1. Technical Field
The disclosure relates to vehicle management systems and, more particularly, to a vehicle use control system and a control method adapted for the system.
2. Description of Related Art
A vehicle is often supplied with two keys used to unlock and start up the vehicle. A person who needs to operate the vehicle has to have one of the keys to get access to and start up the vehicle, if he or she does not have the key, he or she will not be able to use the vehicle, even in emergency situations.
Therefore, what is needed is a vehicle use control system for unlocking a vehicle when there is no key to overcome the described shortcoming.
The vehicle unlocking unit 10 includes a first communicating module 11, a first storage module 12, a first input module 13, and a processing module 14. The vehicle control unit 20 includes a second communicating module 21, a second storage module 22, a validating module 23, and a control module 24. Each of the at least one mobile communication units 30 includes a third communicating module 31, a third storage module 32, and a second input module 33.
The second input module 33 generates a request for using the vehicle in response to user input, for example, pressing an button from the mobile communication unit 30, and the third communicating module 31 sends the request to the vehicle unlocking unit 10. In the embodiment, the third storage module 32 stores an ID corresponding to the mobile communication unit 30, and the request includes the ID and a duration of the proposed use of the vehicle. When the first communicating module 11 of the vehicle unlocking unit 10 receives the request, the processing module 14 generates a message (first prompt), which invites the holder of the electronic key to accept the request. If the first input module 13 generates an approval from the holder of the electronic key in response to the first prompt, such as, touching a key from the vehicle unlocking unit 10, the processing module 14 generates a first authentication information and controls the first communicating module 11 to send the first authentication information to the vehicle control unit 20 and to the mobile communication unit 30. Both the vehicle control unit 20 and the mobile communication unit 30 store the first authentication information to the second and the third storage modules 22, 32 respectively.
The second input module 33 acquires a second authentication information in response to user input from a person who possesses the mobile communication unit 30, and sends the second authentication information to the vehicle control unit 20. The validating module 23 acquires the second authentication information sent by the mobile communication unit 30 and determines whether the second authentication information sent by the mobile communication unit 30 matches the first authentication information in the second storage module 22 received from the vehicle unlocking unit 10. If the second authentication information sent by the mobile communication unit 30 matches the first authentication information in the second storage module 22 received from the vehicle unlocking unit 10, the control module 24 unlocks the vehicle and allows the vehicle to be started up, therefore, the user of the mobile communication unit 30 can enter and drive the vehicle.
In the embodiment, the authentication information includes a verification code generated randomly and an allowed duration for the use of the vehicle. For example, the user of the vehicle unlocking unit 10 may allow the person of the mobile communication unit 30 to use the vehicle for three hours only. The control module 24 further determines whether the current use of the vehicle is equal to the allowed duration of use. If the current use of the vehicle is equal to the allowed duration, the control module 24 generates and sends a further message (second prompt), which gives information as to the current length of use and/or the present permission has expired and invites reapplication to use the vehicle, to the person of the mobile communication unit 30, through the second communicating module 21. If the control module 24 does not receive a request from the mobile communication unit 30 within a predetermined period, the control module 24 shuts down the vehicle.
In another embodiment, the first storage module 12 stores a plurality of IDs corresponding to the vehicle unlocking unit 10. The first input module 13 generates a control command for starting up the vehicle in response to user input. The processing module 14 controls the first communicating module 11 to send an ID from the first storage module 12 to the vehicle control unit 20. The second storage module 22 of the vehicle control unit 20 stores certification information. The second communicating module 21 receives the ID from the vehicle unlocking unit 10, and the validating module 23 retrieves the ID from the vehicle unlocking unit 10 and determines whether the ID from the vehicle unlocking unit 10 matches the certification information in the second storage module 22. If the ID from the vehicle unlocking unit 10 matches the certification information, the control module 24 unlocks the vehicle and allows the vehicle to be started up.
The control module 24 further acquires the current position information of the vehicle and controls the second communicating module 21 to send the current position information to the vehicle unlocking unit 10 in real time in the course of driving, therefore, the user who has the electronic key of the vehicle may know the position of the vehicle in real time at all times.
The processing module 14 further encrypts the ID before the first communicating module 11 sends the ID to the vehicle control unit 20. The validating module 23 decrypts the ID from the vehicle unlocking unit 10 before determining whether the ID from the vehicle unlocking unit 10 matches the certification information.
Further, the processing module 14 encrypts the first authentication information before the first communicating module 11 sends the first authentication information to the vehicle control unit 20. The validating module 23 decrypts the second authentication information before determining whether the second authentication information sent by the mobile communication unit 30 matches the first authentication information in the second storage module 22 received from the vehicle unlocking unit 10.
In step S20, the mobile communication unit 30 generates a request for using a vehicle in response to user input and sends the request to the vehicle unlocking unit 10.
In step S21, the vehicle unlocking unit 10 receives the request and generates a first prompt which prompts the holder of the electronic key whether or not to accept the request. In step S22, if the vehicle unlocking unit 10 generates a rejection from the user of the electronic key in response to the first prompt, the vehicle unlocking unit 10 sends the rejection to the vehicle control unit 20. In step S29, the vehicle control unit 20 controls the vehicle to remain at a locked state.
In step S23, if an approval from the user of the electronic key is received in response to the first prompt, the vehicle unlocking unit 10 generates a first authentication information and sends the first authentication information to the vehicle control unit 20 and the mobile communication unit 30. In step S24, the mobile communication unit 30 sends a second authentication information to the vehicle control unit 20.
In step S25, the vehicle control unit 20 determines whether the second authentication information sent by the mobile communication unit 30 matches the first authentication information received from the vehicle control unit 20. In step S26, if the second authentication information sent by the mobile communication unit 30 matches the first authentication information received from the vehicle control unit 20, that is, the first authentication information is the same as the second authentication information, the vehicle control unit 20 unlocks the vehicle and allows the vehicle to be started up. If the second authentication information sent by the mobile communication unit 30 does not match the first authentication information received from the vehicle unlocking unit 10, the step goes back to S29.
In step S27, the vehicle control unit 20 determines whether the current duration of use of the vehicle is equal to the allowed duration of use according to the authentication information. In step S28, if the current duration of use of the vehicle is equal to the allowed duration, the vehicle control unit 20 generates and sends a second prompt which gives information as to the current duration of using the vehicle has expired and inviting reapplication to continue using the vehicle, and the step goes back to S20. In step S29, if the mobile communication unit 30 does not generate a request within a predetermined time, the vehicle control unit 20 shuts down the vehicle.
Although the present disclosure has been specifically described on the basis of the exemplary embodiment thereof, the disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the embodiment without departing from the scope and spirit of the disclosure.
Number | Date | Country | Kind |
---|---|---|---|
2012 1 0064723 | Mar 2012 | CN | national |
Number | Name | Date | Kind |
---|---|---|---|
4898010 | Futami et al. | Feb 1990 | A |
6718240 | Suda et al. | Apr 2004 | B1 |
6798336 | Kanda et al. | Sep 2004 | B2 |
7042334 | Mosgrove et al. | May 2006 | B2 |
8196694 | Biondo et al. | Jun 2012 | B2 |
20110160934 | Harata | Jun 2011 | A1 |
20110313922 | Ben Ayed | Dec 2011 | A1 |
20110314539 | Horton | Dec 2011 | A1 |
20120133563 | Naka | May 2012 | A1 |
20120229253 | Kolar | Sep 2012 | A1 |
Number | Date | Country |
---|---|---|
M314142 | Jun 2007 | TW |