ASSISTANCE METHOD, COMMUNICATION DEVICE AND ASSISTANCE SYSTEM
20210170992 · 2021-06-10
Inventors
- Inés BRAUN (Ludwigsburg, DE)
- Manos FISCHER (Stuttgart, DE)
- Frank KEMPER (Stuttgart, DE)
- Michael KUGER (Blaustein, DE)
- Jakob Luickhardt (Stuttgart, DE)
Cpc classification
B60R25/33
PERFORMING OPERATIONS; TRANSPORTING
B60R2025/1016
PERFORMING OPERATIONS; TRANSPORTING
B60R25/102
PERFORMING OPERATIONS; TRANSPORTING
International classification
B60R25/33
PERFORMING OPERATIONS; TRANSPORTING
B60R25/102
PERFORMING OPERATIONS; TRANSPORTING
Abstract
An assistance method involves predetermining a geographical region, within which the vehicle may move, by an authorized user of a vehicle using by means of a program on a communication device. The authorized user is informed, by the program on the communication device, when the vehicle leaves the predetermined geographical region. At least one piece of contact information for contacting an authority responsible for vehicle theft is displayed to the authorized user. A process identification feature of a process triggered by a theft display of the authorized user with the authority responsible for vehicle theft is entered into the program on the communication device and stored. A piece of positional information about a current position of the vehicle of a piece of access information to this positional information is relayed to the authority responsible for vehicle theft.
Claims
1-7. (canceled)
8. An assistance method, comprising: predetermining, by an authorised user of a vehicle via a program executing on a communication device, a geographical region within which the vehicle may move; informing, via the program executing on the communication device, the authorised user when the vehicle leaves the predetermined geographical region; displaying, via the program executing on the communication device, at least one piece of contact information for contacting an authority responsible for vehicle theft; entering into the program on the communication device a process identification feature of a process triggered by a theft display of the authorised user with the authority responsible for vehicle theft; storing the process identification feature on the communication device; relaying, a piece of positional information about a current position of the vehicle or a piece of access information to the positional information, to the authority responsible for vehicle theft, wherein, by storing the process identification feature, a piece of theft process information is transmitted to a central data store and is stored in the central data store in an electronic user file, and wherein the storage of the piece of theft process information is a reliability requirement for relaying the positional information or the access information to the positional information to the authority responsible for vehicle theft.
9. The assistance method of claim 8, wherein in addition to the display of the at least one piece of contact information for contacting the authority responsible for vehicle theft, a theft report with data relevant to the vehicle is compiled and displayed by the program on the communication device or is relayed to the authority responsible for vehicle theft.
10. The assistance method of claim 8, wherein the access information to positional information about the current position of the vehicle is relayed as an internet address to the authority responsible for vehicle theft.
11. The assistance method of claim 10, wherein the positional information about the current position of the vehicle, the access information to positional information, the relaying the positional information or the access information is protected by a password.
12. The assistance method of claim 10, wherein the access information to positional information about the current position of the vehicle has a validity that is temporally limited or limited based on events.
13. A communication device, comprising: a mobile application, which when executed by the communication device causes the communication device to predetermine a geographical region by an authorised user of a vehicle within which the vehicle may move; emit a piece of information when the vehicle leaves the predetermined geographical region; display at least one piece of contact information for contacting an authority responsible for vehicle theft; enter and store a process identification feature of a process triggered by a theft display of the authorised user with the authority responsible for vehicle theft; and transmit theft process information by storing the process identification feature to a central data store.
14. An assistance system, comprising: a central data store; a position determination unit of a vehicle; and a communication device comprising a mobile application, which when executed by the communication device causes the communication device to predetermine a geographical region by an authorised user of a vehicle within which the vehicle may move; emit a piece of information when the vehicle leaves the predetermined geographical region; display at least one piece of contact information for contacting an authority responsible for vehicle theft; enter and store a process identification feature of a process triggered by a theft display of the authorised user with the authority responsible for vehicle theft; and transmit theft process information by storing the process identification feature to the central data store; wherein the central data store is at least occasionally in communicative connection with the communication device.
Description
BRIEF DESCRIPTION OF THE DRAWING FIGURES
[0019] Exemplary embodiments of the invention are explained in more detail below by means of drawings.
[0020] Here are schematically illustrated:
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027] Parts corresponding to one another are provided with the same reference numerals in all Figures.
DETAILED DESCRIPTION
[0028]
[0029] This communication device 2 is advantageously a component of the assistance system 1 schematically depicted in
[0030] The program 3 is, in particular, an app (application or application software), with a mobile communication device 2, in particular a mobile app. The program 3 is thus, in particular, a computer program product.
[0031] The program 3 is available to an authorized user of a vehicle 4, for example. Various services, for example, in particular the assistance method described below, can be available to the authorized user, in particular from a vehicle manufacturer.
[0032] For the assistance method described below, the program 3, and thus the communication device 2, enables a predetermination of a geographical region 5, in which the vehicle 4 may move, also called a Geo-Fence, an activation of a theft mode, in particular when the vehicle 4 has left this predetermined geographical region 5, a display of at least one station of an authority 10 responsible for vehicle theft, in particular a police station, an access of a theft report for the authority 10 responsible for vehicle theft and/or of an insurance report for an insurance of the vehicle 4, a determination of a current position of the vehicle 4, a call function for calling the authority 10 responsible for vehicle theft, in particular the police, and/or for calling a user assistance center 22, a support of the user in the program 3, also called In-App Support, and/or a display of a user protocol 6, in particular via method components of the assistance method that have been carried out. The program 3 is protected, in particular, by a personal login of the authorized user, for example by a personal access code and/or a recognition of a fingerprint of the authorized user.
[0033] A further component of the assistance system 1 is advantageously the vehicle 4, in particular a position determination unit 7 of the vehicle 4, also called the Windshield Unit (WSU). The vehicle 4 and/or the position determination unit 7 is advantageously crosslinked, i.e., advantageously at least occasionally has a communication connection to the communication device 2 and/or to a central data store, also called the sever.
[0034] The vehicle 4 and/or the position determination unit 7 can advantageously receive, transmit, process and/or trigger commands. For the assistance method described below, the vehicle 4 and/or the position determination unit 7 enables a localization and/or positioning of the vehicle 4, i.e., in particular a position determination, i.e., a determination of a respectively current position of the vehicle 4, in particular by means of at least one global navigation satellite system.
[0035] A further component of the assistance system 1 is advantageously the central data store 8, also called the server. This stores and manages the vehicle 4, for example, i.e., information about the vehicle 4, and, for example, also information about further vehicles 4, and, for example, at least one parking position of the respective vehicle 4 and/or a status of the respective vehicle 4, in particular whether or not there has been a theft of the respective vehicle 4. Furthermore, the data store 8 stores, for example, user profiles of authorized users and links these user profiles to the respective vehicle 4. Furthermore, the data store 8 carries out security checks, for example, and can initiate commands to open and/or close a respective vehicle 4. Furthermore, the data store 8 has a “rights and roles” system for users, aid services, for example, i.e. a so-called helpdesk, developers, administrators and, where necessary, further people.
[0036] A further component of the assistance system 1 is, for example, a so-called back-office tool, i.e., a customer service program 9 of a user assistance system 22, which is installed on the data store 8 or, as shown in
[0037] The assistance method described below and able to be carried out by using the assistance system 1 depicted in
[0038] To carry out the assistance method, the program 3, for example a smartphone application, is available to the authorized user. Here, this program 3 can include different services. One of these services is the assistance method. Here, the authorized user performs so-called Geo-Fence settings in the program 3, i.e., predetermines the geographical position 5 within which the vehicle 4 may move, and, in the event of theft of the vehicle 4, i.e., in particular when the vehicle 4 leaves this predetermined region, can activate the theft mode, in order to then obtain step-by-step instructions in relation to a further procedure. For this, two switching surfaces 11, for example, are displayed to the authorized user in the program 3, which they can actuate, as shown in
[0039] In addition to the communication device 2 and/or to the program 3 installed thereon, an administrator portal, for example, can be provided, i.e., an internet platform, on which the authorized user has access via the internet. The authorized user of the vehicle 4, for example the vehicle owner, has access to the administrator portal after successful registration. The administrator portal allows the authorized user to manage all services. In the context of the services described here of the assistance system, the authorized user has the possibility to perform all setting and functions, which are also available via the program 3 on the communication device 2.
[0040] In order to recognize a theft of the vehicle 4 in good time, the assistance method uses the so-called “Geo-Fence”. This means that the authorized user sets the geographical region 5 in the program 3, which their vehicle 4 should not normally leave, i.e., inside which it may move. Should the geographical region 5 be left, the authorized user is immediately made aware of this.
[0041] To predetermine the geographical region 5, the authorized user opens the program 3 and chooses, for example via the corresponding switching surface 11, the setting possibilities for predetermining the geographical region 5. Now, a map 12 is displayed to the authorized user on the display unit of the communication device 2, as schematically shown in a simplified manner in
[0042] As soon as the authorized user has stored the predetermined geographical region 5, this information is transmitted via the vehicle back-end, i.e., via the central data store 8, to the position determination unit 7, i.e., to the Windshield Unit (WSU), of the vehicle 4 and is stored there. For reasons of data protection, it is advantageously provided that a position determination signal does not leave the driving vehicle 4, which is why the comparison of the current position of the vehicle 4 to the predetermined region 5 in the vehicle 4 takes place, i.e., in the position determination unit 7 or in a different unit of the vehicle 4
[0043] A signal is transmitted only on leaving the predetermined geographical region 5, advantageously to the back-end, i.e., to the data store 8, which triggers a so-called push notification, i.e., a notification, to the front-end, i.e., to the program 3 of the communication device 2. This notification contains, for example, only the information that the vehicle 4 has left the geographical region 5 predetermined by the authorized user. This means that it is not communicated where the vehicle 4 currently is. In addition, reference is made, for example, to the fact that the authorized user should check whether their vehicle 4 is safe or stolen.
[0044] For example, for reasons of data protection, it is provided that the authorized user can only be displayed a position of the vehicle 4 when the vehicle 4 is stationary, for example in order to easily detect the parked vehicle 4 again. This also applies to the user assistance center 22, such that, when there is no theft, no constant position monitoring of the vehicle 4 can be undertaken outside the vehicle 4.
[0045] As soon as the theft mode is activated, the user assistance center 22, i.e., a respective employee of the user assistance center 22, can also view the respectively current position and thus location of the driving vehicle 4. Here, it can be provided that exclusively the user assistance system 22 and, for example, the authority 10 responsible for vehicle theft can see this positional information. This means that as soon as the theft mode is activated, for the authorized user, for example, the location view of their vehicle 4 is hidden, such that they do not obtain any positional information about their vehicle 4, neither when it is driving nor when it is stationary. Thus, it can be avoided, for example, that the authorized user themselves looks for their vehicle and, in doing so, is put at risk.
[0046] If, after they have been informed by means of the program 3 on the communication device 2 that the vehicle has left the predetermined geographical region 5, the authorized user establishes that it was in fact stolen, they open the program 3 and activate the theft mode by means of the corresponding switching surface 11 depicted in
[0047] Firstly, the authorized user is shown step-by-step what they must now undertake. As a first step, in a displayed prompt field 16 it is listed out that they must submit a theft report to the authority 10 responsible for vehicle theft, for example to the police, as shown in
[0048] In order to simplify the theft notification for the authorized user and the authority 10 responsible for vehicle theft, for example the police, a menu of the program 3, for example, offers a theft report to download which can be produced digitally, for example, or printed out or sent by email to the authority 10 responsible for vehicle theft. The theft report contains data relevant to the vehicle, for example a vehicle identification number (Fahrzeug Identifizierungsnummer (FIN)), also called vehicle identification number (VIN), a motor vehicle name, a color of the vehicle 4, a model name of the vehicle 4 and/or data of a SIM card installed in the vehicle subscriber identity module which is exported, for example, from vehicle documentation, for example on the central data store 8. In addition, this theft report advantageously contains an indication for the authority 10 responsible for vehicle theft that a location of the vehicle 4 can be tracked and that, to do so, there is a defined process, and contains indications as to what to look out for. Furthermore, the authorized user can be informed, for example via the program 3, as to what documents they have to take with them to the authority 10 responsible for vehicle theft, for example to the police station, for example personal identification, a driving license and/or a vehicle registration document.
