JP2011013745A - Stolen car recovery support system and stolen car recovery support method - Google Patents

Stolen car recovery support system and stolen car recovery support method Download PDF

Info

Publication number
JP2011013745A
JP2011013745A JP2009155055A JP2009155055A JP2011013745A JP 2011013745 A JP2011013745 A JP 2011013745A JP 2009155055 A JP2009155055 A JP 2009155055A JP 2009155055 A JP2009155055 A JP 2009155055A JP 2011013745 A JP2011013745 A JP 2011013745A
Authority
JP
Japan
Prior art keywords
vehicle
stolen vehicle
system
system block
stolen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2009155055A
Other languages
Japanese (ja)
Other versions
JP5321289B2 (en
Inventor
Toshiki Haga
敏紀 芳賀
Original Assignee
Nissan Motor Co Ltd
日産自動車株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nissan Motor Co Ltd, 日産自動車株式会社 filed Critical Nissan Motor Co Ltd
Priority to JP2009155055A priority Critical patent/JP5321289B2/en
Publication of JP2011013745A publication Critical patent/JP2011013745A/en
Application granted granted Critical
Publication of JP5321289B2 publication Critical patent/JP5321289B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

[PROBLEMS] To provide a stolen vehicle recovery support system and a stolen vehicle recovery support method capable of improving the recovery rate of a stolen vehicle. [Solution] When a vehicle is stolen, the base station 3 is used for search cooperation. The terminal 4 is distributed with the characteristic information of the stolen vehicle 10 and the electronic key for the system block that prevents the stolen vehicle 10 from running, and is stored in the search cooperation terminal 4. When the search cooperation terminal 4 moves and enters the short-range communication range with the stolen vehicle 10, the search cooperation terminal 4 transmits the system block electronic key to the stolen vehicle 10 and causes the stolen vehicle 10 to be system-blocked. When the system block of the stolen vehicle 10 is completed, a reply is made to the search cooperation terminal 4.
[Selection] Figure 4

Description

  The present invention relates to a stolen vehicle collection support system and a stolen vehicle collection support method.

  Conventionally, what was described in the following patent document 1 is known as a technique regarding the system which searches a stolen vehicle. The stolen vehicle search system described in Patent Document 1 notifies the search cooperator PC of stolen vehicle information transmitted from an insurance company and stores a plurality of stolen vehicle information. The stolen vehicle search system compares the vehicle information input from the search partner PC with the stored plurality of stolen vehicle information, and provides the search partner PC with the stolen vehicle information related to the vehicle information. Is provided. Thus, the stolen vehicle search system provides stolen vehicle information for making it easy to find the stolen vehicle.

JP 2003-196482 A

  However, the stolen vehicle search system described above transmits stolen vehicle information to the search partner PC, and even if the search partner PC finds the stolen vehicle, the search partner PC sends the stolen vehicle information to the research company PC. It takes time from the time when the service is provided to the time when the stolen vehicle collection company arrives. Therefore, there is a problem that the stolen vehicle to be collected moves during this time, and the stolen vehicle cannot be efficiently collected.

  Therefore, the present invention has been proposed in view of the above-described circumstances, and an object thereof is to provide a stolen vehicle collection support system and a stolen vehicle collection support method that can improve the collection rate of a stolen vehicle.

  In order to solve the above-mentioned problem, the present invention transmits the characteristic information of the stolen vehicle and the electronic key for the system block of the stolen vehicle to the search cooperation terminal, and the search cooperation terminal is connected to the in-vehicle system of the stolen vehicle. On the other hand, by transmitting the system block electronic key, the in-vehicle system disables the vehicle using the system block electronic key transmitted from the search cooperation terminal.

  According to the present invention, by transmitting the characteristic information of the stolen vehicle and the system block electronic key of the stolen vehicle to the search cooperation terminal, the system block electronic key is sent from the search cooperation terminal to the in-vehicle system. Can be sent. Thereby, even if a stolen vehicle exists outside the communicable range of the base station for wireless communication, the recovery rate of the stolen vehicle can be improved.

It is a block diagram which shows the structure of the stolen vehicle collection assistance system shown as embodiment of this invention. It is a block diagram which shows the functional structure of each part which comprises the stolen vehicle collection assistance system shown as embodiment of this invention. In the stolen vehicle collection support system shown as the embodiment of the present invention, it is a sequence diagram showing an operation procedure when the stolen vehicle is present within a mobile phone area. It is a block diagram which shows operation | movement when a stolen vehicle becomes out of the range of a mobile telephone in the stolen vehicle collection assistance system shown as embodiment of this invention. In the stolen vehicle collection support system shown as the embodiment of the present invention, it is a sequence diagram showing an operation procedure when the stolen vehicle exists outside the range of the mobile phone. It is a sequence diagram which shows the process sequence which transmits stolen vehicle detailed information from the center apparatus to the terminal for search cooperation in the stolen vehicle collection assistance system shown as embodiment of this invention. It is a block diagram which shows the operation | movement which carries out the system block of a stolen vehicle by an in-vehicle system in the stolen vehicle collection assistance system shown as embodiment of this invention. It is a figure which shows the signal processing of the electronic key for system blocks in the stolen vehicle collection assistance system shown as embodiment of this invention. It is a system diagram which shows operation | movement when the search of a stolen vehicle is complete | finished in the stolen vehicle collection assistance system shown as embodiment of this invention.

  Hereinafter, embodiments of the present invention will be described with reference to the drawings.

[Configuration of stolen vehicle collection support system]
The stolen vehicle collection support system shown as an embodiment of the present invention includes, as shown in FIGS. 1 and 2, for example, a center device 1, a base station 3, an in-vehicle system 2 mounted in the stolen vehicle 10, and search cooperation. The terminal 4 and the theft finder terminal 5 perform information communication.

  The stolen vehicle collection support system notifies the center device 1 of a theft occurrence from a theft finder terminal 5 possessed by a theft finder who has found theft at the theft occurrence point P when a vehicle theft occurs at a certain point. Is transmitted (1). On the other hand, the center apparatus 1 transmits a vehicle search mail transmission request to the base station (base station for wireless communication) 3 having the wireless communication range 3A (cell phone communication possible area) including the theft occurrence point P. (2). This vehicle search mail transmission request includes the characteristic information of the stolen vehicle 10 and the system block electronic key of the stolen vehicle 10. Then, the base station 3 transmits vehicle search request mail data to the search cooperation terminal 4 held by the search cooperator registered in advance (3). As a result, the base station 3 transmits the characteristic information of the stolen vehicle 10 and the system block electronic key of the stolen vehicle 10 to the search cooperation terminal 4 existing in the wireless communication range 3A centering on the base station 3. To do.

  On the other hand, the search cooperation terminal 4 receives the feature information of the stolen vehicle 10 and the system block electronic key of the stolen vehicle 10 transmitted from the center device 1 via the base station 3. The system block electronic key is transmitted to the in-vehicle system 2 installed in the system 10. The in-vehicle system 2 uses the system block electronic key transmitted from the search cooperation terminal 4 to perform an operation that makes the vehicle unrunnable. The operation that disables running includes control for prohibiting starting the engine and operation for maintaining a braked state.

  Hereinafter, a stolen vehicle collection support system that performs such an operation will be described. FIG. 2 is a diagram illustrating a functional configuration of each unit constituting the stolen vehicle collection support system.

  The center device 1 is a so-called service provider that provides information for collecting the stolen vehicle 10. The center device 1 includes a communication device 1a, a message creation unit 1b, and a base station control unit 1c. When a theft occurrence notification is generated, the center device 1 creates a vehicle search mail by the message creation unit 1b and transmits the mail data to the base station 3 by the base station control unit 1c.

  Note that the center device 1 can perform voice communication with the theft finder terminal 5 and the collector of the stolen vehicle 10 in accordance with the operation of the operator. Further, the center device 1 can perform various types of information processing in accordance with instructions according to operator operations.

  The in-vehicle system 2 includes a mobile phone communication device 2a, a GPS communication device 2b, a short-range communication device 2c, a stolen vehicle tracking device 2d, a vehicle system block function unit 2e, and a control unit 2f. In addition, the function of this vehicle-mounted system 2 shall be mentioned later.

  The vehicle system block function unit 2e includes a drive mechanism that drives the stolen vehicle 10 on which the in-vehicle system 2 is mounted so as not to run. The vehicle system block function unit 2e operates the drive mechanism in accordance with the vehicle system block command to disable the stolen vehicle 10 from traveling. In addition, the vehicle system block function unit 2e stores in advance a system block electronic key as electronic data different from the vehicle system block function unit 2e mounted in the other in-vehicle system 2. The vehicle system block function unit 2e operates the drive mechanism when the system block electronic key stored in its own memory matches the system block electronic key transmitted from the search cooperation terminal 4 described later. Thus, the stolen vehicle 10 can be disabled.

  The stolen vehicle tracking device 2d performs control to operate the vehicle system block function unit 2e when the vehicle is stolen. The stolen vehicle tracking device 2d has a system block electronic key data storage medium 2da. The system block electronic key stored in the system block electronic key data storage medium 2da is data that permits the vehicle system block function unit 2e to operate and disable the vehicle when the vehicle is stolen. It is.

  The base station 3 includes a communication device 3a. In response to receiving the vehicle search mail from the center device 1, the communication device 3a transfers the vehicle search mail to the search cooperation terminal 4 according to a predetermined communication protocol. The range in which the base station 3 transmits the vehicle search mail is within a predetermined area centered on the base station 3 including the theft occurrence point P of the stolen vehicle 10 in the communication range. This is to reduce the return of unnecessary information from the search cooperation terminal 4 and to make the search for the stolen vehicle 10 more efficient. The area limiting method for transmitting the vehicle search mail is such that the center device 1 calculates the time from the predicted theft based on the time when the theft occurrence notification is received to the mail transmission time, and the predicted vehicle travel speed. The reach of the stolen vehicle 10 is predicted from the above. The center device 1 sends an SMS by so-called SMS cell broadcast after instructing the broadcast position to the base station 3. This transmission procedure is defined by 3GPP.

  The search cooperation terminal 4 includes a short-range communication device 4a, a mobile phone communication device 4b, a GPS communication device 4c, an electronic mail function unit 4d, and a system block electronic key data storage medium 4e. The short-range communication device 4a performs short-range communication with the short-range communication device 2c of the in-vehicle system 2 without passing through the base station 3, and exchanges data.

  The short-range communication device 2c of the in-vehicle system 2 and the short-range communication device 4a of the search cooperation terminal 4 can employ any existing technology capable of communicating in units of several meters. For example, a keyless communication device mounted on a vehicle, a Bluetooth device, a wireless LAN, a door opening / closing communication device using proximity communication such as a Felica system, and the like can be used.

  Theft finder terminal 5 includes a mobile phone communication device 5a, a GPS communication device 5b, and an electronic mail function unit 5c. The theft finder terminal 5 is operated by the theft finder and transmits a theft occurrence notification to the center device 1 by voice by the mobile phone communication device 5a. Alternatively, the theft discoverer terminal 5 transmits a theft occurrence notification as mail data to the center device 1 by the electronic mail function unit 5c. Further, in order to transmit the theft occurrence point P to the center device 1, the theft finder terminal 5 can transmit the current position by the GPS communication device 5 b. The current location of the theft occurrence point P is attached to e-mail data including a theft occurrence notification, for example, and transmitted to the center apparatus 1.

[Basic operation of stolen vehicle collection support system]
Next, the operation of the stolen vehicle collection support system configured as described above will be described with reference to FIG. In FIG. 3, among the information exchanged at the theft finder terminal 5, the center device 1, and the in-vehicle system 2, information indicated by a dotted line is information exchanged between people, and is indicated by a solid line. What is shown is information exchanged as communication data. Therefore, the information indicated by the solid line is transmitted and received using communication resources generated by software provided in each unit using hardware resources such as a communication I / F circuit. Therefore, the information indicated by the solid line is not interpreted as being exchanged by a person's telephone voice, fax, or other means.

  When the theft discoverer discovers the theft of the stolen vehicle 10 at the theft occurrence point P, the theft discoverer operates the theft finder terminal 5 and transmits a vehicle theft occurrence notification S1 to the center device 1. This notification S1 may be a voice using the mobile phone communication device 5a or an electronic mail using the electronic mail function unit 5c. At this time, the theft discoverer terminal 5 may transmit the current position as the theft occurrence point P by the GPS communication device 5b as communication data.

  Next, the center apparatus 1 receives the notification S1 through the communication device 1a. At this time, the center apparatus 1 inputs the theft occurrence point P as latitude / longitude data, which is an electrical signal, by an operator's input operation according to the voice.

  Next, the center device 1 transmits a position confirmation message S2 to the stolen vehicle 10 by the communication device 1a. This location confirmation message S2 is sent from the center device 1 to the stolen vehicle 10 using the mail address or IP address of the in-vehicle system 2 for the information about the theft finder terminal 5 stored in advance. Create Further, the position confirmation message S2 is distributed via the base station 3 in which the area where the theft occurrence point P exists is the wireless communication range 3A. At this time, the center device 1 recognizes the base station 3 including the theft occurrence point P as the wireless communication range 3A with reference to the database describing the correspondence relationship between the longitude / latitude data and the base station 3, and A position confirmation message S2 is transmitted to the station 3. The position confirmation message S2 may be, for example, an email created by the message creation unit 1b, or may be communication data according to another communication method.

  The in-vehicle system 2 receives the position confirmation message S2 transmitted from the center device 1 by the mobile phone communication device 2a. The in-vehicle system 2 measures the current position by the GPS communication device 2b (ST1), and includes it in the stolen vehicle position response message S3 including the current position information acquired by the GPS communication device 2b and its own mail address or IP address. To the center device 1. The stolen vehicle position response message S3 may be e-mail data or IP data, and is transmitted from the mobile phone communication device 2a.

  The center device 1 receives the stolen vehicle position response message S3. Then, the center device 1 displays the stolen vehicle position response message S3 by a display device or the like. As a result, the operator of the center device 1 notifies the theft finder terminal 5 of the confirmation of the intention of securing the stolen vehicle 10 S4. On the other hand, the center device 1 receives the securing request S5 for the stolen vehicle 10 from the theft discoverer terminal 5. At this time, the center device 1 and the theft finder terminal 5 may perform voice communication via the mobile phone communication device 5a of the theft finder terminal 5, send an e-mail, and intend to secure the stolen vehicle 10 Confirmation S4 and securing request S5 for stolen vehicle 10 may be exchanged.

  Next, the center apparatus 1 transmits a stolen vehicle system block command S6 to the in-vehicle system 2. At this time, the center device 1 creates communication data in which the mail address or IP address included in the stolen vehicle position response message S3 is set as the destination mail address or IP address. The stolen vehicle system block command S6 is a command for making the stolen vehicle 10 unmovable by the vehicle system block function unit 2e of the in-vehicle system 2, and is a data string that can be interpreted by the vehicle system block function unit 2e of the in-vehicle system 2. is there. The stolen vehicle system block command S6 is distributed via the base station 3 into the wireless communication range 3A of the base station 3.

  The center device 1 does not need to send / receive the stolen vehicle 10 securing intention confirmation S4 and the stolen vehicle 10 securing request S5 after receiving the stolen vehicle position response message S3. That is, the center device 1 may automatically generate the stolen vehicle system block command S6 and transmit it to the in-vehicle system 2 in response to receiving the stolen vehicle position response message S3 as communication data.

  When the in-vehicle system 2 exists in the wireless communication range 3A of the base station 3, the mobile phone communication device 2a can receive the stolen vehicle system block command S6. When the in-vehicle system 2 receives the stolen vehicle system block command S6, the vehicle system block function unit 2e causes the vehicle to be unable to travel (ST2). In addition, a known technique can be used for the operation of the vehicle system block function unit 2e.

  Next, when the vehicle system block function unit 2e disables traveling, the in-vehicle system 2 periodically transmits its own vehicle position S7 to the center device 1 by the GPS communication device 2b. The own vehicle position S7 is also response data indicating that the vehicle has become unable to travel.

  The center device 1 receives the vehicle position S7 from the in-vehicle system 2. Thereby, the center apparatus 1 can acquire the own vehicle position of the stolen vehicle 10 continuously.

  Next, the center apparatus 1 notifies a vehicle collection message S8 to the vehicle collection person by the mobile phone communication device 2a. At this time, the center apparatus 1 may transmit a vehicle recovery message S8 as e-mail data to the vehicle collector's PC, or send a vehicle recovery message S8 by voice to the vehicle collector's mobile phone. Also good.

  Thereby, a vehicle collection person implements vehicle collection with respect to the stolen vehicle 10 carrying the vehicle-mounted system 2 (S9). When carrying out the vehicle collection, the vehicle collection person notifies the center apparatus 1 of the vehicle collection by voice or e-mail (S10). When the center device 1 acquires the vehicle recovery notification S10 from the vehicle recovery person, the center device 1 notifies the theft finder terminal 5 of the vehicle recovery by voice or electronic mail (S11).

  As described above, when the stolen vehicle 10 is present in the wireless communication range 3A of the base station 3, the stolen vehicle collection support system transmits the position confirmation message S2 from the center device 1 via the base station 3 to the communication data. Delivered by. Then, the in-vehicle system 2 in the wireless communication range 3A can receive the position confirmation message S2 by the mobile phone communication device 2a. Accordingly, the in-vehicle system 2 can automatically return the stolen vehicle position response message S3 as communication data to the center apparatus 1 in response to the position confirmation message S2. Thereafter, the center device 1 transmits a stolen vehicle system block command S6 as communication data to the in-vehicle system 2 and drives the vehicle system block function unit 2e of the in-vehicle system 2 to transmit the stolen vehicle. 10 can be disabled.

[Other operations of stolen vehicle collection support system]
However, in the above-described stolen vehicle collection support system, when the stolen vehicle 10 exists in the wireless communication range 3A of the base station 3, the center device 1 sends the stolen vehicle system block command S6 via the base station 3, It can be received by the in-vehicle system 2. However, as shown in FIG. 4, even if the theft occurrence point P exists in the wireless communication range 3A of the base station 3, the stolen vehicle 10 may not exist in the wireless communication range 3A. In such a case, even if the center device 1 transmits the stolen vehicle system block command S6 via the base station 3, it cannot be received by the in-vehicle system 2.

  Therefore, the stolen vehicle collection support system transmits the detailed information of the stolen vehicle 10 to the search cooperation terminal 4 via the base station 3 and stores it in the search cooperation terminal 4. The search cooperation terminal 4 is held by the search partner and moves outside the wireless communication range 3A. When the search cooperation terminal 4 and the in-vehicle system 2 of the stolen vehicle 10 come close to a communicable distance, the search cooperation terminal 4 performs data communication with the stolen vehicle 10 that matches the detailed information of the stolen vehicle 10. Thereby, the vehicle-mounted system 2 can make the said stolen vehicle 10 untravelable by the vehicle system block function part 2e.

  Such an operation is as shown in FIG.

  First, a vehicle theft occurrence notification S1 is transmitted from the theft finder terminal 5 to the center apparatus 1 by voice or electronic mail by the mobile phone communication device 5a.

  Next, the center device 1 transmits a position confirmation message S2 to the in-vehicle system 2 of the stolen vehicle 10 by the communication device 1a. At this time, the center device 1 creates a position confirmation message S2 to be transmitted to the stolen vehicle 10 by using the mail address or IP address of the in-vehicle system 2 for the information about the theft detecter terminal 5 stored in advance. The position confirmation message S2 may be, for example, an email created by the message creation unit 1b, or may be communication data according to another communication method.

  Next, the center apparatus 1 receives the notification S1 through the communication device 1a. At this time, the center apparatus 1 inputs the theft occurrence point P as latitude / longitude data, which is an electrical signal, by an operator's input operation according to the voice.

  Next, the center device 1 transmits a position confirmation message S2 to the stolen vehicle 10 by the communication device 1a. This location confirmation message S2 is transmitted by the center device 1 to the in-vehicle system 2 of the stolen vehicle 10 by using the mail address or IP address of the in-vehicle system 2 for the information about the theft finder terminal 5 stored in advance. Created as communication data. Further, the position confirmation message S2 is distributed via the base station 3 in which the area where the theft occurrence point P exists is the wireless communication range 3A. At this time, the center device 1 recognizes the base station 3 including the theft occurrence point P as the wireless communication range 3A with reference to the database describing the correspondence relationship between the longitude / latitude data and the base station 3, and A position confirmation message S2 is transmitted to the station 3. The position confirmation message S2 may be, for example, an email created by the message creation unit 1b, or may be communication data according to another communication method.

  When the in-vehicle system 2 of the stolen vehicle 10 does not exist within the wireless communication range 3A of the base station 3, the position confirmation message S2 is not received by the mobile phone communication device 2a of the in-vehicle system 2. Therefore, the center device 1 cannot obtain a response to the position confirmation message S2. The fact that the position confirmation message S2 cannot be received is notified to the operator by display or voice by the center device 1. The operator notifies the theft finder terminal 5 that the operation of the stolen vehicle 10 is started (S21). Note that the center device 1 includes a timer circuit (not shown), and automatically enters “operation of the stolen vehicle 10” as e-mail data when the predetermined time has elapsed from the transmission time of the position confirmation message S2. A message included in the data may be created and automatically transmitted to the theft detecter terminal 5.

  Next, the center apparatus 1 transmits the stolen vehicle detailed information S22 as communication data to the base stations 3 around the theft occurrence point P by broadcast communication. The stolen vehicle detailed information S22 may be e-mail created by the message creating unit 1b, for example, or may be communication data according to another communication method. The stolen vehicle detailed information S22 includes theft of the stolen vehicle 10, characteristic information of the stolen vehicle 10, and an electronic key for system block that can be used only once. The characteristic information of the stolen vehicle 10 includes the model, color, registration number, image data, and the like of the stolen vehicle 10.

  The characteristic information of the stolen vehicle 10 is stored in the center device 1 in advance. In other words, the center device 1 stores in advance, as electronic data, vehicle owner information, vehicle feature information, and system block electronic keys as a database. The center device 1 may store the owner's mobile phone number and electronic mail address as electronic data. Thereby, in this example, the theft finder terminal 5 is the owner's mobile phone, the database is searched using the phone number or the e-mail address of the mobile phone as key information, and the feature information and system block of the stolen vehicle 10 An electronic key can be obtained. Then, the center device 1 can relay it as electronic data by the base station 3 in an e-mail format or the like by the message creation unit 1b using the acquired characteristic information of the stolen vehicle 10, and the search cooperation terminal 4 can transmit the electronic data. It is possible to create stolen vehicle detailed information S22 in a receivable data form.

  The stolen vehicle detailed information S22 is transmitted only to the search cooperation terminal 4 in which the destination information of the search cooperation terminal 4 is stored in the center device 1 in advance. Note that the destination information of the search cooperation terminal 4 includes a signal that can transmit the stolen vehicle detailed information S22 as electronic data, such as an e-mail address and an IP address.

  The stolen vehicle detailed information S22 is transmitted only to the search cooperating terminals 4 of search cooperators existing around the theft occurrence point P among the search cooperating terminals 4 in which the destination information is stored. For this reason, the center apparatus 1 stores in advance predetermined registration position information where the search cooperator exists with respect to the destination information of the search cooperation terminal 4. This registered position information is information that can be changed by selection of a search partner. Thus, in order to limit the transmission area of the stolen vehicle detailed information S22 from the base station 3, using a communication method called SMS cell broadcast, only the search cooperation terminal 4 in the vicinity of the stolen vehicle 10, The stolen vehicle detailed information S22 may be transmitted. This SMS cell broadcast has been put into practical use in the field of earthquake early warning, for example, and is a technique for delivering short messages simultaneously to terminals belonging to a specific cell (region).

  The transmission process of this stolen vehicle detailed information S22 is shown in FIG.

  The center device 1 first transmits a theft occurrence notification S41 by SMS cell broadcast to the search cooperation terminal 4. Here, the center apparatus 1 is a cell broadcast service provider. Then, the center device 1 transmits a theft occurrence notification S41 to the search cooperation terminal 4 existing in a predetermined cell by the cell broadcast. The theft occurrence notification S41 is data called SMS (short message service), for example. At this time, the center apparatus 1 broadcasts the theft occurrence notification S41 to the search cooperation terminals 4 existing in the cell including the theft occurrence point P.

  The search cooperation terminal 4 that has received the theft occurrence notification S41 automatically responds to the theft occurrence notification S41. At this time, the search cooperation terminal 4 returns a response notification S42 as a response to the reception of the theft occurrence notification S41 to the center device 1. This response notification S42 is data called, for example, SMS (Short Message Service).

  The center device 1 receives the response notification S42. The center device 1 refers to the registration database stored in the hard disk device or the like, and acquires, for example, an MMS (Multimedia Messaging Service) mail address from the address and mobile phone number included in the response notification S42. Then, the center device 1 transmits the stolen vehicle detailed information S22 including the mail address, the characteristic information, and the system block electronic key S43 to the center device 1.

  Upon receiving the stolen vehicle detailed information S22 from the center device 1, the search cooperation terminal 4 stores the stolen vehicle detailed information S22 in the system block electronic key data storage medium 4e.

  As described with reference to FIG. 3, it is desirable that the center device 1 periodically transmits the theft vehicle system block command S6 to the base station 3 having the wireless communication range 3A where the theft occurrence point P exists. . Thereby, when the stolen vehicle 10 enters the wireless communication range 3A of the base station 3 where the theft occurrence point P exists again, the center device 1 can cause the in-vehicle system 2 to receive the stolen vehicle system block command S6. it can. Thereby, according to a stolen vehicle collection assistance system, the vehicle system block function part 2e of the vehicle-mounted system 2 can be operated, and the stolen vehicle 10 can be made untravelable.

  Next, the search cooperation terminal 4 is held by the search partner and moved outside the radio communication range 3 </ b> A of the base station 3. Outside the wireless communication range 3A is an area where communication including a cellular phone call or the like is not possible. Then, the search cooperator finds the stolen vehicle 10. The search cooperator displays the feature information of the stolen vehicle 10 included in the stolen vehicle detailed information S22 as screen data by the search cooperation terminal 4, and when the feature information matches the feature of the stolen vehicle 10, 10 can be found.

  Hereinafter, an operation procedure for disabling the stolen vehicle 10 will be described with reference to FIG. 7 in addition to FIG.

  First, the search cooperator operates the stolen vehicle system block operation unit 4f of the search cooperating terminal 4 shown in FIG. 7 (1), and stores the detailed information on the stolen vehicle S22 stored in the system block electronic key data storage medium 4e. The included system block electronic key S23 is read out to the short-range communication device 4a (2). Thereby, the search cooperation terminal 4 transmits the system block electronic key S23 by the near field communication device 4a as the communication data by the near field communication device 4a (3).

  Next, the in-vehicle system 2 receives the system block electronic key S23 transmitted from the near field communication device 4a of the search cooperation terminal 4 by the near field communication device 2c. Upon receipt of the system block electronic key S23, the short-range communication device 2c outputs a request to the stolen vehicle tracking device 2d to disable the stolen vehicle 10 from traveling by the system block (4).

  The stolen vehicle tracking device 2d determines whether or not the received system block electronic key S23 is a valid one issued by the center device 1. For this purpose, the stolen vehicle tracking device 2d collates the system block electronic key S23 with the system block electronic key stored in the system block electronic key data storage medium 2da in advance. When the electronic keys for both system blocks match, the state shifts to a state in which the engine start of the stolen vehicle 10 is prohibited. At this time, the stolen vehicle tracking device 2d outputs a start prohibition instruction command in response to an inquiry from the engine start control device 2e 'that is one function of the vehicle system block function unit 2e.

  Thereby, the vehicle-mounted system 2 operates the vehicle system block function part 2e, and makes a vehicle impossible to drive. At this time, the stolen vehicle tracking device 2d performs control for prohibiting restart of the engine (S12). When the stolen vehicle tracking device 2d disables the stolen vehicle 10, the stolen vehicle tracking device 2d outputs a system block result to the short-range communication device 2c (5).

  A system block electronic key collating process for system-blocking the stolen vehicle 10 will be described with reference to FIG. FIG. 8 shows data processed by the center device 1, the search cooperation terminal 4, and the in-vehicle system 2 of the stolen vehicle 10.

  The center device 1 generates system block electronic key delivery data based on the system block electronic key data stored in advance for each vehicle. This system block electronic key is encrypted and distributed using a public key cryptosystem (RSA or the like) and decrypted by the in-vehicle system 2.

  The center device 1 stores a system block electronic key for each vehicle and a public key on the in-vehicle system 2 side used for the public key cryptosystem algorithm in pairs. First, the center device 1 stores the encrypted data 102 obtained by encrypting the system block electronic key 101 for the in-vehicle system 2 of the stolen vehicle 10 that does not respond to the position confirmation message S2 with the public key of the stolen vehicle 10. create. The center device 1 adds the key expiration date data 103 to the encrypted data 102, and encrypts the encrypted data 102 and the key expiration date data 103 with a secret key of a public key cryptosystem uniquely held by the center device 1. Encrypted encrypted data 104 is created.

  The center device 1 transmits the encrypted data 104 including the system block electronic key 101 and the key expiration date data 103 to the search cooperation terminal 4.

  The search cooperation terminal 4 receives the encrypted data 104 transmitted from the center device 1. When the search cooperation terminal 4 receives the encrypted data 104, as shown in FIG. 8B, the stored data 106 in which the encrypted data 104 and the searcher ID 105 uniquely assigned to each search cooperation person are paired. Is stored in the system block electronic key data storage medium 4e. The stored data 106 is transmitted to the in-vehicle system 2 by the short-range communication device 4a of the search cooperation terminal 4.

  The in-vehicle system 2 receives the stored data 106 from the search cooperation terminal 4 by the short-range communication device 2c. As a result, as shown in FIG. 8C, the in-vehicle system 2 can acquire the encrypted data 104 and the extracted searcher ID 105 '.

  Next, the in-vehicle system 2 decrypts the encrypted data 104 of the stored data 106 using the public key of the center device 1 uniquely assigned to the center device 1. As a result, the in-vehicle system 2 can acquire the encrypted data 102, the extracted key expiration date data 103 ', and the extracted searcher ID 105' as the decrypted data 104 'as shown in FIG. 8D.

  As a result, the in-vehicle system 2 can read the extraction key expiration date data 103 ′ for the system block electronic key 101 that is the encrypted data 102 and acquire the expiration date of the system block electronic key 101. Here, if the in-vehicle system 2 fails to decrypt the encrypted data 104, the in-vehicle system 2 cannot correctly acquire the extraction key expiration date data 103 '. Therefore, the in-vehicle system 2 determines that the stored data 106 received from the search cooperation terminal 4 is abnormal data, and discards the stored data 106 without performing the system block of the in-vehicle system 2.

  If the in-vehicle system 2 determines that the system block electronic key 101 is a system block electronic key within the expiration date as a result of reading the extracted key expiration date data 103 ′, the in-vehicle system 2 extracts the encrypted data 102 from the decrypted data 104 ′. Then, the in-vehicle system 2 decrypts the encrypted data 102 with the secret key of the in-vehicle system 2 stored in advance in the memory. As a result, the in-vehicle system 2 can obtain the extracted extraction system block electronic key 101 ′ as shown in FIG. The in-vehicle system 2 can collate the extraction system block electronic key 101 'with the system block electronic key stored in the system block electronic key data storage medium 2da.

  The in-vehicle system 2 executes the system block by the vehicle system block function unit 2e if the two system block electronic keys match, and stores the system block in the system block electronic key data storage medium 2da for verification. The system block electronic key is discarded, and the searcher ID 105 ′ is stored. Thereby, the vehicle-mounted system 2 can lose the effectiveness of the system block electronic key without performing verification even if the system block electronic key is transmitted from another search cooperation terminal 4 thereafter. That is, the system block electronic key distributed to the plurality of search cooperation terminals 4 can be used once.

  On the other hand, if the two system block electronic keys do not match, the system block function unit 2e does not execute the system block, but the extraction system block electronic key 101 ′, the extraction key expiration date data 103 ′, and the extraction Searcher ID 105 ′ is discarded.

  Returning to FIG. 5, as described above, when the in-vehicle system 2 executes the system block by the vehicle system block function unit 2 e and disables the stolen vehicle 10, the short-range communication device 2 c performs the system block as communication data. A result response S24 is returned to the search cooperation terminal 4 (6). This system block result response S24 is received as communication data by the short-range communication device 4a of the search cooperation terminal 4 and stored as communication data.

  Further, the system block result response S24 preferably includes the position information acquired by the GPS communication device 2b. This position information is the discovery position of the stolen vehicle 10. In this case, when the search cooperation terminal 4 receives the system block result response S24, the location information of the stolen vehicle 10 is also stored in the memory.

  A search cooperator who owns another search cooperation terminal 4 finds the stolen vehicle 10 and transmits the system block electronic key S23 from the search cooperation terminal 4 to the in-vehicle system 2. However, since the in-vehicle system 2 has already completed the system block by the vehicle system block function unit 2e, the locked notification as communication data is notified to the search cooperation terminal 4 that has transmitted the system block electronic key S23. Reply.

  Thereafter, as shown in FIG. 9, when the search cooperation terminal 4 is held by the search cooperation person B (the locker of the stolen car 10) and the search cooperation terminal 4 enters the communication area of the mobile phone, the search cooperation terminal 4 The cooperation terminal 4 transmits a stolen vehicle discovery notification S25 (lock completion mail) to the center device 1. The stolen vehicle discovery notification S25 includes location information acquired by the GPS communication device 2b included in the system block result response S24 received from the in-vehicle system 2. The stolen vehicle discovery notification S25 includes the searcher ID 105 shown in FIG. The stolen vehicle discovery notification S25 is transmitted to the center device 1 via the base station 3.

  When the search cooperation terminal 4 detects that the mobile phone communication device 2a has entered a range where communication is possible, the search cooperation terminal 4 automatically transmits to the center device 1 by e-mail that the stolen vehicle 10 has been found. May be. This e-mail is acquired by the GPS communication device 2b indicating that the destination e-mail address is the e-mail address of the center device 1 and specifying the stolen vehicle 10 such as the registration number of the stolen vehicle 10 and the stop position of the stolen vehicle 10 It includes location information, searcher ID of search partner, and the like. This e-mail may be automatically created by the control unit 2f executing software stored in the in-vehicle system 2. The stolen vehicle discovery notification S25 is transmitted to the center apparatus 1 via the base station 3.

  When the center device 1 receives the stolen vehicle discovery notification S25, the center device 1 transmits search completion to the theft finder terminal 5 that has transmitted the vehicle theft occurrence notification S1. Thereafter, the center device 1 transmits a system block electronic key discard instruction S26 as communication data to the search cooperation terminal 4 (2). At this time, the center apparatus 1 transmits a system block electronic key discard instruction S26 as communication data to all the search cooperation terminals 4 that transmitted the stolen vehicle detailed information S22 via the base station 3 ( 3).

  The center device 1 receives the system block command S6 to the in-vehicle system 2 when the stolen vehicle 10 that has not been subjected to the system block by the vehicle system block function unit 2e enters the communication area of the mobile phone again. Can be made. And the center apparatus 1 is an electronic key for system blocks with respect to all the terminals 4 for search cooperation which transmitted the stolen vehicle detailed information S22, even when the vehicle-mounted system 2 implements a system block by the vehicle system block function part 2e. A discard instruction S26 is transmitted. At this time, the center apparatus 1 determines by returning the own vehicle position S7 from the in-vehicle system 2 that has implemented the system block.

  When the search cooperation terminal 4 receives the system block electronic key destruction instruction S26 transmitted from the center apparatus 1, the search cooperation terminal 4 automatically (software-likely) sends the system block electronic key destruction instruction S26. Interpreted as a command to be erased. Then, the search cooperation terminal 4 erases the system block electronic key contained in the stolen vehicle detailed information S22 stored in the memory (ST14).

  Next, the center device 1 notifies the vehicle recovery person of a vehicle recovery instruction message S27 through the mobile phone communication device 2a. At this time, the center apparatus 1 may transmit a vehicle recovery instruction message S27 as e-mail data to the vehicle collector's PC, and transmit the vehicle recovery instruction message S27 by voice to the vehicle collector's mobile phone. You may do it.

  Thereby, a vehicle collection person implements vehicle collection with respect to the stolen vehicle 10 carrying the vehicle-mounted system 2 (S28). When carrying out the vehicle collection, the vehicle collection person notifies the center apparatus 1 of the vehicle collection by voice or electronic mail (S29). When the center device 1 acquires the vehicle recovery notification S29 from the vehicle recovery person, the center device 1 notifies the theft finder terminal 5 of the success of the vehicle recovery by voice or electronic mail (S30). Thereafter, the stolen vehicle 10 is handed over to the owner as the theft discoverer (S31).

  As described above, the stolen vehicle collection support system transmits the stolen vehicle detailed information S22 from the center device 1 to the search cooperation terminal 4 even if the stolen vehicle 10 is out of the communication area of the mobile phone. The terminal 4 can receive the characteristic information of the stolen vehicle 10 and the system block electronic key. As a result, when the search cooperation terminal 4 and the stolen vehicle 10 are within a range where the short distance communication device 2c and the short distance communication device 4a can communicate with each other, System block electronic key. Thereby, the vehicle-mounted system 2 can make the stolen vehicle 10 unrunnable by the vehicle system block function unit 2e.

  Thereby, the stolen vehicle collection support system distributes the characteristic information of the stolen vehicle 10 and the electronic key for vehicle system lock to the search cooperation terminal 4 held by the searcher who seems to be in the vicinity of the stolen vehicle 10. Thus, when the stolen vehicle 10 is discovered, the system block can be implemented immediately, and the stolen vehicle 10 can be collected efficiently.

  Here, it is said that a Japanese mobile phone operator currently has an artificial coverage area of 90 to 100%, but an actual area coverage ratio is as small as 60 to 80%. This is because if the call area cover rate covers each municipal office, it is covered as a call area. The in-vehicle system 2 using the mobile phone has a risk of going out of the area of 20% to 40%, and in this case, the stolen car collection support system, when the stolen car 10 goes out of the area, The recovery rate of the stolen vehicle 10 can be improved.

  In this stolen vehicle collection support system, the in-vehicle system 2 uses the system block electronic key transmitted from the search cooperation terminal 4 to make the vehicle unmovable, and then the system block as a block success result. The result response S24 and the current position acquired by the GPS communication device 2b are transmitted to the search cooperation terminal 4, and the search cooperation terminal 4 can store the block success result and the position transmitted from the in-vehicle system 2. As a result, according to the stolen vehicle collection support system, data can be communicated using the short-range communication device 2c and the short-range communication device 4a already installed in the vehicle and the mobile phone as another application, and the search cooperation terminal By storing the block success result and the position information in 4, information such as the position information necessary for vehicle collection and the vehicle block success can be transmitted to the center apparatus 1 as communication data. Therefore, the recovery rate of the stolen vehicle 10 can be improved with certainty.

  Further, according to the stolen vehicle collection support system, the search cooperation terminal 4 can store the block success result and the current position stored in the center device 1 when the terminal 4 for search cooperation exists in a range where communication with the base station 3 is possible. The center apparatus 1 transmits the search end information to the search cooperation terminal 4 that has transmitted the stolen vehicle detailed information S22 after receiving the successful block result and the current position from the search cooperation terminal 4. After receiving the search end information from the center device 1, the search cooperation terminal 4 discards the received stolen vehicle characteristic information and the stolen vehicle system block electronic key. As a result, according to the stolen vehicle collection support system, the system block is implemented for the stolen vehicle 10, it is found that the stolen vehicle 10 has been found, and other searchers stop searching for the stolen vehicle 10. be able to.

  Furthermore, according to the stolen vehicle collection support system, the center device 1 periodically transmits the stolen vehicle system block command S6 within the area including the theft occurrence point P, and transmits the stolen vehicle system block command S6. On the other hand, when receiving the vehicle position S7 as response data indicating that the vehicle cannot travel from the in-vehicle system 2, the search cooperation terminal that has received the feature information of the stolen vehicle 10 and the system block electronic key of the stolen vehicle 4 can transmit a system block electronic key discard instruction S26. Thereby, a system block is implemented with respect to the stolen vehicle 10, it turns out that the stolen vehicle 10 was discovered, and another searcher can stop the search of the said stolen vehicle 10.

  In addition, the search range of the center device 1 and the search partner can be efficiently separated. In particular, since the area outside the calling area of a mobile phone is a place that is not easily noticeable, there is no choice but to rely on manual search. Therefore, the area where the theft vehicle system block command S6 is automatically transmitted from the center device 1 and the area where the stolen vehicle 10 is searched by the search cooperation terminal 4 can be separated.

  Furthermore, according to the stolen vehicle collection support system, the in-vehicle system 2 stores in advance the system block electronic key that disables the vehicle, and the search cooperation terminal 4 transmits the system block electronic key. In this case, when the transmitted system block electronic key matches the system block electronic key stored in the storage means, the operation for making the vehicle unable to run is performed, and the stored system block electronic key is stored. Discard the electronic key. Thus, after the in-vehicle system 2 performs the system block, the stolen vehicle collection support system loses the validity of the system block electronic key distributed to the other search cooperation terminals 4 so that the stolen vehicle 10 Search can be stopped.

  The above-described embodiment is an example of the present invention. For this reason, the present invention is not limited to the above-described embodiment, and various modifications can be made depending on the design and the like as long as the technical idea according to the present invention is not deviated from this embodiment. Of course, it is possible to change.

DESCRIPTION OF SYMBOLS 1 Center apparatus 1a Communication apparatus 1b Message preparation part 1c Base station control part 2 In-vehicle system 2a Cell-phone communication apparatus 2b GPS communication apparatus 2c Short-range communication apparatus 2d Stealing car tracking apparatus 2da System block electronic key data storage medium 2e 'engine Start control device 2e Vehicle system block function unit 2f Control unit 3 Base station 3a Communication device 4 Search cooperation terminal 4a Short-range communication device 4b Mobile phone communication device 4c GPS communication device 4d E-mail function unit 4e Storage for system block electronic key data Medium 4f Theft vehicle system block operation unit 5 Theft finder terminal 5a Mobile phone communication device 5b GPS communication device 5c E-mail function unit

Claims (6)

  1. A stolen vehicle collection support system that performs communication processing of information between an in-vehicle system, a search cooperation terminal, and a center device,
    The center device communicates with the search cooperation terminal existing in a predetermined area centered on the wireless communication base station via the wireless communication base station existing at the theft occurrence point. And the electronic key for the system block of the stolen vehicle,
    The search cooperation terminal receives the feature information of the stolen vehicle and the system block electronic key of the stolen vehicle transmitted from the center device, and the system block for the in-vehicle system mounted on the stolen vehicle. Send an electronic key for
    The stolen vehicle collection support system, wherein the in-vehicle system performs an operation of making the vehicle unmovable using the system block electronic key transmitted from the search cooperation terminal.
  2. The in-vehicle system uses the system block electronic key transmitted from the search cooperation terminal to make the vehicle unmovable, and then obtains the block success result and the current position acquired by the position information acquisition means as the search cooperation. To the device for
    The stolen vehicle collection support system according to claim 1, wherein the search cooperation terminal stores a successful block result and a position transmitted from the in-vehicle system.
  3. When the search cooperation terminal exists in a range where communication with the base station for wireless communication is possible, the stored block success result and the current position are transmitted to the center device,
    The center device, after receiving the block success result and the current position from the search cooperation terminal, to the search cooperation terminal that has received the feature information of the stolen vehicle and the system block electronic key of the stolen vehicle Send exit information,
    3. The theft according to claim 2, wherein the search cooperation terminal discards the received stolen vehicle characteristic information and the stolen vehicle system block electronic key after receiving the search end information from the center device. Car collection support system.
  4. The center device periodically transmits a system block command for disabling the vehicle by the in-vehicle system to the area including the theft occurrence point via the wireless communication base station,
    When the center device receives response data indicating that the vehicle cannot travel from the in-vehicle system in response to the transmission of the system block command, the center device receives the characteristic information of the stolen vehicle and the system block electronic for the stolen vehicle. Send search end information to the search cooperation terminal that has received the key,
    3. The theft according to claim 2, wherein the search cooperation terminal discards the received stolen vehicle characteristic information and the stolen vehicle system block electronic key after receiving the search end information from the center device. Car collection support system.
  5. The in-vehicle system includes storage means for storing a system block electronic key that disables the vehicle in advance,
    When a system block electronic key is transmitted from the search cooperation terminal, if the transmitted system block electronic key matches the system block electronic key stored in the storage means, the vehicle is The stolen vehicle collection support system according to claim 1, wherein an operation for disabling travel is performed to discard the system block electronic key stored in the storage unit.
  6. A stolen vehicle collection support method for performing communication processing of information between an in-vehicle system, a search cooperation terminal, and a center device,
    Feature information of the stolen vehicle with respect to the search cooperation terminal existing in a predetermined area centered on the base station for wireless communication via the base station for wireless communication existing at the theft occurrence point by the center device And the search cooperation terminal stores the feature information of the stolen vehicle and the system block electronic key of the stolen vehicle transmitted from the center device,
    When the search cooperation terminal exists in the short-range wireless communication range with the stolen vehicle, the system block electronic key is transmitted to the in-vehicle system mounted on the stolen vehicle,
    The stolen vehicle collection support method, wherein the in-vehicle system performs an operation of making the vehicle unmovable using the system block electronic key transmitted from the search cooperation terminal.
JP2009155055A 2009-06-30 2009-06-30 Stolen vehicle collection support system and stolen vehicle collection support method Active JP5321289B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2009155055A JP5321289B2 (en) 2009-06-30 2009-06-30 Stolen vehicle collection support system and stolen vehicle collection support method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2009155055A JP5321289B2 (en) 2009-06-30 2009-06-30 Stolen vehicle collection support system and stolen vehicle collection support method

Publications (2)

Publication Number Publication Date
JP2011013745A true JP2011013745A (en) 2011-01-20
JP5321289B2 JP5321289B2 (en) 2013-10-23

Family

ID=43592611

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2009155055A Active JP5321289B2 (en) 2009-06-30 2009-06-30 Stolen vehicle collection support system and stolen vehicle collection support method

Country Status (1)

Country Link
JP (1) JP5321289B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101214365B1 (en) 2011-04-05 2012-12-21 동아대학교 산학협력단 Withdrawal Supporting System And Method For Stolen Vehicle, And Apparatus Supporting The Same
JP2012256986A (en) * 2011-06-07 2012-12-27 Fujitsu Ltd Radio communication system, radio communication terminal and subscriber information management device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09240431A (en) * 1996-03-01 1997-09-16 Nissan Motor Co Ltd Vehicle burglary protective device
JP2002236785A (en) * 2001-02-13 2002-08-23 Honda Motor Co Ltd Stolen car information processing system
JP2003036493A (en) * 2001-07-23 2003-02-07 Matsushita Electric Ind Co Ltd Theft tracking/urgent report device
JP2003118550A (en) * 2001-10-12 2003-04-23 Denso Corp Vehicle stop control system and vehicle control device
JP2003196764A (en) * 2001-12-25 2003-07-11 Fujitsu Ten Ltd Device and system for preventing vehicle robbery
JP2004086547A (en) * 2002-08-27 2004-03-18 Matsushita Electric Ind Co Ltd Portable electronic key
JP2006211014A (en) * 2005-01-25 2006-08-10 Matsushita Electric Ind Co Ltd Search support system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09240431A (en) * 1996-03-01 1997-09-16 Nissan Motor Co Ltd Vehicle burglary protective device
JP2002236785A (en) * 2001-02-13 2002-08-23 Honda Motor Co Ltd Stolen car information processing system
JP2003036493A (en) * 2001-07-23 2003-02-07 Matsushita Electric Ind Co Ltd Theft tracking/urgent report device
JP2003118550A (en) * 2001-10-12 2003-04-23 Denso Corp Vehicle stop control system and vehicle control device
JP2003196764A (en) * 2001-12-25 2003-07-11 Fujitsu Ten Ltd Device and system for preventing vehicle robbery
JP2004086547A (en) * 2002-08-27 2004-03-18 Matsushita Electric Ind Co Ltd Portable electronic key
JP2006211014A (en) * 2005-01-25 2006-08-10 Matsushita Electric Ind Co Ltd Search support system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101214365B1 (en) 2011-04-05 2012-12-21 동아대학교 산학협력단 Withdrawal Supporting System And Method For Stolen Vehicle, And Apparatus Supporting The Same
JP2012256986A (en) * 2011-06-07 2012-12-27 Fujitsu Ltd Radio communication system, radio communication terminal and subscriber information management device

Also Published As

Publication number Publication date
JP5321289B2 (en) 2013-10-23

Similar Documents

Publication Publication Date Title
US20200162881A1 (en) Personal security system
EP3053280B1 (en) Systems and methods for programming, controlling and monitoring wireless networks
US10569739B2 (en) Virtual keyfob for vehicle sharing
DE102016100986A1 (en) Method and system for authenticating a vehicle equipped with a passive keyless system
US8918232B2 (en) Short range wireless communication between a vehicle and a handheld communications device
JP2016007004A (en) Authentication in secure user plane location (supl) systems
US9185547B2 (en) System and method for receiving call in wireless terminal
US9561779B2 (en) Start system for a motor vehicle
JP5999108B2 (en) Vehicle remote operation information providing device, in-vehicle remote operation information acquisition device, and vehicle remote operation system including these devices
US20160012728A1 (en) Wireless Locating and Monitoring System
US9084197B2 (en) Method and system for interacting with a vehicle over a mobile radiotelephone network
US6493550B1 (en) System proximity detection by mobile stations
US8059586B2 (en) Mobility management entity tracking for group mobility in wireless communication network
CN103891332B (en) Detect suspicious WAP (wireless access point)
US7733861B2 (en) Radio terminal and ad hoc communication method
CN101124842B (en) Controlling portable digital devices
US8244210B2 (en) Method for destructive readout of data in case of mobile theft
CN101568100B (en) Wireless communication system and base station accommodation server
CN103430513B (en) Tag the registration of object and method, the system of the anonymous communication relevant with the object that tags
AU2012283892B2 (en) Wireless emergency call (eCall) devices and eCall service subscription management
EP1725056B1 (en) Method for disabling a mobile device
ES2654039T3 (en) Systems and methods for automated wireless authorization to enter a geographical area
JP4592957B2 (en) Positioning data communication method and system using cellular phone network
CN101883349B (en) Mobile terminal and communication method thereof
CN101867530B (en) Things-internet gateway system based on virtual machine and data interactive method

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20120424

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20130318

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20130326

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20130524

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20130618

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20130701

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150