The present disclosure is generally directed to vehicle systems, in particular, toward electric and/or hybrid-electric vehicles.
In recent years, transportation methods have changed substantially. This change is due in part to a concern over the limited availability of natural resources, a proliferation in personal technology, and a societal shift to adopt more environmentally friendly transportation solutions. These considerations have encouraged the development of a number of new flexible-fuel vehicles, hybrid-electric vehicles, and electric vehicles.
While these vehicles appear to be new they are generally implemented as a number of traditional subsystems that are merely tied to an alternative power source. In fact, the design and construction of the vehicles is limited to standard frame sizes, shapes, materials, and transportation concepts. Among other things, these limitations fail to take advantage of the benefits of new technology, power sources, and support infrastructure.
Embodiments of the present disclosure will be described in connection with a vehicle, and in accordance with one exemplary embodiment an electric vehicle and/or hybrid-electric vehicle and associated systems.
With attention to
Referring to
Referring to
Data may comprise charging type 310A comprising a manual charging station 310J, robotic charging station 310K such as robotic charging system 254, a roadway charging system 310L such as those of roadway system 250, an emergency charging system 310M such as that of emergency charging vehicle system 270, an emergency charging system 310N such as that of aerial vehicle charging system 280, and overhead charging type 310O such as that of overhead charging system 258.
Compatible vehicle charging panel types 310B comprise locations on vehicle 100 wherein charging may be received, such as vehicle roof 130, vehicle side 160 and vehicle lower or undercarriage 140. Compatible vehicle storage units 310C data indicates storage units types that may receive power from a given charging type 310A. Available automation level 310D data indicates the degree of automation available for a given charging type; a high level may indicate full automation, allowing the vehicle driver 220 and/or vehicle passengers 230 to not involve themselves in charging operations, while a low level of automation may require the driver 220 and/or occupant 230 to manipulate/position a vehicle charging device to engage with a particular charging type 310A to receive charging. Charging status 310E indicates whether a charging type 310A is available for charging (i.e. is “up”) or is unavailable for charging (i.e. is “down”). Charge rate 310F provides a relative value for time to charge, while Cost 310G indicates the cost to vehicle 100 to receive a given charge. The Other data element 310H may provide additional data relevant to a given charging type 310A, such as a recommended separation distance between a vehicle charging plate and the charging source. The Shielding data element 310I indicates if electromagnetic shielding is recommended for a given charging type 310A and/or charging configuration. Further data fields 310P, 310Q are possible.
The static charging areas 520A, 520B may be positioned a static area such as a designated spot, pad, parking space 540A, 540B, traffic controlled space (e.g., an area adjacent to a stop sign, traffic light, gate, etc.), portion of a building, portion of a structure, etc., and/or combinations thereof. Some static charging areas may require that the electric vehicle 100 is stationary before a charge, or electrical energy transfer, is initiated. The charging of vehicle 100 may occur by any of several means comprising a plug or other protruding feature. The power source 516A, 516B may include a receptacle or other receiving feature, and/or vice versa.
The charging area may be a moving charging area 520C. Moving charging areas 520C may include charging areas associated with one or more portions of a vehicle, a robotic charging device, a tracked charging device, a rail charging device, etc., and/or combinations thereof. In a moving charging area 520C, the electrical vehicle 100 may be configured to receive a charge, via a charging panel, while the vehicle 100 is moving and/or while the vehicle 100 is stationary. In some embodiments, the electrical vehicle 100 may synchronize to move at the same speed, acceleration, and/or path as the moving charging area 520C. In one embodiment, the moving charging area 520C may synchronize to move at the same speed, acceleration, and/or path as the electrical vehicle 100. In any event, the synchronization may be based on an exchange of information communicated across a communications channel between the electric vehicle 100 and the charging area 520C. Additionally or alternatively, the synchronization may be based on information associated with a movement of the electric vehicle 100 and/or the moving charging area 520C. In some embodiments, the moving charging area 520C may be configured to move along a direction or path 532 from an origin position to a destination position 520C′.
In some embodiments, a transformer may be included to convert a power setting associated with a main power supply to a power supply used by the charging areas 520A-C. For example, the transformer may increase or decrease a voltage associated with power supplied via one or more power transmission lines.
Referring to
The charging panel controller 610 may receive signals from vehicle sensors 626 to determine, for example, if a hazard is present in the path of the vehicle 100 such that deployment of the vehicle charging panel 608 is inadvisable. The charging panel controller 610 may also query vehicle database 210 comprising data structures 300 to establish other required conditions for deployment. For example, the database may provide that a particular roadway does not provide a charging service or the charging service is inactive, wherein the charging panel 108 would not be deployed.
The power source 516 may include at least one electrical transmission line 624 and at least one power transmitter or charging area 520. During a charge, the charging panel 608 may serve to transfer energy from the power source 516 to at least one energy storage unit 612 (e.g., battery, capacitor, power cell, etc.) of the electric vehicle 100.
Robotic charging unit 700 comprises one or more robotic unit arms 704, at least one robotic unit arm 704 interconnected with charging plate 520. The one or more robotic unit arms 704 manoeuver charging plate 520 relative to charging panel 608 of vehicle 100. Charging plate 520 is positioned to a desired or selectable separation distance, as assisted by a separation distance sensor disposed on charging plate 520. Charging plate 520 may remain at a finite separation distance from charging panel 608, or may directly contact charging panel (i.e. such that separation distance is zero). Charging may be by induction. In alternative embodiments, separation distance sensor is alternatively or additionally disposed on robotic arm 704. Vehicle 100 receives charging via charging panel 608 which in turn charges energy storage unit 612. Charging panel controller 610 is in communication with energy storage unit 612, charging panel 608, vehicle database 300, charge provider controller 622, and/or any one of elements of instrument panel 400.
Robotic unit further comprises, is in communication with and/or is interconnected with charge provider controller 622, power source 516 and a robotic unit database. Power source 516 supplies power, such as electrical power, to charge plate 520 to enable charging of vehicle 100 via charging panel 608. Controller 622 manoeuvers or operates robotic unit 704, either directly and/or completely or with assistance from a remote user, such as a driver or passenger in vehicle 100 by way of, in one embodiment, charging manual controller 432.
The overhead charging cable or first wire 814 is analogous to a contact wire used to provide charging to electric trains or other vehicles. An external source provides or supplies electrical power to the first wire 814. The charge provider comprises an energy source i.e. a provider battery and a provider charge circuit or controller in communication with the provider battery. The overhead charging cable or first wire 814 engages the overhead contact 824 which is in electrical communication with charge receiver panel 108. The overhead contact 824 may comprise any known means to connect to overhead electrical power cables, such as a pantograph 820, a bow collector, a trolley pole or any means known to those skilled in the art. Further disclosure regarding electrical power or energy transfer via overhead systems is found in US Pat. Publ. No. 2013/0105264 to Ruth entitled “Pantograph Assembly,” the entire contents of which are incorporated by reference for all purposes. In one embodiment, the charging of vehicle 100 by overhead charging system 800 via overhead contact 824 is by any means know to those skilled in the art, to include those described in the above-referenced US Pat. Publ. No. 2013/0105264 to Ruth.
The overhead contact 824 presses against the underside of the lowest overhead wire of the overhead charging system, i.e. the overhead charging cable or first wire 814, aka the contact wire. The overhead contact 824 may be electrically conductive. Alternatively or additionally, the overhead contact 824 may be adapted to receive electrical power from overhead charging cable or first wire 814 by inductive charging.
In one embodiment, the receipt and/or control of the energy provided via overhead contact 824 (as connected to the energy storage unit 612) is provided by receiver charge circuit or charging panel controller 110.
Overhead contact 824 and/or charging panel 608 may be located anywhere on vehicle 100, to include, for example, the roof, side panel, trunk, hood, front or rear bumper of the charge receiver 100 vehicle, as long as the overhead contact 824 may engage the overhead charging cable or first wire 814. Charging panel 108 may be stationary (e.g. disposed on the roof of vehicle 100) or may be moveable, e.g. moveable with the pantograph 820. Pantograph 820 may be positioned in at least two states comprising retracted and extended. In the extended state pantograph 820 engages first wire 814 by way of the overhead contact 824. In the retracted state, pantograph 820 may typically reside flush with the roof of vehicle 100 and extend only when required for charging. Control of the charging and/or positioning of the charging plate 608, pantograph 820 and/or overhead contact 824 may be manual, automatic or semi-automatic (such as via controller 610); said control may be performed through a GUI engaged by driver or occupant of receiving vehicle 100 and/or driver or occupant of charging vehicle.
With reference to
In one embodiment, the charging plate 520 is not in physical interconnection to AV 280, that is, there is no tether 1010. In this embodiment, the charging plate 520 is positioned and controlled by AV 280 by way of a controller on AV 280 or in communication with AV 280.
In one embodiment, the charging plate 520 position and/or characteristics (e.g. charging power level, flying separation distance, physical engagement on/off) are controlled by vehicle 100 and/or a user in or driver of vehicle 100.
Charge or power output of power source 516 is provided or transmitted to charger plate 620 by way of a charging cable or wire, which may be integral to tether 1010. In one embodiment, the charging cable is non-structural, that is, it provides zero or little structural support to the connection between AV 280 and charger plate 520.
Charging panel 608 of vehicle 100 receives power from charger plate 520. Charging panel 608 and charger plate 520 may be in direct physical contact (termed a “contact” charger configuration) or not in direct physical contact (termed a “flyer” charger configuration), but must be at or below a threshold (separation) distance to enable charging, such as by induction. Energy transfer or charging from the charger plate 520 to the charging panel 608 is inductive charging (i.e. use of an EM field to transfer energy between two objects). The charging panel 608 provides received power to energy storage unit 612 by way of charging panel controller 610. Charging panel controller 610 is in communication with vehicle database 210, vehicle database 210 comprising an AV charging data structure.
Charging panel 508 may be located anywhere on vehicle 100, to include, for example, the roof, side panel, trunk, hood, front or rear bumper and wheel hub of vehicle 100. Charging panel 608 is mounted on the roof of vehicle 100 in the embodiment of
Charging panel controller 610 may be located anywhere on charge receiver vehicle 100, to include, for example, the roof, side panel, trunk, hood, front or rear bumper and wheel hub of charge receiver 100 vehicle. In some embodiments, charging panel 608 may be deployable, i.e. may extend or deploy only when charging is needed. For example, charging panel 608 may typically stow flush with the lower plane of vehicle 100 and extend when required for charging. Similarly, charger plate 520 may, in one embodiment, not be connected to the lower rear of the emergency charging vehicle 270 by way of connector 1150 and may instead be mounted on the emergency charging vehicle 270, to include, for example, the roof, side panel, trunk, hood, front or rear bumper and wheel hub of emergency charging vehicle 270. Connector 1150 may be configured to maneuver connector plate 520 to any position on emergency charging vehicle 270 so as to enable charging. Control of the charging and/or positioning of the charging plate may be manual, automatic or semi-automatic; said control may be performed through a GUI engaged by driver or occupant of receiving vehicle and/or driver or occupant of charging vehicle.
Referring now to
The structural subsystem includes the frame 1204 of the vehicle 100. The frame 1204 may comprise a separate frame and body construction (i.e., body-on-frame construction), a unitary frame and body construction (i.e., a unibody construction), or any other construction defining the structure of the vehicle 100. The frame 1204 may be made from one or more materials including, but in no way limited to steel, titanium, aluminum, carbon fiber, plastic, polymers, etc., and/or combinations thereof. In some embodiments, the frame 1204 may be formed, welded, fused, fastened, pressed, etc., combinations thereof, or otherwise shaped to define a physical structure and strength of the vehicle 100. In any event, the frame 1204 may comprise one or more surfaces, connections, protrusions, cavities, mounting points, tabs, slots, or other features that are configured to receive other components that make up the vehicle 100. For example, the body panels, powertrain subsystem, controls systems, interior components, communications subsystem, and safety subsystem may interconnect with, or attach to, the frame 1204 of the vehicle 100.
The frame 1204 may include one or more modular system and/or subsystem connection mechanisms. These mechanisms may include features that are configured to provide a selectively interchangeable interface for one or more of the systems and/or subsystems described herein. The mechanisms may provide for a quick exchange, or swapping, of components while providing enhanced security and adaptability over conventional manufacturing or attachment. For instance, the ability to selectively interchange systems and/or subsystems in the vehicle 100 allow the vehicle 100 to adapt to the ever-changing technological demands of society and advances in safety. Among other things, the mechanisms may provide for the quick exchange of batteries, capacitors, power sources 1308A, 1308B, motors 1312, engines, safety equipment, controllers, user interfaces, interiors exterior components, body panels 1208, bumpers 1316, sensors, etc., and/or combinations thereof. Additionally or alternatively, the mechanisms may provide unique security hardware and/or software embedded therein that, among other things, can prevent fraudulent or low quality construction replacements from being used in the vehicle 100. Similarly, the mechanisms, subsystems, and/or receiving features in the vehicle 100 may employ poka-yoke, or mistake-proofing, features that ensure a particular mechanism is always interconnected with the vehicle 100 in a correct position, function, etc.
By way of example, complete systems or subsystems may be removed and/or replaced from a vehicle 100 utilizing a single minute exchange principle. In some embodiments, the frame 1204 may include slides, receptacles, cavities, protrusions, and/or a number of other features that allow for quick exchange of system components. In one embodiment, the frame 1204 may include tray or ledge features, mechanical interconnection features, locking mechanisms, retaining mechanisms, etc., and/or combinations thereof. In some embodiments, it may be beneficial to quickly remove a used power source 1308A, 1308B (e.g., battery unit, capacitor unit, etc.) from the vehicle 100 and replace the used power source 1308A, 1308B with a charged power source. Continuing this example, the power source 1308A, 1308B may include selectively interchangeable features that interconnect with the frame 1204 or other portion of the vehicle 100. For instance, in a power source 1308A, 1308B replacement, the quick release features may be configured to release the power source 1308A, 1308B from an engaged position and slide or move away from the frame 1204 of a vehicle 100. Once removed, the power source 1308A, 1308B may be replaced (e.g., with a new power source, a charged power source, etc.) by engaging the replacement power source into a system receiving position adjacent to the vehicle 100. In some embodiments, the vehicle 100 may include one or more actuators configured to position, lift, slide, or otherwise engage the replacement power source with the vehicle 100. In one embodiment, the replacement power source may be inserted into the vehicle 100 or vehicle frame 1204 with mechanisms and/or machines that are external or separate from the vehicle 100.
In some embodiments, the frame 1204 may include one or more features configured to selectively interconnect with other vehicles and/or portions of vehicles. These selectively interconnecting features can allow for one or more vehicles to selectively couple together and decouple for a variety of purposes. For example, it is an aspect of the present disclosure that a number of vehicles may be selectively coupled together to share energy, increase power output, provide security, decrease power consumption, provide towing services, and/or provide a range of other benefits. Continuing this example, the vehicles may be coupled together based on travel route, destination, preferences, settings, sensor information, and/or some other data. The coupling may be initiated by at least one controller of the vehicle and/or traffic control system upon determining that a coupling is beneficial to one or more vehicles in a group of vehicles or a traffic system. As can be appreciated, the power consumption for a group of vehicles traveling in a same direction may be reduced or decreased by removing any aerodynamic separation between vehicles. In this case, the vehicles may be coupled together to subject only the foremost vehicle in the coupling to air and/or wind resistance during travel. In one embodiment, the power output by the group of vehicles may be proportionally or selectively controlled to provide a specific output from each of the one or more of the vehicles in the group.
The interconnecting, or coupling, features may be configured as electromagnetic mechanisms, mechanical couplings, electromechanical coupling mechanisms, etc., and/or combinations thereof. The features may be selectively deployed from a portion of the frame 1204 and/or body of the vehicle 100. In some cases, the features may be built into the frame 1204 and/or body of the vehicle 100. In any event, the features may deploy from an unexposed position to an exposed position or may be configured to selectively engage/disengage without requiring an exposure or deployment of the mechanism from the frame 1204 and/or body. In some embodiments, the interconnecting features may be configured to interconnect one or more of power, communications, electrical energy, fuel, and/or the like. One or more of the power, mechanical, and/or communications connections between vehicles may be part of a single interconnection mechanism. In some embodiments, the interconnection mechanism may include multiple connection mechanisms. In any event, the single interconnection mechanism or the interconnection mechanism may employ the poka-yoke features as described above.
The power system of the vehicle 100 may include the powertrain, power distribution system, accessory power system, and/or any other components that store power, provide power, convert power, and/or distribute power to one or more portions of the vehicle 100. The powertrain may include the one or more electric motors 1312 of the vehicle 100. The electric motors 1312 are configured to convert electrical energy provided by a power source into mechanical energy. This mechanical energy may be in the form of a rotational or other output force that is configured to propel or otherwise provide a motive force for the vehicle 100.
In some embodiments, the vehicle 100 may include one or more drive wheels 1320 that are driven by the one or more electric motors 1312 and motor controllers 1314. In some cases, the vehicle 100 may include an electric motor 1312 configured to provide a driving force for each drive wheel 1320. In other cases, a single electric motor 1312 may be configured to share an output force between two or more drive wheels 1320 via one or more power transmission components. It is an aspect of the present disclosure that the powertrain include one or more power transmission components, motor controllers 1314, and/or power controllers that can provide a controlled output of power to one or more of the drive wheels 1320 of the vehicle 100. The power transmission components, power controllers, or motor controllers 1314 may be controlled by at least one other vehicle controller described herein.
As provided above, the powertrain of the vehicle 100 may include one or more power sources 1308A, 1308B. These one or more power sources 1308A, 1308B may be configured to provide drive power, system and/or subsystem power, accessory power, etc. While described herein as a single power source 1308 for sake of clarity, embodiments of the present disclosure are not so limited. For example, it should be appreciated that independent, different, or separate power sources 1308A, 1308B may provide power to various systems of the vehicle 100. For instance, a drive power source may be configured to provide the power for the one or more electric motors 1312 of the vehicle 100, while a system power source may be configured to provide the power for one or more other systems and/or subsystems of the vehicle 100. Other power sources may include an accessory power source, a backup power source, a critical system power source, and/or other separate power sources. Separating the power sources 1308A, 1308B in this manner may provide a number of benefits over conventional vehicle systems. For example, separating the power sources 1308A, 1308B allow one power source 1308 to be removed and/or replaced independently without requiring that power be removed from all systems and/or subsystems of the vehicle 100 during a power source 1308 removal/replacement. For instance, one or more of the accessories, communications, safety equipment, and/or backup power systems, etc., may be maintained even when a particular power source 1308A, 1308B is depleted, removed, or becomes otherwise inoperable.
In some embodiments, the drive power source may be separated into two or more cells, units, sources, and/or systems. By way of example, a vehicle 100 may include a first drive power source 1308A and a second drive power source 1308B. The first drive power source 1308A may be operated independently from or in conjunction with the second drive power source 1308B and vice versa. Continuing this example, the first drive power source 1308A may be removed from a vehicle while a second drive power source 1308B can be maintained in the vehicle 100 to provide drive power. This approach allows the vehicle 100 to significantly reduce weight (e.g., of the first drive power source 1308A, etc.) and improve power consumption, even if only for a temporary period of time. In some cases, a vehicle 100 running low on power may automatically determine that pulling over to a rest area, emergency lane, and removing, or “dropping off,” at least one power source 1308A, 1308B may reduce enough weight of the vehicle 100 to allow the vehicle 100 to navigate to the closest power source replacement and/or charging area. In some embodiments, the removed, or “dropped off,” power source 1308A may be collected by a collection service, vehicle mechanic, tow truck, or even another vehicle or individual.
The power source 1308 may include a GPS or other geographical location system that may be configured to emit a location signal to one or more receiving entities. For instance, the signal may be broadcast or targeted to a specific receiving party. Additionally or alternatively, the power source 1308 may include a unique identifier that may be used to associate the power source 1308 with a particular vehicle 100 or vehicle user. This unique identifier may allow an efficient recovery of the power source 1308 dropped off. In some embodiments, the unique identifier may provide information for the particular vehicle 100 or vehicle user to be billed or charged with a cost of recovery for the power source 1308.
The power source 1308 may include a charge controller 1324 that may be configured to determine charge levels of the power source 1308, control a rate at which charge is drawn from the power source 1308, control a rate at which charge is added to the power source 1308, and/or monitor a health of the power source 1308 (e.g., one or more cells, portions, etc.). In some embodiments, the charge controller 1324 or the power source 1308 may include a communication interface. The communication interface can allow the charge controller 1324 to report a state of the power source 1308 to one or more other controllers of the vehicle 100 or even communicate with a communication device separate and/or apart from the vehicle 100. Additionally or alternatively, the communication interface may be configured to receive instructions (e.g., control instructions, charge instructions, communication instructions, etc.) from one or more other controllers of the vehicle 100 or a communication device that is separate and/or apart from the vehicle 100.
The powertrain includes one or more power distribution systems configured to transmit power from the power source 1308 to one or more electric motors 1312 in the vehicle 100. The power distribution system may include electrical interconnections 1328 in the form of cables, wires, traces, wireless power transmission systems, etc., and/or combinations thereof. It is an aspect of the present disclosure that the vehicle 100 include one or more redundant electrical interconnections 1332 of the power distribution system. The redundant electrical interconnections 1332 can allow power to be distributed to one or more systems and/or subsystems of the vehicle 100 even in the event of a failure of an electrical interconnection portion of the vehicle 100 (e.g., due to an accident, mishap, tampering, or other harm to a particular electrical interconnection, etc.). In some embodiments, a user of a vehicle 100 may be alerted via a user interface associated with the vehicle 100 that a redundant electrical interconnection 1332 is being used and/or damage has occurred to a particular area of the vehicle electrical system. In any event, the one or more redundant electrical interconnections 1332 may be configured along completely different routes than the electrical interconnections 1328 and/or include different modes of failure than the electrical interconnections 1328 to, among other things, prevent a total interruption power distribution in the event of a failure.
In some embodiments, the power distribution system may include an energy recovery system 1336. This energy recovery system 1336, or kinetic energy recovery system, may be configured to recover energy produced by the movement of a vehicle 100. The recovered energy may be stored as electrical and/or mechanical energy. For instance, as a vehicle 100 travels or moves, a certain amount of energy is required to accelerate, maintain a speed, stop, or slow the vehicle 100. In any event, a moving vehicle has a certain amount of kinetic energy. When brakes are applied in a typical moving vehicle, most of the kinetic energy of the vehicle is lost as the generation of heat in the braking mechanism. In an energy recovery system 1336, when a vehicle 100 brakes, at least a portion of the kinetic energy is converted into electrical and/or mechanical energy for storage. Mechanical energy may be stored as mechanical movement (e.g., in a flywheel, etc.) and electrical energy may be stored in batteries, capacitors, and/or some other electrical storage system. In some embodiments, electrical energy recovered may be stored in the power source 1308. For example, the recovered electrical energy may be used to charge the power source 1308 of the vehicle 100.
The vehicle 100 may include one or more safety systems. Vehicle safety systems can include a variety of mechanical and/or electrical components including, but in no way limited to, low impact or energy-absorbing bumpers 1316A, 1316B, crumple zones, reinforced body panels, reinforced frame components, impact bars, power source containment zones, safety glass, seatbelts, supplemental restraint systems, air bags, escape hatches, removable access panels, impact sensors, accelerometers, vision systems, radar systems, etc., and/or the like. In some embodiments, the one or more of the safety components may include a safety sensor or group of safety sensors associated with the one or more of the safety components. For example, a crumple zone may include one or more strain gages, impact sensors, pressure transducers, etc. These sensors may be configured to detect or determine whether a portion of the vehicle 100 has been subjected to a particular force, deformation, or other impact. Once detected, the information collected by the sensors may be transmitted or sent to one or more of a controller of the vehicle 100 (e.g., a safety controller, vehicle controller, etc.) or a communication device associated with the vehicle 100 (e.g., across a communication network, etc.).
In some embodiments, the vehicle 100 may include an inductive charging system and inductive charger 1412. The inductive charger 1412 may be configured to receive electrical energy from an inductive power source external to the vehicle 100. In one embodiment, when the vehicle 100 and/or the inductive charger 1412 is positioned over an inductive power source external to the vehicle 100, electrical energy can be transferred from the inductive power source to the vehicle 100. For example, the inductive charger 1412 may receive the charge and transfer the charge via at least one power transmission interconnection 1408 to the charge controller 1324 and/or the power source 1308 of the vehicle 100. The inductive charger 1412 may be concealed in a portion of the vehicle 100 (e.g., at least partially protected by the frame 1204, one or more body panels 1208, a shroud, a shield, a protective cover, etc., and/or combinations thereof) and/or may be deployed from the vehicle 100. In some embodiments, the inductive charger 1412 may be configured to receive charge only when the inductive charger 1412 is deployed from the vehicle 100. In other embodiments, the inductive charger 1412 may be configured to receive charge while concealed in the portion of the vehicle 100.
In addition to the mechanical components described herein, the vehicle 100 may include a number of user interface devices. The user interface devices receive and translate human input into a mechanical movement or electrical signal or stimulus. The human input may be one or more of motion (e.g., body movement, body part movement, in two-dimensional or three-dimensional space, etc.), voice, touch, and/or physical interaction with the components of the vehicle 100. In some embodiments, the human input may be configured to control one or more functions of the vehicle 100 and/or systems of the vehicle 100 described herein. User interfaces may include, but are in no way limited to, at least one graphical user interface of a display device, steering wheel or mechanism, transmission lever or button (e.g., including park, neutral, reverse, and/or drive positions, etc.), throttle control pedal or mechanism, brake control pedal or mechanism, power control switch, communications equipment, etc.
An embodiment of the electrical system 1500 associated with the vehicle 100 may be as shown in
The power generation unit 1504 may be as described in conjunction with
The billing and cost control unit 1512 may interface with the power management controller 1324 to determine the amount of charge or power provided to the power storage 612 through the power generation unit 1504. The billing and cost control unit 1512 can then provide information for billing the vehicle owner. Thus, the billing and cost control unit 1512 can receive and/or send power information to third party system(s) regarding the received charge from an external source. The information provided can help determine an amount of money required, from the owner of the vehicle, as payment for the provided power. Alternatively, or in addition, if the owner of the vehicle provided power to another vehicle (or another device/system), that owner may be owed compensation for the provided power or energy, e.g., a credit.
The power management controller 1324 can be a computer or computing system(s) and/or electrical system with associated components, as described herein, capable of managing the power generation unit 1504 to receive power, routing the power to the power storage 612, and then providing the power from either the power generation unit 1504 and/or the power storage 612 to the loads 1508. Thus, the power management controller 1324 may execute programming that controls switches, devices, components, etc. involved in the reception, storage, and provision of the power in the electrical system 1500.
An embodiment of the power generation unit 1504 may be as shown in
Another power source 1308 may include wired or wireless charging 1608. The wireless charging system 1608 may include inductive and/or resonant frequency inductive charging systems that can include coils, frequency generators, controllers, etc. Wired charging may be any kind of grid-connected charging that has a physical connection, although, the wireless charging may be grid connected through a wireless interface. The wired charging system can include an connectors, wired interconnections, the controllers, etc. The wired and wireless charging systems 1608 can provide power to the power generation unit 1504 from external power sources 1308.
Internal sources for power may include a regenerative braking system 1612. The regenerative braking system 1612 can convert the kinetic energy of the moving car into electrical energy through a generation system mounted within the wheels, axle, and/or braking system of the vehicle 100. The regenerative braking system 1612 can include any coils, magnets, electrical interconnections, converters, controllers, etc. required to convert the kinetic energy into electrical energy.
Another source of power 1308, internal to or associated with the vehicle 100, may be a solar array 1616. The solar array 1616 may include any system or device of one or more solar cells mounted on the exterior of the vehicle 100 or integrated within the body panels of the vehicle 100 that provides or converts solar energy into electrical energy to provide to the power generation unit 1504.
The power sources 1308 may be connected to the power generation unit 1504 through an electrical interconnection 1618. The electrical interconnection 1618 can include any wire, interface, bus, etc. between the one or more power sources 1308 and the power generation unit 1504.
The power generation unit 1504 can also include a power source interface 1620. The power source interface 1620 can be any type of physical and/or electrical interface used to receive the electrical energy from the one or more power sources 1308; thus, the power source interface 1620 can include an electrical interface 1624 that receives the electrical energy and a mechanical interface 1628 which may include wires, connectors, or other types of devices or physical connections. The mechanical interface 1608 can also include a physical/electrical connection 1634 to the power generation unit 1504.
The electrical energy from the power source 1308 can be processed through the power source interface 1624 to an electric converter 1632. The electric converter 1632 may convert the characteristics of the power from one of the power sources into a useable form that may be used either by the power storage 612 or one or more loads 1508 within the vehicle 100. The electrical converter 1624 may include any electronics or electrical devices and/or component that can change electrical characteristics, e.g., AC frequency, amplitude, phase, etc. associated with the electrical energy provided by the power source 1308. The converted electrical energy may then be provided to an optional conditioner 1638. The conditioner 1638 may include any electronics or electrical devices and/or component that may further condition the converted electrical energy by removing harmonics, noise, etc. from the electrical energy to provide a more stable and effective form of power to the vehicle 100.
An embodiment of the power storage 1612 may be as shown in
The battery 1704 can be any type of battery for storing electrical energy, for example, a lithium ion battery, a lead acid battery, a nickel cadmium battery, etc. Further, the battery 1704 may include different types of power storage systems, such as, ionic fluids or other types of fuel cell systems. The energy storage 1704 may also include one or more high-capacity capacitors 1704. The capacitors 1704 may be used for long-term or short-term storage of electrical energy. The input into the battery or capacitor 1704 may be different from the output, and thus, the capacitor 1704 may be charged quickly but drain slowly. The functioning of the converter 1632 and battery capacitor 1704 may be monitored or managed by a charge management unit 1708.
The charge management unit 1708 can include any hardware (e.g., any electronics or electrical devices and/or components), software, or firmware operable to adjust the operations of the converter 1632 or batteries/capacitors 1704. The charge management unit 1708 can receive inputs or periodically monitor the converter 1632 and/or battery/capacitor 1704 from this information; the charge management unit 1708 may then adjust settings or inputs into the converter 1632 or battery/capacitor 1704 to control the operation of the power storage system 612.
An embodiment of one or more loads 1508 associated with the vehicle 100 may be as shown in
The electric motor 1804 can be any type of DC or AC electric motor. The electric motor may be a direct drive or induction motor using permanent magnets and/or winding either on the stator or rotor. The electric motor 1804 may also be wireless or include brush contacts. The electric motor 1804 may be capable of providing a torque and enough kinetic energy to move the vehicle 100 in traffic.
The different loads 1508 may also include environmental loads 1812, sensor loads 1816, safety loads 1820, user interaction loads 1808, etc. User interaction loads 1808 can be any energy used by user interfaces or systems that interact with the driver and/or passenger(s). These loads 1808 may include, for example, the heads up display, the dash display, the radio, user interfaces on the head unit, lights, radio, and/or other types of loads that provide or receive information from the occupants of the vehicle 100. The environmental loads 1812 can be any loads used to control the environment within the vehicle 100. For example, the air conditioning or heating unit of the vehicle 100 can be environmental loads 1812. Other environmental loads can include lights, fans, and/or defrosting units, etc. that may control the environment within the vehicle 100. The sensor loads 1816 can be any loads used by sensors, for example, air bag sensors, GPS, and other such sensors used to either manage or control the vehicle 100 and/or provide information or feedback to the vehicle occupants. The safety loads 1820 can include any safety equipment, for example, seat belt alarms, airbags, headlights, blinkers, etc. that may be used to manage the safety of the occupants. There may be more or fewer loads than those described herein, although they may not be shown in
The communications componentry can include one or more wired or wireless devices such as a transceiver(s) and/or modem that allows communications not only between the various systems disclosed herein but also with other devices, such as devices on a network, and/or on a distributed network such as the Internet and/or in the cloud.
The communications subsystem can also include inter- and intra-vehicle communications capabilities such as hotspot and/or access point connectivity for any one or more of the vehicle occupants and/or vehicle-to-vehicle communications.
Additionally, and while not specifically illustrated, the communications subsystem can include one or more communications links (that can be wired or wireless) and/or communications busses (managed by the bus manager 1974), including one or more of CANbus, OBD-II, ARCINC 429, Byteflight, CAN (Controller Area Network), D2B (Domestic Digital Bus), FlexRay, DC-BUS, IDB-1394, IEBus, I2C, ISO 9141-1/-2, J1708, J1587, J1850, J1939, ISO 11783, Keyword Protocol 2000, LIN (Local Interconnect Network), MOST (Media Oriended Systems Transport), Multifunction Vehicle Bus, SMARTwireX, SPI, VAN (Vehicle Area Network), and the like or in general any communications protocol and/or standard.
The various protocols and communications can be communicated one or more of wirelessly and/or over transmission media such as single wire, twisted pair, fibre optic, IEEE 1394, MIL-STD-1553, MIL-STD-1773, power-line communication, or the like. (All of the above standards and protocols are incorporated herein by reference in their entirety)
As discussed, the communications subsystem enables communications between any if the inter-vehicle systems and subsystems as well as communications with non-collocated resources, such as those reachable over a network such as the Internet.
The communications subsystem, in addition to well-known componentry (which has been omitted for clarity), the device communications subsystem 1900 includes interconnected elements including one or more of: one or more antennas 1904, an interleaver/deinterleaver 1908, an analog front end (AFE) 1912, memory/storage/cache 1916, controller/microprocessor 1920, MAC circuitry 1922, modulator/demodulator 1924, encoder/decoder 1928, a plurality of connectivity managers 1934-1966, GPU 1940, accelerator 1944, a multiplexer/demultiplexer 1954, transmitter 1970, receiver 1972 and wireless radio 1978 components such as a Wi-Fi PHY/Bluetooth® module 1980, a Wi-Fi/BT MAC module 1984, transmitter 1988 and receiver 1992. The various elements in the device 1900 are connected by one or more links/busses 5 (not shown, again for sake of clarity).
The device 400 can have one more antennas 1904, for use in wireless communications such as multi-input multi-output (MIMO) communications, multi-user multi-input multi-output (MU-MIMO) communications Bluetooth®, LTE, 4G, 5G, Near-Field Communication (NFC), etc. The antenna(s) 1904 can include, but are not limited to one or more of directional antennas, omnidirectional antennas, monopoles, patch antennas, loop antennas, microstrip antennas, dipoles, and any other antenna(s) suitable for communication transmission/reception. In an exemplary embodiment, transmission/reception using MIMO may require particular antenna spacing. In another exemplary embodiment, MIMO transmission/reception can enable spatial diversity allowing for different channel characteristics at each of the antennas. In yet another embodiment, MIMO transmission/reception can be used to distribute resources to multiple users for example within the vehicle and/or in another vehicle.
Antenna(s) 1904 generally interact with the Analog Front End (AFE) 1912, which is needed to enable the correct processing of the received modulated signal and signal conditioning for a transmitted signal. The AFE 1912 can be functionally located between the antenna and a digital baseband system in order to convert the analog signal into a digital signal for processing and vice-versa.
The subsystem 1900 can also include a controller/microprocessor 1920 and a memory/storage/cache 1916. The subsystem 1900 can interact with the memory/storage/cache 1916 which may store information and operations necessary for configuring and transmitting or receiving the information described herein. The memory/storage/cache 1916 may also be used in connection with the execution of application programming or instructions by the controller/microprocessor 1920, and for temporary or long term storage of program instructions and/or data. As examples, the memory/storage/cache 1920 may comprise a computer-readable device, RAM, ROM, DRAM, SDRAM, and/or other storage device(s) and media.
The controller/microprocessor 1920 may comprise a general purpose programmable processor or controller for executing application programming or instructions related to the subsystem 1900. Furthermore, the controller/microprocessor 1920 can perform operations for configuring and transmitting/receiving information as described herein. The controller/microprocessor 1920 may include multiple processor cores, and/or implement multiple virtual processors. Optionally, the controller/microprocessor 1920 may include multiple physical processors. By way of example, the controller/microprocessor 1920 may comprise a specially configured Application Specific Integrated Circuit (ASIC) or other integrated circuit, a digital signal processor(s), a controller, a hardwired electronic or logic circuit, a programmable logic device or gate array, a special purpose computer, or the like.
The subsystem 1900 can further include a transmitter 1970 and receiver 1972 which can transmit and receive signals, respectively, to and from other devices, subsystems and/or other destinations using the one or more antennas 1904 and/or links/busses. Included in the subsystem 1900 circuitry is the medium access control or MAC Circuitry 1922. MAC circuitry 1922 provides for controlling access to the wireless medium. In an exemplary embodiment, the MAC circuitry 1922 may be arranged to contend for the wireless medium and configure frames or packets for communicating over the wireless medium.
The subsystem 1900 can also optionally contain a security module (not shown). This security module can contain information regarding but not limited to, security parameters required to connect the device to one or more other devices or other available network(s), and can include WEP or WPA/WPA-2 (optionally+AES and/or TKIP) security access keys, network keys, etc. The WEP security access key is a security password used by Wi-Fi networks. Knowledge of this code can enable a wireless device to exchange information with an access point and/or another device. The information exchange can occur through encoded messages with the WEP access code often being chosen by the network administrator. WPA is an added security standard that is also used in conjunction with network connectivity with stronger encryption than WEP.
The exemplary subsystem 1900 also includes a GPU 1940, an accelerator 1944, a Wi-Fi/BT/BLE PHY module 1980 and a Wi-Fi/BT/BLE MAC module 1984 and wireless transmitter 1988 and receiver 1992. In some embodiments, the GPU 1940 may be a graphics processing unit, or visual processing unit, comprising at least one circuit and/or chip that manipulates and changes memory to accelerate the creation of images in a frame buffer for output to at least one display device. The GPU 1940 may include one or more of a display device connection port, printed circuit board (PCB), a GPU chip, a metal-oxide-semiconductor field-effect transistor (MOSFET), memory (e.g., single data rate random-access memory (SDRAM), double data rate random-access memory (DDR) RAM, etc., and/or combinations thereof), a secondary processing chip (e.g., handling video out capabilities, processing, and/or other functions in addition to the GPU chip, etc.), a capacitor, heatsink, temperature control or cooling fan, motherboard connection, shielding, and the like.
The various connectivity managers 1934-1966 (even) manage and/or coordinate communications between the subsystem 1900 and one or more of the systems disclosed herein and one or more other devices/systems. The connectivity managers include an emergency charging connectivity manager 1934, an aerial charging connectivity manager 1938, a roadway charging connectivity manager 1942, an overhead charging connectivity manager 1946, a robotic charging connectivity manager 1950, a static charging connectivity manager 1954, a vehicle database connectivity manager 1958, a remote operating system connectivity manager 1962 and a sensor connectivity manager 1966.
The emergency charging connectivity manager 1934 can coordinate not only the physical connectivity between the vehicle and the emergency charging device/vehicle, but can also communicate with one or more of the power management controller, one or more third parties and optionally a billing system(s). As an example, the vehicle can establish communications with the emergency charging device/vehicle to one or more of coordinate interconnectivity between the two (e.g., by spatially aligning the charging receptacle on the vehicle with the charger on the emergency charging vehicle) and optionally share navigation information. Once charging is complete, the amount of charge provided can be tracked and optionally forwarded to, for example, a third party for billing. In addition to being able to manage connectivity for the exchange of power, the emergency charging connectivity manager 1934 can also communicate information, such as billing information to the emergency charging vehicle and/or a third party. This billing information could be, for example, the owner of the vehicle, the driver of the vehicle, company information, or in general any information usable to charge the appropriate entity for the power received.
The aerial charging connectivity manager 1938 can coordinate not only the physical connectivity between the vehicle and the aerial charging device/vehicle, but can also communicate with one or more of the power management controller, one or more third parties and optionally a billing system(s). As an example, the vehicle can establish communications with the aerial charging device/vehicle to one or more of coordinate interconnectivity between the two (e.g., by spatially aligning the charging receptacle on the vehicle with the charger on the emergency charging vehicle) and optionally share navigation information. Once charging is complete, the amount of charge provided can be tracked and optionally forwarded to, for example, a third party for billing. In addition to being able to manage connectivity for the exchange of power, the aerial charging connectivity manager 1938 can similarly communicate information, such as billing information to the aerial charging vehicle and/or a third party. This billing information could be, for example, the owner of the vehicle, the driver of the vehicle, company information, or in general any information usable to charge the appropriate entity for the power received etc., as discussed.
The roadway charging connectivity manager 1942 and overhead charging connectivity manager 1946 can coordinate not only the physical connectivity between the vehicle and the charging device/system, but can also communicate with one or more of the power management controller, one or more third parties and optionally a billing system(s). As one example, the vehicle can request a charge from the charging system when, for example, the vehicle needs or is predicted to need power. As an example, the vehicle can establish communications with the charging device/vehicle to one or more of coordinate interconnectivity between the two for charging and share information for billing. Once charging is complete, the amount of charge provided can be tracked and optionally forwarded to, for example, a third party for billing. This billing information could be, for example, the owner of the vehicle, the driver of the vehicle, company information, or in general any information usable to charge the appropriate entity for the power received etc., as discussed. The person responsible for paying for the charge could also receive a copy of the billing information as is customary. The robotic charging connectivity manager 1950 and static charging connectivity manager 1954 can operate in a similar manner to that described herein.
The vehicle database connectivity manager 1958 allows the subsystem to receive and/or share information stored in the vehicle database. This information can be shared with other vehicle components/subsystems and/or other entities, such as third parties and/or charging systems. The information can also be shared with one or more vehicle occupant devices, such as an app on a mobile device the driver uses to track information about the vehicle and/or a dealer or service/maintenance provider. In general, any information stored in the vehicle database can optionally be shared with any one or more other devices optionally subject to any privacy or confidentially restrictions.
The remote operating system connectivity manager 1962 facilitates communications between the vehicle and any one or more autonomous vehicle systems. These communications can include one or more of navigation information, vehicle information, occupant information, or in general any information related to the remote operation of the vehicle.
The sensor connectivity manager 1966 facilitates communications between any one or more of the vehicle sensors and any one or more of the other vehicle systems. The sensor connectivity manager 1966 can also facilitate communications between any one or more of the sensors and/or vehicle systems and any other destination, such as a service company, app, or in general to any destination where sensor data is needed.
In accordance with one exemplary embodiment, any of the communications discussed herein can be communicated via the conductor(s) used for charging. One exemplary protocol usable for these communications is Power-line communication (PLC). PLC is a communication protocol that uses electrical wiring to simultaneously carry both data, and Alternating Current (AC) electric power transmission or electric power distribution. It is also known as power-line carrier, power-line digital subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN). For DC environments in vehicles PLC can be used in conjunction with CAN-bus, LIN-bus over power line (DC-LIN) and DC-BUS.
The communications subsystem can also optionally manage one or more identifiers, such as an IP (internet protocol) address(es), associated with the vehicle and one or other system or subsystems or components therein. These identifiers can be used in conjunction with any one or more of the connectivity managers as discussed herein.
Environment 1901 further includes a network 1909. The network 1909 may can be any type of network familiar to those skilled in the art that can support data communications using any of a variety of commercially-available protocols, including without limitation SIP, TCP/IP, SNA, IPX, AppleTalk, and the like. Merely by way of example, the network 1909 maybe a local area network (“LAN”), such as an Ethernet network, a Token-Ring network and/or the like; a wide-area network; a virtual network, including without limitation a virtual private network (“VPN”); the Internet; an intranet; an extranet; a public switched telephone network (“PSTN”); an infra-red network; a wireless network (e.g., a network operating under any of the IEEE 802.9 suite of protocols, the Bluetooth® protocol known in the art, and/or any other wireless protocol); and/or any combination of these and/or other networks.
The system may also include one or more servers 1913, 1915. In this example, server 1913 is shown as a web server and server 1915 is shown as an application server. The web server 1913, which may be used to process requests for web pages or other electronic documents from computing devices 1903, 1907, 1911. The web server 1913 can be running an operating system including any of those discussed above, as well as any commercially-available server operating systems. The web server 1913 can also run a variety of server applications, including SIP servers, HTTP servers, FTP servers, CGI servers, database servers, Java servers, and the like. In some instances, the web server 1913 may publish operations available operations as one or more web services.
The environment 1901 may also include one or more file and or/application servers 1915, which can, in addition to an operating system, include one or more applications accessible by a client running on one or more of the computing devices 1903, 1907, 1911. The server(s) 1915 and/or 1913 may be one or more general purpose computers capable of executing programs or scripts in response to the computing devices 1903, 1907, 1911. As one example, the server 1915, 1913 may execute one or more web applications. The web application may be implemented as one or more scripts or programs written in any programming language, such as Java™, C, C#°, or C++, and/or any scripting language, such as Perl, Python, or TCL, as well as combinations of any programming/scripting languages. The application server(s) 1915 may also include database servers, including without limitation those commercially available from Oracle, Microsoft, Sybase™, IBM™ and the like, which can process requests from database clients running on a computing device 1903, 1907, 1911.
The web pages created by the server 1913 and/or 1915 may be forwarded to a computing device 1903, 1907, 1911 via a web (file) server 1913, 1915. Similarly, the web server 1913 may be able to receive web page requests, web services invocations, and/or input data from a computing device 1903, 1907, 1911 (e.g., a user computer, etc.) and can forward the web page requests and/or input data to the web (application) server 1915. In further embodiments, the server 1915 may function as a file server. Although for ease of description,
The environment 1901 may also include a database 1917. The database 1917 may reside in a variety of locations. By way of example, database 1917 may reside on a storage medium local to (and/or resident in) one or more of the computers 1903, 1907, 1911, 1913, 1915. Alternatively, it may be remote from any or all of the computers 1903, 1907, 1911, 1913, 1915, and in communication (e.g., via the network 1909) with one or more of these. The database 1917 may reside in a storage-area network (“SAN”) familiar to those skilled in the art. Similarly, any necessary files for performing the functions attributed to the computers 1903, 1907, 1911, 1913, 1915 may be stored locally on the respective computer and/or remotely, as appropriate. The database 1917 may be a relational database, such as Oracle 20i®, that is adapted to store, update, and retrieve data in response to SQL-formatted commands.
The computer system 1919 may additionally include a computer-readable storage media reader 1931; a communications system 1933 (e.g., a modem, a network card (wireless or wired), an infra-red communication device, etc.); and working memory 1937, which may include RAM and ROM devices as described above. The computer system 1919 may also include a processing acceleration unit 1935, which can include a DSP, a special-purpose processor, and/or the like.
The computer-readable storage media reader 1931 can further be connected to a computer-readable storage medium, together (and, optionally, in combination with storage device(s) 1929) comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing computer-readable information. The communications system 1933 may permit data to be exchanged with a network and/or any other computer described above with respect to the computer environments described herein. Moreover, as disclosed herein, the term “storage medium” may represent one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information.
The computer system 1919 may also comprise software elements, shown as being currently located within a working memory 1937, including an operating system 1939 and/or other code 1941. It should be appreciated that alternate embodiments of a computer system 1919 may have numerous variations from that described above. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed.
Examples of the processors 1923 as described herein may include, but are not limited to, at least one of Qualcomm® Snapdragon® 800 and 801, Qualcomm® Snapdragon® 620 and 615 with 4G LTE Integration and 64-bit computing, Apple® A7 processor with 64-bit architecture, Apple® M7 motion coprocessors, Samsung® Exynos® series, the Intel® Core™ family of processors, the Intel® Xeon® family of processors, the Intel® Atom™ family of processors, the Intel Itanium® family of processors, Intel® Core® i5-4670K and i7-4770K 22 nm Haswell, Intel® Core® i5-3570K 22 nm Ivy Bridge, the AMID® FX™ family of processors, AMD® FX-4300, FX-6300, and FX-8350 32 nm Vishera, AMD® Kaveri processors, Texas Instruments® Jacinto C6000™ automotive infotainment processors, Texas Instruments® OMAP™ automotive-grade mobile processors, ARM® Cortex™-M processors, ARM® Cortex-A and ARIV1926EJS™ processors, other industry-equivalent processors, and may perform computational functions using any known or future-developed standard, instruction set, libraries, and/or architecture.
Authentication can be an important capability of the computing environment 1901. For example, authentication of the operator and/or computing system 1903 can be used to control an operation or function of the computing system 1903 or vehicle 120 (such as locking or unlocking the vehicle, raising or lowering a window, selecting auto-adjustable seat, steering column/wheel, peddle, climate control, etc. settings, starting a power source or driving or otherwise operating the vehicle, enabling user or user portable device access to a local area network and/or on board computing components, completing a purchase of a product or service by the operator, a passenger or occupant, or the computing system 1903 itself, completing a license check to confirm proper usage of an on board component, such as a software and/or hardware and/or other component of the computing system or battery pack, and the like. Examples include authentication for such things as battery licensing, purchasing a charge (e.g., by amp-hour, distance traveled, overall wattage, amperes, etc.) or fuel, making a product purchase at a drive-thru, etc. As will be appreciated, in REVs amp-hour is directly proportional to the load, and wattage is a function of voltage and amperes.
Authentication can be a multi-factor authentication which enables or permits the operation or function to be performed or access to be granted only after an authentication mechanism successfully verifies or validates multiple items of information (“authentication information”). Any number of factors can be used for authentication. The use of multiple authentication factors in authentication assumes that an unauthorized actor is unlikely to supply the factors required for access. If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, authentication is not successful and the requested function or access or other operation is denied.
Authentication can use a credential or key generated or derived by a cryptographic algorithm or engine from multiple factors. The key can be an authentication key, benign key, content-encryption key, crypto ignition key, cryptovariable, derived key, electronic key, ephemeral key, key encryption key, key production key, master key, master encryption key, public/private key, session key, symmetric key, asymmetric key, traffic encryption key, transmission security key, seed key, signature key, or stream key. Exemplary cryptographic algorithms used for key generation and/or authentication include a key derivation function, keystream generator, cryptographic hash function, key derivation function, cryptographic pseudorandom number generator, cryptanalytic algorithm, broken cryptography algorithm, asymmetric key algorithm, information-theoretically secure algorithm, integer factorization algorithm, symmetric key algorithm, Type 1, 2, or 2 3 encryption algorithm, advanced access content system, cipher block chain, and the like.
The factors can be static or dynamic. They can relate to an operator or passenger of the vehicle, his or her portable computing or communication device (e.g., smart phone, tablet computer, laptop, and the like), or the vehicle itself or a vehicle component (e.g., battery pack, chassis, motor or engine, etc.).
Operator or passenger factors include biometric data. Biometric data relates to a metric of a physiological or behavioral human characteristic. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to, fingerprint, palm veins, face recognition (e.g., facial characteristic or digital face mapping parameter(s)), DNA, palm print, hand geometry (e.g., hand geometry characteristic or digital hand geometry mapping parameter(s)), iris recognition (e.g., iris characteristic or digital iris mapping parameter(s)), retina (e.g., retina characteristic or digital retina mapping parameter(s)), and odor and/or scent. Behavioral characteristics are related to the pattern of behavior of a person, including, but not limited to, typing rhythm, typing speed, pattern in key press intervals, gait, and voice (e.g., voice audible or spectral characteristic or digital voice print mapping parameter(s)).
Portable computing device or communication device 1907 factors include keyless remote identifier, communication device Electronic Serial Number (“ESN”), Mobile Equipment Identifier (“MEID”), International Mobile Equipment Identity (“MEI”), International Mobile Subscriber Identity (“IMSI”) number (stored on a Subscriber Identity Module (“SIM”) card), Temporary Mobile Subscriber Identity (“TMSI”), telephone number, and Mobile IP (“MIP”) (optionally in conjunction with one or more public/private keys).
As will be appreciated, keyless remotes contain a short-range radio transmitter and must be within a certain range, usually about 5-20 meters, of the wireless radio signal receiver unit in the car to operate. When a button on the keyless remote is pushed, the keyless remote sends a coded signal by radio waves to the receiver unit in the car. Keyless remotes typically operate at a frequency of about 315 MHz for North America-made cars and at about 433.92 MHz for European, Japanese and Asian cars.
ESNs are often represented as either 11-digit decimal numbers or 8 digit hexadecimal numbers. For the decimal format the first three digits are the decimal representation of the first 8 bits (between 000 and 255 inclusive) and the next 8 digits are derived from the remaining 24 bits and will be between 00000000 and 16777215 inclusive. The decimal format of pseudo ESNs will therefore begin with 128. The decimal format separately displays 8 bit manufacturer codes in the first 3 digits, but 14 bit codes are not displayed as separate digits. The hexadecimal format displays an ESN as 8 digits and also does not separately display 14 bit manufacturer codes which occupy 3.5 hexadecimal digits.
A mobile equipment identifier (MEID) is a globally unique number identifying a physical piece of CDMA2000 mobile station equipment. The number format is defined by the 3GPP2 report SR0048 but in practical terms, it can be seen as an IMEI (discussed below) but with hexadecimal digits. An MEID is 56 bits long (14 hex digits). It comprises three fields, including an 8-bit regional code (RR), a 24-bit manufacturer code, and a 24-bit manufacturer-assigned serial number. The check digit (CD) is not considered part of the MEID.
The IMEI (15 decimal digits: 14 digits plus a check digit) or IMEISV (16 digits) includes information on the origin, model, and serial number of the device. The structure of the IMEI/SV is specified in 3GPP TS 23.003. The model and origin comprise the initial 8-digit portion of the IMEI/SV, known as the Type Allocation Code (TAC). The remainder of the IMEI is manufacturer-defined, with a Luhn check digit at the end.
The International Mobile Subscriber Identity or IMSI is used to identify the user of a cellular network and is a unique identification associated with all cellular networks. It is stored as a 64 bit field and is sent by the phone to the network. An IMSI is usually presented as a 15 digit number, but can be shorter. The first 3 digits are the mobile country code (MCC), which are followed by the mobile network code (MNC), either 2 digits (European standard) or 3 digits (North American standard). The length of the MNC depends on the value of the MCC. The remaining digits are the mobile subscription identification number (MSIN) within the network's customer base.
The Temporary Mobile Subscriber Identity (TMSI) is the identity that is most commonly sent between the mobile and the network. TMSI is randomly assigned by the Visitor Location Register (“VLR”) to every mobile in the area, the moment it is switched on. The number is local to a location area, and so it has to be updated each time the mobile moves to a new geographical area. The Mobile IP allows for location-independent routing of IP datagrams on the Internet. Each mobile node is identified by its home address disregarding its current location in the Internet. While away from its home network, a mobile node is associated with a care-of address which identifies its current location and its home address is associated with the local endpoint of a tunnel to its home agent. Mobile IP specifies how a mobile node registers with its home agent and how the home agent routes datagrams to the mobile node through the tunnel.
The portable communication device 1907 or vehicle 120 can also use, as a factor, a valid passcode provided to the communication device 1907 or vehicle 120 for authentication purposes. If the user has already used a sequence of digits (passcode), this is automatically deleted and the authenticating server or server requesting authentication can send a new code to the communication device 1907. If the new code is not entered within a specified time limit, the authenticating server 2012 or server requesting authentication 2008 automatically sends a new passcode. This ensures that no old, already used codes are left on mobile devices or in vehicle memory. For added security, it is possible to specify how many incorrect entries are permitted before the authenticating server blocks access.
Factors about the vehicle itself include vehicle identification numbers (“VINs”), battery identifiers, and parameters sensed, captured or otherwise collected by one or more on board sensors.
A vehicle identification number (VIN), also called a chassis number, is a unique code, including a serial number, used by the automotive industry to identify individual motor vehicles. A VIN commonly includes a world manufacturer identifier to identify uniquely a manufacturer of the corresponding vehicle, a vehicle attribute or other descriptor of a characteristic of the corresponding vehicle, an indication that provides a clear identification of the corresponding vehicle, a check digit, a model year, a manufacturing plant code for the manufacturing plant making all or part of the vehicle, a sequential number, a vehicle descriptor section (to identify the vehicle type, and may include information on the automobile platform used, the model, and the body style), and a vehicle identifier section (to identify the individual vehicle in question and may include information on options installed, engine, or transmission, but often is a simple sequential number).
The parameters sensed, captured, or otherwise collected by an on board sensor and sensor connectivity manager 1966 can be static or dynamic. The parameter can be, for instance, an operating metric or other parameter associated with the vehicle, such as vehicle location (such as by determined by a Global Positioning System (“GPS”) unit or other satellite positioning system), vehicle speed, acceleration, stored energy or fuel level, winding temperature, rotor speed, battery pack voltage level, output electrical current, electrical current direction of flow, leakage current, battery pack temperature, state-of-charge, state-of-health, or state-of-function, throttle position, manifold pressure, engine coolant temperature, mass air flow, camshaft position, crankshaft position, oxygen, detonation, EGR, intake air temperature, engine speed, brake or accelerator pedal position, brake pad wear, and fuel pressure. The controller/microprocessor 1920 or sensor connectivity manager 1966 of the vehicle 120 generally continuously or substantially continuously monitors sensor feedback signals to acquire the foregoing parameters. The parameter can be an associated with an interior or exterior of the vehicle, such as light level, still or video image of an object within or outside of the vehicle, sound signature of ambient noise within or outside of the vehicle, and received wireless signal.
Referring to
Referring to
Referring to
A number of examples will illustrate the concepts of this disclosure.
In a first example, the authenticating server 2012 is a licensing server performing a license check on a component of the vehicle 2004, such as a battery pack. The authenticating server 2012 requests multiple factors from the vehicle comprising, for example, a VIN or battery pack identifier and a biometric factor associated with the vehicle owner or a portable communication device of the vehicle owner (such as an electronic address). As will be appreciated, any other combination of factors can be used. The credential manager 2108 acquires the requested factors and forwards them to the authenticating server 2012. The authenticating server 2012 compares and successfully matches the received factors against stored credentials and successfully authenticates the operator of the vehicle as the owner of record and the licensed vehicle component as belonging to the owner of record.
In another example, the vehicle 120 is at a drive-through vendor to purchase an item. The server 2008 requesting authentication is associated with the drive-through vendor. The server 2008 provides, via a short range transmitter, a wireless signal comprising a request to provide factors to an authenticating server 2012 associated with a financial institution of the owner/operator of the vehicle. The request can comprise a description of the item(s) to be purchased (e.g., a QR code) and vendor identity. The vehicle provides factors to the vendor, via a short range transmitter, and the vendor scans the owner/operator's credit card. Both the server requesting authentication and the vehicle 2004 independently and separately forward the exchanged information to the authenticating server 2012, which compares a first of the factors, such as the vehicle's VIN, wireless remote signal description, owner/operator biometric factor, or electronic address of a portable communication device of the owner/operator, received from both the vehicle 2004 and server 2008 against a stored credential and compares the other second factor (such as a sensed vehicle parameter or sound signature of ambient noise) received from both the vehicle and server 2008 against one another. When the first factors each match the stored credential and the second factors match one another, the authenticating server successfully, authenticates the vehicle 120 as being associated with the owner/operator and can further compare credit card information received from the server 2008 and confirm that it is associated with the successfully authenticated vehicle as a second check on the identity of the person presenting the credit card.
In yet another example, the vehicle 120 is at a drive-through vendor to purchase an item. The server 2008 requesting authentication is associated with the drive-through vendor. The server 2008 provides, via a short range transmitter, a wireless signal comprising a request to provide factors to an authenticating server 2012 associated with a financial institution of the owner/operator. The request can comprise a description of the item(s) to be purchased (e.g., a QR code) and vendor identity. The vehicle provides factors to the vendor, via a short range transmitter. Both the server requesting authentication and the vehicle 2004 independently and separately forward the exchanged information to the authenticating server 2012, which compares a first of the factors, such as the electronic address of the owner/operator's communication device, wireless remote signal description, owner/operator biometric factor, or VIN received from both the vehicle 120 and server 2008 against a stored credential and compares the other second factor (such as a sensed vehicle parameter or sound signature of ambient noise) received from both the vehicle and server 2008 against one another. When the first factors each match the stored credential and the second factors match one another, the authenticating server successfully authenticates the owner/operator as being physically at the vendor and can further compare credit card information received from the server 2008 and confirm that it is associated with the successfully authenticated owner/operator as a second check on the identity of the person presenting the credit card.
In another example, an operator is seeking to perform a function or operation on the vehicle. Before the function or operation on the vehicle (e.g., start the ignition of the vehicle) can be performed, he or she must be authenticated successfully by the authenticating server as the owner of the vehicle or locally by the vehicle. The credential manager collects multiple factors, including the VIN of the vehicle, a biometric factor of the owner/operator or an electronic address of an on board or nearby communication device 1907 of the owner/operator and optionally forwards the authentication information to the server 2012. When the factors match values stored in the credential repository 2016 in association with the vehicle and its owner/operator or in the memory 1916 of the vehicle 120, the function or operation is enabled.
In another example, the vehicle 120 is monitored remotely (over the network 1909) by a remote monitoring service (which may be a fee-based service, warranty provider, vehicle manufacturer, etc.). The vehicle 120 periodically sends, via the vehicle database connectivity manager 1958, to the remote monitoring service wireless signals containing one or more vehicle parameter measurements received from one or more of the sensors 2112. The owner/operator or vehicle subsequently is involved in a transaction that requires authentication (e.g., battery pack license validation check, financial transaction, purchase of a good or service, and the like). The authenticating server 2012 receives, from the vehicle, multiple factors, such as an electronic address of the owner/operator's portable communication device (e.g., smart phone, tablet computer, and the like), wireless remote signal description, owner/operator biometric factor, or VIN along with a sensor measurement regarding a vehicle function or operation and timestamp of the sensor measurement. The authenticating server 2012 further receives, from the remote monitoring service, vehicle parameter measurements associated with the timestamp. The electronic address or VIN are compared with values stored in the credential repository 2016 and the sensor measurement values associated with the timestamp to authenticate the owner/operator or vehicle or both depending on the authentication information employed.
In yet another example, the vehicle 120 is at a drive-through vendor to purchase an item. The server 2008 requesting authentication is associated with the drive-through vendor. The server 2008 optionally provides, via a short range transmitter, a wireless signal comprising a request to provide factors to an authenticating server 2012 associated with a financial institution of the owner/operator. The request can comprise a description of the item(s) to be purchased (e.g., a QR code) and vendor identity. The server 208 receives from a local sensor a sensed ambient measurement, such as ambient light level or ambient noise sound signature. A different sensor on the vehicle captures the same measurement. Both the server requesting authentication and the vehicle 2004 independently and separately forward the sensed ambient measurement and authentication information regarding the owner/operator and/or vehicle (e.g., owner/operator biometric factor, VIN, electronic address of the owner/operator's portable communication device (e.g., smart phone, tablet computer, and the like), wireless remote signal description, and/or credit card information) to the authenticating server 2012, which compares a first of the factors, such as the authentication information received from both the vehicle 2004 and server 2008 against a stored credential and compares the other second factor, or the sensed ambient measurement, received from both the vehicle and server 2008 against one another. When the first factors each match the stored credential and the second factors match one another, the authenticating server successfully authenticates the owner/operator as being physically at the vendor and can further compare credit card information received from the server 2008 and confirm that it is associated with the successfully authenticated owner/operator as a second check on the identity of the person presenting the credit card.
An opportunity exists to use the unique information associated with a vehicle to assist with and be used as authentication information. Since VINs are unique, pairing this information with other types of IDs presents a robust manner of authenticating, for example, a driver and a vehicle, for a transaction. Specifically, the vehicle VIN, and/or a unique battery, module, or battery pack identifier, and/or an ignition key (or keyless remote) identifier and/or communication device ESN/SIM Card (optionally in conjunction with one or more public/private keys). The use of a vehicle as a source of authentication information can serve as “something that the user possesses”. If a user wants to authenticate himself or herself, he or she can use a characteristic or descriptor associated with his or her vehicle or keyless remote (i.e. something that the individual user knows or possesses and may or may not be globally unique) plus a second unique factor (such as a valid, dynamic passcode or electronic address associated with a portable communication device of the user, VIN, battery pack ID, or user biometric factor). An advantage of this method is that there is no need for an additional, dedicated token, as users tend to carry routinely their mobile devices and are typically associated with a finite number of vehicles.
Multi-factor authentication can provide more reliable and robust authentication for an owner/operator or vehicle and reduce the time and effort required for authentication while at the same time not inconveniencing or distracting the owner/operator. VINs, vehicle sensor measurements, SPS units, microphones, and gyro/acceleromoters can provide a trustworthy second factor in authentication.
With reference to
In step 2300, the cryptographic manager 2100 receives a request, from the server requesting authentication or authenticating server depending on the application, for authentication credentials or factors.
In step 2304, the credential manager 2108 validates the request by known techniques.
In step 2308, the credential manager 2108 determines which of multiple first, second, . . . nth factors 2112a-n and, in step 2312, retrieves the determined factors.
In optional step 2316, the credential manager 2108 generates a security key from the determined factors.
In step 2320, the credential manager 2100 transmits authentication information to the requestor.
In step 2400, the authenticating server or server requesting authentication receives the transmitted authentication information from the cryptographic manager.
In step 2404, the authenticating server optionally receives second authentication information from the server requesting authentication.
In step 2408, the authenticating server retrieves authentication information for the vehicle and/or owner/operator from the credential database 2016.
In step 2412, the authenticating server compares the received authentication information with the retrieved authentication information and determines whether or not authentication is successful.
In step 2416, the authenticating server transmits the appropriate response (i.e., a comparison has failed to match and authentication failed or comparisons match and authentication is successful) to the server requesting authentication.
With reference to
Any of the steps, functions, and operations discussed herein can be performed continuously and automatically.
The exemplary systems and methods of this disclosure have been described in relation to vehicle systems and electric vehicles. However, to avoid unnecessarily obscuring the present disclosure, the preceding description omits a number of known structures and devices. This omission is not to be construed as a limitation of the scope of the claimed disclosure. Specific details are set forth to provide an understanding of the present disclosure. It should, however, be appreciated that the present disclosure may be practiced in a variety of ways beyond the specific detail set forth herein.
Furthermore, while the exemplary embodiments illustrated herein show the various components of the system collocated, certain components of the system can be located remotely, at distant portions of a distributed network, such as a LAN and/or the Internet, or within a dedicated system. Thus, it should be appreciated, that the components of the system can be combined into one or more devices, such as a server, communication device, or collocated on a particular node of a distributed network, such as an analog and/or digital telecommunications network, a packet-switched network, or a circuit-switched network. It will be appreciated from the preceding description, and for reasons of computational efficiency, that the components of the system can be arranged at any location within a distributed network of components without affecting the operation of the system.
Furthermore, it should be appreciated that the various links connecting the elements can be wired or wireless links, or any combination thereof, or any other known or later developed element(s) that is capable of supplying and/or communicating data to and from the connected elements. These wired or wireless links can also be secure links and may be capable of communicating encrypted information. Transmission media used as links, for example, can be any suitable carrier for electrical signals, including coaxial cables, copper wire, and fiber optics, and may take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
While the flowcharts have been discussed and illustrated in relation to a particular sequence of events, it should be appreciated that changes, additions, and omissions to this sequence can occur without materially affecting the operation of the disclosed embodiments, configuration, and aspects.
A number of variations and modifications of the disclosure can be used. It would be possible to provide for some features of the disclosure without providing others.
In yet another embodiment, the systems and methods of this disclosure can be implemented in conjunction with a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device or gate array such as PLD, PLA, FPGA, PAL, special purpose computer, any comparable means, or the like. In general, any device(s) or means capable of implementing the methodology illustrated herein can be used to implement the various aspects of this disclosure. Exemplary hardware that can be used for the present disclosure includes computers, handheld devices, telephones (e.g., cellular, Internet enabled, digital, analog, hybrids, and others), and other hardware known in the art. Some of these devices include processors (e.g., a single or multiple microprocessors), memory, nonvolatile storage, input devices, and output devices. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
In yet another embodiment, the disclosed methods may be readily implemented in conjunction with software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this disclosure is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized.
In yet another embodiment, the disclosed methods may be partially implemented in software that can be stored on a storage medium, executed on programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods of this disclosure can be implemented as a program embedded on a personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated measurement system, system component, or the like. The system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system.
Although the present disclosure describes components and functions implemented in the embodiments with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. Other similar standards and protocols not mentioned herein are in existence and are considered to be included in the present disclosure. Moreover, the standards and protocols mentioned herein and other similar standards and protocols not mentioned herein are periodically superseded by faster or more effective equivalents having essentially the same functions. Such replacement standards and protocols having the same functions are considered equivalents included in the present disclosure.
The present disclosure, in various embodiments, configurations, and aspects, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various embodiments, subcombinations, and subsets thereof. Those of skill in the art will understand how to make and use the systems and methods disclosed herein after understanding the present disclosure. The present disclosure, in various embodiments, configurations, and aspects, includes providing devices and processes in the absence of items not depicted and/or described herein or in various embodiments, configurations, or aspects hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease, and/or reducing cost of implementation.
The foregoing discussion of the disclosure has been presented for purposes of illustration and description. The foregoing is not intended to limit the disclosure to the form or forms disclosed herein. In the foregoing Detailed Description for example, various features of the disclosure are grouped together in one or more embodiments, configurations, or aspects for the purpose of streamlining the disclosure. The features of the embodiments, configurations, or aspects of the disclosure may be combined in alternate embodiments, configurations, or aspects other than those discussed above. This method of disclosure is not to be interpreted as reflecting an intention that the claimed disclosure requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment, configuration, or aspect. Thus, the following claims are hereby incorporated into this Detailed Description, with each claim standing on its own as a separate preferred embodiment of the disclosure.
Moreover, though the description of the disclosure has included description of one or more embodiments, configurations, or aspects and certain variations and modifications, other variations, combinations, and modifications are within the scope of the disclosure, e.g., as may be within the skill and knowledge of those in the art, after understanding the present disclosure. It is intended to obtain rights, which include alternative embodiments, configurations, or aspects to the extent permitted, including alternate, interchangeable and/or equivalent structures, functions, ranges, or steps to those claimed, whether or not such alternate, interchangeable and/or equivalent structures, functions, ranges, or steps are disclosed herein, and without intending to publicly dedicate any patentable subject matter.
Embodiments include a vehicle that can comprise:
a power source to propel the vehicle;
a user interface to receive commands from an occupant and provide output to the occupant;
a plurality of on board sensors to sense an operating parameter of the vehicle;
a computer readable medium for storing multiple factors; and
an on board microprocessor, coupled (or in communication) with the computer readable medium, that is programmed to:
receive and transmit the multiple factors to a remote server to authenticate the vehicle or a vehicle occupant, the multiple factors comprising a plurality of an electronic address of a portable communication device of the occupant, a wireless remote signal description, a biometric factor of the occupant, a vehicle-related identifier, a sensed vehicle parameter, a sensed environmental parameter, a passcode received from the remote server, or a derivative thereof.
Embodiments include a method that can comprise the step of:
collecting, by a vehicle microprocessor and on board sensor, multiple factors, the multiple factors comprising a plurality of an electronic address of a portable communication device of the occupant, a wireless remote signal description, a biometric factor of the occupant, a vehicle-related identifier, a sensed vehicle parameter, a sensed environmental parameter, a passcode received from the remote server, or a derivative thereof; and
transmitting multiple factors to a remote server to authenticate a vehicle or a vehicle occupant.
Embodiments include a vehicle that can comprise:
a power source to propel the vehicle;
a user interface to receive commands from an occupant and provide output to the occupant;
a plurality of on board sensors to sense an operating parameter of the vehicle;
a computer readable medium for storing multiple factors; and
an on board microprocessor, coupled (or in communication) with the computer readable medium, that is programmed to:
receive a request, from the occupant via the user interface, to perform an operation or function;
determine multiple factors by the plurality of on board sensors;
compare the determined multiple factors against the stored multiple factors;
when the determined multiple factors each match a corresponding one of the stored multiple factors, the on board microprocessor performs the requested operation or function; and
when one or more of the determined multiple factors does not match a corresponding one of the stored multiple factors, the on board microprocessor does not perform the requested operation or function, the determined and stored multiple factors each comprising a plurality of an electronic address of a portable communication device of the occupant, a wireless remote signal description, a biometric factor of the occupant, a sensed environmental parameter, and a passcode received from a remote server.
Aspects of one or more of the above embodiments can comprise a vehicle or method in which a derivative of one or more of the multiple factors is generated by the microprocessor. The key can be an authentication key, benign key, content-encryption key, crypto ignition key, cryptovariable, derived key, electronic key, ephemeral key, key encryption key, key production key, master key, master encryption key, public/private key, session key, symmetric key, asymmetric key, traffic encryption key, transmission security key, seed key, signature key, or stream key. The microprocessor can generate the key using a key derivation function, keystream generator, cryptographic hash function, key derivation function, cryptographic pseudorandom number generator, cryptanalytic algorithm, broken cryptography algorithm, asymmetric key algorithm, information-theoretically secure algorithm, integer factorization algorithm, symmetric key algorithm, Type 1, 2, or 2 3 encryption algorithm, advanced access content system, or cipher block chain.
Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a biometric factor of the occupant. The biometric factor can relate to a metric of a physiological or behavioral human characteristic of the occupant, wherein the physiological characteristic is related to a shape of the body. The shape of the body can be a fingerprint, palm vein pattern, facial characteristic, palm print, hand geometry characteristic, iris characteristic, retina characteristic, or scent of the occupant. The behavioral characteristic can be related to a pattern of behavior of the occupant. The pattern of behavior can comprise typing rhythm, typing speed, pattern in key press intervals, gait, or voice characteristic. The plurality of sensors can comprise one or more of an image processor, fingerprint, palm print, or palm vein scanner, retina or iris scanner, voice analyzer, or keypad to collect the biometric factor.
Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise an electronic address of a portable communication device of the occupant, wherein the electronic address is one or more of communication device Electronic Serial Number (“ESN”), Mobile Equipment Identifier (“MEID”), International Mobile Equipment Identity (“IMEI”), International Mobile Subscriber Identity (“IMSI”) number (stored on a Subscriber Identity Module (“SIM”) card of the communication device), Temporary Mobile Subscriber Identity (“TMSI”), telephone number, and Mobile IP (“MIP”).
Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a wireless remote signal description emitted by a keyless remote. The keyless remote can comprise a short range radio transmitter emitting the wireless remote signal. The keyless remote can transmit the wireless remote signal as a coded signal by radio waves to a receiver in the vehicle.
Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a passcode received by a receiver in the vehicle from the remote server. The passcode can delete automatically a passcode stored in the computer readable medium and previously used by the occupant. If the received passcode is not entered within a specified time limit, the remote server can automatically send a new passcode to the vehicle receiver.
Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a vehicle-related identifier. The vehicle-related identifier can be a vehicle identification number (“VIN”) of the vehicle or a unique identifier of a vehicle component. The microprocessor can one or more of optically read the vehicle-related identifier with a barcode scanner or digital camera or digitally read the vehicle-related identifier via OBD-II.
Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a sensed vehicle parameter. The sensed vehicle parameter can be one or more of vehicle location, vehicle speed, acceleration, stored energy or fuel level, winding temperature, rotor speed, battery pack voltage level, output electrical current, electrical current direction of flow, leakage current, battery pack temperature, state-of-charge, state-of-health, or state-of-function, throttle position, manifold pressure, engine coolant temperature, mass air flow, camshaft position, crankshaft position, oxygen, detonation, EGR, intake air temperature, engine speed, brake pedal position, accelerator pedal position, brake pad wear, or fuel pressure. The plurality of sensors can comprise one or more of a throttle or accelerator pedal position sensor, a brake pedal position sensor, manifold pressure sensor, engine coolant temperature sensor, mass air flow sensor, camshaft position sensor, crankshaft position sensor, pedal angle sensor, chassis position sensor, oxygen sensor, AC or DC current sensor, brake pad wear sensor, detonation sensor, EGR sensor, satellite position system unit, or intake air temperature sensor to collect the sensed vehicle parameter.
Aspects of one or more of the above embodiments can comprise a vehicle or method in which a sensed environmental parameter is associated with an interior or exterior of the vehicle. The sensed environmental parameter can be one or more of light level, still or video image, and sound signature of ambient noise. The plurality of sensors can comprise one or more of a light sensor, still or video image by an image capture device, or a microphone to collect the sensed environmental parameter.
The phrases “at least one,” “one or more,” “or,” and “and/or” are open-ended expressions that are both conjunctive and disjunctive in operation. For example, each of the expressions “at least one of A, B and C,” “at least one of A, B, or C,” “one or more of A, B, and C,” “one or more of A, B, or C,” “A, B, and/or C,” and “A, B, or C” means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.
The term “a” or “an” entity refers to one or more of that entity. As such, the terms “a” (or “an”), “one or more,” and “at least one” can be used interchangeably herein. It is also to be noted that the terms “comprising,” “including,” and “having” can be used interchangeably.
The term “automatic” and variations thereof, as used herein, refers to any process or operation, which is typically continuous or semi-continuous, done without material human input when the process or operation is performed. However, a process or operation can be automatic, even though performance of the process or operation uses material or immaterial human input, if the input is received before performance of the process or operation. Human input is deemed to be material if such input influences how the process or operation will be performed. Human input that consents to the performance of the process or operation is not deemed to be “material.”
Aspects of the present disclosure may take the form of an embodiment that is entirely hardware, an embodiment that is entirely software (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module,” or “system.” Any combination of one or more computer-readable medium(s) may be utilized. The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium.
A computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer-readable storage medium may be any tangible medium that can contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer-readable signal medium may be any computer-readable medium that is not a computer-readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including, but not limited to, wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
The term “database” or “data model” as used herein refers to any system, hardware, software, memory, storage device, firmware, component, etc., that stores data. The data model can be any type of database or storage framework described in conjunction with
The terms “determine,” “calculate,” “compute,” and variations thereof, as used herein, are used interchangeably and include any type of methodology, process, mathematical operation or technique.
The term “electric vehicle” (EV), also referred to herein as an electric drive vehicle, may use one or more electric motors or traction motors for propulsion. An electric vehicle may be powered through a collector system by electricity from off-vehicle sources, or may be self-contained with a battery or generator to convert fuel to electricity. An electric vehicle generally includes a rechargeable electricity storage system (RESS) (also called Full Electric Vehicles (FEV)). Power storage methods may include: chemical energy stored on the vehicle in on-board batteries (e.g., battery electric vehicle or BEV), on board kinetic energy storage (e.g., flywheels), and/or static energy (e.g., by on-board double-layer capacitors). Batteries, electric double-layer capacitors, and flywheel energy storage may be forms of rechargeable on-board electrical storage.
The term “electronic address” refers to any contactable address, including a telephone number, instant message handle, e-mail address, Universal Resource Locator (“URL”), Universal Resource Identifier (“URI”), Address of Record (“AOR”), electronic alias in a database, like addresses, and combinations thereof.
The term “hybrid electric vehicle” refers to a vehicle that may combine a conventional (usually fossil fuel-powered) powertrain with some form of electric propulsion. Most hybrid electric vehicles combine a conventional internal combustion engine (ICE) propulsion system with an electric propulsion system (hybrid vehicle drivetrain). In parallel hybrids, the ICE and the electric motor are both connected to the mechanical transmission and can simultaneously transmit power to drive the wheels, usually through a conventional transmission. In series hybrids, only the electric motor drives the drivetrain, and a smaller ICE works as a generator to power the electric motor or to recharge the batteries. Power-split hybrids combine series and parallel characteristics. A full hybrid, sometimes also called a strong hybrid, is a vehicle that can run on just the engine, just the batteries, or a combination of both. A mid hybrid is a vehicle that cannot be driven solely on its electric motor, because the electric motor does not have enough power to propel the vehicle on its own.
The term “in communication with” as used herein refers to any coupling, connection, or interaction using electrical signals to exchange information or data, using any system, hardware, software, protocol, or format.
The term “network” as used herein refers to a system used by one or more user devices to communicate. The network can include one or more session managers, feature servers, communication endpoints, etc. that allow communications, whether voice or data, between two user devices. A network can be any network or communication system described herein. Generally, a network can be a local area network (LAN), a wide area network (WAN), a wireless LAN, a wireless WAN, the Internet, etc. that receives and transmits messages or data between devices. A network may communicate in any format or protocol known in the art, such as, transmission control protocol/internet protocol (TCP/IP), 802.11g, 802.11n, Bluetooth, or other formats or protocols.
The term “rechargeable electric vehicle” or “REV” refers to a vehicle with on board rechargeable energy storage, including electric vehicles and hybrid electric vehicles.
The present application claims the benefit of and priority, under 35 U.S.C. § 119(e), to U.S. Provisional Application Ser. Nos. 62/359,563, filed Jul. 7, 2016, entitled “Next Generation Vehicle”, and 62/378,348, filed Aug. 23, 2016, entitled “Next Generation Vehicle.” The entire disclosures of the applications listed above are hereby incorporated by reference, in their entirety, for all that they teach and for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
4361202 | Minovitch | Nov 1982 | A |
4476954 | Johnson et al. | Oct 1984 | A |
4754255 | Sanders et al. | Jun 1988 | A |
4875391 | Leising et al. | Oct 1989 | A |
5136498 | McLaughlin et al. | Aug 1992 | A |
5204817 | Yoshida | Apr 1993 | A |
5363306 | Kuwahara et al. | Nov 1994 | A |
5508689 | Rado et al. | Apr 1996 | A |
5521815 | Rose | May 1996 | A |
5529138 | Shaw et al. | Jun 1996 | A |
5531122 | Chatham et al. | Jul 1996 | A |
5572450 | Worthy | Nov 1996 | A |
5610821 | Gazis et al. | Mar 1997 | A |
5648769 | Sato et al. | Jul 1997 | A |
5710702 | Hayashi et al. | Jan 1998 | A |
5794164 | Beckert et al. | Aug 1998 | A |
5797134 | McMillan et al. | Aug 1998 | A |
5808372 | Schwegler et al. | Sep 1998 | A |
5812067 | Bergholz et al. | Sep 1998 | A |
5825283 | Camhi | Oct 1998 | A |
5838251 | Brinkmeyer et al. | Nov 1998 | A |
5847661 | Ricci | Dec 1998 | A |
5890080 | Coverdill et al. | Mar 1999 | A |
5928294 | Zelinkovsky | Jul 1999 | A |
5949345 | Beckert et al. | Sep 1999 | A |
5983161 | Lemelson et al. | Nov 1999 | A |
5986575 | Jones et al. | Nov 1999 | A |
6038426 | Williams, Jr. | Mar 2000 | A |
6081756 | Mio et al. | Jun 2000 | A |
D429684 | Johnson | Aug 2000 | S |
6128003 | Smith et al. | Oct 2000 | A |
6141620 | Zyburt et al. | Oct 2000 | A |
6148261 | Obradovich et al. | Nov 2000 | A |
6152514 | McLellen | Nov 2000 | A |
6157321 | Ricci | Dec 2000 | A |
6191703 | Wallace | Feb 2001 | B1 |
6198996 | Berstis | Mar 2001 | B1 |
6199001 | Ohta et al. | Mar 2001 | B1 |
6202008 | Beckert et al. | Mar 2001 | B1 |
6252544 | Hoffberg | Jun 2001 | B1 |
6267428 | Baldas et al. | Jul 2001 | B1 |
6302438 | Stopper, Jr. et al. | Oct 2001 | B1 |
6310542 | Gehlot | Oct 2001 | B1 |
6317058 | Lemelson et al. | Nov 2001 | B1 |
6339826 | Hayes, Jr. et al. | Jan 2002 | B2 |
6356838 | Paul | Mar 2002 | B1 |
6388579 | Adcox et al. | May 2002 | B1 |
6445084 | Daiss et al. | Sep 2002 | B1 |
6480224 | Brown | Nov 2002 | B1 |
6496100 | Hiebl | Dec 2002 | B1 |
6502022 | Chastain et al. | Dec 2002 | B1 |
6519519 | Stopczynski | Feb 2003 | B1 |
6542071 | Ohtsubo et al. | Apr 2003 | B1 |
6557752 | Yacoob | May 2003 | B1 |
6563910 | Menard et al. | May 2003 | B2 |
6587739 | Abrams et al. | Jul 2003 | B1 |
6598227 | Berry et al. | Jul 2003 | B1 |
6607212 | Reimer et al. | Aug 2003 | B1 |
6617981 | Basinger | Sep 2003 | B2 |
6662077 | Haag | Dec 2003 | B2 |
6675081 | Shuman et al. | Jan 2004 | B2 |
6678747 | Goossen et al. | Jan 2004 | B2 |
6681176 | Funk et al. | Jan 2004 | B2 |
6690260 | Ashihara | Feb 2004 | B1 |
6690940 | Brown et al. | Feb 2004 | B1 |
6724920 | Berenz et al. | Apr 2004 | B1 |
6754580 | Ask et al. | Jun 2004 | B1 |
6757593 | Mori et al. | Jun 2004 | B2 |
6762684 | Camhi | Jul 2004 | B1 |
6765495 | Dunning et al. | Jul 2004 | B1 |
6778888 | Cataldo et al. | Aug 2004 | B2 |
6782240 | Tabe | Aug 2004 | B1 |
6785531 | Lepley et al. | Aug 2004 | B2 |
6816783 | Hashima et al. | Nov 2004 | B2 |
6820259 | Kawamata et al. | Nov 2004 | B1 |
6944533 | Obradovich et al. | Sep 2005 | B2 |
6950022 | Breed | Sep 2005 | B2 |
6952156 | Arshad et al. | Oct 2005 | B2 |
6958707 | Siegel | Oct 2005 | B1 |
6965816 | Walker | Nov 2005 | B2 |
6992580 | Kotzin et al. | Jan 2006 | B2 |
7019641 | Lakshmanan et al. | Mar 2006 | B1 |
7020544 | Shinada et al. | Mar 2006 | B2 |
7021691 | Schmidt et al. | Apr 2006 | B1 |
7042345 | Ellis | May 2006 | B2 |
7047129 | Uotani | May 2006 | B2 |
7058898 | McWalter et al. | Jun 2006 | B2 |
7096431 | Tambata et al. | Aug 2006 | B2 |
7142696 | Engelsberg et al. | Nov 2006 | B1 |
7164117 | Breed et al. | Jan 2007 | B2 |
7187947 | White et al. | Mar 2007 | B1 |
7203598 | Whitsell | Apr 2007 | B1 |
7233861 | Van Buer et al. | Jun 2007 | B2 |
7239960 | Yokota et al. | Jul 2007 | B2 |
7277454 | Mocek et al. | Oct 2007 | B2 |
7284769 | Breed | Oct 2007 | B2 |
7289645 | Yamamoto et al. | Oct 2007 | B2 |
7295921 | Spencer et al. | Nov 2007 | B2 |
7313547 | Mocek et al. | Dec 2007 | B2 |
7333012 | Nguyen | Feb 2008 | B1 |
7343148 | O'Neil | Mar 2008 | B1 |
7386376 | Basir et al. | Jun 2008 | B2 |
7386799 | Clanton et al. | Jun 2008 | B1 |
7432829 | Poltorak | Oct 2008 | B2 |
7474264 | Bolduc et al. | Jan 2009 | B2 |
7493140 | Michmerhuizen et al. | Feb 2009 | B2 |
7526539 | Hsu | Apr 2009 | B1 |
7548815 | Watkins et al. | Jun 2009 | B2 |
7566083 | Vitito | Jul 2009 | B2 |
7606660 | Diaz et al. | Oct 2009 | B2 |
7606867 | Singhal et al. | Oct 2009 | B1 |
7643913 | Taki et al. | Jan 2010 | B2 |
7650234 | Obradovich et al. | Jan 2010 | B2 |
7671764 | Uyeki et al. | Mar 2010 | B2 |
7680596 | Uyeki et al. | Mar 2010 | B2 |
7683771 | Loeb | Mar 2010 | B1 |
7711468 | Levy | May 2010 | B1 |
7734315 | Rathus et al. | Jun 2010 | B2 |
7748021 | Obradovich et al. | Jun 2010 | B2 |
RE41449 | Krahnstoever et al. | Jul 2010 | E |
7791499 | Mohan et al. | Sep 2010 | B2 |
7796190 | Basso et al. | Sep 2010 | B2 |
7802832 | Carnevali | Sep 2010 | B2 |
7821421 | Tamir et al. | Oct 2010 | B2 |
7832762 | Breed | Nov 2010 | B2 |
7864073 | Lee et al. | Jan 2011 | B2 |
7864987 | Venkatanna et al. | Jan 2011 | B2 |
7872591 | Kane et al. | Jan 2011 | B2 |
7873471 | Gieseke | Jan 2011 | B2 |
7881703 | Roundtree et al. | Feb 2011 | B2 |
7891004 | Gelvin et al. | Feb 2011 | B1 |
7891719 | Carnevali | Feb 2011 | B2 |
7899610 | McClellan | Mar 2011 | B2 |
7966678 | Ten Eyck et al. | Jun 2011 | B2 |
7969290 | Waeller et al. | Jun 2011 | B2 |
7969324 | Chevion et al. | Jun 2011 | B2 |
8060631 | Collart et al. | Nov 2011 | B2 |
8064925 | Sun et al. | Nov 2011 | B1 |
8066313 | Carnevali | Nov 2011 | B2 |
8098170 | Szczerba et al. | Jan 2012 | B1 |
8113564 | Carnevali | Feb 2012 | B2 |
8131419 | Ampunan et al. | Mar 2012 | B2 |
8157310 | Carnevali | Apr 2012 | B2 |
8162368 | Carnevali | Apr 2012 | B2 |
8175802 | Forstall et al. | May 2012 | B2 |
8233919 | Haag et al. | Jul 2012 | B2 |
8245609 | Greenwald et al. | Aug 2012 | B1 |
8306514 | Nunally | Nov 2012 | B1 |
8334847 | Tomkins | Dec 2012 | B2 |
8346233 | Aaron et al. | Jan 2013 | B2 |
8346432 | Van Wiemeersch et al. | Jan 2013 | B2 |
8350721 | Carr | Jan 2013 | B2 |
8352282 | Jensen et al. | Jan 2013 | B2 |
8369263 | Dowling et al. | Feb 2013 | B2 |
8417449 | Denise | Apr 2013 | B1 |
8432260 | Talty et al. | Apr 2013 | B2 |
8442389 | Kashima et al. | May 2013 | B2 |
8442758 | Rovik et al. | May 2013 | B1 |
8467965 | Chang | Jun 2013 | B2 |
8497842 | Tomkins et al. | Jul 2013 | B2 |
8498809 | Bill | Jul 2013 | B2 |
8509982 | Montemerlo et al. | Aug 2013 | B2 |
8521410 | Mizuno et al. | Aug 2013 | B2 |
8527143 | Tan | Sep 2013 | B2 |
8527146 | Jackson et al. | Sep 2013 | B1 |
8532574 | Kirsch | Sep 2013 | B2 |
8543330 | Taylor et al. | Sep 2013 | B2 |
8547340 | Sizelove et al. | Oct 2013 | B2 |
8548669 | Naylor | Oct 2013 | B2 |
8559183 | Davis | Oct 2013 | B1 |
8577600 | Pierfelice | Nov 2013 | B1 |
8578279 | Chen et al. | Nov 2013 | B2 |
8583292 | Preston et al. | Nov 2013 | B2 |
8589073 | Guha et al. | Nov 2013 | B2 |
8600611 | Seize | Dec 2013 | B2 |
8613385 | Hulet et al. | Dec 2013 | B1 |
8621645 | Spackman | Dec 2013 | B1 |
8624727 | Saigh et al. | Jan 2014 | B2 |
8634984 | Sumizawa | Jan 2014 | B2 |
8644165 | Saarimaki et al. | Feb 2014 | B2 |
8660735 | Tengler et al. | Feb 2014 | B2 |
8671068 | Harber et al. | Mar 2014 | B2 |
8688372 | Bhogal et al. | Apr 2014 | B2 |
8705527 | Addepalli et al. | Apr 2014 | B1 |
8706143 | Elias | Apr 2014 | B1 |
8718797 | Addepalli et al. | May 2014 | B1 |
8725311 | Breed | May 2014 | B1 |
8730033 | Yarnold et al. | May 2014 | B2 |
8737986 | Rhoads et al. | May 2014 | B2 |
8761673 | Sakata | Jun 2014 | B2 |
8774842 | Jones et al. | Jul 2014 | B2 |
8779947 | Tengler et al. | Jul 2014 | B2 |
8782262 | Collart et al. | Jul 2014 | B2 |
8793065 | Seltzer et al. | Jul 2014 | B2 |
8798918 | Onishi et al. | Aug 2014 | B2 |
8799657 | Bhattacharya et al. | Aug 2014 | B2 |
8805110 | Rhoads et al. | Aug 2014 | B2 |
8812171 | Fillev et al. | Aug 2014 | B2 |
8817761 | Gruberman et al. | Aug 2014 | B2 |
8825031 | Aaron et al. | Sep 2014 | B2 |
8825277 | McClellan et al. | Sep 2014 | B2 |
8825382 | Liu | Sep 2014 | B2 |
8826261 | Ag et al. | Sep 2014 | B1 |
8838088 | Henn et al. | Sep 2014 | B1 |
8862317 | Shin et al. | Oct 2014 | B2 |
8977408 | Cazanas et al. | Mar 2015 | B1 |
8989053 | Skaaksrud | Mar 2015 | B1 |
9043016 | Filippov et al. | May 2015 | B2 |
9229905 | Penilla et al. | Jan 2016 | B1 |
9501666 | Lockett et al. | Nov 2016 | B2 |
20010010516 | Roh et al. | Aug 2001 | A1 |
20010015888 | Shaler et al. | Aug 2001 | A1 |
20020009978 | Dukach et al. | Jan 2002 | A1 |
20020023010 | Rittmaster et al. | Feb 2002 | A1 |
20020026278 | Feldman et al. | Feb 2002 | A1 |
20020045484 | Eck et al. | Apr 2002 | A1 |
20020065046 | Mankins et al. | May 2002 | A1 |
20020077985 | Kobata et al. | Jun 2002 | A1 |
20020095249 | Lang | Jul 2002 | A1 |
20020097145 | Tumey et al. | Jul 2002 | A1 |
20020103622 | Burge | Aug 2002 | A1 |
20020105968 | Pruzan et al. | Aug 2002 | A1 |
20020126876 | Paul et al. | Sep 2002 | A1 |
20020128774 | Takezaki et al. | Sep 2002 | A1 |
20020143461 | Burns et al. | Oct 2002 | A1 |
20020143643 | Catan | Oct 2002 | A1 |
20020152010 | Colmenarez et al. | Oct 2002 | A1 |
20020154217 | Ikeda | Oct 2002 | A1 |
20020169551 | Inoue et al. | Nov 2002 | A1 |
20020174021 | Chu et al. | Nov 2002 | A1 |
20030004624 | Wilson et al. | Jan 2003 | A1 |
20030007227 | Ogino | Jan 2003 | A1 |
20030055557 | Dutta et al. | Mar 2003 | A1 |
20030060937 | Shinada et al. | Mar 2003 | A1 |
20030065432 | Shuman et al. | Apr 2003 | A1 |
20030101451 | Bentolila et al. | May 2003 | A1 |
20030109972 | Tak | Jun 2003 | A1 |
20030125846 | Yu et al. | Jul 2003 | A1 |
20030132666 | Bond et al. | Jul 2003 | A1 |
20030149530 | Stopczynski | Aug 2003 | A1 |
20030158638 | Yakes et al. | Aug 2003 | A1 |
20030182435 | Redlich et al. | Sep 2003 | A1 |
20030202683 | Ma et al. | Oct 2003 | A1 |
20030204290 | Sadler et al. | Oct 2003 | A1 |
20030229492 | Nolan | Dec 2003 | A1 |
20030230443 | Cramer et al. | Dec 2003 | A1 |
20040017292 | Reese et al. | Jan 2004 | A1 |
20040024502 | Squires et al. | Feb 2004 | A1 |
20040036622 | Dukach et al. | Feb 2004 | A1 |
20040039500 | Amendola et al. | Feb 2004 | A1 |
20040039504 | Coffee et al. | Feb 2004 | A1 |
20040068364 | Zhao et al. | Apr 2004 | A1 |
20040070920 | Flueli | Apr 2004 | A1 |
20040093155 | Simonds et al. | May 2004 | A1 |
20040117494 | Mitchell et al. | Jun 2004 | A1 |
20040128062 | Ogino et al. | Jul 2004 | A1 |
20040143438 | Cabezas et al. | Jul 2004 | A1 |
20040153356 | Lockwood et al. | Aug 2004 | A1 |
20040162019 | Horita et al. | Aug 2004 | A1 |
20040180653 | Royalty | Sep 2004 | A1 |
20040182574 | Adnan et al. | Sep 2004 | A1 |
20040193347 | Harumoto et al. | Sep 2004 | A1 |
20040203974 | Seibel | Oct 2004 | A1 |
20040204837 | Singleton | Oct 2004 | A1 |
20040209594 | Naboulsi | Oct 2004 | A1 |
20040217850 | Perttunen et al. | Nov 2004 | A1 |
20040225557 | Phelan et al. | Nov 2004 | A1 |
20040255123 | Noyama et al. | Dec 2004 | A1 |
20040257208 | Huang et al. | Dec 2004 | A1 |
20040260470 | Rast | Dec 2004 | A1 |
20050012599 | DeMatteo | Jan 2005 | A1 |
20050031100 | Iggulden et al. | Feb 2005 | A1 |
20050038598 | Oesterling et al. | Feb 2005 | A1 |
20050042999 | Rappaport | Feb 2005 | A1 |
20050065678 | Smith et al. | Mar 2005 | A1 |
20050065711 | Dahlgren et al. | Mar 2005 | A1 |
20050086051 | Brulle-Drews | Apr 2005 | A1 |
20050093717 | Lilja | May 2005 | A1 |
20050096906 | Barzilay | May 2005 | A1 |
20050097541 | Holland | May 2005 | A1 |
20050114864 | Surace | May 2005 | A1 |
20050122235 | Teffer et al. | Jun 2005 | A1 |
20050124211 | Diessner et al. | Jun 2005 | A1 |
20050130744 | Eck et al. | Jun 2005 | A1 |
20050144156 | Barber | Jun 2005 | A1 |
20050149752 | Johnson et al. | Jul 2005 | A1 |
20050153760 | Varley | Jul 2005 | A1 |
20050159853 | Takahashi et al. | Jul 2005 | A1 |
20050159892 | Chung | Jul 2005 | A1 |
20050192727 | Shostak et al. | Sep 2005 | A1 |
20050197748 | Holst et al. | Sep 2005 | A1 |
20050197767 | Nortrup | Sep 2005 | A1 |
20050251324 | Wiener et al. | Nov 2005 | A1 |
20050261815 | Cowelchuk et al. | Nov 2005 | A1 |
20050278093 | Kameyama | Dec 2005 | A1 |
20050283284 | Grenier et al. | Dec 2005 | A1 |
20060015819 | Hawkins et al. | Jan 2006 | A1 |
20060036358 | Hale et al. | Feb 2006 | A1 |
20060044119 | Egelhaaf | Mar 2006 | A1 |
20060047386 | Kanevsky et al. | Mar 2006 | A1 |
20060058948 | Blass et al. | Mar 2006 | A1 |
20060059229 | Bain et al. | Mar 2006 | A1 |
20060125631 | Sharony | Jun 2006 | A1 |
20060130033 | Stoffels et al. | Jun 2006 | A1 |
20060142933 | Feng | Jun 2006 | A1 |
20060173841 | Bill | Aug 2006 | A1 |
20060175403 | McConnell et al. | Aug 2006 | A1 |
20060184319 | Seick et al. | Aug 2006 | A1 |
20060212909 | Girard et al. | Sep 2006 | A1 |
20060241836 | Kachouh et al. | Oct 2006 | A1 |
20060243056 | Sundermeyer et al. | Nov 2006 | A1 |
20060250272 | Puamau | Nov 2006 | A1 |
20060253307 | Warren et al. | Nov 2006 | A1 |
20060259210 | Tanaka et al. | Nov 2006 | A1 |
20060259304 | Barzilay | Nov 2006 | A1 |
20060274829 | Siemens et al. | Dec 2006 | A1 |
20060282204 | Breed | Dec 2006 | A1 |
20060286969 | Talmor et al. | Dec 2006 | A1 |
20060287807 | Teffer | Dec 2006 | A1 |
20060287865 | Cross et al. | Dec 2006 | A1 |
20060288382 | Vitito | Dec 2006 | A1 |
20060290516 | Muehlsteff et al. | Dec 2006 | A1 |
20070001831 | Raz et al. | Jan 2007 | A1 |
20070002032 | Powers et al. | Jan 2007 | A1 |
20070010942 | Bill | Jan 2007 | A1 |
20070015485 | DeBiasio et al. | Jan 2007 | A1 |
20070028370 | Seng | Feb 2007 | A1 |
20070032225 | Konicek et al. | Feb 2007 | A1 |
20070057781 | Breed | Mar 2007 | A1 |
20070061057 | Huang et al. | Mar 2007 | A1 |
20070067614 | Berry et al. | Mar 2007 | A1 |
20070069880 | Best et al. | Mar 2007 | A1 |
20070083298 | Pierce et al. | Apr 2007 | A1 |
20070088488 | Reeves et al. | Apr 2007 | A1 |
20070103328 | Lakshmanan et al. | May 2007 | A1 |
20070115101 | Creekbaum et al. | May 2007 | A1 |
20070118301 | Andarawis et al. | May 2007 | A1 |
20070120697 | Ayoub et al. | May 2007 | A1 |
20070135995 | Kikuchi et al. | Jun 2007 | A1 |
20070156317 | Breed | Jul 2007 | A1 |
20070182625 | Kerai et al. | Aug 2007 | A1 |
20070182816 | Fox | Aug 2007 | A1 |
20070185969 | Davis | Aug 2007 | A1 |
20070192486 | Wilson et al. | Aug 2007 | A1 |
20070194902 | Blanco et al. | Aug 2007 | A1 |
20070194944 | Galera et al. | Aug 2007 | A1 |
20070195997 | Paul et al. | Aug 2007 | A1 |
20070200663 | White et al. | Aug 2007 | A1 |
20070208860 | Zellner et al. | Sep 2007 | A1 |
20070213090 | Holmberg | Sep 2007 | A1 |
20070228826 | Jordan et al. | Oct 2007 | A1 |
20070233341 | Logsdon | Oct 2007 | A1 |
20070250228 | Reddy et al. | Oct 2007 | A1 |
20070257815 | Gunderson et al. | Nov 2007 | A1 |
20070276596 | Solomon et al. | Nov 2007 | A1 |
20070280505 | Breed | Dec 2007 | A1 |
20080005974 | Vazquez et al. | Jan 2008 | A1 |
20080023253 | Prost-Fin et al. | Jan 2008 | A1 |
20080027337 | Dugan et al. | Jan 2008 | A1 |
20080033635 | Obradovich et al. | Feb 2008 | A1 |
20080042824 | Kates | Feb 2008 | A1 |
20080051957 | Breed et al. | Feb 2008 | A1 |
20080052627 | Oguchi | Feb 2008 | A1 |
20080071465 | Chapman et al. | Mar 2008 | A1 |
20080082237 | Breed | Apr 2008 | A1 |
20080086455 | Meisels et al. | Apr 2008 | A1 |
20080090522 | Oyama | Apr 2008 | A1 |
20080104227 | Birnie et al. | May 2008 | A1 |
20080119994 | Kameyama | May 2008 | A1 |
20080129475 | Breed et al. | Jun 2008 | A1 |
20080143085 | Breed et al. | Jun 2008 | A1 |
20080147280 | Breed | Jun 2008 | A1 |
20080148374 | Spaur et al. | Jun 2008 | A1 |
20080154712 | Wellman | Jun 2008 | A1 |
20080154957 | Taylor et al. | Jun 2008 | A1 |
20080161986 | Breed | Jul 2008 | A1 |
20080164985 | Iketani et al. | Jul 2008 | A1 |
20080169940 | Lee et al. | Jul 2008 | A1 |
20080174451 | Harrington et al. | Jul 2008 | A1 |
20080212215 | Schofield et al. | Sep 2008 | A1 |
20080216067 | Villing | Sep 2008 | A1 |
20080228358 | Wang et al. | Sep 2008 | A1 |
20080234919 | Ritter et al. | Sep 2008 | A1 |
20080252487 | McClellan et al. | Oct 2008 | A1 |
20080253613 | Jones et al. | Oct 2008 | A1 |
20080255721 | Yamada | Oct 2008 | A1 |
20080255722 | McClellan et al. | Oct 2008 | A1 |
20080269958 | Filev et al. | Oct 2008 | A1 |
20080281508 | Fu | Nov 2008 | A1 |
20080300778 | Kuznetsov | Dec 2008 | A1 |
20080305780 | Williams et al. | Dec 2008 | A1 |
20080319602 | McClellan et al. | Dec 2008 | A1 |
20090006525 | Moore | Jan 2009 | A1 |
20090024419 | McClellan et al. | Jan 2009 | A1 |
20090037719 | Sakthikumar et al. | Feb 2009 | A1 |
20090040026 | Tanaka | Feb 2009 | A1 |
20090055178 | Coon | Feb 2009 | A1 |
20090082951 | Graessley | Mar 2009 | A1 |
20090099720 | Elgali | Apr 2009 | A1 |
20090112393 | Maten et al. | Apr 2009 | A1 |
20090112452 | Buck et al. | Apr 2009 | A1 |
20090119657 | Link, II | May 2009 | A1 |
20090125174 | Delean | May 2009 | A1 |
20090132294 | Haines | May 2009 | A1 |
20090138336 | Ashley et al. | May 2009 | A1 |
20090144622 | Evans et al. | Jun 2009 | A1 |
20090157312 | Black et al. | Jun 2009 | A1 |
20090158200 | Palahnuk et al. | Jun 2009 | A1 |
20090180668 | Jones et al. | Jul 2009 | A1 |
20090189373 | Schramm et al. | Jul 2009 | A1 |
20090189979 | Smyth | Jul 2009 | A1 |
20090195370 | Huffman et al. | Aug 2009 | A1 |
20090210257 | Chalfant et al. | Aug 2009 | A1 |
20090216935 | Flick | Aug 2009 | A1 |
20090222200 | Link et al. | Sep 2009 | A1 |
20090224931 | Dietz et al. | Sep 2009 | A1 |
20090224942 | Goudy et al. | Sep 2009 | A1 |
20090234578 | Newby et al. | Sep 2009 | A1 |
20090241883 | Nagoshi et al. | Oct 2009 | A1 |
20090254446 | Chernyak | Oct 2009 | A1 |
20090264849 | La Croix | Oct 2009 | A1 |
20090275321 | Crowe | Nov 2009 | A1 |
20090278750 | Man et al. | Nov 2009 | A1 |
20090278915 | Kramer et al. | Nov 2009 | A1 |
20090279839 | Nakamura et al. | Nov 2009 | A1 |
20090284359 | Huang et al. | Nov 2009 | A1 |
20090287405 | Liu et al. | Nov 2009 | A1 |
20090299572 | Fujikawa et al. | Dec 2009 | A1 |
20090312998 | Berckmans et al. | Dec 2009 | A1 |
20090319181 | Khosravy et al. | Dec 2009 | A1 |
20100008053 | Osternack et al. | Jan 2010 | A1 |
20100023204 | Basir et al. | Jan 2010 | A1 |
20100035620 | Naden et al. | Feb 2010 | A1 |
20100036560 | Wright et al. | Feb 2010 | A1 |
20100042498 | Schalk | Feb 2010 | A1 |
20100052945 | Breed | Mar 2010 | A1 |
20100057337 | Fuchs | Mar 2010 | A1 |
20100066498 | Fenton | Mar 2010 | A1 |
20100069115 | Liu | Mar 2010 | A1 |
20100070338 | Siotia et al. | Mar 2010 | A1 |
20100077094 | Howarter et al. | Mar 2010 | A1 |
20100087987 | Huang et al. | Apr 2010 | A1 |
20100090817 | Yamaguchi et al. | Apr 2010 | A1 |
20100097178 | Pisz et al. | Apr 2010 | A1 |
20100097239 | Campbell et al. | Apr 2010 | A1 |
20100097458 | Zhang et al. | Apr 2010 | A1 |
20100106344 | Edwards et al. | Apr 2010 | A1 |
20100106418 | Kindo et al. | Apr 2010 | A1 |
20100118025 | Smith et al. | May 2010 | A1 |
20100121570 | Tokue et al. | May 2010 | A1 |
20100121645 | Seitz et al. | May 2010 | A1 |
20100125387 | Sehyun et al. | May 2010 | A1 |
20100125405 | Chae et al. | May 2010 | A1 |
20100125811 | Moore et al. | May 2010 | A1 |
20100127847 | Evans et al. | May 2010 | A1 |
20100131300 | Collopy et al. | May 2010 | A1 |
20100134958 | Disaverio et al. | Jun 2010 | A1 |
20100136944 | Taylor et al. | Jun 2010 | A1 |
20100137037 | Basir | Jun 2010 | A1 |
20100144284 | Chutorash et al. | Jun 2010 | A1 |
20100145700 | Kennewick et al. | Jun 2010 | A1 |
20100145987 | Harper et al. | Jun 2010 | A1 |
20100152976 | White et al. | Jun 2010 | A1 |
20100169432 | Santori et al. | Jul 2010 | A1 |
20100174474 | Nagase | Jul 2010 | A1 |
20100179712 | Pepitone et al. | Jul 2010 | A1 |
20100185341 | Wilson et al. | Jul 2010 | A1 |
20100188831 | Ortel | Jul 2010 | A1 |
20100197359 | Harris | Aug 2010 | A1 |
20100202346 | Sitzes et al. | Aug 2010 | A1 |
20100211259 | McClellan | Aug 2010 | A1 |
20100211282 | Nakata et al. | Aug 2010 | A1 |
20100211300 | Jaffe et al. | Aug 2010 | A1 |
20100211304 | Hwang et al. | Aug 2010 | A1 |
20100211441 | Sprigg et al. | Aug 2010 | A1 |
20100217458 | Schweiger et al. | Aug 2010 | A1 |
20100222939 | Namburu et al. | Sep 2010 | A1 |
20100228404 | Link et al. | Sep 2010 | A1 |
20100234071 | Shabtay et al. | Sep 2010 | A1 |
20100235042 | Ying | Sep 2010 | A1 |
20100235744 | Schultz | Sep 2010 | A1 |
20100235891 | Oglesbee et al. | Sep 2010 | A1 |
20100250071 | Pala et al. | Sep 2010 | A1 |
20100253493 | Szczerba et al. | Oct 2010 | A1 |
20100256836 | Mudalige | Oct 2010 | A1 |
20100265104 | Zlojutro | Oct 2010 | A1 |
20100268426 | Pathak et al. | Oct 2010 | A1 |
20100274410 | Tsien et al. | Oct 2010 | A1 |
20100280751 | Breed | Nov 2010 | A1 |
20100287303 | Smith et al. | Nov 2010 | A1 |
20100289632 | Seder et al. | Nov 2010 | A1 |
20100289643 | Trundle et al. | Nov 2010 | A1 |
20100291427 | Zhou | Nov 2010 | A1 |
20100295676 | Khachaturov et al. | Nov 2010 | A1 |
20100304640 | Sofman et al. | Dec 2010 | A1 |
20100305807 | Basir et al. | Dec 2010 | A1 |
20100306080 | Trandal et al. | Dec 2010 | A1 |
20100306309 | Santori et al. | Dec 2010 | A1 |
20100306435 | Nigoghosian et al. | Dec 2010 | A1 |
20100315218 | Cades et al. | Dec 2010 | A1 |
20100321151 | Matsuura et al. | Dec 2010 | A1 |
20100325626 | Greschler et al. | Dec 2010 | A1 |
20100332130 | Shimizu et al. | Dec 2010 | A1 |
20110015853 | DeKock et al. | Jan 2011 | A1 |
20110018736 | Carr | Jan 2011 | A1 |
20110021213 | Carr | Jan 2011 | A1 |
20110021234 | Tibbits et al. | Jan 2011 | A1 |
20110028138 | Davies-Moore et al. | Feb 2011 | A1 |
20110035098 | Goto et al. | Feb 2011 | A1 |
20110035141 | Barker et al. | Feb 2011 | A1 |
20110040438 | Kluge et al. | Feb 2011 | A1 |
20110050589 | Yan et al. | Mar 2011 | A1 |
20110053506 | Lemke et al. | Mar 2011 | A1 |
20110077808 | Hyde et al. | Mar 2011 | A1 |
20110078024 | Messier et al. | Mar 2011 | A1 |
20110080282 | Kleve et al. | Apr 2011 | A1 |
20110082615 | Small et al. | Apr 2011 | A1 |
20110084824 | Tewari et al. | Apr 2011 | A1 |
20110090078 | Kim et al. | Apr 2011 | A1 |
20110092159 | Park et al. | Apr 2011 | A1 |
20110093154 | Moinzadeh et al. | Apr 2011 | A1 |
20110093158 | Theisen et al. | Apr 2011 | A1 |
20110093438 | Poulsen | Apr 2011 | A1 |
20110093846 | Moinzadeh et al. | Apr 2011 | A1 |
20110105097 | Tadayon et al. | May 2011 | A1 |
20110106375 | Sundaram et al. | May 2011 | A1 |
20110112717 | Resner | May 2011 | A1 |
20110112969 | Zaid et al. | May 2011 | A1 |
20110117933 | Andersson | May 2011 | A1 |
20110119344 | Eustis | May 2011 | A1 |
20110130915 | Wright et al. | Jun 2011 | A1 |
20110134749 | Speks et al. | Jun 2011 | A1 |
20110137520 | Rector et al. | Jun 2011 | A1 |
20110145331 | Christie et al. | Jun 2011 | A1 |
20110172873 | Szwabowski et al. | Jul 2011 | A1 |
20110175754 | Karpinsky | Jul 2011 | A1 |
20110183658 | Zellner | Jul 2011 | A1 |
20110187520 | Filev et al. | Aug 2011 | A1 |
20110193707 | Ngo | Aug 2011 | A1 |
20110193726 | Szwabowski et al. | Aug 2011 | A1 |
20110195699 | Tadayon et al. | Aug 2011 | A1 |
20110197187 | Roh | Aug 2011 | A1 |
20110205047 | Patel et al. | Aug 2011 | A1 |
20110209079 | Tarte et al. | Aug 2011 | A1 |
20110210867 | Benedikt | Sep 2011 | A1 |
20110212717 | Rhoads et al. | Sep 2011 | A1 |
20110221656 | Haddick et al. | Sep 2011 | A1 |
20110224865 | Gordon et al. | Sep 2011 | A1 |
20110224898 | Scofield et al. | Sep 2011 | A1 |
20110225527 | Law et al. | Sep 2011 | A1 |
20110227757 | Chen et al. | Sep 2011 | A1 |
20110231091 | Gourlay et al. | Sep 2011 | A1 |
20110234369 | Cai et al. | Sep 2011 | A1 |
20110245999 | Kordonowy | Oct 2011 | A1 |
20110246210 | Matsur | Oct 2011 | A1 |
20110247013 | Feller et al. | Oct 2011 | A1 |
20110251734 | Schepp et al. | Oct 2011 | A1 |
20110257973 | Chutorash et al. | Oct 2011 | A1 |
20110267204 | Chuang et al. | Nov 2011 | A1 |
20110267205 | McClellan et al. | Nov 2011 | A1 |
20110286676 | El Dokor | Nov 2011 | A1 |
20110291886 | Krieter | Dec 2011 | A1 |
20110291926 | Gokturk et al. | Dec 2011 | A1 |
20110298808 | Rovik | Dec 2011 | A1 |
20110301844 | Aono | Dec 2011 | A1 |
20110307354 | Erman et al. | Dec 2011 | A1 |
20110307570 | Speks | Dec 2011 | A1 |
20110309926 | Eikelenberg et al. | Dec 2011 | A1 |
20110309953 | Petite et al. | Dec 2011 | A1 |
20110313653 | Lindner | Dec 2011 | A1 |
20110320089 | Lewis | Dec 2011 | A1 |
20120006610 | Wallace et al. | Jan 2012 | A1 |
20120010807 | Zhou | Jan 2012 | A1 |
20120016581 | Mochizuki et al. | Jan 2012 | A1 |
20120029852 | Goff et al. | Feb 2012 | A1 |
20120030002 | Bous et al. | Feb 2012 | A1 |
20120030512 | Wadhwa et al. | Feb 2012 | A1 |
20120038489 | Goldshmidt | Feb 2012 | A1 |
20120046822 | Anderson | Feb 2012 | A1 |
20120047530 | Shkedi | Feb 2012 | A1 |
20120053793 | Sala et al. | Mar 2012 | A1 |
20120053888 | Stahlin et al. | Mar 2012 | A1 |
20120059789 | Sakai et al. | Mar 2012 | A1 |
20120065815 | Hess | Mar 2012 | A1 |
20120065834 | Senart | Mar 2012 | A1 |
20120068956 | Jira et al. | Mar 2012 | A1 |
20120071097 | Matsushita et al. | Mar 2012 | A1 |
20120072244 | Collins et al. | Mar 2012 | A1 |
20120074770 | Lee | Mar 2012 | A1 |
20120083960 | Zhu et al. | Apr 2012 | A1 |
20120083971 | Preston | Apr 2012 | A1 |
20120084773 | Lee et al. | Apr 2012 | A1 |
20120089299 | Breed | Apr 2012 | A1 |
20120092251 | Hashimoto et al. | Apr 2012 | A1 |
20120101876 | Truvey et al. | Apr 2012 | A1 |
20120101914 | Kumar et al. | Apr 2012 | A1 |
20120105613 | Weng et al. | May 2012 | A1 |
20120106114 | Caron et al. | May 2012 | A1 |
20120109446 | Yousefi et al. | May 2012 | A1 |
20120109451 | Tan | May 2012 | A1 |
20120110356 | Yousefi et al. | May 2012 | A1 |
20120113822 | Letner | May 2012 | A1 |
20120115446 | Guatama et al. | May 2012 | A1 |
20120116609 | Jung et al. | May 2012 | A1 |
20120116678 | Witmer | May 2012 | A1 |
20120116696 | Wank | May 2012 | A1 |
20120146766 | Geisler et al. | Jun 2012 | A1 |
20120146809 | Oh et al. | Jun 2012 | A1 |
20120149341 | Tadayon et al. | Jun 2012 | A1 |
20120150651 | Hoffberg et al. | Jun 2012 | A1 |
20120155636 | Muthaiah | Jun 2012 | A1 |
20120158436 | Bauer et al. | Jun 2012 | A1 |
20120173900 | Diab et al. | Jul 2012 | A1 |
20120173905 | Diab et al. | Jul 2012 | A1 |
20120179325 | Faenger | Jul 2012 | A1 |
20120179547 | Besore et al. | Jul 2012 | A1 |
20120188876 | Chow et al. | Jul 2012 | A1 |
20120197523 | Kirsch | Aug 2012 | A1 |
20120197669 | Kote et al. | Aug 2012 | A1 |
20120204166 | Ichihara | Aug 2012 | A1 |
20120210160 | Fuhrman | Aug 2012 | A1 |
20120215375 | Chang | Aug 2012 | A1 |
20120217928 | Kulidjian | Aug 2012 | A1 |
20120218125 | Demirdjian et al. | Aug 2012 | A1 |
20120226413 | Chen et al. | Sep 2012 | A1 |
20120238286 | Mallavarapu et al. | Sep 2012 | A1 |
20120239242 | Uehara | Sep 2012 | A1 |
20120242510 | Choi et al. | Sep 2012 | A1 |
20120254763 | Protopapas et al. | Oct 2012 | A1 |
20120254804 | Shema et al. | Oct 2012 | A1 |
20120259951 | Schalk et al. | Oct 2012 | A1 |
20120265359 | Das | Oct 2012 | A1 |
20120274459 | Jaisimha et al. | Nov 2012 | A1 |
20120274481 | Ginsberg et al. | Nov 2012 | A1 |
20120284292 | Rechsteiner et al. | Nov 2012 | A1 |
20120289217 | Reimer et al. | Nov 2012 | A1 |
20120289253 | Haag et al. | Nov 2012 | A1 |
20120296567 | Breed | Nov 2012 | A1 |
20120313771 | Wottlifff, III | Dec 2012 | A1 |
20120316720 | Hyde et al. | Dec 2012 | A1 |
20120317561 | Aslam et al. | Dec 2012 | A1 |
20120323413 | Kedar-Dongarkar et al. | Dec 2012 | A1 |
20120327231 | Cochran et al. | Dec 2012 | A1 |
20130005263 | Sakata | Jan 2013 | A1 |
20130005414 | Bindra et al. | Jan 2013 | A1 |
20130013157 | Kim et al. | Jan 2013 | A1 |
20130019252 | Haase et al. | Jan 2013 | A1 |
20130024060 | Sukkarie et al. | Jan 2013 | A1 |
20130030645 | Divine et al. | Jan 2013 | A1 |
20130030811 | Olleon et al. | Jan 2013 | A1 |
20130031540 | Throop et al. | Jan 2013 | A1 |
20130031541 | Wilks et al. | Jan 2013 | A1 |
20130035063 | Fisk et al. | Feb 2013 | A1 |
20130046624 | Calman | Feb 2013 | A1 |
20130050069 | Ota | Feb 2013 | A1 |
20130055096 | Kim et al. | Feb 2013 | A1 |
20130059607 | Herz et al. | Mar 2013 | A1 |
20130063336 | Sugimoto et al. | Mar 2013 | A1 |
20130066512 | Willard et al. | Mar 2013 | A1 |
20130067599 | Raje et al. | Mar 2013 | A1 |
20130075530 | Shander et al. | Mar 2013 | A1 |
20130079964 | Sukkarie et al. | Mar 2013 | A1 |
20130083805 | Lu et al. | Apr 2013 | A1 |
20130085787 | Gore et al. | Apr 2013 | A1 |
20130086164 | Wheeler et al. | Apr 2013 | A1 |
20130099915 | Prasad et al. | Apr 2013 | A1 |
20130103196 | Monceaux et al. | Apr 2013 | A1 |
20130105264 | Ruth et al. | May 2013 | A1 |
20130116882 | Link et al. | May 2013 | A1 |
20130116915 | Ferreira et al. | May 2013 | A1 |
20130134730 | Ricci | May 2013 | A1 |
20130135118 | Ricci | May 2013 | A1 |
20130138591 | Ricci | May 2013 | A1 |
20130138714 | Ricci | May 2013 | A1 |
20130139140 | Rao et al. | May 2013 | A1 |
20130141247 | Ricci | Jun 2013 | A1 |
20130141252 | Ricci | Jun 2013 | A1 |
20130143495 | Ricci | Jun 2013 | A1 |
20130143546 | Ricci | Jun 2013 | A1 |
20130143601 | Ricci | Jun 2013 | A1 |
20130144459 | Ricci | Jun 2013 | A1 |
20130144460 | Ricci | Jun 2013 | A1 |
20130144461 | Ricci | Jun 2013 | A1 |
20130144462 | Ricci | Jun 2013 | A1 |
20130144463 | Ricci et al. | Jun 2013 | A1 |
20130144469 | Ricci | Jun 2013 | A1 |
20130144470 | Ricci | Jun 2013 | A1 |
20130144474 | Ricci | Jun 2013 | A1 |
20130144486 | Ricci | Jun 2013 | A1 |
20130144520 | Ricci | Jun 2013 | A1 |
20130144657 | Ricci | Jun 2013 | A1 |
20130145065 | Ricci | Jun 2013 | A1 |
20130145279 | Ricci | Jun 2013 | A1 |
20130145297 | Ricci et al. | Jun 2013 | A1 |
20130145360 | Ricci | Jun 2013 | A1 |
20130145401 | Ricci | Jun 2013 | A1 |
20130145482 | Ricci et al. | Jun 2013 | A1 |
20130147638 | Ricci | Jun 2013 | A1 |
20130151031 | Ricci | Jun 2013 | A1 |
20130151065 | Ricci | Jun 2013 | A1 |
20130151088 | Ricci | Jun 2013 | A1 |
20130151288 | Bowne et al. | Jun 2013 | A1 |
20130152003 | Ricci et al. | Jun 2013 | A1 |
20130154298 | Ricci | Jun 2013 | A1 |
20130157640 | Aycock | Jun 2013 | A1 |
20130157647 | Kolodziej | Jun 2013 | A1 |
20130158778 | Tengler et al. | Jun 2013 | A1 |
20130158821 | Ricci | Jun 2013 | A1 |
20130166096 | Jotanovic | Jun 2013 | A1 |
20130166097 | Ricci | Jun 2013 | A1 |
20130166098 | Lavie et al. | Jun 2013 | A1 |
20130166152 | Butterworth | Jun 2013 | A1 |
20130166208 | Forstall et al. | Jun 2013 | A1 |
20130167159 | Ricci et al. | Jun 2013 | A1 |
20130173531 | Rinearson et al. | Jul 2013 | A1 |
20130179689 | Matsumoto et al. | Jul 2013 | A1 |
20130190978 | Kato et al. | Jul 2013 | A1 |
20130194108 | Lapiotis et al. | Aug 2013 | A1 |
20130197796 | Obradovich et al. | Aug 2013 | A1 |
20130198031 | Mitchell et al. | Aug 2013 | A1 |
20130198737 | Ricci | Aug 2013 | A1 |
20130198802 | Ricci | Aug 2013 | A1 |
20130200991 | Ricci et al. | Aug 2013 | A1 |
20130203400 | Ricci | Aug 2013 | A1 |
20130204455 | Chia et al. | Aug 2013 | A1 |
20130204457 | King | Aug 2013 | A1 |
20130204466 | Ricci | Aug 2013 | A1 |
20130204484 | Ricci | Aug 2013 | A1 |
20130204493 | Ricci et al. | Aug 2013 | A1 |
20130204943 | Ricci | Aug 2013 | A1 |
20130205026 | Ricci | Aug 2013 | A1 |
20130205412 | Ricci | Aug 2013 | A1 |
20130207794 | Patel et al. | Aug 2013 | A1 |
20130212065 | Rahnama | Aug 2013 | A1 |
20130212659 | Maher et al. | Aug 2013 | A1 |
20130215116 | Siddique et al. | Aug 2013 | A1 |
20130218412 | Ricci | Aug 2013 | A1 |
20130218445 | Basir | Aug 2013 | A1 |
20130219039 | Ricci | Aug 2013 | A1 |
20130226365 | Brozovich | Aug 2013 | A1 |
20130226371 | Rovik et al. | Aug 2013 | A1 |
20130226392 | Schneider et al. | Aug 2013 | A1 |
20130226449 | Rovik et al. | Aug 2013 | A1 |
20130226622 | Adamson et al. | Aug 2013 | A1 |
20130227648 | Ricci | Aug 2013 | A1 |
20130231784 | Rovik et al. | Sep 2013 | A1 |
20130231800 | Ricci | Sep 2013 | A1 |
20130232142 | Nielsen et al. | Sep 2013 | A1 |
20130238165 | Garrett et al. | Sep 2013 | A1 |
20130241720 | Ricci et al. | Sep 2013 | A1 |
20130245882 | Ricci | Sep 2013 | A1 |
20130250933 | Yousefi et al. | Sep 2013 | A1 |
20130261871 | Hobbs et al. | Oct 2013 | A1 |
20130261966 | Wang et al. | Oct 2013 | A1 |
20130265178 | Tengler et al. | Oct 2013 | A1 |
20130274997 | Chien | Oct 2013 | A1 |
20130279111 | Lee | Oct 2013 | A1 |
20130279491 | Rubin et al. | Oct 2013 | A1 |
20130282238 | Ricci et al. | Oct 2013 | A1 |
20130282357 | Rubin et al. | Oct 2013 | A1 |
20130282946 | Ricci | Oct 2013 | A1 |
20130288606 | Kirsch | Oct 2013 | A1 |
20130293364 | Ricci et al. | Nov 2013 | A1 |
20130293452 | Ricci et al. | Nov 2013 | A1 |
20130293480 | Kritt et al. | Nov 2013 | A1 |
20130295901 | Abramson et al. | Nov 2013 | A1 |
20130295908 | Zeinstra et al. | Nov 2013 | A1 |
20130295913 | Matthews et al. | Nov 2013 | A1 |
20130300554 | Braden | Nov 2013 | A1 |
20130301584 | Addepalli et al. | Nov 2013 | A1 |
20130304371 | Kitatani et al. | Nov 2013 | A1 |
20130308265 | Arnouse | Nov 2013 | A1 |
20130309977 | Heines et al. | Nov 2013 | A1 |
20130311038 | Kim et al. | Nov 2013 | A1 |
20130325453 | Levien et al. | Dec 2013 | A1 |
20130325568 | Mangalvedkar et al. | Dec 2013 | A1 |
20130329372 | Wilkins | Dec 2013 | A1 |
20130332023 | Bertosa et al. | Dec 2013 | A1 |
20130338914 | Weiss | Dec 2013 | A1 |
20130339027 | Dokor et al. | Dec 2013 | A1 |
20130345929 | Bowden et al. | Dec 2013 | A1 |
20140028542 | Lovitt et al. | Jan 2014 | A1 |
20140032014 | DeBiasio et al. | Jan 2014 | A1 |
20140054957 | Bellis | Feb 2014 | A1 |
20140058672 | Wansley et al. | Feb 2014 | A1 |
20140066014 | Nicholson et al. | Mar 2014 | A1 |
20140067201 | Visintainer et al. | Mar 2014 | A1 |
20140067564 | Yuan | Mar 2014 | A1 |
20140070917 | Protopapas | Mar 2014 | A1 |
20140081544 | Fry | Mar 2014 | A1 |
20140088798 | Himmelstein | Mar 2014 | A1 |
20140096068 | Dewan et al. | Apr 2014 | A1 |
20140097955 | Lovitt et al. | Apr 2014 | A1 |
20140109075 | Hoffman et al. | Apr 2014 | A1 |
20140109080 | Ricci | Apr 2014 | A1 |
20140120829 | Bhamidipati et al. | May 2014 | A1 |
20140121862 | Zarrella et al. | May 2014 | A1 |
20140125802 | Beckert et al. | May 2014 | A1 |
20140143839 | Ricci | May 2014 | A1 |
20140164611 | Molettiere et al. | Jun 2014 | A1 |
20140168062 | Katz et al. | Jun 2014 | A1 |
20140168436 | Pedicino | Jun 2014 | A1 |
20140169621 | Burr | Jun 2014 | A1 |
20140171752 | Park et al. | Jun 2014 | A1 |
20140172727 | Abhyanker et al. | Jun 2014 | A1 |
20140188533 | Davidson | Jul 2014 | A1 |
20140195272 | Sadiq et al. | Jul 2014 | A1 |
20140198216 | Zhai et al. | Jul 2014 | A1 |
20140200737 | Lortz et al. | Jul 2014 | A1 |
20140207328 | Wolf et al. | Jul 2014 | A1 |
20140220966 | Muetzel et al. | Aug 2014 | A1 |
20140222298 | Gurin | Aug 2014 | A1 |
20140223384 | Graumann | Aug 2014 | A1 |
20140240089 | Chang | Aug 2014 | A1 |
20140244078 | Downey et al. | Aug 2014 | A1 |
20140244111 | Gross et al. | Aug 2014 | A1 |
20140244156 | Magnusson et al. | Aug 2014 | A1 |
20140245277 | Petro et al. | Aug 2014 | A1 |
20140245278 | Zellen | Aug 2014 | A1 |
20140245284 | Alrabady et al. | Aug 2014 | A1 |
20140252091 | Morse et al. | Sep 2014 | A1 |
20140257627 | Hagan, Jr. | Sep 2014 | A1 |
20140267035 | Schalk et al. | Sep 2014 | A1 |
20140277936 | El Dokor et al. | Sep 2014 | A1 |
20140278070 | McGavran et al. | Sep 2014 | A1 |
20140278071 | San Filippo et al. | Sep 2014 | A1 |
20140281971 | Isbell, III et al. | Sep 2014 | A1 |
20140282161 | Cash | Sep 2014 | A1 |
20140282278 | Anderson et al. | Sep 2014 | A1 |
20140282470 | Buga et al. | Sep 2014 | A1 |
20140282931 | Protopapas | Sep 2014 | A1 |
20140292545 | Nemoto | Oct 2014 | A1 |
20140292665 | Lathrop et al. | Oct 2014 | A1 |
20140303899 | Fung | Oct 2014 | A1 |
20140306799 | Ricci | Oct 2014 | A1 |
20140306814 | Ricci | Oct 2014 | A1 |
20140306817 | Ricci | Oct 2014 | A1 |
20140306826 | Ricci | Oct 2014 | A1 |
20140306833 | Ricci | Oct 2014 | A1 |
20140306834 | Ricci | Oct 2014 | A1 |
20140306835 | Ricci | Oct 2014 | A1 |
20140307655 | Ricci | Oct 2014 | A1 |
20140307724 | Ricci | Oct 2014 | A1 |
20140308902 | Ricci | Oct 2014 | A1 |
20140309789 | Ricci | Oct 2014 | A1 |
20140309790 | Ricci | Oct 2014 | A1 |
20140309804 | Ricci | Oct 2014 | A1 |
20140309805 | Ricci | Oct 2014 | A1 |
20140309806 | Ricci | Oct 2014 | A1 |
20140309813 | Ricci | Oct 2014 | A1 |
20140309814 | Ricci et al. | Oct 2014 | A1 |
20140309815 | Ricci et al. | Oct 2014 | A1 |
20140309838 | Ricci | Oct 2014 | A1 |
20140309839 | Ricci et al. | Oct 2014 | A1 |
20140309847 | Ricci | Oct 2014 | A1 |
20140309849 | Ricci | Oct 2014 | A1 |
20140309852 | Ricci | Oct 2014 | A1 |
20140309853 | Ricci | Oct 2014 | A1 |
20140309862 | Ricci | Oct 2014 | A1 |
20140309863 | Ricci | Oct 2014 | A1 |
20140309864 | Ricci | Oct 2014 | A1 |
20140309865 | Ricci | Oct 2014 | A1 |
20140309866 | Ricci | Oct 2014 | A1 |
20140309867 | Ricci | Oct 2014 | A1 |
20140309868 | Ricci | Oct 2014 | A1 |
20140309869 | Ricci | Oct 2014 | A1 |
20140309870 | Ricci et al. | Oct 2014 | A1 |
20140309871 | Ricci | Oct 2014 | A1 |
20140309872 | Ricci | Oct 2014 | A1 |
20140309873 | Ricci | Oct 2014 | A1 |
20140309874 | Ricci | Oct 2014 | A1 |
20140309875 | Ricci | Oct 2014 | A1 |
20140309876 | Ricci | Oct 2014 | A1 |
20140309877 | Ricci | Oct 2014 | A1 |
20140309878 | Ricci | Oct 2014 | A1 |
20140309879 | Ricci | Oct 2014 | A1 |
20140309880 | Ricci | Oct 2014 | A1 |
20140309885 | Ricci | Oct 2014 | A1 |
20140309886 | Ricci | Oct 2014 | A1 |
20140309891 | Ricci | Oct 2014 | A1 |
20140309892 | Ricci | Oct 2014 | A1 |
20140309893 | Ricci | Oct 2014 | A1 |
20140309913 | Ricci et al. | Oct 2014 | A1 |
20140309919 | Ricci | Oct 2014 | A1 |
20140309920 | Ricci | Oct 2014 | A1 |
20140309921 | Ricci et al. | Oct 2014 | A1 |
20140309922 | Ricci | Oct 2014 | A1 |
20140309923 | Ricci | Oct 2014 | A1 |
20140309927 | Ricci | Oct 2014 | A1 |
20140309929 | Ricci | Oct 2014 | A1 |
20140309930 | Ricci | Oct 2014 | A1 |
20140309934 | Ricci | Oct 2014 | A1 |
20140309935 | Ricci | Oct 2014 | A1 |
20140309982 | Ricci | Oct 2014 | A1 |
20140310031 | Ricci | Oct 2014 | A1 |
20140310075 | Ricci | Oct 2014 | A1 |
20140310103 | Ricci | Oct 2014 | A1 |
20140310186 | Ricci | Oct 2014 | A1 |
20140310277 | Ricci | Oct 2014 | A1 |
20140310379 | Ricci et al. | Oct 2014 | A1 |
20140310594 | Ricci et al. | Oct 2014 | A1 |
20140310610 | Ricci | Oct 2014 | A1 |
20140310702 | Ricci et al. | Oct 2014 | A1 |
20140310739 | Ricci et al. | Oct 2014 | A1 |
20140310788 | Ricci | Oct 2014 | A1 |
20140322676 | Raman | Oct 2014 | A1 |
20140347207 | Zeng et al. | Nov 2014 | A1 |
20140347265 | Allen et al. | Nov 2014 | A1 |
20150007155 | Hoffman et al. | Jan 2015 | A1 |
20150012186 | Horseman | Jan 2015 | A1 |
20150032366 | Man et al. | Jan 2015 | A1 |
20150032670 | Brazell | Jan 2015 | A1 |
20150057839 | Chang et al. | Feb 2015 | A1 |
20150061895 | Ricci | Mar 2015 | A1 |
20150081133 | Schulz | Mar 2015 | A1 |
20150081167 | Pisz et al. | Mar 2015 | A1 |
20150088423 | Tuukkanen | Mar 2015 | A1 |
20150088515 | Beaumont et al. | Mar 2015 | A1 |
20150116200 | Kurosawa et al. | Apr 2015 | A1 |
20150158499 | Koravadi | Jun 2015 | A1 |
20150161832 | Esselink et al. | Jun 2015 | A1 |
20150178034 | Penilla et al. | Jun 2015 | A1 |
20160008985 | Kim et al. | Jan 2016 | A1 |
20160039356 | Talwar et al. | Feb 2016 | A1 |
20160070527 | Ricci | Mar 2016 | A1 |
20160086391 | Ricci | Mar 2016 | A1 |
20160269456 | Ricci | Sep 2016 | A1 |
20160269469 | Ricci | Sep 2016 | A1 |
20170053460 | Hauser | Feb 2017 | A1 |
Number | Date | Country |
---|---|---|
1417755 | May 2003 | CN |
1847817 | Oct 2006 | CN |
101303878 | Nov 2008 | CN |
102467827 | May 2012 | CN |
1223567 | Jul 2002 | EP |
1484729 | Dec 2004 | EP |
2192015 | Jun 2010 | EP |
2004-284450 | Oct 2004 | JP |
2006-0128484 | Dec 2006 | KR |
WO 2007126204 | Nov 2007 | WO |
WO 2012102879 | Aug 2012 | WO |
WO 2013074866 | May 2013 | WO |
WO 2013074867 | May 2013 | WO |
WO 2013074868 | May 2013 | WO |
WO 2013074897 | May 2013 | WO |
WO 2013074899 | May 2013 | WO |
WO 2013074901 | May 2013 | WO |
WO 2013074919 | May 2013 | WO |
WO 2013074981 | May 2013 | WO |
WO 2013074983 | May 2013 | WO |
WO 2013075005 | May 2013 | WO |
WO 2013181310 | Dec 2013 | WO |
WO 2014014862 | Jan 2014 | WO |
WO 2014143563 | Sep 2014 | WO |
WO 2014158667 | Oct 2014 | WO |
WO 2014158672 | Oct 2014 | WO |
WO 2014158766 | Oct 2014 | WO |
WO 2014172312 | Oct 2014 | WO |
WO 2014172313 | Oct 2014 | WO |
WO 2014172316 | Oct 2014 | WO |
WO 2014172320 | Oct 2014 | WO |
WO 2014172322 | Oct 2014 | WO |
WO 2014172323 | Oct 2014 | WO |
WO 2014172327 | Oct 2014 | WO |
WO 2016145073 | Sep 2016 | WO |
WO 2016145100 | Sep 2016 | WO |
Entry |
---|
“Multi-factor authentication,” Wikipedia, retrieved from https://en.wikipedia.org/wiki/Multi-factor_authentication, retrieved on Dec. 9, 2016, 6 pages. |
“Radio-frequency identification,” Wikipedia, retrieved from https://en.wikipedia.org/wiki/Radio-frequency_identification, retrieved on Dec. 9, 2016, 23 pages. |
“Product code,” Wikipedia, retrieved from https://en.wikipedia.org/wiki/Product_code, retrieved on Dec. 9, 2016, 1 page. |
“Electronic Product Code,” Wikipedia, retrieved from https://en.wikipedia.org/wiki/Electronic_Product_Code, retrieved on Dec. 9, 2016, 4 page. |
U.S. Appl. No. 61/567,962, filed Dec. 7, 2011, Baarman et al. |
U.S. Appl. No. 15/406,138, filed Jan. 13, 2017, Newman |
U.S. Appl. No. 15/407,480, filed Jan. 17, 2017, Falkson et al. |
U.S. Appl. No. 15/414,897, filed Jan. 25, 2017, Chen et al. |
“Nexus 10 Guidebook for Android,” Google Inc., © 2012, Edition 1.2, 166 pages. |
“Self-Driving: Self-Driving Autonomous Cars,” available at http://www.automotivetechnologies.com/autonomous-self-driving-cars, accessed Dec. 2016, 9 pages. |
Amor-Segan et al., “Towards the Self Healing Vehicle,” Automotive Electronics, Jun. 2007, 2007 3rd Institution of Engineering and Technology Conference, 7 pages. |
Bennett, “Meet Samsung's Version of Apple AirPlay,” CNET.com, Oct. 10, 2012, 11 pages. |
Cairnie et al., “Using Finger-Pointing to Operate Secondary Controls in Automobiles,” Proceedings of the IEEE Intelligent Vehicles Symposium 2000, Oct. 3-5, 2000, 6 pages. |
Clark, “How Self-Driving Cars Work: The Nuts and Bolts Behind Google's Autonomous Car Program,” Feb. 21, 2015, available at http://www.makeuseof.com/tag/how-self-driving-cars-work-the-nuts-and-bolts-behind-googles-autonomous-car-program/, 9 pages. |
Deaton et al., “How Driverless Cars Will Work,” Jul. 1, 2008, HowStuffWorks.com. <http://auto.howstuffworks.com/under-the-hood/trends-innovations/driverless-car.htm> Sep. 18, 2017, 10 pages. |
Dumbaugh, “Safe Streets, Livable Streets: A Positive Approach to urban Roadside Design,” Ph.D. dissertation for School of Civil & Environ. Engr., Georgia Inst. of Technology, Dec. 2005, 235 pages. |
Fei et al., “A QoS-aware Dynamic Bandwidth Allocation Algorithm for Relay Stations in IEEE 802.16j-based Vehicular Networks,” Proceedings of the 2010 IEEE Global Telecommunications Conference, Dec. 10, 2010, 10 pages. |
Ge et al., “Optimal Relay Selection in IEEE 802.16j Multihop Relay Vehicular Networks,” IEEE Transactions on Vehicular Technology, 2010, vol. 59(5), pp. 2198-2206. |
Guizzo, Erico, “How Google's Self-Driving Car Works,” Oct. 18, 2011, available at https://spectrum.ieee.org/automaton/robotics/artificial-intelligence/how-google-self-driving-car-works, 5 pages. |
Heer et al., “ALPHA: An Adaptive and Lightweight Protocol for Hop-by-hop Authentication,” Proceedings of CoNEXT 2008, Dec. 2008, pp. 1-12. |
Jahnich et al., “Towards a Middleware Approach for a Self-Configurable Automotive Embedded System,” International Federation for Information Processing, 2008, pp. 55-65. |
Persson “Adaptive Middleware for Self-Configurable Embedded Real-Time Systems,” KTH Industrial Engineering and Management, 2009, pp. iii-71 and references. |
Raychaudhuri et al., “Emerging Wireless Technologies and the Future Mobile Internet,” p. 48, Cambridge Press, 2011, 3 pages. |
Stephens, Leah, “How Driverless Cars Work,” Interesting Engineering, Apr. 28, 2016, available at https://interestingengineering.com/driverless-cars-work/, 7 pages. |
Stoller, “Leader Election in Distributed Systems with Crash Failures,” Indiana University, 1997, pp. 1-15. |
Strunk et al., “The Elements of Style,” 3d ed., Macmillan Publishing Co., 1979, 3 pages. |
Suwatthikul, “Fault detection and diagnosis for in-vehicle networks,” Intech, 2010, pp. 283-286 [retrieved from: www.intechopen.com/books/fault-detection-and-diagnosis-for-in-vehicle-networks]. |
Walter et al., “The smart car seat: personalized monitoring of vital signs in automotive applications.” Personal and Ubiquitous Computing, Oct. 2011, vol. 15, No. 7, pp. 707-715. |
Wolf et al., “Design, Implementation, and Evaluation of a Vehicular Hardware Security Module,” ICISC'11 Proceedings of the 14th Int'l Conf. Information Security & Cryptology, Springer-Verlag Berlin, Heidelberg, 2011, pp. 302-318. |
Official Action for U.S. Appl. No. 15/407,480, dated Sep. 6, 2017, 13 pages. |
Official Action for U.S. Appl. No. 15/406,138, dated Jul. 13, 2017, 6 pages. |
Official Action for U.S. Appl. No. 15/406,138, dated Dec. 28, 2017, 7 pages. |
Number | Date | Country | |
---|---|---|---|
20180012433 A1 | Jan 2018 | US |
Number | Date | Country | |
---|---|---|---|
62359563 | Jul 2016 | US | |
62378348 | Aug 2016 | US |