Patent classifications
B60R25/31
Intrusion detector for a lorry
For various political, commercial and humanitarian reasons there is a desire to detect intrusion of stowaways into lorries and other freight vehicles. Many traditional intrusion detectors operate on the bases of detecting an increase in carbon dioxide within a space as indicator of presence of a human. A problem arises when the freight vehicle is carrying perishable goods such as fruits and vegetables which give off CO.sub.2 as they perish which makes it difficult to reliably attribute the cause of an elevation in CO.sub.2 concentration. An embodiment of the invention overcomes this problem by detecting a sudden decrease in CO.sub.2 concentration within the freight vehicle from a concentration that is much elevated from a background atmospheric concentration of around 400 ppm. This sudden decrease can be attributed to opening of a door of a trailer allowing the escape of CO.sub.2 that has built up as the freight perishes.
Intrusion detector for a lorry
For various political, commercial and humanitarian reasons there is a desire to detect intrusion of stowaways into lorries and other freight vehicles. Many traditional intrusion detectors operate on the bases of detecting an increase in carbon dioxide within a space as indicator of presence of a human. A problem arises when the freight vehicle is carrying perishable goods such as fruits and vegetables which give off CO.sub.2 as they perish which makes it difficult to reliably attribute the cause of an elevation in CO.sub.2 concentration. An embodiment of the invention overcomes this problem by detecting a sudden decrease in CO.sub.2 concentration within the freight vehicle from a concentration that is much elevated from a background atmospheric concentration of around 400 ppm. This sudden decrease can be attributed to opening of a door of a trailer allowing the escape of CO.sub.2 that has built up as the freight perishes.
Autonomous vehicle refueling
Methods and systems for autonomous vehicle recharging or refueling are disclosed. Autonomous vehicles may be automatically refueled by routing the vehicles to available fueling stations when not in operation, according to methods described herein. A fuel level within a tank of an autonomous vehicle may be monitored until it reaches a refueling threshold, at which point an on-board computer may generate a predicted use profile for the vehicle. Based upon the predicted use profile, a time and location for the vehicle to refuel the vehicle may be determined. In some embodiments, the vehicle may be controlled to automatically travel to a fueling station, refill a fuel tank, and return to its starting location in order to refuel when not in use.
ELECTRONIC DEVICE MOUNTED ON VEHICLE AND OPERATION METHOD THEREOF
An electronic device mounted on a vehicle and an operating method of the electronic device are provided. The electronic device monitor the number of occupants riding in the vehicle, obtain communication access information includes information about the number of connectors accessing a communication module from among the occupants and information about an amount of data use through the communication module, recognize an operation pattern of the occupants, by using an occupant monitoring system (OMS), predict a data throughput to be transmitted and received through the communication module, by using the number of occupants, the obtained communication access information, and the operation pattern of the occupants, and determine, based on the predicted data throughout, whether to change a first communication scheme in use to a second communication scheme, which is fifth generation (5G) millimeter wave (mmWave) communication.
VEHICULAR DISPLAY DEVICE
When an ignition switch has been turned off, an accessory switch has been turned off, and a door has been opened (100, 102), a message is displayed in a monitor on an opposite side to a side that the door has been opened (112). In addition, when it has been detected that a key has been shut in or that it has been forgotten to close a window (104), there is performed a warning display that displays a warning in a monitor on an opposite side to a door where a door locking operation has been performed (110). Moreover, when there has been detected a smart key carried by an occupant on a vehicle outside after getting out of a vehicle (118), a message is displayed in a monitor on an opposite side to a key detection direction (120).
VEHICLE AND METHOD OF CONTROLLING A POWERED DOOR BASED ON USER IDENTIFICATION
A vehicle includes a powered door having an actuator to move the door between open and closed positions, a transceiver configured to communicate with one or more mobile devices, and an imaging device oriented to capture images in a region proximate to the powered door. A controller processes the captured images and controls the actuator to move the door to the open position when a mobile device is detected proximate the vehicle and a user is detected in the captured images located in a door detection zone. The controller moves the door to the open position when a face of a user is recognized as an authorized user located in the door detection zone. The controller moves the door to the open position when a gait of the user is detected and identifies the gait are indicative of an authorized user located in the door detection zone.
VEHICLE AND METHOD OF CONTROLLING A POWERED DOOR BASED ON USER IDENTIFICATION
A vehicle includes a powered door having an actuator to move the door between open and closed positions, a transceiver configured to communicate with one or more mobile devices, and an imaging device oriented to capture images in a region proximate to the powered door. A controller processes the captured images and controls the actuator to move the door to the open position when a mobile device is detected proximate the vehicle and a user is detected in the captured images located in a door detection zone. The controller moves the door to the open position when a face of a user is recognized as an authorized user located in the door detection zone. The controller moves the door to the open position when a gait of the user is detected and identifies the gait are indicative of an authorized user located in the door detection zone.
Activating a security mode for a vehicle based on driver identification
A controller of a vehicle detects persons that are approaching the vehicle and uses sensors to collect data regarding the persons to determine whether a security risk exists. In one approach, the collected data is used to determine whether each person is associated with the vehicle. In response to determining that at least one of the persons is unknown, a security risk is evaluated based on data from monitoring of the environment of the vehicle. In response to determining that a security risk score exceeds a threshold, one or more actions for the vehicle are performed to make the vehicle more secure.
Activating a security mode for a vehicle based on driver identification
A controller of a vehicle detects persons that are approaching the vehicle and uses sensors to collect data regarding the persons to determine whether a security risk exists. In one approach, the collected data is used to determine whether each person is associated with the vehicle. In response to determining that at least one of the persons is unknown, a security risk is evaluated based on data from monitoring of the environment of the vehicle. In response to determining that a security risk score exceeds a threshold, one or more actions for the vehicle are performed to make the vehicle more secure.
Relay attack inhibiting
An apparatus in a wireless vehicle-access system, that includes a vehicle and a fob, includes: a vehicle-authorization parameter module configured to obtain a value of a vehicle-authorization parameter wherein the vehicle-authorization parameter comprises at least one of movement of the fob, a received directional signal, or a received audible signal; and a vehicle function compatibility module configured to: determine whether the value of the vehicle-authorization parameter is consistent or inconsistent with a desired function of the vehicle; inhibit the desired function of the vehicle in response to the value of the vehicle-authorization parameter being determined to be inconsistent with the desired function of the vehicle; and permit the desired function of the vehicle in response to the value of the vehicle-authorization parameter being determined to be consistent with the desired function of the vehicle.