[0049] After the authorized user has now demonstrated the theft to the authority 10 responsible for vehicle theft, for example at the police station, they obtain a process identification feature of a process triggered by this theft demonstration from this authority 10 responsible for vehicle theft, for example a reference number in relation to this theft demonstration. In the next step, they enter this process identification feature, for example the reference number, into the program 3 and store this process, as shown in
[0050] With the storing in the front-end, i.e., in the communication device 2, in particular in its program 3, this information about the back-end, i.e., about the central data store 8, is forwarded to the back-office tool, i.e., to the customer service program 9, of the user assistance center 22 and stored there in the electronic customer file index. In the third step, the authorized user contacts the user assistance center 22 in order to end the activation of the theft mode. To do so, the request 20 for contacting the user assistance center 22 and its assistance telephone number 21 are displayed to the authorized user by the program 3. For example, the user assistance center 22 here requests again in which federal state the theft was reported.
[0051] Advantageously, the responsible employees in the user assistance center 22 are trained employees, who know how to specifically respond to users in stressful and exceptional situations. The employee explains to the authorized user on the telephone what steps are now being initiated and that they will be kept up to date via a protocol function of the program 3 by means of the user protocol 6 depicted in
[0052] For example, some of the entries into the user protocol 6 are carried out automatically, for example when the authorized user inputs the process identification feature, for example the reference number. Other entries are initiated manually, for example, by the employee of the user assistance center 22, such as, for example, the notification that the user assistance center 22 has communicated the location, i.e., the current position, of the vehicle 4 to the authority 10 responsible for vehicle theft.
[0053] There is an interface between the back-office tool of the user assistance center 22, i.e., the customer service program 9, and the vehicle back-end, i.e., the central data store 8, i.e., the customer service program 9 of the user assistance center 22 is carried out on the central data store 8 and can then correspondingly access the data of the vehicle 4 and the authorized user, in particular also the positional information about the vehicle 4, or it communicates with the central data store 8 in order to make this possible, as shown in
[0054] In an embodiment of the assistance method, the authorized user additionally has the option to download all data relevant to insurance for a damage demonstration for an insurance, for example a partial coverage insurance, of the vehicle 4, for example as a PDF file or in a different form. Such an insurance report is compiled, for example, with data relevant to the vehicle from the vehicle documents and from the vehicle back-end, i.e., from the central data store 8 and contains, for example, the process identification feature, in particular the reference number, a date of the theft and/or further information. In addition, the insurance report also includes important evidence for the damage display, for example, and a checklist for this. To do so, it is depicted in
[0055] For example, in the next step, the employee of the user assistance center 22 phones a tracking coordinator in the relevant federal state. The user assistance center 22 has a list with contact data for tracking coordinators in all federal states. In order to ensure that the case is valid, the employee of the user assistance center 22 mentions the process identification feature, for example the police reference number, to the tracking coordinator, for comparison. If this matches, the employee of the user assistance center 22 may share the location of the vehicle 4, i.e., its current position, with the tracking coordinator.
[0056] In this step, the employee of the user assistance center 22 additionally communicates the case number, for example, to the authority 10 responsible for vehicle theft, for example the police, such that the user assistance center 22 can immediately allocate the case in the event of later requests by this authority 10. Moreover, the employee of the user assistance center 22 also activates the theft mode after comparison of the process identification feature, for example the reference number. This means that the authorized user sees in the program 3 that their vehicle 4 is being searched for and is also visible in the customer file in the back-office tool, i.e., in the electronic customer file in the customer service program 9.
