WO2016154637A1 - Système de sécurité - Google Patents

Système de sécurité Download PDF

Info

Publication number
WO2016154637A1
WO2016154637A1 PCT/ZA2016/000005 ZA2016000005W WO2016154637A1 WO 2016154637 A1 WO2016154637 A1 WO 2016154637A1 ZA 2016000005 W ZA2016000005 W ZA 2016000005W WO 2016154637 A1 WO2016154637 A1 WO 2016154637A1
Authority
WO
WIPO (PCT)
Prior art keywords
security device
security
server
communications module
status
Prior art date
Application number
PCT/ZA2016/000005
Other languages
English (en)
Inventor
Johann Friedrich WEBER
Original Assignee
Weber Johann Friedrich
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weber Johann Friedrich filed Critical Weber Johann Friedrich
Publication of WO2016154637A1 publication Critical patent/WO2016154637A1/fr

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/102Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/32Detection related to theft or to other events relevant to anti-theft systems of vehicle dynamic parameters, e.g. speed or acceleration
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/33Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates

Definitions

  • the present application relates to a security system where a security server will remotely monitor a wireless mobile security device for the protection of an automotive vehicle from unauthorized use, tampering and theft.
  • the methods of executing these functions are numerous and could include for example: an audible alarm or siren, the sending of an alarm SMS, the tracking of GPS devices, etc.
  • the present invention seeks to address this.
  • a security device including: a means for monitoring the status of the security device, and/or an object to be monitored and to which the security device is attachable; a communications module used for communication between the security device and a server via a communications network; and a processor for controlling operations of the security device including activating and deactivating a monitoring mode of the security device such thai with the security device in an active monitoring mode either:
  • the status monitoring means may generate status data from the operative monitoring of any one or more of the acceleration , the position, th iiit and the ignition on/off condition of the security device and/or the monitored object, or any change in the acceleration, position, tilt or ignition condition.
  • the status monitoring means is from a group of status monitoring means including an aceeierometer for monitoring acceleration, a position sensor for monitoring position, a tilt sensor for monitoring angular displacement and a voltmeter or similar device for monitoring the starting up of the monitored object, for example a motor vehicle,
  • the position sensor may be a sensor measuring the distance or change n distance between itself and a point of reference.
  • the position sensor is a global position system (GPS) module.
  • GPS global position system
  • the communications module and the processor may be connected to the security device and as such, act. as a client-side communications module and a client-side processor. f ypica!iy, the status data generated by the status monitoring means is:
  • the ciient-side communications moduie is a transmitter.
  • the client-side communications moduie is a transceiver.
  • the security device may further inciude a location module used to determine the location of the device.
  • the location moduie may be one and the same GPS moduie used as the position sensor, or an independent secondary GPS module.
  • the security device may include a short range communications module for communicating with a switching device for activating and deactivating the monitoring mode of the security device.
  • the switching device may be, for example, a mobile telephone or a key fob.
  • the short range communications module may be a Near Field Connector (NFC) communications moduie.
  • the security device further includes a means cf detecting jamming frequencies in the vicinity of the security device, and an aiert for alerting the user of such jamming frequencies.
  • a security system inciuding: a communications module for, via a communications network: (i) receiving request signals from one or more security devices; or (ii) transmitting request signals to one or more security devices and in response thereto receiving response signals from the security devices; a processor connected to the communications module for, and with at least one of the security devices in an active monitoring mode, either.
  • the security system further includes a database for storing data relating to the security devices, the users, the signals transmitted and received, and/or the status data transmitted and received.
  • the security system communications module and the processor are part of a server, thereby to act as a server-side communications module and a server-side processor, which server-side communications module is capable of communication with a ciient-side communications module of the security devices.
  • the status data is generated by a means for monitoring the status of the security device, and/or the monitored object.
  • the status data generated by the status monitoring means is:
  • the server-side communications module is a receiver.
  • the server-side communications module is a transceiver.
  • client-side communications module and client-side processor wiil be understood to mean a communications module and a processor local to the security device and/or the monitored object.
  • server-side communications module and server-side processor will be understood to mean a communications module and a processor local to the server.
  • a communications module will be understood to mean any device capable of communicating with another device via a communications network, via which network communications can be transmitted and/or received.
  • the Irregular break may be: a break in the transmission or reception of a continuous signal; a break in the transmission or reception of a regular periodic signal; or a break in the transmission or reception of an irregular predetermined periodic signal.
  • Figure 1 is a schematic diagram illustrating an example system to
  • Figure 2 is a block diagram illustrating an example security device in more detail.
  • Figure 3 is a block diagram illustrating an example server in more detail.
  • a security system includes a security device 10 that is attached to a motor vehicle 12. It will be appreciated that the secu ity device 10 could be attached to the motor vehicle 12 at any suitable position.
  • the security device 10 communicates via a communications network 14 with a server 15.
  • the server has an associated database 18.
  • the communications network 14 may be any type of communications network, covering small or large areas, including Personal Area Networks (PAN), Local Area Networks (LAN), Metropolitan Area Networks (MAN) and Wide Area Networks (WAN).
  • PAN Personal Area Networks
  • LAN Local Area Networks
  • MAN Metropolitan Area Networks
  • WAN Wide Area Networks
  • PAN Personal Area Networks
  • LAN Local Area Networks
  • MAN Metropolitan Area Networks
  • WAN Wide Area Networks
  • the security device 10 includes a means 20 for monitoring the status of the security device 10 and/or the motor vehicle 12 being monitored, to which the security device 10 is operabiy attachable.
  • the status monitoring means 20 may take many different forms, it is preferable that it is an acceierometer to determine acceleration of the security device 10, thereby Indicating that the security device, and consequently the motor vehicle 12, is moving.
  • a communications module 22 mere specifically a client-side communications module 22, Is used for communication between the security device 10 and the server 15 via the mobile communications network 14. It will be appreciated that the modules described herein may be implemented by a machine-readable medium embodying instructions which, when executed by a machine, cause the machine to perform any of the methods described above.
  • modules illustrated could be located on one or more servers operated by one or more institutions.
  • the modules may be implemented using firmware programmed specifically to execute the method described herein. It will also be appreciated that in any of these cases the modules form a physical apparatus with physical modules specificaiiv for executing the steps of the method described herein. in any event, the communications module 22 will also typically include a Si card, which is required to communicate over a mobile communications network, for example a GSM network.
  • a Si card which is required to communicate over a mobile communications network, for example a GSM network.
  • a processor 24, more specifically a client-side processor, is used for controlling operations of the security device 10, which will be described in more detail below.
  • the security device 10 may further include a location moduie 26, which Is used to determine the location of the device.
  • the device also includes a short range communications module 28 for communicating with a mobile telephone or key fob of the user.
  • the short range communications module 28 may be a Near Field Connector (NFC) communications module or a Bluetooth communications module to name but two examples of suitable short range communication technologies currently available.
  • the security device 10 includes a memory 30 for storing data required for the operation of the security device 10.
  • the security device 10 will typically be connected to a battery of the motor vehicle from where the security device 10 and its components will draw power. Depending on the power requirements of the security device 10, a transformer (not shown) may be required to step down the voltage provided from the vehicle battery. i he device will also iypicaily include an antenna (not shown) for ease of communication with the mobile communications network 14.
  • the server 16 also includes a communications module 32, .more specifically a server-side communications module 32, for transmitting requests to a plurality of security devices 10 and for receiving responses from the security devices 10 via the mobile communications network 14. This will be described in more detail below.
  • a processor 34 more specially a server-side processor 34, Is connected to the communications moduie 32 and to the database I S.
  • the security device 10 installed in the motor vehicle 12 is used to secure the motor vehicle 12 and generate an alarm If the motor vehicle is stolen.
  • the security device 10 can be accessed by a user using their mobile communications device typically in the form of a mobile telephone.
  • the user will have downloaded an executable application onto their mobile telephone. Once executed, the application will connect with any security device 10 in short range of the physical location of the mobile telephone. This is done via the short range communications module 28 of the security device 10.
  • the short range communications protocol could be any suitable protocol such as Bluetooth or Near Field Communication (NFC).
  • the processor 24 will activate the security device 10 Into a monitoring mode. This will typicaiiy include awakening the various components of the security device 10 from their sleep modes. in addition, a message wili be transmitted via the communications module 22 and the mobiie communication network 14 to the server 16 to inform the server that the security device 10 is in monitoring mode which will then activate a monitoring mode on the server 16 vis-a-vis the particular security device 10.
  • the security device 10 could be activated by the user logging into a website and entering a user name and password. Once this has been entered an activation request can be entered into the website. This couid be done remotely by the user logging in using either a PC web browser or even a web browser on their mobile telephone. Alternatively or in addition a mobiie telephone application could be used to switch on the monitoring mode remotely. it is !ikeiy in these scenarios that the activation request entered into the website wi!! foe transmitted to the server 16 and then from there onto the security device 10.
  • An automatic activation function ccu!d a iso be implemented whereby an automatic short range communication connection between the mobile telephone of the user, or other device such as a key fob, and the security device 10 will activate a monitoring mode on the server 16. in any event, once the security device 10 and/or the server 15 are in the monitoring mode, the server 16 will essentially monitor the security device 10 as follows.
  • connection confirmation request will be periodically transmitted from the server 16, via the communications module 32 and the mobile communications network 14, to the security device 10.
  • the connection confirmation request could be transmitted at any suitable appropriate intervals. An example of this may be every 1 minute but it will be appreciated that any other suitable interval could be used as deemed appropriate by the system designers.
  • connection confirmation request is received at the security device 10 via the communications module 22.
  • the processor 24 will control the security device 10 to reply with a connection confirmation response, which will be transmitted via the communications module 22 and the mobile communication network 14 back to the server 15.
  • ail connection confirmation requests and responses will need to include an identity of the security device to allow the security device 10 to know that the request Is directed at it and to allow the server to know thai it has received a confirmation response from the correct security device. s he identity of a particular security device 10 will typically be stored in the memory 30 of the device.
  • the server 16 upon receiving a connection confirmation response the server 16 will know that the security device 10 is still connected to the network. This is an important security feature, which addresses one of the methodologies that thieves use whereby they block any signals transmitted to and from security devices iocated In the motor vehicle.
  • the processor of the server 10 upon receipt of a connection confirmation response, will transmit a status data request, for example an acceierometer data request, via the communications module 32 and the mobile communications network 14 to the security device 10.
  • a status data request for example an acceierometer data request
  • This acceierometer data request will be transmitted in much the same way as the connection confirmation request as has been described above and will include an identification of the particular security device 10 to which the request is addressed.
  • the processor 24 Upon receiving the acceierometer data request via the communications module 22, the processor 24 will access the acceierometer 20 and In return transmit via the communications module 22 acceierometer data.
  • This acceierometer data 20 wiii be received by the server 16 and if the acceierometer data shows thai the acceierometer (and therefore the motor vehicle) is moving, an alarm is generated as the vehicle at this point should be stationary.
  • a user interface 36 associated with the server is used to aiert a user if an alarm is generated. This could typically Include a screen on which the alarm is shown and may also include an audible aiert to catch the user's attention.
  • the server side user will access the database 18 to obtain information pertaining to the security device 10 relating to which the alarm has been activated. It will be appreciated that when setting up the system, a registration process will be used to capture information relating to the security device 10, the motor vehicle 12 and the user of the motor vehicle including their emergency contact details and possibly also alternate emergency contact details.
  • the server side user will pull up the contact details of the user of the motor vehicle 12 and contact them to ascertain if there is indeed a theft under way or if the alarm is a false alarm for some reason .
  • the contact details of the user of the motor vehicle 12 are automatically displayed via a screen to the server side user if an alarm is activated.
  • tracking of the security device commences using the location module 26 of the security device 10.
  • This location module 26 in one example is a GPS module. These modules are well-known and allow the server 16 to track the location of the security device 10 and thereby the location of the motor vehicle 12 to which the security device 10 is attached.
  • the above described methodology is a server driven methodology whereby the server requests connection confirmation from the security device and then requests accelerometer data from the security device.
  • a methodology could be implemented in the reverse (i.e. security device driven), whereby the security device 10 transmits signals to the server 16 in a one-way signal version of ihe invention, or in response to signals received from the server 16 in an alternative two-way signal version of the invention.
  • a system client will connect to the server 16 and will open a server website or application.
  • a client represents the person, user or manager who interacts with the system for the purpose of controlling a security device 10.
  • the client will be asked if he would like to create a new user, or if he would like to log into the website or application. if he chooses to create a new user, then the system will ask the client to enter a new username or email address and password. The system will then check if the information, which was entered is already registered in the system database 18. if the username or emaii address is already registered in the database 18, then the client wili receive an error message, which wiii prompt the user to re-enter a new username or emaii address and password. if the information that was entered is not registered in the database I S, then the username or emaii address and password wiii be registered into the database 8. if the client chose to log into the website or application, then the system wiii ask the client to enter their username or email address and password. The system wili then check if the information, which was entered is already registered in the database 18.
  • the client will receive an error message, which wili prompt the client to re-enter a valid username or email address and password.
  • the client will be logged into the server.
  • the system wili then check if the username has any registered devices, if there are no devices registered then the system wili ask If the client would like to register a new device. if the client does not want to register a device, then the client will remain logged into the server. However, if the client wants to register a new- device, then the system will ask the client to enter the identification of the device needing to be registered.
  • the system will then check if the device is already registered in the database, if the device is already registered in the database, then the client will receive an error message, which will prompt the client to reenter a device identification.
  • system vvili check if the system can connect to the device. If no connection could be established, then the client vvili receive an error message, which will prompt to check if the device is working properly and will ask if the client wants to register another device.
  • the system can connect to the device, then the Identification and the mac addresses of the GPS and NFC modules of the device will be registered in the database. if the username has a device registered in the database 18, then the system will try and connect to any of the registered devices.
  • the system will set the device status to Online", and If the system could not connect to a registered device, then the system will set the device status to 'Offline".
  • the system will then present the client with a system menu.
  • the system menu will consist of a user info option, a settings menu and a list of registered devices.
  • the user info option will have alarm procedure notification settings, and the option to register a user mobile telephone number which will store the NFC mac address of the mobile telephone. - i 3 ⁇ 4J-
  • the settings menu wili consist of the device acceSeromeisr 20 threshoid settings.
  • the list of registered devices within the system menu will show a device connection status and a monitoring status for each registered device.
  • the client can also include other persons to an alarm sequence notification by adding the contact details of friends, family, neighbours, security companies or the local police department.
  • the system menu consists of a "Devices” branch, a “Settings” branch and a "User Information” branch.
  • the list of devices branch will show all the registered devices 10 which are registered In the system database. Each listed device will show if the device status is Online” or “Offline”; if the device NFC status is Online” or Offline”; if the device monitoring status is "Locked” o “Unlocked”; and a Lock/Unlock button which will set the device status.
  • the settings branch will show a list aii the registered devices. Each device will have acceieromeier threshold settings, which wili determine the sensitivity of the device accelerometer sensor.
  • the user information branch wili have a mobile phone NFC registration branch and an alarm sequence notification details branch.
  • the mobile phone NFC registration branch will show a list of aii the registered mobile phones.
  • the client can register a mobile phone by either entering or editing a mobile phone number.
  • the system When the client has entered a mobile phone number, then the system will send a "validation code” to the number by SMS. The system will then ask the client to enter the "validation coda” which was sent by SMS. The system will then check if the "validation code” which was entered matches the "validation code” which was sent to the number by SMS.
  • the client will receive an error message that the entered code is not valid and will be returned to entering a mobile phone number. If the entered code matches the code that was sent to the number, then the system will try and connect to the GSM module of the phone number that was provided. if the system could not connect to the phone number within a reasonable time frame, then the client will receive an error message that the system could not complete the registration process. The system will continuously try and connect to the phone number.
  • the system will save the phone number and Mac addresses of the GPS and NFC modules of the mobile phone in the database,
  • the mobile phone number will now be registered in the database list of registered mobile phones.
  • the alarm sequence notification details branch will have a list of contact persons whom will be contacted in the event of en alarm activation.
  • Each registered contact person will have a registered phone number, which will be used to contact the person in the event of an alarm activation.
  • the present invention provides a system that both monitors a motor vehicle and raises an alarm to prevent it from being stolen but also effectively circumvents the jamming of the device to prevent the alarm signal from successfully being sent.
  • the users mobile phone may not only be used to activate the monitoring mode of the security device 10, but also as the server 16.
  • the server 16 may be based at a users home, with the communication network 14 extending a defined radius around the users home.
  • the security device 10 On activation of the security device 10 into the active monitoring mode, the security device 10 first checks if it is within range of the communication network 14. if within range, the security device 10 and the server 16 begin to communicate as described previously herein. If communication should be Interrupted, the alarm is triggered. if outside of range, the secu ity device 10 may be configured to activate only the status monitoring means 20 of the device 10.
  • the security device 10 Is enabled to communicate an alarm to the user, or some other person or location, from its own client- side communications module 22 in the event of a change In the status of the security device 10 or motor vehicle 12 being detected. It is envisaged that the invention may extend to include a jamming alert to the user In the event of the security device 10 and motor vehicle 12 entering an area in which the security device 10 can detect jamming frequencles.
  • the description refers to the transmission and/or reception of the signals as being periodic, and particularly regular at exemplified time intervals of 1 -minute, it will be appreciated that the transmission and/o reception of the signals may be irregular or continuous.
  • an irregular break in the transmission and/or reception of the signals would cause the relevant alarm to be triggered.
  • the irregular break may for example be a time lapse between signals greater than a predefined maximum.
  • an irregular break in the transmission and/or reception of the signals would cause the relevant alarm to be triggered.
  • the irregular break may for example be any break between signals, or a break greater than a predefined maximum.

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Alarm Systems (AREA)

Abstract

La présente invention concerne un système de sécurité dans lequel un serveur de sécurité (16) surveillera à distance un dispositif de sécurité mobile (10) sans fil pour la protection d'un véhicule automobile (12) contre une utilisation non autorisée, une manipulation et un vol, et en particulier contre un brouillage par des émetteurs radiofréquences de brouillage. Le système de sécurité comprend un serveur (16) et un ou plusieurs dispositifs de sécurité (10) montés dans un véhicule à moteur, le serveur (16) et les dispositifs de sécurité dans un mode actif de surveillance émettant et/ou recevant des signaux entre eux par le biais d'un réseau de communication (14). Une alarme est déclenchée en cas d'une interruption irrégulière au cours d'une communication. Les dispositifs de sécurité (10) comprennent en outre un moyen de surveillance du déplacement du véhicule de sorte que, dans le mode actif de surveillance, tout déplacement non autorisé du véhicule automobile (12) déclenche une alarme.
PCT/ZA2016/000005 2015-03-20 2016-03-18 Système de sécurité WO2016154637A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA201501946 2015-03-20
ZA2015/01946 2015-03-20

Publications (1)

Publication Number Publication Date
WO2016154637A1 true WO2016154637A1 (fr) 2016-09-29

Family

ID=56979231

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2016/000005 WO2016154637A1 (fr) 2015-03-20 2016-03-18 Système de sécurité

Country Status (1)

Country Link
WO (1) WO2016154637A1 (fr)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110148712A1 (en) * 2009-12-21 2011-06-23 Decabooter Steve Apparatus And Method For Determining Vehicle Location
US20110151796A1 (en) * 2009-12-21 2011-06-23 James Walby Apparatus And Method For Detecting A Cloned Base Station
US20110148713A1 (en) * 2009-12-21 2011-06-23 D Avello Robert F Apparatus And Method For Tracking Stolen Vehicles
US20110151795A1 (en) * 2009-12-21 2011-06-23 D Avello Robert F Apparatus And Method For Maintaining Communications With A Vehicle In The Presence Of Jamming
US20110298580A1 (en) * 2009-01-23 2011-12-08 Toyota Jidosha Kabushiki Kaisha In-vehicle device control system
EP2535731A1 (fr) * 2011-06-15 2012-12-19 Astrium GmbH Dispositif de localisation et de suivi d'un véhicule
GB2499466A (en) * 2012-02-16 2013-08-21 Continental Automotive Systems Detecting jamming signals on a control channel of a wireless communication system
US20130217358A1 (en) * 2012-02-16 2013-08-22 Continental Automotive Systems, Inc. Method and apparatus to determine if a cellular jamming signal is malicious or non-malicious based on received signal strength

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110298580A1 (en) * 2009-01-23 2011-12-08 Toyota Jidosha Kabushiki Kaisha In-vehicle device control system
US20110148712A1 (en) * 2009-12-21 2011-06-23 Decabooter Steve Apparatus And Method For Determining Vehicle Location
US20110151796A1 (en) * 2009-12-21 2011-06-23 James Walby Apparatus And Method For Detecting A Cloned Base Station
US20110148713A1 (en) * 2009-12-21 2011-06-23 D Avello Robert F Apparatus And Method For Tracking Stolen Vehicles
US20110151795A1 (en) * 2009-12-21 2011-06-23 D Avello Robert F Apparatus And Method For Maintaining Communications With A Vehicle In The Presence Of Jamming
EP2535731A1 (fr) * 2011-06-15 2012-12-19 Astrium GmbH Dispositif de localisation et de suivi d'un véhicule
GB2499466A (en) * 2012-02-16 2013-08-21 Continental Automotive Systems Detecting jamming signals on a control channel of a wireless communication system
US20130217358A1 (en) * 2012-02-16 2013-08-22 Continental Automotive Systems, Inc. Method and apparatus to determine if a cellular jamming signal is malicious or non-malicious based on received signal strength

Similar Documents

Publication Publication Date Title
AU2021221470B2 (en) A tracking and theft-recovery system for mobile assets
US8610599B2 (en) Vehicle security and monitoring system
US10407022B2 (en) Car theft prevention using long range wide area network
JP2003296859A (ja) 主動救援請求盗難防止システム及びその方法
US20220237972A1 (en) Systems and methods of a doorbell device initiating a state change of an access control device and/or a control panel responsive to two-factor authentication
CN111164655B (zh) 区域锁状态控制系统
US20140361902A1 (en) Methods, user equipment, property device, and computer program products for detecting movement of the property device and of indicating such movement at the user device
US12012066B2 (en) Proximate device detection, monitoring and reporting
CN110800027A (zh) 具有人员定位器能力的区域锁状态控制系统
WO1998030991A1 (fr) Systeme de surveillance et de securite d'objets mobiles terrestre, aerien et marin
WO2016154637A1 (fr) Système de sécurité
JP2002302014A (ja) 車両管理装置、車載監視装置、車両管理方法、車両監視方法、車両管理プログラム、車両監視プログラム、車両管理プログラムを記録した記録媒体、車両監視プログラムを記録した記録媒体および車両管理システム
WO2019220314A1 (fr) Unité de commande du suivi du collier d'un animal pourvue d'un capteur d'authentification wifi
CN111052191B (zh) 请求锁的网络的锁事件的方法和锁系统
JP2004230964A (ja) 盗難検出装置
JP2004234156A (ja) 盗難検出装置
JP2010041409A (ja) 監視カメラシステム及びカメラ式監視方法
GB2419995A (en) System And Method For Vehicle Tracking And Automatic Theft Notification

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16769846

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16769846

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16769846

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11/05/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16769846

Country of ref document: EP

Kind code of ref document: A1