PERSONAL ACCESS CODE REMOTE CONTROL FIELD OF THE INVENTION The present invention relates generally to remote control systems, and particularly to a remote control that transmits a valid operating signal only upon prior entry of a valid personal access code, such a remote control being particularly useful in a vehicle security system.
BACKGROUND OF THE INVENTION Many kinds of remote controllers are known for operating alarm or security systems of vehicles. A problem is that remote control devices used with vehicles can be pilfered or copied, thereby allowing unscrupulous individuals unauthorized access to the vehicle. The prior art recognizes the need to personalize remote controllers in order to confound attempts of unauthorized individuals to use the remote controllers.
In US Patent 5,654,688, a controller learns a unique code of a remote transmitter that is capable of causing the operation of various functions associated with vehicle security. The controller performs transmitter verification, i.e., an indication of whether a new uniquely coded remote transmitter has been learned by the controller. The remote transmitter verification is based upon the controller being recently entered into the remote transmitter learning mode. Verification can be incorporated in a remote keyless entry system, remote engine starting system, and door access system. Indication of verification can be provided at or remote from the vehicle and may be either visual or audible. However, in this system, no personal access code is entered into a remote control device.
British Patent GB 2298071 describes a security system wherein a remote control wireless transmitter generates remote control command signals for the system to enter a valet mode. A system controller is responsive to the remote control commands signals to enter a secure valet mode and the system is disabled from tripping and performing the security functions. The valet mode may be entered via wireless remote control signals received from the transmitter. However, this system does not teach or show entering a personal access code into a remote control device.
US Patent 5,467,070 describes a vehicle security system that includes a secure valet/programming switch inside the vehicle. To enter the system valet mode (i.e. switch off the security system), or to select a function via the valet/programming switch, the user must first enter a valid personal access code via the switch. To prevent an intruder from deciphering the personal
code by trying various codes, the system ignores, after a preset number of successive invalid entries, further switch inputs for preset period of time. When attempts to decipher the code are detected, an alarm is tripped, and a siren will sound. To accommodate various drivers of the same vehicle, more than one valid code can be stored in the system. Any of the personal access codes may be changed any time, but after the user's present code is entered. It should be noted that although the '070 patent uses a personal access code, nevertheless this access code is used only once the user is inside the vehicle. The '070 patent does not teach or show entering a personal access code into a remote control device.
Other relevant patent documents include US Patents 5,218,358; 5,278,547; 5,673,017; 5,559,493; 5,585,779; 5,654,688; 5,673.017; and 5,708,308. None of the prior art teaches entering a personal access code into a remote control device in order to allow the remote control device to transmit an operating signal.
SUMMARY OF THE INVENTION The present invention seeks to provide an improved remote control system wherein a personal access code must be entered into the remote control system in order to allow the remote control system to transmit an operating signal. Such a remote control system is particularly useful for transmitting a valid operating signal to a vehicle security and/or location system. By assigning a personal access code to the remote control system, an unauthorized individual cannot disarm the vehicle security and/or location system by merely stealing the remote control system because that individual does not know the personal access code.
There is thus provided in accordance with a preferred embodiment of the present invention a remote control system including a remote control transmitter, an input device, and a processor in communication with the transmitter and the input device, the processor being operative to process an access code entered into the input device, to compare the entered code with a valid access code and to command the transmitter to transmit a valid operating signal only upon entry of a valid personal access code into the input device.
In accordance with a preferred embodiment of the present invention the transmitter and the input device are housed together with the processor. .Alternatively, the transmitter and the input device may be housed separately from the processor. Preferably the transmitter controls operation of at least one of a vehicle security system and a vehicle location system. The processor
may be housed together with at least one of the vehicle security system and the vehicle location system.
The input device may include a keyboard, a touch pad, a telegraphic code entry device, an optical signal device, a fingerprint reader and/or a voice recognition device. There is also provided in accordance with a preferred embodiment of the present invention method for remote control operation, including entering a personal access code into a remote control system, processing the entered access code and comparing the entered code with a valid access code, and transmitting a valid operating signal only upon entry of a valid personal access code. In accordance with a preferred embodiment of the present invention the method also includes transmitting a decoy operating signal upon entry of a non- valid personal access code.
Further in accordance with a preferred embodiment of the present invention the method also includes transmitting a warning signal of an unauthorized access attempt if a number of entries of non- valid personal access codes is greater than a predetermined amount. Still further in accordance with a preferred embodiment of the present invention the method also includes encrypting the transmitted signal.
In accordance with a preferred embodiment of the present invention the valid operating signal is generated as a function of the valid personal access code.
Further in accordance with a preferred embodiment of the present invention the valid operating signal includes a randomly generated code.
Still further in accordance with a preferred embodiment of the present invention the step of entering the personal access code includes entering alphanumeric data.
Additionally in accordance with a preferred embodiment of the present invention the step of entering the personal access code includes entering data in accordance with a telegraphic code.
In accordance with a preferred embodiment of the present invention the step of entering the personal access code includes a combination of keyed-in signals and optical signals.
