US20150329079A1 - Detecting vehicle door ajar using intrusion sensor - Google Patents
Detecting vehicle door ajar using intrusion sensor Download PDFInfo
- Publication number
- US20150329079A1 US20150329079A1 US14/278,161 US201414278161A US2015329079A1 US 20150329079 A1 US20150329079 A1 US 20150329079A1 US 201414278161 A US201414278161 A US 201414278161A US 2015329079 A1 US2015329079 A1 US 2015329079A1
- Authority
- US
- United States
- Prior art keywords
- vehicle
- doppler shift
- predetermined threshold
- door
- sensor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/1004—Alarm systems characterised by the type of sensor, e.g. current sensing means
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/1004—Alarm systems characterised by the type of sensor, e.g. current sensing means
- B60R25/1009—Sonic sensors; Signal treatment therefor
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/102—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/30—Detection related to theft or to other events relevant to anti-theft systems
Definitions
- key-off load Even when turned off, vehicles perform various actions, at least some of which require a current draw from the battery. This draw is referred to as the “key-off load.”
- One way to reduce the key-off load is to reduce the number of devices that draw current while the vehicle is off. Doing so, however, typically means giving up premium vehicle features.
- An alternative approach is to install a larger battery to handle the increased current. However, larger batteries are often associated with increased vehicle costs, increased weight, and reduced fuel economy.
- FIG. 1 illustrates an exemplary vehicle configured to use an intrusion sensor to detect whether a vehicle door is ajar.
- FIG. 2 is a block diagram of an exemplary vehicle system that may be incorporated into the vehicle of FIG. 1 .
- FIG. 3 is a flowchart of an exemplary process for using an intrusion sensor to detect whether a vehicle door is ajar.
- An exemplary vehicle includes an intrusion sensor configured to detect a Doppler shift in a passenger compartment and output an intrusion signal representing the Doppler shift.
- the vehicle further includes a processing device configured to receive the intrusion signal and activate an alarm if the Doppler shift exceeds a predetermined threshold.
- a predetermined threshold may be set to detect Doppler shifts caused by such actions that suggest an unauthorized intrusion into the vehicle.
- other sensors such as door ajar sensors, may be turned off during a key-off cycle without sacrificing the intrusion-detection features offered by such sensors. Turning off the door ajar sensors, and potentially other sensors, may reduce the key-off load, thus allowing for a smaller battery to be used in the vehicle.
- the vehicle and system shown in the FIGURES may take many different forms and include multiple and/or alternate components and facilities.
- the exemplary components illustrated are not intended to be limiting. Indeed, additional or alternative components and/or implementations may be used.
- the vehicle 100 includes an intrusion detection system 105 that can detect a Doppler shift in the passenger compartment 110 caused by various acts that suggest unauthorized vehicle 100 access. Examples of such acts may include opening a door 115 , breaking a window 120 including any side window, rear window, sunroof, or windshield, opening a liftgate of an SUV, Van or Cross-Over or the like.
- the vehicle 100 may include any passenger or commercial vehicle such as a car, a truck, a sport utility vehicle, a taxi, a bus, etc.
- the vehicle 100 is an autonomous vehicle configured to operate in an autonomous (e.g., driverless) mode, a partially autonomous mode, and/or a non-autonomous mode.
- FIG. 2 is a block diagram of an exemplary intrusion detection system 105 that may be incorporated into the vehicle 100 of FIG. 1 .
- the intrusion detection system 105 includes an intrusion sensor 135 , a door ajar sensor 140 , an alarm system 145 , and a processing device 150 .
- the intrusion sensor 135 may be configured to detect the Doppler shift in the passenger compartment 110 .
- the intrusion sensor 135 may include an ultrasonic sensor or a laser vibrometer configured to perform a Doppler scan in the passenger compartment 110 of the vehicle 100 .
- the Doppler scan may include detecting a change in frequency of a wave for measuring sufficient vibration to cause a Doppler shift. Sufficient vibration may be caused by, e.g., opening a door 115 , opening or breaking a window 120 , or the like.
- the Doppler shift may be detected by the ultrasonic sensor or laser vibrometer and converted into an intrusion signal.
- the intrusion signal may represent, for example, the magnitude of the Doppler shift.
- the door ajar sensor 140 may be configured to determine whether a door 115 has been opened.
- the door ajar sensor 140 may include a switch or proximity sensor such as a Hall-effect sensor.
- the door ajar sensor 140 may be configured to output a door state signal. When the door 115 is closed, the door state signal may indicate a closed state (i.e., the door 115 is closed). When the door 115 is open, the door state signal may indicate an open state (i.e., the door 115 is open).
- the system may include any number of door ajar sensors 140 . At least one door ajar sensor 140 may be disposed on each door 115 . In addition, door ajar sensors 140 may be located placed on the hood 125 , trunk 130 , lift gate and possibly other locations throughout the vehicle 100 such as lockable storage compartments.
- the alarm system 145 may be configured to output an audio, visual indication, UHF RF notification to the Key fob, or a Telematics notification of an attempt to access the vehicle 100 without authorization. For instance, upon receipt of an alarm signal from, e.g., the processing device 150 , discussed below, the alarm system 145 may cause a horn of the vehicle 100 to beep, headlights and tail lights of the vehicle 100 to flash, or both, or it may send off a warning through wireless means to display on the Key fob, Phone, or to generate an email or SMS alert of the alarm event. In some instances, the alarm system 145 may be configured to transmit messages notifying the owner of the attempted unauthorized access. Thus, the alarm system 145 may be configured to generate and send a message according to any number of communication protocols.
- the processing device 150 may be configured to receive the intrusion signal, compare the Doppler shift measured by the intrusion sensor 135 to a predetermined threshold, and activate the alarm system 145 if, for instance, the Doppler shift exceeds a predetermined threshold.
- the predetermined threshold may be set so that Doppler shifts caused by acts of unauthorized access to the vehicle 100 such as opening a door 115 or breaking a window 120 will trigger the alarm. In other words, the Doppler shift caused by such acts may exceed the predetermined threshold.
- the predetermined threshold may be set to exclude acts that could cause a Doppler shift but are unrelated to an attempt to access the vehicle 100 .
- the predetermined threshold may be set to exclude such events so that the alarm is not triggered for weather related reasons or other reasons unrelated to attempts to access the vehicle 100 without authorization.
- the processing device 150 may be further configured to determine whether to enable or disable the intrusion sensor 135 , the door ajar sensor 140 , or both.
- the processing device 150 may be configured to enable the intrusion sensor 135 and disable the door ajar sensor 140 if the customer sets the alarm system 145 to an armed mode.
- the intrusion sensor 135 may act as both the theft deterrent system and sensor for cabin door ajar events.
- the door ajar sensors 140 may be disabled to reduce the key-off load on the battery.
- the processing device 150 may enable the door ajar sensor 140 so that the state of the door 115 , e.g., either opened or closed, can be detected prior to resuming normal operation of the vehicle 100 . Accordingly, the door ajar sensors 140 may be enabled if the Doppler shift exceeds the predetermined threshold. Further, during a key-off cycle where all the doors 115 may be closed but the vehicle 100 has not been locked and the alarm system 145 has not been armed, and the processing device 150 has not been configured to enable the intrusion sensor 135 , the door ajar sensors 140 shall remain in normal mode even if the unarmed vehicle 100 remains off for a prolonged period. Door ajar sensors 140 , even if the vehicle 100 has five doors 110 , collectively draw less key-off load than the intrusion controller 105 and sensors 135 .
- the intrusion detection system 105 After the intrusion detection system 105 has determined that the cabin 110 has no occupants, other vehicle systems may be disabled to further reduce key-off load. For instance, circuits associated with the radio, garage door opener, seat control module, interior trunk release, parking brake, dome switches, clutch circuits, horn relay inputs, start/stop switch, hazard lights, head lamp switch, park lamp switch, liftgate open/closed switch, multi-function switch controls for, e.g., high beam and turn lights, etc., may be opened to prevent such systems from drawing a current while the vehicle is turned off. Further, the operation of some systems may be reduced instead of disabled. For example, the frequency of scanning the door ajar sensor or scanning any of the previously mentioned switches may be reduced while the intrusion detection system 105 is armed.
- FIG. 3 is a flowchart of an exemplary process 300 that may be implemented by one or more components of the vehicle 100 of FIG. 1 , and in particular, the components of the intrusion detection system 105 of FIG. 2 .
- the processing device 150 may determine whether the vehicle 100 is off. If so, the process 300 may continue at block 310 . If the vehicle 100 is running, the process 300 may repeat block 305 until the vehicle 100 is turned off.
- the processing device 150 may determine whether the doors 110 of the vehicle 100 are closed. Whether the doors 110 are closed may be determined from signals output by the door ajar sensors 140 . If the doors 110 are closed, the process 300 may continue at block 315 . If one or more doors 110 are open, the process 300 may repeat block 310 until all doors 110 are closed. In some instances, an audible or visual signal may remind the driver or other occupant to close any open doors 110 .
- the processing device 150 may determine whether the alarm system 145 has been armed. For example, the alarm system 145 may automatically become armed after, e.g., 20 seconds after the vehicle 100 is turned off and all doors 110 are closed. Alternatively or in addition, the alarm system 145 may become armed in response to a user input. If the alarm system 145 is armed, the process 300 may continue at block 320 . Otherwise, the process 300 may continue at block 325 .
- the processing device 150 may switch to a current save mode. That is, the processing device 150 may disable the door ajar sensors 140 and suspend various circuits and switches, as discussed above, to reduce the key-off load of the vehicle 100 .
- the processing device 150 may maintain a present mode, which may include keeping the door ajar sensors 140 and various circuits and switches active.
- the processing device 150 may determine whether the alarm system 145 has been triggered. Determining whether the alarm system 145 has been triggered may be based on signals received from the intrusion sensors 135 . As discussed above, the intrusion sensors 135 may output signals indicating that a Doppler shift has been detected. A Doppler shift may indicate that an unauthorized person is attempting to enter the vehicle 100 . If the alarm system 145 has been triggered, the process 300 may continue at block 335 . If the alarm system 145 has not been triggered, the process 300 may continue at block 340 .
- the processing device 150 may reactivate the door ajar sensors 140 and any suspended circuits or switches. This way, the status of the doors 110 (e.g., either opened or closed) can be determined.
- An authorized unlock event may include receiving a signal from a key fob, a keypad, telematics, or the like, unlocking one or more doors 110 .
- the processing device 150 may determine whether the alarm system 145 has been disabled. If so, the process 300 may continue at block 350 . Otherwise, the process 300 may loop block 345 until the alarm system 145 is disabled.
- the processing device 150 may reactivate any suspended switches and suspend the intrusion detection system 105 .
- the process 300 may end or return to block 305 .
- computing systems and/or devices may employ any of a number of computer operating systems, including, but by no means limited to, versions and/or varieties of the Ford Sync® operating system, the Microsoft Windows® operating system, the Unix operating system (e.g., the Solaris® operating system distributed by Oracle Corporation of Redwood Shores, Calif.), the AIX UNIX operating system distributed by International Business Machines of Armonk, N.Y., the Linux operating system, the Mac OS X and iOS operating systems distributed by Apple Inc. of Cupertino, Calif., the BlackBerry OS distributed by Research In Motion of Waterloo, Canada, and the Android operating system developed by the Open Handset Alliance.
- Examples of computing devices include, without limitation, an on-board vehicle computer, a computer workstation, a server, a desktop, notebook, laptop, or handheld computer, or some other computing system and/or device.
- Computing devices generally include computer-executable instructions, where the instructions may be executable by one or more computing devices such as those listed above.
- Computer-executable instructions may be compiled or interpreted from computer programs created using a variety of programming languages and/or technologies, including, without limitation, and either alone or in combination, JavaTM, C, C++, Visual Basic, Java Script, Perl, etc.
- a processor e.g., a microprocessor
- receives instructions e.g., from a memory, a computer-readable medium, etc., and executes these instructions, thereby performing one or more processes, including one or more of the processes described herein.
- Such instructions and other data may be stored and transmitted using a variety of computer-readable media.
- a computer-readable medium includes any non-transitory (e.g., tangible) medium that participates in providing data (e.g., instructions) that may be read by a computer (e.g., by a processor of a computer).
- a medium may take many forms, including, but not limited to, non-volatile media and volatile media.
- Non-volatile media may include, for example, optical or magnetic disks and other persistent memory.
- Volatile media may include, for example, dynamic random access memory (DRAM), which typically constitutes a main memory.
- Such instructions may be transmitted by one or more transmission media, including coaxial cables, copper wire and fiber optics, including the wires that comprise a system bus coupled to a processor of a computer.
- Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH-EEPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
- Databases, data repositories or other data stores described herein may include various kinds of mechanisms for storing, accessing, and retrieving various kinds of data, including a hierarchical database, a set of files in a file system, an application database in a proprietary format, a relational database management system (RDBMS), etc.
- Each such data store is generally included within a computing device employing a computer operating system such as one of those mentioned above, and are accessed via a network in any one or more of a variety of manners.
- a file system may be accessible from a computer operating system, and may include files stored in various formats.
- An RDBMS generally employs the Structured Query Language (SQL) in addition to a language for creating, storing, editing, and executing stored procedures, such as the PL/SQL language mentioned above.
- SQL Structured Query Language
- system elements may be implemented as computer-readable instructions (e.g., software) on one or more computing devices (e.g., servers, personal computers, etc.), stored on computer readable media associated therewith (e.g., disks, memories, etc.).
- a computer program product may comprise such instructions stored on computer readable media for carrying out the functions described herein.
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Burglar Alarm Systems (AREA)
- Radar Systems Or Details Thereof (AREA)
- Emergency Alarm Devices (AREA)
- Measurement Of Velocity Or Position Using Acoustic Or Ultrasonic Waves (AREA)
Abstract
Description
- Even when turned off, vehicles perform various actions, at least some of which require a current draw from the battery. This draw is referred to as the “key-off load.” One way to reduce the key-off load is to reduce the number of devices that draw current while the vehicle is off. Doing so, however, typically means giving up premium vehicle features. An alternative approach is to install a larger battery to handle the increased current. However, larger batteries are often associated with increased vehicle costs, increased weight, and reduced fuel economy.
-
FIG. 1 illustrates an exemplary vehicle configured to use an intrusion sensor to detect whether a vehicle door is ajar. -
FIG. 2 is a block diagram of an exemplary vehicle system that may be incorporated into the vehicle ofFIG. 1 . -
FIG. 3 is a flowchart of an exemplary process for using an intrusion sensor to detect whether a vehicle door is ajar. - An exemplary vehicle includes an intrusion sensor configured to detect a Doppler shift in a passenger compartment and output an intrusion signal representing the Doppler shift. The vehicle further includes a processing device configured to receive the intrusion signal and activate an alarm if the Doppler shift exceeds a predetermined threshold. Several events, such as an occupant remaining in the vehicle, the opening one or more doors or a vent, or breaking one or more windows, may generate a Doppler shift in the passenger compartment. The predetermined threshold may be set to detect Doppler shifts caused by such actions that suggest an unauthorized intrusion into the vehicle. Accordingly, other sensors, such as door ajar sensors, may be turned off during a key-off cycle without sacrificing the intrusion-detection features offered by such sensors. Turning off the door ajar sensors, and potentially other sensors, may reduce the key-off load, thus allowing for a smaller battery to be used in the vehicle.
- The vehicle and system shown in the FIGURES may take many different forms and include multiple and/or alternate components and facilities. The exemplary components illustrated are not intended to be limiting. Indeed, additional or alternative components and/or implementations may be used.
- As illustrated in
FIG. 1 , thevehicle 100 includes anintrusion detection system 105 that can detect a Doppler shift in thepassenger compartment 110 caused by various acts that suggestunauthorized vehicle 100 access. Examples of such acts may include opening adoor 115, breaking awindow 120 including any side window, rear window, sunroof, or windshield, opening a liftgate of an SUV, Van or Cross-Over or the like. Although illustrated as a sedan, thevehicle 100 may include any passenger or commercial vehicle such as a car, a truck, a sport utility vehicle, a taxi, a bus, etc. In some possible approaches, as discussed below, thevehicle 100 is an autonomous vehicle configured to operate in an autonomous (e.g., driverless) mode, a partially autonomous mode, and/or a non-autonomous mode. -
FIG. 2 is a block diagram of an exemplaryintrusion detection system 105 that may be incorporated into thevehicle 100 ofFIG. 1 . As illustrated, theintrusion detection system 105 includes anintrusion sensor 135, adoor ajar sensor 140, analarm system 145, and aprocessing device 150. - The
intrusion sensor 135 may be configured to detect the Doppler shift in thepassenger compartment 110. For instance, theintrusion sensor 135 may include an ultrasonic sensor or a laser vibrometer configured to perform a Doppler scan in thepassenger compartment 110 of thevehicle 100. The Doppler scan may include detecting a change in frequency of a wave for measuring sufficient vibration to cause a Doppler shift. Sufficient vibration may be caused by, e.g., opening adoor 115, opening or breaking awindow 120, or the like. The Doppler shift may be detected by the ultrasonic sensor or laser vibrometer and converted into an intrusion signal. The intrusion signal may represent, for example, the magnitude of the Doppler shift. - The
door ajar sensor 140 may be configured to determine whether adoor 115 has been opened. In some instances, thedoor ajar sensor 140 may include a switch or proximity sensor such as a Hall-effect sensor. Thedoor ajar sensor 140 may be configured to output a door state signal. When thedoor 115 is closed, the door state signal may indicate a closed state (i.e., thedoor 115 is closed). When thedoor 115 is open, the door state signal may indicate an open state (i.e., thedoor 115 is open). The system may include any number ofdoor ajar sensors 140. At least onedoor ajar sensor 140 may be disposed on eachdoor 115. In addition,door ajar sensors 140 may be located placed on thehood 125,trunk 130, lift gate and possibly other locations throughout thevehicle 100 such as lockable storage compartments. - The
alarm system 145 may be configured to output an audio, visual indication, UHF RF notification to the Key fob, or a Telematics notification of an attempt to access thevehicle 100 without authorization. For instance, upon receipt of an alarm signal from, e.g., theprocessing device 150, discussed below, thealarm system 145 may cause a horn of thevehicle 100 to beep, headlights and tail lights of thevehicle 100 to flash, or both, or it may send off a warning through wireless means to display on the Key fob, Phone, or to generate an email or SMS alert of the alarm event. In some instances, thealarm system 145 may be configured to transmit messages notifying the owner of the attempted unauthorized access. Thus, thealarm system 145 may be configured to generate and send a message according to any number of communication protocols. - The
processing device 150 may be configured to receive the intrusion signal, compare the Doppler shift measured by theintrusion sensor 135 to a predetermined threshold, and activate thealarm system 145 if, for instance, the Doppler shift exceeds a predetermined threshold. The predetermined threshold may be set so that Doppler shifts caused by acts of unauthorized access to thevehicle 100 such as opening adoor 115 or breaking awindow 120 will trigger the alarm. In other words, the Doppler shift caused by such acts may exceed the predetermined threshold. Likewise, the predetermined threshold may be set to exclude acts that could cause a Doppler shift but are unrelated to an attempt to access thevehicle 100. For example, certain weather events such as high winds, hail, heavy rainfall or snowfall, or the like, may cause a Doppler shift. The predetermined threshold may be set to exclude such events so that the alarm is not triggered for weather related reasons or other reasons unrelated to attempts to access thevehicle 100 without authorization. - The
processing device 150 may be further configured to determine whether to enable or disable theintrusion sensor 135, thedoor ajar sensor 140, or both. During a key-off cycle—that is, when thevehicle 100 is turned off—theprocessing device 150 may be configured to enable theintrusion sensor 135 and disable thedoor ajar sensor 140 if the customer sets thealarm system 145 to an armed mode. Thus, during the key-off cycle, theintrusion sensor 135 may act as both the theft deterrent system and sensor for cabin door ajar events. In this scenario thedoor ajar sensors 140 may be disabled to reduce the key-off load on the battery. After or if the enabled alarm has been triggered by an unauthorized cabin intrusion , theprocessing device 150 may enable thedoor ajar sensor 140 so that the state of thedoor 115, e.g., either opened or closed, can be detected prior to resuming normal operation of thevehicle 100. Accordingly, thedoor ajar sensors 140 may be enabled if the Doppler shift exceeds the predetermined threshold. Further, during a key-off cycle where all thedoors 115 may be closed but thevehicle 100 has not been locked and thealarm system 145 has not been armed, and theprocessing device 150 has not been configured to enable theintrusion sensor 135, thedoor ajar sensors 140 shall remain in normal mode even if theunarmed vehicle 100 remains off for a prolonged period.Door ajar sensors 140, even if thevehicle 100 has fivedoors 110, collectively draw less key-off load than theintrusion controller 105 andsensors 135. - After the
intrusion detection system 105 has determined that thecabin 110 has no occupants, other vehicle systems may be disabled to further reduce key-off load. For instance, circuits associated with the radio, garage door opener, seat control module, interior trunk release, parking brake, dome switches, clutch circuits, horn relay inputs, start/stop switch, hazard lights, head lamp switch, park lamp switch, liftgate open/closed switch, multi-function switch controls for, e.g., high beam and turn lights, etc., may be opened to prevent such systems from drawing a current while the vehicle is turned off. Further, the operation of some systems may be reduced instead of disabled. For example, the frequency of scanning the door ajar sensor or scanning any of the previously mentioned switches may be reduced while theintrusion detection system 105 is armed. -
FIG. 3 is a flowchart of anexemplary process 300 that may be implemented by one or more components of thevehicle 100 ofFIG. 1 , and in particular, the components of theintrusion detection system 105 ofFIG. 2 . - At
decision block 305, theprocessing device 150 may determine whether thevehicle 100 is off. If so, theprocess 300 may continue atblock 310. If thevehicle 100 is running, theprocess 300 may repeat block 305 until thevehicle 100 is turned off. - At
decision block 310, theprocessing device 150 may determine whether thedoors 110 of thevehicle 100 are closed. Whether thedoors 110 are closed may be determined from signals output by the doorajar sensors 140. If thedoors 110 are closed, theprocess 300 may continue atblock 315. If one ormore doors 110 are open, theprocess 300 may repeat block 310 until alldoors 110 are closed. In some instances, an audible or visual signal may remind the driver or other occupant to close anyopen doors 110. - At
decision block 315, theprocessing device 150 may determine whether thealarm system 145 has been armed. For example, thealarm system 145 may automatically become armed after, e.g., 20 seconds after thevehicle 100 is turned off and alldoors 110 are closed. Alternatively or in addition, thealarm system 145 may become armed in response to a user input. If thealarm system 145 is armed, theprocess 300 may continue atblock 320. Otherwise, theprocess 300 may continue atblock 325. - At
block 320, theprocessing device 150 may switch to a current save mode. That is, theprocessing device 150 may disable the doorajar sensors 140 and suspend various circuits and switches, as discussed above, to reduce the key-off load of thevehicle 100. - At
block 325, theprocessing device 150 may maintain a present mode, which may include keeping the doorajar sensors 140 and various circuits and switches active. - At
decision block 330, theprocessing device 150 may determine whether thealarm system 145 has been triggered. Determining whether thealarm system 145 has been triggered may be based on signals received from theintrusion sensors 135. As discussed above, theintrusion sensors 135 may output signals indicating that a Doppler shift has been detected. A Doppler shift may indicate that an unauthorized person is attempting to enter thevehicle 100. If thealarm system 145 has been triggered, theprocess 300 may continue atblock 335. If thealarm system 145 has not been triggered, theprocess 300 may continue atblock 340. - At
block 335, theprocessing device 150 may reactivate the doorajar sensors 140 and any suspended circuits or switches. This way, the status of the doors 110 (e.g., either opened or closed) can be determined. - At
block 340, theprocessing device 150 may wait for an authorized unlock event. An authorized unlock event may include receiving a signal from a key fob, a keypad, telematics, or the like, unlocking one ormore doors 110. - At
decision block 345, theprocessing device 150 may determine whether thealarm system 145 has been disabled. If so, theprocess 300 may continue atblock 350. Otherwise, theprocess 300 may loop block 345 until thealarm system 145 is disabled. - At
block 350, theprocessing device 150 may reactivate any suspended switches and suspend theintrusion detection system 105. Afterblock 350, theprocess 300 may end or return to block 305. - In general, computing systems and/or devices may employ any of a number of computer operating systems, including, but by no means limited to, versions and/or varieties of the Ford Sync® operating system, the Microsoft Windows® operating system, the Unix operating system (e.g., the Solaris® operating system distributed by Oracle Corporation of Redwood Shores, Calif.), the AIX UNIX operating system distributed by International Business Machines of Armonk, N.Y., the Linux operating system, the Mac OS X and iOS operating systems distributed by Apple Inc. of Cupertino, Calif., the BlackBerry OS distributed by Research In Motion of Waterloo, Canada, and the Android operating system developed by the Open Handset Alliance. Examples of computing devices include, without limitation, an on-board vehicle computer, a computer workstation, a server, a desktop, notebook, laptop, or handheld computer, or some other computing system and/or device.
- Computing devices generally include computer-executable instructions, where the instructions may be executable by one or more computing devices such as those listed above. Computer-executable instructions may be compiled or interpreted from computer programs created using a variety of programming languages and/or technologies, including, without limitation, and either alone or in combination, Java™, C, C++, Visual Basic, Java Script, Perl, etc. In general, a processor (e.g., a microprocessor) receives instructions, e.g., from a memory, a computer-readable medium, etc., and executes these instructions, thereby performing one or more processes, including one or more of the processes described herein. Such instructions and other data may be stored and transmitted using a variety of computer-readable media.
- A computer-readable medium (also referred to as a processor-readable medium) includes any non-transitory (e.g., tangible) medium that participates in providing data (e.g., instructions) that may be read by a computer (e.g., by a processor of a computer). Such a medium may take many forms, including, but not limited to, non-volatile media and volatile media. Non-volatile media may include, for example, optical or magnetic disks and other persistent memory. Volatile media may include, for example, dynamic random access memory (DRAM), which typically constitutes a main memory. Such instructions may be transmitted by one or more transmission media, including coaxial cables, copper wire and fiber optics, including the wires that comprise a system bus coupled to a processor of a computer. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH-EEPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
- Databases, data repositories or other data stores described herein may include various kinds of mechanisms for storing, accessing, and retrieving various kinds of data, including a hierarchical database, a set of files in a file system, an application database in a proprietary format, a relational database management system (RDBMS), etc. Each such data store is generally included within a computing device employing a computer operating system such as one of those mentioned above, and are accessed via a network in any one or more of a variety of manners. A file system may be accessible from a computer operating system, and may include files stored in various formats. An RDBMS generally employs the Structured Query Language (SQL) in addition to a language for creating, storing, editing, and executing stored procedures, such as the PL/SQL language mentioned above.
- In some examples, system elements may be implemented as computer-readable instructions (e.g., software) on one or more computing devices (e.g., servers, personal computers, etc.), stored on computer readable media associated therewith (e.g., disks, memories, etc.). A computer program product may comprise such instructions stored on computer readable media for carrying out the functions described herein.
- With regard to the processes, systems, methods, heuristics, etc. described herein, it should be understood that, although the steps of such processes, etc. have been described as occurring according to a certain ordered sequence, such processes could be practiced with the described steps performed in an order other than the order described herein. It further should be understood that certain steps could be performed simultaneously, that other steps could be added, or that certain steps described herein could be omitted. In other words, the descriptions of processes herein are provided for the purpose of illustrating certain embodiments, and should in no way be construed so as to limit the claims.
- Accordingly, it is to be understood that the above description is intended to be illustrative and not restrictive. Many embodiments and applications other than the examples provided would be apparent upon reading the above description. The scope should be determined, not with reference to the above description, but should instead be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. It is anticipated and intended that future developments will occur in the technologies discussed herein, and that the disclosed systems and methods will be incorporated into such future embodiments. In sum, it should be understood that the application is capable of modification and variation.
- All terms used in the claims are intended to be given their ordinary meanings as understood by those knowledgeable in the technologies described herein unless an explicit indication to the contrary is made herein. In particular, use of the singular articles such as “a,” “the,” “said,” etc. should be read to recite one or more of the indicated elements unless a claim recites an explicit limitation to the contrary.
- The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
Claims (20)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/278,161 US9199606B1 (en) | 2014-05-15 | 2014-05-15 | Detecting vehicle door ajar using intrusion sensor |
DE102015208799.9A DE102015208799A1 (en) | 2014-05-15 | 2015-05-12 | DETECTING AN ATTACHED VEHICLE DOOR USING AN INFRARED SENSOR |
MX2015006186A MX345653B (en) | 2014-05-15 | 2015-05-15 | Detecting vehicle door ajar using intrusion sensor. |
CN201510249583.6A CN105083212B (en) | 2014-05-15 | 2015-05-15 | Door ajar is detected using intrusion sensor |
RU2015118218A RU2684814C2 (en) | 2014-05-15 | 2015-05-15 | System for detecting vehicle door being ajar |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/278,161 US9199606B1 (en) | 2014-05-15 | 2014-05-15 | Detecting vehicle door ajar using intrusion sensor |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150329079A1 true US20150329079A1 (en) | 2015-11-19 |
US9199606B1 US9199606B1 (en) | 2015-12-01 |
Family
ID=54361900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/278,161 Active US9199606B1 (en) | 2014-05-15 | 2014-05-15 | Detecting vehicle door ajar using intrusion sensor |
Country Status (5)
Country | Link |
---|---|
US (1) | US9199606B1 (en) |
CN (1) | CN105083212B (en) |
DE (1) | DE102015208799A1 (en) |
MX (1) | MX345653B (en) |
RU (1) | RU2684814C2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107194248A (en) * | 2017-04-21 | 2017-09-22 | 百度在线网络技术(北京)有限公司 | Crack down upon evil forces objective abduction method, device, equipment and the storage medium of automatic driving vehicle |
US10025899B2 (en) * | 2016-06-17 | 2018-07-17 | Toyota Motor Engineering & Manufacturing North America, Inc. | Deactivating or disabling various vehicle systems and/or components when vehicle operates in an autonomous mode |
WO2018186899A1 (en) * | 2017-04-05 | 2018-10-11 | Ford Global Technologies, Llc | Vehicle occupant detection |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9578261B1 (en) | 2015-03-24 | 2017-02-21 | Phillip Flagg Rockwell | Portable security surveillance device |
US10118593B2 (en) * | 2016-06-16 | 2018-11-06 | Ford Global Technologies, Llc | Police vehicle monitor |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4517556A (en) | 1982-12-23 | 1985-05-14 | Sur-Gard Security Systems Ltd. | Automatic bypass switch for household security system |
JPH075062B2 (en) * | 1985-01-24 | 1995-01-25 | 富士通テン株式会社 | Anti-theft device for automobile |
US4929925A (en) * | 1988-02-24 | 1990-05-29 | Bodine David B | Alarm system |
US5070442A (en) | 1989-12-14 | 1991-12-03 | Syron Townson Ann T | Computerized door locking and monitoring system using power-line carrier components |
US5003290A (en) | 1990-01-11 | 1991-03-26 | Lindquist Jonathan B | Integrated alarm and access control system |
US5317303A (en) | 1992-09-11 | 1994-05-31 | Anro Engineering, Inc. | Batteryless sensor used in security applications |
JP2818719B2 (en) * | 1992-11-10 | 1998-10-30 | 株式会社東海理化電機製作所 | Vehicle alarm generator |
US5389911A (en) | 1993-12-06 | 1995-02-14 | Ford Motor Company | Alarm system for detecting glass breakage |
CN2202074Y (en) * | 1994-05-19 | 1995-06-28 | 綦敦星 | Automobile remote-controlling alarm against thief |
US5856778A (en) * | 1996-02-29 | 1999-01-05 | Denso Corporation | Intrusion detecting apparatus for a vehicle |
JP2001034855A (en) * | 1999-07-19 | 2001-02-09 | Nissei Giken Kk | Vehicle robbery warning device |
EP1683693B1 (en) * | 2005-01-25 | 2007-06-20 | Mazda Motor Corporation | Periphery monitoring system |
JP4389874B2 (en) * | 2006-01-06 | 2009-12-24 | パナソニック電工株式会社 | Moving body detection device |
US20120050021A1 (en) * | 2010-08-27 | 2012-03-01 | Ford Global Technologies, Llc | Method and Apparatus for In-Vehicle Presence Detection and Driver Alerting |
CN102390351B (en) * | 2011-10-13 | 2013-05-08 | 大连理工大学 | Multi-sensor fused comprehensive car alarm system |
-
2014
- 2014-05-15 US US14/278,161 patent/US9199606B1/en active Active
-
2015
- 2015-05-12 DE DE102015208799.9A patent/DE102015208799A1/en active Pending
- 2015-05-15 MX MX2015006186A patent/MX345653B/en active IP Right Grant
- 2015-05-15 RU RU2015118218A patent/RU2684814C2/en active
- 2015-05-15 CN CN201510249583.6A patent/CN105083212B/en active Active
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10025899B2 (en) * | 2016-06-17 | 2018-07-17 | Toyota Motor Engineering & Manufacturing North America, Inc. | Deactivating or disabling various vehicle systems and/or components when vehicle operates in an autonomous mode |
WO2018186899A1 (en) * | 2017-04-05 | 2018-10-11 | Ford Global Technologies, Llc | Vehicle occupant detection |
US11345353B2 (en) * | 2017-04-05 | 2022-05-31 | Ford Global Technologies, Llc | Vehicle occupant detection |
CN107194248A (en) * | 2017-04-21 | 2017-09-22 | 百度在线网络技术(北京)有限公司 | Crack down upon evil forces objective abduction method, device, equipment and the storage medium of automatic driving vehicle |
US10963560B2 (en) | 2017-04-21 | 2021-03-30 | Baidu Online Network Technology (Beijing) Co., Ltd. | Method and apparatus for anti hacker's hijacking of autonomous vehicle, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
MX345653B (en) | 2017-02-09 |
US9199606B1 (en) | 2015-12-01 |
RU2684814C2 (en) | 2019-04-15 |
CN105083212A (en) | 2015-11-25 |
MX2015006186A (en) | 2015-11-16 |
DE102015208799A1 (en) | 2015-11-19 |
CN105083212B (en) | 2019-07-26 |
RU2015118218A3 (en) | 2018-11-27 |
RU2015118218A (en) | 2016-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9752370B2 (en) | Rain onset detection auto-close user interface | |
US9199606B1 (en) | Detecting vehicle door ajar using intrusion sensor | |
US9199521B2 (en) | Trailer theft detection and alarm | |
US9512661B2 (en) | Rain onset detection glazing auto-close | |
US10697226B2 (en) | Method for automatic closure of a vehicle tailgate | |
US11597348B2 (en) | Detecting abnormal CAN bus wake-up pattern | |
US20140292483A1 (en) | Hands-free system and method for opening trunk | |
US10328896B2 (en) | Vehicle theft avoidance systems and associated methods | |
US11423767B2 (en) | Early warning method and device of staying in vehicle, and computer readable storage medium | |
US11427154B2 (en) | Vehicle security system | |
US20170282855A1 (en) | Wireless vehicle security motion sensor with threaded mounting surface and related methods | |
CN105292060B (en) | A kind of automotive safety based on RFID is anti-to omit based reminding method and system | |
CN107215309B (en) | Vehicle door emergency locking system based on mobile phone APP and control method | |
CN104933781A (en) | Automatic locking system and method for vehicle | |
WO2021158424A1 (en) | Artificial intelligence-enabled alarm for detecting passengers locked in vehicle | |
US9682669B2 (en) | Vehicle safety power management | |
US9694785B1 (en) | Wireless vehicle security motion sensor and related methods | |
CN112750335A (en) | Vehicle auxiliary control method and device, vehicle and storage medium | |
US11653173B2 (en) | Electronic device monitoring system | |
US20230294722A1 (en) | Eco-friendly vehicle and method of controlling the same | |
WO2021121094A1 (en) | Object management for vehicle loading | |
US20230243200A1 (en) | Vehicle door safety system | |
CN117360429A (en) | System, vehicle, method and electronic device for vehicle anti-theft control | |
CN117935403A (en) | Vehicle door unlocking method and device, vehicle-mounted equipment and computer readable storage medium | |
CN116486541A (en) | In-vehicle environment monitoring method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FORD GLOBAL TECHNOLOGIES, LLC, MICHIGAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VAN WIEMEERSCH, JOHN ROBERT;WOJCIK, KARL WILLIAM;REEL/FRAME:032900/0387 Effective date: 20140514 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |