B60R25/00

TAILGATE LOCK ASSEMBLY
20170274869 · 2017-09-28 ·

A lock assembly for locking a tailgate relative to a body assembly of a vehicle includes a coupling member, a carriage, a trunnion, and a catch. The carriage is rotatably disposed within the coupling member and includes a first aperture and a first slot. The trunnion is removably received by the carriage and includes a second aperture aligned with the first aperture. The catch is movable between a locked position and an unlocked position. The catch is received by the first aperture and the second aperture in the locked position.

Double-security anti-theft emergency device for batteryless motor vehicles
09744942 · 2017-08-29 · ·

A double-security anti-theft emergency switch, specially suitable for batteryless race motor vehicles comprising a fixed assembly integral with the vehicle and cooperating with a movable key which is tied up to the driver by means of an even partially elastic lace, is disclosed. The double security is bound to the presence of a first normally closed switch whose opening, via the movable key, is necessary to disconnect the ignition circuit of the motorcycle from ground and to allow the engine to start-up, so as to produce the electrical power necessary for an RFID system to monitor a transponder comprised in the movable key. Should the outcome of this transponder test be unsuccessful, a second normally open switch would be closed and would ground the ignition circuit of the engine and lock the motorcycle.

SHIELDED ELECTRONIC LOCK BOX
20170241165 · 2017-08-24 · ·

Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each of the vehicles. The vehicle activity module has a wireless transmitter, a storage device, at least one sensor for receiving event information from identification devices, such as RFID cards, keypads, magnetic ID cards, and the like, a releasable key container, and a processor for accessing and analyzing information. The VAMs are wirelessly connected to a computer system. The VAMs control access to the keys, monitor information relating to access, and store and transmit information relating to sales events, non-sales events, and intrusion events. The VAMs are capable of autonomous operation, without the need to access the computer system to verify event information. The VAMs further include signal attenuating mechanisms to facilitate use of “smart keys.”

SHIELDED ELECTRONIC LOCK BOX
20170241165 · 2017-08-24 · ·

Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each of the vehicles. The vehicle activity module has a wireless transmitter, a storage device, at least one sensor for receiving event information from identification devices, such as RFID cards, keypads, magnetic ID cards, and the like, a releasable key container, and a processor for accessing and analyzing information. The VAMs are wirelessly connected to a computer system. The VAMs control access to the keys, monitor information relating to access, and store and transmit information relating to sales events, non-sales events, and intrusion events. The VAMs are capable of autonomous operation, without the need to access the computer system to verify event information. The VAMs further include signal attenuating mechanisms to facilitate use of “smart keys.”

SYSTEM AND METHOD FOR FLEET MANAGEMENT FOR WORK VEHICLES
20170240181 · 2017-08-24 ·

A fleet management control system and method are disclosed for a plurality of work vehicles each having a respective work tool. The work vehicles are associated with an owner and a plurality of operators. The fleet management system includes a source of input data that provides operator identification data for the work vehicles and operator permissions data that indicates at least which of the work vehicles each of the operators is permitted to operate. The fleet management system includes a remote processing system having a processor that receives and processes the operator identification and operator permissions data, outputs fleet management data that includes a fleet operator profile for the work vehicles based on the operator identification and operator permissions data, and communicates the fleet management data to a controller of each of the work vehicles.

SYSTEM AND METHOD FOR FLEET MANAGEMENT FOR WORK VEHICLES
20170240181 · 2017-08-24 ·

A fleet management control system and method are disclosed for a plurality of work vehicles each having a respective work tool. The work vehicles are associated with an owner and a plurality of operators. The fleet management system includes a source of input data that provides operator identification data for the work vehicles and operator permissions data that indicates at least which of the work vehicles each of the operators is permitted to operate. The fleet management system includes a remote processing system having a processor that receives and processes the operator identification and operator permissions data, outputs fleet management data that includes a fleet operator profile for the work vehicles based on the operator identification and operator permissions data, and communicates the fleet management data to a controller of each of the work vehicles.

METHODS AND SYSTEMS RELATED TO A REMOTE TAMPER DETECTION

Remote tamper detection, some example embodiment methods including: receiving signals indicative of a location, the receiving by a first device coupled to an asset; periodically sending a signal of operability from the first device to a second device, the second device coupled to the asset, and the second device configured to selectively disable the asset; receiving a first command from a remote operations center, the receiving by the first device; sending a second command from the first device to the second device, wherein the second command is sent responsive to the receiving of the first command; disabling the asset by the second device when receipt of the signal of operability has ceased or the second command is a disable command; and issuing from the first device an indication of the location of the first device, the issuing from the first device by a wireless transmission to the remote operations center.

TRAILER LEG SECURING DEVICES AND SYSTEM
20170232941 · 2017-08-17 ·

Devices and systems for securing and locking tractor trailer support legs in the down position are described herein. A securing pin passing through one of the support legs of a trailer while in the down position prevents the trailer legs from being raised. The pin can be locked in place such that only authorized users may remove the pin, raise the support legs, and move the trailer. A variety of kits for retrofitting existing trailers with securing devices are also provided.

Methods and systems related to a remote tamper detection

Remote tamper detection. At least some of the example embodiments are methods including: receiving signals indicative of a location, the receiving by a first device coupled to an asset; sending, at predetermined time intervals, a signal of operability between the first device and a second device, the second device coupled to the asset, and the second device configured to selectively disable the asset; determining that receipt of the signal of operability has ceased; and issuing an indication of the location of the first device responsive to the determining that receipt of the signal of operability has ceased, the issuing from the first device by a wireless transmission to a remote operations center.

Methods and systems related to a remote tamper detection

Remote tamper detection. At least some of the example embodiments are methods including: receiving signals indicative of a location, the receiving by a first device coupled to an asset; sending, at predetermined time intervals, a signal of operability between the first device and a second device, the second device coupled to the asset, and the second device configured to selectively disable the asset; determining that receipt of the signal of operability has ceased; and issuing an indication of the location of the first device responsive to the determining that receipt of the signal of operability has ceased, the issuing from the first device by a wireless transmission to a remote operations center.