Method and apparatus for vehicle hardware theft prevention

Abstract
A computer-implemented method includes determining that an infotainment system has been activated. The method further includes accessing a vehicle network containing at least a unique vehicle identifier. The method additionally includes comparing the unique vehicle identifier to a stored vehicle identifier. The method further includes permitting access to the infotainment system only if the unique vehicle identifier matches the stored vehicle identifier.
Description
TECHNICAL FIELD

The illustrative embodiments generally relate to a method and apparatus for vehicle hardware theft prevention.


BACKGROUND

Vehicle security is a constant source of concern to owners of vehicles. From vehicle alarms, to vehicle tracking systems, numerous security measures have been developed over the years to provide protection to owners and to prevent theft.


Vehicle security systems often will produce a loud noise or alarm if the vehicle is compromised or tampered with. These alarms are designed as a deterrent, and can alert bystanders to the presence of a thief, and may serve to scare the thief away before a crime is completed. Such systems can also help reduce insurance rates and may be required to obtain the most desirable rates.


Some security systems can even alert an owner of a potential theft, or alert authorities. Due to the fact that an alerted party may take some time to arrive at the vehicle, however, theft may be complete by the time the notified party has arrived.


In some instances, theft deterrent systems may even track the location of a vehicle. This can assist in capture of a thief, and recovery of the vehicle if the vehicle itself has been stolen. If vehicle components, such as a stereo, navigation system, entertainment system, etc. are stolen, however, the tracking device may be unable to provide a vehicle location.


These components, once they have been taken from the vehicle, stand very little chance of recovery unless the thief is captured or a storehouse is found. Once they have been sold and installed into different vehicles, it may almost be impossible to discover the components and recover them. As such, if the thief acts quickly enough the thief may be able to remove some or all of the valuable components and escape. If an alarm system did not provide sufficient deterrent, there may be little else that can be done to deter a determined thief from stealing a component.


SUMMARY

In a first illustrative embodiment, a computer-implemented method includes determining that an infotainment system has been activated. The illustrative method further includes accessing a vehicle network containing at least a unique vehicle identifier.


In this embodiment, the illustrative method additionally includes comparing the unique vehicle identifier to a stored vehicle identifier. The illustrative method further includes permitting access to the infotainment system only if the unique vehicle identifier matches the stored vehicle identifier.


In a second illustrative embodiment, a computer readable storage medium, stores instructions that, when executed, cause a processor of a vehicle computing system to perform the method including determining that an infotainment system has been activated.


The illustrative method further includes accessing a vehicle network containing at least a unique vehicle identifier and comparing the unique vehicle identifier to a stored vehicle identifier. Also, the illustrative method includes permitting access to the infotainment system only if the unique vehicle identifier matches the stored vehicle identifier.


In a third illustrative embodiment, a system includes a vehicle computing system and at least one module running on the vehicle computing system. In this embodiment, the module is operable to access a vehicle network to determine if a unique vehicle identifier is present. The module is further operable to compare the unique vehicle identifier to a stored vehicle identifier. Also, the module is operable to permit access to the infotainment system only if the unique vehicle identifier matches the stored vehicle identifier.


In a fourth illustrative embodiment, a computer-implemented method includes determining that a requested upload corresponds to a procedure for unlocking a locked vehicle infotainment system. In this illustrative embodiment, the method includes verifying the authenticity of the requested upload. The illustrative method also includes activating a verified upload to unlock the locked vehicle infotainment system.


Also, in this embodiment, the method includes, responsive to the unlocking, deleting a VIN associated with the locked vehicle infotainment system. The method further includes obtaining a new VIN for association with the vehicle infotainment system, the new VIN being available on a vehicle bus in which the infotainment system is installed, and corresponding to the vehicle's VIN. Further, the method includes saving the new VIN as a VIN which must be detected upon system startup to prevent relocking of the vehicle infotainment system.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows an illustrative example of a vehicle computing system;



FIG. 2 shows an illustrative example of a verification process;



FIG. 3 shows an illustrative example of an unlock process;



FIG. 4 shows an illustrative example of VIN pairing process; and



FIG. 5 shows an illustrative example of a VIN recording process.





DETAILED DESCRIPTION

As required, detailed embodiments of the present invention are disclosed herein; however, it is to be understood that the disclosed embodiments are merely exemplary of the invention that may be embodied in various and alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimized to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention.



FIG. 1 illustrates an example block topology for a vehicle based computing system 1 (VCS) for a vehicle 31. An example of such a vehicle-based computing system 1 is the SYNC system manufactured by THE FORD MOTOR COMPANY. A vehicle enabled with a vehicle-based computing system may contain a visual front end interface 4 located in the vehicle. The user may also be able to interact with the interface if it is provided, for example, with a touch sensitive screen. In another illustrative embodiment, the interaction occurs through, button presses, audible speech and speech synthesis.


In the illustrative embodiment 1 shown in FIG. 1, a processor 3 controls at least some portion of the operation of the vehicle-based computing system. Provided within the vehicle, the processor allows onboard processing of commands and routines. Further, the processor is connected to both non-persistent 5 and persistent storage 7. In this illustrative embodiment, the non-persistent storage is random access memory (RAM) and the persistent storage is a hard disk drive (HDD) or flash memory.


The processor is also provided with a number of different inputs allowing the user to interface with the processor. In this illustrative embodiment, a microphone 29, an auxiliary input 25 (for input 33), a USB input 23, a GPS input 24 and a BLUETOOTH input 15 are all provided. An input selector 51 is also provided, to allow a user to swap between various inputs. Input to both the microphone and the auxiliary connector is converted from analog to digital by a converter 27 before being passed to the processor. Although not shown, numerous of the vehicle components and auxiliary components in communication with the VCS may use a vehicle network (such as, but not limited to, a CAN bus) to pass data to and from the VCS (or components thereof).


Outputs to the system can include, but are not limited to, a visual display 4 and a speaker 13 or stereo system output. The speaker is connected to an amplifier 11 and receives its signal from the processor 3 through a digital-to-analog converter 9. Output can also be made to a remote BLUETOOTH device such as PND 54 or a USB device such as vehicle navigation device 60 along the bi-directional data streams shown at 19 and 21 respectively.


In one illustrative embodiment, the system 1 uses the BLUETOOTH transceiver 15 to communicate 17 with a user's nomadic device 53 (e.g., cell phone, smart phone, PDA, or any other device having wireless remote network connectivity). The nomadic device can then be used to communicate 59 with a network 61 outside the vehicle 31 through, for example, communication 55 with a cellular tower 57. In some embodiments, tower 57 may be a WiFi access point.


Exemplary communication between the nomadic device and the BLUETOOTH transceiver is represented by signal 14.


Pairing a nomadic device 53 and the BLUETOOTH transceiver 15 can be instructed through a button 52 or similar input. Accordingly, the CPU is instructed that the onboard BLUETOOTH transceiver will be paired with a BLUETOOTH transceiver in a nomadic device.


Data may be communicated between CPU 3 and network 61 utilizing, for example, a data-plan, data over voice, or DTMF tones associated with nomadic device 53. Alternatively, it may be desirable to include an onboard modem 63 having antenna 18 in order to communicate 16 data between CPU 3 and network 61 over the voice band. The nomadic device 53 can then be used to communicate 59 with a network 61 outside the vehicle 31 through, for example, communication 55 with a cellular tower 57. In some embodiments, the modem 63 may establish communication 20 with the tower 57 for communicating with network 61. As a non-limiting example, modem 63 may be a USB cellular modem and communication 20 may be cellular communication.


In one illustrative embodiment, the processor is provided with an operating system including an API to communicate with modem application software. The modem application software may access an embedded module or firmware on the BLUETOOTH transceiver to complete wireless communication with a remote BLUETOOTH transceiver (such as that found in a nomadic device). Bluetooth is a subset of the IEEE 802 PAN (personal area network) protocols. IEEE 802 LAN (local area network) protocols include WiFi and have considerable cross-functionality with IEEE 802 PAN. Both are suitable for wireless communication within a vehicle. Another communication means that can be used in this realm is free-space optical communication (such as IrDA) and non-standardized consumer IR protocols.


In another embodiment, nomadic device 53 includes a modem for voice band or broadband data communication. In the data-over-voice embodiment, a technique known as frequency division multiplexing may be implemented when the owner of the nomadic device can talk over the device while data is being transferred. At other times, when the owner is not using the device, the data transfer can use the whole bandwidth (300 Hz to 3.4 kHz in one example). While frequency division multiplexing may be common for analog cellular communication between the vehicle and the internet, and is still used, it has been largely replaced by hybrids of with Code Domain Multiple Access (CDMA), Time Domain Multiple Access (TDMA), Space-Domain Multiple Access (SDMA) for digital cellular communication. These are all ITU IMT-2000 (3G) compliant standards and offer data rates up to 2 mbs for stationary or walking users and 385 kbs for users in a moving vehicle. 3G standards are now being replaced by IMT-Advanced (4G) which offers 100 mbs for users in a vehicle and 1 gbs for stationary users. If the user has a data-plan associated with the nomadic device, it is possible that the data-plan allows for broad-band transmission and the system could use a much wider bandwidth (speeding up data transfer). In still another embodiment, nomadic device 53 is replaced with a cellular communication device (not shown) that is installed to vehicle 31. In yet another embodiment, the ND 53 may be a wireless local area network (LAN) device capable of communication over, for example (and without limitation), an 802.11g network (i.e., WiFi) or a WiMax network.


In one embodiment, incoming data can be passed through the nomadic device via a data-over-voice or data-plan, through the onboard BLUETOOTH transceiver and into the vehicle's internal processor 3. In the case of certain temporary data, for example, the data can be stored on the HDD or other storage media 7 until such time as the data is no longer needed.


Additional sources that may interface with the vehicle include a personal navigation device 54, having, for example, a USB connection 56 and/or an antenna 58, a vehicle navigation device 60 having a USB 62 or other connection, an onboard GPS device 24, or remote navigation system (not shown) having connectivity to network 61. USB is one of a class of serial networking protocols. IEEE 1394 (firewire), EIA (Electronics Industry Association) serial protocols, IEEE 1284 (Centronics Port), S/PDIF (Sony/Philips Digital Interconnect Format) and USB-IF (USB Implementers Forum) form the backbone of the device-device serial standards. Most of the protocols can be implemented for either electrical or optical communication.


Further, the CPU could be in communication with a variety of other auxiliary devices 65. These devices can be connected through a wireless 67 or wired 69 connection. Auxiliary device 65 may include, but are not limited to, personal media players, wireless health devices, portable computers, and the like.


Also, or alternatively, the CPU could be connected to a vehicle based wireless router 73, using for example a WiFi 71 transceiver. This could allow the CPU to connect to remote networks in range of the local router 73.


In addition to having exemplary processes executed by a vehicle computing system located in a vehicle, in certain embodiments, the exemplary processes may be executed by a computing system in communication with a vehicle computing system. Such a system may include, but is not limited to, a wireless device (e.g., and without limitation, a mobile phone) or a remote computing system (e.g., and without limitation, a server) connected through the wireless device. Collectively, such systems may be referred to as vehicle associated computing systems (VACS). In certain embodiments particular components of the VACS may perform particular portions of a process depending on the particular implementation of the system. By way of example and not limitation, if a process has a step of sending or receiving information with a paired wireless device, then it is likely that the wireless device is not performing the process, since the wireless device would not “send and receive” information with itself. One of ordinary skill in the art will understand when it is inappropriate to apply a particular VACS to a given solution. In all solutions, it is contemplated that at least the vehicle computing system (VCS) located within the vehicle itself is capable of performing the exemplary processes.


In the illustrative embodiments, a vehicle component, such as, but not limited to, a vehicle computing system and/or vehicle infotainment system contains at least one module installed thereon that is capable of securing the module. Since vehicles have unique identification numbers, known as VINs, the module can be keyed to allow the system to operate only when installed in a vehicle whose VIN the module recognizes.


Thus, if the module is stolen and placed in a new vehicle, the module will not recognize the VIN, and will lock out the infotainment system. This should deter the theft of the systems, as they will only work in vehicles for which they were intended.


Of course, it is possible that the system will be permissibly removed, or recovered from an otherwise totaled vehicle and placed in a new vehicle with the permission of the system owner. In such an instance, the module may place the system in lockout mode. When the system is in lockout mode, however, an authorized service provider can be equipped with the capability to cause the system to begin normal operation, and re-pair itself with a new vehicle. In this manner, a system may not be rendered permanently inoperable if properly moved between vehicles.



FIG. 2 shows an illustrative example of a verification process. In this illustrative embodiment, at some point after the vehicle has been activated, such as in the case of a key-on event, the infotainment system will power up. This may cause the protection module (or similar software routine) to activated 201.


Once the module has been activated, it may first check to see if the system has already entered a lock-down state 203. An indicator that cannot be tampered with may have been set if a previous lock-down was engaged, and the module may be capable of detecting that the system is already in a state of lock-down 203. If this is the case, a screen may be displayed (or an audio output may be engaged) 205 to notify the vehicle owner that the system is currently locked and in very limited functionality mode. This display can include, but is not limited to, lock-out of non-critical functions, play-back on ignition cycle of a message that the module is not genuine, etc.


In at least one instance, the functionality is limited to the output of the lockdown message and the ability to communicate with a dealer system to disengage the locking mechanism. In at least one alternative embodiment, the original owner of the system, or a new authorized owner, may be given the ability to unlock the system through the input of a password, or through the uploading of software provided in conjunction with a request from the manufacturer. The user seeking to unlock the system may be required to provide some form of verification before an unlock capability is provided.


If the system is not currently in a lock-down mode, the module may access a vehicle network, such as, but not limited to, a CAN bus 207. Information about the vehicle, including, but not limited to, electronic VIN identification numbers, can be obtained over the CAN bus. Accessing the vehicle bus can give the module the ability to obtain a vehicle VIN 209.


If a VIN is not present 211, the module may persist in the attempts to discover the VIN. Due to a system error, the VIN may not be available (temporarily or permanently) and the vehicle manufacturer may have to determine whether a no-VIN state should result in system lockout or system accessibility. An alternative message, such as a VIN-error message, may be output to inform the user that a visit to a dealer may be required to repair the VIN-error. In at least one case, the module may allow access to the system for a limited number of times if an error occurs, before entering lockout mode. This will give an authorized user an opportunity to use the system while traveling to a dealer to have the issue repaired.


In another instance, the user may be able to input a temporary authorization code for the particular system. This can be obtained, for example, from a manufacturer or dealer. The temporary code can provide limited use of the system before lockout is entered, again giving the user time to get the vehicle to a scheduled dealer appointment. Also, with the case of a temporary authorization code obtained through provision of user credentials, the user can be assured that a thief is not simply using a stolen code to authorize the use of the system. To prevent exploitation of such a system, input of temporary codes may be limited to one or a few instances before lockout mode is entered.


If the VIN is detectable over the vehicle network 211, the module may then determine if the detected VIN is the correct VIN 213. In at least one instance, the module/system is paired to a vehicle's VIN upon completion of manufacture of the vehicle or at some point during the manufacturing process. It may be desirable to perform the pairing near the end of the process so that it is ensured that the vehicle has passed any quality control checks, but pairing can be done earlier if desired.


Once the module/system has been paired to a VIN, it is designed to only operate in conjunction with a vehicle having the same VIN number to which it is paired. This prevents stolen modules from operating in alternative vehicles. Modules/systems may also have an alternative option where they operate in conjunction with secondary VINs, such as testing VINs or alternative VINs, but in the example discussed here the module is designed to operate with a single VIN.


If the VIN is the correct VIN, the module allows the driver to access the system as usual 217. Otherwise, the module may place the system in a lock-down mode 215. As previously noted, the lockdown mode, in at least one embodiment, may only be removed through the aid of an authorized service provider. Even if a customer inadvertently purchased a stolen module, they would be prohibited from using it, and a trip to the dealer to rectify the problem would then result in recovery of the stolen module.



FIG. 3 shows an illustrative example of an unlock process. In this illustrative embodiment, the module has detected that it is in a locked state 301, and is in the process of prohibiting system access while outputting a lockout message 303. The limited system functionality may also include a list of authorized repair technicians in the area of the vehicle, and an ability to contact or direct the driver to one of the local repair technicians. This may aid in the case of inadvertent lock-out, in that the driver can still easily reach a repair technician to have the module/system unlocked.


Once the driver has reached an authorized repair location, such as a dealer or an authorized mechanic, a service tool may be connected to the vehicle through, for example, an ODB port or USB port. In at least one instance, the module is signed with an electronic serial number (ESN), providing a module specific identification serial number.


The technician, through a connected diagnostic tool or other backend system, may request the generation of a signed unlock application signed specifically to be recognized by the particular module installed in the vehicle being serviced. In other words, the application can only be used by a particular vehicle (in this instance) and cannot be used to unlock a plurality of vehicles if stolen from the dealer.


The backend system will generate a signed unlock application and provide it to the technician for installation on the vehicle. The module receives the unlock request from the service tool 307, and verifies the signature of the unlock application to be installed 309. This can be done, for example, by comparing the ESN associated with the module to the ESN associated with the unlock application.


If the unlock application has been verified as being suitable for that particular vehicle, this is presumably sufficient, in this case, to identify the provider of the application as being authorized to unlock the module/system. Other security protocol can be implemented as needed.


The unlock application is then installed/executed by the module 311, and the module is placed in an unlocked state. As part of unlocking the module, the module is unpaired from the VIN 313, so that the module does not immediately re-lock the system upon wake-up. The module then, having no paired VIN currently associated therewith, is free to re-pair itself with the VIN of the vehicle on which it is installed 315.



FIG. 4 shows an illustrative example of VIN pairing process. This is a process that may occur several times during the life of a system, including, but not limited to, upon manufacturing completion, upon authorized sale of the system, upon recovery of the system from a damaged vehicle, etc.


Once the vehicle has been powered, the module may be enabled 401 and determine if a VIN is present and paired with the module currently 403. If a VIN is present, the module may then proceed with a next authorization step 203.


If a VIN pairing is not present, however, the module may determine if the system is in a suitable state to pair with a new VIN. Since the module may be started several times during manufacturing, while the VCS is still being provisioned, it may be desirable to determine if the system is in a provisioning mode before VIN-pairing is attempted 405. This should help prevent inadvertent pairing of a module/system that may be moved to a new vehicle before leaving the factory, and should help prevent an attempt to pair the system in a state when a VIN may not be accessible on a system bus.


If the system is not in provisioning mode 405, the module may further ensure that the system has entered an infotainment mode 407. This indicates that the system is operating in a standard end-user mode, and is not in some form of diagnostic or other mode during which pairing may not be desired.


If all desired criteria (which may include criteria other than those listed here) are met, the module will access a vehicle bus or other information source from which it can obtain the vehicle's VIN 409. The module may then seek out the VIN as electronic information 411.


If the VIN is not found 413, the module may persist in seeking the VIN until such time as a VIN is available. Once the VIN has been found, the module may pair with the VIN and enter an operational mode, for use with that VIN only. At this point, any attempt to place the system in a new vehicle would result in lockout of the system, until such time as the module was instructed to seek out a new VIN and was unlocked by an authorized party.



FIG. 5 shows an illustrative example of a VIN recording process. In at least one illustrative example, VINs with which the module is paired are recorded with respect to a history source, so that reporting of paired VINs can be obtained at a future time. This can help provide a history of what vehicles the module has been paired with, and may further provide information about any unauthorized unlocking of the system. Historical information can also be used to determine which vehicle a module is supposed to be paired with, in the event that a stolen system is recovered.


In at least one embodiment, ten VINs are stored as a maximum, although this can be adjusted as per a manufacturer's desire. Once a new VIN has been detected for pairing 413, the module may check an existing history to determine what VINs have previously been paired with this system 501. The history may be part of a special record that exists on the module and survives module reflashes, preventing attempts to clear a history.


If the history is full 503, the process may proceed to pairing with the current VIN 415. Although the new VIN may not be recorded in the history file, it can still be accessible through reporting from a memory location storing the identity of the currently paired VIN. Additionally, the process may check to see if the VIN of the current vehicle is already stored in the history list 505.


If, for example, a module malfunction caused the system to lock, then there may be no reason to re-save the VIN number upon unlock and re-pairing. In this embodiment, only new, unstored VIN numbers will be saved during the pairing process.


If room remains in the history file, and the VIN is not already present in the file, the module may save the VIN number in the file 507 and then proceed with pairing 415.


In at least one instance, certain aspects of the module may be saved in a device parameter store (DPS). DPS is a special flash area that survives image reflashes of the module, and maintains its values. This may be helpful in preventing a savvy thief from thwarting the module control by attempting to reflash the module. Since the VIN and any lock-state will be saved in the DPS, a reflashed module will still use these variables to determine functionality of the system, and improper usage of the system will still be prevented.


In certain instances, such a system can be included but disabled during production. Only if the system is enabled post-production will it go into effect, otherwise the relevant modules may lay dormant. In at least one embodiment, additional vehicle firmware/software modules may be disabled by this system as well.


While exemplary embodiments are described above, it is not intended that these embodiments describe all possible forms of the invention. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the invention. Additionally, the features of various implementing embodiments may be combined to form further embodiments of the invention.

Claims
  • 1. A computer-implemented method comprising: determining, by a processor, that a requested-upload corresponds to a locked vehicle infotainment system (VIS) unlocking procedure;verifying, by the processor, requested-upload authenticity;activating, by the processor, the requested-upload to unlock the VIS;responsive to the unlocking, deleting, by the processor, a vehicle identification number (VIN) associated with the locked VIS;obtaining, by the processor, a new VIN, from a vehicle containing the VIS, for VIS association; andsaving, by the processor, the new VIN as a VIN which must be detected upon startup to prevent VIS relocking.
  • 2. The method of claim 1, wherein the verifying includes verifying an electronic serial number (ESN) associated with the requested-upload.
  • 3. The method of claim 2, wherein the verifying includes ensuring that the ESN of the requested-upload is the same as an ESN associated with the locked VIS.
  • 4. The method of claim 1, wherein the VIN is obtained from a vehicle bus.
  • 5. A system comprising: a processor configured to:determine a requested-upload corresponds to a locked vehicle infotainment system (VIS) unlocking procedure;verify requested-upload authenticity;activate requested-upload to unlock the VIS;responsive to the unlocking, delete a vehicle identification number (VIN) associated with the locked VIS;obtain a new VIN, from a vehicle containing the VIS, for VIS association; andsave the new VIN as a VIN which must be detected upon startup to prevent VIS relocking.
  • 6. The system of claim 5, wherein the verifying includes verifying an electronic serial number (ESN) associated with the requested-upload.
  • 7. The system of claim 6, wherein the processor is configured to ensure that the ESN of the requested-upload is the same as an ESN associated with the locked VIS.
  • 8. The system of claim 5, wherein the VIN is obtained from a vehicle bus.
  • 9. A non-transitory, computer readable storage medium, storing instructions, that, when executed by a processor, cause the processor to perform a method comprising: determining that a requested-upload corresponds to a locked vehicle infotainment system (VIS) unlocking procedure;verifying requested-upload authenticity;activating the requested-upload to unlock the VIS;responsive to the unlocking, deleting a vehicle identification number (VIN) associated with the locked VIS;obtaining a new VIN, from a vehicle containing the VIS, for VIS association; andsaving the new VIN as a VIN which must be detected upon startup to prevent VIS relocking.
  • 10. The storage medium of claim 9, wherein the verifying includes verifying an electronic serial number (ESN) associated with the requested-upload.
  • 11. The storage medium of claim 10, wherein the verifying includes ensuring that the ESN of the requested-upload is the same as an ESN associated with the locked VIS.
  • 12. The storage medium of claim 9, wherein the VIN is obtained from a vehicle bus.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a division of U.S. application Ser. No. 13/206,094 filed Aug. 9, 2011, now U.S. Patent No. 8,849,519, the disclosure of which is hereby incorporated in its entirety by reference herein.

US Referenced Citations (171)
Number Name Date Kind
4543569 Karlstrom Sep 1985 A
5081667 Drori et al. Jan 1992 A
5467070 Drori et al. Nov 1995 A
5513107 Gormley Apr 1996 A
5627510 Yuan May 1997 A
5635916 Bucholtz et al. Jun 1997 A
5655081 Bonnell et al. Aug 1997 A
5734336 Smithline Mar 1998 A
5776031 Minowa et al. Jul 1998 A
5828319 Tonkin et al. Oct 1998 A
5874889 Higdon et al. Feb 1999 A
5959540 Walter Sep 1999 A
6018291 Marble et al. Jan 2000 A
6133825 Matsuoka Oct 2000 A
6177866 O'Connell Jan 2001 B1
6198996 Berstis Mar 2001 B1
6263282 Vallancourt Jul 2001 B1
6268804 Janky et al. Jul 2001 B1
6271745 Anzai et al. Aug 2001 B1
6282226 Furukawa Aug 2001 B1
6434455 Snow et al. Aug 2002 B1
6434486 Studt et al. Aug 2002 B1
6438491 Farmer Aug 2002 B1
6539078 Hunt et al. Mar 2003 B1
6574734 Colson et al. Jun 2003 B1
6590495 Behbehani Jul 2003 B1
6668221 Harter, Jr. et al. Dec 2003 B2
6679702 Rau Jan 2004 B1
6690260 Ashihara Feb 2004 B1
6731195 Nemoto May 2004 B2
6737963 Gutta et al. May 2004 B2
6754562 Strege et al. Jun 2004 B2
6785542 Blight et al. Aug 2004 B1
6810309 Sadler et al. Oct 2004 B2
6853919 Kellum Feb 2005 B2
6859718 Fritz et al. Feb 2005 B2
6871145 Altan et al. Mar 2005 B2
6906619 Williams et al. Jun 2005 B2
6927676 Edens et al. Aug 2005 B2
6941194 Dauner et al. Sep 2005 B1
7057501 Davis Jun 2006 B1
7075409 Guba Jul 2006 B2
7102496 Ernst, Jr. et al. Sep 2006 B1
7124027 Ernst, Jr. et al. Oct 2006 B1
7131005 Levenson et al. Oct 2006 B2
7148790 Aoyama et al. Dec 2006 B2
7161563 Vitale et al. Jan 2007 B2
7173903 Remboski et al. Feb 2007 B2
7194069 Jones et al. Mar 2007 B1
7207041 Elson et al. Apr 2007 B2
7228213 Sakai et al. Jun 2007 B2
7246062 Knott et al. Jul 2007 B2
7266438 Kellum et al. Sep 2007 B2
7312691 Zambo et al. Dec 2007 B2
7337113 Nakagawa et al. Feb 2008 B2
7340332 Underdahl et al. Mar 2008 B2
7356394 Burgess Apr 2008 B2
7366892 Spaur et al. Apr 2008 B2
7375620 Balbale et al. May 2008 B2
7391305 Knoll et al. Jun 2008 B2
7484008 Gelvin et al. Jan 2009 B1
7565230 Gardner et al. Jul 2009 B2
7602782 Doviak et al. Oct 2009 B2
7783475 Neuberger et al. Aug 2010 B2
7812712 White et al. Oct 2010 B2
7862945 Saito et al. Jan 2011 B2
8050817 Moinzadeh et al. Nov 2011 B2
8050863 Trepagnier et al. Nov 2011 B2
8089339 Mikan et al. Jan 2012 B2
8232864 Kakiwaki Jul 2012 B2
8237554 Miller et al. Aug 2012 B2
8258939 Miller et al. Sep 2012 B2
8301108 Naboulsi Oct 2012 B2
8305189 Miller et al. Nov 2012 B2
8311722 Zhang et al. Nov 2012 B2
8798852 Chen et al. Aug 2014 B1
20010021891 Kusafuka et al. Sep 2001 A1
20020013650 Kusafuka et al. Jan 2002 A1
20020031228 Karkas et al. Mar 2002 A1
20020096572 Chene et al. Jul 2002 A1
20020097145 Tumey et al. Jul 2002 A1
20030004730 Yuschik Jan 2003 A1
20030055643 Woestemeyer et al. Mar 2003 A1
20030079123 Mas Ribes Apr 2003 A1
20030217148 Mullen et al. Nov 2003 A1
20030220725 Harter, Jr. et al. Nov 2003 A1
20030231550 Macfarlane Dec 2003 A1
20040046452 Suyama et al. Mar 2004 A1
20040073367 Altan et al. Apr 2004 A1
20040088205 Geisler et al. May 2004 A1
20040124968 Inada et al. Jul 2004 A1
20040176906 Matsubara et al. Sep 2004 A1
20040227642 Giles et al. Nov 2004 A1
20040236475 Chowdhary Nov 2004 A1
20050021597 Derasmo et al. Jan 2005 A1
20050033517 Kondoh et al. Feb 2005 A1
20050125110 Potter et al. Jun 2005 A1
20050134115 Betts, Jr. et al. Jun 2005 A1
20050177635 Schmidt et al. Aug 2005 A1
20050190039 Aoyama Sep 2005 A1
20050193212 Yuhara Sep 2005 A1
20050261816 DiCroce et al. Nov 2005 A1
20060056663 Call Mar 2006 A1
20060142917 Goudy Jun 2006 A1
20060150197 Werner Jul 2006 A1
20060156315 Wood et al. Jul 2006 A1
20060202799 Zambo et al. Sep 2006 A1
20060220904 Jarlengrip Oct 2006 A1
20060250224 Steffel et al. Nov 2006 A1
20060293813 Nou Dec 2006 A1
20070027595 Nou Feb 2007 A1
20070050854 Cooperstein et al. Mar 2007 A1
20070072616 Irani Mar 2007 A1
20070100514 Park May 2007 A1
20070103339 Maxwell et al. May 2007 A1
20070255568 Pennock Nov 2007 A1
20080070616 Yun Mar 2008 A1
20080109653 Yokohama May 2008 A1
20080148374 Spaur et al. Jun 2008 A1
20080150683 Mikan et al. Jun 2008 A1
