The present disclosure relates to a method for allowing access to a vehicle and a fleet of vehicles.
Keys for vehicles are crucial to be able to avoid theft of the vehicle or any items or equipment present in the vehicle. In modern society where vehicles more often are shared by multiple people, e.g. in time sharing setups or for rental vehicles, keys have to be distributed to a user before that user can access and use the vehicle. This can in many situations be cumbersome.
There is thus a need in the industry for improved solutions for handling of keys for vehicles.
It is an object of the present disclosure to mitigate, alleviate or eliminate one or more of the above-identified deficiencies and disadvantages in the prior art and solve at least the above mentioned problem. According to a first aspect there is provided a method for allowing access to a vehicle, wherein the vehicle comprises a key access management system in communication with a remote key access database; and at least one sensor for reading a static identifier. The remote key access database comprises identification information of static identifiers and a user profile associated with each static identifier. The method comprises receiving identification information for at least one static identifier and the associated user profile from the remote key access database; storing the received identification information of the static identifier and the associated user profile in the key access management system of the vehicle; reading identification information of a static identifier by the at least one sensor; comparing the read identification information with identification information in the key access management system. In response to finding a match of the read identification information in the key access management system, the method provides access to at least part of the vehicle.
The problem of the prior art is thereby solved in that a generic static identifier known to the remote key access database and communicated to the vehicle's key access management system can be used to grant a user access to a vehicle or part of a vehicle. Multiple keys are thereby not a problem as the database can store identifications information about a vast number of static identifiers. Any existing static identifier can be used as key as long as it is stored in the remote key access database and communicated to the key access management system of the vehicle. A static identifier is a unique static property of an item or a person that cannot be changed. The identification information for such a static identifier is stored in the vehicle key access management system.
Another benefit is that the static identifier can be added to a vehicle and used for objects, e.g. a service drone, that can transmit information but that cannot receive new information.
The remote key access database is a remote database containing identification information of static identifiers and a user profile associated with each static identifier. The remote key access database is remotely placed and in communication with the vehicle via wired or wireless network, whatever is available. Wireless network could be wifi or telecom data traffic. Wired connection could be available e.g. when refueling/recharging the vehicle. In some situations no communication will be available. The vehicle will then rely on the information stored in the key access management system locally present in the vehicle.
According to some embodiments, the vehicle comprises multiple sensors for reading static identifiers and the user profile associated with each static identifier comprises information about which vehicle sensor or vehicle sensors that correspond to the static identifier. An advantage of this embodiment is that different sensors can be allowed to be used for different users dependent on the type of static identifier the user uses. Also, the location on the vehicle of the sensor used can be determined for a static identifier.
According to some embodiments, the user profile comprises access information for which doors of the vehicle the static identifier is allowed access to. The user can thereby be allowed to access only parts of the vehicle or only enter through certain doors. In combination with assigning a vehicle sensor for reading the static identifier that is close to the parts of the vehicle doors that the user has access to the user can more convenient enter the vehicle and avoid moving around the vehicle to access a sensor. This is also a safety feature when being located in traffic. Embarking a taxi may e.g. only be possible on the side of the sidewalk to keep the user walking on the road and being exposed to possible hazardous traffic situations.
According to some embodiments, the user profile comprises access information for which of a subset of a plurality of vehicle functions of the vehicle that the static identifier is allowed access to. The user can then be allowed to use only certain systems or functions, e.g. according to a leasing agreement or according to a rental agreement. The vehicle may thus have functions that the user is not allowed access to. The functions available in the vehicle do thus not limit what the user has access to. Instead the access level defined in the user profile limit what the user has access to.
According to some embodiments, the user profile received from the key access database includes an expiration timestamp for the associated static identifier. The key may then be made to expire at a certain point in time without the need of being in contact with the remote key access database.
According to some embodiments, the user profile received from the key access database includes an activation timestamp for the associated static identifier. The key can then be made to start working at a certain point in time without the need of being in contact with the remote key access database.
According to some embodiments, the user profile comprises access information for allowing access to the vehicle doors and the subset of a plurality of vehicle functions at a defined geographical area and/or operation up to maximal speed. This can stop the use of a vehicle if it is placed in a restricted area or e.g. if the vehicle is in a service area where only service personnel is permitted to have access to the vehicle. It could also be used to restrict the vehicle to drive away from an area of a valet parking. The speed could also be limited for service personnel or valet parking personnel for work safety reasons or peace of mind for the owner.
According to some embodiments, the method comprises dynamically updating the user profile associated with a static identifier in the key access management system of the vehicle whenever changes are made in the remote key access database. In that way the key access database of the vehicle can be dynamically changed. Access can also be changed also when the vehicle is driving as long as it has a connection to the remote key access database.
According to some embodiments, the method comprises receiving instructions from the remote key access database to remove a specific static identifier from the key access management system of the vehicle so as to revoke access to the vehicle for the specific static identifier.
According to some embodiments, the static identifier is a uniquely identifiable NFC chip, a uniquely identifiable key card, a uniquely identifiable smartphone, a uniquely identifiable electronic device, a face of a person, an eye of a person, a fingerprint of a person, a voice of a person. Basically any uniquely identifiable object or personal biometric characteristic can be used as a key presenting an elegant solution to the problems of the prior art discussed in the background section.
According to some embodiments, the identification information corresponds to the type of static identifier: card number, NFC identification number, mac network ID, biometric face recognition data, biometric eye recognition data, biometric fingerprint data, and biometric voice recognition data, respectively.
According to some embodiments, the vehicle sensors are comprised in the group consisting of a NFC reader, an IR scanner, a camera, a short range wireless communication device, a fingerprint reader, an eye scanner, a data input/output connector. The static identifier that is allowed to use for a vehicle must match a sensor that is available on the vehicle and that is able to read that specific static identifier.
Different users can have completely different static identifiers. One user can e.g. have a chip operated into a hand, while another user uses an NFC chip present in a mobile phone.
According to some embodiments, a plurality of sensors and a corresponding plurality of static identifiers are required for allowing access to a vehicle. In that way a higher security for accessing the vehicle can be achieved. It could be that a physical static identifier as an NFC device and a biometric static identifier as a face or fingerprint are need for accessing the vehicle to increase security. Identical twins with identical biometric data can thereby be stopped from using the same personal biometric static identifier.
According to a second aspect there is provided a fleet of vehicles comprising a plurality of vehicles, wherein each vehicle comprises a key access management system in communication with a remote key access database and at least one sensor for reading a static identifier. Access to each vehicle is allowed according to the method of the first aspect, wherein a first static identifier is allowed access to a plurality of vehicles in the fleet of vehicles. A single static identifier can thereby be used for more than one vehicle, which simplifies for the user that now does not have to have one key per vehicle. Thus one static identifier can be used for multiple vehicles instead of having multiple keys as in the prior art.
According to some embodiments, the first static identifier is associated with a unique user profile for each vehicle, so that the first static identifier has different access at different vehicles. Agreement between the user and a vehicle owner can then be different for different vehicles while still using the same static identifier for accessing the vehicle.
According to some embodiments the same static identifier has different access in the same vehicle based on the current time or the location of the vehicle. It could e.g. be a person who works in a work shop doing service on his/her otherwise personal vehicle or a vehicle that the person regularly rents. It could also be that door is kept locked when driving in areas where it is not allowed to leave the vehicle, e.g. military areas or areas where crime rates are high.
Effects and features of the second aspect are to a large extent analogous to those described above in connection with the first aspect. Embodiments mentioned in relation to the first aspect are largely compatible with the second aspect.
The present disclosure will become apparent from the detailed description given below. The detailed description and specific examples disclose preferred embodiments of the disclosure by way of illustration only. Those skilled in the art understand from guidance in the detailed description that changes and modifications may be made within the scope of the disclosure.
Hence, it is to be understood that the herein disclosed disclosure is not limited to the particular component parts of the device described or steps of the methods described since such device and method may vary. It is also to be understood that the terminology used herein is for purpose of describing particular embodiments only, and is not intended to be limiting. It should be noted that, as used in the specification and the appended claims, the articles “a”, “an”, “the”, and “said” are intended to mean that there are one or more of the elements unless the context explicitly dictates otherwise. Thus, for example, reference to “a unit” or “the unit” may include several devices, and the like. Furthermore, the words “comprising”, “including”, “containing” and similar wordings does not exclude other elements or steps.
The above objects, as well as additional objects, features and advantages of the present disclosure, will be more fully appreciated by reference to the following illustrative and non-limiting detailed description of example embodiments of the present disclosure, when taken in conjunction with the accompanying drawings.
The present disclosure will now be described with reference to the accompanying drawings, in which preferred example embodiments of the disclosure are shown. The disclosure may, however, be embodied in other forms and should not be construed as limited to the herein disclosed embodiments. The disclosed embodiments are provided to fully convey the scope of the disclosure to the skilled person.
With reference to
The remote key access database 4 is remotely placed and in communication with the vehicle 1 via wired or wireless network, whatever is available. Wireless network could be wifi or telecommunication data traffic. Wired connection could be available e.g. when refueling/recharging the vehicle. In some situations no communication will be available. The vehicle will then rely on the information stored in the key access management system that is locally present in the vehicle and contains identification information a user profile associated with specific static identifiers that has been received at an earlier pint in time from the remote key access database.
The vehicle 1 of
The user profile of user 41 comprises access information for which of a subset of a plurality of vehicle functions of the vehicle that the static identifier is allowed access to. The user can then be allowed to use only certain systems or functions, e.g. according to a leasing agreement or according to a rental agreement. If paying a budget price for renting the vehicle, the user 41 may e.g. not have access to the infotainment system of the vehicle or automatic speed control functions etc. The user profile received from the key access database may include an expiration timestamp for the associated static identifier. The user profile received from the key access database may further include an activation timestamp for the associated static identifier. In that way the vehicle may give the user access during a limited time also without further communication with the remote access database. The vehicle may thus have functions that the user is not allowed access to. The functions available in the vehicle do thus not limit what the user has access to. Instead the access level defined in the user profile limit what the user has access to.
The functionality for the user can be dynamically updated while driving. E.g. if a user has not access to the full power range of the engine, the user can buy that access for a limited time. Or if the user is running out of battery allowed to use in accordance with the user's user profile, the user could purchase extra battery access during a time limited time (it could be a one time occurrence).
The user profile comprises access information for allowing access to the vehicle doors and the subset of a plurality of vehicle functions at a defined geographical area and/or operation up to maximal speed. This can stop the use of a vehicle if it is placed in a restricted area or e.g. if the vehicle is in a service area where only service personnel is permitted to have access to the vehicle. It could also be used to restrict the vehicle to drive away from an area of a valet parking or if a vehicles is about to leave the country via border or ferry. The speed could also be limited for service personnel or valet parking personnel or to limit speed in a rental company parking zones etc. Speed limitation may also be important if the user is a service robot that is only allowed to charge the vehicle at stand still.
Referring to
The method may further comprise receiving S7 instructions from the remote key access database 4 to remove a specific static identifier from the key access management system 2 of the vehicle 1 so as to revoke access to the vehicle 1 for the specific static identifier. In
The static identifier is a uniquely identifiable NFC chip, a uniquely identifiable key card, a smartphone, a uniquely identifiable electronic device, a face of a person, an eye of a person, a fingerprint of a person, a voice of a person. The identification information corresponds to the type of static identifier: NFC identification number, card number, mac network ID, biometric face recognition data, biometric eye recognition data, biometric fingerprint data, and biometric voice recognition data, respectively. Basically any uniquely identifiable object or personal biometric characteristic can be used a as a key presenting an elegant solution to the problems of the prior art discussed in the background section. An advantage with using biometric data as a face, iris or fingerprint is that it is not possible to change, adding a high level of certainty that the user really is the one associated with the user profile in the key access management system. The vehicle sensors may e.g. be a NFC reader 5-10, an IR scanner, a camera 11-14, a short range wireless communication device 5-10, a fingerprint reader, an eye scanner, a data input/output connector, microphone. A plurality of sensors and a corresponding plurality of static identifiers may in some cases be required for allowing access to a vehicle. The static identifier that is allowed to use for a vehicle must match a sensor that is available on the vehicle and that is able to read that specific static identifier.
In
The second aspect of this disclosed in
The same static identifier has different access in the same vehicle based on the current time or the location of the vehicle. It could e.g. be a person who works in a work shop doing service on his/her otherwise personal vehicle or a vehicle that the person regularly rents. It could be a user that cleans taxi vehicle but also works as a taxi driver for the same vehicle. It could also be that door is kept locked when driving in areas where it is not allowed to leave the vehicle, e.g. military areas or areas where crime rates are high.
A static identifier may have multiple user accounts connected to the same key. E.g. in the example above when a user works with cleaning taxis, but also works with driving the same vehicle as taxi, two different user accounts can be associated with the static identifier that the user uses. The user profiles can then restrict/allow access in accordance with each employers based on date, time and location.
The person skilled in the art realizes that the present disclosure is not limited to the preferred embodiments described above. The person skilled in the art further realizes that modifications and variations are possible within the scope of the appended claims. For example, the type of static identifiers could be extended with any unique property of a person or item. Additionally, variations to the disclosed embodiments can be understood and effected by the skilled person in practicing the claims, from a study of the drawings, the disclosure, and the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
21193831.1 | Aug 2021 | EP | regional |
This application is a continuation of International Patent Application No. PCT/CN2022/115126, filed Aug. 26, 2022, which claims the benefit of European Patent Application No. 21193831.1, filed Aug. 30, 2021, the disclosures of which are incorporated herein by reference in their entireties.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2022/115126 | Aug 2022 | WO |
Child | 18581181 | US |