The security and the usage of motor vehicles is problematic for many vehicle owners but especially vehicle fleet operators. Prior art mechanical keys are relatively easy to defeat, which makes cars and trucks equipped with them relatively easy to take. Wireless or keyless entry systems provide a somewhat better security than mechanical keys but they too can be defeated.
In addition to being relatively easy to defeat, prior art vehicle security devices provide no control over vehicle usage nor do they provide any sort of history or record of a vehicle's use and are therefore of little value to vehicle owners who wish to limit how a vehicle is used, by whom it is used, as well as when and where it is used. A vehicle security device, that provides a higher level of security, and which can limit or control who uses a vehicle, limit or control how and where it is used, and record what it has been used to do would be an improvement over the prior art.
Wireless ignition keys, also known as keyless entry systems, are well-known in the art. In a keyless entry system, a low-power radio frequency signal is broadcast from a vehicle 20. When a wireless ignition key 30 is within range of the signal broadcast by the vehicle 20, the wireless ignition key 30 responds with a second radio frequency transmission to the vehicle 20. A “hand-shaking” takes place between the wireless ignition key 30 and the vehicle 20 to identify the ignition key 30 as corresponding to the vehicle 20. A successful registration of the wireless key 30 enables the vehicle 20 to be operated.
The electronic vehicle security key disclosed herein operates separately and independently from a wireless ignition key 30. The electronic vehicle security key 50 disclosed herein participates in its own “hand-shaking” with the vehicle 20.
In a first embodiment, two protected memory locations, ranges or devices physically within the electronic vehicle security key 50, store vehicle-operation data and user data respectively. Vehicle-operation data includes information, specifications about the vehicle, maintenance records and requirements and limitations as to how a particular vehicle should be used. Vehicle-operation data also includes data that uniquely identifies one or more electronic vehicle security keys 50 that can be used with the vehicle and by which the electronic vehicle security key 50 can be identified by a vehicle 20.
Vehicle-operation data also includes but is not limited to vehicle use limitations. Vehicle use limitations include, but are not limited to a geographic range or coordinates wherein the vehicle may be used. Vehicle use information can also include geographic coordinates or locations beyond which the vehicle operation should be interrupted.
Vehicle-operation data includes information that specifies or identifies one or more individuals as authorized users, i.e., people who have permission or qualifications to operate a motor vehicle 20. Authorized user data can be embodied as numbers or strings of alpha-numeric characters but can also include biometric data such as a person's fingerprint or retinal pattern.
Vehicle-operation data also includes a record of a vehicle's use. A record or history of a vehicle's use can include a driver's habits, acceleration, braking and so forth as well as the dates, times, and locations of stops that a vehicle user made over a user-defined period of time.
In addition to storing user-operation data, the electronic vehicle security key has one or more separate memory locations, address ranges or devices wherein user data is stored. User data includes but is not limited to navigation information. Navigation information for a user can include a route that a user is to follow, destinations or locations that a user stops at or is expected to stop at, dates, times of operation, acceleration, and braking habits and fuel economy information. In instances where a vehicle is part of a for-hire fleet, user-operation data includes payment information. Payment information can include a credit card number, or an accumulation of fees and costs accruing to the fleet operator by virtue of the user's operation.
A principal difference between vehicle-operation data and user data is that user data can be changed by a user of either a vehicle or of the electronic vehicle security key. Vehicle-operation data can be changed by either a vehicle or a system administrator, an example of which would be a fleet owner or operator. The vehicle-operation data and the user-operation are stored in protected memory devices of the electronic vehicle security key 50 to prevent the data stored therein from being compromised and vehicle security lost as a result thereof. Vehicle-operation data is stored in a first protected memory device 570. User-operation data is stored in a second and different protected memory device 580.
While
Separate memory address locations, address ranges or physical devices are considered herein as being protected because read and write access to them is restricted. Access control is implemented by program instructions, which are stored in program memory device 560 and executed by the CPU 510.
In one embodiment, the CPU 510 provides the first and second memories 570 and 580 with different levels of access-protection by encrypting the contents of the respective memories differently. The encryptions are performed according to program instructions stored in a program memory 560. When these program instructions are executed by the CPU 510, the contents of the memories are encoded differently such that decoding them requires different decryption algorithms. The access to the memories 570 and 580 can thus be controlled by controlling the decryption algorithm.
In one embodiment, a robust encryption algorithm executed by the CPU 510 encrypts the contents of the first protected memory 570 such that read and write access to the first protected memory 570 is available to only a system administrator or a particular vehicle 20 associated with the electronic vehicle security key 50. Information in the first protected memory 570 can be read and used by a controller for a particular vehicle 20 associated with the electronic vehicle security key 50. Information in the first protected memory 570 can also be read and used by controllers in other vehicles 20 that might also be associated with the electronic vehicle security key 50. Information in the first protected memory 570 can be read, written, and transmitted by controllers in other, separate devices such as personal computers operated by a system administrator. By way of example, an eVSK having a universal serial bus or “USB” interface 540 can be plugged into the USB port of a system administrator's personal computer whereby data stored on the eVSK can be uploaded to the system administrator's computer for analysis. Data can also be downloaded from the system administrator's computer into the eVSK. Data downloaded to the first protected memory determines or controls how a vehicle associated with the eVSK can be operated.
A second access-protection level embodied as a less-robust encryption, or no encryption enables read and write access to the second protected memory 580 by an authorized user of the vehicle 20, a system administrator or a particular vehicle 20 that the electronic vehicle security key 50 is to be used with.
In one embodiment, different access protection levels are provided by using different encryption schemes for information stored in the protected memory devices 570 and 580. In another embodiment, access protection can be provided by strictly limiting read and write access by the CPU 510 under program control. Stated another way, instructions stored in program memory 560 can be provided that, when executed, prohibit the CPU 510 from reading or writing to any of the address locations within the corresponding protected memories.
Vehicle-operation data is exchanged with a vehicle 20 via a vehicle transceiver 520 operatively coupled to the CPU 510 by a bus, well-known to those of ordinary skill in the electronics art. The vehicle transceiver 520 is comprised of a transmitter and receiver which communicate using an RF (radio frequency) communications link. A corresponding transceiver in the vehicle, and which is depicted in
User data is written into and read from the electronic vehicle security key using a different radio interface. In one embodiment, a Bluetooth transceiver 530, which is also coupled to the CPU 510 via the same bus, enables information and data to be transferred into the second protected memory 580 via the Bluetooth communications link. Historical data such as a vehicle's usage, which would be obtained from the vehicle 20 via the vehicle transceiver 520 and stored in the second protected memory 580, can be read from the electronic vehicle security key 50 via the Bluetooth transceiver 530. The Bluetooth transceiver 530 thus provides a second radio link by which an authorized vehicle user, an administrator or even a vehicle having a corresponding Bluetooth transceiver can send and receive information to and from the electronic vehicle security key 50.
In addition to exchanging user data, the Bluetooth transceiver 530 can also be used to read and write vehicle-operation data into and out of the first protected memory 570. The same protocol that would be used to exchange user data can thus be used to exchange vehicle-operation data.
In addition to a wireless interface to the electronic vehicle security key, in another embodiment also depicted in
In another embodiment, also depicted with
Using appropriate program instructions stored in program memory 560, the electronic vehicle security key 50 can limit vehicle usage to a particular individual whose biometric data is stored in one or both of the protected memories 570 and 580. By reading biometric data from the biometric sensor 550 the CPU 510 can readily determine whether or not the person whose biometric data was read by the sensor 550 is authorized to use the vehicle or determine the extent or nature of the privileges to be provided to the user whose data was read.
Biometric data read by the sensor 550 can be verified by the CPU 510 and the results of that comparison transmitted to the vehicle 20 via the vehicle transceiver 520. The electronic vehicle security key 50 thus intercepts or prevents operation of the vehicle 20 by inhibiting or authorizing the operation of the vehicle 20.
In another embodiment, a keyless entry transceiver 670 exchanges signals with the keyless entry key fob or wireless ignition key 30 described above and shown in
In another embodiment, the ECU 600 is provided with an electronic vehicle security key connector 690. In one embodiment, the vehicle security key connector 690 is embodied as a USB connector accessible from the vehicle dashboard. In such an embodiment, the vehicle security key 50 is provided with a mating USB connector 700. When the vehicle security key 50/52 is inserted to the vehicle security key connector 690 in the dash, information in the protected memories 570 and 580 within the electronic vehicle security key 50 can be exchanged with the vehicle 20 via the USB port 540 within the vehicle security key 50. The electronic vehicle security key 50 can thus be considered a wired, i.e. non-wireless device.
As set forth above, and as shown in
In as much as the electronic vehicle security key 50 can, in one embodiment, be inserted into an electronic key fob 30 or a fob holding the electronic security key 50 can be provided with a mechanical key, another embodiment of the vehicle security device includes an ignition key as both a mechanical device and a wireless device. In instances where the electronic vehicle security device 50 is inserted into a wireless or keyless entry fob 30 the ignition key functionality will be provided by its own processor. Such a device will also typically include its own memory device coupled to the corresponding processor by which the parameters exchange between the key 30 and vehicle 20 can be kept.
From the foregoing description, those of ordinary skill in the art will recognize that a method of controlling a vehicle is implemented using the structures depicted in the figures. A vehicle, such as an automobile or truck can be controlled and its usage tracked by reading vehicle-operation data from a first protected memory location or address range or device. Upon the determination or evaluation of the vehicle operation data, as a second step authorized-user operational data can also be read from other locations or devices. The information read from the memory devices that hold vehicle-operation data and user-operation data can be evaluated and transmitted to the vehicle over a wireless data link by which the operation and usage of the vehicle can be controlled according to the parameters read from the corresponding memories.
In embodiments described above, the vehicle-operation data and user-operation data are kept in separately protected memory locations, memory ranges or memory devices. Keeping such data separate, and separately protected, using different protection schemes, is intended to thwart the circumvention of the security that is intended to be provided with respect to controlling use of a vehicle and storing and retrieving data regarding how a vehicle has been used.
The foregoing description is for purposes of illustration only. The true scope of the invention is set forth in the appurtenant claims.