WO2017131571A1 - Method and system for preventing theft of a unit from a vehicle - Google Patents

Method and system for preventing theft of a unit from a vehicle Download PDF

Info

Publication number
WO2017131571A1
WO2017131571A1 PCT/SE2017/050038 SE2017050038W WO2017131571A1 WO 2017131571 A1 WO2017131571 A1 WO 2017131571A1 SE 2017050038 W SE2017050038 W SE 2017050038W WO 2017131571 A1 WO2017131571 A1 WO 2017131571A1
Authority
WO
WIPO (PCT)
Prior art keywords
unit
vehicle
database
identification reference
theft
Prior art date
Application number
PCT/SE2017/050038
Other languages
French (fr)
Inventor
Niklas Andersson
Johan ANEROS
Original Assignee
Scania Cv Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Scania Cv Ab filed Critical Scania Cv Ab
Priority to DE112017000265.6T priority Critical patent/DE112017000265T5/en
Publication of WO2017131571A1 publication Critical patent/WO2017131571A1/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/048Monitoring; Safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/26Pc applications
    • G05B2219/2637Vehicle, car, auto, wheelchair

Definitions

  • This document discloses methods and a control unit. More particularly, methods and a con- trol unit are described, for preventing theft of a unit from a vehicle by establishing and using database stored information, related to the unit.
  • Vehicles are often equipped with valuable equipment, which form desirable targets for thieves.
  • Some examples of such equipment, or unit may be e.g. headlights, radio, navigator, communication device, CD player, computer, entertainment unit, sensor units, etc.
  • the vehicles as herein discussed may comprise a means for transportation in broad sense such as e.g. a truck, a bus, a car, a motorcycle, a bicycle, a boat, an aircraft, a train, etc.
  • Some such valuable equipment such as e.g. headlights may be rather complex products, comprising a multitude of parts and expensive electronics such as e.g. processing means. This makes such equipment attractive for thieves and they are often stolen when the vehicle is parked, as the headlights are easily accessible for the thief and may not be protected by the vehicle alarm.
  • a vehicle without headlights is not allowed to be driven.
  • the vehicle has to be kept stationary until new headlights have been mounted.
  • the vehicle owner not only has to buy new headlights, but also take the risk of having the transportation delayed.
  • a delay may be associated with penalties, besides the lost goodwill and additional costs for driver salary.
  • Document WO 2014072783 relates to protection of a lighting device in a vehicle. Information identifying the vehicle in which the lighting device is installed is stored in a memory in the lighting device. Identification of the vehicle is collected from the vehicle when being installed at the workshop and compared with the stored value in a control unit in the lighting device. When these identification references do not correspond, the functionality of the lighting device is terminated, partly or entirely.
  • the thief having stolen the lighting device also has access to the memory wherein the vehicle identification is stored. Thereby he/ she can manipulate, exchange or remove the memory and/ or the control unit, e.g. erase the memory and make the lighting device behave as a new (not previously utilised) lighting device.
  • the disclosed solution does not prevent the workshop from mounting a counterfeit lighting device, not having the identification control mechanism. Neither is it possible to detect where equipment often is stolen, or to detect non-authorised workshops making incorrect installations.
  • the above described solution will prevent the vehicle owner/ driver from e.g. replacing a lighting device of a first vehicle in his/ her vehicle fleet, with a lighting device from another vehicle, e.g. in case of theft and an urgent transport of the first vehicle. This may also affect the goodwill of the vehicle producing company, in the eyes of the vehicle owner.
  • Document US 7230349 also concerns protection of a lighting device in a vehicle.
  • a ballast circuit is energising the lighting device having an anti-theft operating mode.
  • An identification reference from the vehicle is retrieved and compared with the identification reference of the lighting device. When these identification references do not correspond, the functionality of the lighting device is terminated, partly or entirely.
  • the provided solution has the same disadvantages as previously mentioned concerning the other document.
  • this objective is achieved by a method for preventing theft of a unit from a vehicle by database establishment.
  • the method comprises storing an identification reference of the unit in a first database, associated with an identification reference of the vehicle. Further the method comprises inquiring a vehicle owner, upon replacing the unit of the vehicle, if the reason for replacement is theft of the previous unit. When the previous unit is stolen, the method further comprises determining the identification reference of the stolen unit, based on the identification reference of the vehicle stored in the first database. Also, the method furthermore comprises storing the identification reference of the stolen unit in a second database, associated with an indication of theft.
  • a control unit for preventing theft of a unit from a vehicle by database establishment.
  • the control unit is configured to store an identification reference of the unit in a first database, associated with an identification reference of the vehicle. Further, the control unit is configured to inquire a ve- hide owner, upon replacing the unit of the vehicle, if the reason for replacement is theft of the previous unit.
  • the control unit is additionally configured to determine the identification reference of the stolen unit, based on the identification reference of the vehicle stored in the first database, when the previous unit is stolen. Also, the control unit is configured to store the identification reference of the stolen unit in a second database, associated with an indi- cation of theft.
  • this objective is achieved by a method for for preventing theft of a unit from a vehicle by using database stored information.
  • the method comprises extracting an identification reference of the unit from the vehicle. Further the method comprises checking if the extracted identification reference is stored in a second database, associated with an indication of theft. The method also comprises outputting information stating that the unit is stolen when the extracted identification reference is detected in the second database associated with the indication of theft.
  • this objective is achieved by a control unit for preventing theft of a unit from a vehicle by using database stored information.
  • the control unit is configured to extract an identification reference of the unit from the vehicle.
  • control unit is configured to check if the extracted identification reference is stored in a second database, associated with an indication of theft.
  • the control unit is fur- thermore configured to output information stating that the unit is stolen when the extracted identification reference is detected in the second database associated with the indication of theft.
  • Figure 1 A illustrates a vehicle and units according to an embodiment of the invention
  • Figure 1 B illustrates a vehicle and units according to an embodiment of the invention
  • Figure 2 illustrates a system according to an embodiment of the invention
  • Figure 3 is a flow chart illustrating an embodiment of a first method
  • Figure 4 is an illustration depicting a system according to an embodiment
  • Figure 5 is a flow chart illustrating an embodiment of a second method.
  • Embodiments of the invention described herein are defined as methods and a control unit, which may be put into practice in the embodiments described below. These embodiments may, however, be exemplified and realised in many different forms and are not to be limited to the examples set forth herein; rather, these illustrative examples of embodiments are provided so that this disclosure will be thorough and complete. Still other objects and features may become apparent from the following detailed description, considered in conjunction with the accompanying drawings. It is to be understood, however, that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the herein disclosed embodiments, for which reference is to be made to the appended claims. Further, the drawings are not necessarily drawn to scale and, unless oth- erwise indicated, they are merely intended to conceptually illustrate the structures and procedures described herein.
  • Figure 1 A illustrates a scenario with a vehicle 100 comprising a unit 110.
  • the unit 1 10 may comprise e.g. headlights, lighting device, radio, navigator, communication device, CD player, media player, computer, camera, entertainment unit, radar, sensor units, etc.
  • the unit 1 10 may be any kind of device having a unique Identification reference value (ID), e.g. stored in a computer memory in the unit 1 10.
  • ID unique Identification reference value
  • the unit 1 10 may be mounted exterior or interior to the vehicle 100.
  • the vehicle 100 may comprise e.g. a truck, a bus, a car, a motorcycle, a bicycle, a boat, an aircraft, a train, an elevator or any other similar vehicle type or other means of conveyance.
  • the vehicle 100 may be driver controlled or a driverless autonomously controlled vehicle in different embodiments. However, for enhanced clarity, the vehicle 100 is subse- quently described as having a driver.
  • Figure 1 B illustrates a scenario similar to, or identical with the one already illustrated in Figure 1 A, previously discussed, as seen from an above perspective.
  • an identification reference (ID) of the unit 1 10 such as a serial number or other unique identification reference of the unit 1 10, is extracted from the unit 1 10, e.g. from a computer memory in the unit 1 10, and stored in a first external database, associated with an identification reference of the vehicle 100. This may be made e.g. during production of the vehicle 100 when mounting the unit 1 10, or during final testing of the vehicle 100. Further, a second database may be established for storing IDs of stolen units 1 10. Thereby, stolen units 1 10 may be detected and identified. Also, functionalities of the unit 1 10 (or of the vehicle 100 having the stolen unit 1 10 installed) may be turned off or reduced. However, this is further explained and illustrated in Figure 2.
  • Figure 2 illustrates a system 200 for preventing theft of a unit 1 10 from a vehicle 100 by using database stored information.
  • the unit 1 10 may comprise a processor 115 and a unique ID.
  • the vehicle 100 comprises a monitoring unit 210.
  • the monitoring unit 210 in the vehicle 100 may communicate with the processor 1 15 in the unit 1 10, e.g. over a communication bus.
  • a communication bus such as e.g. a Controller Area Network (CAN) bus, a Media Oriented Systems Transport (MOST) bus, or similar.
  • the datalink may alternatively be made over a wireless connection comprising, or at least be inspired by wireless communication technology such as Wi-Fi, Wireless Local Area Network (WLAN), Ultra Mobile Broadband (UMB), Bluetooth (BT), Near Field Communication (NFC), Radio-Frequency Identification (RFID), optical communication such as Infrared Data Association (IrDA) or infrared transmission to name but a few possible examples of wireless communications in some embodiments.
  • Wi-Fi Wireless Local Area Network
  • UMB Ultra Mobile Broadband
  • BT Bluetooth
  • NFC Near Field Communication
  • RFID Radio-Frequency Identification
  • RFID optical communication
  • IrDA Infrared Data Association
  • IrDA
  • the system 200 may comprise a diagnostic tool 220 in a workshop 230.
  • diagnostic tool 220 may comprise e.g. Scania Diagnose and Programmer 3 (SDP3) or similar program.
  • SDP3 Scania Diagnose and Programmer 3
  • the diagnostic tool 220 may extract the unit ID from the processor 1 15 of the unit 1 10, via the monitoring unit 210 of the vehicle 100.
  • an identity reference of the vehicle 100 may be extracted, e.g. from a memory in the vehicle 100.
  • the system 200 also comprises a control unit 240.
  • the control unit 240 may obtain the extracted unit ID from the processor 1 15 of the unit 1 10 and/ or the diagnostic tool 220 of the workshop 230.
  • the control unit 240 may be comprised in the vehicle 100, or alternatively be external to the vehicle 100.
  • the control unit 240 further has access to a first database 250.
  • the first database 250 stores an identification reference of the unit 1 10, associated with an identification reference of the vehicle 100. These identification references may be generated and/ or stored e.g. when fabricating the vehicle 100, at the factory.
  • the vehicle owner or driver of the vehicle 100 may be asked if the reason for the exchange is that the previous unit 1 10 has been stolen. This question/ information may be provided over any arbitrary user interface, such as a computer at the workshop 230; the vehicle owners mobile device; a graphical user interface in the vehicle 100, etc.
  • the identity reference of the previous unit 1 10 is stored in a second database 260, associated with an indication of theft.
  • the indication may be implicit (i.e. all IDs stored in the second database 260 belongs to stolen units 1 10).
  • an alert message may be issued and presented to the staff of the workshop 230. Thereby, mounting of stolen units 1 10 is prevented and can be avoided.
  • the vehicle 100 may comprise a navigator or positioning device, based on a satellite navigation system such as the Navigation Signal Timing and Ranging (Navstar) Global Positioning System (GPS), Differential GPS (DGPS), Galileo, GLONASS, or the like.
  • the vehi- cle 100 may also comprise means for communication via a wireless communication interface, e.g. any of the previously mentioned, or at least partly based on or inspired by radio access technologies such as, e.g., 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE), LTE-Advanced, Evolved Universal Terrestrial Radio Access Network (E- UTRAN), Universal Mobile Telecommunications System (UMTS), Wideband Code Division Multiple Access (WCDMA), etc.
  • 3GPP 3rd Generation Partnership Project
  • LTE Long Term Evolution
  • E- UTRAN Universal Mobile Telecommunications System
  • UMTS Universal Mobile Telecommunications System
  • WCDMA Wideband Code Division Multiple Access
  • the geographical position of the vehicle 100 may be determined by the positioning device when the connection between the unit 1 10, or the processor 1 15 of the unit 1 10, and the monitoring unit 210 is lost. The determined geographical position may then be sent via wireless communication to the control unit 240, for storage in a third database 270.
  • This information may be collected from a plurality of vehicles 100 and the geographical indi- cations may be collected in the third database 270, possibly together with an identification reference of the unit 1 10 and/ or the vehicle 100.
  • the identification references stored in the second database 260 comprising IDs of stolen units 1 10)
  • the geographical positions stored in the third database 270 geographical positions where units 1 10 are stolen may be determined.
  • a (visual) presentation 5 of zones which are in particular affected by theft may be made. This information may be distributed to e.g. the police, or to vehicle owners/ drivers. Further, in some embodiments, a warning may be emitted when a vehicle 100 is approaching such zone, discouraging the driver from stopping the vehicle 100 there.
  • various data and information may be transmitted from the vehicle 100 to the vehicle external control unit 240, such as e.g. identification reference of the unit 1 10 and/ or the vehicle 100.
  • a check may then be made by parsing and comparing the collected identification reference of the unit 1 10 with identification references of stolen units registered in the third database
  • the control unit 240 may remotely disable certain functions of the unit 1 10, and/ or the vehicle 100.
  • the unit 1 10 comprises headlights
  • the vehicle headlights may be set 20 into safe mode, i.e. main beam may be disabled.
  • the unit 1 10 comprises radio, navigator, communication device, CD player, computer, camera, entertainment unit, radar, and/ or sensor units (or similar), the unit 1 10 may be completely disabled.
  • the driver of the vehicle 100 then has to drive to the workshop 230 to exchange the unit 1 10.
  • Figure 3 illustrates an example of a method 300 for preventing theft of a unit 1 10 from a vehicle 100 by database establishment.
  • the vehicle 100 may be any arbitrary kind of means for conveyance, such as a truck, a bus, a car, a motorcycle, a boat, an aeroplane, a train or other similar vehicle.
  • the unit 1 10 may comprise e.g. headlights, lighting device, radio, navigator, communication device, CD player, computer, camera, entertainment unit, radar, sensor units, etc.
  • the unit 1 10 may comprise a unique identification reference, e.g. stored in a local memory and ex- tractable by a processor 1 15 in the unit 1 10.
  • the unit 1 10 may comprise headlights of a truck, trailer or bus.
  • the method 300 may comprise a number of steps 301-307. However, some of these steps 301 -307 may be performed solely in some alternative embodiments, like e.g. step 305-307. Further, the described steps 301 - 307 may be performed in a somewhat different chronological order than the numbering suggests.
  • the method 300 may comprise the subsequent steps:
  • Step 301 comprises storing an identification reference of the unit 1 10 in a first database 250, associated with an identification reference of the vehicle 100.
  • the respective identification references may be stored in the first database 250 e.g. when the unit 1 10 is mounted into the vehicle 100, or when a final test of the vehicle 100 before delivery is made.
  • Step 302 comprises inquiring a vehicle owner/ driver, upon replacing the unit 1 10 of the vehicle 100, if the reason for replacement is theft of the previous unit 1 10.
  • Steps 303-305 may be performed only when the previous unit 1 10 is declared stolen by the vehicle owner/ driver.
  • Step 303 comprises determining the identification reference of the stolen unit 1 10, based on the identification reference of the vehicle 100 stored in the first database 250.
  • Step 304 comprises storing the identification reference of the stolen unit 1 10 in a second database 260, associated with an indication of theft.
  • the association with theft may be implicit in some embodiments.
  • Step 305 which only may be comprised in some embodiments, comprises detecting when a connection between the unit 1 10 and a monitoring unit 210 of the vehicle 100 is interrupted.
  • This moment when the connection is interrupted may be considered the moment when the unit 1 10 is stolen, in case the driver/ vehicle owner later reports the unit 1 10 as stolen.
  • Step 306 which only may be comprised in some embodiments wherein step 305 has been performed, comprises determining geographical position of the vehicle 100 when the interrupted connection is detected 305.
  • the geographical position may be determined by a positioning device in the vehicle 100, based on e.g. GPS or similar.
  • Step 307 which only may be comprised in some embodiments wherein step 305 and 306 have been performed, comprises storing the determined 306 geographical position in a third database 270.
  • Figure 4 illustrates an embodiment of a system 200 for preventing theft of a unit 1 10 from a vehicle 100 by using database stored information.
  • the system 200 aims at preventing theft of a unit 1 10 from a vehicle 100 by using database stored information.
  • the system 200 comprises a control unit 240, configured to perform at least some of the previously described steps according to the method 300 described above and illustrated in Figure 3.
  • the control unit 240 aims at preventing theft of a unit 1 10 from a vehicle 100 by database establishment.
  • the control unit 240 is configured to store an identification reference of the unit 1 10 in a first database 250, associated with an identification reference of the vehicle 100. Further the control unit 240 is configured to inquire a vehicle owner, upon replacing the unit 1 10 of the vehicle 100, if the reason for replacement is theft of the previous unit 1 10. Additionally, the control unit 240 is also configured to determine the identification reference of the stolen unit 1 10, based on the identification reference of the vehicle 100 stored in the first database 250, when the previous unit 1 10 is stolen. Further the control unit 240 is also configured to store the identification reference of the stolen unit 1 10 in a second database 260, associated with an indication of theft.
  • control unit 240 may be configured to obtain geo- graphical position of the vehicle 100 when an interrupted connection between the unit 1 10 and a control unit 240 of the vehicle 100 is interrupted. Also, the control unit 240 may be configured to store the obtained geographical position in a third database 270.
  • control unit 240 may be configured to extract an identification reference of the unit 1 10 from the vehicle 100.
  • control unit 240 may also be configured to check if the extracted identification reference is stored in a second database 260, associated with an indication of theft.
  • control unit 240 may be further configured to output information stating that the unit 1 10 is stolen when the extracted identification reference is detected in the second database 260 associated with the indication of theft.
  • control unit 240 may also be configured to disable a functionality of the vehicle 100 when detecting the extracted identification reference of the unit 1 10 in the second database 260 associated with the indication of theft.
  • the control unit 240 may furthermore be additionally configured to output information concerning the stored geographical positions in the third database 270.
  • system 200 also comprises a first database 250 configured to store an identifi- cation reference of the unit 1 10, associated with an identification reference of the vehicle 100.
  • the system 200 further comprises a second database 260 for preventing theft of the unit 1 10 from the vehicle 100, wherein the second database 260 is configured to store an identifica- tion reference of a stolen unit 1 10, associated with an indication of theft.
  • Figure 5 illustrates an example of a method 500 for preventing theft of a unit 1 10 from a vehicle 100 by using database stored information.
  • the database information may have been established according to the previously described method 300 for database establishment, in some embodiments.
  • the vehicle 100 may be any arbitrary kind of means for conveyance, such as a truck, a bus, a car, a motorcycle, a boat, an aeroplane, a train or other similar vehicle.
  • the unit 1 10 may comprise e.g. headlights, lighting device, radio, navigator, communication device, CD player, computer, camera, entertainment unit, radar, sensor units, etc.
  • the unit 1 10 may comprise a unique identification reference, e.g. stored in a local memory and ex- tractable by a processor 1 15 in the unit 1 10.
  • the unit 1 10 may comprise headlights of a truck, trailer or bus.
  • the method 500 may comprise a number of steps 501-505. However, some of these steps 501 -505 may be performed solely in some alternative embodiments, like e.g. step 504-505. Further, the described steps 501 - 505 may be performed in a somewhat different chronological order than the numbering suggests.
  • the method 500 may comprise the subsequent steps: Step 501 comprises extracting an identification reference of the unit 1 10 from the vehicle 100.
  • the extraction may be made from a memory in the unit 1 10, and provided over a wireless interface.
  • Step 502 comprises checking if the extracted 501 identification reference is stored in a second database 260, associated with an indication of theft.
  • the indication may be implicit, i.e. the mere presence of the identification reference in the second database 260 may be regarded as an indication of theft.
  • a check may also be made if the identification reference is stored in the first database 250, i.e. if the same identification reference is used repeatedly, which may be a sign of counterfeit (i.e. that the same identification reference is copied on to several units 1 10).
  • Step 503 comprises outputting information stating that the unit 1 10 is stolen when the extracted 501 identification reference is detected in the second database 260 associated with the indication of theft.
  • Step 504 which only may be comprised in some embodiments, when the identification reference of the unit 1 10 is stored in the second database 260 associated with the indication of theft, comprises disabling a functionality of the unit 1 10, and/ or vehicle 100, when the extracted 501 identification reference of the unit 1 10 is detected in the second database 260 5 associated with the indication of theft.
  • the unit 1 10 comprises headlights
  • Another option may be to disable another functionality of the vehicle 100 than provided by the stolen unit 1 10, such as i.e. disable the radio when the headlights are stolen etc.
  • Step 505 which only may be comprised in some embodiments, may comprise outputting information concerning the stored geographical positions in the third database 270.
  • This information may be outputted e.g. to (a subset of) vehicle drivers, police authorities etc.
  • the previously described control unit 240 may according to some embodiments comprise a processor 420 for performing various computations, required for performing the method 300 according to at least some of the previously described steps 301 - 307 and/ or the method 500 according to at least some of the previously described steps
  • Such processor 420 may comprise one or more instances of a processing circuit, i.e. a Central Processing Unit (CPU), a processing unit, a processing circuit, a processor, an Application Specific Integrated Circuit (ASIC), a microprocessor, or other processing logic that may interpret and execute instructions.
  • a processing circuit i.e. a Central Processing Unit (CPU), a processing unit, a processing circuit, a processor, an Application Specific Integrated Circuit (ASIC), a microprocessor, or other processing logic that may interpret and execute instructions.
  • CPU Central Processing Unit
  • ASIC Application Specific Integrated Circuit
  • microprocessor may thus represent a processing circuitry comprising a plurality of processing circuits, such as,
  • control unit 240 may comprise a memory 425 in some embodiments.
  • the optional memory 425 may comprise a tangible, physical device utilised to store data or programs, i.e., sequences of instructions, on a temporary or permanent basis.
  • the memory 425 may comprise integrated circuits comprising silicon- based transistors.
  • the memory 425 may comprise e.g. a memory card, a flash memory, a USB memory, a hard disc, or another similar volatile or non-volatile storage unit for storing data such as e.g. ROM (Read-Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable PROM), EEPROM (Electrically Erasable PROM), etc. in different embodiments.
  • the control unit 240 also comprises an input unit 410, for receiving signals and data from e.g. a diagnostic tool 220 in a workshop 230; a first database 250; a second database 260 and/ or a third database 270, in various embodiments.
  • control unit 240 further comprises an output unit 430.
  • the output unit 430 may be configured for receiving signals and data from e.g. a diagnostic tool 220 in a workshop 230; a first database 250; a second database 260 and/ or a third database 270, in various embodiments.
  • the previously described steps 301 -307 and/ or steps 501 -505 to be performed by the control unit 240 may be implemented through the one or more processors 420 within the control unit 240, together with computer program product for performing at least some of the functions of the steps 301 -307 and/ or steps 501 -505.
  • a computer program product comprising instructions for performing the steps 301 -307 and/ or steps 501 -505 in the control unit 240 may perform the method 300 comprising at least some of the steps 301 -307 and/ or the method 500 comprising at least some of the steps 501 -505 for preventing theft of a unit 1 10 from a vehicle 100, when the computer program is loaded into the one or more processors 420 of the control unit 240.
  • the computer program product mentioned above may be provided for instance in the form of a tangible data carrier carrying computer program code for performing at least some of the steps 301 -307 and/ or steps 501 -505 according to some embodiments when being loaded into the one or more processors 420 of the control unit 240.
  • the data carrier may be, e.g., a hard disk, a CD ROM disc, a memory stick, an optical storage device, a magnetic storage device or any other appropriate medium such as a disk or tape that may hold machine readable data in a non-transitory manner.
  • the computer program product may further- more be provided as computer program code on a server and downloaded to the control unit 240 remotely, e.g., over an Internet or an intranet connection.
  • a computer program may be stored/ distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms such as via Internet or other wired or wireless communication system.

Abstract

Method (300) and control unit (240) for preventing theft of a unit (110) from a vehicle (100) by database establishment. The method (300) comprises: storing (301) an identification reference of the unit (110) in a first database (250), associated with an identification reference of the vehicle (100); inquiring (302) a vehicle owner, upon replacing the unit (110) of the vehicle (100), if the reason for replacement is theft of the previous unit (110), and when the previous unit (110) is stolen: determining (303) the identification reference of the stolen unit (110), based on the identification reference of the vehicle (100) stored in the first database (250); and storing (304) the identification reference of the stolen unit (110) in a second database (260), associated with an indication of theft.

Description

METHOD AND SYSTEM FOR PREVENTING THEFT OF A UNIT FROM A VEHICLE
TECHNICAL FIELD
This document discloses methods and a control unit. More particularly, methods and a con- trol unit are described, for preventing theft of a unit from a vehicle by establishing and using database stored information, related to the unit.
BACKGROUND
Vehicles are often equipped with valuable equipment, which form desirable targets for thieves. Some examples of such equipment, or unit, may be e.g. headlights, radio, navigator, communication device, CD player, computer, entertainment unit, sensor units, etc.
The vehicles as herein discussed may comprise a means for transportation in broad sense such as e.g. a truck, a bus, a car, a motorcycle, a bicycle, a boat, an aircraft, a train, etc.
Some such valuable equipment such as e.g. headlights may be rather complex products, comprising a multitude of parts and expensive electronics such as e.g. processing means. This makes such equipment attractive for thieves and they are often stolen when the vehicle is parked, as the headlights are easily accessible for the thief and may not be protected by the vehicle alarm.
A vehicle without headlights is not allowed to be driven. Thus, in case of theft, the vehicle has to be kept stationary until new headlights have been mounted. Thereby the vehicle owner not only has to buy new headlights, but also take the risk of having the transportation delayed. In the cases of public transportation and/ or carriage of goods, a delay may be associated with penalties, besides the lost goodwill and additional costs for driver salary.
Yet another problem with the above mentioned valuable equipment is that such equipment is often counterfeited. The counterfeited equipment typically may be made with lower quality than the original equipment, which often leads to malfunction and may thereby endanger traffic safety. However, it may be difficult for an average driver or vehicle owner to distinguish between a counterfeit equipment and an original equipment, in particular when the installation is made at a workshop. It would also be desired to spot places which are in particular affected by theft and possibly warn drivers from parking at these places and/ or put the attention of the local police department to such parking places. Document WO 2014072783 relates to protection of a lighting device in a vehicle. Information identifying the vehicle in which the lighting device is installed is stored in a memory in the lighting device. Identification of the vehicle is collected from the vehicle when being installed at the workshop and compared with the stored value in a control unit in the lighting device. When these identification references do not correspond, the functionality of the lighting device is terminated, partly or entirely.
However, this approach has several disadvantages. For example, the thief having stolen the lighting device also has access to the memory wherein the vehicle identification is stored. Thereby he/ she can manipulate, exchange or remove the memory and/ or the control unit, e.g. erase the memory and make the lighting device behave as a new (not previously utilised) lighting device. Further, the disclosed solution does not prevent the workshop from mounting a counterfeit lighting device, not having the identification control mechanism. Neither is it possible to detect where equipment often is stolen, or to detect non-authorised workshops making incorrect installations.
On the other hand, the above described solution will prevent the vehicle owner/ driver from e.g. replacing a lighting device of a first vehicle in his/ her vehicle fleet, with a lighting device from another vehicle, e.g. in case of theft and an urgent transport of the first vehicle. This may also affect the goodwill of the vehicle producing company, in the eyes of the vehicle owner.
Document US 7230349 also concerns protection of a lighting device in a vehicle. A ballast circuit is energising the lighting device having an anti-theft operating mode. An identification reference from the vehicle is retrieved and compared with the identification reference of the lighting device. When these identification references do not correspond, the functionality of the lighting device is terminated, partly or entirely.
The provided solution has the same disadvantages as previously mentioned concerning the other document.
Also document US 20090122571 concerns a "smart" lighting device in a vehicle. Also according to this solution, a control unit is comprised in the housing of the lighting device. The control unit stores a unique activation data/ security code. This is compared to the corre- sponding activation data/ security code received from a unit enable device. In case the codes do not correspond, the lighting device is disabled. Also this solution has the same disadvantages as the previously mentioned solutions, as the intelligence all lies in the lighting device and when the lighting device is stolen, there is no security mechanism at all. Consequently, there is a requirement for improvements of vehicle equipment.
SUMMARY
It is therefore an object of this invention to solve at least some of the above problems and provide a solution for preventing theft of a unit from a vehicle.
According to a first aspect of the invention, this objective is achieved by a method for preventing theft of a unit from a vehicle by database establishment. The method comprises storing an identification reference of the unit in a first database, associated with an identification reference of the vehicle. Further the method comprises inquiring a vehicle owner, upon replacing the unit of the vehicle, if the reason for replacement is theft of the previous unit. When the previous unit is stolen, the method further comprises determining the identification reference of the stolen unit, based on the identification reference of the vehicle stored in the first database. Also, the method furthermore comprises storing the identification reference of the stolen unit in a second database, associated with an indication of theft.
According to a second aspect of the invention, this objective is achieved by a control unit for preventing theft of a unit from a vehicle by database establishment. The control unit is configured to store an identification reference of the unit in a first database, associated with an identification reference of the vehicle. Further, the control unit is configured to inquire a ve- hide owner, upon replacing the unit of the vehicle, if the reason for replacement is theft of the previous unit. The control unit is additionally configured to determine the identification reference of the stolen unit, based on the identification reference of the vehicle stored in the first database, when the previous unit is stolen. Also, the control unit is configured to store the identification reference of the stolen unit in a second database, associated with an indi- cation of theft.
According to a third aspect of the invention, this objective is achieved by a method for for preventing theft of a unit from a vehicle by using database stored information. The method comprises extracting an identification reference of the unit from the vehicle. Further the method comprises checking if the extracted identification reference is stored in a second database, associated with an indication of theft. The method also comprises outputting information stating that the unit is stolen when the extracted identification reference is detected in the second database associated with the indication of theft. According to a fourth aspect of the invention, this objective is achieved by a control unit for preventing theft of a unit from a vehicle by using database stored information. The control unit is configured to extract an identification reference of the unit from the vehicle. Further the control unit is configured to check if the extracted identification reference is stored in a second database, associated with an indication of theft. In addition, the control unit is fur- thermore configured to output information stating that the unit is stolen when the extracted identification reference is detected in the second database associated with the indication of theft.
Thanks to the described aspects, theft of vehicle parts becomes less attractive for thieves, as reprogramming is required for making stolen vehicle parts functional. Further, as the stolen vehicle parts are registered in a central database and thus becomes traceable as stolen, they become less attractive for someone to buy. Furthermore, it becomes possible to remotely disable functionality of the stolen unit, partly or entirely, when the theft is detected. This will most likely further discourage anyone from purchasing such stolen unit. In addition, geographical positions of places where units have been stolen may be collected in a database. This collected information may be used for warning drivers from parking their vehicles at such places. It also becomes possible to detect which workshops that are trying to install stolen vehicle parts. Consequently, theft of vehicle parts becomes less attractive. In addition, counterfeit units could be detected and their mounting may be avoided. Furthermore, work- shops trying to install stolen or counterfeit units may be spotted.
Other advantages and additional novel features will become apparent from the subsequent detailed description. FIGURES
Embodiments of the invention will now be described in further detail with reference to the accompanying figures, in which:
Figure 1 A illustrates a vehicle and units according to an embodiment of the invention; Figure 1 B illustrates a vehicle and units according to an embodiment of the invention; Figure 2 illustrates a system according to an embodiment of the invention;
Figure 3 is a flow chart illustrating an embodiment of a first method;
Figure 4 is an illustration depicting a system according to an embodiment; and Figure 5 is a flow chart illustrating an embodiment of a second method. DETAILED DESCRIPTION
Embodiments of the invention described herein are defined as methods and a control unit, which may be put into practice in the embodiments described below. These embodiments may, however, be exemplified and realised in many different forms and are not to be limited to the examples set forth herein; rather, these illustrative examples of embodiments are provided so that this disclosure will be thorough and complete. Still other objects and features may become apparent from the following detailed description, considered in conjunction with the accompanying drawings. It is to be understood, however, that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the herein disclosed embodiments, for which reference is to be made to the appended claims. Further, the drawings are not necessarily drawn to scale and, unless oth- erwise indicated, they are merely intended to conceptually illustrate the structures and procedures described herein.
Figure 1 A illustrates a scenario with a vehicle 100 comprising a unit 110. The unit 1 10 may comprise e.g. headlights, lighting device, radio, navigator, communication device, CD player, media player, computer, camera, entertainment unit, radar, sensor units, etc. The unit 1 10 may be any kind of device having a unique Identification reference value (ID), e.g. stored in a computer memory in the unit 1 10. The unit 1 10 may be mounted exterior or interior to the vehicle 100. The vehicle 100 may comprise e.g. a truck, a bus, a car, a motorcycle, a bicycle, a boat, an aircraft, a train, an elevator or any other similar vehicle type or other means of conveyance.
Further, the vehicle 100 may be driver controlled or a driverless autonomously controlled vehicle in different embodiments. However, for enhanced clarity, the vehicle 100 is subse- quently described as having a driver.
Figure 1 B illustrates a scenario similar to, or identical with the one already illustrated in Figure 1 A, previously discussed, as seen from an above perspective. According to some embodiments, an identification reference (ID) of the unit 1 10, such as a serial number or other unique identification reference of the unit 1 10, is extracted from the unit 1 10, e.g. from a computer memory in the unit 1 10, and stored in a first external database, associated with an identification reference of the vehicle 100. This may be made e.g. during production of the vehicle 100 when mounting the unit 1 10, or during final testing of the vehicle 100. Further, a second database may be established for storing IDs of stolen units 1 10. Thereby, stolen units 1 10 may be detected and identified. Also, functionalities of the unit 1 10 (or of the vehicle 100 having the stolen unit 1 10 installed) may be turned off or reduced. However, this is further explained and illustrated in Figure 2.
Figure 2 illustrates a system 200 for preventing theft of a unit 1 10 from a vehicle 100 by using database stored information. The unit 1 10 may comprise a processor 115 and a unique ID.
The vehicle 100 comprises a monitoring unit 210. The monitoring unit 210 in the vehicle 100 may communicate with the processor 1 15 in the unit 1 10, e.g. over a communication bus. Such as e.g. a Controller Area Network (CAN) bus, a Media Oriented Systems Transport (MOST) bus, or similar. However, the datalink may alternatively be made over a wireless connection comprising, or at least be inspired by wireless communication technology such as Wi-Fi, Wireless Local Area Network (WLAN), Ultra Mobile Broadband (UMB), Bluetooth (BT), Near Field Communication (NFC), Radio-Frequency Identification (RFID), optical communication such as Infrared Data Association (IrDA) or infrared transmission to name but a few possible examples of wireless communications in some embodiments.
Further, the system 200 may comprise a diagnostic tool 220 in a workshop 230. Such diagnostic tool 220 may comprise e.g. Scania Diagnose and Programmer 3 (SDP3) or similar program. When the vehicle 100 is situated at the workshop 230, the diagnostic tool 220 may extract the unit ID from the processor 1 15 of the unit 1 10, via the monitoring unit 210 of the vehicle 100. Also, an identity reference of the vehicle 100 may be extracted, e.g. from a memory in the vehicle 100.
Additionally, the system 200 also comprises a control unit 240. The control unit 240 may obtain the extracted unit ID from the processor 1 15 of the unit 1 10 and/ or the diagnostic tool 220 of the workshop 230. The control unit 240 may be comprised in the vehicle 100, or alternatively be external to the vehicle 100.
The control unit 240, further has access to a first database 250. The first database 250 stores an identification reference of the unit 1 10, associated with an identification reference of the vehicle 100. These identification references may be generated and/ or stored e.g. when fabricating the vehicle 100, at the factory. When the unit 1 10 of the vehicle 100 is exchanged, or non-present, the vehicle owner or driver of the vehicle 100 may be asked if the reason for the exchange is that the previous unit 1 10 has been stolen. This question/ information may be provided over any arbitrary user interface, such as a computer at the workshop 230; the vehicle owners mobile device; a graphical user interface in the vehicle 100, etc.
If the reason for the exchange is that the previous unit 1 10 has been stolen, the identity reference of the previous unit 1 10 is stored in a second database 260, associated with an indication of theft. The indication may be implicit (i.e. all IDs stored in the second database 260 belongs to stolen units 1 10).
In case the identity reference of the previous unit 1 10 in the second database 260 appears in a check by the diagnostic tool 220 in the workshop 230, an alert message may be issued and presented to the staff of the workshop 230. Thereby, mounting of stolen units 1 10 is prevented and can be avoided.
Further, the vehicle 100 may comprise a navigator or positioning device, based on a satellite navigation system such as the Navigation Signal Timing and Ranging (Navstar) Global Positioning System (GPS), Differential GPS (DGPS), Galileo, GLONASS, or the like. The vehi- cle 100 may also comprise means for communication via a wireless communication interface, e.g. any of the previously mentioned, or at least partly based on or inspired by radio access technologies such as, e.g., 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE), LTE-Advanced, Evolved Universal Terrestrial Radio Access Network (E- UTRAN), Universal Mobile Telecommunications System (UMTS), Wideband Code Division Multiple Access (WCDMA), etc.
It thereby becomes possible to detect and register the geographical position where the unit 1 10 is stolen from the vehicle 100. In some embodiments, the geographical position of the vehicle 100 may be determined by the positioning device when the connection between the unit 1 10, or the processor 1 15 of the unit 1 10, and the monitoring unit 210 is lost. The determined geographical position may then be sent via wireless communication to the control unit 240, for storage in a third database 270.
This information may be collected from a plurality of vehicles 100 and the geographical indi- cations may be collected in the third database 270, possibly together with an identification reference of the unit 1 10 and/ or the vehicle 100. By combining the identification references stored in the second database 260 (comprising IDs of stolen units 1 10) with the geographical positions stored in the third database 270, geographical positions where units 1 10 are stolen may be determined.
Based on the geographical positions stored in the third database 270, a (visual) presentation 5 of zones which are in particular affected by theft may be made. This information may be distributed to e.g. the police, or to vehicle owners/ drivers. Further, in some embodiments, a warning may be emitted when a vehicle 100 is approaching such zone, discouraging the driver from stopping the vehicle 100 there.
10 As many vehicles 100 comprise positioning devices and means for wireless communication, various data and information may be transmitted from the vehicle 100 to the vehicle external control unit 240, such as e.g. identification reference of the unit 1 10 and/ or the vehicle 100. A check may then be made by parsing and comparing the collected identification reference of the unit 1 10 with identification references of stolen units registered in the third database
15 270.
In case the collected identification reference of the unit 1 10 is stored in the second database 260, the control unit 240 may remotely disable certain functions of the unit 1 10, and/ or the vehicle 100. In case the unit 1 10 comprises headlights, the vehicle headlights may be set 20 into safe mode, i.e. main beam may be disabled. In case the unit 1 10 comprises radio, navigator, communication device, CD player, computer, camera, entertainment unit, radar, and/ or sensor units (or similar), the unit 1 10 may be completely disabled.
The driver of the vehicle 100 then has to drive to the workshop 230 to exchange the unit 1 10.
25
Thereby, it becomes more difficult for any thief to sell the stolen units 1 10, as reprogramming is required in order to make the stolen units 1 10 operational. This makes stolen units 1 10 less attractive. Further, information may be compiled concerning which places are most affected by thieves, which information may be forwarded to police authorities, and/ or warn 30 drivers from parking at such places. Furthermore, information may be compiled concerning workshops 230 having tried to mount units 1 10 having been reported as stolen.
Figure 3 illustrates an example of a method 300 for preventing theft of a unit 1 10 from a vehicle 100 by database establishment.
35
The vehicle 100 may be any arbitrary kind of means for conveyance, such as a truck, a bus, a car, a motorcycle, a boat, an aeroplane, a train or other similar vehicle. The unit 1 10 may comprise e.g. headlights, lighting device, radio, navigator, communication device, CD player, computer, camera, entertainment unit, radar, sensor units, etc. The unit 1 10 may comprise a unique identification reference, e.g. stored in a local memory and ex- tractable by a processor 1 15 in the unit 1 10.
In some embodiments, the unit 1 10 may comprise headlights of a truck, trailer or bus.
In order to be able to establish the database correctly, the method 300 may comprise a number of steps 301-307. However, some of these steps 301 -307 may be performed solely in some alternative embodiments, like e.g. step 305-307. Further, the described steps 301 - 307 may be performed in a somewhat different chronological order than the numbering suggests. The method 300 may comprise the subsequent steps:
Step 301 comprises storing an identification reference of the unit 1 10 in a first database 250, associated with an identification reference of the vehicle 100.
The respective identification references may be stored in the first database 250 e.g. when the unit 1 10 is mounted into the vehicle 100, or when a final test of the vehicle 100 before delivery is made.
Step 302 comprises inquiring a vehicle owner/ driver, upon replacing the unit 1 10 of the vehicle 100, if the reason for replacement is theft of the previous unit 1 10.
Steps 303-305 may be performed only when the previous unit 1 10 is declared stolen by the vehicle owner/ driver.
In case the replacement of the unit 1 10 is made for other reasons than theft, such as e.g. malfunction or damage due to an accident, no further steps may be made according to some embodiments.
Step 303 comprises determining the identification reference of the stolen unit 1 10, based on the identification reference of the vehicle 100 stored in the first database 250.
The identification reference of the stolen unit 1 10 is stored in the first database 250, associated with the identification reference of the vehicle 100. Thereby the identification reference of the stolen unit 1 10 may be extracted. Step 304 comprises storing the identification reference of the stolen unit 1 10 in a second database 260, associated with an indication of theft.
The association with theft may be implicit in some embodiments.
Step 305 which only may be comprised in some embodiments, comprises detecting when a connection between the unit 1 10 and a monitoring unit 210 of the vehicle 100 is interrupted.
This moment when the connection is interrupted may be considered the moment when the unit 1 10 is stolen, in case the driver/ vehicle owner later reports the unit 1 10 as stolen.
Step 306 which only may be comprised in some embodiments wherein step 305 has been performed, comprises determining geographical position of the vehicle 100 when the interrupted connection is detected 305.
The geographical position may be determined by a positioning device in the vehicle 100, based on e.g. GPS or similar.
Step 307 which only may be comprised in some embodiments wherein step 305 and 306 have been performed, comprises storing the determined 306 geographical position in a third database 270.
Figure 4 illustrates an embodiment of a system 200 for preventing theft of a unit 1 10 from a vehicle 100 by using database stored information. The system 200 aims at preventing theft of a unit 1 10 from a vehicle 100 by using database stored information.
The system 200 comprises a control unit 240, configured to perform at least some of the previously described steps according to the method 300 described above and illustrated in Figure 3.
The control unit 240 aims at preventing theft of a unit 1 10 from a vehicle 100 by database establishment. The control unit 240 is configured to store an identification reference of the unit 1 10 in a first database 250, associated with an identification reference of the vehicle 100. Further the control unit 240 is configured to inquire a vehicle owner, upon replacing the unit 1 10 of the vehicle 100, if the reason for replacement is theft of the previous unit 1 10. Additionally, the control unit 240 is also configured to determine the identification reference of the stolen unit 1 10, based on the identification reference of the vehicle 100 stored in the first database 250, when the previous unit 1 10 is stolen. Further the control unit 240 is also configured to store the identification reference of the stolen unit 1 10 in a second database 260, associated with an indication of theft.
Furthermore, in some embodiments, the control unit 240 may be configured to obtain geo- graphical position of the vehicle 100 when an interrupted connection between the unit 1 10 and a control unit 240 of the vehicle 100 is interrupted. Also, the control unit 240 may be configured to store the obtained geographical position in a third database 270.
Further, in some alternative embodiments, the control unit 240 may be configured to extract an identification reference of the unit 1 10 from the vehicle 100. in addition, the control unit 240 may also be configured to check if the extracted identification reference is stored in a second database 260, associated with an indication of theft. In addition, the control unit 240 may be further configured to output information stating that the unit 1 10 is stolen when the extracted identification reference is detected in the second database 260 associated with the indication of theft.
In some embodiments, the control unit 240 may also be configured to disable a functionality of the vehicle 100 when detecting the extracted identification reference of the unit 1 10 in the second database 260 associated with the indication of theft.
The control unit 240 may furthermore be additionally configured to output information concerning the stored geographical positions in the third database 270.
Further the system 200 also comprises a first database 250 configured to store an identifi- cation reference of the unit 1 10, associated with an identification reference of the vehicle 100.
The system 200 further comprises a second database 260 for preventing theft of the unit 1 10 from the vehicle 100, wherein the second database 260 is configured to store an identifica- tion reference of a stolen unit 1 10, associated with an indication of theft.
Figure 5 illustrates an example of a method 500 for preventing theft of a unit 1 10 from a vehicle 100 by using database stored information. The database information may have been established according to the previously described method 300 for database establishment, in some embodiments.
The vehicle 100 may be any arbitrary kind of means for conveyance, such as a truck, a bus, a car, a motorcycle, a boat, an aeroplane, a train or other similar vehicle. The unit 1 10 may comprise e.g. headlights, lighting device, radio, navigator, communication device, CD player, computer, camera, entertainment unit, radar, sensor units, etc. The unit 1 10 may comprise a unique identification reference, e.g. stored in a local memory and ex- tractable by a processor 1 15 in the unit 1 10.
In some embodiments, the unit 1 10 may comprise headlights of a truck, trailer or bus.
In order to be able to establish the database correctly, the method 500 may comprise a number of steps 501-505. However, some of these steps 501 -505 may be performed solely in some alternative embodiments, like e.g. step 504-505. Further, the described steps 501 - 505 may be performed in a somewhat different chronological order than the numbering suggests. The method 500 may comprise the subsequent steps: Step 501 comprises extracting an identification reference of the unit 1 10 from the vehicle 100.
The extraction may be made from a memory in the unit 1 10, and provided over a wireless interface.
Step 502 comprises checking if the extracted 501 identification reference is stored in a second database 260, associated with an indication of theft.
The indication may be implicit, i.e. the mere presence of the identification reference in the second database 260 may be regarded as an indication of theft.
In some embodiments, a check may also be made if the identification reference is stored in the first database 250, i.e. if the same identification reference is used repeatedly, which may be a sign of counterfeit (i.e. that the same identification reference is copied on to several units 1 10).
Step 503 comprises outputting information stating that the unit 1 10 is stolen when the extracted 501 identification reference is detected in the second database 260 associated with the indication of theft.
The information may be outputted or presented at a display at the workshop 230, at a display in the vehicle 100, at a mobile device of the vehicle driver/ owner etc. Step 504 which only may be comprised in some embodiments, when the identification reference of the unit 1 10 is stored in the second database 260 associated with the indication of theft, comprises disabling a functionality of the unit 1 10, and/ or vehicle 100, when the extracted 501 identification reference of the unit 1 10 is detected in the second database 260 5 associated with the indication of theft.
It thereby becomes possible to remotely disable some or all functionality of the unit 1 10, or even of the vehicle 100 when the unit 1 10 installed in the vehicle 100 is determined to be a stolen unit 1 10, and/ or a counterfeit product.
10
In case the unit 1 10 comprises headlights, they may be remotely set into safety mode, disabling full light and/ or parking light, for example. Another option may be to disable another functionality of the vehicle 100 than provided by the stolen unit 1 10, such as i.e. disable the radio when the headlights are stolen etc.
15
Step 505 which only may be comprised in some embodiments, may comprise outputting information concerning the stored geographical positions in the third database 270.
This information may be outputted e.g. to (a subset of) vehicle drivers, police authorities etc.
20
The previously described control unit 240, as illustrated in Figure 4 may according to some embodiments comprise a processor 420 for performing various computations, required for performing the method 300 according to at least some of the previously described steps 301 - 307 and/ or the method 500 according to at least some of the previously described steps
25 501 -505. Such processor 420 may comprise one or more instances of a processing circuit, i.e. a Central Processing Unit (CPU), a processing unit, a processing circuit, a processor, an Application Specific Integrated Circuit (ASIC), a microprocessor, or other processing logic that may interpret and execute instructions. The here utilised expression "processor" may thus represent a processing circuitry comprising a plurality of processing circuits, such as,
30 e.g., any, some or all of the ones enumerated above.
Furthermore, the control unit 240 may comprise a memory 425 in some embodiments. The optional memory 425 may comprise a tangible, physical device utilised to store data or programs, i.e., sequences of instructions, on a temporary or permanent basis. According to 35 some embodiments, the memory 425 may comprise integrated circuits comprising silicon- based transistors. The memory 425 may comprise e.g. a memory card, a flash memory, a USB memory, a hard disc, or another similar volatile or non-volatile storage unit for storing data such as e.g. ROM (Read-Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable PROM), EEPROM (Electrically Erasable PROM), etc. in different embodiments.
The control unit 240 also comprises an input unit 410, for receiving signals and data from e.g. a diagnostic tool 220 in a workshop 230; a first database 250; a second database 260 and/ or a third database 270, in various embodiments.
Also the control unit 240 further comprises an output unit 430. The output unit 430 may be configured for receiving signals and data from e.g. a diagnostic tool 220 in a workshop 230; a first database 250; a second database 260 and/ or a third database 270, in various embodiments.
The previously described steps 301 -307 and/ or steps 501 -505 to be performed by the control unit 240 may be implemented through the one or more processors 420 within the control unit 240, together with computer program product for performing at least some of the functions of the steps 301 -307 and/ or steps 501 -505. Thus a computer program product, comprising instructions for performing the steps 301 -307 and/ or steps 501 -505 in the control unit 240 may perform the method 300 comprising at least some of the steps 301 -307 and/ or the method 500 comprising at least some of the steps 501 -505 for preventing theft of a unit 1 10 from a vehicle 100, when the computer program is loaded into the one or more processors 420 of the control unit 240.
The computer program product mentioned above may be provided for instance in the form of a tangible data carrier carrying computer program code for performing at least some of the steps 301 -307 and/ or steps 501 -505 according to some embodiments when being loaded into the one or more processors 420 of the control unit 240. The data carrier may be, e.g., a hard disk, a CD ROM disc, a memory stick, an optical storage device, a magnetic storage device or any other appropriate medium such as a disk or tape that may hold machine readable data in a non-transitory manner. The computer program product may further- more be provided as computer program code on a server and downloaded to the control unit 240 remotely, e.g., over an Internet or an intranet connection.
The terminology used in the description of the embodiments as illustrated in the accompanying drawings is not intended to be limiting of the described methods 300/ 500; the control unit 240 and/ or the system 200. Various changes, substitutions or alterations may be made, without departing from invention embodiments as defined by the appended claims. As used herein, the term "and/ or" comprises any and all combinations of one or more of the associated listed items. The term "or" as used herein, is to be interpreted as a mathematical OR, i.e., as an inclusive disjunction; not as a mathematical exclusive OR (XOR), unless expressly stated otherwise. In addition, the singular forms "a", "an" and "the" are to be inter- preted as "at least one", thus also possibly comprising a plurality of entities of the same kind, unless expressly stated otherwise. It will be further understood that the terms "includes", "comprises", "including" or "comprising", specifies the presence of stated features, actions, integers, steps, operations, elements, or components, but do not preclude the presence or addition of one or more other features, actions, integers, steps, operations, elements, com- ponents, or groups thereof. A single unit such as e.g. a processor may fulfil the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage. A computer program may be stored/ distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms such as via Internet or other wired or wireless communication system.

Claims

PATENT CLAIMS
1 . A method (300) for preventing theft of a unit (1 10) from a vehicle (100) by database establishment; which method (300) comprises:
storing (301 ) an identification reference of the unit (1 10) in a first database (250), associated with an identification reference of the vehicle (100);
inquiring (302) a vehicle owner, upon replacing the unit (1 10) of the vehicle (100), if the reason for replacement is theft of the previous unit (1 10), and when the previous unit (1 10) is stolen:
determining (303) the identification reference of the stolen unit (1 10), based on the identification reference of the vehicle (100) stored in the first database (250); and
storing (304) the identification reference of the stolen unit (1 10) in a second database (260), associated with an indication of theft.
2. The method (300) according to claim 1 , further comprising:
detecting (305) when a connection between the unit (1 10) and a monitoring unit
(210) of the vehicle (100) is interrupted;
determining (306) geographical position of the vehicle (100) when the interrupted connection is detected (305);
storing (307) the determined (306) geographical position in a third database (270).
3. A control unit (240) for preventing theft of a unit (1 10) from a vehicle (100) by database establishment; wherein the control unit (240) is configured to:
store an identification reference of the unit (1 10) in a first database (250), associated with an identification reference of the vehicle (100);
inquire a vehicle owner, upon replacing the unit (1 10) of the vehicle (100), if the reason for replacement is theft of the previous unit (1 10); and when the previous unit (1 10) is stolen:
determine the identification reference of the stolen unit (1 10), based on the identification reference of the vehicle (100) stored in the first database (250); and
store the identification reference of the stolen unit (1 10) in a second database (260), associated with an indication of theft.
4. The control unit (240) according to claim 3, wherein the control unit (240) is configured to:
obtain geographical position of the vehicle (100) when an interrupted connection between the unit (1 10) and a control unit (240) of the vehicle (100) is interrupted; and
store the obtained geographical position in a third database (270).
5. A method (500) for preventing theft of a unit (1 10) from a vehicle (100) by using database stored information; which method (500) comprises:
extracting (501 ) an identification reference of the unit (1 10) from the vehicle (100); checking (502) if the extracted (501 ) identification reference is stored in a second database (260), associated with an indication of theft; and
outputting (503) information stating that the unit (1 10) is stolen when the extracted (501 ) identification reference is detected in the second database (260) associated with the indication of theft.
6. The method (500) according to claim 5, further comprising, when the identification reference of the unit (1 10) is detected in the second database (260), associated with the indication of theft:
disabling (504) a functionality of the vehicle (100).
7. The method (500) according to any of claim 5 or claim 6, further comprising:
outputting (505) information concerning the stored geographical positions in the third database (270).
8. A control unit (240) for preventing theft of a unit (1 10) from a vehicle (100) by using database stored information; wherein the control unit (240) is configured to:
extract an identification reference of the unit (1 10) from the vehicle (100);
check if the extracted identification reference is stored in a second database (260), associated with an indication of theft; and
output information stating that the unit (1 10) is stolen when the extracted identifica- tion reference is detected in the second database (260) associated with the indication of theft.
9. The control unit (240) according to claim 8, further configured to:
disable a functionality of the vehicle (100) when detecting the extracted identification reference of the unit (1 10) in the second database (260) associated with the indication of theft.
10. The control unit (240) according to any of claim 8 or claim 9, further configured to: output information concerning the stored geographical positions in the third data- base (270).
1 1 . The control unit (240) according to any of claims 3 - 4 or claims 8 - 10, wherein the unit (1 10) is a headlamp unit of the vehicle (100).
12. A computer program comprising program code for performing a method (300) according to any of claims 1 -2, or a method (500) according to any of claims 5-7 when the computer program is executed in a computer.
5
13. A second database (260) for preventing theft of a unit (1 10) from a vehicle (100), wherein the second database (260) is configured to store an identification reference of a stolen unit (1 10), associated with an indication of theft.
10 14. A system (200) for preventing theft of a unit (1 10) from a vehicle (100) by using database stored information, comprising:
a control unit (240) according to any of claims 3-4 or claims 8-1 1 ;
a first database (250) configured to store an identification reference of the unit (1 10), associated with an identification reference of the vehicle (100); and
15 a second database (260) according to claim 13.
PCT/SE2017/050038 2016-01-29 2017-01-17 Method and system for preventing theft of a unit from a vehicle WO2017131571A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE112017000265.6T DE112017000265T5 (en) 2016-01-29 2017-01-17 Method and system for preventing theft of a unit from a vehicle

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE1650113-2 2016-01-29
SE1650113A SE1650113A1 (en) 2016-01-29 2016-01-29 Method and system for preventing theft of a unit from a vehicle

Publications (1)

Publication Number Publication Date
WO2017131571A1 true WO2017131571A1 (en) 2017-08-03

Family

ID=59398610

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2017/050038 WO2017131571A1 (en) 2016-01-29 2017-01-17 Method and system for preventing theft of a unit from a vehicle

Country Status (3)

Country Link
DE (1) DE112017000265T5 (en)
SE (1) SE1650113A1 (en)
WO (1) WO2017131571A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110562199A (en) * 2018-06-06 2019-12-13 罗伯特·博世有限公司 Method for identifying an environmental sensor unit, computing unit and storage medium
EP3689686A1 (en) * 2019-01-30 2020-08-05 Marelli Automotive Lighting Reutlingen (Germany) GmbH Motor vehicle light, circuit arrangement for a motor vehicle light and control circuit and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040075559A1 (en) * 2002-10-07 2004-04-22 Brodine Michael L. System and method for identifying component parts in an assembly
US20040098179A1 (en) * 2002-11-14 2004-05-20 Sokoloski Darren Scott Vehicle security device
US20050143883A1 (en) * 2003-12-24 2005-06-30 Honda Motor Co., Ltd. Vehicle management system
US20120078444A1 (en) * 2010-09-23 2012-03-29 Denso Corporation Prevention system against invalid use of stolen battery

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040075559A1 (en) * 2002-10-07 2004-04-22 Brodine Michael L. System and method for identifying component parts in an assembly
US20040098179A1 (en) * 2002-11-14 2004-05-20 Sokoloski Darren Scott Vehicle security device
US20050143883A1 (en) * 2003-12-24 2005-06-30 Honda Motor Co., Ltd. Vehicle management system
US20120078444A1 (en) * 2010-09-23 2012-03-29 Denso Corporation Prevention system against invalid use of stolen battery

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110562199A (en) * 2018-06-06 2019-12-13 罗伯特·博世有限公司 Method for identifying an environmental sensor unit, computing unit and storage medium
EP3689686A1 (en) * 2019-01-30 2020-08-05 Marelli Automotive Lighting Reutlingen (Germany) GmbH Motor vehicle light, circuit arrangement for a motor vehicle light and control circuit and system

Also Published As

Publication number Publication date
DE112017000265T5 (en) 2018-09-13
SE1650113A1 (en) 2017-07-30

Similar Documents

Publication Publication Date Title
US10308243B2 (en) Vehicle remote park assist with occupant detection
US8115656B2 (en) Vehicle security and monitoring system
US7327250B2 (en) System for providing a virtual vehicle boundary
US20160050309A1 (en) Restrictive cell phone use and anti-texting apparatus and methods
US10262291B2 (en) System for delivering shipping items
US20150365479A1 (en) Electronic vehicle information system, electronic license plates and other related devices and methods
CN110023112B (en) System and method for vehicle wheel theft prevention for a vehicle
US20160019775A1 (en) System For Transmitting Baggage Items
US20190061692A1 (en) Apparatus and method for pairing smartphone with vehicle tracking device
US11557125B2 (en) Method for monitoring the environment of a vehicle
EP3349199B1 (en) Method for determining a vehicle driven by a drunk driver, driving safety device and system, and server
CN111542458B (en) Method for stopping a vehicle
US20150087241A1 (en) Rf jamming detection and mitigation system
CN107107868A (en) For automobile and the system and method for the antitheft tracking of automotive wheel
WO2017160201A1 (en) Method and control unit for vehicle self-diagnosis
EP1593564A1 (en) Communication method and system for vehicles
US11390245B2 (en) Tire anti-theft system, vehicle control apparatus, and vehicle control method
US11186254B2 (en) Tire theft monitoring system, tire theft monitoring apparatus, and tire theft monitoring method
CN111914237A (en) Driver biometric authentication and GPS service
WO2017131571A1 (en) Method and system for preventing theft of a unit from a vehicle
WO2019050449A1 (en) Method and control arrangement for activation of a communication device
US20090085732A1 (en) Method, Tire Sensor Device, Central Control Unit and System for Anti-Theft Protection Through Tire Removal Recognition
EP4283585A1 (en) Chain of custody provenance for an autonomous vehicle
CN112537319A (en) Method, device and storage medium for remote control of a motor vehicle
CN113525397A (en) Method and control device for self-diagnosis of vehicle

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17744645

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 112017000265

Country of ref document: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17744645

Country of ref document: EP

Kind code of ref document: A1