Patent classifications
B60R2325/30
ANTI-THEFT METHOD AND DEVICE FOR A BALANCE VEHICLE AND COMPUTER-READABLE MEDIUM
The disclosure relates to an anti-theft method for a balance vehicle, a device, and a non-transitory computer readable medium. The method includes measuring a first set of physiological characteristics of a first user that is currently occupying the balance vehicle; retrieving a second set of physiological characteristics from storage, wherein the second set of physiological characteristics is associated with at least one second user that is permitted to operate the balance vehicle; comparing the first set of physiological characteristics with the second set of physiological characteristics; determining whether the first user is different from the second user based on the comparison; and generating a prompt that is configured to indicate whether the first user is different from the second user based on the determination.
SYSTEMS AND METHODS FOR IMMOBILIZING A VEHICLE
A device may receive an arming signal associated with immobilizing a vehicle. The device may monitor, based on receiving the arming signal, a current associated with an electrical power output from a battery of the vehicle. The device may detect that a measurement of the current satisfies a threshold associated with an ignition component starting an engine of the vehicle. The device may control, based on detecting that the current satisfies the threshold, a bypass circuit to reduce the electrical power output to prevent the ignition component from starting the engine.
SECURE LAYERED AUTONOMOUS VEHICLE ACCESS
A vehicle having at least one vehicle access secured by a first lock and at least one secure area secured by a second lock. The vehicle may also have a receiver configured to receive a command from a remote computing system to unlock the vehicle access or the secure area.
Systems and methods for immobilizing a vehicle
A device may receive an arming signal associated with immobilizing a vehicle. The device may monitor, based on receiving the arming signal, a current associated with an electrical power output from a battery of the vehicle. The device may detect that a measurement of the current satisfies a threshold associated with an ignition component starting an engine of the vehicle. The device may control, based on detecting that the current satisfies the threshold, a bypass circuit to reduce the electrical power output to prevent the ignition component from starting the engine.
SYSTEMS AND METHODS FOR IMMOBILIZING A VEHICLE
A device may receive an arming signal associated with immobilizing a vehicle. The device may monitor, based on receiving the arming signal, a current associated with an electrical power output from a battery of the vehicle. The device may detect that a measurement of the current satisfies a threshold associated with an ignition component starting an engine of the vehicle. The device may control, based on detecting that the current satisfies the threshold, a bypass circuit to reduce the electrical power output to prevent the ignition component from starting the engine.
Methods and systems for vehicle protection
A method (500) for protection of a vehicle (100), the method comprising: receiving information from a sensor (502); comparing the information with known signatures indicative of a likely attack (504); determining whether a known signature indicative of a likely attack is present (506); and if a known signature indicative of a likely attack is present, placing at least one system of the vehicle into a heightened state of alert (508).
Transportation analytics systems and methods using a mobility device embedded within a vehicle
A transportation analytics (TA) computing device may be provided. The TA computing device may include at least one processor and/or associated transceiver. The at least one processor and/or associated transceiver may be configured to: (1) receive, from a user mobile device, telematics data including an indicator that the user mobile device is communicatively linked to a transportation device; (2) identify each period that the user mobile device is communicatively linked to a transportation device as a trip using the transportation device; (3) store, the telematics data in a database in association with a trip identifier corresponding to the identified trips and a time stamp; (4) perform a lookup in the database to identify, based upon the timestamps, telematics data corresponding to a time period; and/or (5) calculate, based upon the identified telematics data, a premium amount for insuring the user during the trips taken during the time period.
Systems and methods for protecting property
A method and apparatus for protecting property, wherein the method comprises receiving information indicating an attack on the property, determining, from the received information, a type of attack upon the property indicated by the received information, and transmitting a data packet to a receiver, the data packet comprising metadata describing the determined type of attack.
Secure layered autonomous vehicle access
A vehicle having at least one vehicle access secured by a first lock and at least one secure area secured by a second lock. The vehicle may also have a receiver configured to receive a command from a remote computing system to unlock the vehicle access or the secure area.
ARRANGEMENT FOR SECURING A RAIL VEHICLE AGAINST THE ACTIONS OF UNAUTHORISED PERSONS
A rail vehicle contains a vehicle control system being connected to a drive enable device which controls drive components for the operation of the vehicle. The vehicle control system is connected to a high-voltage enable device which controls high-voltage components of the rail vehicle. The rail vehicle contains a locking device containing controllable switches. A first switch is interposed between the vehicle control system and the drive enable device so that the control of the drive components can be prevented when the first switch is open and executed when the first switch is closed. A second switch is interposed between the vehicle control system and the high-voltage enable device so that the control of the high-voltage components can be prevented when the second switch is open and executed when the second switch is closed. The locking device is connected to an enable device which closes the switches after an authentication.