The authorization to the vehicle to start the ignition system." During the starting process, the RFID reader will read the tag and give Vehicle should snap a key-like device that uses a passive RFID tag device (ISO15693). "The product uses a magnetic sensing technology as a Kill-safe device and NFCv RFID signal (ISO15693) to identify the driver of the vehicle. I'm guessing this from this note in the test report: It sounds like there is a magnet in the key to provide for a fast engine kill if the tether is pulled off. I guess I could grab a spectrum analyzer and see if there is any excess noise on 13.56 MHz coming from my GPS or UClear BluTooth communicators that could cause an issue with the RF DESS Key, but I doubt this. as 'confidential' and controlled by an NDA, so they don't allow them to be downloaded by us mere mortals (end users). Unfortunately, they list the user manual, block diagram, schematics, etc. Knowing this, it was good to learn that they weren't using anything near any WiFi, BluTooth, or Cellular frequencies. According to Wikipedia, this is the standard NFC Frequency used by many things. You can find the info here via the FCC ID number:Īccording to this, it seems that the RF DESS post uses 13.56 MHz to communicate with the key. Just because I'm interested in such things, I looked up the frequency that the RF DESS post uses to communicate with the key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |