Systems and methods for key fob communication disconnection

ABSTRACT

System, methods, and other embodiments described herein relate to controlling a key fob. In one embodiment, a key fob, associated with a vehicle, includes an antenna, a control circuit including one or more processors and a memory communicably connected to the one or more processors, and a disable switch connected to the antenna and to the control circuit. The disable switch connects the antenna with the control circuit in a first state and disconnects the antenna from the control circuit in a second state.

TECHNICAL FIELD

The subject matter described herein relates to systems and methods forcontrolling communications between a key fob and a vehicle, and, moreparticularly, to a key fob having features that can limit receipt oftransmission signals and thereby decrease a risk of vehicle theft due tosignal boosting techniques.

BACKGROUND

A vehicle may be configured to communicate with a key fob for thepurpose of allowing an owner to remotely execute operations such asunlocking doors, opening/closing windows, opening doors, opening a trunkor even starting an engine of the vehicle. In addition, some vehiclesutilize a key fob to facilitate “keyless entry”, wherein the vehicledetects the presence of the key fob near the vehicle and, in response,allows execution of an action such as unlocking the doors based on theowner touching the door handle.

Although the communication signals a vehicle uses to communicate withthe key fob in providing such features may be encrypted or useperiodically changing or rolling codes, individuals who desire to stealthe vehicle have developed ways to exploit vulnerabilities inherent inthe wireless communications used in the vehicle/key fob system. Forexample, unauthorized individuals have found that a device thatphysically boosts wireless signals between the vehicle and the fob canenable communication to take place between certain manufacturer'svehicles and their associated fobs when the two are relatively farapart. In some cases, a boost attack can allow an unauthorizedindividual to unlock a vehicle parked in a driveway of a home while thefob rests seeming securely within the home by tricking the vehicle intoincorrectly determining that the fob is nearby.

SUMMARY

In one embodiment, example systems and methods are disclosed forproviding a key fob having a communication disconnect switch.

In one approach, a disclosed key fob, associated with a vehicle,includes an antenna, a control circuit including one or more processorsand a memory communicably connected to the one or more processors, and adisable switch connected to the antenna and to the control circuit,wherein the disable switch connects the antenna with the control circuitin a first state and disconnects the antenna from the control circuit ina second state.

In one embodiment a method of controlling a key fob, the key fobincluding an antenna, a control circuit, and a disable switch connectedbetween the antenna and the control circuit such that the disable switchconnects the antenna with the control circuit in a first state anddisconnects the antenna from the control circuit in a second state isdisclosed. The method includes controlling an actuator connected to thedisable switch to transition the disable switch to the second state toprevent a signal received at the antenna from being processed by thecontrol circuit and controlling an electronic indicator component toexecute a response to the disable switch transitioning between the firststate and the second state.

In one embodiment, a non-transitory computer-readable medium isdisclosed. The computer-readable medium stores instructions forcontrolling a key fob, the key fob including an antenna, a controlcircuit, and a disable switch connected between the antenna and thecontrol circuit such that the disable switch connects the antenna withthe control circuit in a first state and disconnects the antenna fromthe control circuit in a second state. When the instructions areexecuted by one or more processors, they cause the one or moreprocessors to perform the disclosed functions and include instructionsto control an actuator connected to the disable switch to transition thedisable switch to the second state to prevent a signal received at theantenna from being processed by the control circuit, and control anelectronic indicator component to execute a response to the disableswitch transitioning between the first state and the second state.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of the specification, illustrate various systems, methods, andother embodiments of the disclosure. It will be appreciated that theillustrated element boundaries (e.g., boxes, groups of boxes, or othershapes) in the figures represent one embodiment of the boundaries. Insome embodiments, one element may be designed as multiple elements ormultiple elements may be designed as one element. In some embodiments,an element shown as an internal component of another element may beimplemented as an external component and vice versa. Furthermore,elements may not be drawn to scale.

FIG. 1 illustrates a key fob and an associated vehicle according to thedisclosed subject matter.

FIG. 2 illustrates an example key fob and control circuit according tothe disclosed subject matter.

FIG. 3 illustrates an example scenario in which a key fob according tothe disclosed subject matter is advantageous.

FIG. 4 illustrates another example scenario in which a key fob accordingto the disclosed subject matter is advantageous.

FIG. 5 illustrates a flow chart of a method of controlling a key fobaccording to the disclosed subject matter.

DETAILED DESCRIPTION

Systems, methods and embodiments associated with controllinginteractions between a vehicle and a key fob are disclosed. Thedisclosed systems provide multiple advantages that improve security ofvehicles, provide measures that mitigate against attacks that exploitvulnerabilities inherent in wireless communication and provide means fordiscovering lost key fobs and securing a vehicle even when itsassociated key fob is lost.

In one embodiment, a key fob according to the disclosed subject matterincludes an antenna for wireless communication, a control circuitpowered by a battery, and a disable switch connected between the antennaand the control circuit. The antenna and control circuit can provide thefunctionality of a radio transceiver, that is, operated to transmit andreceive radio signals. The control circuit can include, for example, amemory and one or more processors/microprocessors. The memory can storeone or more that including one or more instructions that, when executedby the one or more processors/microprocessors execute functions such astransmitting/receiving various signals to/from a vehicle that the keyfob is paired with. The signals can include codewords and identificationsignals to identify the key fob, as well as command codes (also known as“function codes”) transmitted from the key fob to the vehicle to causethe vehicle to perform specific actions, such as unlock a door, open awidow, or start an engine.

The disable switch can have two states. In a first state the disableswitch connects the antenna to the control circuit, allowing wirelesscommunication to take place between the key fob and the vehicle. In asecond state the disable switch disconnects the antenna from the controlswitch, thereby preventing certain types of wireless communicationbetween the key fob and the vehicle. The disable switch can include amechanism, such as a button, a switch or the like, that a user canmanually manipulate to transition the switch back and forth between thefirst state and the second state.

