Patent classifications
B60R25/1025
SYSTEMATIC INTEGRATION VIA AN INTRUSION DETECTION DEVICE
A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.
AUTOMOBILE ACCESS AND INTRUSION DETECTION
A vehicle theft-prevention apparatus can include at least one computing device coupled to a first sensor and a second sensor that are configured to sense a first and a second type of measurement in a vehicle, respectively. The at least on computing device can be configured to read a plurality of measurements of the first type of measurement from the first sensor at a predetermined frequency. In response to one of the plurality of measurements exceeding a predetermined threshold, the at least one computing device can read at least one measurement from the second sensor. Based on the at least one measurement from the second sensor, the at least one computing device can determine that a person has entered the vehicle.
PHYSICALLY SECURED DEVICE FOR VEHICLE INTRUSION DETECTION
A vehicle theft-prevention apparatus can include a slip clutch mechanism, a locking mechanism, and a cylindrical body including a first portion and a second portion. The first portion can be configured to rotate about the second portion. The locking mechanism can be configured to engage based on rotation of the first portion relative to the second portion in a first direction, and disengage based on a rotation of the first portion relative to the second portion in a second direction. The slip clutch mechanism can be configured to prevent the locking mechanism from further engaging from rotation in the first direction relative to the second portion based on a magnitude of force applied.
Multi-sensor intrusion detection and validation
A vehicle theft-prevention apparatus can include a first sensor, a second sensor, and at least one computing device coupled to the first and second sensors. The first sensor and second sensors can be configured to sense a first type and a second type of measurement, respectively. The at least one computing device can be configured to read a plurality of measurements of the first type at a predetermined frequency from within a vehicle. In response to one of the plurality of measurements meeting a predetermined threshold, the at least one computing device can read, from the second sensor, at least one measurement of the second type from within the vehicle. The at least one computing device can be configured to determine, based on the at least one measurement from the second sensor, that the one of the plurality of measurements that met the predetermined threshold corresponds to a false positive.
PHYSICALLY SECURED DEVICE FOR VEHICLE INTRUSION DETECTION
A vehicle theft-prevention apparatus can include a locking mechanism with an engagement component. The locking mechanism can be engaged via a first action to apply a force on the vehicle when in an engaged state. The locking mechanism can disengage, via a second action, to withdraw the force from the vehicle when in the engaged state. The locking mechanism can maintain a current state of the force in response to the first action and the second action when in a disengaged state. One or more computing devices can receive a command to enable or disable the locking mechanism. In response to receiving the command, the computing device can cause the engagement component to transition the locking mechanism from the disengaged state to the engaged state or from an engaged state to a disengaged state.
Automobile access and intrusion detection
A vehicle theft-prevention apparatus can include at least one computing device coupled to a first sensor and a second sensor that are configured to sense a first and a second type of measurement in a vehicle, respectively. The at least on computing device can be configured to read a plurality of measurements of the first type of measurement from the first sensor at a predetermined frequency. In response to one of the plurality of measurements exceeding a predetermined threshold, the at least one computing device can read at least one measurement from the second sensor. Based on the at least one measurement from the second sensor, the at least one computing device can determine that a person has entered the vehicle.
Physically secured device for vehicle intrusion detection
A vehicle theft-prevention apparatus can include a slip clutch mechanism, a locking mechanism, and a cylindrical body including a first portion and a second portion. The first portion can be configured to rotate about the second portion. The locking mechanism can be configured to engage based on rotation of the first portion relative to the second portion in a first direction, and disengage based on a rotation of the first portion relative to the second portion in a second direction. The slip clutch mechanism can be configured to prevent the locking mechanism from further engaging from rotation in the first direction relative to the second portion based on a magnitude of force applied.
Tamper security systems and methods for vehicles
A passive entry/passive start (PEPS) system includes a communication gateway configured to transmit a ping signal based on at least one of a predetermined period and a predetermined transmission power level. The PEPS system includes at least one sensor configured to receive the ping signal and measure a physical characteristic of the ping signal. The PEPS system includes a central module configured to receive the measured physical characteristic of the ping signal, determine a lower threshold and an upper threshold associated with the at least one sensor, and compare the measured physical characteristic of the ping signal to the lower threshold and the upper threshold. In response to determining that the measured physical characteristic is less than the lower threshold and greater than the upper threshold, the central module is further configured to notify a portable device that the at least one sensor has been tampered with.
Vehicle alarm system with multiple devices
A vehicle alarm system comprising a primary device and at least one secondary device. The primary device is adapted to be connected to the vehicle and the secondary device is adapted to not be connected to the vehicle but adapted to be arranged in the vehicle, wherein the secondary device is adapted to take the role of the primary device if the primary device is disabled or removed from the vehicle.
Preventing replay/relay attacks in keyless entry systems
A method for controlling access to a resource, the method performed by a system comprising a first component, a second component and a third component, the first component comprising a first cryptographic key; the second component comprising a second cryptographic key. The method comprising: transmitting a signal; generating, by the first component a first channel observation; generating, by the second component, a second channel observation, and a first data value based on the second channel observation and the second cryptographic key; transmitting, by the second component, the second channel observation and the first data value; and verifying the second component based on the second channel observation, the first cryptographic key and the first data value; and allowing access to the resource in response to determining that the second component is: 1) permitted to gain access to the resource; and 2) located proximate to the first component.