B60R25/30

METHOD FOR MONITORING INTERNAL ENVIRONMENT OF VEHICLE, ELECTRONIC DEVICE, AND STORAGE MEDIUM
20230219522 · 2023-07-13 ·

A method for monitoring internal environment of a vehicle implemented in an electronic device includes detecting environment data of internal of the vehicle, and detecting whether an engine of the vehicle is running; when the engine of the vehicle is running and the environment data does not meet a preset threshold, issuing a first alarm; when the engine of the vehicle is not running, obtaining location information of the vehicle, activating a camera device to capture images or shoot a video of internal of the vehicle, and determining whether at least one living creature is inside the vehicle; when the at least one living creature is inside the vehicle, transmitting the location information, and the images or the video and the environment data to a terminal device; and displaying the location information, the images or the video and the environment data, and issuing a second alarm.

Vehicle security systems and methods

Example vehicle security systems and methods are described. In one implementation, a method receives a destination and a driving route to the destination for an autonomous vehicle to follow. A vehicle security system identifies a passkey associated with the driving route and communicates the passkey to a user designated to meet the autonomous vehicle at the destination. The vehicle security system confirms that the user designated to meet the autonomous vehicle possesses the passkey.

DELIVERY METHOD AND SYSTEM USING AN AUTONOMOUS MOBILITY DEVICE

Disclosed are a delivery method and a system using an autonomous mobility device for a delivery service. The delivery method and system improve reliability and security by use of an authentication procedure between the mobility device and a user, and also improve a feeling of satisfaction of the delivery service by satisfying a delivery request made by the user.

DELIVERY METHOD AND SYSTEM USING AN AUTONOMOUS MOBILITY DEVICE

Disclosed are a delivery method and a system using an autonomous mobility device for a delivery service. The delivery method and system improve reliability and security by use of an authentication procedure between the mobility device and a user, and also improve a feeling of satisfaction of the delivery service by satisfying a delivery request made by the user.

Region monitoring system and control method for region monitoring system

A region monitoring system includes: a first communication control unit that transmits monitoring camera captured-image data to a monitoring server, the monitoring camera captured-image data being captured-image data of a monitoring camera that monitors a region in which a plurality of houses are located; and a camera communication control unit that transmits in-vehicle camera captured-image data to the monitoring server, the in-vehicle camera captured-image data being captured-image data of an in-vehicle camera of a vehicle located in the region.

METHOD OF UPDATING FRAUD DETECTION RULES FOR DETECTING MALICIOUS FRAMES, FRAUD DETECTING ELECTRONIC CONTROL UNIT, AND ON-BOARD NETWORK SYSTEM

A method used in an on-board network system, having electronic controllers that exchange messages and a fraud-detecting electronic controller. The method includes receiving an inquiry for a vehicle status indicating whether a vehicle in which the fraud-detecting electronic controller is installed is running from an external device, transmitting the vehicle status to the external device, and determining whether a message transmitted conforms to fraud detection rules. The method also includes receiving from the external device the delivery data, including updated fraud detection rules and network type information indicating a network type that the updated fraud detection rules are to be applied The method further includes determining whether the vehicle is running, and whether the network type information indicates a drive network that is connected to an electronic controller related to travel of the vehicle. When the network type information does not indicate the drive network, updating the fraud detection rules.

Method and system for relay attack prevention incorporating motion
11696136 · 2023-07-04 · ·

A method and system for detecting if a relay is present in a PEPS system for a vehicle is provided by (a) determining whether movement of an authentication device was detected within a predefined time period after the authentication device enters a PEPS entry operational region; and (b) determining if the authentication device was stationary for a predetermined time period during a PEPS entry triggering event.

Systematic integration via an intrusion detection device

A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.

Systematic integration via an intrusion detection device

A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.

Vehicle operation

A computer includes a processor and a memory, the memory storing instructions executable by the processor to collect biometric data of a vehicle user, identify a set of user-specific data from one or more stored sets of user-specific data based on the biometric data, and receive a request for a stored location. When the biometric data of the vehicle user match the stored biometric data, the instructions include instructions to display the requested location. When the biometric data of the vehicle user do not match the stored biometric data, the instructions include instructions to identify an offset location based on the requested location and a population density of the requested location and display the offset location.