In one or more embodiments, the key fob can include an indication deviceconfigured to provide a first type of indication (e.g., visual, audible,haptic, or any combination of these) when the disable switch is placedin the first state. In one or more embodiments, the indication devicecan be configured to provide a second type of indication, different fromthe first type of indication, when the disable switch is placed in thesecond state. For example, in an implementation in which the first typeof indication is to activate an light emitting diode (LED) having afirst color, the second type of indication can be to deactivate the LEDor to activate an LED having a second color different from the firstcolor. In an implementation in which the first type of indication is toemit a first sound (e.g., a single chirp), the second type of indicationcan be to emit a second sound (e.g., two chirps). In a hapticimplementation in which the first type of indication is a single buzz,the second type of indication can be two buzzes.

In one or more embodiments, the key fob can further include at least onesecondary communication circuit and an actuator connected to thesecondary communication circuit and to the disable switch. The secondarycommunication circuit can be a wireless communication circuit that canreceive a disable signal and, in response, control the actuator to openthe disable switch. Conversely, in one or more embodiments the secondarycommunication circuit can receive an enable signal and, in response,control the actuator to close the disable switch.

In one or more embodiments, the key fob can also include an internalswitch disposed between the disable switch and the control circuit. Theinternal switch may be implemented as one or more circuit elementsdisposed within a casing of the key fob and therefore not immediatelyaccessible for manual manipulation. Similar to the disable switch, theinternal switch can have two states: a closed state in which the disableswitch is connected to the control circuit and an open state in whichthe disable switch is disconnected from the control circuit.

Due to the logic of the circuit connections, the open state of theinternal switch inherently disconnects the antenna from the controlcircuit as well. Thus, the internal switch can essentially override thedisable switch and place the key fob in a noncommunicative stateregardless of the state of the disable switch. In one or moreembodiments, the secondary communication circuit can control theinternal switch to place it in an open state or closed state undercertain conditions, as will be discussed in detail below.

Referring to FIG. 1, one embodiment of a key fob 100 is illustrated. Forthe purpose of illustration the key fob 100 is not drawn to scale. Thekey fob 100 may be associated (i.e., paired, synchronized, etc.) with avehicle 102 such that the key fob 100 and vehicle 102 are configured tocommunicate wirelessly with each other. For example, the wirelesscommunication can take place through radio signals transmitted/receivedvia the antenna 160. The key fob 100 can further include a controlcircuit 105 that controls transmission of signals from the key fob 100and processes signals received by the key fob 100.

The key fob 100 may provide various function related to the vehicle 102,such a keyless entry function. For example, when a user wants to unlocka door or open a trunk of the vehicle, the user can touch a handle ofthe door and, in response, the vehicle 102 can broadcast a short-rangechallenge or interrogation signal 106. When the key fob 100 detects theinterrogation signal 106, the key fob 100 can, in response, broadcast anidentification code signal 107. When the vehicle 102 receives theidentification code signal 107 in response to the interrogation signal,the vehicle 102 can confirm that the code matches its own stored code orgenerated code in a rolling code system. The match indicates thepresence of the key fob 100 (and presumably an authorized user),accordingly the vehicle 102 can proceed to automatically unlock thedoor.

However, the keyless entry function is a type of wireless communicationfunction that is vulnerable to attack in various ways. For example, inone known attack referred to as a “boost attack” an unauthorizedindividual can cause the vehicle 102 to broadcast the interrogationsignal, for example by touching a door handle, and use one or moreamplifiers 108 to boost the range of the signal. In this attack, even ifthe key fob 100 is located within a nearby structure (e.g., a home,store, or restaurant) that the authorized user is currently inside, itis possible that the boosted signal may reach the key fob 100 and causethe key fob 100 to broadcast an identification code signal 107 inresponse. The unauthorized individual may either use an amplifier 108 toboost the identification code signal 107 from the key fob 100 so that itreaches the vehicle 102 or may intercept the identification code signal107 and retransmit it to the vehicle 102. In either case the objective,which is to trick the vehicle 102 into responding as though the key fob100 were present, may be obtained and cause the vehicle 102 to performan unauthorized action, i.e., unlock the door.

FIG. 2 shows an embodiment the key fob 100 and control circuit 105including features that significantly reduce a likelihood of asuccessful boost attack. The key fob 100 includes a disable switch 150connected to the control circuit 105 and to the antenna 160. The disableswitch 150, in a first state (e.g., closed), connects the antenna 160 tothe control circuit 105. In a second state (e.g., open), the disableswitch 150 disconnects the antenna 160 from the control circuit 105.When the antenna 160 is disconnected from the control circuit 105, thecontrol circuit 105 will not detect or receive an interrogation signal106 from the vehicle 102. Thus, even if an unauthorized individualattempts a boost attack, if the disable switch 150 is in the open statethe attack will not cause the key fob 100 to transmit an identificationcode signal 107, since the control circuit 105 will not detect theinterrogation signal 106.

In one or more embodiments the disable switch 150 is implemented as auser-accessible switch mechanism (e.g., a push button switch, a slidingswitch, a toggle switch, a rotary switch, etc.) that a user may manuallymanipulate to place the disable switch 150 in the open state or theclosed state. As will be discussed further below, the control circuit105 can include an indicator component 170 that notifies the user of thecurrent communication state of the key fob 100 regarding connectionbetween the antenna 160 and the control circuit 105.

In addition to manual control, in one or more embodiments the controlcircuit 105 can control an actuator 140 to automatically transition thedisable switch 150 to the open state or the closed state in certaincircumstances, for example, based on an auto self-disable controlsetting or a secondary communication signal received by a secondarycommunication circuit 180, as will be discussed below.

As shown in FIG. 2, the control circuit 105 can include multipleelements, including one or more processors 110, a first communicationcircuit 115, a memory device 120, an indicator component 170, asecondary communication circuit 180, an internal switch 152, and aninterface 185. It should be understood that in different embodiments andconfigurations, depending on the implementation, it may not be necessaryfor the control circuit 105 to include all of the elements shown in FIG.2. For example, one or more embodiments may omit the secondarycommunication circuit 180 or other elements. Different embodiments ofthe disclosed subject matter can include control circuits 105 havingdifferent combinations of the various elements shown in FIG. 2.Furthermore, for purposes of brevity the present disclosure focuses onelements most relevant to the disclosed subject matter. Accordingly, inactual implementation the control circuit 105 can have additionalelements to those shown in FIG. 2 that are required to providefunctionality of the device, e.g., a battery, circuit elements, etc. Inaddition, while the various elements are shown as being located withinthe control circuit 105 in a certain configuration, it will beunderstood that one or more of these elements can be disposed in adifferent configuration within the control circuit 105.

