B60R2325/20

Nonspecific vehicle
11541843 · 2023-01-03 · ·

A vehicle capable of being utilized by users other than a user assigned to the vehicle is described herein. Such a vehicle may operate in various modes, including a first mode in which the vehicle allows additional users to utilize the vehicle and a second mode in which the vehicle prohibits additional users from utilizing the vehicle. A vehicle may transition from the first mode to the second mode based on various environmental factors, such as, but not limited to, vehicle demand, geolocation, and the like. When operating in a mode in which the vehicle can be utilized by users other than a user assigned to the vehicle, a user who may have been assigned a different vehicle may utilize the vehicle when proximate to the vehicle. Trip information and other details may be provided to the vehicle for transport of the user.

APPARATUS, SYSTEM AND METHOD FOR VEHICLE ACCESS AND FUNCTION CONTROL UTILIZING A PORTABLE DEVICE
20180009416 · 2018-01-11 ·

A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to one or more key fobs linked to the vehicle, and device data that includes data relating to one or more devices linked to the key fob that are authorized to access the vehicle. The vehicle receives an access request indicating that a new device is requesting access to the vehicle, whereupon a challenge may be transmitted to one or more of the authorized devices. The one or more devices may respond, granting access to vehicle functions. The vehicle and/or authentication network generate a secure fob key and access limitations based on the response and transmit the secure fob key to the new device. Profile templates may be used to set and control vehicle access and functions.

Systematic integration via an intrusion detection device

A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.

Working machine management system and working machine

A working machine management system includes a working machine having a prime mover and a control unit and a key device which is detachable from the working machine and is used for operating the working machine. The key device stores first authentication information for identifying a drivable working machine and second authentication information necessary for the prime mover to continuously operate. When the key device is attached to the working machine, the control unit confirms validity of the key device based on the first authentication information, compares input information from the outside with the second authentication information to determine whether the prime mover can be operated if the key device is valid, and controls operation of the prime mover according to the determination result.

Vehicular safety monitoring

Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.

KEYLESS PATTERN-BASED MECHANISM FOR UNLOCKING VEHICLE

An approach for the unlocking a vehicle is disclosed. The approach determines a plurality of devices of one or more users and one or more unlocking protocols associated with one or more vehicles, requests a user unlock action command by at least one of the plurality of devices. The approach receives a user unlock action complete command from at least one of the plurality of devices and validates the user unlock action complete command against the one or more unlocking protocols. Finally, after successful authentication, the approach unlocks the one or more vehicles.

USER AUTHENTICATION METHOD FOR CONSTRUCTION EQUIPMENT
20230094085 · 2023-03-30 ·

The present disclosure relates to a user authentication method for construction equipment, capable of preventing theft of construction equipment. The user authentication method for construction equipment according to an embodiment of the present invention includes: a user authentication method for construction equipment includes: a user information registration step for registering a user identification information provided from a user device; a digital key issuance step for, upon request for use of the construction equipment from the user device, generating a digital key corresponding to the construction equipment and transmitting the generated digital key to the user device; and an equipment authentication step for allowing the use of the construction equipment when the user device having receive the digital key completes authentication of the identification information through the digital key.

SYSTEM AND METHOD FOR GRANTING ACCESS TO AN AUTONOMOUS VEHICLE
20230102898 · 2023-03-30 ·

A system for granting access to an autonomous vehicle comprises the autonomous vehicle, a control device, and a communication device associated with the autonomous vehicle. The communication device receives a signal from a device associated with a user that indicates the user requests the autonomous vehicle to pull over. The control device pulls the autonomous vehicle over to a side of road traveled by the autonomous vehicle. The control device receives a credential associated with the user. The control device determines whether the credential is verified. In response to determining that the credential is verified, the control device grants the user to access the autonomous vehicle.

Sensing and controlling states of locking mechanisms

An affixable device can include a locking mechanism, a force-limiting mechanism, and a sensing mechanism. The locking mechanism can include an engagement component configured to disable the locking mechanism. The force-limiting mechanism can be configured to limit a locking force of the locking mechanism. The sensing mechanism can be coupled to the engagement component, and can be configured to determine that the force-limiting mechanism has limited the locking force of the locking mechanism. In response to determining the force-limiting mechanism limiting the locking force, the sensing mechanism can cause the engagement component to disable the locking mechanism.

PASSIVE ENTRY PASSIVE START SYSTEM AND METHOD, AND VEHICLE

The invention relates to a passive entry passive start system and method, and a vehicle. The system includes a vehicle and a mobile terminal, where the vehicle includes: a plurality of sensors configured to interact with the mobile terminal to acquire service-related data, each sensor having a master-slave integration function in which the sensor is able to be a master node or a slave node; a central module configured to perform data exchange with the sensors, and generate a corresponding control instruction based on the service-related data received from the sensors, and configured to designate one sensor in the plurality of sensors as a master node and the other sensors and the central module as slave nodes, or designate the central module itself as a master node and the plurality of sensors as slave nodes, where the master node implements data exchange with the slave nodes; and a controller configured to receive the control instruction from the central module and execute a corresponding control action according to the control instruction. According to the invention, separation between hardware and software can be implemented, and development flexibility can be enhanced.