20080275604 Perry et al. Nov 2008 A1
20090030605 Breed Jan 2009 A1
20090045928 Rao et al. Feb 2009 A1
20090096596 Sultan et al. Apr 2009 A1
20090167524 Chesnutt et al. Jul 2009 A1
20090184800 Harris Jul 2009 A1
20090190735 Gilmartin et al. Jul 2009 A1
20090195370 Huffman et al. Aug 2009 A1
20090275281 Rosen Nov 2009 A1
20090287499 Link, II Nov 2009 A1
20090309709 Bevacqua et al. Dec 2009 A1
20100004818 Phelan Jan 2010 A1
20100007479 Smith Jan 2010 A1
20100013596 Kakiwaki Jan 2010 A1
20100030458 Coughlin Feb 2010 A1
20100039224 Okude et al. Feb 2010 A1
20100057586 Chow Mar 2010 A1
20100075656 Howarter et al. Mar 2010 A1
20100097178 Pisz et al. Apr 2010 A1
20100148923 Takizawa Jun 2010 A1
20100178872 Alrabady et al. Jul 2010 A1
20100191535 Berry et al. Jul 2010 A1
20100191973 Huntzicker et al. Jul 2010 A1
20100228404 Link et al. Sep 2010 A1
20100321203 Tieman et al. Dec 2010 A1
20110009107 Guba et al. Jan 2011 A1
20110071720 Schondorf et al. Mar 2011 A1
20110071725 Kleve et al. Mar 2011 A1
20110071734 Van Wiemeersch et al. Mar 2011 A1
20110102146 Giron May 2011 A1
20110105097 Tadayon et al. May 2011 A1
20110106374 Margol et al. May 2011 A1
20110112969 Zaid et al. May 2011 A1
20110148574 Simon et al. Jun 2011 A1
20110166748 Schneider et al. Jul 2011 A1
20110213629 Clark et al. Sep 2011 A1
20110215921 Ben Ayed et al. Sep 2011 A1
20110275321 Zhou et al. Nov 2011 A1
20110295444 Westra et al. Dec 2011 A1
20120041633 Schunder et al. Feb 2012 A1
20120054036 Nam et al. Mar 2012 A1
20120071140 Oesterling et al. Mar 2012 A1
20120139760 Bevacqua et al. Jun 2012 A1
20120157069 Elliott et al. Jun 2012 A1
20120280786 Miller et al. Nov 2012 A1
20120284702 Ganapathy et al. Nov 2012 A1
20120293317 Hanna et al. Nov 2012 A1
20120313768 Campbell et al. Dec 2012 A1
20130005302 Ozaki Jan 2013 A1
20130162421 Inaguma et al. Jun 2013 A1
20130200999 Spodak et al. Aug 2013 A1
Foreign Referenced Citations (16)
Number Date Country
1834832 Sep 2006 CN
1863052 Nov 2006 CN
101596895 Dec 2009 CN
102007046270 Apr 2009 DE
0449471 Oct 1991 EP
0971463 Jan 2000 EP
1095527 May 2001 EP
H04233892 Aug 1992 JP
2008195253 Aug 2008 JP
200803630 Dec 2008 JP
20110081577 Feb 2013 KR
2189912 Sep 2002 RU
WO0125572 Apr 2001 WO
2009158469 Dec 2009 WO
2011047056 Apr 2011 WO
2012015403 Feb 2012 WO
Non-Patent Literature Citations (12)
Entry
Chinese Patent and Trademark Office, First Office Action for the corresponding Chinese Patent Application No. 201210280045.X mailed Dec. 31, 2014.
Autobiometrics, Com, US Distributor for ATRD Biometric Immobilizer, http://www.autobiometrics.com, Jul. 6, 2011.
SALES@usasupremetech.com, In the U.S. a Car is Stolen Every 26 Seconds, The Wave of the Future, Biometrics Authentication, An Introduction.
Ford Motor Company, “SYNC with Navigation System,” Owner's Guide Supplement, SYNC System Version 1 (Jul. 2007).
Ford Motor Company, “SYNC,” Owners's Guide Supplement, SYNC System Version 1 (Nov. 2007).
Ford Motor Company, “SYNC with Navigation System,” Owner's Guide Supplement, SYNC System Version 2 (Oct. 2008).
Ford Motor Company, “SYNC,” Owner's Guide Supplement, SYNC System Version 2 (Oct. 2008).
Ford Motor Company, “SYNC with Navigation System,” Owner's Guide Supplement, SYNC System Version 3 (Jul. 2009).
Ford Motor Company, “SYNC,” Owner's Guide Supplement, SYNC System Version 3 (Aug. 2009).
Kermit Whitfield, “A hitchhiker's guide to the telematics ecosystem,” Automotive Design & Production, Oct. 2003, http://findarticles.com, pp. 103.
Driver Focus—Telematics Working Group, Statement of Principles, Criteria and Verification Procedures on Driver Interactions with Advanced In-Vehicle Information and Communications Systems, Including 2006 Updated Sections, Jun. 26, 2006.
The Federal Service for Intellectual Property Patents and Trademarks, Decision on Granting a Patent for Invention for the corresponding Russian Application No. 2012134107/08, Filed Aug. 9, 2012 dated Mar. 4, 2015.
Related Publications (1)
Number Date Country
20140058631 A1 Feb 2014 US
Divisions (1)
Number Date Country
Parent 13206094 Aug 2011 US
Child 14071704 US