The present invention generally relates to a disabling method for a stolen car in a secluded location.
When a car owner realizes that his or her car is stolen and it is out of sight or the robber is just driving the car away, the owner wants to stop it immediately, without a chase, wherever the car may be at that moment. Currently, the procedure to stop a stolen car is to compare the plate number of a suspicious car with a stolen car list on the police computer, and then to ask the driver of the car to stop using the speaker of the police car. The driver will react in one of two ways: They will either follow the request of the police or attempt to escape by driving at high speeds. In the second case, the driver of the stolen car hopes to evade the police. However, as seen many times on the news, the police never give up chasing them. It creates an extremely dangerous situation and many innocent people are put in jeopardy. It is purpose of this invention to avoid this dangerous situation and stop the stolen car without any unnecessary accidents. The method and the means introduced by this invention will stop the stolen car immediately wherever the stolen car may be located. The method and the means introduced by this invention will disable the stolen car even though the thief changes the number plate or the painting of the car.
U.S. Pat. No. 5,432,495 to Tompkins illustrates a beeper controlled auto security system in which a vehicle disabling device such as an ignition kill switch is selectively activated either by a hand held radio frequency transmitter unit or a beeper paging system satellite transmission initiated by a telephone call which may be at a very remote location from the vehicle. A vehicle motion detector turns on a monitor transmitter if the vehicle is thereafter moved, enabling detection by a portable monitor receiver carried by the vehicle owner or police vehicles. However, most car thieves can easily open the door, turn on the ignition switch and drive away.
U.S. Pat. No. 6,028,506 to Xiao introduces a car alarm transmitting and paging system comprising an improvement of an existing conventional phone pager and transmitter which allows the pager to be used dually as a phone pager and also as an alarm activation notification device, wherein the transmitter is used in conjunction with a conventional vehicle alarm to transmit the notification of alarm activation to the carrier of the modified pager. Because the modified pager still accepts incoming calls and operates as a conventional pager, this invention obviates the necessity of owning and carrying two separate pagers, one for normal pager use, and the other for notification of alarm activation.
Most car thieves can easily turn off the alarm, even though the car is running on a highway.
None of the prior art discloses such a perfect disabling method of disabling a stolen car wherever the stolen car may locate.
The method to stop a stolen car utilizes a pager set behind the driver's gauge board. The method is comprised of three steps: 1) Confirming that the car is stolen, 2) Dialing the number of the pager installed in the stolen car, and 3) Entering a secret number to activate the trigger of the three stopping methods of this invention. The three stopping methods are: a) turning off the engine by cutting the electricity supplied to the engine, b) puncturing the rear tires with pistol bullets or jack knives which are installed inside of rear wheel cover, and c) activating a car alarm. When a car owner realizes his or her car is stolen, the car owner will activate the trigger of the stolen car by dialing the number the pager installed in the stolen car and a secret code. The stolen car will stop immediately by means of a combination of the stopping methods, i.e., the engine of the stolen car will stop, the rear tires will be punctured by one of the puncturing means, and car alarm will go off.
The pager (3) used for the above purpose is installed behind the driving gauge board (5) as shown in
If the pager number and secret code match the numbers memorized in the computer, the main computer (6) of the stolen car (2) sends an activating signal for the disabling means in step S-4.
The three disabling means are illustrated as follows. The first one is to disconnect the electric power supply to the ignition plug of the car's engine (7) as shown in
The second disabling system works by puncturing both of the rear tires with pistol bullets or jack knives.
If all of the three disabling systems are activated, recovering the damage will require a great deal time and money. Therefore, the value of the car to the thief will decrease while the chance of getting caught will increase. Therefore, the only option for the thief is to abandon the car.