Vehicle access with selective jamming radio signal

ABSTRACT

A jamming radio signal is selectively outputted based on an access signal. The jamming radio signal is configured to prevent an interrogation signal of a vehicle to complete an authentication of a vehicle key of the vehicle.

BACKGROUND INFORMATION

This application is a continuation of U.S. non-provisional patentapplication Ser. No. 16/533,426 entitled “Interfering Radio and VehicleKey Locker” and filed Aug. 6, 2019. Application Ser. No. 16/533,426 ishereby incorporated by reference.

BACKGROUND INFORMATION

Increasingly, different vehicle-sharing services are providingopportunities to access vehicles. Some vehicle-sharing services provideaccess by the minute, hour, and/or days. Some vehicle-sharing servicesprovide a fleet of vehicles that are accessed by consumers. Othervehicle-sharing services are peer-to-peer. In some contexts, a companypossesses a fleet of vehicles and desires to selectively provide accessto different operators or employees for specific periods of time.

In vehicle-sharing contexts, logistical challenges arise from physicallyproviding a vehicle key to the intended driver for the proper amount oftime. Additionally, providing the vehicle key to a driver may limitaccess of the vehicle to a different driver who would be authorized touse the vehicle. Furthermore, providing the key to the vehicle exposesthe provider to risk that the key will be copied or retained formalicious purposes. Yet an additional risk of providing the key to thevehicle is having the vehicle stolen using the provided key as a meansto access or drive the vehicle.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the invention aredescribed with reference to the following figures, wherein likereference numerals refer to like parts throughout the various viewsunless otherwise specified.

FIG. 1 includes example keys that may be used to access a vehicle, inaccordance with aspects of the disclosure.

FIG. 2A-2B illustrates a vehicle system including a jamming radio foroutputting a jamming radio signal to control access to a vehicle, inaccordance with aspects of the disclosure.

FIG. 3 illustrates a vehicle system including a jamming radio foroutputting a jamming radio signal and a key locker door to controlaccess to a vehicle, in accordance with aspects of the disclosure.

FIG. 4 illustrates a vehicle system including a vehicle reader, acontroller unit, a keypad, a server, and a mobile device, in accordancewith aspects of the disclosure.

FIG. 5 illustrates a flow chart for a computer-implemented method ofselectively providing access to a vehicle, in accordance with aspects ofthe disclosure.

DETAILED DESCRIPTION

Embodiments of a system, apparatus, and method for a selectivelyemitting a radio signal to control access to a vehicle are describedherein. In the following description, numerous specific details are setforth to provide a thorough understanding of the embodiments. Oneskilled in the relevant art will recognize, however, that the techniquesdescribed herein can be practiced without one or more of the specificdetails, or with other methods, components, materials, etc. In otherinstances, well-known structures, materials, or operations are not shownor described in detail to avoid obscuring certain aspects.

Reference throughout this specification to “one embodiment” or “anembodiment” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment of the present invention. Thus, theappearances of the phrases “in one embodiment” or “in an embodiment” invarious places throughout this specification are not necessarily allreferring to the same embodiment. Furthermore, the particular features,structures, or characteristics may be combined in any suitable manner inone or more embodiments.

Throughout this specification, several terms of art are used. Theseterms are to take on their ordinary meaning in the art from which theycome, unless specifically defined herein or the context of their usewould clearly suggest otherwise.

Embodiments of the disclosure include a system that selectively emits ajamming radio signal to control access to a vehicle. When a vehicle keyis provided within a vehicle as part of a vehicle-sharing arrangement,there may be some cases where a bad actor is able to move the vehicleusing the vehicle key located in the vehicle. By way of an example, abad actor could gain unauthorized access to the vehicle (e.g. bybreaking a window, picking lock) and use the vehicle key that is locatedin the vehicle to drive the vehicle to a new location (e.g. a garage).Once at the new location, anti-theft devices and/or alarms may bedisabled and the vehicle may be further modified or even disassembledwithout further scrutiny. Hence, controlling access to the vehicle keyand also access to the vehicle is highly desirable.

A vehicle key may have a radio-frequency identification (RFID) tag thatallows for access to the vehicle and operation of the vehicle. Forexample, the tag of the vehicle key may have been factory set by thevehicle manufacturer or authorized dealer to allow access and/or allowthe vehicle to start/drive. Typically, a vehicle reader transmits aninterrogation signal and receives a response signal from the RFID tag ofa vehicle key. Based on the response signal from the RFID tag, access tothe vehicle or operation of the vehicle is controlled. Therefore, theresponse signal can authenticate that the correct vehicle key is presentand the vehicle may be accessed, started, and operated.

