U.S. Pat. No. 6,670,905, invented by the inventor named herein, and hereby incorporated by reference, discloses a GPS enabled radar detector that uses GPS to aid in the management of non-police-related or otherwise irrelevant sources of radar signals, permitting the detector to dynamically improve its handling of such sources and reduce false alerts. The detector references previously-stored geographically-referenced information on such sources, and compares the detector's current location to locations of known stationary false alert sources of radar to improve the handling of detection of those sources. When the detector is within a threshold distance of a stored false alert source, the detector suppresses alerts to frequency bands or sub-bands that correlate to the frequency of the known false alert source. False sources may be manually identified and “locked out” by the user, or may be automatically identified based upon multiple repeated encounters of the detector with the source at a particular geographic area.
Systems embodying the invention of the '905 patent have been successfully commercialized by the assignee of this application, and have proven commercially viable, but those systems remain subject to certain vulnerabilities which will be discussed herein.
One vulnerability is false radar alerts created by traffic sensing equipment installed in many major metropolitan areas. The signals from traffic sensors appear in police radar bands, and are emitted in short bursts at a regular cadence. Because traffic sensors are geographically fixed and operate in a consistent frequency range, it is possible for a radar detector user to manually lockout traffic sensor alerts; however, traffic sensor signals do not appear regularly enough to be reliably locked out automatically, at least without a greater than normal number of encounters. In response to this source of false signals, the assignee developed a Traffic Sensor Rejection (TSR) method, which searches for the characteristic cadence and frequency of traffic sensor systems, and suppresses alerts of those systems using a processing logic separate from the location-based lockout described in the '905 patent. Because this logic is separate from location based lockouts, police radar or police-like false signal sources appearing in the same frequency band and same geographic area as a TSR signal will not be suppressed by the TSR method, which is preferable to a location based frequency lockout in that area which would potentially suppress police signals as well.
Another vulnerability is the increasing number of vehicle-borne radar sources. Examples include radar based systems attached to vehicles for lane sensing, adaptive cruise control, collision prevention, automated parking, and the like, which will be collectively identified herein as “vehicle guidance systems”. One specific example of these systems is the Mercedes-Daimler Distronic system, which emits a 24.125 GHz K-band frequency to provide adaptive vehicle cruise control, which is in the band used by police and normally detected by a radar detector whenever it is near to an operative Distronic system. Vehicle guidance systems often create an annoying false alarm when a radar detector passes the source vehicle, and this false alarm cannot be suppressed based on location because the signal source is a mobile vehicle. The annoyance becomes critical when the vehicle with the radar detector is itself carrying a vehicle guidance system; the constant alerting in this scenario essentially puts the vehicle operator to a choice between disabling an entire band of radar detection (or foregoing radar detection entirely), and disabling the vehicle guidance system.
Efforts are underway by the assignee to identify characteristic cadences or other profiles of vehicle guidance systems, much as was done for TSR, and some have been effectively identified and suppressed via a separate methodology like that used for TSR. However, some vehicle guidance systems have so far eluded effective characterization in this manner.
A third vulnerability of the existing systems is that location based lockouts can potentially prevent alerting to police radar that happens to appear in the same frequency range and within a geographic range of a stationary source. As radar detectors become more sensitive the effective scope of a location lockout area must increase to ensure that alerts to the false signal are suppressed, which entails also increasing the geographic area in which alerts will be given to other sources in the same frequency ranges, including police radar sources. A regular criticism of location based lockout methods is the potential a radar detector will fail to alert to police radar which happens to coincide in location and frequency to a stored false signal. It would be desirable to improve the manner in which stationary false signals are processed to reduce the likelihood that an alert to actual police radar is suppressed.
A final vulnerability of the existing systems is the continuing adoption of ‘instant-on’ and line of site speed monitoring technology. A radar detector provides advance warning of police speed monitoring by detecting the monitoring of other cars that are typically ahead of the vehicle carrying the radar detector. Modern radar guns which operate in the Ka band can turn on and off rapidly, on a car-by-car basis. If there is a long enough interval between uses of the gun, a radar detector will not be able to pick up the stray radar emissions from previous interrogations to give advance warning of the use of radar. Laser (LIDAR) speed detection poses an even greater challenge for the reason that it is generally line of sight and provides very little advance warning of its use, if any. To respond to these challenges the assignee and others have developed social networks through which drivers can share radar events and sightings of police into a social network, so that a warning can be delivered to other drivers approaching the area. Unfortunately, users of social networks often report police activities that are not actually speed traps, for example, social network users may warn of a police car that is driving with traffic, waiting at a traffic light on a cross street, or involved in other activities that are not characteristic of a fixed location speed trap. Alerts that can be confirmed, e.g., via radar detection, are more reliable, but the social network cannot rely only upon radar-based alerts, for the reason that a police car on station at a speed trap may be using instant-on radar or LIDAR, in which case not every vehicle will be exposed to radar. Accordingly, it would be useful to provide a method for better identifying particular situations which are actually indicative of a speed trap, such as police positioned at a roadside monitoring passing traffic, or operating its light bar adjacent to a stopped car.
The present invention addresses the shortcomings of the prior art by improving a radar detector in accordance with several different aspects.
According to a first aspect of the present invention, the challenge of false alarms from vehicle guidance systems is addressed by introducing a local source lockout sequence into the operation of a radar detector. The local source lockout sequence may be performed at any time of detector operation, but in one example it is performed when the radar detector is first powered. In the local source lockout sequence the radar detector sweeps for radar signals that are steadily present and/or appear to be location independent, and thus are characteristic of vehicle guidance systems on the vehicle carrying the radar detector. If such a signal is found, the radar detector identifies a center frequency for the signal, and stores that center frequency for future reference. Thereafter, the detector will suppress warnings of a radar signal that is detected at frequencies that are near to the stored center frequency. The center frequency may be in any of the sensitive bands of the radar detector, including the K-band, Ka-band or X-band. Furthermore, the detector may have a setting to enable or disable the local source lockout sequence, so that this sequence may be disabled, e.g., for vehicles that do not have vehicle guidance systems. Furthermore, the detector may identify cases in which two discriminable signals appear within the range of the stored center frequency, and in those cases, the detector will produce an alert (provided there is no applicable location-based lockout), thus avoiding to the extent possible suppressing police radar alerts.
In a second aspect, the invention features an enhanced method for suppression of signals near a known location of a false signal source. Specifically, in the event the detector detects a radar signal and finds a matching stored false signal (that is, the detected signal is within the frequency subrange of the stored false signal, and the detector is in a location near to the stored a known false signal source), rather than suppressing the received signal, the detector will first compare the strength of the received signal to a threshold strength that is computed based upon the distance of the detector from the stored false signal, and if the received signal exceeds the threshold strength the alert of the received signal is reported to a more prominent extent than if the received signal is below the threshold strength. For example, signals below the threshold may be reported by a minimal visual alert without accompanying warning sounds, whereas signals above the threshold may be reported with visual and audible cues in the manner of other radar signal detections. In the specific embodiment disclosed, the threshold is set at 3 dB higher than an expected signal strength, and the expected signal strength is computed according to an inverse square-law relationship between signal strength and the distance of the radar detector from location stored for the false signal source. In a most particular embodiment, signals falling below the threshold are tracked over time and in the event they are persistent over time, an alert is generated to those signals notwithstanding signal strength below the threshold.
According to a third aspect, the invention features an enhanced method for identifying police activity that is indicative of a speed trap, to improve the reliability of warnings of police activity delivered via social networks. To implement this method, a camera is integrated into a radar detector, the camera directed to the road in the vicinity of the vehicle. The radar detector gathers image data from the camera and processes that data to identify police vehicles in the image. In particular embodiments the processing by the radar detector evaluates sequential images to identify flashing lights characteristic of a functioning light bar on a police or emergency vehicle. In another embodiment the processing by the radar detector evaluates one or more images to identify the profile of a vehicle that is characteristic of a police vehicle (e.g., having a rooftop light bar and/or highly contrasting colored panels) and/or which is stationed to monitor traffic, such as at a roadside in a position that is not correlated with crossing traffic at an intersection. The radar detector may respond to image(s) indicative of police activity by automatically generating an alert to other drivers in a social network, or by suggesting to a vehicle operator the generation of such an alert, subject to validation by the vehicle operator.
The above and other objects and advantages of the present invention shall be made apparent from the accompanying drawings and the description thereof.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and, together with a general description of the invention given above, and the detailed description of the embodiments given below, serve to explain the principles of the invention.
Processor 22 is further connected to a laser detector 28 for detecting police LIDAR signals. Processor 22 is further connected to a GPS receiver 32 and a separate differential GPS (DGPS) receiver 30, such that differential GPS methodologies may be used where beacon signals are available.
Processor 22 executes a stored program, found in integrated or off-chip electrically erasable programmable read only memory (EEPROM), flash memory, or masked read only memory (ROM). The processor is programmed to manage and report detected signals in various ways depending on its stored program, including by methods described herein.
Processor is coupled to a cellular interface 34 to permit social network interaction with servers and data from other radar detectors. In one embodiment cellular interface 34 comprises a BLUETOOTH® (IEEE 802.15.1) or other 802.1x compliant radio for connecting to a cellular phone, smart phone, or other cellular device, which may operate on the control of a separate application such as the assignee's “Escort Live” smartphone app. In another embodiment cellular interface 34 may itself comprise a cellular radio for direct connection to cell towers. Other communication technologies may also be used for social network interaction, such as satellite telephony, mesh networking via wifi, BLUETOOTH® (IEEE 802.15.1), or 802.1x radio of other kinds, or other standards.
The radar detector further incorporates a user input keypad or switches 36. Operational commands are conveyed by the user to processor 22 via the keypad. Processor 22 is further connected to a display 38, which may comprise one or more light emitting diodes for indicating various status conditions, or in a more feature-rich device, may include an alphanumeric or graphical display for providing detailed information to a user. A speaker 40 is also provided to enable processor 22 to deliver audible feedback to a user under various alert conditions, as is elaborated below.
Processor 22 may further include a camera 42, positioned on a front-facing, side facing or rear facing surface of the device, and a video processor 44, such as for processing video or still images from camera 42 according to methods that are described herein.
Processor 22 is further coupled to a Universal Serial Bus (USB) interface 46 that provides a means for uploading and downloading information to and from processor 22. USB interface 46 may be used to automate the assimilation of coordinate information into data structures in EEPROM 34. USB interface 46 may also be used to interface the detector to a separate host computer or product application containing a larger storage capacity than available from internal memory. USB interface 46 may also be used for the purposes of firmware upgrade. From time to time updates and bug fixes may become available, e.g. through a manufacturer website. USB interface 46 will enable the user to apply the appropriate firmware upgrade or bug fix. USB interface 46 could also be used to add other user waypoints.
Referring now to
The lockout sequence 204 is enabled under several circumstances. For example, when the unit is powered on 200, if the vehicle guidance suppression mode is enabled 203, a lockout sequence 204 is performed. Alternatively, when the user encounters a vehicle guidance interference, and in response enables 202 the vehicle guidance suppression mode via a sequence of button presses, the lockout sequence may be performed. A third alternative is for the vehicle guidance lockout sequence to be automatically enabled 201 upon detection of a time consistent alert that is frequency consistent with a vehicle guidance system.
The lockout sequence 204 scans 206 the radar band for a radar signal consistent with the frequencies of known vehicle guidance systems. The signal is then evaluated 208 for consistency over time with the on/off cadence of the known vehicle guidance system. If these tests are passed, then in step 210 the center frequency of the short-range sensor of the guidance system is identified, and stored 212. The detector then pads that frequency above and below to allow for drift of both the signal and, if appropriate, the radar detector.
After a lockout has been stored, if (step 214) the detector identifies one signal in the range of the stored center frequency, it suppresses 218 an alert to the signal. For example the device may show a small visual indication that there is a detected signal, but it has been determined to be a vehicle guidance system. As a further optional test (step 216), in a GPS-enabled radar detector, the speed of the vehicle as reported by the GPS receiver may be compared to the known speed ranges of operation of the vehicle guidance system (some systems do not operate below a threshold speed, or above a threshold speed). Using this optional test 216, the alert is suppressed only if the vehicle's speed is consistent with operation of a vehicle guidance system.
When a lockout has been stored, if (step 220) the detector identifies two signals in the range of the stored center frequency, then the detector will proceed to step 220 and produce a normal alert to the radar signal, if the signal is not subject to filtering on other bases (such as TSR filtering or GPS-location based lockout)
Referring now to
A significant enhancement will be realized by redefining a lockout region to be “a region in which the Radar Detector's sensitivity varies in proportion to the distance between it and the focal points that define that region.” The beneficial result is that police radar can still be reported, even if the police radar frequency matches one of the frequencies that is locked for false alarm signals for a given region. This method is accordingly referred to as “Variable Sensitivity Lockout Region” or VSLR.
In current GPS system without VSLR, the lockout decision is made by examining the current location of the detector to determine if it falls within any nearby regions, which may be defined in an octagonal shape for computational simplicity. The center of each of these Octagonal regions is referred to as a focal point. For each overlapping Octagonal region, a comparison is made between the frequency of the detected signal and the frequency of signals determined as being locked in each region. If there is a match, current GPS systems will suppress the reporting of the signal.
In a VSLR-enhanced method 300, shown in
In a first step 306, the signal power level of the detected signal is determined, and in step 308, a threshold signal power level is computed, defined to be approximately 3 dB higher than the normal inverse square-law signal propagation expected from the previously locked signal source. If actual police radar at a locked frequency is being operated near a locked signal source, the police radar should be reported (and not suppressed) as soon as its signal level rises above this 3 dB threshold. Accordingly, in step 310, the received signal level is compared to the threshold, and if it is greater than the threshold, in step 312 an alert to the radar signal is produced, if the signal is not subject to other filtering such as TSR or vehicle guidance system suppression as discussed above. However, if the signal is below the threshold, then it is deemed to be from the locked stationary source, and (subject to optional processing discussed below) in step 316 warnings of the signal are suppressed.
Since it is possible that police radar could be operated immediately adjacent to a rejected stationary source it is important that the VSLR method report of locked signals, even if they are weaker than the 3 dB threshold. In current products of the assignee, a detected, locked signal is identified by a minimal visual indication on the radar detector display. This visual indication may, however, fail to adequately warn of a true police radar signal. Accordingly, In addition to using a signal level threshold as mentioned above, the VSLR method may optionally include a step 314 also use signal duration as a factor in the suppression decision. In one particular example, a time threshold is computed by first computing an average value of the difference between the detected signal's power level and the threshold power level. Call this average difference X, measured in dB. If the signal is continuously detected, it will be reported (10*(1+X/4)) seconds after the first detection. Thus, a signal which remains roughly 4 dB below the threshold will be reported after a 20 second delay.
Both the 3 dB signal level threshold of step 308 and the signal duration requirement of step 314 will be applied to all focal points for all locked false signals, which are the centers of nearby Octagonal regions that encompass the current position. Note, however, that if the suppression criterion for any focal point results in a decision to suppress an alert to a signal, none of the other focal points need to be considered relative to that signal. If all of the focal considerations fail to conclude in a signal suppression decision, the signal will be reported.
Referring now to
One circumstance of interest, step 404, is video reflecting a flashing light bar on the road, typically indicative of police or other emergency vehicles, according to a standardized color coding. Flashing police lights are strongly indicative of speed monitoring in the local area.
A second circumstance of interest, steps 406 and 408, is a vehicle profile in the image of the road that matches a police car. Per step 406 a vehicle with a profile that includes a light bar, that moves across the field of vision in a manner suggesting a roadside traffic monitoring vehicle, is indicative of a possible speed trap. Alternatively, per step 408, a vehicle with block colored panels that is similarly situated is likely a police vehicle and is suggestive of a speed trap.
In the event no circumstances of interest are identified, then the image processing is done until re-initiated. However, if a circumstance of interest is identified in step 404, 406 or 408, then in step 412 the particular circumstance is evaluated to determine if a user confirmation is required. Some circumstances, such as a flashing light bar, may be unambiguous as to their relevance to others in a social network, whereas other circumstances, such as a vehicle with block colored panels, may or may not be of interest. Accordingly, user confirmation may be required for some circumstances and not others. If user confirmation is required in step 412, then in step 416 the user is alerted to the possible police sighting and a confirmation is requested, which can be provided by a button on the detector, or on a cord connected to the detector.
If a particular sighting is confirmed, or if no confirmation is required, then a police vehicle sighting and its GPS location and, optionally, details thereof such as the image or video, vehicle direction and/or speed, and are reported to the social network for use in alerting others. If a sighting is not confirmed, however, the processing finishes without alerting the social network.
The present invention has been described in connection with several embodiments and some of those embodiments have been elaborated in substantial detail. However, the scope of the invention is not to be limited by these embodiments which are presented as exemplary and not exclusive. The scope of the invention being claimed is set forth by the following claims.
This application is a continuation of U.S. application Ser. No. 13/794,867 filed Mar. 12, 2013, now U.S. Pat. No. 9,279,881, which is incorporated by reference in its entirety as if fully set forth herein.
Number | Name | Date | Kind |
---|---|---|---|
3754253 | Balsiger | Aug 1973 | A |
3956626 | Ross | May 1976 | A |
4360811 | Cantwell et al. | Nov 1982 | A |
4866438 | Knisch | Sep 1989 | A |
5021961 | Ross et al. | Jun 1991 | A |
5151701 | Valentine et al. | Sep 1992 | A |
5206651 | Valentine et al. | Apr 1993 | A |
5218467 | Ross et al. | Jun 1993 | A |
5229947 | Ross et al. | Jul 1993 | A |
5250951 | Valentine et al. | Oct 1993 | A |
5280288 | Sherry et al. | Jan 1994 | A |
5510793 | Gregg, III et al. | Apr 1996 | A |
5515042 | Nelson | May 1996 | A |
5515402 | Chester | May 1996 | A |
5598338 | Taniguchi et al. | Jan 1997 | A |
5617085 | Tsutsumi et al. | Apr 1997 | A |
5742340 | Alves | Apr 1998 | A |
5784021 | Oliva | Jul 1998 | A |
5815092 | Gregg, III et al. | Sep 1998 | A |
5852417 | Valentine et al. | Dec 1998 | A |
5859628 | Ross et al. | Jan 1999 | A |
5912822 | Davis et al. | Jun 1999 | A |
5935190 | Davis et al. | Aug 1999 | A |
5938717 | Dunne et al. | Aug 1999 | A |
5948038 | Daly et al. | Sep 1999 | A |
5977884 | Ross | Nov 1999 | A |
6118403 | Lang | Sep 2000 | A |
6201493 | Silverman | Mar 2001 | B1 |
6204798 | Fleming, III | Mar 2001 | B1 |
6265989 | Taylor | Jul 2001 | B1 |
6266617 | Evans | Jul 2001 | B1 |
6384776 | Martin | May 2002 | B1 |
6400304 | Chubbs, III | Jun 2002 | B1 |
6442485 | Evans | Aug 2002 | B2 |
6449540 | Rayner | Sep 2002 | B1 |
6469653 | Haynes | Oct 2002 | B1 |
6480144 | Miller et al. | Nov 2002 | B1 |
6483452 | Iwakini | Nov 2002 | B1 |
6498569 | Dijkstra | Dec 2002 | B2 |
6567035 | Elliott | May 2003 | B1 |
6670905 | Orr | Dec 2003 | B1 |
6675085 | Straub | Jan 2004 | B2 |
6718239 | Rayner | Apr 2004 | B2 |
6748322 | Fernandez | Jun 2004 | B1 |
6750785 | Trajkovic et al. | Jun 2004 | B2 |
6845317 | Craine | Jan 2005 | B2 |
6895324 | Straub | May 2005 | B2 |
6943723 | Kim et al. | Sep 2005 | B2 |
6980092 | Turnbull et al. | Dec 2005 | B2 |
RE39038 | Fleming, III | Mar 2006 | E |
7042345 | Ellis | May 2006 | B2 |
7183942 | Rock et al. | Feb 2007 | B2 |
7301494 | Waters | Nov 2007 | B2 |
7403153 | Kelly, Jr. et al. | Jul 2008 | B2 |
7471236 | Pitt et al. | Dec 2008 | B1 |
RE40653 | Fleming, III | Mar 2009 | E |
7522747 | Horibe | Apr 2009 | B2 |
7576679 | Orr et al. | Aug 2009 | B1 |
7702044 | Nallapureddy et al. | Apr 2010 | B2 |
7764219 | Pitt et al. | Jul 2010 | B2 |
7804440 | Orr | Sep 2010 | B1 |
RE41905 | Fleming, III | Nov 2010 | E |
7899450 | Pitt et al. | Mar 2011 | B2 |
7965222 | Pitt et al. | Jun 2011 | B2 |
7999721 | Orr | Aug 2011 | B2 |
8099466 | Tenereillo et al. | Jan 2012 | B2 |
8185132 | Katpelly et al. | May 2012 | B1 |
8255155 | Crane et al. | Aug 2012 | B1 |
8373588 | Kuhn | Feb 2013 | B2 |
8421667 | Batten et al. | Apr 2013 | B2 |
8446467 | Tilton | May 2013 | B2 |
8466806 | Schofield | Jun 2013 | B2 |
8515414 | Pitt et al. | Aug 2013 | B2 |
8525723 | Orr et al. | Sep 2013 | B2 |
8633815 | Al-Harbi | Jan 2014 | B2 |
8792041 | Green et al. | Jul 2014 | B2 |
8842004 | Kabler et al. | Sep 2014 | B2 |
8890954 | O'Donnell et al. | Nov 2014 | B2 |
8896694 | O'Donnell et al. | Nov 2014 | B2 |
8970422 | Washlow et al. | Mar 2015 | B2 |
9132773 | Washlow et al. | Sep 2015 | B2 |
9135818 | Washlow et al. | Sep 2015 | B2 |
20020135504 | Singer | Sep 2002 | A1 |
20020152264 | Yamasaki | Oct 2002 | A1 |
20030052797 | Rock et al. | Mar 2003 | A1 |
20030080878 | Kirmuss | May 2003 | A1 |
20030214430 | Husted et al. | Nov 2003 | A1 |
20030218562 | Orr | Nov 2003 | A1 |
20040056778 | Hilliard | Mar 2004 | A1 |
20040107037 | Straub | Jun 2004 | A1 |
20040233036 | Sefton | Nov 2004 | A1 |
20040254729 | Browne et al. | Dec 2004 | A1 |
20050242984 | Waters | Nov 2005 | A1 |
20060089792 | Manber et al. | Apr 2006 | A1 |
20060132349 | Stern et al. | Jun 2006 | A1 |
20060271593 | De Mes et al. | Nov 2006 | A1 |
20070035632 | Silvernail et al. | Feb 2007 | A1 |
20070046531 | Yu | Mar 2007 | A1 |
20070109187 | Murphy | May 2007 | A1 |
20070216521 | Guensler et al. | Sep 2007 | A1 |
20080211914 | Herrera et al. | Sep 2008 | A1 |
20090016418 | Silver et al. | Jan 2009 | A1 |
20090160696 | Pare et al. | Jun 2009 | A1 |
20090256736 | Orr | Oct 2009 | A1 |
20100157061 | Katsman et al. | Jun 2010 | A1 |
20100214148 | Kuhn | Aug 2010 | A1 |
20100214149 | Kuhn | Aug 2010 | A1 |
20100250369 | Peterson et al. | Sep 2010 | A1 |
20100317420 | Hoffberg | Dec 2010 | A1 |
20110025851 | Rumble | Feb 2011 | A1 |
20110149933 | Pitt et al. | Jun 2011 | A1 |
20120136559 | Rothschild | May 2012 | A1 |
20120229657 | Calman et al. | Sep 2012 | A1 |
20120236173 | Telek et al. | Sep 2012 | A1 |
20120268306 | Coburn et al. | Oct 2012 | A1 |
20120311559 | Clark et al. | Dec 2012 | A1 |
20120326889 | Kabler et al. | Dec 2012 | A1 |
20130009760 | Washlow et al. | Jan 2013 | A1 |
20130063554 | Green et al. | Mar 2013 | A1 |
20130091548 | Song | Apr 2013 | A1 |
20130194381 | McMahon et al. | Aug 2013 | A1 |
20130201051 | Kreter | Aug 2013 | A1 |
20130207829 | Kabler et al. | Aug 2013 | A1 |
20130211707 | Washlow et al. | Aug 2013 | A1 |
20130214939 | Washlow et al. | Aug 2013 | A1 |
20130238168 | Reyes | Sep 2013 | A1 |
20140368601 | deCharms | Dec 2014 | A1 |
20140375800 | Lim et al. | Dec 2014 | A1 |
20150009347 | O'Donnell et al. | Jan 2015 | A1 |
20150036047 | Bledsoe | Feb 2015 | A1 |
20150123834 | Kabler et al. | May 2015 | A1 |
20150224929 | McCarthy et al. | Aug 2015 | A1 |
20150237252 | O'Donnell et al. | Aug 2015 | A1 |
Number | Date | Country |
---|---|---|
101889215 | May 2013 | CN |
1 672 379 | Jun 2016 | EP |
2456782 | Jul 2009 | GB |
2003-132488 | May 2003 | JP |
2006-058191 | Mar 2006 | JP |
2006-171001 | Jun 2006 | JP |
2008-269178 | Nov 2008 | JP |
2009-097865 | May 2009 | JP |
2009-277059 | Nov 2009 | JP |
96951 | Aug 2010 | RU |
2000029869 | May 2000 | WO |
2001055744 | Aug 2001 | WO |
2010096760 | Aug 2010 | WO |
2011071826 | Jun 2011 | WO |
2011087714 | Jul 2011 | WO |
2014151793 | Sep 2014 | WO |
Entry |
---|
European Search Report for Application No. 14786048.0-1812 dated Nov. 10, 1966, 9 pages. |
Kuhn, U.S. Pat. No. 8,373,588 B2, issued on Feb. 12, 2013, from U.S. Publication No. 2010/0214148 A1. |
Pitt et al., U.S. Pat. No. 8,515,414 B2, issued on Aug. 20, 2013, from U.S. Publication No. 2011/0149933 A1. |
Cerico KK, Japanese Publication No. JP-A-2003-132488, published on May 9, 2003, 36 pages (including English abstract) and machine translation thereof, 39 pages. |
Yupiterulnd Co Ltd, Japanese Publication No. JP-A-2006-058191, published on Mar. 2, 2006, 28 pages (including English abstract) and machine translation thereof, 41 pages. |
Traffic Plus KK, Japanese Publication No. JP-A-2008-269178, published on Nov. 6, 2008, 42 pages (including English abstract) and machine translation thereof, 46 pages. |
Cellstar Kogyo KK, Japanese Publication No. JP-A-2009-097865, published on May 7, 2009, 12 pages (including English abstract) and machine translation thereof, 13 pages. |
Denso Corp., Japanese Publication No. JP-A-2009-277059, published on Nov. 26, 2009, 18 pages (including English abstract) and machine translation thereof, 24 pages. |
Miah et al., United Kingdom Publication No. GB-2456782 A, published on Jul. 29, 2009, 10 pages. |
Res Inst Highway Mini Transp, Chinese Publication No. CN201718054 U, published on Jan. 19, 2011, 1 page (Espacenet Website showing English abstract). |
Cobra Electronics Corporation, International Publication No. WO 2011/071826 A1, published on Jun. 16, 2011, 42 pages. |
Cobra Electronics Corporation, International Publication No. WO 2011/087714 A1, published on Jul. 21, 2011, 52 pages. |
Cobra Electronics Corporation, International Publication No. WO 2014/151793 A2, published on Sep. 25, 2014, 145 pages. |
Lang, International Publication No. WO 2000/029869 A1, published on May 25, 2000, 16 pages. |
Origin Technologies Limited, International Publication No. WO 2001/055744 A2, published on Aug. 2, 2001, 174 pages. |
Escort, Inc, International Publication No. WO 2010/096760 A1, published on Aug. 26, 2010, 63 pages. |
Valeo Raytheon Systems Inc, Japanese Publication No. JP-A-2006-171001, published on Jun. 29, 2006, 26 pages (including Espacenet Website showing English abstract). |
Vinogradov Vyacheslav Evgenievich, Russian Utility Model Patent No. RU96951 U1, published on Aug. 20, 2010, 5 pages (including Espacenet Website showing English abstract). |
Selex Sistemi Integrati SPA, Chinese Patent No. CN101889215 B, published on May 1, 2013, 29 pages (including Espacenet Website showing English abstract). |
Beamberboy, Radar detector interface to iPhone, blog entry, Tuesday, Aug. 25, 2009, www.trapster.com, printed on Nov. 5, 2009. |
What is Radar Active?, website, May 15, 2010, www.radaractive.com, as saved by Web.archive.org, printed on Jan. 21, 2013. |
Amy Gilroy, Ford Prototype Car Talks to Other Cars, Jan. 26, 2011, www.ceoutlook.com, as printed on Feb. 3, 2011. |
Tim Stevens, Ford's intelligent vehicles communicate wirelessly, shoot hula hoops out of tailpipes (video), Jan. 27, 2011, www.engadget.com, as printed on Jan. 21, 2013. |
Mumble Webpage, http://muble.sourceforge.net, printed on Oct. 15, 2013. |
Entry for “Multimedia Messaging Service” in Wikipedia at Wikipedia.org, retrieved on May 9, 2014. |
Understand—Google Street View webpage, https://www.google.com/maps/streetview/understand/, printed on Dec. 7, 2015. |
Garmin Dash Cam 35 webpage, https://buy.garmin.com/en-US/US/on-the-road/533/garmin-dash-cam-35/prod517726.html, printed on Dec. 7, 2015. |
GoPro—HERO4 Black 4K Ultra HD Waterproof Camera webpage, https://shop.gopro.com/hero4/hero4-black/CHDHX-401.html, printed on Dec. 7, 2015. |
F750—THINKWARE Dash Cam webpage, http://www.thinkware.com/Products/Dashcam/F750, printed on Dec. 7, 2015. |
Number | Date | Country | |
---|---|---|---|
20160187461 A1 | Jun 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13794867 | Mar 2013 | US |
Child | 15062983 | US |