Abstract: ABSTRACT A System for Tracking, and Locating a Stolen Vehicle And a Method Therefor The present invention relates to a system for tracking, and locating a stolen vehicle (SV) comprising a server (110); a first communication device (120) mounted on the stolen vehicle (SV), the first communication device (120) having a unique address (UA) and configured to communicate using short-range wireless communication, a second communication device (130) for communicating the unique address of the first communication device (120) to the server (110) thereby intimating the server (110) about the stolen vehicle (SV); and a third communication device (140) configured to communicate with the first communication device (120) using short-range wireless communication, the third communication (140) device further configured to communicate with the server (110) over a network to receive the unique address (UA) of the first communication device (120), and to send geographic location of the stolen vehicle (SV) when the third communication device (140) communicates with the first communication device (120). Reference Figure 1
Claims:WE CLAIM:
1. A system (100) for locating and tracking a stolen vehicle (SV), the system (100) comprising:
a server (110);
a first communication device (120) mounted on the stolen vehicle (SV), the first communication device (120) having a unique address (UA) and configured to communicate using short-range wireless communication;
a second communication device (130) for communicating the unique address (UA) of the first communication device (120) to the server (110) thereby intimating the server (110) about the stolen vehicle (SV); and
a third communication device (140) configured to communicate with the first communication device (120) using short-range wireless communication, the third communication (140) device further configured to communicate with the server (110) over a network to receive the unique address (UA) of the first communication device (120), and to send geographic location of the stolen vehicle (SV) when the third communication device (140) communicates with the first communication device (110).
2. The system (100) as claimed in claim 1, wherein the second communication device (130) communicates with the server (110) by means of an application (131), said application (131) being executable on the second communication device (130) and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data.
3. The system (100) as claimed in claim 1 or 2, wherein the third communication device (140) communicates with the server (110) by means of an application (141), said application (141) being executable on the third communication device (140) and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data.
4. The system (100) as claimed in claim 2 or 3, wherein the application (131, 141) is a web application or a mobile application.
5. The system (100) as claimed in one or more of claims 1 to 4, wherein the second communication device (130) and third communication device (140), independent of each other, is a mobile telephone or a computer.
6. The system (100) as claimed in one or more of claims 1 to 5, wherein the short-range wireless communication is Bluetooth, or ZigBee, or ANT.
7. The system (100) as claimed in one or more of claims 2 to 6, wherein each of (i) the plurality of messages, and (ii) geographic location data in the second communication device (130) and the third communication device (140) being selected from at least one of electronic data, synthesized voice data, and actual voice data.
8. The system (100) as claimed in one or more of claims 1 to 7, wherein the second communication device (130) is configured to store the unique address (UA) of the first communication device (120) mounted on the stolen vehicle (SV), and the third communication device (140) is configured to store a unique address (UA′) of a fourth communication device (150) mounted on a vehicle (V).
9. A method for locating and tracking a stolen vehicle (SV), said method comprising:
(A) sending a message (M1) from a second communication device (130) to a server (110) thereby intimating the server (110) about the stolen vehicle (SV), the second communication device (130) configured to store a unique address (UA) of a first communication device (120) mounted on the stolen vehicle (SV);
(B) relaying a message (M2) by the server (110), said message (M2) comprising the unique address (UA);
(C) receiving the message (M2) by a third communication device (140), the third communication device (140) stores the unique address (UA);
(D) scanning the unique address (UA) and generating a scanned response;
(E) optionally repeating the step (D);
(F) sending a message (M3) from the third communication device (140) to the server (110) when the scanned response contains the unique address (UA), said message (M3) comprising at least the geographic location of the stolen vehicle (SV), thereby locating the stolen vehicle (SV); and
(G) receiving the message (M3) from the server (110) to the second communication device (130), thereby tracking the stolen vehicle (SV).
10. The method as claimed in claim 9, wherein the server (110) is pre-programmed with identity data comprising at least the unique address (UA) corresponding to first communication device (120), and the unique address (UA′) of the fourth communication device (150).
11. The method as claimed in claim 9 or 10, wherein each of the message (M2) and the message (M3) is received as a notification.
, Description:FIELD OF THE INVENTION
[001] The present invention relates to a system for tracking and locating a stolen vehicle and a method therefor.
BACKGROUND OF THE INVENTION
[002] Preventing a vehicle from being stolen is a major concern for a vehicle owner. To this effect, there are various technologies and associated infrastructures, however, they have not been quite successful in preventing theft of a vehicle. Such technologies and associated infrastructures are widely known as anti-theft solutions.
[003] One of the most used anti-theft solution includes a keyfob, which forms part of an electronic lock that controls access to a vehicle without using traditional mechanical key. A keyfob is a small device that uses radio transmission to allow access to a vehicle. Whenever the rider has the key, the keyfob enables searching of the vehicle in the vicinity, thereby allowing access to the same. Hence, the keyfobs are useful only if the vehicle is in proximity to the same.
[004] Another solution that is known in the art involves telematics based anti-theft solution. In this system, the vehicle has a tracking device which uses Global Positioning System (GPS) for locating the vehicle even at distance from the rider or the vehicle owner. However, such system essentially requires a mobile device linked with the telematic unit for obtaining tracking information of the vehicle. Also, the telematic unit installed in the vehicle will have to be activated for the anti-theft solution to work. Further, it is also easier to locate telematic unit in a vehicle and remove them to prevent tracking of the vehicle.
[005] The security of a vehicle in existing anti-theft solutions is largely dependent upon locating the vehicle using any Global navigation satellite system (GNSS) or a cellular network. However, cost involved with a dedicated instrument for locating the vehicle and transmitting location information is quite high. The high cost is attributed to purchase price, installation within a vehicle (or other device), and subscriber services.
[006] Thus, there is a need in the art for a system for tracking and locating a stolen vehicle which addresses at least the aforementioned problems.
SUMMARY OF THE INVENTION
[007] In one aspect, the present invention is directed to a system for locating and tracking a stolen vehicle, the system comprises a server; a first communication device mounted on the stolen vehicle, the first communication device having a unique address and configured to communicate using short-range wireless communication; a second communication device for communicating the unique address of the first communication device to the server thereby intimating the server about the stolen vehicle; and a third communication device configured to communicate with the first communication device using short-range wireless communication, the third communication device further configured to communicate with the server over a network to receive the unique address of the first communication device, and to send geographic location of the stolen vehicle when the third communication device communicates with the first communication device.
[008] In an embodiment of the invention, the second communication device communicates with the server by means of an application, said application being executable on the second communication device and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data.
[009] In another embodiment of the invention, the third communication device communicates with the server by means of an application, said application being executable on the third communication device and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data.
[010] In yet another embodiment of the invention, the application is a web application or a mobile application. Further, the second communication device and third communication device, independent of each other, is a mobile telephone or a computer.
[011] In a further embodiment of the invention, the short-range wireless communication is Bluetooth. Moreover, each of (i) the plurality of messages, and (ii) geographic location data in the second communication device and the third communication device can be selected from at least one of electronic data, synthesized voice data, and actual voice data.
[012] In a still further embodiment of the invention, the second communication device comprises the unique address of the first communication device mounted on the stolen vehicle, and the third communication device comprises a unique address of a first communication device mounted on a vehicle.
[013] In another aspect, the present invention is directed to a method for locating and tracking a stolen vehicle, said method comprising sending a message from a second communication device to a server thereby intimating the server about the stolen vehicle, the second communication device comprising a unique address of a first communication device mounted on the stolen vehicle; relaying a message by the server, said message comprising the unique address; receiving the message by a third communication device, the third communication device storing the unique address; scanning the unique address and generating a scanned response; sending a message from the third communication device to the server when the scanned response contains the unique address, said message comprising at least the geographic location of the stolen vehicle, thereby locating the stolen vehicle; receiving the message from the server to the second communication device, thereby tracking the stolen vehicle.
[014] In an embodiment of the invention, the server is pre-programmed with identity data comprising at least the unique address corresponding to first communication device, and the unique address of the first communication device. Further, the message is received as a notification.
BRIEF DESCRIPTION OF THE DRAWINGS
[015] Reference will be made to embodiments of the invention, examples of which may be illustrated in accompanying figures. These figures are intended to be illustrative, not limiting. Although the invention is generally described in context of these embodiments, it should be understood that it is not intended to limit the scope of the invention to these particular embodiments.
Figure 1 illustrates a system for locating and tracking a stolen device in accordance with an embodiment of the present invention.
Figure 2 shows a third communication device communicating with first communicating devices of the vehicles in accordance with an embodiment of the present invention.
Figure 3 illustrates the third communication device of Figure 2 communicating with a second communication device in accordance with an embodiment of the present invention.
Figure 4 illustrates a method for locating and tracking a stolen vehicle in accordance with an embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[016] An aspect of the present invention relates to a system for locating and tracking a stolen vehicle.
[017] Figure 1 illustrates a system (100) for locating and tracking the stolen vehicle (SV) in accordance with an embodiment of the present invention. In the present context, “stolen vehicle (SV)” refers to a vehicle which is lost or stolen and has to be located and tracked down using the present invention. Said otherwise, the stolen vehicle (SV) is not in custody of its authorized user or rider, but with a thief or an unauthorized user. Similarly, “vehicle (V)” refers to a vehicle which is in custody of its authorized user or rider.
[018] In the present context, an “affected node” refers to an authorized user or rider whose vehicle has been stolen or is lost. Similarly, a “non-affected node” refers to an authorized user whose vehicle is still with him, i.e. neither stolen nor lost.
[019] Further, “stolen vehicle (SV)” or “vehicle (V)” can be any vehicle capable of being used by the affected node or the non-affected for commuting purpose. In an embodiment, the stolen vehicle (SV) and the vehicle (V), independent of each other, can be selected from a two-wheeler, three-wheeler, four-wheeler, and a multi-wheeler vehicle.
[020] Also, “network” refers to a communication network which can be selected from a cellular or mobile or wireless network. For example, a wireless or cellular communication network that uses a protocol such as 802.11, CDMA, GSM, FDMA, or LTE.
[021] Referring to Figure 1, the system includes a server (110), a first communication device (120) mounted on the stolen vehicle (SV), a second communication device (130) and a third communication device. The first communication device (120) has a unique address (UA) and configured to communicate using short-range wireless communication. The second communication device (130) communicates the unique address (UA) of the first communication device (120) to the server (110) thereby intimating the server (110) about the stolen vehicle (SV). The third communication device (140) is configured to communicate with the first communication device (120) using short-range wireless communication. In this regard, the third communication (140) device is further configured to communicate with the server (110) over a network to receive the unique address (UA) of the first communication device (120), and to send geographic location of the stolen vehicle (SV) when the third communication device (140) communicates with the first communication device (120).
[022] Herein, the first communication device (120), the second communication device (130), the third communication device (140), fourth communication device (150) and any additional communication device (such as a fifth communication device) together, in the present context, is referred as communication devices.
[023] In an embodiment, the server (110) is a server computer. Accordingly, the server (110) can include but not limited to a processor, a memory, a communication port, and a storage device such as a database. The server (110) is capable of communicating with at least the second communication device (130) and/or the third communication device (140) via network, such as a mobile network or a wireless network.
[024] In another embodiment, the short-range wireless communication refers to wireless communication means which is capable of communicating up to a distance of 100m between at least any two selected from the first communication device (120), the second communication device (130), and the third communication device (140). Suitable short-range wireless communication can be selected from Bluetooth, Wi-Fi, WiMax, and HomeRF. In an embodiment, the short-range wireless communication is via Bluetooth or ZigBee, or ANT.
[025] In another embodiment, the first communication device (120) is mounted on the stolen vehicle (SV). In the present context, “mounted” refers to the first communication device (120) being installed on the stolen vehicle (SV) at a location on the stolen vehicle (SV) which is effective for establishing the communication using the short-range wireless communication. Preferably, the first communication device (120) is mounted in the vicinity of the affected node riding the stolen vehicle (SV). For instance, if the stolen vehicle (SV) is a two-wheeler, the first communication device (120) can be installed on the fuel tank. Similarly, the fourth communication device (150) is also mounted on the vehicle (V) of the non-affected node.
[026] The first communication device (120) has the unique address (UA) and is configured to communicate using short-range wireless communication. For example, the first communication device (120) is capable of communicating with the second communication device (130) using the short-range wireless communication. This refers to the first communication device (120) pairing with the second communication device (130) and thus capable of communicating with each other. Any reference to “pairing” or “pair” or “paired” in the context of the communication devices refers to them being connected to each other using the short-range wireless communication, thereby capable of communicating. When both the first communication device (120) and the third communication device (130) are connected or paired, the unique address (UA) is stored in the second communication device (130).
[027] In one embodiment, the first communication device (120) comprises a short-range wireless transceiver (120a) for communicating with the second communication device (130); a memory (120b) for storing the unique address (UA); and a location transceiver (120c) for transmitting data representing the geographic location of the first communication device (120). The short-range wireless transceiver (120a), memory (120b) and the location transceiver (120c) are together known as building blocks of the first communication device (120). In an embodiment, the first communication device (120) could be a commercially available device comprising the above building blocks, which can be mounted on the stolen vehicle (SV) and is capable of communicating using short-range wireless communication.
[028] In another embodiment, the short-range wireless transceiver (120a) allows communication to and from the first communication device (120). In fact, the pairing between the communication devices occurs by way of short-range wireless communication signals, for example Bluetooth signals. The unique address (UA) of the first communication device (120) is preferably the short-range wireless communication name and/or serial number which is unique for each device (120). For instance, the unique address could be a serial number of the short-range wireless transceiver (120a). The unique address (UA) is stored permanently in the memory (120b).
[029] For determining the location of the first communicating device (120), any known method can be used. One known group of methods is based on dedicated Telecom networks or dedicated segments of a Telecom network. These methods are usually referred to as “network based', i.e., they employ a wide area array of antennas and transceivers coupled together, such that the first communication device (120) can be located whenever being contained within the area that is covered by said antennas. Such methods usually require minimal modifications in the communication devices the location of which is to be determined by this network.
[030] The latter methods are further subdivided into “sub-methods’. One such sub-method measures the Angle of Arrival (AOA) of a signal emitted by the first communication device (120), received at least at two of the network’s antennas. Knowing the location of these antennas and the AOA of the received signal, the location of the first communication device (120) can be derived by trigonometric calculations.
[031] Another sub-method measures the Time of Arrival (TOA) of a signal emitted by the first communication device (120), received at least at three of the network’s antennas. Knowing the location of these antennas and the TOA of the received signal, the location of the first communication device (120) can be derived. The TOA method is based on spherical radio navigation, i.e., the geometric locus of points having a same range from a fixed point is a sphere surface, the fixed point of which is its center. In case of TOA, the fixed points are the receiving networks antennas, and the range is [TOA x C] for each receiving antenna, wherein “C” is the velocity of light or electromagnetic waves. The location of the first communication device (120) is calculated as one of the two points, defined by the crossing sector of all three sphere surfaces (the crossing sector of two spherical surfaces is a circle, and this circle crosses a third sphere surface at two points). Sometimes, a fourth antenna is used to remove this ambiguity or to compensate for clock discrepancies.
[032] In an embodiment, the geographic location of the first communication device (120) is determined using the location transceiver (120c). The data representing the geographic location is determined by utilizing satellite signals received from a navigation system such as Global Positioning System (GPS) or Galileo or GLONASS.
[033] The embodiments describing the first communication device (120) mounted on the stolen vehicle (SV), as above, are also applicable for the fourth communication device (150) mounted on the vehicle (V) and having a unique address (UA′).
[034] As shown in Figure 1, the system (100) comprises the second communication device (130) for communicating the unique address (UA) of the first communication device (120) to the server (110) thereby intimating the server (110) about the stolen vehicle (SV).
[035] In an embodiment, the second communication device (130) is a mobile telephone or a computer. For instance, when the second communication device (130) is a mobile telephone, the unique address (UA) of the first communication device (120) is communicated to the server (110) by the affected node by way of at least a call, an application, or a short message service, each sent using a network. Preferably, the second communication device (130) communicates with the server (110) by means of an application (131), said application (131) being executable on the second communication device (130) and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data. In one embodiment, the application (131) is a web application or a mobile application. When the application (131) is a web application, the second communication device (130) is a mobile computer, for e.g. a laptop computer, tablet computer, and the likes. As is known to the person skilled in the art, the web application is an application software that runs on a web server, unlike computer-based software programs that are run locally on an operating system. Web applications can be accessed by the affected node through a web browser over a network.
[036] In case the application (131) is a mobile application, the second communication device (130) is a mobile telephone. As is known to the person skilled in the art, the mobile application (also referred to as an app) is a type of application software designed to run on a mobile device, such as a smartphone or tablet computer. Preferably, the application (131) is a mobile application installed in the second communication device (130) and having a user interface that displays various options or buttons to the affected node to select from. When the affected node selects or clicks the requisite option or button from the mobile application installed in the second communication device (130), the server is intimated about the stolen vehicle (SV).
[037] In one embodiment, the second communication device (130) comprises a short-range wireless transceiver (131) for communicating with the first communication device (120); a memory (131b) for storing the unique address (UA); a circuitry (131c) for sending, receiving, and processing the plurality of messages to or from the central server (110) over a network; and a location transceiver (131d) for transmitting data representing the geographic location of the first communication device (120). The short-range wireless transceiver (131), memory (131b), circuitry (131c) and location transceiver (131d) are together known as building blocks of the second communication device (130). Preferably, these building blocks are embedded in the second communication device (130), for example in a mobile telephone, in a manner known to the person skilled in the art.
[038] In one embodiment, the second communication device (130) is further capable of sending geographic location of the stolen vehicle (SV) when the second communication device (130) communicates with the first communication device (120).
[039] The system (100) of the present invention also comprises of the third communication device (140) which is configured to communicate with the first communication device (120) using short-range wireless communication, the third communication (140) device further configured to communicate with the server (110) over a network to receive the unique address (UA) of the first communication device (120), and to send geographic location of the stolen vehicle (SV) when the third communication device (140) communicates with the first communication device (120).
[040] As shown in Figures 1 and 2, the non-affected node is in possession of the third communication device (140), while the affected node is in possession of the second communication device (130).
[041] Similar to the second communication device (130), the third communication device (140) is a mobile telephone or a computer. Accordingly, the corresponding embodiments for the mobile telephone and the computer described in the context of the second communication device (130), as above, are also applicable to the third communication device (140).
[042] Similar to the second communication device (130), the third communication device (140) also communicates with the server (110) by means of an application (141), said application (141) being executable on the third communication device (140) and capable of sending, receiving, and processing of at least (i) a plurality of messages, and (ii) geographic location data. The embodiments corresponding to the application (131) in the context of the second communication device (130), as above, are also applicable for the application (141) of the third communication device (140).
[043] Similar to the second communication device (130), the third communication device (140) also comprises a short-range wireless transceiver (141) for communicating with the first communication device (120); a memory (141b) for storing at least the unique address (UA); a circuitry (141c) for sending, receiving, and processing the plurality of messages to or from the central server (110) over a network; and a location transceiver (141d) for transmitting data representing the geographic location of the first communication device (120). The short-range wireless transceiver (141), memory (141b), circuitry (141c) and location transceiver (141d) are together known as building blocks of the second communication device (130). Preferably, these building blocks are embedded in the third communication device (140), for example in a mobile telephone, in a manner known to the person skilled in the art. The memory (141b) is further capable of storing the unique address (UA′) of the fourth communication device (150) mounted on the vehicle (V).
[044] In an embodiment, the third communication device (140) is a telematics unit comprising a short-range wireless transceiver as described herein. In such a scenario, the location of the stolen vehicle (SV) can be directly communicated to the server (110) by the third communication device (140) via a network, i.e. without using the application (141).
[045] In one embodiment, each of (i) the plurality of messages, and (ii) geographic location data, in the second communication device (130) and the third communication device (140) can be selected from at least one of electronic data, synthesized voice data, and actual voice data.
[046] In another embodiment, the system (100) further comprises an auxiliary node (not shown in Figures). A fifth communication device having a unique address (UA′′) is mounted on the auxiliary node. The fifth communication device is capable of communicating with the first communication device (120) of the affected node and the fourth communication device (150) of the non-affected node, each using the short-range wireless communication. The fifth communication device is also capable of communicating with the second communication device (130) and the third communication device (140), each using the short-range wireless communication. The manner of communication of the fifth communication device using the short-range wireless communication is same as that described herein for the second communication device (130) and the third communication device (140). Further, the fifth communication device also includes the building blocks similar to that of the second communication device (130) and the third communication device (140). Suitable examples of auxiliary nodes include, but are not limited to, fuel stations, vehicle service wagons, vehicle service stations, vehicle dealership centers, vehicle charging stations, and rider accessories such as helmets, jackets, smart bands, and smart watches, etc.
[047] While the present system (100) has been described in the context of tracking and locating the stolen vehicle (SV), it is also possible to use this system (100) for various other similar purposes. For instance, the system (100) can be used to obtain the geographic location of a particular area which is prone to maximum number of vehicles being stolen. This is determined based on feedback shared by several affected nodes with the server (110) and local public servants, for e.g. police or cops.
[048] Further, the system (100) is also capable of locating and tracking more than one stolen vehicles (SV). In that case, there will be more than one communication devices capable of communicating with each other using the short-range wireless communication, as above.
[049] The system (100), as described herein, is easy-to-use, economical and does not requires using the existing complex infrastructures, such as but not limited to telematics and keyfobs.
[050] Another aspect of the present invention relates to a method for locating and tracking a stolen vehicle. Referring to Figures 1 and 4, at step 402, the second communication device reports about the theft of stolen vehicle (SV) to the server (110). In this regard, to report theft of a vehicle or to intimate the server (110) about the stolen vehicle (SV), the server (110) is pre-programmed with identity data comprising at least the unique address (UA) corresponding to the first communication device (120), and the unique address (UA′) of the fourth communication device (150). For this, the second communication device (130) and the third communication device (140) need to be first registered with the server (110). Said otherwise, the identity data for each of the affected node and the non-affected node is created and stored with the server (110).
[051] Every time a vehicle (V) is purchased by a non-affected node, the fourth communication device (150) is paired with the second communication device (130). Once the fourth communication device (150) is paired, the server (110) creates the identity data for the non-affected node which includes at least the unique address (UA′) of the vehicle (V). Additionally, the identity data further includes details such as, but not limited to, name, email address, mobile telephone number, customized username, address of residence, blood group, and the likes of the non-affected node.
[052] The identity data of the affected node is also created with the details similar to that of the non-affected node, as above.
[053] This creation of identity data enables the server (110) to detect and prevent the non-authorized user from registering his details which include at least the unique address (UA) of the stolen vehicle (SV). Since the unique address (UA) of the stolen vehicle (SV) is already registered against the affected node, the server can easily detect the non-authorized user and further communicate this unauthorized access or connection request to the affected node.
[054] As shown in Figure 4, the affected node intimates the server (110) about the stolen vehicle (SV) by the second communication device (130). For this, a message (M1) is sent from the second communication device (130) to the server (110). Since the server (110) already has the identity data of the affected node, the details of the affected node are first verified by the server (110), as described above.
[055] When the second communication device (130) is a mobile telephone, the message (M1) is sent by means of the application (131), preferably the mobile application. For this, the affected node selects or clicks the requisite option or button from the mobile application installed in the second communication device (130). Subsequently, the message (M1) is sent to the server (110) via the network. Alternately, the message (M1) can also be sent by way of call or short message service.
[056] When the second communication device (130) is a computer, the message (M1) is sent by means of the web application. For this, the affected node would be required to visit the webpage from where the requisite option needs to be selected or clicked to intimate the server about the stolen vehicle (SV).
[057] In an embodiment, the message (M1) is sent by manually clicking a button or by voice communication from the application (131) in the second communication device (130).
[058] At step 404, a message (M2) is relayed by the server (110) to the third communication device (140) via a network. Once the identity data of the affected user is verified by the server (110), the message (M2) is generated and is sent to the third communication device (140). The message (M2) comprises the unique address (UA) of the first communication device (120) mounted on the stolen vehicle (SV).
[059] In an embodiment, the third communication device (140) receives the message (M2) only if the corresponding identity details are registered with the server (110). At step 406, the third communication device receives the message (M2) relayed by the server 110 and stores the unique address (UA). The third communication device (140) already has the unique address (UA′) of the fourth communication device (150) mounted on the vehicle (V), stored in the memory (141b). The message (M2) is preferably received as a notification in the third communication device (140), particularly in the application (141). In one embodiment, the non-affected node is required to respond to the message (M2) to allow the unique address (UA) of the stolen vehicle (SV) to be stored. If the non-affected node does not respond to the message (M2) or prefers to ignore the message (M2), the unique address (UA) of the stolen vehicle (SV) is not stored.
[060] Accordingly, the message (M2) is generated by the following steps: receiving the message (M1) from the second communication device (130) by the server (110), verifying the identity data, and sending the message (M2) to the third communication device (140).
[061] In another embodiment, at step 406, the method stores the unique address (UA) from the message (M2) in the memory (141b) of the third communication device (140).
[062] At step 408, the unique address (UA) is continuously scanned by the third communication device (140) and a scanned response is generated. The scanned response contains the output of the scanning, i.e. whether the unique address of all vehicles (including the stolen vehicle (SV)) in the vicinity is same as UA or not.
[063] As shown in Figure 2, the method of the present invention is also capable of scanning the unique address (UA) when the affected node and/or the non-affected node are on the move, i.e. in motion. Said otherwise, whenever the affected node and/or the non-affected node are in the vicinity of a vehicle which has the first communication device (110) mounted on it, the second communication device (130) and the third communication device (140) pair with the first communication device (110) of that vehicle. Once the pairing is done, the unique address of that vehicle is stored in the memory (131b, 141b) and is scanned against the unique address (UA) of the stolen vehicle (SV).
[064] At step 410, when the scanned response of the vehicle (V) does not match with the unique address (UA) of the stolen vehicle (SV), the scanning ends. Once the third communication device (140) pairs with the first communication device (120) of another vehicle, which may or may not be the stolen vehicle (SV), the unique address of that vehicle is stored in the memory (141b) and the scanning happens again. Said otherwise, the steps 408 and 410 are performed once again, as shown in Figure 4.
[065] As shown in Figures 3 and 4, when the scanned response contains the unique address (UA) of the stolen vehicle (SV), the message (M3) is automatically relayed, at step 410, from the third communication device (140) to the server (110), preferably from the application (141). Scanning ends now. The message (M3) comprises at least the geographic location of the stolen vehicle (SV), thereby locating the stolen vehicle (SV).
[066] At step 412 the server receives the message (M3) from the third communication device (140), verifies the identity data, and sends the message (M3) to the second communication device (130).
[067] When the message (M3) is received by the server (110), the identity data is verified to ensure that the details correspond to the affected node only. Once the verification is satisfactory or the details of the affected node match, the message (M3) is sent to the second communication device (130) of the affected node.
[068] At step 414, message (M3) is received from the server (110) by the second communication device (130). As shown in Figures 3 and 4, the message (M3) is received as a notification in the application (131) in the second communication device (130).
[069] The message (M3) contains at least the geographic location of the stolen vehicle (SV). Preferably, the data representing the geographic location is converted from geographic coordinates to a corresponding physical address. The affected node can then track down the stolen vehicle (SV) and update the status of his vehicle in the application (131) of the second communication device (130).
[070] Once the affected node is in possession of the stolen vehicle (SV), the server (110) is updated with the details. Optionally, at step 416, a message (M4) is sent from the server (110) to the third communication device (140) of the non-affected nodes, preferably in the application (141). The message (M4) preferably contains a text message informing the non-affected nodes that the stolen vehicle (SV) has been found.
[071] As an advantage of the method, the steps (408) and (410) are performed without the non-affected node being prompted for necessary action or disturbed. Said otherwise, the steps (408) and (410) are performed in the background without bothering the non-affected node. Moreover, the steps (C) and (D), together referred as step (E), are many a times repeated at least once or until the unique address (UA′) is same as the unique address (UA).
[072] In another embodiment, the message (M3) further comprises a timestamp depicting the time corresponding to accessing the geographic location data of the first communication device (120) mounted on the stolen vehicle (SV). In this manner, the time when the stolen vehicle (SV) was spotted, or the corresponding unique address (UA) paired with the second communication device (130) or the third communication device (140) can also be relayed along with the geographic location.
[073] Further, it is also possible that more than one non-affected node report finding the stolen vehicle (SV) by pairing and scanning its unique address (UA). In that case, the present system and its corresponding method is capable of providing a more accurate location of the stolen vehicle (SV) to the second communication device (130) of the affected node.
[074] Additionally, the method is also capable of establishing a connected vehicle concept. In the connected vehicle concept, several vehicles are able to exchange information via the second communication device (130) between the riders. For this, the first communication devices (120) of the vehicles need to be paired with the second communication devices (130) and/or the third communication devices (140) using short-range wireless communication. Once the devices are paired, the application (131, 141) enables the exchange of information between the users.
[075] As an example of the connected vehicle concept, whenever a non-affected node visits a new location, the application (131, 141) allows the non-affected node to interact and exchange information with other non-affected nodes. In this manner the non-affected node visiting the new location can exchange any information with other non-affected node, for instance, places to visit, vehicle service centers, etc.
[076] While the present invention has been described with respect to certain embodiments, it will be apparent to those skilled in the art that various changes and modification may be made without departing from the scope of the invention as defined in the following claims.
| # | Name | Date |
|---|---|---|
| 1 | 202041054488-STATEMENT OF UNDERTAKING (FORM 3) [15-12-2020(online)].pdf | 2020-12-15 |
| 2 | 202041054488-REQUEST FOR EXAMINATION (FORM-18) [15-12-2020(online)].pdf | 2020-12-15 |
| 3 | 202041054488-FORM 18 [15-12-2020(online)].pdf | 2020-12-15 |
| 4 | 202041054488-FORM 1 [15-12-2020(online)].pdf | 2020-12-15 |
| 5 | 202041054488-FIGURE OF ABSTRACT [15-12-2020(online)].jpg | 2020-12-15 |
| 6 | 202041054488-DRAWINGS [15-12-2020(online)].pdf | 2020-12-15 |
| 7 | 202041054488-DECLARATION OF INVENTORSHIP (FORM 5) [15-12-2020(online)].pdf | 2020-12-15 |
| 8 | 202041054488-COMPLETE SPECIFICATION [15-12-2020(online)].pdf | 2020-12-15 |
| 9 | 202041054488-Proof of Right [10-03-2021(online)].pdf | 2021-03-10 |
| 10 | 202041054488-FORM-26 [02-07-2021(online)].pdf | 2021-07-02 |
| 11 | 202041054488-Request Letter-Correspondence [23-09-2021(online)].pdf | 2021-09-23 |
| 12 | 202041054488-Power of Attorney [23-09-2021(online)].pdf | 2021-09-23 |
| 13 | 202041054488-Form 1 (Submitted on date of filing) [23-09-2021(online)].pdf | 2021-09-23 |
| 14 | 202041054488-Covering Letter [23-09-2021(online)].pdf | 2021-09-23 |
| 15 | 202041054488-FORM 3 [04-10-2021(online)].pdf | 2021-10-04 |
| 16 | 202041054488-FER.pdf | 2022-07-19 |
| 1 | SearchHistory(55)E_18-07-2022.pdf |