When a vehicle key remains in the vehicle for vehicle-sharing contexts,there is the possibility that the vehicle key is used to start andoperate the car even when the access to the vehicle is unauthorized. Inembodiments of the disclosure, a vehicle key is included in a vehiclekey locker sized to store the vehicle key. A jamming radio signal isselectively outputted to interfere with an interrogation signal emittedby the vehicle reader of the vehicle. When the jamming radio signal isoutputted, the interrogation signal degenerates into a deterioratedsignal that is not capable of successfully soliciting a response signalfrom the tag of the vehicle tag. Therefore, selectively emitting thejamming radio signal allows for controlling access to the vehicle by wayof selectively allowing for an authentication of the vehicle key. Thevehicle key may be stored in a vehicle key locker that is inaccessibleor hidden from operators of the vehicle. In some embodiments, thejamming radio signal is emitted from a jamming radio of the vehicle keylocker. The jamming radio signal may be paused or turned off in responseto receiving access data that matches an access code. In one example, auser provides the access data via a touchpad included in vehicle. In oneexample, a user provides the access data via a mobile device.Consequently, authorized users who provide the correct access data maycause the jamming radio signal to be paused (or halted) to allow theuser to access and/or start and operate the vehicle. In contrast, thejamming radio signal will prevent unauthorized users from starting andoperating the vehicle as the interrogation signal from the vehicle willnot properly interrogate the tag of the vehicle key to elicit theresponse signal from the tag.

In concert with selectively outputting the radio jamming signal, thevehicle key locker may modulate the shielding of the vehicle key fromthe interrogation signal of the vehicle reader. For example, for avehicle key locker made of metal or otherwise provides a Faraday cagethat shields the vehicle key from an interrogation signal, a key lockerdoor of the vehicle key locker may open when the correct access data isreceived. Opening the key locker door allows the interrogation signal ofthe reader to elicit the response signal from the tag and authenticatethe vehicle key. However, there may be cases where the interrogationsignal still reaches the vehicle key even when the vehicle key residesin a shielded vehicle key locker. In these cases, selectively outputtingthe jamming radio signal to interfere with the interrogation signalfurther ensures security of the vehicle. In addition, selectivelyoutputting the jamming radio signal may be utilized without modulating ashielding of the vehicle key locker, in some embodiments.

Utilizing particular embodiments of the disclosure, access to a vehiclemay be assigned to a particular person having the access data for aparticular amount of time. Furthermore, the physical vehicle key doesnot need to be exchanged and access to the vehicle key need not beprovided so that a user who has access to the vehicle may not retain orcopy the vehicle key. In contrast, existing vehicle-sharing serviceshave the vehicle key inside the vehicle and accessible to the user.These and other embodiments of the disclosure will be described indetail below with respect to FIGS. 1-5.

FIG. 1 illustrates example vehicle keys that may be used to access avehicle, in accordance with aspects of the disclosure. Key 170 is anexample wireless key that incorporates a remote control and a blade ofthe key is not required to access the vehicle and/or start/drive thevehicle. Key 170 includes a tag 173. Tag 173 may be a passive(unpowered) or an active (powered) tag. In one embodiment, tag 173 is anRFID tag configured to generate a response signal when the tag 173receives an interrogation signal from an RFID reader of a vehicleassociated with the key 170.

Key 180 is an example wireless key that may include a blade of a key foraccessing the vehicle and/or start/drive the vehicle. Key 180 may alsoincorporate a remote control to access the vehicle. Key 180 includes atag 183. Tag 183 may be a passive (unpowered) or an active (powered)tag. In one embodiment, tag 183 is an RFID tag configured to generate aresponse signal when the tag 173 receives an interrogation signal froman RFID reader of a vehicle associated with the key 180.

Vehicle keys that include a tag (e.g. keys 170 and 180) may be placed ina vehicle key locker such as vehicle key locker 250 of vehicle system200, illustrated in FIG. 2A. Key locker 250 is sized to store a vehiclekey such as key 170 or 180. In the illustrated embodiment, vehicle key170 is stored in key locker 250, although the illustration may not be toscale. Key Locker 250 may be only marginally longer, wider, and tallerthan vehicle key 170 even though the illustrated block diagram issizably larger than vehicle key 170, for illustration of the componentsof key locker 250.

Key locker 250 may include a key locker body 251 made of metal, plastic,or otherwise, depending on the particular embodiment. In someembodiments, key locker body 251 is fabricated so that it shields theinside of the key locker 250 from radio waves/signals. To accomplishthis, the key locker body 251 may be made from metal, incorporate ametal mesh, or otherwise form a Faraday cage.

In FIG. 2A, example key locker 250 includes a wireless interface 263,processing logic 253, and jamming radio 255. Jamming radio 255 includesa radio scanner 258 configured to sense an interrogation signal 283emitted by a vehicle. Processing logic 253 is coupled to jamming radio255, wireless interface 263, and coupled to receive signals from input284.

Wireless interface 263 may include antennas and corresponding circuitryto receive and/or transmit BlueTooth, cellular, IEEE 802.11x wirelesscommunication signals and/or optical signals (e.g. infrared signals).Wireless interface 263 may therefore receive a wireless access signal291 from a mobile device, computer, a radio-based remote control, oroptical-based remote control. Wireless interface 263 may also receive awireless access signal 291 from a cellular communications towerutilizing 2G/3G/4G/LTE/5G or other cellular data standard, in someembodiments.

Processing logic 253 may include one or more processors,microprocessors, multi-core processors, and/or Field Programmable GateArrays (FPGAs) to execute operations disclosed herein. One or morevolatile and/or non-volatile memory (not illustrated) may becommunicatively coupled to the processing logic 253 to storeinstructions to execute operations and/or store data.

In FIG. 2A, vehicle reader 280 is communicatively coupled to vehiclesystem 299 via communication channel 295. Communication channel 295 maybe either wired or wireless, in different embodiments. In one example,communication channel 295 is a wired communication channel utilizing CAN(Controller Area Network) bus protocols. In one embodiment, vehiclereader 280 is an RFID reader. Vehicle reader 280 is configured totransmit an interrogation signal 283 and is configured to receive aresponse signal 252 from a vehicle key stored in key locker 250, in someembodiments. Interrogation signal 283 may be approximately 300 MHz, insome embodiments. Vehicle system 299 may have access to or include avehicle computer that controls providing access to the vehicle and/orstarting and stopping the vehicle. In one embodiment, vehicle system 299includes a starting circuit that controls whether the vehicle can bestarted, by turning the keys in the ignition or by pushing a START/STOPbutton of the vehicle in combination with vehicle system 299 sensing avehicle key. Vehicle system 299 may generally include electrical modulesfor operating a powerplant of the vehicle, heating and cooling thevehicle, and providing vehicle information such as speed, position, andmaintenance information to the user. Vehicle system 299 may include aplurality of electrical harnesses, vehicle computers, electrical controlmodules, switches, and buttons.

In some embodiments, vehicle system 299 senses that a user is attemptingto access the vehicle and prompts reader 280 to transmit interrogationsignal 283 in response. For example, if someone engages a door handle ofthe vehicle, vehicle system 299 may sense the engagement and promptreader 280 to transmit interrogation signal 283 to authenticate a tag ofa vehicle key. In another example, a user engages a starting interface(e.g. key ignition or START/STOP button) and vehicle system 299 promptsreader 280 to transmit the interrogation signal 283 to authenticate thatthe tag of a proximate vehicle key is authorized to operate the vehicle.

Referring briefly to FIG. 4, vehicle system 299 is illustrated asreceiving access indicators 487 from door handle or door lock 421 aswell as a starting interface 423. Starting interface 423 is illustratedas a START/STOP button 423 that provides operation access to thevehicle. In the case of a vehicle with a petrol-based engine, theSTART/STOP button may engage a starter to turn over and start the engineof the vehicle. In the case of an electric vehicle, the startinginterface 423 may allow for operation of the battery power plant topower the drivetrain of the vehicle to operate/navigate the vehicle.Starting interface 423 may also include a keyed ignition of the vehicle.Hence, vehicle system 299 may prompt reader 280 to transmitinterrogation signal 283 in response to sensing engagement from elements421 or 423 and receiving access indicators 487A or 487B, respectively.Access indicator(s) 487 may be an analog electrical signal (e.g. sensingan electrical current value or voltage level) or a digital message (e.g.a digital message on a CAN bus).

Returning to FIG. 2A, processing logic 253 of key locker 250 may receiveaccess indicator 287 on input 284. Processing logic 253 may also receiveaccess signal 281 on input 284. Access signal 281 may include accessdata that a user provides to gain access to the vehicle. Access signal281 may include a series of key entries from a touchpad, for example. Insome embodiments, wireless interface 263 receives access signal 291 andprovides access signal 291 to processing logic 253. Wireless accesssignal 291 may be provided by a user's mobile device to gain access tothe vehicle, for example.

Processing logic 253 may be configured to receive an access indicator287 indicative of a user attempting to access the vehicle. FIG. 2B showsthat, in operation, processing logic 253 may activate jamming radio 255to output jamming radio signal 257 in response to receiving accessindicator 287. Activating the jamming radio 255 in response to receivingaccess indicator(s) 287 may reduce the power consumption associated withembodiments where the jamming radio signal 257 is constantly outputteduntil the correct access data is received. When jamming radio signal 257encounters interrogation signal 283, interrogation signal 283degenerates into a deteriorated signal 286 that is not capable ofsoliciting a response from tag 173 and thus tag 173 does not output aresponse signal 252 even though reader 280 is transmitting aninterrogation signal 283. Consequently, reader 280 is unable toauthenticate key 170 and access to or operation of the vehicle isdenied. In contrast to FIG. 2B, FIG. 2A shows that when jamming radio255 does not output jamming radio signal 257, interrogation signal 283is able to elicit response signal 252 from tag 173 and thereforeauthenticate tag 173 and provide access and/or operation of the vehicle.Therefore, selectively outputting jamming radio 255 and jamming radiosignal 257 can control access to and permission to operate the vehicle.Jamming radio signal 257 may be between 40 kHz and 200 kHz, in someexamples. Jamming radio signal 257 may include other frequencies thatwould sufficiently interfere with interrogation signal 283.

Processing logic 253 is configured to selectively activate/deactivatejamming radio 255 from outputting the jamming radio signal 257 based onreceiving access data included in access signal 281/291. When the accessdata included in access signal 281/291 matches an access code accessibleto processing logic 253, processing logic 253 is configured todeactivate jamming radio 255 from emitting jamming radio signal 257 sothat interrogation signal 283 can elicit response signal 252 from tag173 to authenticate key 170. Once processing logic 253 has deactivatedjamming radio 255 from outputting jamming radio signal 257, processinglogic 253 may be configured to wait for a pre-determined time period(e.g. 0.5 seconds) since deactivating jamming radio 255 and thenactivate or reactivate jamming radio 255 to output jamming radio signal257.

There are various ways for a user to provide the access data to gainaccess to the vehicle. In one embodiment, an input interface such askeypad 440 of FIG. 4 can be placed on the inside of a vehicle (e.g.under the windshield) and the buttons of the keypad 440 arecapacitive-sense buttons such that the buttons are sensitive to a finger“pressing” the button through the glass of the vehicle. In oneembodiment, keypad 440 is configured to be mounted on the outside of thevehicle.

In one embodiment, a user uses a mobile application (running on mobiledevice 430 of FIG. 4) having access data to wirelessly transmit theaccess data to the wireless interface 263 of vehicle key locker 250. Inone embodiment, the access data is transmitted from a mobile device towireless interface 263 via a BlueTooth protocol. The user may enter theaccess data into the mobile application or the access data may beprovided to the mobile application via a server that stores reservationdata for users that is associated with a vehicle that the user selected.The access data may be received by the mobile device via a cellularconnection or a WiFi connection.

In one embodiment, the access data is transmitted from a mobile deviceto wireless interface 263 using IEEE 802.11x protocols and frequencies.Wireless interface 263 may be configured to receive and/or transmitBlueTooth and/or WiFi. In one embodiment, the access data is transmittedfrom a mobile device to wireless interface 263 using cellular data(cellular data tower not illustrated) transmitted using 2G/3G/4G/LTE/5Gor other cellular data standard that is used now or hereafter.

In some embodiments, jamming radio 255 includes a radio scanner sensor258. In other embodiments, radio scanner 258 is a stand-alone componentand communicatively coupled to processing logic 253. Radio scannersensor 258 may be intermittently activated to scan for interrogationsignal 283 emitted by the vehicle reader 280. The jamming radio 255 maybe configured to be activated to output the jamming radio signal 257when the interrogation signal 283 is sensed by the radio scanner sensor258. Radio scanner sensor 258 may include a radio antenna that isconfigured to sense the radio frequency of interrogation signal 283.When the radio frequency of interrogation signal 283 is sensed by radioscanner sensor 258, the jamming radio 255 outputs jamming radio signal257 so that reader 280 cannot complete the authentication of key 170.Radio scanner 258 may be intermittently activated for less than 100milliseconds in any given second of time to scan for interrogationsignal 283. This may assist to reduce the power consumption associatedwith constantly outputting a jamming radio signal 257. In someembodiments, radio scanner 258 is configured to be “listening” for lessthan 10% of the time to save on power consumption. In one embodiment,radio scanner sensor 258 is configured to be “listening” for less than5% of the time to save on power consumption. By way of example, radioscanner sensor 258 may be configured to “listen” for 2 ms and “sleep”for 48 ms to save on electrical power consumption while also beingresponsive to interrupt interrogation signal 283 (and blockauthentication of key 170 or 180) in any given 50 ms period of time. Ifradio scanner sensor 258 does sense interrogation signal 283 in the 2 ms“listening” period, it immediately outputs a sense signal to jammingradio 255 so jamming radio 255 is prompted to output jamming radiosignal 257. In embodiments where radio scanner sensor is separate fromjamming radio 255 and separately communicatively coupled to processinglogic 253, radio scanner sensor 258 may output the sense signal toprocessing logic 253.

FIG. 3 illustrates an example vehicle system 300 where key locker 350includes a key locker door 360 and access actuator 365 in addition tothe features of key locker 250, in accordance with aspects of thedisclosure. In the embodiment of FIG. 3, reader 280 may be preventedfrom authenticating key 170 because tag 173 is shielded from receivinginterrogation signal 283 by the key locker body 351. Key locker body 351is fabricated so that it shields the inside of the key locker 350 fromradio waves/signals. To accomplish this, the key locker body 351 may bemade from metal, or incorporate a metal mesh, or otherwise form aFaraday cage. However, key locker 350 also includes access actuator 365configured to open and close key locker door 360. When key locker door360 is open, tag 173 is no longer shielded from interrogation signal 283and thus reader 280 can authenticate key 170. Yet, when key locker door360 is closed, key 170 and tag 173 are substantially shielded frominterrogation signal 283 and thus it may be more difficult or impossiblefor reader 280 to authenticate key 170. Therefore, controlling theoperation of key locker door 360 may, on its own, be sufficient tocontrol access to the vehicle by selectively shielding key 170 frominterrogation signal 283.

However, some vehicle readers 280 emit a very strong interrogationsignal 283 that may penetrate shielding of key locker body 351 even whenkey locker door 360 is closed. And, some vehicle readers 280 actuallyincrease the transmission power of interrogation signal 283 when thevehicle unsuccessfully authenticates a key. For example, if a startinginterface of a vehicle is engaged, but the vehicle is unable toauthenticate a key, the vehicle reader may increase transmission powerof interrogation signal 283 in order to further its effort toauthenticate a key.

In contexts where interrogation signal 283 may be successful inauthenticating a key housed by a key locker where the key locker door360 is closed, jamming radio 255 may be included in a system to furtherassist in shielding key 170 by interfering with interrogation signal283. Thus, in some embodiments, key locker door 360 is opened andjamming radio 255 is deactivated when access data matches an accesscode. When no access to the vehicle is granted, key locker door 360 isclosed and jamming radio 255 is selectively activated to interfere withinterrogation signal 283 to prevent authentication of key 170.

As such, in some embodiments, key locker 350 includes key locker door360 configured to substantially shield tag 173 of vehicle key 170 fromreceiving interrogation signal 283 and shields vehicle key 170 fromtransmitting radio signals (e.g. response signal 252) outside key lockerbody 351 when the key locker door 360 is closed. Processing logic 353 iscommunicatively coupled to access actuator 365 to control the opening ofkey locker door 360, in FIG. 3.

When key locker door 360 is to be opened, access actuator 365 receivesan actuation signal from processing logic 353, in the illustratedembodiment. Access actuator 365 may include a stepper motor that ismechanically coupled to key locker door 360 to open the key locker door360 a distance defined by the actuation signal. In some embodiments, aservo, motor, actuator, or combination may be utilized to move keylocker door 360.

