B60R25/04

SECURITY SYSTEM, VEHICLE, SECURITY DEVICE, AND VALIDITY DETERMINATION METHOD

A security system includes an information transmission device, and a security device to which a target device is connectable. The information transmission device and the security device are connected to each other via a network. The information transmission device transmits, to the security device, generation information to be used for generating reference identification information. The security device generates the reference identification information by using the generation information received from the information transmission device via the network. The security device acquires identification information of the target device connected to the security device. The security device compares the acquired identification information with the generated reference identification information, and determines validity of the target device connected thereto, based on a result of comparison.

SECURITY SYSTEM, VEHICLE, SECURITY DEVICE, AND VALIDITY DETERMINATION METHOD

A security system includes an information transmission device, and a security device to which a target device is connectable. The information transmission device and the security device are connected to each other via a network. The information transmission device transmits, to the security device, generation information to be used for generating reference identification information. The security device generates the reference identification information by using the generation information received from the information transmission device via the network. The security device acquires identification information of the target device connected to the security device. The security device compares the acquired identification information with the generated reference identification information, and determines validity of the target device connected thereto, based on a result of comparison.

Vehicle operator authentication operations
11548473 · 2023-01-10 · ·

An apparatus for vehicle operator authentication operations can include multiple memory devices coupled to a processor. The processor can perform an authentication operation using determined driving patterns associated with an authorized operator of a vehicle in which the apparatus is deployed and information received from a global positioning satellite and a base station to determine whether a current operator of the vehicle is the authorized operator of the vehicle and determine whether the vehicle has experienced a vehicle event. The processor can also re-allocate computing resources between the first memory device and the second memory device in response to the determination that the vehicle has experienced the vehicle event and perform, using the re-allocated computing resources, a subsequent authentication operation using the determined driving patterns and the information received from the global positioning satellite and the base station to determine whether the current operator of the vehicle is the authorized operator of the vehicle.

Vehicle operator authentication operations
11548473 · 2023-01-10 · ·

An apparatus for vehicle operator authentication operations can include multiple memory devices coupled to a processor. The processor can perform an authentication operation using determined driving patterns associated with an authorized operator of a vehicle in which the apparatus is deployed and information received from a global positioning satellite and a base station to determine whether a current operator of the vehicle is the authorized operator of the vehicle and determine whether the vehicle has experienced a vehicle event. The processor can also re-allocate computing resources between the first memory device and the second memory device in response to the determination that the vehicle has experienced the vehicle event and perform, using the re-allocated computing resources, a subsequent authentication operation using the determined driving patterns and the information received from the global positioning satellite and the base station to determine whether the current operator of the vehicle is the authorized operator of the vehicle.

Vehicle theft prevention device
11572036 · 2023-02-07 ·

A vehicle theft prevention device detachably connected to a vehicle, the vehicle theft prevention device including a switch assembly, and an ignition disabler assembly connected to the switch assembly and the vehicle to complete a circuit between an ignition switch and an electronics system of the vehicle in response to depressing the switch assembly, and prevent start of the vehicle using a vehicle key while the circuit between the ignition switch and the electronics system is incomplete.

Vehicle theft prevention device
11572036 · 2023-02-07 ·

A vehicle theft prevention device detachably connected to a vehicle, the vehicle theft prevention device including a switch assembly, and an ignition disabler assembly connected to the switch assembly and the vehicle to complete a circuit between an ignition switch and an electronics system of the vehicle in response to depressing the switch assembly, and prevent start of the vehicle using a vehicle key while the circuit between the ignition switch and the electronics system is incomplete.

ON-DEMAND DRIVER SYSTEMS AND METHODS

Example on-demand driver (ODD) systems and methods are described herein. An example method includes generating, with an ODD system, a softkey for a vehicle associated with an agreement between a driver-in-need (DIN) and an ODD, monitoring, with the ODD system, a location of an ODD device carried by the ODD, and transmitting, with the ODD system, the softkey to the ODD device when the ODD device is detected as being within a proximity of the vehicle. In the example method, the softkey is used to unlock the vehicle.

ON-DEMAND DRIVER SYSTEMS AND METHODS

Example on-demand driver (ODD) systems and methods are described herein. An example method includes generating, with an ODD system, a softkey for a vehicle associated with an agreement between a driver-in-need (DIN) and an ODD, monitoring, with the ODD system, a location of an ODD device carried by the ODD, and transmitting, with the ODD system, the softkey to the ODD device when the ODD device is detected as being within a proximity of the vehicle. In the example method, the softkey is used to unlock the vehicle.

METHOD FOR IMMOBILIZATION, CLUTCH, VEHICLE TRANSMISSION, DRIVE UNIT, AND VEHICLE
20230234535 · 2023-07-27 ·

A method for immobilizing a vehicle, in particular an electric bicycle. A drive train of the vehicle includes a clutch that includes a first clutch component and a second clutch component that are situated coaxially with respect to one another and configured to be rotatably fixedly connected to one another by mechanical contact in at least one predefined rotational direction. The method includes: detecting an input of a user for activating an immobilizer, and actuating an actuator as a function of the detected input, as the result of which the first clutch component and/or the second clutch component are/is displaced in the axial direction, as the result of which the mechanical contact between the first clutch component and the second clutch component is separated.

METHOD FOR IMMOBILIZATION, CLUTCH, VEHICLE TRANSMISSION, DRIVE UNIT, AND VEHICLE
20230234535 · 2023-07-27 ·

A method for immobilizing a vehicle, in particular an electric bicycle. A drive train of the vehicle includes a clutch that includes a first clutch component and a second clutch component that are situated coaxially with respect to one another and configured to be rotatably fixedly connected to one another by mechanical contact in at least one predefined rotational direction. The method includes: detecting an input of a user for activating an immobilizer, and actuating an actuator as a function of the detected input, as the result of which the first clutch component and/or the second clutch component are/is displaced in the axial direction, as the result of which the mechanical contact between the first clutch component and the second clutch component is separated.