SYSTEM AND METHOD FOR SECURING A VEHICLE
20190248325 · 2019-08-15
Inventors
Cpc classification
B60R25/33
PERFORMING OPERATIONS; TRANSPORTING
B60R25/1003
PERFORMING OPERATIONS; TRANSPORTING
H04W4/44
ELECTRICITY
H04W12/126
ELECTRICITY
B60R25/1004
PERFORMING OPERATIONS; TRANSPORTING
B60R2025/1016
PERFORMING OPERATIONS; TRANSPORTING
B60R25/102
PERFORMING OPERATIONS; TRANSPORTING
B60Y2200/12
PERFORMING OPERATIONS; TRANSPORTING
International classification
B60R25/102
PERFORMING OPERATIONS; TRANSPORTING
B60R25/33
PERFORMING OPERATIONS; TRANSPORTING
Abstract
A system for securing of vehicles includes at least one server; at least one vehicle having a vehicle processing device and a vehicle communication device designed to communicate with the server via at least one mobile radio network, wherein the vehicle processing device is designed to transmit data to the server; and at least one mobile terminal device, in particular a smartphone. The server has at least one allocation table which assigns at least one terminal device to the at least one vehicle. The server is designed to: (a) determine, by using the transmitted data, whether the vehicle is being moved without authorization; (b) determine, in the event of unauthorized movement of the vehicle, the associated terminal device using the allocation table; and/or (c) send a warning message to the associated terminal device in the event of unauthorized movement.
Claims
1-17. (canceled)
18. A system comprising: at least one server in particular a cloud or web server; at least one vehicle, in particular a bicycle, tricycle or off-road vehicle (e.g. quad, ATV, UTV), having a vehicle processing device and a vehicle communication device, wherein the vehicle communication device is designed to communicate with the server via at least one mobile network, and wherein the vehicle processing device is designed to transmit data to the server, and wherein the server has at least one allocation table which assigns at least one terminal device to the at least one vehicle, and wherein the server is designed for: a) determining, by using the transmitted data of the vehicle, whether the vehicle is being moved without authorization; b) determining, in the event of unauthorized movement of the vehicle, the associated terminal device by using the allocation table; and/or c) sending a warning message to the associated terminal device in the event of unauthorized movement.
19. The system according to claim 18, wherein the at least one vehicle comprises a position determination device, such as a GPS or GNSS receiver, for receiving signals from a satellite navigation system and for determining a position of the vehicle, wherein the vehicle processing device is designed to transmit the position of the vehicle to the server.
20. The system according to claim 18, wherein the at least one vehicle comprises at least one electric drive controlled via a control unit, wherein the vehicle processing device is communicatively connected to the control unit and/or the at least one electric drive to determine a driving state indicating that the vehicle is being moved.
21. The system according to claim 20, wherein the at least one vehicle comprises a short-range communication device, such as a Bluetooth module, which is communicatively connected to a mobile terminal device and the vehicle processing device.
22. The system according to claim 21, wherein the control unit is designed to activate the at least one electric drive as a function of signals, in particular an enable message, of the short-range communication device.
23. The system according to claim 22, wherein for activation of the at least one electric drive, the enable message encrypted via a key pair is exchanged between the short-range communication device and the mobile terminal device.
24. The system according to claim 23, wherein a key of the key pair is component-specific and loses its validity with an exchange of a battery or a rechargeable battery.
25. The system according to claim 18, wherein the vehicle processing device is designed: a) to change between an active state and a passive state as a function of a driving state (Z, Z1) and/or signals from at least one acceleration sensor; b) to transmit data to the server in the active state at small time intervals, for example less than 1 hour, in particular less than 10 minutes; and c) to transmit data to the server in the passive state at large time intervals, for example greater than 1 hour, in particular greater than 2 hours, or to transmit no data to the server in the passive state.
26. The system according to claim 25, wherein the vehicle processing device is designed, in the passive state, to at least temporarily de-energize some components, for example a position determination device and/or the vehicle communication device.
27. The system according to claim 18, wherein the server stores enable information for at least some of the vehicles indicating whether the respective vehicle may be moved, wherein the server is adapted to determine, by using the enable information-of the respective vehicle, whether the respective vehicle is being moved in an unauthorized way.
28. The system according to claim 27, wherein the server is designed for setting the respective enable information depending on instructions which are received from the associated mobile terminal device.
29. The system according to claim 18, wherein at least one mobile terminal device comprises an application which is designed to communicate with the server-and/or to visualize information provided by the server, in particular position information, when the application is run by the mobile terminal device.
30. A method for operating the system according to claim 18, the method comprising steps of: a) transmitting data, in particular position data, by a vehicle communication device to a server; b) ascertaining, by using the transmitted data of the vehicle, whether the vehicle is being moved without authorization; c) determining, by using an allocation table of an associated terminal device, in case of unauthorized movement of the vehicle; and d) sending a warning message to the associated terminal device in the event of unauthorized movement.
31. The method according to claim 30, further comprising a step of: e) activating a signal generator, for example a horn, in an event of unauthorized movement.
32. A computer-readable memory containing instructions for implementing the method according to claim 30 when they are carried out.
33. A system, comprising: at least one vehicle, in particular a bicycle, tricycle or off-road vehicle (e.g. quad, ATV, UTV), comprising a vehicle processing device and a short-range communication device, wherein the vehicle comprises an electric drive controlled by a control unit, and wherein the control unit is designed to activate the electric drive as a function of signals, in particular an enable message, of the short-range communication device; at least one mobile terminal device, in particular a smartphone, which is designed to communicate with the vehicle via a radio link, wherein an enable message encrypted via a key pair is exchanged between the short-range communication device and the mobile terminal device to activate the electric drive, wherein a key of the key pair is component-specific, in particular based on a hardware ID, and loses its validity with an exchange of the component.
34. A vehicle comprising: a vehicle communication device; and an electric drive controlled by a control unit, wherein the control unit is designed to activate the electric drive as a function of signals, in particular an enable message, of the short-range communication device, and wherein an/the enable message-encrypted via a key pair is received by the short-range communication device in order to activate the electric drive, wherein a key of the key pair is component-specific, in particular based on a hardware ID, and loses its validity with an exchange of the component.
Description
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
[0078] The foregoing summary, as well as the following detailed description of the invention, will be better understood when read in conjunction with the appended drawings. For the purpose of illustrating the invention, there are shown in the drawings embodiments which are presently preferred. It should be understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown. In the drawings:
[0079]
[0080]
[0081]
[0082]
[0083]
[0084]
[0085]
[0086]
DETAILED DESCRIPTION OF THE INVENTION
[0087] In the following, the same reference numbers are used for identical or equivalent parts.
[0088]
[0089] Server 30 is in communicative connection with a mobile radio network 2. Server 30 is therefore capable of receiving calls or SMS messages, for example. In addition, the server 30 is able to establish an internet connection via the mobile radio network 2. For this purpose, the server 30 can use the UMTS or LTE standard, for example. Warning message 61 could therefore also be sent via mobile radio network 2.
[0090] The bicycle 10 sends data 60 to the mobile radio network 2, which are received by the server 30. For example, data 60 could be position data 60. For example, position data 60 can be transmitted periodically, for example at intervals of 1 hour, 2 hours or even every minute.
[0091] Using the received data 60, server 30 can determine whether the bicycle 10 is moved or not. If the data 60 are GPS coordinates, server 30 can easily determine whether the GPS coordinates change. Data 60 can also be the identification number of a mobile phone cell. Server 30 can then determine whether the identification number of the mobile radio cell is changing. If there is a change in the mobile radio cell, there is a movement of the bicycle 10.
