Various embodiments relate to an authentication process for authenticating one or more user of a vehicle communication and information system. In some embodiments, one or more vehicle users may be authenticated before operating one or more vehicle controls from a device remote from a vehicle.
For a variety of reasons including, but not limited to, identification, security, and safety, a vehicle owner or user may be authenticated as an authorized user of a vehicle communications and information computing system before the system can be used by the vehicle owner. Typically, this authentication may occur prior to first use of the vehicle and/or vehicle communications and information system. The authentication may occur at a dealership by a dealer or dealer representative. Additionally or alternatively, the authorization process may occur through a telephone call, or other communication, to the automotive OEM (or an entity associated with the automotive OEM responsible for handling such calls) by the dealer, the vehicle owner, or other authorized person.
One aspect is a system for authorizing use of a vehicle communication and information system. The system includes one or more data processors. The data processor(s) may be configured to receive information associating one or more devices remote from a vehicle with a vehicle computer. Further, the data processor(s) may be configured to receive information identifying a user. The user may request authorization to command one or more vehicle controls from the one or more devices which are associated with the vehicle computer. The data processor(s) may be further configured to authorize the user to command one or more vehicle controls from the one or more devices associated with the vehicle computer.
Authorizing the user(s) may include performing an authentication process for authenticating the user. Further, it may be determined that the user is an authenticated user based on the authentication process. Based on the user being authenticated, the command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer may be authorized.
In some embodiments, the authentication process may include receiving one or more inputs for authentication and authenticating the user based on the one or more inputs for authentication. The one or more inputs may be one or more authentication items including, but not limited to, one or more touch-based inputs, information from one or more vehicle key transponders, one or more voice commands, one or more codes, one or more patterns of maneuvers, or at least one question and answer process.
In some embodiments, the inputs for authentication may be received in the vehicle.
Another aspect is a computer-implemented method for authorizing use of the vehicle communication and information system. The method may include receiving information at one or more data processors indicating that a vehicle communications and information system (VCIS) is associated with one or more command devices from which one or more users command the VCIS. The method may also include authorizing at the data processor(s) the one or more users to command the VCIS from the one or more associated command devices.
The authorizing may include receiving information identifying one or more authenticating devices associated with the one or more users. Further, an authentication process may be performed using the identified authenticating devices to authenticate the one or more users. If the user(s) are authenticated based on the authentication process, the user(s) may command the VCIS from the one or more associated command devices.
In some embodiments, the authentication process may include initiating a timer to measure a time period during which the one or more users are authenticated using the identified authenticating devices. The one or more users may command the VCIS from the one or more associated command devices if authenticated during the time period.
In some embodiments, the authentication process may include counting a number of authentication attempts during the time period. If the number of attempts is exceeded, the user(s) may not be authenticated.
Another aspect is a method comprising receiving information at a computer associating one or more devices (e.g., a nomadic device or a personal computer) for commanding vehicle controls with a vehicle. Further, the method may include receiving information at the computer identifying a user who may request authorization to command vehicle controls from the devices. The method may also include authorizing the command(s) from the devices.
The authorizing may include performing an authentication process to authenticate the user(s). If the user(s) are authenticated based on the process, the user(s) may command the vehicle controls from the devices.
In some embodiment, the authentication process may include receiving one or more inputs for authentication and authenticating the user(s) based on the one or more inputs for authentication.
The one or more inputs for authentication may be one or more authentication items. These authentication items may include, but are not limited to, one or more touch-based inputs, information from one or more vehicle key transponders, one or more voice commands, one or more codes, one or more patterns of maneuvers, or at least one question and answer process.
In some embodiments, the authentication process may further include initiating a timer to measure a time period during which the one or more inputs for authentication are received. Further, the authentication process may include authenticating the user(s) based on the one or more inputs for authentication if received during the time period.
In some embodiments, the authentication process may further include counting a number of authentication attempts and authenticating the user(s) based on the one or more inputs for authentication unless the number of attempts is exceeded.
These and other aspects will be better understood in view of the attached drawings and following detailed description of the invention.
The figures identified below are illustrative of some embodiments of the invention. The figures are not intended to be limiting of the invention recited in the appended claims. The embodiments, both as to their organization and manner of operation, together with further object and advantages thereof, may best be understood with reference to the following description, taken in connection with the accompanying drawings, in which:
A typical authentication process for authenticating vehicle owners or users to use the vehicle's telematics system may not only be expensive for an OEM, but also inconvenient for the vehicle owner. Authentication may be performed through a human operator with access to information for authenticating the vehicle user(s). This may include, for example, access to remote systems, such as a DMV's or Secretary of State's office, to verify the identity of the vehicle owner/users. This may leave a limited time window for the user to be authenticated (e.g., due to hours of operation). Further, using human operators can be expensive for the OEM because of the added cost of employing these individuals. Therefore, using, for example (and without limitation), a nomadic device (such as a cell phone), a vehicle owner and/or user can be authenticated to use the vehicle's communication and information computing system (VCIS) without the issues that may be associated with typical authentication processes.
Detailed embodiments of the invention are disclosed herein. However, it is to be understood that the disclosed embodiments are merely exemplary of an invention that may be embodied in various and alternative forms. Therefore, specific functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for the claims and/or as a representative basis for teaching one skilled in the art to variously employ the present invention.
Additionally, the disclosure and arrangement of the figures is non-limiting. Accordingly, the disclosure and arrangement of the figures may be modified or re-arranged to best fit a particular implementation of the various embodiments of the invention.
In this illustrative embodiment, the centralized system is a server system that includes processing capability for incoming nomadic device signals designated to interact with a remote vehicle 121.
For example, the server(s) 101 may include an automated call server and/or web host. Further, the server(s) 101 may route an incoming signal from a nomadic device (ND) 103 to the appropriate remote vehicle. Data sent in this fashion may be sent using data-over-voice, a data-plan, or in any other suitable format.
Data can also be sent to the remote vehicle 121 through the server(s) 101 using a personal computer 105. In this case, the data is likely, although not necessarily, sent over the internet 109.
Once the server(s) 101 receive the incoming data request from the remote source 103, 105, the message is processed and/or relayed to a vehicle 121. The vehicle may be identified by a header associated with one or more incoming data packets, or may be identifiable based on a database lookup, for example.
The relay to the vehicle 121 is sent out from the server(s) 101 through a network (e.g., without limitation, a cellular network 113, the internet, etc.) and passed through a cellular network 115 to the vehicle 121. In another embodiment, the relay may be passed through network 114 (e.g., WiFi or WiMax) and to the vehicle 121. A remote communication module 200 in the vehicle 121 receives the signal sent from the server(s) 101 and processes it or relays it to an appropriate processing system within the vehicle 121.
In at least one illustrative embodiment, the vehicle 121 is also outfitted with a communication transceiver, such as, but not limited to, a BLUETOOTH transceiver. This transceiver may allow communication with the nomadic device 103 using a direct signal 119.
It should be understood that the communication between nomadic device 103, server 101, and vehicle 121 may be performed in a number of ways and
In this illustrative embodiment, a communications module 200 can include a cellular (e.g., and without limitation, GSM or CDMA) antenna 201 that communicates with a remote server over a cellular network. The received cellular signal may be sent from the cellular antenna 201 to a multi-band cellular (e.g., and without limitation, GSM or CDMA) decoder 219 that processes the received signal to produce information usable by the microprocessor 217.
In this illustrative embodiment, the multi-band cellular chip 219, including flash memory 207 and RAM 211, is installed in the module as part of a removable device 223 including a SIM card 221. The SIM card 221 may contain user identifying information that allows access to the cellular network under a particular user's plan.
Additionally, the module includes a GPS chip 203 that can process and decode a signal from the GPS antenna 205 and send this information to a microprocessor 217.
The microprocessor is also in communication with a vehicle data bus that provides access to various vehicle modules, such as RF module 215. Other modules not shown include, but are not limited to, the vehicle cluster, a remote (off-board) GPS system, a radio module, etc. Non-limiting examples of a vehicle data bus include an SAE J1850 bus, a CAN bus, a GMLAN bus, and any other vehicle data buses known in the art. For illustration purposes only,
In another embodiment, the GPS antenna 205b may be attached to the module separately from this board 223. When a signal comes in from the cellular antenna 201 and/or the GPS antenna 205b, the signal may be sent to the corresponding cellular/GPS chip 203 for processing, and then passed to the microprocessor 217. The microprocessor 217 interfaces with the CAN transceiver 213 to connect to a vehicle network 214 and vehicle modules such as RF module 215.
In this illustrative embodiment, the removable board 223 may contain a SIM card 221 and a multi-band cellular chip 219, as well as a flash memory 207 and RAM 211. Signals from the cellular antenna 201 may be sent to the board 223 for processing by the multi-band cellular chip 219 before being sent to the microprocessor 217.
Again, in this embodiment, the cellular antenna 201 may send a signal to the multi-band cellular 219, including flash memory 207 and RAM 211. The signal may be processed and sent to the microprocessor 217. The multi band cellular chip 219 may be located on a removable circuit board 223, which may also include a SIM card 221.
In some embodiments, input(s) may be received in the vehicle 121 through tactile and/or audible inputs. Accordingly, the module 200 may process such inputs received from one or more vehicle microphones (not shown) and one or more touch-sensitive vehicle controls (not shown) via vehicle network 214.
Use of the communications system 100 may be provided once a vehicle user is a registered user. Accordingly, a vehicle user may register one or more devices (nomadic device 103 and/or personal computer 105) to use the communications system 100 (block 300) in order to gain access to various vehicle-based services from the nomadic device 103 and/or personal computer 105. Examples of such vehicle-based services, without limitation, may include remote lock and unlock, remote start, vehicle tracking, remote control of vehicle controls (e.g., and without limitation, radio and HVAC), data download, and others.
Registration may occur from a nomadic device 103 and/or personal computer 105 using an Internet connection. In some embodiments, the vehicle user may download a software application (e.g., a mobile application) to the personal computer 105 and/or nomadic device 103. Using this application, the vehicle user may remotely operate one or more vehicle functions and/or controls via system 100. In order to download this application, the vehicle user may additionally or alternatively register for the service. Registration may occur, for example, through a website.
In some embodiments, the applications may be located and executing on a remote computing system, such as server 101 (or a different server in communication with system 100). In this case, an application programming interface (API) may be installed on the nomadic device 103 and/or personal computer 105 and/or a web-based interface may be used in order to operate the remotely executing application.
The registration process may be, but not necessarily, a single event such that the step may not occur subsequent to a first use of the system 100. During the registration process, the vehicle user may establish one or more forms of identification to identify the vehicle user. Such forms of identification may include a username and password, one or more security questions, a VIN, a mobile identification number (MIN), or a combination of such identification items. Additionally, during the registration process one or more identifiers, such as a phone number, associated with the vehicle user may be provided to identify the nomadic device 103 and/or PC 105 which serves as the primary or controlling device. Also, during the registration process, an identification associated with the module 200 (e.g., and without limitation, a VIN or Electronic Serial Number) may be provided to identify the vehicle having the vehicle controls which may be controlled via the vehicle communication system 100.
Once the user is registered, the vehicle user may login from the nomadic device 103 and/or personal computer 105 (block 302). A login may include, without limitation, inputting the vehicle user identification information created by the user during registration. The input may be one or more touch-sensitive inputs and/or one or more voice inputs. In some embodiments, the login information may be saved in memory. In this case, the vehicle user may use the vehicle-based services without inputting login information.
One or more commands for a vehicle-based service may be input and received by the personal computer 105 or nomadic device 103 (block 304). Where the nomadic device 103, personal computer 105, or the remote computing system has software application installed, this application may receive the command(s). Such commands may be input using tactile and/or audible inputs. Audible inputs may include one or more spoken commands.
Further, vehicle communication module information may be received identifying the vehicle communication module 200 (block 305). Module information may include, for example, an electronic serial number associated with the module 200. This information may be received from the vehicle user via user input. The module information may be received from the module 200 by the user after a key-on event in the vehicle. The user may input this information at the ND 103 and/or PC 105.
In some embodiments, the module information may be stored in memory at one or more of the nomadic device 103, personal computer 105, or the remote computing system during, for example, registration. In this case, the module information may be received from memory. In some embodiments, the module information may be an electronic serial number (ESN) associated with the module 200. This module information may be used to tie the user device (nomadic device 103 and/or personal computer 105) to the module 200 so that data and information may be exchanged.
Since a vehicle user may command one or more vehicle controls from a nomadic device or a personal computer, either or both devices may be registered. As represented by block 306, one or more determinations may be made relating to the type of device used by the vehicle user.
If a nomadic device 103 is used, nomadic device information may be obtained in order for the server 101 to identify the nomadic device (block 308). The nomadic device information may be input manually by a vehicle user from the nomadic device 103 or obtained automatically. Such information may include a mobile identification number (e.g., a phone number).
Additionally, one or more registration codes may be input to and received by the nomadic device 103 (block 310) which may be used by the system 100 (e.g., at server 101) to confirm (block 312) that the nomadic device 103 (and, therefore, the vehicle user) is registered (block 316). The registration code(s) may be received by a vehicle user from the OEM (via, for example, a vehicle dealer or a third-party (e.g., a telematics service provider) either through a physical exchange (e.g., in-person or in a telephone call) or from an Internet-based exchange (e.g., through an email exchange or a website). Once received, the code may be input by the vehicle user. In some embodiments, the registration code (and any associated authorization codes) may periodically change and, as such, a new registration code may be received and input by the vehicle user. The registration code(s) may include numbers, letters, characters, or a combination of numbers, letters, and characters. Additionally, the code(s) may comprise graphics and colors. In some embodiments, the registration code(s) may be input by the vehicle user and stored in memory (e.g., locally or remotely) so that, thereafter, the code is automatically obtained.
The server 101 may store a registration code which may be compared to the registration code received by the nomadic device 103 as part of the confirmation process (block 312) to register the nomadic device 103 (block 316). The confirmation process may occur at server 101. In some embodiments, the comparison may be made to confirm that the codes are the same. Alternatively, the comparison may be made of different, but complementary codes. As one non-limiting example, the registration code from the vehicle user may be “ABCD” while the registration code on the server 101 may be “1234.” Accordingly, the server 101 may receive the “ABCD” registration code and, based on the correspondence between “ABCD” and “1234,” the nomadic device may be recognized (block 316).
If the registration code is not confirmed (block 312), the registration code may be requested and, in some embodiments, the request presented at the nomadic device (block 314). The registration code may be re-entered (block 310).
Referring back to block 306, if the vehicle user is using personal computer 105, information about the personal computer 105 may be obtained in order for the server 101 to identify the personal computer 105 (block 318). Non-limiting examples of personal computer information may include an IP address, a MAC address, or other like identifier. This information may be input by the vehicle user or obtained automatically.
As with when a nomadic device 103 is used, a registration code may be input to and received by the personal computer 105 (block 320) so that the personal computer 105 is registered (block 326). If the registration code(s) is not confirmed, a request for the registration code may be transmitted to the personal computer 105 and, in some embodiments, presented at the computer 105 (block 324). Details of the confirmation process (block 322) and further details about the registration code(s) are described above. Accordingly, for purposes of brevity, these details are not herein repeated. In some embodiments, the process illustrated in
As represented by circle block A, the authentication process may further include one or more processes at the vehicle 121. One non-limiting example of this authentication process is provided in
The authentication request may be received in the vehicle 121 by the module 200 (block 400). In some embodiments, the authentication request may not be received until the registration code(s) is confirmed. In other embodiments, the authentication request may be received at any time. Accordingly, the order of the processes illustrated in
The one or more commands for vehicle-based services from the vehicle user may be received by the module 200 (block 402). The command(s) may be transmitted to the vehicle 121 from nomadic device 103 or personal computer 105 directly or via server 101.
The authentication sequence may be initiated in the vehicle (block 404). The module 200 may monitor for the receipt or presence of one or more authentication items (block 412). The authentication items may include, but are not limited to, one or more of the following, individually or in combination: 1 vehicle key, 2 or more vehicle keys, voice, one or more codes (e.g., numeric, alphabetic, or alphanumeric), a pattern of maneuvers, or a question and answer process. In some embodiments, the module may monitor that one or more of these authentication items are within the vehicle. As one non-limiting example, the RF module (e.g., a PEPS receiver) may monitor for the presence of at least two programmed vehicle keys. If detected, the vehicle user may be confirmed as authenticated and, further, in the vehicle.
In other alternative or additional embodiments, the module may monitor for authentication items that are received from a remote source (such as nomadic device 103 and/or personal computer 105). As one non-limiting example, the module 200 may monitor for a code (which may be different than the registration code described with respect to
Of course, the code or maneuvers (in the non-limiting example above) may be provided in the vehicle. For example, the vehicle user may input the code using the vehicle's HMI (e.g., and without limitation, a touchscreen display, a microphone, one or more controls in the center stack, a vehicle keypad, and others). Accordingly, the monitoring may be for authentication items at least some of which may be provided in the vehicle or remote from the vehicle.
In some embodiments, the authentication sequence may be time limited. Accordingly, if the vehicle-based authentication sequence is not completed within the time period, the command(s) for vehicle-based services rejected. In this case, a timer may be initiated as part of the authentication sequence (block 406). The module 200 may use a vehicle clock, a GPS clock, a crystal oscillator, or other like timer for measuring the time. The time period may be measured in seconds, minutes, clock cycles, or variations thereof.
In the illustrative embodiment of
If one or more authentication items have not been received (block 414), the module 200 may continue to monitor for the authentication item(s) until the time has expired (block 408). Additionally, the time may continue to be monitored if one or more authentication items have been received, but the items are not valid or recognized (block 416). Non-limiting examples where one or more authentication items may not be recognized include, but are not limited to: one key in the vehicle where two are required, incorrect code(s), incorrect maneuver(s), voice is not recognized, and the like. Accordingly, if the time has not expired (block 420), one or more authentication items may continue to be provided (block 412) unless the number of attempts has been exceeded (block 422). The number of attempts may be predetermined by the OEM (or VCIS provider). In some embodiments, the vehicle user may get a single attempt. Once the number of attempts has been exceeded, the authorization process may be suspended (block 410). In some embodiments, the authentication process may be restarted.
It will be appreciated that the time periods 408 and 420 may comprise a single time period. For example, the receipt (block 412) and recognition (block 416) of the authentication items may occur in the same time period in order for the user to be authorized. Alternatively, the time periods 408,412 may be separate time periods measured by separate timers or resetting a timer to measure the time of receipt (block 414) or recognition (block 416) of the authentication items.
If the time has expired, the process may be suspended (block 410). In some embodiments, the authentication process may be restarted.
If one or more authentication items are recognized (block 416), the vehicle user may be authenticated and authorized to use the VCIS and the command(s) accepted (block 418). In some embodiments, recognition of the authentication item(s) may indicate that an authorized user is in the vehicle.
In some embodiments, the vehicle user may be provided with instructions for the authentication process. These instructions may be presented audibly and/or visually at the nomadic device 103, personal computer 105, and/or in the vehicle (e.g., and without limitation, at a vehicle display). These instructions may be provided as the vehicle user performs each step of the authorization process. In some embodiments, the instructions may not be provided until is apparent that the vehicle user requires assistance. As one non-limiting, non-exhaustive example, the vehicle user may be provided instructions if the number of times to input the authentication item(s) has been exceeded.
After such information is received by the server 101 (block 403), including user identification information, the server 101 may determine that a new account is requested based on, for example, the user information and the module 200 information.
One or more notifications may be transmitted to the authorizing user (e.g., the user already having authorization) indicating that a user has requested authorization (block 405). An authorizing user may be a vehicle dealer or a private owner of the vehicle. The user requesting authorization may be an additional user and/or a substitute user of the system.
The notification may state, as a non-limiting example, “a new remote user (name of user) has requested to be account owner—current owner is (name of current owner).” The notification may also include instructions for the authorizing user to accept or reject the request. This notification may be received on the module 200 display (e.g., and without limitation, as a pop-up notification) and/or in the vehicle as a voice notification. In additional or alternative embodiments, the notification may be received on the ND 103 and/or PC 105 as an email, a text message, instant message, web-based message, and the like (block 407).
In one embodiment, the authorization may be accepted/rejected by the requesting user (who then, if accepted, becomes the additional/substitute user). However, a notification may be received at the ND 103 and/or PC 105 notifying the current owner that authorization is being requested and/or authorization was accepted/rejected.
If the request is rejected by the authorizing user, the requesting user(s) may not be authorized to use the system. However, if accepted by the authorizing user, the requesting user(s) may be added/substituted (block 411) and the user authorized (block 413).
In some embodiments, as illustrated in
If authorization is accepted, the additional/substitute user(s) may only be permitted limited operation of the module 200. As some non-limiting, non-exhaustive examples, the additional user(s) may be restricted from GPS tracking, vehicle lock and/or unlock, and vehicle charging schedule.
Additional notification(s) may be transmitted after the first notification for granting authorization to the additional/substitute user(s). If authorization is accepted, the additional/substitute user may operate all functions of the module 200 (block 409).
In some embodiments, there may be a period of time that elapses before the additional notification(s) are transmitted. The period of time may be in seconds, minutes, hours, days, or variations thereof. The time gap may provide additional confirmation that the additional/substitute user is authorized. For example, if the period of time that elapses is 24 hours, the time gap may confirm that an owner has confirmed authorization of the additional/substitute user (after the second notification) because a non-owner may not have 24-hour access to the vehicle.
In some instances, however, a vehicle technician may have longer than 24 hour access to the vehicle. In this case, if the unscrupulous technician attempts to self-authorize access to the system (e.g., via the module 200), the vehicle owner may be notified at ND 103 and/or PC 105. The vehicle owner may have an override option which disables authorization to the system 200. Alternatively, accepting or rejecting authorization after the second notification may only be permitted from the ND 103 and/or PC 105 so that accepting/rejecting authorization is not permitted from the vehicle.
An authorized user may monitor the usage of the VCIS 100.
A request may be received in the vehicle or remotely from the vehicle (block 500). The request may be received from an authorized user and/or the module 200. The request may be for information for select system usage or all system usage. Accordingly, the usage information may be received according to the type of information requested (block 502) and presented to an authorized user.
Non-limiting and non-exhaustive examples of usage information that may be obtained and provided to the user are illustrated in
In some embodiments, the authorized user may indicate whether the associated nomadic device 103 is authorized (block 508) by rejecting the request (block 510) or permitting/accepting the request (block 512). In some embodiments, granting permission may not require input or instructions from the authorized user. For example, the paired nomadic device 103 may be automatically accepted based on information provided by the authorized user indicating which nomadic device(s) 103 are authorized, which may be stored at server 101.
Additionally or alternatively, the vehicle user may obtain vehicle tracking information (block 516). In this case, a tracking event for tracking the vehicle 121 may be received by the module 200 from another person (at another device) and the vehicle's position transmitted to server 101. As an example, a service technician, having access to the vehicle, may attempt to track the vehicle's location. The vehicle user may be notified of the vehicle tracking (block 506) and may permit (block 512) or deny the tracking (block 510). The process for denying or granting permission is described above and, for purposes of brevity, is not herein repeated.
Additionally or alternatively, the vehicle user may request a command history report (block 518). Commands received by the module 200 may be stored in memory at the vehicle or on the server 101. Accordingly, if a report is not requested, if any command(s) are received by the module 200, the may be stored (block 514). If the vehicle user requests a report, the report may be presented in the vehicle, at the nomadic device 103 or at the personal computer 105 (block 520).
Other non-limiting examples of notifications (not shown) may include notification(s) relating to expiration of a subscription to the service and unavailability of one or more services of the module 200.
While exemplary embodiments are illustrated and described above, it is not intended that these embodiments illustrate and describe all possibilities. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the invention.
This application is a continuation of U.S. application Ser. No. 13/945,193 Apr. 1, 2011, now U.S. Pat. No. 8,522,320, issued on Aug. 27, 2013, the disclosure of which is incorporated in its entirety by reference herein. reference herein.
Number | Name | Date | Kind |
---|---|---|---|
4543569 | Karlstrom | Sep 1985 | A |
5081667 | Drori et al. | Jan 1992 | A |
5467070 | Drori et al. | Nov 1995 | A |
5513107 | Gormley | Apr 1996 | A |
5627510 | Yuan | May 1997 | A |
5635916 | Bucholtz et al. | Jun 1997 | A |
5655081 | Bonnell et al. | Aug 1997 | A |
5734336 | Smithline | Mar 1998 | A |
5776031 | Minowa et al. | Jul 1998 | A |
5828319 | Tonkin et al. | Oct 1998 | A |
5874889 | Higdon et al. | Feb 1999 | A |
5959540 | Walter | Sep 1999 | A |
6018291 | Marble et al. | Jan 2000 | A |
6133825 | Matsuoka | Oct 2000 | A |
6177866 | O'Connell | Jan 2001 | B1 |
6198996 | Berstis | Mar 2001 | B1 |
6263282 | Vallancourt | Jul 2001 | B1 |
6268804 | Janky et al. | Jul 2001 | B1 |
6271745 | Anzai et al. | Aug 2001 | B1 |
6282226 | Furukawa | Aug 2001 | B1 |
6434455 | Snow et al. | Aug 2002 | B1 |
6434486 | Studt et al. | Aug 2002 | B1 |
6438491 | Farmer | Aug 2002 | B1 |
6439078 | Schlude et al. | Aug 2002 | B1 |
6574734 | Colson et al. | Jun 2003 | B1 |
6590495 | Behbehani | Jul 2003 | B1 |
6668221 | Harter, Jr. et al. | Dec 2003 | B2 |
6679702 | Rau | Jan 2004 | B1 |
6690260 | Ashihara | Feb 2004 | B1 |
6737963 | Gutta et al. | May 2004 | B2 |
6754562 | Strege et al. | Jun 2004 | B2 |
6785542 | Blight et al. | Aug 2004 | B1 |
6810309 | Sadler et al. | Oct 2004 | B2 |
6853919 | Kellum | Feb 2005 | B2 |
6859718 | Fritz et al. | Feb 2005 | B2 |
6871145 | Altan et al. | Mar 2005 | B2 |
6906619 | Williams et al. | Jun 2005 | B2 |
6941194 | Dauner et al. | Sep 2005 | B1 |
7057501 | Davis | Jun 2006 | B1 |
7075409 | Guba | Jul 2006 | B2 |
7102496 | Ernst, Jr. et al. | Sep 2006 | B1 |
7124027 | Ernst, Jr. et al. | Oct 2006 | B1 |
7148790 | Aoyama et al. | Dec 2006 | B2 |
7161563 | Vitale et al. | Jan 2007 | B2 |
7173903 | Remboski et al. | Feb 2007 | B2 |
7194069 | Jones et al. | Mar 2007 | B1 |
7207041 | Elson et al. | Apr 2007 | B2 |
7228213 | Sakai et al. | Jun 2007 | B2 |
7246062 | Knott et al. | Jul 2007 | B2 |
7266438 | Kellum et al. | Sep 2007 | B2 |
7301441 | Inada et al. | Nov 2007 | B2 |
7337113 | Nakagawa et al. | Feb 2008 | B2 |
7340332 | Underdahl et al. | Mar 2008 | B2 |
7356394 | Burgess | Apr 2008 | B2 |
7366892 | Spaur et al. | Apr 2008 | B2 |
7375620 | Balbale et al. | May 2008 | B2 |
7391305 | Knoll et al. | Jun 2008 | B2 |
7484008 | Gelvin et al. | Jan 2009 | B1 |
7565230 | Gardner et al. | Jul 2009 | B2 |
7602782 | Doviak et al. | Oct 2009 | B2 |
7783475 | Neuberger et al. | Aug 2010 | B2 |
7812712 | White et al. | Oct 2010 | B2 |
7862945 | Saito et al. | Jan 2011 | B2 |
8050817 | Moinzadeh et al. | Nov 2011 | B2 |
8050863 | Trepagnier et al. | Nov 2011 | B2 |
8089339 | Mikan et al. | Jan 2012 | B2 |
8232864 | Kakiwaki | Jul 2012 | B2 |
8237554 | Miller et al. | Aug 2012 | B2 |
8258939 | Miller et al. | Sep 2012 | B2 |
8301108 | Naboulsi | Oct 2012 | B2 |
8305189 | Miller et al. | Nov 2012 | B2 |
8311722 | Zhang et al. | Nov 2012 | B2 |
8417415 | Phelan | Apr 2013 | B2 |
8522320 | Kleve et al. | Aug 2013 | B2 |
9399445 | Abou Mahmoud | Jul 2016 | B2 |
20020013650 | Kusafuka et al. | Jan 2002 | A1 |
20020031228 | Karkas et al. | Mar 2002 | A1 |
20020096572 | Chene et al. | Jul 2002 | A1 |
20020097145 | Tumey et al. | Jul 2002 | A1 |
20030004730 | Yuschik | Jan 2003 | A1 |
20030055643 | Woestemeyer et al. | Mar 2003 | A1 |
20030079123 | Ribes | Apr 2003 | A1 |
20030217148 | Mullen et al. | Nov 2003 | A1 |
20030220725 | Harter, Jr. et al. | Nov 2003 | A1 |
20030231550 | MacFarlane | Dec 2003 | A1 |
20040046452 | Suyama et al. | Mar 2004 | A1 |
20040073367 | Altan et al. | Apr 2004 | A1 |
20040088205 | Geisler et al. | May 2004 | A1 |
20040124968 | Inada et al. | Jul 2004 | A1 |
20040176906 | Matsubara et al. | Sep 2004 | A1 |
20040227642 | Giles et al. | Nov 2004 | A1 |
20040236475 | Chowdhary | Nov 2004 | A1 |
20050021597 | Derasmo et al. | Jan 2005 | A1 |
20050033517 | Kondoh et al. | Feb 2005 | A1 |
20050125110 | Potter et al. | Jun 2005 | A1 |
20050134115 | Betts, Jr. et al. | Jun 2005 | A1 |
20050177635 | Schmidt et al. | Aug 2005 | A1 |
20050190039 | Aoyama | Sep 2005 | A1 |
20050193212 | Yuhara | Sep 2005 | A1 |
20050261816 | DiCroce et al. | Nov 2005 | A1 |
20060056663 | Call | Mar 2006 | A1 |
20060142917 | Goudy | Jun 2006 | A1 |
20060150197 | Werner | Jul 2006 | A1 |
20060156315 | Wood et al. | Jul 2006 | A1 |
20060220904 | Jarlengrip | Oct 2006 | A1 |
20060250224 | Steffel et al. | Nov 2006 | A1 |
20060293813 | Nou | Dec 2006 | A1 |
20070027595 | Nou | Feb 2007 | A1 |
20070050954 | Cooperstein et al. | Mar 2007 | A1 |
20070072616 | Irani | Mar 2007 | A1 |
20070100514 | Park | May 2007 | A1 |
20070103339 | Maxwell et al. | May 2007 | A1 |
20070109094 | Sahai | May 2007 | A1 |
20070255568 | Pennock | Nov 2007 | A1 |
20080070616 | Yun | Mar 2008 | A1 |
20080109653 | Yokohama | May 2008 | A1 |
20080148374 | Spaur et al. | Jun 2008 | A1 |
20080150683 | Mikan et al. | Jun 2008 | A1 |
20080275604 | Perry et al. | Nov 2008 | A1 |
20090030605 | Breed | Jan 2009 | A1 |
20090045928 | Rao et al. | Feb 2009 | A1 |
20090096596 | Sultan et al. | Apr 2009 | A1 |
20090167524 | Chesnutt et al. | Jul 2009 | A1 |
20090184800 | Harris | Jul 2009 | A1 |
20090195370 | Huffman et al. | Aug 2009 | A1 |
20090275281 | Rosen | Nov 2009 | A1 |
20090309709 | Bevacqua et al. | Dec 2009 | A1 |
20100004818 | Phelan | Jan 2010 | A1 |
20100007479 | Smith | Jan 2010 | A1 |
20100013596 | Kakiwaki | Jan 2010 | A1 |
20100039224 | Okude et al. | Feb 2010 | A1 |
20100075656 | Hawarter et al. | Mar 2010 | A1 |
20100097178 | Pisz et al. | Apr 2010 | A1 |
20100057586 | Chow | May 2010 | A1 |
20100148923 | Takizawa | Jun 2010 | A1 |
20100178872 | Alrabady et al. | Jul 2010 | A1 |
20100191535 | Berry et al. | Jul 2010 | A1 |
20100191973 | Huntzicker et al. | Jul 2010 | A1 |
20100030458 | Coughlin | Dec 2010 | A1 |
20100321203 | Tieman et al. | Dec 2010 | A1 |
20110009107 | Guba et al. | Jan 2011 | A1 |
20110071720 | Schondorf et al. | Mar 2011 | A1 |
20110071725 | Kleve et al. | Mar 2011 | A1 |
20110071734 | Van Wiemeersch et al. | Mar 2011 | A1 |
20110102146 | Giron | May 2011 | A1 |
20110105097 | Tadayon et al. | May 2011 | A1 |
20110106374 | Margot et al. | May 2011 | A1 |
20110148574 | Simon et al. | Jul 2011 | A1 |
20110166748 | Schneider et al. | Jul 2011 | A1 |
20110213629 | Clark et al. | Sep 2011 | A1 |
20110215921 | Ben Ayed et al. | Sep 2011 | A1 |
20110275321 | Zhou et al. | Nov 2011 | A1 |
20110295444 | Westra et al. | Dec 2011 | A1 |
20120041633 | Schunder et al. | Feb 2012 | A1 |
20120054036 | Nam et al. | Mar 2012 | A1 |
20120071140 | Oesterling et al. | Mar 2012 | A1 |
20120139760 | Bevacqua et al. | Jun 2012 | A1 |
20120157069 | Elliott et al. | Jun 2012 | A1 |
20120280786 | Miller et al. | Nov 2012 | A1 |
20120284702 | Ganapathy et al. | Nov 2012 | A1 |
20120293317 | Hanna et al. | Nov 2012 | A1 |
20120313768 | Campbell et al. | Dec 2012 | A1 |
20130005302 | Ozaki | Jan 2013 | A1 |
20130162421 | Inaguma et al. | Jun 2013 | A1 |
20130200999 | Spodak et al. | Aug 2013 | A1 |
Number | Date | Country |
---|---|---|
1863052 | Nov 2006 | CN |
101596895 | Dec 2009 | CN |
102007046270 | Apr 2009 | DE |
0449471 | Oct 1991 | EP |
0971463 | Jan 2000 | EP |
1095527 | May 2001 | EP |
2008195253 | Aug 2008 | JP |
2008303630 | Dec 2008 | JP |
2001025572 | Apr 2001 | WO |
2009158469 | Dec 2009 | WO |
2012015403 | Feb 2013 | WO |
Entry |
---|
Autobiometrics, COM, US Distributor for ATRD Biometric Immobilizer, http://www.autobiometrics.com, Jul. 6, 2011. |
Ford Motor Company, “SYNC with Navigation System,” Owner's Guide Supplement, SYNC System Version 1 (Jul. 2007). |
Ford Motor Company, “SYNC,” Owners's Guide Supplement, SYNC System Version 1 (Nov. 2007). |
Ford Motor Company, “SYNC with Navigation System,” Owner's Guide Supplement, SYNC System Version 2 (Oct. 2008). |
Ford Motor Company, “SYNC,” Owner's Guide Supplement, SYNC System Version 2 (Oct. 2008). |
Ford Motor Company, “SYNC with Navigation System,” Owner's Guide Supplement, SYNC System Version 3 (Jul. 2009). |
Ford Motor Company, “SYNC,” Owner's Guide Supplement, SYNC System Version 3 (Aug. 2009). |
Kermit Whitfield, “A hitchhiker's guide to the telematics ecosystem,” Automotive Design & Production, Oct. 2003, http://findarticles.com, pp. 103. |
Driver Focus—Telematics Working Group, Statement of Principles, Criteria and Verification Procedures on Driver Interactions with Advanced in-Vehicle Information and Communications Systems, Including 2006 Updated Sections, Jun. 26, 2006. |
Chinese Patent Office, Third Office Action for the corresponding Chinese Patent Application No. 201210078615.7 dated Aug. 6, 2014. |
Number | Date | Country | |
---|---|---|---|
20150262439 A1 | Sep 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13945193 | Jul 2013 | US |
Child | 14712367 | US | |
Parent | 13078345 | Apr 2011 | US |
Child | 13945193 | US |