[0057] As soon as the theft mode is active, the location of the moving vehicle 4 is enabled. This position determination unit 7 of the vehicle 4 is requested, for example by SMS, to transmit the location of the driving vehicle 4, i.e., the respectively current position of the driving vehicle 4. As soon as the theft mode is active, for the authorized user, the view of their vehicle 4 on the map 12 in the program 3 is blocked until the theft mode is deactivated.
[0058] A particular advantage of the assistance method is thus relaying the vehicle location to the authority 10 responsible for vehicle theft, in particular to the police. This can happen via telephone, for example in the manner described above. In a further embodiment of the assistance method, it is provided to enable a so-called Live-Tracking of the vehicle 4 to the authority 10 responsible for vehicle theft, i.e., a real-time display of the respective current position of the vehicle 4. This can be carried out, for example, by a password-protected link with limited validity, i.e., a piece of access information to the positional information via the current position of the vehicle 4 is relayed as an internet address to the authority 10 responsible for vehicle theft, connected, for example, to a password protection and, for example, with limited validity. Thus, the authority 10 responsible for vehicle theft receives direct access to this positional information on the central data store 8, as schematically depicted in
[0059] After the location of the vehicle 4 has been communicated to the authority 10 responsible for vehicle theft, the employee of the user assistance center 22, for example, calls the authorized user back and supports them with topics such as damage display with partial coverage insurance of the user, vehicle deregistration, for example with the transport office, and with other necessary processes.
[0060] If the authority 10 responsible for vehicle theft, for example the police, does not have constant access to the positional information about the vehicle 4, it can further request the vehicle position during the search from the user assistance center 22, for example by mentioning the case number.
[0061] For example, at the end of a predetermined period of time of a month, for example, from receipt of the damage display with partial coverage insurers, the vehicle 4 passes into possession of the insurance company. If the vehicle 4 is found before the end of this deadline, it is provided, for example, that the vehicle 4 must be taken back by the authorized user. Because of this, the employee of the user assistance center 22 sets a resubmission of the case after a predetermined period of time of five weeks, for example.
[0062] If the vehicle 4 is found within a predetermined period of time of four weeks, for example, the search authority, i.e., the authority 10 responsible for vehicle theft, expediently communicates this to the employee of the user assistance center 22 in relation to the case number. They contact the authorized user and generate a new entry in the user protocol 6. Thus, a push notification, i.e., a notification, on the communication device 2 of the authorized user is advantageously additionally triggered with the indication that the vehicle 4 has been found. Furthermore, the theft mode is thus deactivated. Thus, the employee of the user assistance center 22 can close the case.
[0063] If the vehicle 4 is not found within the predetermined period of time of four weeks, for example, the employee of the user assistance center 22 advantageously phones the authority 10 responsible for the search, i.e., the authority 10 responsible for vehicle theft, for example after a further predetermined period of time of a further week, for example, in order to make sure that the vehicle 4 has actually not been found. If this is the case, they expediently deactivate the theft mode. Then, they advantageously get in touch with the authorized user in order to communicate to them that the case is closed and thus their vehicle 4 is separated from the electronic user file.
[0064] Although the invention has been illustrated and described in detail by way of preferred embodiments, the invention is not limited by the examples disclosed, and other variations can be derived from these by the person skilled in the art without leaving the scope of the invention. It is therefore clear that there is a plurality of possible variations. It is also clear that embodiments stated by way of example are only really examples that are not to be seen as limiting the scope, application possibilities or configuration of the invention in anyway. In fact, the preceding description and the description of the figures enable the person skilled in the art to implement the exemplary embodiments in concrete manner, wherein, with the knowledge of the disclosed inventive concept, the person skilled in the art is able to undertake various changes, for example, with regard to the functioning or arrangement of individual elements stated in an exemplary embodiment without leaving the scope of the invention, which is defined by the claims and their legal equivalents, such as further explanations in the description.