Browse Definitions :
Definition

passive keyless entry (PKE)

Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled and locking it when the user walks away or touches the car on exit. PKE systems are also used to secure buildings or areas of buildings.

A PKE device can operate while stored in the user's pocket or bag, unlike a standard remote keyless entry (RKE) device, which requires the user to hold the device and push a button to lock or unlock the vehicle. Passive keyless entry systems typically involve an RF (radio frequency) key fob but there are also smart cards and Mobile apps designed for PKE.

The PKE key fob and the vehicle module both contain transceivers that communicate wirelessly to detect each other. The module in the vehicle continually sends out encoded messages; when the key fob is in range it responds. If the encrypted messages are correct, they identify the vehicle and key fob to each other and the door opens. Current PKE systems often use rolling codes to ensure that a fresh code is supplied each time, preventing the possibility of a replay attack.

Cars that are designed for passive keyless entry often feature keyless start as well, which simply requires the driver to push a button. (That combination is sometimes called passive entry/passive start or PEPS.) Individual smart keys may be customized for specific drivers, adjusting seat and mirror positions automatically, for example, or setting the car's radio to the driver's chosen station.

Siemens, a German manufacturing and electronics company, developed the first PKE system in the mid-1990s, and Mercedes-Benz implemented it under the name of "Keyless Go." There are a great number of other names for PKE systems and they vary from one manufacturer to another.

This was last updated in April 2017

Continue Reading About passive keyless entry (PKE)

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • IT project management

    IT project management is the process of planning, organizing and delineating responsibility for the completion of an ...

  • chief financial officer (CFO)

    A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations ...

  • chief strategy officer (CSO)

    A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an ...

HRSoftware
Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close