Secured Network Intellingence That Contacts Help
20220357737 · 2022-11-10
Inventors
Cpc classification
H04W4/80
ELECTRICITY
B60R25/102
PERFORMING OPERATIONS; TRANSPORTING
B60R25/104
PERFORMING OPERATIONS; TRANSPORTING
International classification
G05D1/00
PHYSICS
G06F21/62
PHYSICS
Abstract
An encrypted intelligence networking system that takes car to car communication/C-V2X to the next stage of vehicle safety by enhancing how auto owners report vehicles stolen, while affording law enforcement tools that allow disabling and faster detection of stolen vehicles. Secured Network Intelligence That Contacts Help (SNITCH) system, designed for installation on vehicles which require DMV registration, would rely on 4G LTE and or 5G networks to quickly transmit data through secured bluetooth features, enabling stolen vehicles to release stolen status info and other vehicle information (e.g. VIN, direction of travel, owner contact information, etc.) exclusively to law enforcement vehicles within the desired range for communication. Upon detection of a stolen vehicle, officers would have the option to activate Offender Apprehension Mode (OAM), a feature designed to disable accelerating components and prevent high-speed chases that often end with deadly crashes.
Claims
1. Will use bluetooth enabled devices, such as smartphones, computers, and vehicles to transmit data/information to one another to achieve car to car communication/C-V2X.
2. Will use a secured bluetooth feature designed to release data/information from a vehicle declared stolen by the owner “exclusively” to law enforcement vehicles equipped with a laptop/computer without officers having to run the stolen vehicle plates.
3. Will use “secured” smartphone applications, computer applications, and/or a customer service number to control, activate, deactivate or disable features afforded by this invention invention (Secured Network Intelligence That Contacts Help, SNITCH).
4. Will use a fully encrpted, isolated and firewalled system to prevent hacking/breaching, designed to enhance vehicle cybersecurity and vehicle data safety.
5. Will use 5G and/or 4G LTE networks for high-speed data transmission between car to car of C-V2X products and applications for short range communications.
6. Will use computer programming techniques to achieve offender apprehension mode or “OAM”, a feature designed to electronically disable accelerating components (e.g. cylinders and motors) while employing a governor at each MPH/KMH reduction, then engaging a vehicle's braking system once a safe speed is reached.
7. Will use GPS signal trajectory to determine a stolen vehicle's direction of travel, and enhance visual detection by law enforcement.
8. Will use light indicators installed on the top of a vehicle or inside the taillights that will flash and remain illuminated for law enforcement to clearly and quickly identify a target vehicle (stolen vehicle).
9. Will use passcodes and security questions provided by an auto owner to prevent application and feature misuse.
Description
DETAILED DESCRIPTION OF THE INVENTION
Section 4 OF 6
How Does it Work?
[0036] In the event a vehicle is stolen, the owner would be able to access an application on their phones or contact a hotline (i.e. 1-800-hot-cars) via telephone. They would then enter their exclusive passcode, answer a few security questions, activate their vehicle's bluetooth identifier, (SNITCH) and make an official police call using 911. The SNITCH system is designed to allow civilian owned vehicles equipped with SNITCH to communicate with law enforcement vehicles equipped with computers through a secured bluetooth networking feature. (i.e. There's a device called “King Fish” or “Trigger Fish” that law enforcement all over the U.S. use to combat crime. This device manipulates other devices into sending their identification information to the “King Trigger” fish device). Using similar technology, a stolen vehicle with an activated SNITCH system would only be able to release its stolen status and other information to law enforcement computers inside their cruisers when the vehicle is marked stolen by the owner. All communicating/releasing of vehicle ID information would take place when the vehicle comes within the desired range (5 to 75 feet), for a 2 to 5 second duration via bluetooth. Communication between police vehicles and stolen vehicles would still take place even if a marked vehicle is powered off.
[0037] Once desired contact is made, small indicator lights installed in the taillights or on the top of the stolen vehicle would flash green and remain illuminated for police to clearly identify a target vehicle. An arrow would also appear on the officer's computer screen, providing them with a signal direction to quickly zero in on the target vehicle. Other information such as the stolen vehicle's “VIN”, owner contact information, vehicle make, model, and color would also be provided to officers via the cruiser's computer.
OFFENDER APPREHENSION MODE “OAM”
[0038] Since law enforcement would become aware of a stolen vehicle's status within seconds of coming into the desired range (5 to 75 feet) officers could activate the “OAM” feature and wait for the magic to happen. Offender Apprehension Mode would gradually reduce the stolen vehicle's speed: while disengaging the vehicle's cylinders/motor, employing a governor after each reduction to prevent acceleration and finally dead-locking the brakes once the vehicle reaches a safe speed (e.g. 10 to 20 mph or less).
[0039] Offender Apprehension Mode would also extend to vehicles that aren't stolen, but are potential targets for traffic stops. By using the bluetooth search feature, officers would be able to identify and lock in any vehicle within a desired range which they intend to stop. If the vehicle doesn't pull over after officers have activated their sirens, signaling the targeted vehicle to stop, then Offender Apprehension Mode will be activated to disable and eventually stop the fleeing vehicle.
[0040] Bluetooth Search—Upon officer's bluetooth search, a list of vehicles within the desired range, from closest to farthest, will be sent to law enforcement vehicles. Officers would then use this list of short range communicating vehicles to identify and lock-in on specific vehicles that are considered to be fleeing and disable them.
APPLICATION/HOTLINE SECURITY QUESTIONS
[0041] 1. Is your vehicle missing or stolen? [0042] 2. Do you want to activate your vehicle's SNITCH system? [0043] 3. Do you understand that law enforcement's job is to pursue suspects and not yours?
[0044] Please hold while you are connected with a 911 dispatch to complete a police report.
SEQUENCE LISTING
[0045] NOT APPLICABLE
TERMS AND DEFINITIONS
[0046] 1. Car to car communication—the exchanging of information data between vehicles. [0047] 2. C-V2X—The exchanging of information/data between cellularrdevices, vehicles, and everything capable of communicating. Cellular-vehicle to everything. [0048] 3. DMV—Department of Motor Vehicles [0049] 4. Light indicators—Small lights installed on a vehicle designed to flash and illuminate [0050] 5. Offender Apprehension Mode—The combination of techniques or methods that allow law enforcement to disable a stolen vehicle electronically via computer application(s)—““OAM”; [0051] 6. Secured Network Intelligence That Contacts Help—A system designed to combat auto theft and high-speed chases with law enforcement which often end with crashes and fatalities. [0052] 7. [0053] 7. Striker Plating—A criminal technique used to replace a vehicle's “VIN” (Vehicle Identification Number). [0054] 8. Taillight Indicators—Small lights installed inside of a taillight, designed to flash and illuminate. [0055] 9. VIN—Vehicle identification number.