US20040257208A1 - Remotely controllable and configurable vehicle security system - Google Patents
Remotely controllable and configurable vehicle security system Download PDFInfo
- Publication number
- US20040257208A1 US20040257208A1 US10/463,937 US46393703A US2004257208A1 US 20040257208 A1 US20040257208 A1 US 20040257208A1 US 46393703 A US46393703 A US 46393703A US 2004257208 A1 US2004257208 A1 US 2004257208A1
- Authority
- US
- United States
- Prior art keywords
- vehicle
- data
- security
- controller
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/102—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/30—Detection related to theft or to other events relevant to anti-theft systems
- B60R25/305—Detection related to theft or to other events relevant to anti-theft systems using a camera
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/30—Detection related to theft or to other events relevant to anti-theft systems
- B60R25/33—Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
Definitions
- the present invention relates to a vehicle security system that is both remotely controllable and remotely configurable, and more particularly, a vehicle security system that is integrated with a user accessible backend server and intelligent in-vehicle controller.
- U.S. Pat. No. 5,027,104 to Reid discloses a vehicle security device, which includes multiple video camcorders that are activated responsive to certain conditions and are under the control of local controller mechanism. Captured video images are transmitted by the system to remote locations. However, there is no ability to control the vehicle security system from the remote locations based on the images or otherwise.
- vehicle security systems using video camcorders include the TaxiCam system by VerifEye Technologies of Ontario, Canada, and the Taxicab Security system by Sigtec of Melbourne, Australia.
- the systems can be configured with real time transmission of images via 2-way radio back to the control center.
- the systems provide for real-time video image capture and transfer to a remote location for monitoring purposes.
- costly human monitoring is required.
- a system that provides control over the vehicle from a remote location based upon conditions sensed in the vehicle is U.S. Pat. No. 6,337,621 to Ogino et al.
- the system of Ogino coordinates between a vehicle-mounted security apparatus and an emergency response center. When a security breach or emergency condition is detected in the vehicle, the response center takes appropriate action. While this system allows for remote control over the in-vehicle security system, a costly human staffed response center is required. Additionally, there is no provision for remote configuration of the in-vehicle security system, direct user control, or video image capture.
- a system that provides automated parallel and redundant subscriber contact and event notification is U.S. Pat. No. 6,442,241 to Tsumpes.
- the system enables automated simultaneous contact of one or more persons over a plurality of telephonic and electronic communication channels and provides parallel event-specific notification via voice, pager, fax, and email to the identified recipients(s) and a detailed message including the data and time of a specific event which has occurred with respect to a monitored sensor.
- the system can be triggered or programmed to perform its notification based upon the failure to receive an anticipated input and to operate at a specific time. However, there is no ability to take proper action(s) other than sending notifications.
- the system's main functionality is to notify the central monitoring station.
- the present invention is a security control system for responding to security events detected by in-vehicle security systems utilizing vehicle-mounted video cameras.
- the system includes an in-vehicle control apparatus located within each of the vehicles that has a security system communications interface connected to the in-vehicle security system, a data store configured to store configuration data, a controller connected to the security system communications interface and the data store and configured to control operation of the video cameras in response to security events detected by the vehicle security system based upon configuration data, a wireless transceiver configured for bi-directional communication on a wireless link, and a communication link to the video cameras configured to transmit command data to the video cameras from the controller and receive captured images from the video cameras.
- the system has a remote server in communication with the in-vehicle control apparatus of the plurality of vehicles via the wireless link, and a remote programming device in communication with the remote server via a communications network.
- the configuration data input at the remote programming device is transmitted via the communications network to the remote server and from the remote server via the wireless link to the in-vehicle control apparatus for storage in the data store.
- FIG. 1 is a block diagram of the overall system components and configuration
- FIG. 2 is a flowchart depicting the in-vehicle controller handling process for in-vehicle events.
- FIG. 3 is a flowchart depicting the user action preference setup.
- FIG. 4 is a flowchart depicting the event parameter setup process.
- FIG. 5 is a flowchart depicting the user issued in-vehicle command process.
- FIG. 6 is a flowchart depicting the process of the backend server sending commands or settings to the in-vehicle control box.
- FIG. 7 is a flowchart depicting the process of the user notification and response process under control of the backend server.
- FIG. 8 is a flow chart depicting the process of the controller sending video images to the backend server.
- FIG. 1 depicts a block diagram of an illustrative arrangement of the present invention including in-vehicle integrated components box 105 , which is coupled to alarm system 101 , in-vehicle user control unit 102 , vehicle mounted video camcorder(s) 120 , remote backend server 119 , remote user access device 123 , and an optional in-vehicle video image display 121 .
- Components box 105 includes line in signal interface 106 for receiving data signals from alarm system 101 and user control unit 102 , battery 108 , wireless transceiver 111 for bi-directional communications with backend server 119 , transceiver 115 for bi-directional communications with video camcorders 120 , and unidirectional transmission to in-vehicle display 121 . All of the various components in components box 105 are coupled to and operate under the control of controller 109 . Controller 109 is a standard commercial available microcontroller, such as a general-purpose microprocessor with a Linux or comparable OS. Controller 109 also includes a nonvolatile instruction memory 124 that holds a sequence of commands or steps that the controller follows.
- Alarm system 101 can be any standard off the shelf vehicle alarm system for detecting motion, glass breakage, vehicle tilt, door opening, trunk opening, hood opening, and the like.
- alarm system 101 emits an alarm signal on bi-directional communications line 103 that is received by line in signal interface 106 .
- the alarm signal (which may be as simple as a power on/off signal) contains data indicative of the particular triggering alarm event (e.g., broken glass or vehicle tilting).
- the format of the alarm signal is manufacturer dependent.
- alarm signal interface 106 In order to present the alarm data in a format useful to controller 109 , alarm signal interface 106 translates the alarm signal from the manufacturer specific format into a uniform format for processing by controller 109 . Likewise, any control signals from controller 109 to alarm system 101 are translated by alarm signal interface 106 into the manufacturer specific format.
- Alarm signal interface 106 is pre-programmed to interface with all required manufacturer specific formats.
- interface 106 serves to process signals from user control unit 102 , which is either a standard keypad or touch-screen device.
- User control unit 102 allows a privileged user to send commands to controller 109 .
- a privileged user is a person (typically the vehicle owner) in possession of the required authentication information (i.e., account name and password) to the remote backend server 119 .
- Each vehicle has its own distinct account name.
- the privileged user 123 can change the password.
- alarm system 101 may be switched on/off by control unit 102 or by off-site privileged user via control signals sent by controller 109 to alarm system 101 .
- Controller 109 sends the control signals based upon commands received from control unit 102 or by off-site privileged user.
- Components box 105 is fully configurable by both in-vehicle control 102 and remote user device 123 .
- Configuration options include, for example, the frequency at which video camcorders 120 capture images, the time interval at which location information from GPS receiver 114 is gathered and provided to the user. Not all the signals from the alarm system 101 will trigger the video camcorders 120 and finally results the images send to the remote backend server 119 .
- a complete list of configuration options is described later in this specification.
- These configuration settings are stored in configuration tables within the nonvolatile memory 124 , which map the event signals to the corresponding actions. Configuration tables may be updated by a privileged user 123 either locally using user control 102 or remotely via backend server 119 .
- Each input event signal has a default action set, the default may be ignore, take images and transmit to remote backend server 119 , emit panic sound, turn on head light to get attention, etc.
- the commands of the in-vehicle control unit 102 takes precedence over the commands of off-site privileged user in case of there is a command conflict.
- the in-vehicle control unit 102 can also be set to ignore any requests from the off-site privileged user. This is a security measure to prevent unauthorized access.
- the vehicle-mounted video camcorder(s) 120 have either a multiply lens that can cover three hundreds and sixty degrees of view, or a rotating lens that can cover three hundreds and sixty degrees of view. Either of these lenses provides a full view and will not miss potentially important events, such as might occur with a partial view angle.
- the camcorder 120 should operate at reasonable dim light, preferably with infrared capability.
- the view area of the camcorder(s) 120 can be set by the user, therefore, either the interior or exterior or both views can be captured.
- the camcorder(s) 120 can be disabled via user control 102 as desired.
- the optional in-vehicle video display 121 can display the vehicle-mounted video camcorder(s) 120 in real time to the user.
- Wireless transmitter 111 exchanges encrypted data or signals 116 / 110 between the remote backend sever 119 and the controller 109 .
- Wireless or line-in transmitter 115 exchanges the data or signals 112 / 117 between vehicle-mounted video camcorder(s) 120 and the controller 109 .
- the optional GPS receiver 114 sends the geographical information to the controller 109 for every pre-defined time interval. If the vehicle is not in the driving mode and the controller 109 detects the changes of the geographical position, this implies the unauthorized moving the vehicle. The controller 109 now can apply the preset logic to take proper actions.
- Optional local storage media 125 can be used to store the images.
- the media could be memory, tape, or hard disks. Not all the images taken by video camcorder(s) 120 must transmitted back to the remote backend server 119 , user may take images just for the scenery in the ad hoc mode and don't want to those images stored in the remote backend server 119 .
- Remote backend server 119 may be any standard web server or web server cluster. Server 119 is able to communicate with multiple vehicles or to handle multiple users requests simultaneously. Additionally, server 119 stores user preferences and images captured by camcorders 120 along with the associated time stamp, optional GPS information and triggered event data. Privileged users 123 can login to the server 119 via phone, web browser, PDA or other communication devices to retrieve the images and change preference settings such as notification methods, mayday event handling (airbag deployment, user triggered panic button, etc.), alarm system 101 event handling.
- the notification settings indicate to whom and how server 119 provides notifications.
- Privilege user 123 can select one or more preferred ways to receive the notifications such as email, phone, short message service and the like, and select one or more preferred parties to receive the notifications.
- Each event can have different notification settings (i.e., the notification is event driven).
- Remote backend server 119 may be configured as fully automated system without human intervention. For example, in the event of a vehicle accident, the images and location can be forward to the law enforcement's emergency response center.
- In-vehicle component box 105 and server 119 are connected via a wireless network, such as the pager, cell phone, or satellite services networks.
- Remote user device 123 and server 119 are connected via the Internet using standard web access protocol such as HTTP.
- Remote user device 123 is any type of Internet enabled appliance, such as a Internet connected personal computer, PDA, cellular telephone, or the like.
- the privileged user 123 might be able to lock/unlock the doors/windows, to disable the ignition or fueling system via the remote backend server 119 . This is particular useful in case the vehicle was stolen or hijacked. Another one is user accidentally leaves the key in the vehicle.
- FIG. 1 The system depicted in FIG. 1 allows users to interact with their vehicles anywhere in the world via telephone, Internet, or other communication devices. Through backend server 119 and remote user equipment 123 , users are able to remotely monitor and control their vehicle's security system.
- the set of local maps used for navigation system can be downloaded/updated from the backend server 119 and saved in the vehicle's attached local storage 125 .
- a new set of maps will be automatically downloaded in case of traveling close to the boundary of the existing map set.
- This “local intelligence” i.e., local processing) eliminates the hassles of changing the CD/DVD maps periodically.
- Remote backend server 119 can provide up-to-date information such as local traffic, weather, seasonal discount sales news, etc through a link to corresponding authorities. The information can then be transmitted to the vehicles based on the users'location.
- alarm system 101 and remote backend server 119 provide for intelligent responses to alarm system 101 , for example, users are automatically notified when images are taken during a pre-configured event.
- the pre-configured events include discovering an unauthorized entry of the vehicle, airbag deployment, or the like.
- the appropriate law enforcement agency can also be notified depending on the preference settings in backend server 119 .
- Images are stored and maintained in backend server 119 . This eliminates the need for components box 105 to store images in storage device 125 .
- the digital camcorders 120 are operable for both day and night. With optional GPS information, the system may alert a user when entering high crime rate area detected by controller 109 to activate the camcorders 120 to take images at defined time interval to ensure higher security. Another example is in the event of unauthorized towing of the vehicle, the user will be notified and able to see the image in real time.
- the user can also have an optional configuration to send the images not only to backend servers 119 , but also to an in-vehicle display to monitor the back seats. This usage is helpful for police officers when transmitting criminals, or for parents to monitor what their children are doing when seated in back.
- Digital video camcorders 120 components box 105 to transmit the images wirelessly back to remote backend server 119 and to receive camcorder 120 control signals triggered by alarm system 101 , airbag deployment, and in-vehicle privileged users to take real-time images for further processing to remote backend server 119 .
- the system can also be operated by remote backend server 119 upon privileged user's request to remote control the vehicles such as taking real-time images, locking the car doors, etc.
- An optional GPS device can be integrated to the system to provide more information.
- the backend server 119 will notify privileged users or law enforcement when events (alarm triggered, airbag deployment, and etc.) occur.
- the notified parties and event settings are configurable by privileged users through backend server 119 , which transmits the configuration data to controller 109 through wireless link 116 .
- the privileged users 123 can communicate with backend server 119 by phone, Internet, PDA, or other devices to control in-vehicle camcorder(s) 120 remotely.
- Video images are encrypted and wirelessly transmitted (through RF or wireless phone network) to remote backend server 119 in real time.
- This real time wireless video image transmission capability prevents tampering with the images. Even if the system or vehicle itself is destroyed, the video will be safely stored in the remote backend server 119 . It also provides the users real time ability to access the video recorded anywhere in the world.
- the system is fully integrated with alarm system 101 to prevent crime and vandalism.
- the signals of alarm system 101 are feed into the control unit of the system. If alarm system 101 is triggered, the signals are sent to the control unit.
- the unit uses a set of configurable predefined logics to choose the proper actions. The actions include but not limited to activating camcorders 120 to record events, sending images back to remote backend server 119 in real time, and notifying the vehicle owner.
- the in-vehicle video camcorders 120 can be programmed to capture images when triggered by a Mayday signal or car accident event (such as a vehicle airbag deployed signal). Incorporation of the real time video images and GPS data improve Mayday support and speed up car accident rescue missions.
- a Mayday signal or car accident event such as a vehicle airbag deployed signal.
- the system can be controlled by commands issued from remote backend server 119 through wireless transmitted signals.
- Backend server 119 can issue commands automatically based on internally stored logic.
- the commands issued by backend server 119 are encrypted during transmission and then are verified and decrypted by the in-vehicle control unit.
- Video camcorders 120 can be triggered at the vehicle driver's will through local in-vehicle control unit 102 .
- the video camcorder 120 trigger events are programmable.
- the user can re-program the camcorder 120 settings from anyplace.
- the privilege commands are password protected; only privilege users have ability to reprogram the trigger events.
- the privilege users can even control the setting of video camcorders 120 to override the commands and requests issued by remote backend server 119 to protect user privacy. However the history of these override actions will be sent back and stored in remote backend server 119 .
- Any video image that is sent back to remote backend server 119 or is stored in remote backend server 119 can be relayed to registered users immediately through different devices.
- the device could be phone, PDA, wireless phone or device with internet access capability but not limited to.
- Privilege users can activate, reprogram or control the in-vehicle camcorders 120 and alarm security system remotely and in a real time manner by sending requests and commands to remote backend server 119 through Internet, wireless enabled PDA, email or phone.
- Backend server 119 will authenticate the users' requests then issue commands on behalf of the users to the in-vehicle camcorder 120 system and alarm system 101 via control box 105 .
- the system can support from one or multiple video camcorders 120 . If multiple camcorders 120 are deployed, control box 105 can coordinate camcorders 120 to take video images of the are surrounding the vehicle. If only one video camcorder 120 is installed, a specialized camcorder 120 , which can take three hundred and sixty degree view video images of the surroundings, is used.
- the trigger events are programmable from the remote backend server 119 .
- the logic, preference settings and features can be updated with ease at any time.
- the system supports two-way communication between in-vehicle system, backend server 119 and remote users. All remote user requests and the complex logics are stored and processed in the powerful backend server 119 .
- in-vehicle controller 109 needs relatively little computing power and memory capacity to process and store simpler logics and configuration settings. This configuration provides an intelligent and flexible integrated system with high cost efficiency.
- Control box 105 includes a GPS receiver 114 . Additionally control box 105 downloads crime rate data for particular locations from backend server 119 and stores the data in local storage 125 or in the nonvolatile memory of controller 109 . Thus, control box 105 may provide critical decision-making functions independent of backend server 119 .
- control box 105 can send the GPS data back to remote backend server 119 when the driver parks the vehicle. If the server 119 decides the area has high crime rate by history statistics data, it could issue commands to reconfigure the settings of the system such as setting camcorders 120 to monitor surroundings of the vehicle periodically.
- In-vehicle integrated components control box 105 .
- Control box 105 can receive any event triggered by categories 1, 2, 3, or 4.
- Backend server 119 can receive any event triggered by categories 1, 2, 3, 4, or 5.
- Each event is represented by the following attributes ⁇ Source name, Intensity, Time, Location, Extended data ⁇ .
- Operable components can recieve and execute commands issued by controller 109 .
- Each operable component has the following attributes stored in nonvolatile memory 124 : ⁇ Component name, Support operations, Current state, Last applied operation, Time of last applied operation, Remote command allowed, Extended data ⁇ .
- Operation is a command sent to controller 109 to invoke an operable component.
- the operation comprises the following attributes:
- Attributes of Camcorder 120 Operation Attribute Name Attribute Value Target component name Digital Camcorder Issuer Backend Server, Rung Tsai Operation Take image Frequency 10 frames/sec Start time Apr. 20, 2003 12:03:20 End time Apr. 20, 2003 12:45:30 Intensity Strongest Extended data N/A
- Attributes of Alarm Siren Operation Attribute Name Attribute Value Target component name Alarm siren Issuer Controller Operation Turn on Frequency N/A Start time Apr. 20, 2003 18:40:30 End time Apr. 20, 2003 18:45:30 Intensity Strongest Extended data N/A
- control box 105 When control box 105 processes detect abnormal conditions, it takes two additional factors, time and location, into consideration. Hence, the same type of events may not be dealt with the same way if the time and location of the event are different. For example, the event of the impact sensor detecting a medium impact hit on the vehicle. An event like this could be sent to controller 109 as: ⁇ Source name: Impact sensor, Intensity: medium, Time: Apr. 28, 2003 23:35:48, Location: GPS data, Extended data: N/A ⁇ . Controller 109 gets the crime rate of the location pre-stored in local storage 125 , and then evaluates the crime rate of this location and time of the event detected to decide the proper action.
- Controller 109 gets the crime rate of the location pre-stored in local storage 125 , and then evaluates the crime rate of this location and time of the event detected to decide the proper action.
- controller 109 activates camcorder 120 and sends the captured images to backend server 119 .
- Backend server 119 then notifies the user.
- the user can login to backend server 119 to watch the real time images and take the appropriate action. Time and location are used as the “contribution factors” to the vehicle security systems.
- controller 109 determines the vehicle is in a very safe location, then the system will not disturb user for the event, which may be caused by neighbor's cat jumping on the vehicle.
- the intelligent controller 109 can download the crime rate of the local area from the backend server 119 to local storage 125 .
- An exemplary event trigger condition is as follows: if the vehicle is moving in a high crime rate area then an event ⁇ Source name: Controller, Intensity: high, Time: current time, Location: GPS data, Extend data: N/A ⁇ will be issued by the controller 109 .
- Controller 109 determines the necessary action to be taken. The action could be that the controller 109 checks the vehicle condition and sends a warning to the driver. For example, when an event is triggered, controller 109 could warn the driver and roll up the windows automatically. Controller 109 automatically downloads the crime rate data periodically as the vehicle traveling in different areas.
- parent can set the “out of area event” and get notified when their children drive out of a certain area.
- the area here is a region defined by the parent, i.e., privileged user.
- the area data is stored in both backend server 119 and in-vehicle memory (either nonvolatile memory 124 or local storage 125 ). Controller 109 can check if the vehicle is in the area without contacting backend server 119 to reduce the frequency of communicating with backend server 119 .
- backend server 119 can send preset commands to activate home appliances (i.e. air conditioner/light/garage door) if the intelligent home management software is integrated with backend server 119 .
- home appliances i.e. air conditioner/light/garage door
- controller 109 When a predefined car accident event occurs, such as air bag deployed signal or user activated Mayday signal, event data is provided to controller 109 .
- event data is provided to controller 109 .
- the following event attributes are sent to controller 109 : ⁇ Source name: Air bag deploy, Intensity: high, Time: current time, Location: GPS data, Extend data: N/A ⁇ .
- Controller 109 checks the event/action table and takes the corresponding action for the event. If the user does not redefine new action for the car accident event, then the default action will be taken: controller 109 activates video camcorders 120 , which immediately records video images continuously and transmits encrypted (video image data and the car accident event) back to remote server 119 in real time.
- backend server 119 When backend server 119 receives the car accident event, it checks the event/action table and takes the corresponding action for the event.
- the default action for the car accident event may include notifying the nearest emergency rescue team and providing the real time video images to them to indicate the needed equipment and trained medical staff, notifying local police, and notifying the emergency contact persons appointed by the user.
- user Upon receiving event notification, user can also receive real time images from backend server 119 on devices such as a PDA via secure network. The user can also login to backend server 119 to watch real time video images and send operations to the vehicle to respond to the event (see FIG. 7). Referring to the above example:
- the impact sensor detects medium impact in a high crime rate area and user receives notification from backend server 119 (Step 701 ).
- Backend server 119 checks if user has privilege to review the video image (Step 704 ). If user does not have proper privilege to watch video image, then backend server 119 rejects the user's request and logs the rejected request (Step 707 ). This watch operation is local to backend server 119 .
- Server executes the operation for the user (Step 708 ). Or
- the user can also send operation commands to remotely control in-vehicle video camcorder 120 . After the user views the video image, he can turn off the siren if desired by recompiling the siren operation.
- Backend server 119 checks if the user has the privilege to execute the operation (Step 704 ). If user does not have privilege, the request is rejected.
- Backend server 119 checks if the operation is for the remote system (Step 705 ). Since the siren turn off operation is a remote operation, the server 119 encrypts and sends the operation to in-vehicle system to turn it off (Step 706 ).
- Controller 109 receives and decrypts the encrypted signal from server 119 (Step 602 ).
- Controller 109 checks if the signals are from an authenticated server 119 (Step 603 ). If the signals are not from authenticated server 119 then the controller 109 logs “not authenticated server 119 ” error and disconnects (Step 607 ). If the controller 109 verifies the signals then the controller 109 checks if the siren accepts remote control (Step 604 ).
- the controller 109 interprets the operation and sends proper signal to siren to turn off the alarm siren (Step 605 ).
- backend server 119 or controller 109 have the following logic: “if user does not respond within a certain time, then it can take preset action X”. The action X will be taken by backend server 119 or by controller 109 to response to the situation without user intervention.
- the user can check the real time image by controlling the in-vehicle camcorder 120 remotely.
- the user can issue the following operation command: ⁇ Target component name: Digital Camcorder, Issuer: “Backend Server, Rung Tsai”, Operation: Take image, Frequency: 10 frames/sec, Start time: Apr. 29, 2003 01:35:48, End time: Apr.
- Backend server 119 encrypts the operation command and sends it to controller 109 .
- Controller 109 receives and decrypts the encrypted signal from server 119 (Step 602 ). Controller 109 checks if the signals are from an authenticated server 119 (Step 603 ). After controller 109 verifies that the signals do come from authenticated server 119 , controller 109 checks if camcorder 120 accepts remote control (Step 604 ). If the remote operation is allowed, then controller 109 interprets the operation command and sends proper signal to operate camcorder 120 (Step 605 ).
- the controller 109 receives real time images from camcorder 120 through wireless transmitter 115 (Step 802 ).
- the controller 109 checks if the encrypt option is set in the operation command (Step 803 ).
- the encrypt option is set to “public key” in the extended data field of the command. It tells controller 109 to use the public key encryption algorithm to encrypt the images (Step 804 ). This provides privacy for the user.
- the images will be encrypted with the public key of the user. Only user who holds the private key is able to decrypt the images. Even backend server 119 is unable to decrypt user images.
- the communication between in-vehicle system and backend server 119 is always encrypted.
- Controller 109 then checks if it needs send images to backend server 119 (Step 805 ).
- the extended data attribute of the operation is set to “Storage: Backend Server”. It directs controller 109 to send back images to backend server 119 .
- Controller 109 encrypts the triggered event and time and location data, and sends the encrypted data to backend server 119 (Step 806 ). Since the images have been encrypted with the users public key, the controller 109 does not need to encrypt the images again.
- the command is ⁇ Target component: Camcorder, Issuer: “In-vehicle control unit, Rung Tsai”, Operation: Set configure, Frequency: N/A, Start time: N/A, End time: N/A, Intensity: N/A, Extended data: “Remote command allowed: No” ⁇ .
- Controller 109 checks if the user has privilege to issue the command (Step 504 ). If the user has proper privilege the controller 109 executes the command to set camcorder component 120 to reject any remote operation (Step 505 ). Controller 109 will send all of component setting change activities back to backend server 119 (Step 508 ).
- a hand-held device carried by the user may be employed to let in-vehicle digital camcorder 120 track the user.
- the purpose of this device is to let camcorder 120 know where to capture images.
- camcorder 120 When a user parks his car he can carry the device. The device activates camcorder 120 and adjusts focus to follow the user home. The image taken can be sent back to remote server 119 immediately.
- FIG. 2 is a flowchart depicting the process of how in-vehicle controller 109 handles triggered in-vehicle events.
- alarm system 101 sensors detect an abnormal condition occurring in the vehicle, a pre-defined condition in controller 109 being satisfied or a user notification issued by in-vehicle control unit 102 , an event is triggered (step 201 ).
- the signals go through the line in/out signal interface 106 and are sent to controller 109 .
- Controller 109 determines the attribute values of the triggered event such as names and impact degrees (intensity) of the abnormal-condition-detected sensors.
- controller 109 gets timestamp and location data for the event from the controller's timer and GPS device 114 (step 202 ).
- Controller 109 checks the predefined event-action table stored in nonvolatile memory to see if the event has a correspondent action. If there is a correspondent predefined action for the triggered event, controller 109 executes the action. Otherwise controller 109 executes the default action in response to the triggered event (Step 203 ). To execute the action, controller 109 sends signals through line in/out signal interface 106 to involved components of alarm system 101 and through wireless in/out transmitter 115 to video camcorders 120 if camcorder 120 operation is involved. The action may require the transmission of status or image data to backend server 119 . Controller 109 sends signals via wireless transceiver 111 to remote backend server 119 .
- controller 109 checks whether the action succeeds or fails (Step 204 ). If any operation of the action fails, then controller 109 verifies whether the failure involve data transmission errors between control box 105 and backend server 119 (Step 205 ). If the failure has nothing to do with data transmission then controller 109 sends the triggered event, the action taken and failed operations to backend server 119 (Step 206 ). Controller 109 again checks if step 206 succeeds (Step 207 ). If step 206 fails, then controller 109 executes a retry procedure (Step 208 ). If the failure involves data transmission problems between remote backend server 119 and control box 105 , controller 109 will execute a retry procedure (Step 208 ). In the retry procedure, controller 109 logs problems and retransmits data in a predefined time interval. After the retry, controller 109 checks if the retry succeeds (Step 207 ).
- FIG. 3 is a flowchart depicting the user preference setup process for control box 105 and backend server 119 .
- a user logs in to remote backend server 119 (Step 301 ).
- Backend server 119 checks if the user name and password are correct (Step 302 ). If the user name and password are not correct, the backend server 119 rejects the user login. If the user name and password are correct, server 119 checks the user privilege to see if the user has the proper privilege to setup actions (Step 303 ). If the user does not have the proper privilege, then the request is rejected. If the user has privilege to setup actions, then the user is allowed to start the process for action setup (Step 304 ).
- the first step is that user can choose the name of the action he is setting up to uniquely identify the action. However it is not necessary for the user to name every action he creates. If the name of the action is not specified then backend server 119 creates a unique action name for the user automatically.
- the second step is that the user decides what operations the action is composed of. The action can be a single operation or a set of operations. Then the user must decide if the action is for control box 105 , backend server 119 , or both.
- backend server 119 validates the actions and stores them in backend server 119 .
- Backend server 119 also logs the action setup activity of the user in backend server 119 log (Step 305 ).
- Backend server 119 checks if there is any action for control box 105 (Step 306 ). If all the actions are for backend server 119 , then user completes the action setup process. If there is any action for control box 105 , then backend server 119 encrypts and sends these actions data to control box 105 and updates controller 109 (Step 307 ).
- FIG. 4 is a flowchart depicting the event parameter setup process for control box 105 and backend server 119 .
- a user logs in to remote backend server 119 (Step 401 ).
- the backend server 119 checks if the user name and password are correct (Step 402 ). If the user name and password are not correct, backend server 119 rejects the login. If the user name and password are correct, server 119 checks the user privilege to see if the user has the proper privilege to setup event (Step 403 ). If the user does not have the proper privilege then request is rejected. If the login user has privilege then user can start the process for event set setup (Step 404 ).
- the first step is that user can choose the unique name of the event set (Step 404 . 1 ). It is not necessary for user to name every event set user creates. If the name of event set is not specified then the backend server 119 can create a unique event set name for user automatically.
- the next step is to choose the sensor(s) corresponding to the event set (Step 404 . 2 ).
- An event set can relate to one or multiple sensors, user can set the logical relation (i.e. AND, OR) among the participated sensor(s) in the event set (Step 404 . 3 ). For example, an event set maybe defined as “1. Sensor A is on, or 2. Sensor B and sensor C are both on”.
- Backend server 119 validates the event set and stores it in backend server 119 (Step 405 ).
- Backend server 119 checks if there is any event set for the in-vehicle system (Step 406 ). If all the actions are for backend server 119 , then the user completes the action setup process. If there is any action for control box 105 , then backend server 119 encrypts and sends the actions data to control box 105 and updates controller 109 (Step 407 ).
- FIG. 5 is a flowchart depicting the process of the user issuing an in-vehicle command.
- Users enter login name and password though in-vehicle control device 102 (Step 501 ).
- Controller 109 checks if the user name and password match (Step 502 ). If the password is not correct then the controller 109 rejects the login request and logs the errors (Step 507 ). If the login name and password of the user are correct, then the user is permitted to issue commands to operate components or change local settings (Step 503 ). The commands are sent to controller 109 through Line in/out signal interface 106 . Controller 109 checks if the user has the privilege to issue the command (Step 504 ).
- controller 109 rejects the commands and logs the error (Step 507 ). If the user has proper privilege for the command, then controller 109 will execute the command (Step 505 ). Controller 109 checks if the issued commands need to send data to backend server 119 (Step 506 ). If it is necessary to send data to backend server 119 , controller 109 encrypts and sends the data to backend server 119 (Step 508 ).
- FIG. 6 is a flowchart depicting the process of the backend server 119 sending commands or settings to control box 105 .
- Backend server 119 encrypts the commands or settings, and then sends the data to control box 105 (Step 601 ).
- Controller 109 receives signals from wireless transceiver 111 . Controller 109 then decrypts the encrypted signals (Step 602 ). Then, controller 109 checks if the data was sent by an authenticated remote server 119 (Step 603 ). If the data is not from an authenticated source, then controller 109 rejects the data and disconnects the connection. Controller 109 logs the error and informs remote backend server 119 of the unauthenticated connection attempt (Step 607 ).
- controller 109 checks if the remote command or setting is allowed (Step 604 ). If the remote command or setting option is set to disable, then controller 109 rejects the commands or setting requests issued from backend server 119 and informs server 119 the reason for the rejection. Remote backend server 119 receives the rejection from controller 109 and logs the event (Step 608 ). If remote commands and settings are allowed, for commands controller 109 checks the targeted component if the operation is legal. If the remote commands are allowed, then controller 109 sends operation commands to the target component for execution (Step 605 . 1 ). For settings, controller 109 stores them in nonvolatile memory 124 or local storage 125 after controller 109 validates the settings (Step 605 . 2 ).
- FIG. 7 is a flowchart depicting the process of the user notification and response process under control of backend server 119 .
- the user may decide to take actions such as watching the video images taken by the system, sending operation commands to control box 105 or changing the settings of control box 105 .
- the user receiving the notification can login to backend server 119 by phone or through Internet (Step 702 ).
- backend server 119 verifies the login name and password of the user, the user can take actions to respond to the notification.
- the actions could be watching video images sent from camcorder 120 , changing settings of backend server 119 or control box 105 , or any combination of those.
- Backend server 119 will verify if the user has proper privilege for executing these actions (Step 704 ). Backend server 119 will reject the actions and log the rejected actions for the record if the user does not have privilege for these actions (Step 707 ). If the user has privilege for the actions, server 119 will check if there is any action or setting for control box 105 (Step 705 ). If all of the actions issued by the user are for backend server 119 only, then backend server 119 executes these actions (Step 708 ). If there are actions or settings for control box 105 , then backend server 119 will send these user actions or settings to control box 105 on behalf of the user (Step 706 ).
- FIG. 8 is a flow chart depicting the process of the controller 109 sending video images to backend server 119 .
- Video camcorder 120 receives operation commands issued by controller 109 on behalf of remote backend server 119 , controller 109 itself, or the user using control unit 102 in the vehicle (Step 801 ).
- Video camcorder 120 is operating and sending image data through wireless line in/out transceiver 115 to controller 109 (Step 802 ).
- the controller 109 first checks if the encryption option is set by the user (Step 803 ). If the user encrypt option is on, then controller 109 encrypts the image data using the pre-specified encryption algorithm (Step 804 ). Otherwise, controller 109 will not encrypt image data at this moment.
- Controller 109 checks if the image data needs to be sent back to remote backend server 119 (Step 805 ). If video camcorder component 120 is set to not remotely store data, then the image data will be stored in local storage 125 (Step 807 ). If the image data needs to be sent to backend server 119 , controller 109 encrypts the image data and triggered event data, and sends the encrypted data to backend server 119 (Step 806 ). The communication between controller 109 and backend server 119 is always encrypted. But for the better privacy protection, the user can even set the parameters to encrypt the image data using a special encryption algorithm such as public key/private key protection, so that only the user can watch the image. In this form, backend server 119 cannot access the user's image data.
- a special encryption algorithm such as public key/private key protection
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
A security control system for responding to security events detected by in-vehicle security systems utilizing vehicle-mounted video cameras. The system includes an in-vehicle control apparatus located within each vehicle that has a security system communications interface connected to the in-vehicle security system, memory, a controller configured to control operation of the video cameras in response to security events detected by the vehicle security system based upon configuration data and situation data, a wireless transceiver configured for bi-directional communication on a wireless link, and a communication link to the video cameras configured to transmit command data to the video cameras from the controller and receive captured images from the video cameras. Additionally, the system has a remote server in communication with the in-vehicle control apparatus of the plurality of vehicles via the wireless link, and a remote programming device in communication with the remote server via a communications network.
Description
- The present invention relates to a vehicle security system that is both remotely controllable and remotely configurable, and more particularly, a vehicle security system that is integrated with a user accessible backend server and intelligent in-vehicle controller.
- In recent years, vehicle theft and vandalism has become an increasing problem. To combat this problem, there are a wide variety of vehicle security systems available. These systems utilize motion detectors, glass breakage detectors, trunk and hood sensors, tilt sensors, power lock mechanisms, and other schemes to detect and deter thieves and vandals.
- Also, more sophisticated systems are available to allow the monitoring of vehicle conditions by way of strategically located video camcorders and global positioning (GPS) tracking. Either unidirectional or bi-directional transmission channels allow for remote monitoring and response based upon conditions detected in and around the vehicle. Remote monitoring and response is effective in for both crime prevention and emergency event handling. However, current full feature systems require security personnel monitoring the images and other data received from the vehicle in real time, which is costly and impractical.
- An example of such a security system is U.S. Pat. No. 5,027,104 to Reid, which discloses a vehicle security device, which includes multiple video camcorders that are activated responsive to certain conditions and are under the control of local controller mechanism. Captured video images are transmitted by the system to remote locations. However, there is no ability to control the vehicle security system from the remote locations based on the images or otherwise.
- Other examples of vehicle security systems using video camcorders include the TaxiCam system by VerifEye Technologies of Ontario, Canada, and the Taxicab Security system by Sigtec of Melbourne, Australia. The images, gathered using limited view (i.e., fixed angle) video camcorders, are stored in control unit can be downloaded by cable to mobile data terminal unit or portable computer. Alternately, the systems can be configured with real time transmission of images via 2-way radio back to the control center. The systems provide for real-time video image capture and transfer to a remote location for monitoring purposes. However, there is no ability to control the vehicle security systems from the remote locations based on the images or otherwise. Moreover, costly human monitoring is required.
- A system that provides control over the vehicle from a remote location based upon conditions sensed in the vehicle is U.S. Pat. No. 6,337,621 to Ogino et al. The system of Ogino coordinates between a vehicle-mounted security apparatus and an emergency response center. When a security breach or emergency condition is detected in the vehicle, the response center takes appropriate action. While this system allows for remote control over the in-vehicle security system, a costly human staffed response center is required. Additionally, there is no provision for remote configuration of the in-vehicle security system, direct user control, or video image capture.
- A system that provides automated parallel and redundant subscriber contact and event notification is U.S. Pat. No. 6,442,241 to Tsumpes. The system enables automated simultaneous contact of one or more persons over a plurality of telephonic and electronic communication channels and provides parallel event-specific notification via voice, pager, fax, and email to the identified recipients(s) and a detailed message including the data and time of a specific event which has occurred with respect to a monitored sensor. The system can be triggered or programmed to perform its notification based upon the failure to receive an anticipated input and to operate at a specific time. However, there is no ability to take proper action(s) other than sending notifications. The system's main functionality is to notify the central monitoring station.
- The systems described above provide a variety of in-vehicle security approaches but fail to provide a system that combines the time of event occurrence, vehicle location, and local geography information in order to process/respond to the event based on user configurable settings. In these systems, the actions taken in response to an event does not differ regardless of the time of the event, vehicle location, and local geography information.
- In sum, these known methods and systems do not provide a flexible means for users to remotely interact with their vehicles in order to check the vehicle's surroundings, lock doors, dim lights, disable the ignition or the like. Moreover, most of these systems required remotely located personnel to monitor the in-vehicle security and emergency systems, which is costly. The present invention solves these problems.
- The present invention is a security control system for responding to security events detected by in-vehicle security systems utilizing vehicle-mounted video cameras. The system includes an in-vehicle control apparatus located within each of the vehicles that has a security system communications interface connected to the in-vehicle security system, a data store configured to store configuration data, a controller connected to the security system communications interface and the data store and configured to control operation of the video cameras in response to security events detected by the vehicle security system based upon configuration data, a wireless transceiver configured for bi-directional communication on a wireless link, and a communication link to the video cameras configured to transmit command data to the video cameras from the controller and receive captured images from the video cameras. Additionally, the system has a remote server in communication with the in-vehicle control apparatus of the plurality of vehicles via the wireless link, and a remote programming device in communication with the remote server via a communications network. The configuration data input at the remote programming device is transmitted via the communications network to the remote server and from the remote server via the wireless link to the in-vehicle control apparatus for storage in the data store.
- The present invention has other objects and advantages which are set forth in the description of the Best Mode of Carrying Out the Invention. The features and advantages described in the specification, however, are not all inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the art in view of the drawings and specification herein.
- FIG. 1 is a block diagram of the overall system components and configuration
- FIG. 2 is a flowchart depicting the in-vehicle controller handling process for in-vehicle events.
- FIG. 3 is a flowchart depicting the user action preference setup.
- FIG. 4 is a flowchart depicting the event parameter setup process.
- FIG. 5 is a flowchart depicting the user issued in-vehicle command process.
- FIG. 6 is a flowchart depicting the process of the backend server sending commands or settings to the in-vehicle control box.
- FIG. 7 is a flowchart depicting the process of the user notification and response process under control of the backend server.
- FIG. 8 is a flow chart depicting the process of the controller sending video images to the backend server.
- FIG. 1 depicts a block diagram of an illustrative arrangement of the present invention including in-vehicle integrated
components box 105, which is coupled toalarm system 101, in-vehicleuser control unit 102, vehicle mounted video camcorder(s) 120,remote backend server 119, remoteuser access device 123, and an optional in-vehiclevideo image display 121.Components box 105 includes line insignal interface 106 for receiving data signals fromalarm system 101 anduser control unit 102,battery 108,wireless transceiver 111 for bi-directional communications withbackend server 119,transceiver 115 for bi-directional communications withvideo camcorders 120, and unidirectional transmission to in-vehicle display 121. All of the various components incomponents box 105 are coupled to and operate under the control ofcontroller 109.Controller 109 is a standard commercial available microcontroller, such as a general-purpose microprocessor with a Linux or comparable OS.Controller 109 also includes anonvolatile instruction memory 124 that holds a sequence of commands or steps that the controller follows. -
Alarm system 101 can be any standard off the shelf vehicle alarm system for detecting motion, glass breakage, vehicle tilt, door opening, trunk opening, hood opening, and the like. In the event of an alarm being triggered,alarm system 101 emits an alarm signal on bi-directional communications line 103 that is received by line insignal interface 106. The alarm signal (which may be as simple as a power on/off signal) contains data indicative of the particular triggering alarm event (e.g., broken glass or vehicle tilting). The format of the alarm signal is manufacturer dependent. In order to present the alarm data in a format useful to controller 109,alarm signal interface 106 translates the alarm signal from the manufacturer specific format into a uniform format for processing bycontroller 109. Likewise, any control signals fromcontroller 109 toalarm system 101 are translated byalarm signal interface 106 into the manufacturer specific format.Alarm signal interface 106 is pre-programmed to interface with all required manufacturer specific formats. - Additionally,
interface 106 serves to process signals fromuser control unit 102, which is either a standard keypad or touch-screen device.User control unit 102 allows a privileged user to send commands tocontroller 109. A privileged user is a person (typically the vehicle owner) in possession of the required authentication information (i.e., account name and password) to theremote backend server 119. Each vehicle has its own distinct account name. Theprivileged user 123 can change the password. - As explained above, communication between
alarm system 101 andcontroller 109 is bi-directional. This allows full control ofalarm system 101. For example,alarm system 101 may be switched on/off bycontrol unit 102 or by off-site privileged user via control signals sent bycontroller 109 toalarm system 101.Controller 109 sends the control signals based upon commands received fromcontrol unit 102 or by off-site privileged user. -
Components box 105 is fully configurable by both in-vehicle control 102 andremote user device 123. Configuration options include, for example, the frequency at whichvideo camcorders 120 capture images, the time interval at which location information fromGPS receiver 114 is gathered and provided to the user. Not all the signals from thealarm system 101 will trigger thevideo camcorders 120 and finally results the images send to theremote backend server 119. A complete list of configuration options is described later in this specification. These configuration settings are stored in configuration tables within thenonvolatile memory 124, which map the event signals to the corresponding actions. Configuration tables may be updated by aprivileged user 123 either locally usinguser control 102 or remotely viabackend server 119. Each input event signal has a default action set, the default may be ignore, take images and transmit toremote backend server 119, emit panic sound, turn on head light to get attention, etc. The commands of the in-vehicle control unit 102 takes precedence over the commands of off-site privileged user in case of there is a command conflict. The in-vehicle control unit 102 can also be set to ignore any requests from the off-site privileged user. This is a security measure to prevent unauthorized access. - The vehicle-mounted video camcorder(s)120 have either a multiply lens that can cover three hundreds and sixty degrees of view, or a rotating lens that can cover three hundreds and sixty degrees of view. Either of these lenses provides a full view and will not miss potentially important events, such as might occur with a partial view angle. The
camcorder 120 should operate at reasonable dim light, preferably with infrared capability. The view area of the camcorder(s) 120 can be set by the user, therefore, either the interior or exterior or both views can be captured. The camcorder(s) 120 can be disabled viauser control 102 as desired. The optional in-vehicle video display 121 can display the vehicle-mounted video camcorder(s) 120 in real time to the user. -
Wireless transmitter 111 exchanges encrypted data or signals 116/110 between the remote backend sever 119 and thecontroller 109. Wireless or line-intransmitter 115 exchanges the data or signals 112/117 between vehicle-mounted video camcorder(s) 120 and thecontroller 109. Theoptional GPS receiver 114 sends the geographical information to thecontroller 109 for every pre-defined time interval. If the vehicle is not in the driving mode and thecontroller 109 detects the changes of the geographical position, this implies the unauthorized moving the vehicle. Thecontroller 109 now can apply the preset logic to take proper actions. - Optional
local storage media 125 can be used to store the images. The media could be memory, tape, or hard disks. Not all the images taken by video camcorder(s) 120 must transmitted back to theremote backend server 119, user may take images just for the scenery in the ad hoc mode and don't want to those images stored in theremote backend server 119. -
Remote backend server 119 may be any standard web server or web server cluster.Server 119 is able to communicate with multiple vehicles or to handle multiple users requests simultaneously. Additionally,server 119 stores user preferences and images captured bycamcorders 120 along with the associated time stamp, optional GPS information and triggered event data.Privileged users 123 can login to theserver 119 via phone, web browser, PDA or other communication devices to retrieve the images and change preference settings such as notification methods, mayday event handling (airbag deployment, user triggered panic button, etc.),alarm system 101 event handling. - The notification settings indicate to whom and how
server 119 provides notifications.Privilege user 123 can select one or more preferred ways to receive the notifications such as email, phone, short message service and the like, and select one or more preferred parties to receive the notifications. Each event can have different notification settings (i.e., the notification is event driven).Remote backend server 119 may be configured as fully automated system without human intervention. For example, in the event of a vehicle accident, the images and location can be forward to the law enforcement's emergency response center. - In-
vehicle component box 105 andserver 119 are connected via a wireless network, such as the pager, cell phone, or satellite services networks.Remote user device 123 andserver 119 are connected via the Internet using standard web access protocol such as HTTP.Remote user device 123 is any type of Internet enabled appliance, such as a Internet connected personal computer, PDA, cellular telephone, or the like. - If the in-
vehicle component box 105 is further integrated with the electronic control system of the vehicle, theprivileged user 123 might be able to lock/unlock the doors/windows, to disable the ignition or fueling system via theremote backend server 119. This is particular useful in case the vehicle was stolen or hijacked. Another one is user accidentally leaves the key in the vehicle. - The system depicted in FIG. 1 allows users to interact with their vehicles anywhere in the world via telephone, Internet, or other communication devices. Through
backend server 119 andremote user equipment 123, users are able to remotely monitor and control their vehicle's security system. - Based upon the preference settings, the set of local maps used for navigation system can be downloaded/updated from the
backend server 119 and saved in the vehicle's attachedlocal storage 125. A new set of maps will be automatically downloaded in case of traveling close to the boundary of the existing map set. This “local intelligence” (i.e., local processing) eliminates the hassles of changing the CD/DVD maps periodically. -
Remote backend server 119 can provide up-to-date information such as local traffic, weather, seasonal discount sales news, etc through a link to corresponding authorities. The information can then be transmitted to the vehicles based on the users'location. - The integration of
alarm system 101 andremote backend server 119 provides for intelligent responses to alarmsystem 101, for example, users are automatically notified when images are taken during a pre-configured event. The pre-configured events include discovering an unauthorized entry of the vehicle, airbag deployment, or the like. The appropriate law enforcement agency can also be notified depending on the preference settings inbackend server 119. - Users interact with the vehicles via
backend server 119. Authorized users send command toserver 119, which communicates withcomponents box 105, to take proper actions. The two-way communication signals betweenserver 119 and components box 105 are encrypted - Images are stored and maintained in
backend server 119. This eliminates the need forcomponents box 105 to store images instorage device 125. Thedigital camcorders 120 are operable for both day and night. With optional GPS information, the system may alert a user when entering high crime rate area detected bycontroller 109 to activate thecamcorders 120 to take images at defined time interval to ensure higher security. Another example is in the event of unauthorized towing of the vehicle, the user will be notified and able to see the image in real time. The user can also have an optional configuration to send the images not only to backendservers 119, but also to an in-vehicle display to monitor the back seats. This usage is helpful for police officers when transmitting criminals, or for parents to monitor what their children are doing when seated in back. -
Digital video camcorders 120components box 105 to transmit the images wirelessly back toremote backend server 119 and to receivecamcorder 120 control signals triggered byalarm system 101, airbag deployment, and in-vehicle privileged users to take real-time images for further processing toremote backend server 119. The system can also be operated byremote backend server 119 upon privileged user's request to remote control the vehicles such as taking real-time images, locking the car doors, etc. An optional GPS device can be integrated to the system to provide more information. Thebackend server 119 will notify privileged users or law enforcement when events (alarm triggered, airbag deployment, and etc.) occur. The notified parties and event settings are configurable by privileged users throughbackend server 119, which transmits the configuration data tocontroller 109 throughwireless link 116. Theprivileged users 123 can communicate withbackend server 119 by phone, Internet, PDA, or other devices to control in-vehicle camcorder(s) 120 remotely. - Video images are encrypted and wirelessly transmitted (through RF or wireless phone network) to
remote backend server 119 in real time. This real time wireless video image transmission capability prevents tampering with the images. Even if the system or vehicle itself is destroyed, the video will be safely stored in theremote backend server 119. It also provides the users real time ability to access the video recorded anywhere in the world. - The system is fully integrated with
alarm system 101 to prevent crime and vandalism. The signals ofalarm system 101 are feed into the control unit of the system. Ifalarm system 101 is triggered, the signals are sent to the control unit. The unit uses a set of configurable predefined logics to choose the proper actions. The actions include but not limited to activatingcamcorders 120 to record events, sending images back toremote backend server 119 in real time, and notifying the vehicle owner. - The in-
vehicle video camcorders 120 can be programmed to capture images when triggered by a Mayday signal or car accident event (such as a vehicle airbag deployed signal). Incorporation of the real time video images and GPS data improve Mayday support and speed up car accident rescue missions. - The system can be controlled by commands issued from
remote backend server 119 through wireless transmitted signals.Backend server 119 can issue commands automatically based on internally stored logic. The commands issued bybackend server 119 are encrypted during transmission and then are verified and decrypted by the in-vehicle control unit. -
Video camcorders 120 can be triggered at the vehicle driver's will through local in-vehicle control unit 102. Thevideo camcorder 120 trigger events are programmable. The user can re-program thecamcorder 120 settings from anyplace. The privilege commands are password protected; only privilege users have ability to reprogram the trigger events. The privilege users can even control the setting ofvideo camcorders 120 to override the commands and requests issued byremote backend server 119 to protect user privacy. However the history of these override actions will be sent back and stored inremote backend server 119. - Any video image that is sent back to
remote backend server 119 or is stored inremote backend server 119 can be relayed to registered users immediately through different devices. The device could be phone, PDA, wireless phone or device with internet access capability but not limited to. - Privilege users can activate, reprogram or control the in-
vehicle camcorders 120 and alarm security system remotely and in a real time manner by sending requests and commands toremote backend server 119 through Internet, wireless enabled PDA, email or phone.Backend server 119 will authenticate the users' requests then issue commands on behalf of the users to the in-vehicle camcorder 120 system andalarm system 101 viacontrol box 105. - The system can support from one or
multiple video camcorders 120. Ifmultiple camcorders 120 are deployed,control box 105 can coordinatecamcorders 120 to take video images of the are surrounding the vehicle. If only onevideo camcorder 120 is installed, aspecialized camcorder 120, which can take three hundred and sixty degree view video images of the surroundings, is used. - The trigger events are programmable from the
remote backend server 119. Thus, the logic, preference settings and features can be updated with ease at any time. - The system supports two-way communication between in-vehicle system,
backend server 119 and remote users. All remote user requests and the complex logics are stored and processed in thepowerful backend server 119. As a result, in-vehicle controller 109 needs relatively little computing power and memory capacity to process and store simpler logics and configuration settings. This configuration provides an intelligent and flexible integrated system with high cost efficiency. -
Control box 105 includes aGPS receiver 114. Additionally controlbox 105 downloads crime rate data for particular locations frombackend server 119 and stores the data inlocal storage 125 or in the nonvolatile memory ofcontroller 109. Thus,control box 105 may provide critical decision-making functions independent ofbackend server 119. - Alternatively,
control box 105 can send the GPS data back toremote backend server 119 when the driver parks the vehicle. If theserver 119 decides the area has high crime rate by history statistics data, it could issue commands to reconfigure the settings of the system such as settingcamcorders 120 to monitor surroundings of the vehicle periodically. - Events fall generally into five different categories:
- 1. Sensor(s) in
alarm system 101. - 2. The pre-specified logic or condition stored in the
nonvolatile memory 124 is satisfied. - 3. In-
vehicle control unit 102. - 4.
Remote backend server 119. - 5. In-vehicle integrated
components control box 105. -
Control box 105 can receive any event triggered bycategories Backend server 119 can receive any event triggered bycategories - Operable components can recieve and execute commands issued by
controller 109. The following are some examples of operable components:Operable component Operation Power Door lock Lock/Unlock/Set configure Power Windows Roll up/Roll down/Set configure Alarm Siren Chirp/Full scale/Set configure Horn Honk/Set configure Interior Light Turn on/Turn off/Set configure Ignition Starter Turn on/Turn off/Set configure Head Light Turn on/Turn off/Set configure Trunk Lock/Unlock/Set configure Digital Camcorder Turn on/Turn off/Stand by/Take image/Set configure GPS Get location data/Set configure Car Immobilizer Arm/Disarm/Set configure - Each operable component has the following attributes stored in nonvolatile memory124: {Component name, Support operations, Current state, Last applied operation, Time of last applied operation, Remote command allowed, Extended data}.
- Operation is a command sent to
controller 109 to invoke an operable component. The operation comprises the following attributes: - {Target component name, Issuer, Operation, Frequency, Start time, End time, Intensity, Extended data}; however, not every attribute is required for different operations. For example:
- Attributes for Door Lock Operation
Attribute Name Attribute Value Target component name Front door on the driver side Issuer Controller Operation Lock Frequency N/A Start time Immediately End time N/A Intensity N/A Extended data N/A - Attributes of
Camcorder 120 OperationAttribute Name Attribute Value Target component name Digital Camcorder Issuer Backend Server, Rung Tsai Operation Take image Frequency 10 frames/sec Start time Apr. 20, 2003 12:03:20 End time Apr. 20, 2003 12:45:30 Intensity Strongest Extended data N/A - Attributes of Alarm Siren Operation
Attribute Name Attribute Value Target component name Alarm siren Issuer Controller Operation Turn on Frequency N/A Start time Apr. 20, 2003 18:40:30 End time Apr. 20, 2003 18:45:30 Intensity Strongest Extended data N/A - When
control box 105 processes detect abnormal conditions, it takes two additional factors, time and location, into consideration. Hence, the same type of events may not be dealt with the same way if the time and location of the event are different. For example, the event of the impact sensor detecting a medium impact hit on the vehicle. An event like this could be sent tocontroller 109 as: {Source name: Impact sensor, Intensity: medium, Time: Apr. 28, 2003 23:35:48, Location: GPS data, Extended data: N/A}.Controller 109 gets the crime rate of the location pre-stored inlocal storage 125, and then evaluates the crime rate of this location and time of the event detected to decide the proper action. For this event, if the location has high crime rate and the time of the event happening is close to midnight,controller 109 activatescamcorder 120 and sends the captured images tobackend server 119.Backend server 119 then notifies the user. The user can login tobackend server 119 to watch the real time images and take the appropriate action. Time and location are used as the “contribution factors” to the vehicle security systems. - However if the same event happens but
controller 109 determines the vehicle is in a very safe location, then the system will not disturb user for the event, which may be caused by neighbor's cat jumping on the vehicle. - The
intelligent controller 109 can download the crime rate of the local area from thebackend server 119 tolocal storage 125. An exemplary event trigger condition is as follows: if the vehicle is moving in a high crime rate area then an event {Source name: Controller, Intensity: high, Time: current time, Location: GPS data, Extend data: N/A} will be issued by thecontroller 109.Controller 109 determines the necessary action to be taken. The action could be that thecontroller 109 checks the vehicle condition and sends a warning to the driver. For example, when an event is triggered,controller 109 could warn the driver and roll up the windows automatically.Controller 109 automatically downloads the crime rate data periodically as the vehicle traveling in different areas. - Another usage is that parent can set the “out of area event” and get notified when their children drive out of a certain area. The area here is a region defined by the parent, i.e., privileged user. The area data is stored in both
backend server 119 and in-vehicle memory (eithernonvolatile memory 124 or local storage 125).Controller 109 can check if the vehicle is in the area without contactingbackend server 119 to reduce the frequency of communicating withbackend server 119. - A further integration with intelligent home technology is possible. For example, when the vehicle is close to home then
backend server 119 can send preset commands to activate home appliances (i.e. air conditioner/light/garage door) if the intelligent home management software is integrated withbackend server 119. - When a predefined car accident event occurs, such as air bag deployed signal or user activated Mayday signal, event data is provided to
controller 109. Taking the air bag deployed event as an example, the following event attributes are sent to controller 109: {Source name: Air bag deploy, Intensity: high, Time: current time, Location: GPS data, Extend data: N/A}.Controller 109 checks the event/action table and takes the corresponding action for the event. If the user does not redefine new action for the car accident event, then the default action will be taken:controller 109 activatesvideo camcorders 120, which immediately records video images continuously and transmits encrypted (video image data and the car accident event) back toremote server 119 in real time. Whenbackend server 119 receives the car accident event, it checks the event/action table and takes the corresponding action for the event. The default action for the car accident event may include notifying the nearest emergency rescue team and providing the real time video images to them to indicate the needed equipment and trained medical staff, notifying local police, and notifying the emergency contact persons appointed by the user. - Upon receiving event notification, user can also receive real time images from
backend server 119 on devices such as a PDA via secure network. The user can also login tobackend server 119 to watch real time video images and send operations to the vehicle to respond to the event (see FIG. 7). Referring to the above example: - 1. The impact sensor detects medium impact in a high crime rate area and user receives notification from backend server119 (Step 701).
- 2. User logs in to
backend server 119 through Internet (Step 702). - 3. User can take action to watch real time video image sent back from in-vehicle camcorder120 (Step 703).
- 4.
Backend server 119 checks if user has privilege to review the video image (Step 704). If user does not have proper privilege to watch video image, thenbackend server 119 rejects the user's request and logs the rejected request (Step 707). This watch operation is local tobackend server 119. - 5. Server executes the operation for the user (Step708). Or
- 6. The user can also send operation commands to remotely control in-
vehicle video camcorder 120. After the user views the video image, he can turn off the siren if desired by recompiling the siren operation. - 7.
Backend server 119 checks if the user has the privilege to execute the operation (Step 704). If user does not have privilege, the request is rejected. - 8.
Backend server 119 checks if the operation is for the remote system (Step 705). Since the siren turn off operation is a remote operation, theserver 119 encrypts and sends the operation to in-vehicle system to turn it off (Step 706). - 9.
Controller 109 receives and decrypts the encrypted signal from server 119 (Step 602). - 10.
Controller 109 checks if the signals are from an authenticated server 119 (Step 603). If the signals are not from authenticatedserver 119 then thecontroller 109 logs “not authenticatedserver 119” error and disconnects (Step 607). If thecontroller 109 verifies the signals then thecontroller 109 checks if the siren accepts remote control (Step 604). - 11. If the remote operation is allowed, then the
controller 109 interprets the operation and sends proper signal to siren to turn off the alarm siren (Step 605). - 12. After the siren is turn off, the
controller 109 reports the result back to backend server 119 (Step 606). - If the user does not receive the notification from
backend server 119 in time,backend server 119 orcontroller 109 have the following logic: “if user does not respond within a certain time, then it can take preset action X”. The action X will be taken bybackend server 119 or bycontroller 109 to response to the situation without user intervention. When the user gets chance to login toserver 119, the user can check the real time image by controlling the in-vehicle camcorder 120 remotely. The user can issue the following operation command: {Target component name: Digital Camcorder, Issuer: “Backend Server, Rung Tsai”, Operation: Take image, Frequency: 10 frames/sec, Start time: Apr. 29, 2003 01:35:48, End time: Apr. 29, 2003 01:45:00, Intensity: N/A, Extended data: “Encrypt: Public key, Storage: Backend Server”}.Backend server 119 encrypts the operation command and sends it tocontroller 109.Controller 109 receives and decrypts the encrypted signal from server 119 (Step 602).Controller 109 checks if the signals are from an authenticated server 119 (Step 603). Aftercontroller 109 verifies that the signals do come from authenticatedserver 119,controller 109 checks ifcamcorder 120 accepts remote control (Step 604). If the remote operation is allowed, thencontroller 109 interprets the operation command and sends proper signal to operate camcorder 120 (Step 605). Aftercamcorder 120 is activated, thecontroller 109 receives real time images fromcamcorder 120 through wireless transmitter 115 (Step 802). Thecontroller 109 checks if the encrypt option is set in the operation command (Step 803). The encrypt option is set to “public key” in the extended data field of the command. It tellscontroller 109 to use the public key encryption algorithm to encrypt the images (Step 804). This provides privacy for the user. The images will be encrypted with the public key of the user. Only user who holds the private key is able to decrypt the images. Evenbackend server 119 is unable to decrypt user images. The communication between in-vehicle system andbackend server 119 is always encrypted. -
Controller 109 then checks if it needs send images to backend server 119 (Step 805). The extended data attribute of the operation is set to “Storage: Backend Server”. It directscontroller 109 to send back images tobackend server 119.Controller 109 encrypts the triggered event and time and location data, and sends the encrypted data to backend server 119 (Step 806). Since the images have been encrypted with the users public key, thecontroller 109 does not need to encrypt the images again. - It is a powerful capability to allow off-site user and
backend server 119 control the in-vehicle system remotely. However, this remote control ability raises great concern over user privacy. It is an important feature allowing the privileged user to set the in-vehicle system to reject the commands issued fromremote backend server 119 or through invehicle control unit 102. This override request will be sent back toremote backend server 119 and logged inbackend server 119. For example, the privileged user can issue a command to setvideo camcorder 120 to reject the remote command issued by backend server 119 (Step 503). The command is {Target component: Camcorder, Issuer: “In-vehicle control unit, Rung Tsai”, Operation: Set configure, Frequency: N/A, Start time: N/A, End time: N/A, Intensity: N/A, Extended data: “Remote command allowed: No”}.Controller 109 checks if the user has privilege to issue the command (Step 504). If the user has proper privilege thecontroller 109 executes the command to setcamcorder component 120 to reject any remote operation (Step 505).Controller 109 will send all of component setting change activities back to backend server 119 (Step 508). - A hand-held device carried by the user may be employed to let in-vehicle
digital camcorder 120 track the user. The purpose of this device is to letcamcorder 120 know where to capture images. When a user parks his car he can carry the device. The device activatescamcorder 120 and adjusts focus to follow the user home. The image taken can be sent back toremote server 119 immediately. - FIG. 2 is a flowchart depicting the process of how in-
vehicle controller 109 handles triggered in-vehicle events. Whenalarm system 101 sensors detect an abnormal condition occurring in the vehicle, a pre-defined condition incontroller 109 being satisfied or a user notification issued by in-vehicle control unit 102, an event is triggered (step 201). The signals go through the line in/outsignal interface 106 and are sent tocontroller 109.Controller 109 determines the attribute values of the triggered event such as names and impact degrees (intensity) of the abnormal-condition-detected sensors. At the same time,controller 109 gets timestamp and location data for the event from the controller's timer and GPS device 114 (step 202).Controller 109 checks the predefined event-action table stored in nonvolatile memory to see if the event has a correspondent action. If there is a correspondent predefined action for the triggered event,controller 109 executes the action. Otherwisecontroller 109 executes the default action in response to the triggered event (Step 203). To execute the action,controller 109 sends signals through line in/outsignal interface 106 to involved components ofalarm system 101 and through wireless in/outtransmitter 115 tovideo camcorders 120 ifcamcorder 120 operation is involved. The action may require the transmission of status or image data tobackend server 119.Controller 109 sends signals viawireless transceiver 111 toremote backend server 119. After the action is complete,controller 109 checks whether the action succeeds or fails (Step 204). If any operation of the action fails, thencontroller 109 verifies whether the failure involve data transmission errors betweencontrol box 105 and backend server 119 (Step 205). If the failure has nothing to do with data transmission thencontroller 109 sends the triggered event, the action taken and failed operations to backend server 119 (Step 206).Controller 109 again checks ifstep 206 succeeds (Step 207). Ifstep 206 fails, thencontroller 109 executes a retry procedure (Step 208). If the failure involves data transmission problems between remotebackend server 119 andcontrol box 105,controller 109 will execute a retry procedure (Step 208). In the retry procedure,controller 109 logs problems and retransmits data in a predefined time interval. After the retry,controller 109 checks if the retry succeeds (Step 207). - FIG. 3 is a flowchart depicting the user preference setup process for
control box 105 andbackend server 119. A user logs in to remote backend server 119 (Step 301).Backend server 119 checks if the user name and password are correct (Step 302). If the user name and password are not correct, thebackend server 119 rejects the user login. If the user name and password are correct,server 119 checks the user privilege to see if the user has the proper privilege to setup actions (Step 303). If the user does not have the proper privilege, then the request is rejected. If the user has privilege to setup actions, then the user is allowed to start the process for action setup (Step 304). In the action setup process, the first step is that user can choose the name of the action he is setting up to uniquely identify the action. However it is not necessary for the user to name every action he creates. If the name of the action is not specified thenbackend server 119 creates a unique action name for the user automatically. The second step is that the user decides what operations the action is composed of. The action can be a single operation or a set of operations. Then the user must decide if the action is forcontrol box 105,backend server 119, or both. Once the user completes the action setup,backend server 119 validates the actions and stores them inbackend server 119.Backend server 119 also logs the action setup activity of the user inbackend server 119 log (Step 305).Backend server 119 checks if there is any action for control box 105 (Step 306). If all the actions are forbackend server 119, then user completes the action setup process. If there is any action forcontrol box 105, thenbackend server 119 encrypts and sends these actions data to controlbox 105 and updates controller 109 (Step 307). - FIG. 4 is a flowchart depicting the event parameter setup process for
control box 105 andbackend server 119. A user logs in to remote backend server 119 (Step 401). Thebackend server 119 checks if the user name and password are correct (Step 402). If the user name and password are not correct,backend server 119 rejects the login. If the user name and password are correct,server 119 checks the user privilege to see if the user has the proper privilege to setup event (Step 403). If the user does not have the proper privilege then request is rejected. If the login user has privilege then user can start the process for event set setup (Step 404). In the process of the event set setup, the first step is that user can choose the unique name of the event set (Step 404.1). It is not necessary for user to name every event set user creates. If the name of event set is not specified then thebackend server 119 can create a unique event set name for user automatically. The next step is to choose the sensor(s) corresponding to the event set (Step 404.2). An event set can relate to one or multiple sensors, user can set the logical relation (i.e. AND, OR) among the participated sensor(s) in the event set (Step 404.3). For example, an event set maybe defined as “1. Sensor A is on, or 2. Sensor B and sensor C are both on”. Then the user chooses if the action is forcontrol box 105,backend server 119, or even both (Step 404.4).Backend server 119 validates the event set and stores it in backend server 119 (Step 405).Backend server 119 checks if there is any event set for the in-vehicle system (Step 406). If all the actions are forbackend server 119, then the user completes the action setup process. If there is any action forcontrol box 105, thenbackend server 119 encrypts and sends the actions data to controlbox 105 and updates controller 109 (Step 407). - FIG. 5 is a flowchart depicting the process of the user issuing an in-vehicle command. Users enter login name and password though in-vehicle control device102 (Step 501).
Controller 109 checks if the user name and password match (Step 502). If the password is not correct then thecontroller 109 rejects the login request and logs the errors (Step 507). If the login name and password of the user are correct, then the user is permitted to issue commands to operate components or change local settings (Step 503). The commands are sent tocontroller 109 through Line in/outsignal interface 106.Controller 109 checks if the user has the privilege to issue the command (Step 504). If the user does not have proper privilege to issue the command, thencontroller 109 rejects the commands and logs the error (Step 507). If the user has proper privilege for the command, thencontroller 109 will execute the command (Step 505).Controller 109 checks if the issued commands need to send data to backend server 119 (Step 506). If it is necessary to send data tobackend server 119,controller 109 encrypts and sends the data to backend server 119 (Step 508). - FIG. 6 is a flowchart depicting the process of the
backend server 119 sending commands or settings to controlbox 105.Backend server 119 encrypts the commands or settings, and then sends the data to control box 105 (Step 601).Controller 109 receives signals fromwireless transceiver 111.Controller 109 then decrypts the encrypted signals (Step 602). Then,controller 109 checks if the data was sent by an authenticated remote server 119 (Step 603). If the data is not from an authenticated source, thencontroller 109 rejects the data and disconnects the connection.Controller 109 logs the error and informsremote backend server 119 of the unauthenticated connection attempt (Step 607). If the connection is coming from an authenticated source, thencontroller 109 checks if the remote command or setting is allowed (Step 604). If the remote command or setting option is set to disable, thencontroller 109 rejects the commands or setting requests issued frombackend server 119 and informsserver 119 the reason for the rejection.Remote backend server 119 receives the rejection fromcontroller 109 and logs the event (Step 608). If remote commands and settings are allowed, forcommands controller 109 checks the targeted component if the operation is legal. If the remote commands are allowed, thencontroller 109 sends operation commands to the target component for execution (Step 605.1). For settings,controller 109 stores them innonvolatile memory 124 orlocal storage 125 aftercontroller 109 validates the settings (Step 605.2). - FIG. 7 is a flowchart depicting the process of the user notification and response process under control of
backend server 119. When the user receives a notification from backend server 119 (Step 701), the user may decide to take actions such as watching the video images taken by the system, sending operation commands to controlbox 105 or changing the settings ofcontrol box 105. The user receiving the notification can login tobackend server 119 by phone or through Internet (Step 702). Afterbackend server 119 verifies the login name and password of the user, the user can take actions to respond to the notification. The actions could be watching video images sent fromcamcorder 120, changing settings ofbackend server 119 orcontrol box 105, or any combination of those. The user can compile the actions he wants to take for the event (Step 703).Backend server 119 will verify if the user has proper privilege for executing these actions (Step 704).Backend server 119 will reject the actions and log the rejected actions for the record if the user does not have privilege for these actions (Step 707). If the user has privilege for the actions,server 119 will check if there is any action or setting for control box 105 (Step 705). If all of the actions issued by the user are forbackend server 119 only, thenbackend server 119 executes these actions (Step 708). If there are actions or settings forcontrol box 105, thenbackend server 119 will send these user actions or settings to controlbox 105 on behalf of the user (Step 706). - FIG. 8 is a flow chart depicting the process of the
controller 109 sending video images tobackend server 119.Video camcorder 120 receives operation commands issued bycontroller 109 on behalf ofremote backend server 119,controller 109 itself, or the user usingcontrol unit 102 in the vehicle (Step 801).Video camcorder 120 is operating and sending image data through wireless line in/outtransceiver 115 to controller 109 (Step 802). Thecontroller 109 first checks if the encryption option is set by the user (Step 803). If the user encrypt option is on, thencontroller 109 encrypts the image data using the pre-specified encryption algorithm (Step 804). Otherwise,controller 109 will not encrypt image data at this moment.Controller 109 checks if the image data needs to be sent back to remote backend server 119 (Step 805). Ifvideo camcorder component 120 is set to not remotely store data, then the image data will be stored in local storage 125 (Step 807). If the image data needs to be sent tobackend server 119,controller 109 encrypts the image data and triggered event data, and sends the encrypted data to backend server 119 (Step 806). The communication betweencontroller 109 andbackend server 119 is always encrypted. But for the better privacy protection, the user can even set the parameters to encrypt the image data using a special encryption algorithm such as public key/private key protection, so that only the user can watch the image. In this form,backend server 119 cannot access the user's image data. - From the above description, it will be apparent that the invention disclosed herein provides a novel and advantageous vehicle security system that is both remotely controllable and remotely configurable. The foregoing discussion discloses and describes merely exemplary methods and embodiments of the present invention. One skilled in the art will readily recognize from such discussion that various changes, modifications and variations may be made therein without departing from the spirit and scope of the invention.
Claims (14)
1. A security control system for responding to security events detected by in-vehicle security systems located within a plurality of vehicles having vehicle-mounted video cameras comprising:
an in-vehicle control apparatus located within each of the vehicles comprising:
a security system communications interface connected to the in-vehicle security system;
a data store configured to store configuration data;
a controller connected to the security system communications interface and the memory and configured to control operation of the video cameras in response to security events detected by the vehicle security system based upon configuration data and situation data;
a wireless transceiver configured for bi-directional communication on a wireless link;
a communication link to the video cameras configured to transmit command data to the video cameras from the controller and receive captured images from the video cameras;
a remote server in communication with the in-vehicle control apparatus of the plurality of vehicles via the wireless link; and
a remote programming device in communication with the remote server via a communications network, the remote programming device being configured for the input of the configuration data;
wherein the configuration data input at the remote programming device is transmitted via the communications network to the remote server and from the remote server via the wireless link to the in-vehicle control apparatus for storage in the data store.
2. The system recited in claim 1 , wherein the captured images are transmitted to remote server via the wireless communications link.
3. The system recited in claim 1 , further comprising a data entry device located within the vehicle and coupled to the in-vehicle control apparatus and configured for the input of the configuration data.
4. The system recited in claim 1 , wherein the remote server is configured to authenticate the remote programming device through a secure login procedure.
5. The system recited in claim 1 , wherein the situation data includes vehicle location data, local geography data and time of day data.
6. The system recited in claim 5 , wherein the vehicle location data is provided by a global positioning system.
7. The system recited in claim 1 , wherein in response to detection of a security event by the in-vehicle security system, the in-vehicle control apparatus transmits event data comprising data indicative of the security event, a time stamp, and the captured images to the remote server.
8. The system recited in claim 1 , wherein in response to detection of a security event by the in-vehicle security system, the in-vehicle control apparatus is configured to transmit data indicative of the security event to the remote server, and wherein the remote server is configured to compare the security event data to a set of pre-defined response criteria and based upon the comparison to provide a notification of the security event to the remote programming device.
9. A remotely configurable in-vehicle control apparatus for responding to security events detected by an in-vehicle security system located within a vehicle having vehicle-mounted video cameras and for communicating with a remote server via a wireless link and a remote programming device configured for input of configuration data and coupled to the remote server via a communications network comprising:
a security system communications interface connected to the in-vehicle security system;
a data store configured to store configuration data;
a controller connected to the security system communications interface and the data store and configured to control operation of the video cameras in response to security events detected by the vehicle security system based upon configuration data;
a wireless transceiver configured for bi-directional communication on the wireless link;
a communication link to the video cameras configured to transmit command data to the video cameras from the controller and receive captured images from the video cameras;
wherein the configuration data input at the remote programming device is transmitted via the communications network to the remote server and from the remote server via the wireless link to the in-vehicle control apparatus for storage in the data store.
10. The apparatus recited in claim 9 , wherein the captured images are transmitted to remote server via the wireless communications link.
11. The apparatus recited in claim 9 , wherein the situation data includes vehicle location data, local geography data and time of day data.
12. The apparatus recited in claim 11 , wherein the vehicle location data is provided by a global positioning system.
13. The apparatus recited in claim 9 , wherein in response to detection of a security event by the in-vehicle security system, the in-vehicle control apparatus transmits event data comprising data indicative of the security event, a time stamp, and the captured images to the remote server.
14. The apparatus recited in claim 9 , wherein in response to detection of a security event by the in-vehicle security system, the in-vehicle control apparatus is configured to transmit data indicative of the security event to the remote server, and wherein the remote server is configured to compare the security event data to a set of pre-defined response criteria and based upon the comparison to provide a notification of the security event to the remote programming device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/463,937 US20040257208A1 (en) | 2003-06-18 | 2003-06-18 | Remotely controllable and configurable vehicle security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/463,937 US20040257208A1 (en) | 2003-06-18 | 2003-06-18 | Remotely controllable and configurable vehicle security system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20040257208A1 true US20040257208A1 (en) | 2004-12-23 |
Family
ID=33517170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/463,937 Abandoned US20040257208A1 (en) | 2003-06-18 | 2003-06-18 | Remotely controllable and configurable vehicle security system |
Country Status (1)
Country | Link |
---|---|
US (1) | US20040257208A1 (en) |
Cited By (144)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050041805A1 (en) * | 2003-08-04 | 2005-02-24 | Lowell Rosen | Miniaturized holographic communications apparatus and methods |
US20050148329A1 (en) * | 2003-12-01 | 2005-07-07 | Jeffrey Brunet | Smartphone profiler system and method |
US20050264412A1 (en) * | 2004-05-12 | 2005-12-01 | Raytheon Company | Event alert system and method |
US20060015221A1 (en) * | 2004-07-14 | 2006-01-19 | Sarkar Susanta P | System and method for changing motor vehicle personalization settings |
US20060139155A1 (en) * | 2004-12-14 | 2006-06-29 | Jounghoon Kim | Remote access system for a vehicle |
US20070082700A1 (en) * | 2005-10-07 | 2007-04-12 | Agere Systems, Inc. | Method of using mobile communications devices for monitoring purposes and a system for implementation thereof |
US20070124599A1 (en) * | 2005-11-28 | 2007-05-31 | Fujitsu Ten Limited | Authentication apparatus and method for use in vehicle |
US20070150460A1 (en) * | 2005-12-27 | 2007-06-28 | Evans Raymond K | Systems and methods for providing victim location information during an emergency situation |
EP1897767A1 (en) * | 2006-09-05 | 2008-03-12 | Harman Becker Automotive Systems GmbH | Vehicle emergency system |
US20080177571A1 (en) * | 2006-10-16 | 2008-07-24 | Rooney James H | System and method for public health surveillance and response |
US20080180241A1 (en) * | 2003-06-11 | 2008-07-31 | Hess Brian K | Portable alarm and methods of transmitting alarm data |
US20080288615A1 (en) * | 2004-02-13 | 2008-11-20 | Blue Vector Systems | Radio Frequency Identification (RFID) Network System and Method |
US20090146797A1 (en) * | 2007-12-11 | 2009-06-11 | Denso International America, Inc. | Security for navigation system and garage door opener |
US20090167524A1 (en) * | 2007-12-31 | 2009-07-02 | General Motors Corporation | Method for remotely controlling vehicle features |
US20090195651A1 (en) * | 2008-01-31 | 2009-08-06 | Leonard Robert C | Method of providing safety enforcement for school buses |
EP2105361A1 (en) * | 2008-03-28 | 2009-09-30 | Aisin AW Co., Ltd. | Door-lock control system, door-lock control method and program |
US20090303066A1 (en) * | 2008-06-06 | 2009-12-10 | Michael Lee | Method and apparatus to remotely set alarms on a mobile device |
EP2137933A1 (en) * | 2007-03-14 | 2009-12-30 | Robert Bosch GmbH | Interface in a vehicle, and method for data exchange |
US7778664B1 (en) | 2001-10-18 | 2010-08-17 | Iwao Fujisaki | Communication device |
US20100275061A1 (en) * | 2009-04-28 | 2010-10-28 | Chi Mei Communication Systems, Inc. | Server and method for remotely testing electronic devices |
US7853295B1 (en) | 2001-10-18 | 2010-12-14 | Iwao Fujisaki | Communication device |
US7856248B1 (en) | 2003-09-26 | 2010-12-21 | Iwao Fujisaki | Communication device |
US7865216B1 (en) | 2001-10-18 | 2011-01-04 | Iwao Fujisaki | Communication device |
US20110010435A1 (en) * | 2008-04-23 | 2011-01-13 | Panasonic Corporation | Vehicle mounted device, server device, and communication system |
US7890089B1 (en) | 2007-05-03 | 2011-02-15 | Iwao Fujisaki | Communication device |
US20110169647A1 (en) * | 2010-01-08 | 2011-07-14 | Simon Dean Morley | Method of Providing Crime-Related Safety Information to a User of a Personal Navigation Device and Related Device |
US7986225B1 (en) * | 2010-02-02 | 2011-07-26 | Cicada Security Technology Inc. | Pluggable security device |
US20110227712A1 (en) * | 2010-03-18 | 2011-09-22 | Atteck Marvin R | Computerized multiple technology based vehicle alarm system and method |
US8041348B1 (en) | 2004-03-23 | 2011-10-18 | Iwao Fujisaki | Communication device |
US20110261200A1 (en) * | 2010-04-27 | 2011-10-27 | GM Global Technology Operations LLC | Method for locating a parked vehicle and portable localization device for locating a parked vehicle |
US20120001771A1 (en) * | 2010-07-02 | 2012-01-05 | Hans Roth | Computer based system and method for providing a driver assist information |
US8121635B1 (en) | 2003-11-22 | 2012-02-21 | Iwao Fujisaki | Communication device |
US8125329B1 (en) * | 2005-10-12 | 2012-02-28 | Hirou Timothy L | Identification system |
US8208954B1 (en) | 2005-04-08 | 2012-06-26 | Iwao Fujisaki | Communication device |
US8229512B1 (en) | 2003-02-08 | 2012-07-24 | Iwao Fujisaki | Communication device |
US8241128B1 (en) | 2003-04-03 | 2012-08-14 | Iwao Fujisaki | Communication device |
US8269618B2 (en) * | 2004-01-21 | 2012-09-18 | Numerex Corp. | Method and system for remotely monitoring the location of a vehicle |
US8340726B1 (en) | 2008-06-30 | 2012-12-25 | Iwao Fujisaki | Communication device |
US8452307B1 (en) | 2008-07-02 | 2013-05-28 | Iwao Fujisaki | Communication device |
CN103121436A (en) * | 2013-01-29 | 2013-05-29 | 华南理工大学广州学院 | Automobile navigation monitoring system |
US8468515B2 (en) | 2000-11-17 | 2013-06-18 | Hewlett-Packard Development Company, L.P. | Initialization and update of software and/or firmware in electronic devices |
US8479189B2 (en) | 2000-11-17 | 2013-07-02 | Hewlett-Packard Development Company, L.P. | Pattern detection preprocessor in an electronic device update generation system |
US8526940B1 (en) | 2004-08-17 | 2013-09-03 | Palm, Inc. | Centralized rules repository for smart phone customer care |
US8543157B1 (en) | 2008-05-09 | 2013-09-24 | Iwao Fujisaki | Communication device which notifies its pin-point location or geographic area in accordance with user selection |
US8555273B1 (en) | 2003-09-17 | 2013-10-08 | Palm. Inc. | Network for updating electronic devices |
US8578361B2 (en) | 2004-04-21 | 2013-11-05 | Palm, Inc. | Updating an electronic device with update agent code |
US8639214B1 (en) | 2007-10-26 | 2014-01-28 | Iwao Fujisaki | Communication device |
WO2013190415A3 (en) * | 2012-06-22 | 2014-02-27 | Koninklijke Philips N.V. | Methods and apparatuses for communicating information between nodes |
US8676273B1 (en) | 2007-08-24 | 2014-03-18 | Iwao Fujisaki | Communication device |
US20140143839A1 (en) * | 2011-11-16 | 2014-05-22 | Flextronics Ap, Llc. | On board vehicle remote control module |
US8752044B2 (en) | 2006-07-27 | 2014-06-10 | Qualcomm Incorporated | User experience and dependency management in a mobile device |
WO2014100356A1 (en) * | 2012-12-21 | 2014-06-26 | Simon Sascha | System and method for determining when a smartphone is in a vehicle |
US8805431B2 (en) | 2012-07-31 | 2014-08-12 | Motorola Solutions, Inc. | Apparatus and method for initiating and sharing incident information in a communication system |
US20140285337A1 (en) * | 2013-03-21 | 2014-09-25 | Mark Anthony Gebhardt | Automobile Alert System for Recording and Communicating Incidents to Remote Monitoring Devices |
US8855621B2 (en) | 2012-05-01 | 2014-10-07 | Innova Electronics, Inc. | Cellphone controllable car intrusion recording and monitoring reaction system |
US8862117B2 (en) | 2012-05-01 | 2014-10-14 | Innova Electronics, Inc. | Cellphone controllable car intrusion recording and monitoring reaction system |
US8893110B2 (en) | 2006-06-08 | 2014-11-18 | Qualcomm Incorporated | Device management in a network |
US8989952B2 (en) | 2012-12-21 | 2015-03-24 | Apio Systems, Inc. | System and method for detecting vehicle crash |
CN104536463A (en) * | 2015-01-21 | 2015-04-22 | 郑豪 | Remote control automatic orientation fine-tuning follower system |
CN104836984A (en) * | 2014-07-16 | 2015-08-12 | 北汽福田汽车股份有限公司 | Vehicle monitoring method, device and system |
US9116786B2 (en) | 2011-11-16 | 2015-08-25 | Flextronics Ap, Llc | On board vehicle networking module |
US9135808B2 (en) | 2012-12-18 | 2015-09-15 | James Vincent Petrizzi | Systems, devices and methods to communicate public safety information |
US9134986B2 (en) | 2011-11-16 | 2015-09-15 | Flextronics Ap, Llc | On board vehicle installation supervisor |
EP2930070A1 (en) * | 2014-04-08 | 2015-10-14 | Application Solutions (Electronics and Vision) Limited | Monitoring system |
CN105353697A (en) * | 2015-12-15 | 2016-02-24 | 重庆联导金宏电子有限公司 | Vehicle remote control system capable of remotely controlling automobile data recorder |
US9333946B2 (en) | 2012-12-21 | 2016-05-10 | Apio Systems, Inc. | System and method for identifying vehicle by utilizing detected magnetic field |
US9338170B2 (en) | 2011-11-16 | 2016-05-10 | Autoconnect Holdings Llc | On board vehicle media controller |
US20160129883A1 (en) * | 2011-04-22 | 2016-05-12 | Angel A. Penilla | Contact detect feature of a vehicle and notifications to enable live views of vehicle |
US9406222B2 (en) * | 2012-10-18 | 2016-08-02 | Calamp Corp. | Systems and methods for location reporting of detected events in vehicle operation |
US9644977B2 (en) | 2015-05-22 | 2017-05-09 | Calamp Corp. | Systems and methods for determining vehicle operational status |
US20170132918A1 (en) * | 2015-11-11 | 2017-05-11 | Toyota Jidosha Kabushiki Kaisha | Vehicle image data transmission device |
DE102015226147A1 (en) * | 2015-12-21 | 2017-06-22 | Bayerische Motoren Werke Aktiengesellschaft | Automatic configuration of telematic data transmissions of a motor vehicle |
US20170200333A1 (en) * | 2005-12-08 | 2017-07-13 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
US20170267170A1 (en) * | 2016-03-21 | 2017-09-21 | Ford Global Technologies, Llc | Geofencing Application for Driver Convenience |
US20180084184A1 (en) * | 2009-12-07 | 2018-03-22 | Cobra Electronics Corporation | Vehicle Camera System |
US9928734B2 (en) | 2016-08-02 | 2018-03-27 | Nio Usa, Inc. | Vehicle-to-pedestrian communication systems |
US9946906B2 (en) | 2016-07-07 | 2018-04-17 | Nio Usa, Inc. | Vehicle with a soft-touch antenna for communicating sensitive information |
US9963106B1 (en) | 2016-11-07 | 2018-05-08 | Nio Usa, Inc. | Method and system for authentication in autonomous vehicles |
US9984572B1 (en) | 2017-01-16 | 2018-05-29 | Nio Usa, Inc. | Method and system for sharing parking space availability among autonomous vehicles |
US10031521B1 (en) | 2017-01-16 | 2018-07-24 | Nio Usa, Inc. | Method and system for using weather information in operation of autonomous vehicles |
US20180215348A1 (en) * | 2017-01-27 | 2018-08-02 | Nec Corporation | Monitoring system, monitoring center device, mounting device, monitoring method, processing method, and program |
US10055909B2 (en) | 2016-07-08 | 2018-08-21 | Calamp Corp. | Systems and methods for crash determination |
US10062285B2 (en) | 2012-12-21 | 2018-08-28 | Sfara, Inc. | System and method for smartphone communication during vehicle mode |
US10074223B2 (en) | 2017-01-13 | 2018-09-11 | Nio Usa, Inc. | Secured vehicle for user use only |
US10107831B2 (en) | 2012-11-21 | 2018-10-23 | Calamp Corp | Systems and methods for efficient characterization of acceleration events |
US10149110B2 (en) | 2016-06-06 | 2018-12-04 | Motorola Solutions, Inc. | Method and system for tracking a plurality of communication devices |
US10219117B2 (en) | 2016-10-12 | 2019-02-26 | Calamp Corp. | Systems and methods for radio access interfaces |
US10214166B2 (en) | 2015-06-11 | 2019-02-26 | Calamp Corp. | Systems and methods for impact detection with noise attenuation of a sensor signal |
EP3429168A4 (en) * | 2016-03-11 | 2019-03-13 | BYD Company Limited | Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle |
EP3429158A4 (en) * | 2016-03-11 | 2019-03-13 | BYD Company Limited | Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle |
US10234302B2 (en) | 2017-06-27 | 2019-03-19 | Nio Usa, Inc. | Adaptive route and motion planning based on learned external and internal vehicle environment |
US10249105B2 (en) | 2014-02-21 | 2019-04-02 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
US10246104B1 (en) | 2013-11-11 | 2019-04-02 | Smartdrive Systems, Inc. | Vehicle fuel consumption monitor and feedback systems |
US10249104B2 (en) | 2016-12-06 | 2019-04-02 | Nio Usa, Inc. | Lease observation and event recording |
CN109649315A (en) * | 2019-01-11 | 2019-04-19 | 四川虫洞科技有限公司 | A kind of vehicle Internet of Things safe rescue system applied on vehicle |
US10286915B2 (en) | 2017-01-17 | 2019-05-14 | Nio Usa, Inc. | Machine learning for personalized driving |
US10339732B2 (en) | 2006-11-07 | 2019-07-02 | Smartdrive Systems, Inc. | Vehicle operator performance history recording, scoring and reporting systems |
US10360739B2 (en) | 2015-04-01 | 2019-07-23 | Smartdrive Systems, Inc. | Vehicle event recording system and method |
US10369974B2 (en) | 2017-07-14 | 2019-08-06 | Nio Usa, Inc. | Control and coordination of driverless fuel replenishment for autonomous vehicles |
US10369966B1 (en) | 2018-05-23 | 2019-08-06 | Nio Usa, Inc. | Controlling access to a vehicle using wireless access devices |
US10382966B2 (en) | 2005-12-23 | 2019-08-13 | Perdiemco Llc | Computing device carried by a vehicle for tracking driving events in a zone using location and event log files |
US10395438B2 (en) | 2016-08-19 | 2019-08-27 | Calamp Corp. | Systems and methods for crash determination with noise filtering |
US10404951B2 (en) | 2006-03-16 | 2019-09-03 | Smartdrive Systems, Inc. | Vehicle event recorders with integrated web server |
US10410250B2 (en) | 2016-11-21 | 2019-09-10 | Nio Usa, Inc. | Vehicle autonomy level selection based on user context |
US10410064B2 (en) | 2016-11-11 | 2019-09-10 | Nio Usa, Inc. | System for tracking and identifying vehicles and pedestrians |
US10466269B2 (en) | 2013-02-19 | 2019-11-05 | Calamp Corp. | Systems and methods for low latency 3-axis accelerometer calibration |
US10464530B2 (en) | 2017-01-17 | 2019-11-05 | Nio Usa, Inc. | Voice biometric pre-purchase enrollment for autonomous vehicles |
US10471828B2 (en) | 2006-11-09 | 2019-11-12 | Smartdrive Systems, Inc. | Vehicle exception event management systems |
US10471829B2 (en) | 2017-01-16 | 2019-11-12 | Nio Usa, Inc. | Self-destruct zone and autonomous vehicle navigation |
US10473750B2 (en) | 2016-12-08 | 2019-11-12 | Calamp Corp. | Systems and methods for tracking multiple collocated assets |
US10476933B1 (en) | 2007-05-08 | 2019-11-12 | Smartdrive Systems, Inc. | Distributed vehicle event recorder systems having a portable memory data transfer system |
CN110678353A (en) * | 2017-05-24 | 2020-01-10 | 奥迪股份公司 | Externally displaying captured images of a vehicle interior in VR glasses |
US10599421B2 (en) | 2017-07-14 | 2020-03-24 | Calamp Corp. | Systems and methods for failsafe firmware upgrades |
US10606274B2 (en) | 2017-10-30 | 2020-03-31 | Nio Usa, Inc. | Visual place recognition based self-localization for autonomous vehicles |
CN110989371A (en) * | 2019-11-13 | 2020-04-10 | 上海博泰悦臻电子设备制造有限公司 | Intelligent household control method and system |
US10635109B2 (en) | 2017-10-17 | 2020-04-28 | Nio Usa, Inc. | Vehicle path-planner monitor and controller |
US10682969B2 (en) | 2006-11-07 | 2020-06-16 | Smartdrive Systems, Inc. | Power management systems for automotive video event recorders |
US10694357B2 (en) | 2016-11-11 | 2020-06-23 | Nio Usa, Inc. | Using vehicle sensor data to monitor pedestrian health |
US10692126B2 (en) | 2015-11-17 | 2020-06-23 | Nio Usa, Inc. | Network-based system for selling and servicing cars |
US10708547B2 (en) | 2016-11-11 | 2020-07-07 | Nio Usa, Inc. | Using vehicle sensor data to monitor environmental and geologic conditions |
US10710633B2 (en) | 2017-07-14 | 2020-07-14 | Nio Usa, Inc. | Control of complex parking maneuvers and autonomous fuel replenishment of driverless vehicles |
US10717412B2 (en) | 2017-11-13 | 2020-07-21 | Nio Usa, Inc. | System and method for controlling a vehicle using secondary access methods |
CN111596552A (en) * | 2019-02-21 | 2020-08-28 | 上海擎感智能科技有限公司 | Intelligent home interaction method, system, medium and vehicle-mounted terminal based on vehicle-mounted terminal |
US20200322038A1 (en) * | 2005-07-18 | 2020-10-08 | Mutualink, Inc. | Incident communications network with dynamic asset marshaling and a mobile interoperability workstation |
US10818112B2 (en) | 2013-10-16 | 2020-10-27 | Smartdrive Systems, Inc. | Vehicle event playback apparatus and methods |
US10837790B2 (en) | 2017-08-01 | 2020-11-17 | Nio Usa, Inc. | Productive and accident-free driving modes for a vehicle |
CN112073683A (en) * | 2020-08-14 | 2020-12-11 | 开沃新能源汽车集团股份有限公司 | Remote driving device based on 5G |
US10897469B2 (en) | 2017-02-02 | 2021-01-19 | Nio Usa, Inc. | System and method for firewalls between vehicle networks |
US10902722B2 (en) | 2017-05-11 | 2021-01-26 | Motorola Solutions, Inc. | Method for providing incident specific information at a vehicle computer |
DE102019122248A1 (en) * | 2019-08-19 | 2021-02-25 | Zf Active Safety Gmbh | Vehicle assistance system, vehicle and alarm system |
US10935978B2 (en) | 2017-10-30 | 2021-03-02 | Nio Usa, Inc. | Vehicle self-localization using particle filters and visual odometry |
US10940832B1 (en) | 2019-09-18 | 2021-03-09 | Toyota Motor North America, Inc. | Identifying suspicious events relating to a vehicle |
CN112524754A (en) * | 2020-11-16 | 2021-03-19 | 珠海格力电器股份有限公司 | Data synchronization device and method of electric appliance control system and air conditioner control system |
US11069257B2 (en) | 2014-11-13 | 2021-07-20 | Smartdrive Systems, Inc. | System and method for detecting a vehicle event and generating review criteria |
GB2592667A (en) * | 2020-03-06 | 2021-09-08 | Ford Global Tech Llc | Location-based parking |
US11206171B2 (en) | 2017-11-07 | 2021-12-21 | Calamp Corp. | Systems and methods for dynamic device programming |
US11292430B2 (en) * | 2019-05-24 | 2022-04-05 | Ford Global Technologies, Llc | Systems and methods for securing a vehicle and its content after a bailout operation |
US11316937B2 (en) | 2005-12-23 | 2022-04-26 | Perdiemco Llc | Method for tracking events based on mobile device location and sensor event conditions |
US11350237B2 (en) | 2012-12-21 | 2022-05-31 | Sfara, Inc. | System and method for determining smartphone location |
CN115297097A (en) * | 2022-07-07 | 2022-11-04 | 广州市大周电子科技有限公司 | A vehicle-mounted all-in-one machine system and all-in-one machine |
US20220396217A1 (en) * | 2021-06-10 | 2022-12-15 | Firstech, LLC | Method for event notification with vehicle camera |
US11924303B2 (en) | 2017-11-06 | 2024-03-05 | Calamp Corp. | Systems and methods for dynamic telematics messaging |
US12027047B2 (en) | 2013-12-20 | 2024-07-02 | Sfara, Inc. | System and method for smartphone communication during vehicle mode |
US12143893B2 (en) | 2013-12-03 | 2024-11-12 | Sfara, Inc. | System and method for determining when smartphone is in vehicle |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5027104A (en) * | 1990-02-21 | 1991-06-25 | Reid Donald J | Vehicle security device |
US6184779B1 (en) * | 1997-01-29 | 2001-02-06 | Directed Electronics Inc. | Vehicle security system having wireless function-programming capability |
US6337621B1 (en) * | 1998-08-12 | 2002-01-08 | Alpine Electronics, Inc. | Security and emergency communication service coordination system and notification control method therefor |
US6373381B2 (en) * | 2000-01-20 | 2002-04-16 | Lite-On Automotive Corporation | Vehicle security system and control method therefor |
US6442241B1 (en) * | 1999-07-15 | 2002-08-27 | William J. Tsumpes | Automated parallel and redundant subscriber contact and event notification system |
US6452483B2 (en) * | 1997-01-29 | 2002-09-17 | Directed Electronics, Inc. | Vehicle security system having advanced wireless function-programming capability |
US20030137426A1 (en) * | 2001-12-07 | 2003-07-24 | Eric Anthony | Early warning near-real-time security system |
US6803854B1 (en) * | 1999-01-04 | 2004-10-12 | Siemens Aktiengesellschaft | System and method for especially graphically monitoring and/or remote controlling stationary and/or mobile devices |
-
2003
- 2003-06-18 US US10/463,937 patent/US20040257208A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5027104A (en) * | 1990-02-21 | 1991-06-25 | Reid Donald J | Vehicle security device |
US6184779B1 (en) * | 1997-01-29 | 2001-02-06 | Directed Electronics Inc. | Vehicle security system having wireless function-programming capability |
US6452483B2 (en) * | 1997-01-29 | 2002-09-17 | Directed Electronics, Inc. | Vehicle security system having advanced wireless function-programming capability |
US6337621B1 (en) * | 1998-08-12 | 2002-01-08 | Alpine Electronics, Inc. | Security and emergency communication service coordination system and notification control method therefor |
US6803854B1 (en) * | 1999-01-04 | 2004-10-12 | Siemens Aktiengesellschaft | System and method for especially graphically monitoring and/or remote controlling stationary and/or mobile devices |
US6442241B1 (en) * | 1999-07-15 | 2002-08-27 | William J. Tsumpes | Automated parallel and redundant subscriber contact and event notification system |
US6373381B2 (en) * | 2000-01-20 | 2002-04-16 | Lite-On Automotive Corporation | Vehicle security system and control method therefor |
US20030137426A1 (en) * | 2001-12-07 | 2003-07-24 | Eric Anthony | Early warning near-real-time security system |
Cited By (288)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8468515B2 (en) | 2000-11-17 | 2013-06-18 | Hewlett-Packard Development Company, L.P. | Initialization and update of software and/or firmware in electronic devices |
US8479189B2 (en) | 2000-11-17 | 2013-07-02 | Hewlett-Packard Development Company, L.P. | Pattern detection preprocessor in an electronic device update generation system |
US8498672B1 (en) | 2001-10-18 | 2013-07-30 | Iwao Fujisaki | Communication device |
US7778664B1 (en) | 2001-10-18 | 2010-08-17 | Iwao Fujisaki | Communication device |
US8538485B1 (en) | 2001-10-18 | 2013-09-17 | Iwao Fujisaki | Communication device |
US8538486B1 (en) | 2001-10-18 | 2013-09-17 | Iwao Fujisaki | Communication device which displays perspective 3D map |
US8290482B1 (en) | 2001-10-18 | 2012-10-16 | Iwao Fujisaki | Communication device |
US8200275B1 (en) | 2001-10-18 | 2012-06-12 | Iwao Fujisaki | System for communication device to display perspective 3D map |
US8086276B1 (en) | 2001-10-18 | 2011-12-27 | Iwao Fujisaki | Communication device |
US8068880B1 (en) | 2001-10-18 | 2011-11-29 | Iwao Fujisaki | Communication device |
US8064964B1 (en) | 2001-10-18 | 2011-11-22 | Iwao Fujisaki | Communication device |
US8024009B1 (en) | 2001-10-18 | 2011-09-20 | Iwao Fujisaki | Communication device |
US7996037B1 (en) | 2001-10-18 | 2011-08-09 | Iwao Fujisaki | Communication device |
US7949371B1 (en) | 2001-10-18 | 2011-05-24 | Iwao Fujisaki | Communication device |
US7945256B1 (en) | 2001-10-18 | 2011-05-17 | Iwao Fujisaki | Communication device |
US7945236B1 (en) | 2001-10-18 | 2011-05-17 | Iwao Fujisaki | Communication device |
US7945286B1 (en) | 2001-10-18 | 2011-05-17 | Iwao Fujisaki | Communication device |
US7945287B1 (en) | 2001-10-18 | 2011-05-17 | Iwao Fujisaki | Communication device |
US7907963B1 (en) | 2001-10-18 | 2011-03-15 | Iwao Fujisaki | Method to display three-dimensional map on communication device |
US7907942B1 (en) | 2001-10-18 | 2011-03-15 | Iwao Fujisaki | Communication device |
US7904109B1 (en) | 2001-10-18 | 2011-03-08 | Iwao Fujisaki | Communication device |
US7865216B1 (en) | 2001-10-18 | 2011-01-04 | Iwao Fujisaki | Communication device |
US7853297B1 (en) | 2001-10-18 | 2010-12-14 | Iwao Fujisaki | Communication device |
US7853295B1 (en) | 2001-10-18 | 2010-12-14 | Iwao Fujisaki | Communication device |
US8229512B1 (en) | 2003-02-08 | 2012-07-24 | Iwao Fujisaki | Communication device |
US8241128B1 (en) | 2003-04-03 | 2012-08-14 | Iwao Fujisaki | Communication device |
US20080180241A1 (en) * | 2003-06-11 | 2008-07-31 | Hess Brian K | Portable alarm and methods of transmitting alarm data |
US8698619B2 (en) * | 2003-06-11 | 2014-04-15 | Tattletale Portable Alarm Systems, Inc. | Alarm system and method of communicating with alarm system |
US20130222132A1 (en) * | 2003-06-11 | 2013-08-29 | Tattle Tale Portable Alarm Systems, Inc. | Alarm system and method of communicating with alarm system |
US8410925B2 (en) * | 2003-06-11 | 2013-04-02 | Tattletale Portable Alarm Systems, Inc. | Portable alarm and methods of transmitting alarm data |
US20120146785A1 (en) * | 2003-06-11 | 2012-06-14 | Hess Brian K | Portable alarm and methods of transmitting alarm data |
US8125330B2 (en) * | 2003-06-11 | 2012-02-28 | Tattletale Portable Alarm Systems, Inc. | Portable alarm and methods of transmitting alarm data |
US20050041805A1 (en) * | 2003-08-04 | 2005-02-24 | Lowell Rosen | Miniaturized holographic communications apparatus and methods |
US8555273B1 (en) | 2003-09-17 | 2013-10-08 | Palm. Inc. | Network for updating electronic devices |
US7890136B1 (en) | 2003-09-26 | 2011-02-15 | Iwao Fujisaki | Communication device |
US8055298B1 (en) | 2003-09-26 | 2011-11-08 | Iwao Fujisaki | Communication device |
US8229504B1 (en) | 2003-09-26 | 2012-07-24 | Iwao Fujisaki | Communication device |
US7856248B1 (en) | 2003-09-26 | 2010-12-21 | Iwao Fujisaki | Communication device |
US8233938B1 (en) | 2003-09-26 | 2012-07-31 | Iwao Fujisaki | Communication device |
US8165630B1 (en) | 2003-09-26 | 2012-04-24 | Iwao Fujisaki | Communication device |
US8364201B1 (en) | 2003-09-26 | 2013-01-29 | Iwao Fujisaki | Communication device |
US8351984B1 (en) | 2003-09-26 | 2013-01-08 | Iwao Fujisaki | Communication device |
US8340720B1 (en) | 2003-09-26 | 2012-12-25 | Iwao Fujisaki | Communication device |
US8295880B1 (en) | 2003-09-26 | 2012-10-23 | Iwao Fujisaki | Communication device |
US8335538B1 (en) | 2003-09-26 | 2012-12-18 | Iwao Fujisaki | Communication device |
US8331984B1 (en) | 2003-09-26 | 2012-12-11 | Iwao Fujisaki | Communication device |
US8331983B1 (en) | 2003-09-26 | 2012-12-11 | Iwao Fujisaki | Communication device |
US7996038B1 (en) | 2003-09-26 | 2011-08-09 | Iwao Fujisaki | Communication device |
US8160642B1 (en) | 2003-09-26 | 2012-04-17 | Iwao Fujisaki | Communication device |
US8010157B1 (en) | 2003-09-26 | 2011-08-30 | Iwao Fujisaki | Communication device |
US8150458B1 (en) | 2003-09-26 | 2012-04-03 | Iwao Fujisaki | Communication device |
US8326355B1 (en) | 2003-09-26 | 2012-12-04 | Iwao Fujisaki | Communication device |
US8041371B1 (en) | 2003-09-26 | 2011-10-18 | Iwao Fujisaki | Communication device |
US8121641B1 (en) | 2003-09-26 | 2012-02-21 | Iwao Fujisaki | Communication device |
