G07C2009/00539

SENSING AND CONTROLLING STATES OF LOCKING MECHANISMS

An affixable device can include a locking mechanism, a force-limiting mechanism, and a sensing mechanism. The locking mechanism can include an engagement component configured to disable the locking mechanism. The force-limiting mechanism can be configured to limit a locking force of the locking mechanism. The sensing mechanism can be coupled to the engagement component, and can be configured to determine that the force-limiting mechanism has limited the locking force of the locking mechanism. In response to determining the force-limiting mechanism limiting the locking force, the sensing mechanism can cause the engagement component to disable the locking mechanism.

VEHICULAR KEY FOB DEVICE

A sensing device can include an accelerometer, a transceiver, and a computing device in communication with the accelerometer and transceiver. The computing device can transmit a first set of signals at a first power level to a remote device. The computing device can determine, via the accelerometer, a movement of the sensing device. The computing device can increase a power level for transmission from the first power level to a second power level in response to the movement. The computing device can transmit future signals at the second power level to the remote device.

WINDSHIELD-MOUNTED VEHICLE ANTI-THEFT APPARATUS AND METHODS FOR USING SAME

A vehicle theft-prevention system can include a plurality of sensors configured to sense measurements proximate to a vehicle and a body configured to secure to a window of the vehicle. The body can include a wireless transceiver and at least one computing device coupled to the plurality of sensors and the wireless transceiver. The at least one computing device can be configured to receive, via the wireless transceiver, an indication to enter an armed mode from an unarmed mode. The at least one computing device can be configured to, in response to the indication, transition to the armed mode, wherein transitioning to the armed mode comprises setting a configuration of at least one property of a subset of the plurality of sensors.

VEHICULAR DRIVER MONITORING

Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.

POINT-OF-INTEREST-BASED ANTI-VEHICLE THEFT SYSTEMS AND PROCESSES FOR USING THE SAME

A sensing device can include at least one sensor, positioning circuitry, a transceiver, and a computing device in communication with the at least one sensor, the positioning circuitry, and the transceiver. The computing device can determine a location of a vehicle via the positioning circuitry. The computing device can determine that a point of interest (POI) associated with a predefined category of POIs corresponds to the location. The computing device, via the transceiver, can determine that a person is moving away from the vehicle based on a measurement associated with a remote device. The computing device can enter into an armed mode in response to the determinations. The computing device can detect an intrusion into a vehicle while in the armed mode based at least in part on measurements from the at least one sensor. The computing device can generate an alarm in response to the intrusion.

VEHICULAR SAFETY MONITORING

Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.

Systems and Methods for Remotely Locking and Unlocking Vehicle Accessory Locks
20220144213 · 2022-05-12 · ·

Systems and methods for remotely locking and unlocking vehicle accessory locks of vehicle accessories positioned on a vehicle are disclosed. The vehicle includes main doors with locks that are remotely lockable and unlockable using main door lock actuators. Vehicle includes a vehicle controller that receives a user signal from a user, first determines a main door actuation command based on the first signal, and first transmits, based on the main door actuation command, a first actuation command signal to the main door lock actuators. The system includes accessory lock actuator(s) operably coupled to the accessory lock(s), accessory lock controller(s) operably coupled to the accessory lock actuator(s), and a gateway controller operably coupled to the vehicle controller. Gateway controller second determines an accessory lock actuation command based on the first actuation command signal, and second transmits, based on the accessory lock actuation command, a gateway signal to the accessory lock controller.

Wire management module for a vehicle

A wire-management module is configured to be installable to a vehicle having an operable system configured to be energized in response to operative connection between a first wire and a second wire. A user-authentication module is configured to transmit a wire-management signal including a wire-inhibit signal configured to indicate lack of authorization to use the operable system of the vehicle. The wire-management module is configured to be operatively coupled to the first wire and the second wire. The wire-management module has a signal input port configured to receive the wire-inhibit signal that is transmittable from the user-authentication module. The wire-management module is also configured to inhibit operative connection between the first wire and the second wire.

Programmable security system and method for protecting merchandise

A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermined period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.

Eliminating unexpected activation of components of a vehicle when parked in a garage

This disclosure is generally directed to systems and methods for eliminating false activation of components of a vehicle when the vehicle is parked in a garage. Example components can be a door lock, a door latch, a door activation servomotor, or a light. In an example method, a vehicle entry authorization system of a vehicle operates a sensor system to obtain dimensional information of an interior portion of the garage. The vehicle entry authorization system may then detect a presence of a mobile device (such as a phone-as-a-key or a vehicle key fob) and determines the location of the mobile device based on the dimensional information. If the mobile device is located outside the garage, the vehicle entry authorization system refrains from activating a component of the vehicle. However, if the mobile device is located inside the garage, the vehicle entry authorization system activates the component.