B60R25/04

METHODS OF FACILITATING EMERGENCY ASSISTANCE

A method of driver behavior that includes generating, by a mobile device located inside a vehicle, telematics data associated with operation of the vehicle, and transmitting, from the mobile device to one or more processors via wireless communication, the telematics data in real-time. The method also includes analyzing the telematics data to determine whether a driving score for a driver, determining whether the driving score is greater than a threshold value, determining a discount based upon the driving score being higher than the threshold, and generating a communication based upon the discount. The method further includes transmitting the communication.

METHODS OF FACILITATING EMERGENCY ASSISTANCE

A method of driver behavior that includes generating, by a mobile device located inside a vehicle, telematics data associated with operation of the vehicle, and transmitting, from the mobile device to one or more processors via wireless communication, the telematics data in real-time. The method also includes analyzing the telematics data to determine whether a driving score for a driver, determining whether the driving score is greater than a threshold value, determining a discount based upon the driving score being higher than the threshold, and generating a communication based upon the discount. The method further includes transmitting the communication.

COORDINATED AUTONOMOUS VEHICLE AUTOMATIC AREA SCANNING

Methods and systems for autonomous and semi-autonomous vehicle control, routing, and automatic feature adjustment are disclosed. Sensors associated with autonomous operation features may be utilized to search an area for missing persons, stolen vehicles, or similar persons or items of interest. Sensor data associated with the features may be automatically collected and analyzed to passively search for missing persons or vehicles without vehicle operator involvement. Search criteria may be determined by a remote server and communicated to a plurality of vehicles within a search area. In response to which, sensor data may be collected and analyzed by the vehicles. When sensor data generated by a vehicle matches the search criteria, the vehicle may communicate the information to the remote server.

Security mechanisms for electric motors and associated systems
11697392 · 2023-07-11 · ·

The present disclosure relates to security mechanisms for electric motors and associated systems. For example, the present technology includes a powertrain assembly having (1) a motor having multiple sets of coils; (2) a drive circuitry electrically coupled to the multiple sets of coils; and (3) a security unit electrically coupled to the drive circuitry and the multiple sets of coils. The security unit is configured to short-circuit at least one set of the multiple sets of coils responsive to a signal from a controller. The signal indicates that the motor is, or has been, turned off.

Security mechanisms for electric motors and associated systems
11697392 · 2023-07-11 · ·

The present disclosure relates to security mechanisms for electric motors and associated systems. For example, the present technology includes a powertrain assembly having (1) a motor having multiple sets of coils; (2) a drive circuitry electrically coupled to the multiple sets of coils; and (3) a security unit electrically coupled to the drive circuitry and the multiple sets of coils. The security unit is configured to short-circuit at least one set of the multiple sets of coils responsive to a signal from a controller. The signal indicates that the motor is, or has been, turned off.

METHOD, APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR LOCKING AUTOMOBILE
20230011534 · 2023-01-12 ·

A method for locking automobile includes determines if a door locking action is done by a driver. If the automobile is found to be in a status of parking and an engine system is not turned off, a sensor can detect presence of absence of passengers in the automobile. The location of a key being found outside of the automobile or still inside according to wireless communication signals from the key allows the engine system to be shut down and the door lock to be locked, thereby locking and securing the automobile, otherwise the driver is warned that his door locking action is ineffective and his action to apply locking is rejected. An apparatus and a non-transitory computer readable medium for locking automobile are also disclosed.

METHOD, APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR LOCKING AUTOMOBILE
20230011534 · 2023-01-12 ·

A method for locking automobile includes determines if a door locking action is done by a driver. If the automobile is found to be in a status of parking and an engine system is not turned off, a sensor can detect presence of absence of passengers in the automobile. The location of a key being found outside of the automobile or still inside according to wireless communication signals from the key allows the engine system to be shut down and the door lock to be locked, thereby locking and securing the automobile, otherwise the driver is warned that his door locking action is ineffective and his action to apply locking is rejected. An apparatus and a non-transitory computer readable medium for locking automobile are also disclosed.

Systematic integration via an intrusion detection device

A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.

Systems and methods for reducing latency in vehicle access requests

Systems and methods for reducing latency in vehicle access requests are provided herein. An example method includes receiving a first vehicle access request from a user, determining a pre-authenticated status for the user based on authenticating the user in response to the first vehicle access request, determining a pre-authorized status for the user based on the determination of the pre-authenticated status, receiving a second first vehicle access request from the user, and granting access to the vehicle when the user has the pre-authenticated status. Access to the vehicle can be conditioned upon the pre-authorized status of the user.

Systems and methods for reducing latency in vehicle access requests

Systems and methods for reducing latency in vehicle access requests are provided herein. An example method includes receiving a first vehicle access request from a user, determining a pre-authenticated status for the user based on authenticating the user in response to the first vehicle access request, determining a pre-authorized status for the user based on the determination of the pre-authenticated status, receiving a second first vehicle access request from the user, and granting access to the vehicle when the user has the pre-authenticated status. Access to the vehicle can be conditioned upon the pre-authorized status of the user.