B60R25/30

Vehicle monitoring system

A system for monitoring an interior of a vehicle, comprising an identification device adapted to be carried by an individual, a vehicular unit adapted for mounting within the vehicle, and a controller adapted for remote wireless communication with the unit. The unit will activate a camera and a microphone when a person is detected within the vehicle. The unit will search for the identification device and, if the identification device is not detected, the unit will activate an alarm. If the identification device is detected, the unit will compare an access code from the identification device with authorized access codes. If the access code is not found within the authorized access codes, the unit will activate an alarm. The controller is operable to display images, broadcast sounds, and display the alarm status from the unit to a user in possession of the controller.

METHOD FOR DETECTING THE INTENTION TO LOCK OR UNLOCK A VEHICLE DOOR AND ASSOCIATED DETECTING DEVICE
20220032872 · 2022-02-03 ·

Disclosed is a device for detecting intention to lock or unlock a door of a motor vehicle, the device including at least a first inductive sensor, including a first target, an oscillating circuit including a coil, a unit measuring a resonant frequency of the circuit, and a printed circuit. The device includes a second inductive sensor including: a second target in the form of a loop, such that a first end of the loop is connected to a fixed potential, and a second end of the loop is connected to a switch having two states, in a first state, the second end of the loop is connected to the fixed potential, in a second state, the second end of the loop is connected to a floating potential; and a controller for the switch. The coil of the first inductive sensor is common to the second inductive sensor.

METHOD FOR DETECTING THE INTENTION TO LOCK OR UNLOCK A VEHICLE DOOR AND ASSOCIATED DETECTING DEVICE
20220032872 · 2022-02-03 ·

Disclosed is a device for detecting intention to lock or unlock a door of a motor vehicle, the device including at least a first inductive sensor, including a first target, an oscillating circuit including a coil, a unit measuring a resonant frequency of the circuit, and a printed circuit. The device includes a second inductive sensor including: a second target in the form of a loop, such that a first end of the loop is connected to a fixed potential, and a second end of the loop is connected to a switch having two states, in a first state, the second end of the loop is connected to the fixed potential, in a second state, the second end of the loop is connected to a floating potential; and a controller for the switch. The coil of the first inductive sensor is common to the second inductive sensor.

Shared vehicle I/O expander

System, apparatus, device and methods relating to a telematic vehicle sharing platform ecosystem and a telematic vehicle share I/O expander to automate sharing and management of a vehicle that is shared by more than one operator.

CLOUD-CONTROLLED VEHICLE SECURITY SYSTEM
20220036102 · 2022-02-03 ·

Incidents may be monitored using a camera in response to an activation of a trigger device. Trigger data may be received over a communication network in response to activation of a trigger device disposed within a first area of a vehicle. A camera disposed within a second area of the vehicle may be controlled over the communication network in response to receiving the trigger data, the controlling causing the camera to capture sensor information of a passenger of the vehicle. Passenger information of the passenger of the vehicle may be obtained in response to receiving the trigger data. An alert notification may be generated. The alert notification may comprise at least a portion of the sensor information of the passenger, and the alert notification may be capable of initiating one or more incident actions associated with the passenger.

VEHICLE CORRELATION SYSTEM FOR CYBER ATTACKS DETECTION AND METHOD THEREOF
20170230385 · 2017-08-10 · ·

A system and method for detection of at least one cyber-attack on one or more vehicles including steps of transmitting and/or receiving by a first on-board agent module installed within one or more vehicles and/or a second on-board agent module installed within road infrastructure and in a range of communication with said first on-board agent module metadata to and/or from an on-site and/or remote cloud-based detection server including a correlation engine; detecting cyberattacks based on correlation calculation between the metadata received from one or more first agent module installed within vehicles and/or from one or more second agent modules installed within road infrastructure; indicating a probability of a cyber-attack against one or more vehicle based on correlation calculation; initiating blocking of vehicle-to-vehicle communication to present and/or stop a spread of an identified threat.

VEHICLE CORRELATION SYSTEM FOR CYBER ATTACKS DETECTION AND METHOD THEREOF
20170230385 · 2017-08-10 · ·

A system and method for detection of at least one cyber-attack on one or more vehicles including steps of transmitting and/or receiving by a first on-board agent module installed within one or more vehicles and/or a second on-board agent module installed within road infrastructure and in a range of communication with said first on-board agent module metadata to and/or from an on-site and/or remote cloud-based detection server including a correlation engine; detecting cyberattacks based on correlation calculation between the metadata received from one or more first agent module installed within vehicles and/or from one or more second agent modules installed within road infrastructure; indicating a probability of a cyber-attack against one or more vehicle based on correlation calculation; initiating blocking of vehicle-to-vehicle communication to present and/or stop a spread of an identified threat.

VEHICLE CONTROL AND IDENTIFICATION SYSTEMS AND METHODS

An identification system for a property includes: a mobile device including a display and configured to: selectively output a feature during execution of an application; and transmit user data stored on the mobile device; a scanning module configured to scan the feature and to generate an output based on the feature; an identity module configured to, based on the user data, determine an identity identifier indicative of an identity of a user of the mobile device; and a checking module configured to one of approve and deny an action based on: the output generated based on the feature; and the identity identifier indicative of the identity of the user of the mobile device.

Car control system

A car control system is disclosed. The car control system for controlling a car by being linked with a car control device (electronic control unit, ECU) that is installed inside the car for electronic control of the car can include: an authentication server configured to perform access authentication for a user terminal and configured to generate an authentication result based on least one of terminal information of the user terminal and vehicle identification information; and a car access device configured to be directly connected with the car control device through an internal network of the car and configured to determine whether a car control request for control of the car by the user terminal is to be relayed to the car control device according to the authentication result of the user terminal.

Car control system

A car control system is disclosed. The car control system for controlling a car by being linked with a car control device (electronic control unit, ECU) that is installed inside the car for electronic control of the car can include: an authentication server configured to perform access authentication for a user terminal and configured to generate an authentication result based on least one of terminal information of the user terminal and vehicle identification information; and a car access device configured to be directly connected with the car control device through an internal network of the car and configured to determine whether a car control request for control of the car by the user terminal is to be relayed to the car control device according to the authentication result of the user terminal.