[0092] In another embodiment example, the data 60 can be used to predict the path of the bicycle 10. For example, particle filters or recurrent neural networks can be used for this purpose. In this case, historical position data can be used as evidence so that a future position can be estimated.
[0093] Server 30 can determine whether the movement is an authorized movement or an unauthorized movement after determining whether the bicycle is being moved. If the server 30 detects that the movement of the bicycle 10 is unauthorized, it sends a warning message 61 to the smartphone 40. In the first embodiment example, the warning message 61 is an SMS. In other embodiment examples, warning message 61 can also be a push message from a web service.
[0094] Warning message 61, for example, contains information on the position of the bicycle 10, so that the position of the bicycle 10 can be visualized on a map on a display device of the smartphone 40. It is also possible for the smartphone 40 to display the past movement of the bicycle 10 on a map. This means that the user of the smartphone 40 can track where the bicycle is heading at any time. Law enforcement agencies or the user per se can thus recover the bicycle 10.
[0095]
[0096] The determined GPS coordinates can then be sent to the server 30 via the vehicle communication device 12.
[0097] However, in another embodiment example, it is also possible for the vehicle processing device 11 to check whether the position of the bicycle 10 has changed. An SMS or other message only needs to be sent to server 30 if the position of the bicycle 10 changes. This prevents messages from being sent unnecessarily.
[0098] In one embodiment example, the bicycle 10 is an electric bicycle with an electric drive 15. The electric drive 15 is powered by a battery 50 and controlled by a control unit 14. In the current embodiment example, the electric drive 15 supports the driver when pedaling. The vehicle processing device 11 can therefore also determine whether the bicycle 10 is moved when the electric drive 15 is active. In one embodiment example, the position determination device 13 can thus be dispensed with. Another possibility of determining whether the bicycle 10 is moved is to provide an acceleration sensor 17. The acceleration sensor 17 can be designed as a gyrometer, for example. The vehicle processing device 11 can determine whether there is movement of the bicycle 10 using the data generated by the acceleration sensor 17. It is therefore sufficient to provide only the acceleration sensor 17 to detect a movement of the bicycle 10.
[0099] In further embodiment examples, the vehicle communication device 12 can send the raw data or data preprocessed by the vehicle processing device 11 from the acceleration sensor 17 to the server 30.
[0100] In one embodiment example, the vehicle communication device 12 is adapted to receive messages from the server 30. For example, if the server 30 determines that a movement of the bicycle 10 is an unauthorized movement, the server 30 can send a message to the vehicle communication device 12. The vehicle processing device 11 may activate a horn 19 mounted on the bicycle 10 in response to receiving the message. This will alert passers-by to the unauthorized movement of bicycle 10.
[0101] In the embodiment example described above, the driver or owner of the bicycle 10 is informed of an unauthorized movement and can be enabled to locate the vehicle 10 using position data 60. It is also possible to activate an alarm system function on the bicycle so that passers-by are informed of theft.
[0102]
[0103] The network card 33 receives data from the bicycle 10, for example a bicycle ID together with position data 60. First the server 30 can determine whether there is a movement of the bicycle 10. In this case, past position data of the bicycle 10 stored in the memory 32 can be compared with the received position data 60. If there is a deviation in the position data, the system determines a movement. The allocation table 34 contains enable information 36, 36, 36 indicating whether a movement of the vehicle 10 assigned to the enable information 36, 36, 36 (see
[0104] If the server 30 detects that the movement of the bicycle 10 is being performed without authorization, the network card 33 sends a warning message 61 to the smartphone 40 of the driver.
[0105]
[0106] From the column for vehicle numbers 20, 20, 20 and the column for devices 45, 45, 45 it can be determined to which device 40 the server 30 must send a warning message 61 if an unauthorized movement of a vehicle 10 is detected.
[0107] The allocation table may also contain a column for enable authorizations 36, 36, 36. The enable authorizations column indicates whether a vehicle 10 assigned to enable information 36, 36, 36 may be moved.
[0108] For example, if the server 30 determines that a vehicle 10 with a vehicle number 20 is being moved, the enable information 36 indicates whether this movement is being performed with or without authorization. If the movement is unauthorized, a warning message 61 is sent to device 40 with device number 45.
[0109] The allocation table 34 can also contain a column that stores keys 35, 35, 35 that can be used to authenticate users. For example, keys 35, 35, 35 may be a tuple of private and public keys of an asymmetric encryption procedure. The keys 35, 35, 35 can be used to verify the incoming messages 60 of the bicycle 10. This prevents unauthorized messages from being received.
[0110] In the column for devices 40, a tuple of device numbers 45, 45, 45 may also be indicated in other embodiment examples in addition to a single device number 45, 45, 45. In the column for vehicle numbers, in addition to a single vehicle number 20, a tuple of vehicle numbers 20 may also be indicated. Thus also 1:N and M:N relations can be converted with the allocation table 34. Alternatively, the allocation table 34 may include a plurality of additional columns for equipment numbers or vehicle numbers which can be used to implement the above relationship types.
[0111] In one embodiment example, a device 40 is arranged with a third party. A third party may be a private security service, the police or a fleet operator. This means that third parties can also be informed of unauthorized movements of the vehicle at any time.
[0112]
[0113] In step S2 it is determined whether the transmitted data 60 indicate that the state Z of the vehicle 10 is a driving state Z1 or a stop state Z2. If it is determined that the state Z corresponds to a stop state Z2, the method continues with step S1. If, on the other hand, it is found that the Z state corresponds to a driving state Z1, the method continues with step S3 by determining whether the movement of the vehicle 10 is an authorized or an unauthorized movement.
[0114] The allocation table 34 is used for this purpose.
[0115] If it is determined that the movement of the vehicle 10 is an unauthorized movement, a warning message 61 shall be sent to the smartphone 40 assigned in allocation table 34.
[0116]
[0117] It is advantageous if the connection between smartphone 40 and bicycle 10 is automatically established as soon as the smartphone 40 is within the reception area 3 of bicycle 10.
[0118] The reception range 3 is determined by a radius R and depends on the range of the Bluetooth modules 18 and 42.
[0119] In order to establish a connection between the bicycle 10 and the smartphone 40, it is provided in the embodiment examples shown that an encrypted enable message 64 is exchanged between the bicycle 10 and the smartphone 40. This ensures that only authorized smartphones 40 communicate with the corresponding bicycles 10. The key 35, 35, 35 used to encrypt the message 64 can at least partly be based on the hardware components used in the bicycle 10. In this embodiment example, the key 35, 35, 35 is generated using the serial number of the installed rechargeable battery 50. If the rechargeable battery 50 is replaced, the key 35, 35, 35 loses its validity. This makes it impossible for an unauthorized user to cause an unauthorized movement of the bicycle to occur if a change is made to the bicycle.
[0120] If a connection between smartphone 40 and bicycle 10 is successfully established, the control unit 14 of the bicycle 10 can enable the electric drive 15. Normally, the electric drive 15 is switched off so that unauthorized movement of the bicycle 10 is prevented. The approach of the smartphone 40 to the bicycle 10 thus provides a so-called keyless-go functionality.
[0121]
[0122] One advantage of the illustrated embodiment is that, for example, bicycles 10 or vehicles 10 can also be retrofitted with keyless go functionality.
[0123]
[0124] It is clear to the person skilled in the art that the embodiment examples and embodiments described above are merely exemplary and that the individual aspects of the embodiment examples can be combined with each other without deviating from the inventive idea.
[0125] It will be appreciated by those skilled in the art that changes could be made to the embodiments described above without departing from the broad inventive concept thereof. It is understood, therefore, that this invention is not limited to the particular embodiments disclosed, but it is intended to cover modifications within the spirit and scope of the present invention as defined by the appended claims.