Further in accordance with a preferred embodiment of the present invention the step of entering the personal access code includes entering fingerprint identification information. Still further in accordance with a preferred embodiment of the present invention the step of entering the personal access code includes entering voice recognition information.
Additionally in accordance with a preferred embodiment of the present invention the step of transmitting a valid operating signal disarms operation of at least one of a vehicle security system and a vehicle location system.
In accordance with a preferred embodiment of the present invention the step of transmitting a valid operating signal initiates operation of at least one of a vehicle security system and a vehicle location system.
BRIEF DESCRIPTION OF THE DRAWINGS The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which: Fig. 1 is a simplified block diagram illustration of a remote control system constructed and operative in accordance with a preferred embodiment of the present invention; and
Fig. 2 is a simplified flow chart illustration of a method for remote control operation of a system, in accordance with a preferred embodiment of the present invention. DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT
Reference is now made to Fig. 1 which illustrates in block diagram form a remote control system constructed and operative in accordance with a preferred embodiment of the present invention. A remote control system 10 includes a remote control transmitter 12, such as that used in conventional remote control devices, and an input device 14 for inputting a personal access code, as will be described further in detail hereinbelow. A processor 16, preferably a microprocessor, is in communication with transmitter 12 and input device 14. Processor 16 preferably recognizes different kinds of code, such as, but not limited to, rolling or hopping codes. Processor 16 processes an access code entered into input device 14, compares the entered code with a valid access code and commands transmitter 12 to transmit a valid operating signal only upon entry of a valid personal access code into input device 14.
Such a remote control system is particularly useful for transmitting a valid operating signal to a vehicle security and/or location system 20. As discussed above, remote control devices used with vehicles can be pilfered or copied, thereby allowing unscrupulous individuals unauthorized access to the vehicle. By assigning remote control system 10 a personal access code, an unauthorized individual cannot disarm vehicle security and/or location system 20
by merely stealing remote control system 10 because that individual does not know the personal access code.
Processor 16 most preferably is housed in remote control system 10 together with transmitter 12 and input device 14. In such an embodiment, processor 16 may encrypt the signal to be transmitted. For example, compressive, one-way cryptological functions, known as hash functions, may be used to secure the communication between remote control system 10 and vehicle security and/or location system 20. To provide a greater level of trust, mutual zero- knowledge interaction authentication sessions between remote control system 10 and vehicle security and/or location system 20 may be held, such as the so-called Fiat-Shamir authentication methods taught in US Patent 4,748,668 to Shamir and Fiat, the disclosure of which is incorporated herein by reference. Such an embodiment provides a high level of communication security wherein security cannot be breached by listening to the communication between remote control system 10 and vehicle security and/or location system 20.
Additionally or alternatively, the valid operating signal may be generated as a function of the valid personal access code. The valid operating signal may comprise a randomly generated code.
.Alternatively, processor 16 may be housed separately from transmitter 12 and input device 14 in a portion of vehicle security and/or location system 20. In the latter case, transmitter 12 transmits a signal comprising the personal access code. Certainly this is less preferable for security reasons.
Input device 14 may include a keyboard or touch pad for entering alphanumeric data. .Alternatively, input device 14 may include a telegraphic code entry device, i.e., a device for entering a series of signals, sounds or "clicks", such as the familiar Morse code, which signals are recognized by processor 16. Additionally or alternatively, an optical signal device 22, such as a LED or LCD, may be used in conjunction with input device 14. For example, the optical signal device 22 may flash in a predetermined manner in accordance with the input of the personal access code to provide a use with a visual verification or aid that the personal access code is being entered properly. Alternatively, if the personal access code is, for example, 435, the optical signal device 22 may flash, and at the fourth flash, the user must press a button to transmit "4", then after the subsequent third flash, press the button to transmit "3", and so forth. Optical signal device 22 may be mounted either on remote control system 10 or any part of a vehicle.
Still alternatively, input device 14 may include a fingerprint reader or a voice recognition device.
Reference is now made to Fig. 2 which is a flow chart illustration of a method for remote control operation of a system, in accordance with a preferred embodiment of the present invention.
The remote control system 10 is first turned on by pressing a start button. A personal access code is entered in input device 14. Processor 16 compares the entered personal access code with a valid code, preferably stored in a memory, such as a PROM. If access code is found to be valid, then transmitter 12 is commanded to transmit a valid operating signal. If the entered code is not valid, then, in accordance with a preferred embodiment of the present invention, processor 16 instructs transmitter 12 to transmit a decoy operating signal. If transmitter 12 were to transmit an operating signal only upon entering the valid personal code, hackers could possibly scan through a range of access codes and wait until a signal is transmitted, whereupon they would know that they have found the valid personal access code. By emitting a decoy signal, the hackers have no way of knowing which is the valid personal access code.
The number of false attempts may be counted, and upon passing a predetermined amount, transmitter 12 may be instructed to transmit a warning signal of an unauthorized access attempt, thereby providing an additional security feature.
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the present invention includes both combinations and subcombinations of the features described hereinabove as well as modifications and variations thereof which would occur to a person of skill in the art upon reading the foregoing description and which are not in the prior art.