US20150005981A1 - Methods of operation for plug-in wireless safety device - Google Patents
Methods of operation for plug-in wireless safety device Download PDFInfo
- Publication number
- US20150005981A1 US20150005981A1 US13/929,534 US201313929534A US2015005981A1 US 20150005981 A1 US20150005981 A1 US 20150005981A1 US 201313929534 A US201313929534 A US 201313929534A US 2015005981 A1 US2015005981 A1 US 2015005981A1
- Authority
- US
- United States
- Prior art keywords
- vehicle
- plug
- processor
- radio
- signals
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R16/00—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
- B60R16/02—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
- B60R16/023—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements for transmission of signals between vehicle parts or subsystems
- B60R16/0231—Circuits relating to the driving or the functioning of the vehicle
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/008—Registering or indicating the working of vehicles communicating information to a remotely located station
Definitions
- This invention relates generally to an aftermarket plug-in or dealer retrofit device providing vehicle wireless communications and, more particularly, to an aftermarket plug-in device that can be coupled to a vehicle's on-board diagnostic (OBD) connector or another accessible location to provide vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) communications or vehicle-to-entity communications (V2X).
- OBD on-board diagnostic
- V2V vehicle-to-vehicle
- V2I vehicle-to-infrastructure
- V2X vehicle-to-entity communications
- VANET Vehicular ad-hoc network
- DSRC dedicated short range communications
- V2V vehicle-to-vehicle
- V2I vehicle-to-infrastructure
- V2X short range communications that occur between a vehicle and any similarly equipped external object
- many vehicle-to-vehicle safety applications can be executed on one vehicle by simply receiving broadcast messages from one or more neighboring vehicles. These messages are not directed to any specific vehicle, but are meant to be shared with a vehicle population to support the safety application.
- the vehicle systems can warn the vehicle drivers, or possibly take action for the driver, such as applying the brakes.
- roadway infrastructure components such as traffic control units, can observe the information broadcasts or otherwise sense vehicle traffic and provide a driver warning if there is a detected hazard (e.g., if a vehicle is approaching a curve at an unsafe speed or there is a crossing vehicle that is violating a red traffic signal phase).
- V2X communications is a cooperative technology, the system is dependent on other similarly equipped entities in order to provide safety benefits.
- V2X systems are subject to the network effect, where the value of the system increases as the fleet penetration increases.
- certain safety and other features may only be available in a limited fashion, as the number of communicating vehicles is not sufficient to provide safety benefits on a large scale.
- Existing vehicles without communications equipment will not be able to communicate with newer vehicles that have been deployed with a V2X communications system. Therefore, it may be desirable to provide an aftermarket device that is capable of being plugged into an existing vehicle to allow that vehicle to be capable of providing vehicle location and state information to other vehicles and enable a variety of V2X features on the host vehicle using location and state information that is obtained from other communicating vehicles.
- an aftermarket plug-in safety device that allows a vehicle to communicate with other vehicles or infrastructures in a V2X communication system.
- the device includes a radio (e.g., DSRC, Wi-Fi, Bluetooth, LTE, etc.) for transmitting and receiving signals and a global navigation satellite system (GNSS) receiver for receiving location signals and providing vehicle position data.
- GNSS global navigation satellite system
- the device also includes a secure memory for storing digital security certificates, memory for vehicle application data and a processor that is communicatively coupled to the vehicle CAN bus.
- the processor receives vehicle location signals from the GPS receiver, determines the host vehicle state either indirectly, i.e., by deriving speed or acceleration information from the GPS data over time, or directly receives signals from the radio by reading state information from the vehicle CAN bus interface, and provides signals for transmission to the radio.
- the processor identifies the vehicle that the plug-in device is coupled to so as to determine host vehicle human-vehicle interface capabilities or vehicle actuation capabilities, and provides data on the CAN bus identifying the device to enable the vehicle to authenticate the device.
- the processor also performs self-configuring operations based on type of vehicle, access to vehicle systems and location of the vehicle.
- FIG. 1 is an illustration of a partial interior of a vehicle including a plug-in safety device
- FIG. 2 is a schematic block diagram of the plug-in safety device referred to in FIG. 1 ;
- FIG. 3 is a flow chart diagram showing a process for operating the plug-in safety device.
- V2X communications systems are currently being developed that allow the vehicles that have these systems to communicate with one another so that these vehicles are able to provide warnings that can be received by the other vehicles.
- the present invention proposes a plug-in device that is capable of providing V2X communications when connected to the vehicle.
- the plug-in device can be connected to the vehicle at any suitable and available location (e.g., diagnostics port, adjacent to an existing vehicle electronic control module using a junction connector, or into a new or existing accessory port such as USB or other interface that is provided by the OEM to accommodate brought in devices).
- OBD on-board diagnostic
- the plug-in device will have the ability to identify the vehicle's capabilities and parameters once it is plugged in by receiving signals from the vehicle's controller area network (CAN) bus.
- the device will also provide information about the device to the vehicle CAN bus and may actuate a variety of in-vehicle systems (e.g., including, but not limited to, driver displays, audible chimes, haptic seat, braking, throttle or steering systems).
- the device will be able to identify the make and model of the vehicle and specific on-board features that vehicle may have, such as warning chimes, seat vibration, displays, etc.
- the device self-configures system algorithms based on the determined capabilities and system security access, i.e., the authorized data set that is provided by the vehicle manufacture to the plug-in device, and self-configures operational modes based on system security access and vehicle capabilities (e.g., if the vehicle does not provide any audible warning interface, the device may generate its own audible alerts). Based on that knowledge, the algorithms operating on the plug-in device can be adapted for the particular vehicle that the device is connected to.
- the plug-in device will also identify, typically through GPS, the location of the vehicle, and subsequently adhere to the operational standards that are in place for the identified region (e.g., over-the-air message format, congestion control mechanism, transmission frequency, etc.).
- Region information can be determined from a local digital map database or from a cloud database API that provides access to country information. For example, different regions, such as the United States or Europe, have certain variations in terms of radio channel usage, messaging protocols, application set, or application behavior. Also, some locations, such as satellite ground based station locations, do not allow communications at certain frequency bands.
- the plug-in device would identify when the vehicle is in proximity to one of these locations by accessing a database that is local to the device or stored remotely in the cloud and disable communications upon entry to one of these areas and resume communications upon exiting one of these areas.
- the plug-in device will provide a driver indication that the system is disabled when an entry into the restricted area has been determined.
- Such adaptations by region illustrate how location information can be used at a macroscopic level to configure device operation in accordance with regional standards. Within a particular region, road-level location information can enable other types of adaptations.
- the device may self-configure feature priorities based on local real-time or historic traffic data, such as provide an indication when the vehicle is approaching busy intersections, or by adapting the warning time at such locations, i.e., adjust the warning to a conservative setting.
- feature sensitivity can be adjusted based on local environment, such as increased sensitivity near schools (e.g., increasing the sensitivity of pedestrian detection applications) and rural areas (e.g., increasing the sensitivity of oncoming vehicle applications), and level of driver engagement, for example, the warning time is adjusted to a more conservative setting if the driver monitoring system is detecting that the driver is distracted or drowsy.
- the plug-in safety device also allows the user to configure or set parameters for the particular user so that the operation of the device can be personalized to that user, where these features may include such elements as warning timing (e.g., allow the user to adjust when alert is provided in accordance with their preferred driving style), which available features are enabled, etc.
- warning timing e.g., allow the user to adjust when alert is provided in accordance with their preferred driving style
- available features are enabled, etc.
- Configuring the system parameters for a particular user can be accomplished in a number of ways, such as by using a smart phone (the user could pair to the plug-in device and enter configuration settings on the smart phone device), using near field communications (NFC) (the user could specify the desired settings on a smart phone or laptop computer and use NFC to communicate the settings to the plug-in device), through WiFi or Bluetooth devices, through OnStarTM, etc. Further, a USB connection could be made to a laptop, where the laptop would recognize the device and bring up an application that enables the user to enter the desired device settings. Examples of features that could be turned on and off include warnings for vehicles traveling with hazard lights, disabled vehicle, hard braking vehicle, etc.
- the device can be configured so that some features may be active when the vehicle is traveling above a certain speed.
- the user would have the option of specifying different speed ranges for different applications.
- driver warnings could be configured by distance (e.g., an alert is provided if the host vehicle is within 250 meters of the event) or preferred notification time (e.g., an alert is provided if the host vehicle is within seven seconds of the event based on the current host vehicle speed).
- the message transmitted between vehicles as discussed herein must be secure to prevent hackers from broadcasting improper messages.
- the messages are typically signed and authenticated using digital signatures based on an underlying public key infrastructure (PKI) in accordance with the IEEE 1609.2 standard specification.
- PKI public key infrastructure
- Each principal in a PKI system has a pair of keys, namely, a private key and a public key.
- the private key is known only to the principal and the public key can be shared with other entities in the system.
- the sender of the message signs the message with its private key, and adds the signature to the message.
- the recipient can verify the signature of the message using the sender's public key.
- a fundamental problem in the PKI architecture is the exchange of the public keys without compromising them.
- a trusted entity known as a certifying authority (CA)
- CA certifying authority
- a certificate includes several fields, namely, the public key, geographic scope or region of the certificate, a certified revocation list series number associated with the certificate, the expiration time of the certificate and the signature of the CA.
- the public key of the CA In order to verify the certificates signed by the CA, the public key of the CA must be available at each entity of the PKI system. Because the distribution of all of the certificates issued by the CA is impractical, the IEEE 1609.2 standard specifies that a sender should add its certificate to a signed message.
- the messages transmitted by the plug-in device are signed with a certificate, and those certificates are continually being updated for security purposes. It will eventually be necessary to provide new certificates to the plug-in device that are used to sign the messages.
- Various techniques are proposed to allow the device to receive the new security certificates, such as connecting the device to a laptop computer or taking the device to a dealership, the Department of Motor Vehicles, a certificate kiosk, etc.
- the device provides identity information to the vehicle, such as device type or manufacturer, third party subscriber information, etc.
- the access of the plug-in device to the various vehicle systems may be fully or partially granted according to any number of protocols or rules, which may be regional, original equipment manufacturer (OEM) specific, etc.
- OEM original equipment manufacturer
- Such access limitations enable device and/or vehicle manufactures to enter into licensing agreements and share the vehicle propriety data that enables specific V2X applications.
- Such a design also enables specific categories of devices that may be sold in the market, such as (1) transmit-only devices that provide simple vehicle awareness, (2) transmit/receive devices that provide driver warnings or (3) more advanced devices that perform certain types of vehicle control functions.
- a vehicle manufacturer could grant access to vehicle systems based on the device type that is supplied by the plug-in device.
- Such classifications defined by the device manufacturer or OEM can be used to restrict access to vehicle data and/or enforce standard compliance, determine device certification status, restrict access to purchased services, etc.
- Different access levels may include access to vehicle information systems (such as vehicle sensors) non-safety related vehicle actuators that have both read and write capabilities, such as heated mirror on/off, or seat positioning system, vehicle displays including visual displays such as a driver information center, center stack, audible chime system or haptic interfaces. If so authorized, the device may have access to vehicle control systems, such as safety enhancing systems (e.g., headlight aiming, windshield wipers) and critical safety systems, such as braking, steering, throttle, etc.
- safety enhancing systems e.g., headlight aiming, windshield wipers
- critical safety systems such as braking, steering, throttle, etc.
- Access granted by the device could depend on its location, for example, North America or Europe, where there may be different policies in place that govern the type of vehicle display or vehicle control operations that may be performed.
- Regional requirements may define congestion control mechanisms, such as the power of the transmitted message or the rate of the transmitted message.
- the region may also set security policies, such as how often the digital certificates are replaced or rotated.
- the device access and operation may be limited based on locality, where the device may be disabled in prohibited areas, such as near terrestrial satellite or military locations, safety features may run at higher rates at high risks areas, such as intersections, various feature functionalities can be adapted for different geographic locations and predicted level driver engagement, etc.
- FIG. 1 is a broken-away perspective view of an interior of a vehicle 10 having a steering wheel 12 .
- the vehicle 10 also includes a plug-in safety device 14 of the type discussed above plugged into an on-board diagnostic (OBD) connector 16 under the steering wheel 12 .
- OBD on-board diagnostic
- the device 14 can be connected to the vehicle 10 at any suitable connection location where it would be able to receive signals from the vehicle CAN bus depending on the type of vehicle, the capabilities of the device 14 , etc.
- FIG. 2 is a schematic block diagram of a vehicle system 20 including a plug-in safety device 22 , such as the device 14 .
- the device 22 includes an ECU 24 that runs the various algorithms and protocols discussed herein for operation of the device 22 .
- the device 22 also includes a DCRC radio 26 that receives and transmits the V2X communications signals and messages that are up-converted for transmission, down-converted for reception, amplified, filtered, converted between analog and digitals signals, etc.
- Other types of radios can also be used, such as Wi-Fi radios, Bluetooth radios, long term evolution (LTE) radios, etc.
- the received signals are converted from analog signals to digital signals and then sent to the ECU 24 and the digital signals from the ECU 24 for transmission are converted to analog signals for up-conversion.
- the device 22 also includes a global navigation satellite system (GNSS) receiver 28 that receives GPS signals, where the receiver 28 provides time keeping signals to the radio 26 and vehicle position signals to the ECU 24 .
- GNSS global navigation satellite system
- Such a GNSS system may include the existing GPS, Galileo, etc. systems and/or ground-based systems that provide their own location information or augment the satellite based systems. Some device embodiments may utilize the existing positioning system of the vehicle through data that is obtained through the vehicle serial data bus.
- the device 22 also includes a suitable memory 30 that stores data necessary to run the algorithms and protocols in the ECU 24 , such as security certificates, certificate revocation lists (CRL), application data, etc.
- the vehicle system 20 includes a GPS antenna 32 that provides the GPS signals to the GPS receiver 28 . Additionally, the antenna 32 can be used to transmit signals provided by the radio 26 or receive V2V or V2I communications signals that are sent to the radio 26 . In an alternate embodiment, separate antennas are provided for the GPS signals and the DSRC communications signals.
- Vehicle dynamics and operational state data available on a vehicle CAN bus 34 is provided to the ECU 24 and the ECU 24 provides necessary signals on the CAN bus 34 for proper vehicle operation.
- the ECU 24 provides signals to a driver vehicle interface 36 intended to represent any or all of the various devices that could provide advisory or warning sounds, visual displays, seat vibrations, steering wheel vibrations, etc. as warnings in a safety application.
- the digital certificates stored in the memory 30 will need to be updated periodically.
- Box 40 represents a security credential management system (SCMS) that has some applicable infrastructure, such as those mentioned above, that processes requests for, generates and delivers security certificates to users and maintains and delivers CRLs.
- An antenna 38 provides the communications link between the radio 26 and the SCMS 40 for this purpose.
- FIG. 3 is a flow chart diagram 50 showing a high level operation of the plug-in safety device 22 discussed herein.
- the device 22 is in a sleep mode where the device 22 has been previously formatted for a particular user, has been plugged into a particular vehicle, and the vehicle is in an off condition where there is no vehicle bus traffic. In this condition, the device 22 goes into the sleep mode to wait for vehicle activity where it may be needed.
- the device 22 is powered through the OBD connection 16 and periodically sends out a polling signal to decision diamond 54 to determine whether there is traffic on the CAN bus 34 and the device 22 should wake up for operation. If no bus traffic is detected, then the device 22 remains in the sleep mode at the box 52 .
- the device 22 may be equipped with a vibration sensor, where the polling signal determines if vibrations have been sensed at the decision diamond 54 to wake the device 22 up from the sleep mode.
- the device operation moves to box 56 to determine what region the device 22 is currently in and what protocols and algorithms would need to be used for that location.
- the algorithm running in the ECU 24 uses the GPS signals and the GNSS to determine the location of the device 22 , and the vehicle state. Particularly, the device 22 would determine whether it is in the same vehicle it was in when it went to sleep, or whether it is now in a different vehicle at decision diamond 58 . If the vehicle is identified at the decision diamond 58 , then the algorithm will go through a device authentication process at box 60 to determine whether the device 22 is authorized to perform certain operations that may require a subscription or some verification that the device 22 is being used consistent with the discussion herein. This authentication process may require the device to communicate with a remote facility at box 62 .
- the algorithm determines whether the device 22 has been authenticated at decision diamond 64 , and if not, the device 22 can only operate in a standalone operation mode at box 66 .
- the standalone operation mode is also allowed if the vehicle interface is not known at the decision diamond 58 .
- the standalone operation mode may provide a number of operations for receiving signals from other vehicles and transmitting signals to those vehicles that only require GPS information.
- the device 22 will not be able to access most vehicle systems and will be limited in what operations it can perform because it has not been authenticated.
- the vehicle bus may go off where the device 22 goes to sleep at the box 52 .
- the connected operation mode is a more robust operation where the vehicle can send out messages of a more detailed vehicle operation. For example, if the vehicle is slipping on ice, where the traction control system and yaw rate sensors identify such a condition, the vehicle will be able to transmit those conditions to other vehicles on the communications link. Other applications would apply if the device 22 is connected to the vehicle systems for the connected operation mode, such as identifying suspension anomalies, such as the vehicle traveling over a pot hole, which can also be transmitted on the communications link.
- the device 22 is connected to the vehicle systems so that if a safety condition is received from another vehicle, the algorithm determines whether the vehicle has display access at decision diamond 72 , and if so uses the appropriate visual, auditory or tactile availability at box 74 to warn the driver. If the vehicle does not have suitable display access at the decision diamond 72 , then the algorithm provides some kind of device alert at box 68 , such as audible tones. Likewise, during the standalone operation mode at the box 66 , where the device 22 is not connected to the vehicle systems, and the device 22 receives a warning from another vehicle, that warning will also be provided to the vehicle operator as an alert at the box 68 .
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Traffic Control Systems (AREA)
- Automation & Control Theory (AREA)
- Mechanical Engineering (AREA)
Abstract
Description
- 1. Field of the Invention
- This invention relates generally to an aftermarket plug-in or dealer retrofit device providing vehicle wireless communications and, more particularly, to an aftermarket plug-in device that can be coupled to a vehicle's on-board diagnostic (OBD) connector or another accessible location to provide vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) communications or vehicle-to-entity communications (V2X).
- 2. Discussion of the Related Art
- Traffic accidents and roadway congestion are significant problems for vehicle travel. Vehicular ad-hoc network (VANET) based active safety and driver assistance systems, such as a dedicated short range communications (DSRC) system, known to those skilled in the art, allow a vehicle to transmit messages to other vehicles in a particular area with warning messages about dangerous road conditions, driving events, accidents, etc. In these systems, either direct broadcast communications or multi-hop geocast routing protocols, known to those skilled in the art, are commonly used to communicate warning messages, i.e., to deliver messages to vehicles that are within direct communication range or are located within a few kilometers from the road condition. In other words, an initial message advising drivers of a potential hazardous condition is transmitted from vehicle to vehicle either in a direct broadcast fashion or by using a geocast routing protocol so that vehicles within the desired application range will receive the messages of interest.
- The communications systems referred to above include vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) applications that require a minimum of one entity to send information to another entity. Broadly, short range communications that occur between a vehicle and any similarly equipped external object may be referred to as “V2X” communications. For example, many vehicle-to-vehicle safety applications can be executed on one vehicle by simply receiving broadcast messages from one or more neighboring vehicles. These messages are not directed to any specific vehicle, but are meant to be shared with a vehicle population to support the safety application. In these types of applications where collision avoidance is desirable, as two or more vehicles talk to one another and a collision becomes probable, the vehicle systems can warn the vehicle drivers, or possibly take action for the driver, such as applying the brakes. Likewise, roadway infrastructure components, such as traffic control units, can observe the information broadcasts or otherwise sense vehicle traffic and provide a driver warning if there is a detected hazard (e.g., if a vehicle is approaching a curve at an unsafe speed or there is a crossing vehicle that is violating a red traffic signal phase).
- Since V2X communications is a cooperative technology, the system is dependent on other similarly equipped entities in order to provide safety benefits. As such, V2X systems are subject to the network effect, where the value of the system increases as the fleet penetration increases. In the early years of deployment, certain safety and other features may only be available in a limited fashion, as the number of communicating vehicles is not sufficient to provide safety benefits on a large scale. Existing vehicles without communications equipment will not be able to communicate with newer vehicles that have been deployed with a V2X communications system. Therefore, it may be desirable to provide an aftermarket device that is capable of being plugged into an existing vehicle to allow that vehicle to be capable of providing vehicle location and state information to other vehicles and enable a variety of V2X features on the host vehicle using location and state information that is obtained from other communicating vehicles.
- In accordance with the teachings of the present invention, an aftermarket plug-in safety device is disclosed that allows a vehicle to communicate with other vehicles or infrastructures in a V2X communication system. The device includes a radio (e.g., DSRC, Wi-Fi, Bluetooth, LTE, etc.) for transmitting and receiving signals and a global navigation satellite system (GNSS) receiver for receiving location signals and providing vehicle position data. The device also includes a secure memory for storing digital security certificates, memory for vehicle application data and a processor that is communicatively coupled to the vehicle CAN bus. The processor receives vehicle location signals from the GPS receiver, determines the host vehicle state either indirectly, i.e., by deriving speed or acceleration information from the GPS data over time, or directly receives signals from the radio by reading state information from the vehicle CAN bus interface, and provides signals for transmission to the radio. The processor identifies the vehicle that the plug-in device is coupled to so as to determine host vehicle human-vehicle interface capabilities or vehicle actuation capabilities, and provides data on the CAN bus identifying the device to enable the vehicle to authenticate the device. The processor also performs self-configuring operations based on type of vehicle, access to vehicle systems and location of the vehicle.
- Additional features of the present invention will become apparent from the following description and appended claims, taken in conjunction with the accompanying drawings.
-
FIG. 1 is an illustration of a partial interior of a vehicle including a plug-in safety device; -
FIG. 2 is a schematic block diagram of the plug-in safety device referred to inFIG. 1 ; and -
FIG. 3 is a flow chart diagram showing a process for operating the plug-in safety device. - The following discussion of the embodiments of the invention directed to a plug-in safety device for V2X communications is merely exemplary in nature, and is in no way intended to limit the invention or its applications or uses.
- As discussed above, V2X communications systems are currently being developed that allow the vehicles that have these systems to communicate with one another so that these vehicles are able to provide warnings that can be received by the other vehicles. In an effort to provide safety benefits for those vehicles currently on the roadway that do not have V2X communications capabilities, the present invention proposes a plug-in device that is capable of providing V2X communications when connected to the vehicle. The plug-in device can be connected to the vehicle at any suitable and available location (e.g., diagnostics port, adjacent to an existing vehicle electronic control module using a junction connector, or into a new or existing accessory port such as USB or other interface that is provided by the OEM to accommodate brought in devices). All vehicles manufactured beginning in 1996 are required to have an on-board diagnostic (OBD) system that provides diagnostic signals having known messaging formats and protocols identifying the state of health of vehicle components, devices and sub-systems through an OBD connector. The connector is normally required to be located under the vehicle steering column. The OBD connector provides one suitable location for accepting the plug-in device.
- As will be discussed in further detail below, the plug-in device will have the ability to identify the vehicle's capabilities and parameters once it is plugged in by receiving signals from the vehicle's controller area network (CAN) bus. The device will also provide information about the device to the vehicle CAN bus and may actuate a variety of in-vehicle systems (e.g., including, but not limited to, driver displays, audible chimes, haptic seat, braking, throttle or steering systems). For example, the device will be able to identify the make and model of the vehicle and specific on-board features that vehicle may have, such as warning chimes, seat vibration, displays, etc. The device self-configures system algorithms based on the determined capabilities and system security access, i.e., the authorized data set that is provided by the vehicle manufacture to the plug-in device, and self-configures operational modes based on system security access and vehicle capabilities (e.g., if the vehicle does not provide any audible warning interface, the device may generate its own audible alerts). Based on that knowledge, the algorithms operating on the plug-in device can be adapted for the particular vehicle that the device is connected to.
- The plug-in device will also identify, typically through GPS, the location of the vehicle, and subsequently adhere to the operational standards that are in place for the identified region (e.g., over-the-air message format, congestion control mechanism, transmission frequency, etc.). Region information can be determined from a local digital map database or from a cloud database API that provides access to country information. For example, different regions, such as the United States or Europe, have certain variations in terms of radio channel usage, messaging protocols, application set, or application behavior. Also, some locations, such as satellite ground based station locations, do not allow communications at certain frequency bands. The plug-in device would identify when the vehicle is in proximity to one of these locations by accessing a database that is local to the device or stored remotely in the cloud and disable communications upon entry to one of these areas and resume communications upon exiting one of these areas. The plug-in device will provide a driver indication that the system is disabled when an entry into the restricted area has been determined. Such adaptations by region illustrate how location information can be used at a macroscopic level to configure device operation in accordance with regional standards. Within a particular region, road-level location information can enable other types of adaptations. The device may self-configure feature priorities based on local real-time or historic traffic data, such as provide an indication when the vehicle is approaching busy intersections, or by adapting the warning time at such locations, i.e., adjust the warning to a conservative setting. Additionally, feature sensitivity can be adjusted based on local environment, such as increased sensitivity near schools (e.g., increasing the sensitivity of pedestrian detection applications) and rural areas (e.g., increasing the sensitivity of oncoming vehicle applications), and level of driver engagement, for example, the warning time is adjusted to a more conservative setting if the driver monitoring system is detecting that the driver is distracted or drowsy.
- The plug-in safety device also allows the user to configure or set parameters for the particular user so that the operation of the device can be personalized to that user, where these features may include such elements as warning timing (e.g., allow the user to adjust when alert is provided in accordance with their preferred driving style), which available features are enabled, etc. Once those features are set into the device, the settings will remain with the device so that if the device is taken from one vehicle to another vehicle, such as a rental car, those settings would automatically be used for the new vehicle. Configuring the system parameters for a particular user can be accomplished in a number of ways, such as by using a smart phone (the user could pair to the plug-in device and enter configuration settings on the smart phone device), using near field communications (NFC) (the user could specify the desired settings on a smart phone or laptop computer and use NFC to communicate the settings to the plug-in device), through WiFi or Bluetooth devices, through OnStar™, etc. Further, a USB connection could be made to a laptop, where the laptop would recognize the device and bring up an application that enables the user to enter the desired device settings. Examples of features that could be turned on and off include warnings for vehicles traveling with hazard lights, disabled vehicle, hard braking vehicle, etc. Further, the device can be configured so that some features may be active when the vehicle is traveling above a certain speed. The user would have the option of specifying different speed ranges for different applications. Also, driver warnings could be configured by distance (e.g., an alert is provided if the host vehicle is within 250 meters of the event) or preferred notification time (e.g., an alert is provided if the host vehicle is within seven seconds of the event based on the current host vehicle speed).
- The message transmitted between vehicles as discussed herein must be secure to prevent hackers from broadcasting improper messages. In one known protocol, the messages are typically signed and authenticated using digital signatures based on an underlying public key infrastructure (PKI) in accordance with the IEEE 1609.2 standard specification. Each principal in a PKI system has a pair of keys, namely, a private key and a public key. The private key is known only to the principal and the public key can be shared with other entities in the system. The keys can be visualized as a pair of functions Pr and Pu representing the private and public keys, respectively, and having the property M=Pr(Pu(M)) and M=Pu(Pr(M)), where M is the message that is to be secured using the keys. To ensure message integrity, the sender of the message signs the message with its private key, and adds the signature to the message. Upon receiving the message, the recipient can verify the signature of the message using the sender's public key.
- A fundamental problem in the PKI architecture is the exchange of the public keys without compromising them. One widely accepted solution is for a trusted entity, known as a certifying authority (CA), to digitally sign data structures, known as certificates, that state the binding nature between names and public keys. In the case of the IEEE 1609.2 standard, a certificate includes several fields, namely, the public key, geographic scope or region of the certificate, a certified revocation list series number associated with the certificate, the expiration time of the certificate and the signature of the CA. In order to verify the certificates signed by the CA, the public key of the CA must be available at each entity of the PKI system. Because the distribution of all of the certificates issued by the CA is impractical, the IEEE 1609.2 standard specifies that a sender should add its certificate to a signed message.
- In one non-limiting embodiment, the messages transmitted by the plug-in device are signed with a certificate, and those certificates are continually being updated for security purposes. It will eventually be necessary to provide new certificates to the plug-in device that are used to sign the messages. Various techniques are proposed to allow the device to receive the new security certificates, such as connecting the device to a laptop computer or taking the device to a dealership, the Department of Motor Vehicles, a certificate kiosk, etc.
- The device provides identity information to the vehicle, such as device type or manufacturer, third party subscriber information, etc. The access of the plug-in device to the various vehicle systems may be fully or partially granted according to any number of protocols or rules, which may be regional, original equipment manufacturer (OEM) specific, etc. Such access limitations enable device and/or vehicle manufactures to enter into licensing agreements and share the vehicle propriety data that enables specific V2X applications. Such a design also enables specific categories of devices that may be sold in the market, such as (1) transmit-only devices that provide simple vehicle awareness, (2) transmit/receive devices that provide driver warnings or (3) more advanced devices that perform certain types of vehicle control functions. In this design, a vehicle manufacturer could grant access to vehicle systems based on the device type that is supplied by the plug-in device. Such classifications defined by the device manufacturer or OEM can be used to restrict access to vehicle data and/or enforce standard compliance, determine device certification status, restrict access to purchased services, etc. Different access levels may include access to vehicle information systems (such as vehicle sensors) non-safety related vehicle actuators that have both read and write capabilities, such as heated mirror on/off, or seat positioning system, vehicle displays including visual displays such as a driver information center, center stack, audible chime system or haptic interfaces. If so authorized, the device may have access to vehicle control systems, such as safety enhancing systems (e.g., headlight aiming, windshield wipers) and critical safety systems, such as braking, steering, throttle, etc.
- Access granted by the device could depend on its location, for example, North America or Europe, where there may be different policies in place that govern the type of vehicle display or vehicle control operations that may be performed. Regional requirements may define congestion control mechanisms, such as the power of the transmitted message or the rate of the transmitted message. The region may also set security policies, such as how often the digital certificates are replaced or rotated. The device access and operation may be limited based on locality, where the device may be disabled in prohibited areas, such as near terrestrial satellite or military locations, safety features may run at higher rates at high risks areas, such as intersections, various feature functionalities can be adapted for different geographic locations and predicted level driver engagement, etc.
-
FIG. 1 is a broken-away perspective view of an interior of avehicle 10 having asteering wheel 12. Thevehicle 10 also includes a plug-insafety device 14 of the type discussed above plugged into an on-board diagnostic (OBD)connector 16 under thesteering wheel 12. This is by way of a non-limiting example in that thedevice 14 can be connected to thevehicle 10 at any suitable connection location where it would be able to receive signals from the vehicle CAN bus depending on the type of vehicle, the capabilities of thedevice 14, etc. -
FIG. 2 is a schematic block diagram of avehicle system 20 including a plug-insafety device 22, such as thedevice 14. Thedevice 22 includes anECU 24 that runs the various algorithms and protocols discussed herein for operation of thedevice 22. Thedevice 22 also includes aDCRC radio 26 that receives and transmits the V2X communications signals and messages that are up-converted for transmission, down-converted for reception, amplified, filtered, converted between analog and digitals signals, etc. Other types of radios can also be used, such as Wi-Fi radios, Bluetooth radios, long term evolution (LTE) radios, etc. The received signals are converted from analog signals to digital signals and then sent to theECU 24 and the digital signals from theECU 24 for transmission are converted to analog signals for up-conversion. Thedevice 22 also includes a global navigation satellite system (GNSS)receiver 28 that receives GPS signals, where thereceiver 28 provides time keeping signals to theradio 26 and vehicle position signals to theECU 24. Such a GNSS system may include the existing GPS, Galileo, etc. systems and/or ground-based systems that provide their own location information or augment the satellite based systems. Some device embodiments may utilize the existing positioning system of the vehicle through data that is obtained through the vehicle serial data bus. Thedevice 22 also includes asuitable memory 30 that stores data necessary to run the algorithms and protocols in theECU 24, such as security certificates, certificate revocation lists (CRL), application data, etc. Thevehicle system 20 includes aGPS antenna 32 that provides the GPS signals to theGPS receiver 28. Additionally, theantenna 32 can be used to transmit signals provided by theradio 26 or receive V2V or V2I communications signals that are sent to theradio 26. In an alternate embodiment, separate antennas are provided for the GPS signals and the DSRC communications signals. - Vehicle dynamics and operational state data available on a
vehicle CAN bus 34 is provided to theECU 24 and theECU 24 provides necessary signals on theCAN bus 34 for proper vehicle operation. TheECU 24 provides signals to adriver vehicle interface 36 intended to represent any or all of the various devices that could provide advisory or warning sounds, visual displays, seat vibrations, steering wheel vibrations, etc. as warnings in a safety application. As mentioned above, the digital certificates stored in thememory 30 will need to be updated periodically.Box 40 represents a security credential management system (SCMS) that has some applicable infrastructure, such as those mentioned above, that processes requests for, generates and delivers security certificates to users and maintains and delivers CRLs. Anantenna 38 provides the communications link between theradio 26 and theSCMS 40 for this purpose. -
FIG. 3 is a flow chart diagram 50 showing a high level operation of the plug-insafety device 22 discussed herein. Atbox 52, thedevice 22 is in a sleep mode where thedevice 22 has been previously formatted for a particular user, has been plugged into a particular vehicle, and the vehicle is in an off condition where there is no vehicle bus traffic. In this condition, thedevice 22 goes into the sleep mode to wait for vehicle activity where it may be needed. During the sleep mode, thedevice 22 is powered through theOBD connection 16 and periodically sends out a polling signal todecision diamond 54 to determine whether there is traffic on theCAN bus 34 and thedevice 22 should wake up for operation. If no bus traffic is detected, then thedevice 22 remains in the sleep mode at thebox 52. In an alternate embodiment, thedevice 22 may be equipped with a vibration sensor, where the polling signal determines if vibrations have been sensed at thedecision diamond 54 to wake thedevice 22 up from the sleep mode. - If bus traffic or a vibration is detected at the
decision diamond 54, then the device operation moves to box 56 to determine what region thedevice 22 is currently in and what protocols and algorithms would need to be used for that location. The algorithm running in theECU 24 uses the GPS signals and the GNSS to determine the location of thedevice 22, and the vehicle state. Particularly, thedevice 22 would determine whether it is in the same vehicle it was in when it went to sleep, or whether it is now in a different vehicle atdecision diamond 58. If the vehicle is identified at thedecision diamond 58, then the algorithm will go through a device authentication process atbox 60 to determine whether thedevice 22 is authorized to perform certain operations that may require a subscription or some verification that thedevice 22 is being used consistent with the discussion herein. This authentication process may require the device to communicate with a remote facility atbox 62. - The algorithm then determines whether the
device 22 has been authenticated atdecision diamond 64, and if not, thedevice 22 can only operate in a standalone operation mode atbox 66. The standalone operation mode is also allowed if the vehicle interface is not known at thedecision diamond 58. The standalone operation mode may provide a number of operations for receiving signals from other vehicles and transmitting signals to those vehicles that only require GPS information. In the standalone mode, thedevice 22 will not be able to access most vehicle systems and will be limited in what operations it can perform because it has not been authenticated. During the standalone operation mode, the vehicle bus may go off where thedevice 22 goes to sleep at thebox 52. - If the
device 22 is authenticated at thedecision diamond 64, then thedevice 22 goes into a connected operation mode at box 70. The connected operation mode is a more robust operation where the vehicle can send out messages of a more detailed vehicle operation. For example, if the vehicle is slipping on ice, where the traction control system and yaw rate sensors identify such a condition, the vehicle will be able to transmit those conditions to other vehicles on the communications link. Other applications would apply if thedevice 22 is connected to the vehicle systems for the connected operation mode, such as identifying suspension anomalies, such as the vehicle traveling over a pot hole, which can also be transmitted on the communications link. During the connected operation mode at the box 70, thedevice 22 is connected to the vehicle systems so that if a safety condition is received from another vehicle, the algorithm determines whether the vehicle has display access atdecision diamond 72, and if so uses the appropriate visual, auditory or tactile availability atbox 74 to warn the driver. If the vehicle does not have suitable display access at thedecision diamond 72, then the algorithm provides some kind of device alert atbox 68, such as audible tones. Likewise, during the standalone operation mode at thebox 66, where thedevice 22 is not connected to the vehicle systems, and thedevice 22 receives a warning from another vehicle, that warning will also be provided to the vehicle operator as an alert at thebox 68. - As will be well understood by those skilled in the art, the several and various steps and processes discussed herein to describe the invention may be referring to operations performed by a computer, a processor or other electronic calculating devices that manipulate and/or transform data using electrical phenomenon. Those computers and electronic devices may employ various volatile and/or non-volatile memories including non-transitory computer-readable medium with an executable program stored thereon including various code or executable instructions able to be performed by the computer or processor, where the memory and/or computer-readable medium may include all forms and types of memory and other computer-readable media.
- The foregoing discussion disclosed and describes merely exemplary embodiments of the present invention. One skilled in the art will readily recognize from such discussion and from the accompanying drawings and claims that various changes, modifications and variations can be made therein without departing from the spirit and scope of the invention as defined in the following claims.
Claims (22)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/929,534 US8930041B1 (en) | 2013-06-27 | 2013-06-27 | Methods of operation for plug-in wireless safety device |
DE102013113617.6A DE102013113617B4 (en) | 2013-06-27 | 2013-12-06 | Plug-in device for wireless communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/929,534 US8930041B1 (en) | 2013-06-27 | 2013-06-27 | Methods of operation for plug-in wireless safety device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150005981A1 true US20150005981A1 (en) | 2015-01-01 |
US8930041B1 US8930041B1 (en) | 2015-01-06 |
Family
ID=52017162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/929,534 Expired - Fee Related US8930041B1 (en) | 2013-06-27 | 2013-06-27 | Methods of operation for plug-in wireless safety device |
Country Status (2)
Country | Link |
---|---|
US (1) | US8930041B1 (en) |
DE (1) | DE102013113617B4 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150091740A1 (en) * | 2013-08-02 | 2015-04-02 | Honda Motor Co., Ltd. | System and method for detection and utilization of driver distraction level |
US20150153178A1 (en) * | 2013-11-29 | 2015-06-04 | Hyundai Mobis Co., Ltd. | Car navigation system and method in which global navigation satellite system (gnss) and dead reckoning (dr) are merged |
US20150163854A1 (en) * | 2013-12-09 | 2015-06-11 | Hyundai Motor Company | System and method for providing communication service, and vehicle supporting the same |
US20150256534A1 (en) * | 2014-03-04 | 2015-09-10 | Nissan North America, Inc. | On-board vehicle communication system and method |
US20160119151A1 (en) * | 2014-10-22 | 2016-04-28 | Hyundai Motor Company | Method and system for detecting misbehavior for vehicle-to-anything communication |
US20160219029A1 (en) * | 2015-01-27 | 2016-07-28 | Renesas Electronics Corporation | Communication device, lsi, program, and communication system |
CN105882823A (en) * | 2015-12-29 | 2016-08-24 | 乐卡汽车智能科技(北京)有限公司 | Intelligent bicycle |
US20160255154A1 (en) * | 2013-10-08 | 2016-09-01 | Ictk Co., Ltd. | Vehicle security network device and design method therefor |
US20160255459A1 (en) * | 2015-02-27 | 2016-09-01 | Plantronics, Inc. | Mobile User Device and Method of Communication over a Wireless Medium |
US20160328972A1 (en) * | 2013-12-18 | 2016-11-10 | Continental Teves Ag & Co. Ohg | Method for classifying a received vehicle-to-x message |
KR20170006859A (en) * | 2015-07-10 | 2017-01-18 | 엘지전자 주식회사 | Mobile terminal, vehicle and method for controlling the same |
US9685086B2 (en) * | 2015-05-27 | 2017-06-20 | Cisco Technology, Inc. | Power conservation in traffic safety applications |
US9799058B2 (en) | 2015-01-31 | 2017-10-24 | Foribus, LLC. | Vehicle valuation system and method |
US9922564B2 (en) | 2013-08-02 | 2018-03-20 | Honda Motor Co., Ltd. | Vehicle pedestrian safety system and methods of use and manufacture thereof |
EP3438945A3 (en) * | 2017-08-03 | 2019-05-08 | Forward Electronics Co., ltd. | Portable plug and play collision avoidance device |
CN109906387A (en) * | 2016-10-26 | 2019-06-18 | 大陆-特韦斯贸易合伙股份公司及两合公司 | For determining the device and method in the geographical location of vehicle |
EP3517785A1 (en) | 2018-01-25 | 2019-07-31 | Fiac S.P.A. | Air compressor unit |
US10623921B2 (en) | 2015-09-29 | 2020-04-14 | Continental Teves Ag & Co. Ohg | Communications system for V2X communication |
USRE48958E1 (en) | 2013-08-02 | 2022-03-08 | Honda Motor Co., Ltd. | Vehicle to pedestrian communication system and method |
DE102021212824A1 (en) | 2021-10-07 | 2023-04-13 | Continental Automotive Technologies GmbH | Method for reading specified vehicle data from a vehicle data network of a motor vehicle |
US11810407B2 (en) | 2019-07-30 | 2023-11-07 | T-Mobile Usa, Inc. | Selecting V2X communications interface |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9755851B2 (en) | 2015-08-12 | 2017-09-05 | GM Global Technology Operations LLC | Method and apparatus for plug-in wireless safety devices |
US10089882B2 (en) | 2016-09-21 | 2018-10-02 | Wabco Europe Bvba | Method for controlling an own vehicle to participate in a platoon |
US11025607B2 (en) | 2016-12-15 | 2021-06-01 | At&T Mobility Ii Llc | V2X certificate management |
US10171953B2 (en) | 2016-12-15 | 2019-01-01 | At&T Mobility Ii Llc | Vehicle event notification via cell broadcast |
US10462225B2 (en) | 2017-08-25 | 2019-10-29 | Innova Electronics Corporation | Method and system for autonomously interfacing a vehicle electrical system of a legacy vehicle to an intelligent transportation system and vehicle diagnostic resources |
KR102384518B1 (en) | 2017-08-28 | 2022-04-08 | 삼성전자 주식회사 | Method for processing message and electronic device implementing the same |
US10885781B2 (en) * | 2017-09-25 | 2021-01-05 | Blackberry Limited | Method and system for a proxy vehicular intelligent transportation system station |
US11651628B2 (en) | 2020-04-20 | 2023-05-16 | Innova Electronics Corporation | Router for vehicle diagnostic system |
US11967189B2 (en) | 2020-04-20 | 2024-04-23 | Innova Electronics Corporation | Router for communicating vehicle data to a vehicle resource |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110130916A1 (en) * | 2009-12-01 | 2011-06-02 | Ise Corporation | Location Based Vehicle Data Logging and Diagnostic System and Method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7629899B2 (en) | 1997-10-22 | 2009-12-08 | Intelligent Technologies International, Inc. | Vehicular communication arrangement and method |
US6675082B2 (en) | 2002-04-24 | 2004-01-06 | International Business Machines Corporation | System and method for automotive systems relative positional translations |
US8306735B2 (en) | 2009-07-15 | 2012-11-06 | GM Global Technology Operations LLC | System and method for managing geographical maplet downloads for a vehicle to support stop sign violation assist and similar applications |
US8199028B2 (en) | 2009-07-16 | 2012-06-12 | GM Global Technology Operations LLC | Protocol for map data transmission for infrastructure to vehicle communications |
-
2013
- 2013-06-27 US US13/929,534 patent/US8930041B1/en not_active Expired - Fee Related
- 2013-12-06 DE DE102013113617.6A patent/DE102013113617B4/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110130916A1 (en) * | 2009-12-01 | 2011-06-02 | Ise Corporation | Location Based Vehicle Data Logging and Diagnostic System and Method |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10074280B2 (en) | 2013-08-02 | 2018-09-11 | Honda Motor Co., Ltd. | Vehicle pedestrian safety system and methods of use and manufacture thereof |
US9922564B2 (en) | 2013-08-02 | 2018-03-20 | Honda Motor Co., Ltd. | Vehicle pedestrian safety system and methods of use and manufacture thereof |
US20150091740A1 (en) * | 2013-08-02 | 2015-04-02 | Honda Motor Co., Ltd. | System and method for detection and utilization of driver distraction level |
US10223919B2 (en) | 2013-08-02 | 2019-03-05 | Honda Motor Co., Ltd. | Vehicle pedestrian safety system and methods of use and manufacture thereof |
USRE49232E1 (en) | 2013-08-02 | 2022-10-04 | Honda Motor Co., Ltd. | Vehicle to pedestrian communication system and method |
USRE48958E1 (en) | 2013-08-02 | 2022-03-08 | Honda Motor Co., Ltd. | Vehicle to pedestrian communication system and method |
US9505412B2 (en) * | 2013-08-02 | 2016-11-29 | Honda Motor Co., Ltd. | System and method for detection and utilization of driver distraction level |
US20160255154A1 (en) * | 2013-10-08 | 2016-09-01 | Ictk Co., Ltd. | Vehicle security network device and design method therefor |
US10033814B2 (en) * | 2013-10-08 | 2018-07-24 | Ictk Holdings Co., Ltd. | Vehicle security network device and design method therefor |
US20150153178A1 (en) * | 2013-11-29 | 2015-06-04 | Hyundai Mobis Co., Ltd. | Car navigation system and method in which global navigation satellite system (gnss) and dead reckoning (dr) are merged |
US20150163854A1 (en) * | 2013-12-09 | 2015-06-11 | Hyundai Motor Company | System and method for providing communication service, and vehicle supporting the same |
US9911333B2 (en) * | 2013-12-18 | 2018-03-06 | Continental Teves Ag & Co. Ohg | Method for classifying a received vehicle-to-X message |
US20160328972A1 (en) * | 2013-12-18 | 2016-11-10 | Continental Teves Ag & Co. Ohg | Method for classifying a received vehicle-to-x message |
US9485247B2 (en) * | 2014-03-04 | 2016-11-01 | Nissan North America, Inc. | On-board vehicle communication system and method |
US20150256534A1 (en) * | 2014-03-04 | 2015-09-10 | Nissan North America, Inc. | On-board vehicle communication system and method |
US20160119151A1 (en) * | 2014-10-22 | 2016-04-28 | Hyundai Motor Company | Method and system for detecting misbehavior for vehicle-to-anything communication |
US10382419B2 (en) * | 2015-01-27 | 2019-08-13 | Renesas Electronics Corporation | Communication device, LSI, program, and communication system |
CN105827586A (en) * | 2015-01-27 | 2016-08-03 | 瑞萨电子株式会社 | Communication device, LSI, program, and communication system |
US20160219029A1 (en) * | 2015-01-27 | 2016-07-28 | Renesas Electronics Corporation | Communication device, lsi, program, and communication system |
US9799058B2 (en) | 2015-01-31 | 2017-10-24 | Foribus, LLC. | Vehicle valuation system and method |
US9699594B2 (en) * | 2015-02-27 | 2017-07-04 | Plantronics, Inc. | Mobile user device and method of communication over a wireless medium |
US20160255459A1 (en) * | 2015-02-27 | 2016-09-01 | Plantronics, Inc. | Mobile User Device and Method of Communication over a Wireless Medium |
US9685086B2 (en) * | 2015-05-27 | 2017-06-20 | Cisco Technology, Inc. | Power conservation in traffic safety applications |
KR102360334B1 (en) | 2015-07-10 | 2022-02-09 | 엘지전자 주식회사 | Mobile terminal, vehicle and method for controlling the same |
US10327119B2 (en) | 2015-07-10 | 2019-06-18 | Lg Electronics Inc. | Mobile device and control method therefor |
KR20170006859A (en) * | 2015-07-10 | 2017-01-18 | 엘지전자 주식회사 | Mobile terminal, vehicle and method for controlling the same |
WO2017010632A1 (en) * | 2015-07-10 | 2017-01-19 | 엘지전자 주식회사 | Mobile device and control method therefor |
US10623921B2 (en) | 2015-09-29 | 2020-04-14 | Continental Teves Ag & Co. Ohg | Communications system for V2X communication |
EP3357262B1 (en) * | 2015-09-29 | 2021-03-03 | Continental Teves AG & Co. OHG | Communications system for v2x communication |
CN105882823A (en) * | 2015-12-29 | 2016-08-24 | 乐卡汽车智能科技(北京)有限公司 | Intelligent bicycle |
CN109906387A (en) * | 2016-10-26 | 2019-06-18 | 大陆-特韦斯贸易合伙股份公司及两合公司 | For determining the device and method in the geographical location of vehicle |
EP3438945A3 (en) * | 2017-08-03 | 2019-05-08 | Forward Electronics Co., ltd. | Portable plug and play collision avoidance device |
EP3517785A1 (en) | 2018-01-25 | 2019-07-31 | Fiac S.P.A. | Air compressor unit |
US11810407B2 (en) | 2019-07-30 | 2023-11-07 | T-Mobile Usa, Inc. | Selecting V2X communications interface |
DE102021212824A1 (en) | 2021-10-07 | 2023-04-13 | Continental Automotive Technologies GmbH | Method for reading specified vehicle data from a vehicle data network of a motor vehicle |
Also Published As
Publication number | Publication date |
---|---|
DE102013113617B4 (en) | 2020-03-26 |
DE102013113617A1 (en) | 2014-12-31 |
US8930041B1 (en) | 2015-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8930041B1 (en) | Methods of operation for plug-in wireless safety device | |
US9755851B2 (en) | Method and apparatus for plug-in wireless safety devices | |
US9691278B2 (en) | Systems and methods for traffic control | |
CN107872512B (en) | Vehicle access authentication | |
US9813897B2 (en) | Systems and methods for vehicle policy enforcement | |
JP6717183B2 (en) | Road-vehicle communication system, roadside communication device, vehicle-mounted communication device, and road-vehicle communication method | |
CN109691029B (en) | Detection device, gateway device, and detection method | |
US9767655B2 (en) | Methods, systems and apparatus for providing notification that a wireless communication device has been left inside a vehicle | |
US10667100B2 (en) | Communication system and in-vehicle communication apparatus | |
US20150116100A1 (en) | Methods, systems and apparatus for providing notification that a vehicle has been accessed | |
US20160001720A1 (en) | Configurable rental vehicle | |
EP3371987B1 (en) | Communication between a vehicle ecu and external devices in proximity | |
US10214163B2 (en) | Apparatus for smart antenna sharing in a vehicle and methods for implementing the apparatus | |
US20160105539A1 (en) | Vehicle interface docking system for dsrc-equipped user devices in a vehicle | |
JP2018097668A5 (en) | ||
US20210392496A1 (en) | System and method of manufacturer-approved access to vehicle sensor data by mobile application | |
DE102014109877A1 (en) | A method, systems and apparatus for providing a message in an automotive main unit that a wireless communication device is located outside of a vehicle | |
CN109196817B (en) | Communication system and in-vehicle communication device | |
KR20160106997A (en) | eCall servicing method for vehicle and recording medium in which program of the method | |
Albertengo et al. | Smartphone enabled connected vehicles pave the way to intelligent mobility | |
JP6883530B2 (en) | Communications system | |
JP7146082B2 (en) | Autonomous driving system | |
CN112839297A (en) | Method, mobile device and system for internet of vehicles communication | |
Sreekumar et al. | Telematics and potential in indian market | |
JP2010026868A (en) | Apparatus for providing information for vehicle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GM GLOBAL TECHNOLOGY OPERATIONS LLC, MICHIGAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GRIMM, DONALD K.;MUDALIGE, UPALI PRIYANTHA;LITKOUHI, BAKHTIAR BRIAN;REEL/FRAME:030708/0005 Effective date: 20130626 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: WILMINGTON TRUST COMPANY, DELAWARE Free format text: SECURITY INTEREST;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS LLC;REEL/FRAME:033135/0336 Effective date: 20101027 |
|
AS | Assignment |
Owner name: GM GLOBAL TECHNOLOGY OPERATIONS LLC, MICHIGAN Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WILMINGTON TRUST COMPANY;REEL/FRAME:034189/0065 Effective date: 20141017 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230106 |