 30 can also bedesigned as encrypted, for example, by way of an asymmetrical encryptionmethod such as PGP. The mobile terminal 20 and the server can thus eachstore a private key, wherein the messages between mobile terminal 20 andthe server 30 are encrypted by a public key. The private keys are eachused to decrypt the messages.

The transmitted key data set 40 can thus comprise an encrypted remotecode 43.

The smart phone 20 can use the received remote code 43 to unlock thebicycle 20. For this purpose, the smart phone 20 transmits the receivedremote code 43 via a Bluetooth connection 6 to the bicycle 10. As shownin FIG. 2, the bicycle 10 has a vehicle communication unit 11, via whichthe remote code 43 can be received.

In the present exemplary embodiment, the vehicle communication unit 11is designed as a Bluetooth module. The bicycle 10 furthermore has astorage unit 17, in which the remote code 43 is written after receptionby the vehicle communication unit 11. Using a pseudorandom numbergenerator 14, the bicycle 10 can generate a local code 42, which iscompared by a vehicle processing unit 12 to the received remote code 43.If remote code 43 and local code 42 correspond, the bicycle 10 is thusunlocked. The power supply of the bicycle 10 is furthermore ensured viaa battery 16.

FIG. 3 shows a schematic illustration of a mobile terminal 20. Themobile terminal 20 comprises a terminal communication unit 21, which isdesigned in the present exemplary embodiment as a Bluetoothcommunication unit 21. The terminal communication unit 21 has acommunicative connection to a terminal storage unit 23. The mobileterminal 20 furthermore has a terminal processing unit 22, which has acommunicative connection to the terminal storage unit 23.

In one exemplary embodiment, the mobile terminal 20 can also have apseudorandom number generator 24. Using the pseudorandom numbergenerator 24, the mobile terminal is capable of independently generatingremote codes 43.

FIG. 4 shows the schematic illustration of a server 30. The server 30has a server communication unit 33, which is designed in the presentexemplary embodiment to provide an Internet connection. The servercommunication unit 33 has communicative connection to a server storageunit 31, in which a database 32, 32′ (see FIGS. 5 and 9) is stored. Theserver 30 furthermore has a server processing unit 34. The server 30 isalso designed in one exemplary embodiment to generate remote codes 43using a pseudorandom number generator. In a further exemplaryembodiment, however, a large number of remote codes 43 can also bestored in the database 32.

FIG. 5 shows a database table of the database 32, which is stored on theserver 30. The illustrated database table comprises two columns, whereinvehicle identification numbers 15, 15′, 15″ are stored in a firstcolumn. A seed key 45, 45′, 45″ is assigned to each vehicleidentification 15, 15′, 15″. Since a vehicle identification number 15,15′, 15″ is uniquely assigned to each vehicle, a corresponding seed key45, 45′, 45″ is assigned to each vehicle 10 via the database 32.

In one exemplary embodiment, the server 30 determines the associatedseed key 45, 45′, 45″ after receiving a vehicle identification 15, 15′,15″. Using the determined seed key 45, 45′, 45″, the server 30 generatesa remote code 43, which is transmitted via the server communication unit33 to the smart phone 20.

In other exemplary embodiments, the server 30 directly transmits thedetermined seed key 45, 45′, 45″.

FIG. 6 shows a flow chart which illustrates the steps for opening avehicle 10.

In step S1, a mobile terminal 20 receives an identifier 15 from avehicle 10. The identifier 15 is transmitted in step S2 via a mobilewireless network 5 to the server 30. In step S3, the server 30 generatesa remote code 43 and transmits the remote code 43 to the mobile terminal20.

In a further exemplary embodiment, the server 30 transmits a seed key 45to the mobile terminal. In still another exemplary embodiment, theserver 30 transmits a plurality of remote codes 43 to the mobileterminal 20.

After the reception of the remote code 43 from the server 30 on themobile terminal 20, the mobile terminal 20 transmits the remote code 43to the vehicle 10 in step S4. The transmission is executed in thepresent exemplary embodiment via a WLAN.

In step S5, the vehicle 10 receives the remote code 43 and, in step S6,generates a local code 42. In step S7, the generated local code 42 andthe received remote code 43 are compared to one another. If the twocodes do not correspond, an error message is thus transmitted to themobile terminal 20 in step S9. In a further exemplary embodiment, acounter can be incremented in step S9, so that after a number ofattempts, preferably three attempts, the vehicle is permanently locked.

If the generated local code 42 and the received remote code 43correspond, the vehicle 10 is thus opened in step S8. In one exemplaryembodiment, a control electronics unit can be used during the opening toactuate a positioning motor which opens a lock. Alternatively, amagnetic lock can also be used.

In a further exemplary embodiment, an arbitrary vehicle command can beexecuted in step S8, which was transmitted together with the remote code43 to the vehicle 10 in step S4.

In subsequent step S10, the received remote code is (optionally) markedas invalid. This means that upon a further reception of the same remotecode 43, it no longer functions. If a rolling code method is used, notonly the present remote code 43 thus becomes invalid, but rather allremote codes lying before it with respect to time are also marked asinvalid.

FIG. 7 schematically shows the generation of local codes 42, 42′, 42″and remote codes 43, 43′, 43″ in one exemplary embodiment, in whichsynchronized timers 13, 24 are used to generate remote and/or localcodes at continuous time intervals. In the present exemplary embodiment,the vehicle 10 and the mobile terminal 20 comprise timers 13, 24 whichare synchronized. At a first point in time T1, a remote code 43 isgenerated on the mobile terminal 20 and a local code 42 is generated onthe vehicle 10. After passage of a validity duration 47, the local code42 and the remote code 43 are marked as invalid. Subsequently, a newlocal code 42 and a new remote code 43 are generated at the point intime T2. These are in turn marked as invalid after passage of thevalidity duration 47, whereupon a new local code 42″ and a new remotecode 43″ are subsequently generated.

Because the remote and local codes are each marked as invalid, it isabsolutely necessary for the timers 13, 24 used to be synchronized. Thesynchronization of the timers 13, 24 can be carried out either by acorresponding protocol during operation or upon delivery of theindividual components.

FIG. 8 shows an exemplary embodiment in which a generated remote code 43is valid in a time window TF around a point in time T. It is thuspossible that a point in time T is defined for a remote code 43 at whichthe remote code 43 is to be valid. Furthermore, it is possible to definea time window TF, for example, 5 minutes, which is used as a buffer oralso lending duration. The remote code 43 can then only be used in theperiod of time T-TF and T+TF for opening a vehicle 10. Point in time Tand duration TF can be transmitted as information with the remote code43 from the mobile terminal 20 to the vehicle 10.

FIG. 9 shows a table of a database 32′, in which a plurality of seedkeys 45, 45′, 45″ of different types are assigned to a vehicle 10. Anidentifier 15 is assigned to three seed keys 45, 45′, 45″ in the exampleshown. One seed key type 48, 48′, 48″ specifies the validity duration ofthe remote code 43 generated using the seed keys 45, 45′, 45″.

For example, the seed key type 48 can specify that the remote codes 43which are generated using the seed key 45 have a validity of 30 minutes.Generated remote codes of the key type 48′ can have a validity of 60minutes and remote codes of the key type 48″ can have a validity of 3hours. The mobile terminal 20 generates a remote code 43 on the basis ofthe seed key 45, 45′, 45″ received from the server 30.

The remote code 43 is transmitted to the vehicle 10. In order that thevehicle 10 can determine from which type 48, 48′, 48″ the remote code 43is, the vehicle 10 has the same seed keys 45, 45′, 45″ as the server 30.The vehicle 10 generates local codes K1 to K6 for all seed keys 45, 45′,45″ and compares the received remote code 43 to all generated localcodes K1 to K6. Depending on which local code K1 to K6 corresponds tothe received remote code 43, the vehicle can determine by which seed key45, 45′, 45″ the local code K1 to K6 was generated. It may therefore beestablished by the comparison from which key type 48, 48′, 48″ thereceived remote code 43 is.

If it is established, for example, that the received remote code 43 isfrom the type 48′, the vehicle 10 is thus released for 60 minutes.

In one exemplary embodiment, the mobile terminal 20 transmits the keytype 48, 48′, 48″ as information to the vehicle 10 together with theremote code 43. The vehicle 10 can then establish using the received keytype 48, 48′, 48″ which seed key 45, 45′, 45″ it has to use to generatea local code 45.

FIG. 10 shows various key sequences 46, 46′ 46″, which were generated onthe vehicle 10. Each key sequence 46, 46′ 46″ is a seed key 45, 45′,45″, which are each assigned to a different key type 48, 48′, 48″.

FIG. 11 shows how a smart phone 20 can open a bicycle 10 without anexisting Internet connection to a server 30. A remote code 43 is storedon the smart phone 20. The remote code 43 can be transmitted by means ofa Bluetooth connection 6, a WLAN connection, or via an ad hoc network 3to the bicycle 10. The bicycle 10 compares the received remote code 43to a generated local code 42 and releases the bicycle 10 accordingly.

It will be appreciated by those skilled in the art that changes could bemade to the embodiments described above without departing from the broadinventive concept thereof. It is understood, therefore, that thisinvention is not limited to the particular embodiments disclosed, but itis intended to cover modifications within the spirit and scope of thepresent invention as defined by the appended claims.

LIST OF REFERENCE SIGNS

-   1 system-   2 direct connection-   3 ad hoc network-   4 WLAN-   5 mobile wireless network-   6 Bluetooth connection-   10, 10′, 10″ vehicle, target vehicle, bicycle-   11 vehicle communication unit-   12 vehicle processing unit-   13, 24 timer-   14, 24 pseudorandom number generator-   15, 15′, 15″ identifier-   16 battery, power supply-   17, 31 storage unit-   20 mobile terminal, smart phone-   21 terminal communication unit-   22 terminal processing unit-   23 terminal storage unit-   30 server-   32, 32′ database-   33 server communication unit-   34 server processing unit-   40 key data set-   41 code-   42, 42′, 42″ local code-   43, 43′, 43″ remote code-   K1, K2 key from the type 48-   K3, K4 key from the type 48′-   K5, K6 key from the type 48″-   45, 45′, 45″ seed key-   46, 46′, 46″ key sequence-   47 validity duration-   48, 48′, 48″ key type-   50 command data set-   51 vehicle command-   TS time span-   TA time intervals-   T, T1, T2, T3 point in time-   TF time window-   S1, S2, S3, step-   S4, S5, S6,-   S7, S8, S9,-   S10

What is claimed is:
 1. A method for opening and/or using at least onevehicle, comprising: a) receiving, by a mobile terminal, an identifier,which is assigned to a target vehicle; b) transmitting the identifier,via a mobile wireless network, to a server; c) receiving, by the mobileterminal, a key data set from the server, wherein the key data setcomprises a seed key, and wherein the mobile terminal generates a remotecode using the seed key, by means of a pseudorandom number generator; d)transmitting to the target vehicle the key data set and/or a codegenerated based on the key data set as the remote code, via a directconnection and/or an ad hoc network between the target vehicle and themobile terminal; e) receiving the remote code by the target vehicle; f)generating at least one local code by the target vehicle; g) comparingthe remote code to the at least one local code by the target vehicle; h)opening and/or releasing the target vehicle and/or executing a vehiclecommand on the target vehicle upon determining that the at least onelocal code corresponds to the remote code.
 2. The method according toclaim 1, wherein generating the at least one local code and/or theremote code comprises generating the at least one local code and/or theremote code using a rolling code method and/or based on a rolling codemethod.
 3. The method according to claim 1, wherein the at least onelocal code comprises a first and multiple further local codes, andwherein opening and/or release of the target vehicle does not take placeonly upon determining that none of the local codes corresponds to theremote code.
 4. The method according to claim 1, wherein the directconnection is designed as a Bluetooth connection, an infraredconnection, or a WLAN connection.
 5. The method according to claim 1,wherein d) comprises transmitting a specification with respect to apoint in time or time window and/or c) comprises receiving an indicationwith respect to a point in time or time window, wherein the generatedremote code is valid at the point in time or during the time window. 6.The method according to claim 1 wherein the vehicle has first and secondkey data for generating a first key sequence or second key sequence,respectively, wherein the method further comprises: receiving keyinformation by the mobile terminal at the vehicle; selecting the firstor second key data using the key information; generating at least onecode of the at least one local code using the selected key data;comparing the at least one generated local code to the received remotecode; and opening and/or releasing the vehicle and/or executing avehicle command upon determining that the remote code corresponds to theat least one generated local code of the selected key data.
 7. Acomputer-readable storage medium, which contains instructions whichcause at least one processor to implement the method according to claim1 when the instructions are executed by the at least one processor. 8.The method according to claim 1, wherein the remote code loses itsvalidity after one-time use by the target vehicle or loses its validityafter a defined time span, or the remote code is only usable for openingand/or releasing the target vehicle within a predefined time window. 9.The method according to claim 4, wherein 1) the target vehicle and theserver or 2) the mobile terminal and the server have timers that areeach synchronized with one another, wherein the remote code and the atleast one local code are generated continuously at equal time intervals.10. The method according to claim 1, wherein the method furthermorefurther comprises: transmitting a command data set from the mobileterminal to the target vehicle, wherein the command data set comprisesat least the vehicle command; receiving the command data set by thetarget vehicle; and executing at least the vehicle command upondetermining that the at least one local code corresponds to the remotecode.
 11. The method according to claim 10, wherein the remote code isvalid within a time window.
 12. A system for opening and/or using avehicle, comprising: at least one server, which comprises a database,and which receives at least one identifier from at least one mobileterminal, wherein the server determines a target vehicle using thedatabase and the identifier; and a vehicle, including the following: astorage unit; a vehicle communication unit which is designed to receivea key data set and/or a code generated based on the key data set as aremote code via a direct connection and/or via an ad hoc network,wherein the key data set comprises a seed key, and wherein the mobileterminal generates the remote code using the seed key, by means of apseudorandom number generator; and a vehicle processing unit designed togenerate a local code and to compare the remote code to the local code;wherein the vehicle processing unit furthermore opens and/or releasesthe vehicle and/or executes a vehicle command upon determining that theremote code and the local code correspond.
 13. The system according toclaim 12, wherein the local code and/or the remote code are generated bya rolling code method, and/or are generated based on a rolling codemethod.
 14. The system according to claim 12, wherein the key data setcomprises a seed key, and wherein the system further comprises a mobileterminal, wherein the mobile terminal comprises: a terminalcommunication unit, which to receives the key data set; and a terminalprocessing unit, which generates the remote code using the seed key, bymeans of a pseudorandom number generator.