B60R25/307

Method for sharing and monitoring vehicles

System, apparatus, device and methods relating to a telematic vehicle sharing platform ecosystem and a telematic vehicle share I/O expander to automate sharing and management of a vehicle that is shared by more than one operator.

Shared vehicle communication management

System, apparatus, device and methods relating to a telematic vehicle sharing platform ecosystem and a telematic vehicle share I/O expander to automate sharing and management of a vehicle that is shared by more than one operator.

Vehicle monitoring and theft detection using location

A vehicle theft-prevention system can include a mobile application that can determine a location of the mobile device. One or more computing devices can be in communication with the mobile application via a network. The mobile application and the at least one computing device configured to determine that the location of the mobile device has moved outside of a geofence associated with a vehicle theft-prevention apparatus. The mobile application and the at least one computing device can cause the vehicle theft-prevention apparatus to change from an unarmed mode to an armed mode.

Load status of transport chassis

In some examples, a system receives sensor data from a sensor of a transport chassis configured to carry a cargo transportation unit (CTU), and determines, based on the sensor data and a profile learned based on past data, whether the transport chassis is loaded with a CTU or cargo.

Remote engagement of coupling mechanism for vehicle intrusion detection device

A vehicle theft-prevention apparatus can include a locking mechanism, at least one computing device, and a cylindrical body including a first portion and a second portion. The first portion can be configured to rotate about the second portion. The at least one computing device can be configured to determine that the locking mechanism has transitioned from an unlocked state to a locked state. In response to determining that the locking mechanism has transitioned to the locked state, the at least one computing device can disable an engaging component of the locking mechanism. The at least one computing device can be configured to receive, via a network, a command to enable the engaging component. In response to receiving the command, the at least one computing device can enable the engaging component of the locking mechanism.

SECURE LAYERED AUTONOMOUS VEHICLE ACCESS
20210094511 · 2021-04-01 ·

A vehicle having at least one vehicle access secured by a first lock and at least one secure area secured by a second lock. The vehicle may also have a receiver configured to receive a command from a remote computing system to unlock the vehicle access or the secure area.

REMOTE ENGAGEMENT OF COUPLING MECHANISM FOR VEHICLE INTRUSION DETECTION DEVICE
20210039589 · 2021-02-11 ·

A vehicle theft-prevention apparatus can include a locking mechanism, at least one computing device, and a cylindrical body including a first portion and a second portion. The first portion can be configured to rotate about the second portion. The at least one computing device can be configured to determine that the locking mechanism has transitioned from an unlocked state to a locked state. In response to determining that the locking mechanism has transitioned to the locked state, the at least one computing device can disable an engaging component of the locking mechanism. The at least one computing device can be configured to receive, via a network, a command to enable the engaging component. In response to receiving the command, the at least one computing device can enable the engaging component of the locking mechanism.

AUTHENTICATION AND CONTROL FOR VEHICLE INTRUSION DEVICES
20210039590 · 2021-02-11 ·

A system can include at least one server in communication with a vehicle theft-prevention apparatus that comprises a plurality of sensors and at least one computing device. The at least one server can be configured to receive an authentication request from a particular application executed on a mobile device comprising user credentials. The at least one server can authenticate the authentication request as a particular user account, where the particular user account is associated with the vehicle theft-prevention apparatus. The at least one server can receive instructions from the particular application that the mobile device has moved outside of a geofence associated with the vehicle theft-prevention apparatus. The at least one server can send a command to the vehicle theft-prevention apparatus to enter an armed mode.

MULTI-SENSOR INTRUSION DETECTION AND VALIDATION
20210039591 · 2021-02-11 ·

A vehicle theft-prevention apparatus can include a first sensor, a second sensor, and at least one computing device coupled to the first and second sensors. The first sensor and second sensors can be configured to sense a first type and a second type of measurement, respectively. The at least one computing device can be configured to read a plurality of measurements of the first type at a predetermined frequency from within a vehicle. In response to one of the plurality of measurements meeting a predetermined threshold, the at least one computing device can read, from the second sensor, at least one measurement of the second type from within the vehicle. The at least one computing device can be configured to determine, based on the at least one measurement from the second sensor, that the one of the plurality of measurements that met the predetermined threshold corresponds to a false positive.

MULTIMODAL INTRUSION DETECTION
20210039597 · 2021-02-11 ·

A vehicle theft-prevention apparatus can include a wireless transceiver, a plurality of sensors configured to sense measurements proximate to a vehicle, and at least one computing device coupled to the plurality of sensors and the wireless transceiver. The at least one computing device can be configured to receive, via the wireless transceiver, an indication to enter an armed mode from an unarmed mode. In response to entering the armed mode, the at least one computing device can set a configuration of at least one property of a subset of the plurality of sensors. The at least one computing device can receive, via the wireless transceiver, a second indication to enter a special mode from the armed mode. In response to entering the special mode, the at least one computing device can alter the configuration of the at least one property of the subset of the plurality of sensors.