Furthermore, it will be appreciated that for simplicity and clarity ofillustration, where appropriate, reference numerals have been repeatedamong the different figures to indicate corresponding or analogouselements. The discussion outlines numerous specific details to provide athorough understanding of the embodiments described herein. Those ofskill in the art, however, will understand that the embodimentsdescribed herein may be practiced using various combinations of theseelements.

Referring to FIG. 2, the control circuit 105 is shown as including aprocessor 110. In various implementations the processor 110 is anelectronic device such as a microprocessor, an ASIC, multipleprocessors/microprocessors, or another computing component that iscapable of executing machine-readable instructions to produce variouselectronic outputs therefrom that may be used to control or cause thecontrol of other electronic devices.

In one embodiment, the control circuit 105 includes a memory 120 thatstores a control module 122 and a disable module 124. The memory 120 isa random-access memory (RAM), read-only memory (ROM), a hard-disk drive,a flash memory, or other suitable memory for storing the modules 122 and124. The modules 122 and 124 are, for example, computer-readableinstructions that when executed by the processor 110 cause the processor110 to perform the various functions disclosed herein. In variousembodiments, the modules 122 and 124 can be implemented in differentforms that can include but are not limited to hardware logic, an ASIC,components of the processor 110, instructions embedded within anelectronic memory, and so on.

The control module 122 is generally constructed including instructionsthat function to control the processor 110 to execute basic functionaloperations of the key fob 100, for example, generating codewords oridentification codes, broadcasting an identification code signal to avehicle, processing and responding to inputs received from the interface185 (buttons, etc.), controlling the communication circuit 115 totransmit command codes (e.g., codes to unlock doors, open trunk, etc.)to the vehicle, processing signals received from the vehicle, etc.

The disable module 124 can generally be constructed includinginstructions that function to cause the processor 110 to, among otherthings, determine that the antenna 160 has not received a signal fromthe vehicle for at least a threshold amount of time and, in response,cause the actuator 140 to transition the disable switch 150 to the openstate. Thus, in one or more embodiments, the disable module 124 canimplement an optional auto-disable feature.

For example, in one or more embodiments the disable module 124 can pingthe vehicle 102 to determine whether the key fob 100 is still within thevehicle 102 or within a limited range vicinity of the vehicle 102. Ifthe vehicle 102 does not respond to the ping signal within a set amountof time and/or does not respond after a set number of pings, the disablemodule 124 can cause the actuator 140 to transition the disable switch150 to the open state. In this manner the key fob 100 can automaticallydisable the antenna 160 from receiving potentially boosted signals afterthe owner has left the vehicle 102 and forgotten to disengage theantenna 160. In one or more embodiments, this auto-disable feature canbe activated or deactivated according to user preference.

In one or more embodiments, the user-accessible portion of the disableswitch 150 can be implemented as an indirect control of the actuator140, such that manipulating the user-accessible portion of the disableswitch 150 first initiates a request to the disable module 124 todetermine whether the key fob 100 is outside the vehicle 102 before thedisable module 124 can cause the actuator 140 to transition the disableswitch 150 from the closed state to the open state thereby disabling theantenna 160. Confirmation that key fob 100 is outside of the vehicle 102before antenna 160 disengagement prevents unintentional disablement ofkeyless entry features while user is still inside vehicle and preventsthe key fob 100 from being locked inside the vehicle 102 or left insidea running vehicle.

The control circuit 105 can also include a secondary communicationcircuit 180 that allows the control circuit 105 to receive a secondarywireless signal. The secondary communication circuit 180 can beconfigured to communicate, for example, via a secondary communicationprotocol such as internet protocol (IP), near field communication (NFC),Bluetooth® (BT), Bluetooth Low Energy (BLE), ultrawide band (UWB), Wifi,radio-frequency identification (RFID), or through other communicationsmethods.

In one or more embodiments, the key fob 100 can be directly addressableunder the secondary communication protocol. For example, eachmanufactured key fob 100 can be assigned a unique address within thesecondary communication protocol. In one or more embodiments, the keyfob 100 is not assigned an address under the secondary communicationprotocol but is still configured to receive encoded command signals viathe secondary communication protocol. Accordingly, in any case thesecondary communication circuit 180 can process signals detected by asecond antenna 190 and thereby detect a disable code received via thesecondary communication protocol.

The secondary communication circuit 180 can further be connected to aninternal switch 152. The internal switch 152 is connected to the disableswitch 150 and the control circuit 105. In one or more embodiments, theinternal switch is connected to a communication gateway of the controlcircuit 105, for example, the first communication circuit 115. In afirst state (e.g., closed), the internal switch 152 connects the disableswitch 150, and by extension the antenna 160, to the rest of the controlcircuit 105. In a second state (e.g., open), the internal switch 152disconnects the disable switch and the antenna 160 from the rest of thecontrol circuit 105.

The internal switch 152 can be controlled by the secondary communicationcircuit 180. For example, the secondary communication circuit 180 canreceive a signal via a second antenna 190 and open the internal switch152 in response. While the internal switch 152 is open, the key fob 100will not receive signals via the antenna 160.

Thus, the antenna 160 can be disconnected from the control circuit 105in various ways, including manually by the owner opening the disableswitch 150, automatically by the disable module 124 controlling theactuator 140 to open the disable switch 150, or remotely by thesecondary communication circuit 180 opening the internal switch 152.

The control circuit 105 can also include an indicator component 170 thatprovides an indication of a state (e.g., open/closed) of the disableswitch 150 and/or internal switch 152. The indicator component 170 canprovide visual indication, audible indication, haptic indication, or anycombination thereof.