FIG. 4 illustrates a vehicle system 400 that includes a key locker 450,in accordance with aspects of the disclosure. Vehicle system 400includes a controller unit 403, a keypad 440, a mobile device 430,vehicle system 299, vehicle reader 280, and a key locker 450, inaccordance with an embodiment of the disclosure. Controller unit 403includes processing logic 407, cellular interface 411, and wirelessinterface 413. Wireless interface 413 may include a cellular radioconfigured for sending and/or receiving cellular data utilizing2G/3G/4G/LTE/5G or other cellular data standard that is used now orhereafter. Processing logic 407 may include one or more processors,microprocessors, multi-core processors, and/or Field Programmable GateArrays (FPGAs) to execute operations disclosed herein. One or morevolatile and/or non-volatile memory (not illustrated) may becommunicatively coupled to the processing logic 407 to storeinstructions to execute operations and/or store data. In someembodiments, processing logic 407 includes one or more volatile ornon-volatile memories to store data such as an access code.

Keypad 440 is communicatively coupled to controller unit 403 viacommunication channel 492. In one example, communication channel 492 isa wireless communication channel (e.g. BlueTooth and/or WiFi/802.11x).Mobile device 430 is communicatively coupled to controller unit 403 viacommunication channel 493. In one example, communication channel 493 isa wireless communication channel (e.g. BlueTooth and/or WiFi/802.11x).Vehicle system 299 is communicatively coupled to controller unit 403 viacommunication channel 491. In one example, communication channel 491 isa wired communication channel utilizing CAN (Controller Area Network)bus protocols. Processing logic 407 may include an input to receivecommunication channel 491. Key locker 450 is communicatively coupled tocontroller unit 403 via communication channel 494. Key locker 450 mayinclude the features of key locker 250 or 350. In one example,communication channel 494 is a wireless communication channel (e.g.BlueTooth and/or WiFi/802.11x). In one example, communication channel494 is a wired communication channel, utilizing I²C (Inter-IntegratedCircuit), or SPI (Serial Peripheral Interface) protocols. Communicationchannel 494 may be an encrypted channel. Vehicle reader 280 iscommunicatively coupled to vehicle system 299 via communication channel495.

Door handle or door lock 421 is coupled to provide access indicator 487Ato vehicle system 299 via communication channel 496 when a user engagesa door handle or a door lock of the vehicle. Starting interface 423 iscoupled to provide access indicator 487B to vehicle system 299 viacommunication channel 497 when a user engages starting interface 423.Access indicators 487A and/or 487B may be passed from vehicle system 299to controller unit 403 via communication channel 491, in someembodiments. In an embodiment (not illustrated), door handle or doorlock 421 and/or starting interface 423 are coupled to controller unit403 so that controller unit 403 may receive access indicator(s) 487Aand/or 487B directly. Communication channels 491, 492, 493, 494, 495,496, and 497, may be either wired or wireless, in different embodiments.

Server 445 is communicatively coupled to communicate with controllerunit 403 via wireless interface 413 or cellular interface 411. Theaccess code(s) 489 that the access data is compared to may be sent tosystem 400 by a provisioning server such as server 445. Server 445 maythen also separately provide the access data 488 that matches the accesscode 489 to mobile device 430 via communication channel 499 so a usercan enter the access data 488 into keypad 440 to gain access to thevehicle. Access data 488 may also be wirelessly provided to system 400via a wireless communication interface 493.

Key locker 450 may include any of the features of key locker 250 and305, although FIG. 4 illustrates that some of the components that wereincluded in key lockers 250 and 350 may be included in controller unit403. For example, a wireless interface 413 may be included in controllerunit 403 instead of key locker 450 and wireless communications may bereceived on wireless interface 413 and transmitted to key locker 450 viacommunication channel 494. Similarly, processing logic 407 may performsome or all of the processes described with respect to processing logic253 or 353. Furthermore, jamming radio 255 may be located withincontroller unit 403 and coupled to processing logic 407 instead of beingincluded in key locker 450, in some embodiments.

FIG. 5 illustrates a flow chart of an example process of selectivelyproviding access to a vehicle, in accordance with aspects of thedisclosure. The order in which some or all of the process blocks appearin process 500 should not be deemed limiting. Rather, one of ordinaryskill in the art having the benefit of the present disclosure willunderstand that some of the process blocks may be executed in a varietyof orders not illustrated, or even in parallel. All or a portion of theprocess blocks of process 500 may be executed by processing logic 253,353, or 407, for example.

In process block 505, a jamming radio signal (e.g. jamming radio signal257) is emitted from a jamming radio (e.g. 255) of a key locker. Thejamming radio signal is configured to interfere with an interrogationsignal emitted by a vehicle for verifying a tag of a vehicle key thatprovides access to the vehicle. In some embodiments, the jamming radiosignal may be emitted from a jamming radio that is disposed in thevehicle, but not included in the key locker.

In process block 510, an access signal (e.g. access signal 281 or 291)is received on an input to the key locker. The input may be a wirelessinterface, a cellular interface, or a wired analog or digital input.Access data included in the access signal may be provided by a keypad ora mobile device.

In process block 515, when the access signal does not include accessdata that matches an access code, process 500 may return to processblock 505. When the access signal includes access data that matches anaccess code in process block 515, process 500 proceeds to process block520. Processing logic 253, 353, or 407 may facilitate the comparison ofthe access data to the access code.

In process block 520, the jamming radio signal is halted or paused whenthe access data of the access signal matches the access code. Haltingthe output of the jamming radio signal allows the interrogation signalemitted by the reader of the vehicle to authenticate the tag of thevehicle key to provide access to the vehicle. In some embodiments, thejamming radio signal is paused for a pre-determined time period to allowthe vehicle reader to authenticate the key included in a key locker andafter the pre-determined time period, process 500 returns to processblock 505 to resume the output of the jamming radio signal. In someembodiments of the disclosure, process 500 further includes opening akey locker door (e.g. key locker door 360) of the key locker when accessdata of the access signal matches the access code in process block 515.

In some embodiments, process 500 further includes receiving an accessindicator (e.g. 287/487) indicative of a user attempting to access thevehicle and outputting the jamming radio signal is in response toreceiving the access indicator. The access indicator may be generated bya user interacting with a door handle (e.g. pulling up on the doorhandle or pressing a button on or near the door handle to facilitateopening the door), door lock (e.g. turning a bladed key in the doorlock), or starting interface of the vehicle, for example.

In some embodiments, process 500 further includes sensing the emissionof the interrogation signal emitted by the vehicle and outputting thejamming radio signal is in response to sensing the emission of theinterrogation signal. Radio scanner sensor 258 may be configured tosense the interrogation signal, for example. The radio sensor scannermay be included in the key locker or located elsewhere in the vehicle.In one embodiment, radio scanner sensor 258 is included in controllerunit 403. The radio scanner sensor may be intermittently activated forless than 100 milliseconds of any given second of time to scan for theinterrogation signal of the vehicle. A jamming radio may be configuredto be activated to output the jamming radio signal when theinterrogation signal is sensed by the radio scanner sensor.

In some vehicles, the interrogation signal increases in power when thevehicle reader fails to authenticate a vehicle key. In some embodimentsof process 500, the radio scanner sensor performs a plurality ofmeasurements of the interrogation signal over time, and when themeasurements of the interrogation signals are increasing in power, thejamming radio signal of the jamming radio is also increased in power sothat the interrogation signal 283 is not successful in authenticatingthe vehicle key.

The above disclosure has been discussed in the context ofvehicle-sharing although it is contemplated that systems and methods ofthis disclosure could be used in the context of vacation rentals orshort-term housing rentals to provide key access to a property for alimited period of time.

The term “processing logic” in this disclosure may include one or moreprocessors, microprocessors, multi-core processors, and/or FieldProgrammable Gate Arrays (FPGAs) to execute operations disclosed herein.In some embodiments, memories (not illustrated) are integrated into theprocessing logic to store instructions to execute operations and/orstore data. Processing logic may include analog or digital circuitry toperform the operations disclosed herein. A “memory” or “memories”described in this disclosure may include volatile or non-volatile memoryarchitectures.

Communication channels described herein may include wired or wirelesscommunications utilizing IEEE 802.11 protocols, BlueTooth, SPI (SerialPeripheral Interface), I²C (Inter-Integrated Circuit), USB (UniversalSerial Port), CAN (Controller Area Network), cellular data protocols(e.g. 3G, 4G, LTE, 5G), or otherwise.

The processes explained above are described in terms of computersoftware and hardware. The techniques described may constitutemachine-executable instructions embodied within a tangible ornon-transitory machine (e.g., computer) readable storage medium, thatwhen executed by a machine will cause the machine to perform theoperations described. Additionally, the processes may be embodied withinhardware, such as an application specific integrated circuit (ASIC) orotherwise.

