WO2022130399A1 - Système de suivi et de localisation d'un véhicule volé et procédé associé - Google Patents

Système de suivi et de localisation d'un véhicule volé et procédé associé Download PDF

Info

Publication number
WO2022130399A1
WO2022130399A1 PCT/IN2021/050912 IN2021050912W WO2022130399A1 WO 2022130399 A1 WO2022130399 A1 WO 2022130399A1 IN 2021050912 W IN2021050912 W IN 2021050912W WO 2022130399 A1 WO2022130399 A1 WO 2022130399A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication device
server
unique address
stolen vehicle
vehicle
Prior art date
Application number
PCT/IN2021/050912
Other languages
English (en)
Inventor
Ajay Kumar Vasu
Balaganesh Selvarajan
Original Assignee
Tvs Motor Company Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tvs Motor Company Limited filed Critical Tvs Motor Company Limited
Publication of WO2022130399A1 publication Critical patent/WO2022130399A1/fr

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/33Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/20Monitoring the location of vehicles belonging to a group, e.g. fleet of vehicles, countable or determined number of vehicles
    • G08G1/205Indicating the location of the monitored vehicles as destination, e.g. accidents, stolen, rental
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/101Bluetooth
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/30Vehicles applying the vehicle anti-theft devices
    • B60R2325/306Motorcycles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/102Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner

Definitions

  • the present invention relates to a system for tracking and locating a stolen vehicle and a method therefor.
  • One of the most used anti-theft solution includes a keyfob, which forms part of an electronic lock that controls access to a vehicle without using traditional mechanical key.
  • a keyfob is a small device that uses radio transmission to allow access to a vehicle. Whenever the rider has the key, the keyfob enables searching of the vehicle in the vicinity, thereby allowing access to the same. Hence, the keyfobs are useful only if the vehicle is in proximity to the same.
  • Another solution that is known in the art involves telematics based anti-theft solution.
  • the vehicle has a tracking device which uses Global Positioning System (GPS) for locating the vehicle even at distance from the rider or the vehicle owner.
  • GPS Global Positioning System
  • such system essentially requires a mobile device linked with the telematic unit for obtaining tracking information of the vehicle.
  • the telematic unit installed in the vehicle will have to be activated for the anti-theft solution to work. Further, it is also easier to locate telematic unit in a vehicle and remove them to prevent tracking of the vehicle.
  • GNSS Global navigation satellite system
  • cost involved with a dedicated instrument for locating the vehicle and transmitting location information is quite high. The high cost is attributed to purchase price, installation within a vehicle (or other device), and subscriber services.
  • the present invention is directed to a system for locating and tracking a stolen vehicle, the system comprises a server; a first communication device mounted on the stolen vehicle, the first communication device having a unique address and configured to communicate using short-range wireless communication; a second communication device for communicating the unique address of the first communication device to the server thereby intimating the server about the stolen vehicle; and a third communication device configured to communicate with the first communication device using short-range wireless communication, the third communication device further configured to communicate with the server over a network to receive the unique address of the first communication device, and to send geographic location of the stolen vehicle when the third communication device communicates with the first communication device.
  • the second communication device communicates with the server by means of an application, said application being executable on the second communication device and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data.
  • the third communication device communicates with the server by means of an application, said application being executable on the third communication device and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data.
  • the application is a web application or a mobile application.
  • the second communication device and third communication device independent of each other, is a mobile telephone or a computer.
  • the short-range wireless communication is Bluetooth.
  • each of (i) the plurality of messages, and (ii) geographic location data in the second communication device and the third communication device can be selected from at least one of electronic data, synthesized voice data, and actual voice data.
  • the second communication device comprises the unique address of the first communication device mounted on the stolen vehicle
  • the third communication device comprises a unique address of a first communication device mounted on a vehicle.
  • the present invention is directed to a method for locating and tracking a stolen vehicle, said method comprising sending a message from a second communication device to a server thereby intimating the server about the stolen vehicle, the second communication device comprising a unique address of a first communication device mounted on the stolen vehicle; relaying a message by the server, said message comprising the unique address; receiving the message by a third communication device, the third communication device storing the unique address; scanning the unique address and generating a scanned response; sending a message from the third communication device to the server when the scanned response contains the unique address, said message comprising at least the geographic location of the stolen vehicle, thereby locating the stolen vehicle; receiving the message from the server to the second communication device, thereby tracking the stolen vehicle.
  • the server is pre-programmed with identity data comprising at least the unique address corresponding to first communication device, and the unique address of the first communication device. Further, the message is received as a notification.
  • Figure 1 illustrates a system for locating and tracking a stolen device in accordance with an embodiment of the present invention.
  • Figure 2 shows a third communication device communicating with first communicating devices of the vehicles in accordance with an embodiment of the present invention.
  • Figure 3 illustrates the third communication device of Figure 2 communicating with a second communication device in accordance with an embodiment of the present invention.
  • Figure 4 illustrates a method for locating and tracking a stolen vehicle in accordance with an embodiment of the present invention.
  • An aspect of the present invention relates to a system for locating and tracking a stolen vehicle.
  • FIG. 1 illustrates a system (100) for locating and tracking the stolen vehicle (SV) in accordance with an embodiment of the present invention.
  • SV stolen vehicle
  • V vehicle
  • an “affected node” refers to an authorized user or rider whose vehicle has been stolen or is lost.
  • a “non-affected node” refers to an authorized user whose vehicle is still with him, i.e. neither stolen nor lost.
  • stolen vehicle (SV)” or “vehicle (V)” can be any vehicle capable of being used by the affected node or the non-affected for commuting purpose.
  • the stolen vehicle (SV) and the vehicle (V), independent of each other can be selected from a two-wheeler, three-wheeler, four-wheeler, and a multi-wheeler vehicle.
  • network refers to a communication network which can be selected from a cellular or mobile or wireless network.
  • a wireless or cellular communication network that uses a protocol such as 802.11 , CDMA, GSM, FDMA, or LTE.
  • the system includes a server (110), a first communication device (120) mounted on the stolen vehicle (SV), a second communication device (130) and a third communication device.
  • the first communication device (120) has a unique address (UA) and configured to communicate using short-range wireless communication.
  • the second communication device (130) communicates the unique address (UA) of the first communication device (120) to the server (110) thereby intimating the server (110) about the stolen vehicle (SV).
  • the third communication device (140) is configured to communicate with the first communication device (120) using short-range wireless communication.
  • the third communication (140) device is further configured to communicate with the server (110) over a network to receive the unique address (UA) of the first communication device (120), and to send geographic location of the stolen vehicle (SV) when the third communication device (140) communicates with the first communication device (120).
  • the first communication device (120), the second communication device (130), the third communication device (140), fourth communication device (150) and any additional communication device (such as a fifth communication device) together, in the present context, is referred as communication devices.
  • the server (110) is a server computer. Accordingly, the server (1 10) can include but not limited to a processor, a memory, a communication port, and a storage device such as a database. The server (110) is capable of communicating with at least the second communication device (130) and/or the third communication device (140) via network, such as a mobile network or a wireless network.
  • network such as a mobile network or a wireless network.
  • the short-range wireless communication refers to wireless communication means which is capable of communicating up to a distance of 100m between at least any two selected from the first communication device (120), the second communication device (130), and the third communication device (140).
  • Suitable short- range wireless communication can be selected from Bluetooth, Wi-Fi, WiMax, and HomeRF.
  • the short-range wireless communication is via Bluetooth or ZigBee, or ANT.
  • the first communication device (120) is mounted on the stolen vehicle (SV).
  • “mounted” refers to the first communication device (120) being installed on the stolen vehicle (SV) at a location on the stolen vehicle (SV) which is effective for establishing the communication using the short-range wireless communication.
  • the first communication device (120) is mounted in the vicinity of the affected node riding the stolen vehicle (SV). For instance, if the stolen vehicle (SV) is a two-wheeler, the first communication device (120) can be installed on the fuel tank.
  • the fourth communication device (150) is also mounted on the vehicle (V) of the non-affected node.
  • the first communication device (120) has the unique address (UA) and is configured to communicate using short-range wireless communication.
  • the first communication device (120) is capable of communicating with the second communication device (130) using the short-range wireless communication.
  • This refers to the first communication device (120) pairing with the second communication device (130) and thus capable of communicating with each other.
  • Any reference to “pairing” or “pair” or “paired” in the context of the communication devices refers to them being connected to each other using the short-range wireless communication, thereby capable of communicating.
  • the unique address (UA) is stored in the second communication device (130).
  • the first communication device (120) comprises a short-range wireless transceiver (120a) for communicating with the second communication device (130); a memory (120b) for storing the unique address (UA); and a location transceiver (120c) for transmitting data representing the geographic location of the first communication device (120).
  • the short-range wireless transceiver (120a), memory (120b) and the location transceiver (120c) are together known as building blocks of the first communication device (120).
  • the first communication device (120) could be a commercially available device comprising the above building blocks, which can be mounted on the stolen vehicle (SV) and is capable of communicating using short-range wireless communication.
  • the short-range wireless transceiver (120a) allows communication to and from the first communication device (120).
  • the pairing between the communication devices occurs by way of short-range wireless communication signals, for example Bluetooth signals.
  • the unique address (UA) of the first communication device (120) is preferably the short-range wireless communication name and/or serial number which is unique for each device (120).
  • the unique address could be a serial number of the short-range wireless transceiver (120a).
  • the unique address (UA) is stored permanently in the memory (120b).
  • any known method can be used.
  • One known group of methods is based on dedicated Telecom networks or dedicated segments of a Telecom network. These methods are usually referred to as “network based', i.e., they employ a wide area array of antennas and transceivers coupled together, such that the first communication device (120) can be located whenever being contained within the area that is covered by said antennas. Such methods usually require minimal modifications in the communication devices the location of which is to be determined by this network.
  • the latter methods are further subdivided into “sub-methods’.
  • One such sub-method measures the Angle of Arrival (AOA) of a signal emitted by the first communication device (120), received at least at two of the network’s antennas. Knowing the location of these antennas and the AOA of the received signal, the location of the first communication device (120) can be derived by trigonometric calculations.
  • AOA Angle of Arrival
  • Another sub-method measures the Time of Arrival (TOA) of a signal emitted by the first communication device (120), received at least at three of the network’s antennas. Knowing the location of these antennas and the TOA of the received signal, the location of the first communication device (120) can be derived.
  • the TOA method is based on spherical radio navigation, i.e., the geometric locus of points having a same range from a fixed point is a sphere surface, the fixed point of which is its center.
  • the fixed points are the receiving networks antennas, and the range is [TOA x C] for each receiving antenna, wherein “C” is the velocity of light or electromagnetic waves.
  • the location of the first communication device (120) is calculated as one of the two points, defined by the crossing sector of all three sphere surfaces (the crossing sector of two spherical surfaces is a circle, and this circle crosses a third sphere surface at two points).
  • a fourth antenna is used to remove this ambiguity or to compensate for clock discrepancies.
  • the geographic location of the first communication device (120) is determined using the location transceiver (120c).
  • the data representing the geographic location is determined by utilizing satellite signals received from a navigation system such as Global Positioning System (GPS) or Galileo or GLONASS.
  • GPS Global Positioning System
  • Galileo Galileo
  • GLONASS Global Positioning System
  • the embodiments describing the first communication device (120) mounted on the stolen vehicle (SV), as above, are also applicable for the fourth communication device (150) mounted on the vehicle (V) and having a unique address (UA').
  • the system (100) comprises the second communication device (130) for communicating the unique address (UA) of the first communication device (120) to the server (110) thereby intimating the server (110) about the stolen vehicle (SV).
  • the second communication device (130) is a mobile telephone or a computer.
  • the unique address (UA) of the first communication device (120) is communicated to the server (110) by the affected node by way of at least a call, an application, or a short message service, each sent using a network.
  • the second communication device (130) communicates with the server (110) by means of an application (131 ), said application (131 ) being executable on the second communication device (130) and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data.
  • the application (131 ) is a web application or a mobile application.
  • the second communication device (130) is a mobile computer, for e.g. a laptop computer, tablet computer, and the likes.
  • the web application is an application software that runs on a web server, unlike computer-based software programs that are run locally on an operating system. Web applications can be accessed by the affected node through a web browser over a network.
  • the second communication device (130) is a mobile telephone.
  • the mobile application also referred to as an app
  • the application (131 ) is a type of application software designed to run on a mobile device, such as a smartphone or tablet computer.
  • the application (131 ) is a mobile application installed in the second communication device (130) and having a user interface that displays various options or buttons to the affected node to select from.
  • the server is intimated about the stolen vehicle (SV).
  • the second communication device (130) comprises a short- range wireless transceiver (131 ) for communicating with the first communication device (120); a memory (131 b) for storing the unique address (UA); a circuitry (131 c) for sending, receiving, and processing the plurality of messages to or from the central server (110) over a network; and a location transceiver (131d) for transmitting data representing the geographic location of the first communication device (120).
  • the short-range wireless transceiver (131 ), memory (131 b), circuitry (131 c) and location transceiver (131 d) are together known as building blocks of the second communication device (130). Preferably, these building blocks are embedded in the second communication device (130), for example in a mobile telephone, in a manner known to the person skilled in the art.
  • the second communication device (130) is further capable of sending geographic location of the stolen vehicle (SV) when the second communication device (130) communicates with the first communication device (120).
  • the system (100) of the present invention also comprises of the third communication device (140) which is configured to communicate with the first communication device (120) using short-range wireless communication, the third communication (140) device further configured to communicate with the server (110) over a network to receive the unique address (UA) of the first communication device (120), and to send geographic location of the stolen vehicle (SV) when the third communication device (140) communicates with the first communication device (120).
  • the third communication device (140) which is configured to communicate with the first communication device (120) using short-range wireless communication
  • the third communication (140) device further configured to communicate with the server (110) over a network to receive the unique address (UA) of the first communication device (120), and to send geographic location of the stolen vehicle (SV) when the third communication device (140) communicates with the first communication device (120).
  • the non-affected node is in possession of the third communication device (140), while the affected node is in possession of the second communication device (130).
  • the third communication device (140) is a mobile telephone or a computer. Accordingly, the corresponding embodiments for the mobile telephone and the computer described in the context of the second communication device (130), as above, are also applicable to the third communication device (140).
  • the third communication device (140) Similar to the second communication device (130), the third communication device (140) also communicates with the server (110) by means of an application (141 ), said application (141 ) being executable on the third communication device (140) and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data.
  • the embodiments corresponding to the application (131 ) in the context of the second communication device (130), as above, are also applicable for the application (141 ) of the third communication device (140).
  • the third communication device (140) also comprises a short-range wireless transceiver (141 ) for communicating with the first communication device (120); a memory (141 b) for storing at least the unique address (UA); a circuitry (141 c) for sending, receiving, and processing the plurality of messages to or from the central server (110) over a network; and a location transceiver (141d) for transmitting data representing the geographic location of the first communication device (120).
  • the short-range wireless transceiver (141 ), memory (141 b), circuitry (141 c) and location transceiver (141d) are together known as building blocks of the second communication device (130).
  • these building blocks are embedded in the third communication device (140), for example in a mobile telephone, in a manner known to the person skilled in the art.
  • the memory (141 b) is further capable of storing the unique address (UA') of the fourth communication device (150) mounted on the vehicle (V).
  • the third communication device (140) is a telematics unit comprising a short-range wireless transceiver as described herein.
  • the location of the stolen vehicle (SV) can be directly communicated to the server (110) by the third communication device (140) via a network, i.e. without using the application (141 ).
  • each of (i) the plurality of messages, and (ii) geographic location data, in the second communication device (130) and the third communication device (140) can be selected from at least one of electronic data, synthesized voice data, and actual voice data.
  • the system (100) further comprises an auxiliary node (not shown in Figures).
  • a fifth communication device having a unique address (UA") is mounted on the auxiliary node.
  • the fifth communication device is capable of communicating with the first communication device (120) of the affected node and the fourth communication device (150) of the non-affected node, each using the short-range wireless communication.
  • the fifth communication device is also capable of communicating with the second communication device (130) and the third communication device (140), each using the short-range wireless communication.
  • the manner of communication of the fifth communication device using the short-range wireless communication is same as that described herein for the second communication device (130) and the third communication device (140).
  • the fifth communication device also includes the building blocks similar to that of the second communication device (130) and the third communication device (140).
  • Suitable examples of auxiliary nodes include, but are not limited to, fuel stations, vehicle service wagons, vehicle service stations, vehicle dealership centers, vehicle charging stations, and rider accessories such as helmets, jackets, smart bands, and smart watches, etc.
  • the present system (100) has been described in the context of tracking and locating the stolen vehicle (SV), it is also possible to use this system (100) for various other similar purposes. For instance, the system (100) can be used to obtain the geographic location of a particular area which is prone to maximum number of vehicles being stolen. This is determined based on feedback shared by several affected nodes with the server (1 10) and local public servants, for e.g. police or cops.
  • the system (100) is also capable of locating and tracking more than one stolen vehicles (SV). In that case, there will be more than one communication devices capable of communicating with each other using the short-range wireless communication, as above.
  • the system (100), as described herein, is easy-to-use, economical and does not requires using the existing complex infrastructures, such as but not limited to telematics and keyfobs.
  • the second communication device reports about the theft of stolen vehicle (SV) to the server (110).
  • the server (110) is pre-programmed with identity data comprising at least the unique address (UA) corresponding to the first communication device (120), and the unique address (UA') of the fourth communication device (150).
  • the second communication device (130) and the third communication device (140) need to be first registered with the server (110). Said otherwise, the identity data for each of the affected node and the non-affected node is created and stored with the server (110).
  • the fourth communication device (150) is paired with the second communication device (130).
  • the server (110) creates the identity data for the non-affected node which includes at least the unique address (UA') of the vehicle (V). Additionally, the identity data further includes details such as, but not limited to, name, email address, mobile telephone number, customized username, address of residence, blood group, and the likes of the non-affected node.
  • This creation of identity data enables the server (110) to detect and prevent the nonauthorized user from registering his details which include at least the unique address (UA) of the stolen vehicle (SV). Since the unique address (UA) of the stolen vehicle (SV) is already registered against the affected node, the server can easily detect the nonauthorized user and further communicate this unauthorized access or connection request to the affected node.
  • the affected node intimates the server (110) about the stolen vehicle (SV) by the second communication device (130). For this, a message (M1 ) is sent from the second communication device (130) to the server (110). Since the server (110) already has the identity data of the affected node, the details of the affected node are first verified by the server (110), as described above. [055]
  • the message (M1 ) is sent by means of the application (131 ), preferably the mobile application.
  • the affected node selects or clicks the requisite option or button from the mobile application installed in the second communication device (130). Subsequently, the message (M1 ) is sent to the server (110) via the network. Alternately, the message (M1 ) can also be sent by way of call or short message service.
  • the message (M1 ) is sent by means of the web application.
  • the affected node would be required to visit the webpage from where the requisite option needs to be selected or clicked to intimate the server about the stolen vehicle (SV).
  • the message (M1 ) is sent by manually clicking a button or by voice communication from the application (131 ) in the second communication device (130).
  • a message (M2) is relayed by the server (110) to the third communication device (140) via a network. Once the identity data of the affected user is verified by the server (1 10), the message (M2) is generated and is sent to the third communication device (140).
  • the message (M2) comprises the unique address (UA) of the first communication device (120) mounted on the stolen vehicle (SV).
  • the third communication device (140) receives the message (M2) only if the corresponding identity details are registered with the server (110). At step 406, the third communication device receives the message (M2) relayed by the server 110 and stores the unique address (UA).
  • the third communication device (140) already has the unique address (UA') of the fourth communication device (150) mounted on the vehicle (V), stored in the memory (141 b).
  • the message (M2) is preferably received as a notification in the third communication device (140), particularly in the application (141 ).
  • the non-affected node is required to respond to the message (M2) to allow the unique address (UA) of the stolen vehicle (SV) to be stored. If the non-affected node does not respond to the message (M2) or prefers to ignore the message (M2), the unique address (UA) of the stolen vehicle (SV) is not stored.
  • the message (M2) is generated by the following steps: receiving the message (M1 ) from the second communication device (130) by the server (110), verifying the identity data, and sending the message (M2) to the third communication device (140).
  • the method stores the unique address (UA) from the message (M2) in the memory (141 b) of the third communication device (140).
  • the unique address (UA) is continuously scanned by the third communication device (140) and a scanned response is generated.
  • the scanned response contains the output of the scanning, i.e. whether the unique address of all vehicles (including the stolen vehicle (SV)) in the vicinity is same as UA or not.
  • the method of the present invention is also capable of scanning the unique address (UA) when the affected node and/or the non-affected node are on the move, i.e. in motion. Said otherwise, whenever the affected node and/or the non-affected node are in the vicinity of a vehicle which has the first communication device (1 10) mounted on it, the second communication device (130) and the third communication device (140) pair with the first communication device (110) of that vehicle. Once the pairing is done, the unique address of that vehicle is stored in the memory (131 b, 141 b) and is scanned against the unique address (UA) of the stolen vehicle (SV).
  • step 410 when the scanned response of the vehicle (V) does not match with the unique address (UA) of the stolen vehicle (SV), the scanning ends. Once the third communication device (140) pairs with the first communication device (120) of another vehicle, which may or may not be the stolen vehicle (SV), the unique address of that vehicle is stored in the memory (141 b) and the scanning happens again. Said otherwise, the steps 408 and 410 are performed once again, as shown in Figure 4.
  • the message (M3) is automatically relayed, at step 410, from the third communication device (140) to the server (110), preferably from the application (141 ). Scanning ends now.
  • the message (M3) comprises at least the geographic location of the stolen vehicle (SV), thereby locating the stolen vehicle (SV).
  • the server receives the message (M3) from the third communication device (140), verifies the identity data, and sends the message (M3) to the second communication device (130).
  • the identity data is verified to ensure that the details correspond to the affected node only. Once the verification is satisfactory or the details of the affected node match, the message (M3) is sent to the second communication device (130) of the affected node.
  • message (M3) is received from the server (110) by the second communication device (130). As shown in Figures 3 and 4, the message (M3) is received as a notification in the application (131 ) in the second communication device (130).
  • the message (M3) contains at least the geographic location of the stolen vehicle (SV). Preferably, the data representing the geographic location is converted from geographic coordinates to a corresponding physical address.
  • the affected node can then track down the stolen vehicle (SV) and update the status of his vehicle in the application (131 ) of the second communication device (130).
  • the server (110) is updated with the details.
  • a message (M4) is sent from the server (1 10) to the third communication device (140) of the non-affected nodes, preferably in the application (141 ).
  • the message (M4) preferably contains a text message informing the non-affected nodes that the stolen vehicle (SV) has been found.
  • the steps (408) and (410) are performed without the non-affected node being prompted for necessary action or disturbed. Said otherwise, the steps (408) and (410) are performed in the background without bothering the non-affected node. Moreover, the steps (C) and (D), together referred as step (E), are many a times repeated at least once or until the unique address (UA') is same as the unique address (UA).
  • the message (M3) further comprises a timestamp depicting the time corresponding to accessing the geographic location data of the first communication device (120) mounted on the stolen vehicle (SV).
  • a timestamp depicting the time corresponding to accessing the geographic location data of the first communication device (120) mounted on the stolen vehicle (SV).
  • the present system and its corresponding method is capable of providing a more accurate location of the stolen vehicle (SV) to the second communication device (130) of the affected node.
  • the method is also capable of establishing a connected vehicle concept.
  • the connected vehicle concept several vehicles are able to exchange information via the second communication device (130) between the riders.
  • the first communication devices (120) of the vehicles need to be paired with the second communication devices (130) and/or the third communication devices (140) using short- range wireless communication.
  • the application (131 , 141 ) enables the exchange of information between the users.
  • the application (131 , 141) allows the non-affected node to interact and exchange information with other non-affected nodes. In this manner the non-affected node visiting the new location can exchange any information with other non-affected node, for instance, places to visit, vehicle service centers, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Mechanical Engineering (AREA)
  • Traffic Control Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)

Abstract

Système de suivi et de localisation d'un véhicule volé et procédé associé La présente invention concerne un système de suivi et de localisation d'un véhicule volé (SV) comprenant un serveur (110) ; un premier dispositif de communication (120) monté sur le véhicule volé (SV), le premier dispositif de communication (120) ayant une adresse unique (UA) et étant configuré pour communiquer à l'aide d'une communication sans fil de courte portée, un deuxième dispositif de communication (130) pour communiquer l'adresse unique du premier dispositif de communication (120) au serveur (110), ce qui permet d'informer le serveur (110) au sujet du véhicule volé (SV) ; et un troisième dispositif de communication (140) configuré pour communiquer avec le premier dispositif de communication (120) à l'aide d'une communication sans fil de courte portée, le troisième dispositif de communication (140) étant en outre configuré pour communiquer avec le serveur (110) sur un réseau afin de recevoir l'adresse unique (UA) du premier dispositif de communication (120) et pour envoyer l'emplacement géographique du véhicule volé (SV) lorsque le troisième dispositif de communication (140) communique avec le premier dispositif de communication (120).
PCT/IN2021/050912 2020-12-15 2021-09-15 Système de suivi et de localisation d'un véhicule volé et procédé associé WO2022130399A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202041054488 2020-12-15
IN202041054488 2020-12-15

Publications (1)

Publication Number Publication Date
WO2022130399A1 true WO2022130399A1 (fr) 2022-06-23

Family

ID=78621952

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2021/050912 WO2022130399A1 (fr) 2020-12-15 2021-09-15 Système de suivi et de localisation d'un véhicule volé et procédé associé

Country Status (1)

Country Link
WO (1) WO2022130399A1 (fr)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003036493A (ja) * 2001-07-23 2003-02-07 Matsushita Electric Ind Co Ltd 盗難追跡及び緊急通報装置
JP2006211014A (ja) * 2005-01-25 2006-08-10 Matsushita Electric Ind Co Ltd 捜索支援システム
JP2008140128A (ja) * 2006-12-01 2008-06-19 Denso Corp 車両検出装置
WO2014007754A2 (fr) * 2012-07-06 2014-01-09 Nida Tech Sweden Ab PROCÉDÉS, NœUDS ET PROGRAMME D'ORDINATEUR POUR LE POSITIONNEMENT D'UN DISPOSITIF
JP2016110617A (ja) * 2014-11-28 2016-06-20 株式会社ナスカ 移動物体の位置検索システム
JP2016126602A (ja) * 2015-01-06 2016-07-11 三洋テクノソリューションズ鳥取株式会社 車載通信機
EP3119068A1 (fr) * 2014-03-10 2017-01-18 Ntt Docomo, Inc. Dispositif de serveur et système de traitement d'informations

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003036493A (ja) * 2001-07-23 2003-02-07 Matsushita Electric Ind Co Ltd 盗難追跡及び緊急通報装置
JP2006211014A (ja) * 2005-01-25 2006-08-10 Matsushita Electric Ind Co Ltd 捜索支援システム
JP2008140128A (ja) * 2006-12-01 2008-06-19 Denso Corp 車両検出装置
WO2014007754A2 (fr) * 2012-07-06 2014-01-09 Nida Tech Sweden Ab PROCÉDÉS, NœUDS ET PROGRAMME D'ORDINATEUR POUR LE POSITIONNEMENT D'UN DISPOSITIF
EP3119068A1 (fr) * 2014-03-10 2017-01-18 Ntt Docomo, Inc. Dispositif de serveur et système de traitement d'informations
JP2016110617A (ja) * 2014-11-28 2016-06-20 株式会社ナスカ 移動物体の位置検索システム
JP2016126602A (ja) * 2015-01-06 2016-07-11 三洋テクノソリューションズ鳥取株式会社 車載通信機

Similar Documents

Publication Publication Date Title
US7027772B2 (en) Inter-vehicle message disseminating method and apparatus for the application of the method
US6771972B2 (en) System and method for a distributed search for a lost asset
USRE42435E1 (en) Wireless location determining device
US9171470B2 (en) Wireless locating and monitoring system
ES2295582T3 (es) Metodo para capacitar a un dispositivo de informacion inalambrico para acceso a datos de localizacion.
US6498565B2 (en) Two way tracking system and method using an existing wireless network
US7333820B2 (en) System and method for providing routing, mapping, and relative position information to users of a communication network
US6853910B1 (en) Vehicle tracking telematics system
US20050202830A1 (en) Method and system for monitoring location of a cellular phone in relation to a predefined geographic area with automatic notation of boundary violations
US6552682B1 (en) Method for distributing location-relevant information using a network
KR101302826B1 (ko) 무선 시스템에서의 지오펜스의 동적 생성을 위한 방법
US20020029108A1 (en) Dual map system for navigation and wireless communication
US20100145987A1 (en) System for and method of location-based process execution
US20050153707A1 (en) Portable service identification, notification and location device and method
US7312700B2 (en) GPS enabled cell phone with common interest alerts
US20030052797A1 (en) Speed trap detection and warning system
US20040192336A1 (en) Device and method for establishing a wireless communication link by a wireless communication device having more than one transceiver
KR20040063077A (ko) 다른 모바일 유닛 위치 추적을 위한 방법 및 장치
US20050049021A1 (en) Device and method for redirecting a wireless communication link based on location
EP2135465A1 (fr) Procédé de détermination d'emplacement et dispositif mobile
KR100442032B1 (ko) 지피에스 기능 이동통신 단말기를 이용한 단말기간의 접근통지방법
WO2022130399A1 (fr) Système de suivi et de localisation d'un véhicule volé et procédé associé
EP1515154B1 (fr) Système de poursuite bidirectionnel utilisant un réseau sans fil existant et procédé correspondant
JP4849719B2 (ja) 情報配信システム
Usman et al. A Model for Smart Vehicle Tracking: A Review

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21807292

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21807292

Country of ref document: EP

Kind code of ref document: A1