ELECTRONIC SIGNAL BASED AUTHENTICATION SYSTEM AND METHOD THEREOF
20230089891 · 2023-03-23
Inventors
Cpc classification
B60R25/02
PERFORMING OPERATIONS; TRANSPORTING
G06F21/32
PHYSICS
B60R25/24
PERFORMING OPERATIONS; TRANSPORTING
International classification
G06F21/32
PHYSICS
B60R25/02
PERFORMING OPERATIONS; TRANSPORTING
B60R25/24
PERFORMING OPERATIONS; TRANSPORTING
Abstract
The present invention relates to the field of authentication systems. More particularly, it relates to electronic signal-based authentication system. It relates to authentication system which integrates into devices in electro-mechanical systems without interfering with any of its internal functions and hence provides ease of maintenance and upgradability. The present invention relates to prevention of un-authorized usage of electro-mechanical systems. To demonstrate the signal-based authentication, the vehicle is chosen as a candidate system, since vehicles are part of daily life and has widespread usage all over the world. As an embodiment of electro-mechanical device, the present invention covering vehicle anti-theft authentication system, suggests electronic signal intervention/modification unit [5] comprising of one or more microprocessors with embedded computer instructions, input-output ports, networking units, communication units, display units resulting in a highly secure authentication mechanism to prevent vehicle from being burgled and driven away.
Claims
1.-30. (canceled)
31. An electronic signal based anti-theft authentication method for vehicles, comprising of the steps: configuration of the signal intervention unit [5] between the torque sensor [4] and the electronic control unit [1] of the vehicle; detecting and comparing the authentication data according to the user input with the pre-configured user authentication data upon ignition [10] of the vehicle; detecting of events indicating an unauthorized operation of the vehicle; and outputting a control signal in accordance to detected authentication status by authentication module for permitting unaltered signal [6] from the torque sensor [4] to the electronic control unit [1] through the signal intervention unit [5], wherein the signal intervention unit [5] comprises functional flow intervention module [12] configured to receive the signal from the sensor [4] and permit unaltered signal [6] to the electronic control unit [1] for driving the steering motor [3], to allow normal movement of the vehicle, in accordance with detection result provided in response based on valid authentication status by the authentication module.
32. The electronic signal based anti-theft authentication method for vehicles as claimed in claim 31, wherein the signal intervention unit [5] comprises functional flow intervention module [12] configured to receive signal [6] from sensor [4] and permit pre-configured signal [6] to the electronic control unit [1] for setting the steering directional lock, resulting in the vehicle being steered only in one direction irrespective of the steering wheel [2] being turned clockwise or anti-clockwise in accordance with the detected invalid authentication status.
33. The electronic signal based anti-theft authentication method for vehicles as claimed in claim 31, wherein the control signal to the alert signal unit is output, in accordance with the detected authentication status within a predefined time-out period or attempts.
34. The electronic signal based anti-theft authentication method for vehicles as claimed in claim 33, wherein after predefined time-out period or attempts authentication data is required to unlock the vehicle.
35. The electronic signal based anti-theft authentication method for vehicles as claimed in claim 33, wherein the alert signal unit generates an audio and visual alert to the user device [9], in accordance with the detected authentication status.
36. The electronic signal based anti-theft authentication method for vehicles as claimed in claim 31, wherein the signal [6] from the sensor [4] to the electronic control unit [1] is not altered for authorized user, in accordance with the detected authentication status.
37. The electronic signal based anti-theft authentication method for vehicles as claimed in claim 31, wherein the events comprise of successful authentication, failed authentication, recording of credential of user, timestamp, and location of the vehicle.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0111] So that the manner in which the features, advantages and objects of the invention, as well as others which will become apparent, may be understood in more detail, more particular description of the invention briefly summarized above may be had by reference to the embodiment thereof which is illustrated in the appended drawings, which form a part of this specification. It is to be noted, however, that the drawings illustrate only a preferred embodiment of the invention and is therefore not to be considered limiting of the invention's scope as it may admit to other equally effective embodiments.
[0112]
[0113]
[0114]
[0115]
DESCRIPTION FOR DRAWINGS WITH REFERENCE NUMERALS
[0116] [1] Electronic control unit [0117] [2] Steering wheel [0118] [3] Steering motor [0119] [4] Sensors [0120] [5] Signal intervention/modification box/unit [0121] [6] Torque sensor output signal [0122] [7] Gear box [0123] [8] Rack [0124] [9] User devices [0125] [10] Starter/Ignition switch [0126] [11] Server [0127] [12] Microprocessor
DETAILED DESCRIPTION OF THE INVENTION
[0128] The present invention relates to the field of authentication systems. More particularly, it relates to the electronic signal-based authentication system. It relates to an authentication system which integrates into devices in electro-mechanical systems without interfering with any of its internal functions and hence provides an ease of maintenance and upgradability. More particularly, the present invention relates to prevention of un-authorized usage of electro-mechanical systems.
[0129] The signal based authentication system for electromechanical devices, comprising of one or more power on/starter units, an integrated circuit controller, one or more converters, one or more user devices, one or more workflow sensors/functional components, a server, a memory, a power supply unit, a signal intervention/modification box/unit comprising one or more microprocessors with embedded computer instructions, input-output ports, one or more networking units, one or more communication units, one or more display units and one or more actuators, one or more authentication modules and one or more alert signal units.
[0130] The converters comprise of analog to digital converter, digital to analog converter and the like. The signal intervention/modification box/unit is installed between the workflow sensor/functional component and the integrated circuit controller of the device. The microprocessor is configured to load the instructions into the memory and to receive user authentication data from the user device and is programmed to fetch and compare the user authentication data against authentication data/code/image from the server/from the internal memory of microprocessor. The programmed microprocessor enables a cloud based/in-device authentication from the server and is configured to detect events indicating an unauthorized entry into/operation of the device and notifying a control function to the alert signal unit. The signal intervention unit is configured to execute instructions at the microprocessor, to allow/alter the response to the event, based on authentication status by the authentication module. The response comprises of allowing/altering the signal from the workflow sensor/functional component to the integrated circuit controller of the device.
[0131] The analog to digital converter (ADC) is configured to read the analog signal values from the sensor/component and to convert the signal values into digital values and send the same to the microprocessor. The microprocessor is configured to send the converted digital signal received from the sensor/component to the integrated circuit controller and allows normal function of the device, if the authentication status is valid/authentic. The alteration of signal comprises of sending of digitally altered pre-configured signal to the integrated circuit controller for functioning the device in an abnormal manner that is pre-defined, if the authentication status is invalid/failed. The signal from the workflow sensor/component comprises of voltage signal, current signal, sensor signal, optical signal, wireless signal, magnetic signal and the like. The events comprise of successful authentication, failed authentication, hacking of programs, locking of programs, recording the credentials of user, timestamp, location of equipment, system shutdown forcing only authorized user to unlock/restart the system and the like. The events are stored in the memory real-time and offline/asynchronous. The electromechanical devices comprise of steering lock device, electric starter mechanism, fuel supply system, automatic teller machine, secret locker device, authenticated medical devices for measuring/recording critical illness, vehicle anti-theft authentication system and the like.
[0132] The method of working of the signal-based authentication system for electromechanical devices, comprising of the following steps. The signal intervention/modification box/unit is installed between the workflow sensor/functional component and the integrated circuit controller of a device. The start-up unit is switched on. An authentication code/image input is requested to be entered in the user device configured in the device. An authentication code/image is entered by the user on the user device within a predefined time-out period. The above user authentication input code/image is transferred to the microprocessor. The user authentication data and authentication data/code/image are fetched and compared from the server by the programmed microprocessor enabling a cloud based/in-device authentication from the server. The events indicating an unauthorized entry into the device is detected and a control function is notified to the alert signal unit. The programs are executed by the embedded microprocessor programming logic. The response is provided to the event, based on authentication status by the authentication module.
[0133] The response comprises of allowing/altering the signal from the workflow sensor/functional component to the integrated circuit controller of a device. The analog to digital converter is configured to read analogue signal values from the sensor/component and to convert the signal values into digital values to the microprocessor. The microprocessor sends the digital signal received from the sensor/component to the integrated circuit controller and allows normal function of the device, if the authentication status is valid/authentic. The alteration of signal comprises of sending of digitally altered pre-configured signal to the integrated circuit controller for functioning the device in abnormal manner that is pre-defined in the microprocessor, if the authentication status is invalid/failed.
[0134] General Processing steps:
[0135] a) Choose device functions (can be multiple or complete device) to be secured.
[0136] b) Install (or use existing) standard microprocessor (control unit) in the electrical line between the operator starting/signal device/master device and the functional device's functions to be secured.
[0137] c) Install/Integrate embedded security software in to the microprocessor.
[0138] d) Store reference authentication data in data store attached to microprocessor/cloud.
[0139] e) Upon start of equipment, accept authentication from operator/signal device/master device.
[0140] f) Authenticate the user against data from the microprocessor data store/cloud.
[0141] g) Upon successful authentication, allow normal operation of device.
[0142] h) Upon failure of authentication, prevent usage of device or device's target functions.
Exemplary Embodiment
[0143] The present invention relates to the field of authentication systems. The present invention relates to a vehicle anti-theft authentication system which integrates into a vehicle's electro-mechanical systems without interfering with any of its internal functions and hence provides an ease of maintenance and upgradability.
[0144] Referring to
[0145] The converters comprise of analog to digital converter, digital to analog converter and the like. The signal intervention/modification box/unit [5] is installed between the torque sensor [4] and the electronic control unit [1] of the steering motor [3] to steer the wheels. The microprocessor [12] is located inside the signal intervention/modification box/unit [5]. The microprocessor [12] is configured to load the instructions into the memory and to receive user authentication data from the user device [9] and is programmed to fetch and compare the user authentication data against the authentication data/code/image from a server [11]/from the internal storage of microprocessor. The programmed microprocessor [12] enables a cloud based/in-device authentication from the server [11] and is configured to detect events indicating an unauthorized entry into the vehicle and notifying a control function to the alert signal unit. The signal intervention unit [5] is configured to execute instructions at the microprocessor [12] with computer instructions, to allow/alter the response to the event, based on authentication status by the authentication module. The response comprises of allowing/altering the signal [6] from the torque sensor [4] to the electronic control unit [1] of the vehicle.
[0146] The analog to digital converter (ADC) is configured to read the analog signals from the sensor [4] and to convert the signal values [6] into digital values to the microprocessor [12]. The microprocessor [12] sends the converted digital signal received from the sensor [4] to the electronic control unit [1] and allows normal movement of the vehicle, if the authentication status is valid/authentic. The alteration of signal comprises of sending of digitally altered pre-configured signal to the electronic control unit [1] for driving the steering motor [3] in only one direction either clockwise or anti-clockwise direction that is pre-defined in the microprocessor [12], if the authentication status is invalid/failed. The signal from the sensor [4] comprises of voltage signal, current signal, sensor signal, optical signal, wireless signal, magnetic signal and the like. The events comprise of successful authentication, failed authentication, hacking of programs, locking of programs, recording of credentials of user, timestamp, location of vehicle, shutting down the microprocessor, unlocking a locked program, restarting the microprocessor which is shut down and the like. The events are stored in the memory real-time and offline/asynchronous.
[0147] The steering motor [3] is configured to receive signal from the electronic control unit [1] and to drive the steering motor [3] to steer the wheel in clockwise, anti-clockwise or straight direction. The signal-based vehicle anti-theft authentication system is configured for extraneous conditions to allow the driver/user to enter special authentication code and to send SOS alert to the owner/main user device/law enforcement device with location of the vehicle using the GPS. The extraneous conditions comprise of vehicle hijack, accidents, breakdowns and the like. The complete lockdown of the vehicle is performed with secure authentication, which can be unlocked and driven by users/drivers duly authenticated. The signal intervention/modification box/unit [5] is configured to be installed by the original equipment manufacturer/dealer at point of sale into new vehicles and the signal intervention/modification box/unit [5] is retrofitted in the circuit of the existing vehicles. The embedded microprocessor [12] sends an audio/visual alert to the main user device/law enforcement user device on the security network configured in the device upon receiving failed authentication code by the user/driver. The user is authenticated by checking the personal identification details which comprise of name, mobile number, user credentials such as driving license and the like for operating the signal-based device. The authentication modules comprise of smart device, bio-metric unit, Bluetooth unit, near field communication unit, face recognition sensor, finger print sensor, and the like. The successful/failed attempts in the usage are recorded in in-vehicle/cloud database. The authentic data collected can be used for variety of purposes as listed in Benefits section below. The authentication data comprises of password, bio-metric, voice command, video command, one-time password, driving license, National Unique ID (e.g., Aadhar in India), face recognition, finger print and the like.
[0148] Anti-theft authentication system uses an automobile's steering system torque sensor, it's electronic control unit, steering motor and a highly secure authentication mechanism to prevent it from being burgled and driven away.
[0149] The operation of the EPAS (Electronic Power Assisted Steering) is achieved by firstly sensing the amount of effort, or torque, applied to the steering wheel by means of a torque sensor. This torque sensor is easily incorporated within the steering column. An electric circuit is able to relay this information into an electronic control unit (ECU). The control algorithm generates a signal that drives the electric motor to provide steering assistance.
[0150] If the input received from the user is authentic, then the voltage signal received from the torque sensor is transmitted without modification to the electronic control unit and the steering of vehicle behaves normally.
[0151] If the user is not authenticated, the embedded microprocessor programming logic passes a configured voltage to the electronic control unit which drives the motor in only one direction that is pre-defined in the microprocessor.
[0152] Referring to
[0153] a) The signal intervention/modification box/unit [5] is installed between the torque sensor [4] and the electronic control unit [1] of the vehicle.
[0154] b) Install embedded security software in the processor.
[0155] c) Store authentication data in data store attached to microprocessor/cloud.
[0156] d) The ignition switch [10] is switched on.
[0157] e) An authentication code/image input interface is requested to be entered in the user device [9] configured in the vehicle.
[0158] f) An authentication code/image is entered by the user on the user device [9] within a predefined time-out period.
[0159] g) The above user authentication input code/image is transferred to the microprocessor [12].
[0160] h) The user authentication data and authentication data/code/image are fetched and compared from the server [11], by the programmed microprocessor [12] enabling a cloud based/in-device authentication from the server [11]. The events indicating an unauthorized operation of the vehicle are detected and a control function is notified to the alert signal unit. The programs are executed by the embedded microprocessor programming logic [12]. The response is provided to the event, based on authentication status by the authentication module. The response comprises of allowing/altering the signal [6] from the torque sensor [4] to the electronic control unit [1].
[0161] i) The analogue to digital converter (ADC) is configured to read signal values [6] from the sensor [4] and to convert the signal values [6] into digital values and send to the microprocessor [12].
[0162] j) The microprocessor [12] sends the digital signal received from the sensor [4] to the electronic control unit [1] and allows normal movement of the vehicle, if the authentication status is valid/authentic. The alteration of signal comprises of sending of digitally altered pre-configured signal to the electronic control unit [1] for driving the steering motor [3] in only one direction either clockwise or anti-clockwise direction that is pre-defined in the microprocessor [12], if the authentication status is invalid/failed.
[0163] The user has to authenticate within pre-configured number of times, failing which, the authentication module is disabled from further access. The audio/visual alert is generated by the alert signal unit to alert the owner/main user device regarding unidirectional steering of the vehicle (Refer
[0164] In vehicle hijack conditions, driver sends an extra SOS byte/use button to send SOS to law agencies and owner.
[0165] The authentication can be merged into existing vehicle entry control mechanisms such as key fob, or can be made an additional layer of security such as Smartphone etc.
[0166] The present invention is secure and seamlessly integrates with the above described EPAS function, microprocessor based black box that sits in between the steering column torque sensor and the electric/electronic control unit that drives the steering shaft motor to steer the wheels.
[0167] Key Features:
[0168] Patent is designed for electro-mechanical systems with functional flow intervention. The analogue/digital signals flow is to the device are controlled, (for example voltage) using secure embedded software logic. Coalesces into device's natural functioning & controls the same without interference. Virtually hack proof as the solution integrates seamlessly in to the device's existing hardware/software. Authentication flexibility—Existing security mechanisms can be used or new ones can be implemented—Future proof. The present invention is easily Retrofittable. The usage data collection is facilitated by owner/law enforcement for effective device security management. The innovative extensions are provided to device security—Providing action alerts to stall forced usage under duress. The present invention has very low additional incremental and maintenance effort and cost.
[0169] For the vehicle anti-theft, the signal intervention/modification box/unit is installed in between torque sensor and electronic control unit to control the direction of steering motor rotation. The authentication microprocessor is integrated in the vehicle to control function. The authentication system is integrated in the ignition system of new vehicle or retrofitted in older vehicles. Seamless vehicle security features are offered to Original equipment manufacturer. The vehicle wheel steering direction is controlled based on authentication. Authentication mechanism is built into/for natural function of vehicle. The recovery assistance from anti theft device is achieved without use of GPS. Access control devises assist to collect authentic usage data (Eg., odometer can be fudged). For example, access control device can assist in collecting and storing log information and the microprocessor can store such log of all events.
[0170] Sequence of Operation:
[0171] 1. Driver starts the ignition.
[0172] 2. Vehicle battery powers up all electric components including the security device which is a microprocessor. Security code is loaded and runs in microprocessor (or can be executed from a secure remote server/cloud depending on portability to ECU computing architecture)
[0173] 3. The security program configures (Refer Vehicle Security and Configuration Setup) the signal to ECU to drive the Steering electric motor to rotate in one-direction (steering directional lock is set) which will make the vehicle wheels steer only in one direction.
[0174] 4. Security program requests authentication details and waits for authentication inputs from (or communicates with) the mobile device which the driver would use to enter authentication data. This can be a password, bio metric, voice command, OTP etc. If the authentication data is not received within authentication time-out period (Refer Vehicle Security and Configuration Setup), the security code is unloaded. The operator has to start the ignition again to initiate authentication.
[0175] 5. Upon receiving authentication data, security program will access the authentication data registered in vehicle database or access a secure external database (Eg., RTO database for verifying smart card-based driving license etc) for comparison (Refer Vehicle Security and Configuration Setup).
[0176] 6. At this point, this program also reads the torque sensor signal. This signal is only read and not processed. If the operator credentials are not valid, request is sent to operator to provide correct credentials. Number of such retries is configurable (Refer Vehicle Security and Configuration Setup).
[0177] 7. If authentication succeeds, the steering directional lock is not applied and the security program passes the torque sensor signal value without modification to steering ECU/drive motor for normal steering direction and vehicle can be driven away.
[0178] 8. If authentication fails, the steering directional lock is set, which makes a single way steering direction signal to ECU/drive assist motor. Also, an audio-visual signal alerts the operator about steering directional lock and uni-directional steering. Since the ignition is already on, the operator may tend to ignore audio-visual warning and generally tries to drive the vehicle, to move forward or backward. During this process, operator will necessarily have to steer the vehicle either left or right to manoeuvre the vehicle by turning the steering wheel. Since the steering directional lock is already on, this ensures vehicle security. Despite the driver turning the steering wheel in either direction upon engaging the gear, irrespective of whether the steering wheel is turned right or left, vehicle wheel turns only in one configured direction (Refer Vehicle Security and Configuration Setup) and hence the vehicle cannot be driven away. After the detection of authentication failure, after a configured number of attempts, the engine will automatically shut down and microprocessor feeding the voltage signals to ECU is also shut down (Refer Vehicle Security and Configuration Setup).
[0179] 9. If the steering directional lock is set after the specified failed attempts, the Supervisor/Owner of vehicle has to authorize with a special code, before restart of the vehicle.
[0180] 10. The operator, can try to authenticate number of times (Refer Vehicle Security and Configuration Setup). An alert is sent to the owner of the vehicle for every successful/failed attempt. Beyond a certain number of failures (Refer Vehicle Security and Configuration Setup), an alert can be made to be sent to law enforcement agency.
[0181] Real Life Scenarios of Embodiment:
[0182] 1) Stationery Vehicle:
[0183] When a stationery vehicle in off condition is started, an authentication mechanism forces the driver to enter an authentication code in his hand-held device such as mobile phone using Bluetooth stack or use bio-metric or use any other security mechanism configured in the vehicle. The system then fetches a bio-metric image or an authentication code (or any other relevant data) from secure cloud storage/in vehicle storage and compares the same with the information entered/image captured by the driver.
[0184] If the match (and hence authentication) is SUCCESSFUL, embedded microprocessor-based programming logic allows the voltage signals from the torque sensor of steering system to be passed on to the electronic control unit of the vehicle to drive the steering motor under normal conditions.
[0185] If the authentication FAILS, the programming logic built in to the microprocessor passes a pre-configured voltage to the electronic control unit which uses the input to drive the motor in only one direction after a configured number of attempts to authenticate. This forces the vehicle to turn in only one direction and hence the vehicle cannot be driven away. After each success/failure, alert is sent to owner's mobile. After repeated failures, alert is sent to law enforcing agencies.
[0186] 2) Under Forced Hijack Conditions:
[0187] When stopped at gun/knife point, driver of the vehicle needs to first switch off ignition. When forced to restart, he can use an SOS authentication code that is either a different pass code or his bio-metric with a special button in his mobile to drive the vehicle. The microprocessor then interprets and differentiates the SOS pass code from the normal one and sends an alert to connected police network and even to another mobile (For E.g., vehicle owner's mobile or multiple mobile numbers such as call center etc.) configured in the system. The steering directional lock is not applied, and optionally turn on GPS recording and the vehicle can run normally. The alert will enable the law enforcement authority to locate the vehicle and intercept appropriately to save the driver and prevent the vehicle from being stolen and driven away.
[0188] 3) Vehicles Violating Traffic Rules:
[0189] As the vehicle is fitted with the registration details which are electronically transmittable, the law enforcing authorities can implement suitable detection system at traffic signal, to detect vehicles violating signals and issue tickets resulting in better law enforcement. (Linking of this system to any vehicle tracking system E.g., FASTag can also be done).
[0190] This invention provides the flexibility to OEM to seamlessly add additional security features, devices and solutions to enhance vehicle security.
[0191] Vehicle Security and Configuration Setup:
[0192] This invention provides for configuring the vehicle security parameters either in the plant assembly by the OEM, at dealer point or by the owner authorized to modify the factory set-up. These data can either be stored in-vehicle in a secure storage or in cloud/remote server.
[0193] 1. During Vehicle Registration—
[0194] a) Record the owner's credentials (E.g., Driving license, Mobile number etc)
[0195] b) The default direction of turning (Left or right) during directional lock of steering. This may depend on left-hand or right-hand driving.
[0196] c) Configure device(s) for authentication E.g., cell phone, biometric etc
[0197] d) The law-enforcement authority to whom alert will be sent, in case of attempted theft.
[0198] 2. Initial Setup by Owner of Vehicle.
[0199] a) List of authorized persons and their authentication details. Details of driver/s that have been removed from service or are no more authorized to drive the vehicle can be easily removed.
[0200] b) Set/Modify Supervisor password, to restart the vehicle after authentication failure.
[0201] c) Contact details (E.g., Cell-phone) for sending alert message during every success/failure of vehicle start.
[0202] d) Configure audio-visual alert during authentication failure.
[0203] e) Time-out period after ignition start before user authentication.
[0204] f) Number of attempts allowed before authentication failure is recognized.
[0205] g) Configure data storage (local/cloud storage for operator credentials, access to RTO database etc.)
[0206] h) Configure the extent of data collected (E.g., odometer reading, start/stop timing, incidents occurred)
Working Example
[0207] The following is a specific implementation (Working example) of the Exemplary Embodiment described earlier
[0208] A working model is made with a turning knob, (that simulates a steering), Dual Sensor that generate two voltage signals when knob is turned, a DC/stepper motor, motor drive integrated circuit, two wheels representing vehicle wheels. This model closely represents real life working.
[0209] In an exemplary embodiment of the present invention, following implementation of the solution is described below. For illustration of Signal based vehicle anti-theft authentication system is implemented in a working example with the following components:
TABLE-US-00001 Newly Added/ Specification/ SL Component Replacement Representation Remarks 1 Turn Knob Replacement Represents and Turning the Knob helps achieve simulates steering wheel turning. wheel 2 Dual sensor Replacement Represents steering Provides sensor signal outputs torque sensor similar to main and aux steering Creates two sensor torque sensor outputs when knob is turned 3 Column Shaft Replacement Represents steering This is attached to the Knob at column shaft one end and activates the dual sensors at the other end. 4 Microprocessor Newly Added 1. Raspberry Pi 3 On power up, loads the vehicle Model B security program into memory Raspbian OS and executes the same BCM 2837 64-bit Reads ADC (Analog to processor Digital) IC for voltage values, 1 GB RAM Checks authentication input Broadcom Wireless from the user mobile against an LAN and Bluetooth authentication value pre-stored Low Energy On board in the microprocessor GPIO pins for reading If user is authenticated, sends (input) and writing the digital voltage value (output) digital signals received from dual sensors to SPI-Serial the Motor Controller IC Peripheral Interface If user is not authenticated, changes the voltage signal to force the motor to rotate the wheel in only the pre-configured direction (left or right) and sends the same to Motor Controller IC 5 Analog to Newly Added MCP3008 ADC IC Two of the 8 channels used to Digital 8 channels for read analogue signal from dual Converter connecting 8 analogue sensor, convert to digital values (ADC) input devices and send as digital output to Microprocessor. 6 Motor Newly Added ULN2003A motor Receives the analogue signal Controller IC drive controller IC and sends signal to steering having digital and motor wheel mechanism to steer analogue pins that can the wheels be read from and written to 7 Drive Motor Replacement Stepper motor that Depending on the extent of helps rotate the wheel. Knob rotation, the signal This is similar to received from the Motor steering motor Controller IC drives the steering mechanism attached to drive motor to steer the vehicle wheel left or right or straight. In straight drive conditions motor does not rotate 8 Battery Replacement Power supply 5 V Power supply to drive the ADC, microprocessor components and drive motor IC and mechanism 9 Mobile Phone1 Newly Added Standard Android This mobile is used by the mobile phone with vehicle user who needs to WIFI, Bluetooth paired authenticate himself with the with the microprocessor authentication Microprocessor, an system authentication input entry app 10 Mobile Phone2 Newly Added Standard Android This mobile is used for mobile phone with receiving alerts on possible theft WIFI connection and attempts and such alerts are sent an app to display the by the security software running alert messages from the in the microprocessor. These security software mobiles can be with the owner and law enforcing agencies or call centres Note MCP3008 ADC IC, Raspberry PI, and ULN2003 motor driver IC together represents EPS ECU (Power Steering Electronic Control Unit) performs its functions, besides authenticating the user.
[0210] Process described below simulates the implementation of the core functionality described in
[0239] Benefits:
[0240] The signal-based device can be used for a variety of purposes, (as the vehicles are being driven by only authorized persons and their identity of the driver is known) such as: [0241] 1. Help collect data to control maintenance cost/incidents during the driving of a driver (for fleet owners). [0242] 2. Can trace the driver/owner of vehicle involved in an incident, especially hit and run or in crimes, carrying contraband goods etc. [0243] 3. Facilitate the creation and maintenance of KYD (Know Your Driver) database—Driver's driving habits and incident record which can be used by RTO (Road Transport Office) to take decisions regarding renewal of license and rate a driver (similar to credit score for a financial system). Just as a credit score database helps lenders identify potential borrowers with good credit score, KYD database will help vehicle owners identify drivers with safe driving score. This KYD database can be designed to prevent persons with criminal background own/drive vehicles. [0244] 4. Can help trigger alert regarding movement of criminals when they use vehicles. [0245] 5. Can be extended to communicate about an accident to the nearest control room and the driver concerned, which info can be used by Insurance companies to validate claims. Besides Insurance companies can come up with new schemes for vehicles/drivers predominantly driven by single user with few/no incidents. [0246] 6. Can facilitate the law enforcing authorities to track vehicles violating signals and one-way violation etc. [0247] 7. Allows integration with vehicle remote start mechanism that is needed for cold countries. In cold climatic conditions it is not possible to enter the vehicle under very cold conditions without heating the interior and warming up the engine before entering the vehicle. Owner/driver can use a remote start provided by the manufacturer for these aspects and this invention works seamlessly with the remote start feature. Physical presence of the driver inside the vehicle to authenticate and secure the vehicle is not mandatory as the security program will await authentication inputs from the driver after starting the vehicle and will not release the wheel rotation lock till authentication is successful. The same is applicable for very hot regions. As the duration for which the engine can be run without authentication is pre-configured, the engine is also protected. [0248] 8. Intermittent re-authentication by the authenticated driver can be automatically executed by the security program at configured time intervals. Vehicle will be permitted to run for a specific time to enable the driver to pull over and park the vehicle to avoid accidents at signal intersections. This feature can also be linked to vehicle hijack condition forcing the hijacker to authenticate again. And integrated with other mechanisms such as reducing vehicle speed or reducing gradually fuel flow to engine to force the driver to stop within a preconfigured time for providing alert, can also be considered. [0249] 9. Authentication can be open-ended (no time limit) or for a fixed period of time/distance (to cover service personnel, valet parking etc.) [0250] 10. In addition to engine start, authentication inputs can also be taken when the driver occupies driver seat (using seat sensor signal), a camera to capture driver image when vehicle is started etc. [0251] 11. Invention provides for flexible vehicle security that can be configured by OEM or at sales/service point. On ignition start, following additional options can be provided by the security program: [0252] Ignition key/remote can contain the finger print reader. When the finger print reader sends authentication signal that is verified successfully, the steering lock is not applied. [0253] Only authorized Bluetooth device (BT device address is unique) can initiate the authentication data verification. Inputs from any other BT device can be rejected or not taken [0254] Specific Bluetooth device ID s or addresses can be configured for verification in the security software. These BT addresses can be searched to accept authentication only from configured driver mobile devices. Such BT devices can alone be paired and allowed to exchange messages with the security software. Standard Bluetooth message encryption and security layer would prevent authentication message hacking. [0255] 12. Anti-theft security is increased by the fact that there is no data communication line between the security control unit and the steering lock (ECU/drive motor) which is accessible by a malicious code from outside by a hacker and which can be manipulated by unauthorized persons. Besides, the time available for any hacker to intrude is limited by the timeout feature. Flow intervention in the security program ensures that even if a thief manages to gain entry and start the vehicle, steering uni-directional lock is applied, prohibiting normal driving if authentication fails. [0256] 13. Driver/equipment operator identification can include—PIN code, driving license, finger print reader, facial recognition, questions only the correct driver can answer and the like. Driver license is suggested as valid check for automobiles, as this ensures validated knowledge of driving skill and prevents under-age driving. Even if the owner authorizes an under-age person to drive, he becomes liable. [0257] 14. Event log for tracing can be implemented. This can include authentication success or failure, number of attempts with time stamp, vehicle hijack SOS event, from and to locations based on GPS etc. GPS can be optionally enabled only when an incident such as an accident or hijack conditions happen. Event log analysis can be used to provide additional alerts, security or even restrict vehicle usage. This log can also help insurance authorities, besides help devise schemes for responsible driving. [0258] 15. If the security program reads a voltage value from torque sensor that falls beyond a pre-defined upper and lower circuit values, the vehicle can still be left locked, despite authentication succeeding, and a risk alert to the driver and other stake holders such as service center configured. [0259] 16. Embedded microprocessor security software for authentication and functional flow intervention to lock/unlock steering direction control helps in making the security very high. Security software can either be hosted in a separate secure microprocessor or can be embedded in the steering EPS ECU controller and this ECU can be secured. For a connected vehicle, this software can be executed from a secure remote/cloud environment (likely to be the future scenario).
[0260] Although, the invention has been described and illustrated with respect to the exemplary embodiments thereof, it should be understood by those skilled in the art that the foregoing and various other changes, omissions and additions may be made therein and thereto, without parting from the spirit and scope of the present invention.