The invention relates to the field of vehicle theft. More specifically, it relates to a method and system for dissuading vehicle thieves from stealing a vehicle and encouraging vehicle owners to adopt the method and system.
Even with the advent of several new technologies in the vehicle tracking and theft prevention arena, vehicle theft is still on the rise. Vehicle tracking does not stop the theft from occurring nor does it serve as a major deterrent. The overwhelming majorities of conventional anti-theft devices are easily removable or bypassed and thus offer little or no deterrence to a thief.
Tracking systems are all “hard wired” to the vehicle in which they are installed thus limiting the places in which they can be hidden and making them vulnerable to being discovered, deactivated and or removed. Also, because they rely on radio frequencies and operate using 2-way communication they can easily be detected and “jammed”, or rendered inoperable with well-known devices such as frequency jammers.
For their part, more traditional systems such as audible alarms or ignition kill systems are very easily by-passed. These systems are also “hard wired” to the vehicle's power source and can be by-passed when a thief disables the vehicle's main power source and uses an alternate one. The wires leading to a siren on an audible alarm system can easily be located and cut prior to setting off the alarm when attempting to steal the vehicle. Also the public has grown more and more immune to the sound of a vehicle alarm because of the so-called “false alarm syndrome” thus giving thieves even more reaction time.
Conventional systems as described above have had little or no positive effect on theft caused by customer or owner fraud. Statistics show that approximately 15% to 20% of vehicle thefts are related to fraud. The customer or owner benefits from having plenty of time to clear the vehicle of any security systems before he or she attempts to report the vehicle as being stolen or missing.
Furthermore, as electrical systems found in vehicles become increasingly complex and sensitive, consumers and vehicle manufactures are becoming increasingly weary of these “hard wired” systems due to the fact that their interaction with the vehicle circuits can cause several mal functions. In some cases the installation of “hard wired” systems can even void certain vehicle manufacturer warranties. As for traditional transponder systems they operate at very limited ranges and can only be used in a very specific area such as a room or doorway.
According to a first broad aspect, there is provided a method for locating a stolen vehicle, the method comprising: embedding multiple signal emitting devices in the vehicle, each one of the signal emitting devices being camouflaged among a part of the vehicle and hidden from view, each signal emitting device being independent of a power source for the vehicle and adapted to emit actively without prompt; registering the vehicle in a central database; providing readers for receiving signals from signal emitting devices at a plurality of locations in a geographical area; connecting the readers to a network having a central location such that information being processed by the readers is transferred to and accessible by the central location, and correlated with the central database.
According to a second broad aspect of the present invention, a system for locating stolen vehicles, the system comprising: multiple signal emitting devices embedded in a vehicle and camouflaged among various parts of the vehicle to be hidden from view, each signal emitting device being independent of a power source for the vehicle and adapted to emit actively without prompt; readers placed at a plurality of locations in a geographical area and connected to a network having a central location, the readers receiving signals from the signal emitting devices and transferring reader data to the central location; and a central database at the central location comprising registration data for each vehicle equipped with the signal emitting devices, and whereby the central database is correlated with the reader data to identify vehicles that have been stolen.
According to a third broad aspect, there is provided a vehicle comprising multiple signal emitting devices embedded and camouflaged among various parts of the vehicle to be hidden from view, each one of the signal emitting devices being independent of a power source for the vehicle and adapted to emit a signal actively without prompt at a given tuned frequency, at a given time, and at a given signal strength.
According to a fourth broad aspect, there is provided a method for preventing vehicle theft, the method comprising embedding multiple signal emitting devices in a vehicle, each one of the signal emitting devices being camouflaged among a part of the vehicle and hidden from view, each one of the signal emitting devices being independent of a power source for the vehicle and adapted to emit a signal actively without prompt at a given tuned frequency, at a given time, and at a given signal strength.
These and other features, aspects and advantages of the present invention will become better understood with regard to the following description and accompanying drawings wherein:
Throughout this application, the embodiments will be referred to as a “TAG” system. A TAG is to be understood as a signal emitting device that is placed within various parts of a vehicle. The signal is emitted for the purpose of transmitting information to a receiving entity. In one embodiment, the TAGs emit signals at regular or irregular intervals without being prompted to do so. In another embodiment, the TAGs will emit signals as a result of having received a prompt from either a TAG reader or the network with which the system works. It is also possible to have TAGs that emit signals without the prompt, but can also receive a request from a TAG reader or the network to emit at a particular point in time and emit in response to that request.
