The present invention generally relates to controlling an operation of a vehicle and, more particularly, to a method, system, and program product that controls an operation of the vehicle based on the presence of a foreign object within a monitored zone about the vehicle and/or absence of an object of the vehicle.
During normal operation of a vehicle, such as an automobile, various mechanical structures and electrical circuits are active. The presence of a foreign object (an object that generally should not be present during normal operation of the vehicle) near such structures and/or circuits when the vehicle is being operated may lead to a situation in which the vehicle and/or the object can be damaged. An example includes a multimeter left within the engine. If the multimeter moves into rotating fan blades of an operating vehicle, the multimeter and/or the fan may become damaged, if a lead wire of the multimeter moves up against a terminal of the battery, the lead wire may short the battery, etc. Likewise, absence of an object of the vehicle that should be present during operation of the vehicle may lead to a situation in which the vehicle is damaged. An example includes an oil cap for the oil entry port on the engine. Operating a vehicle without the oil cap may result in loss of oil via the oil entry port and contamination of the oil as a result of debris entering the oil entry port, and operating the vehicle with less than the recommended volume of oil and/or contaminated oil may result in engine damage.
In one aspect, a system includes a first transceiver that receives first information about a first foreign object in a first zone of the vehicle. The first foreign object is an object that generally is not present when the vehicle is running. The system further includes a first controller that generates a signal that inhibits the vehicle from starting based on the first information about the first foreign object and the first zone.
In another aspect, a method includes receiving information about a foreign object in a zone of the vehicle, identifying the foreign object from the information, identifying a first action corresponding to the foreign object, wherein the first action includes inhibiting the vehicle from starting, and performing the first action.
In another aspect, a method includes producing computer executable program code, storing the code on a computer readable medium, and providing the program code to be deployed and executed on a computer system. The program code comprising instructions which, when executed on the computer system, cause the computer system to: receive information about a foreign object in a zone of the vehicle, identify the foreign object from the information, and identify an action corresponding to the foreign object, wherein the action includes inhibiting the vehicle from starting.
In another aspect, a method for deploying an application for controlling an operation of a vehicle based on the presence and/or absence of an object includes providing a computer infrastructure being operable to: receive information about a foreign object in a zone of the vehicle, identify the foreign object from the information, and identify an action corresponding to the foreign object, wherein the action includes inhibiting the vehicle from starting.
These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:
The drawings are not necessarily to scale. The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
For convenience purposes, the Detailed Description of the Invention has the following sections
I. General Description
II. Computerized Implementation
I. General Description
The system 100 includes N transceivers, wherein N is a positive integer equal to or greater than one. For clarity and sake of brevity, only two of the transceivers, T1 106 and TN 108, are shown. The transceivers T1 106 and TN 108 respectively receive information that traverses respective zones 110 and 112. In this example, the zone 110 is generally spherical in shape and the zone 112 is generally spheroidal in shape. However, other shapes are also contemplated herein. For instance, a suitable zone may have an ellipsoid, a paraboloid, a hyperboloid, a conical, an irregular, and/or other shape.
The size of the zones 110 and 112 are configurable so that each zone can be used to receive information within a particular region. In the illustrated example, the zone 110 encompasses a first region that generally corresponds to the region in which the engine resides. The zone 112 encompasses a second region that generally corresponds to the region in which a fuel entry port to the fuel tank resides. The second region covers an area within the perimeter of the vehicle as well as an area outside of the perimeter of the vehicle. The information can be used to locate a foreign object within a particular zone based on the zone. For instance, receiving information by the transceivers T1106 indicates that the information came from the region in which the engine resides. In another implementation, such zones overlap.
The transceivers T1 106 and TN 108 include various wireless technology. For explanatory purpose and sake of brevity, the example illustrated in
The system 100 further includes a storage component 124 such as a memory, a database, etc. that stores information related to an object(s) that should not be and/or an object(s) that should be located with the vehicle during operation of the vehicle. The storage component 124 also stores rules or the like that facilitate identifying one or more responses depending on whether a foreign object is present or an object of the vehicle is absent. The rules stored in the storage component 124 may be modified and/or deleted via a communication interface (I/F) 126 used to communicate with a device external to the vehicle such as a network, a computer, a client, etc. In addition, new rules may be added to the storage component 124 via the communication I/F 126.
An example of a suitable response is a notification. A notifier 128 is used provide notifications. Such notifications may be audible, visual, tactile, etc. For instance, a notification may include displaying an alphanumeric message on a display screen, selectively and variously illuminating lights such as light emitting diodes (LEDs) or other lights, etc. Alternatively or additionally, a speaker or the like may be used to produce a beep, a bell, a song, a human discernable messages, etc. Alternatively or additionally, a transducer may be used to convert a signal into mechanical movement such as, but not limited to, a vibration. The notifier 128 may also communicate the notification to a system external to the vehicle. For instance, the notification may be sent to a cell phone, an email address, a pager, a printer, etc.
Another example of a suitable response is a signal indicative of an action to perform or a signal that invokes the action to be performed. An action identifier 130 conveys such signals. In one instance, the signal may indicate that the vehicle's ignition should remain in or transition to an off state. Such a signal may be conveyed to the ignition control system and/or other component that controls the ignition. As such, the recipient component of the signal may turn the vehicle off or ignore the signal based on the signal and/or other information. In another instance, the signal causes the ignition to turn off.
The following provides a non-limiting example of the system 100 in operation. In this example, the emitter E1 114 is affixed to a socket wrench left with the engine. The wrench is considered a foreign object since it should not be with the engine when the vehicle is being operated. The emitter EI 116 is affixed to an air filter. The air filter is absent from the vehicle in this example, as indicated via the dotted lines. As such, emitter EI 116 represents an object of the vehicle that should be in the vehicle when the vehicle is being operated. Without the air filter, debris that would otherwise be filtered passes through and may increase the likelihood of damage and a subsequent repair.
The emitter EJ 118 is affixed to the fuel cap, which also represents an object of the vehicle that should be with the vehicle when the vehicle is being operated but is absent, as indicated via the dotted lines. With the fuel door closed, debris may still be prevented from entering the fuel tank; however, fuel emissions may more easily escape into the environment. The emitter EJ is affixed to or part of a device external to the vehicle such as a cell phone, an electronic gamming system, a lighter, etc. The emitter EM is affixed to a tire iron left with the engine. Like emitter E1 114, the tire iron is considered a foreign object since it should not be with the engine when the vehicle is being operated.
The emitter E1 114, when subjected to an electromagnetic or other field produced by the transceiver T1 106 or on its own, emits information related to the socket wrench to which it is affixed. Such information may include information about the nature of the socket wrench as indicia that identifies it as a socket wrench. Additionally or alternatively, the information may include information regarding the size of the socket wrench, the shape of the socket wrench, how the socket wrench is used with the vehicle, whether the socket wrench is a type of object that securely attaches to the vehicle, the durability of the socket wrench, etc. Such information is provided to the controller C1 104 along with socket wrench location information, which may be obtained from the emitter E1 114 and/or the transceiver T1 106.
The controller C1 104 accesses the storage component 124 for the information about the nature and/or a characteristic of the socket wrench and/or one or more related rules. For instance, where the information identifies the socket wrench as a socket wrench, the controller C1 104 may map the socket wrench to a response to a socket wrench being located in the engine in a look up table or the like in the storage component 124. Where a characteristic about the socket wrench is additionally or alternatively provided, the controller C1 104 may map the characteristics to a response to such characteristic in the engine in a look up table or the like in the storage component 124. When both the nature and a characteristic are available, the results from using both may be compared to verify the response is suitable, to provide a primary and a backup response, to offer a choice of two suitable responses, etc. Where neither the type nor the characteristic is in the storage component 124, the controller C1 104 may use a classifier, an inference engine, a history of responses, and/or the like to facilitate determining an appropriate response.
In one instance, the response may be to have the notifier 128 provide a message that indicates that a socket wrench is within the zone covering the engine. The message may include the identity of the socket wrench. For example, the display and/or speaker may provide a message stating that a socket wrench is within the engine region. In another instance, the message may indicate that a foreign object is located with the engine and that it is likely to be lost or damaged if not removed or secured before the vehicle is operated and/or that the vehicle is likely to be damaged if the foreign object is not removed before the vehicle is operated.
Additionally or alternatively, the response may be to have the action identifier 130 provide a signal that indicates that the vehicle should not be started without removing the foreign object or a signal that inhibits the vehicle from being started. The signal may be directly or indirectly provided to the ignition control system and/or main computing system of the vehicle. A message indicating such action has occurred may also be presented by the notifier 128.
The transceiver T1 106 receives similar information from the emitter EM, which, as indicated above, is affixed to a tire iron, which is a foreign object. Since a tire iron is not likely to be substantially damaged if it falls to the ground, the message may indicate that the foreign object or the tire iron is located with the engine and is likely to be lost or cause damage to the vehicle. As with the socket wrench, the response may be to have the action identifier 130 provide a signal that indicates that the vehicle should not be started without removing the object or a signal that inhibits the vehicle from being started.
Upon reading information from emitters present within the reading zones 110 and 112, the controller C1 104 may also access the storage component 124 to determine whether a component that should be in one of the zones is located in one of the zones. In this example, the emitter EI, which is affixed to the air filter, should be present but is not. As such, the controller C1 104 does not receive information about the air filter, and the controller C1 104 identifies the air filter as a missing component.
In this case, the response may be to have the notifier 128 provide a message that indicates that the air filter is absent using the display, the speaker, etc. The message may also indicate that running the vehicle without the air filter may result in detrimental affects that would otherwise not happen if the air filter were present. Additionally or alternatively, the action may be to have the action identifier 130 provide a signal that indicates that the vehicle should not be started without the air filter or signal that inhibits the vehicle from being started.
The controller C1 104 also identifies the missing fuel cap as an object of the vehicle that is not located within the zone 112. In this case, the response may be to have the notifier 128 provide a message that indicates that the fuel cap is absent using the display, the speaker, etc. The message may also indicate that as a result fuel emissions greater than that which would be emitted if the cap were installed are likely to be emitted. Since, generally, with the fuel door closed, debris should still be blocked from entering the fuel tank, a signal that indicates that the vehicle should not be started or that inhibits the vehicle from being started may not be generated and sent.
The information from emitter EK regarding the cell phone, in this example, alone does not present a situation in which the vehicle or the cell phone can be damaged. As such, the information may be stored or discarded, acted upon or ignored, etc. For instance, a response may be to do nothing. In addition, the information may be stored and used in conjunction with other stored information to determine responses as described below. For example, the information related to the missing fuel cap and the cell phone may be used in conjunction to identify a situation that warrants a response such as a notification and/or inhibiting an operation of the vehicle. For instance, as known, an operating cell phone has been known to generate a spark or the like that may cause inadvertent combustion of fuel. As such, controller C1 104 may derive from the stored information and/or the rules that a potentially dangerous situation exists. As such, the notifier 128 may provide a corresponding message and/or signal as described above.
It is to be appreciated that a particular situation may be ranked according to the potential outcome of not changing the situation. For instance, in the example provided above, the combination of the missing fuel cap and the operating cell phone may be ranked high since such a situation may result in inadvertent fuel combustion. The missing air filter may be ranked lower since the damage, if any, is likely to be relatively less. The socket wrench may be ranked next since damage could occur to both the vehicle and the socket wrench. The tire iron may be ranked next since damage is likely to occur to the vehicle, but not the tire iron. The missing gas cap may be ranked next since damage to the vehicle and the gas cap is likely not to occur. The operating cell phone may be ranked last since it is external to the vehicle and alone does not present any problems for the vehicle or the cell phone. Of course, the above scenarios and rankings are for explanatory purposes and do not limit the contemplated embodiments.
It is also to be appreciated that the information in the storage component 124 may be communicated over the communication interface 126. As such, the information may be analyzed and/or an response resulting therefrom may be identified external to the vehicle by a component external to the vehicle. The results of such an analysis and/or the identified response can be communicated back to system 100 via the communication interface 126. It is to be appreciated that such communication may be via a personal area network, over the Internet, or the like. In addition, the information obtained from the emitters may be included in and/or form part of a history.
Although the above described the system 100 as detecting foreign objects and missing objects, it is to be understood that that in another implementation system 100 either may not detect the absence of objects of the vehicle or may not detect the presence of a foreign object. In addition, the user may override the system 100. Thus, the user may start the vehicle after the system inhibits the vehicle from starting. For example, the user may enter authorization indicia (e.g., a code, a fingerprint, an iris scan, a password, etc.) that allows the user to override the system 100.
At 404, the region in which the object is located is identified. For instance, the obtained information may include regional information. For example, the information provided for a fuel cap may indicate that it is a fuel cap, and the region of the fuel entry port to the fuel tank may be known to the vehicle. In another instance, since the fuel cap generally is always in the same location when installed on the fuel entry port, the identity of the fuel cap connotes the region. In yet another example, the identity of the transceiver identifies the location of the foreign object based on the region covered by the transceiver.
At 406, the information from the object is used to identify the nature of the object and/or a characteristic of the object. For instance, the information may indicate the type of the object (e.g., wrench) and/or whether the object may cause sparks. At 408, based on the nature and/or characteristic, a response is identified. As noted above, this may include mapping the nature and/or characteristic to a look up table, deriving a response based on the nature and/or characteristic of several present and/or absent objects, etc. At 410, a corresponding action is performed. As noted above, the response may include providing a notification, a signal that indicates an action to perform, a signal that invokes an action, a null action, etc.
With respect to
At 504, the information about the object(s) is compared with information about monitored objects that should be present in the vehicle to determine if an object that should be present is absent. At 506, based on the nature and/or characteristic of the object, an action is identified. As noted above, this may include mapping the nature and/or characteristic to a look up table, deriving an action based on the nature and/or characteristic of several present and/or absent objects, etc. At 508, a corresponding action is performed. As noted above, the response may include providing a notification, a signal that indicates an action to perform, a signal that invokes an action, a null action, etc.
Another method includes receiving information about a foreign object in a zone about a vehicle, identifying the foreign object from the information, identifying a first action corresponding to the foreign object, wherein the first action includes inhibiting the vehicle from starting, and performing the first action. This method may also include receiving information about the absence of an object of the vehicle, identifying the object from the information, identifying a second action corresponding to the object, wherein the second action includes inhibiting the vehicle from starting, and performing the second action. This method may also include notifying a user of a possible consequence to the vehicle if the vehicle is started without the object.
This method may also include identifying a characteristic of the foreign object from the information, identifying a second action corresponding to the characteristic, wherein the second action includes inhibiting the vehicle from starting, and performing the second action. In one instance, the first action is identified in a computing system of the vehicle. In another instance, the first action is identified in a computing system external to the vehicle. This method may also include notifying a user of a possible consequence to the vehicle if the vehicle is started without removing the foreign object. This method may also include providing the first action to an ignition control system of the vehicle.
Another method includes producing computer executable program code, storing the code on a computer readable medium, and providing the program code to be deployed and executed on a computer system, the program code comprising instructions which, when executed on the computer system, cause the computer system to: receive information about a foreign object in a zone of the vehicle, identify the foreign object from the information, and identify an action corresponding to the foreign object, wherein the action includes inhibiting the vehicle from starting.
Another method includes deploying an application for controlling an operation of a vehicle based on presence and/or absence of an object, comprising: providing a computer infrastructure being operable to: receive information about a foreign object in a zone of the vehicle, identify the foreign object from the information, and identify an action corresponding to the foreign object, wherein the action includes inhibiting the vehicle from starting.
II. Computerized Implementation
Referring now to
In the case of the former, communication throughout the network can occur via any combination of various types of communication links. For example, the communication links can comprise addressable connections that may utilize any combination of wired and/or wireless transmission methods.
Where communications occur via the Internet, connectivity could be provided by conventional TCP/IP sockets-based protocol, and an Internet service provider could be used to establish connectivity to the Internet. Still yet, computer infrastructure 608 is intended to demonstrate that some or all of the components of implementation could be deployed, managed, serviced, etc. by a service provider who offers to implement, deploy, and/or perform the functions of the present invention for others.
As shown, the computer system 604 includes a processing unit 612, a memory 616, a bus 620, and input/output (I/O) interfaces 624. Further, the computer system 604 is shown in communication with external I/O devices/resources 628 and storage system 632. In general, the processing unit 612 executes computer program code, such as the code to implement various components of the system 100, which is stored in memory 616 and/or storage system 632. It is to be appreciated that two or more, including all, of these components may be implemented as a single component.
While executing computer program code, the processing unit 612 can read and/or write data to/from the memory 616, the storage system 632, and/or the I/O interfaces 624. The bus 620 provides a communication link between each of the components in computer system 604. The external devices 628 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact with computer system 604 and/or any devices (e.g., network card, modem, etc.) that enable computer system 604 to communicate with one or more other computing devices.
The computer infrastructure 608 is only illustrative of various types of computer infrastructures for implementing the invention. For example, in one embodiment, computer infrastructure 608 comprises two or more computing devices (e.g., a server cluster) that communicate over a network to perform the various process steps of the invention. Moreover, computer system 604 is only representative of various possible computer systems that can include numerous combinations of hardware.
To this extent, in other embodiments, computer system 604 can comprise any specific purpose-computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general-purpose hardware/software, or the like. In each case, the program code and hardware can be created using standard programming and engineering techniques, respectively.
Moreover, the processing unit 612 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server. Similarly, the memory 616 and/or the storage system 632 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations.
Further, I/O interfaces 624 can comprise any system for exchanging information with one or more of the external device 628. Still further, it is understood that one or more additional components (e.g., system software, math co-processing unit, etc.) not shown in
The storage system 632 can be any type of system (e.g., a database) capable of providing storage for information under the present invention. To this extent, the storage system 632 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive. In another embodiment, the storage system 632 includes data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown). In addition, although not shown, additional components, such as cache memory, communication systems, system software, etc., may be incorporated into computer system 604.
Shown in the memory 616 of computer system 604 is the system 100, which includes the components and performs the functions discussed above. In the illustrated embodiment, the system 100 communicates with external entities 636 such as another vehicle computing system, a system that identifies an action to perform based on the object, a system for modifying the contents of the storage component 124, other apparatuses external to the vehicle, etc. over a path 440, which may be wired (as shown) or wireless.
While shown and described herein as a method and a system, it is understood that the invention further provides various alternative embodiments. For example, in one embodiment, the invention provides a computer-readable/useable medium that includes computer program code to enable a computer infrastructure to perform the process steps of the invention. To this extent, the computer-readable/useable medium includes program code that implements each of the various process steps of the invention.
It is understood that the terms computer-readable medium or computer useable medium comprise one or more of any type of physical embodiment of the program code. In particular, the computer-readable/useable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as the memory 616 (
In another embodiment, the invention provides a business method that performs the process steps of the invention on a subscription, advertising, and/or fee basis. That is, a service provider could offer to manage the system 100. In this case, the service provider can create, maintain, support, etc., a computer infrastructure, such as the computer infrastructure 608 (
In still another embodiment, the invention provides a computer-implemented method for executing the system 100. In this case, a computer infrastructure, such as computer infrastructure 608 (
As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions intended to cause a computing device having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form. To this extent, program code can be embodied as one or more of: an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like.
Certain examples and elements described in the present specification, including in the claims and as illustrated in the Figures, may be distinguished or otherwise identified from others by unique adjectives (e.g. a “first” element distinguished from another “second” of a plurality of elements, a “primary” distinguished from a “secondary,” an “another”, etc.). Such identifying adjectives are generally used to reduce confusion or uncertainty, and are not to be construed to limit the claims to any specific illustrated element or embodiment, or to imply any precedence, ordering or ranking of any claim elements, limitations or process steps.
The foregoing description of various aspects of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible. Such modifications and variations that may be apparent to a person skilled in the art are intended to be included within the scope of the invention as defined by the accompanying claims.
Number | Name | Date | Kind |
---|---|---|---|
4897630 | Nykerk | Jan 1990 | A |
6944528 | Nagano | Sep 2005 | B2 |
6995652 | Carrender et al. | Feb 2006 | B2 |
7084767 | Hasegawa et al. | Aug 2006 | B2 |
7176801 | Matsukawa et al. | Feb 2007 | B2 |
7202776 | Breed | Apr 2007 | B2 |
7236798 | Beuck | Jun 2007 | B2 |
7408445 | Cunningham | Aug 2008 | B1 |
7737833 | Takafuji | Jun 2010 | B2 |
8060282 | Breed | Nov 2011 | B2 |
20020097146 | Harris, III | Jul 2002 | A1 |
20040019426 | Knoop et al. | Jan 2004 | A1 |
20050134440 | Breed | Jun 2005 | A1 |
20060238316 | Taki et al. | Oct 2006 | A1 |
20080255731 | Mita et al. | Oct 2008 | A1 |
20080284575 | Breed | Nov 2008 | A1 |
20090045928 | Rao et al. | Feb 2009 | A1 |
20090240400 | Lachapelle et al. | Sep 2009 | A1 |
20100145563 | Boss et al. | Jun 2010 | A1 |
20100268423 | Breed | Oct 2010 | A1 |
Number | Date | Country | |
---|---|---|---|
20100145563 A1 | Jun 2010 | US |