Auto access systems come of age

Herhoffer, Klaus
July 2005
Portable Design;Jul2005, Vol. 11 Issue 7, p10
This article traces the evolution of automobiles' access systems. For decades, drivers have used mechanical keys to unlock doors and start the engine. However, the standard steel key has a security level of only about 1,000 choices. Virtually all old-fashioned car keys unlock more than one car. The first remote keyless entry systems used 32-bit encryption, allowing for more than four billion possible combinations. These keys were also more convenient than older ones, allowing operation from anywhere near the car and providing access to the interior even in the winter when the lock is frozen.


Related Articles

  • Designing "Un-Hackable" Automotive Communications Networks. Holmlund, Mike // ECN: Electronic Component News;Jul2004, Vol. 48 Issue 8, p61 

    Discusses the electronic design of a secure automotive communication network using field programmable gate arrays. Deployment of wireless conduits inside vehicles to enable connectivity necessary to support fleets of mobile telematic consumers; Denial of service, cloning and reverse engineering...

  • AWWK-POLLY GOT A BLUETOOTH.  // Company Vehicle;Jun2006, p17 

    The article focuses on the Parrot Easy Drive, a toy with Bluetooth technology for automobiles. The Parrot Easy drive is made up of a microphone that is connected to any car's accessory socket and a call answer switch which is attached to the dashboard. It recommends to do the programming of...

  • SWEDEN DOES TELEMATICS. Whitfield, Kermit // Automotive Design & Production;Dec2004, Vol. 116 Issue 12, p50 

    Presents information on two of the emerging telematics technologies in the automobile industry that was revealed during an annual conference held by Telematics Valley, a cluster of small and large companies and universities doing research on telematics. RaveGeo, a compression and streaming...

  • This time, the industry embraces connectivity. Moran, Tim // Automotive News;7/21/2008, Vol. 82 Issue 6317, p17 

    The article focuses on services that connect the car to outside data by using telematics. It is reported that changes in expectations and the availability of the technology in cars have allowed telematics to reboot. Mike Marshall, a J.D. Power and Associates comapny analyst says that consumers...

  • K&N tells subbies to buy in on e-POD. Meczes, Robin // Motor Transport;4/29/2004, p6 

    Reports on the plan of Kühne & Nagel to require its sub-contractors to purchase its electronic proof-of-delivery system (e-POD), an automotive telematics system. Features of POD; Rental cost of the device; Compatibility of the system with other customers.

  • iRiver AudiaX DGT-201. Yates, Darren // Australian PC User;May2005, Vol. 17 Issue 5, p137 

    Evaluates the iRiver AudiaX DGT-201 stereo FM car transmitter. Features; Price.

  • How to make mobility work. Vernon, Mark // Management Today;Jul2005, p70 

    The article discusses the issue of security being faced by organizations installing remote working systems. Mobility tends to take root in organizations in one of two ways. The first is official and thorough in which management makes a decision, laptops, mobiles, PDAs are bought, as well as the...

  • Network Resource Awareness and Control in Mobile Applications. Peddemors, Arjan; Eertink, Henk; Bargh, Mortaza; Niemegeers, Ignas // IEEE Internet Computing;Mar/Apr2007, Vol. 11 Issue 2, p34 

    As mobile devices become increasingly capable of simultaneously using various kinds of wireless and fixed networks, developers must match mobile application needs to network resource dynamics. The authors' network resource model and network abstraction layer (NAL) software offer an extensible...

  • FOUR WAYS VENDORS HINDER ENTERPRISE MOBILITY. Cummings, Joanne // Network World;3/16/2009, Vol. 26 Issue 11, p24 

    The article provides information on the four ways the vendors are hindered enterprise mobility for mobile devices. It includes the deterring factors such bizarre billing as most carriers takes every employee as a separate consumer, frequent fingerpointing and the complexity of dealing with...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics