Patent classifications
B60R25/20
Method and system for relay attack prevention incorporating vector check
A method and system for detecting if a relay is present in a PEPS system for a vehicle is provided which includes (a) transmitting LF signals from antennas associated with a vehicle to a key fob using a 3D LF receiver to measure the LF signal level on the x, y and z-axes; (b) selecting two or more parallel antennas associated with the vehicle that are orthogonal to the antenna at the PEPS triggering location; (c) normalizing the x, y and z vectors that are measured by the key fob for the selected two or more parallel antennas associated with the vehicle; and (d) determining if the normalized x, y and z vectors for the selected two or more parallel antennas associated with the vehicle are within a predefined range.
Method for controlling a locking element of a vehicle
A method for controlling at least one locking element of a vehicle is disclosed. A mobile identification transmitter is detected at a position in a certain access region around the vehicle. Furthermore, a user signal is output to a user carrying the mobile identification transmitter after the mobile identification transmitter has stayed at the position for a first predetermined duration. In addition, the at least one locking element is unlocked/opened after the mobile identification transmitter further stays at the position for a second predetermined duration after the user signal is output. For the targeted control of the automatic unlocking or opening of the vehicle door, the process of unlocking or opening is terminated if a termination signal from the user is detected within the second predetermined duration.
Vehicle access based on RF digests/backgrounds
According to certain examples, a circuit-based wireless communications system provides secure access to a vehicle by way of certain circuitry configure to compare a first RF background observed for a vehicle-located RF receiver that is part of a vehicle-located circuit secured to a vehicle, with a second RF background observed for a wireless-communications vehicle-access circuit that includes another RF receiver. In response, a distance metric is generated to indicate a degree of similarity between the first RF background and the second RF background, and based on whether this metric satisfies a threshold, access to the vehicle may be granted via the wireless-communications vehicle-access circuit.
Driver personalization for vehicle-sharing fleet
Methods and systems are disclosed and include determining, using a processor configured to execute instructions stored in a nontransitory computer-readable medium, whether a user is authenticated to operate a vehicle-sharing vehicle. The method also includes, in response to determining the user is authenticated: (i) obtaining, using the processor, a height value, wherein the height value is associated with a vehicle-sharing account of the user and is displayed on an identification card of the user; (ii) determining, using the processor, whether a position of a vehicle control mechanism needs to be adjusted based on the height value; and (iii) in response to determining that the position of the vehicle control mechanism needs to be adjusted, adjusting, using the processor, the position of the vehicle control mechanism based on the height value.
SMART KEY SYSTEM CAPABLE OF OPERATING EVEN WHEN UWB COMMUNICATION IS IMPOSSIBLE DUE TO BATTERY VOLTAGE DROP OF FOB AND OPERATION METHOD THEREOF
A smart key system of a vehicle that notifies a user that a fob battery needs to be replaced, including a fob configured to transmit information that the battery needs to be replaced to an in-vehicle communication module configured to transmit the information to an identification authentication unit (IAU); and the IAU configured to transmit the information to an integrated body unit (IBU) configured to notify a user of the information. A smart key system includes: a fob configured to transmit failure information to a BLE module when UWB communication fails due to battery voltage drop; the BLE module configured to receive the failure information, and measure a distance for positioning the fob using a BLE signal; and an IBU configured to transmit an operation signal to a controller configured to control at least one function among vehicle door opening and closing, vehicle start, remote parking, and vehicle door locking.
Systems and Methods to Repossess a Vehicle
The disclosure generally pertains to systems and methods to repossess a vehicle. In an example method, a first computer sends to a second computer, a message pertaining to a notice of delinquency of a vehicle-related payment. The message includes a request to an individual, such as a purchaser or a lessee of the vehicle, to acknowledge receipt of the message. The first computer may be associated with a financing agency (a bank or a lender) and the second computer may be a vehicle computer of the vehicle or a smartphone owned by the individual. When an acknowledgement is not received within a reasonable period of time, the first computer may disable a functionality of a component of the vehicle or may place the vehicle in a lockout condition. The lockout condition may be lifted momentarily in case of an emergency to allow the vehicle to travel to a medical facility.
Systems and Methods to Repossess a Vehicle
The disclosure generally pertains to systems and methods to repossess a vehicle. In an example method, a first computer sends to a second computer, a message pertaining to a notice of delinquency of a vehicle-related payment. The message includes a request to an individual, such as a purchaser or a lessee of the vehicle, to acknowledge receipt of the message. The first computer may be associated with a financing agency (a bank or a lender) and the second computer may be a vehicle computer of the vehicle or a smartphone owned by the individual. When an acknowledgement is not received within a reasonable period of time, the first computer may disable a functionality of a component of the vehicle or may place the vehicle in a lockout condition. The lockout condition may be lifted momentarily in case of an emergency to allow the vehicle to travel to a medical facility.
Moving object control system, moving object control device, and moving object control method
A moving object control system includes a server, a portable terminal configured to transmit authentication information issued by the server, and a controller provided in a moving object and configured to authenticate the portable terminal according to the authentication information transmitted from the portable terminal, and when the portable terminal is authenticated, control the moving object in response to an operation signal from the portable terminal. The controller is configured to perform information communication with the server and control the moving object according to control information received from the server.
Autonomous vehicle parking and servicing using terminals
A scheduling server is programmed to register terminals for autonomous vehicle use by allocating both capabilities and available times of the terminals to the server; identify a service to perform to an autonomous vehicle using data received from the vehicle; and send a waypoint to the vehicle directing the vehicle to arrive at an identified one of the terminals having capability to perform the service during the available times of the identified terminal.
Unsupervised learning-based detection method and driver profile- based vehicle theft detection device and method using same
An unsupervised learning-based detection method according to one technical aspect of the present disclosure relates to an unsupervised learning-based detection method using a supervised-learned model, and includes: generating a first plurality of matrix data on the basis of driving data; generating encoding information by encoding the first plurality of matrix data using a convolutional neural network; modeling a time series feature of the encoding information by using a long short-term memory (LSTM) network, so as to derive a correlation between variables according to a time series; re-implementing a second plurality of matrix data through a deconvolution calculation of the correlation between the variables according to the time series; and determining whether the driving data corresponds to a pre-supervised learned driver profile, on the basis of a difference between the first plurality of matrix data and the second plurality of matrix data.