CN110740906A - Vehicle key lock cabinet - Google Patents
Vehicle key lock cabinet Download PDFInfo
- Publication number
- CN110740906A CN110740906A CN201880036147.2A CN201880036147A CN110740906A CN 110740906 A CN110740906 A CN 110740906A CN 201880036147 A CN201880036147 A CN 201880036147A CN 110740906 A CN110740906 A CN 110740906A
- Authority
- CN
- China
- Prior art keywords
- key
- vehicle
- key locker
- locker
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B19/00—Keys; Accessories therefor
- E05B19/22—Keys with devices for indicating whether the last operation was locking or unlocking
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
A key locker for a vehicle includes a key locker body sized to store vehicle keys, a key locker , and an access actuator configured to move the key locker in response to an access signal.
Description
Cross reference to related applications
The present application claims priority from us non-provisional application No. 15/992,832, filed on 30/5/2018, which claims priority from us provisional application No. 62/512,285, filed on 30/5/2017, both of which are hereby incorporated by reference herein.
Background
The sharing of services of different vehicles is increasingly providing access to vehicles vehicles provide access in minutes, hours and/or days. shared services of vehicles provide a fleet of vehicles for access by consumers.
In a vehicle sharing context, logistical challenges come from physically providing vehicle keys for a given driver within an appropriate amount of time. Additionally, providing the driver with a vehicle key may limit access to the vehicle by different drivers authorized to use the vehicle. Furthermore, providing a vehicle key exposes the provider to the risk that the key is copied or retained for malicious purposes.
Drawings
Non-limiting and non-exhaustive embodiments of the present invention are described with reference to the following figures, wherein like reference numerals refer to like parts throughout the various views unless otherwise specified.
Fig. 1 includes an example system including a controller unit, a keypad, a mobile device, a vehicle system, a vehicle reader, and a key locker, according to an embodiment of the disclosure.
Fig. 2 includes an example key locker including an access actuator, a wireless interface, processing logic, a sensing module, and a key locker in accordance with an embodiment of the disclosure.
FIG. 3 illustrates an example process of providing access to a vehicle according to an embodiment of the disclosure.
Figure 4 illustrates an example process of immobilizing a vehicle due to tampering, according to an embodiment of the present disclosure.
Fig. 5 illustrates an example process of notifying a vehicle operator of tampering with a key locker of a vehicle according to an embodiment of the disclosure.
Fig. 6 illustrates an example system including a controller unit, a keypad, a mobile device, a key locker, a server, and a cellular gateway, according to an embodiment of the disclosure.
FIG. 7 illustrates an example system for providing access to a vehicle according to an embodiment of this disclosure.
FIG. 8 illustrates an example key locker according to an embodiment of the disclosure.
FIG. 9 illustrates an example process of providing access to a vehicle according to an embodiment of the disclosure.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the embodiments, however, one skilled in the relevant art will recognize that the techniques described herein may be practiced without or with numerous specific details or with other methods, components, materials, etc.
Reference throughout this specification to " embodiments" or " embodiments" means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least embodiments of the present invention.
Throughout this specification, several technical terms are used. These terms take the ordinary meaning as is accorded to such terms unless expressly defined herein or otherwise clearly indicated by the context of their use.
For example, in embodiments, the vehicle key locker is formed of plastic with an integrated metal mesh structure that prevents radio signals from being received or transmitted by a Radio Frequency Identification (RFID) tag of the vehicle key.
When the access data matches the access code stored in the memory of the system, the key locker is optionally opened to provide access to the keys in the key locker, or the key locker of the key locker is opened to allow the vehicle to be started by a radio response signal from the vehicle key in the key locker.
In contrast, existing shared service vehicles have vehicle keys inside the vehicle and are accessible to users, in embodiments, access is provided to remove the vehicle key from the key locker, and the key locker senses when the key is placed back into the key locker.
The embodiments of the present disclosure and additional embodiments described above are described in detail below with respect to fig. 1-9.
Fig. 1 includes an example system 100 according to an embodiment of the disclosure, including a controller unit 103, a keypad 140, a mobile device 130, a vehicle system 199, a vehicle reader 180, and a key locker 150. the controller unit 103 includes processing logic 107, a cellular interface 111, and a wireless interface 113. the processing logic 107 may include or multiple processors, microprocessors, multi-core processors, and/or field programmable arrays (FPGAs), or multiple volatile and/or non-volatile memories (not illustrated) that may be communicatively coupled to the processing logic 107 to store instructions to perform the operations and/or to store data.
The keypad 140 is communicatively coupled to the controller unit 103 via a communication channel 192, in instances, the communication channel 192 is a wireless communication channel (e.g., Bluetooth and/or WiFi/802.11 x.) the mobile device 130 is communicatively coupled to the controller unit 103 via a communication channel 193, in instances, the communication channel 193 is a wireless communication channel (e.g., Bluetooth and/or WiFi/802.11 x.) the vehicle system 199 is communicatively coupled to the controller unit 103 via a communication channel 191, in instances, the communication channel 191 is a wired communication channel using a Controller Area Network (CAN) bus protocol, the key locker 150 is communicatively coupled to the controller unit 103 via a communication channel 194, in instances, the communication channel 194 is a wireless communication channel (e.g., Bluetooth and/or WiFi/802.11 x.) in instances, the communication channel 194 is using an inter-integrated circuit (I)2C) Or a wired communication channel of a Serial Peripheral Interface (SPI) protocol. The communication channel 194 may be an encrypted channel. The vehicle reader 180 is communicatively coupled to a vehicle system 199 via a communication channel 195. In different embodiments, communication channels 191, 192, 193, 194, and 195 may be wired or wireless.
In embodiments, the keypad 140 can be placed inside the vehicle (e.g., below the windshield) and the buttons of the keypad are capacitive sensing buttons such that the buttons are sensitive to the action of fingers "pressing" the buttons through the glass of the vehicle in embodiments, the keypad 140 is configured to be mounted outside the vehicle.
In embodiments, the user wirelessly transmits the access data to the controller unit 103 using a mobile application (running on the mobile device 130) with the access data in embodiments, the access data is transmitted from the mobile device 130 to the wireless interface 113 via Bluetooth.
In embodiments, pickup data is transmitted from mobile device 130 to wireless interface 113 using the IEEE 802.11x protocol and frequency Wireless interface 113 may be configured to receive and/or transmit Bluetooth and/or WiFi in embodiments, pickup data is transmitted from mobile device 130 to cellular interface 111 using cellular data (cellular data towers not illustrated). cellular interface 111 may be configured to receive and/or transmit 2G/3G/4G/LTE or other cellular data standards now or hereafter used.
In the illustrated embodiment of fig. 1, processing logic 107 is coupled to wireless interface 113 to send and receive wireless data (including take data.) processing logic 107 is also coupled to cellular interface 111 to send and receive cellular data (including take data.) in embodiments, memory coupled to processing logic 107 includes take code.
Vehicle system 199 is communicatively coupled to controller unit 103 via communication channel 191, and vehicle reader 180 is communicatively coupled to vehicle system 199 via communication channel 195. in embodiments, vehicle reader 180 is an RFID reader. in embodiments, vehicle reader 180 is configured to transmit interrogation signal 183 and is configured to receive response signal 153 from a vehicle key stored in key locker 150. vehicle system 199 may access or include a vehicle computer that provides access to the vehicle and/or starts and stops the vehicle.in embodiments, vehicle system 199 includes a start circuit that controls whether the vehicle can be started by turning the key on or by pressing a start/stop button of the vehicle in conjunction with vehicle system 199 sensing the vehicle key.
FIG. 1 also includes a key locker 150, depending on the particular embodiment, the key locker 150 may be made of metal, plastic, or otherwise, in embodiments, the key locker 150 is manufactured such that it shields the interior of the key locker 150 from radio waves/signals to accomplish this, the key locker 150 may be made of metal, or incorporate a metal mesh structure, or otherwise form a Faraday cage, FIG. 2 includes example embodiments of the key locker 150 according to embodiments of the disclosure.
In FIG. 2, the example key locker 250 includes an access actuator 265, a wireless interface 263, processing logic 253, a sensing module 257, and a key locker 260 processing logic 253 is coupled to sensing module 257, wireless interface 263, and access actuator 265.
The wireless interface 263 may include an antenna and corresponding circuitry to receive and/or transmit Bluetooth, cellular, and/or IEEE 802.11x wireless communication signals the sensing module 257 may include or more of an accelerometer, a weight sensor, a magnetic sensor, a resistive sensor, and/or a capacitive sensor.
The processing logic 253 may include or multiple processors, microprocessors, multi-core processors, and/or field programmable arrays (FPGAs) to perform the operations disclosed herein or multiple volatile and/or non-volatile memories (not illustrated) may be communicatively coupled to the processing logic 253 to store instructions to perform the operations and/or to store data.
The key locker 250 is sized to store vehicle keys, such as keys 270, 280 or 290.
Key 280 is an example wireless key that may include a blade for taking a key for a vehicle and/or starting/driving a vehicle key 280 may also incorporate remote control for taking a vehicle key 280 includes a tag 283. tag 283 may be a passive (unpowered) or active (powered) tag in embodiments, tag 283 is an RFID tag configured to generate a response signal (e.g., 153) when tag 283 receives an interrogation signal (e.g., 183) from an RFID reader (e.g., reader 180).
The key 290 is a blade-only key typically made of unitary metal pieces.
Embodiments of the key locker 250 may depend on what type of vehicle keys are to be stored.
FIG. 3 illustrates an example process 300 of providing access to a vehicle according to an embodiment of the disclosure, the order in which or all of the process blocks appear in the process 300 should not be considered limiting, rather, those of ordinary skill in the art having the benefit of the present disclosure will appreciate that process blocks may be performed in a variety of orders not illustrated, or even in parallel.
In process block 305 of process 300, take data is received, for example, controller unit 103 may receive take data from keypad 140 or from mobile device 130. in embodiments, take data is wireless take data. in examples, wireless interface 263 may receive take data from keypad 140 or from mobile device 130.
In process block 310, the take data is compared to the take code in embodiments, prior to process block 310, the controller unit 103 receives the take code from the wireless interface 113 or cellular interface 111 and stores the take code to a memory coupled with the processing logic 107 or the processing logic 253 in instances the take code is associated with a vehicle reservation for vehicle sharing purposes in embodiments the processing logic 107 or 253 may facilitate the comparison of the take data to the take code.
When the access data matches the access code, process 300 passes to process block 315. In process block 315, an interrogation signal (e.g., signal 183) generated from outside the key locker (e.g., locker 150/250) is allowed to reach the tag (e.g., 273/283) of the vehicle key (e.g., 270/280) stored in the key locker. The tag of the vehicle key is configured to generate a response signal (e.g., 153) in response to receiving the interrogation signal (e.g., 183). When the vehicle's reader (e.g., 180) receives the response signal, the response signal allows access to the vehicle and/or allows the user to start/drive the vehicle. For example, the tag of the vehicle key may have been factory set by the vehicle manufacturer to allow access to the vehicle and/or to allow starting/driving of the vehicle.
When the fetch data fails to match the fetch code, process 300 passes to process block 320. In process block 320, an interrogation signal (e.g., signal 183) generated from outside the key locker is prevented from reaching the tag (e.g., 273/283) of the vehicle key (e.g., 270/280) stored within the key locker. Since the interrogation signal never reaches the tag, no response signal is generated and sent back to the reader 180, and the vehicle remains unavailable or stationary.
In embodiments, the tag allowing an interrogation signal generated from outside the key locker to reach the vehicle key comprises moving key locker 260 contained in the key locker to a distance (e.g., 0.5 inches) that allows a response signal from the tag to be transmitted outside the key locker, in embodiments, key locker is moved a distance that does not allow the vehicle key to be physically removed from the key locker.
As described above, the key locker may be made of metal or of plastic that incorporates a metal mesh structure or otherwise provides a Faraday cage so that external radio frequencies (at least up to a certain frequency range) do not penetrate the key locker, thus, by opening the key locker 260, allowing a radio signal, such as an interrogation signal 183, to enter the key locker and rendering a response signal 153 from the tag of the vehicle key, which may be sensed by the reader (e.g., 180) of the vehicle, illegal.
In embodiments, the take actuator 265 receives an actuation signal from the processing logic 107 of the controller unit 103 in embodiments, the take actuator 265 receives an actuation signal from the processing logic 253 the take actuator 265 may include a stepper motor mechanically coupled to the key locker 260 to open the key locker 260 a distance defined by the actuation signal in embodiments, the key locker 260 may be moved using a servo, motor, actuator, or combination.
According to embodiments of the present disclosure, an example system includes a wireless interface (e.g., 113 or 263) for receiving wireless access data from a mobile device such as a smartphone, tablet phone, or tablet computer, the system additionally includes processing logic, memory, and a key locker, the key locker includes a key locker and an access actuator, the processing logic is coupled to the wireless interface to receive the wireless access data, the memory is coupled to the processing logic, and the memory includes an access code.
FIG. 4 illustrates an example process 400 of providing access to a vehicle according to an embodiment of the present disclosure the order in which some or all of the process blocks appear in the process 400 should not be considered limiting rather, it will be understood by those of ordinary skill in the art having the benefit of the present disclosure that process blocks may be performed in a variety of orders not illustrated, or even in parallel.
In operation 405 of the process 400, a tamper signal is received from a sensing module (e.g., 257) included in the key locker in embodiments, the sensing module includes an accelerometer and the tamper signal includes acceleration measurements from the accelerometer above a predetermined acceleration threshold.
In embodiments, the sensing module includes a magnetic sensor and the tamper signal includes a magnetic measurement from the magnetic sensor, wherein the magnetic sensor is disposed within the key locker to measure the magnetic field of the vehicle key.
In embodiments, the sensing module includes a resistance sensor, and the tamper signal includes a resistance measurement from the resistance sensor, hi embodiments, the resistance sensor is disposed within the key locker to contact the blade of the vehicle key when the vehicle key is stored in the key locker, hi embodiments, the resistance sensor includes a resistance network incorporated into the structure of the key locker, such that someone penetrating the resistance network (e.g., by drilling through the key locker to access the vehicle key) will change the resistance of the resistance network, which triggers the tamper signal.
In operation 410, the vehicle is immobilized in response to receiving the tamper signal, in embodiments, processing logic 107 receives the tamper signal from sensing module 257 via a wired and encrypted data link and immobilizes the vehicle by sending a CAN bus message to vehicle system 199. in embodiments, processing logic 107 receives the tamper signal from sensing module 257 and immobilizes the vehicle by generating a disconnect circuit of the ignition/starting system of the vehicle (e.g., by activating a relay).
In embodiments where the key locker box is a stand-alone unit and the controller unit 103 is not necessarily required, the processing logic 253 receives the tamper signal from the sensing module 257 and immobilizes the vehicle by sending a CAN bus message to the vehicle system 199 in embodiments, the processing logic 253 receives the tamper signal from the sensing module 257 and immobilizes the vehicle by generating a disconnect circuit of the ignition/starting system of the vehicle (e.g., by activating a relay).
In operation 415, in response to receiving the tamper signal, a tamper notification is transmitted over the wireless interface (e.g., 113 or 263) to the owner or operator of the vehicle.
FIG. 5 illustrates an example process 500 of providing access to a vehicle according to an embodiment of the disclosure the order in which of the process blocks or all occur in the process 500 should not be considered limiting, rather, those of ordinary skill in the art having the benefit of this disclosure will appreciate that of the process blocks may be performed in a variety of orders not illustrated, or even in parallel.
In process block 505, an th sensor measurement of a vehicle key stored within the key locker is initiated, the th sensor measurement is performed by a sensing module (e.g., 257) contained in the key locker.
In process block 510, wireless access data is received from a mobile device.
In process block 515, the wireless access data is compared to the access code. The comparison of process block 515 may be performed by processing logic 107 or 253.
At process block 520, when the access data matches the access code, access to the key locker is allowed so that the user can remove the vehicle key stored in the key locker, hi embodiments, processing logic causes an access actuator (e.g., 265) to unlatch the mechanical latch or the magnetic latch to allow the user to remove the cover of the key locker so that the user can remove the vehicle key.
In process block 525, the reservation end data is received, in embodiments, the reservation end data is received over a wireless interface (e.g., 113 or 263) or a cellular interface (e.g., 111). in embodiments, the reservation end is received from a mobile device (e.g., 130). in embodiments, the reservation end data may be transmitted by a server coordinating vehicle reservations.
If the user has placed the key back into the locker box after the reservation is complete (as indicated by the reservation end data being received), then the second sensor measurement should be similar to the th sensor measurement.
In process block 535, a key loss notification is transmitted via the wireless interface when the second sensor measurement is not within the predetermined variance of the th sensor measurement.
As described above, embodiments include a tag (e.g., 273/283) included in the vehicle key and the key locker opened to allow interrogation of the tag.
In embodiments where the vehicle key does not include a tag, the user needs to access the key to insert the key blade into the ignition system to start the vehicle. In these embodiments, it is desirable that the vehicle keys be accessible to the user and therefore that the key locker be placed somewhere accessible, such as a glove box, center console or trunk.
Those skilled in the art will appreciate that in embodiments, the key locker may include its own processing logic and wireless and/or cellular interface, while in other embodiments, the key locker may include only the access actuator and/or sensing module 257, and the described processing logic and wireless/cellular interface are provided external to the key locker by, for example, the controller unit 103. in embodiments, both the controller unit 103 and the key locker include processing logic and wireless and cellular interfaces.
Fig. 6 includes an example system 600 including a controller unit 603, a keypad 640, a mobile device 130, a key locker 650, a server 670, and a cellular gateway 611 according to embodiments of the disclosure the controller unit 603 may include processing logic that may include or more processors, microprocessors, multi-core processors, and/or field programmable arrays (FPGAs), or more volatile and/or non-volatile memories (not illustrated) that may be communicatively coupled to the processing logic in the controller unit 603 to store instructions to perform the operations and/or to store data.
In FIG. 6, mobile device 130 is communicatively coupled to controller keypad 640 via communication channel 691 in FIG. 6, mobile device 130 is also communicatively coupled to server 670 via communication channel 693 keypad 640 is communicatively coupled to key locker 650 via communication channel 692 in embodiments, communication channel 692 includes a wired serial communication channel key locker 650 is communicatively coupled to controller unit 603 via communication channel 695 controller unit 603 is communicatively coupled to cellular gateway 611 via communication channel 696 and cellular gateway 611 is communicatively coupled to server 670 via communication channel 694 communication channels 691, 692, 693, 694, 695 and 696 may be a wireless communication channel (e.g., Bluetooth and/or WiFi/802.11x) or a wired communication channel (e.g., a CAN bus using I2C, USB and/or SPI protocols) controller unit 603 may be coupled to selectively immobilize the vehicle by ignition.
In embodiments, the mobile device 130 requests a vehicle reservation through the WiFi or cellular data access server 670 by using a mobile browser or mobile application, in response to receiving the vehicle request, the server 670 may supply a pick-up code for the reserved vehicle by transmitting the pick-up code to the cellular gateway 611 through the cellular data network, the cellular gateway 611, the controller unit 603, the key locker 650, and the keypad 640 may all be contained in the vehicle, the cellular gateway 611 may communicate the pick-up code to the control unit 603, the control unit 603 may communicate the pick-up code to the key locker 650, when the mobile device 130 is near the reserved vehicle, the pick-up code may be communicated to the keypad via Bluetooth, and the keypad may communicate the pick-up code to the key locker 650 via a wired serial data interface, if the pick-up code received by the key locker 650 from the keypad 640 matches the pick-up code delivered to the cellular gateway 611, the key locker 260 may open the key locker 36260 to allow the RFID reader stored in the vehicle to receive an RFID signal from the key RFID tag in the key locker 250 to invoke the vehicle.
FIG. 7 illustrates an example system 700 for providing access to a vehicle in accordance with an embodiment of the disclosure, the system 700 may be installed in a vehicle.A reader 781 and a vehicle system 780 may be initially installed by a manufacturer of the vehicle.the system 700 includes a controller 703 including processing logic 707, memory 702, an on-board diagnostics (OBD) reader 709, a wireless interface 710, and a sensor module 720. the processing logic 707 may include or more processors, microprocessors, multi-core processors, and/or field programmable arrays (FPGAs) that perform the operations disclosed herein. in embodiments, memory (not illustrated) is integrated into the processing logic to store instructions to perform the operations and/or to store data.
In FIG. 7, wireless interface 710 includes a cellular interface 713, a short-range wireless interface 714, a Wireless Local Area Network (WLAN) interface 717, and an RFID interface 719 various embodiments of wireless interface 710 may include all or of the illustrated wireless interfaces, cellular interface 713 may be configured to receive and/or transmit 2G/3G/4G/LTE/5G or other cellular data standards used now or below.
The sensor module 720 in fig. 7 includes a glass breakage sensor 721 and a G sensor 723. The glass breakage sensor may include a microphone that receives an audio signal. The audio signal may be filtered or compared to an audio signal associated with a glass break of the vehicle. The G sensor 723 may comprise an accelerometer. When the acceleration reading measured by the accelerometer reaches a predetermined threshold, the acceleration reading may indicate that the controller 703 or the vehicle containing the controller 703 is being tampered with.
Although not illustrated, processing logic 707 is communicatively coupled to read and write to memory 702. Processing logic 707 is also communicatively coupled to wireless interface 710, sensor module 720, and OBD reader 709.
The system 700 additionally includes a key locker 750, a reader 781, an advanced control module 760, disable (disable) circuitry 770, a keypad 740, a mobile device 730, a network 755, and a server 773. The keypad 740 and the mobile device 730 may be configured similarly to the keypad 140 and the mobile device 130, respectively. The reader 781 may be configured similar to the reader 180.
In the embodiment illustrated in FIG. 7, the vehicle system 780 includes an ignition module 785 and a lock/window/ module 786 the module 786 of the vehicle system 780 may control the vehicle to unlock, open and close windows, and monitor for openings and closures the vehicle system 780 may also include a light module (not illustrated) that turns the vehicle lights on and off.
The OBD reader 709 may be communicatively coupled to the vehicle system 780 via a communication channel 791. The OBD reader 709 may access the status of the ignition module 785 and the module 786. The OBD reader 709 may receive vehicle system data, such as vehicle mileage, engine status, maintenance warnings, and other vehicle data, from the vehicle system 780. This data may be sent to processing logic 707 via wireless interface 710 and network 755 and transmitted to server 773.
The processing logic 707 of the controller 703 is communicatively coupled to the key locker 750 (via communication channel 794), the high level control module 760 (via communication channel 796), the disabling circuit 770 (via communication channel 798), and the keypad 740 (via communication channel 792).
In operation, server 773 may supply or multiple access codes 733 for controller 703 by transmitting the access codes over communication channel 787, network 755, communication channel 789, and cellular interface 713 network 755 may include any network or network system such as, but not limited to, a peer-to-peer network, a Local Area Network (LAN), a domain network (WAN), a public network such as the Internet, a private network, a cellular network, a wireless network, a wired network, a combination wireless and wired network, and a satellite network.
After the controller 703 is supplied or multiple access codes 733, the user may provide access data to the controller 703 with the keypad 740 or the mobile device 730. the mobile device 730 may provide access data to the controller 703 by way of any of the interfaces in the wireless interface 710. the mobile device 730 may receive access data from the server 773 via the communication channel 787, the network 755, and the communication channel 788. when the access data provided by the user matches the access code 733 stored in the memory 702, an access signal may be sent from the processing logic 707 to the key locker 750 via the communication channel 794. in embodiment, the key locker 750 opens the key locker to allow the radio of a vehicle key stored in the key locker to receive the interrogation signal 783 generated by the reader 781 and to render the response signal 753 from the vehicle key stored in the key locker 750 illegal.
In embodiments, processing logic 707 sends a high level control module 760 command via communication channel 796 to correspond with the vehicle system 780 via communication channel 797 the communication channel 797 may use the CAN protocol, in examples, module 760 directs the vehicle system 780 to unlock the vehicle when the access data matches the access code so that the user may access the vehicle, in embodiments, processing logic 707 may cause disabling circuit 770 to disable ignition module 785 of the vehicle system 780 until the provided access data matches the access code 733. in embodiments, disabling circuit 770 immobilizes the vehicle ignition by creating a disconnect circuit (e.g., by activating a relay) of the ignition/start module 785 of the vehicle system 780.
FIG. 8 illustrates an example key locker 850, key locker 850 is examples of key lockers 750. key locker 850 includes a key locker body, which may be box-shaped (or other shape) having a cavity sized to store a vehicle key, such as vehicle key 870. example vehicle key 870 includes a radio 873, which may be an RFID tag, which may be configured similar to RFID tag 273. example key locker 850 includes processing logic 853, key sensing module 857, optional power source 859, access actuator 265, and key locker 260, according to embodiments of the disclosure.
The take-up actuator 265 is coupled to move the key locker 260 the take-up actuator 265 may include a stepper motor mechanically coupled to the key locker 260 to open the key locker 260 a distance defined by an actuation signal in embodiments, a servo, motor, actuator or combination may be used to move the key locker 260.
Access actuator 265 is configured to open key locker 260 in response to receiving access signal 881 processing logic 707 may provide access signal 881 when user-provided access data matches access code 733 provided by server 773 access signal 881 may be transmitted over communication channel 794 and forwarded to access actuator 265 via processing logic 853.
When the key locker 260 is closed, the key locker body shields the radio 873 from receiving radio signals (e.g., signals 753 and 783) from or transmitting radio signals (e.g., signals 753 and 783) to the key locker body exterior of the key locker 850. when the key locker 260 is open, the radio 873 of the vehicle key 870 may receive and/or transmit radio signals (e.g., signals 753 and 783). in embodiments, the distance the key locker 260 is open does not allow the vehicle key 870 to be removed from the key locker 35260.
In embodiments, the key locker body includes a metallic material that shields the radio 873 of the vehicle key 870 from the interrogation signal 783 of the reader 781 the key locker body may include plastic (e.g., ABS) and the metallic material may be included in a mesh sized to prevent reception or transmission of radio signals of a particular frequency.
Key locker 850 contains an optional power source 859 that provides power to vehicle keys 870. The battery used to power key 870 may be removed and an insert 877 sized to fit the battery compartment of vehicle key 870 may be inserted into key 870 to power key 870 via power provided by power source 859. Optional power source 859 is configured to provide power within a tolerance of properly powering vehicle key 870.
In a particular example scenario, the controller 703 may sense tampering with a vehicle in which it is installed via the sensor module 720. Processing logic 707 may then generate a disable (deactivation) signal 883 and provide it to processing logic 853 or directly to power supply 859. The optional power source 859 is configured to stop power to the vehicle keys in response to the deactivation signal 883.
In FIG. 8, the key locker 850 includes a key sensing module 857, the key sensing module 857 is configured to sense the presence of a vehicle key 870 within the key locker body, the key sensing module 857 may be configured to generate a missing disable signal 885 to disable the vehicle when the sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker body, the missing disable signal 885 may be sent to the processing logic 707 via the communication channel 794, and the processing logic 707 may immobilize the vehicle in response to receiving the missing disable signal 885. in embodiments, the processing logic 707 may immobilize the vehicle by sending a disable signal to the disable circuit 770. in embodiments, the processing logic 707 may immobilize the vehicle by sending a disable signal to the advanced control module 760 to the vehicle system 780 to immobilize the ignition module 785, thereby immobilizing the vehicle.
In embodiments, the key sensing module 857 includes a pressure sensor and the sensing reading of the key sensing module 857 includes a pressure reading the absence disable signal 885 can be generated when the pressure reading of the pressure sensor is below a pressure threshold to indicate that the key has been removed from the key locker 850.
FIG. 9 illustrates an example process 900 providing access to a vehicle according to embodiments of the disclosure the order in which some or all of the 's of process blocks appear in the process 900 should not be considered limiting, rather, those of ordinary skill in the art having the benefit of the present disclosure will appreciate that 's of process blocks may be performed in a variety of orders not illustrated, or even in parallel.
In operation 905, inputs (e.g., communication channel 794) to a key locker (e.g., key locker 850) are monitored.
In operation 910, the key locker remains in the closed position when an access signal (e.g., 881) is not received on the key locker input the key locker body and the key locker in the closed position prevent the radio of the vehicle key from receiving or transmitting a radio signal.
In operation 915, the key locker of the key locker is opened in response to receiving a take signal on the input of the key locker in embodiments, the open key locker allows the radio of the vehicle key to receive and transmit a radio signal while not allowing the vehicle key to be removed from the key locker body in another embodiment, the key locker is opened to a width sufficient to allow the vehicle key to be removed from the key locker body (and also allow the radio of the vehicle key to receive and transmit a radio signal).
In embodiments of the present disclosure, the particular access code may be associated with allowing the vehicle key to be removed from the vehicle key locker for, e.g., a long-term lease.
In embodiments, the process 900 may additionally include the operations of sensing with a key sensor (e.g., 857) of the key locker whether a vehicle key is present in the key locker, and transmitting a missing disable signal (e.g., 885) when the sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker body.
In embodiments of the key lockers 150, 250, 650, 750, and/or 850, a backup battery (e.g., lithium ion) is provided so that any processing logic, memory, wireless interface, and access actuators contained in the key lockers are operational even when the vehicle battery is dead.
In embodiments of the key locker 150, 250, 650, 750 and/or 850, instead of powering the key with batteries, a selectable voltage may be provided to power the keys inside the key locker, depending on the voltage requirements for powering the keys, the voltage provided may be selected using a jumper to select between 3VDC, 6VDC and 12 VDC.
The above disclosure has been discussed in the context of vehicle sharing, although it is contemplated that the systems and methods of the present disclosure may be used in the context of vacation rentals or short-term house rentals to provide for use of property for a limited period of time.
The term "processing logic" in this disclosure may include or multiple processors, microprocessor multi-core processors, and/or field programmable arrays (FPGAs) that perform the operations disclosed herein in embodiments, a memory (not illustrated) is integrated into the processing logic to store instructions to perform the operations and/or to store data.
The communication channels described herein may include using IEEE 802.11 protocol, Bluetooth, Serial Peripheral Interface (SPI), Interactive Integrated Circuit (I)2C) Universal serial port (USB), Controller Area Network (CAN), cellular data protocols (e.g., 3G, 4G, LTE, 5G), or other wired or wireless communications.
The processes set forth above are described in terms of computer software and hardware. The described techniques may constitute machine-executable instructions embodied within a tangible or non-transitory machine (e.g., computer) readable storage medium, which when executed by a machine, will cause the machine to perform the described operations. Additionally, the processes may be embodied within, for example, an application specific integrated circuit ("ASIC") or other hardware.
Tangible, non-transitory, machine-readable storage media include any mechanism that provides (i.e., stores) information in a non-transitory form that is accessible by a machine (e.g., a computer, network device, personal digital assistant, manufacturing tool, any device with sets or multiple processors, etc.).
The above description of illustrated embodiments of the invention, including what is described in the abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes, various modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize.
These modifications can be made to the invention in light of the above detailed description. The terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification. Rather, the scope of the invention is to be determined entirely by the following claims, which are to be construed in accordance with established doctrines of claim interpretation.
Claims (20)
- An apparatus of the type , comprising:a key locker body sized to store a vehicle key including a Radio Frequency Identification (RFID) tag;a key locker , wherein the key locker body is configured to shield the RFID tag of the vehicle key from receiving or transmitting radio signals from or to the exterior of the key locker body when the key locker is closed, andan access actuator configured to open the key locker in response to an access signal, wherein opening the key locker includes the access actuator moving the key locker to allow the RFID tag of the vehicle key to receive an interrogation signal generated by an RFID reader of a vehicle, and to send a response signal to the RFID reader of the vehicle in response to receiving the interrogation signal, the response signal allowing access to the vehicle to be driven.
- 2. The device of claim 1, further comprising:an optional power source for providing power to a vehicle key, wherein the power is within a tolerance of properly powering the vehicle key, and wherein the optional power source is configured to stop the power from being sent to the vehicle key in response to the optional power source receiving a disable signal.
- 3. The device of claim 2, further comprising:an insert sized to fit a battery compartment of the vehicle key, wherein the insert is configured to receive the power from the optional power source and deliver the power to the vehicle key.
- 4. The device of claim 1, further comprising:a key sensor configured to sense the presence of the vehicle key within the key locker body, wherein the key sensor is configured to generate a missing disable signal to disable the vehicle when a sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker body.
- 5. The device of claim 4, wherein the key sensor includes a pressure sensor, and wherein the sensed reading includes a pressure reading, the absence disable signal being generated when the pressure reading is below a pressure threshold.
- 6. The apparatus of claim 1, wherein the key locker is open a distance that does not allow the vehicle key to be removed from the key locker body.
- 7. The apparatus of claim 1, wherein the RFID tag is an active RFID tag powered by a power source.
- 8. The device of claim 1, wherein the key locker body comprises a metallic material that shields the RFID tag of the vehicle key from the interrogation signal.
- 9. The device of claim 8, wherein the key locker body comprises plastic and the metal material is comprised in a mesh sized to prevent reception or transmission of the radio signal.
- 10, a computer-implemented method of providing access to a vehicle, comprising:monitoring inputs to a key locker, wherein the key locker includes a key locker body sized to store vehicle keys, and wherein the key locker includes a key locker ;when no access signal is received on the input of the key locker, the key locker is held in a closed position, wherein the key locker body and the key locker in the closed position prevent a radio of the vehicle key from receiving or transmitting a radio signal, andopening the key locker of the key locker in response to receiving the access signal on the input of the key locker, wherein opening the key locker allows the radio of the vehicle key to receive and transmit radio signals while not allowing the vehicle key to be removed from the key locker body.
- 11. The method of claim 10, further comprising:receiving a deactivation signal by the key locker; anddisabling power provided to the vehicle key in response to receiving the disable signal, the power being within a tolerance of properly powering the radio of the vehicle key.
- 12. The method of claim 10, further comprising:sensing with a key sensor of the key locker whether the vehicle key is present in the key locker; andtransmitting a missing disable signal when a sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker body.
- 13. The method of claim 12, wherein the key sensor includes a pressure sensor, and wherein the sensed reading includes a pressure reading, the absence disable signal being generated when the pressure reading is below a pressure threshold.
- 14. The method of claim 10, wherein the key locker body comprises a metallic material that shields an RFID tag of the vehicle key from an ignition interrogation signal generated by the vehicle.
- 15. The method of claim 10, wherein the key locker includes plastic and metal materials arranged as a mesh structure sized to prevent reception or transmission of the radio signal.
- 16, a vehicle system, comprising:a wireless interface for receiving wireless access data;processing logic coupled to the wireless interface to receive the wireless access data;a memory coupled to the processing logic, the memory including fetching code; anda key locker sized to store vehicle keys having an RFID tag, wherein the key locker comprises:a key locker , wherein the key locker protects the vehicle keys from radio signals external to the key locker when the key locker is closed, andan access actuator coupled to move the key locker , wherein the processing logic is configured to cause the access actuator to move the key locker when the wireless access data matches the access code stored in the memory, the access actuator moving the key locker a distance to allow the RFID tag of the vehicle key to receive an interrogation signal generated by an RFID reader of a vehicle, and send a response signal to the RFID reader in response to receiving the interrogation signal, wherein the response signal allows access to the vehicle to be driven.
- 17. The vehicle system of claim 16, wherein the distance the key locker is open does not allow the vehicle key to be removed from the key locker when the access data matches the access code, and wherein the distance the key locker is open does allow the vehicle key to be removed from the key locker when the access data matches a second access code stored in the memory.
- 18. The vehicle system of claim 16, wherein the key locker includes a key sensor configured to sense the presence of the vehicle key within the key locker, and wherein the key sensor is configured to generate a missing disable signal to disable the vehicle when a sensed reading of the key sensor indicates that the vehicle key has been removed from the key locker,wherein the processing logic immobilizes the vehicle in response to receiving the missing disable signal.
- 19. The vehicle system of claim 18, wherein the key sensor includes a pressure sensor, and wherein the sensed reading includes a pressure reading, the absence disable signal being generated when the pressure reading is below a pressure threshold.
- 20. The vehicle system of claim 16, further comprising:a sensor module configured to sense vehicle tampering with at least of a microphone or an accelerometer, wherein the key locker is configured to stop power to the vehicle key when the sensor module senses vehicle tampering.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111483227.2A CN114148284B (en) | 2017-05-30 | 2018-05-30 | Key lock cabinet for vehicle |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762512285P | 2017-05-30 | 2017-05-30 | |
US62/512,285 | 2017-05-30 | ||
PCT/US2018/035214 WO2018222772A1 (en) | 2017-05-30 | 2018-05-30 | Vehicle key locker |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111483227.2A Division CN114148284B (en) | 2017-05-30 | 2018-05-30 | Key lock cabinet for vehicle |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110740906A true CN110740906A (en) | 2020-01-31 |
CN110740906B CN110740906B (en) | 2021-12-21 |
Family
ID=69236598
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201880036147.2A Active CN110740906B (en) | 2017-05-30 | 2018-05-30 | Vehicle key lock cabinet |
CN202111483227.2A Active CN114148284B (en) | 2017-05-30 | 2018-05-30 | Key lock cabinet for vehicle |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111483227.2A Active CN114148284B (en) | 2017-05-30 | 2018-05-30 | Key lock cabinet for vehicle |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN110740906B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112258715A (en) * | 2020-10-12 | 2021-01-22 | 武汉湖滨电器有限公司 | Anti-theft device for lock position of key cabinet and safety management system thereof |
CN114999056A (en) * | 2022-02-22 | 2022-09-02 | 合肥进毅智能技术有限公司 | Cash adding and distributing system and method for cash boxes of self-service equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6570486B1 (en) * | 1999-04-09 | 2003-05-27 | Delphi Automotive Systems | Passive remote access control system |
KR20070074914A (en) * | 2006-01-11 | 2007-07-18 | 주식회사 현대오토넷 | Apparatus and method for certificating user using radio frequency identification in electronic system for vehicle |
US20070273534A1 (en) * | 2002-12-12 | 2007-11-29 | Mcginn Dennis | Vehicle activity module |
CN101465009A (en) * | 2007-12-17 | 2009-06-24 | 现代自动车株式会社 | Intelligent key for vehicle and remote information processing system for the same |
US20090224890A1 (en) * | 2008-03-10 | 2009-09-10 | Lg Electronics Inc. | Active rfid tag |
DE102011116209A1 (en) * | 2011-10-14 | 2012-04-05 | Daimler Ag | Device for activating and deactivating locking and control system for vehicle, has control unit for activating or deactivating vehicle key, where entirely or partially deactivatable vehicle key and control unit |
US20140232322A1 (en) * | 2011-09-23 | 2014-08-21 | Thomas G. Kracker | Selective current reduction enabled with electrically deactivated key fob |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6737961B2 (en) * | 2002-08-14 | 2004-05-18 | Omega Patents, L.L.C. | Secure, vehicle key, storage device and associated method |
JP5275741B2 (en) * | 2008-10-14 | 2013-08-28 | 株式会社東海理化電機製作所 | Vehicle electronic key system |
US9725071B2 (en) * | 2015-02-24 | 2017-08-08 | Ford Global Technologies, Llc | Key fob button sequence for accessing keypad reprogramming mode |
-
2018
- 2018-05-30 CN CN201880036147.2A patent/CN110740906B/en active Active
- 2018-05-30 CN CN202111483227.2A patent/CN114148284B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6570486B1 (en) * | 1999-04-09 | 2003-05-27 | Delphi Automotive Systems | Passive remote access control system |
US20070273534A1 (en) * | 2002-12-12 | 2007-11-29 | Mcginn Dennis | Vehicle activity module |
KR20070074914A (en) * | 2006-01-11 | 2007-07-18 | 주식회사 현대오토넷 | Apparatus and method for certificating user using radio frequency identification in electronic system for vehicle |
CN101465009A (en) * | 2007-12-17 | 2009-06-24 | 现代自动车株式会社 | Intelligent key for vehicle and remote information processing system for the same |
US20090224890A1 (en) * | 2008-03-10 | 2009-09-10 | Lg Electronics Inc. | Active rfid tag |
US20140232322A1 (en) * | 2011-09-23 | 2014-08-21 | Thomas G. Kracker | Selective current reduction enabled with electrically deactivated key fob |
DE102011116209A1 (en) * | 2011-10-14 | 2012-04-05 | Daimler Ag | Device for activating and deactivating locking and control system for vehicle, has control unit for activating or deactivating vehicle key, where entirely or partially deactivatable vehicle key and control unit |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112258715A (en) * | 2020-10-12 | 2021-01-22 | 武汉湖滨电器有限公司 | Anti-theft device for lock position of key cabinet and safety management system thereof |
CN112258715B (en) * | 2020-10-12 | 2022-08-23 | 武汉湖滨电器有限公司 | Anti-theft device for lock position of key cabinet and safety management system thereof |
CN114999056A (en) * | 2022-02-22 | 2022-09-02 | 合肥进毅智能技术有限公司 | Cash adding and distributing system and method for cash boxes of self-service equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110740906B (en) | 2021-12-21 |
CN114148284A (en) | 2022-03-08 |
CN114148284B (en) | 2024-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10940830B2 (en) | Upgrade kit for an ignition key and methods | |
US10565409B2 (en) | Key locker with selective access | |
US8635462B2 (en) | Method and device for managing access control | |
CN106157404B (en) | Mobile device communication control authority is recalled | |
EP2575091B1 (en) | Unattended fleet vehicle security system and method | |
EP2811689B1 (en) | Wireless communications system | |
US11447097B1 (en) | Control system with wireless control device authorization and related methods | |
US9134727B2 (en) | Method for displaying information from an ID transmitter | |
US10964138B2 (en) | System and method for secure package delivery | |
CN102667655A (en) | Vehicle access control services and platform | |
US20220180679A1 (en) | Vehicle control system | |
US10793106B2 (en) | Automobile tracking and notification device and service | |
US20200398789A1 (en) | Vehicle control system | |
CN110740906B (en) | Vehicle key lock cabinet | |
CN114270736A (en) | Interference radio and vehicle key locker | |
US11662881B2 (en) | Information processing device, information processing method, vehicle, transmission method, and storage medium | |
US20230043228A1 (en) | Vehicle control system | |
US12128853B2 (en) | Integration of car security and home security system | |
DE102012111361A1 (en) | Method for operating motor car, involves transferring key code of transponder key to electronic immobilizer if release mechanism of transponder key is activated by key activation device, and deactivating immobilizer by key code | |
JP2020100965A (en) | Access control system | |
US20230219526A1 (en) | Vehicle control system | |
JP2006316434A (en) | Remote controller | |
JP7332434B2 (en) | Information management system | |
EP4301020A1 (en) | Vehicle, apparatus, computer program, and methods for revocation of a digital key | |
EP4159555B1 (en) | Updating vehicle ownership authorizations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |