Patent classifications
B60R25/241
SYSTEM FOR MANAGING ACCESS TO A VEHICLE BY A SERVICE PROVIDER THAT IS TO PROVIDE A SERVICE ASSOCIATED WITH THE VEHICLE
In some implementations, a system may receive an access request associated with an agent and the vehicle. The system may authenticate, based on an agent identification associated with the agent, the agent in association with providing the vehicle service. The system may send, based on authenticating the agent, an authorization request to a user associated with the vehicle, wherein the authorization request is sent to a user device associated with the user that enables the user to authorize the agent to access the vehicle in association with providing the vehicle service. The system may receive, from the user device, a user authorization that authorizes the agent to access the vehicle. The system may configure the vehicle to enable the agent to access the vehicle via a client device associated with the agent.
Battery depletion prevention apparatus
A battery depletion prevention apparatus including a microprocessor and a memory coupled to the microprocessor. The microprocessor and the memory are configured to perform registering an information of a user, acquiring an information of a remaining battery capacity of a vehicle, predicting a possibility of a battery depletion of the vehicle based on the information of the remaining battery capacity, and transmitting a use request command for requesting the user to use the vehicle for charging a battery of the vehicle to a user terminal of the user based on the possibility of the battery depletion.
METHOD FOR CONTROLLING A VEHICLE WITH A PLURALITY OF OPERATING MODES
The method for controlling a vehicle comprises a step (E100) of implementing a first operating mode of the vehicle, for which the vehicle operates at least partially, the first operating mode being associated with an operating state of the vehicle allowing said implementation of the first operating mode. This control method comprises: a step (E101) of periodically monitoring the completion of an event during the step (E100) of implementing the first operating mode for detecting the event; a step (E102) of modifying the operating state, triggered by the detection of the event, for authorizing the activation of a second operating mode of the vehicle associated with the modified operating state; a step (E103) of activating the second operating mode of the vehicle authorized by the modified operating state.
Unauthorized Access Detection
Methods, computer-readable media, software, and apparatuses include receiving sensor data from a sensor system associated with a vehicle during operation of the vehicle over a plurality of modes of operation, computing, based on the sensor data, a vehicle fingerprint comprising one or more vehicle characteristics over the plurality of modes of operation, monitoring additional received sensor data from the sensor system during further operation of the vehicle, determining whether an anomaly exists based on comparing the additional received sensor data to the vehicle fingerprint, and based upon determining that an anomaly exists, providing an alert to a communication interface associated with the vehicle.
THEFT PROTECTION FOR AN AUTOMOBILE BY MEANS OF CONTEXT MODELLING OF AN AUTHORISED USER
The present invention is directed to a method for preventing a relay attack between a mobile phone and a starting device of an automobile, which allows to prevent stealing a vehicle. According to the invention, very specific movement profiles of an authorized driver or user are recognized and thereby it is prevented that an unauthorized user starts the vehicle and then steals it, in various application scenarios. This is based, among other things, on the underlying hardware components' sensor technology used. Further, the invention relates to an analogously arranged system arrangement and to a computer program product with control commands which implement the method or operate the system arrangement.
Authentication system, mobile device, processing device, and non-transitory computer-readable medium
A mobile device is carried by a person to be authenticated. An acceleration sensor is installed in the mobile device and configured to output an acceleration signal corresponding to acceleration applied to the mobile device. A processing device is configured to execute determination processing for determining whether the person is walking based on the acceleration signal. A control device is configured to control operation of a controlled device based on a result of the determination processing and a result of processing for authenticating, by way of the mobile device, the person as a user of the controlled device. In a case where same determinations as to whether the person is walking are made M times while the determination processing is repeated N times, the processing device validates the determination. N is an integer no less than 2. M is an integer no less than 2 and no more than N.
Controlling vehicle operations based on vehicle information
Systems, methods, and software can be used to control vehicle operation based on vehicle information. In some aspects, a method is disclosed comprising: transmitting, from a vehicle, a vehicle information request, wherein the vehicle information request comprises an identification (ID) of the vehicle; receiving, at the vehicle, a vehicle information response, wherein the vehicle information response comprises vehicle information of the vehicle; and controlling, by at least one hardware processor on the vehicle, an operation of the vehicle based on the vehicle information.
Vehicle access and power management systems and methods via machine learning
A method for access to a vehicle includes receiving data from an identification device related to at least one device environment sensor of the identification device. At least one pattern associated with the received data is identified. An environment of the identification device based on feedback from the at least one device environment sensor is determined. The environment to the at least one pattern is compared. In response to the comparing step, access to the vehicle is allowed or denied.
METHOD FOR OPENING A VEHICLE
A plurality of keys are registered to the vehicle for opening the vehicle. A respective key must answer within a predetermined timeslot after a first request transmitted by the vehicle, in order to open the vehicle. Several such successive timeslots are provided and several keys are allocated to at least one of these timeslots.
Motorcycle with sensorized storage container
A motorcycle (1) including: —a supporting structure; —at least two wheels (2, 3) constrained to the supporting structure; —a traction engine (4) constrained to the supporting structure and a transmission system (5) adapted to transmit the motion from the traction engine (4) to at least one (3) of the two wheels (2, 3); —a storage container (10) fixed to the supporting structure having an internal compartment (11) and a closing device (12) movable with respect to the supporting structure between a closing position and an opening position in order to prevent the access to the internal compartment (11) in the closing position and to allow the access to the internal compartment (11) in the opening position; —an ignition key (60). The motorcycle (1) includes an electronic device (61) adapted to detect the presence or absence of the ignition key (60) inside the storage container (10).