Individual driver-oriented vehicle configuration

FIELD: transport.

SUBSTANCE: vehicle control system (100) comprises the first set of vehicle functions set (V-CAP). Vehicle (100) user interface (101) receives personal data (D-ID) designating the vehicle (100) drive identity. Communication device (105) transmits personal data (D-ID) and vehicle data (V-ID) to data processor module (120). The later analyses if the user identified by personal data (D-ID) is the authorized user of vehicle (100). If so, vehicle description (D-CERT) is compared with said first set of vehicle data (V-CAP). Then, activation message (MSG-A) is generated to indicate the necessity of activation of the driver authorized functions included in the first set of vehicle (100) functions (V-CAP). Invention covers also the method of vehicle control.

EFFECT: vehicle control by authorized drive only.

8 cl, 2 dwg

 

Art

The present invention relates broadly to an individual driver's vehicle configuration. In particular the invention relates to a system in accordance with the introductory part of claim 1 and a method according to the introductory part of claim 5. The invention also relates to a computer program in accordance with claim 9 and a computer readable medium according to claim 10.

Functions of modern vehicles become increasingly computerized. Among other things, thus, it becomes possible to perform an extremely large number of combinations of settings in each individual vehicle. In commercial situations, where a lot of drivers, alternatively, use a set of vehicles, such as trucks, buses and taxis, in the specific case of vehicle control can be so difficult for certain driver of a specified vehicle to find the installation of the vehicle which corresponds to a driver's specific individual needs.

There are solutions for automatic personalization of motor vehicles in accordance with different preferences the drivers relating to the available units in the vehicle. For example, in US 2002/0062185 R�hidden solution with which the vehicle automatically configure according to individual user preference. On the basis of the identity of the user of the various functions in the vehicle is determined according to the previously defined user requirements. Settings follow the user so that if the user changes the vehicle to a new vehicle, the relevant setting is also introduced in a new vehicle. In connection with the change of vehicle, the vehicle profile is compared with the user requirements for compliance as you think best.

In US 6,122,580 described the system by which drivers get access to a fleet of vehicles, where appropriate, the driver is authorized. A data medium, such as a key or key card, here is used to identify each driver. In accordance with a driver who intends to unlock the vehicle information relating to the identity of the driver, the data transmitted through the radio channel data to the Central data resource where the above-mentioned data is compared with a register authorization. If you determine that the driver is authorized, the vehicle unlocks and water�spruce gets a chance to start the engine, and also to operate the vehicle. In addition, the vehicle is automatically adjusted in accordance with the personal settings of the driver rear view mirrors, seats, head restraint provisions belts, steering wheel control etc. functions such as temperature setting of the air conditioning system, engine mounting, and installation efficiency of the program switch gear, and the maximum speed can be set automatically in accordance with the preference of the driver due to the fact that the driver accesses the vehicle. In addition, if the vehicle is equipped with many locks (e.g., in the cab, ignition, tank cap with fuel), different people can access different parts of the vehicle. Summary personal driver installations can be stored on the media, in the vehicle or in a Central data resource.

Consequently, there are solutions for the personalization of vehicles in an efficient manner. However, there is no solution which would prevent user access to certain functions in the vehicle (or to a given service is implemented using the vehicle), depending on whether leads�l authorized/is competent or not to use this feature/service.

Summary of the invention

The purpose of the present invention, therefore, is to provide the above-mentioned problems and, thus, to ensure that only the driver, who is authorized to use a particular function of the vehicle or service that has access to this feature/service in the vehicle.

In accordance with one aspect of the invention, this objective is achieved by the initially described system in which the Central data processing module configured to receive personal data indicating the identity of a user of the vehicle and receiving vehicle data associated with the designation of the identity of the vehicle. In response, the Central data processing module is additionally performed with the opportunity to explore whether or not the user identity is marked in the mentioned personal data, an authorized user of the vehicle. Given that the user has discovered how authorized, the Central data processing module configured to reconcile the descriptions of the sets of functions of the vehicle, on which the user is authorized, with the functions of the vehicle, the embodiment of which the potential�but perhaps in the vehicle. In addition, it is assumed that the Central data processing module is connected to the Central storage module, for each user in the users group maintains an appropriate description of the set of functions of the vehicle, for which the user is authorized. In addition, the description of the set of vehicle functions, for which the user is authorized, adapt, as the user is trained to features of the vehicle. After the mapping of the Central data processing module configured to generate an activation message, marked for, after taking the vehicle activation requirements, solely for the purpose for which the authorized user and included in the first set of functions of the vehicle, and transmitting the activation message to the vehicle.

One important advantage obtained with this system is that all vehicles in the Park can be equipped with a relatively wide first set of potentially embody functions and at the same time vehicles can be controlled so that no driver has not received access to the functions/services for which he or she has not been trained. Thus, effectiveapproach vehicle combined with a high level of security.

Another advantage is that the system makes a very simple adaptation of the driver's access to various functions of the vehicle and services as drivers are trained in these functions/services, for example through so-called Interactive driver training (IDT, JOB).

In accordance with one variant of implementation of this aspect of the invention, the Central data processing module configured to, if the user identity is marked in the mentioned personal data, detected as an unauthorized user of the vehicle to generate an activation message, which is performed with the opportunity after taking the vehicle to prescribe a prohibition of all functions in the vehicle. This is preferred because the unauthorized use of a vehicle, thus effectively prevented.

In accordance with another variant of implementation of this aspect of the invention, the Central data processing module is connected to the Central storage module, which stores the corresponding description of the first mentioned set of features for each vehicle number of vehicles. This is preferred because thereby it becomes possible to observe in case�AE need to modify the capabilities of each vehicle and associated functional description.

In accordance with an additional variant of the implementation of this aspect of the invention, the user interface configured to accept information on the basis of which referred to personal data generated through: electronic smart card device by entering a code, a means of voice recognition, fingerprint scanning, face recognition, iris recognition and/or the OCR engine on the retina. It simultaneously provides high flexibility and security for user authentication.

In accordance with another aspect of the invention the objective is achieved by the method described initially, wherein the method is performed at the Central data processing module and which includes: receiving the mentioned personal data and referred to vehicle data associated with them, and in response to this study, whether the user identity is marked in the mentioned personal data, an authorized user of the vehicle; and, if so, matching the description of the set of functions of the vehicle for which the user is authorized, with the first set of vehicle functions. Here it is assumed that the Central data processing module with�was merged with the Central storage module, for each user in the group of function user maintains an appropriate description of the sets of vehicle to which this user is authorized.

In addition, the description of the set of vehicle functions, for which the user is authorized, adapt, as the user is trained such functions of the vehicle. Furthermore, the method includes: generating a message activation designed to ensure that after taking the vehicle to prescribe the activation solely for the purpose for which the user is authorized and included in the first set of functions of the vehicle, and transmitting the activation message to the vehicle. The advantages of this method and its embodiments are evident from the above description with reference to the proposed system.

In accordance with another aspect of the invention is achieved by a computer program, directly loadable in the internal storage device of the computer containing the software to control the stages in accordance with the above proposed method when said program is performed in the computer.

In accordance with an additional aspect of the invention is accomplished using card�already listed the computer storage media of the program, written on it, this program is capable of prescriptions to the computer to control steps in accordance with the above-described proposed method.

Brief description of the drawings

The present invention will be explained in more detail by means of preferred embodiments, which are disclosed as examples, and with reference to the accompanying drawings.

Fig. 1 schematically shows a system in accordance with preferred embodiments of the invention, and

Fig. 2 shows a block diagram of the sequence of operations that illustrates a General method in accordance with the invention.

Detailed description of the invention

Initially, let us consider Fig. 1, which shows a system in accordance with preferred embodiments of the invention.

The proposed system includes a set of motor vehicles in which one vehicle 100 is illustrated in Fig. 1. It is assumed that each vehicle 100 comprises a first set of functions V-CAP vehicles which are possible to be performed in the vehicle 100. These functions cover all aspects of vehicle 100 with maximum functionality. Thus, the first set of V-CAP can include both the physical�mechanical equipment (such as cranes, lifting the layout and components of the PTO) and the functions/services that are embodied in the software (such as systems for automatic driver assistance systems anti-slip, adaptive cruise control and a system that prevents collisions). The vehicle 100 is also equipped with a user interface 101 and the device 105 connection.

The user interface 101 configured to receive personal data (D-ID denoting the identity of a user of the vehicle 100. In particular, this may mean that the user after unlocking the vehicle 100 must identify himself/herself before he or she can start the engine or activate any other functions in the vehicle 100. In accordance with one preferred embodiment of the invention, the user interface 101 is capable of receiving information from the user on the base, which then generated the actual information of personal data (D-ID. For example, the user interface 101 may include a reader for reading a smart card, which is unique to each user. Alternatively or in addition thereto, the user interface 101 may include an input device code (e.g., keypads�ü, through which the user can enter a so-called PIN code, or the corresponding data input into the system), medium voice recognition to identify the acoustic profile of his/her vocal organ which is unique for each user, the scanner of fingerprints for registration, the structure of one or more fingers of the user, which is unique to each user, a means of recognition for the registration of the characteristic features of the appearance of the user, a means of recognition of the iris to register the unique patterns of the iris of the user and/or the OCR engine of the retina to register the unique appearance of the retina of the user.

The device 105 connection is made with the possibility in response to the reception of personal data (D-ID to transmit this data to the Central processing module 120 of the data. The device 105 also performed with the opportunity to, in Association with (e.g., together with) personal data (D-ID to transmit data of the vehicle V-ID, which indicate the identity of the vehicle, the Central module 120 processing. Data of the vehicle V ID preferably permanently stored in the vehicle 100 and may be, for example, are connected with the chassis number Tr�Sportage funds. Preferably, the personal data (D-ID and data transport V-ID is transmitted through a wireless data transfer interface (e.g., radio based) and a network connection 110, which is connected to the Central module 120 processing.

Central module 120 of the data processing performed with the opportunity to take personal data (D-ID and the vehicle information V-ID associated with them. After that, the module 120 is arranged to study whether the user identity is marked in the personal data (D-ID, an authorized user of the vehicle 100. Such a study may preferably be performed using a simple lookup table in the database. Given that the user is authorized, the Central module 120 of the data processing performed with the possibility to compare the D-CERT set of vehicle functions, for which the user is authorized, with the first set of vehicle functions V-CAP, potentially possible to perform in the vehicle 100.

In accordance with one preferred embodiment of the invention, the Central module 120 processing data is connected to the Central module 130 storage that stores the corresponding description of the first set of functions V-CAP transport �the means for each vehicle in the set of vehicles. Alternatively, the first set of functions V-CAP vehicle can be transmitted along with the data V-vehicle ID from the vehicle 100 to the Central module 120 processing.

In accordance with another preferred embodiment of the invention, the Central module 120 processing data is connected to the Central module 130 storing, for each user in the users group maintains an appropriate description D-CERT set of vehicle functions, for which the user is authorized. Alternatively, the D-CERT can be passed together with the personal data (D-ID from the vehicle 100 to the Central module 120 processing.

As is evident from Fig. 1, in this example, the same module 130 is used to store descriptions of the first set of functions V-CAP of the vehicle and description of D-CERT authorization. Of course, in accordance with the invention, this data can be equally stored in different storage modules or at least one of the descriptions may be obtained from the vehicle 100 in accordance with what was described above.

In any case, the Central module 120 processing data being configured to generate the message MSG-A activation, which adapter�Vano for, after taking in the vehicle 100, the activation requirements solely for the purpose for which the user is authorized and which simultaneously included in the first set of functions V-CAP vehicle. After that, the Central module 120 processing data being configured to send the message MSG-A activation in the vehicle 100. Similarly, personal data (D-ID and data of the vehicle V-ID, the message MSG-A activation is preferably passed through a network 110 and a wireless communication interface.

The device 105 communication in the vehicle 100, in turn, is arranged to accept the message MSG-A activation, and in response to this set of functions in the vehicle 100 is activated in accordance with the message MSG-A activation.

In accordance with one preferred embodiment of the invention, the Central module 120 of the data processing is made so that if the user identity is marked in the personal data (D-ID is defined as a user of the vehicle 100, which may not be authorized, generate the message MSG-A activation, which is made for, after taking the vehicle 100, the regulations ban all functions in the vehicle 100. This ensures that will not happen neavtorizovannii vehicle 100.

In the General case, it is preferable that the Central processing module 120 of the data was performed with the opportunity to work in accordance with the instructions of software executed by at least one processor module 120. Therefore, it is desirable that the module 120 processing data included or in any other way associated with the module M storage device comprising software that when executed in the module 120 executes the process described above. For some reason it is preferable that the vehicle 100 includes software for performing the reception of personal data (D-ID, performing the transfer of personal data (D-ID and vehicle data V-ID to the Central processing module 120 of the data, and perform activation/deactivation of functions of the vehicle in accordance with the message MSG-A activation.

To summarize everything, the General way in accordance with the invention for controlling a motor vehicle comprising a first set of vehicle functions that can potentially be performed in the vehicle, will be described below with reference to the block diagram of the sequence of operations shown in Fig. 2.

At the first stage 210 research�is, or not the user interface in the vehicle information based on which personal data describing the identity of the user can be generated. If such information was not accepted, the procedure cycles back back and stays in step 210. Otherwise, i.e. if the relevant information has been accepted, the next step 220. Here personal data and vehicle data indicating the identity of the vehicle that the user intends to activate, transmit to the Central processing unit.

Thereafter, in step 230 are exploring whether the user identity is marked in personal data, an authorized user designated vehicle, and if it is determined that this is the case, you should step 240. Otherwise, the procedure cycles back to step 210. In accordance with one preferred embodiment of the invention, all functions in the vehicle is also prohibited.

In step 240 description of a set of vehicle functions, for which the user is authorized, compare with the first set of vehicle functions that are potentially possible to implement in the vehicle (i.e. max�nye functionality of the vehicle).

Thereafter, in step 250 generates an activation message, which is adapted, after taking the vehicle to perform only those functions for which the user is authorized and which are also included in the first set of vehicle functions intended for activation. Theoretically, the intersection between the possible functions in the vehicle and the functions for which the user is authorized, may be empty. Therefore, in this case, none of the functions in the vehicle is activated. In practice, however, it is unlikely that this situation will occur because it is highly likely that all users are authorised for at least the most basic functions that are included in the first set of vehicle functions of each vehicle.

At a later stage 260 transmit the activation message to the vehicle and in response to this, in step 270, activate a set of functions in the vehicle in accordance with the activation message.

Thus, the stages 210, 220 and 270 are performed in the vehicle, while the steps 230-260 are performed at the Central data processing module.

The steps of the method described with reference to Fig. 2, can be operated by a programmed computer�acteristic of the device. Furthermore, although embodiments of the invention described above with reference to the drawings, contain a computer device and the processes performed in the computer device, the invention thus also extends to computer programs, particularly computer programs on or in a storage medium, adapted to implement the invention in practice. The program may be in source code form, object code, intermediate code of the source and object code such as in partially compiled form, or in any other form suitable for use in embodiments implementing the process in accordance with the invention. The program can either be part of an operating system or may be a separate application. The storage medium may be any object or device that is capable of the content of the programme. For example, the storage medium may include a recording medium, such as a mass storage device type, flash, ROM (read only memory), a DVD (digital video/ versatile disk), a CD (compact disk) or a semiconductor ROM, an EPROM (erasable programmable read-only memory), EEPROM (electrically erasable programmable read only memory), or magnetic media �recording, for example, a flexible disk or a hard disk. In addition, the carrier may be a transferable medium such as an electrical or optical signal which may be conveyed via electrical or optical cable or by radio, or through other means. When the program is embodied in a signal which may be conveyed directly by a cable or other device or means, the carrier may be composed of such cable or device or means. Alternatively, the carrier may be an integrated circuit into which is embedded a program, the integrated circuit being configured to execute or be used in performing the related processes.

The invention is not limited to variants of implementation described with reference to the drawings, but may be freely modified within the scope of the following claims.

1. A management system for a motor vehicle (100), comprising a first set of vehicle functions (V-CAP) that can potentially be performed in the vehicle (100), wherein the vehicle (100) includes:
the interface (101) a user with the ability to take personal data (D-ID), indicating the identity of a user of the vehicle (100), and
make�tvo (105) communication configured to, in response to the personal data (D-ID), to transfer the mentioned personal data (D-ID) and in Association with them, to transmit data of the vehicle (V-ID) that indicates the identity of the vehicle (100), the Central module (120) data, and receive the activation message (MSG-A) from the Central module (120) data, and in response to the received message (MSG-A) activate, adapt, at least a single installation of the vehicle (100),differentthe fact that
Central module (120) of the data processing performed with the opportunity to:
undertake the said personal data (D-ID), and mentioned details of the vehicle (V-ID) associated with them, and in response to this
to investigate whether the user identity is marked in the mentioned personal data (D-ID), an authorized user of the vehicle (100); and, if so,
to match the description (D-CERT) the set of functions of the vehicle, on which the user is authorized, with the first set of vehicle functions (V-CAP), wherein the Central module (120) of data processing is connected to the Central module (130) storing, for each user in the users group maintains an appropriate description (D-CERT) set of transport functions with�of estva, on which the user request is authorized, and in which the description (D-CERT) the set of functions of the vehicle for which the user is authorized, adapts as the user is trained to features of the vehicle,
to generate an activation message (MSG-A) that is designed to, after receiving the vehicle (100), the activation requirements solely for the purpose for which the user is authorized, and are included in the first set of vehicle functions (V-CAP), and
transmission of the activation message (MSG-A) in the vehicle (100).

2. A system according to claim 1, in which the Central module (120) of the data processing performed with the possibility, if the user identity is marked in the mentioned personal data (D-ID) that is detected as not an authorized user of the vehicle (100), to generate an activation message (MSG-A), which is configured to, after receiving the vehicle (100), the regulations ban all functions in the vehicle (100).

3. System according to any one of the preceding claims, in which the Central module (120) of data processing is connected to the Central module (130) storage that stores a description mentioned in the first set of vehicle functions (V-CAP) for each of the plurality of transport with�of edst (100).

4. A system according to claim 1, in which the interface (101) of the user is arranged to accept information on the basis of which generate the mentioned personal data (D-ID), via at least one of: an electronic smart card device by entering a code, a means of voice recognition, a means of scanning fingerprints, face recognition, iris recognition and the recognition of the retina.

5. A method of controlling a motor vehicle (100), comprising a first set of vehicle functions (V-CAP) that can potentially be performed in the vehicle (100), the method contains the stages at which:
receive, via the interface (101) of the user's personal data (D-ID), indicating the identity of a user of the vehicle (100), and
transmit, in response to the received activation message (MSG-A), through the device (105) data referred to the personal data (D-ID) associated with the data of the vehicle (V-ID) that indicates the identity of the vehicle (100), the Central module (120) data,
take in the vehicle (100) activation message (MSG - A) from the Central module (120) data and, in response to the received activation message (MSG-A), adapting at least one installation Tran�tailor means (100),
characterized in that the Central module (120) data:
take mentioned personal data (D-ID) and personal details of the vehicle (V-ID) associated with it, and in response to this:
investigate whether a user identity is marked in the mentioned personal data (D-ID), an authorized user of the vehicle (100); and, if so,
map description (D-CERT) the set of functions of the vehicle for which the user is authorized, with the first set of vehicle functions (V-CAP), wherein the Central module (120) of data processing is connected to the Central module (130) storing, for each user in the users group maintains an appropriate description (D-CERT) set of vehicle functions, for which the user is authorized, and in which the description (D-CERT) the set of functions of the vehicle for which the user is authorized, adapt, to the extent that as the user is trained to features of the vehicle,
generate an activation message (MSG-A) that is designed to, after receiving the vehicle (100), the activation requirements solely for the purpose for which the user is authorized, and are included in the first set of vehicle functions (V-CAP), and
Pereda�t activation message (MSG-A) in the vehicle (100).

6. A method according to claim 5, wherein, if the user identity is marked in the mentioned personal data (D-ID) that is detected as not an authorized user of the vehicle (100), the method contains the stage at which generate the activation message (MSG-A), which is configured to, after receiving the vehicle (100), to enforce a ban on all functions in the vehicle (100).

7. A method according to any one of claims claim 5 or 6, containing a stage, on which: retain a corresponding one of the descriptions mentioned in the first set of vehicle functions (V-CAP) for each of a plurality of vehicles (100) to a Central storage module (130) connected to the Central module (120) data.

8. A method according to claim 5, containing a stage, on which: take information on the basis of which referred to the personal data (D-ID) is generated using at least one of: an electronic smart card, the device entering a code, a means of voice recognition, means of fingerprint scanning, means of face recognition, a means of recognition of the iris and means of recognition of the retina.



 

Same patents:

FIELD: transport.

SUBSTANCE: invention relates to automotive industry, particularly, to antitheft devices. Antitheft interlock comprises thrust or thrust shoe with limiter interacting with wheel inner side surface while L-like pin is fitted in the disc vent opening or between spokes and locked at thrust shoe at point corresponding to wheel appropriate width. This interlock this interlock suits most forged and cast light-alloy discs. To prevent wheel removal wheel nits securities are used.

EFFECT: simplified design and fitting in place.

2 dwg

FIELD: radio engineering, communication.

SUBSTANCE: method of protecting a car security system from unauthorised use includes a receiving device mounted on a car and a portable transmitting user device, wherein the transmitting device creates a code package using an encryption key and transmits the package to the receiving device. When reprogramming the system, particularly in case of real or imaginary malfunction of the system, communication between the portable transmitting device and the receiving device is carried out through an information transmission channel which does not use a radio signal.

EFFECT: low risk of information interception.

5 cl, 1 dwg

FIELD: transport.

SUBSTANCE: auxiliary interlocking mechanism is proposed which mechanism locks interlocking element (6) in steering column locking position. In the auxiliary interlocking element, its sliding plate (91) is engaging with auxiliary catching section (95) of interlocking element (6) being in steering column locked position, so that engagement between holding element (21) and holding/receiving section (93) could disengage. Closer to the side of interlocking element (6) rear end relative to relative to auxiliary catching section (95), fragile section (74) is fitted permissible loading on which is less than loading which can sliding plate (91) can withstand. In case when loading of specified or greater value is applied to interlocking element (6), the latter (6) breaks in fragile section (74).

EFFECT: enhanced antitheft protection.

11 cl, 14 dwg

Vehicle terminal // 2537892

FIELD: physics, navigation.

SUBSTANCE: invention relates to the field of navigating, namely to vehicle terminals. The vehicle terminal includes the master microcontroller, antenna GPS/GLONASS, SIM-chip, housing. The housing contains the standby power supply and printed circuit board. The printed circuit board has flash memory, three-axial accelerometer, GPS/GLONASS receiver, power supply control unit, GSM module with antenna, LED indicators, interface unit connection module, slot for installation of SIM-card of mobile communication operator, external power supply module. The output of GPS/GLONASS antenna is connected to the input of GPS/GLONASS receiver. The master microcontroller contains minimum 7 inputs-outputs. SIM-chip and slot for installation of SIM-card are connected to GSM-module. The power control module is connected with the external power supply module and standby power supply module. The acceleration sensor is designed with additional function of determination of acceleration values by three coordinate axes. The standby power supply terminal contains the lithium - polymeric battery.

EFFECT: improvement of reliability of obtaining operating and reliable monitoring information at simultaneous decrease of the sizes of the vehicle terminal.

8 cl, 1 dwg

FIELD: radio engineering, communication.

SUBSTANCE: control points are placed on motorways and are provided with receivers for detecting a source of interference for GPS and GSM signals. Photographic and video capturing of vehicles on the motorway is performed upon detecting interference and the data are transmitted to a remote server. Data received at the server from multiple control points are processed to detect licence plate matches. Data on said licence plates and direction of movement are transmitted to road patrol service posts nearest to the last point where the interference was detected.

EFFECT: high efficiency of detecting stolen vehicles.

2 dwg

FIELD: transport.

SUBSTANCE: steering wheel interlocking device consists of rod, braces rigidly fixed on it, grip installed on steering wheel and locked by lock mechanism. Lock mechanism is made as separate unit with key. The grip is made as levers with pin. The braces are made as plate with holes in butt ends and in base. In one of butt end holes, rod is installed, and in the other butt end hole pin is installed on which pin levers are fixed opposite to each other with possibility to rotate around this pin for specified angle. In the hole in plate base, lock mechanism is installed.

EFFECT: improved protective properties and reduced dimensions of steering wheel interlocking device.

5 dwg

FIELD: physics, computer engineering.

SUBSTANCE: group of inventions relates to public information systems and intelligent transport systems. The method comprises installing an intelligent transport system on vehicle, completely adapting the system to the electrical system of the vehicle, using the system continuously in automatic and manual mode together with cellular communication means, the Internet and navigation satellite systems, and performing video surveillance and monitoring of the vehicle at a distance using cellular equipment which supports 3G technology. The intelligent transport system consists of the following basic interlinked structural components: a video surveillance system, a video recorder, a touch screen display, a processor board with a SIM module, a transceiver, an emergency unit with an antitheft system module, a uninterrupted power supply, a multimedia device, a distance meter and a preventive security system.

EFFECT: achieving comprehensive protection of a vehicle, the driver, passengers, pedestrians and creating favourable traffic conditions overall.

4 cl

FIELD: transport.

SUBSTANCE: group of inventions relates to automotive industry. Proposed device comprises valve (7) to reciprocate in antitheft device (1) for locking the steering column. Lock is fixed to antitheft device (1) to displace said valve (7). Locking means displace when lock gets disengaged from antitheft device (1) between inactive position and working position whereat locking means lock said valve (7). Antitheft device (1) comprises extra retainers of locking means to lock the latter at working position. Said retainers comprises clip and second spring means to act thereat in direction of the position whereat said clip retains said locking means at working position.

EFFECT: higher reliability.

12 cl, 6 dwg

FIELD: physics; control.

SUBSTANCE: invention relates to automated systems for monitoring road traffic and is intended for automatic identification of vehicles and generating an algorithm of actions with respect to further use thereof, and for real-time notification of the driver on all remarks relating to use of a vehicle as a road traffic participant. The vehicle monitoring system includes an electronic device mounted on the vehicle and capable of storing the identification number of the vehicle and information necessary and sufficient for mutual authentication of said device and devices at control points of the system, which are connected via a single telecommunication network to a distributed data base in which the obtained information is processed. To improve protection from unauthorised access, broadcast data are encrypted and accuracy of obtained information is further verified.

EFFECT: designing a reliable system for informing a driver on use of a vehicle as a road traffic participant.

8 cl, 3 dwg

FIELD: transport.

SUBSTANCE: proposed device comprises case to house lock 20 composed of latch 4 displacing between open position whereat it stays at a distance from steering column and closed position whereat it locks the latter and latch drive slider 10 to drive said latch 4 into open or closed position. Slider 10 is driven by said lock 20. Extra locking means can lock latch 4 in locked position. Said extra locking means are retained in passive position by actuator 28 of slider 10. Cam 24 of lock 20 acts at actuator 28 to control latch 4 and to release extra locking means at detachment of said cam 24.

EFFECT: simplified and compact design, higher reliability.

22 cl, 7 dwg

FIELD: transport engineering; security systems.

SUBSTANCE: invention relates to radio-electronic systems used for monitoring immovable property objects and vehicles. Proposed system contains one or several dispatcher centers, personal information centers, stationary and carry-on alarm complexes. System is provided with over-territory distributed retransmission-radio direction finding network with retransmitters-radio direction finders made for reception of signals containing code messages from carry-on alarm complexes, measuring power of received signals and bearings of sources of radiation and transmission of said code messages and results of measurements to dispatcher center. Said dispatcher centers and at least part of personal information centers are made with possibility of access to external information sources. Stationary and carry-on alarm complexes are made for transmission of voice and text messages and video pictures by cellular mobile communication network. Dispatcher centers and personal information centers are made for reception of said voice, test messages and video pictures by cellular mobile communication network.

EFFECT: reduced level of false alarms at revealing of facts of unauthorized action onto objects under protection, improved reliability of location of hi-jacked vehicle.

3 cl, 6 dwg

FIELD: transport engineering; security systems.

SUBSTANCE: proposed invention relates to security systems providing search, detection and finding of current location of vehicle and possibility of interception of hi-jacked vehicles security hazard express vehicle. Subscriber's complex with receiver installed on vehicle is connected by radio with mobile communication network, microcontroller connected to alarm units and actuating devices, satellite navigation unit and subscriber's signaling device radiating code messages on carrier frequency in form of hopping-signal with information of category of message and codes of identification symbols of vehicle. Retransmission network receives code messages from subscriber's signaling devices and transmits them to security hazard express vehicle furnished with radio-search complexes. Each of said complexes contains communication and data transmission unit connected to mobile communication network, unit to store information from external sources, unit to receiver code messages from retransmission network or subscriber's signaling devices, processing, displaying and coordinate finding unit, operator's personal computer, satellite navigation unit and electronic magnetic compass.

EFFECT: improved accuracy of determination of relative location of hi-jacked vehicle and security hazard express vehicle taking part in interception.

3 cl, 5 dwg

FIELD: transport engineering; security systems.

SUBSTANCE: invention relates to protection of vehicles against unauthorized action and control. Standard electronic modules connected to vehicle supply bus are coupled with vehicle functional members and provide checking of state and control of vehicle functional members. System includes local data network controller, of data exchange protocol, external radio network terminal and security lo-jack subsystem. The latter includes controller connected to vehicle supply bus, electronic modules connected to corresponding functional members of vehicle and remote identification unit coupled by radio with vehicle-mounted and carry-on parts. System includes control PLC-unit consisting of PLC-controller, PLC-transceiver and PLC-adapter connected with vehicle supply bus. PLC-modes are built into standard electronic modules, controller and electronic modules of security lo-jack subsystem, each PLC-modem being coupled with vehicle supply bus. Controller-converter of data exchange protocol and controller of vehicle local data network are made for data exchanger with PLC-controller.

EFFECT: provision of high degree of vehicle protection, possibility of control of service devices, ease of mounting and connecting of nonstandard electronic equipment to standard equipment of vehicle.

4 cl, 3 dwg

FIELD: transport engineering; security systems.

SUBSTANCE: invention is designed to protect vehicle from unauthorized use. User remote identification unit consists of vehicle-mounted part and carry-on part connected with processor unit whose control input is connected with supply bus through ignition switch. Display unit input is connected to first output of processor unit. Each functional member locking unit contains series-connected first matching unit whose input is connected by communication channel to second output of processor unit, decoder, memory element and relay connected through contact groups to functional member to be inter locked, and also series-connected relay contact group test unit, nonvolatile memory, coder and second matching unit whose output is connected to first input of processor unit by communication channel. Delay element and movement sensor are connected to corresponding inputs of memory unit. Input of delay element and contact groups of relay are connected to supply input of processor unit. Second output of nonvolatile memory is connected to second input of processor unit. Display unit is made for receiving signals from processor unit indicating provision of jumper parallel to contact group of relay.

EFFECT: improved efficiency of protection of vehicle owing to possibility of detection concealed jumpers installed in interlock circuits of functional members.

5 cl, 2 dwg

FIELD: transport engineering; vehicle security systems.

SUBSTANCE: proposed system contains standard electronic modules some of which are made for revealing condition and controlling functional elements of vehicle, local information system controller, data exchange protocol controller-converter coupled with transceiver-terminal of cellular mobile communication system, security lo-jack subsystem with its controller, electronic modules connected to corresponding functional elements of vehicle and units of radio frequency identification, controlled parameters, deviation recording, controlled parameters deviation detecting and biometric identification, eyes movement video detector, controlled parameters deviation indicating unit, additional electronic module with video camera pointed to vehicle driver's face, video digitizer and picture compressor and multiplexed bus. Security-lo-jack subsystem controller is made for processing biometric data, for instance, outline of face and/or iris and forming, depending on results of processing, and transmitting orders to interlock or release corresponding functional elements of vehicle by multiplexed bus.

EFFECT: improved protection of vehicle from unauthorized use, improved safety on road.

3 cl, 4 dwg

FIELD: transport engineering; security systems.

SUBSTANCE: invention relates to systems providing protection of vehicles from hi-jacking, theft and unauthorized use and location of current position of vehicle. Proposed system contains security lo-jack subsystem, vehicle-mounted computer consisting of system unit and monitor, video camera, navigation unit operating by signals from global satellite radio navigation systems, transceiver coupled with radio modem being terminal of standard mobile communication network, subscriber's receiver being terminal of paging communication and video processor unit consisting of video digitizer and picture analyzing unit. Security l0-jack subsystem includes processor control unit, vehicle-mounted radio frequency identification unit, security pickups and units to interlock functional members of vehicle. Picture analyzing unit includes video locking unit, background rejection unit, contour detector, buffer memory unit, comparator unit and frame storage unit. Video camera is arranged before user sitting at vehicle handwheel who has visual contact with monitor screen. System unit made to control cursor and pictograms on motor screen, and processor control unit is made to form and transmit commands for blocking or releasing functional members of vehicle.

EFFECT: improved resistance to attempts of unauthorized use.

3 dwg

FIELD: transport engineering; security systems.

SUBSTANCE: security alarms reveal intrusion of criminal into vehicle and form alarms messages by which high frequency signals are modulated. The latter are transmitted by retransmission-radio direction finding network and by standard cellular mobile communication network to dispatcher center. Test signals confirming communication with of vehicle with dispatcher center are received on high-jacked vehicle by standard cellular network. Alarm messages are selected and processed in dispatcher center, identification signs of high-jacked vehicle and its location are determined and initial and current external target designations are transmitted to security hazard express vehicle and, if necessary, movement of high-jacked vehicle is blocked. When messages are transmitted by retransmission-radio direction finding network, coincidence of messages transmitted and received by radio are checked on board the high-jacked vehicle. In case of no coincidence, signal of interruption of reception by retransmission-radio direction finding network is formed. When test signals are received by standard cellular network on high-jacked vehicle, mean signal/noise ratio for preset internal is determined and compared with preset threshold, and if they drop to threshold level with simultaneous interruption of reception by retransmission-radio direction finding network, high-jacked vehicle interlock units are acted upon to stop the vehicle. Object terminal generates alarm signals which are taken by security hazard express vehicle. Bearings and external target designations are used to control movement of security hazard express vehicle at intercepting high-jacked vehicle.

EFFECT: improved efficiency of interception even if high-jacked use vehicles.

3 cl, 7 dwg

FIELD: transport engineering; centralized radio security systems.

SUBSTANCE: vehicle is provided with carry-on security set made for receiving signals of global satellite radio navigation system and determining real-time location of high-jacked vehicle, and for transmitting and receiving signals from standard cellular mobile communication network and radiating signals with hopping carrier frequency-hopping signals with code messages containing identification signs of vehicle and its current location. Balloon subsystems are distributed within the limits of observed territory, each consisting of air observation complex connected by variable-length cable and including retransmitter of hopping signals and flight parameters check unit, and ground complex with winch for variable-length cable to supply power to balloon carrier, receive flight parameters check signals from balloon complex and control winch. Data acquisition and processing center is made for receiving retransmitted hopping signals, selection and processing of code messages and presenting results of processing in form of vehicle marks moving on street-road chart, finding real-time location of vehicle and forming and transmitting coded messages containing identification signs of vehicle and its real-time location in the street to centralized security system stations to form orders to hazard express teams and to transmit by radio, or by wire communication channels, flight parameters control commands for balloon carrier and receive flight parameters control, signals from ground complex. Air observation complex includes video camera, video camera control unit, video image compression unit and video image transmitter made for transmitting compressed video images to data acquisition and processing center by radio from balloon carrier. Said data acquisition and processing center provides geometric and amplitude transformations of video images and registration of images with corresponding fragments of street-road chart and searching and identification of vehicle by received coded messages, verification of location of vehicle relative to elements of street-road network and correction of data transmitted to centralized security system station of form order to hazard express teams.

EFFECT: improved accuracy of location of high-jacked vehicle at violation of stable reception of signals of global satellite radio navigations system.

4 cl, 6 dwg

FIELD: transport engineering; security systems.

SUBSTANCE: invention relates to radioelectronic protection of vehicles from unauthorized use. According to proposed method secret PIN-code is fixed in memory of protection system processor. Coded control radio signal to active system is fed by pressing corresponding pushbuttons on radio trinket. Receiver coded radio signal is identified in system processor. After identification, control signal is generated to active sensors of protection system, interlock functional units of vehicle and connect alarm. Under protection mode, presence of signals from protection system sensors is monitored. If sensors send signals on unauthorized action onto vehicle, alarm is switched on. Coded control radio signal to disconnect the protection is sent by pressing on corresponding pushbuttons. Received coded radio signal is identified in protection system processor. After identification, control signal is generated to disconnect sensors of state of protection system, alarm signaling and interlocking of vehicle functional units, except for engine interlocks. Then secret PIN-code signal is sent into system processor which compares said PIN-code with that fixed in processor memory and, if they coincide, engine interlock is disconnected. Secret PIN-code signal is sent to protection system processor in form of coded radio signal from radio trinket by pressing special pushbutton or combination of pushbuttons designed for remote control of protection system. Changing and fixing new secret PIN-code in processor memory, when necessary, is done by Owner by sending coded radio signals from radio trinket by pressing special PIN-code pushbutton or combination of pushbuttons on radio trinket designed for remote control of protection system.

EFFECT: improved comfort in vehicle operation.

FIELD: transport engineering; security systems.

SUBSTANCE: invention relates to methods of protection of vehicles from unauthorized use by interlocking vehicle engine thrust. Proposed system contains central control unit whose supply input is connected to interconnected HOOK-UP and WAIR-UP relay units and is connected through ignition switch to plus terminal of carry-on supply source. HOOK-UP and WAIR-UP units are connected to corresponding functional member of vehicle. Electronic identification mark and mark reader with antenna connected with central control unit are provided. Event protocol shaper, nonvolatile memory, even protocol reader, modulator and data transmission unit are introduced into system being series connected to each other. Event protocol shaper input is connected to additional output of central control unit. Event protocol reader is also connected with central control unit. Output of date transmission unit is connected with mark reader antenna.

EFFECT: provision of reliable protection of insurance company effecting insurance from falsification of events insured against, minimization of possible losses.

3 dwg

Up!