Violations of motor vehicle laws, such as speeding laws, may become an increasing concern as highways become more crowded with ever increasing numbers of vehicles. Electronic systems for monitoring vehicles are described in U.S. Pat. No. 6,107,917 to Carrender et al., entitled Electronic Tag Including RF Modem for Monitoring Motor Vehicle Performance With Filtering; U.S. Pat. No. 6,124,810 to Segal et al., entitled Method and Apparatus for Automatic Event Detection in a Wireless Communication System; and U.S. Pat. No. 6,223,125 to Hall, entitled Collision Avoidance System.
Cooperative Vehicular Identification Systems and Methods, capable of monitoring and recording vehicular law violations, with the assistance and cooperation of the vehicles in violation, are disclosed. In accordance with some embodiments of the invention, real-time information from vehicular sensors is communicated to a Central Processing Unit (CPU). Strategically located Interrogator devices, on roads/highways, at intersections, in and around school zones, integrated with traffic lights, etc., issue inquiries/interrogations to passing-by vehicles. Vehicles proximate to such Interrogators respond with unique identifying information and with parameter lists provided by their vehicular sensors. In some embodiments, each Interrogator inquiry provides data, including the lawful parameter limits (i.e. speed limit) associated with its location. In response to having successfully decoded an inquiry, and in response to the state of its vehicular sensors, a vehicular Transponder may transmit information to the specific Interrogator that has issued an inquiry. The Interrogator then relays relevant identifying information to the CPU for further processing.
Cooperative Vehicular Identification Systems and Methods according to some embodiments of the invention, hereinafter referred to as CVIS, may also provide a public service to motorists by delivering real-time road-specific reports relating to traffic, accidents, weather conditions, etc. In other embodiments, CVIS may further provide a service to motorists by delivering store-and-forward messages (e-mail) to and from their vehicles. In other embodiments, CVIS may also serve as a “mobile yellow pages” providing selective, area-specific information relevant to leisure, shopping, and/or entertainment activities, in response to motorist initiated inquiries. Some embodiments may also provide distress assistance to motorists. Toll collections may be handled very effectively, and some embodiments may even be configured to tell you where to find a parking spot as you approach a parking area.
CVIS can pay for itself very quickly with the dollars of vehicular law violators. Significant new revenue may be generated for State and Local authorities since many or every violator can be apprehended electronically. CVIS may derive additional revenues from services provided to commerce and/or individuals, or may chose to offer (at least some) of its services free of charge as a public service to the community.
Significant business potential exists for industry that may engage in the development, manufacturing, deployment, maintenance, and upgrades to CVIS. In the United States alone, more than 15 Million (lightweight) new cars are sold each year, and there are more that 200 Million such vehicles already in operation. There are also more than 40 Million fleet vehicles US-wide. For all of these vehicles to be CVIS compliant, according to some embodiments of the invention, each one may be equipped with a Transponder. The number of Interrogators that could be deployed US-wide could exceed tens of thousands.
Following the successful deployment of CVIS in the United States, deployment in other countries may follow.
Besides detecting violations such as speeding, some embodiments of CVIS will also be able to detect events such as not having stopped at a red light and/or a stop sign, and will be able to search, locate, and track a vehicle, in response to law enforcement commands, throughout a city and/or throughout the entire country.
Embodiments of CVIS described hereinbelow can potentially benefit society in significant ways. Some embodiments of CVIS may:
A focus of CVIS is on strengthening vehicular law enforcement and mitigating irresponsible driving behavior, thus improving safety for pedestrians and drivers alike. Deployment of CVIS can make vehicular law enforcement automatic, efficient, non-discriminatory, quick, non-intrusive, and/or transparent to the violator and law enforcement agency alike. While being an instrument of beneficial social engineering, embodiments of CVIS also can generate significant new revenues for state/county law-enforcement agencies and can thus pay for itself with the dollars of those who violate the Law. Embodiments of CVIS may thus be envisioned as a selective tax imposed only on vehicular law violators. Other embodiments of CVIS, however, may also generate revenue by delivering area-specific commercial, leisure, and/or recreational information to motorists' vehicles. That is, some embodiments of CVIS can be a “mobile yellow pages” for restaurants, cinemas, stores/malls, promotions, etc, as well as a system for delivering store-and-forward personal messages and/or e-mail to people in transit.
To those who will criticize CVIS as being a “Big Brother is Watching” type of a system, we offer this simple response: Driving on public roads and highways is a necessity of modern life, and is an activity conducted daily by an overwhelming majority of the adult population. Driving on public roads and highways, therefore, is an activity that impacts almost all people daily, either directly or indirectly. Because of its broad reaching affects on society, driving must be conducted responsibly and within the guidelines set forth by Law. According to some embodiments of CVIS, while a driver's activities remain lawful, “Big Brother” is blind. Only when a motorist's actions violate the Law, only then do Big Brother's eyes open to take notice.
We have all witnessed the reckless driver who routinely violates the posted speed limit. We have repeatedly witnessed the careless driver who goes through stop signs without first making a complete stop. We have even seen those who go through red lights in their eagerness to get to their destinations a few minutes earlier. Many drivers still do not wear seat belts and many more execute turns without bothering to indicate their intentions. All these vehicular law violations, and many more, would be noticeable and recordable by some embodiments of CVIS. Each event associated with a violation would be recorded at a central processing unit and would also be tagged with the registered identity of the vehicle involved, the time-of-day of occurrence, and position coordinates of occurrence.
The present invention now will be described more fully hereinafter with reference to the accompanying figures, in which embodiments of the invention are shown. This invention may, however, be embodied in many alternate forms and should not be construed as limited to the embodiments set forth herein.
Accordingly, while the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit the invention to the particular forms disclosed, but on the contrary, the invention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the claims.
An element of some embodiments of CVIS is the Transponder-Interrogator pair of
As is illustrated in
An Interrogator, as shown in
Two groups of embodiments that can be used to detect violations of vehicular law are described below. Following a reading of this section, it will be apparent to one of ordinary skill in the art that a number of combinations and variations on the embodiments discussed hereinbelow are possible. Even though this is recognized, we do not attempt to be exhaustive; rather, we chose to be comprehensive and thorough, focusing on two specific embodiments, so that the scope and spirit of the disclosure can be conveyed fully and unambiguously to one of ordinary skill in the art.
In accordance with first embodiments (the independent Interrogator concept) Interrogators are positioned at predetermined locations, along the sides of highways and roads, and are configured to transmit an interrogation periodically, say once every 0.5 seconds.3 Vehicle Transponders proximate to such Interrogators (i.e. within listening range) may be triggered to provide a response. Even when an interrogation is reliably received (error free) by a vehicle Transponder, said vehicle Transponder may or may-not be triggered to respond. In some embodiments, the decision to respond may depend on the type of interrogation message received, requesting a conditional or an unconditional response. In other embodiments, the decision of a Transponder to respond may also depend on whether or not said Transponder has already responded to the particular Interrogator, within a predetermined elapsed time interval. By suppressing subsequent Transponder responses to the same Interrogator (over a predetermined time interval) some embodiments of the invention may eliminate many redundant Transponder responses (that otherwise may be transmitted) thus reducing the probability of response collisions. 3 In some embodiments, independent Interrogators of the type described in this section may also be installed in law-enforcement vehicles.
As has already been noted, an interrogation may request a conditional or an unconditional Transponder response. Subject to the conditional interrogation, the Transponder will respond if it is in violation of some aspect of the Law. For example, if the driver is not wearing his/her seat belt, and/or if the vehicle has not passed inspection within the time limit allowed, and/or if the speed limit is being violated. Furthermore, if the vehicle has been subjected to unauthorized usage (has been stolen, as determined by the vehicular sensors), and/or if the vehicle has been reported stolen,4 a Transponder response will also be issued. 4 How the vehicle knows that it has been stolen (other than detecting unauthorized usage with its own sensors) will be discussed later.
In some embodiments, each interrogation, whether it is of the conditional or unconditional type, relays a unique Interrogator identifier (ID), a measure of the physical coordinates of the Interrogator, the Time of Day (ToD), the lawful speed limit, and may also relay additional broadcast information that may be relevant to motorists proximate to the Interrogator site.
In some embodiments, should the Transponder decide to respond, the response will include the vehicle's unique identification number, the ToD, position coordinates, the lawful speed limit (as relayed to the Transponder by the Interrogator); the vehicle's actual speed, red light & stop sign flag status (the significance of which will be discussed in detail later); the driver's seat belt status (ON/OFF); inspection status; theft status; and/or driver's distress status (see
In other embodiments, if a Transponder decides to send a response to an interrogation because there is some aspect of the law that has been violated, the response will also be stored locally within the Transponder. In addition to keeping a local copy of its response, the Transponder may also store a digital image and/or other characteristic of the driver.6 Given that the Transponder's response is received reliably by the Interrogator (as determined, for example, by a CRC field and/or other error checking) the Interrogator will copy said Transponder response in memory and will send a confirmation to the issuing Transponder (see
In other embodiments, in the case of an unconditional interrogation, the vehicle is obliged to respond whether it is in violation of the law or not. No permanent record is kept by the Transponder (per the above discussion) unless the vehicle happens to be in violation of some aspect of the law. This mode of Transponder response, to the unconditional interrogation, may be used in places where the authorities desire to gather statistics on parameters such as the number of vehicles passing by a particular location at different times of the day, the distribution of speed at that location, the types of vehicles (private cars, taxis, trucks, etc.) passing by that location, etc. . . . As with the Transponder response to a conditional interrogation, here too, a confirmation by the Interrogator is sent to each responding Transponder in some embodiments. This may be done to silence the Transponder from responding to subsequent interrogations that may be received from the same Interrogator over a predetermined time interval.
In accordance with second embodiments of the invention, the Interrogator does not transmit unless it is triggered by a near-by Transponder whose associated vehicle is in violation of some aspect of the law, or in distress, or needs to receive or transmit information. Some embodiments, may work as follows: Each road containing Interrogators also contains other devices referred to as Notificators. A Notificator is a transmit-only device that relays information to near-by (passing-by) vehicles. The Notificator does not receive information from vehicles, only transmits to them. In some embodiments, the Notificator, however, can be configured to communicate bi-directionally with the CPU. The Notificator will periodically transmit its coordinates, ToD, and the lawful (posted) speed limit for its location, and may also be enabled to transmit other information such as road conditions, traffic reports, accident reports, weather bulletins, etc. In other embodiments, the Notificator may also be configured to transmit a “you have been stolen” message which would be aimed at specific vehicles that have been reported stolen.7 7 Imagine a very sophisticated thief who manages to steal a vehicle without triggering any of the unauthorized use (theft) sensors of the vehicle. When the owner of said stolen vehicle becomes aware of the fact and notifies the authorities, the authorities can command all Notificators in the area (via the CPU) to start transmitting the “you have been stolen” message, accompanied by the stolen vehicle's unique ID. When the stolen vehicle's Transponder receives the notification, it will identify itself as stolen at the next Interrogator site (together with position coordinates) thus notifying the authorities of its whereabouts.
We return now to describe how Interrogators may be triggered to interrogate in accordance with some embodiments of the invention. When a Transponder has received information from a Notificator and said Transponder decides that, based on the received information, it is engaged in some unlawful activity, the Transponder begins to periodically broadcast a message. The Transponder broadcasts (at say frequency fi) its unique vehicle ID and the Notificator's coordinates, pseudo-randomly changing the carrier frequency fi from broadcast to broadcast. The Transponder broadcasts and then listens; broadcasts and then listens; in a time division duplex fashion, both broadcasting and listening at fi. Each Interrogator listens to all possible Transponder broadcast frequencies fi (i=1, 2, . . . , L−1, L). Hence, when an Interrogator hears a Transponder's broadcast, the Interrogator responds by interrogating the specific Transponder whose broadcast it has just heard. The interrogation is transmitted at carrier frequency fi, while the Transponder is still listening at fi.
Embodiments of an Interrogator packet format are illustrated in
According to some embodiments, one reason for including the Notificator's coordinates in the Transponder's broadcast message, is to reduce or preclude the possibility of having vehicles wrongly accused of violating the speed limit. One can imagine, for example, a vehicle on a highway violating the speed limit by going 75 mph while the posted speed limit is 55 mph. Let's assume that said vehicle is broadcasting, and imagine a location where the highway and a city road come very close together. Furthermore, let's assume that, due to an engineering oversight or other reason, an Interrogator situated on the city road (at the point where the city road and the highway come close to each other) can hear broadcasts of vehicle Transponders traveling on the highway. By deciphering the broadcast message, and reading the Notificator's coordinates, the road Interrogator can ignore all highway vehicle broadcasts (even though some aspect of the law has been violated) since the Notificator's coordinates make it clear that said broadcasts relate to vehicles on an other road/highway and, hence, will be handled by Interrogators on said other road/highway. Similarly, if due to some improper installation/calibration of a Notificator or other reason, its radiated signals are heard by Transponders on roads/highways other than the intended one, Interrogators on said “other than the intended one” route will ignore any broadcasts initiated by said Transponders. Failure to correlate between the Notificator's “coordinates”, as relayed by the Transponder's broadcast, and those of the listening Interrogator, can inhibit triggering the Interrogator to interrogate8. 8 It should be understood that the term “coordinates” is used throughout this document in a very liberal sense. In some embodiments, the term coordinates is not used with geometrical rigor to specify a precise point in space; rather, it is used to specify a particular road/highway and in some cases a specific location on said road/highway (e.g. route 495 between exits 50 and 51). It is envisaged that Notificators and Interrogators belonging to the same road/highway will be positioned close to each other (may even be co-located, or even physically integrated onto one assembly). As such, the “coordinates” relayed by a Transponder broadcast should always correlate, at least with regard to the specified road/highway, with the coordinates of an Interrogator hearing the broadcast. In other embodiments, precise geometrical coordinates may be used.
In some embodiments, Notificators frequency-hop from one notification message to the next in order to comply with regulatory requirements of the unlicensed-frequency Instrumentation, Scientific and Medical (ISM) band. Each notification message is repeated at each transponder listening frequency fi; i=1, 2, . . . , L. Preferably, the L repeats of each notification should occur over a short period of time (e.g., within 500 ms or less). In some embodiments, transponders do not have any timing or frequency-hop pattern information relative to Notificators. A Transponder simply tunes its receiver to a frequency, randomly selected from the set {fi; i=1, 2, . . . , L}, and listens.
3.2.1 Special Purpose Notificators at Stop Lights
Special Purpose Notificators may be strategically positioned in the proximity of traffic lights. Such Notificators may contain lists of reported stolen vehicles (as relayed to them by the CPU) and may broadcast such lists periodically. The placement of Notificators in the proximity of traffic lights can offer advantages to the system. As a traffic light turns red, most vehicles (even those in the possession of thieves) stop. The (relatively long) time interval over which vehicles remain stationary at traffic lights allows the Notificator to transmit a significantly longer stolen vehicles list than it could otherwise be able to. As a result, the probability that a stolen vehicle will hear the message “you have been stolen”, as relayed to it, for example, via a broadcast of its unique vehicle ID, is increased. Once a stolen vehicle receives the notification that it has been stolen, its “theft status” flag is raised, thus triggering the vehicle to start broadcasting, as already discussed, in accordance with the second embodiments.
The frame format configuration for this relatively long message may be as shown on
At the beginning of the “stolen vehicles list” notification message and intermittently thereafter, the message segment may be repeated on all Transponder listening frequencies in order to get all proximate Transponders to track the message (to follow the frequency-hopping pattern)10. By doing so, all Transponders in the vicinity of the Special Purpose Notificator can receive a message segment which reveals the value of the next hop frequency at which the message is to be continued. 10 As will be described later, when the Special Purpose Notificator is co-located with Traffic Light State Notificators, this may not be necessary.
In some embodiments, an Interrogator sequentially transmits its interrogation on all possible frequencies (f1 through fL) that Transponders may be listening to.
In some embodiments, all Transponder responses that are received error free by the relevant Interrogator are acknowledged via a confirmation to the issuing Transponder. As illustrated on
As has been stated earlier, in accordance with the second embodiments, shortly after a Transponder is triggered by a Notificator to start broadcasting, said Transponder pseudo-randomly selects a frequency from the set {fi; i=1, 2, . . . , L} and begins to transmit identifying information over said frequency. The Transponder broadcast burst is transmitted periodically (for example, once every 500 msec) until an Interrogator is triggered to interrogate. As illustrated in
In accordance with the second embodiments, it has already been stated that the Transponder, once triggered to start broadcasting, pseudo-randomly (and in some embodiments, uniformly and with no bias over the available frequency set) changes transmit/receive frequency once per broadcast interval (at least once about every 500 msec). When the Transponder is not in the broadcast mode, it randomly (and in some embodiments uniformly) selects a frequency from the set {fi; i=1, 2, . . . , L} to listen to. The Transponder stays at the chosen frequency, and continues to listen for Notificator messages until a Notificator message and some violation of the law and/or a distress state and/or the Transponder's desire to transmit or receive information, triggers said Transponder once again into the broadcast mode.
In accordance with the first embodiments, each Transponder can be configured so that in response to each received interrogation confirmation message the Transponder hops pseudo-randomly (and preferably uniformly) to a new frequency fi. Consequently, even if all Transponders at the time of manufacturing and/or installation are initialized to a common receive/transmit frequency f0, : f0ϵ{f1, f2, . . . , fL}, offenders would soon be randomized. Alternative embodiments may entail assigning, in a pseudo-random fashion, at the time of manufacturing and/or installation, a receive/transmit frequency to each Transponder, which the Transponder then maintains ad infinitum. Variations of the two embodiments may also be used.
We have already described how embodiments of CVIS may be used to identify and record various driving violations such as exceeding of the speed limit, the driver not having engaged the seat belt mechanism, operating a vehicle with expired inspection status, driving a stolen vehicle, etc. We have also described how embodiments of CVIS can serve as a safety net for drivers in distress and how embodiments of CVIS can provide other services and information to motorists. In this section, we describe other embodiments of CVIS—the ability of embodiments of CVIS to detect traffic light and stop sign violations. Not honoring a traffic light (i.e., not stopping at a red light) may be one of the most dangerous behavior patterns that a driver can engage in.
As noted earlier, according to some embodiments of the present invention, a vehicle approaching Traffic Light Set A will first encounter the Approaching Traffic Light Set A Notificator. The Approaching Traffic Light Set A Notificator informs the vehicle that it is about to enter the listening range of a possible plurality of Traffic Light Sets, but it is only to listen and pay attention to transmissions (notifications) originating from Notificators of Traffic Light Set A. The Approaching Traffic Light Set A Notificator also informs the vehicle of the Transponder listening frequencies corresponding to Traffic Light Set A (chosen so as to maintain orthogonality between the transmissions of the plurality of Notificator sets corresponding to a plurality of Traffic Light Sets that may be proximate at an intersection). The Approaching Traffic Light Set A Notificator transmits its notification periodically (say once every 500 msec) repeating said notification on all Transponder listening frequencies within the repetition interval (within the 500 msec). An illustrative packet format for the Approaching Traffic Light Set Notificator is shown in
In some embodiments, each Traffic Light State Notificator periodically transmits a notification informing Transponders of its associated Traffic Light Assembly state. The Traffic Light State Notificator receives information regarding the state of its corresponding Traffic Light Assembly, for example, from the corresponding Traffic Light Assembly itself (see
Frequency coordination between the Stolen Vehicles List Notificator and the Traffic Light State Notificator(s) associated with a particular Traffic Light Set, such as the Traffic Light Set shown on
In accordance with some embodiments of the invention as illustrated in
In some embodiments, the Interrogators following a Traffic Light Set can be of either type—Independent or Dependent. First, assume that Interrogators of the Independent type follow Traffic Light Sets. If a vehicle travels straight-ahead past a Traffic Light Set, and upon interrogation presents a Red Traffic Light State response (within the Traffic Light Assembly S field; see
In accordance with the second embodiments, and in addition to all other embodiments already discussed with respect to said second embodiments, Transponders may be configured such as a non-zero vehicular velocity in conjunction with straight-ahead motion and a Red Traffic Light State from a corresponding (straight-ahead) Traffic Light Assembly will trigger Transponder broadcasts. Transponders may also be configured so that vehicular motion in conjunction with having made a left turn and a Red Traffic Light State from the corresponding left turn Traffic Light Assembly will also trigger Transponder broadcasts, etc. . . .
The notion of having associated a Traffic Light State Notificator with each Traffic Light Assembly (see
In some embodiments, the CPU may ascertain, in substantially real time, the current traffic state (over a geographic area) from a plurality of Interrogators. In response to the current traffic state, the desired traffic state, and the state of a plurality of Traffic Light Assemblies, the CPU may execute an optimization algorithm (e.g., Kalman-based) to determine the optimum set of parameters for said plurality of Traffic Light Assemblies so as to optimally bring about the desired traffic state. Optimal and (nearly) real-time adaptive feedback control of the traffic state may thus be performed by the CPU.
In accordance with these embodiments, a Transponder is notified by a Notificator that it is approaching a stop sign (or that it has just passed by a stop sign). As such, the vehicle associated with the notified Transponder is expected to execute (or to have executed) a complete stop at the stop sign. Thus, in response to such a notification, the vehicle's velocity is examined over a time interval (±τ) about the notification. If a zero velocity reading is found, the vehicle has obeyed the letter of the Law and has stopped at the stop sign; if not, the vehicle is in violation. If the vehicle has not made a complete stop, other questions such as did the vehicle slow down, and if yes by how much, may be asked.
The Hand-Held Transponder Loader (HHTL) and the Hand-Held Transponder Retriever (HHTR) are devices that input and output, respectively, information to/from the Transponder according to some embodiments of the present invention. The exchange of information between a HHTL and a Transponder or a HHTR and a Transponder preferably takes place wirelessly. The HHTL may be, for example, used by an Inspection Station to update the contents of a particular Transponder following an inspection of the vehicle associated with said Transponder. The HHTL may also be used to load into a Transponder a plurality of images, each reflecting characteristics of an authorized driver, so that in the event of a violation, correlations between the driver's “image” and the a priori stored images may be performed locally (within the Transponder). These embodiments can reduce or minimize the amount of data that would need to be relayed to the CPU. The HHTL may also be used by the Motor Vehicles Department to periodically load data into Transponders.
In some embodiments, the HHTR may be a portable device that may be used to (wirelessly) extract the records of drivers from Transponders. Law enforcement officials and insurance company agents, for example, may be users of HHTRs. The HHTR may also be equipped with means to delete Transponder records in response to specific input instruction.
According to other embodiments of the invention, shipping containers, or any other ensemble of transportable vehicles, may be equipped with Transponders. Each Transponder may be configured to accept inputs from one or more sensors of a container/transportable vehicle unit, relating to, for example, the contents of the container/transportable vehicle unit, its environmental state, whether the unit has been opened (and when) since it left a particular origin, etc. . . . , and may keep a record of such sensory inputs. At a particular destination (a loading/unloading dock) an Interrogator may be used to survey the ensemble of such container/transportable vehicle units.
In order to conserve battery life (if the Transponder of a container/transportable vehicle unit is operating on battery power) the Transponder may be configured to have a sleep mode whereby it may, for example, sleep for 1 sec., and then wake-up to listen and take sensor readings for 10 msec. If during the listening interval the Transponder detects a “presence signal” of an Interrogator, the Transponder may remain awake in order to read the interrogation message content and respond with unique identifying information. The Transponder may also relay to the Interrogator the contents of its record (a measure of its sensory inputs). Following the Transponder's response to the interrogation, and following a confirmation of reception sent to the Transponder by the Interrogator, the Transponder may return to its sleep mode cycle (i.e., sleeping for 1 sec. and awaking-up for 10 msec. to listen and take sensor readings). Any subsequent detections of the Interrogator's presence signal by the Transponder may be ignored by a Transponder that has already responded and has received confirmation that its response has been received. The time interval for which the subsequent detections of the Interrogator's presence signal may be ignored (by a Transponder that has responded and has received confirmation) may be a priori determined and stored within the Transponder, may be chosen by the Transponder, or may be dictated by the Interrogator's interrogation message. The Interrogator's presence signal may be a direct-sequence-spread and/or frequency-hopping waveform (or even a simple CW) whose parameter values are a priori known to the Transponder. Thus, each time the Transponder wakes-up, acquisition of the Interrogator's presence signal is attempted. If the presence signal is acquired, the Transponder remains awake in order to receive and process an Interrogation.
To reduce or minimize the probability of Transponder response collisions (particularly in areas where there may be a large ensemble of container/transportable vehicle units equipped with Transponders) the Interrogator may selectively command (via the interrogation message) a subset of the ensemble of container/transportable vehicle unit Transponders to respond. Thus, sequentially, subset-by-subset, the entire ensemble of Transponders may be interrogated to respond.
An ensemble of container/transportable vehicle units that may be en-route (on a barge, railroad cart, airplane, or a truck) may also be subject to the same interrogation process described above. In this case, however, a special purpose Interrogator device may be used. The special purpose Interrogator device may be permanently installed on the barge, railroad cart, airplane, or truck. The special purpose Interrogator device may contain an Interrogator (as specified above) in conjunction with a Transponder. The Interrogator component of the special purpose Interrogator device may be configured to interrogate the ensemble of container/transportable vehicle units, as described earlier, and thus gather a summary of their state. This summary may then be relayed to the Transponder component of the special purpose Interrogator device. Thus, as the barge, railroad cart, airplane, or truck that is transporting the ensemble of container/transportable vehicle units passes by an Interrogator (of the type that has been described for usage on the side of roads and/or highways) information reflecting the state of the container/transportable vehicle units ensemble that is en-route may be relayed to a CVIS CPU. The ability to interrogate and ascertain the state of the container/transportable vehicle units ensemble, as it travels from a point of origin to a point of destination, may offer significant Home Land Security benefits.
In some embodiments of the invention, every vehicle may be CVIS equipped (may have a built-in Transponder). However, in other embodiments, not every vehicle's Transponder may be activated. A vehicle's Transponder may be activated voluntarily by the owner of the vehicle or, in the event that it isn't, a vehicle's Transponder may be activated by a Government authority. For example, an automobile insurance company may offer an insurance premium discount with CVIS activation of a vehicle. Thus, some people may choose to have their vehicles CVIS activated. A vehicle that is not CVIS activated and is involved in a number of accidents/traffic violations, may be ordered by the authorities to become CVIS activated.
CVIS may be activated in a vehicle in response to an interrogation message. In some embodiments, the Transponder of a vehicle that is not CVIS activated continues to receive interrogations, it simply does not respond. As such, the vehicle's Transponder may receive an interrogation specifying the vehicle's unique ID and ordering the vehicle to become CVIS active. Thus, from that time on, the Transponder of the vehicle will configure itself in a CVIS active mode and will begin responding to interrogations. This covert mode of CVIS activation may be used by the authorities where there is probable cause (as is the case with legal wire-tapping) to gather information on suspect behavior. A vehicle that has been CVIS activated by the above technique may become CVIS de-activated in response to an interrogation ordering the vehicle's Transponder back into a CVIS dormant mode.
A jamming device may be used in the vicinity of a CVIS Transponder to prevent the Transponder from deciphering interrogations and/or notifications and thus prevent the Transponder from ever responding to interrogations. The jamming device may be configured to jam the entire band over which the Transponder is configured to receive information from Interrogators and/or Notificators. In order to defeat this threat, the following embodiment may be used:
Since a Transponder knows the frequency that its receiver is tuned to, the Transponder's transmitter may be tuned to the same frequency to transmit an a priori known (to the Transponder receiver) message. In this mode, the transmitter of the Transponder may use a radiating element that is sufficiently apart (spatially) from the Transponder's receiving antenna element (one antenna element may be situated near the front of the vehicle while the other may be positioned near the rear of the vehicle). If the a priori known message that is transmitted by the Transponder's transmitter is not received reliably by the Transponder's receiver (while all other Transponder diagnostics are showing no malfunction) a warning signal/message/alarm may instruct the vehicle's operator to disable the jamming device. If the effect of the jamming device persists for more than a predetermined time interval (following the warning signal/message/alarm) then the vehicle's engine may, for example, stop.
In other embodiments, given the relatively low-cost nature of the Transponder, large-scale redundancy may be provided. Each vehicle may contain a plurality of Transponders, all networked together wirelessly (or otherwise) so that if one fails, the next can provide the necessary functions. The plurality of Transponder chip-sets may be situated in different areas of a vehicle so as to make it difficult to identify and disable. Transponder chip-sets may also be integrated with other electronic functions of a vehicle such that the Transponder assumes an amorphous (or distributed) nature, thus making it difficult for someone to identify, isolate, and disable, without also causing harm to other vehicular electronics.
A vehicle may be equipped with GPS signal processing means and with a satellite/terrestrial transceiver capable of communicating directly with a CVIS CPU. Thus, a vehicle may attain a measure of its position from GPS signal processing. Furthermore, a vehicle may be interrogated via a terrestrial wireless system (cellular, PCS, or other) or via a satellite system. In response to such an interrogation, the vehicle may ascertain a measure of its position from processing of GPS signals and may relay directly to a CPU, via the satellite/terrestrial transceiver unit, information responsive to the interrogation.
Fire trucks, Police vehicles, ambulances, and other authorized vehicles may be equipped with Transponders capable of controlling the traffic signals at intersections along their path. A Transponder of an authorized vehicle may receive, from an Approaching Traffic Light Set Notificator, information regarding an approaching Traffic Light Set. The Transponder of the authorized vehicle may then use this information to command the Traffic Light Set in its path to turn green while all other Traffic Light Sets that may exist at the same intersection are commanded to turn red.
This embodiment of CVIS may provide significant additional safety to motorists, passengers of vehicles, and pedestrians that may be in the vicinity of an emergency vehicle while the emergency vehicle is pursuing its objective at high speed. A hearing impaired person, for example, who may not hear the sirens of an approaching emergency vehicle, may respond to the altered state of traffic signals. Similarly, a vehicle packed with teenagers, with their stereo blasting away at maximum setting, may not hear the sirens of an approaching emergency vehicle but may respond to the altered state of traffic signals.
In the drawings and specification, there have been disclosed embodiments of the invention and, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation, the scope of the invention being set forth in the following claims.
The present application is a reissue continuation of U.S. patent application Ser. No. 16/282,494, filed Feb. 22, 2019, which itself is a reissue continuation of U.S. patent application Ser. No. 15/444,486, filed Feb. 28, 2017 (now U.S. Pat. No. RE47,408), which is an application for reissue of U.S. Pat. No. 8,970,351, for which U.S. patent application Ser. No. 13/753,700 was filed on Jan. 30, 2013 as a divisional of U.S. patent application Ser. No. 12/620,122, filed Nov. 17, 2009, entitled Systems and/or Methods of Data Acquisition From a Transceiver, now U.S. Pat. No. 8,665,068, which itself is a continuation of U.S. patent application Ser. No. 11/855,332, filed Sep. 14, 2007, entitled A Cooperative Vehicular Identification System, now U.S. Pat. No. 7,642,897, which itself is a continuation of U.S. patent application Ser. No. 10/506,365, filed Sep. 2, 2004, entitled A Cooperative Vehicular Identification System, now U.S. Pat. No. 7,286,040, which itself is a 35 U.S.C. §371 national phase application of PCT International Application No. PCT/US03/07770, having an international filing date of Mar. 13, 2003, which itself claims the benefit of U.S. provisional Application No. 60/364,303, filed Mar. 14, 2002, entitled A Cooperative Vehicular Identification System, the disclosures of all of which are incorporated herein by reference in their entirety. The above PCT International Application was published in the English language and has International Publication No. WO 03/096128 A2.
Number | Name | Date | Kind |
---|---|---|---|
3824469 | Ristenbatt | Jul 1974 | A |
4303904 | Chasek | Dec 1981 | A |
4591823 | Horvat | May 1986 | A |
4768220 | Yoshihara et al. | Aug 1988 | A |
4818998 | Apsell et al. | Apr 1989 | A |
5014052 | Obeck | May 1991 | A |
5067147 | Lee | Nov 1991 | A |
5093924 | Toshiyuki et al. | Mar 1992 | A |
5194846 | Lee et al. | Mar 1993 | A |
5243598 | Lee | Sep 1993 | A |
5289183 | Hassett et al. | Feb 1994 | A |
5309503 | Bruckert et al. | May 1994 | A |
5349631 | Lee | Sep 1994 | A |
5351052 | D'Hont | Sep 1994 | A |
5420794 | James | May 1995 | A |
5438329 | Gastouniotis et al. | Aug 1995 | A |
5483666 | Yamada et al. | Jan 1996 | A |
5491469 | Schwendeman | Feb 1996 | A |
5550536 | Flaxl | Aug 1996 | A |
5565858 | Guthrie | Oct 1996 | A |
5608723 | Felsenstein | Mar 1997 | A |
5621412 | Sharpe et al. | Apr 1997 | A |
5625672 | Yamada | Apr 1997 | A |
5729590 | Dimitriadis et al. | Mar 1998 | A |
5732360 | Jarett et al. | Mar 1998 | A |
5737705 | Ruppel et al. | Apr 1998 | A |
5745049 | Akiyama | Apr 1998 | A |
5771454 | Ohsawa | Jun 1998 | A |
5787346 | Iseyama | Jul 1998 | A |
5794151 | McDonald et al. | Aug 1998 | A |
5812522 | Lee et al. | Sep 1998 | A |
5822698 | Tang et al. | Oct 1998 | A |
5828963 | Grandhi et al. | Oct 1998 | A |
5870392 | Ann | Feb 1999 | A |
5887176 | Griffith | Mar 1999 | A |
5898384 | Alt et al. | Apr 1999 | A |
5898683 | Matsumoto et al. | Apr 1999 | A |
5915219 | Pöyhönen | Jun 1999 | A |
5920818 | Frodigh et al. | Jul 1999 | A |
5924030 | Rautiola et al. | Jul 1999 | A |
5960351 | Przelomiec | Sep 1999 | A |
5960352 | Cherpantier | Sep 1999 | A |
5963129 | Warner | Oct 1999 | A |
5963848 | D'Avello | Oct 1999 | A |
5978117 | Koonen | Nov 1999 | A |
6023459 | Clark et al. | Feb 2000 | A |
6032046 | Nakano | Feb 2000 | A |
6052595 | Schellinger et al. | Apr 2000 | A |
6064320 | d'Hont | May 2000 | A |
6104285 | Stobbe | Aug 2000 | A |
6107917 | Carrender et al. | Aug 2000 | A |
6112152 | Tuttle | Aug 2000 | A |
6124810 | Segal et al. | Sep 2000 | A |
6127928 | Issacman et al. | Oct 2000 | A |
6219539 | Basu et al. | Apr 2001 | B1 |
6219613 | Terrier et al. | Apr 2001 | B1 |
6223125 | Hall | Apr 2001 | B1 |
6246954 | Berstis et al. | Jun 2001 | B1 |
6259991 | Nysen | Jul 2001 | B1 |
6314299 | Schreib et al. | Nov 2001 | B1 |
6317598 | Wiesen et al. | Nov 2001 | B1 |
6326903 | Gross et al. | Dec 2001 | B1 |
6381231 | Silventoinen et al. | Apr 2002 | B1 |
6396417 | Lee | May 2002 | B2 |
6404751 | Roark et al. | Jun 2002 | B1 |
6418317 | Cuffaro et al. | Jul 2002 | B1 |
6442473 | Berstis et al. | Aug 2002 | B1 |
6463279 | Sherman et al. | Oct 2002 | B1 |
6512752 | H'mimy et al. | Jan 2003 | B1 |
6535544 | Partyka | Mar 2003 | B1 |
6538563 | Heng | Mar 2003 | B1 |
6570487 | Steeves | May 2003 | B1 |
6606033 | Crocker et al. | Aug 2003 | B1 |
6614387 | Deadman | Sep 2003 | B1 |
6631268 | Lilja | Oct 2003 | B1 |
6653946 | Hassett | Nov 2003 | B1 |
6661352 | Tiernay et al. | Dec 2003 | B2 |
6674966 | Koonen | Jan 2004 | B1 |
6704546 | Lucidarme et al. | Mar 2004 | B1 |
6747558 | Thorne et al. | Jun 2004 | B1 |
6864784 | Loeb | Mar 2005 | B1 |
6901057 | Rune et al. | May 2005 | B2 |
6975667 | Mattisson et al. | Dec 2005 | B2 |
6975865 | Väisänen | Dec 2005 | B1 |
6980838 | Hiben et al. | Dec 2005 | B2 |
6985090 | Ebner et al. | Jan 2006 | B2 |
6990348 | Benveniste | Jan 2006 | B1 |
7026935 | Diorio et al. | Apr 2006 | B2 |
7044387 | Becker et al. | May 2006 | B2 |
7095719 | Wilhelmsson et al. | Aug 2006 | B1 |
7099675 | Keutmann et al. | Aug 2006 | B2 |
7133680 | Crisan | Nov 2006 | B2 |
7233260 | Tang et al. | Jun 2007 | B2 |
7245602 | Skubic et al. | Jul 2007 | B2 |
7257426 | Witkowski et al. | Aug 2007 | B1 |
7283037 | Diorio et al. | Oct 2007 | B2 |
7286040 | Karabinis | Oct 2007 | B2 |
7307964 | Nakai et al. | Dec 2007 | B2 |
7328004 | Wolters et al. | Feb 2008 | B1 |
7335525 | Cole | Feb 2008 | B2 |
7342500 | Ho et al. | Mar 2008 | B2 |
7479896 | Ho et al. | Jan 2009 | B2 |
7605842 | Wilsey et al. | Oct 2009 | B2 |
7642897 | Karabinis | Jan 2010 | B2 |
7792484 | Andreason | Sep 2010 | B2 |
8665068 | Karabinis | Mar 2014 | B2 |
20010002906 | Rune | Jun 2001 | A1 |
20010002908 | Rune et al. | Jun 2001 | A1 |
20010016499 | Hamabe | Aug 2001 | A1 |
20010020198 | Wilson | Sep 2001 | A1 |
20010044697 | Kageyama | Nov 2001 | A1 |
20010049284 | Liu et al. | Dec 2001 | A1 |
20020059612 | Kita | May 2002 | A1 |
20020065099 | Bjorndahl | May 2002 | A1 |
20020175805 | Armstrong | Nov 2002 | A9 |
20030007473 | Strong et al. | Jan 2003 | A1 |
20030016143 | Ghazarian | Jan 2003 | A1 |
20030060159 | Brynielsson | Mar 2003 | A1 |
20030072322 | Collins | Apr 2003 | A1 |
20040248573 | Wandel | Dec 2004 | A1 |
20070137514 | Kumar et al. | Jun 2007 | A1 |
20130342368 | Nathanson | Dec 2013 | A1 |
20160054140 | Breed | Feb 2016 | A1 |
20190149960 | Himmelstein | May 2019 | A1 |
Number | Date | Country |
---|---|---|
43 41 813 | Jun 1995 | DE |
1 090 800 | Apr 2001 | EP |
1 090 800 | Apr 2001 | EP |
1 241 632 | Sep 2002 | EP |
1 255 374 | Nov 2002 | EP |
2 649 517 | Jan 1991 | FR |
WO 9953446 | Oct 1999 | WO |
WO 0150435 | Jul 2001 | WO |
WO 0158181 | Aug 2001 | WO |
WO 0158181 | Aug 2001 | WO |
Entry |
---|
“Surveillance Vision Plan, Revision 2” United States Department of Transportation, Federal Aviation Administration AND-440 (77 pages) (Jul. 1, 1996). |
“Surveillance Vision Plan, Revision 2” United States Department of Transportation, Federal Aviation Administration AND-440, pp. ES-5 and VI-3 (2 pages) (Jul. 1, 1996). |
Communication with Supplementary European Search Report, EP 03 75 0021, Aug. 31, 2006. |
International Search Report PCT/US03/07770,Ju1. 2, 2004. |
Brickhouse et al., “Urban In-Building Cellular Frequency Reuse”, IEEE Global Telecommunications Conference, vol. 2 Nov. 1996, pp. 1192-1196. |
Cover, “Broadcast Channels”, IEEE Trans on Info. Theory, vol. 18, No. 1, Jan. 1972, pp. 2-14. |
Drucker, “Development and Application of a Cellular Repeater”, Proc. IEEE Vehicular Technology Conference, Jun. 1988, pp. 321-325. |
Finean, “Satellite Access in FPLMTS”, PhD Thesis Review and Contents, University of Surrey Centre for Satellite Engineering Research, downloaded May 15, 2012 from rfinean.tripod.com/PhD/. |
Finean, Satellite Channel Assignment, Chapter 7 from PhD Thesis “Satellite Access in FPLMTS”, University of Surrey Centre for Satellite Engineering Research, 1996, pp. 79-115. |
Galda et al., “A Low Complexity Transmitter Structure for OFDM-FDMA Uplink Systems” IEEE 55th Vehicular Technology Conference, 2002, vol. 4, May 2002, pp. 1737-1741. |
Gallager, “A Perspective on Multi-Access Channels”, IEEE Trans. on Info. Theory, vol. 31, No. 2, Mar. 1985, pp. 124-142. |
Iyer et al., “Intelligent Networking for Digital Cellular System and the Wireless World”, Proc. IEEE Globecom, vol. 1, Dec. 1990, pp. 475-479. |
MacKenzie et a1., “Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks”, IEEE Communications Magazine, Nov. 2001, pp. 126-131. |
Murray et al., “Adaptive Radio Resource Management for GSM/GPRS Networks”, ISCC, Cork Ireland, Nov. 27, 2001, 6 pp. |
Quinn, “The Cell Enhancer”, Proc. IEEE Vehicular Technology Conference, vol. 36, May 1986, pp. 77-83. |
Silventoinen et al., “Analysis of a New Channel Access Method for Home Base Station”, 5th IEEE International Conference on Universal Personal Communications, Nokia Res. Center, Helsinki, Sep. 29-Oct. 2, 1996, pp. 930-935. |
Stocker, “Small-Cell Mobile Phone Systems”, IEEE Trans. on Vehicular Technology, vol. 33, No. 4, Nov. 1984, pp. 269-275. |
Walser, “Feasible Cellular Frequency Assignment Using Constraint Programming Abstractions”, Proceedings of the Workshop on Constraint Programming Applications, Aug. 1996, 10 pp. |
Wyner, Shannon-Theoretic Approach to a Gaussian Cellular Multiple-Access Channel, IEEE Transactions on Information Theory, vol. 40, No. 6, Nov. 1994, pp. 1713-1727. |
USPTO Patent Full-Text and Image Database, Patent Database Search Results: ACLM/“unlicensed frequency band” in US Patent Collection, retrieved Dec. 10, 2014 from http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fne . . . . |
Federal Communications Commission, “Access Spectrum” retrieved Dec. 12, 2014 from http://www.fcc.gov/encyclopedia/accessing-spectrum, 2 pp. |
Motorola, White Paper: “Licensed Versus Unlicensed Wireless”, retrieved Dec. 12, 2014 from http://www.winncom.com/images/stories/Motorola_Licensed_Versus_Unlicensed_Wireless_WP.pdf, 6 pp. |
TechTarget, “What's the difference between licensed and unlicensed Wireless?”, retrieved Dec. 12, 2014 from http://searchnetworking.techtarget.com/answer/Whats-the-difference-between-licensed-and-unlicensed-wireless, 6 pp. |
Tetz, “Radio Frequencies and Wireless Networks”, retrieved Dec. 12, 2014 from http://www.dummies.com/how-to/content/radio-frequencies-and-wireless-networks.html, 3 pp. |
Number | Date | Country | |
---|---|---|---|
60364303 | Mar 2002 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12620122 | Nov 2009 | US |
Child | 13753700 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16282494 | Feb 2019 | US |
Child | 13753700 | US | |
Parent | 15444486 | Feb 2017 | US |
Child | 16282494 | US | |
Parent | 11855332 | Sep 2007 | US |
Child | 12620122 | US | |
Parent | 10506365 | US | |
Child | 11855332 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13753700 | Jan 2013 | US |
Child | 17220584 | US | |
Parent | 13753700 | Jan 2013 | US |
Child | 15444486 | US |