This disclosure generally relates to a plug-in vehicle security system, and more particularly relates to a plug-in telematics device that communicates with a wireless communication network and a plug-in wireless relay module equipped with a wireless receiver that operates the relay according to an authorization signal received from the telematics device.
Vehicle fleet owners that rent vehicles to the general public, or have vehicles shared among multiple authorized drivers (e.g.—employees), have various mechanisms to allow only authorized drivers to gain access to the vehicles and drive them. Installation of these systems generally requires some type of vehicle wiring harness modification (e.g. cutting and splicing of wires) to install electronic devices that prevent unauthorized starting and/or unauthorized operating of a vehicle. Additionally, companies offering aftermarket anti-theft systems may also have remote vehicle disable features to shutdown vehicles, and these systems are also installed by modifying the vehicle wiring harness. Having to modify the vehicle harness to install such security systems is particularly undesirable for vehicle rental fleet operators as such installations require highly skilled personal and tend to take an undesirable amount of time to complete. Furthermore, when the security systems are removed when a vehicle is removed from the fleet, the previous modifications to the wiring harness may compromise the environmental integrity or long-term reliability of the wiring harness potentially leading to electrical problems long after the rental vehicle is sold.
In accordance with one embodiment, a plug-in vehicle security system is provided. The system includes a relay module and a telematics device. The relay module is configured for plug-in installation into a vehicle. The relay module includes a relay switch operable to an open-state and a closed-state, and a wireless receiver coupled to the relay switch in a manner effective to influence operation of the relay switch based on reception of an authorization signal. The telematics device is configured for plug-in installation into a vehicle. The telematics device includes a wireless transmitter configured to transmit the authorization signal in response to a network signal. The telematics device also includes a network transceiver configured to receive the network signal from a communication network.
Further features and advantages will appear more clearly on a reading of the following detailed description of the preferred embodiment, which is given by way of non-limiting example only and with reference to the accompanying drawings.
The present invention will now be described, by way of example with reference to the accompanying drawings, in which:
The system 12 may include a wirelessly operated relay module 14 configured for plug-in installation into the vehicle 10.
The relay module 14 may also include a wireless receiver 20 coupled to the relay switch 16 in a manner effective to influence operation of the relay switch 16 based on reception of an authorization signal 22. The authorization signal is preferably communicated wirelessly, for example by a radio frequency (RF) signal having a carrier frequency of 315 Mega-Hertz (MHz) or 433 MHz which are typically used by vehicle remote keyless entry (RKE) transmitters/receivers. Alternatively, the authorization signal may use other wireless communication protocols such as DASH7®, BLUETOOTH®, or ZIGBEE®.
The wireless receiver 20 may be coupled to the relay switch 16 so that a signal applied to the solenoid connections 18a and 18b is blocked or otherwise prevented from actuating a switch 24 of the relay switch 16. Alternatively, a signal suitable to operate the relay switch 16 may be provided by a processor 26 either operating in cooperation with a signal applied to the solenoid connections 18a and 18b, or independent of a signal applied to the solenoid connections 18a and 18b as will be known to those skilled in the art.
The relay module 14 may include switch connections 18c and 18d that correspond to ISO relay connection terminals 30 and 87. In this example, when the switch 24 is closed, current is able to flow between switch connections 18c and 18d. While the example shown illustrates a single pole single throw type switch, it is contemplated that other configurations are possible, for example, an additional switch connection corresponding to ISO relay connection terminal 87a so the relay module 14 could be used for both normally-open and normally-closed applications.
The processor 26 may include devices such as a microprocessor or other control circuitry as should be evident to those in the art. The processor 26 may include memory (not shown), including non-volatile memory, such as electrically erasable programmable read-only memory (EEPROM) for storing one or more routines, thresholds and captured data. The one or more routines may be executed by the processor 26 to perform steps for operating the relay module 14 as described herein. Electrical power for operating the processor 26 and other electrical devices within the relay module 14 may be drawn from the solenoid connections 18a and 18b and/or switch connections 18c and 18d using diode network 52 to provide voltages V+ and V−, or other known polarity corrections techniques such as those described in U.S. Pat. No. 7,132,762 to Metlitzky et al., issued Nov. 7, 2006, the entire contents of which are hereby incorporated by reference herein. It is recognized that in some vehicle electrical system configurations that an alternative ground connection 54 may be necessary to provide electrical power to the relay module 14, and so a flying lead to a vehicle chassis ground may be necessary.
Referring again to
The telematics device 34 may include a wireless transmitter 36 configured to transmit the authorization signal 22 in response to a network signal 38. The network signal 38 may be from a cellular phone network as suggested by
By equipping the system 12 with the network transceiver 42, the authorization signal 22 may be transmitted by the wireless transmitter 36 in response to, for example, a personal communication device 46 such as a smart phone, tablet, or personal computer sending a message via the cellular phone network 40 to the network transceiver 42.
Alternatively, the relay module 14 may be configured so one or more currents through the relay module 14 are monitored. For example, the relay module 14 may include a current sense resistor 48, and the processor 26 may be connected to the current sense resistor 48 so the processor 26 is able to determine if current through the switch 24 is greater than a current threshold, for example greater than one Ampere (1 A). If the current through the relay switch and the current sense resistor 48 is greater than the current threshold, that condition may be indicative of an attempt to start an engine of the vehicle. Alternatively, the relay module 14 may be equipped with a current sensor, for example a Hall effect sensor, the operation of which is well known in the art.
By way of a further non-limiting example, if the relay module 14 replaces a fuel pump relay in the vehicle 10, and the current through the current sense resistor 48 corresponds to the amount of current consumed or drawn by the fuel pump (not shown), then that may be an indication that the engine is being started or is running. If the switch 24 in this example is opened by, for example, open-circuiting the signal path between the solenoid connections 18a and 18b, then the vehicle 10 is disabled because no fuel is being pumped to the engine. If there is no evidence of the engine being started (e.g. [ENGINE STARTING?]=NO), the step 610 may be repeated until engine starting is detected. If engine starting is detected (e.g. [ENGINE STARTING?]=YES), then the flowchart 600 proceeds to step 620 or 630 as will be explained below.
Step 620, OUTPUT REQUEST, is an optional step that may be initiated by the processor if an attempt to start the engine is detected, and may include equipping the wireless receiver 20 with a transmitter, equipping the wireless transmitter with a receiver, and transmitting or outputting an authorization request (same signal path indicated by authorization signal 22) in response to determining that the switch 24 is being operated in a manner indicative of an attempt to start the engine. Detecting an attempt to start the engine may be by way of measuring voltages or currents in the relay module as described above.
Step 630, START TIMER, may include equipping or configuring the processor to determine or measure a period of time after an attempt to start the engine, and possible recall from memory a predetermined time delay value.
Step 640, TIME>TIME DELAY?, may include configuring the processor 26 to determine if the period of time is less than or greater than the predetermined time delay, for example one second (1 s). If time has not expired (e.g. [TIME>TIME DELAY?]=NO), then step 640 is repeated. If time has expired (e.g. [TIME>TIME DELAY?]=YES), then the flowchart 600 proceeds to step 650.
Step 650, OPERATE RELAY SWITCH, may include operating the switch 24 in a manner effective to inhibit vehicle operation if either a) the authorization signal 22 is not received following the authorization request or b) the authorization signal 22 is not received in a time period less than the time delay. Operating the switch 24 may include blocking current from a signal applied to the solenoid connections 18a and 18b, or configuring the processor 26 to directly operate the switch 24 to an open state or closed state base on instructions or programming steps stored in the processor 26.
Accordingly, a plug-in vehicle security system 12 is provided. A key advantage of the system 12 describe herein is that the system 12 can be installed into the vehicle 10 quickly and without significant expertise because the relay module 14 and the telematics device 34 are configured to be plugged into features commonly found on most vehicles such as relay sockets or fuse receptacles. Furthermore, the wireless interconnection of the relay module 14 and the telematics device 34 makes the system easy to install and makes a way to defeat the system less apparent to a would-be thief.
While this invention has been described in terms of the preferred embodiments thereof, it is not intended to be so limited, but rather only to the extent set forth in the claims that follow.