Abstract: The present disclosure relates to a field of automobile engineering that discloses a method and system for secured remote access to a vehicle. The method includes receiving by a remote access monitoring system configured in the vehicle, a command to enable remote Air Conditioner (AC) operation mode in the vehicle, from a user device. In response to the command, the method includes enabling the remote AC operation mode in the vehicle upon performing predefined safety checks. Thereafter, the method includes detecting at least one of intrusion in the vehicle and occurrence of predefined vehicle events in the vehicle using sensors configured in the vehicle. Finally, the method includes performing one or more actions for secure remote access and triggering an alarm based on the detection. The present disclosure ensures seamless and secure access to the vehicle when the remote AC operating mode is activated, by preventing intrusions and unauthorized access to the vehicle. FIG.2
Claims:We claim:
1. A method for secured remote access to a vehicle (101), the method comprising:
receiving, by a remote access monitoring system (107) configured in a vehicle (101), a command to enable remote Air Conditioner (AC) operation mode in the vehicle (101), from a user device (105) associated with the vehicle (101);
enabling, by the remote access monitoring system (107), the remote AC operation mode in the vehicle (101) upon performing one or more predefined safety checks, in response to the command;
detecting, by the remote access monitoring system (107), at least one of intrusion in the vehicle (101) and occurrence of one or more predefined vehicle events in the vehicle (101) using one or more sensors configured in the vehicle (101); and
performing, by the remote access monitoring system (107), one or more actions for secure remote access based on the detection of the at least one of intrusion in the vehicle (101) and the one or more predefined vehicle events in the vehicle (101).
2. The method as claimed in claim 1 further comprises disabling, by the remote access monitoring system (107), the remote AC operation mode in the vehicle (101) upon expiry of a predefined time period after the remote AC operation mode is enabled in the vehicle (101).
3. The method as claimed in claim 1 further comprises disabling, by the remote access monitoring system (107), the remote AC operation mode and switching to a normal operation mode, upon detecting presence of a valid vehicle key inside the vehicle (101) before expiry of a predefined time period after the remote AC operation mode is enabled in the vehicle (101).
4. The method as claimed in claim 1, wherein the enabling of the remote AC operation mode turns ON engine of the vehicle (101) and AC operation in the vehicle (101).
5. The method as claimed in claim 2, wherein the disabling of the remote AC operation mode turns OFF engine of the vehicle (101) and AC operation in the vehicle (101).
6. The method as claimed in claim 1 further comprises switching, by the remote access monitoring system (107), the vehicle (101) into a safety mode upon enabling the remote AC operation mode in the vehicle (101) and prior to the detection of intrusion in the vehicle (101).
7. The method as claimed in claim 1, wherein the one or more predefined vehicle events comprise at least one of activation of accelerator pedal, activation of brake, and activation of gear shifter.
8. The method as claimed in claim 1, wherein the one or more sensors comprise at least one of door open switches, neutral gear sensor, accelerator sensor, brake switch, and Radio Frequency (RF) sensor.
9. The method as claimed in claim 1, wherein the one or more predefined safety checks comprise at least one of door lock check, neutral gear check, park brake engaged check, vehicle (101) speed zero check, no acceleration and brake pedal press check, steering wheel lock check, and battery voltage health check.
10. The method as claimed in claim 1, wherein performing the one or more actions for secure remote access when the intrusion is detected in the vehicle (101) comprises turning OFF engine of the vehicle (101) and AC operation in the vehicle (101).
11. The method as claimed in claim 1, wherein performing the one or more actions for secure remote access upon detecting the one or more predefined vehicle events in the vehicle (101) comprises:
detecting presence of valid vehicle key inside the vehicle (101); and
turning OFF engine of the vehicle (101) and AC operation in the vehicle (101), when the valid vehicle key is not detected in the vehicle (101).
12. The method as claimed in claim 1 further comprises triggering, by the remote access monitoring system (107), an alarm upon detecting at least one of the intrusion in the vehicle (101) and occurrence of the one or more predefined vehicle events in the vehicle (101) when valid vehicle key is not detected in the vehicle (101).
13. A remote access monitoring system (107) for secured remote access to a vehicle (101), the remote access monitoring system (107) comprising:
one or more processors (109); and
a memory (113) communicatively coupled to the processor, wherein the memory (113) stores the processor-executable instructions, which, on execution, causes the one or more processors (109) to:
receive a command to enable remote Air Conditioner (AC) operation mode in the vehicle (101), from a user device (105) associated with the vehicle (101);
enable the remote AC operation mode in the vehicle (101) upon performing one or more predefined safety checks, in response to the command;
detect at least one of intrusion in the vehicle (101) and occurrence of one or more predefined vehicle events in the vehicle (101) using one or more sensors configured in the vehicle (101); and
perform one or more actions for secure remote access based on the detection of the at least one of intrusion in the vehicle (101) and the one or more predefined vehicle events in the vehicle (101).
14. The remote access monitoring system (107) as claimed in claim 13, wherein the one or more processors (109) are further configured to disable the remote AC operation mode in the vehicle (101) upon expiry of a predefined time period after the remote AC operation mode is enabled in the vehicle (101).
15. The remote access monitoring system (107) as claimed in claim 13, wherein the one or more processors (109) are further configured to disable the remote AC operation mode and switch to a normal operation mode upon detecting the valid vehicle key inside the vehicle (101) before expiry of a predefined time period after the remote AC operation mode is enabled in the vehicle (101).
16. The remote access monitoring system (107) as claimed in claim 13, wherein to enable the remote AC operation mode, the one or more processors (109) turn ON engine of the vehicle (101) and AC operation in the vehicle (101).
17. The remote access monitoring system (107) as claimed in claim 14, wherein to disable the remote AC operation mode, the one or more processors (109) turn OFF engine of the vehicle (101) and AC operation in the vehicle (101).
18. The remote access monitoring system (107) as claimed in claim 13, wherein the one or more processors (109) are further configured to switch the vehicle (101) into a safety mode upon enabling the remote AC operation mode in the vehicle (101) and prior to the detection of intrusion in the vehicle (101).
19. The remote access monitoring system (107) as claimed in claim 13, wherein the one or more predefined vehicle events comprise at least one of activation of accelerator pedal, activation of brake, and activation of gear knob.
20. The remote access monitoring system (107) as claimed in claim 13, wherein the one or more sensors comprise at least one of door open switches, neutral gear sensor, accelerator sensor, brake switch, and Radio Frequency (RF) sensor.
21. The remote access monitoring system (107) as claimed in claim 13, wherein the one or more predefined safety checks comprise at least one of door lock check, neutral gear check, park brake engaged check, vehicle (101) speed zero check, no acceleration and brake pedal press check, steering wheel lock check, and battery voltage health check.
22. The remote access monitoring system (107) as claimed in claim 13, wherein to perform the one or more actions for secure remote access when the intrusion is detected in the vehicle (101), the one or more processors (109) are configured to turn OFF engine of the vehicle (101) and AC operation in the vehicle (101).
23. The remote access monitoring system (107) as claimed in claim 13, wherein to perform the one or more actions for secure remote access upon detecting the one or more predefined vehicle events in the vehicle (101), the one or more processors (109) are configured to:
detect presence of valid vehicle key inside the vehicle (101); and
turn OFF engine of the vehicle (101) and AC operation in the vehicle (101), when the valid vehicle key is not detected in the vehicle (101).
24. The remote access monitoring system (107) as claimed in claim 13, wherein the processor is further configured to trigger an alarm upon detecting at least one of the intrusion in the vehicle (101) and occurrence of the one or more predefined vehicle events in the vehicle (101) when key is not detected in the vehicle (101).
Dated this 29th day of October, 2021
MADHUSUDAN S T
IN/PA-1297
OF K & S PARTNERS
AGENT FOR THE APPLICANT
, Description:TECHNICAL FIELD
Present disclosure generally relates to field of automobile engineering. Particularly but not exclusively, the present disclosure relates to a method and a system for secured remote access to a vehicle.
BACKGROUND OF THE DISCLOSURE
Nowadays, vehicles are provided with a remote Air Conditioner (AC) operating mode that can be turned ON by a user remotely i.e. when the user is away from the vehicle. This is achieved by using an application in the user device , that allows the user to provide commands to the vehicle. This feature of remote AC operating mode helps in setting a pleasant cabin temperature to the user of the vehicle before entering the vehicle. Currently existing techniques activate the remote AC operating mode by turning ON the engine of the vehicle and thereafter the AC operation in the vehicle. Therefore, currently, the feature of remote AC operating mode is implemented in the vehicles with a risk of intrusion. For instance, intruders such as thieves or any other unauthorized users can intrude into the vehicle by breaking the window glass of the vehicle or any other means, and drive away the vehicle, since the engine of the vehicle is turned ON when the remote AC operating mode is activated. In another instance, consider kids or any other user, who is novice to driving, are sitting inside the vehicle while the driver of the vehicle is away. In such instances, consider that the kids playfully attempt to shift the gear shifter or activate the accelerator pedal, when the remote AC operating mode is activated. Such unauthorized access of the vehicle may move the vehicle since the engine is turned ON, which may lead to fatal accidents.
Moreover, in the existing techniques, when the remote AC operating mode is turned OFF by the user, the vehicle takes substantive amount of time to switch from the remote AC operating mode to a normal mode. This affects the user experience since the user needs to wait for the vehicle to return to a normal mode, each time the remote AC operating mode is activated.
The information disclosed in this background of the disclosure section is only for enhancement of understanding of the general background of the disclosure and should not be taken as an acknowledgement or any form of suggestion that this information forms prior art already known to a person skilled in the art.
SUMMARY OF THE DISCLOSURE
One or more shortcomings of the conventional systems are overcome by system and method as claimed and additional advantages are provided through the provision of system and method as claimed in the present disclosure. Additional features and advantages are realized through the techniques of the present disclosure. Other embodiments and aspects of the disclosure are described in detail herein and are considered a part of the claimed disclosure.
In one non-limiting embodiment of the present disclosure a method for secured remote access to a vehicle is disclosed. The method includes receiving, by a remote access monitoring system configured in a vehicle, a command to enable remote Air Conditioner (AC) operation mode in the vehicle, from a user device associated with the vehicle. Thereafter, the method includes enabling the remote AC operation mode in the vehicle upon performing one or more predefined safety checks, in response to the command. Upon enabling the remote AC operation mode, the method includes detecting at least one of intrusion in the vehicle and occurrence of one or more predefined vehicle events in the vehicle using one or more sensors configured in the vehicle. Finally, the method includes performing one or more actions for secure remote access based on the detection of the at least one of intrusion in the vehicle and the one or more predefined vehicle events in the vehicle.
In an embodiment of the disclosure, the method further includes disabling, by the remote access monitoring system, the remote AC operation mode in the vehicle upon expiry of a predefined time period after enabling the remote AC operation mode in the vehicle.
In an embodiment of the disclosure, the method further includes disabling, by the remote access monitoring system, the remote AC operation mode and switching to a normal operation mode upon detecting the valid vehicle key inside the vehicle before expiry of a predefined time period after the remote AC operation mode is enabled in the vehicle.
In an embodiment of the disclosure, enabling of the remote AC operation mode turns ON engine of the vehicle and AC operation in the vehicle.
In an embodiment of the disclosure, disabling of the remote AC operation mode turns OFF engine of the vehicle and AC operation in the vehicle.
In an embodiment of the disclosure, the method further includes switching, by the remote access monitoring system, the vehicle into a safety mode upon enabling the remote AC operation mode in the vehicle and prior to the detection of intrusion in the vehicle.
In an embodiment of the disclosure, the one or more predefined vehicle events comprise at least one of activation of accelerator pedal, activation of brake, and activation of gear shifter.
In an embodiment of the disclosure, the one or more sensors comprise at least one of door open switches, neutral gear sensor, accelerator sensor, brake switch, and radio frequency sensor.
In an embodiment of the disclosure, the one or more predefined safety checks comprise at least one of door lock check, neutral gear check, park brake engaged check, vehicle speed zero check, no acceleration and brake pedal press check, steering wheel lock check, and battery voltage health check.
In an embodiment of the disclosure, performing the one or more actions for secure remote access upon detecting the one or more predefined vehicle events in the vehicle comprises detecting presence of valid vehicle key inside the vehicle and turning OFF engine of the vehicle and AC operation in the vehicle, when the valid vehicle key is not detected in the vehicle.
In an embodiment of the disclosure, the method further includes triggering, by the remote access monitoring system, an alarm upon detecting at least one of the intrusion in the vehicle and occurrence of the one or more predefined vehicle events in the vehicle when valid vehicle key is not detected in the vehicle.
In another non-limiting embodiment of the disclosure a remote access monitoring system for secured remote access to a vehicle is disclosed. The remote access monitoring system includes one or more processors and a memory communicatively coupled to the processor. The memory stores the processor-executable instructions, which, on execution, causes the one or more processors to receive a command to enable remote Air Conditioner (AC) operation mode in the vehicle, from a user device associated with the vehicle. Further, the one or more processors enable the remote AC operation mode in the vehicle upon performing one or more predefined safety checks, in response to the command. Upon enabling the remote AC operation mode, the one or more processors detect at least one of intrusion in the vehicle and occurrence of one or more predefined vehicle events in the vehicle using one or more sensors configured in the vehicle. Finally, the one or more processors perform one or more actions for secure remote access based on the detection of the at least one of intrusion in the vehicle and the one or more predefined vehicle events in the vehicle.
It is to be understood that aspects and embodiments of the disclosure described above may be used in any combination with each other. Several aspects and embodiments may be combined together to form a further embodiment of the disclosure.
The foregoing summary is illustrative only and is not intended to be in any way limiting. In addition to illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features will become apparent by reference to drawings and the following detailed description.
BRIEF DESCRIPTION OF THE ACCOMPANYING FIGURES
The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the figures to reference like features and components. Some embodiments of system and/or methods in accordance with embodiments of the present subject matter are now described, by way of example only, and with reference to the accompanying figures, in which:
FIG.1 illustrates an exemplary architecture for secured remote access to a vehicle, in accordance with an embodiment of the present disclosure;
FIG.2 shows a detailed block diagram of a remote access monitoring system for secured remote access to a vehicle, in accordance with some embodiments of the present disclosure;
FIG.3 illustrates a flowchart of a method for secured remote access to a vehicle, in accordance with some embodiments of the present disclosure; and
FIG.4 is a block diagram of an exemplary computer system for implementing embodiments consistent with the present disclosure.
It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative systems embodying the principles of the present subject matter. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and executed by a computer or processor, whether or not such computer or processor is explicitly shown.
The figures depict embodiments of the disclosure for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the system illustrated herein may be employed without departing from the principles of the disclosure described herein.
DETAILED DESCRIPTION
In the present document, the word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment or implementation of the present subject matter described herein as "exemplary" is not necessarily be construed as preferred or advantageous over other embodiments.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiment thereof has been shown by way of example in the drawings and will be described in detail below. It should be understood, however that it is not intended to limit the disclosure to the forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternative falling within the scope of the disclosure.
The terms “comprises”, “comprising”, “includes” or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a setup, device or method that includes a list of components or steps does not include only those components or steps but may include other components or steps not expressly listed or inherent to such setup or device or method. In other words, one or more elements in a system or apparatus proceeded by “comprises… a” does not, without more constraints, preclude the existence of other elements or additional elements in the system or method.
Disclosed herein are a method and a system for secured remote access to a vehicle. As an example, the vehicle may include, but not limited to, a car, a truck, a lorry, a bus and the like. In the present disclosure, the remote access monitoring system receives a command from a user device of a valid user of the vehicle, to enable the remote AC operating mode in the vehicle. The remote access monitoring system may perform one or more predefined safety checks to ensure that the vehicle is in a safe state and then may enable the remote AC operating mode. When the remote AC operating mode is enabled, the remote access monitoring system may detect either an intrusion in the vehicle or occurrence of one or more predefined vehicle events in the vehicle. In some embodiments, the one or more predefined vehicle events may include, but not limited to, activation of accelerator pedal, activation of brake, and activation of gear shifter. Based on the detection, the remote access monitoring system may perform one or more actions for secure remote access, and trigger an alarm to the valid user via the user device.
The present disclosure provides a method and a system for secured remote access to a vehicle by ensuring that remote AC operation mode and engine are turned ON and OFF based on detection of the intrusion in the vehicle or detection of occurrence of one or more predefined vehicle events in the vehicle. Therefore, the present disclosure prevent situations such as an intruder driving away the vehicle by breaking the window of the vehicle and unlocking the vehicle, when the remote AC operating mode is activated. The present disclosure also prevents situations such as vehicle being operated by kids or any other user present in the vehicle when the remote AC operating mode is activated, which may lead to accidents. Therefore, the present disclosure provides a secure remote access to the vehicle while using the remote AC operating mode.
The present disclosure provides a feature wherein the vehicle is switched from a remote AC operating mode to a normal operating mode before expiry of a predefined time period from when the remote AC operating mode is enabled. Therefore, the present disclosure eliminates the wait time for the user which is involved in switching to the normal operating mode, which in turn provides a seamless access to the valid user.
A description of an embodiment with several components in communication with each other does not imply that all such components are required. On the contrary, a variety of optional components are described to illustrate the wide variety of possible embodiments of the disclosure.
In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings that form a part hereof, and in which are shown by way of illustration specific embodiments in which the disclosure may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.
FIG.1 illustrates an exemplary architecture for secured remote access to a vehicle, in accordance with an embodiment of the present disclosure.
The architecture 100 includes a vehicle 101, a valid user 103, a user device 105, and a remote access monitoring system 107. As an example, the vehicle 101 may include, but not limited to, a car, a truck, a lorry, a bus and the like.
In some embodiments, the user device 105 may be communicatively connected with the remote access monitoring system 107 associated with the vehicle 101 via a communication network (not shown in the FIG.1). In some embodiments, the communication network may be a wireless communication network. The user device 105 may be associated with a valid user 103 of the vehicle 101. As an example, the user device 105 may include, but not limited to, a mobile phone, a tablet phone, a laptop, and the like that are capable of communicating with the remote access monitoring system 107 via the communication network. In some embodiments, the valid user 103 of the vehicle 101 associated with the user device 105 may include, but not limited to, an owner of the vehicle 101 and driver of the vehicle 101. The valid user 103 of the vehicle 101 may possess a valid vehicle key. In the context of the present disclosure, valid vehicle key may be a key which is configured with the vehicle 101 to operate the vehicle 101, such as, turning ON engine of the vehicle 101, locking/unlocking the vehicle 101, opening door of boot space of the vehicle 101 and the like.
In some embodiments, the valid user 103 of the vehicle 101 may interact with the remote access monitoring system 107 using the user device 105, provided that the user device 105 is paired with the remote access monitoring system 107. In some embodiments, the remote access monitoring system 107 may be configured in the vehicle 101. In some other embodiments, the remote access monitoring system 107 may be communicatively connected to the vehicle 101. Further, the remote access monitoring system 107 may communicate with one or more Electronic Control Units (ECU) 1081 to ECU 108n (collectively referred as one or more ECUs 108) configured in the vehicle 101 via wired or wireless communication network, to implement the method disclosed in the present disclosure. As an example, the one or more ECUs 108 may include, but not limited to, telematics unit 1081, Fully Automatic Temperature Control System (FATC) ECU 1082, Body Control Module (BCM) 1083, Automatic/Automatic Manual Transmission (AT/ATMS) ECU 1084, Electronic Stability Program (ESP) ECU 1085, Instrumental Panel Cluster (IPC) ECU 1086, Passive Entry Passive Start (PEPS) ECU 1087, Electronic Steering Column Lock (ESCL) ECU 1088, and Engine Management System (EMS) ECU 108n. In some embodiments, the telematics unit 1081 may be configured in the vehicle 100 to communicate the commands received from the user device 105 to the one or more ECUs 108 in the vehicle 101, and to communicate function execution, interruptions and task completion status to the user device 105. The BCM 1083 may be configured to check door lock status and to trigger a wakeup signal to the PEPS ECU 1087 to turn ON ignition of the engine of the vehicle 101. The PEPS ECU 1087 may be configured to turn ON ignition of the engine of the vehicle 101 after receiving confirmation from the BCM 1083, to turn ON CRANK, upon receiving confirmation of predefined safety checks from the one or more ECUs 108. The PEPS ECU 1087 may also be configured to turn OFF the vehicle 101 after successful completion of feature extraction or any failures in between. ESP ECU 1085 may be configured to check the electrical park brake engagement and sends safety check status to the PEPS ECU 1087. Similarly, ESCL ECU 1088 may be configured to check steering lock status and sends safety check status to PEPS ECU 1087. The AT/ATMS ECU 1084 may be configured to check the neutral gear status and sends safety check status to the PEPS ECU 1087. The IPC ECU 1086 may check the vehicle speed zero status and the safety check status to PEPS ECU 1087. In some embodiments, the IPC ECU 1086 may also be configured to send outside ambient temperature information to the FATC ECU 1082. In some embodiments, the EMS ECU may be configured to check acceleration, brake and clutch pedals position in the vehicle 101 and and sends the safety check status to PEPS ECU 1087. The EMS ECU 108n is also configured to fire the engine after receiving the CRANK input from the PEPS ECU 1087, and to turn ON the AC operation upon receiving request from the FATC ECU 1082. The FATC ECU 1082 may be configured to turn ON blowers and sends a request to turn ON AC compressor, and also to control AC temperature inside the vehicle 101.
The remote access monitoring system 107 may include a processor 109, an Input/Output (I/O) interface 111 and a memory 113. In some embodiments, the remote access monitoring system 107 may have more use more than one processor or combination of one or more processors 109 (not shown in the FIG.1). The I/O interface 111 may be configured to receive one or more commands from the user device 105. In the context of the present disclosure, the I/O interface 111 may receive for instance, a command to enable remote Air Conditioner (AC) operation mode in the vehicle 101, from the user device 105. In some embodiments, enabling the remote AC operation mode may include turning ON engine of the vehicle 101 and thereafter AC operation in the vehicle 101 automatically, when the valid user 103 is at a remote location or in other words, away from the vehicle 101. In some embodiments, upon receiving the command, the processor 109 may initially perform one or more predefined safety checks in response to the command. As an example, the one or more predefined safety checks may include, but not limited to, door lock check, neutral gear check, park brake engaged check, vehicle speed zero check, no acceleration and brake pedal press check, steering wheel lock check, and battery voltage health check. When the one or more predefined safety checks are verified successfully and vehicle state is inferred to be safe, the processor 109 may enable the remote AC operation mode in the vehicle 101 i.e. the processor 109 may include turn ON engine of the vehicle 101 and thereafter AC operation in the vehicle 101.
In some embodiments, upon enabling the remote AC operation mode, the processor 109 may switch the vehicle 101 into a safety mode. Thereafter, the processor 109 may detect either an intrusion in the vehicle 101 or an occurrence of one or more predefined vehicle events in the vehicle 101. In some embodiments, the processor 109 may perform such detection using one or more sensors (not shown in the FIG.1) configured in the vehicle 101. As an example, the one or more sensors may include, but not limited to, door open switches, neutral gear sensor, accelerator sensor, brake switch, and radio frequency sensor. In some embodiments, intrusion in the vehicle 101 may be any sort of interference or interruption to the vehicle 101 such as breaking window glass, opening door lock without the valid vehicle key and the like. On the other hand, occurrence of the one or more predefined vehicle events may include, but not limited to, activation of accelerator pedal, activation of brake, and activation of gear shifter. In some embodiments, the processor 109 may perform one or more actions for secure remote access based on the detection of either the intrusion in the vehicle 101 or the one or more predefined vehicle events in the vehicle 101. As an example, when the intrusion in the vehicle 101 is detected, the processor 109 may turn OFF engine of the vehicle 101 and AC operation in the vehicle 101. As an example, when the one or more predefined vehicle events in the vehicle 101 are detected, the processor 109 may initially detect the presence of the valid vehicle key in the vehicle 101. If the valid vehicle key is not detected in the vehicle 101, the processor 109 may turn OFF engine of the vehicle 101 which in turn automatically turns OFF AC operation in the vehicle 101. If the valid vehicle key is detected in the vehicle 101, and such detection is prior an expiry of predefined time period, the processor 109 may disable the remote AC operation mode and switch to a normal operation mode. In the context of the present disclosure, expiry of the predefined time period is counted from the time the remote AC operation mode has been enabled in the vehicle 101. If the valid vehicle key is detected in the vehicle 101, such detection is after the expiry of predefined time period, the vehicle 101 would straight away operate in the normal operating mode. In some embodiments, the processor 109 may trigger an alarm upon detecting at least one of the intrusion in the vehicle 101 and the occurrence of the one or more predefined vehicle events in the vehicle 101 when valid vehicle key is not detected in the vehicle 101.
In some other embodiments, even without intrusion in the vehicle 101 or the occurrence of the one or more predefined vehicle events in the vehicle 101, when the predefined time period has elapsed since the enablement of the remote AC operation mode, the processor 109 may disable the remote AC operation mode in the vehicle 101. In some embodiments, the disabling of the remote AC operation mode includes turning OFF engine of the vehicle 101 and AC operation in the vehicle 101. In some other embodiments, even without intrusion in the vehicle 101 or the occurrence of the one or more predefined vehicle events in the vehicle 101, when the valid vehicle key is detected before the predefined time period has elapsed since the enablement of the remote AC operation mode, the processor 109 may disable the remote AC operation mode in the vehicle 101, and switch to the normal operation mode.
FIG.2 shows a detailed block diagram of the remote access monitoring system for secured remote access to a vehicle, in accordance with some embodiments of the present disclosure.
In some implementations, the remote access monitoring system 107 may include data 203 and modules 205. As an example, the data 203 is stored in the memory 113 configured in the remote access monitoring system 107 as shown in the FIG.2. In one embodiment, the data 203 may include predefined safety check data 207, predefined vehicle event data 209, action data 211 and other data 213. In the illustrated FIG.2, modules 205 are described herein in detail.
In some embodiments, the data 203 may be stored in the memory 113 in form of various data structures. Additionally, the data 203 can be organized using data models, such as relational or hierarchical data models. The other data 213 may store data, including temporary data and temporary files, generated by the modules 205 for performing the various functions of the remote access monitoring system 107.
In some embodiments, predefined safety check data 207 may include data related to one or more checks to be performed to ensure a safe state of the vehicle 101. As an example, the one or more predefined safety checks may include, but not limited to, door lock check, neutral gear check, park brake engaged check, vehicle speed zero check, no acceleration and brake pedal press check, steering wheel lock check, and battery voltage health check. As an example, door lock check may include checking whether all the doors of the vehicle 101 have been locked properly. As an example, neutral gear check may check whether the vehicle gear is kept in neutral mode. As an example, park brake engaged check may check whether the park brake has been applied to the vehicle 101. As an example, the vehicle speed zero check may check whether the speed of the vehicle 101 as indicated by the speedometer is zero or not, which means checking whether the vehicle 101 is in a parked state or not. As an example, brake pedal press check may check whether the brake pedal is in a pressed or a released state. If the brake pedal is pressed, it means there is someone inside the vehicle 101 operating the brake pedal. As an example, steering wheel lock check may check whether steering of the vehicle 101 is locked or not. As an example, battery voltage health check may check the health of the battery of the vehicle 101. In some embodiments, based on these one or more predefined safety checks, the processor 109 may determine whether the vehicle 101 is in a safe state or not.
In some embodiments, the predefined vehicle event data 209 may include data required for one or more sensors configured in the vehicle 101 to identify one or more predefined vehicle events. As an example, the one or more predefined vehicle events may include, but not limited to, activation of accelerator pedal, activation of brake, and activation of gear shifter. As an example, the predefined vehicle event data 209 may include position information of gear shifter that helps the one or more sensors to determine the activation of the gear shifter, position and pressure information that helps the one or more sensors to determine the activation of the accelerator pedal or brake pedal.
In some embodiments, the action data 211 may include the one or more actions to be performed in the vehicle 101 upon encountering various situations such as intrusion in the vehicle 101, occurrence of the one or more predefined vehicle events in the vehicle 101, expiry of predefined time period since enablement of remote AC operation mode in the vehicle 101, detection of valid vehicle key in the vehicle 101 before expiry of the predefined time period since the enablement of the remote Air Conditioner (AC) operation mode in the vehicle 101 and the like.
In some embodiments, the data 203 stored in the memory 113 may be processed by the modules 205 of the remote access monitoring system 107. The modules 205 may be stored within the memory 113. In an example, the modules 205 communicatively coupled to the processor 109 configured in the remote access monitoring system 107, may also be present outside the memory 113 as shown in FIG.2 and implemented as hardware. As used herein, the term modules refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
In some embodiments, the modules 205 may include, for example, a receiving module 221, a mode setting module 223, an intrusion and/or event detecting module 225, an action performing module 227, a triggering module 229 and other modules 231. The other modules 231 may be used to perform various miscellaneous functionalities of the remote access monitoring system 107. It will be appreciated that such aforementioned modules 205 may be represented as a single module or a combination of different modules.
In some embodiments, the mode setting module 223 may perform the one or more predefined safety checks of the vehicle 101, in response to the command received from the user device 105. The mode setting module 223 may use the predefined safety check data 207 to perform the one or more predefined safety checks of the vehicle 101 and ensure that the vehicle 101 is in a safe state. Upon performing the one or more safety checks and ensuring that the vehicle 101 is in a safe state, the mode setting module 223 may enable the remote AC operation mode in the vehicle 101. In some embodiments, enabling the remote AC operation mode may include turning ON engine of the vehicle 101 and thereafter AC operation in the vehicle 101 automatically, when the valid user 103 is away from the vehicle 101.
In some embodiments, the intrusion and/or event detecting module 225 may detect an intrusion in the vehicle 101 and occurrence of one or more predefined vehicle events in the vehicle 101. In some embodiments, intrusion in the vehicle 101 may be any sort of interference or interruption to the vehicle 101 such as breaking window glass, opening door lock without the valid vehicle key and the like. The occurrence of the one or more predefined vehicle events in the vehicle 101 may include, but not limited to, activation of accelerator pedal, activation of brake, and activation of gear shifter. In some embodiments, the intrusion and/or event detecting module 225 may detect an intrusion in the vehicle 101 and occurrence of one or more predefined vehicle events in the vehicle 101 using one or more sensors. As an example, the one or more sensors may include, but not limited to, door open switches, neutral gear sensor, accelerator sensor, brake switch, and radio frequency sensor. As an example, the door open switches may detect opening or closing of the vehicle doors without the valid vehicle key. As an example, the neutral gear sensor may detect a shift in the position of the gear shifter from the neutral position. As an example, the accelerator sensor may detect a pressure on the accelerator pedal and a shift in the position of the accelerator pedal towards acceleration. As an example, the brake switch may detect a pressure on the brake pedal and a shift in the position of the brake pedal from its initial position. As an example, the radio frequency sensor may detect the presence of the valid vehicle key in the vehicle 101.
In some embodiments, the action performing module 227 may perform one or more actions for secure remote access based on the detection of either the intrusion in the vehicle 101 or the one or more predefined vehicle events in the vehicle 101. In some embodiments, when the intrusion and/or event detecting module 225 detects intrusion in the vehicle 101, the action performing module 227 may turn OFF engine of the vehicle 101 and AC operation in the vehicle 101. In some embodiments, when the intrusion and/or event detecting module 225 detects the occurrence of the one or more predefined vehicle events in the vehicle 101, the action performing module 227 may detect the presence of the valid vehicle key in the vehicle 101. If the valid vehicle key is not detected in the vehicle 101, the action performing module 227 may turn OFF engine of the vehicle 101 which in turn automatically turns OFF AC operation in the vehicle 101. In this scenario, when the one or more predefined vehicle events are detected but the valid vehicle key is not detected in the vehicle 101, the action performing module 227 infers that the user attempting to operate the vehicle 101 is not a valid user 103. Therefore, by turning OFF the engine of the vehicle 101, the action performing module 227 prevents unauthorized user from accessing the vehicle 101. As an example, the unauthorized user may be attempting to steal the vehicle 101. In other scenarios, a child or any other user sitting in the vehicle 101 may attempt to operate the vehicle 101 for fun. Therefore, in such scenarios, turning OFF the engine by inferring that the user operating the vehicle 101 is not the valid user 103 ensures security of the vehicle 101.
In some embodiments, when the one or more predefined vehicle events are detected and the valid vehicle key is also detected in the vehicle 101, the action performing module 227 infers that the user attempting to operate the vehicle 101 is the valid user 103. If the valid vehicle key is detected in the vehicle 101, and such detection is prior to an expiry of predefined time period from the time the remote AC operation mode is enabled, the action performing module 227 may disable the remote AC operation mode and switch to a normal operation mode. In another embodiments, if the valid vehicle key is detected in the vehicle 101 after the expiry of the predefined time period from the time the remote AC operation mode is enabled, the action performing module 227 may turn ON the engine and operate the vehicle 101 in the normal operating mode. Therefore, irrespective of the detection of intrusion or the occurrence of the one or more predefined vehicle events, when the predefined time period elapses from the time the remote AC operation mode is enabled, the action performing module 227 automatically turns OFF the engine of the vehicle 101 and AC of the vehicle 101. Similarly, irrespective of the detection of intrusion or the occurrence of the one or more predefined vehicle events, when the valid user key is detected in the vehicle prior to the expiry of the predefined time period from the time the remote AC operation mode is enabled, the action performing module 227 automatically may disable the remote AC operation mode and switch to a normal operation mode. For the ease of understanding, given below in Table 1 are exemplary scenarios and the corresponding actions.
Sl. no. Exemplary scenario Exemplary action
1. Expiry of predefined time period since the time remote AC operating mode is enabled in the vehicle 101 Turn OFF engine and AC operation
2. Valid vehicle key detected in the vehicle 101 upon expiry of the predefined time period since the time remote AC operating mode is enabled in the vehicle 101 Turn ON the engine and operate in the normal operating mode
3. Valid vehicle key detected in the vehicle 101 before expiry of the predefined time period since the time remote AC operating mode is enabled in the vehicle 101 Disable remote AC operating mode and switch to normal operating mode
4. Intrusion detected Turn OFF engine and AC operation
5. One or more predefined vehicle events detected and valid vehicle key detected in the vehicle 101, before expiry of the predefined time period since the time remote AC operating mode is enabled in the vehicle 101 Disable remote AC operating mode and switch to normal operating mode
6. One or more predefined vehicle events detected and valid vehicle key detected in the vehicle 101, after expiry of the predefined time period since the time remote AC operating mode is enabled in the vehicle 101 Turn ON the engine and operate in the normal operating mode
7. One or more predefined vehicle events detected and valid vehicle key not detected in the vehicle 101 Turn OFF engine and AC operation
Table 1
In some embodiments, the triggering module 229 may trigger an alarm upon detecting at least one of the intrusion in the vehicle 101 and the occurrence of the one or more predefined vehicle events in the vehicle 101, when valid vehicle key is not detected in the vehicle 101. In some embodiments, the alarm may be a visual alarm, an audible alarm, a haptic alarm or an alarm in the form of notification sent to the user device 105 of the valid user 103. The alarm may intimate the valid user 103 that an unauthorized access is being attempted on the vehicle 101.
Henceforth, the exemplary embodiments for implementing the method for secured remote access to the vehicle 101 have been disclosed. However, this should not be construed as a limitation of the present disclosure.
As an example, consider a scenario where the valid user 103 has parked the vehicle 101 at a parking space and has left to visit a super market. The valid user 103 may want the vehicle 101 to be at a pleasant temperature when he enters the vehicle 101. Therefore, the valid user 103 may send a command to enable the remote AC operating mode via the user device 105 to the remote access monitoring system 107. In some embodiments, the valid user 103 may also set a temperature of the AC via the user device 105. Upon receiving the command, the remote access monitoring system 107 may perform the one or more predefined safety checks and enable the remote AC operating mode.
In an exemplary scenario 1, consider the predefined time period, for instance 10 minutes, elapses from the time the remote AC operation mode was enabled. The remote access monitoring system 107 turns OFF the engine and the AC operation.
In an exemplary scenario 2, consider the valid user 103 returned from the supermarket and unlocked and entered the vehicle 101 before the expiry of the predefined time period, for instance 10 minutes. The remote access monitoring system 107 disables the remote AC operating mode and switches to the normal operating mode.
In an exemplary scenario 3, consider the valid user 103 returned from the supermarket and unlocked and entered the vehicle 101 after the expiry of the predefined time period, for instance 10 minutes. The remote access monitoring system 107 is turned OFF and the vehicle operates in the normal operating mode.
In an exemplary scenario 4, consider that while the valid user 103 is away from the vehicle 101, a thief attempts to unlock the vehicle 101 by breaking the window glass of the vehicle 101. The remote access monitoring system 107 detects the intrusion in the vehicle 101 and thereby immediately turns OFF the engine and the AC operation.
In an exemplary scenario 5, consider that while the valid user 103 is away from the vehicle 101, a kid sitting inside the vehicle 101 and waiting for the valid user 103 attempts to playfully operate the accelerator pedal of the vehicle 101. The remote access monitoring system 107 detects the occurrence of the predefined vehicle event i.e. the activation of the brake pedal. Thereafter, as a next level check, the remote access monitoring system 107 checks for the presence of the valid vehicle key in the vehicle 101, but fails to detect the presence of the valid vehicle key in the vehicle 101. Then the remote access monitoring system 107 infers that an unauthorized user is attempting to operate the accelerator pedal and thereby turns OFF the engine and the AC operation.
In an exemplary scenario 6, consider that the valid user 103 returned from the supermarket and shifts the gear shifter from the neutral position to a drive mode. The remote access monitoring system 107 detects the occurrence of the predefined vehicle event i.e. the activation of the gear shifter. Thereafter, as a next level check, the remote access monitoring system 107 checks for the presence of the valid vehicle key in the vehicle 101, and detects the presence of the valid vehicle key in the vehicle 101. Then the remote access monitoring system 107 infers that an valid user 103 is attempting to operate the gear shifter. If the predefined time period has elapsed when this inference is made, the remote access monitoring system 107 and thereby turns ON the engine and operates in the normal operating mode. If the predefined time period has not elapsed when this inference is made, the remote access monitoring system 107 and thereby disables the remote AC operating mode and switches to the normal operating mode.
FIG.3 shows a flowchart illustrating a method for secured remote access to a vehicle in accordance with some embodiments of the present disclosure.
As illustrated in FIG.3, the method 300 includes one or more blocks illustrating a method of for secured remote access to a vehicle 101. The method 300 may be described in the general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, and functions, which perform functions or implement abstract data types.
The order in which the method 300 is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method 300. Additionally, individual blocks may be deleted from the methods without departing from the spirit and scope of the subject matter described herein. Furthermore, the method 300 can be implemented in any suitable hardware, software, firmware, or combination thereof.
At block 301, the method 300 may include receiving, by a processor 109 of a remote access monitoring system 107, a command to enable remote Air Conditioner (AC) operation mode in the vehicle, from a user device 105 associated with the vehicle 101. In some embodiments, the user device 105 may belong to the valid user 103 of the vehicle 101.
At block 303, the method 300 may include enabling, by the processor 109, the remote AC operation mode in the vehicle 101 upon performing one or more predefined safety checks, in response to the command.
At block 305, the method 300 may include detecting, by the processor 109, at least one of intrusion in the vehicle 101 and occurrence of one or more predefined vehicle events in the vehicle 101 using one or more sensors configured in the vehicle 101.
At block 307, the method 300 may include performing, by the processor 109, one or more actions for secure remote access based on the detection of the at least one of intrusion in the vehicle 101 and the one or more predefined vehicle events in the vehicle 101. In some embodiments, the processor 109 may trigger an alarm upon detecting the at least one of intrusion in the vehicle 101 and the one or more predefined vehicle events in the vehicle 101 when the valid vehicle key is not detected in the vehicle 101.
FIG.4 is a block diagram of an exemplary computer system for implementing embodiments consistent with the present disclosure.
In some embodiments, FIG.4 illustrates a block diagram of an exemplary computer system 400 for implementing embodiments consistent with the present invention. In some embodiments, the computer system 400 can be a remote access monitoring system 107 that is used for secured remote access to a vehicle 101. The computer system 400 may include a central processing unit (“CPU” or “processor”) 402. The processor 402 may include at least one data processor for executing program components for executing user or system-generated business processes. A user may include a person, a person using a device such as such as those included in this invention, or such a device itself. The processor 402 may include specialized processing units such as integrated system (bus) controllers, memory management control units, floating point units, graphics processing units, digital signal processing units, etc.
The processor 402 may be disposed in communication with input devices 411 and output devices 412 via I/O interface 401. The I/O interface 401 may employ communication protocols/methods such as, without limitation, audio, analog, digital, stereo, IEEE-1394, serial bus, Universal Serial Bus (USB), infrared, PS/2, BNC, coaxial, component, composite, Digital Visual Interface (DVI), high-definition multimedia interface (HDMI), Radio Frequency (RF) antennas, S-Video, Video Graphics Array (VGA), IEEE 802.n /b/g/n/x, Bluetooth, cellular (e.g., Code-Division Multiple Access (CDMA), High-Speed Packet Access (HSPA+), Global System For Mobile Communications (GSM), Long-Term Evolution (LTE), WiMax, or the like), etc.
Using the I/O interface 401, computer system 400 may communicate with input devices 411 and output devices 412.
In some embodiments, the processor 402 may be disposed in communication with a communication network 409 via a network interface 403. The network interface 403 may communicate with the communication network 409. The network interface 403 may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), Transmission Control Protocol/Internet Protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc. Using the network interface 403 and the communication network 409, the computer system 400 may communicate with a user device 105 of a valid user 103 of the vehicle 101 and one or more Electronic Control Units (ECUs) 108 (1081 up to 108n). The communication network 409 can be implemented as one of the different types of networks, such as intranet or Local Area Network (LAN), Closed Area Network (CAN) and such within the vehicle. The communication network 409 may either be a dedicated network or a shared network, which represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), CAN Protocol, Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), etc., to communicate with each other. Further, the communication network 409 may include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, etc. As an example, the one or more ECUs 108 may include, but not limited to, telematics unit 1081, Fully Automatic Temperature Control System (FATC) ECU 1082, Body Control Module (BCM) 1083, Automatic/Automatic Manual Transmission (AT/ATMS) ECU 1084, Electronic Stability Program (ESP) ECU 1085, Instrumental Panel Cluster (IPC) ECU 1086, Passive Entry Passive Start (PEPS) ECU 1087, Electronic Steering Column Lock (ESCL) ECU 1088, and Engine Management System (EMS) ECU 108n. In some embodiments, the processor 402 may be disposed in communication with a memory 405 (e.g., RAM, ROM, etc. not shown in FIG.4) via a storage interface 404. The storage interface 404 may connect to memory 405 including, without limitation, memory drives, removable disc drives, etc., employing connection protocols such as Serial Advanced Technology Attachment (SATA), Integrated Drive Electronics (IDE), IEEE-1394, Universal Serial Bus (USB), fibre channel, Small Computer Systems Interface (SCSI), etc. The memory drives may further include a drum, magnetic disc drive, magneto-optical drive, optical drive, Redundant Array of Independent Discs (RAID), solid-state memory devices, solid-state drives, etc.
The memory 405 may store a collection of program or database components, including, without limitation, a user interface 406, an operating system 407, a web browser 408 etc. In some embodiments, the computer system 400 may store user/application data, such as the data, variables, records, etc. as described in this invention. Such databases may be implemented as fault-tolerant, relational, scalable, secure databases such as Oracle or Sybase.
The operating system 407 may facilitate resource management and operation of the computer system 400. Examples of operating systems include, without limitation, APPLE® MACINTOSH® OS X®, UNIX®, UNIX-like system distributions (E.G., BERKELEY SOFTWARE DISTRIBUTION® (BSD), FREEBSD®, NETBSD®, OPENBSD, etc.), LINUX® DISTRIBUTIONS (E.G., RED HAT®, UBUNTU®, KUBUNTU®, etc.), IBM®OS/2®, MICROSOFT® WINDOWS® (XP®, VISTA®/7/8, 10 etc.), APPLE® IOS®, GOOGLETM ANDROIDTM, BLACKBERRY® OS, or the like. The User interface 406 may facilitate display, execution, interaction, manipulation, or operation of program components through textual or graphical facilities. For example, user interfaces may provide computer interaction interface elements on a display system operatively connected to the computer system 400, such as cursors, icons, check boxes, menus, scrollers, windows, widgets, etc. Graphical User Interfaces (GUIs) may be employed, including, without limitation, Apple® Macintosh® operating systems’ Aqua®, IBM® OS/2®, Microsoft® Windows® (e.g., Aero, Metro, etc.), web interface libraries (e.g., ActiveX®, Java®, Javascript®, AJAX, HTML, Adobe® Flash®, etc.), or the like.
In some embodiments, the computer system 400 may implement the web browser 408 stored program components. The web browser 408 may be a hypertext viewing application, such as MICROSOFT® INTERNET EXPLORER®, GOOGLETM CHROMETM, MOZILLA® FIREFOX®, APPLE® SAFARI®, etc. Secure web browsing may be provided using Secure Hypertext Transport Protocol (HTTPS), Secure Sockets Layer (SSL), Transport Layer Security (TLS), etc. Web browsers 408 may utilize facilities such as AJAX, DHTML, ADOBE® FLASH®, JAVASCRIPT®, JAVA®, Application Programming Interfaces (APIs), etc. In some embodiments, the computer system 400 may implement a mail server stored program component. The mail server may be an Internet mail server such as Microsoft Exchange, or the like. The mail server may utilize facilities such as Active Server Pages (ASP), ACTIVEX®, ANSI® C++/C#, MICROSOFT®, .NET, CGI SCRIPTS, JAVA®, JAVASCRIPT®, PERL®, PHP, PYTHON®, WEBOBJECTS®, etc. The mail server may utilize communication protocols such as Internet Message Access Protocol (IMAP), Messaging Application Programming Interface (MAPI), MICROSOFT® exchange, Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), or the like. In some embodiments, the computer system 400 may implement a mail client stored program component. The mail client may be a mail viewing application, such as APPLE® MAIL, MICROSOFT® ENTOURAGE®, MICROSOFT® OUTLOOK®, MOZILLA® THUNDERBIRD®, etc.
Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present invention. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., non-transitory. Examples include Random Access Memory (RAM), Read-Only Memory (ROM), volatile memory, non-volatile memory, hard drives, Compact Disc (CD) ROMs, Digital Video Disc (DVDs), flash drives, disks, and any other known physical storage media.
Advantages of the embodiment of the present disclosure are illustrated herein.
The present disclosure provides a method and a system for secured remote access to a vehicle by ensuring that remote AC operation mode and engine are turned ON and OFF based on detection of the intrusion in the vehicle or detection of occurrence of one or more predefined vehicle events in the vehicle. Therefore, the present disclosure prevent situations such as an intruder driving away the vehicle by breaking the window of the vehicle and unlocking the vehicle, when the remote AC operating mode is activated. The present disclosure also prevents situations such as vehicle being operated by kids or any other user present in the vehicle when the remote AC operating mode is activated, which may lead to accidents. Therefore, the present disclosure provides a secure remote access to the vehicle while using the remote AC operating mode.
The present disclosure provides a feature wherein the vehicle is switched from a remote AC operating mode to a normal operating mode before expiry of a predefined time period from when the remote AC operating mode is enabled. Therefore, the present disclosure eliminates the wait time for the user which is involved in switching to the normal operating mode, which in turn provides a seamless access to the valid user.
Referral Numerals:
Reference Number Description
100 Architecture
101 Vehicle
103 Valid user
105 User device
107 Remote access monitoring system
108 One or more Electronic Control Units (ECUs)
109 Processor
111 I/O interface
113 Memory
203 Data
205 Modules
207 Predefined safety check data
209 Predefined vehicle event data
211 Action data
213 Other data
221 Receiving module
223 Mode setting module
225 Intrusion and/or event detecting module
227 Action performing module
229 Triggering module
231 Other modules
400 Exemplary computer system
401 I/O Interface of the exemplary computer system
402 Processor of the exemplary computer system
403 Network interface
404 Storage interface
405 Memory of the exemplary computer system
406 User interface
407 Operating system
408 Web browser
409 Communication network
410 Plurality of image capturing devices of the exemplary computer system
411 Input devices
412 Output devices
| # | Name | Date |
|---|---|---|
| 1 | 202121049729-STATEMENT OF UNDERTAKING (FORM 3) [29-10-2021(online)].pdf | 2021-10-29 |
| 2 | 202121049729-REQUEST FOR EXAMINATION (FORM-18) [29-10-2021(online)].pdf | 2021-10-29 |
| 3 | 202121049729-POWER OF AUTHORITY [29-10-2021(online)].pdf | 2021-10-29 |
| 4 | 202121049729-FORM-8 [29-10-2021(online)].pdf | 2021-10-29 |
| 5 | 202121049729-FORM 18 [29-10-2021(online)].pdf | 2021-10-29 |
| 6 | 202121049729-FORM 1 [29-10-2021(online)].pdf | 2021-10-29 |
| 7 | 202121049729-DRAWINGS [29-10-2021(online)].pdf | 2021-10-29 |
| 8 | 202121049729-DECLARATION OF INVENTORSHIP (FORM 5) [29-10-2021(online)].pdf | 2021-10-29 |
| 9 | 202121049729-COMPLETE SPECIFICATION [29-10-2021(online)].pdf | 2021-10-29 |
| 10 | Abstract1.jpg | 2021-12-14 |
| 11 | 202121049729-Proof of Right [28-02-2022(online)].pdf | 2022-02-28 |
| 12 | 202121049729-FER.pdf | 2024-04-01 |
| 13 | 202121049729-OTHERS [25-09-2024(online)].pdf | 2024-09-25 |
| 14 | 202121049729-FER_SER_REPLY [25-09-2024(online)].pdf | 2024-09-25 |
| 15 | 202121049729-CLAIMS [25-09-2024(online)].pdf | 2024-09-25 |
| 16 | 202121049729-PA [22-01-2025(online)].pdf | 2025-01-22 |
| 17 | 202121049729-ASSIGNMENT DOCUMENTS [22-01-2025(online)].pdf | 2025-01-22 |
| 18 | 202121049729-8(i)-Substitution-Change Of Applicant - Form 6 [22-01-2025(online)].pdf | 2025-01-22 |
| 1 | 202121049729E_31-03-2024.pdf |