This disclosure generally relates to a secured-area access system, and more particularly relates to a system that operates an identification-device to convey an access-authorization (e.g. an access-code) to a security-device when a host-vehicle approaches a secured-area.
It is known to restrict vehicle access to parking facilities or government property to only vehicles operated by authorized persons. Unfortunately, an automated vehicle is often unable to access such secured facilities without some action on the part of an authorized occupant of the automated vehicle such as displaying identification and/or manually entering an access code or swiping an identification card.
In accordance with one embodiment, a secured-area access system for an automated vehicle is provided. The system includes an identification-device, an input-device, and a controller. The identification-device conveys an access-authorization from a host-vehicle to a security-device. The input-device receives instructions regarding interaction with the security-device. The controller is in communication with the identification-device and the input-device. The controller operates the identification-device based on the instructions to convey the access-authorization to the security-device when the host-vehicle approaches the secured-area.
Further features and advantages will appear more clearly on a reading of the following detailed description of the preferred embodiment, which is given by way of non-limiting example only and with reference to the accompanying drawings.
The present invention will now be described, by way of example with reference to the accompanying drawings, in which:
With reference to both
The identification-device 24 may consist of or include, but is not limited to, a reconfigurable-display 30 (hereafter the display 30), a transmitter 32 such as a radio-frequency (RF) transmitter, an acoustic-transducer 34 (e.g. speaker), or any combination thereof. Accordingly, the security-device 28 may consist of or include, but is not limited to, a camera, an RF receiver, a microphone, or any combination thereof. Further details about the configuration of the identification-device 24 and the security-device 28 will be presented later is this document.
It is recognized that the host-vehicle 12 may encounter a variety of security-system configurations where each instance has unique requirements and/or procedures that must be adhered to for the host-vehicle 12 to be afforded access to the secured-area 20. In order for the host-vehicle 12 to ‘learn’ or be programmed with the unique requirements and/or procedures for a particular instance/configuration of the control-site 22, the system 10 includes an input-device 36 that receives instructions 38 regarding interaction with the security-device 28. The input-device 36 may consist of or include, but is not limited to, a microphone, a touch-screen, a camera, a receiver, or any combination thereof. The microphone may be used by the system 10 to receive the instructions 38 as voice-commands from the occupant 18. The touch-screen may be operated by the occupant 18 to select from a menu of options for the instructions 38, where the options may be stored in a security-system data-base located within the host-vehicle and/or located ‘in the cloud’. The camera may be used by the system 10 to ‘read’ signage proximate to the control-site 22 that is relevant to the instructions 38. The receiver may be configured to receive the instructions 38 from a smart-phone that is owned by and/or operated by the occupant 18. The receiver may also be used to receive metadata from a personal area network, a local area network, or a wide area network. In this way, the mode, method, or process of security access information can be independently learned by the host vehicle 12. It is also contemplated that the instructions 38 may be received from a different vehicle that has previously, possibly independently, learned the security access mode from an external information database which stores accumulated and shared security access mode information.
In the above examples the instructions 38 are input to the input-device 36 by the occupant 18 of the host-vehicle 12. However, it is also contemplated that the instructions 38 may be down-loaded from a website or a secure database repository. For example, the camera may be used to ‘read’ a quick-reference (QR) code or text that indicates a uniform-resource-locator (URL), and the system 10 may access a website related to the QR code or URL to receive the instructions 38.
The system 10 also includes a controller 42 in communication with the identification-device 24 and the input-device 36. The controller 42 may include a processor (not specifically shown) such as a microprocessor or other control circuitry such as analog and/or digital control circuitry including an application specific integrated circuit (ASIC) for processing data as should be evident to those in the art. The controller 42 may include memory (not specifically shown), including non-volatile memory, such as electrically erasable programmable read-only memory (EEPROM) for storing one or more routines, thresholds, and captured data. The one or more routines may be executed by the processor to perform steps for executing the instructions 38 based on signals received by the controller 42 from the input-device 36 as described herein.
The controller 42 is programmed or configured to operate the identification-device 24 based on the instructions 38 to convey the access-authorization 26 to the security-device 28 when the host-vehicle 12 approaches the secured-area 20. In order for the system 10 to determine the location of the host-vehicle 12, the system may include a location-detector 44 such as a global-positioning-system (GPS) receiver that receives signals from satellites to determine the location of the host-vehicle with respect to a digital-map (not shown), as will be recognized by those in the art. The location detector may use objects from a map database and align those map objects with sensor detections from radars, lidars, cameras, ultrasonic transducers or other sensors to determine a location on a map. In instances when the occupant 18 manually enters the instructions 38, or is otherwise instrumental in the process of the controller 42 receiving the instructions 38, it is contemplated that the instructions for the particular instance of the control-site 22 at the location may be up-loaded to a network-server (i.e. stored ‘in the cloud’) to retain the instructions 38 for future use by other-vehicles that encounter the same instance of the control-site 22.
Returning now to non-limiting examples of various possible configurations of the identification-device 24 and the security-device 28, in one embodiment of the system 10 the identification-device 24 may be or include the display 30 that may be mounted on the host-vehicle 12 where it may be readily seen by a security-camera 46 and/or a human-being 48, i.e. a security-guard. The display 30 may convey the access-authorization 26 as text that can be read by the security-guard, or the access-authorization 26 may be a bar-code and/or a sequence of lights/colors that can be captured by the security-camera 46 and interpreted by a computer (not shown) that is part of the security-device 28 at the control-site 22.
If the identification-device 24 is or includes the transmitter 32, the transmitter 32 may broadcast a radio-frequency (RF) signal similar to that used to operate garage-door-openers. Alternatively, the transmitter 32 may be part of a transceiver that provides for bi-directional communication with the security-device 28 so that the system 10 has a more sophisticated security protocol than that associated with a garage-door-opener. It is also contemplated that if both the identification-device 24 and the security-device 28 are or include transceivers, then the instructions 38 may be conveyed to the host-vehicle 12 by the security-device 28 so that the occupant 18 and/or the host-vehicle 12 will be more readily identified during some future instance of the host-vehicle 12 arriving at the control-site 22.
If the identification-device 24 is or includes the acoustic-transducer 34, that device may be a speaker that conveys an audible form of the access-authorization 26 to the security-guard 48. Alternatively, the acoustic-transducer 34 may be an ultrasonic-transducer 50A (
The system 10 may also include a payment-device 54 (
Accordingly, a secured-area access system (the system 10), a controller 42 for the system 10, and a method of operating the system 10 is provided. The system 10 provides the means by which the security of a secured-area 20 can be maintained while automating the authorization process by removing much of the burden to the occupant 18 to, for example, show identification, enter a security-code into a key-pad at a control-site 22, or inefficiently communicate verbally with a human-being 48 such as security-guard.
While this invention has been described in terms of the preferred embodiments thereof, it is not intended to be so limited, but rather only to the extent set forth in the claims that follow.