For example, in one or more embodiments the indicator component 170 caninclude a light-emitting diode (LED) that is configured to turn on whenthe disable switch 150 is in the open state and turn off when thedisable switch is in the closed state. In another embodiment, theindicator component 170 can include a speaker configured to emit a firstbeeping or chirping pattern (e.g., one beep) when the disable switch 150transitions to the open state and a second beeping or chirping pattern(e.g., two beeps) when the disable switch 150 transitions to the closedstate. In still another embodiment the indicator component 170 caninclude a small motor configured to vibrate in a first pattern (e.g.,one buzz) when the disable switch 150 transitions to the open state andvibrate in a second pattern (e.g., two buzzes) when the disable switch150 transitions to the closed state. In yet another embodiment theindicator component can include a combination of indicator devices(e.g., LED and motor, LED and speaker, speaker and motor, etc.)

In one or more embodiments, the indicator component 170 can provide aseparate indication of a state of the internal switch 152 as compared tothe indication of the state of the disable switch 150. For example, inone or more embodiments, the indicator component 170 can include a firstcolor LED (e.g., blue) associated with the disable switch and a secondcolor LED (e.g., red) associated with the internal switch 152.

Referring back to the control circuit 105 of FIG. 2, in one embodiment,the control circuit 105 includes a data store 130, which may beimplemented as a database 130. The database 130 is, in one embodiment,an electronic data structure that may be stored in the memory 120 and isconfigured with routines that can be executed by the processor 110 foranalyzing stored data, providing stored data, organizing stored data,and so on. Thus, in one embodiment, the database 130 stores data used bythe modules 122 and 124 in executing various determinations. In oneembodiment, the database 130 stores data including static or generatedidentification codes 132 and command codes 134.

The above-discussed features allow the disclosed key fob 100 to presenta barrier to attack in several situations that would leave aconventional key fob particularly vulnerable. For example, FIG. 3illustrates an example scene 300 in which a key fob 100 has been lost,e.g., inadvertently dropped inside a store, a market, or the like. Whena conventional key fob is lost it is vulnerable to an unauthorized userpicking it up, proceeding to the parking lot and repeatedly pressingbuttons on the key fob to attempt to cause the associated vehicle torespond. Upon discovering the whereabouts of the associated vehicle, theunauthorized user can unlock the vehicle, enter and, unless othersecurity measures are present (e.g., steering wheel lock), steal thevehicle with relative ease.

In contrast, the disclosed key fob 100 may remotely be placed in acommunicative state that is unresponsive to the associated vehicle,thereby preventing an unauthorized user from using the key fob 100 tolocate and/or enter the vehicle. For example, a manufacturer of the keyfob 100 (or a third party entity) can provide a service that allows anowner of the key fob 100 to remotely open the internal switch 152 upondiscovering upon that the key fob 100 is missing. The service can assigna unique identifier to each key fob 100 participating in the service.The service can further include, for example, a server 320 that allows auser to register a secure account that associates the user (owner) witha key fob and with a registered wireless communication device, such as acell phone, tablet, watch laptop, etc.

When the user loses the key fob 100, the user can login to the server320 using the secure account to submit a search and disable request. Therequest can include an identifier 330 associated with the lost fob. Theserver 320 can require one or more types of security verifications priorto acting on the request. After the security verifications are complete,in one or more embodiments the server 320 can broadcast the identifier330 to devices registered to other participating users 340, 350. In animplementation in which the key fob 100 is directly addressable, theserver 320 can attempt to transmit an encoded disable command directlyto the key fob 100 using the secondary communication protocol. If thekey fob 100 directly receives the encoded disable command, accompaniedby the key fob identifier 330 associated with the key fob 100, thesecondary communication circuit 180 responds by opening the internalswitch 152.

The internal switch 152, once opened, cannot be manually closed by anunauthorized user. While the internal switch 152 remains open, the keyfob 100 will not communicate with the associated vehicle via the antenna160, thereby preventing an unauthorized user from using the key fob 100to locate or unlock the associated vehicle. If the key fob 100 is foundor returned to the owner, the owner can again login to the server 320,complete the required identity verifications, and submit a request tosend an enable signal to cause the secondary communication circuit 180to close the internal switch 152, thereby restoring the key fob 100 tonormal operational status.

With continued reference to FIG. 3, if the key fob 100 is not directlyaddressable or the server 320 is unable to reach the key fob 100, theserver 320 can broadcast an encoded search and disable signal toregistered wireless communication devices that belong to participatingusers 340, 350. The registered wireless communication devices (e.g., keyfob, cell phone, watch, tablet, etc.) may receive the encoded search anddisable signal from the server 320 and rebroadcast the signal. Forexample, a key fob 360 that belongs to participating user 350 mayreceive the encoded signal carrying key fob 100 identification code anda disable command and, in response, broadcast the signal.

When the participating user 350 passes within a communicative range ofthe key fob 100, the secondary communication circuit 180 can receive theencoded signal being broadcasted from key fob 360. In response, thesecondary communication circuit 180 of the key fob 100 can broadcast aconfirmation signal via the second antenna 190 using the secondarycommunication protocol and open the internal switch 152, therebydisconnecting the antenna 160 from the control circuit 105.

In one or more embodiments, the secondary communication circuit 180 cancontinue to periodically broadcast the confirmation signal. In thisstate, the key fob 100 is no longer vulnerable to a boost attack, cannotbe used to locate, unlock and drive the vehicle, and can be detected byany registered device passing by that detects the confirmation signal.The registered device can in turn report the receipt of the confirmationsignal to the server 320, which can notify the owner of the state of thekey fob 100. In one or more embodiments, if the registered device isequipped with a GPS receiver the registered device can also report tothe server 320 a location or an approximate location at which theconfirmation signal was first received. The owner can thereby beinformed of a general area to search for the key fob 100.

As previously discussed, since the antenna 160 is disconnected from thecontrol circuit 105 by the internal switch 152, the disable switch 150cannot be used to reconnect the antenna 160 to the control circuit 105.When the key fob 100 is found or returned to the owner, the owner canlogin to the server 320, confirm that the key fob 100 is back in theowner's possession, and request the server 320 to broadcast an encodedsignal including the key fob address and enable command to cause thesecondary communication circuit 180 to close the internal switch 152,thereby reconnecting the antenna 160 to the control circuit 105 andrestoring normal operational functions of the key fob 100.

FIG. 4 illustrates another example scenario 400 in which features of thedisclosed key fob 100 can provide a defensive barrier in a situation inwhich a conventional key fob would be vulnerable to attack. In theexample scenario 400 the key fob 100 has been placed inside a home 410while the vehicle 102 associated with the key fob 100 remains parkednearby outside of the home 410. For example, the owner may be settlingdown for the night and left the key fob 100 on a stand, counter, etc. Inthis setting, while a conventional key fob would be particularlyvulnerable to a boost attack (e.g., in the middle of the night) the keyfob 100 can provide several options to oppose the attack.

First, the owner of the key fob 100 may manually open the disable switch150 of the key fob 100 upon exiting the vehicle, thereby preventing thekey fob 100 from receiving signals from the associated vehicle orsending signals to the vehicle 102. Upon opening the disable switch 150the indicator component 170 would provide an indication of thecommunicative state of the key fob 100 (e.g., a chirp and turning on ablue LED). For the duration of the time that the disable switch 150 isopen, the key fob 100 would exhibit significant increased resistance toa boost attack or similar signal-based attack.

When the owner is ready to drive the vehicle 102 again, the owner cantake note of the indication of the communicative state of the key fob100 and, in response, close the disable switch 150. Upon closure of thedisable switch 150 the indicator component 170 would again provide anindication of the communicative state of the key fob 100 (e.g., a doublechirp and turning off the blue LED). Closing the disable switch 150reconnects the antenna 160 with the control circuit 105, allowing theowner to unlock the vehicle 102 and otherwise utilize the normaloperational functions of the key fob 100 in association with the vehicle102.

As a second option, in one or more embodiments the disable module 124can automatically control the actuator 140 to open the disable switch150, for example, based on attempting to ping the associated vehicle 102and not receiving a response after a threshold amount of time or numberof attempts. In one or more embodiments this feature can be activated ordeactivated as a user preference setting. For example, if the ownertends to forget to manually open the disable switch 150 after exitingthe vehicle 102, this feature can be utilized to automatically open thedisable switch 150.

Similar to manual operation, the same boost attack resistance is raisedand the indicator component 170 would provide an indication that thedisable switch 150 has been opened. Thus, if the owner simply enteredthe home 410, set the key fob 100 down and carried on, the key fob 100can automatically defend itself against boost attacks and notify theowner of its communicative state.

As a third option, in one or more embodiments an external system, suchas a home security system, wireless computing device, vehicle system,etc., can be scheduled to broadcast an encoded signal including the keyfob 100 address and a disable command. In one implementation shown inFIG. 4, for example, a home security system 420 can be programmed totransmit an encoded signal 430 to the key fob 100 address via thesecondary communication protocol at 11:00 PM every night. Upon receivingthe encoded signal 430, the secondary communication circuit can controlthe actuator 140 to open the disable switch 150, with the results andoutcomes following as discussed above in the first two options.

Thus, the disclosed key fob 100 can provide numerous improvements insecurity, peace of mind and utility over conventional key fobs byproviding various ways, including manual, automatic, and remote, todefend the key fob 100 against certain signal-based attacks.

It should be noted that in one or more embodiments the control circuit105 can be configured to limit possible output signals based on theconnective state of the antenna 160. For example, in one or moreembodiments when the disable switch 150 is open the control module 122can be limited to causing the communication circuit to output a presencesignal responsive to a presence check signal from the associated vehicle102. In this manner if the key fob 100 is inside of the vehicle and thecommunication circuit 115 directly detects a presence check signal fromthe vehicle 102 (i.e., the circuit detects the signal without the use ofthe antenna 160), the key fob 100 can respond to indicate to the vehicle102 that the key fob 100 is inside the vehicle. Such limited action canallow the key fob 100 to still provide conventional features associatedwith preventing the key fob 100 from being locked inside the vehicle.

FIG. 5 illustrates a flowchart of an example method 500 that isassociated with operations of the disclosed key fob 100. The method 500will be discussed from the perspective of the disclosed key fob 100 ofFIGS. 1-4. While the method 500 is discussed in combination with the keyfob 100, it should be appreciated that the method 500 is not limited tobeing implemented within the key fob 100, which is merely one example ofa type of key fob system that may implement the method 500. Furthermore,one of ordinary skill in the art will recognize that the method 500 ismerely one example method of implementing the disclosed embodiments.Different variations may be constructed according to implementation in agiven setting or situation.

At operation 505 the key fob 100 receives a signal. At operation 510 thecontrol circuit 105 (e.g., control module 122) checks whether the signalis a valid signal encoded in the primary communication protocol anddirected to the key fob 100. For example, the control module 122 candetermine whether the signal includes necessary identifiers and/or codesto validate that the signal was sent from the associated vehicle 102.

If the signal is valid and encoded in the primary communicationprotocol, at operation 515 the control circuit 105 (e.g., control module122) processes the signal and executes a corresponding response (e.g.,respond to a presence check signal from the vehicle 102). The processthen ends at operation 560.

If the signal is not a valid signal encoded in the primary communicationprotocol, at operation 520 the control circuit (e.g., secondarycommunication circuit 180) determines whether the signal is a validsignal encoded in the secondary communication protocol directed to thekey fob 100. For example, in one or more embodiments, if the key fob 100is addressable under the secondary communication protocol the secondarycommunication circuit 180 can determine whether the signal includes thecorrect address for the key fob 100. Other security, ID and validationchecks may be used to check the signal. If the secondary communicationcircuit 180 determines that the signal is not a valid signal encoded inthe secondary communication protocol, the signal is ignored and theprocess ends at operation 560.

If the secondary communication circuit 180 determines that the signal isa valid signal encoded in the secondary communication protocol, atoperation 525 the secondary communication circuit 180 determines whetherthe signal includes a command to open the disable switch 150.

If secondary communication circuit 180 determines that the signalincludes a disable command (e.g., received from a home security system),at operation 530 the control circuit 105 opens the disable switch 150.For example, the disable module 124 can control the actuator 140 tocause the disable switch 150 to transition from a first state (closed)to a second state (open).

At operation 535 the control circuit 105 (e.g., disable module 124)controls the indicator component 170 to execute an indication responseto the disable switch 150 transitioning between the first state and thesecond state. For example, in one or more embodiments the indicatorcomponent 170 is an electronic indicator component including a visualindicator (e.g., an LED). In this case, the disable module 124 canexecute the response to the disable switch transition by transitioningthe visual indicator to a first visual state (e.g., blue light on) whenthe disable switch connects the antenna with the control circuit, andtransitioning the visual indicator to a second visual state (e.g., bluelight off) different from the first visual state when the disable switchdisconnects the antenna from the control circuit. The process then endsat operation 560.

If the secondary communication circuit 180 determines that the signaldoes not include a disable command, at operation 540 the secondarycommunication circuit 180 determines whether the signal includes a validoverride command to open the internal switch 152. If the secondarycommunication circuit 180 determines that the signal does not include avalid override command, then the signal is ignored and the process endsat operation 560.

If secondary communication circuit 180 determines that the signal doesinclude a valid override signal, at operation 545 the secondarycommunication circuit 180 transitions the internal switch 152 from afirst state (closed) to a second state (open). Opening the internalswitch 152 disconnects the disable switch 150 and the antenna 160 fromthe control circuit 105, thereby overriding the functionality of thedisable switch 150 and placing the key fob 100 in a noncommunicativestate in reference to the primary communication protocol.

At operation 550, the control circuit 105 can execute a secondaryindicator response. In one or more embodiments, the secondary indicatorresponse is different from the indicator response associated with thedisable switch 150, as discussed above.

At operation 555, the control circuit 105 (e.g., secondary communicationcircuit 180) can transmit a confirmation signal indicating that theinternal switch 152 has been opened. The process ends at operation 560.

Accordingly, the disclosed key fob 100 can advantageously raise abarrier against boost attacks by incorporating features that allow formultiple ways to place the key fob 100 in an uncommunicative state.Thus, the disclosed embodiments significantly reduce a likelihood ofunauthorized individuals successfully exploiting certain types ofvulnerabilities inherence in wireless communication commands.

In addition to the above described configurations, it should beappreciated that the key fob 100 from FIG. 1 can be configured invarious arrangements with separate integrated circuits and/or chips. Insuch embodiments, the control module 122 and disable module 124 can eachbe embodied on individual integrated circuits. The circuits can beconnected via connection paths to provide for communicating signalsbetween the separate circuits. Of course, while separate integratedcircuits are discussed, in various embodiments, the circuits may beintegrated into a common integrated circuit board. Additionally, theintegrated circuits may be combined into fewer integrated circuits ordivided into more integrated circuits. In another embodiment, themodules 122 and 124 may be combined into a separate application-specificintegrated circuit. In further embodiments, portions of thefunctionality associated with the modules 122 and 124 may be embodied asfirmware executable by a processor and stored in a non-transitorymemory. In still further embodiments, the modules 122 and 124 areintegrated as hardware components of the processor 110.

In another embodiment, the described methods and/or their equivalentsmay be implemented with computer-executable instructions. Thus, in oneembodiment, a non-transitory computer-readable medium is configured withstored computer executable instructions that when executed by a machine(e.g., processor, computer, and so on) cause the machine (and/orassociated components) to perform the method.

While for purposes of simplicity of explanation, the illustratedmethodologies in the figures are shown and described as a series ofblocks, it is to be appreciated that the methodologies (e.g., method 500of FIG. 5) are not limited by the order of the blocks, as some blockscan occur in different orders and/or concurrently with other blocks fromthat shown and described. Moreover, less than all the illustrated blocksmay be used to implement an example methodology. Blocks may be combinedor separated into multiple components. Furthermore, additional and/oralternative methodologies can employ additional blocks that are notillustrated.

As previously described, the key fob 100 can include one or moreprocessors 110. In one or more arrangements, the processor(s) 110 can bea main processor of the key fob 100. For instance, the processor(s) 110can be an electronic control unit (ECU). The key fob 100 can include oneor more data stores for storing one or more types of data. The datastores can include volatile and/or non-volatile memory. Examples ofsuitable data stores include RAM (Random Access Memory), flash memory,ROM (Read Only Memory), PROM (Programmable Read-Only Memory), EPROM(Erasable Programmable Read-Only Memory), EEPROM (Electrically ErasableProgrammable Read-Only Memory), registers, other storage medium that aresuitable for storing the disclosed data, or any combination thereof. Thedata stores can be a component of the processor(s) 110, or the datastore can be operatively connected to the processor(s) 110 for usethereby. The term “operatively connected,” as used throughout thisdescription, can include direct or indirect connections, includingconnections without direct physical contact.

Detailed embodiments are disclosed herein. However, it is to beunderstood that the disclosed embodiments are intended only as examples.Therefore, specific structural and functional details disclosed hereinare not to be interpreted as limiting, but merely as a basis for theclaims and as a representative basis for teaching one skilled in the artto variously employ the aspects herein in virtually any appropriatelydetailed structure. Further, the terms and phrases used herein are notintended to be limiting but rather to provide an understandabledescription of possible implementations. Various embodiments are shownin FIGS. 1-5, but the embodiments are not limited to the illustratedstructure or application.

The flowcharts and block diagrams in the figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments. In this regard, each block in the flowcharts or blockdiagrams may represent a module, segment, or portion of code, whichcomprises one or more executable instructions for implementing thespecified logical function(s). It should also be noted that, in somealternative implementations, the functions noted in the block may occurout of the order noted in the figures. For example, two blocks shown insuccession may, in fact, be executed substantially concurrently, or theblocks may sometimes be executed in the reverse order, depending uponthe functionality involved.

The systems, components and/or processes described above can be realizedin hardware or a combination of hardware and software and can berealized in a centralized fashion in one processing system or in adistributed fashion where different elements are spread across severalinterconnected processing systems. Any kind of processing system oranother apparatus adapted for carrying out the methods described hereinis suited. A combination of hardware and software can be a processingsystem with computer-usable program code that, when being loaded andexecuted, controls the processing system such that it carries out themethods described herein. The systems, components and/or processes alsocan be embedded in a computer-readable storage, such as a computerprogram product or other data programs storage device, readable by amachine, tangibly embodying a program of instructions executable by themachine to perform methods and processes described herein. Theseelements also can be embedded in an application product which comprisesall the features enabling the implementation of the methods describedherein and, which when loaded in a processing system, is able to carryout these methods.

Furthermore, arrangements described herein may take the form of acomputer program product embodied in one or more computer-readable mediahaving computer-readable program code embodied, e.g., stored, thereon.Any combination of one or more computer-readable media may be utilized.The computer-readable medium may be a computer-readable signal medium ora computer-readable storage medium. The phrase “computer-readablestorage medium” means a non-transitory storage medium. Acomputer-readable medium may take forms, including, but not limited to,non-volatile media, and volatile media. Non-volatile media may include,for example, optical disks, magnetic disks, and so on. Volatile mediamay include, for example, semiconductor memories, dynamic memory, and soon. Examples of such a computer-readable medium may include, but are notlimited to, a floppy disk, a flexible disk, a hard disk, a magnetictape, other magnetic medium, an ASIC, a CD, other optical medium, a RAM,a ROM, a memory chip or card, a memory stick, and other media from whicha computer, a processor or other electronic device can read. In thecontext of this document, a computer-readable storage medium may be anytangible medium that can contain, or store a program for use by or inconnection with an instruction execution system, apparatus, or device.

The following includes definitions of selected terms employed herein.The definitions include various examples and/or forms of components thatfall within the scope of a term and that may be used for variousimplementations. The examples are not intended to be limiting. Bothsingular and plural forms of terms may be within the definitions.

References to “one embodiment”, “an embodiment”, “one example”, “anexample”, and so on, indicate that the embodiment(s) or example(s) sodescribed may include a particular feature, structure, characteristic,property, element, or limitation, but that not every embodiment orexample necessarily includes that particular feature, structure,characteristic, property, element or limitation. Furthermore, repeateduse of the phrase “in one embodiment” does not necessarily refer to thesame embodiment, though it may.

“Module,” as used herein, includes a computer or electrical hardwarecomponent(s), firmware, a non-transitory computer-readable medium thatstores instructions, and/or combinations of these components configuredto perform a function(s) or an action(s), and/or to cause a function oraction from another logic, method, and/or system. Module may include amicroprocessor controlled by an algorithm, a discrete logic (e.g.,ASIC), an analog circuit, a digital circuit, a programmed logic device,a memory device including instructions that when executed perform analgorithm, and so on. A module, in one or more embodiments, includes oneor more CMOS gates, combinations of gates, or other circuit components.Where multiple modules are described, one or more embodiments includeincorporating the multiple modules into one physical module component.Similarly, where a single module is described, one or more embodimentsdistribute the single module between multiple physical components.

Additionally, module as used herein includes routines, programs,objects, components, data structures, and so on that perform particulartasks or implement particular data types. In further aspects, a memorygenerally stores the noted modules. The memory associated with a modulemay be a buffer or cache embedded within a processor, a RAM, a ROM, aflash memory, or another suitable electronic storage medium. In stillfurther aspects, a module as envisioned by the present disclosure isimplemented as an application-specific integrated circuit (ASIC), ahardware component of a system on a chip (SoC), as a programmable logicarray (PLA), or as another suitable hardware component that is embeddedwith a defined configuration set (e.g., instructions) for performing thedisclosed functions.

In one or more arrangements, one or more of the modules described hereincan include artificial or computational intelligence elements, e.g.,neural network, fuzzy logic or other machine learning algorithms.Further, in one or more arrangements, one or more of the modules can bedistributed among a plurality of the modules described herein. In one ormore arrangements, two or more of the modules described herein can becombined into a single module.

Program code embodied on a computer-readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber, cable, RF, etc., or any suitable combination ofthe foregoing. Computer program code for carrying out operations foraspects of the present arrangements may be written in any combination ofone or more programming languages, including an object-orientedprogramming language such as Java™, Smalltalk, C++ or the like andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The program codemay execute entirely on the user's computer, partly on the user'scomputer, as a stand-alone software package, partly on the user'scomputer and partly on a remote computer, or entirely on the remotecomputer or server. In the latter scenario, the remote computer may beconnected to the user's computer through any type of network, includinga local area network (LAN) or a wide area network (WAN), or theconnection may be made to an external computer (for example, through theInternet using an Internet Service Provider).

The terms “a” and “an,” as used herein, are defined as one or more thanone. The term “plurality,” as used herein, is defined as two or morethan two. The term “another,” as used herein, is defined as at least asecond or more. The terms “including” and/or “having,” as used herein,are defined as comprising (i.e., open language). The phrase “at leastone of . . . and . . . ” as used herein refers to and encompasses anyand all possible combinations of one or more of the associated listeditems. As an example, the phrase “at least one of A, B, and C” includesA only, B only, C only, or any combination thereof (e.g., AB, AC, BC orABC).

Aspects herein can be embodied in other forms without departing from thespirit or essential attributes thereof. Accordingly, reference should bemade to the following claims, rather than to the foregoingspecification, as indicating the scope hereof.

