US20100007497A1 - Antitheft system - Google Patents
Antitheft system Download PDFInfo
- Publication number
- US20100007497A1 US20100007497A1 US12/499,385 US49938509A US2010007497A1 US 20100007497 A1 US20100007497 A1 US 20100007497A1 US 49938509 A US49938509 A US 49938509A US 2010007497 A1 US2010007497 A1 US 2010007497A1
- Authority
- US
- United States
- Prior art keywords
- key
- electronic key
- equipment
- operator
- lawnmower
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000003213 activating effect Effects 0.000 abstract description 6
- 238000004891 communication Methods 0.000 description 19
- 238000012545 processing Methods 0.000 description 17
- 239000007858 starting material Substances 0.000 description 9
- 230000005856 abnormality Effects 0.000 description 8
- 238000002485 combustion reaction Methods 0.000 description 6
- 230000008439 repair process Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 230000015556 catabolic process Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 244000025254 Cannabis sativa Species 0.000 description 3
- 230000001186 cumulative effect Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- 238000006073 displacement reaction Methods 0.000 description 2
- 239000000446 fuel Substances 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000005007 materials handling Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000011347 resin Substances 0.000 description 2
- 229920005989 resin Polymers 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000005674 electromagnetic induction Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 239000002828 fuel tank Substances 0.000 description 1
- 239000003502 gasoline Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000010248 power generation Methods 0.000 description 1
- 230000000246 remedial effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/01—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
- B60R25/04—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
- B60R25/045—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor by limiting or cutting the electrical supply to the propulsion unit
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/0042—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00793—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
Definitions
- This invention relates to an antitheft system, particularly to a system for preventing equipment such as a moving object or operating machine from theft.
- each user has his/her own electronic key, and accordingly the same number of copies of the key as the users should be made.
- the operator will usually copy the key by using the authentication device installed in the equipment.
- the operator will store the key-checking data corresponding to the key to be copied and must activate the equipment every time the key is to be copied. This is troublesome and tedious.
- An object of this invention is therefore to overcome the aforesaid problem by providing an antitheft system that can make a copy of an electronic key without activating equipment such as a moving object or operating machine, while ensuring to prevent the equipment from theft.
- this invention provides a system for preventing an equipment from theft, comprising: an electronic key that is adapted to be carried by an operator of the equipment and stores authenticating data for identifying the operator who carries the electronic key; an authenticator that is installed at the equipment and performs authentication check as to whether the electronic key is an authorized key using stored key-checking data, when the authenticating data is outputted from the electronic key; and an electronic key copier that is provided separately from the equipment and copies the electronic key.
- FIG. 1 is a perspective view of a small electric vehicle on which a part of an antitheft system according to a first embodiment of this invention is mounted;
- FIG. 2 is a front view of a control panel of the vehicle shown in FIG. 1 ;
- FIG. 3 is a block diagram showing the configuration of the system for the vehicle shown in FIG. 1 ;
- FIG. 4 is a flowchart showing the operation of the system, specifically the sequence of operations of an authentication ECU thereof;
- FIG. 5 is a flowchart showing the operation of copying an electronic key among the operations of the system
- FIG. 6 is an explanatory view schematically showing authenticating data stored in the keys shown in FIG. 3 ;
- FIG. 7 is a flowchart showing the operation of writing into a first key among the operations of the system
- FIG. 8 is an explanatory view showing the relationship between the key and vehicle shown in FIG. 3 ;
- FIG. 9 is an explanatory view similar to FIG. 8 , but showing the relationship between an electronic key and a small electric vehicle according to a prior art
- FIG. 10 is a side view of a lawnmower on which a part of an antitheft system according to a second embodiment of this invention is mounted;
- FIG. 11 is a plan view of the lawnmower shown in FIG. 10 ;
- FIG. 12 is an enlarged cross-sectional view of an internal combustion engine shown in FIG. 10 ;
- FIG. 13 is a block diagram showing the configuration of the system for the lawnmower shown in FIG. 10 ;
- FIG. 14 is a flowchart showing the operation of the system shown in FIG. 10 , specifically the sequence of operations of the authentication ECU thereof;
- FIG. 15 is a subroutine flowchart showing the operation for storing operation parameters of FIG. 14 ;
- FIG. 16 is a subroutine flowchart showing the operation for storing abnormal-state operation parameters of FIG. 14 ;
- FIG. 17 is a flowchart similar to FIG. 14 , but showing the operation of the system, specifically the sequence of operations of the authentication ECU thereof;
- FIG. 18 is a flowchart showing the operation of an analyzer shown in FIG. 13 , specifically the sequence of operations of a terminal device thereof;
- FIG. 19 is an explanatory view showing operating history and other information displayed on a display unit of the terminal device shown in FIG. 13 .
- FIG. 1 is a perspective view of a small electric vehicle on which a part of an antitheft system according to a first embodiment of this invention is mounted.
- reference numeral 10 generally indicates the small electric vehicles (equipment). As illustrated, a plurality of (e.g., three) vehicles 10 are indicated by reference numerals 10 a, 10 b, 10 c. Although the vehicles 10 will be explained taking the vehicle 10 a as an example, since the other vehicles 10 b, 10 c have the substantially same configuration, the following explanation can also be applied thereto.
- the vehicle 10 is a relatively small, single-passenger, electric vehicle, precisely an electric wheelchair or electric four-wheel scooter equipped with a body frame 14 supported by four wheels 12 (one of which is not shown in FIG. 1 ), a seat 16 installed on the frame 14 to be taken by the operator (user) P, and an operation unit 20 to be manually operated by the operator P.
- the vehicle 10 is a moving object that moves at extremely low speed, i.e., at a human walking speed, and is suitable for the elderly.
- An electric motor 22 for driving the wheels 12 (specifically rear wheels) and a battery (i.e., a lead battery) 24 for supplying operating power to the motor 22 and the like are installed under the seat 16 .
- the motor 22 is a brushless motor.
- FIG. 2 is a front view of the operation unit 20 of the vehicle 10 shown in FIG. 1 .
- the operation unit 20 comprises a loop-shaped handle 20 b laterally projecting, as curving, from a dashboard 20 a, two drive levers 20 c that laterally projects and allows the operator P to input a moving/stopping instruction, a speed setting knob 20 d that allows the operator P to set a desired travel speed within a range starting continuously from 1 km/h up to 6 km/h, forward/reverse switches 20 e that allows the operator P to input a traveling direction instruction between forward and reverse travels, a horn switch 20 f that allows the operator P to sound a horn (not shown), a power switch key 20 g that allows the operator P to connects/disconnects power from the battery 24 to the motor 22 , and other components.
- Two drive switches 20 h are installed near the drive levers 20 c.
- the drive switch 20 h produces an ON signal when one of the drive levers 20 c is manipulated by the operator P to drive and an OFF signal when manipulated by the operator P to stop.
- a speed setting knob sensor 20 i is installed near the knob 20 d and produces an output or signal (speed instruction) corresponding to the desired travel speed set by the operator P through the speed setting knob 20 d.
- FIG. 3 is a block diagram showing the configuration of the antitheft system for the vehicles 10 .
- reference numeral 26 designates the antitheft system.
- the system 26 comprises an electronic key 30 that stores authenticating data (ID; explained later), a control ECU (electronic control unit) 32 installed in each vehicle 10 for controlling the operation of the motor 22 and the like, and an authentication ECU (electronic control unit; authenticator) 34 installed in each vehicle 10 for authenticating the key 30 .
- the ECUs 32 , 34 are disposed at an appropriate location in each vehicle 10 , specifically near the power switch key 20 g in the interior of the dashboard 20 a of the operation unit 20 , as clearly shown in FIG. 2 .
- the control ECU 32 comprises a microcomputer having a CPU 32 a, memory (EEPROM non-volatile memory) 32 b and other components.
- the control ECU 32 is inputted by the operator P with a traveling direction instruction through the forward/reverse switch 20 e, a drive instruction through the drive switch 20 h, and a speed instruction through the speed setting knob sensor 20 i.
- the control ECU 32 controls the operation of the motor 22 and the like in response to those instructions, thereby controlling the operation of the vehicle 10 .
- the operator P selects a traveling direction using the forward/reverse switch 20 e and sets desired travel speed using the speed setting knob 20 d. Then, when the operator P grips or grasps one of (or both of) the drive levers 20 c with the handle 20 b, the vehicle 10 starts moving at the set speed, and when the operator P releases it, the vehicle 10 stops.
- the authentication ECU 34 similarly to the control ECU 32 , comprises a microcomputer having a CPU 34 a, memory (EEPROM (non-volatile memory)) 34 b for storing key-checking data (explained later), and other components.
- the authentication ECU 34 further comprises a reader/writer 34 c for reading authenticating data stored in the key 30 , and an LED (light-emitting diode (signal lamp)) 34 d installed on the dashboard 20 a for informing the operator P of the result of electronic key authentication (pass/fail) which will be explained later.
- the so-configured authentication ECU 34 is connected for communication with the control ECU 32 through a serial communication line 36 .
- the ECUs 32 , 34 are connected to the battery 24 through a power line 40 to be supplied with operating power from the battery 24 .
- the key 30 is a contact-less IC (integrated circuit) card equipped with a CPU 30 a, a non-volatile memory 30 b for storing authenticating data (i.e., identification data (user ID) for identifying the operator P who carries the key 30 and identification information (product ID) for identifying the model, product number, etc., of the vehicles 10 ), and an antenna 30 c for exchange (input/output) with the reader/writer 34 c of authenticating data and the like by short-distance wireless communication (RFID: Radio Frequency Identification).
- the IC card constituting the key 30 is a card made of resin and houses the CPU 30 a and other components in its interior. As shown in FIG. 2 , it is made portable to be carried by the operator P.
- the key 30 Upon receipt of the radio wave transmitted by the reader/writer 34 c, the key 30 generates power by electromagnetic induction of a built-in coil (not shown), thereby activating the CPU 30 a and the like.
- the key 30 is not equipped with a battery or other internal power supply source but is supplied with operating power induced by the radio wave from the reader/writer 34 c.
- the CPU 30 a of the key 30 Upon being supplied with power, the CPU 30 a of the key 30 outputs the authenticating data stored in the memory 30 b to the reader/writer 34 c through antenna 30 c.
- the authentication ECU 34 uses the key-checking data stored in the memory 34 b to perform an authentication check to determine whether the key 30 is an authorized key.
- the key-checking data is identical to the authenticating data and is the unique data (user ID and product ID) set for each vehicle 10 a, 10 b, 10 c.
- the ECU 34 performs the authentication by comparing the authenticating data in the key 30 with the key-checking data. Specifically, the authenticating data and the key-checking data are compared each other to determine whether they are identical, and the key 30 moved to the reader/writer 34 c is discriminated to be an authorized key for the vehicle 10 if they are the same and not to be an authorized key if they do not match.
- the key 30 is thus a contact-less (wireless) IC card that can input/output (communicate) authenticating data and the like when the operator P merely moves it to, but out of contact with, the reader/writer 34 c of the authentication ECU 34 .
- the explanation of the system 26 will be continued.
- the system 26 comprises, in addition to the authentication ECU 34 , etc., an electronic key copying unit (electronic key copier) 42 for copying the key 30 .
- an electronic key copying unit electronic key copier
- the copying unit 42 is solely provided for a plurality of (three) vehicles 10 a, 10 b, 10 c, separately or independently therefrom.
- the copying unit 42 is equipped with a terminal device 44 for making a copy and a reader/writer 46 connected to the device 44 .
- the device 44 is a personal computer having a CPU 44 a, a memory 44 b, an input unit 44 c including a keyboard, mouse and the like (none of which is shown) operable by the operator P, and a display unit 44 d including a display (screen).
- the device 44 is connected to a power source (e.g., a commercial power source; not shown) that supplies operating power.
- a power source e.g., a commercial power source; not shown
- the reader/writer 46 operates similarly to the reader/writer 36 c of the authentication ECU 34 . Specifically, when the key 30 is moved near, the reader/writer 46 outputs a radio wave to the key 30 , thereby supplying operating power to the key 30 , reads authenticating data from the key 30 , and writes new authenticating data (explained later) into the key 30 .
- FIG. 4 is a flowchart showing the operation of the system 26 , specifically the sequence of operations of the authentication ECU 34 thereof. The illustrated program is executed only once when the associated vehicle 10 is started.
- the battery 24 commences supplying the authentication ECU 34 with operating power.
- the program begins in S 10 , in which the reader/writer 34 c outputs radio wave to the key 30 to supply operating power.
- the program next proceeds to S 12 , in which the authentication of the key 30 is performed using the authenticating data outputted from the key 30 and key-checking data.
- the program then proceeds to S 14 , in which it is determined whether the key 30 was found to be an authorized key for the vehicle 10 .
- the program proceeds to S 16 , in which a signal enabling the operation of the motor 22 is sent to the control ECU 32 , whereafter the program is terminated.
- the control ECU 32 starts controlling the operation of the motor 22 in accordance with the instructions inputted via the running switch 20 h, etc., whereby the vehicle 10 is operated normally.
- the program proceeds to S 18 , in which the signal lamp 34 d is lit to inform the operator P that the key 30 was found to be not the authorized key, and to S 20 , in which a signal disabling the operation of the motor 22 is sent to the control ECU 32 .
- the ECU 32 stops the operation of the motor 22 , thereby stopping the operation of the associated vehicle 10 , regardless of instructions inputted from the running switch 20 h and the like.
- the system 26 prevents the vehicle 10 from theft.
- each operator P When the vehicles 10 a, 10 b, 10 c are to be shared by multiple operators P, it is convenient for each operator P to have his/her own key 30 , and accordingly the same number of copies of the key 30 as the operators P should be made. If each copy of the key 30 can activate all of the vehicles 10 a, 10 b, 10 c, it further enhances convenience.
- FIG. 5 is a flowchart showing the operation of copying the key 30 .
- the illustrated operation is conducted in the terminal device 44 when the key 30 is moved to the reader/writer 46 of the copying unit 42 .
- the authenticating data (ID) is stored in the memory 30 b of the key 30 .
- the key 30 falls into two types, i.e., a first electronic key (master key) 301 and a second electronic key (duplicate key) 302 , depending on a kind of the stored authenticating data.
- FIG. 6 is an explanatory view schematically showing the authenticating data stored in the first and second keys 301 , 302 .
- the first keys 301 before copying are shown on the left side in the drawing and the first and second keys 301 , 302 after copying on the right side.
- the first keys 301 are designated by reference numerals 301 a, 301 b, 301 c.
- the first keys 301 a, 301 b, 301 c (before copying) each stores the authenticating data (ID) corresponding to the associated vehicle 10 a, 10 b, 10 c.
- ID-a the authenticating data corresponding to (i.e., capable to activate) the vehicle 10 a
- ID-b the authenticating data corresponding to the vehicles 10 b, 10 c
- ID-c the authenticating data corresponding to the vehicles 10 b, 10 c are indicated by ID-b, ID-c, respectively.
- the authenticating data (ID) in the first key 301 is an ID with which the copying unit 42 can make a duplicate key and hereinafter called the master ID (indicated as “(Master)” in FIG. 6 ).
- the first key 301 is a key that can be copied by the copying unit 42 .
- the second key 302 is a duplicate key of the first key 301 made by the copying unit 42 and does not store the authenticating data (ID) constituted of the master ID.
- ID authenticating data
- the key 30 falls into two types of the first key 301 and the second key 302 depending on a kind of the stored authenticating data, i.e., on whether the authenticating data is the master ID.
- the authenticating data with a term of “copy” in parentheses indicates a copy of the master ID made by the copying unit 42 and hereinafter called the “copy ID.”
- the key 30 when the operator P moves the key 30 to the reader/writer 46 , the key 30 is supplied with operating power induced by the radio wave and outputs the authenticating data.
- the program proceeds to S 104 , in which it is determined whether an instruction to issue a key ID is inputted by the operator P.
- the key ID is an ID (number) assigned to the key 30 .
- the processing of S 104 is conducted for determining whether the operator P has inputted an ID (e.g., ID-a) to be assigned to the key 30 using the input unit 44 c (i.e., has instructed to issue the ID), in other words, for checking as to whether the operator P desires to copy the key 30 .
- the program proceeds to S 108 , in which an indication of “copying disapproved” appears on the display unit 44 d to inform the operator P that a copy of the key 30 cannot be made and the routine ends.
- the copying unit 42 is configured to enable copying of the key 30 only from the first key 301 , i.e., disable copying from the second key 302 .
- the program proceeds to S 110 , in which the authenticating data (ID) read in S 100 is copied and stored in the memory 44 b as the copy ID. Then the program proceeds to S 112 , in which it is determined whether an instruction to successively perform the processing of storing a copy of the authenticating data by using another first key 301 is inputted, and when the result is affirmative, the program returns to S 100 and the foregoing processing is repeated.
- the operator P inputs a continuation instruction after a copy of the authenticating data (ID-a (Copy)) of the first key 301 a is stored, while the first key 301 b (or the first key 301 c ) is moved to the reader/writer 46 .
- the processing from S 100 to S 112 is repeated three times and accordingly, the three authenticating data (ID-a (Copy), ID-b (Copy), ID-c (Copy)) are stored in the memory 44 b.
- the program next proceeds to S 116 , in which an indication of “copying completed” is displayed on the display unit 44 d to inform the operator P of completion of the second key 302 .
- the second key 302 shown in FIG. 6 i.e., the second key 302 having only copies of the three authenticating data (copy IDs), is made.
- the program then proceeds to SI 18 , in which it is determined whether the operator P inputs an instruction to produce another second key 302 successively. When the result is negative, the program is terminated, while, when the result is affirmative, the processing of S 114 and S 116 is repeated to make another second key 302 .
- copies of the three authenticating data are written into the first keys 301 .
- the three authenticating data are stored in the first key 301 , thereby enabling the first key 301 to operate or activate all the vehicles 10 a, 10 b, 10 c.
- FIG. 7 is a flowchart showing the operation of writing into the first key 301 .
- the illustrated operation is conducted in the terminal device 44 when the key 30 is moved to the reader/writer 46 after the routine of FIG. 5 ended.
- the key 30 When the operator P moves the key 30 to the reader/writer 46 , the key 30 is supplied with operating power induced by the radio wave and outputs the authenticating data.
- the program starts at S 200 , in which the outputted authenticating data is read and proceeds to S 202 , in which the read authenticating data is displayed on the display unit 44 d.
- the program next proceeds to S 204 , in which it is determined whether an instruction to write the copied authenticating data (copy ID) is inputted by the operator P. When the result is negative, the processing of S 204 is repeated until the operator P inputs the writing instruction, and when the result is affirmative, the program proceeds to S 206 , in which it is determined whether the key 30 near the reader/writer 46 is the first key 301 .
- the program proceeds to S 208 , in which the three authenticating data (copy IDs, i.e., ID-a (Copy), ID-b (Copy), ID-c (Copy)) stored in the memory 44 b are written into the first key 301 .
- the first key 301 shown on the right side in FIG. 6 i.e., the first key 301 storing the one master ID and three copy IDs, is made.
- the program proceeds to S 210 , in which an indication of “copy ID writing disapproved” is displayed on the display unit 44 d to inform the operator P that writing of the copy ID is not conducted and the routine ends.
- the copying unit 42 is configured to be disabled to write the copy ID into an electronic key other than the first key 301 , after making the second key 302 .
- the authentication ECU 34 can authenticate the keys 301 , 302 as the authorized keys at the next starting of the vehicle 10 .
- each of the first and second keys 301 , 302 can store a plurality of (three) authenticating data (ID-a (Copy), ID-b (Copy), ID-c (Copy)) corresponding to the vehicles 10 a, 10 b, 10 c. Therefore, each of the multiple operators P 1 , P 2 , P 3 , P 4 can own the key 30 , i.e., the first keys 301 a, 301 b, 301 c or the second key 302 , and operate or activate all of the vehicles 10 a, 10 b, 10 c by the key 30 .
- each duplicate key 30 stores different authenticating data (ID-a, ID-b or ID-c).
- the authentication ECU 34 of the vehicle 10 stores key-checking data corresponding to the respective duplicate keys 30 and hence, the vehicles 10 have to be activated one by one to rewrite the key-checking data.
- the system 26 according to the first embodiment is provided with the copying unit 42 separately from the associated vehicle 10 , it becomes possible to make a copy of the key 30 without activating the associated vehicle 10 . Further, since the key 30 stores the three authenticating data (ID-a, ID-b, ID-c), it becomes possible to activate all of the vehicles 10 a, 10 b, 10 c by the single key 30 .
- the first embodiment is configured to have a system ( 26 ) for preventing an equipment (small electric vehicle 10 ) from theft, comprising: an electronic key ( 30 ) that is adapted to be carried by an operator of the equipment and stores authenticating data for identifying the operator who carries the electronic key; an authenticator (authentication ECU 34 , S 12 , S 14 ) that is installed at the equipment and performs authentication check as to whether the electronic key is an authorized key using stored key-checking data, when the authenticating data is outputted from the electronic key; and an electronic key copier (copying unit 42 , S 100 -S 118 , S 200 -S 210 ) that is provided separately from the equipment and copies the electronic key.
- an electronic key authentication ECU 34 , S 12 , S 14
- an electronic key copier copying unit 42 , S 100 -S 118 , S 200 -S 210
- the copying unit 42 is provided separately from or independently of the associated vehicle 10 , it becomes possible to make a copy of the key 30 without activating the associated vehicle 10 , and by providing the key 30 and the authentication ECU 34 , it becomes possible to prevent the equipment from theft.
- the electronic key ( 30 ) comprises at least one of a first electronic key ( 301 ) and a second electronic key ( 302 ) copied from the first electronic key by the electronic key copier, and the electronic key copier inhibits additional copying of the second electronic key (S 106 , S 108 ).
- the electronic key copier inhibits additional copying of the second electronic key (S 106 , S 108 ).
- the equipment comprises a plurality of moving objects (small electric vehicles 10 a, 10 b, 10 c ) and the electronic key stores authenticating data in a same number as that of the equipment.
- the electronic key copier (copying unit 42 ) comprises a terminal device ( 44 ), and a reader/writer ( 46 ) that is connected to the terminal device and reads the authenticating data outputted from the electronic key ( 30 ) and writes the authenticating data to the electronic key.
- the equipment comprises electric vehicles ( 10 a, 10 b, 10 c ). With this, it becomes possible to make a copy of the key 30 without activating the vehicles 10 a, 10 b, 10 c, as well as preventing theft of the vehicles 10 a, 10 b, 10 c.
- the electronic key ( 30 ) comprises an IC card.
- FIG. 10 is a side view of a lawnmower on which a part of an antitheft system according to a second embodiment of this invention is mounted and FIG. 11 is a plan view thereof.
- the reference numeral 50 indicates a lawnmower (operating machine; equipment).
- the lawnmower 50 is a non-riding self-propelled lawnmower with two front wheels 52 F and two rear wheels 52 R (a total of four wheels), and a handlebar 54 .
- a general-purpose internal combustion engine (hereinafter called “engine”) 58 is installed beneath an engine cover 56 on a frame mounted on the four wheels 52 F and 52 R.
- the engine 58 is equipped with a recoil starter 60 installed to be manually operable by the operator P (shown only in FIG. 10 ).
- a crankshaft 62 of the engine 58 is connected to a rear wheel drive axle 66 via a belt 64 , as shown in FIG. 10 .
- the drive axle 66 is connected to the rear wheels 52 R via a gear mechanism 68 .
- a rear wheel electromagnetic clutch 70 is disposed in the middle of the drive axle 66 , and the clutch 70 cuts off the transmission of engine output to the rear wheels 52 R.
- a grass-cutting blade 72 is mounted on the distal end of the crankshaft 62 .
- a blade electromagnetic clutch 74 is disposed between the blade 72 and the belt 64 in the crankshaft 62 , and the clutch 74 cuts off the transmission of engine output to the blade 72 .
- a grass bag 76 is installed in the rear part of the lawnmower 50 , so that the grass cut by the blade 72 is collected in the grass bag 76 .
- a drive lever 78 and a drive switch 80 which produces an ON signal when the drive lever 78 is moved to tilt forward by the operator P in the traveling direction of the lawnmower 50 are installed near the distal end of the handlebar 54 .
- a blade switch 82 is installed on the drive lever 78 . The blade switch 82 produces an ON signal when pressed once by the operator P, and terminates producing the ON signal when pressed again.
- FIG. 12 is an enlarged cross-sectional view of the engine 58 shown in FIG. 10 .
- the engine 58 has a cylinder 86 , and a piston 88 is accommodated therein to reciprocate.
- An air intake valve 92 and an exhaust valve 94 are disposed at a position facing a combustion chamber 90 of the engine 58 to open and close the connection between the combustion chamber 90 and an intake passage 96 or exhaust passage 98 .
- the engine 58 specifically comprises an air-cooled, four-cycle, single cylinder OHV engine, and has a displacement of, for example, 163 cc.
- the piston 88 is coupled with the crankshaft 62 .
- One end of the crankshaft 62 is attached with a flywheel 100 and the distal end of the flywheel 100 is attached with the recoil starter 60 .
- the blade 72 is installed on the other end of the crankshaft 62 via the blade electromagnetic clutch 74 .
- a magneto coil (alternator) 106 is mounted on the side of a crankcase 104 so as to face the permanent magnets 102 .
- the crankshaft 62 is rotated by operation of the recoil starter 60 or reciprocal motion of the piston 88 , the magneto coil 106 generates alternating current in synchronous with the rotation.
- the alternating current generated by the magneto coil 106 is converted to direct current by a processing circuit (not shown) to be supplied as operating power to a control ECU, authentication ECU (explained later), ignition circuit (not shown) and the like.
- the engine 58 can be started by the operator P by the recoil starter 60 , so it is not equipped with a battery. In other words, it is a battery-less type general purpose internal combustion engine.
- a throttle body 108 is installed in the intake passage 96 .
- a throttle valve 110 and an electric motor 112 for driving the throttle valve 110 are accommodated in the throttle body 108 .
- a carburetor assembly (not shown) is provided at a location upstream of the throttle valve 110 and injects gasoline fuel supplied from a fuel tank (indicated by reference numeral 114 in FIGS. 10 and 11 ). The resulting air-fuel mixture is drawn into the combustion chamber 90 through the throttle valve 110 , intake passage 96 and air intake valve 92 .
- a throttle position sensor 116 is disposed near the motor 112 and produces an output or signal indicative of position (throttle opening) ⁇ TH of the throttle valve 110 .
- a crank angle sensor 118 composed of an electromagnetic pickup is installed near the flywheel 100 and produces a pulse signal at every predetermined crank angle.
- FIG. 13 is a block diagram showing the configuration of the antitheft system for the lawnmower 50 on which the engine 58 is mounted.
- the antitheft system is assigned by the reference numeral 26 a in FIG. 13 .
- the system 26 a is equipped with an electronic key 122 that stores, in addition to authenticating data, information on the operating history of the lawnmower 50 (explained later), a control ECU 124 that is installed in the lawnmower 50 and controls the operation of the engine 58 and other components, and an authentication ECU 126 that is installed in the lawnmower 50 for authenticating the key 122 .
- the ECUs 124 , 126 are both disposed at suitable locations in the lawnmower 50 , i.e., inside the engine cover 56 near the recoil starter 60 .
- the control ECU 124 comprises a microcomputer having a CPU 124 a, memory (EEPROM non-volatile memory) 124 b, a counter (not shown) and the like.
- the outputs of the throttle position sensor 116 and crank angle sensor 118 are sent to the control ECU 124 , which counts the pulses outputted by the crank angle sensor 118 to calculate (detect) the engine speed NE.
- the control ECU 124 Based on the detected engine speed NE and throttle position ⁇ TH, calculates a current supply command value for operating the motor 112 so as to make the engine speed NE equal to a predetermined desired speed (e.g., 2,000 rpm) and outputs the calculated command value to the motor 112 to control its operation.
- a predetermined desired speed e.g., 2,000 rpm
- the control ECU 124 is further inputted with a drive command (ON signal) from the operator P using the drive switch 80 and with a blade operation command (ON signal) from the operator P using the blade switch 82 .
- a drive command ON signal
- a blade operation command ON signal
- the control ECU 124 engages the rear wheel magnetic clutch 70 to transmit the rotational output of the engine 58 to the rear wheels 52 R, whereby the lawnmower 50 is self-propelled.
- the control ECU 124 engages the blade magnetic clutch 74 to transmit the rotational output of the engine 58 to the blade 72 , thereby rotating the blade 72 to enable mowing.
- the authentication ECU 126 comprises, similarly to the control ECU 124 , a microcomputer having a CPU 126 a, a memory (EEPROM) 126 b for storing key-checking data and the like, a counter (not shown) and other components.
- the authentication ECU 126 is further equipped with a reader/writer 126 c for reading from the key 122 authenticating data stored therein and writing to the key 122 information indicative of the operating condition of the lawnmower 50 (i.e., information on the operating history and failure of the lawnmower 50 (service data) to be explained later) and with an LED 126 d for informing the operator P of the result of electronic key authentication (pass/fail) and the like.
- the authentication ECU 126 is connected for communication with the control ECU 124 through a serial communication line 128 .
- the ECUs 124 , 126 are connected to the magneto coil 106 through a power line 130 to be supplied with operating power generated by the magneto coil 106 .
- the key 122 is a contact-less IC card similar to that in the first embodiment equipped with a CPU 122 a, a non-volatile memory 122 b for storing authenticating data (i.e., identification data (user ID) for identifying the operator P and identification information (product ID) for identifying the model and the like of the lawnmower 50 ), and an antenna 122 c for exchange (input/output) with the reader/writer 126 c of authenticating data and the like by short-distance wireless communication.
- authenticating data i.e., identification data (user ID) for identifying the operator P and identification information (product ID) for identifying the model and the like of the lawnmower 50
- an antenna 122 c for exchange (input/output) with the reader/writer 126 c of authenticating data and the like by short-distance wireless communication.
- the IC card constituting the key 122 is also made of resin and houses the CPU 122 a and other components in its interior. As shown in FIG. 10 , the card is made portable to be carried by the operator P.
- the key 122 may be the first key (master key) or may be the second key (duplicate key).
- the authentication ECU 126 copies (writes) information on the operating history and the like in the memory 122 b of the key 122 using the reader/writer 126 c. This will be explained later.
- the system 26 a having the authentication ECU 126 , etc. is further equipped with an analyzer 132 for reading and analyzing information stored in the key 122 .
- the analyzer 132 is installed at, independently of the lawnmower 50 , such as a repair shop associated with a lawnmower sales outlet (not shown).
- the analyzer 132 is equipped with a terminal device 134 used to analyze the operating history and other information on the lawnmower 50 , and a reader/writer 136 connected to the device 134 .
- the device 134 is a personal computer having a CPU 134 a, a memory 134 b, an input unit 134 c comprising a keyboard, mouse and the like (none of which is shown) operable by the operator P, and a display unit 134 d comprising a display (screen).
- the device 134 is connected to a power source (e.g., a commercial power source) that supplies operating power.
- the reader/writer 136 operates similarly to the reader/writer 126 c of the authentication ECU 126 . Specifically, when the key 122 is moved thereto, the reader/writer 136 outputs radio wave to the key 122 , thereby supplying the key 122 with operating power, and reads the authenticating data, operating history and other information stored in the key 122 .
- the device 134 is configured to be able to access an information system server 144 through a communication circuit 140 and the Internet (Web; public communication network) 142 .
- the server 144 stores parts data including the specifications, price, inventory and the like of the components (e.g., the engine 58 and authentication ECU 126 ) constituting the lawnmower 50 .
- the server 144 stores specifications, inventory and other parts data required for ordering a part of the lawnmower 50 when that part fails.
- the analyzer 132 can copy the key 122 using the devise 134 and reader/writer 136 .
- the copying operation is performed in the same manner as that by the electronic key copying unit 42 in the first embodiment, so the explanation thereof is omitted.
- the analyzer 132 also functions as an electronic key copying unit.
- FIG. 14 is a flowchart showing the operation of the system 26 a, specifically the sequence of operations of the authentication ECU 126 thereof.
- the illustrated program is executed at predetermined intervals (e.g., every 100 milliseconds).
- the program begins at S 300 , in which it is determined whether the bit of a flag ST is set to 0.
- the bit of the flag ST is set in a later processing step.
- the bit thereof (initial value 0) being set (reset) to 0 indicates that the current program loop is the first program loop following starting of the engine 58 , and its being set to 1 indicates that the current program loop is the second or a later program loop.
- the result in S 300 is affirmative and the program proceeds to S 302 , in which the value of an operating event counter CNT indicative of the number of times the lawnmower 50 has been operated is incremented by 1, and to S 304 , in which the bit of the flag ST is set to 1. Therefore, in the next program loop the result in S 300 is negative and S 302 and S 304 are skipped.
- the program next proceeds to S 306 , in which the operation parameters of the lawnmower 50 to be inputted to and outputted from the control ECU 124 are stored (saved) in the memory 126 b.
- These parameters include the throttle position ⁇ TH detected based on the output of the throttle position sensor 116 , the engine speed NE detected based on the output of the crank angle sensor 118 , the current supply command value for the motor 112 , the drive command (ON signal) from the drive switch 80 , and the blade operation command (ON signal) from the blade switch 82 .
- FIG. 15 is a subroutine flowchart showing the sequence of operations for storing operation parameters of FIG. 14 .
- the program begins at S 400 , in which the present (latest) operation parameters of the lawnmower 50 are sent from the control ECU 124 through the serial communication line 128 to be inputted to and stored in the memory 126 b.
- the program then proceeds to S 402 , in which operation parameters stored a first predetermined time earlier (e.g., 1 minute earlier) are erased from the memory 126 b.
- operation parameters stored a first predetermined time earlier e.g., 1 minute earlier
- S 402 is skipped (not executed).
- the operation parameters are collected in (inputted to) the memory 126 b periodically (i.e., every 100 milliseconds) for storage of time-series data (i.e., time-series data over a predetermined period (1 minute)).
- the program next proceeds to S 308 , in which it is determined whether any abnormality has arisen in the stored operation parameters, specifically whether any abnormality has arisen in the operation parameters because of failure of a component (e.g., the engine 58 ) of the lawnmower 50 .
- the processing of S 308 is conducted by comparing the operation parameters with threshold values set for the operation parameters.
- the threshold values are defined as values that enable determination of failure of components of the lawnmower 50 .
- the program proceeds to S 310 , in which it is determined whether, among the stored operation parameters, the throttle position ⁇ TH is a predetermined idle position which is set near the fully closed position.
- the program proceeds to S 312 , in which an idle operation timer is started to measure the cumulative (total) time that the engine 58 operates at the idle throttle position (the idle operation time T 1 ) and the measured value is stored in the memory 126 b, in other words, the idle operation time T 1 is measured and stored in the memory 126 b.
- the program proceeds to S 314 , in which it is determined whether the throttle position ⁇ TH is a predetermined wide-open position which is set near the fully opened position.
- the program proceeds to S 316 , in which a wide-open operation timer is started to measure the cumulative time that the engine 58 is kept operating at the wide-open throttle position (the wide-open operation time T 2 ) and the measured value is stored in the memory 126 b.
- the program proceeds to S 320 , in which the total operation duration TA corresponding to the total use (operating) time of the lawnmower 50 is calculated and stored in the memory 126 b. Specifically, the sum of the idle operation time T 1 , wide-open operation time T 2 and partially open operation time T 3 is calculated and stored as the total operation duration TA, whereafter the program is terminated.
- FIG. 16 is a subroutine flowchart showing the sequence of operations for storing the abnormal-state operation parameters in S 322 of FIG. 14 .
- the program begins in S 500 , in which the operation parameters of the lawnmower 50 are sent from the control ECU 124 through the serial communication line 128 to be inputted to and stored in the memory 126 b.
- the program next proceeds to S 502 , in which it is determined whether a second predetermined time (e.g., 1 minute) has passed since the operation parameter abnormality occurred. This determination is made in another subroutine (not shown) by starting a counter (up-counter) when the operation parameter abnormality occurs and ascertaining whether its count value has reached the second predetermined time.
- a second predetermined time e.g. 1 minute
- the program next proceeds to S 324 , in which the type of abnormality (failure) of the lawnmower 50 is estimated based on the abnormal-state operation parameters, and an error code indicating the estimated abnormality (failure) type is stored in the memory 126 b.
- information on the operating history (operation parameters, idle operation time T 1 , wide-open operation time T 2 , partially open operation time T 3 and total operation duration TA) and information on failure (abnormal-state operation parameters and error codes) of the lawnmower 50 are stored in the memory 126 b.
- the operation parameters of the most recent several cycles e.g., the most recent 5 cycles
- the memory 126 b the operation parameters of the most recent several cycles (e.g., the most recent 5 cycles) are maintained in the memory 126 b.
- FIG. 17 is a flowchart also showing the operation of the system 26 a, specifically the sequence of operations of the authentication ECU 126 .
- the program shown in FIG. 17 is executed in parallel with the processing of FIG. 14 and is executed only once at the time the engine 58 is started.
- the operator P When the operator P operates the recoil starter 60 , more exactly when, as shown in FIG. 10 , the operator P operates the recoil starter 60 (pulls the recoil starter handle) while holding the key 122 near the reader/writer 126 c of the authentication ECU 126 , the engine 58 is started, the magneto coil 106 commences power generation, and the ECU 126 is supplied with operating power.
- the program begins in S 600 , in which radio wave is outputted from the reader/writer 126 c to the key 122 , thereby supplying the key 122 with operating power, and proceeds to S 602 , in which authentication of the key 122 is performed using authenticating data outputted from the key 122 and key-checking data.
- the program next proceeds to S 604 , in which it is determined whether in S 602 the key 122 held near the reader/writer 126 c was found to be an authorized key for the lawnmower 50 . When the result is affirmative, the program proceeds to S 606 , in which the signal lamp 126 d is lit to inform the operator P that the key 122 was authenticated to be the authorized key.
- the program then proceeds to S 608 , in which it is determined whether the information on operating history and failure stored in the memory 126 b is free of abnormal-state operation parameters.
- S 608 determines whether the information on operating history and failure stored in the memory 126 b is free of abnormal-state operation parameters.
- the program proceeds to S 610 , in which the operating history information stored in the memory 126 b is reproduced in (copied to) the key 122 .
- the information (data) is outputted from the reader/writer 126 c and written to the memory 122 b of the key 122 .
- the program then proceeds to S 612 , in which the engine 58 is operated normally, whereafter the program is terminated.
- the program proceeds to S 614 , in which the signal lamp 126 d is flashed to inform the operator P that an abnormal-state operation parameter was stored in the memory 126 b during the preceding operation of the lawnmower 50 .
- the signal lamp 126 d functions to notify the operator P of any failure occurring in the lawnmower 50 .
- the program next proceeds to S 616 , in which the operating history information and failure information stored in the memory 126 b are copied to the key 122 , and to S 618 , in which the operation of the engine 58 is terminated by, for example, ignition cut-off. In other words, when a failure occurs, operation of the lawnmower 50 is not allowed.
- the program proceeds to S 620 , in which copying of the operating history and other information to the key 122 is not performed.
- S 620 copying of the operating history and other information to the key 122 is not performed.
- the program proceeds to S 622 , in which the operation of the engine 58 is terminated by ignition cut-off or some other means, thereby preventing theft of the lawnmower 50 .
- the operation of the engine 58 is terminated in S 622 when the key 122 is not the authorized key.
- this arrangement makes lawn mowing impossible but allows the lawnmower 50 to be driven at low speed, thus providing a way to deal with cases where the operator P lost the key 122 .
- the operation of the analyzer 132 which is one of the operations of the system 26 a, is explained next.
- flashing of the signal lamp 126 d as a result of the aforesaid processing makes the operator P aware that the lawnmower 50 has a problem, or at the time of a regular maintenance inspection, the operator P sends the key 122 to a shop equipped with the analyzer 132 (a shop where a technician able to service and repair the lawnmower 50 is available).
- FIG. 18 is a flowchart showing the sequence of operations of the analyzer 132 .
- the illustrated routine is performed in the terminal device 134 of the analyzer 132 when the key 122 is held near the reader/writer 136 .
- the program begins in S 700 , in which the authenticating data, operating history and other information are read by the reader/writer 136 .
- the program next proceeds to S 702 , in which the read authenticating data, etc., are displayed on the display unit 134 d.
- FIG. 19 shows the operating history and other information displayed on the display unit 134 d.
- the display unit 134 d displays information on the operating history, specifically the user ID, product ID, together with service data such as the total operation duration TA, idle operation time T 1 , wide-open operation time T 2 , partially open operation time T 3 , number of operating times (operating event counter CNT), operation parameters, error code(s) (when the lawnmower 50 has experienced a failure or the like), and abnormal-state operation parameters.
- service data such as the total operation duration TA, idle operation time T 1 , wide-open operation time T 2 , partially open operation time T 3 , number of operating times (operating event counter CNT), operation parameters, error code(s) (when the lawnmower 50 has experienced a failure or the like), and abnormal-state operation parameters.
- the service technician determines (troubleshoots) the cause of the lawnmower 50 failure. Based on the determined failure cause, the service technician takes remedial action by accessing the server 144 via the input unit 134 c of the terminal device 134 , the communication circuit 140 and the Internet 142 , specifically by placing an order for a part to replace the one that failed, with reference to the part data contained in the server 144 .
- Use of the key 122 is not limited to cases where the lawnmower 50 breaks down as discussed above.
- the operator P can send the key 122 to the maintenance shop when a periodic inspection is due, so that the service technician can use information obtained from the key 122 to estimate wear and tear on the components (engine 58 etc.) of the lawnmower 50 , thereby making it possible to perform optimum maintenance procedures.
- the key 122 stores authenticating data corresponding to each of the multiple lawnmowers 50 and operating history and failure information of the lawnmowers 50 .
- the second embodiment is configured to have a system ( 26 a ) for preventing an equipment ( 50 ) from theft, comprising: an electronic key ( 122 ) that is adapted to be carried by an operator of the equipment and stores authenticating data for identifying the operator who carries the electronic key; an authenticator ( 126 , S 602 , S 604 ) that is installed at the equipment and performs authentication check as to whether the electronic key is an authorized key using stored key-checking data, when the authenticating data is outputted from the electronic key; and an electronic key copier ( 132 ) that is provided separately from the equipment and copies the electronic key.
- a system 26 a ) for preventing an equipment ( 50 ) from theft, comprising: an electronic key ( 122 ) that is adapted to be carried by an operator of the equipment and stores authenticating data for identifying the operator who carries the electronic key; an authenticator ( 126 , S 602 , S 604 ) that is installed at the equipment and performs authentication check as to whether the electronic key is an authorized
- the electronic key ( 122 ) comprises at least one of a first electronic key ( 301 ) and a second electronic key ( 302 ) copied from the first electronic key by the electronic key copier, and the electronic key copier inhibits additional copying of the second electronic key.
- the equipment comprises an operating machine ( 50 ), and the electronic key stores authenticating data in a same number as that of the equipment.
- the system further includes: a memory ( 126 b ) that is installed at the equipment and stores information on at least one of operating history operating history (operation parameters, idle operation time T 1 , wide-open operation time T 2 , partially open operation time T 3 and total operation duration TA) and information on failure (abnormal-state operation parameters and error codes) of the equipment; and the authenticator copies the information to the electronic key ( 122 ), when performing the authentication check (S 610 , S 616 ).
- operating history operating history operation parameters, idle operation time T 1 , wide-open operation time T 2 , partially open operation time T 3 and total operation duration TA
- failure abnormal-state operation parameters and error codes
- the operating history and failure information can be easily and reliably read even when the lawnmower 50 experiences a breakdown or the like, thus offering improved convenience while also making it possible to prevent theft of the lawnmower 50 .
- the operating history and other information are copied and stored in both the memory 126 b of the lawnmower 50 and the memory 122 b of the key 122 .
- the information can be easily read from the key 122 when the lawnmower 50 experiences a breakdown or the like, simply by sending the key 122 to the repair shop (i.e., without need to haul the lawnmower 50 itself to the repair shop). Since the service technician who repairs the lawnmower 50 can therefore pinpoint the cause of the breakdown from the read information, the breakdown can be promptly dealt with (namely, the lead-time between ordering and delivery of replacement parts can be shortened), which also enhances convenience.
- the authenticator copies the information to the electronic key ( 122 ), when performing the authentication check.
- This arrangement ensures that the information can be reliably read from the key 122 if the lawnmower memory 126 b should fail. This eliminates the inconvenience of not being able to determine the failure cause because information cannot be read due to the breakdown.
- the authenticator ( 126 ) copies the information to the electronic key when the electronic key ( 122 ) is authenticated to be an authorized key (S 604 , S 610 , S 616 ), whereas the authenticator does not copy the information to the electronic key when the electronic key ( 122 ) is not authenticated to be an authorized key (S 604 , S 620 ).
- This arrangement ensures that the operating history and other information are reliably copied to the authorized key 122 and that copying of information to an electronic key other than the authorized key (an unauthorized key) is prevented.
- the system further includes: an informer ( 126 d, S 608 , S 614 ) that informs the failure of the equipment to the operator when the information on the failure of the equipment ( 50 ) is copied to the electronic key ( 122 ). With this, it becomes possible to let the operator P recognize that a failure has occurred in the equipment 50 .
- the system further includes: an analyzer ( 132 ) that is provided separately from the equipment ( 50 ) and reads the information copied in the electronic key ( 122 ) to analyze. With this, the service technician can easily read the information through the analyzer 132 at a place apart from the equipment 50 .
- the equipment comprises a lawnmower ( 50 ).
- the operating history and failure information of the lawnmower 50 can be easily and reliably read from the key 122 , thus offering improved convenience while also making it possible to prevent theft of the lawnmower 50 .
- the remaining configuration is the same as that in the first embodiment.
- the first embodiment is explained taking a moving object, i.e., the small electric vehicle 10 as an example of the equipment having the system 26 , it can be other kinds of equipment including moving objects such as four-wheeled vehicles, two-wheeled vehicles, etc., and machines such as lawnmowers, cultivators, generators, snow removal machines and materials handling machines.
- moving objects such as four-wheeled vehicles, two-wheeled vehicles, etc.
- machines such as lawnmowers, cultivators, generators, snow removal machines and materials handling machines.
- the vehicle 10 is exemplified as the equipment and it is configured to supply the motor 22 (which is a power source of the wheels 12 ), authentication ECU 34 , etc., with operating power from the battery 24
- the equipment is a machine (e.g., a lawnmower or a cultivator) having the engine as a power source
- a magneto coil, recoil starter and the like can be provided instead of the battery to supply power from the magneto coil to the authentication ECU 34 and other components (i.e., it can be battery-less).
- the second embodiment is explained taking a machine, i.e., the lawnmower 50 as an example of the equipment having the system 26 a, it can be other kinds of equipment including machines such as cultivators, generators, snow removal machines and materials handling machines, and moving objects such as four-wheeled vehicles, two-wheeled vehicles and small electric vehicles.
- machines such as cultivators, generators, snow removal machines and materials handling machines
- moving objects such as four-wheeled vehicles, two-wheeled vehicles and small electric vehicles.
- the second embodiment is aimed to have an antitheft system which, based on the configuration of the first embodiment, enables to copy the information on the operating history and on failure of the equipment. For that reason, although only single number of the lawnmower is disclosed in the second embodiment, two or more lawnmower can be used in the second embodiment.
- the lawnmower 50 is configured to supply the authentication ECU 126 , etc., with operating power not from a battery but from the magneto coil 106 (to have a battery-less configuration), it is alternatively possible to replace the magneto coil 106 with a battery and supply the authentication ECU 126 , etc., with power from the battery.
- the key 122 is constituted as an IC card, it is possible instead, for example, to incorporate a function similar to that of the key 122 in a mobile phone so that the mobile phone can send information directly to the terminal device 134 at the repair shop by electronic mail or the like via the Internet 142 .
- This configuration enhances convenience by enabling quick transmission of lawnmower 50 operating history, etc., to the terminal device 134 .
- piston displacement of the engine 58 was specified, the specified value is non-limiting example.
- the key 30 , 122 and the reader/writer 34 c, 126 c of the authentication ECU 34 , 126 are configured to exchange data using short-distance RFID wireless communication, it is alternatively possible to exchange data via another type of wireless communication means or wired communication means.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
- Burglar Alarm Systems (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/734,749 US8692652B2 (en) | 2008-07-10 | 2013-01-04 | Antitheft system |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2008180557A JP5138486B2 (ja) | 2008-07-10 | 2008-07-10 | 機器の盗難防止装置 |
| JP2008-180557 | 2008-07-10 | ||
| JP2008-180558 | 2008-07-10 | ||
| JP2008180558A JP5138487B2 (ja) | 2008-07-10 | 2008-07-10 | 機器の盗難防止装置 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/734,749 Continuation US8692652B2 (en) | 2008-07-10 | 2013-01-04 | Antitheft system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20100007497A1 true US20100007497A1 (en) | 2010-01-14 |
Family
ID=41061082
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/499,385 Abandoned US20100007497A1 (en) | 2008-07-10 | 2009-07-08 | Antitheft system |
| US13/734,749 Expired - Fee Related US8692652B2 (en) | 2008-07-10 | 2013-01-04 | Antitheft system |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/734,749 Expired - Fee Related US8692652B2 (en) | 2008-07-10 | 2013-01-04 | Antitheft system |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US20100007497A1 (enExample) |
| EP (1) | EP2143598B1 (enExample) |
| AT (1) | ATE541754T1 (enExample) |
| AU (1) | AU2009202622B2 (enExample) |
| TW (1) | TW201002557A (enExample) |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110132680A1 (en) * | 2009-12-09 | 2011-06-09 | Honda Motor Co., Ltd. | Antitheft apparatus for equipment with prime mover |
| US20110136398A1 (en) * | 2009-12-09 | 2011-06-09 | Honda Motor Co., Ltd. | Outboard motor antitheft apparatus |
| US20110248821A1 (en) * | 2010-04-08 | 2011-10-13 | Merten C William | Interlock System and Method |
| US20110298593A1 (en) * | 2010-06-04 | 2011-12-08 | Toshiba Tec Kabushiki Kaisha | Electronic device and method for controlling the same |
| US20120159152A1 (en) * | 2010-12-21 | 2012-06-21 | Kt Corporation | Method and apparatus for smart-key management |
| US20190214921A1 (en) * | 2018-01-10 | 2019-07-11 | Polaris Industries Inc. | Low loss shunt regulator |
| EP3961587A1 (en) * | 2020-08-26 | 2022-03-02 | The Hillman Group, Inc. | Duplication device for key fobs |
| US20230001886A1 (en) * | 2021-06-30 | 2023-01-05 | Audi Ag | Method and system for preventing the driving of an electrically driven vehicle |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2473956B (en) * | 2009-09-24 | 2011-12-07 | David Gilleland | Authorisation system |
| JP6147983B2 (ja) * | 2012-10-10 | 2017-06-14 | 株式会社東海理化電機製作所 | 電子キー登録システム |
| WO2016012604A1 (en) * | 2014-07-24 | 2016-01-28 | Keyline S.P.A. | Method and apparatus for duplicating keys with electronic code |
| DE102016124407B4 (de) * | 2016-12-14 | 2023-01-26 | Ujet S.A. | Anzeigevorrichtung und Authentifizierungsvorrichtung für einen Motorroller sowie Verfahren zum Steuern einer Anzeigevorrichtung und Computer-lesbares Speichermedium |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5734330A (en) * | 1994-10-11 | 1998-03-31 | Calsonic Corporation | Anti-theft car protection device |
| US6310542B1 (en) * | 1999-08-19 | 2001-10-30 | Lucent Technologies Inc. | Cognitive system for a vehicle and its occupants |
| US20020180582A1 (en) * | 1999-11-30 | 2002-12-05 | Nielsen Ernst Lykke | Electronic key device a system and a method of managing electronic key information |
| US6531955B1 (en) * | 1999-03-23 | 2003-03-11 | Henry Tzvi Brendzel | Arrangement for prevention of motor vehicle thefts |
| US20050099265A1 (en) * | 2003-11-12 | 2005-05-12 | Dix Peter J. | Central access control system |
| US7068144B2 (en) * | 2003-07-21 | 2006-06-27 | Lear Corporation | Method and system for re-learning a key |
| US20060220806A1 (en) * | 2005-03-16 | 2006-10-05 | Nguyen Huan T | Remote feedback for vehicle key fob functions |
| US7280034B2 (en) * | 2003-03-27 | 2007-10-09 | Kubota Corporation | Antitheft system for vehicle |
| DE102006018831A1 (de) * | 2006-04-22 | 2007-10-25 | Daimlerchrysler Ag | Kraftfahrzeugdiagnose und Fahrzeugannahme |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH1016714A (ja) | 1996-06-27 | 1998-01-20 | Suzuki Chizuko | 車両の盗難防止装置 |
| DE69726681T2 (de) * | 1996-10-14 | 2004-10-07 | Denso Corp | Diebstahlsicherung mit kodiertem Transponder |
| JP2001043431A (ja) | 1999-07-30 | 2001-02-16 | Honda Motor Co Ltd | 車両共有システム |
| JP4193922B2 (ja) * | 1999-09-03 | 2008-12-10 | ヤマハモーターエレクトロニクス株式会社 | 車両の盗難防止方法および装置 |
| US6501369B1 (en) * | 2000-04-11 | 2002-12-31 | Ford Global Technologies, Inc. | Vehicle security system having unlimited key programming |
| DE10202332B4 (de) * | 2002-01-23 | 2011-08-11 | Marquardt GmbH, 78604 | Schließsystem, insbesondere für ein Kraftfahrzeug |
| JP2003253936A (ja) * | 2002-02-28 | 2003-09-10 | Sony Corp | 車両、電子キー、データ処理装置及び車両管理方法 |
| JP3964764B2 (ja) | 2002-09-11 | 2007-08-22 | アルプス電気株式会社 | タイヤ空気圧異常の警告装置及び方法 |
| JP2004232277A (ja) | 2003-01-29 | 2004-08-19 | Matsushita Electric Ind Co Ltd | 電子キー及び電子キーシステム |
| JP4580635B2 (ja) * | 2003-12-10 | 2010-11-17 | ソニー株式会社 | 車載通信システムおよび通信方法、車載通信端末および通信方法、プログラム記録媒体、並びにプログラム |
| JP4136921B2 (ja) * | 2003-12-17 | 2008-08-20 | 本田技研工業株式会社 | 盗難防止機能付きエンジン始動装置 |
| US7222006B2 (en) * | 2004-01-13 | 2007-05-22 | General Motors Corporation | Method for determination of pre-authorization engine operation time for a vehicle theft deterrent system |
| JP2006127307A (ja) | 2004-10-29 | 2006-05-18 | Nippon Dempa Kogyo Co Ltd | 車両状態の通知システム及びその構成装置、通知方法 |
| DE102005030081A1 (de) * | 2005-06-27 | 2007-01-04 | Huf Hülsbeck & Fürst Gmbh & Co. Kg | System für eine schlüssellose Aktivierung einer Schließvorrichtung eines Kraftfahrzeuges |
| JP4459153B2 (ja) | 2005-10-21 | 2010-04-28 | 本田技研工業株式会社 | 小型電動車両の後部懸架装置 |
| JP2007244207A (ja) | 2006-03-13 | 2007-09-27 | Yanmar Co Ltd | 作業機 |
| JP4747944B2 (ja) | 2006-05-19 | 2011-08-17 | 大日本印刷株式会社 | 電子ドアロックシステム |
| JP5038238B2 (ja) * | 2008-06-12 | 2012-10-03 | 株式会社東海理化電機製作所 | 車両機能制限システム |
-
2009
- 2009-06-29 AU AU2009202622A patent/AU2009202622B2/en not_active Ceased
- 2009-07-08 US US12/499,385 patent/US20100007497A1/en not_active Abandoned
- 2009-07-09 EP EP09165033A patent/EP2143598B1/en not_active Not-in-force
- 2009-07-09 AT AT09165033T patent/ATE541754T1/de active
- 2009-07-10 TW TW098123534A patent/TW201002557A/zh not_active IP Right Cessation
-
2013
- 2013-01-04 US US13/734,749 patent/US8692652B2/en not_active Expired - Fee Related
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5734330A (en) * | 1994-10-11 | 1998-03-31 | Calsonic Corporation | Anti-theft car protection device |
| US6531955B1 (en) * | 1999-03-23 | 2003-03-11 | Henry Tzvi Brendzel | Arrangement for prevention of motor vehicle thefts |
| US6310542B1 (en) * | 1999-08-19 | 2001-10-30 | Lucent Technologies Inc. | Cognitive system for a vehicle and its occupants |
| US20020180582A1 (en) * | 1999-11-30 | 2002-12-05 | Nielsen Ernst Lykke | Electronic key device a system and a method of managing electronic key information |
| US7280034B2 (en) * | 2003-03-27 | 2007-10-09 | Kubota Corporation | Antitheft system for vehicle |
| US7068144B2 (en) * | 2003-07-21 | 2006-06-27 | Lear Corporation | Method and system for re-learning a key |
| US20050099265A1 (en) * | 2003-11-12 | 2005-05-12 | Dix Peter J. | Central access control system |
| US20060220806A1 (en) * | 2005-03-16 | 2006-10-05 | Nguyen Huan T | Remote feedback for vehicle key fob functions |
| DE102006018831A1 (de) * | 2006-04-22 | 2007-10-25 | Daimlerchrysler Ag | Kraftfahrzeugdiagnose und Fahrzeugannahme |
| US20090306849A1 (en) * | 2006-04-22 | 2009-12-10 | Daimler Ag | System for diagnosis of motor vehicles, and for reception of vehicles at a repair facility |
Cited By (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110136398A1 (en) * | 2009-12-09 | 2011-06-09 | Honda Motor Co., Ltd. | Outboard motor antitheft apparatus |
| US20110132680A1 (en) * | 2009-12-09 | 2011-06-09 | Honda Motor Co., Ltd. | Antitheft apparatus for equipment with prime mover |
| US8302725B2 (en) * | 2009-12-09 | 2012-11-06 | Honda Motor Co., Ltd. | Antitheft apparatus for equipment with prime mover |
| US8357018B2 (en) * | 2009-12-09 | 2013-01-22 | Honda Motor Co., Ltd. | Outboard motor antitheft apparatus |
| US8362876B2 (en) * | 2010-04-08 | 2013-01-29 | Merten C William | Interlock system and method |
| US20110248821A1 (en) * | 2010-04-08 | 2011-10-13 | Merten C William | Interlock System and Method |
| US20110298593A1 (en) * | 2010-06-04 | 2011-12-08 | Toshiba Tec Kabushiki Kaisha | Electronic device and method for controlling the same |
| US9026785B2 (en) * | 2010-12-21 | 2015-05-05 | Kt Corporation | Method and apparatus for smart-key management |
| US20120159152A1 (en) * | 2010-12-21 | 2012-06-21 | Kt Corporation | Method and apparatus for smart-key management |
| US20190214921A1 (en) * | 2018-01-10 | 2019-07-11 | Polaris Industries Inc. | Low loss shunt regulator |
| US11637506B2 (en) * | 2018-01-10 | 2023-04-25 | Polaris Industries Inc. | Low loss shunt regulator |
| EP3961587A1 (en) * | 2020-08-26 | 2022-03-02 | The Hillman Group, Inc. | Duplication device for key fobs |
| US20220067471A1 (en) * | 2020-08-26 | 2022-03-03 | The Hillman Group, Inc. | Duplication device for key fobs |
| US11361205B2 (en) * | 2020-08-26 | 2022-06-14 | The Hillman Group, Inc. | Duplication device for key fobs |
| US11836561B2 (en) | 2020-08-26 | 2023-12-05 | The Hillman Group, Inc. | Key fob duplication device |
| US20230001886A1 (en) * | 2021-06-30 | 2023-01-05 | Audi Ag | Method and system for preventing the driving of an electrically driven vehicle |
Also Published As
| Publication number | Publication date |
|---|---|
| TWI365819B (enExample) | 2012-06-11 |
| TW201002557A (en) | 2010-01-16 |
| EP2143598A1 (en) | 2010-01-13 |
| ATE541754T1 (de) | 2012-02-15 |
| AU2009202622A1 (en) | 2010-01-28 |
| EP2143598B1 (en) | 2012-01-18 |
| US20130120113A1 (en) | 2013-05-16 |
| US8692652B2 (en) | 2014-04-08 |
| AU2009202622B2 (en) | 2010-12-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8692652B2 (en) | Antitheft system | |
| US8299892B2 (en) | Antitheft system | |
| CN101625775B (zh) | 设备的防盗装置 | |
| US7164213B2 (en) | Theft prevention system for motor vehicles | |
| US6836710B2 (en) | Vehicle management system | |
| CA2701438C (en) | Keyless ignition | |
| CN101423050B (zh) | 遥控启动控制装置 | |
| FR2805365A1 (fr) | Systeme de reprogrammation a distance d'au moins un calculateur d'un systeme informatique embarque a bord d'un vehicule automobile | |
| EP2034453B1 (en) | Tamper resistant hourmeter for mower | |
| CN102094552B (zh) | 驱动源搭载设备的防盗装置 | |
| JP5138487B2 (ja) | 機器の盗難防止装置 | |
| JP5813173B1 (ja) | 車両システム | |
| US7233879B1 (en) | System and method of agent self-repair within an intelligent agent system | |
| JP3855838B2 (ja) | 電気自動車の盗難防止装置 | |
| JP4481086B2 (ja) | 車両の盗難防止装置 | |
| JPH11213195A (ja) | 始動キー及び稼動情報管理システム | |
| JP2010275900A (ja) | 車載制御装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: HONDA MOTOR CO., LTD, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TAKEDA, MASATO;SHINOGI, YOSHIHISA;YAMASHITA, KOSEI;AND OTHERS;REEL/FRAME:022941/0771 Effective date: 20090611 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |