Vehicle identification or authentication

Abstract
A vehicle includes an on board microprocessor that is programmed to receive and transmit multiple authentication factors or a key derived therefrom to a remote server to authenticate the vehicle or a vehicle occupant to a remote server. The multiple authentication factors comprise a plurality of an electronic address of a portable communication device of the occupant sensed by an on board sensor, a wireless remote signal description sensed by an on board sensor, a vehicle-related identifier, a vehicle parameter sensed by the on board processor, an environmental parameter sensed by the on board processor, and a passcode received by the microprocessor from the remote server.
Description
FIELD

The present disclosure is generally directed to vehicle systems, in particular, toward electric and/or hybrid-electric vehicles.


BACKGROUND

In recent years, transportation methods have changed substantially. This change is due in part to a concern over the limited availability of natural resources, a proliferation in personal technology, and a societal shift to adopt more environmentally friendly transportation solutions. These considerations have encouraged the development of a number of new flexible-fuel vehicles, hybrid-electric vehicles, and electric vehicles.


While these vehicles appear to be new they are generally implemented as a number of traditional subsystems that are merely tied to an alternative power source. In fact, the design and construction of the vehicles is limited to standard frame sizes, shapes, materials, and transportation concepts. Among other things, these limitations fail to take advantage of the benefits of new technology, power sources, and support infrastructure.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows a vehicle in accordance with embodiments of the present disclosure;



FIG. 2 shows a vehicle in an environment in accordance with embodiments of the present disclosure;



FIG. 3 is a diagram of an embodiment of a data structure for storing information about a vehicle in an environment;



FIG. 4A shows a vehicle in a user environment in accordance with embodiments of the present disclosure;



FIG. 4B shows a vehicle in a fleet management and automated operation environment in accordance with embodiments of the present disclosure;



FIG. 4C shows an embodiment of the instrument panel of the vehicle according to one embodiment of the present disclosure;



FIG. 5 shows charging areas associated with an environment in accordance with embodiments of the present disclosure;



FIG. 6 shows a vehicle in a roadway charging environment in accordance with embodiments of the present disclosure;



FIG. 7 shows a vehicle in a robotic charging station environment in accordance with another embodiment of the present disclosure;



FIG. 8 shows a vehicle in an overhead charging environment in accordance with another embodiment of the present disclosure;



FIG. 9 shows a vehicle in a roadway environment comprising roadway vehicles in accordance with another embodiment of the present disclosure;



FIG. 10 shows a vehicle in an aerial vehicle charging environment in accordance with another embodiment of the present disclosure;



FIG. 11 shows a vehicle in an emergency charging environment in accordance with embodiments of the present disclosure;



FIG. 12 is a perspective view of a vehicle in accordance with embodiments of the present disclosure;



FIG. 13 is a plan view of a vehicle in accordance with at least some embodiments of the present disclosure;



FIG. 14 is a plan view of a vehicle in accordance with embodiments of the present disclosure;



FIG. 15 is a block diagram of an embodiment of an electrical system of the vehicle;



FIG. 16 is a block diagram of an embodiment of a power generation unit associated with the electrical system of the vehicle;



FIG. 17 is a block diagram of an embodiment of power storage associated with the electrical system of the vehicle;



FIG. 18 is a block diagram of an embodiment of loads associated with the electrical system of the vehicle;



FIG. 19A is a block diagram of an exemplary embodiment of a communications subsystem of the vehicle;



FIG. 19B is a block diagram of a computing environment associated with the embodiments presented herein;



FIG. 19C is a block diagram of a computing device associated with one or more components described herein;



FIG. 20 is a block diagram of a distributed cryptographic system according to an embodiment;



FIG. 21 is a block diagram of an on board cryptographic manager according to an embodiment;



FIG. 22 is a block diagram of an on board cryptographic device executing the cryptographic manager according to an embodiment;



FIG. 23 is a flow chart according to an embodiment;



FIG. 24 is a flow chart according to an embodiment; and



FIG. 25 is a block diagram of an exemplary computing system to execute the cryptographic manager.





DETAILED DESCRIPTION

Embodiments of the present disclosure will be described in connection with a vehicle, and in accordance with one exemplary embodiment an electric vehicle and/or hybrid-electric vehicle and associated systems.


With attention to FIGS. 1-11, embodiments of the electric vehicle system 10 and method of use are depicted.


Referring to FIG. 1, the electric vehicle system comprises electric vehicle 100. The electric vehicle 100 comprises vehicle front 110, vehicle aft 120, vehicle roof 130, vehicle side 160, vehicle undercarriage 140 and vehicle interior 150.


Referring to FIG. 2, the vehicle 100 is depicted in a plurality of exemplary environments. The vehicle 100 may operate in any one or more of the depicted environments in any combination. Other embodiments are possible but are not depicted in FIG. 2. Generally, the vehicle 100 may operate in environments which enable charging of the vehicle 100 and/or operation of the vehicle 100. More specifically, the vehicle 100 may receive a charge via one or more means comprising emergency charging vehicle system 270, aerial vehicle charging system 280, roadway system 250, robotic charging system 254 and overhead charging system 258. The vehicle 100 may interact and/or operate in an environment comprising one or more other roadway vehicles 260. The vehicle 100 may engage with elements within the vehicle 100 comprising vehicle driver 220, vehicle passengers 220 and vehicle database 210. In one embodiment, vehicle database 210 does not physically reside in the vehicle 100 but is instead accessed remotely, e.g. by wireless communication, and resides in another location such as a residence or business location. Vehicle 100 may operate autonomously and/or semi-autonomously in an autonomous environment 290 (here, depicted as a roadway environment presenting a roadway obstacle of which the vehicle 100 autonomously identifies and steers the vehicle 100 clear of the obstacle). Furthermore, the vehicle 100 may engage with a remote operator system 240, which may provide fleet management instructions or control.



FIG. 3 is a diagram of an embodiment of a data structure 300 for storing information about a vehicle 100 in an environment. The data structure may be stored in vehicle database 210. Generally, data structure 300 identifies operational data associated with charging types 310A. The data structures 300 may be accessible by a vehicle controller. The data contained in data structure 300 enables, among other things, for the vehicle 100 to receive a charge from a given charging type.


Data may comprise charging type 310A comprising a manual charging station 310J, robotic charging station 310K such as robotic charging system 254, a roadway charging system 310L such as those of roadway system 250, an emergency charging system 310M such as that of emergency charging vehicle system 270, an emergency charging system 310N such as that of aerial vehicle charging system 280, and overhead charging type 310O such as that of overhead charging system 258.


Compatible vehicle charging panel types 310B comprise locations on vehicle 100 wherein charging may be received, such as vehicle roof 130, vehicle side 160 and vehicle lower or undercarriage 140. Compatible vehicle storage units 310C data indicates storage units types that may receive power from a given charging type 310A. Available automation level 310D data indicates the degree of automation available for a given charging type; a high level may indicate full automation, allowing the vehicle driver 220 and/or vehicle passengers 230 to not involve themselves in charging operations, while a low level of automation may require the driver 220 and/or occupant 230 to manipulate/position a vehicle charging device to engage with a particular charging type 310A to receive charging. Charging status 310E indicates whether a charging type 310A is available for charging (i.e. is “up”) or is unavailable for charging (i.e. is “down”). Charge rate 310F provides a relative value for time to charge, while Cost 310G indicates the cost to vehicle 100 to receive a given charge. The Other data element 310H may provide additional data relevant to a given charging type 310A, such as a recommended separation distance between a vehicle charging plate and the charging source. The Shielding data element 310I indicates if electromagnetic shielding is recommended for a given charging type 310A and/or charging configuration. Further data fields 310P, 310Q are possible.



FIG. 4A depicts the vehicle 100 in a user environment comprising vehicle database 210, vehicle driver 220 and vehicle passengers 230. Vehicle 100 further comprises vehicle instrument panel 400 to facilitate or enable interactions with one or more of vehicle database 210, vehicle driver 220 and vehicle passengers 230. In one embodiment, driver 210 interacts with instrument panel 400 to query database 210 so as to locate available charging options and to consider or weigh associated terms and conditions of the charging options. Once a charging option is selected, driver 210 may engage or operate a manual control device (e.g., a joystick) to position a vehicle charging receiver panel so as to receive a charge.



FIG. 4B depicts the vehicle 100 in a user environment comprising a remote operator system 240 and an autonomous driving environment 290. In the remote operator system 240 environment, a fleet of electric vehicles 100 (or mixture of electric and non-electric vehicles) is managed and/or controlled remotely. For example, a human operator may dictate that only certain types of charging types are to be used, or only those charging types below a certain price point are to be used. The remote operator system 240 may comprise a database comprising operational data, such as fleet-wide operational data. In another example, the vehicle 100 may operate in an autonomous driving environment 290 wherein the vehicle 100 is operated with some degree of autonomy, ranging from complete autonomous operation to semi-automation wherein only specific driving parameters (e.g., speed control or obstacle avoidance) are maintained or controlled autonomously. In FIG. 4B, autonomous driving environment 290 depicts an oil slick roadway hazard that triggers that triggers the vehicle 100, while in an automated obstacle avoidance mode, to automatically steer around the roadway hazard.



FIG. 4C shows one embodiment of the vehicle instrument panel 400 of vehicle 100. Instrument panel 400 of vehicle 100 comprises steering wheel 410, vehicle operational display 420 (which would provide basic driving data such as speed), one or more auxiliary displays 424 (which may display, e.g., entertainment applications such as music or radio selections), heads-up display 434 (which may provide, e.g., guidance information such as route to destination, or obstacle warning information to warn of a potential collision, or some or all primary vehicle operational data such as speed), power management display 428 (which may provide, e.g., data as to electric power levels of vehicle 100), and charging manual controller 432 (which provides a physical input, e.g. a joystick, to manual maneuver, e.g., a vehicle charging plate to a desired separation distance). One or more of displays of instrument panel 400 may be touch-screen displays. One or more displays of instrument panel 400 may be mobile devices and/or applications residing on a mobile device such as a smart phone.



FIG. 5 depicts a charging environment of a roadway charging system 250. The charging area may be in the roadway 504, on the roadway 504, or otherwise adjacent to the roadway 504, and/or combinations thereof. This static charging area 520B may allow a charge to be transferred even while the electrical vehicle 100 is moving. For example, the static charging area 520B may include a charging transmitter (e.g., conductor, etc.) that provides a transfer of energy when in a suitable range of a receiving unit (e.g., an inductor pick up, etc.). In this example, the receiving unit may be a part of the charging panel associated with the electrical vehicle 100.


The static charging areas 520A, 520B may be positioned a static area such as a designated spot, pad, parking space 540A, 540B, traffic controlled space (e.g., an area adjacent to a stop sign, traffic light, gate, etc.), portion of a building, portion of a structure, etc., and/or combinations thereof. Some static charging areas may require that the electric vehicle 100 is stationary before a charge, or electrical energy transfer, is initiated. The charging of vehicle 100 may occur by any of several means comprising a plug or other protruding feature. The power source 516A, 516B may include a receptacle or other receiving feature, and/or vice versa.


The charging area may be a moving charging area 520C. Moving charging areas 520C may include charging areas associated with one or more portions of a vehicle, a robotic charging device, a tracked charging device, a rail charging device, etc., and/or combinations thereof. In a moving charging area 520C, the electrical vehicle 100 may be configured to receive a charge, via a charging panel, while the vehicle 100 is moving and/or while the vehicle 100 is stationary. In some embodiments, the electrical vehicle 100 may synchronize to move at the same speed, acceleration, and/or path as the moving charging area 520C. In one embodiment, the moving charging area 520C may synchronize to move at the same speed, acceleration, and/or path as the electrical vehicle 100. In any event, the synchronization may be based on an exchange of information communicated across a communications channel between the electric vehicle 100 and the charging area 520C. Additionally or alternatively, the synchronization may be based on information associated with a movement of the electric vehicle 100 and/or the moving charging area 520C. In some embodiments, the moving charging area 520C may be configured to move along a direction or path 532 from an origin position to a destination position 520C′.


In some embodiments, a transformer may be included to convert a power setting associated with a main power supply to a power supply used by the charging areas 520A-C. For example, the transformer may increase or decrease a voltage associated with power supplied via one or more power transmission lines.


Referring to FIG. 6, a vehicle 100 is shown in a charging environment in accordance with embodiments of the present disclosure. The system 10 comprises a vehicle 100, an electrical storage unit 612, an external power source 516 able to provide a charge to the vehicle 100, a charging panel 608 mounted on the vehicle 100 and in electrical communication with the electrical storage unit 612, and a vehicle charging panel controller 610. The charging panel controller 610 may determine if the electrical storage unit requires charging and if conditions allow for deployment of a charging panel. The vehicle charging panel 608 may operate in at least a retracted state and a deployed state (608 and 608′ as shown is FIG. 6), and is movable by way of an armature.


The charging panel controller 610 may receive signals from vehicle sensors 626 to determine, for example, if a hazard is present in the path of the vehicle 100 such that deployment of the vehicle charging panel 608 is inadvisable. The charging panel controller 610 may also query vehicle database 210 comprising data structures 300 to establish other required conditions for deployment. For example, the database may provide that a particular roadway does not provide a charging service or the charging service is inactive, wherein the charging panel 108 would not be deployed.


The power source 516 may include at least one electrical transmission line 624 and at least one power transmitter or charging area 520. During a charge, the charging panel 608 may serve to transfer energy from the power source 516 to at least one energy storage unit 612 (e.g., battery, capacitor, power cell, etc.) of the electric vehicle 100.



FIG. 7 shows a vehicle 100 in a charging station environment 254 in accordance with another embodiment of the present disclosure. Generally, in this embodiment of the disclosure, charging occurs from a robotic unit 700.


Robotic charging unit 700 comprises one or more robotic unit arms 704, at least one robotic unit arm 704 interconnected with charging plate 520. The one or more robotic unit arms 704 manoeuver charging plate 520 relative to charging panel 608 of vehicle 100. Charging plate 520 is positioned to a desired or selectable separation distance, as assisted by a separation distance sensor disposed on charging plate 520. Charging plate 520 may remain at a finite separation distance from charging panel 608, or may directly contact charging panel (i.e. such that separation distance is zero). Charging may be by induction. In alternative embodiments, separation distance sensor is alternatively or additionally disposed on robotic arm 704. Vehicle 100 receives charging via charging panel 608 which in turn charges energy storage unit 612. Charging panel controller 610 is in communication with energy storage unit 612, charging panel 608, vehicle database 300, charge provider controller 622, and/or any one of elements of instrument panel 400.


Robotic unit further comprises, is in communication with and/or is interconnected with charge provider controller 622, power source 516 and a robotic unit database. Power source 516 supplies power, such as electrical power, to charge plate 520 to enable charging of vehicle 100 via charging panel 608. Controller 622 manoeuvers or operates robotic unit 704, either directly and/or completely or with assistance from a remote user, such as a driver or passenger in vehicle 100 by way of, in one embodiment, charging manual controller 432.



FIG. 8 shows a vehicle 100 in an overhead charging environment in accordance with another embodiment of the present disclosure. Generally, in this embodiment of the disclosure, charging occurs from an overhead towered charging system 258, similar to existing commuter rail systems. Such an overhead towered system 258 may be easier to build and repair compared to in-roadway systems. Generally, the disclosure includes a specially-designed overhead roadway charging system comprising an overhead charging cable or first wire 814 that is configured to engage an overhead contact 824 which provides charge to charging panel 608 which provides charge to vehicle energy storage unit 612. The overhead towered charging system 258 may further comprise second wire 818 to provide stability and structural strength to the roadway charging system 800. The first wire 814 and second wire 818 are strung between towers 810.


The overhead charging cable or first wire 814 is analogous to a contact wire used to provide charging to electric trains or other vehicles. An external source provides or supplies electrical power to the first wire 814. The charge provider comprises an energy source i.e. a provider battery and a provider charge circuit or controller in communication with the provider battery. The overhead charging cable or first wire 814 engages the overhead contact 824 which is in electrical communication with charge receiver panel 108. The overhead contact 824 may comprise any known means to connect to overhead electrical power cables, such as a pantograph 820, a bow collector, a trolley pole or any means known to those skilled in the art. Further disclosure regarding electrical power or energy transfer via overhead systems is found in US Pat. Publ. No. 2013/0105264 to Ruth entitled “Pantograph Assembly,” the entire contents of which are incorporated by reference for all purposes. In one embodiment, the charging of vehicle 100 by overhead charging system 800 via overhead contact 824 is by any means know to those skilled in the art, to include those described in the above-referenced US Pat. Publ. No. 2013/0105264 to Ruth.


The overhead contact 824 presses against the underside of the lowest overhead wire of the overhead charging system, i.e. the overhead charging cable or first wire 814, aka the contact wire. The overhead contact 824 may be electrically conductive. Alternatively or additionally, the overhead contact 824 may be adapted to receive electrical power from overhead charging cable or first wire 814 by inductive charging.


In one embodiment, the receipt and/or control of the energy provided via overhead contact 824 (as connected to the energy storage unit 612) is provided by receiver charge circuit or charging panel controller 110.


Overhead contact 824 and/or charging panel 608 may be located anywhere on vehicle 100, to include, for example, the roof, side panel, trunk, hood, front or rear bumper of the charge receiver 100 vehicle, as long as the overhead contact 824 may engage the overhead charging cable or first wire 814. Charging panel 108 may be stationary (e.g. disposed on the roof of vehicle 100) or may be moveable, e.g. moveable with the pantograph 820. Pantograph 820 may be positioned in at least two states comprising retracted and extended. In the extended state pantograph 820 engages first wire 814 by way of the overhead contact 824. In the retracted state, pantograph 820 may typically reside flush with the roof of vehicle 100 and extend only when required for charging. Control of the charging and/or positioning of the charging plate 608, pantograph 820 and/or overhead contact 824 may be manual, automatic or semi-automatic (such as via controller 610); said control may be performed through a GUI engaged by driver or occupant of receiving vehicle 100 and/or driver or occupant of charging vehicle.



FIG. 9 shows a vehicle in a roadway environment comprising roadway vehicles 260 in accordance with another embodiment of the present disclosure. Roadway vehicles 260 comprise roadway passive vehicles 910 and roadway active vehicles 920. Roadway passive vehicles 910 comprise vehicles that are operating on the roadway of vehicle 100 but do no cooperatively or actively engage with vehicle 100. Stated another way, roadway passive vehicles 910 are simply other vehicles operating on the roadway with the vehicle 100 and must be, among other things, avoided (e.g., to include when vehicle 100 is operating in an autonomous or semi-autonomous manner). In contrast, roadway active vehicles 920 comprise vehicles that are operating on the roadway of vehicle 100 and have the capability to, or actually are, actively engaging with vehicle 100. For example, the emergency charging vehicle system 270 is a roadway active vehicle 920 in that it may cooperate or engage with vehicle 100 to provide charging. In some embodiments, vehicle 100 may exchange data with a roadway active vehicle 920 such as, for example, data regarding charging types available to the roadway active vehicle 920.



FIG. 10 shows a vehicle in an aerial vehicle charging environment in accordance with another embodiment of the present disclosure. Generally, this embodiment involves an aerial vehicle (“AV”), such as an Unmanned Aerial Vehicle (UAV), flying over or near a vehicle to provide a charge. The UAV may also land on the car to provide an emergency (or routine) charge. Such a charging scheme may be particularly suited for operations in remote areas, in high traffic situations, and/or when the car is moving. The AV may be a specially-designed UAV, aka RPV or drone, with a charging panel that can extend from the AV to provide a charge. The AV may include a battery pack and a charging circuit to deliver a charge to the vehicle. The AV may be a manned aerial vehicle, such as a piloted general aviation aircraft, such as a Cessna 172.


With reference to FIG. 10, an exemplar embodiment of a vehicle charging system 100 comprising a charge provider configured as an aerial vehicle 280, the aerial vehicle 280 comprising a power source 516 and charge provider controller 622. The AV may be semi-autonomous or fully autonomous. The AV may have a remote pilot/operator providing control inputs. The power source 516 is configured to provide a charge to a charging panel 608 of vehicle 100. The power source 516 is in communication with the charge provider controller 622. The aerial vehicle 280 provides a tether 1010 to deploy or extend charging plate 520 near to charging panel 608. The tether 1010 may comprise a chain, rope, rigid or semi-rigid tow bar or any means to position charging plate 520 near charging panel 608. For example, tether 1010 may be similar to a refueling probe used by airborne tanker aircraft when refueling another aircraft.


In one embodiment, the charging plate 520 is not in physical interconnection to AV 280, that is, there is no tether 1010. In this embodiment, the charging plate 520 is positioned and controlled by AV 280 by way of a controller on AV 280 or in communication with AV 280.


In one embodiment, the charging plate 520 position and/or characteristics (e.g. charging power level, flying separation distance, physical engagement on/off) are controlled by vehicle 100 and/or a user in or driver of vehicle 100.


Charge or power output of power source 516 is provided or transmitted to charger plate 620 by way of a charging cable or wire, which may be integral to tether 1010. In one embodiment, the charging cable is non-structural, that is, it provides zero or little structural support to the connection between AV 280 and charger plate 520.


Charging panel 608 of vehicle 100 receives power from charger plate 520. Charging panel 608 and charger plate 520 may be in direct physical contact (termed a “contact” charger configuration) or not in direct physical contact (termed a “flyer” charger configuration), but must be at or below a threshold (separation) distance to enable charging, such as by induction. Energy transfer or charging from the charger plate 520 to the charging panel 608 is inductive charging (i.e. use of an EM field to transfer energy between two objects). The charging panel 608 provides received power to energy storage unit 612 by way of charging panel controller 610. Charging panel controller 610 is in communication with vehicle database 210, vehicle database 210 comprising an AV charging data structure.


Charging panel 508 may be located anywhere on vehicle 100, to include, for example, the roof, side panel, trunk, hood, front or rear bumper and wheel hub of vehicle 100. Charging panel 608 is mounted on the roof of vehicle 100 in the embodiment of FIG. 10. In some embodiments, charging panel 608 may be deployable, i.e. may extend or deploy only when charging is needed. For example, charging panel 608 may typically reside flush with the roof of vehicle 100 and extend when required for charging. Similarly, charger plate 520 may, in one embodiment, not be connected to AV 280 by way of tether 1010 and may instead be mounted directly on the AV 280, to include, for example, the wing, empennage, undercarriage to include landing gear, and may be deployable or extendable when required. Tether 1010 may be configured to maneuver charging plate 520 to any position on vehicle 100 so as to enable charging. In one embodiment, the AV 280 may land on the vehicle 100 so as to enable charging through direct contact (i.e. the aforementioned contact charging configuration) between the charging plate 520 and the charging panel 608 of vehicle 100. Charging may occur while both AV 280 and vehicle 100 are moving, while both vehicle 100 and AV 280 are not moving (i.e., vehicle 100 is parked and AV 280 lands on top of vehicle 100), or while vehicle 100 is parked and AV 280 is hovering or circling above. Control of the charging and/or positioning of the charging plate 520 may be manual, automatic or semi-automatic; said control may be performed through a GUI engaged by driver or occupant of receiving vehicle 100 and/or driver or occupant of charging AV 280.



FIG. 11 is an embodiment of a vehicle emergency charging system comprising an emergency charging vehicle 270 and charge receiver vehicle 100 is disclosed. The emergency charging vehicle 270 is a road vehicle, such as a pick-up truck, as shown in FIG. 11. The emergency charging vehicle 270 is configured to provide a charge to a charge receiver vehicle 100, such as an automobile. The emergency charging vehicle 270 comprises an energy source i.e. a charging power source 516 and a charge provider controller 622 in communication with the charging power source 516. The emergency charging vehicle 270 provides a towed and/or articulated charger plate 520, as connected to the emergency charging vehicle 270 by connector 1150. The connector 1150 may comprise a chain, rope, rigid or semi-rigid tow bar or any means to position charger plate 520 near the charging panel 608 of vehicle 100. Charge or power output of charging power source 516 is provided or transmitted to charger plate 520 by way of charging cable or wire 1140. In one embodiment, the charging cable 1140 is non-structural, that is, it provides little or no structural support to the connection between emergency charging vehicle 270 and charging panel 608. Charging panel 608 (of vehicle 100) receives power from charger plate 520. Charger plate 520 and charging panel 608 may be in direct physical contact or not in direct physical contact, but must be at or below a threshold separation distance to enable charging, such as by induction. Charger plate 520 may comprise wheels or rollers so as to roll along roadway surface. Charger plate 520 may also not contact the ground surface and instead be suspended above the ground; such a configuration may be termed a “flying” configuration. In the flying configuration, charger plate may form an aerodynamic surface to, for example, facilitate stability and control of the positioning of the charging plate 520. Energy transfer or charging from the charger plate 520 to the charge receiver panel 608 is through inductive charging (i.e. use of an EM field to transfer energy between two objects). The charging panel 608 provides received power to energy storage unit 612 directly or by way of charging panel controller 610. In one embodiment, the receipt and/or control of the energy provided via the charging panel 608 is provided by charging panel controller 610.


Charging panel controller 610 may be located anywhere on charge receiver vehicle 100, to include, for example, the roof, side panel, trunk, hood, front or rear bumper and wheel hub of charge receiver 100 vehicle. In some embodiments, charging panel 608 may be deployable, i.e. may extend or deploy only when charging is needed. For example, charging panel 608 may typically stow flush with the lower plane of vehicle 100 and extend when required for charging. Similarly, charger plate 520 may, in one embodiment, not be connected to the lower rear of the emergency charging vehicle 270 by way of connector 1150 and may instead be mounted on the emergency charging vehicle 270, to include, for example, the roof, side panel, trunk, hood, front or rear bumper and wheel hub of emergency charging vehicle 270. Connector 1150 may be configured to maneuver connector plate 520 to any position on emergency charging vehicle 270 so as to enable charging. Control of the charging and/or positioning of the charging plate may be manual, automatic or semi-automatic; said control may be performed through a GUI engaged by driver or occupant of receiving vehicle and/or driver or occupant of charging vehicle.



FIG. 12 shows a perspective view of a vehicle 100 in accordance with embodiments of the present disclosure. Although shown in the form of a car, it should be appreciated that the vehicle 100 described herein may include any conveyance or model of a conveyance, where the conveyance was designed for the purpose of moving one or more tangible objects, such as people, animals, cargo, and the like. The term “vehicle” does not require that a conveyance moves or is capable of movement. Typical vehicles may include but are in no way limited to cars, trucks, motorcycles, busses, automobiles, trains, railed conveyances, boats, ships, marine conveyances, submarine conveyances, airplanes, space craft, flying machines, human-powered conveyances, and the like. In any event, the vehicle 100 may include a frame 1204 and one or more body panels 1208 mounted or affixed thereto. The vehicle 100 may include one or more interior components (e.g., components inside an interior space 150, or user space, of a vehicle 100, etc.), exterior components (e.g., components outside of the interior space 150, or user space, of a vehicle 100, etc.), drive systems, controls systems, structural components.


Referring now to FIG. 13, a plan view of a vehicle 100 will be described in accordance with embodiments of the present disclosure. As provided above, the vehicle 100 may comprise a number of electrical and/or mechanical systems, subsystems, etc. The mechanical systems of the vehicle 100 can include structural, power, safety, and communications subsystems, to name a few. While each subsystem may be described separately, it should be appreciated that the components of a particular subsystem may be shared between one or more other subsystems of the vehicle 100.


The structural subsystem includes the frame 1204 of the vehicle 100. The frame 1204 may comprise a separate frame and body construction (i.e., body-on-frame construction), a unitary frame and body construction (i.e., a unibody construction), or any other construction defining the structure of the vehicle 100. The frame 1204 may be made from one or more materials including, but in no way limited to steel, titanium, aluminum, carbon fiber, plastic, polymers, etc., and/or combinations thereof. In some embodiments, the frame 1204 may be formed, welded, fused, fastened, pressed, etc., combinations thereof, or otherwise shaped to define a physical structure and strength of the vehicle 100. In any event, the frame 1204 may comprise one or more surfaces, connections, protrusions, cavities, mounting points, tabs, slots, or other features that are configured to receive other components that make up the vehicle 100. For example, the body panels, powertrain subsystem, controls systems, interior components, communications subsystem, and safety subsystem may interconnect with, or attach to, the frame 1204 of the vehicle 100.


The frame 1204 may include one or more modular system and/or subsystem connection mechanisms. These mechanisms may include features that are configured to provide a selectively interchangeable interface for one or more of the systems and/or subsystems described herein. The mechanisms may provide for a quick exchange, or swapping, of components while providing enhanced security and adaptability over conventional manufacturing or attachment. For instance, the ability to selectively interchange systems and/or subsystems in the vehicle 100 allow the vehicle 100 to adapt to the ever-changing technological demands of society and advances in safety. Among other things, the mechanisms may provide for the quick exchange of batteries, capacitors, power sources 1308A, 1308B, motors 1312, engines, safety equipment, controllers, user interfaces, interiors exterior components, body panels 1208, bumpers 1316, sensors, etc., and/or combinations thereof. Additionally or alternatively, the mechanisms may provide unique security hardware and/or software embedded therein that, among other things, can prevent fraudulent or low quality construction replacements from being used in the vehicle 100. Similarly, the mechanisms, subsystems, and/or receiving features in the vehicle 100 may employ poka-yoke, or mistake-proofing, features that ensure a particular mechanism is always interconnected with the vehicle 100 in a correct position, function, etc.


By way of example, complete systems or subsystems may be removed and/or replaced from a vehicle 100 utilizing a single minute exchange principle. In some embodiments, the frame 1204 may include slides, receptacles, cavities, protrusions, and/or a number of other features that allow for quick exchange of system components. In one embodiment, the frame 1204 may include tray or ledge features, mechanical interconnection features, locking mechanisms, retaining mechanisms, etc., and/or combinations thereof. In some embodiments, it may be beneficial to quickly remove a used power source 1308A, 1308B (e.g., battery unit, capacitor unit, etc.) from the vehicle 100 and replace the used power source 1308A, 1308B with a charged power source. Continuing this example, the power source 1308A, 1308B may include selectively interchangeable features that interconnect with the frame 1204 or other portion of the vehicle 100. For instance, in a power source 1308A, 1308B replacement, the quick release features may be configured to release the power source 1308A, 1308B from an engaged position and slide or move away from the frame 1204 of a vehicle 100. Once removed, the power source 1308A, 1308B may be replaced (e.g., with a new power source, a charged power source, etc.) by engaging the replacement power source into a system receiving position adjacent to the vehicle 100. In some embodiments, the vehicle 100 may include one or more actuators configured to position, lift, slide, or otherwise engage the replacement power source with the vehicle 100. In one embodiment, the replacement power source may be inserted into the vehicle 100 or vehicle frame 1204 with mechanisms and/or machines that are external or separate from the vehicle 100.


In some embodiments, the frame 1204 may include one or more features configured to selectively interconnect with other vehicles and/or portions of vehicles. These selectively interconnecting features can allow for one or more vehicles to selectively couple together and decouple for a variety of purposes. For example, it is an aspect of the present disclosure that a number of vehicles may be selectively coupled together to share energy, increase power output, provide security, decrease power consumption, provide towing services, and/or provide a range of other benefits. Continuing this example, the vehicles may be coupled together based on travel route, destination, preferences, settings, sensor information, and/or some other data. The coupling may be initiated by at least one controller of the vehicle and/or traffic control system upon determining that a coupling is beneficial to one or more vehicles in a group of vehicles or a traffic system. As can be appreciated, the power consumption for a group of vehicles traveling in a same direction may be reduced or decreased by removing any aerodynamic separation between vehicles. In this case, the vehicles may be coupled together to subject only the foremost vehicle in the coupling to air and/or wind resistance during travel. In one embodiment, the power output by the group of vehicles may be proportionally or selectively controlled to provide a specific output from each of the one or more of the vehicles in the group.


The interconnecting, or coupling, features may be configured as electromagnetic mechanisms, mechanical couplings, electromechanical coupling mechanisms, etc., and/or combinations thereof. The features may be selectively deployed from a portion of the frame 1204 and/or body of the vehicle 100. In some cases, the features may be built into the frame 1204 and/or body of the vehicle 100. In any event, the features may deploy from an unexposed position to an exposed position or may be configured to selectively engage/disengage without requiring an exposure or deployment of the mechanism from the frame 1204 and/or body. In some embodiments, the interconnecting features may be configured to interconnect one or more of power, communications, electrical energy, fuel, and/or the like. One or more of the power, mechanical, and/or communications connections between vehicles may be part of a single interconnection mechanism. In some embodiments, the interconnection mechanism may include multiple connection mechanisms. In any event, the single interconnection mechanism or the interconnection mechanism may employ the poka-yoke features as described above.


The power system of the vehicle 100 may include the powertrain, power distribution system, accessory power system, and/or any other components that store power, provide power, convert power, and/or distribute power to one or more portions of the vehicle 100. The powertrain may include the one or more electric motors 1312 of the vehicle 100. The electric motors 1312 are configured to convert electrical energy provided by a power source into mechanical energy. This mechanical energy may be in the form of a rotational or other output force that is configured to propel or otherwise provide a motive force for the vehicle 100.


In some embodiments, the vehicle 100 may include one or more drive wheels 1320 that are driven by the one or more electric motors 1312 and motor controllers 1314. In some cases, the vehicle 100 may include an electric motor 1312 configured to provide a driving force for each drive wheel 1320. In other cases, a single electric motor 1312 may be configured to share an output force between two or more drive wheels 1320 via one or more power transmission components. It is an aspect of the present disclosure that the powertrain include one or more power transmission components, motor controllers 1314, and/or power controllers that can provide a controlled output of power to one or more of the drive wheels 1320 of the vehicle 100. The power transmission components, power controllers, or motor controllers 1314 may be controlled by at least one other vehicle controller described herein.


As provided above, the powertrain of the vehicle 100 may include one or more power sources 1308A, 1308B. These one or more power sources 1308A, 1308B may be configured to provide drive power, system and/or subsystem power, accessory power, etc. While described herein as a single power source 1308 for sake of clarity, embodiments of the present disclosure are not so limited. For example, it should be appreciated that independent, different, or separate power sources 1308A, 1308B may provide power to various systems of the vehicle 100. For instance, a drive power source may be configured to provide the power for the one or more electric motors 1312 of the vehicle 100, while a system power source may be configured to provide the power for one or more other systems and/or subsystems of the vehicle 100. Other power sources may include an accessory power source, a backup power source, a critical system power source, and/or other separate power sources. Separating the power sources 1308A, 1308B in this manner may provide a number of benefits over conventional vehicle systems. For example, separating the power sources 1308A, 1308B allow one power source 1308 to be removed and/or replaced independently without requiring that power be removed from all systems and/or subsystems of the vehicle 100 during a power source 1308 removal/replacement. For instance, one or more of the accessories, communications, safety equipment, and/or backup power systems, etc., may be maintained even when a particular power source 1308A, 1308B is depleted, removed, or becomes otherwise inoperable.


In some embodiments, the drive power source may be separated into two or more cells, units, sources, and/or systems. By way of example, a vehicle 100 may include a first drive power source 1308A and a second drive power source 1308B. The first drive power source 1308A may be operated independently from or in conjunction with the second drive power source 1308B and vice versa. Continuing this example, the first drive power source 1308A may be removed from a vehicle while a second drive power source 1308B can be maintained in the vehicle 100 to provide drive power. This approach allows the vehicle 100 to significantly reduce weight (e.g., of the first drive power source 1308A, etc.) and improve power consumption, even if only for a temporary period of time. In some cases, a vehicle 100 running low on power may automatically determine that pulling over to a rest area, emergency lane, and removing, or “dropping off,” at least one power source 1308A, 1308B may reduce enough weight of the vehicle 100 to allow the vehicle 100 to navigate to the closest power source replacement and/or charging area. In some embodiments, the removed, or “dropped off,” power source 1308A may be collected by a collection service, vehicle mechanic, tow truck, or even another vehicle or individual.


The power source 1308 may include a GPS or other geographical location system that may be configured to emit a location signal to one or more receiving entities. For instance, the signal may be broadcast or targeted to a specific receiving party. Additionally or alternatively, the power source 1308 may include a unique identifier that may be used to associate the power source 1308 with a particular vehicle 100 or vehicle user. This unique identifier may allow an efficient recovery of the power source 1308 dropped off. In some embodiments, the unique identifier may provide information for the particular vehicle 100 or vehicle user to be billed or charged with a cost of recovery for the power source 1308.


The power source 1308 may include a charge controller 1324 that may be configured to determine charge levels of the power source 1308, control a rate at which charge is drawn from the power source 1308, control a rate at which charge is added to the power source 1308, and/or monitor a health of the power source 1308 (e.g., one or more cells, portions, etc.). In some embodiments, the charge controller 1324 or the power source 1308 may include a communication interface. The communication interface can allow the charge controller 1324 to report a state of the power source 1308 to one or more other controllers of the vehicle 100 or even communicate with a communication device separate and/or apart from the vehicle 100. Additionally or alternatively, the communication interface may be configured to receive instructions (e.g., control instructions, charge instructions, communication instructions, etc.) from one or more other controllers of the vehicle 100 or a communication device that is separate and/or apart from the vehicle 100.


The powertrain includes one or more power distribution systems configured to transmit power from the power source 1308 to one or more electric motors 1312 in the vehicle 100. The power distribution system may include electrical interconnections 1328 in the form of cables, wires, traces, wireless power transmission systems, etc., and/or combinations thereof. It is an aspect of the present disclosure that the vehicle 100 include one or more redundant electrical interconnections 1332 of the power distribution system. The redundant electrical interconnections 1332 can allow power to be distributed to one or more systems and/or subsystems of the vehicle 100 even in the event of a failure of an electrical interconnection portion of the vehicle 100 (e.g., due to an accident, mishap, tampering, or other harm to a particular electrical interconnection, etc.). In some embodiments, a user of a vehicle 100 may be alerted via a user interface associated with the vehicle 100 that a redundant electrical interconnection 1332 is being used and/or damage has occurred to a particular area of the vehicle electrical system. In any event, the one or more redundant electrical interconnections 1332 may be configured along completely different routes than the electrical interconnections 1328 and/or include different modes of failure than the electrical interconnections 1328 to, among other things, prevent a total interruption power distribution in the event of a failure.


In some embodiments, the power distribution system may include an energy recovery system 1336. This energy recovery system 1336, or kinetic energy recovery system, may be configured to recover energy produced by the movement of a vehicle 100. The recovered energy may be stored as electrical and/or mechanical energy. For instance, as a vehicle 100 travels or moves, a certain amount of energy is required to accelerate, maintain a speed, stop, or slow the vehicle 100. In any event, a moving vehicle has a certain amount of kinetic energy. When brakes are applied in a typical moving vehicle, most of the kinetic energy of the vehicle is lost as the generation of heat in the braking mechanism. In an energy recovery system 1336, when a vehicle 100 brakes, at least a portion of the kinetic energy is converted into electrical and/or mechanical energy for storage. Mechanical energy may be stored as mechanical movement (e.g., in a flywheel, etc.) and electrical energy may be stored in batteries, capacitors, and/or some other electrical storage system. In some embodiments, electrical energy recovered may be stored in the power source 1308. For example, the recovered electrical energy may be used to charge the power source 1308 of the vehicle 100.


The vehicle 100 may include one or more safety systems. Vehicle safety systems can include a variety of mechanical and/or electrical components including, but in no way limited to, low impact or energy-absorbing bumpers 1316A, 1316B, crumple zones, reinforced body panels, reinforced frame components, impact bars, power source containment zones, safety glass, seatbelts, supplemental restraint systems, air bags, escape hatches, removable access panels, impact sensors, accelerometers, vision systems, radar systems, etc., and/or the like. In some embodiments, the one or more of the safety components may include a safety sensor or group of safety sensors associated with the one or more of the safety components. For example, a crumple zone may include one or more strain gages, impact sensors, pressure transducers, etc. These sensors may be configured to detect or determine whether a portion of the vehicle 100 has been subjected to a particular force, deformation, or other impact. Once detected, the information collected by the sensors may be transmitted or sent to one or more of a controller of the vehicle 100 (e.g., a safety controller, vehicle controller, etc.) or a communication device associated with the vehicle 100 (e.g., across a communication network, etc.).



FIG. 14 shows a plan view of the vehicle 100 in accordance with embodiments of the present disclosure. In particular, FIG. 14 shows a broken section 1402 of a charging system for the vehicle 100. The charging system may include a plug or receptacle 1404 configured to receive power from an external power source (e.g., a source of power that is external to and/or separate from the vehicle 100, etc.). An example of an external power source may include the standard industrial, commercial, or residential power that is provided across power lines. Another example of an external power source may include a proprietary power system configured to provide power to the vehicle 100. In any event, power received at the plug/receptacle 1404 may be transferred via at least one power transmission interconnection 1408. Similar, if not identical, to the electrical interconnections 1328 described above, the at least one power transmission interconnection 1408 may be one or more cables, wires, traces, wireless power transmission systems, etc., and/or combinations thereof. Electrical energy in the form of charge can be transferred from the external power source to the charge controller 1324. As provided above, the charge controller 1324 may regulate the addition of charge to the power source 1308 of the vehicle 100 (e.g., until the power source 1308 is full or at a capacity, etc.).


In some embodiments, the vehicle 100 may include an inductive charging system and inductive charger 1412. The inductive charger 1412 may be configured to receive electrical energy from an inductive power source external to the vehicle 100. In one embodiment, when the vehicle 100 and/or the inductive charger 1412 is positioned over an inductive power source external to the vehicle 100, electrical energy can be transferred from the inductive power source to the vehicle 100. For example, the inductive charger 1412 may receive the charge and transfer the charge via at least one power transmission interconnection 1408 to the charge controller 1324 and/or the power source 1308 of the vehicle 100. The inductive charger 1412 may be concealed in a portion of the vehicle 100 (e.g., at least partially protected by the frame 1204, one or more body panels 1208, a shroud, a shield, a protective cover, etc., and/or combinations thereof) and/or may be deployed from the vehicle 100. In some embodiments, the inductive charger 1412 may be configured to receive charge only when the inductive charger 1412 is deployed from the vehicle 100. In other embodiments, the inductive charger 1412 may be configured to receive charge while concealed in the portion of the vehicle 100.


In addition to the mechanical components described herein, the vehicle 100 may include a number of user interface devices. The user interface devices receive and translate human input into a mechanical movement or electrical signal or stimulus. The human input may be one or more of motion (e.g., body movement, body part movement, in two-dimensional or three-dimensional space, etc.), voice, touch, and/or physical interaction with the components of the vehicle 100. In some embodiments, the human input may be configured to control one or more functions of the vehicle 100 and/or systems of the vehicle 100 described herein. User interfaces may include, but are in no way limited to, at least one graphical user interface of a display device, steering wheel or mechanism, transmission lever or button (e.g., including park, neutral, reverse, and/or drive positions, etc.), throttle control pedal or mechanism, brake control pedal or mechanism, power control switch, communications equipment, etc.


An embodiment of the electrical system 1500 associated with the vehicle 100 may be as shown in FIG. 15. The electrical system 1500 can include power source(s) that generate power, power storage that stores power, and/or load(s) that consume power. Power sources may be associated with a power generation unit 1504. Power storage may be associated with a power storage system 612. Loads may be associated with loads 1508. The electrical system 1500 may be managed by a power management controller 1324. Further, the electrical system 1500 can include one or more other interfaces or controllers, which can include the billing and cost control unit 1512.


The power generation unit 1504 may be as described in conjunction with FIG. 16. The power storage component 612 may be as described in conjunction with FIG. 17. The loads 1508 may be as described in conjunction with FIG. 18.


The billing and cost control unit 1512 may interface with the power management controller 1324 to determine the amount of charge or power provided to the power storage 612 through the power generation unit 1504. The billing and cost control unit 1512 can then provide information for billing the vehicle owner. Thus, the billing and cost control unit 1512 can receive and/or send power information to third party system(s) regarding the received charge from an external source. The information provided can help determine an amount of money required, from the owner of the vehicle, as payment for the provided power. Alternatively, or in addition, if the owner of the vehicle provided power to another vehicle (or another device/system), that owner may be owed compensation for the provided power or energy, e.g., a credit.


The power management controller 1324 can be a computer or computing system(s) and/or electrical system with associated components, as described herein, capable of managing the power generation unit 1504 to receive power, routing the power to the power storage 612, and then providing the power from either the power generation unit 1504 and/or the power storage 612 to the loads 1508. Thus, the power management controller 1324 may execute programming that controls switches, devices, components, etc. involved in the reception, storage, and provision of the power in the electrical system 1500.


An embodiment of the power generation unit 1504 may be as shown in FIG. 16. Generally, the power generation unit 1504 may be electrically coupled to one or more power sources 1308. The power sources 1308 can include power sources internal and/or associated with the vehicle 100 and/or power sources external to the vehicle 100 to which the vehicle 100 electrically connects. One of the internal power sources can include an on board generator 1604. The generator 1604 may be an alternating current (AC) generator, a direct current (DC) generator or a self-excited generator. The AC generators can include induction generators, linear electric generators, and/or other types of generators. The DC generators can include homopolar generators and/or other types of generators. The generator 1604 can be brushless or include brush contacts and generate the electric field with permanent magnets or through induction. The generator 1604 may be mechanically coupled to a source of kinetic energy, such as an axle or some other power take-off. The generator 1604 may also have another mechanical coupling to an exterior source of kinetic energy, for example, a wind turbine.


Another power source 1308 may include wired or wireless charging 1608. The wireless charging system 1608 may include inductive and/or resonant frequency inductive charging systems that can include coils, frequency generators, controllers, etc. Wired charging may be any kind of grid-connected charging that has a physical connection, although, the wireless charging may be grid connected through a wireless interface. The wired charging system can include an connectors, wired interconnections, the controllers, etc. The wired and wireless charging systems 1608 can provide power to the power generation unit 1504 from external power sources 1308.


Internal sources for power may include a regenerative braking system 1612. The regenerative braking system 1612 can convert the kinetic energy of the moving car into electrical energy through a generation system mounted within the wheels, axle, and/or braking system of the vehicle 100. The regenerative braking system 1612 can include any coils, magnets, electrical interconnections, converters, controllers, etc. required to convert the kinetic energy into electrical energy.


Another source of power 1308, internal to or associated with the vehicle 100, may be a solar array 1616. The solar array 1616 may include any system or device of one or more solar cells mounted on the exterior of the vehicle 100 or integrated within the body panels of the vehicle 100 that provides or converts solar energy into electrical energy to provide to the power generation unit 1504.


The power sources 1308 may be connected to the power generation unit 1504 through an electrical interconnection 1618. The electrical interconnection 1618 can include any wire, interface, bus, etc. between the one or more power sources 1308 and the power generation unit 1504.


The power generation unit 1504 can also include a power source interface 1620. The power source interface 1620 can be any type of physical and/or electrical interface used to receive the electrical energy from the one or more power sources 1308; thus, the power source interface 1620 can include an electrical interface 1624 that receives the electrical energy and a mechanical interface 1628 which may include wires, connectors, or other types of devices or physical connections. The mechanical interface 1608 can also include a physical/electrical connection 1634 to the power generation unit 1504.


The electrical energy from the power source 1308 can be processed through the power source interface 1624 to an electric converter 1632. The electric converter 1632 may convert the characteristics of the power from one of the power sources into a useable form that may be used either by the power storage 612 or one or more loads 1508 within the vehicle 100. The electrical converter 1624 may include any electronics or electrical devices and/or component that can change electrical characteristics, e.g., AC frequency, amplitude, phase, etc. associated with the electrical energy provided by the power source 1308. The converted electrical energy may then be provided to an optional conditioner 1638. The conditioner 1638 may include any electronics or electrical devices and/or component that may further condition the converted electrical energy by removing harmonics, noise, etc. from the electrical energy to provide a more stable and effective form of power to the vehicle 100.


An embodiment of the power storage 1612 may be as shown in FIG. 17. The power storage unit can include an electrical converter 1632b, one or more batteries, one or more rechargeable batteries, one or more capacitors, one or more accumulators, one or more supercapacitors, one or more ultrabatteries, and/or superconducting magnetics 1704, and/or a charge management unit 1708. The converter 1632b may be the same or similar to the electrical converter 1632a shown in FIG. 16. The converter 1632b may be a replacement for the electric converter 1632a shown in FIG. 16 and thus eliminate the need for the electrical converter 1632a as shown in FIG. 16. However, if the electrical converter 1632a is provided in the power generation unit 1504, the converter 1632b, as shown in the power storage unit 612, may be eliminated. The converter 1632b can also be redundant or different from the electrical converter 1632a shown in FIG. 16 and may provide a different form of energy to the battery and/or capacitors 1704. Thus, the converter 1632b can change the energy characteristics specifically for the battery/capacitor 1704.


The battery 1704 can be any type of battery for storing electrical energy, for example, a lithium ion battery, a lead acid battery, a nickel cadmium battery, etc. Further, the battery 1704 may include different types of power storage systems, such as, ionic fluids or other types of fuel cell systems. The energy storage 1704 may also include one or more high-capacity capacitors 1704. The capacitors 1704 may be used for long-term or short-term storage of electrical energy. The input into the battery or capacitor 1704 may be different from the output, and thus, the capacitor 1704 may be charged quickly but drain slowly. The functioning of the converter 1632 and battery capacitor 1704 may be monitored or managed by a charge management unit 1708.


The charge management unit 1708 can include any hardware (e.g., any electronics or electrical devices and/or components), software, or firmware operable to adjust the operations of the converter 1632 or batteries/capacitors 1704. The charge management unit 1708 can receive inputs or periodically monitor the converter 1632 and/or battery/capacitor 1704 from this information; the charge management unit 1708 may then adjust settings or inputs into the converter 1632 or battery/capacitor 1704 to control the operation of the power storage system 612.


An embodiment of one or more loads 1508 associated with the vehicle 100 may be as shown in FIG. 18. The loads 1508 may include a bus or electrical interconnection system 1802, which provides electrical energy to one or more different loads within the vehicle 100. The bus 1802 can be any number of wires or interfaces used to connect the power generation unit 1504 and/or power storage 1612 to the one or more loads 1508. The converter 1632c may be an interface from the power generation unit 1504 or the power storage 612 into the loads 1508. The converter 1632c may be the same or similar to electric converter 1632a as shown in FIG. 16. Similar to the discussion of the converter 1632b in FIG. 17, the converter 1632c may be eliminated, if the electric converter 1632a, shown in FIG. 16, is present. However, the converter 1632c may further condition or change the energy characteristics for the bus 1802 for use by the loads 1508. The converter 1632c may also provide electrical energy to electric motor 1804, which may power the vehicle 100.


The electric motor 1804 can be any type of DC or AC electric motor. The electric motor may be a direct drive or induction motor using permanent magnets and/or winding either on the stator or rotor. The electric motor 1804 may also be wireless or include brush contacts. The electric motor 1804 may be capable of providing a torque and enough kinetic energy to move the vehicle 100 in traffic.


The different loads 1508 may also include environmental loads 1812, sensor loads 1816, safety loads 1820, user interaction loads 1808, etc. User interaction loads 1808 can be any energy used by user interfaces or systems that interact with the driver and/or passenger(s). These loads 1808 may include, for example, the heads up display, the dash display, the radio, user interfaces on the head unit, lights, radio, and/or other types of loads that provide or receive information from the occupants of the vehicle 100. The environmental loads 1812 can be any loads used to control the environment within the vehicle 100. For example, the air conditioning or heating unit of the vehicle 100 can be environmental loads 1812. Other environmental loads can include lights, fans, and/or defrosting units, etc. that may control the environment within the vehicle 100. The sensor loads 1816 can be any loads used by sensors, for example, air bag sensors, GPS, and other such sensors used to either manage or control the vehicle 100 and/or provide information or feedback to the vehicle occupants. The safety loads 1820 can include any safety equipment, for example, seat belt alarms, airbags, headlights, blinkers, etc. that may be used to manage the safety of the occupants. There may be more or fewer loads than those described herein, although they may not be shown in FIG. 18.



FIG. 19 illustrates an exemplary hardware diagram of communications componentry that can be optionally associated with the vehicle.


The communications componentry can include one or more wired or wireless devices such as a transceiver(s) and/or modem that allows communications not only between the various systems disclosed herein but also with other devices, such as devices on a network, and/or on a distributed network such as the Internet and/or in the cloud.


The communications subsystem can also include inter- and intra-vehicle communications capabilities such as hotspot and/or access point connectivity for any one or more of the vehicle occupants and/or vehicle-to-vehicle communications.


Additionally, and while not specifically illustrated, the communications subsystem can include one or more communications links (that can be wired or wireless) and/or communications busses (managed by the bus manager 1974), including one or more of CANbus, OBD-II, ARCINC 429, Byteflight, CAN (Controller Area Network), D2B (Domestic Digital Bus), FlexRay, DC-BUS, IDB-1394, IEBus, I2C, ISO 9141-1/-2, J1708, J1587, J1850, J1939, ISO 11783, Keyword Protocol 2000, LIN (Local Interconnect Network), MOST (Media Oriended Systems Transport), Multifunction Vehicle Bus, SMARTwireX, SPI, VAN (Vehicle Area Network), and the like or in general any communications protocol and/or standard.


The various protocols and communications can be communicated one or more of wirelessly and/or over transmission media such as single wire, twisted pair, fibre optic, IEEE 1394, MIL-STD-1553, MIL-STD-1773, power-line communication, or the like. (All of the above standards and protocols are incorporated herein by reference in their entirety)


As discussed, the communications subsystem enables communications between any if the inter-vehicle systems and subsystems as well as communications with non-collocated resources, such as those reachable over a network such as the Internet.


The communications subsystem, in addition to well-known componentry (which has been omitted for clarity), the device communications subsystem 1900 includes interconnected elements including one or more of: one or more antennas 1904, an interleaver/deinterleaver 1908, an analog front end (AFE) 1912, memory/storage/cache 1916, controller/microprocessor 1920, MAC circuitry 1922, modulator/demodulator 1924, encoder/decoder 1928, a plurality of connectivity managers 1934-1966, GPU 1940, accelerator 1944, a multiplexer/demultiplexer 1954, transmitter 1970, receiver 1972 and wireless radio 1978 components such as a Wi-Fi PHY/Bluetooth® module 1980, a Wi-Fi/BT MAC module 1984, transmitter 1988 and receiver 1992. The various elements in the device 1900 are connected by one or more links/busses 5 (not shown, again for sake of clarity).


The device 400 can have one more antennas 1904, for use in wireless communications such as multi-input multi-output (MIMO) communications, multi-user multi-input multi-output (MU-MIMO) communications Bluetooth®, LTE, 4G, 5G, Near-Field Communication (NFC), etc. The antenna(s) 1904 can include, but are not limited to one or more of directional antennas, omnidirectional antennas, monopoles, patch antennas, loop antennas, microstrip antennas, dipoles, and any other antenna(s) suitable for communication transmission/reception. In an exemplary embodiment, transmission/reception using MIMO may require particular antenna spacing. In another exemplary embodiment, MIMO transmission/reception can enable spatial diversity allowing for different channel characteristics at each of the antennas. In yet another embodiment, MIMO transmission/reception can be used to distribute resources to multiple users for example within the vehicle and/or in another vehicle.


Antenna(s) 1904 generally interact with the Analog Front End (AFE) 1912, which is needed to enable the correct processing of the received modulated signal and signal conditioning for a transmitted signal. The AFE 1912 can be functionally located between the antenna and a digital baseband system in order to convert the analog signal into a digital signal for processing and vice-versa.


The subsystem 1900 can also include a controller/microprocessor 1920 and a memory/storage/cache 1916. The subsystem 1900 can interact with the memory/storage/cache 1916 which may store information and operations necessary for configuring and transmitting or receiving the information described herein. The memory/storage/cache 1916 may also be used in connection with the execution of application programming or instructions by the controller/microprocessor 1920, and for temporary or long term storage of program instructions and/or data. As examples, the memory/storage/cache 1920 may comprise a computer-readable device, RAM, ROM, DRAM, SDRAM, and/or other storage device(s) and media.


The controller/microprocessor 1920 may comprise a general purpose programmable processor or controller for executing application programming or instructions related to the subsystem 1900. Furthermore, the controller/microprocessor 1920 can perform operations for configuring and transmitting/receiving information as described herein. The controller/microprocessor 1920 may include multiple processor cores, and/or implement multiple virtual processors. Optionally, the controller/microprocessor 1920 may include multiple physical processors. By way of example, the controller/microprocessor 1920 may comprise a specially configured Application Specific Integrated Circuit (ASIC) or other integrated circuit, a digital signal processor(s), a controller, a hardwired electronic or logic circuit, a programmable logic device or gate array, a special purpose computer, or the like.


The subsystem 1900 can further include a transmitter 1970 and receiver 1972 which can transmit and receive signals, respectively, to and from other devices, subsystems and/or other destinations using the one or more antennas 1904 and/or links/busses. Included in the subsystem 1900 circuitry is the medium access control or MAC Circuitry 1922. MAC circuitry 1922 provides for controlling access to the wireless medium. In an exemplary embodiment, the MAC circuitry 1922 may be arranged to contend for the wireless medium and configure frames or packets for communicating over the wireless medium.


The subsystem 1900 can also optionally contain a security module (not shown). This security module can contain information regarding but not limited to, security parameters required to connect the device to one or more other devices or other available network(s), and can include WEP or WPA/WPA-2 (optionally+AES and/or TKIP) security access keys, network keys, etc. The WEP security access key is a security password used by Wi-Fi networks. Knowledge of this code can enable a wireless device to exchange information with an access point and/or another device. The information exchange can occur through encoded messages with the WEP access code often being chosen by the network administrator. WPA is an added security standard that is also used in conjunction with network connectivity with stronger encryption than WEP.


The exemplary subsystem 1900 also includes a GPU 1940, an accelerator 1944, a Wi-Fi/BT/BLE PHY module 1980 and a Wi-Fi/BT/BLE MAC module 1984 and wireless transmitter 1988 and receiver 1992. In some embodiments, the GPU 1940 may be a graphics processing unit, or visual processing unit, comprising at least one circuit and/or chip that manipulates and changes memory to accelerate the creation of images in a frame buffer for output to at least one display device. The GPU 1940 may include one or more of a display device connection port, printed circuit board (PCB), a GPU chip, a metal-oxide-semiconductor field-effect transistor (MOSFET), memory (e.g., single data rate random-access memory (SDRAM), double data rate random-access memory (DDR) RAM, etc., and/or combinations thereof), a secondary processing chip (e.g., handling video out capabilities, processing, and/or other functions in addition to the GPU chip, etc.), a capacitor, heatsink, temperature control or cooling fan, motherboard connection, shielding, and the like.


The various connectivity managers 1934-1966 (even) manage and/or coordinate communications between the subsystem 1900 and one or more of the systems disclosed herein and one or more other devices/systems. The connectivity managers include an emergency charging connectivity manager 1934, an aerial charging connectivity manager 1938, a roadway charging connectivity manager 1942, an overhead charging connectivity manager 1946, a robotic charging connectivity manager 1950, a static charging connectivity manager 1954, a vehicle database connectivity manager 1958, a remote operating system connectivity manager 1962 and a sensor connectivity manager 1966.


The emergency charging connectivity manager 1934 can coordinate not only the physical connectivity between the vehicle and the emergency charging device/vehicle, but can also communicate with one or more of the power management controller, one or more third parties and optionally a billing system(s). As an example, the vehicle can establish communications with the emergency charging device/vehicle to one or more of coordinate interconnectivity between the two (e.g., by spatially aligning the charging receptacle on the vehicle with the charger on the emergency charging vehicle) and optionally share navigation information. Once charging is complete, the amount of charge provided can be tracked and optionally forwarded to, for example, a third party for billing. In addition to being able to manage connectivity for the exchange of power, the emergency charging connectivity manager 1934 can also communicate information, such as billing information to the emergency charging vehicle and/or a third party. This billing information could be, for example, the owner of the vehicle, the driver of the vehicle, company information, or in general any information usable to charge the appropriate entity for the power received.


The aerial charging connectivity manager 1938 can coordinate not only the physical connectivity between the vehicle and the aerial charging device/vehicle, but can also communicate with one or more of the power management controller, one or more third parties and optionally a billing system(s). As an example, the vehicle can establish communications with the aerial charging device/vehicle to one or more of coordinate interconnectivity between the two (e.g., by spatially aligning the charging receptacle on the vehicle with the charger on the emergency charging vehicle) and optionally share navigation information. Once charging is complete, the amount of charge provided can be tracked and optionally forwarded to, for example, a third party for billing. In addition to being able to manage connectivity for the exchange of power, the aerial charging connectivity manager 1938 can similarly communicate information, such as billing information to the aerial charging vehicle and/or a third party. This billing information could be, for example, the owner of the vehicle, the driver of the vehicle, company information, or in general any information usable to charge the appropriate entity for the power received etc., as discussed.


The roadway charging connectivity manager 1942 and overhead charging connectivity manager 1946 can coordinate not only the physical connectivity between the vehicle and the charging device/system, but can also communicate with one or more of the power management controller, one or more third parties and optionally a billing system(s). As one example, the vehicle can request a charge from the charging system when, for example, the vehicle needs or is predicted to need power. As an example, the vehicle can establish communications with the charging device/vehicle to one or more of coordinate interconnectivity between the two for charging and share information for billing. Once charging is complete, the amount of charge provided can be tracked and optionally forwarded to, for example, a third party for billing. This billing information could be, for example, the owner of the vehicle, the driver of the vehicle, company information, or in general any information usable to charge the appropriate entity for the power received etc., as discussed. The person responsible for paying for the charge could also receive a copy of the billing information as is customary. The robotic charging connectivity manager 1950 and static charging connectivity manager 1954 can operate in a similar manner to that described herein.


The vehicle database connectivity manager 1958 allows the subsystem to receive and/or share information stored in the vehicle database. This information can be shared with other vehicle components/subsystems and/or other entities, such as third parties and/or charging systems. The information can also be shared with one or more vehicle occupant devices, such as an app on a mobile device the driver uses to track information about the vehicle and/or a dealer or service/maintenance provider. In general, any information stored in the vehicle database can optionally be shared with any one or more other devices optionally subject to any privacy or confidentially restrictions.


The remote operating system connectivity manager 1962 facilitates communications between the vehicle and any one or more autonomous vehicle systems. These communications can include one or more of navigation information, vehicle information, occupant information, or in general any information related to the remote operation of the vehicle.


The sensor connectivity manager 1966 facilitates communications between any one or more of the vehicle sensors and any one or more of the other vehicle systems. The sensor connectivity manager 1966 can also facilitate communications between any one or more of the sensors and/or vehicle systems and any other destination, such as a service company, app, or in general to any destination where sensor data is needed.


In accordance with one exemplary embodiment, any of the communications discussed herein can be communicated via the conductor(s) used for charging. One exemplary protocol usable for these communications is Power-line communication (PLC). PLC is a communication protocol that uses electrical wiring to simultaneously carry both data, and Alternating Current (AC) electric power transmission or electric power distribution. It is also known as power-line carrier, power-line digital subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN). For DC environments in vehicles PLC can be used in conjunction with CAN-bus, LIN-bus over power line (DC-LIN) and DC-BUS.


The communications subsystem can also optionally manage one or more identifiers, such as an IP (internet protocol) address(es), associated with the vehicle and one or other system or subsystems or components therein. These identifiers can be used in conjunction with any one or more of the connectivity managers as discussed herein.



FIG. 19B illustrates a block diagram of a computing environment 1901 that may function as the servers, user computers, or other systems provided and described above. The environment 1901 includes one or more user computers, or computing devices, such as a vehicle computing device 1903, a communication device 1907, and/or more 1911. The computing devices 1903, 1907, 1911 may include general purpose personal computers (including, merely by way of example, personal computers, and/or laptop computers running various versions of Microsoft Corp.'s Windows® and/or Apple Corp.'s Macintosh® operating systems) and/or workstation computers running any of a variety of commercially-available UNIX® or UNIX-like operating systems. These computing devices 1903, 1907, 1911 may also have any of a variety of applications, including for example, database client and/or server applications, and web browser applications. Alternatively, the computing devices 1903, 1907, 1911 may be any other electronic device, such as a thin-client computer, Internet-enabled mobile telephone, and/or personal digital assistant, capable of communicating via a network 1909 and/or displaying and navigating web pages or other types of electronic documents. Although the exemplary computer environment 1901 is shown with two computing devices, any number of user computers or computing devices may be supported.


Environment 1901 further includes a network 1909. The network 1909 may can be any type of network familiar to those skilled in the art that can support data communications using any of a variety of commercially-available protocols, including without limitation SIP, TCP/IP, SNA, IPX, AppleTalk, and the like. Merely by way of example, the network 1909 maybe a local area network (“LAN”), such as an Ethernet network, a Token-Ring network and/or the like; a wide-area network; a virtual network, including without limitation a virtual private network (“VPN”); the Internet; an intranet; an extranet; a public switched telephone network (“PSTN”); an infra-red network; a wireless network (e.g., a network operating under any of the IEEE 802.9 suite of protocols, the Bluetooth® protocol known in the art, and/or any other wireless protocol); and/or any combination of these and/or other networks.


The system may also include one or more servers 1913, 1915. In this example, server 1913 is shown as a web server and server 1915 is shown as an application server. The web server 1913, which may be used to process requests for web pages or other electronic documents from computing devices 1903, 1907, 1911. The web server 1913 can be running an operating system including any of those discussed above, as well as any commercially-available server operating systems. The web server 1913 can also run a variety of server applications, including SIP servers, HTTP servers, FTP servers, CGI servers, database servers, Java servers, and the like. In some instances, the web server 1913 may publish operations available operations as one or more web services.


The environment 1901 may also include one or more file and or/application servers 1915, which can, in addition to an operating system, include one or more applications accessible by a client running on one or more of the computing devices 1903, 1907, 1911. The server(s) 1915 and/or 1913 may be one or more general purpose computers capable of executing programs or scripts in response to the computing devices 1903, 1907, 1911. As one example, the server 1915, 1913 may execute one or more web applications. The web application may be implemented as one or more scripts or programs written in any programming language, such as Java™, C, C#°, or C++, and/or any scripting language, such as Perl, Python, or TCL, as well as combinations of any programming/scripting languages. The application server(s) 1915 may also include database servers, including without limitation those commercially available from Oracle, Microsoft, Sybase™, IBM™ and the like, which can process requests from database clients running on a computing device 1903, 1907, 1911.


The web pages created by the server 1913 and/or 1915 may be forwarded to a computing device 1903, 1907, 1911 via a web (file) server 1913, 1915. Similarly, the web server 1913 may be able to receive web page requests, web services invocations, and/or input data from a computing device 1903, 1907, 1911 (e.g., a user computer, etc.) and can forward the web page requests and/or input data to the web (application) server 1915. In further embodiments, the server 1915 may function as a file server. Although for ease of description, FIG. 19B illustrates a separate web server 1913 and file/application server 1915, those skilled in the art will recognize that the functions described with respect to servers 1913, 1915 may be performed by a single server and/or a plurality of specialized servers, depending on implementation-specific needs and parameters. The computer systems 1903, 1907, 1911, web (file) server 1913 and/or web (application) server 1915 may function as the system, devices, or components described in FIGS. 1-19A.


The environment 1901 may also include a database 1917. The database 1917 may reside in a variety of locations. By way of example, database 1917 may reside on a storage medium local to (and/or resident in) one or more of the computers 1903, 1907, 1911, 1913, 1915. Alternatively, it may be remote from any or all of the computers 1903, 1907, 1911, 1913, 1915, and in communication (e.g., via the network 1909) with one or more of these. The database 1917 may reside in a storage-area network (“SAN”) familiar to those skilled in the art. Similarly, any necessary files for performing the functions attributed to the computers 1903, 1907, 1911, 1913, 1915 may be stored locally on the respective computer and/or remotely, as appropriate. The database 1917 may be a relational database, such as Oracle 20i®, that is adapted to store, update, and retrieve data in response to SQL-formatted commands.



FIG. 19C illustrates one embodiment of a computer system 1919 upon which the servers, user computers, computing devices, or other systems or components described above may be deployed or executed. The computer system 1919 is shown comprising hardware elements that may be electrically coupled via a bus 1921. The hardware elements may include one or more central processing units (CPUs) 1923; one or more input devices 1925 (e.g., a mouse, a keyboard, etc.); and one or more output devices 1927 (e.g., a display device, a printer, etc.). The computer system 1919 may also include one or more storage devices 1929. By way of example, storage device(s) 1929 may be disk drives, optical storage devices, solid-state storage devices such as a random access memory (“RAM”) and/or a read-only memory (“ROM”), which can be programmable, flash-updateable and/or the like.


The computer system 1919 may additionally include a computer-readable storage media reader 1931; a communications system 1933 (e.g., a modem, a network card (wireless or wired), an infra-red communication device, etc.); and working memory 1937, which may include RAM and ROM devices as described above. The computer system 1919 may also include a processing acceleration unit 1935, which can include a DSP, a special-purpose processor, and/or the like.


The computer-readable storage media reader 1931 can further be connected to a computer-readable storage medium, together (and, optionally, in combination with storage device(s) 1929) comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing computer-readable information. The communications system 1933 may permit data to be exchanged with a network and/or any other computer described above with respect to the computer environments described herein. Moreover, as disclosed herein, the term “storage medium” may represent one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information.


The computer system 1919 may also comprise software elements, shown as being currently located within a working memory 1937, including an operating system 1939 and/or other code 1941. It should be appreciated that alternate embodiments of a computer system 1919 may have numerous variations from that described above. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed.


Examples of the processors 1923 as described herein may include, but are not limited to, at least one of Qualcomm® Snapdragon® 800 and 801, Qualcomm® Snapdragon® 620 and 615 with 4G LTE Integration and 64-bit computing, Apple® A7 processor with 64-bit architecture, Apple® M7 motion coprocessors, Samsung® Exynos® series, the Intel® Core™ family of processors, the Intel® Xeon® family of processors, the Intel® Atom™ family of processors, the Intel Itanium® family of processors, Intel® Core® i5-4670K and i7-4770K 22 nm Haswell, Intel® Core® i5-3570K 22 nm Ivy Bridge, the AMID® FX™ family of processors, AMD® FX-4300, FX-6300, and FX-8350 32 nm Vishera, AMD® Kaveri processors, Texas Instruments® Jacinto C6000™ automotive infotainment processors, Texas Instruments® OMAP™ automotive-grade mobile processors, ARM® Cortex™-M processors, ARM® Cortex-A and ARIV1926EJS™ processors, other industry-equivalent processors, and may perform computational functions using any known or future-developed standard, instruction set, libraries, and/or architecture.


Authentication can be an important capability of the computing environment 1901. For example, authentication of the operator and/or computing system 1903 can be used to control an operation or function of the computing system 1903 or vehicle 120 (such as locking or unlocking the vehicle, raising or lowering a window, selecting auto-adjustable seat, steering column/wheel, peddle, climate control, etc. settings, starting a power source or driving or otherwise operating the vehicle, enabling user or user portable device access to a local area network and/or on board computing components, completing a purchase of a product or service by the operator, a passenger or occupant, or the computing system 1903 itself, completing a license check to confirm proper usage of an on board component, such as a software and/or hardware and/or other component of the computing system or battery pack, and the like. Examples include authentication for such things as battery licensing, purchasing a charge (e.g., by amp-hour, distance traveled, overall wattage, amperes, etc.) or fuel, making a product purchase at a drive-thru, etc. As will be appreciated, in REVs amp-hour is directly proportional to the load, and wattage is a function of voltage and amperes.


Authentication can be a multi-factor authentication which enables or permits the operation or function to be performed or access to be granted only after an authentication mechanism successfully verifies or validates multiple items of information (“authentication information”). Any number of factors can be used for authentication. The use of multiple authentication factors in authentication assumes that an unauthorized actor is unlikely to supply the factors required for access. If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, authentication is not successful and the requested function or access or other operation is denied.


Authentication can use a credential or key generated or derived by a cryptographic algorithm or engine from multiple factors. The key can be an authentication key, benign key, content-encryption key, crypto ignition key, cryptovariable, derived key, electronic key, ephemeral key, key encryption key, key production key, master key, master encryption key, public/private key, session key, symmetric key, asymmetric key, traffic encryption key, transmission security key, seed key, signature key, or stream key. Exemplary cryptographic algorithms used for key generation and/or authentication include a key derivation function, keystream generator, cryptographic hash function, key derivation function, cryptographic pseudorandom number generator, cryptanalytic algorithm, broken cryptography algorithm, asymmetric key algorithm, information-theoretically secure algorithm, integer factorization algorithm, symmetric key algorithm, Type 1, 2, or 2 3 encryption algorithm, advanced access content system, cipher block chain, and the like.


The factors can be static or dynamic. They can relate to an operator or passenger of the vehicle, his or her portable computing or communication device (e.g., smart phone, tablet computer, laptop, and the like), or the vehicle itself or a vehicle component (e.g., battery pack, chassis, motor or engine, etc.).


Operator or passenger factors include biometric data. Biometric data relates to a metric of a physiological or behavioral human characteristic. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to, fingerprint, palm veins, face recognition (e.g., facial characteristic or digital face mapping parameter(s)), DNA, palm print, hand geometry (e.g., hand geometry characteristic or digital hand geometry mapping parameter(s)), iris recognition (e.g., iris characteristic or digital iris mapping parameter(s)), retina (e.g., retina characteristic or digital retina mapping parameter(s)), and odor and/or scent. Behavioral characteristics are related to the pattern of behavior of a person, including, but not limited to, typing rhythm, typing speed, pattern in key press intervals, gait, and voice (e.g., voice audible or spectral characteristic or digital voice print mapping parameter(s)).


Portable computing device or communication device 1907 factors include keyless remote identifier, communication device Electronic Serial Number (“ESN”), Mobile Equipment Identifier (“MEID”), International Mobile Equipment Identity (“MEI”), International Mobile Subscriber Identity (“IMSI”) number (stored on a Subscriber Identity Module (“SIM”) card), Temporary Mobile Subscriber Identity (“TMSI”), telephone number, and Mobile IP (“MIP”) (optionally in conjunction with one or more public/private keys).


As will be appreciated, keyless remotes contain a short-range radio transmitter and must be within a certain range, usually about 5-20 meters, of the wireless radio signal receiver unit in the car to operate. When a button on the keyless remote is pushed, the keyless remote sends a coded signal by radio waves to the receiver unit in the car. Keyless remotes typically operate at a frequency of about 315 MHz for North America-made cars and at about 433.92 MHz for European, Japanese and Asian cars.


ESNs are often represented as either 11-digit decimal numbers or 8 digit hexadecimal numbers. For the decimal format the first three digits are the decimal representation of the first 8 bits (between 000 and 255 inclusive) and the next 8 digits are derived from the remaining 24 bits and will be between 00000000 and 16777215 inclusive. The decimal format of pseudo ESNs will therefore begin with 128. The decimal format separately displays 8 bit manufacturer codes in the first 3 digits, but 14 bit codes are not displayed as separate digits. The hexadecimal format displays an ESN as 8 digits and also does not separately display 14 bit manufacturer codes which occupy 3.5 hexadecimal digits.


A mobile equipment identifier (MEID) is a globally unique number identifying a physical piece of CDMA2000 mobile station equipment. The number format is defined by the 3GPP2 report SR0048 but in practical terms, it can be seen as an IMEI (discussed below) but with hexadecimal digits. An MEID is 56 bits long (14 hex digits). It comprises three fields, including an 8-bit regional code (RR), a 24-bit manufacturer code, and a 24-bit manufacturer-assigned serial number. The check digit (CD) is not considered part of the MEID.


The IMEI (15 decimal digits: 14 digits plus a check digit) or IMEISV (16 digits) includes information on the origin, model, and serial number of the device. The structure of the IMEI/SV is specified in 3GPP TS 23.003. The model and origin comprise the initial 8-digit portion of the IMEI/SV, known as the Type Allocation Code (TAC). The remainder of the IMEI is manufacturer-defined, with a Luhn check digit at the end.


The International Mobile Subscriber Identity or IMSI is used to identify the user of a cellular network and is a unique identification associated with all cellular networks. It is stored as a 64 bit field and is sent by the phone to the network. An IMSI is usually presented as a 15 digit number, but can be shorter. The first 3 digits are the mobile country code (MCC), which are followed by the mobile network code (MNC), either 2 digits (European standard) or 3 digits (North American standard). The length of the MNC depends on the value of the MCC. The remaining digits are the mobile subscription identification number (MSIN) within the network's customer base.


The Temporary Mobile Subscriber Identity (TMSI) is the identity that is most commonly sent between the mobile and the network. TMSI is randomly assigned by the Visitor Location Register (“VLR”) to every mobile in the area, the moment it is switched on. The number is local to a location area, and so it has to be updated each time the mobile moves to a new geographical area. The Mobile IP allows for location-independent routing of IP datagrams on the Internet. Each mobile node is identified by its home address disregarding its current location in the Internet. While away from its home network, a mobile node is associated with a care-of address which identifies its current location and its home address is associated with the local endpoint of a tunnel to its home agent. Mobile IP specifies how a mobile node registers with its home agent and how the home agent routes datagrams to the mobile node through the tunnel.


The portable communication device 1907 or vehicle 120 can also use, as a factor, a valid passcode provided to the communication device 1907 or vehicle 120 for authentication purposes. If the user has already used a sequence of digits (passcode), this is automatically deleted and the authenticating server or server requesting authentication can send a new code to the communication device 1907. If the new code is not entered within a specified time limit, the authenticating server 2012 or server requesting authentication 2008 automatically sends a new passcode. This ensures that no old, already used codes are left on mobile devices or in vehicle memory. For added security, it is possible to specify how many incorrect entries are permitted before the authenticating server blocks access.


Factors about the vehicle itself include vehicle identification numbers (“VINs”), battery identifiers, and parameters sensed, captured or otherwise collected by one or more on board sensors.


A vehicle identification number (VIN), also called a chassis number, is a unique code, including a serial number, used by the automotive industry to identify individual motor vehicles. A VIN commonly includes a world manufacturer identifier to identify uniquely a manufacturer of the corresponding vehicle, a vehicle attribute or other descriptor of a characteristic of the corresponding vehicle, an indication that provides a clear identification of the corresponding vehicle, a check digit, a model year, a manufacturing plant code for the manufacturing plant making all or part of the vehicle, a sequential number, a vehicle descriptor section (to identify the vehicle type, and may include information on the automobile platform used, the model, and the body style), and a vehicle identifier section (to identify the individual vehicle in question and may include information on options installed, engine, or transmission, but often is a simple sequential number).


The parameters sensed, captured, or otherwise collected by an on board sensor and sensor connectivity manager 1966 can be static or dynamic. The parameter can be, for instance, an operating metric or other parameter associated with the vehicle, such as vehicle location (such as by determined by a Global Positioning System (“GPS”) unit or other satellite positioning system), vehicle speed, acceleration, stored energy or fuel level, winding temperature, rotor speed, battery pack voltage level, output electrical current, electrical current direction of flow, leakage current, battery pack temperature, state-of-charge, state-of-health, or state-of-function, throttle position, manifold pressure, engine coolant temperature, mass air flow, camshaft position, crankshaft position, oxygen, detonation, EGR, intake air temperature, engine speed, brake or accelerator pedal position, brake pad wear, and fuel pressure. The controller/microprocessor 1920 or sensor connectivity manager 1966 of the vehicle 120 generally continuously or substantially continuously monitors sensor feedback signals to acquire the foregoing parameters. The parameter can be an associated with an interior or exterior of the vehicle, such as light level, still or video image of an object within or outside of the vehicle, sound signature of ambient noise within or outside of the vehicle, and received wireless signal.


Referring to FIG. 20, a cryptographic system 2000 is depicted according to an embodiment. The cryptographic system 2000 comprises a cryptographic manager (not shown) on board the vehicle 120 in communication, via network 1909, with a server 2008 requesting authentication of a vehicle occupant or the vehicle itself, and an authenticating server 2012 in communication with a credential repository 2016 to compare authentication information received from the cryptographic manager alone or from both the cryptographic manager and server 2008 requesting authentication with credentials stored locally in the credential repository 2016 to determine whether authentication is successful (the received authentication information matches one or more stored credentials) or unsuccessful (the received authentication information fails to match one or more stored credentials). The authentication information can be a factor or a key derived or generated from the factor.


Referring to FIG. 21, the cryptographic manager 2100 on board the vehicle 2004 comprises a transmitter 1970 or 1988 to send and a receiver 1972 or 1992 to receive wireless signals, a credential manager 2108 to receive, via receiver 1972 or 1992, requests for authentication via a user interface from a vehicle operator or passenger or via a remote communication device 1907 or server 1915, and stored first, second, . . . nth factors 2112a-n.


Referring to FIG. 22, the computational system 2200 on board the vehicle executing the credential manager 2108 comprises a computer readable medium 2204 in the memory 1916 comprising the credential manager 2108 and first, second, . . . nth factors 2112a-n and a processor 2208. The credential manager 2108 can receive the factors from first, second, . . . mth sensors 2212a-m. The first, second, . . . mth sensors 2112a-m can include a throttle or accelerator pedal position sensor, a brake pedal position sensor, manifold pressure sensor, engine coolant temperature sensor, mass air flow sensor, camshaft position sensor, crankshaft position sensor, pedal angle sensor, chassis position sensor, oxygen sensor, AC or DC current sensor, brake pad wear sensor, detonation sensor, EGR sensor and intake air temperature sensor. The cryptographic manager can optically read the VIN with a barcode scanner or digital camera or digitally read the VIN via OBD-II. An application on a portable computing device, such as a smartphone or tablet computer, can pass the VIN to the cryptographic manager. Biometric factors can be sensed an image processor, fingerprint, palm print, or palm vein scanner, retina or iris scanner, voice analyzer, keypad, and the like. Vehicle location can be determined by an SPS unit (such as a Global Positioning System or GPS unit). The identifiers associated with a portable computational device of an operator or passenger or on board communication device can be received by the cryptographic manager directly from the device. Ambient factors, such as light level can be captured by light sensor (e.g., photoresistor, photodiode, or phototransistor), still or video image by an image capture device, and sound signature can be captured by a microphone. Wireless signals can be captured by the receiver.


A number of examples will illustrate the concepts of this disclosure.


In a first example, the authenticating server 2012 is a licensing server performing a license check on a component of the vehicle 2004, such as a battery pack. The authenticating server 2012 requests multiple factors from the vehicle comprising, for example, a VIN or battery pack identifier and a biometric factor associated with the vehicle owner or a portable communication device of the vehicle owner (such as an electronic address). As will be appreciated, any other combination of factors can be used. The credential manager 2108 acquires the requested factors and forwards them to the authenticating server 2012. The authenticating server 2012 compares and successfully matches the received factors against stored credentials and successfully authenticates the operator of the vehicle as the owner of record and the licensed vehicle component as belonging to the owner of record.


In another example, the vehicle 120 is at a drive-through vendor to purchase an item. The server 2008 requesting authentication is associated with the drive-through vendor. The server 2008 provides, via a short range transmitter, a wireless signal comprising a request to provide factors to an authenticating server 2012 associated with a financial institution of the owner/operator of the vehicle. The request can comprise a description of the item(s) to be purchased (e.g., a QR code) and vendor identity. The vehicle provides factors to the vendor, via a short range transmitter, and the vendor scans the owner/operator's credit card. Both the server requesting authentication and the vehicle 2004 independently and separately forward the exchanged information to the authenticating server 2012, which compares a first of the factors, such as the vehicle's VIN, wireless remote signal description, owner/operator biometric factor, or electronic address of a portable communication device of the owner/operator, received from both the vehicle 2004 and server 2008 against a stored credential and compares the other second factor (such as a sensed vehicle parameter or sound signature of ambient noise) received from both the vehicle and server 2008 against one another. When the first factors each match the stored credential and the second factors match one another, the authenticating server successfully, authenticates the vehicle 120 as being associated with the owner/operator and can further compare credit card information received from the server 2008 and confirm that it is associated with the successfully authenticated vehicle as a second check on the identity of the person presenting the credit card.


In yet another example, the vehicle 120 is at a drive-through vendor to purchase an item. The server 2008 requesting authentication is associated with the drive-through vendor. The server 2008 provides, via a short range transmitter, a wireless signal comprising a request to provide factors to an authenticating server 2012 associated with a financial institution of the owner/operator. The request can comprise a description of the item(s) to be purchased (e.g., a QR code) and vendor identity. The vehicle provides factors to the vendor, via a short range transmitter. Both the server requesting authentication and the vehicle 2004 independently and separately forward the exchanged information to the authenticating server 2012, which compares a first of the factors, such as the electronic address of the owner/operator's communication device, wireless remote signal description, owner/operator biometric factor, or VIN received from both the vehicle 120 and server 2008 against a stored credential and compares the other second factor (such as a sensed vehicle parameter or sound signature of ambient noise) received from both the vehicle and server 2008 against one another. When the first factors each match the stored credential and the second factors match one another, the authenticating server successfully authenticates the owner/operator as being physically at the vendor and can further compare credit card information received from the server 2008 and confirm that it is associated with the successfully authenticated owner/operator as a second check on the identity of the person presenting the credit card.


In another example, an operator is seeking to perform a function or operation on the vehicle. Before the function or operation on the vehicle (e.g., start the ignition of the vehicle) can be performed, he or she must be authenticated successfully by the authenticating server as the owner of the vehicle or locally by the vehicle. The credential manager collects multiple factors, including the VIN of the vehicle, a biometric factor of the owner/operator or an electronic address of an on board or nearby communication device 1907 of the owner/operator and optionally forwards the authentication information to the server 2012. When the factors match values stored in the credential repository 2016 in association with the vehicle and its owner/operator or in the memory 1916 of the vehicle 120, the function or operation is enabled.


In another example, the vehicle 120 is monitored remotely (over the network 1909) by a remote monitoring service (which may be a fee-based service, warranty provider, vehicle manufacturer, etc.). The vehicle 120 periodically sends, via the vehicle database connectivity manager 1958, to the remote monitoring service wireless signals containing one or more vehicle parameter measurements received from one or more of the sensors 2112. The owner/operator or vehicle subsequently is involved in a transaction that requires authentication (e.g., battery pack license validation check, financial transaction, purchase of a good or service, and the like). The authenticating server 2012 receives, from the vehicle, multiple factors, such as an electronic address of the owner/operator's portable communication device (e.g., smart phone, tablet computer, and the like), wireless remote signal description, owner/operator biometric factor, or VIN along with a sensor measurement regarding a vehicle function or operation and timestamp of the sensor measurement. The authenticating server 2012 further receives, from the remote monitoring service, vehicle parameter measurements associated with the timestamp. The electronic address or VIN are compared with values stored in the credential repository 2016 and the sensor measurement values associated with the timestamp to authenticate the owner/operator or vehicle or both depending on the authentication information employed.


In yet another example, the vehicle 120 is at a drive-through vendor to purchase an item. The server 2008 requesting authentication is associated with the drive-through vendor. The server 2008 optionally provides, via a short range transmitter, a wireless signal comprising a request to provide factors to an authenticating server 2012 associated with a financial institution of the owner/operator. The request can comprise a description of the item(s) to be purchased (e.g., a QR code) and vendor identity. The server 208 receives from a local sensor a sensed ambient measurement, such as ambient light level or ambient noise sound signature. A different sensor on the vehicle captures the same measurement. Both the server requesting authentication and the vehicle 2004 independently and separately forward the sensed ambient measurement and authentication information regarding the owner/operator and/or vehicle (e.g., owner/operator biometric factor, VIN, electronic address of the owner/operator's portable communication device (e.g., smart phone, tablet computer, and the like), wireless remote signal description, and/or credit card information) to the authenticating server 2012, which compares a first of the factors, such as the authentication information received from both the vehicle 2004 and server 2008 against a stored credential and compares the other second factor, or the sensed ambient measurement, received from both the vehicle and server 2008 against one another. When the first factors each match the stored credential and the second factors match one another, the authenticating server successfully authenticates the owner/operator as being physically at the vendor and can further compare credit card information received from the server 2008 and confirm that it is associated with the successfully authenticated owner/operator as a second check on the identity of the person presenting the credit card.


An opportunity exists to use the unique information associated with a vehicle to assist with and be used as authentication information. Since VINs are unique, pairing this information with other types of IDs presents a robust manner of authenticating, for example, a driver and a vehicle, for a transaction. Specifically, the vehicle VIN, and/or a unique battery, module, or battery pack identifier, and/or an ignition key (or keyless remote) identifier and/or communication device ESN/SIM Card (optionally in conjunction with one or more public/private keys). The use of a vehicle as a source of authentication information can serve as “something that the user possesses”. If a user wants to authenticate himself or herself, he or she can use a characteristic or descriptor associated with his or her vehicle or keyless remote (i.e. something that the individual user knows or possesses and may or may not be globally unique) plus a second unique factor (such as a valid, dynamic passcode or electronic address associated with a portable communication device of the user, VIN, battery pack ID, or user biometric factor). An advantage of this method is that there is no need for an additional, dedicated token, as users tend to carry routinely their mobile devices and are typically associated with a finite number of vehicles.


Multi-factor authentication can provide more reliable and robust authentication for an owner/operator or vehicle and reduce the time and effort required for authentication while at the same time not inconveniencing or distracting the owner/operator. VINs, vehicle sensor measurements, SPS units, microphones, and gyro/acceleromoters can provide a trustworthy second factor in authentication.


With reference to FIGS. 23 and 24, logical instructions according to an embodiment will be discussed.


In step 2300, the cryptographic manager 2100 receives a request, from the server requesting authentication or authenticating server depending on the application, for authentication credentials or factors.


In step 2304, the credential manager 2108 validates the request by known techniques.


In step 2308, the credential manager 2108 determines which of multiple first, second, . . . nth factors 2112a-n and, in step 2312, retrieves the determined factors.


In optional step 2316, the credential manager 2108 generates a security key from the determined factors.


In step 2320, the credential manager 2100 transmits authentication information to the requestor.


In step 2400, the authenticating server or server requesting authentication receives the transmitted authentication information from the cryptographic manager.


In step 2404, the authenticating server optionally receives second authentication information from the server requesting authentication.


In step 2408, the authenticating server retrieves authentication information for the vehicle and/or owner/operator from the credential database 2016.


In step 2412, the authenticating server compares the received authentication information with the retrieved authentication information and determines whether or not authentication is successful.


In step 2416, the authenticating server transmits the appropriate response (i.e., a comparison has failed to match and authentication failed or comparisons match and authentication is successful) to the server requesting authentication.


With reference to FIG. 25, the logical instructions are executed by an arithmetic/logic unit (“ALU”), which performs mathematical operations, such as addition, subtraction, multiplication, and division, machine instructions, an address bus (that sends an address to memory), a data bus (that can send data to memory or receive data from memory), a read and write line to tell the memory whether to set or get the addressed location, a clock line that enables a clock pulse to sequence the processor, and a reset line that resets the program counter to zero or another value and restarts execution. The arithmetic/logic unit can be a floating point processor that performs operations on floating point numbers. The verification system further includes first, second, and third registers that are typically configured from flip-flops, an address latch, a program counter (which can increment by “1” and reset to “0”), a test register to hold values from comparisons performed in the arithmetic/logic unit, plural tri-state buffers to pass a “1” or “0” or disconnect its output (thereby allowing multiple outputs to connect to a wire but only one of them to actually drive a “1” or “0” into the line), and an instruction register and decoder to control other components. Control lines, in the verification system, from the instruction decoder can: command the first register to latch the value currently on the data bus, command the second register to latch the value currently on the data bus, command the third register to latch the value currently output by the ALU, command the program counter register to latch the value currently on the data bus, command the address register to latch the value currently on the data bus, command the instruction register to latch the value currently on the data bus, command the program counter to increment, command the program counter to reset to zero, activate any of the plural tri-state buffers (plural separate lines), command the ALU what operation to perform, command the test register to latch the ALU's test bits, activate the read line, and activate the write line. Bits from the test register and clock line as well as the bits from the instruction register come into the instruction decoder. Hardware similar or identical to that of FIG. 25 is in each of the server requesting authentication, cryptographic manager on board the vehicle, portable communication or computational device of the owner/operator, and authenticating server for executing the instructions of FIGS. 24-25. The ALU executes instructions for a random or pseudo-random number generation algorithm and generates the recipient identifier using the appropriate seed values.


Any of the steps, functions, and operations discussed herein can be performed continuously and automatically.


The exemplary systems and methods of this disclosure have been described in relation to vehicle systems and electric vehicles. However, to avoid unnecessarily obscuring the present disclosure, the preceding description omits a number of known structures and devices. This omission is not to be construed as a limitation of the scope of the claimed disclosure. Specific details are set forth to provide an understanding of the present disclosure. It should, however, be appreciated that the present disclosure may be practiced in a variety of ways beyond the specific detail set forth herein.


Furthermore, while the exemplary embodiments illustrated herein show the various components of the system collocated, certain components of the system can be located remotely, at distant portions of a distributed network, such as a LAN and/or the Internet, or within a dedicated system. Thus, it should be appreciated, that the components of the system can be combined into one or more devices, such as a server, communication device, or collocated on a particular node of a distributed network, such as an analog and/or digital telecommunications network, a packet-switched network, or a circuit-switched network. It will be appreciated from the preceding description, and for reasons of computational efficiency, that the components of the system can be arranged at any location within a distributed network of components without affecting the operation of the system.


Furthermore, it should be appreciated that the various links connecting the elements can be wired or wireless links, or any combination thereof, or any other known or later developed element(s) that is capable of supplying and/or communicating data to and from the connected elements. These wired or wireless links can also be secure links and may be capable of communicating encrypted information. Transmission media used as links, for example, can be any suitable carrier for electrical signals, including coaxial cables, copper wire, and fiber optics, and may take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.


While the flowcharts have been discussed and illustrated in relation to a particular sequence of events, it should be appreciated that changes, additions, and omissions to this sequence can occur without materially affecting the operation of the disclosed embodiments, configuration, and aspects.


A number of variations and modifications of the disclosure can be used. It would be possible to provide for some features of the disclosure without providing others.


In yet another embodiment, the systems and methods of this disclosure can be implemented in conjunction with a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device or gate array such as PLD, PLA, FPGA, PAL, special purpose computer, any comparable means, or the like. In general, any device(s) or means capable of implementing the methodology illustrated herein can be used to implement the various aspects of this disclosure. Exemplary hardware that can be used for the present disclosure includes computers, handheld devices, telephones (e.g., cellular, Internet enabled, digital, analog, hybrids, and others), and other hardware known in the art. Some of these devices include processors (e.g., a single or multiple microprocessors), memory, nonvolatile storage, input devices, and output devices. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.


In yet another embodiment, the disclosed methods may be readily implemented in conjunction with software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this disclosure is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized.


In yet another embodiment, the disclosed methods may be partially implemented in software that can be stored on a storage medium, executed on programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods of this disclosure can be implemented as a program embedded on a personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated measurement system, system component, or the like. The system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system.


Although the present disclosure describes components and functions implemented in the embodiments with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. Other similar standards and protocols not mentioned herein are in existence and are considered to be included in the present disclosure. Moreover, the standards and protocols mentioned herein and other similar standards and protocols not mentioned herein are periodically superseded by faster or more effective equivalents having essentially the same functions. Such replacement standards and protocols having the same functions are considered equivalents included in the present disclosure.


The present disclosure, in various embodiments, configurations, and aspects, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various embodiments, subcombinations, and subsets thereof. Those of skill in the art will understand how to make and use the systems and methods disclosed herein after understanding the present disclosure. The present disclosure, in various embodiments, configurations, and aspects, includes providing devices and processes in the absence of items not depicted and/or described herein or in various embodiments, configurations, or aspects hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease, and/or reducing cost of implementation.


The foregoing discussion of the disclosure has been presented for purposes of illustration and description. The foregoing is not intended to limit the disclosure to the form or forms disclosed herein. In the foregoing Detailed Description for example, various features of the disclosure are grouped together in one or more embodiments, configurations, or aspects for the purpose of streamlining the disclosure. The features of the embodiments, configurations, or aspects of the disclosure may be combined in alternate embodiments, configurations, or aspects other than those discussed above. This method of disclosure is not to be interpreted as reflecting an intention that the claimed disclosure requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment, configuration, or aspect. Thus, the following claims are hereby incorporated into this Detailed Description, with each claim standing on its own as a separate preferred embodiment of the disclosure.


Moreover, though the description of the disclosure has included description of one or more embodiments, configurations, or aspects and certain variations and modifications, other variations, combinations, and modifications are within the scope of the disclosure, e.g., as may be within the skill and knowledge of those in the art, after understanding the present disclosure. It is intended to obtain rights, which include alternative embodiments, configurations, or aspects to the extent permitted, including alternate, interchangeable and/or equivalent structures, functions, ranges, or steps to those claimed, whether or not such alternate, interchangeable and/or equivalent structures, functions, ranges, or steps are disclosed herein, and without intending to publicly dedicate any patentable subject matter.


Embodiments include a vehicle that can comprise:


a power source to propel the vehicle;


a user interface to receive commands from an occupant and provide output to the occupant;


a plurality of on board sensors to sense an operating parameter of the vehicle;


a computer readable medium for storing multiple factors; and


an on board microprocessor, coupled (or in communication) with the computer readable medium, that is programmed to:


receive and transmit the multiple factors to a remote server to authenticate the vehicle or a vehicle occupant, the multiple factors comprising a plurality of an electronic address of a portable communication device of the occupant, a wireless remote signal description, a biometric factor of the occupant, a vehicle-related identifier, a sensed vehicle parameter, a sensed environmental parameter, a passcode received from the remote server, or a derivative thereof.


Embodiments include a method that can comprise the step of:


collecting, by a vehicle microprocessor and on board sensor, multiple factors, the multiple factors comprising a plurality of an electronic address of a portable communication device of the occupant, a wireless remote signal description, a biometric factor of the occupant, a vehicle-related identifier, a sensed vehicle parameter, a sensed environmental parameter, a passcode received from the remote server, or a derivative thereof; and


transmitting multiple factors to a remote server to authenticate a vehicle or a vehicle occupant.


Embodiments include a vehicle that can comprise:


a power source to propel the vehicle;


a user interface to receive commands from an occupant and provide output to the occupant;


a plurality of on board sensors to sense an operating parameter of the vehicle;


a computer readable medium for storing multiple factors; and


an on board microprocessor, coupled (or in communication) with the computer readable medium, that is programmed to:


receive a request, from the occupant via the user interface, to perform an operation or function;


determine multiple factors by the plurality of on board sensors;


compare the determined multiple factors against the stored multiple factors;


when the determined multiple factors each match a corresponding one of the stored multiple factors, the on board microprocessor performs the requested operation or function; and


when one or more of the determined multiple factors does not match a corresponding one of the stored multiple factors, the on board microprocessor does not perform the requested operation or function, the determined and stored multiple factors each comprising a plurality of an electronic address of a portable communication device of the occupant, a wireless remote signal description, a biometric factor of the occupant, a sensed environmental parameter, and a passcode received from a remote server.


Aspects of one or more of the above embodiments can comprise a vehicle or method in which a derivative of one or more of the multiple factors is generated by the microprocessor. The key can be an authentication key, benign key, content-encryption key, crypto ignition key, cryptovariable, derived key, electronic key, ephemeral key, key encryption key, key production key, master key, master encryption key, public/private key, session key, symmetric key, asymmetric key, traffic encryption key, transmission security key, seed key, signature key, or stream key. The microprocessor can generate the key using a key derivation function, keystream generator, cryptographic hash function, key derivation function, cryptographic pseudorandom number generator, cryptanalytic algorithm, broken cryptography algorithm, asymmetric key algorithm, information-theoretically secure algorithm, integer factorization algorithm, symmetric key algorithm, Type 1, 2, or 2 3 encryption algorithm, advanced access content system, or cipher block chain.


Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a biometric factor of the occupant. The biometric factor can relate to a metric of a physiological or behavioral human characteristic of the occupant, wherein the physiological characteristic is related to a shape of the body. The shape of the body can be a fingerprint, palm vein pattern, facial characteristic, palm print, hand geometry characteristic, iris characteristic, retina characteristic, or scent of the occupant. The behavioral characteristic can be related to a pattern of behavior of the occupant. The pattern of behavior can comprise typing rhythm, typing speed, pattern in key press intervals, gait, or voice characteristic. The plurality of sensors can comprise one or more of an image processor, fingerprint, palm print, or palm vein scanner, retina or iris scanner, voice analyzer, or keypad to collect the biometric factor.


Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise an electronic address of a portable communication device of the occupant, wherein the electronic address is one or more of communication device Electronic Serial Number (“ESN”), Mobile Equipment Identifier (“MEID”), International Mobile Equipment Identity (“IMEI”), International Mobile Subscriber Identity (“IMSI”) number (stored on a Subscriber Identity Module (“SIM”) card of the communication device), Temporary Mobile Subscriber Identity (“TMSI”), telephone number, and Mobile IP (“MIP”).


Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a wireless remote signal description emitted by a keyless remote. The keyless remote can comprise a short range radio transmitter emitting the wireless remote signal. The keyless remote can transmit the wireless remote signal as a coded signal by radio waves to a receiver in the vehicle.


Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a passcode received by a receiver in the vehicle from the remote server. The passcode can delete automatically a passcode stored in the computer readable medium and previously used by the occupant. If the received passcode is not entered within a specified time limit, the remote server can automatically send a new passcode to the vehicle receiver.


Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a vehicle-related identifier. The vehicle-related identifier can be a vehicle identification number (“VIN”) of the vehicle or a unique identifier of a vehicle component. The microprocessor can one or more of optically read the vehicle-related identifier with a barcode scanner or digital camera or digitally read the vehicle-related identifier via OBD-II.


Aspects of one or more of the above embodiments can comprise a vehicle or method in which the multiple factors comprise a sensed vehicle parameter. The sensed vehicle parameter can be one or more of vehicle location, vehicle speed, acceleration, stored energy or fuel level, winding temperature, rotor speed, battery pack voltage level, output electrical current, electrical current direction of flow, leakage current, battery pack temperature, state-of-charge, state-of-health, or state-of-function, throttle position, manifold pressure, engine coolant temperature, mass air flow, camshaft position, crankshaft position, oxygen, detonation, EGR, intake air temperature, engine speed, brake pedal position, accelerator pedal position, brake pad wear, or fuel pressure. The plurality of sensors can comprise one or more of a throttle or accelerator pedal position sensor, a brake pedal position sensor, manifold pressure sensor, engine coolant temperature sensor, mass air flow sensor, camshaft position sensor, crankshaft position sensor, pedal angle sensor, chassis position sensor, oxygen sensor, AC or DC current sensor, brake pad wear sensor, detonation sensor, EGR sensor, satellite position system unit, or intake air temperature sensor to collect the sensed vehicle parameter.


Aspects of one or more of the above embodiments can comprise a vehicle or method in which a sensed environmental parameter is associated with an interior or exterior of the vehicle. The sensed environmental parameter can be one or more of light level, still or video image, and sound signature of ambient noise. The plurality of sensors can comprise one or more of a light sensor, still or video image by an image capture device, or a microphone to collect the sensed environmental parameter.


The phrases “at least one,” “one or more,” “or,” and “and/or” are open-ended expressions that are both conjunctive and disjunctive in operation. For example, each of the expressions “at least one of A, B and C,” “at least one of A, B, or C,” “one or more of A, B, and C,” “one or more of A, B, or C,” “A, B, and/or C,” and “A, B, or C” means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.


The term “a” or “an” entity refers to one or more of that entity. As such, the terms “a” (or “an”), “one or more,” and “at least one” can be used interchangeably herein. It is also to be noted that the terms “comprising,” “including,” and “having” can be used interchangeably.


The term “automatic” and variations thereof, as used herein, refers to any process or operation, which is typically continuous or semi-continuous, done without material human input when the process or operation is performed. However, a process or operation can be automatic, even though performance of the process or operation uses material or immaterial human input, if the input is received before performance of the process or operation. Human input is deemed to be material if such input influences how the process or operation will be performed. Human input that consents to the performance of the process or operation is not deemed to be “material.”


Aspects of the present disclosure may take the form of an embodiment that is entirely hardware, an embodiment that is entirely software (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module,” or “system.” Any combination of one or more computer-readable medium(s) may be utilized. The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium.


A computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer-readable storage medium may be any tangible medium that can contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.


A computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer-readable signal medium may be any computer-readable medium that is not a computer-readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including, but not limited to, wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.


The term “database” or “data model” as used herein refers to any system, hardware, software, memory, storage device, firmware, component, etc., that stores data. The data model can be any type of database or storage framework described in conjunction with FIGS. 6 and 7, which is stored on any type of non-transitory, tangible computer readable medium. The data model can include one or more data structures, which may comprise one or more sections that store an item of data. A section may include, depending on the type of data structure, an attribute of an object, a data field, or other types of sections included in one or more types of data structures. The data model can represent any type of database, for example, relational databases, flat file databases, object-oriented databases, or other types of databases. Further, the data structures can be stored in memory or memory structures that may be used in either run-time applications or in initializing a communication.


The terms “determine,” “calculate,” “compute,” and variations thereof, as used herein, are used interchangeably and include any type of methodology, process, mathematical operation or technique.


The term “electric vehicle” (EV), also referred to herein as an electric drive vehicle, may use one or more electric motors or traction motors for propulsion. An electric vehicle may be powered through a collector system by electricity from off-vehicle sources, or may be self-contained with a battery or generator to convert fuel to electricity. An electric vehicle generally includes a rechargeable electricity storage system (RESS) (also called Full Electric Vehicles (FEV)). Power storage methods may include: chemical energy stored on the vehicle in on-board batteries (e.g., battery electric vehicle or BEV), on board kinetic energy storage (e.g., flywheels), and/or static energy (e.g., by on-board double-layer capacitors). Batteries, electric double-layer capacitors, and flywheel energy storage may be forms of rechargeable on-board electrical storage.


The term “electronic address” refers to any contactable address, including a telephone number, instant message handle, e-mail address, Universal Resource Locator (“URL”), Universal Resource Identifier (“URI”), Address of Record (“AOR”), electronic alias in a database, like addresses, and combinations thereof.


The term “hybrid electric vehicle” refers to a vehicle that may combine a conventional (usually fossil fuel-powered) powertrain with some form of electric propulsion. Most hybrid electric vehicles combine a conventional internal combustion engine (ICE) propulsion system with an electric propulsion system (hybrid vehicle drivetrain). In parallel hybrids, the ICE and the electric motor are both connected to the mechanical transmission and can simultaneously transmit power to drive the wheels, usually through a conventional transmission. In series hybrids, only the electric motor drives the drivetrain, and a smaller ICE works as a generator to power the electric motor or to recharge the batteries. Power-split hybrids combine series and parallel characteristics. A full hybrid, sometimes also called a strong hybrid, is a vehicle that can run on just the engine, just the batteries, or a combination of both. A mid hybrid is a vehicle that cannot be driven solely on its electric motor, because the electric motor does not have enough power to propel the vehicle on its own.


The term “in communication with” as used herein refers to any coupling, connection, or interaction using electrical signals to exchange information or data, using any system, hardware, software, protocol, or format.


The term “network” as used herein refers to a system used by one or more user devices to communicate. The network can include one or more session managers, feature servers, communication endpoints, etc. that allow communications, whether voice or data, between two user devices. A network can be any network or communication system described herein. Generally, a network can be a local area network (LAN), a wide area network (WAN), a wireless LAN, a wireless WAN, the Internet, etc. that receives and transmits messages or data between devices. A network may communicate in any format or protocol known in the art, such as, transmission control protocol/internet protocol (TCP/IP), 802.11g, 802.11n, Bluetooth, or other formats or protocols.


The term “rechargeable electric vehicle” or “REV” refers to a vehicle with on board rechargeable energy storage, including electric vehicles and hybrid electric vehicles.

Claims
  • 1. A vehicle, comprising: a power source to propel the vehicle;a user interface to receive commands from an occupant and provide output to the occupant;a plurality of on board sensors to sense an operating parameter of the vehicle;a computer readable medium for storing multiple authentication factors; andan on board microprocessor, coupled with the computer readable medium, that is programmed to:receive and transmit the multiple authentication factors or a key derived therefrom to a remote server to authenticate the vehicle or a vehicle occupant to the remote server, the multiple authentication factors comprising a plurality of an electronic address of a portable communication device of the occupant sensed by an on board sensor, a wireless remote signal description sensed by an on board sensor, a vehicle-related identifier, a vehicle parameter sensed by the on board processor, an environmental parameter sensed by the on board processor, and a passcode received by the microprocessor from the remote server.
  • 2. The vehicle of claim 1, wherein the key is generated by the microprocessor using the multiple authentication factors as a seed value, wherein the key is an authentication key, benign key, content-encryption key, crypto ignition key, cryptovariable, derived key, electronic key, ephemeral key, key encryption key, key production key, master key, master encryption key, public/private key, session key, symmetric key, asymmetric key, traffic encryption key, transmission security key, seed key, signature key, or stream key, and wherein the microprocessor generates the key using a key derivation function, keystream generator, cryptographic hash function, key derivation function, cryptographic pseudorandom number generator, cryptanalytic algorithm, broken cryptography algorithm, asymmetric key algorithm, information-theoretically secure algorithm, integer factorization algorithm, symmetric key algorithm, Type 1, 2, or 2 3 encryption algorithm, advanced access content system, or cipher block chain.
  • 3. The vehicle of claim 1, wherein the multiple authentication factors comprise a biometric factor of the occupant sensed by an on board sensor, wherein the biometric factor relates to a metric of a physiological or behavioral human characteristic of the occupant, wherein the physiological characteristic is related to a shape of the body, wherein the shape of the body is a fingerprint, palm vein pattern, facial characteristic, palm print, hand geometry characteristic, iris characteristic, retina characteristic, or scent of the occupant, wherein the behavioral characteristic is related to a pattern of behavior of the occupant, wherein the pattern of behavior comprises typing rhythm, typing speed, pattern in key press intervals, gait, or voice characteristic, and wherein the plurality of sensors comprise one or more of an image processor, fingerprint, palm print, or palm vein scanner, retina or iris scanner, voice analyzer, or keypad to collect the biometric factor.
  • 4. The vehicle of claim 1, wherein the multiple authentication factors comprise an electronic address of a portable communication device of the occupant, wherein the electronic address is one or more of communication device Electronic Serial Number (“ESN”), Mobile Equipment Identifier (“MEID”), International Mobile Equipment Identity (“IMEI”), International Mobile Subscriber Identity (“IMSI”) number (stored on a Subscriber Identity Module (“SIM”) card of the communication device), Temporary Mobile Subscriber Identity (“TMSI”), telephone number, and Mobile IP (“MIP”).
  • 5. The vehicle of claim 1, wherein the multiple authentication factors comprise a wireless remote signal description emitted by a keyless remote, wherein the keyless remote comprises a short range radio transmitter emitting the wireless remote signal, and wherein the keyless remote transmits the wireless remote signal as a coded signal by radio waves to a receiver in the vehicle.
  • 6. The vehicle of claim 1, wherein the multiple authentication factors comprise a passcode received by a receiver in the vehicle from the remote server, wherein the passcode deletes automatically a passcode stored in the computer readable medium and previously used by the occupant, and wherein, if the received passcode is not entered within a specified time limit, the remote server automatically sends a new passcode to the vehicle receiver.
  • 7. The vehicle of claim 1, wherein the multiple authentication factors comprise a vehicle-related identifier, wherein the vehicle-related identifier is a vehicle identification number (“VIN”) of the vehicle or a unique identifier of a vehicle component, and wherein the microprocessor one or more of optically reads the vehicle-related identifier with a barcode scanner or digital camera or digitally reads the vehicle-related identifier via OBD-II.
  • 8. The vehicle of claim 1, wherein the multiple authentication factors comprise a sensed dynamically changing vehicle parameter, wherein the sensed vehicle parameter is one or more of vehicle location, vehicle speed, acceleration, stored energy or fuel level, winding temperature, rotor speed, battery pack voltage level, output electrical current, electrical current direction of flow, :leakage current, battery pack temperature, state-of-charge, state-of-health, or state-of-function, throttle position, manifold pressure, engine coolant temperature, mass air flow, camshaft position, crankshaft position, oxygen, detonation, EGR, intake air temperature, engine speed, brake pedal position, accelerator pedal position, brake pad wear, or fuel pressure, and wherein the plurality of sensors comprise one or more of a throttle or accelerator pedal position sensor, a brake pedal position sensor, manifold pressure sensor, engine coolant, temperature sensor, mass air flow sensor, camshaft position sensor, crankshaft position sensor, pedal angle sensor, chassis position sensor, oxygen sensor, AC or DC current sensor, brake pad wear sensor, detonation sensor, EGR sensor, satellite position system unit, or intake air temperature sensor to collect the sensed vehicle parameter.
  • 9. The vehicle of claim 1, wherein the multiple authentication factors comprise a sensed dynamically changing environmental parameter, wherein the sensed environmental parameter is associated with an interior or exterior of the vehicle, wherein the sensed environmental parameter is one or more of light level, still or video image, and sound signature of ambient noise, and wherein the plurality of sensors comprise one or more of a light sensor, still or video image by an image capture device, or a microphone to collect the sensed environmental parameter.
  • 10. A method, comprising: collecting, by a vehicle microprocessor and on board sensor, multiple authentication factors, the multiple authentication factors comprising a plurality of an electronic address of a portable communication device of the occupant, a wireless remote signal description, a biometric factor of the occupant, a vehicle-related identifier, a sensed vehicle parameter, a sensed environmental parameter, and a passcode received from a remote server;generating, by the microprocessor, the key from the multiple authentication factors using the multiple authentication factors as a seed value; andtransmitting the key to the remote server to authenticate a vehicle or a vehicle occupant to the remote server.
  • 11. The method of claim 10, further comprising: generating, by the microprocessor, the key from the multiple authentication factors using the multiple authentication factors as a seed value, wherein the key is an authentication key, benign key, content-encryption key, crypto ignition key, cryptovariable, derived key, electronic key, ephemeral key, key encryption key, key production key, master key, master encryption key, public/private key, session key, symmetric key, asymmetric key, traffic encryption key, transmission security key, seed key, signature key, or stream key, and wherein the microprocessor generates the key using a key derivation function, keystream generator, cryptographic hash function, key derivation function, cryptographic pseudorandom number generator, cryptanalytic algorithm, broken cryptography algorithm, asymmetric key algorithm, information-theoretically secure algorithm, integer factorization algorithm, symmetric key algorithm, Type 1, 2, or 2 3 encryption algorithm, advanced access content system, or cipher block chain.
  • 12. The method of claim 10, wherein the multiple authentication factors comprise a biometric factor of the occupant sensed by the on board sensor, wherein the biometric factor relates to a metric of a physiological or behavioral human characteristic of the occupant, wherein the physiological characteristic is related to a shape of the body, wherein the shape of the body is a fingerprint, palm vein pattern, facial characteristic, palm print, hand geometry characteristic, iris characteristic, retina characteristic, or scent of the occupant, wherein the behavioral characteristic is related to a pattern of behavior of the occupant, wherein the pattern of behavior comprises typing rhythm, typing speed, pattern in key press intervals, gait, or voice characteristic, and wherein the plurality of sensors comprise one or more of an image processor, fingerprint, palm print, or palm vein scanner, retina or iris scanner, voice analyzer, or keypad to collect the biometric factor.
  • 13. The method of claim 10, wherein the multiple authentication factors comprise an electronic address of a portable communication device of the occupant, wherein the electronic address is one or more of communication device Electronic Serial Number (“ESN”), Mobile Equipment Identifier (“MEID”), International Mobile Equipment Identity (“IMEI”), International Mobile Subscriber Identity (“IMSI”) number (stored on a Subscriber Identity Module (“SIM”) card of the communication device), Temporary Mobile Subscriber Identity (“TMSI”), telephone number, and Mobile IP (“MIP”).
  • 14. The method of claim 10, wherein the multiple authentication factors comprise a wireless remote signal description emitted by a keyless remote, wherein the keyless remote comprises a short range radio transmitter emitting the wireless remote signal, and wherein the keyless remote transmits the wireless remote signal as a coded signal by radio waves to a receiver in the vehicle.
  • 15. The method of claim 10, wherein the multiple authentication factors comprise a passcode received by a receiver in the vehicle from the remote server, wherein the passcode deletes automatically a passcode stored in the computer readable medium and previously used by the occupant, and wherein, if the received passcode is not entered within a specified time limit, the remote server automatically sends a new passcode to the vehicle receiver.
  • 16. The method of claim 10, wherein the multiple authentication factors comprise a vehicle-related identifier, wherein the vehicle-related identifier is a vehicle identification number (“VIN”) of the vehicle or a unique identifier of a vehicle component, and wherein the microprocessor one or more of optically reads the vehicle-related identifier with a barcode scanner or digital camera or digitally reads the vehicle-related identifier via OBD-II.
  • 17. The method of claim 10, wherein the multiple authentication factors comprise a dynamically changing sensed vehicle parameter, wherein the sensed vehicle parameter is one or more of vehicle location, vehicle speed, acceleration, stored energy or fuel level, winding temperature, rotor speed, battery pack voltage level, output electrical current, electrical current direction of flow, leakage current, battery pack temperature, state-of-charge, state-of-health, or state-of-function, throttle position, manifold pressure, engine coolant temperature, mass air flow, camshaft position, crankshaft position, oxygen, detonation, EGR, intake air temperature, engine speed, brake pedal position, accelerator pedal position, brake pad wear, or fuel pressure, and wherein the plurality of sensors comprise one or more of a throttle or accelerator pedal position sensor, a brake pedal position sensor, manifold pressure sensor, engine coolant temperature sensor, mass air flow sensor, camshaft position sensor, crankshaft position sensor, pedal angle sensor, chassis position sensor, oxygen sensor, AC or DC current sensor, brake pad wear sensor, detonation sensor, EGF sensor, satellite position system unit, or intake air temperature sensor to collect the sensed vehicle parameter.
  • 18. The method of claim 10, wherein the multiple authentication factors comprise a dynamically changing sensed environmental parameter, wherein the sensed environmental parameter is associated with an interior or exterior of the vehicle, wherein the sensed environmental parameter is one or more of light level, still or video image, and sound signature of ambient noise, and wherein the plurality of sensors comprise one or more of a light sensor, still or video image by an image capture device, or a microphone to collect the sensed environmental parameter.
  • 19. A method, comprising: receiving, by a remote server from a vehicle microprocessor, a plurality of authentication factors or a key derived therefrom, the plurality of authentication factors comprising a plurality of an electronic address of a portable communication device of the occupant, a wireless remote signal description, a biometric factor of the occupant, a vehicle-related identifier, a sensed vehicle parameter, a sensed environmental parameter, and a passcode received from the remote server;comparing the plurality of authentication factors or a key derived therefrom against one or more corresponding stored values; andapplying the following rules: when the one or more corresponding values match the plurality of authentication factors or a key derived therefrom, the vehicle or a vehicle occupant thereof is authenticated successfully and a transaction between the vehicle and remote server is enabled; andwhen the one or more corresponding values do not match the plurality of authentication factors or a key derived therefrom, the vehicle or a vehicle occupant thereof is not authenticated successfully and the transaction between the vehicle and remote server is not enabled.
  • 20. The method of claim 19, wherein the remote server receives the key derived from the plurality of authentication factors, wherein the key is derived using the plurality of authentication factors as a seed value, wherein the key is an authentication key, benign key, content-encryption key, crypto ignition key, cryptovariable, derived key, electronic key, ephemeral key, key encryption key, key production key, master key, master encryption key, public/private key, session key, symmetric key, asymmetric key, traffic encryption key, transmission security key, seed key, signature key, or stream key, and wherein the key is derived using a key derivation function, keystream generator, cryptographic hash function, key derivation function, cryptographic pseudorandom number generator, cryptanalytic algorithm, broken cryptography algorithm, asymmetric key algorithm, information-theoretically secure algorithm, integer factorization algorithm, symmetric key algorithm, Type 1, 2, or 2 3 encryption algorithm, advanced access content system, or cipher block chain.
  • 21. The method of claim 19, wherein the transaction is a licensing validity check by a vendor, wherein the plurality of authentication factors comprise a wireless remote signal description emitted by a keyless remote, wherein the keyless remote comprises a short range radio transmitter emitting the wireless remote signal, and wherein the keyless remote transmits the wireless remote signal as a coded signal by radio waves to a receiver in the vehicle.
  • 22. The method of claim 19, wherein the transaction is a purchase of a good or service by the vehicle occupant, wherein the plurality of authentication factors comprise a passcode received by a receiver in the vehicle from the remote server, wherein the passcode deletes automatically a passcode stored in the computer readable medium and previously used by the occupant, and wherein, if the received passcode is not entered within a specified time limit, the remote server automatically sends a new passcode to the vehicle receiver.
  • 23. The method of claim 19, wherein the plurality of authentication factors comprise a sensed dynamically changing vehicle parameter, wherein the sensed vehicle parameter is one or more of vehicle location, vehicle speed, acceleration, stored energy or fuel level, winding temperature, rotor speed, battery pack voltage level, output electrical current, electrical current direction of flow, leakage current, battery pack temperature, state-of-charge, state-of-health or state-of-function, throttle position, manifold pressure, engine coolant temperature, mass air flow, camshaft position, crankshaft position, oxygen, detonation, EGR, intake air temperature, engine speed, brake pedal position, accelerator pedal position, brake pad wear, or fuel pressure, and wherein the plurality of sensors comprise one or more of a throttle or accelerator pedal position sensor, a brake pedal position sensor, manifold pressure sensor, engine coolant temperature sensor, mass air flow sensor, camshaft position sensor, crankshaft position sensor, pedal angle sensor, chassis position sensor, oxygen sensor, AC or DC current sensor, brake pad wear sensor, detonation sensor, EGR sensor, satellite position system unit, or intake air temperature sensor to collect the sensed vehicle parameter.
  • 24. The method of claim 19, wherein the plurality of authentication factors comprise a sensed dynamically changing environmental parameter, wherein the sensed environmental parameter is associated with an interior or exterior of the vehicle, wherein the sensed environmental parameter is one or more of light level, still or video image, and sound signature of ambient noise, and wherein the plurality of sensors comprise one or more of a light sensor, still or video image by an image capture device, or a microphone to collect the sensed environmental parameter.
CROSS REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit of and priority, under 35 U.S.C. § 119(e), to U.S. Provisional Application Ser. Nos. 62/359,563, filed Jul. 7, 2016, entitled “Next Generation Vehicle”, and 62/378,348, filed Aug. 23, 2016, entitled “Next Generation Vehicle.” The entire disclosures of the applications listed above are hereby incorporated by reference, in their entirety, for all that they teach and for all purposes.

US Referenced Citations (929)
Number Name Date Kind
4361202 Minovitch Nov 1982 A
4476954 Johnson et al. Oct 1984 A
4754255 Sanders et al. Jun 1988 A
4875391 Leising et al. Oct 1989 A
5136498 McLaughlin et al. Aug 1992 A
5204817 Yoshida Apr 1993 A
5363306 Kuwahara et al. Nov 1994 A
5508689 Rado et al. Apr 1996 A
5521815 Rose May 1996 A
5529138 Shaw et al. Jun 1996 A
5531122 Chatham et al. Jul 1996 A
5572450 Worthy Nov 1996 A
5610821 Gazis et al. Mar 1997 A
5648769 Sato et al. Jul 1997 A
5710702 Hayashi et al. Jan 1998 A
5794164 Beckert et al. Aug 1998 A
5797134 McMillan et al. Aug 1998 A
5808372 Schwegler et al. Sep 1998 A
5812067 Bergholz et al. Sep 1998 A
5825283 Camhi Oct 1998 A
5838251 Brinkmeyer et al. Nov 1998 A
5847661 Ricci Dec 1998 A
5890080 Coverdill et al. Mar 1999 A
5928294 Zelinkovsky Jul 1999 A
5949345 Beckert et al. Sep 1999 A
5983161 Lemelson et al. Nov 1999 A
5986575 Jones et al. Nov 1999 A
6038426 Williams, Jr. Mar 2000 A
6081756 Mio et al. Jun 2000 A
D429684 Johnson Aug 2000 S
6128003 Smith et al. Oct 2000 A
6141620 Zyburt et al. Oct 2000 A
6148261 Obradovich et al. Nov 2000 A
6152514 McLellen Nov 2000 A
6157321 Ricci Dec 2000 A
6191703 Wallace Feb 2001 B1
6198996 Berstis Mar 2001 B1
6199001 Ohta et al. Mar 2001 B1
6202008 Beckert et al. Mar 2001 B1
6252544 Hoffberg Jun 2001 B1
6267428 Baldas et al. Jul 2001 B1
6302438 Stopper, Jr. et al. Oct 2001 B1
6310542 Gehlot Oct 2001 B1
6317058 Lemelson et al. Nov 2001 B1
6339826 Hayes, Jr. et al. Jan 2002 B2
6356838 Paul Mar 2002 B1
6388579 Adcox et al. May 2002 B1
6445084 Daiss et al. Sep 2002 B1
6480224 Brown Nov 2002 B1
6496100 Hiebl Dec 2002 B1
6502022 Chastain et al. Dec 2002 B1
6519519 Stopczynski Feb 2003 B1
6542071 Ohtsubo et al. Apr 2003 B1
6557752 Yacoob May 2003 B1
6563910 Menard et al. May 2003 B2
6587739 Abrams et al. Jul 2003 B1
6598227 Berry et al. Jul 2003 B1
6607212 Reimer et al. Aug 2003 B1
6617981 Basinger Sep 2003 B2
6662077 Haag Dec 2003 B2
6675081 Shuman et al. Jan 2004 B2
6678747 Goossen et al. Jan 2004 B2
6681176 Funk et al. Jan 2004 B2
6690260 Ashihara Feb 2004 B1
6690940 Brown et al. Feb 2004 B1
6724920 Berenz et al. Apr 2004 B1
6754580 Ask et al. Jun 2004 B1
6757593 Mori et al. Jun 2004 B2
6762684 Camhi Jul 2004 B1
6765495 Dunning et al. Jul 2004 B1
6778888 Cataldo et al. Aug 2004 B2
6782240 Tabe Aug 2004 B1
6785531 Lepley et al. Aug 2004 B2
6816783 Hashima et al. Nov 2004 B2
6820259 Kawamata et al. Nov 2004 B1
6944533 Obradovich et al. Sep 2005 B2
6950022 Breed Sep 2005 B2
6952156 Arshad et al. Oct 2005 B2
6958707 Siegel Oct 2005 B1
6965816 Walker Nov 2005 B2
6992580 Kotzin et al. Jan 2006 B2
7019641 Lakshmanan et al. Mar 2006 B1
7020544 Shinada et al. Mar 2006 B2
7021691 Schmidt et al. Apr 2006 B1
7042345 Ellis May 2006 B2
7047129 Uotani May 2006 B2
7058898 McWalter et al. Jun 2006 B2
7096431 Tambata et al. Aug 2006 B2
7142696 Engelsberg et al. Nov 2006 B1
7164117 Breed et al. Jan 2007 B2
7187947 White et al. Mar 2007 B1
7203598 Whitsell Apr 2007 B1
7233861 Van Buer et al. Jun 2007 B2
7239960 Yokota et al. Jul 2007 B2
7277454 Mocek et al. Oct 2007 B2
7284769 Breed Oct 2007 B2
7289645 Yamamoto et al. Oct 2007 B2
7295921 Spencer et al. Nov 2007 B2
7313547 Mocek et al. Dec 2007 B2
7333012 Nguyen Feb 2008 B1
7343148 O'Neil Mar 2008 B1
7386376 Basir et al. Jun 2008 B2
7386799 Clanton et al. Jun 2008 B1
7432829 Poltorak Oct 2008 B2
7474264 Bolduc et al. Jan 2009 B2
7493140 Michmerhuizen et al. Feb 2009 B2
7526539 Hsu Apr 2009 B1
7548815 Watkins et al. Jun 2009 B2
7566083 Vitito Jul 2009 B2
7606660 Diaz et al. Oct 2009 B2
7606867 Singhal et al. Oct 2009 B1
7643913 Taki et al. Jan 2010 B2
7650234 Obradovich et al. Jan 2010 B2
7671764 Uyeki et al. Mar 2010 B2
7680596 Uyeki et al. Mar 2010 B2
7683771 Loeb Mar 2010 B1
7711468 Levy May 2010 B1
7734315 Rathus et al. Jun 2010 B2
7748021 Obradovich et al. Jun 2010 B2
RE41449 Krahnstoever et al. Jul 2010 E
7791499 Mohan et al. Sep 2010 B2
7796190 Basso et al. Sep 2010 B2
7802832 Carnevali Sep 2010 B2
7821421 Tamir et al. Oct 2010 B2
7832762 Breed Nov 2010 B2
7864073 Lee et al. Jan 2011 B2
7864987 Venkatanna et al. Jan 2011 B2
7872591 Kane et al. Jan 2011 B2
7873471 Gieseke Jan 2011 B2
7881703 Roundtree et al. Feb 2011 B2
7891004 Gelvin et al. Feb 2011 B1
7891719 Carnevali Feb 2011 B2
7899610 McClellan Mar 2011 B2
7966678 Ten Eyck et al. Jun 2011 B2
7969290 Waeller et al. Jun 2011 B2
7969324 Chevion et al. Jun 2011 B2
8060631 Collart et al. Nov 2011 B2
8064925 Sun et al. Nov 2011 B1
8066313 Carnevali Nov 2011 B2
8098170 Szczerba et al. Jan 2012 B1
8113564 Carnevali Feb 2012 B2
8131419 Ampunan et al. Mar 2012 B2
8157310 Carnevali Apr 2012 B2
8162368 Carnevali Apr 2012 B2
8175802 Forstall et al. May 2012 B2
8233919 Haag et al. Jul 2012 B2
8245609 Greenwald et al. Aug 2012 B1
8306514 Nunally Nov 2012 B1
8334847 Tomkins Dec 2012 B2
8346233 Aaron et al. Jan 2013 B2
8346432 Van Wiemeersch et al. Jan 2013 B2
8350721 Carr Jan 2013 B2
8352282 Jensen et al. Jan 2013 B2
8369263 Dowling et al. Feb 2013 B2
8417449 Denise Apr 2013 B1
8432260 Talty et al. Apr 2013 B2
8442389 Kashima et al. May 2013 B2
8442758 Rovik et al. May 2013 B1
8467965 Chang Jun 2013 B2
8497842 Tomkins et al. Jul 2013 B2
8498809 Bill Jul 2013 B2
8509982 Montemerlo et al. Aug 2013 B2
8521410 Mizuno et al. Aug 2013 B2
8527143 Tan Sep 2013 B2
8527146 Jackson et al. Sep 2013 B1
8532574 Kirsch Sep 2013 B2
8543330 Taylor et al. Sep 2013 B2
8547340 Sizelove et al. Oct 2013 B2
8548669 Naylor Oct 2013 B2
8559183 Davis Oct 2013 B1
8577600 Pierfelice Nov 2013 B1
8578279 Chen et al. Nov 2013 B2
8583292 Preston et al. Nov 2013 B2
8589073 Guha et al. Nov 2013 B2
8600611 Seize Dec 2013 B2
8613385 Hulet et al. Dec 2013 B1
8621645 Spackman Dec 2013 B1
8624727 Saigh et al. Jan 2014 B2
8634984 Sumizawa Jan 2014 B2
8644165 Saarimaki et al. Feb 2014 B2
8660735 Tengler et al. Feb 2014 B2
8671068 Harber et al. Mar 2014 B2
8688372 Bhogal et al. Apr 2014 B2
8705527 Addepalli et al. Apr 2014 B1
8706143 Elias Apr 2014 B1
8718797 Addepalli et al. May 2014 B1
8725311 Breed May 2014 B1
8730033 Yarnold et al. May 2014 B2
8737986 Rhoads et al. May 2014 B2
8761673 Sakata Jun 2014 B2
8774842 Jones et al. Jul 2014 B2
8779947 Tengler et al. Jul 2014 B2
8782262 Collart et al. Jul 2014 B2
8793065 Seltzer et al. Jul 2014 B2
8798918 Onishi et al. Aug 2014 B2
8799657 Bhattacharya et al. Aug 2014 B2
8805110 Rhoads et al. Aug 2014 B2
8812171 Fillev et al. Aug 2014 B2
8817761 Gruberman et al. Aug 2014 B2
8825031 Aaron et al. Sep 2014 B2
8825277 McClellan et al. Sep 2014 B2
8825382 Liu Sep 2014 B2
8826261 Ag et al. Sep 2014 B1
8838088 Henn et al. Sep 2014 B1
8862317 Shin et al. Oct 2014 B2
8977408 Cazanas et al. Mar 2015 B1
8989053 Skaaksrud Mar 2015 B1
9043016 Filippov et al. May 2015 B2
9229905 Penilla et al. Jan 2016 B1
9501666 Lockett et al. Nov 2016 B2
20010010516 Roh et al. Aug 2001 A1
20010015888 Shaler et al. Aug 2001 A1
20020009978 Dukach et al. Jan 2002 A1
20020023010 Rittmaster et al. Feb 2002 A1
20020026278 Feldman et al. Feb 2002 A1
20020045484 Eck et al. Apr 2002 A1
20020065046 Mankins et al. May 2002 A1
20020077985 Kobata et al. Jun 2002 A1
20020095249 Lang Jul 2002 A1
20020097145 Tumey et al. Jul 2002 A1
20020103622 Burge Aug 2002 A1
20020105968 Pruzan et al. Aug 2002 A1
20020126876 Paul et al. Sep 2002 A1
20020128774 Takezaki et al. Sep 2002 A1
20020143461 Burns et al. Oct 2002 A1
20020143643 Catan Oct 2002 A1
20020152010 Colmenarez et al. Oct 2002 A1
20020154217 Ikeda Oct 2002 A1
20020169551 Inoue et al. Nov 2002 A1
20020174021 Chu et al. Nov 2002 A1
20030004624 Wilson et al. Jan 2003 A1
20030007227 Ogino Jan 2003 A1
20030055557 Dutta et al. Mar 2003 A1
20030060937 Shinada et al. Mar 2003 A1
20030065432 Shuman et al. Apr 2003 A1
20030101451 Bentolila et al. May 2003 A1
20030109972 Tak Jun 2003 A1
20030125846 Yu et al. Jul 2003 A1
20030132666 Bond et al. Jul 2003 A1
20030149530 Stopczynski Aug 2003 A1
20030158638 Yakes et al. Aug 2003 A1
20030182435 Redlich et al. Sep 2003 A1
20030202683 Ma et al. Oct 2003 A1
20030204290 Sadler et al. Oct 2003 A1
20030229492 Nolan Dec 2003 A1
20030230443 Cramer et al. Dec 2003 A1
20040017292 Reese et al. Jan 2004 A1
20040024502 Squires et al. Feb 2004 A1
20040036622 Dukach et al. Feb 2004 A1
20040039500 Amendola et al. Feb 2004 A1
20040039504 Coffee et al. Feb 2004 A1
20040068364 Zhao et al. Apr 2004 A1
20040070920 Flueli Apr 2004 A1
20040093155 Simonds et al. May 2004 A1
20040117494 Mitchell et al. Jun 2004 A1
20040128062 Ogino et al. Jul 2004 A1
20040143438 Cabezas et al. Jul 2004 A1
20040153356 Lockwood et al. Aug 2004 A1
20040162019 Horita et al. Aug 2004 A1
20040180653 Royalty Sep 2004 A1
20040182574 Adnan et al. Sep 2004 A1
20040193347 Harumoto et al. Sep 2004 A1
20040203974 Seibel Oct 2004 A1
20040204837 Singleton Oct 2004 A1
20040209594 Naboulsi Oct 2004 A1
20040217850 Perttunen et al. Nov 2004 A1
20040225557 Phelan et al. Nov 2004 A1
20040255123 Noyama et al. Dec 2004 A1
20040257208 Huang et al. Dec 2004 A1
20040260470 Rast Dec 2004 A1
20050012599 DeMatteo Jan 2005 A1
20050031100 Iggulden et al. Feb 2005 A1
20050038598 Oesterling et al. Feb 2005 A1
20050042999 Rappaport Feb 2005 A1
20050065678 Smith et al. Mar 2005 A1
20050065711 Dahlgren et al. Mar 2005 A1
20050086051 Brulle-Drews Apr 2005 A1
20050093717 Lilja May 2005 A1
20050096906 Barzilay May 2005 A1
20050097541 Holland May 2005 A1
20050114864 Surace May 2005 A1
20050122235 Teffer et al. Jun 2005 A1
20050124211 Diessner et al. Jun 2005 A1
20050130744 Eck et al. Jun 2005 A1
20050144156 Barber Jun 2005 A1
20050149752 Johnson et al. Jul 2005 A1
20050153760 Varley Jul 2005 A1
20050159853 Takahashi et al. Jul 2005 A1
20050159892 Chung Jul 2005 A1
20050192727 Shostak et al. Sep 2005 A1
20050197748 Holst et al. Sep 2005 A1
20050197767 Nortrup Sep 2005 A1
20050251324 Wiener et al. Nov 2005 A1
20050261815 Cowelchuk et al. Nov 2005 A1
20050278093 Kameyama Dec 2005 A1
20050283284 Grenier et al. Dec 2005 A1
20060015819 Hawkins et al. Jan 2006 A1
20060036358 Hale et al. Feb 2006 A1
20060044119 Egelhaaf Mar 2006 A1
20060047386 Kanevsky et al. Mar 2006 A1
20060058948 Blass et al. Mar 2006 A1
20060059229 Bain et al. Mar 2006 A1
20060125631 Sharony Jun 2006 A1
20060130033 Stoffels et al. Jun 2006 A1
20060142933 Feng Jun 2006 A1
20060173841 Bill Aug 2006 A1
20060175403 McConnell et al. Aug 2006 A1
20060184319 Seick et al. Aug 2006 A1
20060212909 Girard et al. Sep 2006 A1
20060241836 Kachouh et al. Oct 2006 A1
20060243056 Sundermeyer et al. Nov 2006 A1
20060250272 Puamau Nov 2006 A1
20060253307 Warren et al. Nov 2006 A1
20060259210 Tanaka et al. Nov 2006 A1
20060259304 Barzilay Nov 2006 A1
20060274829 Siemens et al. Dec 2006 A1
20060282204 Breed Dec 2006 A1
20060286969 Talmor et al. Dec 2006 A1
20060287807 Teffer Dec 2006 A1
20060287865 Cross et al. Dec 2006 A1
20060288382 Vitito Dec 2006 A1
20060290516 Muehlsteff et al. Dec 2006 A1
20070001831 Raz et al. Jan 2007 A1
20070002032 Powers et al. Jan 2007 A1
20070010942 Bill Jan 2007 A1
20070015485 DeBiasio et al. Jan 2007 A1
20070028370 Seng Feb 2007 A1
20070032225 Konicek et al. Feb 2007 A1
20070057781 Breed Mar 2007 A1
20070061057 Huang et al. Mar 2007 A1
20070067614 Berry et al. Mar 2007 A1
20070069880 Best et al. Mar 2007 A1
20070083298 Pierce et al. Apr 2007 A1
20070088488 Reeves et al. Apr 2007 A1
20070103328 Lakshmanan et al. May 2007 A1
20070115101 Creekbaum et al. May 2007 A1
20070118301 Andarawis et al. May 2007 A1
20070120697 Ayoub et al. May 2007 A1
20070135995 Kikuchi et al. Jun 2007 A1
20070156317 Breed Jul 2007 A1
20070182625 Kerai et al. Aug 2007 A1
20070182816 Fox Aug 2007 A1
20070185969 Davis Aug 2007 A1
20070192486 Wilson et al. Aug 2007 A1
20070194902 Blanco et al. Aug 2007 A1
20070194944 Galera et al. Aug 2007 A1
20070195997 Paul et al. Aug 2007 A1
20070200663 White et al. Aug 2007 A1
20070208860 Zellner et al. Sep 2007 A1
20070213090 Holmberg Sep 2007 A1
20070228826 Jordan et al. Oct 2007 A1
20070233341 Logsdon Oct 2007 A1
20070250228 Reddy et al. Oct 2007 A1
20070257815 Gunderson et al. Nov 2007 A1
20070276596 Solomon et al. Nov 2007 A1
20070280505 Breed Dec 2007 A1
20080005974 Vazquez et al. Jan 2008 A1
20080023253 Prost-Fin et al. Jan 2008 A1
20080027337 Dugan et al. Jan 2008 A1
20080033635 Obradovich et al. Feb 2008 A1
20080042824 Kates Feb 2008 A1
20080051957 Breed et al. Feb 2008 A1
20080052627 Oguchi Feb 2008 A1
20080071465 Chapman et al. Mar 2008 A1
20080082237 Breed Apr 2008 A1
20080086455 Meisels et al. Apr 2008 A1
20080090522 Oyama Apr 2008 A1
20080104227 Birnie et al. May 2008 A1
20080119994 Kameyama May 2008 A1
20080129475 Breed et al. Jun 2008 A1
20080143085 Breed et al. Jun 2008 A1
20080147280 Breed Jun 2008 A1
20080148374 Spaur et al. Jun 2008 A1
20080154712 Wellman Jun 2008 A1
20080154957 Taylor et al. Jun 2008 A1
20080161986 Breed Jul 2008 A1
20080164985 Iketani et al. Jul 2008 A1
20080169940 Lee et al. Jul 2008 A1
20080174451 Harrington et al. Jul 2008 A1
20080212215 Schofield et al. Sep 2008 A1
20080216067 Villing Sep 2008 A1
20080228358 Wang et al. Sep 2008 A1
20080234919 Ritter et al. Sep 2008 A1
20080252487 McClellan et al. Oct 2008 A1
20080253613 Jones et al. Oct 2008 A1
20080255721 Yamada Oct 2008 A1
20080255722 McClellan et al. Oct 2008 A1
20080269958 Filev et al. Oct 2008 A1
20080281508 Fu Nov 2008 A1
20080300778 Kuznetsov Dec 2008 A1
20080305780 Williams et al. Dec 2008 A1
20080319602 McClellan et al. Dec 2008 A1
20090006525 Moore Jan 2009 A1
20090024419 McClellan et al. Jan 2009 A1
20090037719 Sakthikumar et al. Feb 2009 A1
20090040026 Tanaka Feb 2009 A1
20090055178 Coon Feb 2009 A1
20090082951 Graessley Mar 2009 A1
20090099720 Elgali Apr 2009 A1
20090112393 Maten et al. Apr 2009 A1
20090112452 Buck et al. Apr 2009 A1
20090119657 Link, II May 2009 A1
20090125174 Delean May 2009 A1
20090132294 Haines May 2009 A1
20090138336 Ashley et al. May 2009 A1
20090144622 Evans et al. Jun 2009 A1
20090157312 Black et al. Jun 2009 A1
20090158200 Palahnuk et al. Jun 2009 A1
20090180668 Jones et al. Jul 2009 A1
20090189373 Schramm et al. Jul 2009 A1
20090189979 Smyth Jul 2009 A1
20090195370 Huffman et al. Aug 2009 A1
20090210257 Chalfant et al. Aug 2009 A1
20090216935 Flick Aug 2009 A1
20090222200 Link et al. Sep 2009 A1
20090224931 Dietz et al. Sep 2009 A1
20090224942 Goudy et al. Sep 2009 A1
20090234578 Newby et al. Sep 2009 A1
20090241883 Nagoshi et al. Oct 2009 A1
20090254446 Chernyak Oct 2009 A1
20090264849 La Croix Oct 2009 A1
20090275321 Crowe Nov 2009 A1
20090278750 Man et al. Nov 2009 A1
20090278915 Kramer et al. Nov 2009 A1
20090279839 Nakamura et al. Nov 2009 A1
20090284359 Huang et al. Nov 2009 A1
20090287405 Liu et al. Nov 2009 A1
20090299572 Fujikawa et al. Dec 2009 A1
20090312998 Berckmans et al. Dec 2009 A1
20090319181 Khosravy et al. Dec 2009 A1
20100008053 Osternack et al. Jan 2010 A1
20100023204 Basir et al. Jan 2010 A1
20100035620 Naden et al. Feb 2010 A1
20100036560 Wright et al. Feb 2010 A1
20100042498 Schalk Feb 2010 A1
20100052945 Breed Mar 2010 A1
20100057337 Fuchs Mar 2010 A1
20100066498 Fenton Mar 2010 A1
20100069115 Liu Mar 2010 A1
20100070338 Siotia et al. Mar 2010 A1
20100077094 Howarter et al. Mar 2010 A1
20100087987 Huang et al. Apr 2010 A1
20100090817 Yamaguchi et al. Apr 2010 A1
20100097178 Pisz et al. Apr 2010 A1
20100097239 Campbell et al. Apr 2010 A1
20100097458 Zhang et al. Apr 2010 A1
20100106344 Edwards et al. Apr 2010 A1
20100106418 Kindo et al. Apr 2010 A1
20100118025 Smith et al. May 2010 A1
20100121570 Tokue et al. May 2010 A1
20100121645 Seitz et al. May 2010 A1
20100125387 Sehyun et al. May 2010 A1
20100125405 Chae et al. May 2010 A1
20100125811 Moore et al. May 2010 A1
20100127847 Evans et al. May 2010 A1
20100131300 Collopy et al. May 2010 A1
20100134958 Disaverio et al. Jun 2010 A1
20100136944 Taylor et al. Jun 2010 A1
20100137037 Basir Jun 2010 A1
20100144284 Chutorash et al. Jun 2010 A1
20100145700 Kennewick et al. Jun 2010 A1
20100145987 Harper et al. Jun 2010 A1
20100152976 White et al. Jun 2010 A1
20100169432 Santori et al. Jul 2010 A1
20100174474 Nagase Jul 2010 A1
20100179712 Pepitone et al. Jul 2010 A1
20100185341 Wilson et al. Jul 2010 A1
20100188831 Ortel Jul 2010 A1
20100197359 Harris Aug 2010 A1
20100202346 Sitzes et al. Aug 2010 A1
20100211259 McClellan Aug 2010 A1
20100211282 Nakata et al. Aug 2010 A1
20100211300 Jaffe et al. Aug 2010 A1
20100211304 Hwang et al. Aug 2010 A1
20100211441 Sprigg et al. Aug 2010 A1
20100217458 Schweiger et al. Aug 2010 A1
20100222939 Namburu et al. Sep 2010 A1
20100228404 Link et al. Sep 2010 A1
20100234071 Shabtay et al. Sep 2010 A1
20100235042 Ying Sep 2010 A1
20100235744 Schultz Sep 2010 A1
20100235891 Oglesbee et al. Sep 2010 A1
20100250071 Pala et al. Sep 2010 A1
20100253493 Szczerba et al. Oct 2010 A1
20100256836 Mudalige Oct 2010 A1
20100265104 Zlojutro Oct 2010 A1
20100268426 Pathak et al. Oct 2010 A1
20100274410 Tsien et al. Oct 2010 A1
20100280751 Breed Nov 2010 A1
20100287303 Smith et al. Nov 2010 A1
20100289632 Seder et al. Nov 2010 A1
20100289643 Trundle et al. Nov 2010 A1
20100291427 Zhou Nov 2010 A1
20100295676 Khachaturov et al. Nov 2010 A1
20100304640 Sofman et al. Dec 2010 A1
20100305807 Basir et al. Dec 2010 A1
20100306080 Trandal et al. Dec 2010 A1
20100306309 Santori et al. Dec 2010 A1
20100306435 Nigoghosian et al. Dec 2010 A1
20100315218 Cades et al. Dec 2010 A1
20100321151 Matsuura et al. Dec 2010 A1
20100325626 Greschler et al. Dec 2010 A1
20100332130 Shimizu et al. Dec 2010 A1
20110015853 DeKock et al. Jan 2011 A1
20110018736 Carr Jan 2011 A1
20110021213 Carr Jan 2011 A1
20110021234 Tibbits et al. Jan 2011 A1
20110028138 Davies-Moore et al. Feb 2011 A1
20110035098 Goto et al. Feb 2011 A1
20110035141 Barker et al. Feb 2011 A1
20110040438 Kluge et al. Feb 2011 A1
20110050589 Yan et al. Mar 2011 A1
20110053506 Lemke et al. Mar 2011 A1
20110077808 Hyde et al. Mar 2011 A1
20110078024 Messier et al. Mar 2011 A1
20110080282 Kleve et al. Apr 2011 A1
20110082615 Small et al. Apr 2011 A1
20110084824 Tewari et al. Apr 2011 A1
20110090078 Kim et al. Apr 2011 A1
20110092159 Park et al. Apr 2011 A1
20110093154 Moinzadeh et al. Apr 2011 A1
20110093158 Theisen et al. Apr 2011 A1
20110093438 Poulsen Apr 2011 A1
20110093846 Moinzadeh et al. Apr 2011 A1
20110105097 Tadayon et al. May 2011 A1
20110106375 Sundaram et al. May 2011 A1
20110112717 Resner May 2011 A1
20110112969 Zaid et al. May 2011 A1
20110117933 Andersson May 2011 A1
20110119344 Eustis May 2011 A1
20110130915 Wright et al. Jun 2011 A1
20110134749 Speks et al. Jun 2011 A1
20110137520 Rector et al. Jun 2011 A1
20110145331 Christie et al. Jun 2011 A1
20110172873 Szwabowski et al. Jul 2011 A1
20110175754 Karpinsky Jul 2011 A1
20110183658 Zellner Jul 2011 A1
20110187520 Filev et al. Aug 2011 A1
20110193707 Ngo Aug 2011 A1
20110193726 Szwabowski et al. Aug 2011 A1
20110195699 Tadayon et al. Aug 2011 A1
20110197187 Roh Aug 2011 A1
20110205047 Patel et al. Aug 2011 A1
20110209079 Tarte et al. Aug 2011 A1
20110210867 Benedikt Sep 2011 A1
20110212717 Rhoads et al. Sep 2011 A1
20110221656 Haddick et al. Sep 2011 A1
20110224865 Gordon et al. Sep 2011 A1
20110224898 Scofield et al. Sep 2011 A1
20110225527 Law et al. Sep 2011 A1
20110227757 Chen et al. Sep 2011 A1
20110231091 Gourlay et al. Sep 2011 A1
20110234369 Cai et al. Sep 2011 A1
20110245999 Kordonowy Oct 2011 A1
20110246210 Matsur Oct 2011 A1
20110247013 Feller et al. Oct 2011 A1
20110251734 Schepp et al. Oct 2011 A1
20110257973 Chutorash et al. Oct 2011 A1
20110267204 Chuang et al. Nov 2011 A1
20110267205 McClellan et al. Nov 2011 A1
20110286676 El Dokor Nov 2011 A1
20110291886 Krieter Dec 2011 A1
20110291926 Gokturk et al. Dec 2011 A1
20110298808 Rovik Dec 2011 A1
20110301844 Aono Dec 2011 A1
20110307354 Erman et al. Dec 2011 A1
20110307570 Speks Dec 2011 A1
20110309926 Eikelenberg et al. Dec 2011 A1
20110309953 Petite et al. Dec 2011 A1
20110313653 Lindner Dec 2011 A1
20110320089 Lewis Dec 2011 A1
20120006610 Wallace et al. Jan 2012 A1
20120010807 Zhou Jan 2012 A1
20120016581 Mochizuki et al. Jan 2012 A1
20120029852 Goff et al. Feb 2012 A1
20120030002 Bous et al. Feb 2012 A1
20120030512 Wadhwa et al. Feb 2012 A1
20120038489 Goldshmidt Feb 2012 A1
20120046822 Anderson Feb 2012 A1
20120047530 Shkedi Feb 2012 A1
20120053793 Sala et al. Mar 2012 A1
20120053888 Stahlin et al. Mar 2012 A1
20120059789 Sakai et al. Mar 2012 A1
20120065815 Hess Mar 2012 A1
20120065834 Senart Mar 2012 A1
20120068956 Jira et al. Mar 2012 A1
20120071097 Matsushita et al. Mar 2012 A1
20120072244 Collins et al. Mar 2012 A1
20120074770 Lee Mar 2012 A1
20120083960 Zhu et al. Apr 2012 A1
20120083971 Preston Apr 2012 A1
20120084773 Lee et al. Apr 2012 A1
20120089299 Breed Apr 2012 A1
20120092251 Hashimoto et al. Apr 2012 A1
20120101876 Truvey et al. Apr 2012 A1
20120101914 Kumar et al. Apr 2012 A1
20120105613 Weng et al. May 2012 A1
20120106114 Caron et al. May 2012 A1
20120109446 Yousefi et al. May 2012 A1
20120109451 Tan May 2012 A1
20120110356 Yousefi et al. May 2012 A1
20120113822 Letner May 2012 A1
20120115446 Guatama et al. May 2012 A1
20120116609 Jung et al. May 2012 A1
20120116678 Witmer May 2012 A1
20120116696 Wank May 2012 A1
20120146766 Geisler et al. Jun 2012 A1
20120146809 Oh et al. Jun 2012 A1
20120149341 Tadayon et al. Jun 2012 A1
20120150651 Hoffberg et al. Jun 2012 A1
20120155636 Muthaiah Jun 2012 A1
20120158436 Bauer et al. Jun 2012 A1
20120173900 Diab et al. Jul 2012 A1
20120173905 Diab et al. Jul 2012 A1
20120179325 Faenger Jul 2012 A1
20120179547 Besore et al. Jul 2012 A1
20120188876 Chow et al. Jul 2012 A1
20120197523 Kirsch Aug 2012 A1
20120197669 Kote et al. Aug 2012 A1
20120204166 Ichihara Aug 2012 A1
20120210160 Fuhrman Aug 2012 A1
20120215375 Chang Aug 2012 A1
20120217928 Kulidjian Aug 2012 A1
20120218125 Demirdjian et al. Aug 2012 A1
20120226413 Chen et al. Sep 2012 A1
20120238286 Mallavarapu et al. Sep 2012 A1
20120239242 Uehara Sep 2012 A1
20120242510 Choi et al. Sep 2012 A1
20120254763 Protopapas et al. Oct 2012 A1
20120254804 Shema et al. Oct 2012 A1
20120259951 Schalk et al. Oct 2012 A1
20120265359 Das Oct 2012 A1
20120274459 Jaisimha et al. Nov 2012 A1
20120274481 Ginsberg et al. Nov 2012 A1
20120284292 Rechsteiner et al. Nov 2012 A1
20120289217 Reimer et al. Nov 2012 A1
20120289253 Haag et al. Nov 2012 A1
20120296567 Breed Nov 2012 A1
20120313771 Wottlifff, III Dec 2012 A1
20120316720 Hyde et al. Dec 2012 A1
20120317561 Aslam et al. Dec 2012 A1
20120323413 Kedar-Dongarkar et al. Dec 2012 A1
20120327231 Cochran et al. Dec 2012 A1
20130005263 Sakata Jan 2013 A1
20130005414 Bindra et al. Jan 2013 A1
20130013157 Kim et al. Jan 2013 A1
20130019252 Haase et al. Jan 2013 A1
20130024060 Sukkarie et al. Jan 2013 A1
20130030645 Divine et al. Jan 2013 A1
20130030811 Olleon et al. Jan 2013 A1
20130031540 Throop et al. Jan 2013 A1
20130031541 Wilks et al. Jan 2013 A1
20130035063 Fisk et al. Feb 2013 A1
20130046624 Calman Feb 2013 A1
20130050069 Ota Feb 2013 A1
20130055096 Kim et al. Feb 2013 A1
20130059607 Herz et al. Mar 2013 A1
20130063336 Sugimoto et al. Mar 2013 A1
20130066512 Willard et al. Mar 2013 A1
20130067599 Raje et al. Mar 2013 A1
20130075530 Shander et al. Mar 2013 A1
20130079964 Sukkarie et al. Mar 2013 A1
20130083805 Lu et al. Apr 2013 A1
20130085787 Gore et al. Apr 2013 A1
20130086164 Wheeler et al. Apr 2013 A1
20130099915 Prasad et al. Apr 2013 A1
20130103196 Monceaux et al. Apr 2013 A1
20130105264 Ruth et al. May 2013 A1
20130116882 Link et al. May 2013 A1
20130116915 Ferreira et al. May 2013 A1
20130134730 Ricci May 2013 A1
20130135118 Ricci May 2013 A1
20130138591 Ricci May 2013 A1
20130138714 Ricci May 2013 A1
20130139140 Rao et al. May 2013 A1
20130141247 Ricci Jun 2013 A1
20130141252 Ricci Jun 2013 A1
20130143495 Ricci Jun 2013 A1
20130143546 Ricci Jun 2013 A1
20130143601 Ricci Jun 2013 A1
20130144459 Ricci Jun 2013 A1
20130144460 Ricci Jun 2013 A1
20130144461 Ricci Jun 2013 A1
20130144462 Ricci Jun 2013 A1
20130144463 Ricci et al. Jun 2013 A1
20130144469 Ricci Jun 2013 A1
20130144470 Ricci Jun 2013 A1
20130144474 Ricci Jun 2013 A1
20130144486 Ricci Jun 2013 A1
20130144520 Ricci Jun 2013 A1
20130144657 Ricci Jun 2013 A1
20130145065 Ricci Jun 2013 A1
20130145279 Ricci Jun 2013 A1
20130145297 Ricci et al. Jun 2013 A1
20130145360 Ricci Jun 2013 A1
20130145401 Ricci Jun 2013 A1
20130145482 Ricci et al. Jun 2013 A1
20130147638 Ricci Jun 2013 A1
20130151031 Ricci Jun 2013 A1
20130151065 Ricci Jun 2013 A1
20130151088 Ricci Jun 2013 A1
20130151288 Bowne et al. Jun 2013 A1
20130152003 Ricci et al. Jun 2013 A1
20130154298 Ricci Jun 2013 A1
20130157640 Aycock Jun 2013 A1
20130157647 Kolodziej Jun 2013 A1
20130158778 Tengler et al. Jun 2013 A1
20130158821 Ricci Jun 2013 A1
20130166096 Jotanovic Jun 2013 A1
20130166097 Ricci Jun 2013 A1
20130166098 Lavie et al. Jun 2013 A1
20130166152 Butterworth Jun 2013 A1
20130166208 Forstall et al. Jun 2013 A1
20130167159 Ricci et al. Jun 2013 A1
20130173531 Rinearson et al. Jul 2013 A1
20130179689 Matsumoto et al. Jul 2013 A1
20130190978 Kato et al. Jul 2013 A1
20130194108 Lapiotis et al. Aug 2013 A1
20130197796 Obradovich et al. Aug 2013 A1
20130198031 Mitchell et al. Aug 2013 A1
20130198737 Ricci Aug 2013 A1
20130198802 Ricci Aug 2013 A1
20130200991 Ricci et al. Aug 2013 A1
20130203400 Ricci Aug 2013 A1
20130204455 Chia et al. Aug 2013 A1
20130204457 King Aug 2013 A1
20130204466 Ricci Aug 2013 A1
20130204484 Ricci Aug 2013 A1
20130204493 Ricci et al. Aug 2013 A1
20130204943 Ricci Aug 2013 A1
20130205026 Ricci Aug 2013 A1
20130205412 Ricci Aug 2013 A1
20130207794 Patel et al. Aug 2013 A1
20130212065 Rahnama Aug 2013 A1
20130212659 Maher et al. Aug 2013 A1
20130215116 Siddique et al. Aug 2013 A1
20130218412 Ricci Aug 2013 A1
20130218445 Basir Aug 2013 A1
20130219039 Ricci Aug 2013 A1
20130226365 Brozovich Aug 2013 A1
20130226371 Rovik et al. Aug 2013 A1
20130226392 Schneider et al. Aug 2013 A1
20130226449 Rovik et al. Aug 2013 A1
20130226622 Adamson et al. Aug 2013 A1
20130227648 Ricci Aug 2013 A1
20130231784 Rovik et al. Sep 2013 A1
20130231800 Ricci Sep 2013 A1
20130232142 Nielsen et al. Sep 2013 A1
20130238165 Garrett et al. Sep 2013 A1
20130241720 Ricci et al. Sep 2013 A1
20130245882 Ricci Sep 2013 A1
20130250933 Yousefi et al. Sep 2013 A1
20130261871 Hobbs et al. Oct 2013 A1
20130261966 Wang et al. Oct 2013 A1
20130265178 Tengler et al. Oct 2013 A1
20130274997 Chien Oct 2013 A1
20130279111 Lee Oct 2013 A1
20130279491 Rubin et al. Oct 2013 A1
20130282238 Ricci et al. Oct 2013 A1
20130282357 Rubin et al. Oct 2013 A1
20130282946 Ricci Oct 2013 A1
20130288606 Kirsch Oct 2013 A1
20130293364 Ricci et al. Nov 2013 A1
20130293452 Ricci et al. Nov 2013 A1
20130293480 Kritt et al. Nov 2013 A1
20130295901 Abramson et al. Nov 2013 A1
20130295908 Zeinstra et al. Nov 2013 A1
20130295913 Matthews et al. Nov 2013 A1
20130300554 Braden Nov 2013 A1
20130301584 Addepalli et al. Nov 2013 A1
20130304371 Kitatani et al. Nov 2013 A1
20130308265 Arnouse Nov 2013 A1
20130309977 Heines et al. Nov 2013 A1
20130311038 Kim et al. Nov 2013 A1
20130325453 Levien et al. Dec 2013 A1
20130325568 Mangalvedkar et al. Dec 2013 A1
20130329372 Wilkins Dec 2013 A1
20130332023 Bertosa et al. Dec 2013 A1
20130338914 Weiss Dec 2013 A1
20130339027 Dokor et al. Dec 2013 A1
20130345929 Bowden et al. Dec 2013 A1
20140028542 Lovitt et al. Jan 2014 A1
20140032014 DeBiasio et al. Jan 2014 A1
20140054957 Bellis Feb 2014 A1
20140058672 Wansley et al. Feb 2014 A1
20140066014 Nicholson et al. Mar 2014 A1
20140067201 Visintainer et al. Mar 2014 A1
20140067564 Yuan Mar 2014 A1
20140070917 Protopapas Mar 2014 A1
20140081544 Fry Mar 2014 A1
20140088798 Himmelstein Mar 2014 A1
20140096068 Dewan et al. Apr 2014 A1
20140097955 Lovitt et al. Apr 2014 A1
20140109075 Hoffman et al. Apr 2014 A1
20140109080 Ricci Apr 2014 A1
20140120829 Bhamidipati et al. May 2014 A1
20140121862 Zarrella et al. May 2014 A1
20140125802 Beckert et al. May 2014 A1
20140143839 Ricci May 2014 A1
20140164611 Molettiere et al. Jun 2014 A1
20140168062 Katz et al. Jun 2014 A1
20140168436 Pedicino Jun 2014 A1
20140169621 Burr Jun 2014 A1
20140171752 Park et al. Jun 2014 A1
20140172727 Abhyanker et al. Jun 2014 A1
20140188533 Davidson Jul 2014 A1
20140195272 Sadiq et al. Jul 2014 A1
20140198216 Zhai et al. Jul 2014 A1
20140200737 Lortz et al. Jul 2014 A1
20140207328 Wolf et al. Jul 2014 A1
20140220966 Muetzel et al. Aug 2014 A1
20140222298 Gurin Aug 2014 A1
20140223384 Graumann Aug 2014 A1
20140240089 Chang Aug 2014 A1
20140244078 Downey et al. Aug 2014 A1
20140244111 Gross et al. Aug 2014 A1
20140244156 Magnusson et al. Aug 2014 A1
20140245277 Petro et al. Aug 2014 A1
20140245278 Zellen Aug 2014 A1
20140245284 Alrabady et al. Aug 2014 A1
20140252091 Morse et al. Sep 2014 A1
20140257627 Hagan, Jr. Sep 2014 A1
20140267035 Schalk et al. Sep 2014 A1
20140277936 El Dokor et al. Sep 2014 A1
20140278070 McGavran et al. Sep 2014 A1
20140278071 San Filippo et al. Sep 2014 A1
20140281971 Isbell, III et al. Sep 2014 A1
20140282161 Cash Sep 2014 A1
20140282278 Anderson et al. Sep 2014 A1
20140282470 Buga et al. Sep 2014 A1
20140282931 Protopapas Sep 2014 A1
20140292545 Nemoto Oct 2014 A1
20140292665 Lathrop et al. Oct 2014 A1
20140303899 Fung Oct 2014 A1
20140306799 Ricci Oct 2014 A1
20140306814 Ricci Oct 2014 A1
20140306817 Ricci Oct 2014 A1
20140306826 Ricci Oct 2014 A1
20140306833 Ricci Oct 2014 A1
20140306834 Ricci Oct 2014 A1
20140306835 Ricci Oct 2014 A1
20140307655 Ricci Oct 2014 A1
20140307724 Ricci Oct 2014 A1
20140308902 Ricci Oct 2014 A1
20140309789 Ricci Oct 2014 A1
20140309790 Ricci Oct 2014 A1
20140309804 Ricci Oct 2014 A1
20140309805 Ricci Oct 2014 A1
20140309806 Ricci Oct 2014 A1
20140309813 Ricci Oct 2014 A1
20140309814 Ricci et al. Oct 2014 A1
20140309815 Ricci et al. Oct 2014 A1
20140309838 Ricci Oct 2014 A1
20140309839 Ricci et al. Oct 2014 A1
20140309847 Ricci Oct 2014 A1
20140309849 Ricci Oct 2014 A1
20140309852 Ricci Oct 2014 A1
20140309853 Ricci Oct 2014 A1
20140309862 Ricci Oct 2014 A1
20140309863 Ricci Oct 2014 A1
20140309864 Ricci Oct 2014 A1
20140309865 Ricci Oct 2014 A1
20140309866 Ricci Oct 2014 A1
20140309867 Ricci Oct 2014 A1
20140309868 Ricci Oct 2014 A1
20140309869 Ricci Oct 2014 A1
20140309870 Ricci et al. Oct 2014 A1
20140309871 Ricci Oct 2014 A1
20140309872 Ricci Oct 2014 A1
20140309873 Ricci Oct 2014 A1
20140309874 Ricci Oct 2014 A1
20140309875 Ricci Oct 2014 A1
20140309876 Ricci Oct 2014 A1
20140309877 Ricci Oct 2014 A1
20140309878 Ricci Oct 2014 A1
20140309879 Ricci Oct 2014 A1
20140309880 Ricci Oct 2014 A1
20140309885 Ricci Oct 2014 A1
20140309886 Ricci Oct 2014 A1
20140309891 Ricci Oct 2014 A1
20140309892 Ricci Oct 2014 A1
20140309893 Ricci Oct 2014 A1
20140309913 Ricci et al. Oct 2014 A1
20140309919 Ricci Oct 2014 A1
20140309920 Ricci Oct 2014 A1
20140309921 Ricci et al. Oct 2014 A1
20140309922 Ricci Oct 2014 A1
20140309923 Ricci Oct 2014 A1
20140309927 Ricci Oct 2014 A1
20140309929 Ricci Oct 2014 A1
20140309930 Ricci Oct 2014 A1
20140309934 Ricci Oct 2014 A1
20140309935 Ricci Oct 2014 A1
20140309982 Ricci Oct 2014 A1
20140310031 Ricci Oct 2014 A1
20140310075 Ricci Oct 2014 A1
20140310103 Ricci Oct 2014 A1
20140310186 Ricci Oct 2014 A1
20140310277 Ricci Oct 2014 A1
20140310379 Ricci et al. Oct 2014 A1
20140310594 Ricci et al. Oct 2014 A1
20140310610 Ricci Oct 2014 A1
20140310702 Ricci et al. Oct 2014 A1
20140310739 Ricci et al. Oct 2014 A1
20140310788 Ricci Oct 2014 A1
20140322676 Raman Oct 2014 A1
20140347207 Zeng et al. Nov 2014 A1
20140347265 Allen et al. Nov 2014 A1
20150007155 Hoffman et al. Jan 2015 A1
20150012186 Horseman Jan 2015 A1
20150032366 Man et al. Jan 2015 A1
20150032670 Brazell Jan 2015 A1
20150057839 Chang et al. Feb 2015 A1
20150061895 Ricci Mar 2015 A1
20150081133 Schulz Mar 2015 A1
20150081167 Pisz et al. Mar 2015 A1
20150088423 Tuukkanen Mar 2015 A1
20150088515 Beaumont et al. Mar 2015 A1
20150116200 Kurosawa et al. Apr 2015 A1
20150158499 Koravadi Jun 2015 A1
20150161832 Esselink et al. Jun 2015 A1
20150178034 Penilla et al. Jun 2015 A1
20160008985 Kim et al. Jan 2016 A1
20160039356 Talwar et al. Feb 2016 A1
20160070527 Ricci Mar 2016 A1
20160086391 Ricci Mar 2016 A1
20160269456 Ricci Sep 2016 A1
20160269469 Ricci Sep 2016 A1
20170053460 Hauser Feb 2017 A1
Foreign Referenced Citations (36)
Number Date Country
1417755 May 2003 CN
1847817 Oct 2006 CN
101303878 Nov 2008 CN
102467827 May 2012 CN
1223567 Jul 2002 EP
1484729 Dec 2004 EP
2192015 Jun 2010 EP
2004-284450 Oct 2004 JP
2006-0128484 Dec 2006 KR
WO 2007126204 Nov 2007 WO
WO 2012102879 Aug 2012 WO
WO 2013074866 May 2013 WO
WO 2013074867 May 2013 WO
WO 2013074868 May 2013 WO
WO 2013074897 May 2013 WO
WO 2013074899 May 2013 WO
WO 2013074901 May 2013 WO
WO 2013074919 May 2013 WO
WO 2013074981 May 2013 WO
WO 2013074983 May 2013 WO
WO 2013075005 May 2013 WO
WO 2013181310 Dec 2013 WO
WO 2014014862 Jan 2014 WO
WO 2014143563 Sep 2014 WO
WO 2014158667 Oct 2014 WO
WO 2014158672 Oct 2014 WO
WO 2014158766 Oct 2014 WO
WO 2014172312 Oct 2014 WO
WO 2014172313 Oct 2014 WO
WO 2014172316 Oct 2014 WO
WO 2014172320 Oct 2014 WO
WO 2014172322 Oct 2014 WO
WO 2014172323 Oct 2014 WO
WO 2014172327 Oct 2014 WO
WO 2016145073 Sep 2016 WO
WO 2016145100 Sep 2016 WO
Non-Patent Literature Citations (32)
Entry
“Multi-factor authentication,” Wikipedia, retrieved from https://en.wikipedia.org/wiki/Multi-factor_authentication, retrieved on Dec. 9, 2016, 6 pages.
“Radio-frequency identification,” Wikipedia, retrieved from https://en.wikipedia.org/wiki/Radio-frequency_identification, retrieved on Dec. 9, 2016, 23 pages.
“Product code,” Wikipedia, retrieved from https://en.wikipedia.org/wiki/Product_code, retrieved on Dec. 9, 2016, 1 page.
“Electronic Product Code,” Wikipedia, retrieved from https://en.wikipedia.org/wiki/Electronic_Product_Code, retrieved on Dec. 9, 2016, 4 page.
U.S. Appl. No. 61/567,962, filed Dec. 7, 2011, Baarman et al.
U.S. Appl. No. 15/406,138, filed Jan. 13, 2017, Newman
U.S. Appl. No. 15/407,480, filed Jan. 17, 2017, Falkson et al.
U.S. Appl. No. 15/414,897, filed Jan. 25, 2017, Chen et al.
“Nexus 10 Guidebook for Android,” Google Inc., © 2012, Edition 1.2, 166 pages.
“Self-Driving: Self-Driving Autonomous Cars,” available at http://www.automotivetechnologies.com/autonomous-self-driving-cars, accessed Dec. 2016, 9 pages.
Amor-Segan et al., “Towards the Self Healing Vehicle,” Automotive Electronics, Jun. 2007, 2007 3rd Institution of Engineering and Technology Conference, 7 pages.
Bennett, “Meet Samsung's Version of Apple AirPlay,” CNET.com, Oct. 10, 2012, 11 pages.
Cairnie et al., “Using Finger-Pointing to Operate Secondary Controls in Automobiles,” Proceedings of the IEEE Intelligent Vehicles Symposium 2000, Oct. 3-5, 2000, 6 pages.
Clark, “How Self-Driving Cars Work: The Nuts and Bolts Behind Google's Autonomous Car Program,” Feb. 21, 2015, available at http://www.makeuseof.com/tag/how-self-driving-cars-work-the-nuts-and-bolts-behind-googles-autonomous-car-program/, 9 pages.
Deaton et al., “How Driverless Cars Will Work,” Jul. 1, 2008, HowStuffWorks.com. <http://auto.howstuffworks.com/under-the-hood/trends-innovations/driverless-car.htm> Sep. 18, 2017, 10 pages.
Dumbaugh, “Safe Streets, Livable Streets: A Positive Approach to urban Roadside Design,” Ph.D. dissertation for School of Civil & Environ. Engr., Georgia Inst. of Technology, Dec. 2005, 235 pages.
Fei et al., “A QoS-aware Dynamic Bandwidth Allocation Algorithm for Relay Stations in IEEE 802.16j-based Vehicular Networks,” Proceedings of the 2010 IEEE Global Telecommunications Conference, Dec. 10, 2010, 10 pages.
Ge et al., “Optimal Relay Selection in IEEE 802.16j Multihop Relay Vehicular Networks,” IEEE Transactions on Vehicular Technology, 2010, vol. 59(5), pp. 2198-2206.
Guizzo, Erico, “How Google's Self-Driving Car Works,” Oct. 18, 2011, available at https://spectrum.ieee.org/automaton/robotics/artificial-intelligence/how-google-self-driving-car-works, 5 pages.
Heer et al., “ALPHA: An Adaptive and Lightweight Protocol for Hop-by-hop Authentication,” Proceedings of CoNEXT 2008, Dec. 2008, pp. 1-12.
Jahnich et al., “Towards a Middleware Approach for a Self-Configurable Automotive Embedded System,” International Federation for Information Processing, 2008, pp. 55-65.
Persson “Adaptive Middleware for Self-Configurable Embedded Real-Time Systems,” KTH Industrial Engineering and Management, 2009, pp. iii-71 and references.
Raychaudhuri et al., “Emerging Wireless Technologies and the Future Mobile Internet,” p. 48, Cambridge Press, 2011, 3 pages.
Stephens, Leah, “How Driverless Cars Work,” Interesting Engineering, Apr. 28, 2016, available at https://interestingengineering.com/driverless-cars-work/, 7 pages.
Stoller, “Leader Election in Distributed Systems with Crash Failures,” Indiana University, 1997, pp. 1-15.
Strunk et al., “The Elements of Style,” 3d ed., Macmillan Publishing Co., 1979, 3 pages.
Suwatthikul, “Fault detection and diagnosis for in-vehicle networks,” Intech, 2010, pp. 283-286 [retrieved from: www.intechopen.com/books/fault-detection-and-diagnosis-for-in-vehicle-networks].
Walter et al., “The smart car seat: personalized monitoring of vital signs in automotive applications.” Personal and Ubiquitous Computing, Oct. 2011, vol. 15, No. 7, pp. 707-715.
Wolf et al., “Design, Implementation, and Evaluation of a Vehicular Hardware Security Module,” ICISC'11 Proceedings of the 14th Int'l Conf. Information Security & Cryptology, Springer-Verlag Berlin, Heidelberg, 2011, pp. 302-318.
Official Action for U.S. Appl. No. 15/407,480, dated Sep. 6, 2017, 13 pages.
Official Action for U.S. Appl. No. 15/406,138, dated Jul. 13, 2017, 6 pages.
Official Action for U.S. Appl. No. 15/406,138, dated Dec. 28, 2017, 7 pages.
Related Publications (1)
Number Date Country
20180012433 A1 Jan 2018 US
Provisional Applications (2)
Number Date Country
62359563 Jul 2016 US
62378348 Aug 2016 US