US8320958B1 (en) | 2003-09-26 | 2012-11-27 | Iwao Fujisaki | Communication device |
US8195228B1 (en) | 2003-09-26 | 2012-06-05 | Iwao Fujisaki | Communication device |
US8311578B1 (en) | 2003-09-26 | 2012-11-13 | Iwao Fujisaki | Communication device |
US8064954B1 (en) | 2003-09-26 | 2011-11-22 | Iwao Fujisaki | Communication device |
US8301194B1 (en) | 2003-09-26 | 2012-10-30 | Iwao Fujisaki | Communication device |
US8244300B1 (en) | 2003-09-26 | 2012-08-14 | Iwao Fujisaki | Communication device |
US8095181B1 (en) | 2003-09-26 | 2012-01-10 | Iwao Fujisaki | Communication device |
US8090402B1 (en) * | 2003-09-26 | 2012-01-03 | Iwao Fujisaki | Communication device |
US8260352B1 (en) | 2003-09-26 | 2012-09-04 | Iwao Fujisaki | Communication device |
US8095182B1 (en) | 2003-09-26 | 2012-01-10 | Iwao Fujisaki | Communication device |
US8295876B1 (en) | 2003-11-22 | 2012-10-23 | Iwao Fujisaki | Communication device |
US8224376B1 (en) | 2003-11-22 | 2012-07-17 | Iwao Fujisaki | Communication device |
US8121635B1 (en) | 2003-11-22 | 2012-02-21 | Iwao Fujisaki | Communication device |
US8238963B1 (en) | 2003-11-22 | 2012-08-07 | Iwao Fujisaki | Communication device |
US20050148329A1 (en) * | 2003-12-01 | 2005-07-07 | Jeffrey Brunet | Smartphone profiler system and method |
US9084197B2 (en) | 2004-01-21 | 2015-07-14 | Numerex Corp. | Method and system for interacting with a vehicle over a mobile radiotelephone network |
US8547212B2 (en) | 2004-01-21 | 2013-10-01 | Numerex Corporation | Method and system for interacting with a vehicle over a mobile radiotelephone network |
US8269618B2 (en) * | 2004-01-21 | 2012-09-18 | Numerex Corp. | Method and system for remotely monitoring the location of a vehicle |
US20080288615A1 (en) * | 2004-02-13 | 2008-11-20 | Blue Vector Systems | Radio Frequency Identification (RFID) Network System and Method |
US8270964B1 (en) | 2004-03-23 | 2012-09-18 | Iwao Fujisaki | Communication device |
US8041348B1 (en) | 2004-03-23 | 2011-10-18 | Iwao Fujisaki | Communication device |
US8195142B1 (en) | 2004-03-23 | 2012-06-05 | Iwao Fujisaki | Communication device |
US8121587B1 (en) | 2004-03-23 | 2012-02-21 | Iwao Fujisaki | Communication device |
US8081962B1 (en) | 2004-03-23 | 2011-12-20 | Iwao Fujisaki | Communication device |
US8578361B2 (en) | 2004-04-21 | 2013-11-05 | Palm, Inc. | Updating an electronic device with update agent code |
US7525421B2 (en) | 2004-05-12 | 2009-04-28 | Raytheon Company | Event detection module |
US20050264412A1 (en) * | 2004-05-12 | 2005-12-01 | Raytheon Company | Event alert system and method |
US7634361B2 (en) * | 2004-05-12 | 2009-12-15 | Raytheon Company | Event alert system and method |
US20060015221A1 (en) * | 2004-07-14 | 2006-01-19 | Sarkar Susanta P | System and method for changing motor vehicle personalization settings |
US7139660B2 (en) * | 2004-07-14 | 2006-11-21 | General Motors Corporation | System and method for changing motor vehicle personalization settings |
US8526940B1 (en) | 2004-08-17 | 2013-09-03 | Palm, Inc. | Centralized rules repository for smart phone customer care |
US20060139155A1 (en) * | 2004-12-14 | 2006-06-29 | Jounghoon Kim | Remote access system for a vehicle |
US8208954B1 (en) | 2005-04-08 | 2012-06-26 | Iwao Fujisaki | Communication device |
US20200322038A1 (en) * | 2005-07-18 | 2020-10-08 | Mutualink, Inc. | Incident communications network with dynamic asset marshaling and a mobile interoperability workstation |
US11902342B2 (en) * | 2005-07-18 | 2024-02-13 | Mutualink, Inc. | Incident communications network with dynamic asset marshaling and a mobile interoperability workstation |
US20070082700A1 (en) * | 2005-10-07 | 2007-04-12 | Agere Systems, Inc. | Method of using mobile communications devices for monitoring purposes and a system for implementation thereof |
US7885681B2 (en) * | 2005-10-07 | 2011-02-08 | Agere Systems Inc. | Method of using mobile communications devices for monitoring purposes and a system for implementation thereof |
US8125329B1 (en) * | 2005-10-12 | 2012-02-28 | Hirou Timothy L | Identification system |
US20070124599A1 (en) * | 2005-11-28 | 2007-05-31 | Fujitsu Ten Limited | Authentication apparatus and method for use in vehicle |
US10706648B2 (en) * | 2005-12-08 | 2020-07-07 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
US20170200333A1 (en) * | 2005-12-08 | 2017-07-13 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
US10878646B2 (en) | 2005-12-08 | 2020-12-29 | Smartdrive Systems, Inc. | Vehicle event recorder systems |
US10602364B2 (en) | 2005-12-23 | 2020-03-24 | Perdiemco Llc | Method for conveyance of event information to individuals interested devices having phone numbers |
US11316937B2 (en) | 2005-12-23 | 2022-04-26 | Perdiemco Llc | Method for tracking events based on mobile device location and sensor event conditions |
US10382966B2 (en) | 2005-12-23 | 2019-08-13 | Perdiemco Llc | Computing device carried by a vehicle for tracking driving events in a zone using location and event log files |
US10397789B2 (en) | 2005-12-23 | 2019-08-27 | Perdiemco Llc | Method for controlling conveyance of event information about carriers of mobile devices based on location information received from location information sources used by the mobile devices |
US11064038B2 (en) | 2005-12-23 | 2021-07-13 | Perdiemco Llc | Method for tracking mobile objects based on event conditions met at mobile object locations |
US10819809B2 (en) | 2005-12-23 | 2020-10-27 | Perdiemco, Llc | Method for controlling conveyance of event notifications in sub-groups defined within groups based on multiple levels of administrative privileges |
US7865512B2 (en) * | 2005-12-27 | 2011-01-04 | Panasonic Electric Works Co., Ltd. | Systems and methods for providing victim location information during an emergency situation |
US20070150460A1 (en) * | 2005-12-27 | 2007-06-28 | Evans Raymond K | Systems and methods for providing victim location information during an emergency situation |
US10404951B2 (en) | 2006-03-16 | 2019-09-03 | Smartdrive Systems, Inc. | Vehicle event recorders with integrated web server |
US8893110B2 (en) | 2006-06-08 | 2014-11-18 | Qualcomm Incorporated | Device management in a network |
US9081638B2 (en) | 2006-07-27 | 2015-07-14 | Qualcomm Incorporated | User experience and dependency management in a mobile device |
US8752044B2 (en) | 2006-07-27 | 2014-06-10 | Qualcomm Incorporated | User experience and dependency management in a mobile device |
EP1897767A1 (en) * | 2006-09-05 | 2008-03-12 | Harman Becker Automotive Systems GmbH | Vehicle emergency system |
US20080177571A1 (en) * | 2006-10-16 | 2008-07-24 | Rooney James H | System and method for public health surveillance and response |
US10339732B2 (en) | 2006-11-07 | 2019-07-02 | Smartdrive Systems, Inc. | Vehicle operator performance history recording, scoring and reporting systems |
US10682969B2 (en) | 2006-11-07 | 2020-06-16 | Smartdrive Systems, Inc. | Power management systems for automotive video event recorders |
US10471828B2 (en) | 2006-11-09 | 2019-11-12 | Smartdrive Systems, Inc. | Vehicle exception event management systems |
US11623517B2 (en) | 2006-11-09 | 2023-04-11 | SmartDriven Systems, Inc. | Vehicle exception event management systems |
US20110106333A1 (en) * | 2007-03-14 | 2011-05-05 | Wolf-Henning Scheider | Interface in a vehicle and method for exchanging data |
EP2137933A1 (en) * | 2007-03-14 | 2009-12-30 | Robert Bosch GmbH | Interface in a vehicle, and method for data exchange |
US8948923B2 (en) * | 2007-03-14 | 2015-02-03 | Robert Bosch Gmbh | Interface in a vehicle and method for exchanging data |
US7890089B1 (en) | 2007-05-03 | 2011-02-15 | Iwao Fujisaki | Communication device |
US10476933B1 (en) | 2007-05-08 | 2019-11-12 | Smartdrive Systems, Inc. | Distributed vehicle event recorder systems having a portable memory data transfer system |
US8676273B1 (en) | 2007-08-24 | 2014-03-18 | Iwao Fujisaki | Communication device |
US8639214B1 (en) | 2007-10-26 | 2014-01-28 | Iwao Fujisaki | Communication device |
US20090146797A1 (en) * | 2007-12-11 | 2009-06-11 | Denso International America, Inc. | Security for navigation system and garage door opener |
US7692533B2 (en) * | 2007-12-11 | 2010-04-06 | Denso International America, Inc. | Security for navigation system and garage door opener |
US20090167524A1 (en) * | 2007-12-31 | 2009-07-02 | General Motors Corporation | Method for remotely controlling vehicle features |
US8731155B2 (en) * | 2007-12-31 | 2014-05-20 | General Motors Llc | Method for remotely controlling vehicle features |
US20090195651A1 (en) * | 2008-01-31 | 2009-08-06 | Leonard Robert C | Method of providing safety enforcement for school buses |
US20090248254A1 (en) * | 2008-03-28 | 2009-10-01 | Aisin Aw Co., Ltd. | Door-lock control system, door-lock control method |
US8095267B2 (en) | 2008-03-28 | 2012-01-10 | Aisin Aw Co., Ltd. | Door-lock control system, door-lock control method |
EP2105361A1 (en) * | 2008-03-28 | 2009-09-30 | Aisin AW Co., Ltd. | Door-lock control system, door-lock control method and program |
US8396943B2 (en) * | 2008-04-23 | 2013-03-12 | Panasonic Corporation | Vehicle mounted device, server device, and communication system |
US20110010435A1 (en) * | 2008-04-23 | 2011-01-13 | Panasonic Corporation | Vehicle mounted device, server device, and communication system |
US8543157B1 (en) | 2008-05-09 | 2013-09-24 | Iwao Fujisaki | Communication device which notifies its pin-point location or geographic area in accordance with user selection |
US20090303066A1 (en) * | 2008-06-06 | 2009-12-10 | Michael Lee | Method and apparatus to remotely set alarms on a mobile device |
US8432267B2 (en) * | 2008-06-06 | 2013-04-30 | Apple Inc. | Method and apparatus to remotely set alarms on a mobile device |
US8340726B1 (en) | 2008-06-30 | 2012-12-25 | Iwao Fujisaki | Communication device |
US8452307B1 (en) | 2008-07-02 | 2013-05-28 | Iwao Fujisaki | Communication device |
US8254908B2 (en) * | 2009-04-28 | 2012-08-28 | Chi Mei Communication Systems, Inc. | Server and method for remotely testing electronic devices |
US20100275061A1 (en) * | 2009-04-28 | 2010-10-28 | Chi Mei Communication Systems, Inc. | Server and method for remotely testing electronic devices |
US10298832B2 (en) * | 2009-12-07 | 2019-05-21 | Cobra Electronics Corporation | Vehicle camera system |
US20180084184A1 (en) * | 2009-12-07 | 2018-03-22 | Cobra Electronics Corporation | Vehicle Camera System |
US10142535B2 (en) * | 2009-12-07 | 2018-11-27 | Cobra Electronics Corporation | Vehicle camera system |
US20110169647A1 (en) * | 2010-01-08 | 2011-07-14 | Simon Dean Morley | Method of Providing Crime-Related Safety Information to a User of a Personal Navigation Device and Related Device |
US8289171B2 (en) * | 2010-01-08 | 2012-10-16 | Mitac International Corp. | Method of providing crime-related safety information to a user of a personal navigation device and related device |
US8378821B2 (en) * | 2010-02-02 | 2013-02-19 | Cicada Security Technology Inc. | Pluggable security device |
US7986225B1 (en) * | 2010-02-02 | 2011-07-26 | Cicada Security Technology Inc. | Pluggable security device |
US20110187532A1 (en) * | 2010-02-02 | 2011-08-04 | Fredric Edelstein | Pluggable security device |
US20110187523A1 (en) * | 2010-02-02 | 2011-08-04 | Cicada Security Technology Inc. | Pluggable security device |
US20110227712A1 (en) * | 2010-03-18 | 2011-09-22 | Atteck Marvin R | Computerized multiple technology based vehicle alarm system and method |
US20110261200A1 (en) * | 2010-04-27 | 2011-10-27 | GM Global Technology Operations LLC | Method for locating a parked vehicle and portable localization device for locating a parked vehicle |
CN102314596A (en) * | 2010-07-02 | 2012-01-11 | 哈曼贝克自动系统股份有限公司 | Be used to provide the computer-based system and the method for driving supplementary |
US20120001771A1 (en) * | 2010-07-02 | 2012-01-05 | Hans Roth | Computer based system and method for providing a driver assist information |
US20160129883A1 (en) * | 2011-04-22 | 2016-05-12 | Angel A. Penilla | Contact detect feature of a vehicle and notifications to enable live views of vehicle |
US9134986B2 (en) | 2011-11-16 | 2015-09-15 | Flextronics Ap, Llc | On board vehicle installation supervisor |
US9338170B2 (en) | 2011-11-16 | 2016-05-10 | Autoconnect Holdings Llc | On board vehicle media controller |
US20140143839A1 (en) * | 2011-11-16 | 2014-05-22 | Flextronics Ap, Llc. | On board vehicle remote control module |
US9116786B2 (en) | 2011-11-16 | 2015-08-25 | Flextronics Ap, Llc | On board vehicle networking module |
US8862117B2 (en) | 2012-05-01 | 2014-10-14 | Innova Electronics, Inc. | Cellphone controllable car intrusion recording and monitoring reaction system |
US8855621B2 (en) | 2012-05-01 | 2014-10-07 | Innova Electronics, Inc. | Cellphone controllable car intrusion recording and monitoring reaction system |
US10250448B2 (en) * | 2012-06-22 | 2019-04-02 | Koninklijke Philips N.V. | Method of communicating information between nodes |
WO2013190415A3 (en) * | 2012-06-22 | 2014-02-27 | Koninklijke Philips N.V. | Methods and apparatuses for communicating information between nodes |
US20150139027A1 (en) * | 2012-06-22 | 2015-05-21 | Koninklijke Philips N.V. | Method of communicating information between nodes |
US8805431B2 (en) | 2012-07-31 | 2014-08-12 | Motorola Solutions, Inc. | Apparatus and method for initiating and sharing incident information in a communication system |
US10102689B2 (en) | 2012-10-18 | 2018-10-16 | Calamp Corp | Systems and methods for location reporting of detected events in vehicle operation |
US9406222B2 (en) * | 2012-10-18 | 2016-08-02 | Calamp Corp. | Systems and methods for location reporting of detected events in vehicle operation |
US10107831B2 (en) | 2012-11-21 | 2018-10-23 | Calamp Corp | Systems and methods for efficient characterization of acceleration events |
US9913121B2 (en) | 2012-12-18 | 2018-03-06 | James Petrizzi | Systems, devices and methods to communicate public safety information |
US9135808B2 (en) | 2012-12-18 | 2015-09-15 | James Vincent Petrizzi | Systems, devices and methods to communicate public safety information |
US9333946B2 (en) | 2012-12-21 | 2016-05-10 | Apio Systems, Inc. | System and method for identifying vehicle by utilizing detected magnetic field |
US10062285B2 (en) | 2012-12-21 | 2018-08-28 | Sfara, Inc. | System and method for smartphone communication during vehicle mode |
US11350237B2 (en) | 2012-12-21 | 2022-05-31 | Sfara, Inc. | System and method for determining smartphone location |
WO2014100356A1 (en) * | 2012-12-21 | 2014-06-26 | Simon Sascha | System and method for determining when a smartphone is in a vehicle |
US8989952B2 (en) | 2012-12-21 | 2015-03-24 | Apio Systems, Inc. | System and method for detecting vehicle crash |
CN103121436A (en) * | 2013-01-29 | 2013-05-29 | 华南理工大学广州学院 | Automobile navigation monitoring system |
US11480587B2 (en) | 2013-02-19 | 2022-10-25 | CalAmpCorp. | Systems and methods for low latency 3-axis accelerometer calibration |
US10466269B2 (en) | 2013-02-19 | 2019-11-05 | Calamp Corp. | Systems and methods for low latency 3-axis accelerometer calibration |
US20140285337A1 (en) * | 2013-03-21 | 2014-09-25 | Mark Anthony Gebhardt | Automobile Alert System for Recording and Communicating Incidents to Remote Monitoring Devices |
US10818112B2 (en) | 2013-10-16 | 2020-10-27 | Smartdrive Systems, Inc. | Vehicle event playback apparatus and methods |
US11884255B2 (en) | 2013-11-11 | 2024-01-30 | Smartdrive Systems, Inc. | Vehicle fuel consumption monitor and feedback systems |
US11260878B2 (en) | 2013-11-11 | 2022-03-01 | Smartdrive Systems, Inc. | Vehicle fuel consumption monitor and feedback systems |
US10246104B1 (en) | 2013-11-11 | 2019-04-02 | Smartdrive Systems, Inc. | Vehicle fuel consumption monitor and feedback systems |
US12143893B2 (en) | 2013-12-03 | 2024-11-12 | Sfara, Inc. | System and method for determining when smartphone is in vehicle |
US12027047B2 (en) | 2013-12-20 | 2024-07-02 | Sfara, Inc. | System and method for smartphone communication during vehicle mode |
US10497187B2 (en) | 2014-02-21 | 2019-12-03 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
US11250649B2 (en) | 2014-02-21 | 2022-02-15 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
US10249105B2 (en) | 2014-02-21 | 2019-04-02 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
US11734964B2 (en) | 2014-02-21 | 2023-08-22 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
EP2930070A1 (en) * | 2014-04-08 | 2015-10-14 | Application Solutions (Electronics and Vision) Limited | Monitoring system |
CN104836984A (en) * | 2014-07-16 | 2015-08-12 | 北汽福田汽车股份有限公司 | Vehicle monitoring method, device and system |
US11069257B2 (en) | 2014-11-13 | 2021-07-20 | Smartdrive Systems, Inc. | System and method for detecting a vehicle event and generating review criteria |
CN104536463A (en) * | 2015-01-21 | 2015-04-22 | 郑豪 | Remote control automatic orientation fine-tuning follower system |
US10930093B2 (en) | 2015-04-01 | 2021-02-23 | Smartdrive Systems, Inc. | Vehicle event recording system and method |
US10360739B2 (en) | 2015-04-01 | 2019-07-23 | Smartdrive Systems, Inc. | Vehicle event recording system and method |
US10304264B2 (en) | 2015-05-22 | 2019-05-28 | Calamp Corp. | Systems and methods for determining vehicle operational status |
US9644977B2 (en) | 2015-05-22 | 2017-05-09 | Calamp Corp. | Systems and methods for determining vehicle operational status |
US10214166B2 (en) | 2015-06-11 | 2019-02-26 | Calamp Corp. | Systems and methods for impact detection with noise attenuation of a sensor signal |
US10255803B2 (en) * | 2015-11-11 | 2019-04-09 | Toyota Jidosha Kabushiki Kaisha | Vehicle image data transmission device |
US20170132918A1 (en) * | 2015-11-11 | 2017-05-11 | Toyota Jidosha Kabushiki Kaisha | Vehicle image data transmission device |
US10692126B2 (en) | 2015-11-17 | 2020-06-23 | Nio Usa, Inc. | Network-based system for selling and servicing cars |
US11715143B2 (en) | 2015-11-17 | 2023-08-01 | Nio Technology (Anhui) Co., Ltd. | Network-based system for showing cars for sale by non-dealer vehicle owners |
CN105353697A (en) * | 2015-12-15 | 2016-02-24 | 重庆联导金宏电子有限公司 | Vehicle remote control system capable of remotely controlling automobile data recorder |
DE102015226147A1 (en) * | 2015-12-21 | 2017-06-22 | Bayerische Motoren Werke Aktiengesellschaft | Automatic configuration of telematic data transmissions of a motor vehicle |
DE102015226147B4 (en) | 2015-12-21 | 2023-08-31 | Bayerische Motoren Werke Aktiengesellschaft | Method, processor device, motor vehicle with such a processor device and telematics system for the automatic configuration of telematic data transmissions of the motor vehicle |
EP3429158A4 (en) * | 2016-03-11 | 2019-03-13 | BYD Company Limited | Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle |
EP3429168A4 (en) * | 2016-03-11 | 2019-03-13 | BYD Company Limited | Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle |
US20170267170A1 (en) * | 2016-03-21 | 2017-09-21 | Ford Global Technologies, Llc | Geofencing Application for Driver Convenience |
CN107221152A (en) * | 2016-03-21 | 2017-09-29 | 福特全球技术公司 | Geography fence application for facilitating driver |
US9776563B1 (en) * | 2016-03-21 | 2017-10-03 | Ford Global Technologies, Llc | Geofencing application for driver convenience |
US10149110B2 (en) | 2016-06-06 | 2018-12-04 | Motorola Solutions, Inc. | Method and system for tracking a plurality of communication devices |
US10672060B2 (en) | 2016-07-07 | 2020-06-02 | Nio Usa, Inc. | Methods and systems for automatically sending rule-based communications from a vehicle |
US9984522B2 (en) | 2016-07-07 | 2018-05-29 | Nio Usa, Inc. | Vehicle identification or authentication |
US10685503B2 (en) | 2016-07-07 | 2020-06-16 | Nio Usa, Inc. | System and method for associating user and vehicle information for communication to a third party |
US10354460B2 (en) | 2016-07-07 | 2019-07-16 | Nio Usa, Inc. | Methods and systems for associating sensitive information of a passenger with a vehicle |
US10679276B2 (en) | 2016-07-07 | 2020-06-09 | Nio Usa, Inc. | Methods and systems for communicating estimated time of arrival to a third party |
US10388081B2 (en) | 2016-07-07 | 2019-08-20 | Nio Usa, Inc. | Secure communications with sensitive user information through a vehicle |
US9946906B2 (en) | 2016-07-07 | 2018-04-17 | Nio Usa, Inc. | Vehicle with a soft-touch antenna for communicating sensitive information |
US10262469B2 (en) | 2016-07-07 | 2019-04-16 | Nio Usa, Inc. | Conditional or temporary feature availability |
US10304261B2 (en) | 2016-07-07 | 2019-05-28 | Nio Usa, Inc. | Duplicated wireless transceivers associated with a vehicle to receive and send sensitive information |
US10032319B2 (en) | 2016-07-07 | 2018-07-24 | Nio Usa, Inc. | Bifurcated communications to a third party through a vehicle |
US10699326B2 (en) | 2016-07-07 | 2020-06-30 | Nio Usa, Inc. | User-adjusted display devices and methods of operating the same |
US11005657B2 (en) | 2016-07-07 | 2021-05-11 | Nio Usa, Inc. | System and method for automatically triggering the communication of sensitive information through a vehicle to a third party |
US11997439B2 (en) | 2016-07-08 | 2024-05-28 | Calamp Corp. | Systems and methods for crash determination |
US11570529B2 (en) | 2016-07-08 | 2023-01-31 | CalAmpCorp. | Systems and methods for crash determination |
US10055909B2 (en) | 2016-07-08 | 2018-08-21 | Calamp Corp. | Systems and methods for crash determination |
US9928734B2 (en) | 2016-08-02 | 2018-03-27 | Nio Usa, Inc. | Vehicle-to-pedestrian communication systems |
US10395438B2 (en) | 2016-08-19 | 2019-08-27 | Calamp Corp. | Systems and methods for crash determination with noise filtering |
US10645551B2 (en) | 2016-10-12 | 2020-05-05 | Calamp Corp. | Systems and methods for radio access interfaces |
US10219117B2 (en) | 2016-10-12 | 2019-02-26 | Calamp Corp. | Systems and methods for radio access interfaces |
US10031523B2 (en) | 2016-11-07 | 2018-07-24 | Nio Usa, Inc. | Method and system for behavioral sharing in autonomous vehicles |
US9963106B1 (en) | 2016-11-07 | 2018-05-08 | Nio Usa, Inc. | Method and system for authentication in autonomous vehicles |
US11024160B2 (en) | 2016-11-07 | 2021-06-01 | Nio Usa, Inc. | Feedback performance control and tracking |
US12080160B2 (en) | 2016-11-07 | 2024-09-03 | Nio Technology (Anhui) Co., Ltd. | Feedback performance control and tracking |
US10083604B2 (en) | 2016-11-07 | 2018-09-25 | Nio Usa, Inc. | Method and system for collective autonomous operation database for autonomous vehicles |
US10694357B2 (en) | 2016-11-11 | 2020-06-23 | Nio Usa, Inc. | Using vehicle sensor data to monitor pedestrian health |
US10708547B2 (en) | 2016-11-11 | 2020-07-07 | Nio Usa, Inc. | Using vehicle sensor data to monitor environmental and geologic conditions |
US10410064B2 (en) | 2016-11-11 | 2019-09-10 | Nio Usa, Inc. | System for tracking and identifying vehicles and pedestrians |
US10970746B2 (en) | 2016-11-21 | 2021-04-06 | Nio Usa, Inc. | Autonomy first route optimization for autonomous vehicles |
US11922462B2 (en) | 2016-11-21 | 2024-03-05 | Nio Technology (Anhui) Co., Ltd. | Vehicle autonomous collision prediction and escaping system (ACE) |
US10949885B2 (en) | 2016-11-21 | 2021-03-16 | Nio Usa, Inc. | Vehicle autonomous collision prediction and escaping system (ACE) |
US11710153B2 (en) | 2016-11-21 | 2023-07-25 | Nio Technology (Anhui) Co., Ltd. | Autonomy first route optimization for autonomous vehicles |
US10699305B2 (en) | 2016-11-21 | 2020-06-30 | Nio Usa, Inc. | Smart refill assistant for electric vehicles |
US10515390B2 (en) | 2016-11-21 | 2019-12-24 | Nio Usa, Inc. | Method and system for data optimization |
US10410250B2 (en) | 2016-11-21 | 2019-09-10 | Nio Usa, Inc. | Vehicle autonomy level selection based on user context |
US10249104B2 (en) | 2016-12-06 | 2019-04-02 | Nio Usa, Inc. | Lease observation and event recording |
US10473750B2 (en) | 2016-12-08 | 2019-11-12 | Calamp Corp. | Systems and methods for tracking multiple collocated assets |
US11022671B2 (en) | 2016-12-08 | 2021-06-01 | Calamp Corp | Systems and methods for tracking multiple collocated assets |
US10074223B2 (en) | 2017-01-13 | 2018-09-11 | Nio Usa, Inc. | Secured vehicle for user use only |
US10471829B2 (en) | 2017-01-16 | 2019-11-12 | Nio Usa, Inc. | Self-destruct zone and autonomous vehicle navigation |
US10031521B1 (en) | 2017-01-16 | 2018-07-24 | Nio Usa, Inc. | Method and system for using weather information in operation of autonomous vehicles |
US9984572B1 (en) | 2017-01-16 | 2018-05-29 | Nio Usa, Inc. | Method and system for sharing parking space availability among autonomous vehicles |
US10464530B2 (en) | 2017-01-17 | 2019-11-05 | Nio Usa, Inc. | Voice biometric pre-purchase enrollment for autonomous vehicles |
US10286915B2 (en) | 2017-01-17 | 2019-05-14 | Nio Usa, Inc. | Machine learning for personalized driving |
US10611341B2 (en) | 2017-01-27 | 2020-04-07 | Nec Corporation | Monitoring system, monitoring center device, mounting device, monitoring method, processing method, and program |
US10618499B2 (en) | 2017-01-27 | 2020-04-14 | Nec Corporation | Monitoring system, monitoring center device, mounting device, monitoring method, processing method, and program |
US10647301B2 (en) | 2017-01-27 | 2020-05-12 | Nec Corporation | Monitoring system, monitoring center device, mounting device, monitoring method, processing method, and program |
US20180215348A1 (en) * | 2017-01-27 | 2018-08-02 | Nec Corporation | Monitoring system, monitoring center device, mounting device, monitoring method, processing method, and program |
US11318912B2 (en) | 2017-01-27 | 2022-05-03 | Nec Corporation | Monitoring system, monitoring center device, mounting device, monitoring method, processing method, and program |
US11811789B2 (en) | 2017-02-02 | 2023-11-07 | Nio Technology (Anhui) Co., Ltd. | System and method for an in-vehicle firewall between in-vehicle networks |
US10897469B2 (en) | 2017-02-02 | 2021-01-19 | Nio Usa, Inc. | System and method for firewalls between vehicle networks |
US10902722B2 (en) | 2017-05-11 | 2021-01-26 | Motorola Solutions, Inc. | Method for providing incident specific information at a vehicle computer |
US11356641B2 (en) * | 2017-05-24 | 2022-06-07 | Audi Ag | External depiction of photographs of a vehicle in interior in VR goggles |
CN110678353A (en) * | 2017-05-24 | 2020-01-10 | 奥迪股份公司 | Externally displaying captured images of a vehicle interior in VR glasses |
US10234302B2 (en) | 2017-06-27 | 2019-03-19 | Nio Usa, Inc. | Adaptive route and motion planning based on learned external and internal vehicle environment |
US10369974B2 (en) | 2017-07-14 | 2019-08-06 | Nio Usa, Inc. | Control and coordination of driverless fuel replenishment for autonomous vehicles |
US10599421B2 (en) | 2017-07-14 | 2020-03-24 | Calamp Corp. | Systems and methods for failsafe firmware upgrades |
US10710633B2 (en) | 2017-07-14 | 2020-07-14 | Nio Usa, Inc. | Control of complex parking maneuvers and autonomous fuel replenishment of driverless vehicles |
US11436002B2 (en) | 2017-07-14 | 2022-09-06 | CalAmpCorp. | Systems and methods for failsafe firmware upgrades |
US10837790B2 (en) | 2017-08-01 | 2020-11-17 | Nio Usa, Inc. | Productive and accident-free driving modes for a vehicle |
US10635109B2 (en) | 2017-10-17 | 2020-04-28 | Nio Usa, Inc. | Vehicle path-planner monitor and controller |
US11726474B2 (en) | 2017-10-17 | 2023-08-15 | Nio Technology (Anhui) Co., Ltd. | Vehicle path-planner monitor and controller |
US10606274B2 (en) | 2017-10-30 | 2020-03-31 | Nio Usa, Inc. | Visual place recognition based self-localization for autonomous vehicles |
US10935978B2 (en) | 2017-10-30 | 2021-03-02 | Nio Usa, Inc. | Vehicle self-localization using particle filters and visual odometry |
US11924303B2 (en) | 2017-11-06 | 2024-03-05 | Calamp Corp. | Systems and methods for dynamic telematics messaging |
US11206171B2 (en) | 2017-11-07 | 2021-12-21 | Calamp Corp. | Systems and methods for dynamic device programming |
US10717412B2 (en) | 2017-11-13 | 2020-07-21 | Nio Usa, Inc. | System and method for controlling a vehicle using secondary access methods |
US10369966B1 (en) | 2018-05-23 | 2019-08-06 | Nio Usa, Inc. | Controlling access to a vehicle using wireless access devices |
CN109649315A (en) * | 2019-01-11 | 2019-04-19 | 四川虫洞科技有限公司 | A kind of vehicle Internet of Things safe rescue system applied on vehicle |
CN111596552A (en) * | 2019-02-21 | 2020-08-28 | 上海擎感智能科技有限公司 | Intelligent home interaction method, system, medium and vehicle-mounted terminal based on vehicle-mounted terminal |
US11292430B2 (en) * | 2019-05-24 | 2022-04-05 | Ford Global Technologies, Llc | Systems and methods for securing a vehicle and its content after a bailout operation |
DE102019122248A1 (en) * | 2019-08-19 | 2021-02-25 | Zf Active Safety Gmbh | Vehicle assistance system, vehicle and alarm system |
US10940832B1 (en) | 2019-09-18 | 2021-03-09 | Toyota Motor North America, Inc. | Identifying suspicious events relating to a vehicle |
CN110989371A (en) * | 2019-11-13 | 2020-04-10 | 上海博泰悦臻电子设备制造有限公司 | Intelligent household control method and system |
GB2592667A (en) * | 2020-03-06 | 2021-09-08 | Ford Global Tech Llc | Location-based parking |
GB2592667B (en) * | 2020-03-06 | 2022-12-14 | Ford Global Tech Llc | Location-based parking |
CN112073683A (en) * | 2020-08-14 | 2020-12-11 | 开沃新能源汽车集团股份有限公司 | Remote driving device based on 5G |
CN112524754A (en) * | 2020-11-16 | 2021-03-19 | 珠海格力电器股份有限公司 | Data synchronization device and method of electric appliance control system and air conditioner control system |
US20220396217A1 (en) * | 2021-06-10 | 2022-12-15 | Firstech, LLC | Method for event notification with vehicle camera |
US12134356B2 (en) | 2021-06-10 | 2024-11-05 | Firstech, LLC | Vehicle camera and event notification |
CN115297097A (en) * | 2022-07-07 | 2022-11-04 | 广州市大周电子科技有限公司 | A vehicle-mounted all-in-one machine system and all-in-one machine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040257208A1 (en) | Remotely controllable and configurable vehicle security system | |
US10654448B2 (en) | Vehicle security system | |
US9809196B1 (en) | Methods and systems for vehicle security and remote access and safety control interfaces and notifications | |
US7808371B2 (en) | Vehicle fleet security system | |
US20160129883A1 (en) | Contact detect feature of a vehicle and notifications to enable live views of vehicle | |
US9734694B2 (en) | Systems and methods for programming, controlling and monitoring wireless networks | |
EP2218060B1 (en) | Alarm device for the protection of property | |
US7064657B2 (en) | Method and system for accessing and viewing images of a vehicle interior | |
US20050242971A1 (en) | System and method for safe disablement of mobile pieces of equipment (MPEs) | |
AU679840B2 (en) | Interactive control of remote equipment | |
US20090042518A1 (en) | Information processing system, information processing apparatus and method, and program | |
WO1995013944A1 (en) | Programmable multi-access verification vehicle monitoring system | |
EP1255235B1 (en) | Vehicle security system | |
US20140070929A1 (en) | Key Fob with Alarm Notification | |
GB2363028A (en) | Surveillance system with remote receiving unit. | |
US9111432B2 (en) | Mobile duress dynamic registration and pendant management system | |
JP2002304686A5 (en) | ||
US20220124453A1 (en) | System And Method For Increasing The Security Of Road Users Without An Own Motor Vehicle | |
JP3950393B2 (en) | Vehicle warning system | |
JP2001338374A (en) | Moving object position confirmation system and method | |
JP2001063525A (en) | Vehicle anti-theft system | |
US20140159883A1 (en) | Intrusion and theft alert device remotely armed and disarmed by mobile platform application | |
JP2002302014A (en) | Vehicle control device, on-vehicle monitor, vehicle control and monitor method and program, recording medium recording vehicle control and monitor program, and action flow in vehicle control device in forgetting set of security mode | |
JP2002302015A (en) | On-vehicle monitor, vehicle monitor method and program, record medium recording vehicle monitor program, and vehicle control system | |
JP6973890B2 (en) | Work equipment monitoring system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |