WO2008147244A1 - Method and system for providing vehicle security - Google Patents

Method and system for providing vehicle security Download PDF

Info

Publication number
WO2008147244A1
WO2008147244A1 PCT/RU2007/000316 RU2007000316W WO2008147244A1 WO 2008147244 A1 WO2008147244 A1 WO 2008147244A1 RU 2007000316 W RU2007000316 W RU 2007000316W WO 2008147244 A1 WO2008147244 A1 WO 2008147244A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
vehicle
security system
foreign
further characterised
Prior art date
Application number
PCT/RU2007/000316
Other languages
French (fr)
Inventor
Vladislav V. Bogushevich
Stanislav A. Shamanin
Original Assignee
Motorola, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola, Inc. filed Critical Motorola, Inc.
Priority to PCT/RU2007/000316 priority Critical patent/WO2008147244A1/en
Publication of WO2008147244A1 publication Critical patent/WO2008147244A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/2009Antitheft state indicator
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/30Vehicles applying the vehicle anti-theft devices
    • B60R2325/306Motorcycles

Definitions

  • the technical field relates generally to a method and system for providing vehicle security.
  • Locks provide a generally mechanical means for preventing, or at least hindering, access to, and therefore subsequent transport of, a vehicle.
  • Alarms provide a means for drawing attention to potential theft or the like, for example by way of an audible signal.
  • ⁇ Spies' provide a means of monitoring and recording activities identifying a theft or the like, to provide information that may subsequently be used in the prosecution of thieves, etc.
  • a problem with such known anti-theft devices is that, if the anti-theft device, or a component used thereby, is disabled or otherwise inoperative, the vehicle is effectively left unprotected. Consequently, not only is the vehicle prone to theft, theft of the vehicle may potentially go unnoticed for an extended period of time, greatly reducing the likelihood of the vehicle be retrieved.
  • a further problem with known anti-theft devices is that a vehicle is limited to those devices with which it is fitted when purchased, or devices an owner has purchased and subsequently had fitted. Older vehicles may not be provided with the latest anti-theft devices, and as such may not benefit from the latest protection available.
  • some vehicles for example light weight vehicles such as motorcycles and bicycles, or older cars, may not be capable of being provided with more complex and/or voluminous security devices.
  • motorcycles in particular, suffer from the fact that they are easily transportable .
  • FIG. 1 illustrates vehicle security system in accordance with an exemplary embodiment of the invention.
  • FIGs. 2 to 5 illustrate a cooperative security network according to an exemplary embodiment of the invention.
  • FIG. 6 illustrates a cooperative security network according to an alternative exemplary embodiment of the invention.
  • FIG. 7 illustrates a method of establishing cooperative security according to an exemplary embodiment of the invention.
  • FIG. 8 illustrates an exemplary method of providing cooperative security in accordance with embodiments of the invention.
  • FIG. 9 illustrates an additional and/or alternative exemplary method of providing cooperative security in accordance with embodiments of the invention.
  • embodiments of the invention described herein may be comprised of one or more generic or specialized processors (or ⁇ processing devices' ) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non- processor circuits, some, most, or all of the functions of the method and apparatus for providing vehicle security described herein.
  • the non-processor circuits may include, but are not limited to, a radio receiver, a radio transmitter and user input devices. As such, these functions may be interpreted as steps of a method to perform the provision of vehicle security described herein.
  • some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs) , in which each function or some combinations of certain of the functions are implemented as custom logic.
  • ASICs application specific integrated circuits
  • a combination of the two approaches could be used. Both the state machine and ASIC are considered herein as a processing devices' for purposes of the foregoing discussion and claim language.
  • an embodiment of the invention may be implemented as a computer-readable storage element having computer readable code stored thereon for programming a computer (e.g., comprising a processing device) to perform a method as described and claimed herein.
  • Examples of such computer-readable storage elements include, but are not limited to, a hard disk, a CD-ROM, an optical storage device and a magnetic storage device.
  • a method of providing vehicle security comprising the steps of detecting one or more foreign security systems; establishing a connection with each of the one or more detected foreign security systems; and providing cooperative security with the one or more detected security systems .
  • a vehicle security system adapted to detect foreign security systems, and upon detection of one or more foreign security systems to establish a connection with the one or more detected foreign security systems.
  • the vehicle security system is further adapted, upon establishing a connection with the one or more detected foreign security systems, to provide cooperative security with one or more foreign wireless communication modules connected thereto.
  • a vehicle is described that is adapted to implement the method, or comprising the aforementioned vehicle security system.
  • the vehicle may not only be protected by its own security resources, but may also be linked to security resources available via detected wireless communication modules connected thereto.
  • the vehicle will not be completely unprotected.
  • more sophisticated and/or advanced security resources than those of the vehicle may be available via cooperative protection.
  • the vehicle may be afforded improved protection.
  • FIG. 1 a vehicle security system is shown and indicated generally at 100.
  • Those skilled in the art will recognize and appreciate that the specifics of this illustrative example are not specifics of the invention itself and that the teachings set forth herein are applicable in a variety of alternative settings.
  • the vehicle security system 100 comprises a wireless communication module (WCM) 110 adapted to detect wireless communication modules of foreign vehicle security systems, and upon detection of one or more foreign vehicle security systems to establish a connection with the one or more detected foreign vehicle security systems.
  • WCM wireless communication module
  • the vehicle security system 100 is adapted, upon establishing a connection with the one or more detected foreign vehicle security systems, to provide cooperative security with the one or more foreign vehicle security system(s) connected thereto.
  • the vehicle security system 100 further comprises a network controller (NC) 120, operatively coupled to the WCM 110.
  • the NC 120 is also operatively coupled to a security system interface (SI)
  • the SI 130 provides an interface to security resources (not shown) provided by, for example, a local vehicle in which the vehicle security system 100 is located.
  • security resources may include, by way of example only, one or more of the following: (i) proximity sensors; (ii) intrusion sensors; (iii) tampering sensors; (iv) audible alarm system; (v) GPS tracking system; (vi) Immobilizer system; and/or (vii) Theft reporting system (e.g. direct reporting to police, local security, etc.).
  • the NC 120 comprises a security management module (SMM) 140.
  • the SMM 140 is adapted to monitor a status of the security resources via the SI 130.
  • the SMM 140 is further adapted to monitor one or more connection (s) with one or more foreign vehicle security systems.
  • the NC 120 or for the illustrated embodiment the SMM 140, is able to determine a security alert, for example in one or more of the following instances : (a) when a security threat to a local vehicle is detected, by virtue of information received via the SI 130; and
  • the NC 120 transmits a Mistress' signal to foreign security systems connected thereto.
  • the foreign security systems connected thereto, and embodying the inventive, concept hereindescribed initiate their own local security measures upon receipt of the distress signal.
  • the vehicle security system 100 is disabled, and/or the local vehicle is moved out of range of one or more of the foreign security systems, the connection therebetween will be inappropriately lost.
  • the foreign security systems up to that time connected thereto, and embodying the inventive, concept hereindescribed initiate their own local security measures upon detection of the inappropriate loss of connection.
  • the vehicle security system 100 is provided with cooperative security by the foreign security systems .
  • the vehicle security system 100 is preferably activated upon receipt of a signal or command from a driver or other person responsible for the vehicle.
  • a remote fob For example, it is well known for a driver, upon parking and exiting a vehicle, to use a remote fob, or similar device to lock the vehicle and activate the alarm system.
  • a remote fob transmits a signal, for example by way of infrared or radio waves, to a receiver within the vehicle .
  • the vehicle security system 100 may be activated in the same manner, by way of a driver or other person responsible for the vehicle using a remote fob to lock the vehicle open exiting, and at the same time activating the security system.
  • the vehicle security- system 100 may be deactivated by way of a driver or other person responsible for the vehicle using a remote fob to unlock the vehicle, and at the same time deactivating the security system.
  • the vehicle security system 100 interprets this as a security alert, and initiates security- measures in response thereto. Therefore, a mechanism of appropriately terminating a connection is required, in order to avoid the initiation of security measures when a security system is legitimately deactivated.
  • the vehicle security system 100 when the vehicle security system 100 receives a deactivation signal or command, for example as a result of a driver or other person responsible for the vehicle using a remote fob to unlock the vehicle, the vehicle security system 100 sends a "terminating connection" signal to the one or more foreign vehicle security systems connected thereto. In this manner, when the vehicle security system 100 subsequently deactivates, and therefore disconnects from the foreign security system(s), the one or more foreign security system(s) do not treat the disconnection as inappropriate.
  • FIG. 2 there is illustrated a cooperative security network 200 according to an exemplary embodiment of the invention.
  • a plurality of vehicles 210 each comprise a vehicle security system, for example the vehicle security system 100 illustrated in FIG. 1. As illustrated in FIG. 2, the security systems of each of the vehicles has been activated, and are wirelessly connected to one another to create a cooperative security network 200. It is envisaged that a number of vehicles 210 comprise detection logic 220 operably coupled to logic arranged to establish a connection with at least one detached foreign security system.
  • the vehicle 210 further comprises monitoring logic 230 which may encompass transceiver circuitry for wireless communication, for example radio frequency or infrared communication, with other vehicles.
  • the aforementioned logic configured to support embodiments of the invention is illustrated with respect to a single vehicle, and in relation to a single figure for clarity purposes only.
  • the cooperative security network 200 is a substantially ad hoc network comprising any number of two or more vehicle security systems.
  • a typical example of where such a cooperative security network may exist is in a car park where the security systems of parked vehicles are activated, and connect to one another to create an ad hoc cooperative security network.
  • a cooperative security network such as the one illustrated in FIG. 2, may be created wherever two or more vehicles, each comprising an active security system embodying the inventive concept described herein, are located.
  • the 'nodes' of the network will continuously change.
  • the security system of a vehicle that has been stolen and driven away may continue to detect foreign security systems, and establish connections therewith. In this manner, even if the security resources of the stolen vehicle have been deactivated, those of foreign security systems, with which a connection has been established, may be utilised wherever the stolen vehicle travels, facilitating the location and/or tracking of a stolen vehicle .
  • FIG. 3 there is illustrated a first exemplary scenario in which the cooperative security network 200 of FIG. 2 provides cooperative security protection to a vehicle 310.
  • the vehicle 310 moves out of range of one or more of the foreign vehicle security systems of the other vehicles 210 within the cooperative security network 200, without transmitting a terminating connection signal. This causes the connections to the one or more foreign security systems to be lost.
  • one or more the foreign security system(s) Upon detection of the lost connection, one or more the foreign security system(s) initiate (s) their local security measures. For example, the one or more foreign security system(s) may activate alarms of the vehicles 210 to draw attention to the fact that a vehicle is being stolen.
  • one or more of the foreign vehicles may comprise more advanced security resources, such as a theft reporting system (e.g. direct reporting to police, local security, etc.), thereby alerting someone to the fact that a vehicle is being stolen.
  • a theft reporting system e.g. direct reporting to police, local security, etc.
  • all connections are lost.
  • the local security system of the vehicle 310 initiates its own local security measures.
  • FIG. 4 there is illustrated a further exemplary scenario in which the cooperative security network 200 of FIG. 2 provides cooperative security protection to a vehicle 410.
  • the security system of the vehicle 410 detects an attempted theft of the vehicle 410, setting of the local security resources of the vehicle 410. Upon detection of the attempted theft, the security system of the vehicle 410 sends a distress signal to the foreign security system(s) connected thereto.
  • the one or more foreign security systems Upon receipt of the distress signals, the one or more foreign security systems initiate the security measures for their own vehicles 210.
  • FIG. 5 there is illustrated a further exemplary scenario in which the cooperative security network 200 of FIG. 2 provides cooperative security protection to a vehicle 510.
  • the security system of vehicle 510 detects that the security resources of the vehicle 510 have been disabled, indicating that an attempted theft is in progress. In response thereto, the security system of vehicle 510 transmits a distress signal to the foreign security systems connected thereto.
  • FIG. 6 there is illustrated a cooperative security network 600 according to an alternative exemplary embodiment of the invention.
  • a plurality of vehicles 210 each comprise a vehicle security system, for example the vehicle security system 100 illustrated in FIG. 1.
  • the security systems of each of the vehicles 210 has been activated, and are wirelessly connected to one another to create the cooperative security network 600.
  • the cooperative network 600 further comprises a resident vehicle security system 620.
  • the resident vehicle security system 620 may reside within a public car park or the like, and comprise a vehicle security system, such as the vehicle security system 100 illustrated in FIG. 1.
  • the SI 130 provides an interface to resident security resources.
  • the resident security resources may comprise, by way of example only:
  • theft reporting system e.g. direct reporting to police, local security, etc.
  • the resident vehicle security system 620 may comprise a plurality of wireless communication modules (WCMs), each covering an area of the public car park. In an alternative embodiment, the resident vehicle security system 620 may reside at a private residence.
  • WCMs wireless communication modules
  • the resident vehicle security system 620 connects with active vehicle security systems within range to form the cooperative security network 600.
  • the resident vehicle security system Upon detection of an inappropriate loss of connection, or upon receipt of a distress message, the resident vehicle security system initiates its local security measures. In this manner, in the event of a theft, or attempted theft, of a vehicle 210 in, for example, a local car park, security resources of the car park may quickly and effectively be activated to protect the vehicle 210 or prevent the vehicle from being removed the car park.
  • a security guard may be immediately notified of a theft in progress.
  • exits from the car park may be secured to prevent the vehicle from leaving.
  • the cooperative security afforded by the security network 600 significantly enhances the protection afforded to vehicles within the network.
  • the method starts at step 710, with the activation of a vehicle security system.
  • step 720 the vehicle security system one or more detects foreign security systems.
  • the vehicle security system then establishes connections with the detected one or more foreign security system(s), in step
  • step 740 the vehicle security system provides cooperative security with the connected foreign security connections.
  • FIG. 8 there is illustrated an exemplary method of providing cooperative security in accordance with the invention. The method starts at step 810 with the monitoring of connections with foreign security systems.
  • a security alert is detected relating to a foreign security system.
  • Such an alert may be in a form of the receipt of a distress signal, or alternatively may be in the form of an inappropriate connection.
  • step 830 security measures are initiated on behalf of the foreign security system to which the security alert relates.
  • FIG. 9 there is illustrated an additional and/or alternative exemplary method of providing cooperative security in accordance with the invention.
  • the method starts at step 910 with a monitoring of a status of a number of local security resources.
  • a security alert is detected relating to the local security resources.
  • Such an alert may be in a form of a receipt of an indication received from the local security resources of an attempted theft.
  • the security alert may be in a form of disablement of one or more of the local security resources.
  • a distress signal is sent to foreign security systems connected thereto.
  • local security measures are initiated. Connections between security systems may be created using any suitable technology. It is envisaged that such connections are created, in one embodiment of the invention, using radio waves, for example utilising known technologies such as BluetoothTM (for more information see www.bluetooth.org) , or wireless local area network (LAN) technology (for more information see http: //standards .ieee.org/wireless) . However, it is envisaged that any suitable alternative means of communication may be utilised. As will be appreciated by a skilled artisan, a vehicle may be provided with a variety of security resources, such as, by way of example only:
  • Theft reporting system (e.g. direct reporting to police, local security, etc.).
  • vehicle security resources may be divided into two categories: shared; and personal.
  • Personal resources may include such resources as proximity sensors, intrusion sensors, tampering sensors, etc., with such resources not being of much use to a foreign security vehicle.
  • the shared resources may include such resources as audible alarm system, GPS system, theft reporting system, etc. Such shared resources potentially being beneficial to a foreign vehicle.
  • relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
  • the terms 'comprises,' 'comprising,' 'has', 'having,' 'includes', 'including,' 'contains', 'containing' or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
  • An element proceeded by 'comprises ...a', 'has ...a' , 'includes ...a' , 'contains ...a' does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element.
  • the terms 'a' and 'an' are defined as one or more unless explicitly stated otherwise herein.
  • the terms 'substantially', 'essentially' , 'approximately' , 'about' or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art.
  • the term 'coupled' as used herein is defined as connected, although not necessarily directly and not necessarily mechanically.
  • a device or structure that is 'configured' in a certain way is configured in at least that way, but may also be configured in ways that are not listed.

Abstract

A method of providing vehicle security comprises detecting one or more foreign security systems; establishing a connection with at least one of the one or more detected foreign security systems (720); and providing cooperative security with the at least one security system with which a connection is established (740). A vehicle security system is also described. In this manner, an improved anti-theft vehicle protection system and method thereof is provided.

Description

METHOD AND SYSTEM FOR PROVIDING VEHICLE SECURITY
TECHNICAL FIELD
The technical field relates generally to a method and system for providing vehicle security.
BACKGROUND
It is known to provide vehicles, such as cars, motorcycles, etc. with anti-theft devices. Such known anti-theft devices may generally be divided into three categories: locks; alarms and ^spies' .
Locks provide a generally mechanical means for preventing, or at least hindering, access to, and therefore subsequent transport of, a vehicle. Alarms provide a means for drawing attention to potential theft or the like, for example by way of an audible signal. ΛSpies' provide a means of monitoring and recording activities identifying a theft or the like, to provide information that may subsequently be used in the prosecution of thieves, etc.
A problem with such known anti-theft devices is that, if the anti-theft device, or a component used thereby, is disabled or otherwise inoperative, the vehicle is effectively left unprotected. Consequently, not only is the vehicle prone to theft, theft of the vehicle may potentially go unnoticed for an extended period of time, greatly reducing the likelihood of the vehicle be retrieved. A further problem with known anti-theft devices is that a vehicle is limited to those devices with which it is fitted when purchased, or devices an owner has purchased and subsequently had fitted. Older vehicles may not be provided with the latest anti-theft devices, and as such may not benefit from the latest protection available.
Furthermore, some vehicles, for example light weight vehicles such as motorcycles and bicycles, or older cars, may not be capable of being provided with more complex and/or voluminous security devices. Motorcycles, in particular, suffer from the fact that they are easily transportable .
Thus, there exists a need for an improved system and apparatus for providing vehicles or the like with anti- theft protection.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views and which together with the detailed description below are incorporated in and form part of the specification, serve to further illustrate various embodiments and to explain various principles and advantages all in accordance with the invention.
FIG. 1 illustrates vehicle security system in accordance with an exemplary embodiment of the invention.
FIGs. 2 to 5 illustrate a cooperative security network according to an exemplary embodiment of the invention.
FIG. 6 illustrates a cooperative security network according to an alternative exemplary embodiment of the invention.
FIG. 7 illustrates a method of establishing cooperative security according to an exemplary embodiment of the invention. FIG. 8 illustrates an exemplary method of providing cooperative security in accordance with embodiments of the invention.
FIG. 9 illustrates an additional and/or alternative exemplary method of providing cooperative security in accordance with embodiments of the invention.
DETAILED DESCRIPTION
Before describing in detail embodiments that are in accordance with the invention, it should be observed that the embodiments reside primarily in combinations of method steps and apparatus components related to a method and apparatus for providing vehicle security. Accordingly, the apparatus components and method steps have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein. Thus, it will be appreciated that for simplicity and clarity of illustration, common and well-understood elements that are useful or necessary in a commercially feasible embodiment may not be depicted in order to facilitate a less obstructed view of these various embodiments.
It will be appreciated that embodiments of the invention described herein may be comprised of one or more generic or specialized processors (or ^processing devices' ) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non- processor circuits, some, most, or all of the functions of the method and apparatus for providing vehicle security described herein. The non-processor circuits may include, but are not limited to, a radio receiver, a radio transmitter and user input devices. As such, these functions may be interpreted as steps of a method to perform the provision of vehicle security described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs) , in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used. Both the state machine and ASIC are considered herein as a processing devices' for purposes of the foregoing discussion and claim language.
Moreover, an embodiment of the invention may be implemented as a computer-readable storage element having computer readable code stored thereon for programming a computer (e.g., comprising a processing device) to perform a method as described and claimed herein. Examples of such computer-readable storage elements include, but are not limited to, a hard disk, a CD-ROM, an optical storage device and a magnetic storage device. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed, herein, will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. Generally speaking, pursuant to the various embodiments, there is provided a method of providing vehicle security comprising the steps of detecting one or more foreign security systems; establishing a connection with each of the one or more detected foreign security systems; and providing cooperative security with the one or more detected security systems .
Furthermore, there is provided a vehicle security system adapted to detect foreign security systems, and upon detection of one or more foreign security systems to establish a connection with the one or more detected foreign security systems. The vehicle security system is further adapted, upon establishing a connection with the one or more detected foreign security systems, to provide cooperative security with one or more foreign wireless communication modules connected thereto.
In addition, a vehicle is described that is adapted to implement the method, or comprising the aforementioned vehicle security system. The vehicle may not only be protected by its own security resources, but may also be linked to security resources available via detected wireless communication modules connected thereto.
In this manner, if the security resources of the vehicle are disabled, or otherwise inoperative, the vehicle will not be completely unprotected. Furthermore, more sophisticated and/or advanced security resources than those of the vehicle may be available via cooperative protection. Thus, the vehicle may be afforded improved protection.
Those skilled in the art will realize that the above recognized advantages and other advantages described herein are merely exemplary and are not meant to be a complete rendering of all of the advantages of the various embodiments of the invention. Referring now to the drawings, and in particular FIG. 1, a vehicle security system is shown and indicated generally at 100. Those skilled in the art, however, will recognize and appreciate that the specifics of this illustrative example are not specifics of the invention itself and that the teachings set forth herein are applicable in a variety of alternative settings.
The vehicle security system 100 comprises a wireless communication module (WCM) 110 adapted to detect wireless communication modules of foreign vehicle security systems, and upon detection of one or more foreign vehicle security systems to establish a connection with the one or more detected foreign vehicle security systems.
As previously mentioned, the vehicle security system 100 is adapted, upon establishing a connection with the one or more detected foreign vehicle security systems, to provide cooperative security with the one or more foreign vehicle security system(s) connected thereto.
For the illustrated embodiment, the vehicle security system 100 further comprises a network controller (NC) 120, operatively coupled to the WCM 110. The NC 120 is also operatively coupled to a security system interface (SI)
130.
The SI 130 provides an interface to security resources (not shown) provided by, for example, a local vehicle in which the vehicle security system 100 is located. Such security resources may include, by way of example only, one or more of the following: (i) proximity sensors; (ii) intrusion sensors; (iii) tampering sensors; (iv) audible alarm system; (v) GPS tracking system; (vi) Immobilizer system; and/or (vii) Theft reporting system (e.g. direct reporting to police, local security, etc.). For the illustrated embodiment, the NC 120 comprises a security management module (SMM) 140. The SMM 140 is adapted to monitor a status of the security resources via the SI 130. The SMM 140 is further adapted to monitor one or more connection (s) with one or more foreign vehicle security systems.
In this manner, the NC 120, or for the illustrated embodiment the SMM 140, is able to determine a security alert, for example in one or more of the following instances : (a) when a security threat to a local vehicle is detected, by virtue of information received via the SI 130; and
(b) when a security threat to a foreign vehicle is detected, by virtue of: i. information received via the WCM 110, for example when a 'distress' signal is received from the foreign vehicle security system; and ii. when a connection to the security system of that foreign vehicle is inappropriately lost (for example due to disabling of the foreign security system or due to the foreign vehicle moving out of range, following a theft thereof) . In an exemplary embodiment, if all connections to security systems of foreign vehicles are inappropriately lost, it may be assumed that a cause is theft of the local vehicle, without the local security resources having detected the theft. Consequently, the vehicle security system may activate the local security resources itself. When the NC 120, or for the illustrated embodiment the SMM 140, determines such a security alert relating to a foreign vehicle, the NC 120 initiates local security measures via the SI 130. In this manner, the vehicle security system 100 provides cooperative security to foreign vehicles connected thereto.
Furthermore, when the security alert relates to the local vehicle, the NC 120, or SMM 140, transmits a Mistress' signal to foreign security systems connected thereto. The foreign security systems connected thereto, and embodying the inventive, concept hereindescribed initiate their own local security measures upon receipt of the distress signal.
Additionally, if the vehicle security system 100 is disabled, and/or the local vehicle is moved out of range of one or more of the foreign security systems, the connection therebetween will be inappropriately lost. The foreign security systems up to that time connected thereto, and embodying the inventive, concept hereindescribed initiate their own local security measures upon detection of the inappropriate loss of connection.
In this manner, the vehicle security system 100 is provided with cooperative security by the foreign security systems . The vehicle security system 100 is preferably activated upon receipt of a signal or command from a driver or other person responsible for the vehicle.
For example, it is well known for a driver, upon parking and exiting a vehicle, to use a remote fob, or similar device to lock the vehicle and activate the alarm system. Such a remote fob transmits a signal, for example by way of infrared or radio waves, to a receiver within the vehicle . It is envisaged that the vehicle security system 100 may be activated in the same manner, by way of a driver or other person responsible for the vehicle using a remote fob to lock the vehicle open exiting, and at the same time activating the security system.
Similarly, it is envisaged that the vehicle security- system 100 may be deactivated by way of a driver or other person responsible for the vehicle using a remote fob to unlock the vehicle, and at the same time deactivating the security system.
As previously mentioned, when a connection is inappropriately lost, the vehicle security system 100 interprets this as a security alert, and initiates security- measures in response thereto. Therefore, a mechanism of appropriately terminating a connection is required, in order to avoid the initiation of security measures when a security system is legitimately deactivated.
Thus, when the vehicle security system 100 receives a deactivation signal or command, for example as a result of a driver or other person responsible for the vehicle using a remote fob to unlock the vehicle, the vehicle security system 100 sends a "terminating connection" signal to the one or more foreign vehicle security systems connected thereto. In this manner, when the vehicle security system 100 subsequently deactivates, and therefore disconnects from the foreign security system(s), the one or more foreign security system(s) do not treat the disconnection as inappropriate.
Referring now to FIG. 2, there is illustrated a cooperative security network 200 according to an exemplary embodiment of the invention.
A plurality of vehicles 210 each comprise a vehicle security system, for example the vehicle security system 100 illustrated in FIG. 1. As illustrated in FIG. 2, the security systems of each of the vehicles has been activated, and are wirelessly connected to one another to create a cooperative security network 200. It is envisaged that a number of vehicles 210 comprise detection logic 220 operably coupled to logic arranged to establish a connection with at least one detached foreign security system. The vehicle 210 further comprises monitoring logic 230 which may encompass transceiver circuitry for wireless communication, for example radio frequency or infrared communication, with other vehicles. The aforementioned logic configured to support embodiments of the invention is illustrated with respect to a single vehicle, and in relation to a single figure for clarity purposes only.
The cooperative security network 200 is a substantially ad hoc network comprising any number of two or more vehicle security systems. A typical example of where such a cooperative security network may exist is in a car park where the security systems of parked vehicles are activated, and connect to one another to create an ad hoc cooperative security network.
As will be appreciated by a skilled artisan, a cooperative security network, such as the one illustrated in FIG. 2, may be created wherever two or more vehicles, each comprising an active security system embodying the inventive concept described herein, are located.
As cars arrive and leave a geographical area defining network range (for example one dictated by the transmit power and receive sensitivity of the monitoring logic) , and their security systems are activated and deactivated respectively, the 'nodes' of the network, for example the security systems of which the network comprises, will continuously change.
In addition, the security system of a vehicle that has been stolen and driven away may continue to detect foreign security systems, and establish connections therewith. In this manner, even if the security resources of the stolen vehicle have been deactivated, those of foreign security systems, with which a connection has been established, may be utilised wherever the stolen vehicle travels, facilitating the location and/or tracking of a stolen vehicle .
Referring now to FIG. 3, there is illustrated a first exemplary scenario in which the cooperative security network 200 of FIG. 2 provides cooperative security protection to a vehicle 310.
The vehicle 310 moves out of range of one or more of the foreign vehicle security systems of the other vehicles 210 within the cooperative security network 200, without transmitting a terminating connection signal. This causes the connections to the one or more foreign security systems to be lost.
Upon detection of the lost connection, one or more the foreign security system(s) initiate (s) their local security measures. For example, the one or more foreign security system(s) may activate alarms of the vehicles 210 to draw attention to the fact that a vehicle is being stolen.
In this manner, even if the security system of the vehicle 310 being stolen has been disabled, the theft has not gone unnoticed. Furthermore, one or more of the foreign vehicles may comprise more advanced security resources, such as a theft reporting system (e.g. direct reporting to police, local security, etc.), thereby alerting someone to the fact that a vehicle is being stolen.
For the illustrated embodiment, all connections are lost. As a consequence of the loss of all connections, the local security system of the vehicle 310 initiates its own local security measures.
Referring now to FIG. 4, there is illustrated a further exemplary scenario in which the cooperative security network 200 of FIG. 2 provides cooperative security protection to a vehicle 410.
The security system of the vehicle 410 detects an attempted theft of the vehicle 410, setting of the local security resources of the vehicle 410. Upon detection of the attempted theft, the security system of the vehicle 410 sends a distress signal to the foreign security system(s) connected thereto.
Upon receipt of the distress signals, the one or more foreign security systems initiate the security measures for their own vehicles 210. Referring now to FIG. 5, there is illustrated a further exemplary scenario in which the cooperative security network 200 of FIG. 2 provides cooperative security protection to a vehicle 510.
The security system of vehicle 510 detects that the security resources of the vehicle 510 have been disabled, indicating that an attempted theft is in progress. In response thereto, the security system of vehicle 510 transmits a distress signal to the foreign security systems connected thereto.
Upon receipt of the distress signals, the foreign security systems initiate the security measures for their own vehicles 210. Referring now to FIG. 6, there is illustrated a cooperative security network 600 according to an alternative exemplary embodiment of the invention.
As for the cooperative security network 200 illustrated in FIG. 2, a plurality of vehicles 210 each comprise a vehicle security system, for example the vehicle security system 100 illustrated in FIG. 1. The security systems of each of the vehicles 210 has been activated, and are wirelessly connected to one another to create the cooperative security network 600.
For the embodiment illustrated in FIG. 6, the cooperative network 600 further comprises a resident vehicle security system 620. For example, the resident vehicle security system 620 may reside within a public car park or the like, and comprise a vehicle security system, such as the vehicle security system 100 illustrated in FIG. 1. In this case, the SI 130 provides an interface to resident security resources.
The resident security resources may comprise, by way of example only:
(i) an audible alarm; (ii) a security guard terminal; (iii) exit barriers;
(iv) theft reporting system (e.g. direct reporting to police, local security, etc.); and
(v) security camera system.
The resident vehicle security system 620 may comprise a plurality of wireless communication modules (WCMs), each covering an area of the public car park. In an alternative embodiment, the resident vehicle security system 620 may reside at a private residence.
In the same manner as for vehicle security systems provided within vehicles, the resident vehicle security system 620 connects with active vehicle security systems within range to form the cooperative security network 600.
Upon detection of an inappropriate loss of connection, or upon receipt of a distress message, the resident vehicle security system initiates its local security measures. In this manner, in the event of a theft, or attempted theft, of a vehicle 210 in, for example, a local car park, security resources of the car park may quickly and effectively be activated to protect the vehicle 210 or prevent the vehicle from being removed the car park.
For example, a security guard may be immediately notified of a theft in progress. Furthermore, exits from the car park may be secured to prevent the vehicle from leaving. In this manner, the cooperative security afforded by the security network 600 significantly enhances the protection afforded to vehicles within the network.
Referring now to FIG. 7, there is illustrated a method of establishing cooperative security according to an exemplary embodiment of the invention. The method starts at step 710, with the activation of a vehicle security system.
Next, in step 720, the vehicle security system one or more detects foreign security systems. The vehicle security system then establishes connections with the detected one or more foreign security system(s), in step
730.
Finally, in step 740, the vehicle security system provides cooperative security with the connected foreign security connections. Referring to FIG. 8, there is illustrated an exemplary method of providing cooperative security in accordance with the invention. The method starts at step 810 with the monitoring of connections with foreign security systems.
Next in step 820, a security alert is detected relating to a foreign security system. Such an alert may be in a form of the receipt of a distress signal, or alternatively may be in the form of an inappropriate connection.
In step 830, security measures are initiated on behalf of the foreign security system to which the security alert relates.
Referring now to FIG. 9, there is illustrated an additional and/or alternative exemplary method of providing cooperative security in accordance with the invention.
The method starts at step 910 with a monitoring of a status of a number of local security resources. Next, in step 920, a security alert is detected relating to the local security resources. Such an alert may be in a form of a receipt of an indication received from the local security resources of an attempted theft. Alternatively, the security alert may be in a form of disablement of one or more of the local security resources.
In step 930, a distress signal is sent to foreign security systems connected thereto. Finally, in step 940, local security measures are initiated. Connections between security systems may be created using any suitable technology. It is envisaged that such connections are created, in one embodiment of the invention, using radio waves, for example utilising known technologies such as Bluetooth™ (for more information see www.bluetooth.org) , or wireless local area network (LAN) technology (for more information see http: //standards .ieee.org/wireless) . However, it is envisaged that any suitable alternative means of communication may be utilised. As will be appreciated by a skilled artisan, a vehicle may be provided with a variety of security resources, such as, by way of example only:
(i) proximity sensors; (ii) intrusion sensors; (iii) tampering sensors; (iv) audible alarm system; (v) GPS system; (vi) Immobilizer system; and/or (vii) Theft reporting system (e.g. direct reporting to police, local security, etc.).
It is anticipated that vehicle security resources may be divided into two categories: shared; and personal.
Personal resources may include such resources as proximity sensors, intrusion sensors, tampering sensors, etc., with such resources not being of much use to a foreign security vehicle. Conversely, the shared resources may include such resources as audible alarm system, GPS system, theft reporting system, etc. Such shared resources potentially being beneficial to a foreign vehicle.
In the foregoing specification, specific embodiments of the present invention have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the present invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of invention. The benefits, advantages, solutions to problems, and any element (s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued. Moreover in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms 'comprises,' 'comprising,' 'has', 'having,' 'includes', 'including,' 'contains', 'containing' or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by 'comprises ...a', 'has ...a' , 'includes ...a' , 'contains ...a' does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms 'a' and 'an' are defined as one or more unless explicitly stated otherwise herein. The terms 'substantially', 'essentially' , 'approximately' , 'about' or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art. The term 'coupled' as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is 'configured' in a certain way is configured in at least that way, but may also be configured in ways that are not listed.

Claims

CLAIMS What is claimed is:
1. A method of providing vehicle security comprising: detecting one or more foreign security systems (720); establishing a connection with at least one of the one or more detected foreign security systems (730); and providing cooperative security with the at least one security system with which a connection is established (740).
2. The method of providing vehicle security of Claim 1 further characterised in that providing cooperative security (740) comprises monitoring the connection with a number or each of the one or more detected foreign security systems (810) .
3. The method of providing vehicle security of Claim 1 or Claim 2 further characterised in that providing cooperative security (740) comprises detecting a security alert relating to a foreign security system (820), and in response thereto initiating one or more local security measure (s) (830) .
4. The method of providing vehicle security of Claim 3 further characterised in that detecting a security alert relating to a foreign security system (820) comprises receiving a distress signal, or detecting an inappropriate connection.
5. The method of providing vehicle security of Claim 1 or Claim 2 further characterised in that providing cooperative security (740) comprises detecting a security- alert relating to one or more local security resource (s) (920), and in response thereto transmitting a distress signal to the or each foreign security system connected thereto (930) .
6. The method of providing vehicle security of Claim 5 further characterised in that detecting a security alert relating to one or more local security resource (s) (920) comprises receiving an indication from the one or more local security resources of an attempted theft, or receiving an indication of disablement of one or more of the local security resources.
7. The method of providing vehicle security of any preceding claim further characterised in that, in establishing a connection with at least one of the detected foreign security systems (730), a cooperative security network is created.
8. The method of providing vehicle security of Claim 7 further characterised in that the cooperative security network is a substantially ad hoc network.
9. A vehicle security system (100) characterised by detection logic arranged to detect one or more foreign security system(s) operably coupled to logic for establishing a connection, with at least one of the one or more detected foreign security systems; wherein upon establishing a connection with the at least one or more detected foreign security systems, cooperative security system with the foreign security system connected thereto is created.
10. The vehicle security system (100) of Claim 9, further characterized in that the vehicle security system (100) comprises monitoring logic arrange to monitor the connection with each of the one or more detected foreign security systems.
11. The vehicle security system (100) of Claim 9 or Claim 10 further characterised in that the detection logic detects a security alert relating to a foreign security system, and in response thereto initiates one or more local security measure (s) .
12. The vehicle security system (100) of Claim 11 further characterised in that the detection logic is arranged to detect a security alert relating to a foreign security system in response to receiving a distress signal, or detecting an inappropriate connection.
13. The vehicle security system (100) of Claim 9 or Claim 10 further characterised in that the detection logic detects a security alert relating to one or more local security resources, and in response thereto to transmits a distress signal to the or each foreign security system connected thereto.
14. The vehicle security system (100) of Claim 13 further characterised in that detecting a security alert relating to local security resources comprises receiving an indication from the local security resources of an attempted theft, or receiving an indication of disablement of one or more of the local security resources.
15. The vehicle security system (100) of any of Claims 9 to 14 further characterised in that the means for establishing connection establishes a connection with at least one of the detected foreign security systems forming a cooperative security network (200, 600).
16. The vehicle security system (100) of Claim 15 further characterised in that the cooperative security network (200, 600) is a substantially ad hoc network.
17. The vehicle security system (100) of any of Claims 9 to 16 further characterised in that the vehicle security system (100) is adapted for use within a vehicle.
18. The vehicle security system (100) of any of Claims 9 to 17 further characterised in that the vehicle security system (100) is adapted for use as part of a resident security system (620).
19. The vehicle security system (100) of any one of Claims 9 to 18 further characterised in that the vehicle security system (100) comprises a wireless communication module (110), a network controller (120) and a security system interface (130).
20. A computer-readable storage element having computer readable code stored thereon for programming a computer to perform a method of providing vehicle security according to any of Claims 1 to 8.
21. The computer-readable storage element of Claim 20 further characterised in that the computer-readable storage element comprises at least one of: a hard disk, a CD-ROM, an optical storage device and a magnetic storage device.
22. A vehicle comprising a vehicle security system according to any of Claims 9 to 19.
PCT/RU2007/000316 2007-05-30 2007-05-30 Method and system for providing vehicle security WO2008147244A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/RU2007/000316 WO2008147244A1 (en) 2007-05-30 2007-05-30 Method and system for providing vehicle security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/RU2007/000316 WO2008147244A1 (en) 2007-05-30 2007-05-30 Method and system for providing vehicle security

Publications (1)

Publication Number Publication Date
WO2008147244A1 true WO2008147244A1 (en) 2008-12-04

Family

ID=39385807

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/RU2007/000316 WO2008147244A1 (en) 2007-05-30 2007-05-30 Method and system for providing vehicle security

Country Status (1)

Country Link
WO (1) WO2008147244A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013134589A (en) * 2011-12-26 2013-07-08 Denso Corp On-vehicle alarm device and vehicle linkage alarm system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000052658A1 (en) * 1999-03-01 2000-09-08 Commtrack Ltd. Security network and system
US20030211852A1 (en) * 2002-03-20 2003-11-13 Pierre Vidaillac Sharing method and apparatus using a non-permanent communication link
EP1384635A1 (en) * 2002-07-23 2004-01-28 Boomerang Tracking Inc. Vehicle location system using an ad hoc network
EP1513123A2 (en) * 2003-08-29 2005-03-09 Rf Monolithics, Inc. Integrated security system and method
EP1593564A1 (en) * 2004-05-05 2005-11-09 Giuseppe Meroni Communication method and system for vehicles
US20060022823A1 (en) * 2004-07-27 2006-02-02 Ryal Kim A Systems and methods for zone security

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000052658A1 (en) * 1999-03-01 2000-09-08 Commtrack Ltd. Security network and system
US20030211852A1 (en) * 2002-03-20 2003-11-13 Pierre Vidaillac Sharing method and apparatus using a non-permanent communication link
EP1384635A1 (en) * 2002-07-23 2004-01-28 Boomerang Tracking Inc. Vehicle location system using an ad hoc network
EP1513123A2 (en) * 2003-08-29 2005-03-09 Rf Monolithics, Inc. Integrated security system and method
EP1593564A1 (en) * 2004-05-05 2005-11-09 Giuseppe Meroni Communication method and system for vehicles
US20060022823A1 (en) * 2004-07-27 2006-02-02 Ryal Kim A Systems and methods for zone security

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013134589A (en) * 2011-12-26 2013-07-08 Denso Corp On-vehicle alarm device and vehicle linkage alarm system

Similar Documents

Publication Publication Date Title
JP4227743B2 (en) Anti-theft system
US8581713B1 (en) Automated geo-fence boundary configuration and activation
US9102294B2 (en) Real-time vehicle alarm communication system
US7046147B2 (en) Integrated security system and method
JP2007099173A (en) Vehicle theft report device
JP2007204014A (en) Security system
EP2523479B1 (en) Method, related device and system for performing monitoring by collaboration among machine type communications devices
CN104709240A (en) Anti-theft method, anti-theft system and vehicle-mounted broadband wireless device
CN105196965A (en) Electric vehicle alarming method and system and electric vehicle
CN101445095B (en) Anti-theft alarming method of an on-line automobile and alarm system thereof
JP2010221958A (en) Vehicular antitheft system
JP4658671B2 (en) Vehicle security device
US20130263291A1 (en) Apparatus and method for supporting theft protection
WO2008147244A1 (en) Method and system for providing vehicle security
JP2001219817A (en) Burglary notifying and warning device for vehicle
JP2004161121A (en) Burglar notification device and emergency notification system
CN102741094B (en) In-vehicle protection system
JP2006330915A (en) Parking lot monitoring system
JP2001088660A (en) Theft prevention device for vehicle
KR20120131475A (en) Apparatus and Method for watching vehicle using wireless modem
JP2004062611A (en) Apparatus and system for protecting vehicles from theft
KR20050045953A (en) A thief proof system for motor vehicle using mobile phone
JP3938039B2 (en) Vehicle anti-theft system
JP2003291784A (en) Theft reporting device for vehicle
JP2002170178A (en) Crime prevention device for automobile

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07852022

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07852022

Country of ref document: EP

Kind code of ref document: A1