Abstract: Disclosed is a vehicle anti-theft and immobilization system for preventing unauthorized operation of a vehicle, comprising: an entry detection mechanism configured to detect an unauthorized entry into the vehicle and to generate an entry signal indicative of said unauthorized entry; a processor interface circuit operatively connected to said entry detection mechanism, wherein said processor interface circuit is configured to receive said entry signal and initiate a security response sequence; a communication interface integrated with said processor interface circuit, configured to generate and send a security alert message to a pre-registered mobile device of the vehicle owner upon activation of said security response sequence; a global positioning system module, activated by said processor interface circuit in response to said entry signal, for determining and tracking the geographic location of the vehicle; a remote command reception module configured to receive a predetermined command from said pre-registered mobile device in response to said security alert message; an engine control unit interfaced with said remote command reception module, wherein said engine control unit is configured to disable the vehicle's ignition system upon receipt of a stop command from said remote command reception module, thereby rendering the vehicle inoperative. Fig. 1 Drawings / FIG. 1 / FIG. 2 / FIG. 3 / FIG. 4 / FIG. 5 / FIG. 6
Description:Field of the Invention
The present disclosure generally relates to vehicle security systems. Particularly, the present disclosure relates to a vehicle anti-theft and immobilization system for preventing unauthorized operation of a vehicle.
Background
The background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
Vehicle security systems play a crucial role in mitigating the risks of theft and unauthorized use. Over the years, these systems have evolved from basic mechanical locks to sophisticated electronic devices that integrate a variety of technologies to ensure the safety of vehicles. As vehicles become more interconnected and technologically advanced, the mechanisms for protecting these assets must also advance.
In the realm of vehicle security, traditional systems often utilize alarm systems that emit loud sounds when a breach is detected. These systems rely on deterring theft through audible alerts, which are intended to attract attention and scare off potential thieves. However, these systems have been found to be less effective in environments where such noise does not draw immediate attention or in situations where thieves have developed methods to quickly neutralize the audible alarms.
Another well-established technique involves the use of immobilization systems that prevent the engine from starting unless a recognized key is used. These systems are designed to ensure that, even if unauthorized access to the vehicle is gained, the engine cannot be started without the correct key. The limitation of such systems is their vulnerability to sophisticated hacking techniques where the immobilizer's code can be bypassed or the key's signal can be cloned.
Moreover, with the advancement of global positioning systems (GPS), vehicle tracking has become a prominent feature in modern security systems. GPS modules allow for real-time tracking of the vehicle's location, offering vehicle recovery options post-theft. Despite the advantages, GPS-based systems can suffer from signal interference and may fail to deliver precise location data if the vehicle is concealed or if the GPS module is disabled.
Further, the integration of communication interfaces in vehicle security systems has allowed for immediate alerts to be sent to vehicle owners via mobile devices. This advancement facilitates quicker response times to theft incidents. However, the effectiveness of these systems depends on the uninterrupted availability of network services, which can be compromised in remote or low-coverage areas.
In light of the above discussion, there exists an urgent need for solutions that overcome the problems associated with conventional systems and techniques for improving the security and immobilization of vehicles.
Summary
The following presents a simplified summary of various aspects of this disclosure in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements nor delineate the scope of such aspects. Its purpose is to present some concepts of this disclosure in a simplified form as a prelude to the more detailed description that is presented later.
The following paragraphs provide additional support for the claims of the subject application.
In a first aspect, the present disclosure aims to provide a vehicle anti-theft and immobilization system designed for preventing unauthorized operation of a vehicle. The system comprises an entry detection mechanism that detects unauthorized entry and generates a signal indicative of such entry. A processor interface circuit, operatively connected to the entry detection mechanism, receives the entry signal and initiates a security response sequence. Integrated with the processor interface circuit, a communication interface sends a security alert message to the vehicle owner's pre-registered mobile device upon activation of the security sequence. Additionally, a global positioning system module, activated in response to the entry signal, determines and tracks the geographic location of the vehicle. A remote command reception module receives a predetermined command from the mobile device in response to the security alert, and an engine control unit interfaced with this module disables the vehicle's ignition system upon receipt of a stop command, rendering the vehicle inoperative.
In an embodiment, the entry detection mechanism includes a pressure transducer that generates the entry signal in response to pressure changes indicative of unauthorized entry. This transducer is further configured to send the entry signal to the processor interface circuit for the initiation of the security response sequence upon detection of pressure changes caused by an individual’s presence within the vehicle.
In an embodiment, the system further includes a GPS activation module operatively connected to the processor interface circuit. The GPS activation module is configured to activate the GPS module upon initiation of the security response sequence, enhancing the tracking capabilities of the system.
In an embodiment, the communication interface comprises a GSM module that sends the security alert message via SMS. This interface includes a delay mechanism connected to the software, introducing a delay before sending the security alert to allow for network checks and signal strength verification. Additionally, the delay mechanism includes retry logic that enables the communication interface to attempt to resend the security alert message if the initial SMS transmission fails.
In an embodiment, the remote command reception module is configured to receive a stop command in the form of a predefined text message from the pre-registered mobile device. This allows for rapid and secure communication between the vehicle owner and the system.
In an embodiment, the system further comprises an inductor switch positioned near the vehicle ignition. The inductor switch, configured to detect the insertion of a key or a key-like instrument, sends a signal indicative of a change in the magnetic field to the processor interface circuit, which distinguishes between authorized and unauthorized use based on predefined criteria. Following detection, the processor interface circuit activates both the GPS module and the communication interface.
In an embodiment, the software processes signals from both the entry detection mechanism and the inductor switch to determine whether to initiate the security response sequence. The software is further configured to update the vehicle owner via SMS regarding the status of the vehicle security upon detection of unauthorized entry.
In an embodiment, the engine control unit is further configured to disable additional vehicle systems in response to the stop command. These additional systems include at least one of the fuel system, electrical system, or transmission system, thereby enhancing the immobilization of the vehicle.
In an embodiment, the communication interface provides the vehicle owner with continuous updates regarding the location of the vehicle until the vehicle is rendered operative or the owner cancels the security alert. This feature ensures continuous monitoring and security of the vehicle.
Brief Description of the Drawings
The features and advantages of the present disclosure would be more clearly understood from the following description taken in conjunction with the accompanying drawings in which:
FIG. 1 illustrates a vehicle anti-theft and immobilization system, in accordance with the embodiments of the present disclosure.
FIG. 2 illustrates a flow diagram describing the operational process of a vehicle security system, in accordance with the embodiments of the present disclosure.
FIG. 3 illustrates a pressure transducer in the seat to detect presence of a person, in accordance with the embodiments of the present disclosure.
FIG. 4 illustrates a visualization diagram describing the operational process of a vehicle security system, in accordance with the embodiments of the present disclosure.
FIG. 5 illustrates an inductor switch for ignition key detection, in accordance with the embodiments of the present disclosure.
FIG. 6 illustrates a sequence diagram to tackle network issues, in accordance with the embodiments of the present disclosure.
Detailed Description
In the following detailed description of the invention, reference is made to the accompanying drawings that form a part hereof, and in which is shown, by way of illustration, specific embodiments in which the invention may be practiced. In the drawings, like numerals describe substantially similar components throughout the several views. These embodiments are described in sufficient detail to claim those skilled in the art to practice the invention. Other embodiments may be utilized and structural, logical, and electrical changes may be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims and equivalents thereof.
The use of the terms “a” and “an” and “the” and “at least one” and similar referents in the context of describing the invention (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The use of the term “at least one” followed by a list of one or more items (for example, “at least one of A and B”) is to be construed to mean one item selected from the listed items (A or B) or any combination of two or more of the listed items (A and B), unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
Pursuant to the "Detailed Description" section herein, whenever an element is explicitly associated with a specific numeral for the first time, such association shall be deemed consistent and applicable throughout the entirety of the "Detailed Description" section, unless otherwise expressly stated or contradicted by the context.
FIG. 1 illustrates a vehicle anti-theft and immobilization system (100), in accordance with the embodiments of the present disclosure. The vehicle anti-theft and immobilization system (100) is engineered to prevent unauthorized operation of a vehicle by incorporating several critical components. Each component within the system serves a distinct purpose, ensuring comprehensive security coverage from initial detection of an intrusion to potential recovery actions post-theft. The entry detection mechanism (102) plays a foundational role in this system. It is specifically designed to detect any unauthorized access to the vehicle. Upon detecting such unauthorized entry, it promptly generates an entry signal. This signal is crucial as it acts as the primary alert that triggers the subsequent security measures. The ability of the entry detection mechanism (102) to accurately and quickly identify unauthorized access is fundamental to the efficacy of the entire anti-theft system. This ensures that the vehicle owner and the security system are alerted at the earliest possible moment, which is vital for immediate action against potential theft or unauthorized use.
The processor interface circuit (PIC) (104) is integrally connected to the entry detection mechanism (102) and forms the nerve center of the vehicle anti-theft system. Upon receiving the entry signal from the entry detection mechanism (102), the PIC (104) is responsible for processing this information and initiating a predefined security response sequence. This sequence is critical as it dictates the specific actions to be undertaken to secure the vehicle immediately after an unauthorized entry is detected. The PIC (104) is programmed to handle various security tasks, such as activating other system components including the communication interface and the GPS module. The configuration of the PIC (104) allows for flexible, quick response options, tailored to different scenarios of unauthorized entries. This adaptability is crucial in providing an effective deterrent against theft, ensuring that the vehicle's security systems are responsive and resilient in the face of potential threats.
Incorporated within the system is the communication interface (106), which is directly integrated with the PIC (104). This interface is designed to generate and transmit a security alert message to a pre-registered mobile device belonging to the vehicle owner, which is activated upon the initiation of the security response sequence by the PIC (104). The capability to send alerts directly to the vehicle owner’s mobile device is crucial for immediate notification, allowing the owner to be aware of the security breach instantaneously. This immediate communication is essential for enabling timely decisions by the owner on how to respond, which could include contacting law enforcement or remotely activating further security measures. Moreover, the configuration of the communication interface (106) ensures that it can operate across various network technologies, thereby maintaining effectiveness regardless of the geographic location of the vehicle or the owner. This global operability enhances the reliability of the system, ensuring that vehicle owners can remain informed and in control, even when they are far from the vehicle.
The global positioning system (GPS) module (108) forms a critical component of the vehicle anti-theft and immobilization system (100), with its primary function activated by the PIC (104) upon detection of an unauthorized entry. The GPS module (108) is essential for tracking the geographic location of the vehicle continuously, providing real-time updates that are crucial for recovering the vehicle if stolen. The ability of the GPS module (108) to provide accurate and timely location data significantly enhances the chances of law enforcement recovering the vehicle before it can be hidden or harmed. The integration of this module into the system’s response sequence allows for seamless activation and tracking, ensuring that the vehicle’s movements are monitored following an unauthorized entry. This continuous tracking is not only vital for recovery purposes but also acts as a significant deterrent to potential thieves, who are aware of the increasing likelihood of quick detection and recovery due to such advanced tracking technologies.
The system incorporates a remote command reception module (110), which is specifically configured to receive commands from a pre-registered mobile device following the issuance of a security alert message. This module allows the vehicle owner to engage directly with the vehicle’s security system in real-time, providing commands that can alter the state of the vehicle’s operational capabilities. One of the primary commands that can be issued is the 'stop' command, which is designed to immobilize the vehicle immediately. This ability to remotely command the vehicle enhances the control owners have over their vehicle’s security, providing a proactive tool in preventing the theft from progressing. The configuration of the remote command reception module (110) ensures that it can receive and process commands securely and effectively, minimizing the risk of unauthorized interception or erroneous commands that could compromise vehicle safety.
Finally, the engine control unit (ECU) (112), interfaced with the remote command reception module (110), plays a decisive role in the immobilization of the vehicle. Upon receipt of the stop command from the remote command reception module (110), the ECU (112) disables the vehicle's ignition system. This action effectively renders the vehicle inoperative, preventing the vehicle from being driven away, thereby securing it against further unauthorized use. The configuration of the ECU (112) to respond specifically to remote commands ensures that the vehicle can be quickly and effectively immobilized, significantly enhancing the vehicle's security posture. This capability is particularly important in scenarios where the thief has already gained access to the vehicle and could potentially escape with it. By immobilizing the vehicle, the ECU (112) not only prevents the physical theft of the vehicle but also aids in the potential recovery of the vehicle by law enforcement.
In an embodiment, the entry detection mechanism (102) comprises a pressure transducer. Said pressure transducer is configured to generate the entry signal in response to a change in pressure indicative of unauthorized entry into the vehicle. The mechanism operates by sensing changes in the internal atmosphere of the vehicle, typically triggered by the opening of a door or a window, which alters the air pressure inside the vehicle. Such changes are immediately detected by the pressure transducer, which converts these physical changes into electrical signals that form the entry signal. The sensitivity and accuracy of the pressure transducer are calibrated to ensure that only significant pressure variations, consistent with unauthorized entries, trigger the alarm system. This specificity is crucial in minimizing false alarms and ensuring that the vehicle security system reacts appropriately to genuine threats.
In an embodiment, the pressure transducer is further configured to send the entry signal to the processor interface circuit (PIC) (104) for initiation of the security response sequence when pressure indicative of an individual's presence within the vehicle is detected. Upon detection of such pressure changes, the signal is immediately communicated to the PIC (104), which serves as the central processing unit for the security system. This prompt communication enables the PIC (104) to activate the necessary security protocols, which may include locking down the vehicle, activating internal and external alarms, and notifying the vehicle owner via the communication interface. The integration between the pressure transducer and the PIC (104) is designed to provide rapid response to potential security breaches, thereby enhancing the protective measures afforded by the system.
In an embodiment, the system further comprises a GPS activation module. Said GPS activation module is operatively connected to the processor interface circuit (PIC) (104) and is configured to activate the global positioning system (GPS) module (108) upon initiation of the security response sequence. This activation is crucial for tracking the geographic location of the vehicle immediately following an unauthorized entry. The GPS activation module ensures that the location tracking is initiated without delay, providing real-time location data to the vehicle owner and, if necessary, law enforcement agencies. This capability is fundamental in the rapid recovery of the vehicle and aids significantly in deterring theft by increasing the likelihood of interception and recovery by authorities.
In an embodiment, the communication interface (106) comprises a GSM module configured to send the security alert message via SMS to the pre-registered mobile device. The GSM module utilizes standard mobile telecommunication networks to ensure broad coverage and reliable transmission of alert messages. Configured to send an SMS, the module provides a direct and immediate form of communication with the vehicle owner, informing them of potential security incidents as they occur. The choice of SMS as the communication medium is based on its widespread accessibility and reliability, ensuring that the owner receives the alert even when internet services are unavailable.
In an embodiment, the communication interface (106) is further configured with a delay mechanism operatively connected to the software, which introduces a delay function before sending the security alert message. This delay allows for a network check and signal strength verification, ensuring that the communication is sent out over the most stable network connection available. The delay mechanism includes software algorithms that assess the network conditions and automatically select the optimal time for sending the SMS. This capability enhances the reliability of message delivery, which is critical in ensuring that the vehicle owner receives timely and accurate alerts regarding the security status of their vehicle.
In an embodiment, the delay mechanism includes retry logic, enabling the communication interface (106) to attempt to resend the security alert message if the initial SMS transmission fails. This retry logic is designed to operate automatically, initiating subsequent attempts at predefined intervals if the first message does not successfully reach the intended recipient. This feature is essential for maintaining communication reliability, particularly in areas of poor network coverage or when mobile network traffic is high. By incorporating such retry logic, the system ensures that critical alerts are not missed due to temporary communication issues, thereby maintaining the integrity of the vehicle's security system.
In an embodiment, the remote command reception module (110) is configured to receive a stop command in the form of a pre-defined text message response from the pre-registered mobile device. Upon receiving such a command, the module processes the command and interacts with other components of the system to execute the stop command, which typically involves disabling the vehicle's ignition and possibly other critical systems to immobilize the vehicle. The configuration of the remote command reception module to receive and process text message commands allows for straightforward and user-friendly interaction between the vehicle owner and the vehicle's security system, enhancing the control owners have over their vehicle's security in real-time.
In an embodiment, the system further comprises an inductor switch positioned near the vehicle ignition, configured to detect the insertion of a key or a key-like instrument. This inductor switch is critical for distinguishing between authorized and unauthorized access attempts based on the presence of a key-like object in the ignition switch. The switch uses changes in the magnetic field to detect the insertion and presence of a key, sending a corresponding signal to the processor interface circuit (PIC) (104) to inform it of potentially authorized access. However, further validation is required to confirm whether the access is authorized, relying on additional security checks integrated within the system.
In an embodiment, the inductor switch is configured to send a signal indicative of a change in magnetic field to the processor interface circuit (PIC) (104), which is configured to distinguish between authorized and unauthorized use based on a predefined criterion. Upon receipt of the signal from the inductor switch, the PIC (104) analyses the data against predefined criteria that determine whether the use is authorized. This determination may involve checking if the correct key is used or if additional security credentials are met, such as a code or a biometric verification, depending on the sophistication of the security system implemented in the vehicle.
In an embodiment, the processor interface circuit (PIC) (104) is further configured to activate the global positioning system (GPS) module (108) and the communication interface (106) upon detection of a change in magnetic field by the inductor switch. This configuration ensures that the vehicle's location can be tracked and the owner alerted immediately upon potential unauthorized access attempts, even if they occur through seemingly normal interactions with the vehicle’s ignition system. Such proactive security measures are critical in mitigating the risks associated with vehicle theft and unauthorized use, ensuring that the owner and relevant authorities are equipped with the necessary information to respond effectively.
In an embodiment, the software is configured to process signals from the entry detection mechanism (102) and from the inductor switch to determine whether to initiate the security response sequence. This processing involves analyzing the signals to assess the nature of the detected events and deciding whether they warrant triggering the vehicle’s comprehensive security measures. This decision-making process is crucial as it determines the appropriateness of the response, ensuring that the system’s actions are justified and effective in real-time scenarios where security is compromised.
In an embodiment, the software is further configured to update the vehicle owner via SMS with information regarding the status of the vehicle security upon detection of the unauthorized entry. This configuration allows the system to provide continuous communication with the vehicle owner, ensuring they are kept informed of all relevant security events concerning their vehicle. Such updates enhance the owner’s ability to monitor their vehicle’s security remotely and make informed decisions regarding necessary actions to protect their property.
In an embodiment, the engine control unit (ECU) (112) is further configured to disable additional vehicle systems in response to the stop command, with the additional vehicle systems including at least one of the fuel system, electrical system, or transmission system. This comprehensive immobilization strategy is designed to enhance the effectiveness of the stop command by extending the disablement beyond the ignition system to other critical vehicle functions. Such an approach ensures that the vehicle cannot be operated in any capacity, thereby significantly reducing the likelihood of theft.
In an embodiment, the communication interface (106) is configured to provide the vehicle owner with continuous updates regarding the location of the vehicle until the vehicle is rendered operative or the owner cancels the security alert. This capability is essential for maintaining the owner’s awareness of the vehicle’s status and location throughout the duration of the security incident. Continuous updates ensure that the owner can make timely decisions based on the most current information available, which is crucial for the effective management of vehicle security in dynamic situations.
FIG. 2 illustrates a flow diagram describing the operational process of a vehicle security system, in accordance with the embodiments of the present disclosure. Upon unauthorized entry into the vehicle, an interruption signal is immediately generated and communicated to the processor interface circuit (PIC), which serves as the central command unit. Subsequent to this signal reception, the PIC orchestrates a series of security protocols starting with the generation of an SMS alert that is sent to the vehicle owner’s pre-registered mobile device. Concurrently, the GPS module within the system is activated by the PIC, initiating real-time tracking of the vehicle’s geographic location. The system awaits a response from the owner, with the key response being the “STOP” message. Upon receipt of this message, the system directs the engine control unit (ECU) to halt the ignition process, bringing the vehicle to a standstill and thus ensuring its safety. The tracking information, facilitated by the activated GPS module, is continuously relayed to the owner, allowing them to monitor the vehicle’s location. This process not only immobilizes the vehicle to prevent theft but also aids in its recovery by providing the owner with the vehicle’s real-time location until the situation is resolved and the vehicle is rendered operative again or until the security alert is cancelled by the owner. The flowchart encapsulates a comprehensive approach to vehicle security, providing both preventive and reactive measures against unauthorized vehicle usage.
FIG. 3 illustrates a pressure transducer in the seat to detect presence of a person, in accordance with the embodiments of the present disclosure. The pressure transducer, situated within the vehicle seat, is responsible for monitoring pressure changes that indicate the presence of a person. Upon detection of such changes, the pressure transducer generates an output signal which is then relayed to the microcontroller. The primary function of the microcontroller is to read this output signal from the pressure transducer, thereby interpreting the data to ascertain whether the pressure variation is within the parameters that suggest the presence of a person. Subsequently, this data is processed by the software, which is programmed to evaluate the signal received from the microcontroller. If the software concludes that the pressure changes correspond to the presence of a person, it triggers an SMS alert. This alert mechanism is part of a security feature designed to inform the vehicle owner or a monitoring system of the detected presence, potentially indicative of an unauthorized entry. The process flow from the detection by the pressure transducer through to the potential alert via SMS highlights a security system's reactive chain of events designed to provide real-time updates and enable prompt responses to secure the vehicle. The system architecture as illustrated ensures a streamlined and efficient flow of information, allowing for rapid processing and reaction, which is essential for effective vehicular security management.
FIG. 4 illustrates a visualization diagram describing the operational process of a vehicle security system, in accordance with the embodiments of the present disclosure. Positioned strategically near the ignition, the inductor switch's primary purpose is to detect the insertion of a key into the ignition. Upon such insertion, the inductor switch senses a change in the magnetic field, a function pivotal to its operation. This change is then communicated to the microcontroller, to which the inductor switch is connected. The microcontroller is programmed to read these magnetic field changes and discern whether they align with the characteristics of an authorized key insertion. Integral to the system is the circuit integration, which facilitates seamless communication between the inductor switch and the microcontroller. Subsequent to the processing by the microcontroller, a software update is prompted, which comprises the task of programming the microcontroller to respond to the detected changes. In the event that an unauthorized key insertion is identified, the software initiates an outcome in the form of an SMS notification to the vehicle owner. This notification acts as an immediate alert to the owner, informing them of the potential security breach. The interconnected nature of these components—inductor switch, microcontroller, and software—creates a robust framework that ensures the vehicle’s security is maintained, and the owner is promptly updated on the vehicle’s status, all contributing to a highly responsive vehicle security system.
FIG. 5 illustrates an inductor switch for ignition key detection, in accordance with the embodiments of the present disclosure. The inductor switch is responsible for detecting when a key is inserted into the vehicle's ignition. Upon insertion, the switch detects a change in the magnetic field, a function intrinsic to its design, which is indicative of a key's presence. This detection is then relayed to the microcontroller, which serves as the central processing unit for the vehicle's security system. The microcontroller is tasked with verifying the change in the magnetic field and ascertaining whether it signals an authorized or unauthorized attempt at vehicle operation. Following this verification, and assuming an anomaly is detected, the microcontroller triggers an SMS notification to be sent to the vehicle owner. This SMS is a critical communication link, serving to inform the owner promptly of the event, which could potentially be an unauthorized attempt to operate the vehicle. The immediate notification provides the owner with the opportunity to respond swiftly to the security threat, thereby enhancing the overall efficacy of the vehicle's anti-theft measures. The system’s streamlined information processing, from physical key detection to digital alert, underscores the integrated approach taken to safeguard vehicles against unauthorized access and use.
FIG. 6 illustrates a sequence diagram to tackle network issues, in accordance with the embodiments of the present disclosure. When a trigger event, such as pressure detection, occurs, the software introduces a delay function via the delay mechanism. This mechanism is integral to the process, as it temporarily holds the action of sending the SMS to perform a network check. The network check is essential to ascertain the availability and strength of the network signal, facilitated by the GSM module, which is responsible for establishing a cellular connection to send the SMS. If the network check reveals insufficient signal strength or if the GSM module fails to establish a connection, the software invokes the retry logic. This logic is programmed to attempt resending the SMS after a predetermined time if the initial attempt fails, continuing the process until the delay timer set by the delay mechanism expires. The intention behind incorporating such a delay mechanism and retry logic is to mitigate the chances of an SMS failing to reach the vehicle owner due to transient network issues, ensuring reliable communication of security alerts. This structured approach, which iteratively checks for network availability and attempts to resend the message, maximizes the likelihood of timely notification to the vehicle owner regarding security breaches, thereby enhancing the effectiveness of the vehicle's security protocol.
Example embodiments herein have been described above with reference to block diagrams and flowchart illustrations of methods and apparatuses. It will be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by various means including hardware, software, firmware, and a combination thereof. For example, in one embodiment, each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations can be implemented by computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the flowchart block or blocks.
Throughout the present disclosure, the term ‘processing means’ or ‘microprocessor’ or ‘processor’ or ‘processors’ includes, but is not limited to, a general purpose processor (such as, for example, a complex instruction set computing (CISC) microprocessor, a reduced instruction set computing (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, a microprocessor implementing other types of instruction sets, or a microprocessor implementing a combination of types of instruction sets) or a specialized processor (such as, for example, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), or a network processor).
The term “non-transitory storage device” or “storage” or “memory,” as used herein relates to a random access memory, read only memory and variants thereof, in which a computer can store data or software for any duration.
Operations in accordance with a variety of aspects of the disclosure is described above would not have to be performed in the precise order described. Rather, various steps can be handled in reverse order or simultaneously or not at all.
While several implementations have been described and illustrated herein, a variety of other means and/or structures for performing the function and/or obtaining the results and/or one or more of the advantages described herein may be utilized, and each of such variations and/or modifications is deemed to be within the scope of the implementations described herein. More generally, all parameters, dimensions, materials, and configurations described herein are meant to be exemplary and that the actual parameters, dimensions, materials, and/or configurations will depend upon the specific application or applications for which the teachings is/are used. Those skilled in the art will recognize, or be able to ascertain using no more than routine experimentation, many equivalents to the specific implementations described herein. It is, therefore, to be understood that the foregoing implementations are presented by way of example only and that, within the scope of the appended claims and equivalents thereto, implementations may be practiced otherwise than as specifically described and claimed. Implementations of the present disclosure are directed to each individual feature, system, article, material, kit, and/or method described herein. In addition, any combination of two or more such features, systems, articles, materials, kits, and/or methods, if such features, systems, articles, materials, kits, and/or methods are not mutually inconsistent, is included within the scope of the present disclosure.
Claims
I/We claims:
A vehicle anti-theft and immobilization system (100) for preventing unauthorized operation of a vehicle, the system (100) comprising:
an entry detection mechanism (102) configured to detect an unauthorized entry into the vehicle and to generate an entry signal indicative of said unauthorized entry;
a processor interface circuit (PIC) (104) operatively connected to said entry detection mechanism (102), wherein said PIC (104) is configured to receive said entry signal and initiate a security response sequence;
a communication interface (106) integrated with said PIC (104), configured to generate and send a security alert message to a pre-registered mobile device of the vehicle owner upon activation of said security response sequence;
a global positioning system (GPS) module (108), activated by said PIC (104) in response to said entry signal, for determining and tracking the geographic location of the vehicle;
a remote command reception module (110) configured to receive a predetermined command from said pre-registered mobile device in response to said security alert message;
an engine control unit (ECU) (112) interfaced with said remote command reception module (110), wherein said ECU (112) is configured to disable the vehicle's ignition system upon receipt of a stop command from said remote command reception module (110), thereby rendering the vehicle inoperative.
The system (100) of claim 1, wherein the entry detection mechanism (102) comprises a pressure transducer configured to generate the entry signal in response to a change in pressure indicative of the unauthorized entry.
The system (100) of claim 2, wherein the pressure transducer is further configured to send the entry signal to the PIC (104) for initiation of the security response sequence when pressure indicative of an individual's presence within the vehicle is detected.
The system (100) of claim 1, further comprising a GPS activation module, wherein the GPS activation module is operatively connected to the PIC (104) and configured to activate the GPS module (108) upon initiation of the security response sequence.
The system (100) of claim 1, wherein the communication interface (106) comprises a GSM module configured to send the security alert message via SMS to the pre-registered mobile device.
The system (100) of claim 1, wherein the remote command reception module (110) is configured to receive a stop command in the form of a pre-defined text message response from the pre-registered mobile device.
The system (100) of claim 1, further comprising an inductor switch positioned near the vehicle ignition and configured to detect insertion of a key or a key-like instrument.
The system (100) of claim 7, wherein the inductor switch is configured to send a signal indicative of a change in magnetic field to the PIC (104), which is configured to distinguish between authorized and unauthorized use based on a predefined criterion.
The system (100) of claim 8, wherein the PIC (104) is further configured to activate the GPS module (108) and the communication interface (106) upon detection of the change in magnetic field by the inductor switch.
The system (100) of claim 1, wherein the ECU (112) is further configured to disable additional vehicle systems in response to the stop command, the additional vehicle systems including at least one of the fuel system, electrical system, or transmission system.
VEHICLE PROTECTION SYSTEM
Disclosed is a vehicle anti-theft and immobilization system for preventing unauthorized operation of a vehicle, comprising: an entry detection mechanism configured to detect an unauthorized entry into the vehicle and to generate an entry signal indicative of said unauthorized entry; a processor interface circuit operatively connected to said entry detection mechanism, wherein said processor interface circuit is configured to receive said entry signal and initiate a security response sequence; a communication interface integrated with said processor interface circuit, configured to generate and send a security alert message to a pre-registered mobile device of the vehicle owner upon activation of said security response sequence; a global positioning system module, activated by said processor interface circuit in response to said entry signal, for determining and tracking the geographic location of the vehicle; a remote command reception module configured to receive a predetermined command from said pre-registered mobile device in response to said security alert message; an engine control unit interfaced with said remote command reception module, wherein said engine control unit is configured to disable the vehicle's ignition system upon receipt of a stop command from said remote command reception module, thereby rendering the vehicle inoperative.
Fig. 1
Drawings /
FIG. 1
/
FIG. 2
/
FIG. 3
/
FIG. 4
/
FIG. 5
/
FIG. 6
, Claims:I/We claims:
A vehicle anti-theft and immobilization system (100) for preventing unauthorized operation of a vehicle, the system (100) comprising:
an entry detection mechanism (102) configured to detect an unauthorized entry into the vehicle and to generate an entry signal indicative of said unauthorized entry;
a processor interface circuit (PIC) (104) operatively connected to said entry detection mechanism (102), wherein said PIC (104) is configured to receive said entry signal and initiate a security response sequence;
a communication interface (106) integrated with said PIC (104), configured to generate and send a security alert message to a pre-registered mobile device of the vehicle owner upon activation of said security response sequence;
a global positioning system (GPS) module (108), activated by said PIC (104) in response to said entry signal, for determining and tracking the geographic location of the vehicle;
a remote command reception module (110) configured to receive a predetermined command from said pre-registered mobile device in response to said security alert message;
an engine control unit (ECU) (112) interfaced with said remote command reception module (110), wherein said ECU (112) is configured to disable the vehicle's ignition system upon receipt of a stop command from said remote command reception module (110), thereby rendering the vehicle inoperative.
The system (100) of claim 1, wherein the entry detection mechanism (102) comprises a pressure transducer configured to generate the entry signal in response to a change in pressure indicative of the unauthorized entry.
The system (100) of claim 2, wherein the pressure transducer is further configured to send the entry signal to the PIC (104) for initiation of the security response sequence when pressure indicative of an individual's presence within the vehicle is detected.
The system (100) of claim 1, further comprising a GPS activation module, wherein the GPS activation module is operatively connected to the PIC (104) and configured to activate the GPS module (108) upon initiation of the security response sequence.
The system (100) of claim 1, wherein the communication interface (106) comprises a GSM module configured to send the security alert message via SMS to the pre-registered mobile device.
The system (100) of claim 1, wherein the remote command reception module (110) is configured to receive a stop command in the form of a pre-defined text message response from the pre-registered mobile device.
The system (100) of claim 1, further comprising an inductor switch positioned near the vehicle ignition and configured to detect insertion of a key or a key-like instrument.
The system (100) of claim 7, wherein the inductor switch is configured to send a signal indicative of a change in magnetic field to the PIC (104), which is configured to distinguish between authorized and unauthorized use based on a predefined criterion.
The system (100) of claim 8, wherein the PIC (104) is further configured to activate the GPS module (108) and the communication interface (106) upon detection of the change in magnetic field by the inductor switch.
The system (100) of claim 1, wherein the ECU (112) is further configured to disable additional vehicle systems in response to the stop command, the additional vehicle systems including at least one of the fuel system, electrical system, or transmission system.
VEHICLE PROTECTION SYSTEM
| # | Name | Date |
|---|---|---|
| 1 | 202421033139-OTHERS [26-04-2024(online)].pdf | 2024-04-26 |
| 2 | 202421033139-FORM FOR SMALL ENTITY(FORM-28) [26-04-2024(online)].pdf | 2024-04-26 |
| 3 | 202421033139-FORM 1 [26-04-2024(online)].pdf | 2024-04-26 |
| 4 | 202421033139-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [26-04-2024(online)].pdf | 2024-04-26 |
| 5 | 202421033139-EDUCATIONAL INSTITUTION(S) [26-04-2024(online)].pdf | 2024-04-26 |
| 6 | 202421033139-DRAWINGS [26-04-2024(online)].pdf | 2024-04-26 |
| 7 | 202421033139-DECLARATION OF INVENTORSHIP (FORM 5) [26-04-2024(online)].pdf | 2024-04-26 |
| 8 | 202421033139-COMPLETE SPECIFICATION [26-04-2024(online)].pdf | 2024-04-26 |
| 9 | 202421033139-FORM-9 [07-05-2024(online)].pdf | 2024-05-07 |
| 10 | 202421033139-FORM 18 [08-05-2024(online)].pdf | 2024-05-08 |
| 11 | 202421033139-FORM-26 [12-05-2024(online)].pdf | 2024-05-12 |
| 12 | 202421033139-FORM 3 [13-06-2024(online)].pdf | 2024-06-13 |
| 13 | 202421033139-RELEVANT DOCUMENTS [17-04-2025(online)].pdf | 2025-04-17 |
| 14 | 202421033139-POA [17-04-2025(online)].pdf | 2025-04-17 |
| 15 | 202421033139-FORM 13 [17-04-2025(online)].pdf | 2025-04-17 |