Exemplary embodiments of the invention relate to an item detection system, and, more particularly, to an item detection system for a vehicle having a radio frequency (“RF”) interrogator monitoring at least one radio frequency identification (“RFID”) tag.
Relatively large items such as, for example, a bicycle or a canoe are usually too large to fit within the passenger compartment or the trunk of a vehicle. Therefore, if an individual wants to transport a relatively large item using his or her vehicle, the item is typically secured to the vehicle's exterior. Several different approaches currently exist for securing large items to the vehicle's exterior. For example, in one approach devices that secure and conceal large items may be used such as, for example, lock boxes, car-top carriers, and truck bed covers. While large items tend to stay relatively secure and are concealed using these devices, it is still possible for a thief to break into or tamper with these devices and remove the large items.
In another approach, large items are strapped to the roof or to a trunk rack of a vehicle. For example, a bicycle carrier may be provided on top of the vehicle for securing a bicycle to the vehicle. Chains and locks may also be used as well to secure large items to the exterior of the vehicle. However, securing large items to the roof or trunk rack of the vehicle leaves the large item in plain sight. This tends to attract the attention of thieves. In particular, an item left in plain sight that has significant value may be especially tempting to a thief.
In some instances even a smaller item such as, for example, a smartphone or a laptop computer, may be stolen from the passenger compartment of the vehicle as well. For example, if a driver leaves his or her cellular telephone in a convertible, and leaves the retractable roof of the convertible open, a thief may be able to easily steal the telephone without being detected. Accordingly, there exists a need for a system that provides notification in the event items are removed from the proximity of the vehicle.
In one exemplary embodiment of the invention, a vehicle having an item detection system is provided including at least one indicator for selectively emitting an alarm when activated, a vehicle alarm control module, at least one radio frequency identification (“RFID”) tag, and a radio frequency (“RF”) interrogator. The vehicle alarm control module is in communication with the at least one indicator and includes control logic for sending an activation data signal to the at least one indicator to selectively activate the at least one indicator. The RFID tag is configured for receiving a query RF signal and transmitting a reply RF signal upon receipt of the query RF signal. The RF interrogator is in communication with the vehicle alarm and is located within a specified distance of the RFID tag. The RF interrogator has a processor, and includes control logic for transmitting the query RF signal to the RFID tag. The RF interrogator includes control logic for monitoring the RFID tag for the reply RF signal. The RF interrogator also includes control logic for determining if the RFID tag is moved out of range of the specified distance. The RFID interrogator will not receive the reply RF signal from the RFID tag if the RFID tag is moved out of range of the specified distance. The RF interrogator further includes control logic for sending a trigger data signal to the vehicle alarm control module for activating the at least one indicator if the RFID tag is moved out of range of the specified distance.
The above features and advantages and other features and advantages of the invention are readily apparent from the following detailed description of the invention when taken in connection with the accompanying drawings.
Other features, advantages and details appear, by way of example only, in the following detailed description of embodiments, the detailed description referring to the drawings in which:
The following description is merely exemplary in nature and is not intended to limit the present disclosure, its application or uses. It should be understood that throughout the drawings, corresponding reference numerals indicate like or corresponding parts and features. As used herein, the term module refers to an application specific integrated circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and memory that executes one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
Referring now to
The vehicle alarm control module 24 and the indicators 26 are part of a vehicle security system 40. The vehicle alarm control module 24 is in communication with the alarm indictors 26. The vehicle alarm control module 24 includes control logic for sending an activation data signal to the indicators 26 to selectively activate the indicators 26. In the embodiment as illustrated in
The vehicle security system 40 typically receives an activation signal. Once the activation signal is received, the vehicle control module 24 enters a monitoring state and monitors the sensors (not shown) within the vehicle 20 for tampering. The vehicle security system 40 may be activated as a user exits the vehicle 20 by a remote device such as, for example, a key fob 42 that is in wireless communication with the vehicle alarm control module 24. In the event that one of the sensors (not shown) detects tampering, the vehicle alarm control module 24 activates at least one of the indicators 26. For example, in one embodiment if the vehicle alarm control module 24 detects tampering, a horn may be activated to emit a honking noise.
The RF interrogator 22 includes an antenna 44, a processor (not shown) and a memory (not shown). The RF interrogator 22 is in wireless communication with each of the RFID tags 32 through the antenna 44. The RF interrogator 22 is also in communication to send and receive data signals from the vehicle alarm control module 24. Specifically, the RF interrogator 22 is in communication with each of the RFID tags 32 that are located within a specified distance D of the RF interrogator 22. The specified distance D represents an area or region of close proximity around the vehicle 20. In one embodiment, the specified distance D may also include items that are stored in a trailer or other type of cargo carrying device 52 pulled by the vehicle 20.
The RF interrogator 22 includes control logic for transmitting an RF signal, which may be referred to as a query signal. The query signal is received by each of the RFID tags 32 that are located within the specified distance D. Upon receipt of the of query signal, the RFID tags 32 are configured for transmitting a reply signal back to the RF interrogator 22. The RF interrogator 22 includes control logic for monitoring each of the RFID tags 32 for the reply signal. In one embodiment, the RF interrogator 22 is programmed to poll one of more RFID tags 32 at a specific time intervals for the reply signal. For example, in one embodiment the RF interrogator 22 polls the RFID tags 32 every ten seconds.
Each of the RFID tags 32 may contain information associated with the corresponding personal item 36. In the event one or more of the RFID tags 32 are not located within the specified distance D, then the RF interrogator 22 does not receive the reply signal. Thus, if one or more of the personal items 36 are removed from close proximity of the vehicle 20, then the RF interrogator 22 will not receive the reply signal from the RFID tag 32. In the event that the RF interrogator 22 does not receive the reply signal, then the RF interrogator 22 includes control logic for sending a trigger data signal to the vehicle alarm control module 24 for activating at least one of the indicators 26. That is, in the event that the RF interrogator 22 detects that at least one of the RFID tags 32 has been moved outside the area of close proximity around the vehicle 20, the RF interrogator 22 includes control logic for activating the vehicle security system 40.
In one embodiment, when the vehicle security system 40 is activated by a device such as the key fob 42, the vehicle alarm control module 24 sends a data signal to the RF interrogator 22 to begin polling each of the RFID tags 32. Alternatively, in another embodiment the RF interrogator 22 is activated independently of the vehicle security system 40. The RF interrogator 22 may include control logic for initializing a learn mode. The learn mode determines which specific personal items 36 located within the distance D of the RF interrogator 22 need to be monitored. Specifically, once the RF interrogator 22 is activated, the RF interrogator 22 includes control logic for sending an initialization query RF signal to each RFID tag 32. The initialization query RF signal represents the first RF signal that is sent to the RFID tags 32 after the RF interrogator 22 is activated. The RF interrogator 22 also includes control logic for monitoring each RFID tag 32 for an initialization reply RF signal. Receipt of the initialization reply signal by the RF interrogator 22 confirms that the RFID tag 32 is within the specified distance D of the RF interrogator 22. Therefore, in the embodiment as illustrated in
In one embodiment, the RF interrogator 22 may also include control logic for only activating the vehicle security system 40 in the event only a portion of the RFID tags 32 or only a selected RFID tag 32 is moved from close proximity of the vehicle 20. Continuing to refer to
The vehicle alarm control module 24 is also in communication with the wireless communication device 30. The wireless communication device 30 is typically any type of communication device that may be placed in wireless communication with at least one personal electronic device 50, and is capable of sending notifications to the personal electronic device 50. In one embodiment, the notification may be in the form of a text message such as, for example, Short Message Service (“SMS”) messages. Alternatively, the notification may be in the form of a recorded voice call. For example, the wireless communication device 30 may include circuitry for making a telephone call over a cellular network. In another embodiment, the wireless communication device 30 is a telematics control module that is in communication with an Internet cloud (not shown), where the Internet cloud is in wireless communication with the personal electronic device 50.
The wireless communication between the wireless communication device 30 and the personal electronic device 50 may be a short-range wireless connection such as a Bluetooth® signal conforming to IEEE Standard 802.15 or a Wi-Fi® signal conforming to IEEE standard 802.11. Alternatively, the wireless communication may be a cellular signal as well. The personal electronic device 50 is any type of device having at least one of voice call capability and text communication service capabilities. In one embodiment, the personal electronic device 50 is a smartphone.
The vehicle alarm control module 24 includes control logic for sending an indicator data signal to the wireless communication device 30 indicating that at least one of the RFID tags 32 have been moved out of range of the specified distance D. Upon receipt of the indicator data signal, the wireless communication device 30 then sends a message to the personal electronic device 50 indicating that one or more of the RFID tags 32 have been moved. For example, in one embodiment, the wireless communication device 30 sends a text message to the personal electronic device 50 that states “Item 1 has been removed from the vicinity of your vehicle” in the event that the RFID tag ‘1’ is removed from the vehicle 20. In another embodiment, the wireless communication device 30 could make a recorded telephone call to the personal electronic device 50 stating that one of more of the RFID tags 32 have been removed. Thus, if one or more of the personal items 36 are removed from close proximity of the vehicle 20, then the vehicle alarm control module 24 sends the indicator data signal to the wireless communication device 30 to notify the personal electronic device 50 of the missing personal item 36.
In one embodiment, a user may have the option to configure the settings of the item detection system 10 such that only the indicators 26 are activated in the event at least one of the RFID tags 32 have been moved out of range of the specified distance D. For example, in one embodiment, the vehicle alarm control module 24 includes control logic for activating either a horn, a vehicle light, or both in the event at least one of the RFID tags 32 are moved out of range of the specified distance D. Alternatively, in another embodiment, the vehicle alarm control module 24 may be configured such that only a data signal is sent to the wireless communication device 30 for sending a text message or telephone call to the personal electronic device 50, and the indicators 26 are not activated at all. In yet another embodiment, in the event at least one of the RFID tags 32 have been moved out of range of the specified distance D the vehicle alarm control module 24 includes control logic for activating the indicators 26 as well as sending a text message or telephone call to the personal electronic device 50. Thus, in the event a thief removes one or more personal items 36 from the vehicle 20, or in the proximity of the vehicle 20, the item detection system 10 may activate the indicators 26 and send a notification to the personal electronic device 50.
A method of operating the item detection system 10 will now be explained. Referring to
In step 104, the RF interrogator 22 may include control logic for initializing a learn mode. The learn mode determines which specific personal items 36 are located within a distance D of the RF interrogator 22 that need to be monitored. Specifically, once the RF interrogator 22 is activated in step 102, the RF interrogator 22 includes control logic for sending an initialization query RF signal to each RFID tag 32. The initialization query RF signal represents the first RF signal that is sent to the RFID tags 32 after the RF interrogator 22 is activated. The RF interrogator 22 also includes control logic for monitoring each RFID tag 32 for an initialization reply RF signal. Receipt of the initialization reply signal by the RF interrogator 22 confirms that the RFID tag 32 is within the specified distance D of the RF interrogator 22. Process 100 may then proceed to step 106.
In step 106, the RF interrogator 22 includes control logic for monitoring each RFID tag 32 for the reply RF signal. In one embodiment, the RF interrogator 22 includes control logic for monitoring each of the RFID tags 32 that have sent an initialization reply RF signal back to the RF interrogator 22. Process 100 may then proceed to step 108.
In step 108, the RF interrogator 22 continues to monitor each RFID tag 32 until, and determines if a personal item 36 is removed from the vehicle 20. In the event the RF interrogator 22 fails to receive the reply RF signal from at least one of the RFID tags 32, then process 100 proceeds to step 110. In the event that the RF interrogator 22 receives the reply signal from each RFID tag 32, then process 100 returns to step 106, where each RFID tag 32 continues to be monitored.
In step 110, the RF interrogator 22 includes control logic for sending a trigger data signal to a vehicle alarm control module 24 indicating that at least one RFID tag 32 is moved out of range of the specified distance D. The vehicle alarm control module 24 includes control logic for activating at least one indicator 26 in the event at least one of the RFID tags 32 are moved out of range of the specified distance D. Alternatively, in another embodiment, the vehicle alarm control module 24 may be configured such that only an indicator data signal is sent to a wireless communication device 30 for sending a text message or telephone call to a personal electronic device 50, and the indicators 26 are not activated at all. In yet another embodiment, in the event at least one of the RFID tags 32 have been moved out of range of the specified distance D the vehicle alarm control module 24 includes control logic for activating the indicators 26 as well as sending a text message or telephone call to the personal electronic device 50. Process 100 may then terminate.
While the invention has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed, but that the invention will include all embodiments falling within the scope of the application.
Number | Name | Date | Kind |
---|---|---|---|
20030220711 | Allen | Nov 2003 | A1 |
20050134459 | Glick et al. | Jun 2005 | A1 |
20060071766 | O'Brien et al. | Apr 2006 | A1 |
20090015410 | Puzio et al. | Jan 2009 | A1 |
20090096599 | Kranz | Apr 2009 | A1 |
20090267757 | Nguyen | Oct 2009 | A1 |
20100102993 | Johnson | Apr 2010 | A1 |
20100271192 | Mituta | Oct 2010 | A1 |
20110084807 | Logan et al. | Apr 2011 | A1 |
20110279273 | Warren | Nov 2011 | A1 |
Number | Date | Country |
---|---|---|
101681454 | Mar 2010 | CN |
Entry |
---|
Chinese Office Action for Application No. 201210280197.X Mailed Dec. 1, 2014, 14 pages. |
Number | Date | Country | |
---|---|---|---|
20130038432 A1 | Feb 2013 | US |