[go: up one dir, main page]

CN110740906B - Vehicle key lock cabinet - Google Patents

Vehicle key lock cabinet Download PDF

Info

Publication number
CN110740906B
CN110740906B CN201880036147.2A CN201880036147A CN110740906B CN 110740906 B CN110740906 B CN 110740906B CN 201880036147 A CN201880036147 A CN 201880036147A CN 110740906 B CN110740906 B CN 110740906B
Authority
CN
China
Prior art keywords
key
vehicle
key locker
locker
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880036147.2A
Other languages
Chinese (zh)
Other versions
CN110740906A (en
Inventor
J·李
J·H·卡明斯基
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fields Technology Ltd
Original Assignee
Fields Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fields Technology Ltd filed Critical Fields Technology Ltd
Priority to CN202111483227.2A priority Critical patent/CN114148284B/en
Priority claimed from PCT/US2018/035214 external-priority patent/WO2018222772A1/en
Publication of CN110740906A publication Critical patent/CN110740906A/en
Application granted granted Critical
Publication of CN110740906B publication Critical patent/CN110740906B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/22Keys with devices for indicating whether the last operation was locking or unlocking
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A key locker for a vehicle includes a key locker body, a key locker door, and an access actuator. The key locker body is sized to store a vehicle key. The access actuator is configured to move the key locker door in response to an access signal.

Description

Vehicle key lock cabinet
Cross reference to related applications
The present application claims priority from us non-provisional application No. 15/992,832, filed on 30/5/2018, which claims priority from us provisional application No. 62/512,285, filed on 30/5/2017, both of which are hereby incorporated by reference herein.
Background
Different vehicles sharing services are increasingly offering the opportunity to access the vehicle. Some vehicles sharing services provide access in minutes, hours, and/or days. Some vehicles sharing services provide a fleet of vehicles for access by consumers. The other vehicles sharing the service are peer-to-peer. In some scenarios, a company owns a fleet of vehicles and wishes to selectively provide access for different operators or employees at particular time periods.
In a vehicle sharing context, logistical challenges come from physically providing vehicle keys for a given driver within an appropriate amount of time. Additionally, providing the driver with a vehicle key may limit access to the vehicle by different drivers authorized to use the vehicle. Furthermore, providing a vehicle key exposes the provider to the risk that the key is copied or retained for malicious purposes.
Drawings
Non-limiting and non-exhaustive embodiments of the present invention are described with reference to the following figures, wherein like reference numerals refer to like parts throughout the various views unless otherwise specified.
Fig. 1 includes an example system including a controller unit, a keypad, a mobile device, a vehicle system, a vehicle reader, and a key locker, according to an embodiment of the disclosure.
Fig. 2 includes an example key locker including an access actuator, a wireless interface, processing logic, a sensing module, and a key locker door in accordance with an embodiment of the disclosure.
FIG. 3 illustrates an example process of providing access to a vehicle according to an embodiment of the disclosure.
Figure 4 illustrates an example process of immobilizing a vehicle due to tampering, according to an embodiment of the present disclosure.
Fig. 5 illustrates an example process of notifying a vehicle operator of tampering with a key locker of a vehicle according to an embodiment of the disclosure.
Fig. 6 illustrates an example system including a controller unit, a keypad, a mobile device, a key locker, a server, and a cellular gateway, according to an embodiment of the disclosure.
FIG. 7 illustrates an example system for providing access to a vehicle according to an embodiment of this disclosure.
FIG. 8 illustrates an example key locker according to an embodiment of the disclosure.
FIG. 9 illustrates an example process of providing access to a vehicle according to an embodiment of the disclosure.
Detailed Description
Embodiments of systems, devices, and methods for vehicle key lockers are described herein. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the embodiments. One skilled in the relevant art will recognize, however, that the techniques described herein can be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring certain aspects.
Reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Throughout this specification, several technical terms are used. These terms take the ordinary meaning as is accorded to such terms unless expressly defined herein or otherwise clearly indicated by the context of their use.
Embodiments of the present disclosure include a vehicle key locker that selectively secures a vehicle key stored in the key locker from starting the vehicle. For example, in one embodiment, the vehicle key locker is formed of plastic with an integrated metal mesh structure that prevents a Radio Frequency Identification (RFID) tag of the vehicle key from receiving or transmitting radio signals. The vehicle is not started without accessing the RFID tag of the vehicle key. The key locker door may also be formed of plastic and/or metal that prevents the transmission of radio signals of a particular frequency. When an access signal is provided to the key locker, the access actuator may open the key locker door to allow a radio signal to be transmitted. The key locker door may be open to a distance sufficient to provide for transmission of a radio signal for starting the vehicle while not allowing an individual to remove the vehicle key from the key locker.
A system including a key locker may receive access data and an access code from a wireless interface. The user may also enter the access data using a keypad. The provisioning server may send the access code to the system. When the access data matches an access code stored in the memory of the system, the key locker is optionally opened to provide access to the keys in the key locker, or the key locker door of the key locker is opened to allow the vehicle to be started by a radio response signal from the vehicle key in the key locker.
Using certain embodiments of the present disclosure, access to a vehicle may be assigned to a particular person with access data within a particular amount of time. Furthermore, there is no need to exchange physical vehicle keys and to provide access to vehicle keys so that a user with access to the vehicle cannot retain or copy the vehicle keys. In contrast, existing shared service vehicles have vehicle keys inside the vehicle and are accessible to the user. In some embodiments, access is provided to remove the vehicle key from the key locker, and the key locker senses when the key is placed back into the key locker.
The embodiments of the present disclosure and additional embodiments described above are described in detail below with respect to fig. 1-9.
Fig. 1 includes an example system 100 including a controller unit 103, a keypad 140, a mobile device 130, a vehicle system 199, a vehicle reader 180, and a key locker 150 according to an embodiment of the disclosure. Controller unit 103 contains processing logic 107, cellular interface 111, and wireless interface 113. The processing logic 107 may include one or more processors, microprocessors, multi-core processors, and/or Field Programmable Gate Arrays (FPGAs) that perform the operations disclosed herein. One or more volatile and/or nonvolatile memories (not illustrated) may be communicatively coupled to the processing logic 107 to store instructions to perform the operations and/or to store data.
The keypad 140 is communicatively coupled to the controller unit 103 via a communication channel 192. In one example, the communication channel 192 is a wireless communication channel (e.g., Bluetooth and/or WiFi/802.11 x). The mobile device 130 is communicatively coupled to the controller unit 103 via a communication channel 193. In one example, the communication channel 193 is a wireless communication channel (e.g., Bluetooth and/or WiFi/802.11 x). The vehicle system 199 is communicatively coupled to the controller unit 103 via a communication channel 191. In one example, the communication channel 191 is a Controller Area Network (CAN) usingA wired communication channel of a bus protocol. The key locker 150 is communicatively coupled to the controller unit 103 via a communication channel 194. In one example, the communication channel 194 is a wireless communication channel (e.g., Bluetooth and/or WiFi/802.11 x). In one example, communication channel 194 is implemented using an inter-integrated circuit (I)2C) Or a wired communication channel of a Serial Peripheral Interface (SPI) protocol. The communication channel 194 may be an encrypted channel. The vehicle reader 180 is communicatively coupled to a vehicle system 199 via a communication channel 195. In different embodiments, communication channels 191, 192, 193, 194, and 195 may be wired or wireless.
In one embodiment, the keypad 140 may be placed inside the vehicle (e.g., below the windshield) and the buttons of the keypad are capacitive sensing buttons such that the buttons are sensitive to the action of fingers "pressing" the buttons through the glass of the vehicle. In one embodiment, keypad 140 is configured to be mounted on the exterior of the vehicle.
In one embodiment, the user wirelessly transmits the access data to controller unit 103 using a mobile application (running on mobile device 130) with the access data. In one embodiment, the access data is transmitted from the mobile device 130 to the wireless interface 113 via bluetooth. The user may enter the access data into the mobile application or the access data may be provided to the mobile application via a server storing the subscription data. The mobile device 130 may receive the access data via a cellular connection or a WiFi connection.
In one embodiment, the take data is transmitted from the mobile device 130 to the wireless interface 113 using the IEEE 802.11x protocol and frequency. The wireless interface 113 may be configured to receive and/or transmit bluetooth and/or WiFi. In one embodiment, the access data is transmitted from the mobile device 130 to the cellular interface 111 using cellular data (cellular data tower not illustrated). The cellular interface 111 may be configured to receive and/or transmit 2G/3G/4G/LTE or other cellular data standards used now or below.
In the illustrated embodiment of fig. 1, processing logic 107 is coupled to wireless interface 113 to send and receive wireless data (including access data). Processing logic 107 is also coupled to cellular interface 111 to send and receive cellular data (including access data). In one embodiment, the memory coupled to the processing logic 107 includes access code.
The vehicle system 199 is communicatively coupled to the controller unit 103 via a communication channel 191, and the vehicle reader 180 is communicatively coupled to the vehicle system 199 via a communication channel 195. In one embodiment, the vehicle reader 180 is an RFID reader. In some embodiments, the vehicle reader 180 is configured to transmit an interrogation signal 183 and to receive a response signal 153 from a vehicle key stored in the key locker 150. The vehicle system 199 may access or include a vehicle computer that provides access to the vehicle and/or starts and stops the vehicle. In one embodiment, the vehicle system 199 includes a start circuit that controls whether the vehicle can be started by turning the key ignition or by pressing the start/stop button of the vehicle in conjunction with the vehicle system 199 sensing the vehicle key.
Fig. 1 also includes a key locker 150. The key locker 150 may be made of metal, plastic, or otherwise, depending on the particular embodiment. In some embodiments, the key locker 150 is manufactured such that it shields the interior of the key locker 150 from radio waves/signals. To accomplish this, the key locker 150 may be made of metal, or incorporate a metal mesh structure, or otherwise form a faraday cage. Fig. 2 includes one example embodiment of a key locker 150 according to an embodiment of the disclosure.
In fig. 2, the example key locker 250 includes an access actuator 265, a wireless interface 263, processing logic 253, a sensing module 257, and a key locker door 260. Processing logic 253 is coupled to sensing module 257, wireless interface 263, and take up actuator 265.
Wireless interface 263 may include an antenna and corresponding circuitry to receive and/or transmit bluetooth, cellular, and/or IEEE 802.11x wireless communication signals. The sensing module 257 may include one or more of an accelerometer, a weight sensor, a magnetic sensor, a resistive sensor, and/or a capacitive sensor.
The processing logic 253 may include one or more processors, microprocessors, multi-core processors, and/or Field Programmable Gate Arrays (FPGAs) that perform the operations disclosed herein. One or more volatile and/or nonvolatile memories (not illustrated) may be communicatively coupled to the processing logic 253 to store instructions to perform the operations and/or to store data.
The key locker 250 is sized to store vehicle keys, such as keys 270, 280 or 290.
The key 270 is an example wireless key that incorporates a remote control and does not require a key blade to access the vehicle and/or start/drive the vehicle. The key 270 includes a label 273. The tag 273 may be a passive (unpowered) or active (powered) tag. In one embodiment, the tag 273 is an RFID tag configured to generate a response signal (e.g., 153) when the tag 273 receives an interrogation signal (e.g., 183) from an RFID reader (e.g., reader 180).
The key 280 is an example wireless key that may include a fob for accessing the vehicle and/or starting/driving the vehicle's key. The key 280 may also incorporate remote control of the access vehicle. Key 280 includes a tag 283. Tag 283 may be a passive (unpowered) or active (powered) tag. In one embodiment, tag 283 is an RFID tag configured to generate a response signal (e.g., 153) when tag 283 receives an interrogation signal (e.g., 183) from an RFID reader (e.g., reader 180).
The key 290 is a blade-only key typically made from one unitary piece of metal.
Embodiments of the key locker 250 may depend on what type of vehicle keys are to be stored.
FIG. 3 illustrates an example process 300 of providing access to a vehicle according to an embodiment of the disclosure. The order in which some or all of the process blocks appear in process 300 should not be construed as limiting. Rather, one of ordinary skill in the art having had the benefit of the present disclosure will appreciate that some of the process blocks may be performed in a variety of orders not illustrated, or even in parallel. The process 300 may be used in conjunction with the keys 270 and/or 280.
In process block 305 of process 300, the access data is received. For example, controller unit 103 may receive the access data from keypad 140 or from mobile device 130. In one embodiment, the access data is wireless access data. In one example, wireless interface 263 may receive access data from keypad 140 or from mobile device 130.
In process block 310, the access data is compared to the access code. In one embodiment, prior to process block 310, controller unit 103 receives an access code from wireless interface 113 or cellular interface 111 and stores the access code to a memory coupled with processing logic 107 or processing logic 253. In one example, the access code is associated with a vehicle reservation for vehicle sharing purposes. In one embodiment, processing logic 107 or 253 may facilitate comparison of the access data to the access code.
When the access data matches the access code, process 300 passes to process block 315. In process block 315, an interrogation signal (e.g., signal 183) generated from outside the key locker (e.g., locker 150/250) is allowed to reach the tag (e.g., 273/283) of the vehicle key (e.g., 270/280) stored in the key locker. The tag of the vehicle key is configured to generate a response signal (e.g., 153) in response to receiving the interrogation signal (e.g., 183). When the vehicle's reader (e.g., 180) receives the response signal, the response signal allows access to the vehicle and/or allows the user to start/drive the vehicle. For example, the tag of the vehicle key may have been factory set by the vehicle manufacturer to allow access to the vehicle and/or to allow starting/driving of the vehicle.
When the fetch data fails to match the fetch code, process 300 passes to process block 320. In process block 320, an interrogation signal (e.g., signal 183) generated from outside the key locker is prevented from reaching the tag (e.g., 273/283) of the vehicle key (e.g., 270/280) stored within the key locker. Since the interrogation signal never reaches the tag, no response signal is generated and sent back to the reader 180, and the vehicle remains unavailable or stationary.
In one embodiment, allowing an interrogation signal generated from outside the key locker to reach the vehicle key includes moving a key locker door 260 contained in the key locker to a distance (e.g., 0.5 inches) that allows a response signal from the tag to be transmitted outside the key locker. In one embodiment, the distance that the key locker door moves does not allow the vehicle key to be physically removed from the key locker.
As described above, the key locker may be made of metal or of plastic that incorporates a metal mesh structure or otherwise provides a faraday cage so that external radio frequencies (at least up to a particular frequency range) do not penetrate the key locker. Thus, by opening the key locker door 260, a radio signal, such as an interrogation signal 183, is allowed to enter the key locker and the response signal 153 from the tag of the vehicle key, which can be sensed by the reader (e.g., 180) of the vehicle, is rendered illegitimate.
In one embodiment, the take actuator 265 receives an actuation signal from the processing logic 107 of the controller unit 103. In one embodiment, the take actuator 265 receives an actuation signal from the processing logic 253. The access actuator 265 may include a stepper motor mechanically coupled to the key locker door 260 to open the key locker door 260 a distance defined by an actuation signal. In some embodiments, the keyed locker door 260 may be moved using a servo, motor, actuator, or combination.
According to one embodiment of the present disclosure, an example system includes a wireless interface (e.g., 113 or 263) for receiving wireless access data from a mobile device, such as a smartphone, tablet, or tablet computer. The system additionally includes processing logic, memory, and a key locker. The key locker includes a key locker door and an access actuator. Processing logic is coupled to the wireless interface to receive the wireless access data. A memory is coupled to the processing logic and the memory includes access code. The key locker is sized to store vehicle keys having RFID tags. When the key locker door is closed, the key locker protects the vehicle keys from radio signals outside the key locker. An access actuator (e.g., 265) is coupled to open and close the key locker door. The access actuator is coupled to the processing logic and the processing logic is configured to cause the access actuator to move the key locker door when the wireless access data matches an access code stored in the memory. An access actuator moves the key locker door a distance to allow an RFID tag of the vehicle key to receive an interrogation signal generated by an RFID reader of the vehicle and to transmit a response signal to the RFID reader in response to receiving the interrogation signal, wherein the response signal allows access to the vehicle and/or drives access to the vehicle.
Fig. 4 illustrates an example process 400 of providing access to a vehicle in accordance with an embodiment of the disclosure. The order in which some or all of the process blocks appear in process 400 should not be construed as limiting. Rather, one of ordinary skill in the art having had the benefit of the present disclosure will appreciate that some of the process blocks may be performed in a variety of orders not illustrated, or even in parallel. The process 400 may be used in conjunction with the keys 270, 280, and/or 290.
In operation 405 of process 400, a tamper signal is received from a sensing module (e.g., 257) contained in the key locker. In one embodiment, the sensing module includes an accelerometer and the tamper signal includes acceleration measurements from the accelerometer above a predetermined acceleration threshold. For example, large acceleration changes may result from a hammer blow or other tampering attempt on the key locker.
In one embodiment, the sensing module includes a weight sensor and the tamper signal includes a weight measurement from the weight sensor that is below a key weight value representative of the weight of the vehicle key. In one embodiment, the sensing module includes a magnetic sensor and the tamper signal includes a magnetic measurement from the magnetic sensor, wherein the magnetic sensor is disposed within the key locker to measure a magnetic field of the vehicle key. If there is a large change in the weight or magnetic field measurements, it may indicate that the vehicle key has been removed from the key locker and tampered with.
In one embodiment, the sensing module includes a resistance sensor and the tamper signal includes a resistance measurement from the resistance sensor. In one embodiment, the resistive sensor is disposed within the key locker to contact the blade of the vehicle key when the vehicle key is stored in the key locker. In one embodiment, the resistive sensor includes a resistive network incorporated into the structure of the key locker, such that someone penetrating the resistive network (e.g., by drilling through the key locker to access the vehicle key) will change the resistance of the resistive network, which will trigger the tamper signal.
In operation 410, the vehicle is immobilized in response to receiving the tamper signal. In one embodiment, the processing logic 107 receives the tamper signal from the sensing module 257 via a wired and encrypted data link and immobilizes the vehicle by sending a CAN bus message to the vehicle system 199 that immobilizes the vehicle. In one embodiment, the processing logic 107 receives the tamper signal from the sensing module 257 and immobilizes the vehicle by creating a disconnect circuit of the ignition/starting system of the vehicle (e.g., by activating a relay).
In one embodiment, where the key locker box is a separate unit and the controller unit 103 is not necessarily required, the processing logic 253 receives a tamper signal from the sensing module 257 and immobilizes the vehicle by sending a CAN bus message to the vehicle system 199 to immobilize the vehicle. In one embodiment, the processing logic 253 receives the tamper signal from the sensing module 257 and immobilizes the vehicle by creating a disconnect circuit of the ignition/starting system of the vehicle (e.g., by activating a relay).
In operation 415, a tamper notification is transmitted to an owner or operator of the vehicle over a wireless interface (e.g., 113 or 263) in response to receiving the tamper signal. In one embodiment, the tamper notification is sent via cellular data. In one embodiment, the tamper notification is sent using WiFi.
Fig. 5 illustrates an example process 500 of providing access to a vehicle according to an embodiment of the disclosure. The order in which some or all of the process blocks appear in process 500 should not be construed as limiting. Rather, one of ordinary skill in the art having had the benefit of the present disclosure will appreciate that some of the process blocks may be performed in a variety of orders not illustrated, or even in parallel. The process 500 may be used in conjunction with the keys 270, 280, and/or 290.
In process block 505, a first sensor measurement of a vehicle key stored in a key locker is initiated. The first sensor measurement is performed by a sensing module (e.g., 257) contained in the key locker. The sensor measurements may be magnetic sensing of the key's blade, key weighing, resistance measurements, where the blade of the key completes (shorts) a resistive circuit to indicate that the key is within the key locker.
In process block 510, wireless access data is received from a mobile device.
In process block 515, the wireless access data is compared to the access code. The comparison of process block 515 may be performed by processing logic 107 or 253.
In process block 520, when the access data matches the access code, access to the key locker is allowed so that the user can remove the vehicle key stored in the key locker. In one embodiment, processing logic causes an access actuator (e.g., 265) to unlatch a mechanical latch or a magnetic latch to allow a user to remove a cover plate of a key locker so that the user can take the vehicle key.
In process block 525, reservation end data is received. In one embodiment, the reservation end data is received over a wireless interface (e.g., 113 or 263) or a cellular interface (e.g., 111). In one embodiment, the reservation end is received from a mobile device (e.g., 130). In one embodiment, the reservation end data may be transmitted by a server coordinating vehicle reservations.
In process block 530, after receiving the reservation end data, a second sensor measurement is initiated with a sensing module contained in the key locker. If the first sensor measurement is a weight measurement of the vehicle key, then the second sensor measurement is also a measurement of the weight of the vehicle key. The second sensor measurement should be similar to the first sensor measurement if the user has placed the key back into the locker box after the appointment. However, if the user of the vehicle has not placed the vehicle key back into the key locker at the end of the reservation (as indicated by the reservation end data being received), the second weight measurement of the vehicle key will be significantly less than the first weight measurement. Similarly, the first magnetic or resistance measurement may be compared to the second magnetic or resistance measurement to ensure that they are similar. Thus, it is possible to determine whether the vehicle key has been placed back into the key locker at the end of the reservation.
In process block 535, a key loss notification is transmitted via the wireless interface when the second sensor measurement is not within the predetermined variance of the first sensor measurement. The key loss notification may be transmitted to a server coordinating vehicle reservations via WiFi or cellular data.
As described above, some embodiments include a tag (e.g., 273/283) included in the vehicle key and the key locker opened to allow interrogation of the tag. These embodiments provide the advantage of placing the key locker in an orientation that is relatively inaccessible to the user. For example, the key locker may be placed under the seat or in a secure location out of the user's line of sight under the dashboard and still allow the vehicle to be accessed and driven by the user. It is more difficult to tamper with the key locker or otherwise access the key since the user does not know the orientation of the key locker.
In embodiments where the vehicle key does not include a tag, the user needs to access the key to insert the key blade into the ignition system to start the vehicle. In these embodiments, it is desirable that the vehicle keys be accessible to the user and therefore that the key locker be placed somewhere accessible, such as a glove box, center console or trunk.
It will be understood by those skilled in the art that in some embodiments, the key locker may include its own processing logic and wireless and/or cellular interface, while in other embodiments, the key locker may include only the access actuator and/or sensing module 257, and the described processing logic and wireless/cellular interface are provided external to the key locker, for example, by the controller unit 103. In some embodiments, both the key lockers of the controller unit 103 include processing logic and wireless and cellular interfaces.
Fig. 6 includes an example system 600 including a controller unit 603, a keypad 640, a mobile device 130, a key locker 650, a server 670, and a cellular gateway 611, according to an embodiment of the disclosure. The controller unit 603 may include processing logic, which may include one or more processors, microprocessors, multi-core processors, and/or Field Programmable Gate Arrays (FPGAs) that perform the operations disclosed herein. One or more volatile and/or nonvolatile memories (not illustrated) may be communicatively coupled to the processing logic in the controller unit 603 to store instructions to perform the operations and/or to store data.
In fig. 6, mobile device 130 is communicatively coupled to controller keypad 640 via a communication channel 691. In fig. 6, the mobile device 130 is also communicatively coupled to a server 670 via a communication channel 693. The keypad 640 is communicatively coupled to the key locker 650 via a communication channel 692. In one embodiment, communication channel 692 includes a wired serial communication channel. The key locker 650 is communicatively coupled to the controller unit 603 via a communication channel 695. The controller unit 603 is communicatively coupled to the cellular gateway 611 via a communication channel 696, and the cellular gateway 611 is communicatively coupled to the server 670 via a communication channel 694. The communication channels 691, 692, 693, 694, 695, and 696 may be wireless communication channels (e.g., Bluetooth and/or WiFi/802.11x) or wired communication channels (e.g., CAN bus, using I2C, USB, and/or SPI protocols). The controller unit 603 may be coupled to selectively immobilize the vehicle by disabling ignition.
In one embodiment, the mobile device 130 requests vehicle reservations via a WiFi or cellular data access server 670 by using a mobile browser or mobile application. In response to receiving the vehicle request, the server 670 may supply the access code for the reserved vehicle by transmitting the access code to the cellular gateway 611 via the cellular data network. The cellular gateway 611, the controller unit 603, the key locker 650 and the keypad 640 may all be comprised in a vehicle. The cellular gateway 611 may communicate the access code to the control unit 603, which the control unit 603 may communicate to the key locker 650. When the mobile device 130 approaches the reserved vehicle, the access code may be communicated via bluetooth to the keypad, and the keypad may communicate the access code to the key locker 650 via a wired serial data interface. If the access code received by the key locker 650 from the keypad 640 matches the access code delivered to the cellular gateway 611, the key locker may open the key locker door 260 to allow the vehicle's RFID reader to receive RFID signals from the RFID tag of the key stored in the key locker 250 to mobilize the vehicle.
Fig. 7 illustrates an example system 700 for providing access to a vehicle in accordance with an embodiment of the disclosure. The system 700 may be installed in a vehicle. The reader 781 and vehicle system 780 may be initially installed by the manufacturer of the vehicle. System 700 includes a controller 703 that includes processing logic 707, memory 702, an on-board diagnostics (OBD) reader 709, a wireless interface 710, and a sensor module 720. The processing logic 707 may include one or more processors, microprocessors, multi-core processors, and/or Field Programmable Gate Arrays (FPGAs) that perform the operations disclosed herein. In some embodiments, memory (not illustrated) is integrated into the processing logic to store instructions to perform operations and/or to store data. Processing logic may include analog or digital circuitry to perform the operations disclosed herein. In the illustrated embodiment, the memory 702 includes an access code 733.
In fig. 7, wireless interface 710 includes a cellular interface 713, a short-range wireless interface 714, a Wireless Local Area Network (WLAN) interface 717, and an RFID interface 719. Different embodiments of wireless interface 710 may include all or some of the illustrated wireless interfaces. The cellular interface 713 may be configured to receive and/or transmit 2G/3G/4G/LTE/5G or other cellular data standards now or hereafter used. The short-range wireless interface 715 may be configured to receive and/or transmit protocols such as zigbee or bluetooth. The WLAN 717 may be configured to receive and/or transmit IEEE 802.11x protocols and frequencies. RFID interface 719 may be configured to transmit or receive RFID signals to read or interrogate RFID tags, such as those included in mobile devices, e.g., device 730.
The sensor module 720 in fig. 7 includes a glass breakage sensor 721 and a G sensor 723. The glass breakage sensor may include a microphone that receives an audio signal. The audio signal may be filtered or compared to an audio signal associated with a glass break of the vehicle. The G sensor 723 may comprise an accelerometer. When the acceleration reading measured by the accelerometer reaches a predetermined threshold, the acceleration reading may indicate that the controller 703 or the vehicle containing the controller 703 is being tampered with.
Although not illustrated, processing logic 707 is communicatively coupled to read and write to memory 702. Processing logic 707 is also communicatively coupled to wireless interface 710, sensor module 720, and OBD reader 709.
The system 700 additionally includes a key locker 750, a reader 781, an advanced control module 760, disable (disable) circuitry 770, a keypad 740, a mobile device 730, a network 755, and a server 773. The keypad 740 and the mobile device 730 may be configured similarly to the keypad 140 and the mobile device 130, respectively. The reader 781 may be configured similar to the reader 180.
In the embodiment illustrated in fig. 7, the vehicle system 780 includes an ignition module 785 and a lock/window/door module 786. A module 786 of the vehicle system 780 may control unlocking, opening and closing of the vehicle, and monitoring opening and closing of the doors. The vehicle system 780 may also include light modules (not illustrated) that turn the vehicle lights on and off.
The OBD reader 709 may be communicatively coupled to the vehicle system 780 via a communication channel 791. The OBD reader 709 may access the status of the ignition module 785 and the module 786. The OBD reader 709 may receive vehicle system data, such as vehicle mileage, engine status, maintenance warnings, and other vehicle data, from the vehicle system 780. This data may be sent to processing logic 707 via wireless interface 710 and network 755 and transmitted to server 773.
The processing logic 707 of the controller 703 is communicatively coupled to the key locker 750 (via communication channel 794), the high level control module 760 (via communication channel 796), the disabling circuit 770 (via communication channel 798), and the keypad 740 (via communication channel 792).
In operation, the server 773 may supply the controller 703 with one or more access codes 733 by transmitting the access codes over the communication channel 787, the network 755, the communication channel 789, and the cellular interface 713. Network 755 may include any network or network system, such as, but not limited to: a peer-to-peer network; a Local Area Network (LAN); a Wide Area Network (WAN); public networks, such as the internet; a private network; a cellular network; a wireless network; a wired network; a combination wireless and wired network; and a satellite network.
After supplying the controller 703 with the one or more access codes 733, the user may provide the access data to the controller 703 with the keypad 740 or the mobile device 730. The mobile device 730 may provide the access data to the controller 703 by means of any of the interfaces in the wireless interface 710. Mobile device 730 may receive the fetch data from server 773 via communication channel 787, network 755, and communication channel 788. When the user-provided access data matches access code 733 stored in memory 702, an access signal may be sent from processing logic 707 to key locker 750 via communication channel 794. In one embodiment, the key locker 750 opens the key locker door to allow the radio of the vehicle key stored in the key locker to receive the interrogation signal 783 generated by the reader 781 and to render the response signal 753 from the vehicle key stored in the key locker 750 illegal. Based at least in part on response signal 753 received by reader 781, reader 781 can enable ignition module 785 to start/maneuver the vehicle.
In some embodiments, the processing logic 707 sends the advanced control module 760 commands via the communication channel 796 to correspond with the vehicle system 780 via the communication channel 797. The communication channel 797 may use the CAN protocol. In one example, module 760 directs vehicle system 780 to unlock the doors when the access data matches the access code so that the user can access the vehicle. In one embodiment, the processing logic 707 may cause the disabling circuit 770 to disable the ignition module 785 of the vehicle system 780 until the provided access data matches the access code 733. In one embodiment, the disable circuit 770 immobilizes the vehicle ignition by creating an open circuit (e.g., by activating a relay) for the ignition/start module 785 of the vehicle system 780.
Fig. 8 illustrates an example key locker 850 according to an embodiment of this disclosure. The key locker 850 is an example of the key locker 750. Key locker 850 includes a key locker body, which may be box-shaped (or other shape) having a cavity sized to store a vehicle key, such as vehicle key 870. Example vehicle key 870 includes a radio 873 that may be an RFID tag. The RFID tag may be configured similar to RFID tag 273. The example key locker 850 includes processing logic 853, a key sensing module 857, an optional power source 859, an access actuator 265, and a key locker door 260.
The access actuator 265 is coupled to move the key locker door 260. The access actuator 265 may include a stepper motor mechanically coupled to the key locker door 260 to open the key locker door 260 a distance defined by the actuation signal. In some embodiments, a servo, motor, actuator, or combination may be used to move the keyed locker door 260.
The access actuator 265 is configured to open the key locker door 260 in response to receiving the access signal 881. Processing logic 707 may provide a take signal 881 when the user-provided take data matches the take code 733 provided by server 773. Access signal 881 may be transmitted over communication channel 794 and forwarded to access actuator 265 via processing logic 853.
When the key locker door 260 is closed, the key locker body shields the radio 873 from receiving radio signals (e.g., signals 753 and 783) from or transmitting radio signals (e.g., signals 753 and 783) to the key locker body exterior of the key locker 850. When the key locker door 260 is open, the radio 873 of the vehicle key 870 may receive and/or transmit radio signals (e.g., signals 753 and 783). In some embodiments, the key locker door 260 is open a distance that does not allow the vehicle key 870 to be removed from the key locker.
In some embodiments, the key locker body comprises a metallic material that shields the interrogation signal 783 of the reader 781 from the radio 873 of the vehicle key 870. The key locker body may comprise plastic (e.g., ABS), and the metal material may be comprised in a mesh sized to prevent reception or transmission of radio signals of a particular frequency.
Key locker 850 contains an optional power source 859 that provides power to vehicle keys 870. The battery used to power key 870 may be removed and an insert 877 sized to fit the battery compartment of vehicle key 870 may be inserted into key 870 to power key 870 via power provided by power source 859. Optional power source 859 is configured to provide power within a tolerance of properly powering vehicle key 870.
In a particular example scenario, the controller 703 may sense tampering with a vehicle in which it is installed via the sensor module 720. Processing logic 707 may then generate a disable (deactivation) signal 883 and provide it to processing logic 853 or directly to power supply 859. The optional power source 859 is configured to stop power to the vehicle keys in response to the deactivation signal 883.
In fig. 8, key locker 850 contains key sensing module 857. The key sensing module 857 is configured to sense the presence of a vehicle key 870 within the key locker body. The key sensing module 857 may be configured to generate a missing disable signal 885 to disable the vehicle when the sensed readings of the key sensor indicate that the vehicle key has been removed from the key locker body. The loss disable signal 885 may be sent to the processing logic 707 via the communication channel 794, and the processing logic 707 may immobilize the vehicle in response to receiving the loss disable signal 885. In one embodiment, the processing logic 707 may immobilize the vehicle by sending a disable signal to the disable circuit 770. In one embodiment, the processing logic 707 may immobilize the vehicle by sending a disable signal to the advanced control module 760 to the vehicle system 780 to immobilize the ignition module 785.
In one embodiment, the key sensing module 857 includes a pressure sensor and the sensed readings of the key sensing module 857 include pressure readings. The missing disable signal 885 may be generated when the pressure reading of the pressure sensor is below a pressure threshold to indicate that the key has been removed from the key locker 850.
Fig. 9 illustrates an example process 900 of providing access to a vehicle in accordance with an embodiment of the disclosure. The order in which some or all of the process blocks appear in process 900 should not be construed as limiting. Rather, one of ordinary skill in the art having had the benefit of the present disclosure will appreciate that some of the process blocks may be performed in a variety of orders not illustrated, or even in parallel.
In operation 905, inputs (e.g., communication channel 794) to a key locker (e.g., key locker 850) are monitored.
In operation 910, the key locker door remains in the closed position when an access signal (e.g., 881) is not received on the input of the key locker. The key locker body and the key locker door in the closed position prevent the radio of the vehicle key from receiving or transmitting a radio signal.
In operation 915, a key locker door of the key locker is opened in response to receiving a take signal on an input of the key locker. In one embodiment, opening the key locker door allows the radio of the vehicle key to receive and transmit radio signals while not allowing the vehicle key to be removed from the key locker body. In another embodiment, the key locker door is opened to a width sufficient to allow the vehicle key to be removed from the key locker body (and also to allow the radio of the vehicle key to receive and transmit radio signals).
In embodiments of the present disclosure, a particular access code may be associated with allowing a vehicle key to be removed from a vehicle key locker, for example, for long term rental. In this scenario, the user may remove the key locker door, or the access actuator may open the key locker door to a distance that allows removal of the key. In other embodiments, the particular access code is associated with the vehicle key being maintained in the key locker at all times and does not allow the user to remove the vehicle key from the key locker. This may facilitate, for example, short term leases. The access signal may vary based on the type of access data provided to the system.
Process 900 may additionally include the following operations: a deactivation signal is received, and in response to receiving the deactivation signal, power to the vehicle key is deactivated.
In one embodiment, the process 900 may additionally include the following operations: a key sensor (e.g., 857) of the key locker senses whether a vehicle key is present in the key locker and transmits a loss disable signal (e.g., 885) when the sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker body.
In some embodiments of the key lockers 150, 250, 650, 750, and/or 850, a backup battery (e.g., lithium ion) is provided so that any processing logic, memory, wireless interface, and access actuators contained in the key lockers are operational even when the vehicle battery is dead. This may allow a user to access the keys of the vehicle, for example, for the purpose of unlocking the vehicle and assisting in starting the vehicle. The key locker 150, 250, 650, 750, and/or 850 may only be switched to the backup battery when the main power of the vehicle is disconnected.
In some embodiments of the key lockers 150, 250, 650, 750, and/or 850, instead of powering the keys with batteries, a selectable voltage may be provided to power the keys inside the key lockers. Depending on the voltage requirements for powering the key, the voltage provided may be selected using the jumper to select between 3VDC, 6VDC, and 12 VDC. The voltage provided may power the key using the "insert" of the battery that replaces the key. Thus, the battery of the key is not a point of failure of the system, since the key can be powered by the insert powered by the vehicle electricity.
The above disclosure has been discussed in the context of vehicle sharing, although it is contemplated that the systems and methods of the present disclosure may be used in the context of vacation rentals or short-term house rentals to provide for use of property for a limited period of time.
The term "processing logic" in this disclosure may include one or more processors, microprocessor multi-core processors, and/or Field Programmable Gate Arrays (FPGAs) that perform the operations disclosed herein. In some embodiments, memory (not illustrated) is integrated into the processing logic to store instructions to perform operations and/or to store data. Processing logic may include analog or digital circuitry to perform the operations disclosed herein. The "memory" or "memories" (e.g., 702) described in this disclosure may include volatile or non-volatile memory architectures.
The communication channels described herein may include using IEEE 802.11 protocol, Bluetooth, Serial Peripheral Interface (SPI), Interactive Integrated Circuit (I)2C) Universal serial port (USB), Controller Area Network (CAN), cellular data protocols (e.g., 3G, 4G, LTE, 5G), or other wired or wireless communications.
The processes set forth above are described in terms of computer software and hardware. The described techniques may constitute machine-executable instructions embodied within a tangible or non-transitory machine (e.g., computer) readable storage medium, which when executed by a machine, will cause the machine to perform the described operations. Additionally, the processes may be embodied within, for example, an application specific integrated circuit ("ASIC") or other hardware.
A tangible, non-transitory, machine-readable storage medium includes any mechanism that provides (i.e., stores) information in a non-transitory form accessible by a machine (e.g., a computer, network device, personal digital assistant, manufacturing tool, any device with a set of one or more processors, etc.). For example, a machine-readable storage medium includes recordable/non-recordable media (e.g., Read Only Memory (ROM), Random Access Memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, etc.).
The above description of illustrated embodiments of the invention, including what is described in the abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes, various modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize.
These modifications can be made to the invention in light of the above detailed description. The terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification. Rather, the scope of the invention is to be determined entirely by the following claims, which are to be construed in accordance with established doctrines of claim interpretation.

Claims (18)

1. An apparatus for a vehicle, comprising:
a key locker body sized to store a vehicle key including a Radio Frequency Identification (RFID) tag;
a key locker door, wherein the key locker body is configured to secure the RFID tag of the vehicle key from receiving or transmitting radio signals from or to the exterior of the key locker body when the key locker door is closed; and
an access actuator configured to open the key locker door in response to an access signal, wherein opening the key locker door includes the access actuator moving the key locker door to allow the RFID tag of the vehicle key to receive an interrogation signal generated by an RFID reader of a vehicle, and in response to receiving the interrogation signal, sending a response signal to the RFID reader of the vehicle, the response signal allowing access to the vehicle to be driven, wherein the key locker door is opened a distance that does not allow the vehicle key to be removed from the key locker body.
2. The device of claim 1, further comprising:
an optional power source for providing power to a vehicle key, wherein the power is within a tolerance of properly powering the vehicle key, and wherein the optional power source is configured to stop the power from being sent to the vehicle key in response to the optional power source receiving a disable signal.
3. The device of claim 2, further comprising:
an insert sized to fit a battery compartment of the vehicle key, wherein the insert is configured to receive the power from the optional power source and deliver the power to the vehicle key.
4. The device of claim 1, further comprising:
a key sensor configured to sense the presence of the vehicle key within the key locker body, wherein the key sensor is configured to generate a missing disable signal to disable the vehicle when a sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker body.
5. The device of claim 4, wherein the key sensor includes a pressure sensor, and wherein the sensed reading includes a pressure reading, the absence disable signal being generated when the pressure reading is below a pressure threshold.
6. The apparatus of claim 1, wherein the RFID tag is an active RFID tag powered by a power source.
7. The device of claim 1, wherein the key locker body comprises a metallic material that shields the RFID tag of the vehicle key from the interrogation signal.
8. The device of claim 7, wherein the key locker body comprises plastic and the metal material is comprised in a mesh sized to prevent reception or transmission of the radio signal.
9. A computer-implemented method of providing access to a vehicle, the computer-implemented method comprising:
monitoring input to a key locker, wherein the key locker comprises a key locker body sized to store vehicle keys, and wherein the key locker comprises a key locker door;
maintaining the key locker door in a closed position when an access signal is not received on the input of the key locker, wherein the key locker body and the key locker door in the closed position prevent a radio of the vehicle key from receiving or transmitting a radio signal; and
opening the key locker door of the key locker in response to receiving the access signal on the input of the key locker, wherein opening the key locker door allows the radio of the vehicle key to receive and transmit radio signals while not allowing the vehicle key to be removed from the key locker body.
10. The method of claim 9, further comprising:
receiving a deactivation signal by the key locker; and
disabling power provided to the vehicle key in response to receiving the disable signal, the power being within a tolerance of properly powering the radio of the vehicle key.
11. The method of claim 9, further comprising:
sensing with a key sensor of the key locker whether the vehicle key is present in the key locker; and
transmitting a missing disable signal when a sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker body.
12. The method of claim 11, wherein the key sensor includes a pressure sensor, and wherein the sensed reading includes a pressure reading, the absence disable signal being generated when the pressure reading is below a pressure threshold.
13. The method of claim 9, wherein the key locker body comprises a metallic material that shields an RFID tag of the vehicle key from an ignition interrogation signal generated by the vehicle.
14. The method of claim 9, wherein the key locker includes plastic and metal materials arranged as a mesh structure sized to prevent reception or transmission of the radio signal.
15. A vehicle system, comprising:
a wireless interface for receiving wireless access data;
processing logic coupled to the wireless interface to receive the wireless access data;
a memory coupled to the processing logic, the memory including fetching code; and
a key locker sized to store vehicle keys having an RFID tag, wherein the key locker comprises:
a key locker door, wherein the key locker protects the vehicle key from radio signals outside the key locker when the key locker door is closed;
a key sensor configured to sense the presence of the vehicle key within the key locker, wherein the key sensor is configured to generate a missing disable signal to disable the vehicle when a sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker, wherein the processing logic immobilizes the vehicle in response to receiving the missing disable signal; and
an access actuator coupled to move the key locker door, wherein the processing logic is configured to cause the access actuator to move the key locker door when the wireless access data matches the access code stored in the memory, the access actuator moving the key locker door a distance to allow the RFID tag of the vehicle key to receive an interrogation signal generated by an RFID reader of a vehicle, and send a response signal to the RFID reader in response to receiving the interrogation signal, wherein the response signal allows access to the vehicle to be driven.
16. The vehicle system of claim 15, wherein the distance that the key locker door is open does not allow the vehicle key to be removed from the key locker when the access data matches the access code, and wherein the distance that the key locker door is open does allow the vehicle key to be removed from the key locker when the access data matches a second access code stored in the memory.
17. The vehicle system of claim 15, wherein the key sensor includes a pressure sensor, and wherein the sensed reading includes a pressure reading, the absence disable signal being generated when the pressure reading is below a pressure threshold.
18. The vehicle system of claim 15, further comprising:
a sensor module configured to sense vehicle tampering with at least one of a microphone or an accelerometer, wherein the key locker is configured to stop power to the vehicle key when the sensor module senses vehicle tampering.
CN201880036147.2A 2017-05-30 2018-05-30 Vehicle key lock cabinet Active CN110740906B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111483227.2A CN114148284B (en) 2017-05-30 2018-05-30 Key lock cabinet for vehicle

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201762512285P 2017-05-30 2017-05-30
US62/512,285 2017-05-30
PCT/US2018/035214 WO2018222772A1 (en) 2017-05-30 2018-05-30 Vehicle key locker

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202111483227.2A Division CN114148284B (en) 2017-05-30 2018-05-30 Key lock cabinet for vehicle

Publications (2)

Publication Number Publication Date
CN110740906A CN110740906A (en) 2020-01-31
CN110740906B true CN110740906B (en) 2021-12-21

Family

ID=69236598

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111483227.2A Active CN114148284B (en) 2017-05-30 2018-05-30 Key lock cabinet for vehicle
CN201880036147.2A Active CN110740906B (en) 2017-05-30 2018-05-30 Vehicle key lock cabinet

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202111483227.2A Active CN114148284B (en) 2017-05-30 2018-05-30 Key lock cabinet for vehicle

Country Status (1)

Country Link
CN (2) CN114148284B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112258715B (en) * 2020-10-12 2022-08-23 武汉湖滨电器有限公司 Anti-theft device for lock position of key cabinet and safety management system thereof
CN114999056A (en) * 2022-02-22 2022-09-02 合肥进毅智能技术有限公司 Cash adding and distributing system and method for cash boxes of self-service equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6570486B1 (en) * 1999-04-09 2003-05-27 Delphi Automotive Systems Passive remote access control system
KR20070074914A (en) * 2006-01-11 2007-07-18 주식회사 현대오토넷 Authentication apparatus and method using radio wave identification of vehicle electronic system
CN101465009A (en) * 2007-12-17 2009-06-24 现代自动车株式会社 Intelligent key for vehicle and remote information processing system for the same
DE102011116209A1 (en) * 2011-10-14 2012-04-05 Daimler Ag Device for activating and deactivating locking and control system for vehicle, has control unit for activating or deactivating vehicle key, where entirely or partially deactivatable vehicle key and control unit

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6737961B2 (en) * 2002-08-14 2004-05-18 Omega Patents, L.L.C. Secure, vehicle key, storage device and associated method
US7949541B2 (en) * 2002-12-12 2011-05-24 Performance Analytics, Inc. Vehicle activity module
KR100958239B1 (en) * 2008-03-10 2010-05-17 엘에스산전 주식회사 RFID tag
JP5275741B2 (en) * 2008-10-14 2013-08-28 株式会社東海理化電機製作所 Vehicle electronic key system
JP2015501120A (en) * 2011-09-23 2015-01-08 本田技研工業株式会社 Selective current reduction with an electrically inactive key fob
US9725071B2 (en) * 2015-02-24 2017-08-08 Ford Global Technologies, Llc Key fob button sequence for accessing keypad reprogramming mode

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6570486B1 (en) * 1999-04-09 2003-05-27 Delphi Automotive Systems Passive remote access control system
KR20070074914A (en) * 2006-01-11 2007-07-18 주식회사 현대오토넷 Authentication apparatus and method using radio wave identification of vehicle electronic system
CN101465009A (en) * 2007-12-17 2009-06-24 现代自动车株式会社 Intelligent key for vehicle and remote information processing system for the same
DE102011116209A1 (en) * 2011-10-14 2012-04-05 Daimler Ag Device for activating and deactivating locking and control system for vehicle, has control unit for activating or deactivating vehicle key, where entirely or partially deactivatable vehicle key and control unit

Also Published As

Publication number Publication date
CN114148284A (en) 2022-03-08
CN110740906A (en) 2020-01-31
CN114148284B (en) 2024-10-11

Similar Documents

Publication Publication Date Title
US10940830B2 (en) Upgrade kit for an ignition key and methods
US10565409B2 (en) Key locker with selective access
EP2575091B1 (en) Unattended fleet vehicle security system and method
CN103999497B (en) System and method for delivering mail
US11042816B2 (en) Vehicle access control services and platform
US8350670B2 (en) Methods and systems for secure keyless entry for vehicle fleet management
EP2811689B1 (en) Wireless communications system
EP3297874B1 (en) Independent vehicle security method and apparatus
CN108173809A (en) For the authentication of the mobile device of vehicle communication
US8264320B2 (en) Aftermarket keyless starter
US11447097B1 (en) Control system with wireless control device authorization and related methods
JP2019512630A (en) Secure device for holding and sharing keys
US9134727B2 (en) Method for displaying information from an ID transmitter
US20220180679A1 (en) Vehicle control system
US10964138B2 (en) System and method for secure package delivery
US20200398789A1 (en) Vehicle control system
CN110740906B (en) Vehicle key lock cabinet
CN114270736A (en) Interference radio and vehicle key locker
DE102012111361A1 (en) Method for operating motor car, involves transferring key code of transponder key to electronic immobilizer if release mechanism of transponder key is activated by key activation device, and deactivating immobilizer by key code
US20230043228A1 (en) Vehicle control system
US12128853B2 (en) Integration of car security and home security system
JP2020100965A (en) Access control system
FI127378B (en) Arrangement and procedure for storing a key on the inside of a vehicle
EP4159555B1 (en) Updating vehicle ownership authorizations
JP7332434B2 (en) Information management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant