Network-based control of movable barrier operators for autonomous vehicles

Information

  • Patent Grant
  • 12056971
  • Patent Number
    12,056,971
  • Date Filed
    Tuesday, September 5, 2023
    a year ago
  • Date Issued
    Tuesday, August 6, 2024
    6 months ago
Abstract
The present disclosure generally relates to a system and method for enabling on-demand, temporary storage of an autonomous vehicle in vehicle storage areas of existing infrastructures. The vehicle storage areas include one or more movable barrier operators configured to control access to the vehicle storage areas via movable barriers. An autonomous vehicle access control platform is configured to enable access to individual ones of the vehicle storage areas by a single-use access credential sent to at least one of the autonomous vehicle and one of the movable barrier operators. The autonomous vehicle access control platform communicates with a transportation-as-a-service (TaaS) platform that pairs an autonomous vehicle with a vehicle storage area for storage based at least on a factor or parameter including the location of the vehicle storage area relative to the autonomous vehicle.
Description
FIELD

This disclosure relates to control systems for directing autonomous vehicles, and more specifically, to control systems for directing autonomous vehicles to vehicle storage areas.


BACKGROUND

Many people own or lease vehicles and store such vehicles in either a personal garage or a portion of a shared/communal resource such as a parking lot or garage. As the percentage of autonomous vehicles on roadways increases, the number of personally-owned vehicles may decrease and, as such, people will be less likely to have a vehicle parked in their garage or parking spot.


Many transportation as a service (“TaaS”) companies, such as Lyft® and Uber®, exist today and are changing the automotive industry from one where individual consumers own vehicles to one where vehicles are provided as a service. Consumers now expect to have on-demand transportation with no more than a click of a button.


TaaS companies are currently developing autonomous vehicle fleets. Autonomous vehicles promise to reduce crashes, save lives, prevent traffic congestion, reduce fuel consumption, and improve land use. However, since these autonomous vehicles will be owned by service providers such vehicles will not have access to the infrastructures used to store personally-owned vehicles, and logistical problems of service and storage will arise when trying to meet consumers' expectation of on-demand transportation. For example, if storage of autonomous vehicles is centralized, wait times will increase and routing logistics become more complicated especially in times of high demand such as the morning commute.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of an example autonomous vehicle control system for enabling the temporary storage of autonomous vehicles in existing vehicle storage areas.



FIG. 2 is a perspective view of an example vehicle storage area having various conditions that increase or decrease the risk, or desirability, associated with parking an autonomous vehicle in the vehicle storage area.



FIG. 3 is a schematic view of an example of a data structure of the autonomous vehicle control system of FIG. 1 storing various data related to a vehicle storage area.



FIG. 4 illustrates an example TaaS company risk profile of a vehicle storage area created from available risk score factors.



FIG. 5 is a block diagram of another example autonomous vehicle control system implemented as an authorized user-in-the-loop control system.



FIG. 6 is a schematic view of a network computing device enabled to determine which vehicle storage area to direct an autonomous vehicle to based on a price-risk function.



FIG. 7 is a functional-block diagram of an example movable barrier operator of the system of FIG. 1.



FIG. 8 is a functional-block diagram of an example autonomous vehicle.



FIG. 9 illustrates a first example communication flow between devices of the control system of FIG. 1.



FIG. 10 illustrates a second example communication flow between the devices of the control system of FIG. 5.



FIG. 11 illustrates a third example communication flow between the devices of the autonomous vehicle control system illustrated of FIG. 1.





DETAILED DESCRIPTION

In one aspect of the present disclosure, an autonomous vehicle control system is provided that balances a consumer's expectation of having rapid on-demand transportation with the realities of implementing autonomous vehicles. The autonomous vehicle control system facilitates autonomous vehicles to be effectively and efficiently stored using existing infrastructures, like personal garages and parking spots. The autonomous vehicle control system allows a fleet of TaaS vehicles to be stored in existing infrastructures and to be efficiently dispersed in the existing infrastructures in order to meet consumer demand.


In accordance with another aspect of the present disclosure, an autonomous vehicle control system is provided that enables on-demand, temporary storage of autonomous vehicles in vehicle storage areas of existing infrastructures. The vehicle storage areas are each associated with one or more movable barrier operators configured to control access to the vehicle storage areas via one or more movable barriers. The autonomous vehicle control system includes an autonomous vehicle access control platform that is configured to enable access to the vehicle storage area such as by sending a single-use access credential to at least one of an autonomous vehicle and a movable barrier operator associated with the vehicle storage area. The single-use access credential may be generated by, for example, a single-use credential generator of an autonomous vehicle access control platform. The single-use credential generator may generate a single-use access control credential that is only valid to be used for a fixed period of time or, for example, only valid to be used in a window of time surrounding an estimated arrival time of the vehicle at a vehicle storage area.


The autonomous vehicle control system may pair an autonomous vehicle with a vehicle storage area for storage based at least in part on the location of the vehicle storage area relative to the autonomous vehicle. The autonomous vehicle control system may consider a number of other data when pairing an autonomous vehicle with a vehicle storage area. For example, the autonomous vehicle control system may consider the ability of an autonomous vehicle to make use of a charger in the vehicle storage area, the ability of an autonomous vehicle to access a wireless network of the vehicle storage area, the size of the vehicle storage area relative to the size of the vehicle, as well as the storage history of other vehicles that have used a particular vehicle storage area.


The autonomous vehicle control system improves the operation of autonomous vehicles by addressing resource expenditure (e.g., fuel as well as wear and tear on the vehicles) and time delay issues inherent in centralized storage solutions for autonomous vehicles. Moreover, the autonomous vehicle control system provides benefits to consumers that have unused vehicle storage areas as a result of their reliance on TaaS companies to meet those consumers' transportation needs. Specifically, users that have unused vehicle storage areas are able to monetize that vehicle storage area by allowing the autonomous vehicles to park in the vehicle storage area for the purposes of storage and service. When an autonomous vehicle uses a vehicle storage area provided by a user, the user is remunerated by the TaaS company who owns or is otherwise responsible for operating the autonomous vehicle.


The autonomous vehicle control system may include or access one or more data structures such as databases to store information related to vehicle storage areas. For example before an autonomous vehicle parks itself (or is otherwise parked) in a space of a vehicle storage area, the autonomous vehicle may collect data regarding the vehicle storage area and provide the collected data to the one or more databases. The collected data will be used by the autonomous vehicle control system to determine the suitability of the space for autonomous vehicle storage and service.


The autonomous vehicle control system may further use: data stored in the one or more databases by the user of the vehicle storage area; or data stored in the database by one or more electronic devices associated with the vehicle storage area, for example, one or more data collected by sensors such as image sensors, microphones, or hazardous gas detectors. For example, when a user creates a profile with the access control platform server that indicates the user's vehicle storage area is available for use by autonomous vehicles, the user may specify one or more pieces of information about themselves and/or the vehicle storage area. In the case of the one or more electronic devices supplying data, the data may be collected from one or more sensors or those one or more electronic devices.


The autonomous vehicle's collection of data related to a vehicle storage area may include determining whether parameters describing the physical dimensions of a particular vehicle storage area have been previously stored in a database and, if not, the autonomous vehicle may use one or more sensors (such as image-based or sound-based) to determine the physical dimensions. For example, the autonomous vehicle may determine the dimensions of the vehicle storage area and then communicate the dimensions of the vehicle storage area to the autonomous vehicle control system. The autonomous vehicle control system may then use the obtained dimensions of the vehicle storage area to pair autonomous vehicles to the vehicle storage area based on known dimensions of the autonomous vehicles and known dimensions of the vehicle storage area.


Such a determination of suitability provides a level of risk control or mitigation for TaaS companies. Because there is risk in storing an autonomous vehicle in a secured space not owned, managed or strictly under the control of the TaaS company, the TaaS company may desire an objective measure of the risk associated with storage at a particular vehicle storage area. For example, the autonomous vehicle, in addition to detecting the dimensions of the vehicle storage area, may determine the presence or absence of combustible materials, sprinkler systems, objects likely to fall on or otherwise damage the vehicle, and any other observable hazard that presents a storage risk to the autonomous vehicle. Any or all of these detected environmental conditions may be taken into consideration by the autonomous vehicle control system to determine the suitability or risk of storing an autonomous vehicle in a vehicle storage area. The autonomous vehicle control system may also use data that a user inputs into the profile associated with the vehicle storage area as well as data from the one or more electronic devices associated with the vehicle storage area to determine the suitability or risk associated with storing autonomous vehicle in a vehicle storage area.


A TaaS company may determine a risk profile, indicating a storage and service risk the the TaaS company is willing to tolerate, and the autonomous vehicle control system may pair an autonomous vehicle with a vehicle storage area based on the storage risk the TaaS company is willing to tolerate. Furthermore, upon arrival at a vehicle storage area, the autonomous vehicle may perform an independent risk analysis of the vehicle storage area to determine if the storage risk has changed—that is, whether a current risk is different than the storage risk previously calculated by the autonomous vehicle control system relative to environmental observations made by other autonomous vehicles. If the risk is different, the autonomous vehicle may reject the vehicle storage area, update the autonomous vehicle control system with new risk parameters, and request that the autonomous vehicle control system find a new vehicle storage area for the autonomous vehicle.


With reference to FIG. 1, an autonomous vehicle control system 1 is illustrated. The autonomous vehicle control system 1 includes an autonomous vehicle access control platform 100 that includes an access control platform server 101 connected to an autonomous vehicle service server 150 of a TaaS platform 130 and to a vehicle storage system 110. The access control platform server 101 may connect to the autonomous vehicle service server 150 and the vehicle storage system 110 over one or more networks such as the Internet. Optionally, the access control platform server 101 may also connect to and communicate directly with an autonomous vehicle 120, again, over one or more communications networks such as the Internet and/or wide-area (e.g., cellular phone communication) wireless systems. The access control platform server 101 may be configured to send, receive, associate, determine, and cause to be stored one or more status parameters, demographic data, access credentials, and vehicle storage system commands.


The vehicle storage system 110 may include one or more movable barrier operators 115 and one or more vehicle storage areas 15. The autonomous vehicle control system 1 is operable to direct a plurality of autonomous vehicle 120, such as dozens or hundreds of autonomous vehicles 120 in urban, suburban and rural areas, to any one of a plurality of vehicle storage areas 15, such as dozens or hundreds of home garages owned by users. The autonomous vehicle control system 1 also facilitates operation of the movable barrier operators 115 associated with the vehicle storage areas 15 once the autonomous vehicles 120 arrive at the vehicle storage areas 15.


The vehicle storage system 110 may include one or more access control devices 105. In one embodiment, the one or more access control devices 105 include a lock of a passageway door that opens to the vehicle storage area 15. In a commercial setting with multiple vehicles in a vehicle storage area, the access control devices 105 may include locks that restrict movement of vehicles in the vehicle storage area 15. The one or more access control devices 105 may be configured to communicate over a network such as the Internet. The access control devices 105 of the vehicle storage platform 110 may also be networked to each other and to the movable barrier operator 115 in a peer-to-peer ad hoc fashion using a short-range communication protocol such as, Zigbee®, Bluetooth® (or Bluetooth Low Energy (BLE)), or Near Field Communications (NFC), or Wi-Fi with at least one of the access control devices 105 of the vehicle storage platform 110 being able to access a communication network such as the Internet. The one or more access control devices 105 may also be in communication with one or more movable barrier operators 115.


As shown in FIG. 2, the movable barrier operator 115 may be, for example, a garage door opener that adjusts the position of a segmented garage door 217 to control access to the vehicle storage area 15. In other embodiments, the movable barrier operator 115 may be configured to shift or swing a gate as some examples. As shown in FIG. 7, the movable barrier operator 115 may have a processor 704 operatively connected to a memory 703, communication circuitry 701, a motor 705 configured to raise and lower or otherwise move a movable barrier 70 such as a gate or a door (e.g., garage door 217), and one or more sensors 702. The one or more sensors 702 may detect one or more environmental conditions of the vehicle storage area 15. For example, the one or more sensors 702 may detect the presence of smoke, heat, flames, carbon monoxide, excess humidity, the presence of standing water, the presence of an obstacle in a space designated for an autonomous vehicle, or any other environmental factor that affects the suitability of the vehicle storage area 15 for use by the autonomous vehicle 120. The movable barrier operator 115 may transmit the environmental conditions to the autonomous vehicle access control platform 100 and/or the autonomous vehicle service server 150.


The access control platform server 101 may be operatively connected to a memory of the access control platform 100 containing an access control platform data structure such as database 102 (FIG. 3). The database 102 stores one or more status parameters, such as environmental conditions sensed by the one or more sensors 702, risk scores, secure space IDs, physical parameters such as area or volume (e.g., length, width and height) of the vehicle storage area 15, demographic data, access credentials, or commands from the access control platform server 101. The access control platform database 102 may further store one or more user accounts associated with one or more vehicle storage platforms 110 and profiles of one or more vehicle storage areas 15 provided by one or more users. The one or more status parameters, risk scores, vehicle storage area condition parameters, vehicle storage area IDs, physical parameters of a vehicle storage area, demographic data, access credentials, and commands stored in the access control platform database 102 may be associated with one or more of the stored user accounts. Any or all of the parameters described as being stored in the access control platform database 102 may also be stored in a memory of the TaaS platform 130, such as a memory containing TaaS database 132.


The status parameters may further include parameters such as the geographical location (e.g., GPS coordinates, street address, etc.) and operating status of one or more movable barrier operators 115 associated with a user account; the presence or absence of one or more peripheral devices, such as charging devices and WiFi access points, in the one or more vehicle storage area 15 controlled by the one or more movable barrier operators 115; rates offered by one or more users for use of one or more vehicle storage areas 15; and an indication of whether or not the vehicle storage areas 15 are currently occupied.


The access control platform database 102 may further store one or more risk scores for one or more of the vehicle storage areas 15. For example, the access control platform database 102 may associate a risk score with a vehicle storage area ID. A secure space ID is an identifier that uniquely identifies a vehicle storage area 15. The risk score may be determined and output by a risk calculation process implemented on either the access control platform server 101 or the TaaS platform 130, or a combination thereof.


The risk calculation may be embodied in or otherwise performed by, for example, a single layer neural expert system, a multilayer neural expert system, or a neuro-fuzzy system having one or more processes under control. For example, the risk calculation may be implemented to control the process of determining the risk score using one or more parameters stored in at least one of the access control platform database 102 and the TaaS database 132 and/or one or more vehicle storage area condition parameters received from at least one of the movable barrier operator 115 and the autonomous vehicle 120.


With reference to FIG. 2, the vehicle storage area parameters may indicate one or more conditions present in the vehicle storage area 15. The one or more conditions identified as being present by the vehicle storage area conditions parameters may include identification of the position of one or more objects that could fall on or otherwise damage the autonomous vehicle 120 such as a loose ceiling tile 225 or a unstable shelf 223; the presence of risk mitigation devices such as sprinklers 219 or other fire extinguishers; and the presence of hazardous materials such as hazardous materials 221. The hazardous materials 221 may include, for example, flammable chemicals.


The risk score factors that are input into the risk calculation may be customizable based on the needs or risk tolerance of a particular TaaS company. For example, FIG. 4 provides a risk algorithm 470 that allows the TaaS company to create a TaaS company risk profile 410 by selecting and/or ranking, using for example a TaaS rank 415, in importance one or more risk score factors 405 such as presence of children in a household, crime rate associated with the neighborhood in which the vehicle storage area 15 is located, past incidence of damage to autonomous vehicles 120 parked in the vehicle storage area 15, the presence of hazardous materials in the vehicle storage area 15, and the presence of objects poised to fall on the autonomous vehicle in the vehicle storage area 15. Each of the selected risk parameters and their importance may then be input into the risk algorithm to determine a risk score 475 for a vehicle storage area 15.


With reference to FIG. 5, an authorized user-in-the-loop autonomous vehicle control system 2 is provided that is similar in many respects to the autonomous vehicle control system 1 and shares many of the same components. The autonomous vehicle control system 2 includes a user device 200 connected to any or all of the access control platform server 101, the movable barrier operator 115, the autonomous vehicle 120, and the TaaS platform 130. The user device 200 may be a device such as a smartphone, tablet computer, personal computer, or other electronic computing device capable of network communication.


A user may set the ask price for use of the vehicle storage area 15 using the user device 200. For example, after setting up a user account and creating a profile of the vehicle storage area 15, the user can make the vehicle storage area 15 available for use by autonomous vehicles 120. The user may set an ask price for the vehicle storage area 15. The ask price is the price the user requests in exchange for use of the vehicle service area 15 by an autonomous vehicle 120 of the fleet of the TaaS service.


The user device 200 includes a user interface that permits the user to set up a user account, set up a profile for the vehicle storage area 15, and set the ask price of the vehicle storage area 15. The user interface may also display other data to the user such as average ask price for other vehicle storage areas 15 in the neighborhood or area surrounding the vehicle storage area 15. The user interface of user device 200 may additionally be employed by the user to select various options such as: whether the ask price is fixed or variable (and additionally a range of ask prices such as a minimum and/or maximum); and whether the platform 100 may solicit bids (e.g., via a Dutch auction or ascending price auction) for use of the user's vehicle storage area 15 by a specific autonomous vehicle or for TaaS-exclusive use such as an extended or recurring basis.


After the user sets the ask price for their vehicle storage area 15 using the user device 200, the user device 200 communicates the ask price to at least one of the access control platform server 101 and the autonomous vehicle service server 150. The ask price may then be stored in at least one of the access control platform database 102 and the TaaS database 132. For example, the user may enter an ask price for use of the vehicle storage area 15 using the user device 200 and the user device 200 may transmit the ask price to the access control platform server 101. The access control platform server 101 may then store the ask price in the access control platform database 102 in association with the secured space ID of the vehicle storage area 15 for which the user set the ask price.


The autonomous vehicle 120 may make a parking or access request to either the access control platform server 101 or the autonomous vehicle service server 150. In the case that the autonomous vehicle 120 makes a parking request to the autonomous vehicle service server 150, the autonomous vehicle service server 150 may request information regarding a vehicle storage area 15. The requested information may include the ask price the user set for the vehicle storage area 15 and the risk score associated with the vehicle storage area 15. The autonomous vehicle service server 150, upon receipt of the ask price and the risk score, may determine which of the vehicle storage areas 15 to direct the autonomous vehicle 120 to park in based on a risk-pricing function. An example risk-pricing function 190 is shown in FIG. 6, however other suitable functions that balance price and risk may be employed.


Regarding FIG. 8, the autonomous vehicle 120 may have a processor 801 coupled or connected to a memory 803 and one or more sensors 804 for sensing the environment external to the autonomous vehicle 120 such as the physical dimension of a vehicle storage area and observable hazards such as unstable shelf 223, hazardous materials 221, and loose ceiling tile 225. Likewise, the autonomous vehicle 120 may have a battery 805 that powers any or all of the processor 801, the communication interface 802, the memory 803, the one or more sensors 804, and one or more drive motors 807 for propelling the autonomous vehicle 120. As can be appreciated, the autonomous vehicle 120 may be a plug-in electric vehicle, a plug-in hybrid electric/IC (internal combustion) vehicle, a hybrid electric vehicle, or an internal combustion vehicle. Additionally the autonomous vehicle 120 may be a “connected” car such that the communication interface 802 facilitates receipt and transmission of messages, information, signals, and the like via a wide-area network (e.g., cellular terrestrial, satellite, etc.). Alternatively or additionally, the communication interface 802 may be configured for short range communications with proximate objects (e.g., other vehicles, transportation system infrastructure, pedestrians, etc.) via peer-to-peer or ad-hoc mesh networks using one or more of vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-anything (V2X) protocols. The autonomous vehicle 120 may be either fully autonomous or semi-autonomous. A fully autonomous vehicle is a self-driving, driverless vehicle that can operate without a human driver in the vehicle or operating the vehicle remotely. A semiautonomous vehicle is a vehicle that can operate autonomously when performing certain functions but can utilize human intervention, either by a driver in the vehicle or a remote driver, for certain other functions. Although the autonomous vehicle 120 is shown as a wheeled, terrestrial car or truck, nevertheless the autonomous vehicle may alternatively or additionally be embodied as an aerial vehicle, a watercraft, or a combination land/water/air vehicle. Accordingly the vehicle storage area 15 may additionally or alternatively be embodied as a boat slip, a helipad, a hangar or combinations/portions thereof to which access is controlled via a barrier and movable barrier operator.


In order for the autonomous vehicle 120 to operate (or cause operation of) the movable barrier operator 115 and gain access to the vehicle storage area 15, the access control platform server 101 may communicate a single-use access credential, such as a temporary access credential, to the autonomous vehicle 120 that is configured to operate the movable barrier operator 115. The single-use access credential may be selected (e.g., from a list) or otherwise created, generated or instantiated by single-access credential generator 103 as shown in FIGS. 1 and 5 using various techniques that include, for example, rolling or changing codes known in the art. The single-use access credential improves the security of the home, business, or other area associated with the vehicle storage area 15 when a user decides to make the vehicle storage area 15 available for use by autonomous vehicles 120. FIG. 9 illustrates an example of a communication flow of a single-use access credential between the devices of the autonomous vehicle control system 1 of FIG. 1. In operation 901, the vehicle 120 may communicate with the TaaS platform 130 to request that the TaaS platform 130 direct the autonomous vehicle 120 to a vehicle storage area 15. In operation 902, after the TaaS platform 130 determines (e.g., using risk calculation/algorithm 170 and/or risk-pricing function 190) a vehicle storage area 15 for the autonomous vehicle 120 to be stored in, the TaaS platform 130 may request access credentials allowing it to operate the movable barrier operator 115 associated with the vehicle storage area 15 from the access control platform server 101. Alternatively, in operation 902, the TaaS platform 130 may forward the access request to the access control platform server 101 without determining a vehicle storage area 15 and instead the access control platform server 101 may determine the vehicle storage area 15 and associated movable barrier operator 115.


In operation 903, the access control platform server 101 may send an access credential request to the movable barrier operator 115 associated with the determined vehicle storage area 15. Upon receipt of the access credential request, the movable barrier operator 115 may generate a single-use access credential and send the single-use access credential to the access control platform server 101 in operation 904. The movable barrier operator 115 additionally or alternatively transmits the single-use access credential to the TaaS platform 130. Instead of sending the access credential request to the movable barrier operator 115 in operation 903, the access control platform server 101 may, itself, determine the single-use access credential and in operation 903 the access control platform server 101 may send the single-use access credential to the movable barrier operator 115. In operation 904, the movable barrier operator 115 may acknowledge that it has received the single-use access credential.


The single-use access credential may be a temporary access credential that is valid for only a set amount of time. For example, the TaaS platform 130 may calculate an expected arrival time of the autonomous vehicle 120 at the vehicle storage area 15 based on the current location of the autonomous vehicle 120 and the TaaS platform 130 may request that the access control platform server 101 or movable barrier operator 115 generate a temporary access credential based on the calculated arrival time. As will be described in more detail below, when autonomous vehicle 120 arrives at a vehicle storage area 15, the autonomous vehicle 120 will transmit the temporary access credential to the movable barrier operator 115 to open the associated movable barrier and allow the autonomous vehicle 120 to access the vehicle storage area 15. The access control platform server 101 may validate the temporary access credential only in, for example, a 15-minute window surrounding the estimated arrival time. Alternatively, the temporary access credential may be valid for a set period of time after it is requested such as 10, 15, or 20 minutes. The set period of time may be any length of time.


The calculated arrival time may be encrypted and used as the temporary access credential. The calculated arrival time may be encrypted using a homomorphic encryption algorithm. As such, changes in arrival time may be added or subtracted from the originally calculated arrival time without decrypting the temporary access credential. For example, if the originally calculated arrival time is 4:30 pm and the access control platform server 101 sent (4:30 pm) encrypted to either or both of the movable barrier operator 115 and the autonomous vehicle 120 as the temporary access credential and if the TaaS platform 130 determines that it will take 15 minutes longer to reach a secured space than originally calculated, the TaaS platform 130 may send (+15 minutes) encrypted to either or both of the movable barrier operator 115 and the autonomous vehicle 120 and the temporary access credential can be updated without decrypting the temporary access credential or requesting that the access control platform server 101 generate a new temporary access credential. This allows the window surrounding the arrival time to be as small as possible and increases security because the temporary access credential can be updated and the window can be shifted without retransmitting the entire temporary access credential. The TaaS platform 130 may determine whether an individual or aggregate arrival time change places the arrival time outside the window of the originally calculated arrival time and update the temporary access credential only if the change in arrival time places the arrival outside the window.


In another example, the single-use access credential may be a temporary access credential that is derived from information associated with the autonomous vehicle. For instance, the temporary access credential may be a numeric or alphanumeric code resulting from performance of a hash function on an identifier such as a VIN (vehicle identification number), MAC (media access control) address, IP (internet protocol) address or the like that is at least one of specific and substantially unique to the autonomous vehicle. To this end, the access control platform server 101 may: retrieve or receive vehicle-specific information from the data structure 102; hash an identifier or identifiers associated with the autonomous vehicle; and communicate (e.g., via a message of operation 904 of FIG. 9) the hashed identifier(s) to a barrier operator such that, upon arrival of the autonomous vehicle 120 at the storage area 15, the barrier operator 115 compares a newly-received identifier (or hashed version thereof) from/of the autonomous vehicle with a previously-received hashed identifier of operation 904. In view of the foregoing the temporary access credential may only be communicated to the barrier operator 115 rather than the vehicle 120 and the barrier operator thereby conserving resources in the system 1.


In yet another example an asymmetric cryptographic technique may be employed in which a public key of the autonomous vehicle 120 is stored by the access control platform server 101 or data structure 102. Accordingly the vehicle's public key may be communicated to barrier operator in operation 903 such that use of a private key by the vehicle facilitates access to a storage area 15 associated with the barrier operator.


Prior to the movable barrier operator 115 providing the temporary access credential to the access control platform server 101 in operation 904, the user offering the vehicle storage area 15 associated with the movable barrier operator 115 for use may be sent a permission request requesting permission to grant a temporary access credential to the autonomous vehicle 120. If the user indicates that a temporary access credential should be granted, using for example the user device 200 (see FIG. 5), then the access control platform server 101 will generate and send the temporary access credential.


In operation 905, the access control platform server 101 may send the TaaS platform 130 the temporary access credential, and in operation 906 the TaaS platform 130 may relay or otherwise send the temporary access credential to the autonomous vehicle 120 and/or the movable barrier operator 115. Optionally, in operation 907, the autonomous vehicle 120 may send a message acknowledging receipt of the temporary access credential to the TaaS platform 130. Alternatively, or additionally, the autonomous vehicle 120 may send the message acknowledging receipt of the temporary access credential to the access control platform server 101.


In operation 908, the autonomous vehicle 120 may send a command signal, such as a request to move (e.g., open or close) a barrier and/or actuate a barrier operator 115, including the temporary access credential to the movable barrier operator 115 of the vehicle storage system 110 to open a movable barrier, such as the garage door 217 (see FIG. 2) controlled by the movable barrier operator 115. In operation 909, the movable barrier operator 115 may send a message or notification to the access control platform server 101 indicating that the autonomous vehicle 120 has used the temporary access credential and, optionally, in operation 910 the access control platform server 101 may relay or otherwise send the message or notification to the TaaS platform 130 to allow the TaaS platform 130 to reconcile billing. The notification permits the TaaS platform 130 to confirm that the autonomous vehicle 120 is using the vehicle storage area 115 to which the TaaS platform 130 directed the autonomous vehicle 120.



FIG. 10 illustrates an example of a communication flow between the devices of the autonomous vehicle control system 1 to facilitate charging of the autonomous vehicle 120 while the autonomous vehicle 120 is stored in the vehicle storage area 15. In operation 1001, the autonomous vehicle 120 sends a charging request to the TaaS platform 130 requesting that the battery 805 of the autonomous vehicle 120 be charged. In operation 1002, the TaaS platform 130 may relay or otherwise send the charging request to the access control platform server 101. The access control platform server 101 may then determine whether the vehicle storage area 15 is capable of charging the autonomous vehicle 120. If the access control platform server 101 determines that the vehicle storage area 15 is capable of charging the autonomous vehicle 120, the access control platform server 101 may authorize a charger 211 (FIG. 2) of the vehicle storage area 15 to be used by the autonomous vehicle 120. If the vehicle storage area 15 is not capable of charging the autonomous vehicle 120, the autonomous vehicle 120 may request that the autonomous vehicle control system 1 find a vehicle storage area 15 in which the autonomous vehicle 120 may be charged.


In operation 1003, the access control platform server 101 may send the charging request to the movable barrier operator 115. Alternatively, in operation 1003, the access control platform server 101 may send the charging request directly to the charger 211 of the vehicle storage area 15, or to a charging network associated with the charger 211.


In operation 1004, the movable barrier operator 115 may send the charging request to the charger 211 of the vehicle storage area 15 or to a charging network associated with the charger 211. Optionally, in operation 1005 a user or another party associated with the vehicle storage area 15 may be notified, by, for example, sending a message to the user device 200, to connect the charger 211 to the autonomous vehicle 120. However, in other instances when the charger 211 is a wireless (inductive) power station, at least one of the access control platform server 101, the barrier operator 115 and the vehicle 120 may cause the charger 211 to be activated or energized for vehicle charging without human intervention. In operation 1006, the autonomous vehicle 120 may notify the charger 211 or charging network that charging is complete. If human intervention for charging occurred in operation 1005, optionally in operation 1007, the user or another party associated with the vehicle storage area 15 may be notified, by for example sending a message to the user device 200 (FIG. 5), to disconnect the charger 211 from the autonomous vehicle 120. Alternatively if no human intervention was employed for charging, the charger 211 may be deactivated or de-energized after receipt of a message, signal or notification from vehicle 120.


In operation 1008, the charger 211 may notify the movable barrier operator 115 that charging has been completed and then in operation 1009 the movable barrier operator 115 may notify the access control platform server 101 that charging has been completed. Optionally, in operation 1010, the access control platform server 101 may notify the TaaS platform 130 that the autonomous vehicle 120 has been charged so that the TaaS platform 130 can reconcile billing.



FIG. 11 illustrates an example of a communication flow between the devices of the autonomous vehicle control system 1 illustrated in FIG. 1 to facilitate updating of the autonomous vehicle 120. In operation 1101, the TaaS platform 130 may send a notification to the autonomous vehicle 120 notifying the autonomous vehicle 120 that the autonomous vehicle 120 is to be updated and, after the autonomous vehicle 120 is parked in the vehicle storage area 15, in operation 1102 the autonomous vehicle 120 may communicate with the movable barrier operator (“MBO”) 115 to request access credentials for a local network 213, such as a home WiFi network. Optionally, in operations 1103 and 1104, the movable barrier operator 115 (which may already be attached/connected to or otherwise associated with the local network 213) may communicate with a local network entity such as a modem, an access point, or a router to obtain temporary access credentials. Then, in operation 1105, the movable barrier operator 115 may transmit the temporary access credentials for the local network 213 to the autonomous vehicle 120 and in operation 1106 the autonomous vehicle 120 may connect to the local network 213. Additionally the movable barrier operator 115 may transmit in operation 1105 network information to the vehicle 120, for example the network name (e.g., service set identifier (SSID) of the wireless local area network) when the network is hidden/private or the name is not broadcast.


In operation 1107, the autonomous vehicle 120 may request, pull or otherwise download the pending updates. The updates may include but are not limited to: software and/or firmware (e.g., patches); infotainment media; navigation/map data; journey/trip scheduling information, as some examples. Alternatively, in operation 1107 the TaaS platform 130 may recognize that the autonomous vehicle 120 is on the local network 213 and push the pending updates to the vehicle. In operation 1108, the movable barrier operator 115 may communicate with the access control platform server 101 via the connection between the autonomous vehicle 120 and the TaaS platform 130. For example, the local network entity may communicate the connection time, the number of packets sent and received, or the total amount of data transferred. And, optionally, in operation 1109, the access control platform server 100 may notify the TaaS platform 130 of the use of the local network so that the TaaS platform 130 may reconcile billing.


While there have been illustrated and described particular embodiments, it will be appreciated that numerous changes and modifications will occur to those skilled in the art, and it is intended for the present disclosure to cover all those changes and modifications which fall within the scope of the appended claims. Although method operations may be presented and described herein in a sequential fashion, one or more of the operations shown and described may be omitted, repeated, performed concurrently, and/or performed in a different order than the order shown in the figures and/or described herein. Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described examples without departing from the scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.

Claims
  • 1. A network computing device for facilitating operation of movable barrier operators by autonomous vehicles, the network computing device comprising: a communication interface operable to communicate with a plurality of autonomous vehicles and a plurality of movable barrier operators associated with a plurality of vehicle storage areas, the communication interface further operable to receive sensed environmental conditions of the plurality of vehicle storage areas;a memory to store information regarding the plurality of movable barrier operators and the sensed environmental conditions of the plurality of vehicle storage areas;a processor operably coupled to the communication interface and the memory, the processor configured to: select a first vehicle storage area of the plurality of vehicle storage areas for a first autonomous vehicle of the plurality of autonomous vehicles based at least in part upon the sensed environmental conditions, the first vehicle storage area associated with a first movable barrier operator of the plurality of movable barrier operators; andcause the communication interface to communicate a temporary access credential to the first movable barrier operator to facilitate operation of the first movable barrier operator by the first autonomous vehicle and permit the first autonomous vehicle to access the first vehicle storage area.
  • 2. The network computing device of claim 1, wherein the memory is further configured to store information regarding availability of the vehicle storage areas associated with the movable barrier operators, and wherein the processor is configured to select the first vehicle storage area for the first autonomous vehicle based at least in part upon the sensed environmental conditions and the availability of the first vehicle storage area associated with the first movable barrier operator.
  • 3. The network computing device of claim 1, wherein the processor is further configured to obtain an expected arrival time of the first autonomous vehicle at the first vehicle storage area associated with the first movable barrier operator, wherein the temporary access credential is based at least in part upon the expected arrival time.
  • 4. The network computing device of claim 1, wherein the processor is configured to utilize the sensed environmental conditions to perform a risk assessment of the plurality of vehicle storage areas; and wherein the processor is configured to select the first vehicle storage area based at least in part upon the risk assessment.
  • 5. The network computing device of claim 1, wherein the processor is configured to select the first vehicle storage area for the first autonomous vehicle based at least in part upon the sensed environmental conditions and a location of the first vehicle storage area relative to the first autonomous vehicle.
  • 6. The network computing device of claim 1, wherein the temporary access credential includes a public key associated with the first autonomous vehicle.
  • 7. The network computing device of claim 1, wherein the processor is further configured to cause the communication interface to communicate a second temporary access credential to the first autonomous vehicle, the second temporary access credential corresponding to the temporary access credential communicated to the first movable barrier operator.
  • 8. The network computing device of claim 1, wherein the temporary access credential is derived from at least one of: a vehicle identification number (VIN) specific to the first autonomous vehicle;a media access control (MAC) address specific to the first autonomous vehicle; andan internet protocol (IP) address specific to the first autonomous vehicle.
  • 9. The network computing device of claim 1, wherein the processor is configured to facilitate communication of at least one of software updates and firmware updates to the first autonomous vehicle at the first vehicle storage area.
  • 10. The network computing device of claim 1, wherein the processor is configured to facilitate charging of the first autonomous vehicle via a charger of the first vehicle storage area.
  • 11. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processor of a network computing device, cause performance of operations comprising: communicating with a plurality of autonomous vehicles and a plurality of movable barrier operators, the plurality of movable barrier operators associated with a plurality of vehicle storage areas;receiving sensed environmental conditions of the plurality of vehicle storage areas;selecting a first vehicle storage area of the plurality of vehicle storage areas for a first autonomous vehicle of the plurality of autonomous vehicles based at least in part upon the sensed environmental conditions, the first vehicle storage area associated with a first movable barrier operator of the plurality of movable barrier operators; andcommunicating a temporary access credential to the first movable barrier operator to facilitate operation of the first movable barrier operator by the first autonomous vehicle and permit the first autonomous vehicle to access the first vehicle storage area.
  • 12. The non-transitory computer readable medium of claim 11, wherein selecting the first vehicle storage area for the first autonomous vehicle includes selecting the first vehicle storage area based at least in part upon the sensed environmental conditions and an availability of the first vehicle storage area for use by the first autonomous vehicle.
  • 13. The non-transitory computer readable medium of claim 11, the operations further comprising: obtaining an expected arrival time of the first autonomous vehicle at the first vehicle storage area; andderiving the temporary access credential based at least in part upon the expected arrival time of the first autonomous vehicle.
  • 14. The non-transitory computer readable medium of claim 11, the operations further comprising utilizing the sensed environmental conditions to perform a risk assessment of the plurality of vehicle storage areas; and wherein selecting the first vehicle storage area for the first autonomous vehicle comprises selecting the first vehicle storage area based at least in part upon the risk assessment.
  • 15. The non-transitory computer readable medium of claim 11 wherein selecting the first vehicle storage area for the first autonomous vehicle comprises selecting the first vehicle storage area based at least in part upon the sensed environmental conditions and a location of the first vehicle storage area relative to the first autonomous vehicle.
  • 16. The non-transitory computer readable medium of claim 11, wherein the temporary access credential includes a public key associated with the first autonomous vehicle.
  • 17. The non-transitory computer readable medium of claim 11, the operations further comprising communicating a second temporary access credential to the first autonomous vehicle, the second temporary access credential corresponding to the temporary access credential communicated to the first movable barrier operator.
  • 18. The non-transitory computer readable medium of claim 11, wherein the temporary access credential is derived from at least one of: a vehicle identification number (VIN) specific to the first autonomous vehicle;a media access control (MAC) address specific to the first autonomous vehicle; andan internet protocol (IP) address specific to the first autonomous vehicle.
  • 19. The non-transitory computer readable medium of claim 11, the operations further comprising facilitating communication of at least one of software updates and firmware updates to the first autonomous vehicle at the first vehicle storage area.
  • 20. The non-transitory computer readable medium of claim 11, the operations further comprising facilitating charging of the first autonomous vehicle via a charger of the first vehicle storage area.
CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of U.S. patent application Ser. No. 17/384,149, filed Jul. 23, 2021, entitled NETWORK-BASED CONTROL OF MOVABLE BARRIER OPERATORS FOR AUTONOMOUS VEHICLES, which is a continuation of U.S. patent application Ser. No. 16/454,978, filed Jun. 27, 2019, entitled NETWORK-BASED CONTROL OF MOVABLE BARRIER OPERATORS FOR AUTONOMOUS VEHICLES, which issued as U.S. Pat. No. 11,074,773 on Jul. 27, 2021, which claims the benefit of U.S. Provisional application No. 62/690,624, filed Jun. 27, 2018, entitled NETWORK-BASED CONTROL OF MOVABLE BARRIER OPERATORS FOR AUTONOMOUS VEHICLES, which are all hereby incorporated by reference in their entireties herein.

US Referenced Citations (656)
Number Name Date Kind
29525 Sherman Aug 1860 A
30957 Campbell Dec 1860 A
35364 Cox May 1862 A
803047 Browne Oct 1905 A
2405500 Gustav Aug 1946 A
2963270 Magarian Dec 1960 A
3716865 Willmott Feb 1973 A
3735106 Hollaway May 1973 A
3792446 McFiggins Feb 1974 A
3798359 Feistel Mar 1974 A
3798360 Feistel Mar 1974 A
3798544 Norman Mar 1974 A
3798605 Feistel Mar 1974 A
3845277 Spetz Oct 1974 A
3890601 Pietrolewicz Jun 1975 A
3906348 Willmott Sep 1975 A
3938091 Atalla Feb 1976 A
4037201 Willmott Jul 1977 A
4064404 Willmott Dec 1977 A
RE29525 Willmott Jan 1978 E
4078152 Tuckerman Mar 1978 A
4097859 Looschen Jun 1978 A
4138735 Allocca Feb 1979 A
4178549 Ledenbach Dec 1979 A
4195196 Feistel Mar 1980 A
4195200 Feistel Mar 1980 A
4196310 Forman Apr 1980 A
4218738 Matyas Aug 1980 A
4243976 Warner Jan 1981 A
4255742 Gable Mar 1981 A
4304962 Fracassi Dec 1981 A
4305060 Apple Dec 1981 A
4316055 Feistel Feb 1982 A
4326098 Bouricius Apr 1982 A
4327444 Court Apr 1982 A
4328414 Atalla May 1982 A
4328540 Matsuoka May 1982 A
RE30957 Feistel Jun 1982 E
4380762 Capasso Apr 1983 A
4385296 Tsubaki May 1983 A
4387455 Schwartz Jun 1983 A
4387460 Boutmy Jun 1983 A
4393269 Konheim Jul 1983 A
4418333 Schwarzbach Nov 1983 A
4426637 Apple Jan 1984 A
4445712 Smagala-Romanoff May 1984 A
4447890 Duwel May 1984 A
4454509 Buennagel Jun 1984 A
4464651 Duhame Aug 1984 A
4468787 Keiper Aug 1984 A
4471493 Schober Sep 1984 A
4471593 Ragland Sep 1984 A
4491774 Schmitz Jan 1985 A
4509093 Stellberger Apr 1985 A
4529980 Liotine Jul 1985 A
4535333 Twardowski Aug 1985 A
4566044 Langdon Jan 1986 A
4574247 Jacob Mar 1986 A
4578530 Zeidler Mar 1986 A
4580111 Swanson Apr 1986 A
4581606 Mallory Apr 1986 A
4590470 Koenig May 1986 A
4593155 Hawkins Jun 1986 A
4596898 Pemmaraju Jun 1986 A
4596985 Bongard Jun 1986 A
4599489 Cargile Jul 1986 A
4602357 Yang Jul 1986 A
4611198 Levinson Sep 1986 A
4623887 Welles Nov 1986 A
4626848 Ehlers Dec 1986 A
4628315 Douglas Dec 1986 A
4630035 Stahl Dec 1986 A
4633247 Hegeler Dec 1986 A
4638433 Schindler Jan 1987 A
4646080 Genest Feb 1987 A
4652860 Weishaupt Mar 1987 A
4653076 Jerrim Mar 1987 A
4670746 Taniguchi Jun 1987 A
4677284 Genest Jun 1987 A
4686529 Kleefeldt Aug 1987 A
4695839 Barbu Sep 1987 A
4703359 Rumbolt Oct 1987 A
4710613 Shigenaga Dec 1987 A
4716301 Willmott Dec 1987 A
4720860 Weiss Jan 1988 A
4723121 Van Feb 1988 A
4731575 Sloan Mar 1988 A
4737770 Brunius Apr 1988 A
4740792 Sagey Apr 1988 A
4750118 Heitschel Jun 1988 A
4754255 Sanders Jun 1988 A
4755792 Pezzolo Jul 1988 A
4758835 Rathmann Jul 1988 A
4761808 Howard Aug 1988 A
4779090 Micznik Oct 1988 A
4794268 Nakano Dec 1988 A
4794622 Isaacman Dec 1988 A
4796181 Wiedemer Jan 1989 A
4799061 Abraham Jan 1989 A
4800590 Vaughan Jan 1989 A
4802114 Sogame Jan 1989 A
4804938 Rouse Feb 1989 A
4807052 Amano Feb 1989 A
4808995 Clark Feb 1989 A
4825200 Evans Apr 1989 A
4825210 Bachhuber Apr 1989 A
4829296 Clark May 1989 A
4831509 Jones May 1989 A
4835407 Kataoka May 1989 A
4845491 Fascenda Jul 1989 A
4847614 Keller Jul 1989 A
4850046 Philippe Jul 1989 A
4855713 Brunius Aug 1989 A
4856062 Weiss Aug 1989 A
4856081 Smith Aug 1989 A
4859990 Isaacman Aug 1989 A
4870400 Downs Sep 1989 A
4878052 Schulze Oct 1989 A
4881148 Lambropoulos Nov 1989 A
4885778 Weiss Dec 1989 A
4888575 De Vaulx Dec 1989 A
4890108 Drori Dec 1989 A
4893338 Pastor Jan 1990 A
4905279 Nishio Feb 1990 A
4910750 Fisher Mar 1990 A
4912463 Li Mar 1990 A
4914696 Dudczak Apr 1990 A
4918690 Markkula Apr 1990 A
4922168 Waggamon May 1990 A
4922533 Philippe May 1990 A
4928098 Dannhaeuser May 1990 A
4931789 Pinnow Jun 1990 A
4939792 Urbish Jul 1990 A
4942393 Waraksa Jul 1990 A
4951029 Severson Aug 1990 A
4963876 Sanders Oct 1990 A
4979832 Ritter Dec 1990 A
4980913 Skret Dec 1990 A
4988990 Warrior Jan 1991 A
4988992 Heitschel Jan 1991 A
4992783 Zdunek Feb 1991 A
4999622 Amano Mar 1991 A
5001332 Schrenk Mar 1991 A
5021776 Anderson Jun 1991 A
5023908 Weiss Jun 1991 A
5049867 Stouffer Sep 1991 A
5055701 Takeuchi Oct 1991 A
5058161 Weiss Oct 1991 A
5060263 Bosen Oct 1991 A
5091942 Dent Feb 1992 A
5103221 Memmola Apr 1992 A
5107258 Soum Apr 1992 A
5126959 Kurihara Jun 1992 A
5136548 Claar Aug 1992 A
5144667 Pogue Sep 1992 A
5146067 Sloan Sep 1992 A
5148159 Clark Sep 1992 A
5150464 Sidhu Sep 1992 A
5153581 Hazard Oct 1992 A
5159329 Lindmayer Oct 1992 A
5168520 Weiss Dec 1992 A
5193210 Nicholas Mar 1993 A
5197061 Halbert-Lassalle Mar 1993 A
5220263 Onishi Jun 1993 A
5224163 Gasser Jun 1993 A
5237614 Weiss Aug 1993 A
5252960 Duhame Oct 1993 A
5278907 Snyder Jan 1994 A
5280527 Gullman Jan 1994 A
5331325 Miller Jul 1994 A
5361062 Weiss Nov 1994 A
5363448 Koopman Nov 1994 A
5365225 Bachhuber Nov 1994 A
5367572 Weiss Nov 1994 A
5369706 Latka Nov 1994 A
5412379 Waraksa May 1995 A
5414418 Andros May 1995 A
5420925 Michaels May 1995 A
5442340 Dykema Aug 1995 A
5442341 Lambropoulos Aug 1995 A
5444737 Cripps Aug 1995 A
5463376 Stoffer Oct 1995 A
5471668 Soenen Nov 1995 A
5473318 Martel Dec 1995 A
5479512 Weiss Dec 1995 A
5485519 Weiss Jan 1996 A
5517187 Bruwer May 1996 A
5528621 Heiman Jun 1996 A
5530697 Watanabe Jun 1996 A
5554977 Jablonski Sep 1996 A
RE35364 Heitschel Oct 1996 E
5563600 Miyake Oct 1996 A
5565812 Soenen Oct 1996 A
5566359 Corrigan Oct 1996 A
5576701 Heitschel Nov 1996 A
5578999 Matsuzawa Nov 1996 A
5594429 Nakahara Jan 1997 A
5596317 Brinkmeyer Jan 1997 A
5598475 Soenen Jan 1997 A
5600653 Chitre Feb 1997 A
5608723 Felsenstein Mar 1997 A
5614891 Zeinstra Mar 1997 A
5635913 Willmott Jun 1997 A
5657388 Weiss Aug 1997 A
5673017 Dery Sep 1997 A
5675622 Hewitt Oct 1997 A
5678213 Myer Oct 1997 A
5680131 Utz Oct 1997 A
5686904 Bruwer Nov 1997 A
5699065 Murray Dec 1997 A
5719619 Hattori et al. Feb 1998 A
5745068 Takahashi Apr 1998 A
5774065 Mabuchi Jun 1998 A
5778348 Manduley Jul 1998 A
5838747 Matsumoto Nov 1998 A
5872513 Fitzgibbon Feb 1999 A
5872519 Issa Feb 1999 A
5898397 Murray Apr 1999 A
5923758 Khamharn Jul 1999 A
5936999 Keskitalo Aug 1999 A
5937065 Simon Aug 1999 A
5942985 Chin Aug 1999 A
5949349 Farris Sep 1999 A
5969637 Doppelt Oct 1999 A
6012144 Pickett Jan 2000 A
6037858 Seki Mar 2000 A
6049289 Waggamon Apr 2000 A
6052408 Trompower Apr 2000 A
6070154 Tavor May 2000 A
6094575 Anderson et al. Jul 2000 A
6130602 O'Toole Oct 2000 A
6137421 Dykema Oct 2000 A
6140938 Flick Oct 2000 A
6154544 Farris Nov 2000 A
6157719 Wasilewski Dec 2000 A
6166650 Bruwer Dec 2000 A
6175312 Bruwer Jan 2001 B1
6181255 Crimmins Jan 2001 B1
6229434 Knapp May 2001 B1
6243000 Tsui Jun 2001 B1
6275519 Hendrickson Aug 2001 B1
6366051 Nantz Apr 2002 B1
6396446 Walstra May 2002 B1
6414587 Fitzgibbon Jul 2002 B1
6414986 Usui Jul 2002 B1
6456726 Yu Sep 2002 B1
6463538 Elteto Oct 2002 B1
6496477 Perkins Dec 2002 B1
6535544 Partyka Mar 2003 B1
6549949 Bowman-Amuah Apr 2003 B1
6609796 Maki et al. Aug 2003 B2
6640244 Bowman-Amuah Oct 2003 B1
6658328 Alrabady Dec 2003 B1
6688518 Valencia Feb 2004 B1
6690796 Farris Feb 2004 B1
6697379 Jacquet Feb 2004 B1
6703941 Blaker Mar 2004 B1
6754266 Bahl Jun 2004 B2
6778064 Yamasaki Aug 2004 B1
6810123 Farris Oct 2004 B2
6829357 Alrabady Dec 2004 B1
6842106 Hughes Jan 2005 B2
6850910 Yu Feb 2005 B1
6861942 Knapp Mar 2005 B1
6917801 Witte Jul 2005 B2
6930983 Perkins Aug 2005 B2
6956460 Tsui Oct 2005 B2
6963270 Gallagher, III Nov 2005 B1
6963561 Lahat Nov 2005 B1
6978126 Blaker Dec 2005 B1
6980518 Sun Dec 2005 B1
6980655 Farris Dec 2005 B2
6988977 Gregori Feb 2006 B2
6998977 Gregori Feb 2006 B2
7002490 Lablans Feb 2006 B2
7039397 Chuey May 2006 B2
7039809 Wankmueller May 2006 B1
7042363 Katrak May 2006 B2
7050479 Kim May 2006 B1
7050794 Chuey et al. May 2006 B2
7057494 Fitzgibbon Jun 2006 B2
7057547 Olmsted Jun 2006 B2
7068181 Chuey Jun 2006 B2
7071850 Fitzgibbon Jul 2006 B1
7088218 Chuey Aug 2006 B2
7088265 Tsui Aug 2006 B2
7088706 Zhang et al. Aug 2006 B2
7139398 Candelore Nov 2006 B2
7161466 Chuey Jan 2007 B2
7205908 Tsui Apr 2007 B2
7221256 Skekloff May 2007 B2
7257426 Witkowski Aug 2007 B1
7266344 Rodriquez Sep 2007 B2
7289014 Mullet Oct 2007 B2
7290886 Cheng Nov 2007 B2
7298721 Atarashi et al. Nov 2007 B2
7301900 Laksono Nov 2007 B1
7332999 Fitzgibbon Feb 2008 B2
7333615 Jarboe Feb 2008 B1
7336787 Unger Feb 2008 B2
7346163 Pedlow Mar 2008 B2
7346374 Witkowski Mar 2008 B2
7349722 Witkowski Mar 2008 B2
7353499 De Jong Apr 2008 B2
7406553 Edirisooriya et al. Jul 2008 B2
7412056 Farris Aug 2008 B2
7415618 De Jong Aug 2008 B2
7429898 Akiyama Sep 2008 B2
7447498 Chuey et al. Nov 2008 B2
7469129 Blaker Dec 2008 B2
7489922 Chuey Feb 2009 B2
7492898 Farris et al. Feb 2009 B2
7492905 Fitzgibbon Feb 2009 B2
7493140 Michmerhuizen Feb 2009 B2
7516325 Willey Apr 2009 B2
7532965 Robillard May 2009 B2
7535926 Deshpande May 2009 B1
7545942 Cohen et al. Jun 2009 B2
7548153 Gravelle et al. Jun 2009 B2
7561075 Fitzgibbon Jul 2009 B2
7564827 Das et al. Jul 2009 B2
7598855 Scalisi et al. Oct 2009 B2
7623663 Farris Nov 2009 B2
7668125 Kadous Feb 2010 B2
7741951 Fitzgibbon Jun 2010 B2
7742501 Williams Jun 2010 B2
7757021 Wenzel Jul 2010 B2
7764613 Miyake et al. Jul 2010 B2
7786843 Witkowski Aug 2010 B2
7812739 Chuey Oct 2010 B2
7839263 Shearer Nov 2010 B2
7839851 Kozat Nov 2010 B2
7855633 Chuey Dec 2010 B2
7864070 Witkowski Jan 2011 B2
7889050 Witkowski Feb 2011 B2
7911358 Bos Mar 2011 B2
7920601 Andrus Apr 2011 B2
7970446 Witkowski Jun 2011 B2
7973678 Petricoin, Jr. Jul 2011 B2
7979173 Breed Jul 2011 B2
7999656 Fisher Aug 2011 B2
8000667 Witkowski Aug 2011 B2
8014377 Zhang et al. Sep 2011 B2
8031047 Skekloff Oct 2011 B2
8049595 Olson Nov 2011 B2
8103655 Srinivasan Jan 2012 B2
8111179 Turnbull Feb 2012 B2
8130079 Mcquaide, Jr. et al. Mar 2012 B2
8138883 Shearer Mar 2012 B2
8174357 Geerlings May 2012 B2
8194856 Farris Jun 2012 B2
8200214 Chutorash Jun 2012 B2
8207818 Keller, Jr. Jun 2012 B2
8208888 Chutorash Jun 2012 B2
8209550 Gehrmann Jun 2012 B2
8225094 Willey Jul 2012 B2
8233625 Farris Jul 2012 B2
8253528 Blaker Aug 2012 B2
8264333 Blaker Sep 2012 B2
8266442 Burke Sep 2012 B2
8276185 Messina et al. Sep 2012 B2
8284021 Farris et al. Oct 2012 B2
8290465 Ryu et al. Oct 2012 B2
8311490 Witkowski Nov 2012 B2
8330569 Blaker Dec 2012 B2
8384513 Witkowski Feb 2013 B2
8384580 Witkowski Feb 2013 B2
8416054 Fitzgibbon Apr 2013 B2
8422667 Fitzgibbon Apr 2013 B2
8452267 Friman May 2013 B2
8463540 Hannah et al. Jun 2013 B2
8494547 Nigon Jul 2013 B2
8531266 Shearer Sep 2013 B2
8536977 Fitzgibbon Sep 2013 B2
8544523 Mays Oct 2013 B2
8581695 Carlson et al. Nov 2013 B2
8615562 Huang et al. Dec 2013 B1
8633797 Farris et al. Jan 2014 B2
8634777 Ekbatani et al. Jan 2014 B2
8634888 Witkowski Jan 2014 B2
8643465 Fitzgibbon Feb 2014 B2
8645708 Labaton Feb 2014 B2
8661256 Willey Feb 2014 B2
8699704 Liu et al. Apr 2014 B2
8760267 Bos et al. Jun 2014 B2
8787823 Justice et al. Jul 2014 B2
8830925 Kim et al. Sep 2014 B2
8836469 Fitzgibbon et al. Sep 2014 B2
8837608 Witkowski Sep 2014 B2
8843066 Chutorash Sep 2014 B2
8878646 Chutorash Nov 2014 B2
8918244 Brzezinski Dec 2014 B2
8981898 Sims Mar 2015 B2
9007168 Bos Apr 2015 B2
9024801 Witkowski May 2015 B2
9082293 Wellman et al. Jul 2015 B2
9122254 Cate Sep 2015 B2
9124424 Aldis Sep 2015 B2
9142064 Muetzel et al. Sep 2015 B2
9160408 Krohne et al. Oct 2015 B2
9189952 Chutorash Nov 2015 B2
9229905 Penilla Jan 2016 B1
9230378 Chutorash Jan 2016 B2
9264085 Pilat Feb 2016 B2
9280704 Lei et al. Mar 2016 B2
9317983 Ricci Apr 2016 B2
9318017 Witkowski Apr 2016 B2
9324230 Chutorash Apr 2016 B2
9336637 Neil et al. May 2016 B2
9367978 Sullivan Jun 2016 B2
9370041 Witkowski Jun 2016 B2
9396376 Narayanaswami Jul 2016 B1
9396598 Daniel-Wayman Jul 2016 B2
9413453 Sugitani et al. Aug 2016 B2
9418326 Narayanaswami Aug 2016 B1
9430939 Shearer Aug 2016 B2
9443422 Pilat Sep 2016 B2
9449449 Evans Sep 2016 B2
9539930 Geerlings Jan 2017 B2
9552723 Witkowski Jan 2017 B2
9576408 Hendricks Feb 2017 B2
9614565 Pilat Apr 2017 B2
9620005 Geerlings Apr 2017 B2
9640005 Geerlings May 2017 B2
9652907 Geerlings May 2017 B2
9652978 Wright May 2017 B2
9679471 Geerlings Jun 2017 B2
9691271 Geerlings Jun 2017 B2
9711039 Shearer Jul 2017 B2
9715772 Bauer Jul 2017 B2
9715825 Geerlings Jul 2017 B2
9791861 Keohane Oct 2017 B2
9811085 Hayes Nov 2017 B1
9811958 Hall Nov 2017 B1
9819498 Vuyst Nov 2017 B2
9836905 Chutorash Dec 2017 B2
9836955 Papay Dec 2017 B2
9836956 Shearer Dec 2017 B2
9858806 Geerlings Jan 2018 B2
9875650 Witkowski Jan 2018 B2
9879466 Yu Jan 2018 B1
9916769 Wright Mar 2018 B2
9922548 Geerlings Mar 2018 B2
9947159 Geerlings Apr 2018 B2
9965947 Geerlings May 2018 B2
9984516 Geerlings May 2018 B2
10008109 Witkowski Jun 2018 B2
10045183 Chutorash Aug 2018 B2
10062229 Zeinstra Aug 2018 B2
10096186 Geerlings Oct 2018 B2
10096188 Geerlings Oct 2018 B2
10097680 Bauer Oct 2018 B2
10127804 Geerlings Nov 2018 B2
10147310 Geerlings Dec 2018 B2
10163337 Geerlings Dec 2018 B2
10163366 Wright Dec 2018 B2
10176708 Geerlings Jan 2019 B2
10198938 Geerlings Feb 2019 B2
10217303 Hall Feb 2019 B1
10229548 Daniel-Wayman Mar 2019 B2
10282977 Witkowski May 2019 B2
10553050 Romero Feb 2020 B1
10614650 Minsley Apr 2020 B2
10652743 Fitzgibbon May 2020 B2
10713869 Morris Jul 2020 B2
10997810 Atwell May 2021 B2
11074773 Morris Jul 2021 B1
11122430 Fitzgibbon Sep 2021 B2
11423717 Cate Aug 2022 B2
11462067 Atwell Oct 2022 B2
11763616 Morris Sep 2023 B1
20010023483 Kiyomoto Sep 2001 A1
20020034303 Farris Mar 2002 A1
20020075133 Flick Jun 2002 A1
20020083178 Brothers Jun 2002 A1
20020183008 Menard Dec 2002 A1
20020184504 Hughes Dec 2002 A1
20020191785 McBrearty Dec 2002 A1
20020191794 Farris Dec 2002 A1
20030025793 Mcmahon Feb 2003 A1
20030033540 Fitzgibbon Feb 2003 A1
20030051155 Martin Mar 2003 A1
20030056001 Mate Mar 2003 A1
20030070092 Hawkes Apr 2003 A1
20030072445 Kuhlman Apr 2003 A1
20030118187 Fitzgibbon Jun 2003 A1
20030141987 Hayes Jul 2003 A1
20030147536 Andivahis Aug 2003 A1
20030177237 Stebbings Sep 2003 A1
20030189530 Tsui Oct 2003 A1
20030190906 Winick Oct 2003 A1
20030191949 Odagawa Oct 2003 A1
20030227370 Brookbank Dec 2003 A1
20040019783 Hawkes Jan 2004 A1
20040046639 Giehler Mar 2004 A1
20040054906 Carro Mar 2004 A1
20040081075 Tsukakoshi Apr 2004 A1
20040174856 Brouet Sep 2004 A1
20040179485 Terrier Sep 2004 A1
20040181569 Attar Sep 2004 A1
20040257200 Baumgardner Dec 2004 A1
20050030153 Mullet Feb 2005 A1
20050046545 Skekloff Mar 2005 A1
20050053022 Zettwoch Mar 2005 A1
20050058153 Santhoff Mar 2005 A1
20050060555 Raghunath Mar 2005 A1
20050101314 Levi May 2005 A1
20050151667 Hetzel Jul 2005 A1
20050174242 Cohen Aug 2005 A1
20050285719 Stephens Dec 2005 A1
20060020796 Aura Jan 2006 A1
20060046794 Scherschel Mar 2006 A1
20060083187 Dekel Apr 2006 A1
20060097843 Libin May 2006 A1
20060103503 Rodriquez May 2006 A1
20060109978 Farris May 2006 A1
20060164208 Schaffzin Jul 2006 A1
20060176171 Fitzgibbon Aug 2006 A1
20060224512 Kurakata Oct 2006 A1
20060232377 Witkowski Oct 2006 A1
20070005806 Fitzgibbon Jan 2007 A1
20070006319 Fitzgibbon Jan 2007 A1
20070018861 Fitzgibbon Jan 2007 A1
20070058811 Fitzgibbon Mar 2007 A1
20070167138 Bauman Jul 2007 A1
20070245147 Okeya Oct 2007 A1
20080194291 Martin Aug 2008 A1
20080224886 Rodriguez et al. Sep 2008 A1
20080229400 Burke Sep 2008 A1
20080291047 Summerford Nov 2008 A1
20080297370 Farris Dec 2008 A1
20080303630 Martinez Dec 2008 A1
20090016530 Farris Jan 2009 A1
20090021348 Farris Jan 2009 A1
20090096621 Ferlitsch Apr 2009 A1
20090176451 Yang et al. Jul 2009 A1
20090313095 Hurpin Dec 2009 A1
20090315672 Nantz et al. Dec 2009 A1
20100029261 Mikkelsen Feb 2010 A1
20100060413 Fitzgibbon et al. Mar 2010 A1
20100112979 Chen et al. May 2010 A1
20100125509 Kranzley et al. May 2010 A1
20100125516 Wankmueller et al. May 2010 A1
20100159846 Witkowski Jun 2010 A1
20100199092 Andrus et al. Aug 2010 A1
20100211779 Sundaram Aug 2010 A1
20110037574 Pratt Feb 2011 A1
20110051927 Murray et al. Mar 2011 A1
20110205014 Fitzgibbon Aug 2011 A1
20110218965 Lee Sep 2011 A1
20110225451 Leggette Sep 2011 A1
20110227698 Witkowski Sep 2011 A1
20110273268 Bassali Nov 2011 A1
20110287757 Nykoluk Nov 2011 A1
20110296185 Kamarthy et al. Dec 2011 A1
20110316668 Laird Dec 2011 A1
20110316688 Ranjan Dec 2011 A1
20110317835 Laird Dec 2011 A1
20110320803 Hampel et al. Dec 2011 A1
20120054493 Bradley Mar 2012 A1
20120133841 Vanderhoff May 2012 A1
20120191770 Perlmutter Jul 2012 A1
20120254960 Lortz Oct 2012 A1
20120297681 Krupke et al. Nov 2012 A1
20130017812 Foster Jan 2013 A1
20130063243 Witkowski Mar 2013 A1
20130088326 Bassali Apr 2013 A1
20130147600 Murray Jun 2013 A1
20130170639 Fitzgibbon Jul 2013 A1
20130268333 Ovick et al. Oct 2013 A1
20130272520 Noda et al. Oct 2013 A1
20130304863 Reber Nov 2013 A1
20140125499 Cate May 2014 A1
20140169247 Jafarian et al. Jun 2014 A1
20140245284 Alrabady Aug 2014 A1
20140266589 Wilder Sep 2014 A1
20140282929 Tse Sep 2014 A1
20140289528 Baghdasaryan Sep 2014 A1
20140327690 Mcguire Nov 2014 A1
20140361866 Evans Dec 2014 A1
20150002262 Geerlings Jan 2015 A1
20150022436 Cho Jan 2015 A1
20150084750 Fitzgibbon Mar 2015 A1
20150116082 Cregg Apr 2015 A1
20150139423 Hildebrandt May 2015 A1
20150161832 Esselink Jun 2015 A1
20150187019 Fernandes Jul 2015 A1
20150193999 Freese Jul 2015 A1
20150222436 Morten Aug 2015 A1
20150222517 McLaughlin et al. Aug 2015 A1
20150235172 Hall Aug 2015 A1
20150235173 Hall Aug 2015 A1
20150235493 Hall Aug 2015 A1
20150235495 Hall Aug 2015 A1
20150261521 Choi Sep 2015 A1
20150310737 Simanowski Oct 2015 A1
20150310765 Wright Oct 2015 A1
20150358814 Roberts Dec 2015 A1
20160009188 Yokoyama Jan 2016 A1
20160020813 Pilat Jan 2016 A1
20160021140 Fitzgibbon Jan 2016 A1
20160043762 Turnbull Feb 2016 A1
20160101736 Geerlings Apr 2016 A1
20160104374 Ypma Apr 2016 A1
20160125357 Hall May 2016 A1
20160145903 Taylor May 2016 A1
20160196706 Tehranchi Jul 2016 A1
20160198391 Orthmann et al. Jul 2016 A1
20160203721 Wright Jul 2016 A1
20160258202 Scalisi Sep 2016 A1
20160261572 Liu et al. Sep 2016 A1
20160359629 Nadathur Dec 2016 A1
20170061110 Wright Mar 2017 A1
20170079082 Papay Mar 2017 A1
20170113619 Boehm Apr 2017 A1
20170140643 Puppo May 2017 A1
20170225526 Tomakidi Aug 2017 A1
20170230509 Lablans Aug 2017 A1
20170316628 Farber Nov 2017 A1
20170320464 Schultz Nov 2017 A1
20170323498 Bauer Nov 2017 A1
20170352286 Witkowski Dec 2017 A1
20170364719 Boehm Dec 2017 A1
20170372574 Linsky Dec 2017 A1
20180052860 Hayes Feb 2018 A1
20180053237 Hayes Feb 2018 A1
20180118045 Gruzen May 2018 A1
20180123806 Vuyst May 2018 A1
20180184376 Geerlings Jun 2018 A1
20180225959 Witkowski Aug 2018 A1
20180232981 Geerlings Aug 2018 A1
20180234843 Smyth Aug 2018 A1
20180245559 Kang Aug 2018 A1
20180246515 Iwama Aug 2018 A1
20180276613 Hall Sep 2018 A1
20180285814 Hall Oct 2018 A1
20180367419 Hall Dec 2018 A1
20190043290 Morris Feb 2019 A1
20190082149 Correnti Mar 2019 A1
20190085615 Cate Mar 2019 A1
20190102962 Miller Apr 2019 A1
20190200225 Fitzgibbon Jun 2019 A1
20190208024 Jablonski Jul 2019 A1
20190228603 Fowler Jul 2019 A1
20190244448 Alamin Aug 2019 A1
20200027054 Hall Jan 2020 A1
20200043270 Cate Feb 2020 A1
20200074753 Adiga Mar 2020 A1
20200208461 Virgin Jul 2020 A1
20200236552 Fitzgibbon Jul 2020 A1
20200364961 Atwell Nov 2020 A1
20210248852 Atwell Aug 2021 A1
20210281405 Fitzgibbon et al. Sep 2021 A1
20210358239 Key Nov 2021 A1
20210385651 Fitzgibbon Dec 2021 A1
20220375287 Cate Nov 2022 A1
Foreign Referenced Citations (102)
Number Date Country
645228 Feb 1992 AU
710682 Nov 1996 AU
2006200340 Aug 2006 AU
2007203558 Feb 2008 AU
2008202369 Jan 2009 AU
2011202656 Jan 2012 AU
2011218848 Sep 2012 AU
2087722 Jul 1998 CA
2193846 Feb 2004 CA
2551295 Dec 2006 CA
2926281 Feb 2008 CA
2177410 Apr 2008 CA
2443452 Jul 2008 CA
2684658 Oct 2008 CA
2708000 Dec 2010 CA
2456680 Feb 2011 CA
2742018 Dec 2011 CA
2565505 Sep 2012 CA
2631076 Sep 2013 CA
2790940 Jun 2014 CA
2596188 Jul 2016 CA
101399825 Apr 2009 CN
102010015104 Nov 1957 DE
3234538 Mar 1984 DE
3234539 Mar 1984 DE
3244049 Sep 1984 DE
3309802 Sep 1984 DE
3309802 Sep 1984 DE
3320721 Dec 1984 DE
3332721 Mar 1985 DE
3407436 Aug 1985 DE
3407469 Sep 1985 DE
3532156 Mar 1987 DE
3636822 Oct 1987 DE
4204463 Aug 1992 DE
102006003808 Nov 2006 DE
102007036647 Feb 2008 DE
0043270 Jan 1982 EP
0103790 Mar 1984 EP
0154019 Sep 1985 EP
0155378 Sep 1985 EP
0244322 Nov 1987 EP
0244332 Nov 1987 EP
0311112 Apr 1989 EP
0335912 Oct 1989 EP
0372285 Jun 1990 EP
0265935 May 1991 EP
0459781 Dec 1991 EP
0857842 Aug 1998 EP
0870889 Oct 1998 EP
0937845 Aug 1999 EP
1024626 Aug 2000 EP
1223700 Jul 2002 EP
1313260 May 2003 EP
1421728 May 2004 EP
1625560 Feb 2006 EP
1760985 Mar 2007 EP
0771498 May 2007 EP
1865656 Dec 2007 EP
2293478 Mar 2011 EP
2149103 Dec 2011 EP
2437212 Apr 2012 EP
1875333 Jan 2013 EP
2290872 Jun 2014 EP
2800403 Nov 2014 EP
2606232 May 1988 FR
2607544 Jun 1988 FR
2685520 Jun 1993 FR
2737373 Jan 1997 FR
218774 Jul 1924 GB
1156279 Jun 1969 GB
2023899 Jan 1980 GB
2051442 Jan 1981 GB
2099195 Dec 1982 GB
2118614 Nov 1983 GB
2131992 Jun 1984 GB
2133073 Jul 1984 GB
2184774 Jul 1987 GB
2254461 Oct 1992 GB
2265482 Sep 1993 GB
2288261 Oct 1995 GB
2430115 Mar 2007 GB
2440816 Feb 2008 GB
2453383 Apr 2009 GB
H6205474 Jul 1994 JP
09322274 Dec 1997 JP
20050005150 Jan 2005 KR
20060035951 Apr 2006 KR
9300137 Jan 1993 WO
9301140 Jan 1993 WO
9320538 Oct 1993 WO
9400147 Jan 1994 WO
9411829 May 1994 WO
9418036 Aug 1994 WO
0010301 Feb 2000 WO
0010302 Feb 2000 WO
03010656 Feb 2003 WO
03079607 Sep 2003 WO
2008082482 Jul 2008 WO
2011106199 Sep 2011 WO
2019126453 Jun 2019 WO
8908225 Oct 1991 ZA
Non-Patent Literature Citations (169)
Entry
US 7,902,994 B2, 03/2011, Geerlings (withdrawn)
US 10,135,479 B2, 11/2018, Turnbull (withdrawn)
‘Access Transmitters—Access Security System’, pp. 1-2, Dated Jul. 16, 1997. http://www.webercreations.com/access/security.html.
About us—ParqEx, 5 pages, Wayback Machine capture dated May 5, 2018, 5 pages, retrieved from https://web.archive.org/web/20180505051951/https://www.parqex.com/about-parqex/.
Abrams, and Podell, ‘Tutorial Computer and Network Security,’ District of Columbia: IEEE, 1987. pp. 1075-1081.
Abramson, Norman. ‘The Aloha System—Another alternative for computer communications,’ pp. 281-285, University of Hawaii, 1970.
Adams, Russ, Classified, data-scrambling program for Apple II, Info-World, vol. 5, No. 3; Jan. 31, 1988.
Alexi, Werner, et al. ‘RSA and Rabin Functions: Certain Parts Are As Hard As The Whole’, pp. 194-209, Siam Computing, vol. 14, No. 2, Apr. 1988.
Allianz: Allianz-Zentrum for Technik GmbH—Detailed Requirements for Fulfilling the Specification Profile for Electronically Coded OEM Immobilizers, Issue 22, (Jun. 1994 (Translation Jul. 5, 1994).
Anderson, Ross. ‘Searching for the Optimum Correlation Attack’, pp. 137-143, Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, Copyright 1995.
Arazi, Benjamin, Vehicular Implementations of Public Key Cryptographic Techniques, IEEE Transactions on Vehicular Technology, vol. 40, No. 3, Aug. 1991, 646-653.
Baran, P. Distribution Communications, vol. 9, ‘Security Secrecy and Tamper-free Communications’, Rand Corporation, 1964.
Barbaroux, Paul. ‘Uniform Results in. Polynomial-Time Security’, pp. 297-306, Advances in Cryptology—Eurocrypt 92, 1992.
Barlow, Mike, ‘A Mathematical Word Block Cipher,’ 12 Cryptologia 256-264 (1988).
Bellovin, S.M. ‘Security Problems in the TCPIP Protocol Suite’, pp. 32-49, Computer Communication Review, New Jersey, Reprinted from Computer Communication Review, vol. 19, No. 2, pp. 32-48, Apr. 1989.
Beutelspacher, Albrecht. Advances in Cryptology—Eurocrypt 87: ‘Perfect and Essentially Perfect Authentication Schemes’ (Extended Abstract), pp. 167-170, Federal Republic of Germany, believed to be publicly available prior to Jun. 30, 2004.
Bloch, Gilbert. Enigma Before Ultra Polish Work and The French Contribution, pp. 142-155, Cryptologia 11(3), (Jul. 1987).
Bosworth, Bruce, ‘Codes, Ciphers, and Computers: An Introduction to Information Security’ Hayden Book Company, Inc. 1982, pp. 30-54.
Brickell, Ernest F. and Stinson, Doug. ‘Authentication Codes With Multiple Arbiters’, pp. 51-55, Proceedings of Eurocrypt 88, 1988.
Bruwer, Frederick J. ‘Die Toepassing Van Gekombineerde Konvolusiekodering en Modulasie op HF-Datakommunikasie,’ District of Pretoria in South Africa Jul. 1998, 176 pages.
Burger, Chris R., Secure Learning RKE Systems Using KeeLoq.RTM. Encoders, TB001, 1996 Microchip Technology, Inc., 1-7.
Burmeister, Mike. A Remark on the Efficiency of Identification Schemes, pp. 493-495, Advances in Cryptology—Eurocrypt 90, (1990).
Canadian Application No. 3,085,470; Office Action Dated Mar. 31, 2023; 10 pages.
Cattermole, K.W., ‘Principles of Pulse Code Modulation’ Iliffe Books Ltd., 1969, pp. 30-381.
Cerf, Vinton a ‘Issues in Packet-Network Interconnection’, pp. 1386-1408, Proceedings of the IEEE, 66(11), Nov. 1978.
Cerf, Vinton G. and Kahn, Robert E. ‘A Protocol for Packet Network Intercommunication’, pp. 637-648, Transactions on Communications, vol. Com-22, No. 5, May 1974.
Charles Watts, How to Program the HiSec(TM) Remote Keyless Entry Rolling Code Generator, National Semiconductor, Oct. 1994, 1-4.
Chinese Application No. 201880083263X; First Office Action Dated Oct. 3, 2021; Our File No. 5569-144643-CN; 25 Pages.
Computer Arithmetic by Henry Jacobowitz; Library of Congress Catalog Card No. 62-13396; Copyright Mar. 1962 by John F. Rider Publisher, Inc.
Conner, Doug, Cryptographic Techniques—Secure Your Wireless Designs, EDN (Design Feature), Jan. 18, 1996, 57-68.
Coppersmith, Don. ‘Fast Evaluation of Logarithms in Fields of Characteristic Two’, IT-30(4): pp. 587-594, IEEE Transactions on Information Theory, Jul. 1984.
Daniels, George, ‘Pushbutton Controls for Garage Doors’ Popular Science (Aug. 1959), pp. 156-160.
Davies, D.W. and Price, W.C. ‘Security for Computer Networks,’ John Wiley and Sons, 1984. Chapter 7, pp. 175-176.
Davies, Donald W., ‘Tutorial: The Security of Data in Networks,’ pp. 13-17, New York: IEEE, 1981.
Davis, Ben and De Long, Ron. Combined Remote Key Control and Immobilization System for Vehicle Security, pp. 125-132, Power Electronics in Transportation, IEEE Catalogue No. 96TH8184, (Oct. 24, 1996).
Davis, Gregory and Palmer, Morris. Self-Programming, Rolling-Code Technology Creates Nearly Unbreakable RF Security, Technological Horizons, Texas Instruments, Inc. (ECN), (Oct. 1996).
Deavours, C. A. and Reeds, James. The Enigma, Part 1, Historical Perspectives, pp. 381-391, Cryptologia, 1(4), (Oct. 1977).
Deavours, C.A. and Kruh, L. ‘The Swedish HC-9 Ciphering Machine’, 251-285, Cryptologia, 13(3): Jul. 1989.
Deavours, Cipher A., et al. ‘Analysis of the Hebern cryptograph Using Isomorphs’, pp. 246-261, Cryptology: Yesterday, Today and Tomorrow, vol. 1, No. 2, Apr. 1977.
Denning, Dorothy E. ‘Cryptographic Techniques’, pp. 135-154, Cryptography and Data Security, 1982. Chapter 3.
Denning, Dorothy E. A Lattice Model of Secure Information Flow, pp. 236-238, 240, 242, Communications of the ACM, vol. 19, No. 5, (May 1976).
Diffie and Hellman, Exhaustive Cryptanalysis of the NB.S Data Encryption Standard, pp. 74-84, Computer, Jun. 1977.
Diffie, Whitfield and Hellman, Martin E. New Directions in Cryptography, pp. 644-654, IEEE Transactions on Information Theory, vol. IT-22, No. 6, (Nov. 1976).
Diffie, Whitfield and Hellman, Martin E. Privacy and Authentication: An Introduction to Cryptography, pp. 397-427, Proceedings of the IEEE, vol. 67, No. 3 (Mar. 1979).
Diffie, Whitfield and Hellman, Martin, E. ‘An RSA Laboratories Technical Note’, Version 1.4, Revised Nov. 1, 1993.
Dijkstra, E. W. Co-Operating Sequential Processes, pp. 43-112, Programming Languages, F. Genuys. NY, believed to be publicly available prior to Jun. 30, 2004.
Dijkstra, E.W. ‘Hierarchical Ordering of Sequential Processes’, pp. 115-138, Acta Informatica 1: 115-138, Springer-Verlag (1971).
ElGamal, Taher. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, pp. 469-472, IEEE, Transactions on Information Theory, vol. IT-31, No. 4, (Jul. 1985).
ElGamal, Taher. A Subexponential Time Algorithm for Computing Discrete Logarithms, pp. 473-481, IEEE, Transactions on Information Theory, vol. IT-31, No. 4, (Jul. 1985).
Feistel, Horst, Notz, Wm. A. and Smith, J. Lynn. Some Cryptographic Techniques for Machine-to-Machine Data Communications, pp. 1545-1554, Proceedings of the IEEE, vol. 63, No. 11, (Nov. 1975).
Feistel, Horst. ‘Cryptography and Computer Privacy’, pp. 15-23, Scientific American, vol. 228, No. 5, May 1973.
Fenzl, H. and Kliner, A. Electronic Lock System: Convenient and Safe, pp. 150-153, Siemens Components XXI, No. 4, (1987).
Fischer, Elliot. Uncaging the Hagelin Cryptograph, pp. 89-92, Cryptologia, vol. 7, No. 1, (Jan. 1983).
Fragano, Maurizio. Solid State Key/Lock Security System, pp. 604-607, IEEE Transactions on Consumer Electronics, vol. CE-30, No. 4, (Nov. 1984).
G. Davis, Marcstar. TM. TRC1300 and TRC1315 Remote Control Transmitter/Receiver, Texas Instruments, Sep. 12, 1994. 1-24.
Godlewski, Ph. and Camion P. ‘Manipulations and Errors, Delection and Localization,’ pp. 97-106, Proceedings of Eurocrypt 88, 1988.
Gordon, Professor J., Police Scientific Development Branch, Designing Codes for Vehicle Remote Security Systems, (Oct. 1994), pp. 1-20.
Gordon, Professor J., Police Scientific Development Branch, Designing Rolling Codes for Vehicle Remote Security Systems, (Aug. 1993), pp. 1-19.
Greenlee, B.M., Requirements for Key Management Protocols in the Wholesale Financial Services Industry, pp. 22 28, IEEE Communications Magazine , Sep. 1985.
Guillou, Louis C. and Quisquater, Jean-Jacques. ‘A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory’, pp. 123-128, Advances in Cryptology—Eurocrypt 88, 1988.
Guillou, Louis C. Smart Cards and Conditional Access, pp. 481-489, Proceedings of Eurocrypt, (1984).
Habermann, A. Nico, Synchronization of Communicating Processes , pp. 171 176, Communications , Mar. 1972.
Hagelin C-35/C-36 (The), (1 page) Sep. 3, 1998. http://hem.passagen.se/tan01/C035.HTML.
Haykin, Simon, “An Introduction to Analog and Digital Communications” 213, 215 (1989).
IEEE 100; The Authoritative Dictionary of IEEE Standards Terms, Seventh Edition, Published by Standards Information Network, IEEE Press, Copyright 2000.
ISO 8732: 1988(E): Banking Key Management (Wholesale) Annex D: Windows and Windows Management, Nov. 1988.
Jones, Anita K. Protection Mechanisms and The Enforcement of Security Policies, pp. 228-251, Carnegie-Mellon University, Pittsburgh, PA, (1978).
Jueneman, R.R et al. ‘Message Authentication’, pp. 29-40, IEEE Communications Magazine, vol. 23, No. 9, Sep. 1985.
Kahn, Robert E. The Organization of Computer Resources Into A Packet Radio Network, pp. 177-186, National Computer Conference, (1975).
Keeloq.RTM. Code Hopping Decoder, HCS500, 1997 Microchip Technology, Inc., 1-25.
Keeloq.RTM. Code Hopping Encoder, HCS300, 1996 Microchip Technology, Inc., 1-20.
Keeloq.RTM. NTQ 105 Code Hopping Encoder, pp. 1-8, Nanoteq (Pty.) Ltd., (Jul. 1993).
Keeloq.RTM. NTQ 125D Code Hopping Decoder, pp. 1-9, Nanoteq (pty.) Ltd., (Jul. 1993).
Kent, Stephen T. A Comparison of Some Aspects of Public-Key and Conventional Cryptosystems, pp. 4.3.1-5, ICC '79 Int. Conf. on Communications, Boston, MA, (Jun. 1979).
Kent, Stephen T. Comments on ‘Security Problems in the TCP/IP Protocol Suite’, pp. 10-19, Computer Communication Review, vol. 19, Part 3, (Jul. 1989).
Kent, Stephen T. Encryption-Based Protection Protocols for Interactive User-Computer Communication, pp. 1-121, (May 1976). (See pp. 50-53).
Kent, Stephen T. Protocol Design Consideration for Network Security, pp. 239-259, Proc. NATO Advanced Study Institute on Interlinking of Computer Networks, (1979).
Kent, Stephen T. Security Requirements and Protocols for a Broadcast Scenario, pp. 778-786, IEEE Transactions on Communications, vol. com-29, No. 6, (Jun. 1981).
Kent, Stephen T., et al. Personal Authorization System for Access Control to the Defense Data Network, pp. 89-93, Conf. Record of Eascon 82 15.sup.th Ann Electronics & Aerospace Systems Conf., Washington, D.C. (Sep. 1982).
Konheim, A.G. Cryptography: A Primer, pp. 285-347, New York, (John Wiley, 1981).
Korean Patent Application No. 10-2020-7020761; Office Action dated Apr. 29, 2022, With Translation.
Koren, Israel, “Computer Arithmetic Algorithms” Prentice Hall, 1978, pp. 1-15.
Kruh, Louis. Device and Machines: The Hagelin Cryptographer, Type C-52, pp. 78-82, Cryptologia, vol. 3, No. 2, (Apr. 1979).
Kruh, Louis. How to Use the German Enigma Cipher Machine: A photographic Essay, pp. 291-296, Cryptologia, vol. No. 7, No. 4 (Oct. 1983).
Kuhn, G.J., et al. A Versatile High-Speed Encryption Chip, INFOSEC '90 Symposium, Pretoria, (Mar. 16, 1990).
Kuhn. G.J. Algorithms for Self-Synchronizing Ciphers, pp. 159-164, Comsig 88, University of Pretoria, Pretoria, (1988).
Lamport, Leslie. The Synchronization of Independent Processes, pp. 15-34, Acta Informatica, vol. 7, (1976).
Linn, John and Kent, Stephen T. Electronic Mail Privacy Enhancement, pp. 40-43, American Institute of Aeronautics and Astronautics, Inc. (1986).
Lloyd, Sheelagh. Counting Functions Satisfying a Higher Order Strict Avalanche Criterion, pp. 63-74, (1990).
Marneweck, Kobus. Guidelines for KeeLoq.RTM. Secure Learning Implementation, TB007, pp. 1-5, 1987 Microchip Technology, Inc.
Massey, James L. The Difficulty with Difficulty, pp. 1-4, Jul. 17, 1996. http://www.iacr.org/conferences/ec96/massey/html/framemassey.html.
McIvor, Robert. Smart Cards, pp. 152-159, Scientific American, vol. 253, No. 5, (Nov. 1985).
Meier, Willi. Fast Correlations Attacks on Stream Ciphers (Extended Abstract), pp. 301-314, Eurocrypt 88, IEEE, (1988).
Meyer, Carl H. and Matyas Stephen H. Cryptography: A New Dimension in Computer Data Security, pp. 237-249 (1982).
Michener, J.R. The ‘Generalized Rotor’ Cryptographic Operator and Some of Its Applications, pp. 97-113, Cryptologia, vol. 9, No. 2, (Apr. 1985).
Microchip Technology, Inc., Enhanced Flash Microcontrollers with 10-Bit A/D and nano Watt Technology, PIC18F2525/2620/4525/4620 Data Sheet, 28/40/44-Pin, .COPYRGT.2008.
MM57HS01 HiSeC.TM. Fixed and Rolling Code Decoder, National Semiconductor, Nov. 11, 1994, 1-8.
Morris, Robert. The Hagelin Cipher Machine (M-209): Reconstruction of the Internal Settings, pp. 267-289, Cryptologia, 2(3), (Jul. 1978).
Newman, David B., Jr., et al. ‘Public Key Management for Network Security’, pp. 11-16, IEE Network Magazine, 1987.
Nickels, Hamilton, ‘Secrets of Making and Breading Codes’ Paladin Press, 1990, pp. 11-29.
Niederreiter, Harald. Keystream Sequences with a Good Linear Complexity Profile for Every Starting Point, pp. 523-532, Proceedings of Eurocrypt 89, (1989).
Nirdhar Khazanie and Yossi Matias, Growing Eddystone with Ephemeral Identifiers: A Privacy Aware & Secure Open Beacon Format; Google Developers; Thursday, Apr. 14, 2016; 6 pages.
NM95HSO1/NM95HSO2 HiSeC.TM. (High Security Code) Generator, pp. 1-19, National Semiconductor, (Jan. 1995).
Otway, Dave and Rees, Owen. Efficient and timely mutual authentication, ACM SIGOPS Operating Systems Review, vol. 21, Issue 1, Jan. 8-10, 1987.
PCT Patent Application No. PCT/US2021/065227; International Search Report and The Written Opinion; Dated May 12, 2022; 12 Pages.
Peebles, Jr., Peyton Z. and Giuma, Tayeb A.; “Principles of Electrical Engineering” McGraw Hill, Inc., 1991, pp. 562-597.
Peyret, Patrice, et al. Smart Cards Provide Very High Security and Flexibility in Subscribers Management, pp. 744-752, IEE Transactions on Consumer Electronics, 36(3), (Aug. 1990).
Postel, J. ed. ‘DOD Standard Transmission Control Protocol’, pp. 52-133, Jan. 1980.
Postel, Jonathon B., et al. The ARPA Internet Protocol, pp. 261-271, (1981).
Reed, David P. and Kanodia, Rajendra K. Synchronization with Eventcounts and Sequencers, pp. 115-123, Communications of the ACM, vol. 22, No. 2, (Feb. 1979).
Reynolds, J. and Postel, J. Official ARPA-Internet Protocols, Network Working Groups, (Apr. 1985).
Roden, Martin S., “Analog and Digital Communication Systems,” Third Edition, Prentice Hall, 1979, pp. 282-460.
Ruffell, J. Battery Low Indicator, p. 15-165, Eleckton Electronics, (Mar. 1989). (See p. 59).
Saab Anti-Theft System: ‘Saab's Engine Immobilizing Anti-Theft System is a Road-Block for ‘Code-Grabbing’ Thieves’, pp. 1-2, Aug. 1996; http://www.saabusa.com/news/newsindex/alarm.html.
Savage. J.E. Some Simple Self-Synchronizing Digital Data Scramblers, pp. 449-498, The Bell System Tech. Journal, (Feb. 1967).
Seberry, J. and Pieprzyk, Cryptography—An Introduction to Computer Security, Prentice Hall of Australia, YTY Ltd, 1989, pp. 134-136.
Secure Terminal Interface Module for Smart Card Application, pp. 1488-1489, IBM: Technical Disclosure Bulletin, vol. 28, No. 4, (Sep. 1985).
Shamir, Adi. ‘Embedding Cryptographic Trapdoors In Arbitrary Knapsack Systems’, pp. 77-79, Information Processing Letters, 1983.
Siegenthaler, T. Decrypting a Class of Stream Ciphers Using Ciphertext Only, pp. 81-85, IEEE Transactions on Computers, vol. C-34, No. 1, (Jan. 1985).
Simmons, Gustavus, J. Message Authentication with Arbitration of Transmitter/Receiver Disputes, pp. 151-165 (1987).
Smith, J.L., et al. An Experimental Application of Cryptography to a Remotely Accessed Data System, pp. 282-297, Proceedings of the ACM, (Aug. 1972).
Smith, Jack, ‘Modem Communication Circuits.’ McGraw-Hill Book Company, 1986, Chapter 11, pp. 420-454.
Smith, Jack, ‘Modem Communication Circuits’ McGraw-Hill Book Company, 1986, Chapter 7, pp. 231-294.
Smith. J.L. The Design of Lucifer: a Cryptographic Device for Data Communications, pp. 1-65, (Apr. 15, 1971).
Soete, M. Some constructions for authentication—secrecy codes, Advances in Cryptology—Eurocrypt '88, Lecture Notes in Computer Science 303 (1988), 57-75.
Spothero, Frequently Asked Questions, Wayback Machine capture dated Jun. 30, 2017, 3 pages, retrieved from https://web.archive.org/web/20170630063148/https://spothero.com/faq/.
Steven Dawson, Keeloq.RTM. Code Hopping Decoder Using Secure Learn, AN662, 1997 Microchip Technology, Inc., 1-16.
Summary of Spothero Product, publicly available before Aug. 1, 2018.
Svigals, J. Limiting Access to Data in an Identification Card Having A Micro-Processor, pp. 580-581, IBM: Technical Disclosure Bulletin, vol. 27, No. 1B, (Jun. 1984).
Thatcham: The Motor Insurance Repair Research Centre, The British Insurance Industry's Criteria for Vehicle Security (Jan. 1993) (Lear 18968-19027), pp. 1-36.
Transaction Completion Code Based on Digital Signatures, pp. 1109-1122, IBM: Technical Disclosure Bulletin, vol. 28, No. 3, (Aug. 1985).
Turn, Rein. Privacy Transformations for Databank Systems, pp. 589-601, National Computer Conference, (1973).
U.S. Appl. No. 16/528,376; Advisory Action Dated May 4, 2021; 4 pages.
U.S. Appl. No. 17/245,672; Application as filed on Apr. 30, 2021, 47 pages.
U.S. Appl. No. 17/384,149; Office Action Dated Jan. 26, 2023; 54 pages.
U.S. Appl. No. 16/454,978; Notice of Allowance mailed Feb. 16, 2021, 9 pages.
U.S. Appl. No. 16/871,844; Notice of Allowance mailed Feb. 23, 2021.
U.S. Appl. No. 16/454,978; application filed Jun. 27, 2019; 57 pages.
U.S. Appl. No. 16/454,978; Office Action mailed May 8, 2020; 25 pages.
U.S. Appl. No. 16/454,978; Office Action mailed Sep. 22, 2020; 36 pages.
U.S. Appl. No. 16/528,376; Office Action mailed Feb. 17, 2021; (pp. 1-14).
U.S. Appl. No. 16/528,376; Office Action mailed Aug. 18, 2020, (pp. 1-11).
U.S. Appl. No. 16/871,844; Notice of Allowance mailed Mar. 23, 2021; (pp. 1-5).
U.S. Appl. No. 16/871,844; Notice of Allowance mailed Dec. 28, 2020; 38 pages.
U.S. Appl. No. 16/871,844; Notice of Allowance mailed Dec. 28, 2020; (pp. 1-10).
U.S. Appl. No. 16/528,376; Non-Final Rejection mailed Jan. 19, 2022; (pp. 1-12).
U.S. Appl. No. 16/528,376; Notice of Allowance and Fees Due (PTOL-85) mailed Jun. 14, 2022; (pp. 1-8).
U.S. Appl. No. 16/528,376; Notice of Allowance and Fees Due (PTOL-85) mailed Jul. 6, 2022; (pp. 1-3).
U.S. Appl. No. 16/528,376; Notice of Allowance and Fees Due (PTOL-85) mailed Jul. 20, 2022; (pp. 1-3).
U.S. Appl. No. 17/245,672; Non-Final Rejection mailed Jan. 31, 2022; (pp. 1-6).
U.S. Appl. No. 17/245,672; Notice of Allowance and Fees Due (PTOL-85) mailed May 2, 2022; (pp. 1-5).
U.S. Appl. No. 17/245,672; Notice of Allowance and Fees Due (PTOL-85) mailed Sep. 2, 2022; (pp. 1-2).
U.S. Appl. No. 17/405,671; Notice of Allowance and Fees Due (PTOL-85) mailed May 11, 2023; (pp. 1-5).
U.S. Appl. No. 17/879,927; Non-Final Rejection mailed May 23, 2023; (pp. 1-8).
U.S. Appl. No. 16/528,376; Office Action Dated Aug. 18, 2020; 34 Pages.
U.S. Appl. No. 16/871,844; Notice of Allowance dated Feb. 23, 2021; (pp. 1-6).
U.S. Appl. No. 16/843,119; Office Action mailed Feb. 2, 2021, 24 pages.
U.S. Appl. No. 16/843,119; Supplemental Notice of Allowability mailed May 25, 2021, 2 pages.
U.S. Appl. No. 16/843,119; Notice of Allowance mailed May 11, 2021, 5 pages.
Voydock, Victor L. and Kent, Stephen T. ‘Security in High-Level Network Protocols’, IEEE Communications Magazine, pp. 12-25, vol. 23, No. 7, Jul. 1985.
Voydock, Victor L. and Kent, Stephen T. ‘Security Mechanisms in High-Level Network Protocols’, Computing Surveys, pp. 135-171, vol. 15, No. 2, Jun. 1983.
Voydock, Victor L. and Kent, Stephen T. Security Mechanisms in a Transport Layer Protocol, pp. 325-341, Computers & Security, (1985).
Watts, Charles and Harper John. How to Design a HiSec.TM. Transmitter, pp. 1-4, National Semiconductor, (Oct. 1994).
Weinstein, S.B. Smart Credit Cards: The Answer to Cashless Shopping, pp. 43-49, IEEE Spectrum, (Feb. 1984).
Weissman, C. Security Controls in the ADEPT-50 Time-Sharing System, pp. 119-133, AFIPS Full Joint Computer Conference, (1969).
Welsh, Dominic, Codes and Cryptography, pp. 7.0-7.1, (Clarendon Press, 1988).
Wolfe, James Raymond, “Secret Writing—The Craft of the Cryptographer” McGraw-Hill Book Company 1970, pp. 111-122, Chapter 10.
YouTube Video entitled “How To Set up Tesla Model 3 Homelink . . . Super Easy !!!!” https://www.youtube.com/watch?v=nmmy4i7FO5M; published Mar. 1, 2018.
YouTube Video entitled Tesla Model X Auto Park in Garage (Just Crazy), https://youtu.be/BszlChMuZV4, published Oct. 2, 2016.
Provisional Applications (1)
Number Date Country
62690624 Jun 2018 US
Continuations (2)
Number Date Country
Parent 17384149 Jul 2021 US
Child 18242501 US
Parent 16454978 Jun 2019 US
Child 17384149 US