METHOD AND SYSTEM FOR ACTIVATING ACCESS TO A VEHICLE PARKED IN AN AREA NOT COVERED BY A DATA NETWORK

20230068045 · 2023-03-02

Assignee

Inventors

Cpc classification

International classification

Abstract

The invention relates to a method for activating access to a vehicle within a vehicle fleet parked in a parking area not covered by a data network, comprising the following steps: transmission of an activation signal from a user's computer equipment, which transmission is done via a short-range wireless connection in the parking area, reception of the activation signal by embedded computer equipment of a plurality of vehicles of the vehicle fleet, implementation of a computerised logic process leading to the election of at least one vehicle from among the plurality of vehicles, identification of the elected vehicle: by transmitting, from the elected vehicle, location information of said vehicle, and/or by transmitting one or more pieces of identification data of the elected vehicle to the user equipment, from the embedded equipment of one of the plurality of vehicles, which transmission is done via a short-range wireless connection in the parking area, transmission of an access authorisation to the elected vehicle's embedded equipment from the user equipment, which transmission is done via a short-range wireless connection in the parking area, activation of access to the elected vehicle following reception of the access authorisation by the embedded equipment of said vehicle.

Claims

1-11. (canceled)

12. A method for activating access to a vehicle within a vehicle fleet parked in a parking area not covered by a data network, comprising: transmitting an activation signal from a piece of computer equipment of a user, which transmission is done via a short-range wireless connection in the parking area, receiving the activation signal by embedded computer equipment from a plurality of vehicles of the vehicle fleet, implementing a computerised logic process leading to the election of at least one vehicle from among the plurality of vehicles, wherein the process is based: on an analysis of the available fuel level and/or the electrical charging level of the vehicles of the plurality of vehicles, or on an analysis of the intensity with which the embedded computer equipment has received the activation signal, identification of the elected vehicle: by transmitting, from the elected vehicle, location information of said vehicle, and/or by transmitting one or more pieces of identification data of the elected vehicle to the user equipment, from the embedded equipment of a vehicle from one of the plurality of vehicles, which transmission is done via a short-range wireless connection in the parking area, transmission of an access authorization to the embedded equipment of the elected vehicle, from the user equipment, which transmission is done via a short-range wireless connection in the parking area, activation of access to the elected vehicle following the reception of the access authorization by the embedded equipment of said vehicle.

13. The method according to claim 12, wherein the location information comprises at least one of an audible and/or visual signal transmitted by the elected vehicle.

14. The method according to claim 12, wherein the location information comprises information on the location of the elected vehicle in the parking area.

15. The method according to claim 12, further comprising: receiving the activation signal by the computer equipment of a first vehicle of the plurality of vehicles, transmitting the activation signal from the computer equipment of the first vehicle to at least the computer equipment of a second vehicle of the plurality of vehicles, and transmitting the activation signal from the computer equipment of the second vehicle to at least the computer equipment of a third vehicle of the plurality of vehicles, wherein the signal transmission between the first vehicle, the second vehicle and third vehicle is done via a short-range wireless connection in the parking area.

16. The method according to claim 12, further comprising arranging the embedded equipment in the form of a wireless mesh network.

17. The method according to claim 12, wherein the computerized election logic process comprises: developing a selectable list, wherein the vehicles of the plurality of vehicles are ranked in descending order of fuel and/or charge level, each vehicle of the list being associated with a unique ID, transmitting the list to the user equipment, from the embedded equipment of a vehicle of the plurality of vehicles, which transmission is done via a short-range wireless connection in the parking area, selecting (SELECT), from the user equipment (EQU), of a vehicle from among the vehicles of the list, transmitting the unique ID of the selected vehicle, to the embedded equipment, of a vehicle of the plurality of vehicles, from the user equipment, which transmission is done via a short-range wireless connection in the parking area, completing the selection process by electing the selected vehicle.

18. The method according to claim 12, further comprising: storing, in a memory of each piece of embedded equipment of the vehicles of the plurality of vehicles, of a list of user IDs and/or user equipment IDs associated with unwanted users, integrating, in the access authorization, a user ID and/or a user equipment ID, for activating access to the elected vehicle, prior verification by the embedded equipment of said vehicle, that the user ID and/or the user equipment ID are not registered in said list.

19. The method according to claim 12, further comprising integrating an ID in the activation signal, which ID is adapted to trigger the computerized election logic process.

20. The method according to claim 12, wherein the short-range wireless connection uses a communication protocol from the following family: Bluetooth, Wi-Fi, Z-Wave, ANT, ZIGBEE, Infrared.

21. A system comprising at least one piece of equipment of a user and at least one piece of embedded computer equipment of a vehicle, for implementing the method of claim 12.

22. A computer program product comprising code instructions for executing a method according to claim 12, when it is executed by at least one piece of embedded computer equipment of a vehicle.

Description

BRIEF DESCRIPTION OF FIGURES

[0032] Other advantages and characteristics of the invention will become clearer in the description of a preferred embodiment below, with reference to the appended drawings, produced by way of non-limitative examples for guidance, wherein:

[0033] FIG. 1 illustrates a use case of the invention when several vehicles of a fleet are likely to be reserved and are parked in an area not covered by a data network,

[0034] FIG. 2 schematises the arrangement of different elements of user equipment and of several pieces of computer equipment embedded in vehicles.

[0035] FIG. 3a is an example of carrying out the steps of a method according to the invention, according to a first embodiment,

[0036] FIG. 3b is an example of carrying out the steps of a method according to the invention, according to the first embodiment in an alternative embodiment,

[0037] FIG. 4a is an example of carrying out the steps of a method according to the invention, according to a second embodiment,

[0038] FIG. 4b is an example of carrying out the steps of a method according to the invention, according to the second embodiment in an alternative embodiment,

[0039] FIG. 5 is an example of carrying out the steps of a method according to the invention, according to a third embodiment.

DETAILED DESCRIPTION OF THE EMBODIMENTS

[0040] The method and system of the invention cause manipulations of physical elements, in particular signals (electrical or magnetic) and digital data, capable of being stored, transferred, combined, compared, etc., and making it possible to achieve a desired result.

[0041] The invention implements one or more computer applications executed by computer equipment or servers. For clarity, it must be understood in the scope of the invention, that “a piece of equipment or server does something” means “the computer application executed by a processing unit of the equipment or server does something”. Just as “the computer application does something” means “the computer application executed by the processing unit of the equipment or server does something”.

[0042] Also, for clarity, the present invention makes reference to one or more “computerised logic processes”. The latter correspond to the actions or results obtained by the execution of instructions of different computer applications. Also, it must be understood in the scope of the invention, that “a computerised logic process is adapted to do something” means “the instructions of a computer application executed by a processing unit do something”.

[0043] Also, for clarity, the following clarifications are made to certain terms used in the description and the claims: [0044] “Computer resource” can be understood in a non-limiting way as: component, hardware, software, file, connection to a computer network, amount of RAM memory, hard disk space, bandwidth, processor speed, number of CPUs, etc. [0045] “Computer server” can be understood in a non-limiting way as: computer device (hardware or software) with computer resources to perform the functions of a server and which offers services, computer, plurality of computers, virtual online server, virtual Cloud server, virtual platform server, virtual local infrastructure server, server networks, cluster, node, server farm, node farm, etc. [0046] “Request” means an execution order which could follow a communication protocol and comprising input parameters (question, information, etc.) and possibly return parameters (answer, information, etc.), which could be presented in a format linked to the protocol used. [0047] “Processing unit” can be understood in a non-limiting manner, as: processor, microprocessors, CPU (Central Processing Unit), etc. [0048] “Computer application” can be understood as: software, computer program, computer microprogram, executable lines of code, software, etc. [0049] “Data network” can be understood in a non-limiting manner, as: internet network, cellular network, satellite network, etc. It is a set of computer equipment connected together to exchange, securely or not, information and/or data according to a communication protocol (ISDN, Ethernet, ATM, IP, CLNP, TCP, HTTP, etc.). [0050] “Database” can be understood in a non-limiting manner, as a structured and organised set of data stored on media accessible by computer equipment and which could be interrogated, read and updated. Data can be inserted, recovered, modified and/or destroyed. Management and access to the database can be ensured by a set of computer applications which constitute a database management system (DBMS). [0051] “Service” can be understood in a non-limiting manner, as the set of functionalities proposed and ensured by a server and/or by at least one piece of computer equipment. The service can comprise, for example, the following functionalities: reservation of a vehicle, location of a vehicle, locking/unlocking of a vehicle, etc. The service comprises, in particular, activating access to a vehicle while it is outside of the data network. [0052] “Shared vehicle” can be understood in a non-limiting manner, as a rental vehicle or a car sharing is a vehicle made available to “customers” or members. The vehicle can be: an autonomous car (capable of driving on the road without the intervention of a driver), a car or a lorry (internal combustion engine and/or electric engine), a motorised two-wheeler (internal combustion engine and/or electric engine), a bicycle (conventional or electrically-assisted), a scooter (conventional or electrically-assisted), a skateboard, an electric unicycle, a Segway, a boat, etc. When a user uses a shared vehicle, they can be charged a certain amount, generally depending on the number of kilometres travelled and/or the time the vehicle is used and/or the model or type of vehicle. [0053] Such as used here, unless otherwise specified, the use of the ordinal adjectives “first”, “second”, etc., to describe an object simply indicates that different occurrences of similar objects are mentioned, and does not imply that the objects thus described must be in a given sequence, whether in time, space, ranking or otherwise.

[0054] FIG. 1 illustrates vehicles V.sub.1-V.sub.3 parked in an area not covered by a data network, for example an underground car park P or a garage. Some or all of these vehicles are shared vehicles to which a user U wishes to have access. As an illustrative example, the vehicles V.sub.4, V.sub.8, V.sub.10 and V.sub.11 are the shared vehicles to which the user U can have access (hereinafter, “target vehicles”). The other vehicles are, for example, private vehicles which are not accessible to the user U. The set of vehicles V.sub.1-V.sub.13 is here named “vehicle fleet”. When entering the car park P, the user U does not know which target vehicles they can access, these vehicles could generally not be distinguished from other vehicles of the fleet.

[0055] Referring to FIG. 2, each target vehicle integrates embedded computer equipment EQ.sub.VE8, EQ.sub.VE10. This equipment can, for example, form part of a telematic box enabling the vehicle to exchange information (e.g. geographical position, speed, etc.) with the remote server presented in the introductory part of the present description, through a data network. The computer equipment EQ.sub.VE8, EQVE.sub.10 can also be dedicated equipment, independent of the telematic box.

[0056] Each embedded equipment EQ.sub.VE8, EQVE.sub.10 comprises, among other computer resources, a processing unit 10.sub.8, 10.sub.10, a signal transmitter/receiver 11.sub.8, 11.sub.10 and one or more memories 12.sub.8, 12.sub.10 wherein a computer application is stored. These different elements are connected to at least the processing unit 10.sub.8, 10.sub.10 by a communication bus.

[0057] The instructions of the computer application stored in the memory 12.sub.8, 12.sub.10, when they are executed by the processing unit 10.sub.8, 10.sub.10, make it possible to carry out the steps of the method which are described above in the description. The memory 12.sub.8, 12.sub.10 is also adapted to store a certain number of pieces of information, which information is presented above in the description.

[0058] The transmitter/receiver 11.sub.8, 11.sub.10 is adapted to exchange signals, via a short-range wireless connection L.sub.CP1 with the user equipment EQ.sub.U described above in the description and/or with the embedded equipment of the other target vehicles, via a short-range wireless connection L.sub.CP2. The connections L.sub.CP1 and L.sub.CP2 have, for example, a range lower than or equal to 100 metres, even less than or equal to 20 metres.

[0059] The signals exchanged are preferably infrared or radiofrequency signals. The connections L.sub.CP1 and L.sub.CP2 preferably use a communication protocol from the following family: Bluetooth, Wi-Fi, Z-Wave, ANT, ZIGBEE, Infrared. The connections L.sub.CP1 and L.sub.CP2 can use the same communication protocol or separate protocols.

[0060] The user U has at least one piece of computer equipment EQ.sub.U which comprises a communication interface, for example, GSM, 3G, 4G or Wi-Fi, to establish a wireless communication connection with the remote server presented above, through a data network. The user equipment EQ.sub.U is preferably a smartphone, a digital tablet, a laptop, etc.

[0061] In FIG. 2, the user equipment EQ.sub.U integrates a processing unit 20, a signal transmitter/receiver 21 and one or more memories 22 wherein a computer application for implementing the service (“service application”) is stored. These different elements are connected to at least the processing unit 20 by a communication bus. It also comprises the computer resources making it possible to carry out the steps of the method of the invention. Transmitter/receiver 21 is similar to that of the embedded equipment EQ.sub.VE8, EQ.sub.VE10.

[0062] According to an embodiment, to download the service application and have access rights to the service, the user U must register beforehand with a rights management server which may or may not be the above-mentioned remote server. According to an embodiment, the registration of the user U is performed with a web service of the remote server associated with the service. The registration comprises the registration of a user ID and/or a user equipment ID EQ.sub.U. This can be a port, an IP address, a MAC address or any other address or combination making it possible to identify a piece of user equipment EQ.sub.U. According to an embodiment, the user U is pre-registered from a piece of software and is known by the fact that an ID is stored in a database of the above-mentioned remote server.

[0063] In FIG. 1, the transmitting/receiving zone of the user equipment EQ.sub.U is referenced Z.sub.U. The transmitting/receiving areas of the embedded equipment of the target vehicles V.sub.4, V.sub.8, V.sub.10 and V.sub.11 are respectively referenced as Z.sub.V4, Z.sub.V8, Z.sub.V10 and Z.sub.V11. These transmitting/receiving zones depend partially on the power of the transmitters/receivers 11.sub.8, 11.sub.10 and 21. The zone Z.sub.U partially overlaps with Z.sub.V8 and Z.sub.V10. The zones Z.sub.V4 and Z.sub.V11 are not overlapped by the zone Z.sub.U. It results that only the embedded equipment EQ.sub.VE8 and EQ.sub.VE10 of the target vehicles V.sub.8 and V.sub.10 will be able to directly communicate and exchange data with the user equipment EQ.sub.U. The zones Z.sub.V8 and Z.sub.V10 also overlap one another, such that the target vehicles V.sub.8 and V.sub.10 can also directly communicate and exchange data with each other by means of their embedded equipment EQ.sub.VE8, EQ.sub.VE10 via the short-range wireless connection L.sub.CP2 (FIG. 2).

First Embodiment

[0064] FIG. 3a illustrates the steps of a first embodiment of the method according to the invention, in the use case of FIG. 1 (user and off-network vehicles, in the car park P). In this embodiment, the user equipment EQ.sub.U communicates only with the embedded equipment of which the transmitting/receiving zone overlaps the zone Z.sub.U, i.e. the equipment EQ.sub.VE8 and EQ.sub.VE10 of the target vehicles V.sub.8 and V.sub.10.

[0065] The user U launches the service application on their EQ.sub.U and sends an activation signal from said equipment. This step is referenced TRANS_SIGN. This activation signal is sent to the car park P, via the connection L.sub.CP1 (FIG. 2), by using a Bluetooth-type protocol.

[0066] The activation signal preferably contains an ID adapted for triggering the computerised election logic process described above in the description. This ID is, for example, a signature specific to the service application or another similar data making it possible to indicate that the activation signal has been sent by a user (or user equipment) with access rights to the service (authorised user). This ID makes it possible to ensure that the computerised election logic process is only triggered by an authorised user and not by another unauthorised user who has triggered the transmission of any Bluetooth signal.

[0067] The activation signal is here only received by the embedded equipment EQ.sub.VE8 and EQ.sub.VE10 of the target vehicles V.sub.8 and V.sub.10. Upon receiving the activation signal, the equipment EQ.sub.VE8 and EQ.sub.VE10 will participate in the implementation of a computerised logic process leading to the election of one of these two vehicles.

[0068] In the case where the signal contains an ID, the embedded equipment EQ.sub.VE8 and EQ.sub.VE10 will analyse it to verify that the signal is actually from an authorised user. This verification can be done, for example, by comparing the received ID with an ID stored in the memory 12.sub.8, 12.sub.10. The election process ELECT is then triggered only after this verification step.

[0069] According to an embodiment, the election process ELECT is based on an analysis of the fuel level (in the case of an internal combustion engine) and/or the electrical charge level (in the case of an electric engine) of the vehicles V.sub.8 and V.sub.10. The elected vehicle will be the one with the highest fuel level or charge level. Referring to FIG. 3a, during an information exchange step ECH, the embedded equipment EQ.sub.VE8, EQ.sub.VE10 will exchange their respective fuel or charge level. Each embedded equipment EQ.sub.VE8, EQ.sub.VE10 will, for example, interrogate a gauge sensor installed in a vehicle fuel tank or a charge sensor connected to a battery system of a vehicle electric engine.

[0070] For example, both the vehicles V.sub.8 and V.sub.10 have electric (respectively combustion) engines and it is the target vehicle V.sub.8 which has the highest charge (respectively fuel) level. The election process ELECT is thus completed by electing the target vehicle V.sub.8.

[0071] According to another example, the vehicle V.sub.8 comprises an internal combustion engine and the vehicle V.sub.10 comprises an electric engine. The fuel level in the vehicle V.sub.8 makes it possible to drive for longer than the charge level allows in the vehicle V.sub.10. The election process ELECT is thus completed here by electing the target vehicle V.sub.8.

[0072] According to another embodiment, the election process ELECT consists of determining the intensity with which the embedded equipment EQ.sub.VE8 and EQ.sub.VE10 have received the activation signal. The elected vehicle will be that which has received the activation signal with the highest intensity. This vehicle is generally that which is physically closest to the user U. During the information exchange step ECH, the embedded equipment EQ.sub.VE8, EQ.sub.VE10 of the vehicles V.sub.8 and V.sub.10 will exchange the intensity level with which they have respectively received the activation signal. As an example, it is the embedded equipment EQ.sub.VE8 which receives the activation signal with the highest intensity, such that the target vehicle V.sub.8 is elected.

[0073] The election process ELECT can be implemented in the embedded equipment EQ.sub.VE8, or in the embedded equipment EQ.sub.VE10, or simultaneously in both these pieces of equipment. One of the two pieces of embedded equipment can be considered as a master piece of equipment ensuring the implementation of the election process. The other piece of equipment is then considered as a slave piece of equipment communicating only information (fuel or charge level, activation signal strength, etc.) to the master equipment. According to an embodiment, the master equipment is that receiving the activation signal first (e.g. the equipment EQ.sub.VE10). According to another embodiment, the master equipment is that receiving the activation signal with the highest intensity (e.g. the equipment EQ.sub.VE8).

[0074] Following its election, the elected vehicle V.sub.8 identifies itself to the user U. According to an embodiment, this identification step comprises the transmission of one or more identification data ID.sub.VE8 of the elected vehicle V.sub.8, to the user equipment EQ.sub.U (step TRANS_ID.sub.VE8). This transmission can be done from the equipment EQ.sub.VE8 of the elected vehicle V.sub.8, or from the master equipment (which can be the equipment EQ.sub.VE8 or the equipment EQ.sub.VE10). This transmission is done via the connection L.sub.CP1 (FIG. 2), in the car park P. A transmission via another short-range wireless connection using another, more secure, communication protocol can however be considered.

[0075] The identification data ID.sub.VE8 of the elected vehicle V.sub.8 is advantageously presented in the form of its number plate code (numeric or alphanumeric), to which is preferably added an indication of its model and its colour and/or its image or photo. This information makes it possible for the user to very simply and very quickly identify the elected vehicle V.sub.8 from among all the other vehicles V.sub.1-V.sub.13.

[0076] According to another embodiment which is combined with or which substitutes the transmission TRANS_ID.sub.VE8 of the identification data ID.sub.VE8, the step of identifying the elected vehicle V.sub.8 comprises the transmission, from said elected vehicle, of location information of said vehicle. This location information advantageously consists of an audible and/or visual signal transmitted by the elected vehicle V.sub.8. Referring to FIG. 2, the processing unit 10.sub.8 of the embedded equipment EQ.sub.VE8, can temporarily activate, for example for a few seconds, a horn 14.sub.8 and/or hazard or low beam lights 15.sub.8 of the elected vehicle V.sub.8. The user U can thus very simply and very quickly identify the elected vehicle V.sub.8 from among all the other vehicles V.sub.1-V.sub.13.

[0077] The location information can also consist of information about the location of the elected vehicle V.sub.8 in the car park P (space number, floor, etc.). To do this, and as illustrated in FIG. 1, each parking space is advantageously fitted with a presence sensor C. This sensor C can be an inductive sensor (e.g. with an inductive loop), a capacitive sensor, a magnetic presence sensor (e.g. magnetometer), an ultrasonic presence sensor, or other sensor, integrated in the floor covering of the space. This sensor C stores the number, and possibly the floor, of the parking space. In FIG. 2, the embedded equipment EQ.sub.VE8 integrates or is connected to a reader 13.sub.8 adapted to communicate with the sensor C and find this parking space number and possibly the floor. This information is thus transmitted to the user equipment EQ.sub.U, for example, at the same time as the identification data ID.sub.VE8. Knowing the exact position of the elected vehicle V.sub.8 in the car park P, the user U can find it very easily.

[0078] The step of identifying the elected vehicle V.sub.8, according to the embodiments described above, can be executed following the election of the vehicle V.sub.8, or following the receipt of the access authorisation ID.sub.ACCES.

[0079] After having identified the elected vehicle V.sub.8, the user U transmits (step TRANS_ID.sub.ACCES), from their equipment EQ.sub.U, an access authorisation ID.sub.ACCES to the EQ.sub.VE8 equipment of said vehicle. With the user U now having all the information to identify the elected vehicle V.sub.8, it is very easy to find it. Also, the authorisation access ID.sub.ACCES is preferably transmitted directly to the equipment EQ.sub.VE8. However, indirect transmission via the equipment EQ.sub.VE10 can be provided if the latter is the master equipment. It is that which thus transmits the authorisation access ID.sub.ACCES to the equipment EQ.sub.VE8.

[0080] The transmission TRANS_ID.sub.ACCES is preferably done through the above-mentioned connection L.sub.CP1. A transmission via another short-range wireless connection using another, more secure communication protocol can however be considered.

[0081] The access authorisation ID.sub.ACCES preferably integrates the user ID and/or the user equipment EQ.sub.U ID and/or a secret shared with the target vehicles V.sub.4, V.sub.8, V.sub.10 and V.sub.11. This secret can in particular be transmitted to the user equipment EQ.sub.U, by the above-mentioned remote server, at the time of registration of the user U, and stored in the memory 22. This secret is also stored in the memory of the embedded equipment of the target vehicles V.sub.4, V.sub.8, V.sub.10 and V.sub.11.

[0082] A user can be registered with the remote server, but blacklisted or registered on a list of unwanted users. This is the case, for example, when this user has not paid for their subscription to the service or has not paid for previous use of a shared vehicle. This unwanted user must not be able to access the target vehicles. The remote server knows that this user is blacklisted (via an update of its database). However, under the conditions of the invention, the equipment EQ.sub.VE8 of the elected vehicle V.sub.8 does not necessarily know this. Indeed, being off-network, the remote server cannot be interrogated to verify the user's access rights to the service. To overcome this, it is preferred that, as soon as a vehicle finds the network, its embedded equipment connects to the remote server to automatically recover a blacklist of user IDs and/or user equipment EQ.sub.U IDs associated with blacklisted users. This blacklist is thus stored in the memory of each piece of embedded equipment. It is thus ensured that this blacklist is regularly updated.

[0083] Also, after having received the access authorisation ID.sub.ACCES, and to authorise access to the elected vehicle V.sub.8, the method can comprise a prior step of verifying the user ID and/or the user equipment EQ.sub.U ID to ensure that these IDs are not stored in the blacklist. This verification step is performed by the equipment EQ.sub.VE8 of the elected vehicle V.sub.8 or by the master equipment (e.g. the equipment EQ.sub.VE10).

[0084] Following reception of the access authorisation ID.sub.ACCES (and, if necessary, following the above-mentioned verification step), the equipment EQ.sub.VE8 of the elected vehicle V.sub.8 activates access to said vehicle (step ACTIV) and in particular, its opening or its unlocking. The user U can thus enter the passenger compartment of the elected vehicle V.sub.8, start it and use it normally.

[0085] As soon as the vehicle V.sub.8 finds the data network, it transmits to the remote server, data stored in its memory such as: the unique ID of the vehicle, the ID of the user U and/or their equipment EQ.sub.U, an indication of its status (e.g. “occupied—unavailable for reservation”), as well as all other data generally transmitted by a telematic box (GPS position, speed, etc.).

[0086] FIG. 3b illustrates an alternative embodiment of the first embodiment. The election process ELECT comprises an intermediate step of developing a selectable list LISTE, wherein vehicles V.sub.8 and V.sub.10 are ranked in descending order (or alternatively, in ascending order) of fuel and/or charge level. Using the above example, the vehicle V.sub.8 is ranked first and the vehicle V.sub.10 second.

[0087] Each vehicle of the list is preferably associated with a unique ID (e.g. a unique numeric or alphanumeric code assigned to each vehicle and stored in the memory of the latter), an indication of its model and of its colour and/or its image or photo.

[0088] This list is transmitted to the user equipment EQ.sub.U (step TRANS_LIST), from the equipment EQ.sub.VE8 of the vehicle V.sub.8 ranked first, or from the master equipment (which can be the equipment EQ.sub.VE8 or the equipment EQ.sub.VE10). This transmission is done via the connection L.sub.CP1 or via another more secure connection.

[0089] The user U selects (SELECT), from their user equipment EQ.sub.U, a vehicle from among the vehicles of the list. In the example of FIG. 3b, the vehicle V.sub.8 is selected by the user U (but, this could be the other vehicle V.sub.10, if its model is more suitable for them).

[0090] The choice of the user U is transmitted (step TRANS_CHOIX) from their equipment EQ.sub.U, either directly to the equipment EQ.sub.VE8 of the selected vehicle V.sub.8, or indirectly, via the equipment EQ.sub.VE10, in the case where this is the master equipment. The data transmitted comprise, in particular, the unique ID of the selected vehicle V.sub.8. This transmission is done via the connection L.sub.CP1 or via another more secure connection.

[0091] As soon as the user's choice is received by the embedded equipment EQ.sub.VE8 and/or EQ.sub.VE10 in charge of implementing the election process ELECT, said process is completed by the election of the vehicle V.sub.8 selected by the user.

Second Embodiment

[0092] In the first embodiment which has just been described and given as an example, the user only has potential access to the two target vehicles V.sub.8 and V.sub.10 of which the transmitting/receiving zones Z.sub.V8, Z.sub.V10 overlap with the transmitting/receiving zone Z.sub.U of the user equipment EQ.sub.U. With the zones Z.sub.V4 and Z.sub.V11 not overlapping with the zone Z.sub.U, the embedded equipment, EQ.sub.VE4, EQ.sub.VE11 do not directly receive the activation signal TRANS_SIGN, such that the vehicles V.sub.4 and V.sub.11 do not participate in the election process. It can however be advantageous for a greater number of vehicles to participate there, this would only be to propose a wider choice of vehicles to the user U.

[0093] In FIG. 1, the transmitting/receiving zone Z.sub.U overlaps with the transmitting/receiving zones Z.sub.V8 and Z.sub.V10. but not with the transmitting/receiving zones Z.sub.V4 and Z.sub.V11. However, the transmitting/receiving zone Z.sub.V10 overlaps with the transmitting/receiving zone Z.sub.V11. Also, the transmitting/receiving zone Z.sub.V11 overlaps with the transmitting/receiving zone Z.sub.V4. As a result: [0094] the embedded equipment EQ.sub.VE8 and EQ.sub.VE10 can directly communicate and exchange data with the user equipment EQ.sub.U; [0095] the embedded equipment EQ.sub.VE10 and EQ.sub.VE11 can directly communicate and exchange data with each other; [0096] the embedded equipment EQ.sub.VE11 and EQ.sub.VE4 can directly communicate and exchange data with each other;

[0097] The embedded equipment EQ.sub.VE4, EQ.sub.VE8, EQ.sub.VE10, EQ.sub.VE11 is thus arranged as a wireless mesh network. Indeed, all the transmitting/receiving zones Z.sub.V4, Z.sub.V8, Z.sub.V10 and Z.sub.V1 are juxtaposed, with each piece of embedded equipment being able to communicate with the other piece(s) of embedded equipment of the network which are located in their own transmitting/receiving zone. For example, the embedded equipment EQ.sub.VE4 communicates only with the embedded equipment EQ.sub.VE11, while the latter can communicate, not only with the embedded equipment EQ.sub.VE4, but also with the embedded equipment EQ.sub.VE10. As an example, the number of vehicles participating in the network is between 2 and 50.

[0098] Thus, and by referring to FIG. 4a, the activation signal is transmitted (step TRANS_SIGN) from the user equipment EQ.sub.U to the embedded equipment EQ.sub.VE8 and EQ.sub.VE10 via the connection L.sub.CP1. Upon reception of the activation signal, the embedded equipment EQ.sub.VE10 retransmits (via the connection L.sub.CP2) said signal to the embedded equipment EQ.sub.VE11 (step TRANS_SIGN′). Also, upon reception of the activation signal, the embedded equipment EQ.sub.VE11 retransmits (via the connection L.sub.CP2) said signal to the embedded equipment EQ.sub.VE4 (step TRANS_SIGN″). The activation signal is therefore received by all the embedded equipment of the target vehicles. Of course, the signal retransmitted by a piece of embedded equipment can be received simultaneously by several other pieces of embedded equipment, if their respective transmitting/receiving zones overlap.

[0099] According to an embodiment, the embedded equipment EQ.sub.VE4, EQ.sub.VE8, EQ.sub.VE10, EQ.sub.VE11 only retransmit the activation signal once. This prevents the activation signal from being retransmitted indefinitely. For example, when the embedded equipment EQ.sub.VE10 receives the activation signal in the step TRANS_SIGN, and retransmits it in the step TRANS_SIGN′, these events are saved in its memory. When the embedded equipment EQ.sub.VE11 retransmits the activation signal in the step TRANS_SIGN″, said signal is again received by the embedded equipment EQ.sub.VE10. This observing that it has already received and transmitted the activation signal, and will not retransmit it again.

[0100] Upon reception of the activation signal, all the embedded equipment EQ.sub.VE4, EQ.sub.VE8, EQ.sub.VE10, EQ.sub.VE11 will participate in the implementation of the election process ELECT. This is similar to the election process described above, with reference to the first embodiment. In particular, the embedded equipment will exchange information (e.g. respective fuel and/or charge level, intensity of the activation signal received, etc.) during the step ECH. Information is communicated, step-by-step, through the wireless mesh network. The election process ELECT can be implemented in one single piece of embedded equipment (e.g. in EQ.sub.VE8) or simultaneously in all the embedded equipment. One of the pieces of embedded equipment can be a master, the others being slaves.

[0101] The steps of identifying the elected vehicle, transmitting the access authorisation TRANS_ID.sub.ACCES and activating ACTIV the access to said elected vehicle, are similar to those described above with reference to the first embodiment.

[0102] FIG. 4b illustrates an alternative embodiment of the second embodiment. The election process ELECT comprises an intermediate step of developing a selectable list LISTE, wherein all the vehicles V.sub.4, V.sub.8, V.sub.10 and V.sub.11 are ranked in descending order of fuel and/or charge level. This list is therefore more extensive than that described with reference to FIG. 3a, and offers more choices to the user U. This step of developing the list, as well as the other steps of transmitting TRANS_LISTE, of selecting a vehicle SELECT, and of transmitting the user's choice TRANS_CHOIX, are similar to those described with reference to FIG. 3a.

Third Embodiment

[0103] In the first and second embodiments, the election process ELECT is implemented in one or more of the pieces of embedded equipment EQ.sub.VE4, EQ.sub.VE8 EQ.sub.VE10, EQ.sub.VE11. In this third embodiment, the election process ELECT is implemented in the user equipment EQ.sub.U.

[0104] By referring to FIG. 5, from the information exchange step ECH, the exchanged information (e.g. respective fuel and/or charge level, received activation signal strength, etc.) is transmitted (step TRANS_DONNEES) to the user equipment EQ.sub.U. The information provided by a vehicle is preferably associated with the unique ID of said vehicle. This transmission is done from one of the pieces of embedded equipment, for example from the equipment EQ.sub.VE8 having received the activation signal with the highest intensity or from another piece of equipment considered as master. This transmission is done via the connection L.sub.CP1 or via another more secure connection.

[0105] As soon as the user equipment EQ.sub.U receives this information, it analyses it to elect one of the target vehicles. As described above, this election can be based on the fuel or charge level of the vehicles, on the strength of the activation signal received, or following a selection of the vehicle in the list of target vehicles developed by the user equipment EQ.sub.U.

[0106] After having elected the vehicle (e.g. vehicle V.sub.8), the user U sends, from their equipment EQ.sub.U, a request for identification of said vehicle (step REQ). As for the activation signal, this request is transmitted directly to the embedded equipment EQ.sub.VE8 and EQ.sub.VE10, then, step-by-step, to the embedded equipment EQ.sub.VE11 and EQ.sub.VE4 (steps REQ′ and REQ″). This transmission is done via the connection L.sub.CP2.

[0107] The identification request contains the unique ID of the elected vehicle. Upon reception of the request, the embedded equipment EQ.sub.VE8 of the elected vehicle V.sub.8 recognises its unique ID and identifies itself to the user U. This identification step is similar to that described above with reference to the first and second embodiments.

[0108] System

[0109] According to another aspect, the invention relates in particular to a system comprising the user equipment EQ.sub.U and at least one of the pieces of embedded equipment EQ.sub.VE4, EQ.sub.VE8, EQ.sub.VE10, EQ.sub.VE11, configured to implement the method according to the invention.

[0110] Computer Program Product

[0111] According also to another aspect, the invention relates to a computer program product comprising code instructions for the execution of the method according to the invention, when it is executed by at least one of the pieces of embedded equipment EQ.sub.VE4, EQ.sub.VE8, EQ.sub.VE10 and/or EQ.sub.VE11.

[0112] The arrangement of the different elements and/or means and/or steps of the invention, in the preferred embodiments described above, must not be understood as requiring such an arrangement in all implementations. In particular, one or more characteristics and/or steps disclosed only in one embodiment can be generalised to the other embodiments. Likewise, one or more characteristics and/or steps disclosed only in one embodiment can be combined with one or more other characteristics and/or steps disclosed only in another embodiment