B60R25/1012

VEHICULAR VIEWER SYSTEM AND METHOD
20200168065 · 2020-05-28 ·

The vehicular viewer system includes application software in communication with a server via a communication network; an electronic device; at least one mountable camera; a sensor mechanism; and a vehicle. The vehicle viewer system includes an application software in communication with a server via communication network through an electronic device enabling a vehicle owner to remotely activate at least one mountable camera and sensor mechanism in a vehicle providing a safe and secure area in and around a vehicle by which can be remotely viewed.

Vehicle security system
11872955 · 2024-01-16 · ·

A vehicle security system may be automatically activated when a vehicle (e.g., car or truck) is temporarily stopped. Specifically, if a car is stopped at a gas station or other type of temporary stop (e.g., where a car would not be fully closed and locked) the vehicle security system may engage (e.g., based on opening of a gas cap cover). The vehicle security system monitors for theft of contents from inside a vehicle in a temporary stopped state. The vehicle security system may lock different doors based on different conditions. In some cases, only some doors (and not all doors) will be locked. In a temporary stop condition, a vehicle may not be fully locked to engage a standard anti-theft security system. If a driver's attention is diverted during the temporary stopped condition a quick and quiet theft scenario (e.g., a reach and grab) may be attempted.

Exterior Camera Services For Vehicle-Sharing Fleet
20200151467 · 2020-05-14 ·

A method and system are disclosed and include obtaining sensor data from at least one sensor of a subject vehicle. The method also includes determining whether the sensor data indicates one of (i) a first vehicle has contacted the subject vehicle and (ii) the first vehicle is located within a threshold distance of the subject vehicle. The method also includes selectively activating, in response to one of (i) the first vehicle contacting the subject vehicle and (ii) the first vehicle being located within the threshold distance, at least one camera of the subject vehicle. The method also includes obtaining image data of the first vehicle from the at least one camera. The method also includes transmitting the image data to a remote computing system.

Securing a vehicle
10577818 · 2020-03-03 · ·

A parking system includes a parking lot having a parking space for parking a motor vehicle; sensors for scanning the parking lot; and a processing unit for assisting in a parking or pickup operation of the motor vehicle independently of a driver, the processing unit being designed to determine that a motor vehicle which is detected inside the parking lot with the aid of the sensors is driving outside a parking or pickup operation controlled independently of a driver, and to trigger an action in response.

METHODS AND APPARATUSES INVOLVING VEHICLE TOW-AWAY DETECTION

A method includes generating a target map indicative of objects around the vehicle using sensor data from sensor circuitry of the vehicle, the sensor circuitry including at least one radar sensor; and determining, by processing circuitry, if the vehicle is being towed away. Determining if the vehicle is being towed away can include comparing the target map to a previously obtained target map, determining if the vehicle is moving based on the comparison, and in response to determining the vehicle is moving, outputting an alarm message indicative of the vehicle being towed away.

AUTOMATIC THREAT DETECTION BASED ON VIDEO FRAME DELTA INFORMATION IN COMPRESSED VIDEO STREAMS

Apparatus and associated methods relate to identifying objects of interest and detecting motion to automatically detect a security threat as a function of video frame delta information received from a video encoder. In an illustrative example, the video encoder may be an H.264 encoder onboard a video camera. A cloud server may receive the video frame delta information in a compressed video stream from the camera. Threats may be detected by the cloud server processing the video frame delta information in the compressed video stream, without decompression, to identify objects and detect motion. The cloud server may employ artificial intelligence techniques to enhance threat detection by the cloud server. Various examples may advantageously provide increased capacity of a computer tasked with detecting security breaches, due to the significant reduction in the amount of data to be processed, relative to threat detection based on processing uncompressed video streams.

Shopping cart and associated systems and methods

Exemplary embodiments are generally directed to shopping carts and associated systems and methods. Exemplary embodiments of the shopping cart include a shopping cart body and a plurality of wheels supporting the shopping cart body. Exemplary embodiments of the shopping cart include a receiver configured to detect a position of the shopping cart relative to a range of a network or an area defined by a geo-fence. Exemplary embodiments of the shopping cart include an electromagnetic generator operatively coupled to at least one of the plurality of wheels. A resistive load can be selectively connected between an input and an output of the electromagnetic generator to restrict rotation of the at least one of the plurality of wheels as the position of the shopping cart detected by the receiver varies between within or outside of the range of the network or the area defined by the geo-fence.

Boundary detection system utilizing wireless signals

A boundary detection system for a vehicle includes a controller programmed to generate an alert in response to sensing a presence of a person in a first zone extending from the vehicle. The system also includes a wireless receiver configured to receive signals transmitted by a nomadic device in a second zone surrounding the vehicle. The controller is further programmed to, in response to the receiver receiving the signals, output the alert.

Monitoring system for working machine
11954947 · 2024-04-09 · ·

A monitoring system for a working machine, includes a first communicator to communicate in wireless, the first communicator being provided on the working machine including a working device and a traveling device, a second communicator to communicate with the first communicator in wireless, the second communicator being provided on a monitoring device installed in an agricultural field, a monitor to monitor the agricultural field, the monitor being provided on the monitoring device, a judgment analyzer to judge whether the working machine is in a monitoring area based on intensities of signals of the first communicator and the second communicator, and an instruction controller to instruct the monitor to start monitoring when the judgment analyzer determines that the working machine is in the monitoring area of the monitor.

System and method with automatic radius crossing notification for global positioning system (GPS) tracker

Systems and methods with automatic radius cross notification for a GPS tracker are provided. Some methods can include receiving user input requesting a dynamic creation of a geo-fence, and, responsive thereto, creating the geo-fence. Some methods can include determining when a GPS tracker device has been stationary for a predetermined period of time, and responsive thereto, dynamically creating a geo-fence.