Unlike conventional anti-theft devices, the TAG system is virtually impossible to completely remove or bypass. The TAGs are stand-alone and do not need to be wired to the vehicle's power source. They can also operate at multiple frequencies, making it virtually impossible to detect the multiple TAGs installed in a vehicle. It is also impossible to jam the TAGs in a vehicle because they do not rely on a network to transmit. The TAG system can still operate as efficiently even if only one TAG remains in the vehicle. The TAG system has a substantial impact on deterring potential thefts due to its use of multiple TAGs that can be hidden in thousands of different locations throughout the vehicle. This includes locations that are virtually impossible to reach once the TAGs are dropped into an opening. The TAGs can also be affixed to the vehicle in such a way that an attempted removal of it causes damage to the vehicle. The TAG system can operate on a large geographical scale due to the fact that TAG readers can be located in virtually any area where vehicles circulate and can also be portable. The TAGs operate at very long ranges and can be read from long distances by the readers.
Scanning a vehicle should be understood to mean receiving and reading data being emitted by said signal emitting devices.
The outlined process for the TAG system is as follows. Major insurance companies mandate their customers to use the TAGs in their vehicles and also mandate the vendors that they do business with to use the TAG readers. Part vendors and body shops must use the TAG readers and be TAG certified as mandated by the major insurance companies in order to be authorized to sell to them. The demand for stolen vehicles and or stolen parts from the part vendors or body shops will then be dramatically reduced. Having witnessed the reduction in demand for stolen parts and or vehicles the thieves will in turn stay away from vehicles that are clearly identified as being equipped with the TAG system. The impossibility of completely removing or by-passing the TAGs in a vehicle, coupled with the dramatic drop in demand from illegal channels, will serve to deter thieves and substantially reduce vehicle theft overall.
The TAG system is comprised of a variable amount of transceivers and/or transponders and/or transmitters (TAGs), fixed and/or mobile electronic TAG readers and several identifying apparatuses such as warning labels or stickers.
The TAGs are installed or hidden within the vehicle to be protected. They are installed in such a manner that they are very difficult to find and virtually impossible to remove. In some cases, removal of the TAG would damage the part of the vehicle to which it is attached. The TAGs can be camouflaged by way of color matching their exterior to the vehicle's body color or by emulating a vehicle component usually found on the vehicle. The TAGS can be installed in the vehicle or affixed thereto in a variety of ways. They can be affixed using epoxy compounds, magnets, Velcro™, industrial tape, etc. The method used depends on the nature of the surface to which the TAG is affixed. Additionally, the TAG can be dropped into crevasses of the various parts of the vehicle, such as in between a door panel and the door to which the panel is attached.
The TAGs have the capability of transmitting information using multiple frequencies and signal strengths, as well as transmitting at varying times. They are also stand-alone in nature, i.e. they do not need to be hard-wired to the vehicle for power.
The TAG readers have various embodiments. They can be fixed or mobile in nature. Fixed TAG readers would generally be used in buildings or on exterior posts and so on. Mobile TAG readers would generally be used for surveying areas and or locations and could also be used by persons that are moving from location to location. The TAG readers could also have a display so that the user could read the information being read by the reader. For example, in the case of an automobile, the readers would be placed at locations such as ports, scrap yards, automotive parts resellers, body shops etc. The TAG readers would then display vehicle and or vehicle parts information being received from any TAGs found in and around that location. Alternatively, the readers do not display any information but simply transmit it directly to a central database.
The TAG system flow is as follows. Following the purchase of a TAG system the installation is done in the customer's vehicle followed by a customer registration in the database. Information such as year, make, color and model of the vehicle is part of the information contained in the registration.
Based on the proof of purchase the customer will benefit from a rebate and or credit from their insurance provider. The insurance company may provide additional incentive for installing the system, such as installation free of cost or the actual system free of cost.
TAG Readers are installed in strategic locations and or geographical areas such as salvage yards, body shops, garages, vehicle part vendors and so on. These various locations must be “TAG Certified” to become a “preferred” supplier or service provider to a member insurance company. In order for a location to be certified a verification of the reader installation must be done. This verification can be done by TAG personnel. The certified installation must be done in such a way as to make sure that all the vehicles and or parts that transit trough the location are automatically read with no exception.
TAG readers are updated with “flagged” vehicle identification numbers (VINs). In the event that a reader receives a flagged VIN from a TAG, it sends a notification to the central. Parts and/or vehicles are then seized or refused. The central then communicates with the location and/or law enforcement if applicable.
The TAG readers can also send requests for information at any time.
In order to maintain transmission costs between the readers and the central to a minimum, the central database containing all the VINs will be updated with theft notifications. Once a day, or at any given time, the central database will update all of the readers via a wireless network, and/or various other means, with a list of VINs that are flagged as being stolen. The readers will then use this lookup table to correlate any VINs that they receive from TAGs. If a reader receives a VIN from a TAG that is indexed in its lookup table as being stolen, it will then send a notification to the central requesting that further action is taken.
In order for a location to sell to or be reimbursed for labor, parts or vehicles by any member insurance company it must be TAG Certified. Therein lies the incentive for a given location to be TAG Certified.
In the event that a flagged VIN is identified by a reader, there are several actions that may be taken 29. TAG assistance may be requested and provided at the location of the reader having identified the flagged VIN. Alternatively, the parts or vehicle may be seized on the spot pending further investigation. Any transactions involving the parts or vehicle having a flagged VIN are immediately halted. Another alternative is that an enforcement agency, such as the police, is automatically notified of the positive identification of the flagged VIN and that agency proceeds according to its own procedures.
A reader may be passive or active. For example, active readers can have a display that indicates that a flagged VIN has been scanned. Passive readers can simply relay the information to the central and it is the police or the TAG system managers that will be informed that a reader at a specific location has identified a flagged VIN. Since the reader itself may or may not indicate that a positive identification has occurred, the immediate actions that can be taken at the location of the reader is a function of what type of reader is present.
The readers R1, R2, R3, . . . , RN may also communicate with each other, as well as communicate with the central database 38 through the network 36. Two-way communications of all of the entities in the system is also possible. In some instances, the central database 38 will receive information from the readers R1, R2, R3, . . . , RN through the network 36 while in other instances, it will send information to the readers R1, R2, R3, . . . , RN through the network 36. The TAGs themselves are also capable of two-way communication with the readers, i.e. they can send and receive data.
Updating of the database is necessary for vehicles that have body parts that are legally changed from one vehicle to another. The updating of the database can be done by anyone who is authorized for such a procedure.
While there are readers that are fixed and readers that are mobile, such as handheld readers for scanning purposes by law enforcement personnel, the fixed readers are capable of periodically verifying their own location to ensure that they have not been moved. This can be done by having the readers use a TAG placed in the near vicinity of the reader as a reference point. The strength of the signal received from the reference TAG will be an indication of the proximity of the reader to the reference point. The central system can periodically poll the various fixed readers in order to verify that their specific locations have not changed. Alternatively, the readers can independently verify their location and only send information to the central in the case of a discrepancy.
The difficulty of detecting the TAGs in a vehicle can be increased by having a number of functioning and a number of non-functioning devices in a single vehicle. Preferably, all major body parts of a vehicle are equipped with a TAG. Furthermore, while some TAGs are set to emit at a relatively high frequency, such as once every few minutes, others will only emit at a very low frequency, such as once every few hours. This will also discourage a car thief from sitting next to a vehicle and attempting to detect all possible TAGs within it.
In a preferred embodiment, there are at least two TAGs in each vehicle that is set to transmit only in response to a request from a reader. In order to avoid interference between the data being transmitted by a first TAG and the data being transmitted by a second TAG, the two TAGs are set to transmit at different times in response to the request. For example, the first TAG is set to transmit immediately upon reception of the request, whereas the second TAG is set to transmit after a delay of a fixed amount of milliseconds. The delay imposed on the second TAG should be sufficient to allow the reader to receive the data from the first TAG and then receive the data from the second TAG. It should be appreciated that if more than two TAGs are installed in a vehicle that respond to a request, multiple delays will be set to allow each TAG to transmit its data without interfering with data from another TAG.
It will be understood that numerous modifications thereto will appear to those skilled in the art. Accordingly, the above description and accompanying drawings should be taken as illustrative of the invention and not in a limiting sense. It will further be understood that it is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains and as may be applied to the essential features herein before set forth, and as follows in the scope of the appended claims.
The present application is a continuation application of U.S. patent application bearing Ser. No. 11/344,181, filed on Feb. 1, 2006, which is a divisional application of U.S. patent application bearing Ser. No. 10/612,879, filed Jul. 7, 2003, the contents of which are hereby incorporated by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 10612879 | Jul 2003 | US |
Child | 11344181 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11344181 | Feb 2006 | US |
Child | 12487017 | US |