|
 |
 |
New generation of keyless access to the system by jodie mht
 |
|
|
New generation of keyless access to the system |
|
|
|
Automotive
|
 |
This makes the key manufacturers face challenges, they must develop a new method of car keys and transceiver assembly together, which does not destroy the key or function can not be removed to the transceiver. A more advanced means of auto theft and look-up table. Key assumptions can have a few days or a few hours, you can use the advanced professional engineering equipment to the transceiver sends the query signal and read its response, to create a database to store the response to different queries. Then, the thief may this database in the car to obtain a correct response to the query signal by electronic anti-theft devices can then be fired at least once to get the correct response to a query signal to open the car. However, this means lower success rate. DST provides a mutual authentication process, the relevant agreement to ensure that the transceiver does not respond to any query signal. The transceiver will verify the request signal from the authorized base station, therefore, look-up table car theft means no effect. The new generation of transceivers focus on automotive history tracking, Pirates of the diagnosis, to prevent car theft "look-up table", and has a larger data or vehicle data storage space. Transceiver dedicated to a special password protected memory area, allows vendors (such as a car manufacturer) to get background information about the car keys and security systems. Its characteristics are the following: Can not reset the step counter, and the traceability of the system studied the total number of car keys;New car key learning process, so that car manufacturers can get the relevant information of the security system, light from the car keys without having to enter the automotive safety systems, or use a central database. This makes it possible to achieve two functions: detect car key is a security system is still effective to prevent the keys to be invalid for fraud; to identify key security system has been disabled again insert keyhole and tried to start the engine . This information will be encoded and stored in a dedicated anti-theft byte. These features supported by the mutual authentication protocol transceiver. As mentioned earlier, this security mechanism to deny access to unauthorized base station. This technology is complex, dedicated to automotive safety key hierarchy is a combination, can ensure that only authorized the department to be able to read confidential data. To develop a car with no mechanical keys, we must first develop a keyless entry system. The next-generation keyless entry system is different from previous remote keyless access to the system when the user close to or touch the door handle, it can automatically identify the driver and opens the lock. Radio frequency identification (RFID) technology can achieve this convenience, and to ensure that the system under any circumstances be able to correctly identify the driver. Drivers carry identification (key chain or a credit card-shaped device) that contains one or more RFID devices connected to the antenna.Main products: car dvd and car gps and car dvd player are with good quality. Base station antennas and antenna coupling, in the vicinity (such as the 50cm area) identification device magnetic energy can be realized without a battery backup function. Distance range (200cm), the identification device antenna reception by the base station to zoom in and the processed data. Figure 1 for the introduction of TI's three-dimensional antenna analog front end (3D AFE) keyless entry system block diagram.
Related Articles -
car gps, car dvd player,
|
Rate This Article |
|
 |
|
Do you Agree or Disagree? Have a Comment? POST IT!
Reader Opinions |
|
 |
|
|
|
 |
 |
 |
Author Login |
|
 |
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views

 |
 |
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
 |
 |
 |
 |
STEPHEN BYE
Stephen Bye is a fiction writer. His most recent novels are a 5-book “The Developer” series which be...more
|
 |
 |
 |
 |
PAUL PHILIPS
For more articles, blog messages & videos and a free e-book download go to www.NewParadigm.ws your p...more
|
 |
 |
 |
 |
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
 |
 |
 |
 |
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
 |
 |
 |
 |
LEVAL AINAH
I am an internet marketer and also an educator. My goal is to help others who are looking to improve...more
|
 |
 |
 |
 |
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
 |
 |
 |
 |
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
 |
 |
 |
 |
MICHAEL BRESCIANI
Rev Bresciani is the author of two Christian books. One book is an important and concisely written b...more
|
 |
 |
|