1. A key fob, associated with a vehicle, comprising: an antenna; acontrol circuit including one or more processors and a memorycommunicably connected to the one or more processors; a disable switch,comprising a physical mechanism that a user can manually manipulate,connected to the antenna and to the control circuit; an actuatorconnected to the disable switch; and a secondary wireless communicationcircuit, connected to the actuator, configured to receive at least adisable signal and an enable signal, and further configured to controlthe actuator to transition the disable switch to the second state inresponse to the disable signal and transition the disable switch to thefirst state in response to the enable signal, wherein the disable switchconnects the antenna with the control circuit in a first state anddisconnects the antenna from the control circuit in a second state, andwherein the key fob wirelessly communicates with the vehicle using aprimary communication protocol and the secondary wireless communicationcircuit is configured to communicate using a secondary communicationprotocol that is different from the primary communication protocol. 2.The key fob of claim 1, further comprising a visual indicator configuredto transition to a first visual state when the disable switch connectsthe antenna with the control circuit and transition to a second visualstate different from the first visual state when the disable switchdisconnects the antenna from the control circuit.
 3. The key fob ofclaim 1, further comprising an audio indicator configured to emit afirst sound when the disable switch connects the antenna with thecontrol circuit and emit a second sound different from the first soundwhen the disable switch disconnects the antenna from the controlcircuit.
 4. (canceled)
 5. The key fob of claim 1, wherein the secondarycommunication protocol is at least one of: internet protocol (IP); nearfield communication (NFC); ultrawide band (UWB); Bluetooth® (BT);Bluetooth® Low Energy (BLE); and radio-frequency identification (RFID).6. The key fob of claim 1, further comprising an internal switchconnected between the disable switch and the control circuit, whereinthe secondary wireless communication circuit is further configured toreceive an override signal and, in response to the override signal,transition the internal switch to an open state that disconnects theantenna from the control circuit.
 7. The key fob of claim 6, furthercomprising an indicator component configured to provide a firstindication when the disable switch is open and provide a secondindication different from the first indication when the internal switchis open.
 8. The key fob of claim 1, further comprising: an actuatorconnected to the disable switch, wherein the memory stores a disablemodule including one or more instructions that, when executed by the oneor more processors, cause the one or more processors to determine thatthe antenna has not received a signal from the vehicle for at least athreshold amount of time, and in response, cause the actuator totransition the disable switch to the second state.
 9. A method ofcontrolling a key fob associated with a vehicle, the key fob includingan antenna, a control circuit, and a disable switch, comprising amechanism that a user can manually manipulate, connected between theantenna and the control circuit such that the disable switch connectsthe antenna with the control circuit in a first state and disconnectsthe antenna from the control circuit in a second state, the methodcomprising: controlling an actuator connected to the disable switch to,in response to receiving a disable signal, transition the disable switchto the second state to prevent a signal received at the antenna frombeing processed by the control circuit; and controlling an electronicindicator component to execute a response to the disable switchtransitioning between the first state and the second state.
 10. Themethod of claim 9, wherein the electronic indicator component includes avisual indicator, and controlling the electronic indicator component toexecute a response further comprises: transitioning the visual indicatorto a first visual state when the disable switch connects the antennawith the control circuit; and transitioning the visual indicator to asecond visual state different from the first visual state when thedisable switch disconnects the antenna from the control circuit.
 11. Themethod of claim 9, wherein the electronic indicator component includesan audio indicator, and controlling the electronic indicator componentto execute a response further comprises: emitting a first sound via theaudio indicator when the disable switch connects the antenna with thecontrol circuit; and emitting a second sound via the audio indicatordifferent from the first sound when the disable switch disconnects theantenna from the control circuit.
 12. The method of claim 9, wherein thekey fob further comprises a secondary wireless communication circuitconnected to the actuator, the method further comprising: receiving, bythe secondary wireless communication circuit, a disable signal; andcontrolling the actuator to transition the disable switch to the secondstate in response to the secondary wireless communication circuitreceiving the disable signal, wherein the key fob communicates with thevehicle using a primary communication protocol and the secondarywireless communication circuit is configured to communicate using asecondary communication protocol that is different from the primarycommunication protocol.
 13. The method of claim 12, wherein thesecondary communication protocol of at least one of: internet protocol(IP); near field communication (NFC); Bluetooth® (BT); Bluetooth® LowEnergy (BLE); and radio-frequency identification (RFID).
 14. The methodof claim 12, wherein the key fob further comprises an internal switchconnected between the disable switch and the control circuit, the methodfurther comprising: receiving, by the secondary wireless communicationcircuit, an override signal; and transitioning the internal switch to anopen state that disconnects the antenna from the control circuit inresponse to the override signal.
 15. The method of claim 14, furthercomprising controlling the electronic indicator component to responddifferently in response to the override signal than in response to thedisable signal.
 16. A non-transitory computer-readable medium storinginstructions for controlling a key fob associated with the vehicle, thekey fob including an antenna, a control circuit, and a disable switch,comprising a mechanism that a user can manually manipulate, connectedbetween the antenna and the control circuit such that the disable switchconnects the antenna with the control circuit in a first state anddisconnects the antenna from the control circuit in a second state, andthat when executed by one or more processors cause the one or moreprocessors to: control an actuator connected to the disable switch totransition the disable switch to the second state to prevent a signalreceived at the antenna from being processed by the control circuit;control an electronic indicator component to execute a response to thedisable switch transitioning between the first state and the secondstate; receive, by a secondary wireless communication circuit connectedto the actuator, a disable signal; and control the actuator totransition the disable switch to the second state in response to thesecondary wireless communication circuit receiving the disable signal,wherein the key fob communicates with the vehicle using a primarycommunication protocol and the secondary wireless communication circuitis configured to communicate using a secondary communication protocolthat is different from the primary communication protocol. 17.(canceled)
 18. The non-transitory computer-readable medium of claim 16,wherein the secondary communication protocol of at least one of:internet protocol (IP); near field communication (NFC); Bluetooth® (BT);Bluetooth® Low Energy (BLE); and radio-frequency identification (RFID.19. The non-transitory computer-readable medium of claim 16, wherein thekey fob further comprises an internal switch connected between thedisable switch and the control circuit, further comprising instructionsto: receive, by the secondary wireless communication circuit, anoverride signal; and transition the internal switch to an open statethat disconnects the antenna from the control circuit in response to theoverride signal.
 20. The non-transitory computer-readable medium ofclaim 19, further comprising instructions to control the electronicindicator component to respond differently in response to the overridesignal than in response to the disable signal.
 21. The non-transitorycomputer-readable medium of claim 16, wherein the electronic indicatorcomponent includes a visual indicator, and instructions to control theelectronic indicator component to execute a response further comprisesinstructions to: transition the visual indicator to a first visual statewhen the disable switch connects the antenna with the control circuit;and transition the visual indicator to a second visual state differentfrom the first visual state when the disable switch disconnects theantenna from the control circuit.
 22. The non-transitorycomputer-readable medium of claim 16, wherein the electronic indicatorcomponent includes an audio indicator, and instructions to control theelectronic indicator component to execute a response further comprisesinstructions to: emit a first sound via the audio indicator when thedisable switch connects the antenna with the control circuit; and emit asecond sound via the audio indicator different from the first sound whenthe disable switch disconnects the antenna from the control circuit.