A tangible non-transitory machine-readable storage medium includes anymechanism that provides (i.e., stores) information in a form accessibleby a machine (e.g., a computer, network device, personal digitalassistant, manufacturing tool, any device with a set of one or moreprocessors, etc.). For example, a machine-readable storage mediumincludes recordable/non-recordable media (e.g., read only memory (ROM),random access memory (RAM), magnetic disk storage media, optical storagemedia, flash memory devices, etc.).

The above description of illustrated embodiments of the invention,including what is described in the Abstract, is not intended to beexhaustive or to limit the invention to the precise forms disclosed.While specific embodiments of, and examples for, the invention aredescribed herein for illustrative purposes, various modifications arepossible within the scope of the invention, as those skilled in therelevant art will recognize.

These modifications can be made to the invention in light of the abovedetailed description. The terms used in the following claims should notbe construed to limit the invention to the specific embodimentsdisclosed in the specification. Rather, the scope of the invention is tobe determined entirely by the following claims, which are to beconstrued in accordance with established doctrines of claiminterpretation.

What is claimed is:
 1. A system comprising: a jamming radio configuredto selectively output a jamming radio signal that interferes with aninterrogation signal emitted by a vehicle; and processing logicconfigured to receive an access signal, wherein the processing logic isconfigured to selectively deactivate the jamming radio from outputtingthe jamming radio signal when access data of the access signal matchesan access code, wherein halting the output of the jamming radio signalallows the interrogation signal emitted by the vehicle to authenticate avehicle key of the vehicle.
 2. The system of claim 1, wherein theprocessing logic is further configured to: receive an access indicatorindicative of a user attempting to access the vehicle; and activate thejamming radio to output the jamming radio signal in response toreceiving the access indicator.
 3. The system of claim 2, wherein theaccess indicator is at least one of an analog electrical signal or adigital message, and wherein the access indicator is generated inresponse to the user engaging a door handle or door lock of the vehicle.4. The system of claim 2, wherein the access indicator is at least oneof an analog electrical signal or a digital message, and wherein theaccess indicator is generated in response to the user engaging astarting interface of the vehicle.
 5. The system of claim 2, wherein theprocessing logic is further configured to activate the jamming radio tooutput the jamming radio signal after a pre-determined time period sinceselectively deactivating the jamming radio.
 6. The system of claim 2,wherein the access indicator is received from a Controller Area Network(CAN) bus.
 7. The system of claim 1 further comprising: a wirelessinterface configured to receive the access signal, wherein the accesssignal is a wireless access signal.
 8. The system of claim 1, whereinthe jamming radio signal is between 40 kHz and 200 kHz.
 9. The system ofclaim 1 further comprising: a keypad, wherein the keypad is configuredto provide the access signal to the processing logic.
 10. The system ofclaim 9, wherein the keypad is configured to provide the access signalto the processing logic via a communication channel, and wherein thecommunication channel is a wireless communication channel.
 11. Thesystem of claim 10 further comprising: a cellular interface configuredto receive the access code.
 12. The system of claim 11, wherein theprocessing logic is configured to receive the access code from thecellular interface.
 13. The system of claim 1, wherein the processinglogic is configured to be communicatively coupled to a Controller AreaNetwork (CAN) bus.
 14. The system of claim 1, further comprising: avehicle system; and a Controller Area Network (CAN) bus coupled betweenthe vehicle system and the processing logic.
 15. A system comprising:jamming radio means for selectively outputting a jamming radio signalthat interferes with an interrogation signal emitted by a vehicle; andprocessing means for receiving an access signal and selectivelydeactivating the jamming radio means from outputting the jamming radiosignal when access data of the access signal matches an access code,wherein halting the output of the jamming radio signal allows theinterrogation signal emitted by the vehicle to authenticate a vehiclekey of the vehicle.
 16. The system of claim 15, wherein the jammingradio signal is between 40 kHz and 200 kHz.
 17. A computer-implementedmethod comprising: receiving an access signal; determining whether theaccess signal includes access data that matches an access code; andselectively outputting a jamming radio signal from a jamming radio basedon the access signal, wherein outputting the jamming radio signalprevents an interrogation signal emitted by a vehicle to authenticate avehicle key of the vehicle.
 18. The computer-implemented method of claim17, wherein the jamming radio signal is between 40 kHz and 200 kHz. 19.The computer-implemented method of claim 17, wherein the access signalis received from a vehicle system via a Controller Area Network (CAN)bus.
 20. The computer-implemented method of claim 17, wherein the accesssignal is received from a keypad.