Patent classifications
B60R2325/205
Passive Entry Passive Start Verification With Two-Factor Authentication
A method for a secure Passive Entry Passive Start (PEPS) authentication protocol measures the walking gait of a user approaching a related vehicle using a passive key device carried by the user. The method also includes measuring the user's gait from the perspective of the vehicle using a vehicle perception system to compare the two and validate the security of an unlock request, authenticate the unlocking session, and protect against relay attacks. The two-factor authentication protocol validates the physical presence and temporal state of the key fob or mobile phone relative to the vehicle using detected key gait measurement (key G-gait) and a vehicle perception-based gait (C-gait) measurement by comparing the independent gaits and generating control commands responsive to consistent and inconsistent measurements.
SENSING AND CONTROLLING STATES OF LOCKING MECHANISMS
An affixable device can include a locking mechanism, a force-limiting mechanism, and a sensing mechanism. The locking mechanism can include an engagement component configured to disable the locking mechanism. The force-limiting mechanism can be configured to limit a locking force of the locking mechanism. The sensing mechanism can be coupled to the engagement component, and can be configured to determine that the force-limiting mechanism has limited the locking force of the locking mechanism. In response to determining the force-limiting mechanism limiting the locking force, the sensing mechanism can cause the engagement component to disable the locking mechanism.
VEHICULAR KEY FOB DEVICE
A sensing device can include an accelerometer, a transceiver, and a computing device in communication with the accelerometer and transceiver. The computing device can transmit a first set of signals at a first power level to a remote device. The computing device can determine, via the accelerometer, a movement of the sensing device. The computing device can increase a power level for transmission from the first power level to a second power level in response to the movement. The computing device can transmit future signals at the second power level to the remote device.
WINDSHIELD-MOUNTED VEHICLE ANTI-THEFT APPARATUS AND METHODS FOR USING SAME
A vehicle theft-prevention system can include a plurality of sensors configured to sense measurements proximate to a vehicle and a body configured to secure to a window of the vehicle. The body can include a wireless transceiver and at least one computing device coupled to the plurality of sensors and the wireless transceiver. The at least one computing device can be configured to receive, via the wireless transceiver, an indication to enter an armed mode from an unarmed mode. The at least one computing device can be configured to, in response to the indication, transition to the armed mode, wherein transitioning to the armed mode comprises setting a configuration of at least one property of a subset of the plurality of sensors.
Mobile identification transmitter
A mobile identification transmitter for an access arrangement of a vehicle, said access arrangement being supplied by a vehicle battery, comprises an identification-transmitter-side receiving device for receiving a vehicle-side request signal. Furthermore, it comprises an identification-transmitter-side transmitting device for emitting a response signal in response to the reception of the vehicle-side request signal. Finally, the mobile identification transmitter has an identification-transmitter-side control device for identifying and/or estimating the state of charge of the vehicle battery, for comparing the identified and/or estimated state of charge with a predetermined threshold value, and for identifying an emergency state of the access arrangement if the identified and/or estimated state of charge falls below the predetermined threshold value. If this is the case, then the identification-transmitter-side transmitting device can emit electromagnetic waves for charging a chargeable energy store for supplying the access arrangement. Simple and convenient emergency operation of the access arrangement is thus possible.
System for controlling operations of a vehicle using mobile devices and related methods thereof
The present disclosure relates to aspects of authenticating a mobile device and providing a vehicle access key thereto when a previously registered mobile device is not accessible. In one aspect of the present disclosure, a method includes requesting at a first mobile device, access to a profile associated with controlling operations of a vehicle, the profile having stored thereon an access key for operating the vehicle, the access key having been previously installed on a second mobile device. The method further includes upon successful authorization, receiving the access key at the first device and operating the vehicle using the access key on the first mobile device.
VEHICLE AUTHENTICATION DEVICE AND VEHICLE CONTROL SYSTEM
A vehicle authentication device includes an electronic control unit. The electronic control unit is configured to display predetermined verification information on a display device, receive, via an information processor possessed by a user, information on an operation performed by the user after the verification information is displayed, and determine that the information processor is present inside a vehicle cabin, when the information on the operation has a predetermined correspondence with the verification information.
VEHICULAR DRIVER MONITORING
Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.
POINT-OF-INTEREST-BASED ANTI-VEHICLE THEFT SYSTEMS AND PROCESSES FOR USING THE SAME
A sensing device can include at least one sensor, positioning circuitry, a transceiver, and a computing device in communication with the at least one sensor, the positioning circuitry, and the transceiver. The computing device can determine a location of a vehicle via the positioning circuitry. The computing device can determine that a point of interest (POI) associated with a predefined category of POIs corresponds to the location. The computing device, via the transceiver, can determine that a person is moving away from the vehicle based on a measurement associated with a remote device. The computing device can enter into an armed mode in response to the determinations. The computing device can detect an intrusion into a vehicle while in the armed mode based at least in part on measurements from the at least one sensor. The computing device can generate an alarm in response to the intrusion.
VEHICULAR SAFETY MONITORING
Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.