Patent classifications
B60R25/307
Systems and methods for controlling a vehicle security system
The present disclosure relates to controlling a vehicle security system for a vehicle configured for habitation. More particularly, but not exclusively, the present disclosure relates to selectively activating one of a first security mode and a second security mode, wherein the first security mode is configured to allow the vehicle to be used as a domicile.
SYSTEMS AND METHODS FOR CONTROLLING A VEHICLE SECURITY SYSTEM
The present disclosure relates to controlling a vehicle security system for a vehicle configured for habitation. More particularly, but not exclusively, the present disclosure relates to selectively activating one of a first security mode and a second security mode, wherein the first security mode is configured to allow the vehicle to be used as a domicile.
Vehicle operator authentication operations
An apparatus for vehicle operator authentication operations can include multiple memory devices coupled to a processor. The processor can perform an authentication operation using determined driving patterns associated with an authorized operator of a vehicle in which the apparatus is deployed and information received from a global positioning satellite and a base station to determine whether a current operator of the vehicle is the authorized operator of the vehicle and determine whether the vehicle has experienced a vehicle event. The processor can also re-allocate computing resources between the first memory device and the second memory device in response to the determination that the vehicle has experienced the vehicle event and perform, using the re-allocated computing resources, a subsequent authentication operation using the determined driving patterns and the information received from the global positioning satellite and the base station to determine whether the current operator of the vehicle is the authorized operator of the vehicle.
METHOD OF UPDATING FRAUD DETECTION RULES FOR DETECTING MALICIOUS FRAMES, FRAUD DETECTING ELECTRONIC CONTROL UNIT, AND ON-BOARD NETWORK SYSTEM
A method used in an on-board network system, having electronic controllers that exchange messages and a fraud-detecting electronic controller. The method includes receiving an inquiry for a vehicle status indicating whether a vehicle in which the fraud-detecting electronic controller is installed is running from an external device, transmitting the vehicle status to the external device, and determining whether a message transmitted conforms to fraud detection rules. The method also includes receiving from the external device the delivery data, including updated fraud detection rules and network type information indicating a network type that the updated fraud detection rules are to be applied The method further includes determining whether the vehicle is running, and whether the network type information indicates a drive network that is connected to an electronic controller related to travel of the vehicle. When the network type information does not indicate the drive network, updating the fraud detection rules.
Systematic integration via an intrusion detection device
A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.
Vehicular safety monitoring
Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.
Sensing and controlling states of locking mechanisms
An affixable device can include a locking mechanism, a force-limiting mechanism, and a sensing mechanism. The locking mechanism can include an engagement component configured to disable the locking mechanism. The force-limiting mechanism can be configured to limit a locking force of the locking mechanism. The sensing mechanism can be coupled to the engagement component, and can be configured to determine that the force-limiting mechanism has limited the locking force of the locking mechanism. In response to determining the force-limiting mechanism limiting the locking force, the sensing mechanism can cause the engagement component to disable the locking mechanism.
TIRE MONITOR
A vehicle includes: a tire monitor, located in a wheel arch and configured to: project beam(s) onto a tire, measure reflection(s) of the beam(s); memory, processor(s) configured to, based on the reflection(s): build a two-dimensional (2D) profile of the tire, compare depths of the built profile to depths of a preloaded profile, assess tire wear based on the comparison.
KEYLESS VEHICLE SYSTEM THAT ENABLES SERVICING
A method and system for servicing keyless vehicles is provided. The keyless vehicles include security systems that permit operation of the keyless vehicles if the security system receives a unique security signal from a smartphone. The method includes receiving a service request and unique first security data information from a customer concerning a location of a first keyless vehicle that requires service. An authorized person is transported to the first keyless vehicle in a second keyless vehicle. A customer's smartphone is provided with unique second security data whereby a customer can enter and operate the second keyless vehicle utilizing the customer's smartphone. The authorized person drives the first keyless vehicle to a service facility utilizing a second smartphone that is configured to generate a security signal to permit operation of the first keyless vehicle.
Shared vehicle I/O expander
System, apparatus, device and methods relating to a telematic vehicle sharing platform ecosystem and a telematic vehicle share I/O expander to automate sharing and management of a vehicle that is shared by more than one operator.