WO2009010954A2 - Vehicular theft-stultifying system - Google Patents

Vehicular theft-stultifying system Download PDF

Info

Publication number
WO2009010954A2
WO2009010954A2 PCT/IL2008/000891 IL2008000891W WO2009010954A2 WO 2009010954 A2 WO2009010954 A2 WO 2009010954A2 IL 2008000891 W IL2008000891 W IL 2008000891W WO 2009010954 A2 WO2009010954 A2 WO 2009010954A2
Authority
WO
WIPO (PCT)
Prior art keywords
vehicle
theft
security
center
jack
Prior art date
Application number
PCT/IL2008/000891
Other languages
French (fr)
Other versions
WO2009010954A3 (en
Inventor
Gal Zilkha
Doron Muctari
Moshe Korber
Alon Haymatan
Adi Haymatan
Original Assignee
Gal Zilkha
Doron Muctari
Moshe Korber
Alon Haymatan
Adi Haymatan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gal Zilkha, Doron Muctari, Moshe Korber, Alon Haymatan, Adi Haymatan filed Critical Gal Zilkha
Publication of WO2009010954A2 publication Critical patent/WO2009010954A2/en
Publication of WO2009010954A3 publication Critical patent/WO2009010954A3/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones

Definitions

  • the present invention relates generally to a vehicular theft- stultifying.
  • Another simple way of stealing a vehicle is by replacing the vehicle's computer with that of the thief. In this way, the security systems fail to be activated and the thief can easily drive away the stolen vehicle.
  • theft refers to any security break, including a burglary to a vehicle and so on.
  • the present invention is directed to a vehicular theft- stultifying system, comprising: a security-center having a communication channel with a user, for informing the security-center by the user about activating or deactivating theft detection; a theft- detector, for detecting theft of the user's vehicle, the the ft - detector having a communication channel with the security-center, for informing the security-center about a theft of the vehicle! and at least one immobilizer installed in the vehicle and controlled by the security-center, for immobilizing the vehicle upon instructions from the security-center in the event of detection of theft by the theft-detector.
  • the communication channel with a user may be carried out via a cellular network.
  • communication with the security center may be via an audio interface, short messaging, and so on.
  • the communication channel between the theft-detector with the security-center may be via RF, a cellular network, via signals transmitted wirelessly to a network of land-based antennas, according to the Differential Time of Arrival model, and so on.
  • the act of informing the security-center by the user about activating theft detection is secured.
  • the act of informing the security-center by the user about activating theft detection may comprise the vehicle's identification number, a number associated with the vehicle's identification number, and so forth.
  • the user may provide a password, information for identifying the vehicle, and so on.
  • the theft-detector comprises a locator, for detecting the location of the vehicle.
  • a locator may be based on a GPS receiver, for detecting the location of the vehicle in a time point.
  • the theft-detector may also comprise a shock sensor, a loudness sensor, and a volume detector, and so on.
  • the theft-detector may also comprise a connection to the systems of the vehicle.
  • the theft- detector operates independently of the systems of the vehicle.
  • the security-center may use a server for interacting with a user via a communication channel.
  • the security-center may also use a database for associating a telephone number with a vehicle, for associating a personal identification number with a vehicle, and so on.
  • Activating or deactivating may be also carried out by a remote control, by a password input device installed in the vehicle, and so on.
  • the security-center may employ different telephone numbers for each of the states of the vehicle's status.
  • the immobilizers may be adapted to immobilize the vehicle only if the vehicle is parking.
  • an immobilizer comprises a jack, and connection means for securing the jack to the vehicle.
  • the jack may be hydraulic, pneumatic, and so on. It also may be operated by an electric motor.
  • the end of a jack may comprise a tripod.
  • the tripod may be adaptable to the ground slope.
  • a jack may also comprise a sensor for indicating a contact between the end of the jack and the ground. When such contact is indicated, the jack may lift the vehicle to a desired elevation.
  • a jack may be controlled independently from the security-center, and thereby be usable as a car's jack.
  • connection means of the jack to the body of a vehicle may be deployed externally to the jack, or internally within the jack, thereby preventing a thief from detaching the jack from the vehicle.
  • Fig. 1 schematically illustrates a method for vehicular theft- stultifying, according to one embodiment of the invention.
  • Fig. 2 schematically illustrates the operation of a vehicular theft- stultifying system, according to one embodiment of the invention.
  • Fig. 3 schematically illustrates the major components of a vehicular theft-stultifying system, according to one embodiment of the invention.
  • Fig. 4 pictorially illustrates a vehicle mobilized by a hydraulic / pneumatic immobilizer, according to a preferred embodiment of the invention.
  • Fig. 5 pictorially illustrates the vehicle of Fig. 4 in which the hydraulic / pneumatic immobilizer 20 is deactivated.
  • Fig. 6 is an outlook which schematically illustrates a hydraulic / pneumatic jack 80 which is a part of an immobilizer 20, according to one embodiment of the invention. It is to be understood, however, that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention, for which reference should be made to the appended claims. It should be further understood that the drawings are not necessarily drawn to scale and that, unless otherwise indicated, they are merely intended to conceptually illustrate the structures and procedures described herein. Reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
  • theft of a vehicle is stultified by activating an immobilizer installed on the vehicle by a remote security-center which is in direct connection with the vehicle.
  • the immobilizer is not connected to the vehicle's control systems, such as the vehicle's computer, and the control center communicates directly with the immobilizer.
  • the control center communicates directly with the immobilizer.
  • the immobilizer is not controlled by the vehicle's systems, neutralizing the immobilizer's operation by a thief is ineffective.
  • Fig. 1 schematically illustrates a method for vehicular theft- stultifying, according to one embodiment of the invention.
  • step 1 a user informs a security-center about parking his vehicle. This can be carried out, for example, via a cellular telephone.
  • step 2 upon detecting theft of the vehicle, the flow continues to step 3, wherein the security-center is informed about the theft.
  • the detection may be carried out by sensors installed in the vehicle, such as a GPS receiver controlled by controller which checks whether the vehicle has been moved within a time period.
  • step 4 the security-center sends to an immobilizer installed in the vehicle an activation code for immobilizing the vehicle.
  • step 5 additional operations are carried out, such as informing the user of his vehicle's theft, alerting the police, dispatching a security team to return the stolen vehicle, and so on.
  • Fig. 2 schematically illustrates the operation of a vehicular theft- stultifying system, according to one embodiment of the invention.
  • a user informs via his cellular telephone 10 the security-center 40 of parking his vehicle.
  • security-center 40 Upon detecting by a sensor thereof (not illustrated in this figure) a theft of vehicle 50, security-center 40 sends (e.g., via the RF communication 14) an activation code to immobilizer 20 (which is installed on vehicle 50) for immobilizing the vehicle.
  • Numeral 70 denotes the communication channel between a user's cellular telephone 10 and security-center 40. The communication may be carried out, for example, by RF (Radio Frequency).
  • Numeral 60 denotes the communication channel between security- center 40 and vehicle 50.
  • the communication in this case is cellular.
  • Fig. 3 schematically illustrates the major components of a vehicular theft-stultifying system, according to one embodiment of the invention.
  • the system comprises three major components ⁇ an immobilizer 20 installed in the vehicle, a theft- detector (such as a sensor) 30, and a security-center 40 in direct connection with both the theft-detector and the immobilizer.
  • an immobilizer 20 installed in the vehicle
  • a theft- detector such as a sensor
  • a security-center 40 in direct connection with both the theft-detector and the immobilizer.
  • a user parks his vehicle, he informs security-center 40, preferably by cellular telephone. From this point on, theft-detector 30 inspects the output of the theft detector 30, which is installed in the vehicle.
  • security-center 40 stops tracking output of the theft detector.
  • security-center 40 retains the "theoretical" status of the vehicle (parking or driving) in a memory. Informing the security-center about changing the status
  • a user informs the security-center about changing the status of his vehicle via a cellular telephone.
  • a cellular telephone There are several technologies for providing information to a remote server via a cellular telephone.
  • short messaging such as an SMS (Short Message Service) message, is one of the technologies that can be employed for sending information to a security-center.
  • SMS Short Message Service
  • the information sent to the security-center may be, for example, the vehicle's ID number.
  • the security-center retains a specific telephone number for informing of parking vehicles, and another for informing about ending of parking. Thus, in this case all the user need do is calling the appropriate number by a cellular phone, which actually simplifies the procedure of informing the security-center about changing the status of the vehicle.
  • the SMS message includes the vehicle's ID number or a code associated with the vehicle, such as a PIN (Personal Identification Number).
  • a message that includes the sequence "P77-888-999/3213" may inform the security-center that the theoretical status of vehicle 77-888-999 has been changed to "parking".
  • the sequence "3213" may be a password. Thus, only a user knowing the password may change the theoretical status of a vehicle.
  • DTMF the acronym of Dual Tone Multi-Frequency
  • DTMF assigns a specific frequency (consisting of two separate tones) to each key so that it can easily be identified by a microprocessor.
  • Audio interface refers herein to an interface that makes use of DTMF.
  • the interface used by a user to communicate with a security-center is audio interface.
  • Another user interface that may be applied for sending information via a cellular telephone is the Internet.
  • browsing the Internet via cellular telephone is a well known technology.
  • sending the theoretical status to a remote security-center may also be carried out by browsing the Internet via a cellular telephone.
  • a "security-center” may refer to any remote server
  • the power required for RF (Radio Frequency) transmission between the security-center and a vehicle becomes an obstacle as the distance increases. From a vehicular point of view, the problem is more acute, since the power that can be provided by a vehicle's battery is limited. Additionally, the size of the transmission antenna is an obstacle.
  • the vehicle transmitter and/or receiver may be a cellular telephone.
  • the connection between the server of the security- center and the cellular network may be via a direct or network connection to a server of the cellular telephone provider, to the Internet, and so on.
  • the Israeli enterprise Ituran www.ituran.com
  • DTOA Differential Time of Arrival
  • DTOA Differential Time of Arrival
  • the theft- detector comprises a locator such as a GPS (Global Positioning System) receiver, upon which the location of a vehicle can be detected.
  • a locator such as a GPS (Global Positioning System) receiver
  • An additional independent sensor that can be employed by a theft- detector may be a shock sensor, loudness sensor, and so forth.
  • the theft-detector may comprise a connection with the vehicle's systems, such as the computer of the vehicle, the RPM (Rounds per Minute) sensor, burglary alarm, and so on.
  • the vehicle's control systems e.g., computer
  • the components of the vehicular the ft" stultifying system the greater the security of said system.
  • the employed immobilizer may be connected to vehicle systems such as the fuel pump, such an immobilizer is vulnerable.
  • an immobilizer which operates independently from the vehicle's computer or any other vehicle control system is based on a hydraulic or pneumatic jack.
  • Fig. 4 pictorially illustrates a vehicle mobilized by a hydraulic / pneumatic immobilizer, according to a preferred embodiment of the invention.
  • Fig. 5 pictorially illustrates the vehicle of Fig. 4 in which the hydraulic / pneumatic immobilizer 20 is deactivated.
  • Fig. 6 is an outlook which schematically illustrates a hydraulic / pneumatic jack 80 which is a part of an immobilizer 20, according to one embodiment of the invention.
  • the vehicle illustrated in Figs. 4 and 5 comprises a plurality of immobilizers, the immobilizing mechanism of which is a jack 80.
  • the immobilizers are deactivated, while in Fig. 5 the immobilizers depicted are activated.
  • a cylinder 88 is pushed out.
  • jack 80 comprises two cylinders, such as in a telescopic leg: an external cylinder 86, and an internal cylinder 88.
  • the internal cylinder 88 is connected to, or is a part of, a piston (not illustrated).
  • a piston not illustrated
  • cylinder 88 is also pushed up.
  • Inlets / outlets 82 and 84 are used for inputting / outputting the fluid (in the case of a hydraulic jack) or air (in the case of a pneumatic jack) into and from the cylinder.
  • legs 90 Preferably at the end there are installed a plurality of legs 90, which remind a tripod. Legs 90 may be pushed out by a spring (not illustrated), or any other mechanism.
  • legs 90 there are four legs 90, but it should be noted that another number of legs may be employed, such as three.
  • each of immobilizer may be used as a jack.
  • a user may activate an immobilizer by remote control (not illustrated).
  • communication between the remote control and an immobilizer may be encrypted.
  • a jack 80 is connectable to a vehicle's body by bolts (not illustrated) through holes 92 at the body of the jack 80.
  • holes 92 are deployed externally to jack 80.
  • holes 92 are deployed internally to jack 80, i.e., out of a burglar's reach, thereby preventing removal of jack 80 by a burglar.
  • a jack 80 may comprise a mechanism for automatically adjusting the slope of the end of the jack (not illustrated herein), which in this case is a tripod, to the ground.
  • a sensor (not illustrated) indicates when the end of the jack touches the ground. Upon indicating contact between the jack and the ground, the jack may lift the vehicle to a desired elevation.
  • Numeral 10 denotes a cellular telephone
  • Numeral 20 denotes an immobilizer
  • Numeral 30 denotes a theft-detector
  • Numeral 40 denotes a security-center!
  • Numeral 50 denotes a vehicle; ⁇ Numeral 60 denotes a communication channel between security-center
  • Numeral 70 denotes a communication channel between a cellular telephone 10 and a security-server 40;
  • Numeral 80 denotes a hydraulic or pneumatic jack, which is used as the immobilization mechanism of immobilizer 20;
  • Each of numerals 82 and 84 denote a fluid / air inlet / outlet;
  • Numeral 86 denotes an external cylinder of the jack 80;
  • Numeral 88 denotes an internal cylinder of the jack 80, which is connected to, or is a part of, the piston thereof (not illustrated);
  • Numeral 90 denotes the leg of a tripod deployed at the end of the cylinder 88; and
  • Numeral 92 denotes a hole through which jack 80 connects to the body of a vehicle.

Abstract

In one aspect, the present invention is directed to a vehicular theft-stultifying system, comprising: a security-center having a communication channel with a user, for informing the security-center by the user about activating or deactivating theft detection; a theft-detector, for detecting a theft of the user's vehicle, the theft-detector having a communication channel with the security-center, for informing the security-center about indication of vehicle theft; and at least one immobilizer installed in the vehicle and controlled by the security-center, for immobilizing the vehicle upon instructions from the security-center in event of detecting a theft by the theft-detector. Preferably, an immobilizer comprises a jack, and connection means for securing the jack to the vehicle.

Description

VEHICULAR THEFT-STULTIFYING SYSTEM
Field of the Invention
The present invention relates generally to a vehicular theft- stultifying.
Background of the Invention
One popular means of stealing a vehicle is by lifting the keys thereof from the owner's household, and using the keys for driving the vehicle therefrom to another location. Vehicle owners usually are not aware of the ease of stealing a vehicle in this way, and therefore regularly leave their keys in obvious places. This way, thieves readily overcome the vehicle security systems, such systems generally having been designed with the assumption that the person holding the keys is either the owner or one retaining the keys with the owner's approval.
Another simple way of stealing a vehicle is by replacing the vehicle's computer with that of the thief. In this way, the security systems fail to be activated and the thief can easily drive away the stolen vehicle.
It is an object of the present invention to provide an anti-theft system for vehicles, which overcomes the above-mentioned drawbacks and other breached systems of the prior art.
Other objects and advantages of the invention will become apparent as the description proceeds. Summary of the Invention
The following embodiments and aspects thereof are described and illustrated in conjunction with systems, tools and methods, which are meant to be merely illustrative, not limiting in scope. In various embodiments, one or more of the above-described problems have been reduced or eliminated, while other embodiments are directed to other advantages or improvements.
In the description, figures and the claims herein the term "theft" refers to any security break, including a burglary to a vehicle and so on.
In one aspect, the present invention is directed to a vehicular theft- stultifying system, comprising: a security-center having a communication channel with a user, for informing the security-center by the user about activating or deactivating theft detection; a theft- detector, for detecting theft of the user's vehicle, the the ft - detector having a communication channel with the security-center, for informing the security-center about a theft of the vehicle! and at least one immobilizer installed in the vehicle and controlled by the security-center, for immobilizing the vehicle upon instructions from the security-center in the event of detection of theft by the theft-detector.
The communication channel with a user may be carried out via a cellular network. In such a case, communication with the security center may be via an audio interface, short messaging, and so on. The communication channel between the theft-detector with the security-center may be via RF, a cellular network, via signals transmitted wirelessly to a network of land-based antennas, according to the Differential Time of Arrival model, and so on.
Preferably, the act of informing the security-center by the user about activating theft detection is secured.
The act of informing the security-center by the user about activating theft detection may comprise the vehicle's identification number, a number associated with the vehicle's identification number, and so forth.
As a part of this act the user may provide a password, information for identifying the vehicle, and so on.
According to one embodiment of the invention, the theft-detector comprises a locator, for detecting the location of the vehicle. Such a locator may be based on a GPS receiver, for detecting the location of the vehicle in a time point.
The theft-detector may also comprise a shock sensor, a loudness sensor, and a volume detector, and so on.
The theft-detector may also comprise a connection to the systems of the vehicle.
According to a preferred embodiment of the invention, the theft- detector operates independently of the systems of the vehicle.
The security-center may use a server for interacting with a user via a communication channel. The security-center may also use a database for associating a telephone number with a vehicle, for associating a personal identification number with a vehicle, and so on.
Activating or deactivating may be also carried out by a remote control, by a password input device installed in the vehicle, and so on.
The security-center may employ different telephone numbers for each of the states of the vehicle's status.
The immobilizers may be adapted to immobilize the vehicle only if the vehicle is parking.
Preferably, an immobilizer comprises a jack, and connection means for securing the jack to the vehicle.
The jack may be hydraulic, pneumatic, and so on. It also may be operated by an electric motor.
The end of a jack may comprise a tripod. The tripod may be adaptable to the ground slope.
A jack may also comprise a sensor for indicating a contact between the end of the jack and the ground. When such contact is indicated, the jack may lift the vehicle to a desired elevation.
A jack may be controlled independently from the security-center, and thereby be usable as a car's jack.
The connection means of the jack to the body of a vehicle may be deployed externally to the jack, or internally within the jack, thereby preventing a thief from detaching the jack from the vehicle. In addition to the exemplary aspects and embodiments described above, further aspects and embodiments will become apparent by reference to the figures and by study of the following detailed description.
Brief Description of the Drawings
The objects and features of the present invention will become apparent from the following detailed description considered in conjunction with the accompanying drawings, in which:
Fig. 1 schematically illustrates a method for vehicular theft- stultifying, according to one embodiment of the invention.
Fig. 2 schematically illustrates the operation of a vehicular theft- stultifying system, according to one embodiment of the invention.
Fig. 3 schematically illustrates the major components of a vehicular theft-stultifying system, according to one embodiment of the invention.
Fig. 4 pictorially illustrates a vehicle mobilized by a hydraulic / pneumatic immobilizer, according to a preferred embodiment of the invention.
Fig. 5 pictorially illustrates the vehicle of Fig. 4 in which the hydraulic / pneumatic immobilizer 20 is deactivated.
Fig. 6 is an outlook which schematically illustrates a hydraulic / pneumatic jack 80 which is a part of an immobilizer 20, according to one embodiment of the invention. It is to be understood, however, that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention, for which reference should be made to the appended claims. It should be further understood that the drawings are not necessarily drawn to scale and that, unless otherwise indicated, they are merely intended to conceptually illustrate the structures and procedures described herein. Reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
Detailed Description of Preferred Embodiments
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the disclosure. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail, so as not to obscure the present disclosure.
According to embodiments of the present invention, theft of a vehicle is stultified by activating an immobilizer installed on the vehicle by a remote security-center which is in direct connection with the vehicle.
Thus, according to this embodiment of the invention, the immobilizer is not connected to the vehicle's control systems, such as the vehicle's computer, and the control center communicates directly with the immobilizer. This is in contrast to prior art immobilizers which are controlled by the vehicle's systems, rather than by a remote center. Since according to these embodiments the immobilizer is not controlled by the vehicle's systems, neutralizing the immobilizer's operation by a thief is ineffective. Fig. 1 schematically illustrates a method for vehicular theft- stultifying, according to one embodiment of the invention.
In step 1 a user informs a security-center about parking his vehicle. This can be carried out, for example, via a cellular telephone.
From step 2, upon detecting theft of the vehicle, the flow continues to step 3, wherein the security-center is informed about the theft. The detection may be carried out by sensors installed in the vehicle, such as a GPS receiver controlled by controller which checks whether the vehicle has been moved within a time period.
In step 4, the security-center sends to an immobilizer installed in the vehicle an activation code for immobilizing the vehicle.
In step 5, additional operations are carried out, such as informing the user of his vehicle's theft, alerting the police, dispatching a security team to return the stolen vehicle, and so on.
Fig. 2 schematically illustrates the operation of a vehicular theft- stultifying system, according to one embodiment of the invention.
A user informs via his cellular telephone 10 the security-center 40 of parking his vehicle.
Upon detecting by a sensor thereof (not illustrated in this figure) a theft of vehicle 50, security-center 40 sends (e.g., via the RF communication 14) an activation code to immobilizer 20 (which is installed on vehicle 50) for immobilizing the vehicle. Numeral 70 denotes the communication channel between a user's cellular telephone 10 and security-center 40. The communication may be carried out, for example, by RF (Radio Frequency).
Numeral 60 denotes the communication channel between security- center 40 and vehicle 50. The communication in this case is cellular.
Fig. 3 schematically illustrates the major components of a vehicular theft-stultifying system, according to one embodiment of the invention.
The system comprises three major components^ an immobilizer 20 installed in the vehicle, a theft- detector (such as a sensor) 30, and a security-center 40 in direct connection with both the theft-detector and the immobilizer. Upon detecting the vehicle's theft by theft-detector 30, security-center 40 sends to immobilizer 20 instructions to immobilize the vehicle.
According to one embodiment of the invention, when a user parks his vehicle, he informs security-center 40, preferably by cellular telephone. From this point on, theft-detector 30 inspects the output of the theft detector 30, which is installed in the vehicle.
When the user intends to drive the parked vehicle, he informs security-center 40, and from this point on, security-center 40 stops tracking output of the theft detector.
Thus, security-center 40 retains the "theoretical" status of the vehicle (parking or driving) in a memory. Informing the security-center about changing the status
Preferably, a user informs the security-center about changing the status of his vehicle via a cellular telephone. There are several technologies for providing information to a remote server via a cellular telephone. For example, short messaging, such as an SMS (Short Message Service) message, is one of the technologies that can be employed for sending information to a security-center. The information sent to the security-center may be, for example, the vehicle's ID number.
Since a cellular telephone is usually associated with a user, a message sent by a specific cellular telephone to the security-center may be considered as sent bj? the owner of the vehicle. According to one embodiment of the invention, the security-center retains a specific telephone number for informing of parking vehicles, and another for informing about ending of parking. Thus, in this case all the user need do is calling the appropriate number by a cellular phone, which actually simplifies the procedure of informing the security-center about changing the status of the vehicle.
Additionally or alternatively, the SMS message includes the vehicle's ID number or a code associated with the vehicle, such as a PIN (Personal Identification Number). For example, a message that includes the sequence "P77-888-999/3213" may inform the security-center that the theoretical status of vehicle 77-888-999 has been changed to "parking". The sequence "3213" may be a password. Thus, only a user knowing the password may change the theoretical status of a vehicle.
DTMF, the acronym of Dual Tone Multi-Frequency, is the system used by touch-tone telephones. DTMF assigns a specific frequency (consisting of two separate tones) to each key so that it can easily be identified by a microprocessor.
The term "Audio interface" refers herein to an interface that makes use of DTMF.
According to one embodiment of the invention, the interface used by a user to communicate with a security-center is audio interface.
Another user interface that may be applied for sending information via a cellular telephone is the Internet. Currently, browsing the Internet via cellular telephone is a well known technology. As such, sending the theoretical status to a remote security-center may also be carried out by browsing the Internet via a cellular telephone.
The security-center
Although a "security-center" may refer to any remote server, the power required for RF (Radio Frequency) transmission between the security-center and a vehicle becomes an obstacle as the distance increases. From a vehicular point of view, the problem is more acute, since the power that can be provided by a vehicle's battery is limited. Additionally, the size of the transmission antenna is an obstacle.
One means of solving these problems is to employ a cellular network for this purpose. In this case, the vehicle transmitter and/or receiver may be a cellular telephone. The connection between the server of the security- center and the cellular network may be via a direct or network connection to a server of the cellular telephone provider, to the Internet, and so on. The Israeli enterprise Ituran (www.ituran.com) offers vehicle locating services based on terrestrial network triangulation and Differential Time of Arrival (DTOA), a model originally developed for advanced military applications^ DTOA uses signals transmitted by wireless devices to a network of land-based antenna that receive and triangulate location of the transmitters. Thus, presently the problem of communicating between a vehicle and a remote station is solved for even relatively-long distances.
The theft-detector
The less the connection between control systems of a vehicle (e.g., the computer) with components of the vehicular theft-stultifying system, the more secure the vehicular theft-stultifying system is rendered. Thus, although theft can be detected by indicating that the vehicle's engine is operating at the time it is supposed to be parked, the security level thereof is relatively low.
According to one embodiment of the present invention, the theft- detector comprises a locator such as a GPS (Global Positioning System) receiver, upon which the location of a vehicle can be detected. Thus, theft of a vehicle can be indicated if it is moved at least a specified distance at the time it is supposed to be parked.
An additional independent sensor that can be employed by a theft- detector may be a shock sensor, loudness sensor, and so forth.
As mentioned above, it is preferred to isolate the components of the vehicular theft-stultifying system from the vehicle's systems. Nevertheless, the theft-detector may comprise a connection with the vehicle's systems, such as the computer of the vehicle, the RPM (Rounds per Minute) sensor, burglary alarm, and so on.
The immobilizer
As mentioned above, the less the connection between the vehicle's control systems (e.g., computer) with the components of the vehicular the ft" stultifying system, the greater the security of said system. Thus, although the employed immobilizer may be connected to vehicle systems such as the fuel pump, such an immobilizer is vulnerable.
According to a preferred embodiment of the invention, an immobilizer which operates independently from the vehicle's computer or any other vehicle control system is based on a hydraulic or pneumatic jack.
Fig. 4 pictorially illustrates a vehicle mobilized by a hydraulic / pneumatic immobilizer, according to a preferred embodiment of the invention.
Fig. 5 pictorially illustrates the vehicle of Fig. 4 in which the hydraulic / pneumatic immobilizer 20 is deactivated.
Fig. 6 is an outlook which schematically illustrates a hydraulic / pneumatic jack 80 which is a part of an immobilizer 20, according to one embodiment of the invention.
The vehicle illustrated in Figs. 4 and 5 comprises a plurality of immobilizers, the immobilizing mechanism of which is a jack 80. In Fig. 4 the immobilizers are deactivated, while in Fig. 5 the immobilizers depicted are activated. As illustrated in Fig. 5, upon activating an immobilizer 20, a cylinder 88 is pushed out.
From the structural point of view, jack 80 comprises two cylinders, such as in a telescopic leg: an external cylinder 86, and an internal cylinder 88. The internal cylinder 88 is connected to, or is a part of, a piston (not illustrated). When the piston is pushed down, the cylinder 88 is also pushed down. When the piston is pushed up, cylinder 88 is also pushed up.
Inlets / outlets 82 and 84 are used for inputting / outputting the fluid (in the case of a hydraulic jack) or air (in the case of a pneumatic jack) into and from the cylinder.
Preferably at the end there are installed a plurality of legs 90, which remind a tripod. Legs 90 may be pushed out by a spring (not illustrated), or any other mechanism.
In the structure illustrated in Fig. 6, there are four legs 90, but it should be noted that another number of legs may be employed, such as three.
Preferably, one immobilizer is deployed at each of the vehicle's wheels. In this way, each of immobilizer may be used as a jack. In this case, a user may activate an immobilizer by remote control (not illustrated). In order to prevent deactivating an immobilizer by an unauthorized factor, communication between the remote control and an immobilizer may be encrypted. A jack 80 is connectable to a vehicle's body by bolts (not illustrated) through holes 92 at the body of the jack 80. According to one embodiment of the invention, holes 92 are deployed externally to jack 80. According to another embodiment of the invention (not illustrated), holes 92 are deployed internally to jack 80, i.e., out of a burglar's reach, thereby preventing removal of jack 80 by a burglar.
A jack 80 may comprise a mechanism for automatically adjusting the slope of the end of the jack (not illustrated herein), which in this case is a tripod, to the ground.
According to one embodiment of the invention, a sensor (not illustrated) indicates when the end of the jack touches the ground. Upon indicating contact between the jack and the ground, the jack may lift the vehicle to a desired elevation.
In the description and figures herein, the following elements have been mentioned:
- Numeral 10 denotes a cellular telephone;
Numeral 20 denotes an immobilizer;
Numeral 30 denotes a theft-detector;
Numeral 40 denotes a security-center!
Numeral 50 denotes a vehicle; ■ Numeral 60 denotes a communication channel between security-center
40 and an immobilizer 20;
Numeral 70 denotes a communication channel between a cellular telephone 10 and a security-server 40;
Numeral 80 denotes a hydraulic or pneumatic jack, which is used as the immobilization mechanism of immobilizer 20;
Each of numerals 82 and 84 denote a fluid / air inlet / outlet; Numeral 86 denotes an external cylinder of the jack 80; Numeral 88 denotes an internal cylinder of the jack 80, which is connected to, or is a part of, the piston thereof (not illustrated); Numeral 90 denotes the leg of a tripod deployed at the end of the cylinder 88; and
Numeral 92 denotes a hole through which jack 80 connects to the body of a vehicle.
While certain features of the invention have been illustrated and described herein, the invention can be embodied in other forms, ways, modifications, substitutions, changes, equivalents, and so forth. The foregoing description of the embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of this disclosure. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto.

Claims

What is claimed is^CLAIMS
1. A vehicular theft- stultifying system, comprising: a security-center having a communication channel with a user, for informing said security-center by said user about activating or deactivating theft detection of a vehicle thereof! a theft-detector, for detecting theft of said vehicle, the theft-detector having a communication channel with said security-center, for informing said security-center about a theft of said vehicle; and at least one immobilizer installed in said vehicle and controlled by said security-center, for immobilizing said vehicle upon instructions from said security-center in the event of detection of theft by said theft-detector.
2. A system according to claim 1, wherein said communication channel with a user is carried out via a cellular network.
3. A system according to claim 1, wherein said communication channel with a user includes an audio interface.
4. A system according to claim 1, wherein said communication channel with a user includes short messaging.
5. A system according to claim 1, wherein said communication channel between said theft-detector with said security-center comprises RF communication.
6. A system according to claim 1, wherein said communication channel between said theft-detector with said security-center is carried out via a cellular network.
7. A system according to claim 1, wherein said communication channel between said theft-detector with said security-center is carried out via signals transmitted wirelessly to a network of land-based antennas.
8. A system according to claim 1, wherein said communication channel between said theft-detector with said security-center uses the
Differential Time of Arrival model.
9. A system according to claim 1, wherein said informing said security- center by said user about activating theft detection is secured.
10. A system according to claim 1, wherein said informing said security- center by said user about activating theft detection comprises said vehicle's identification number.
11. A system according to claim 1, wherein said informing said security- center by said user about activating theft detection comprises a number associated with said vehicle's identification number.
12. A system according to claim 1, wherein said user provides a password along with said informing said security-center by said user about activating theft detection.
13. A system according to claim 1, wherein said informing said security- center by said user about activating theft detection comprises information for identifying said vehicle.
14. A system according to claim 1, wherein said theft-detector comprises a locator, for detecting the location of said vehicle.
15. A system according to claim 1, wherein said theft-detector comprises a GPS receiver, for detecting the location of said vehicle.
16. A system according to claim 1, wherein said theft-detector comprises a member selected from a group comprising: a shock sensor, a loudness sensor, and a volume detector.
17. A system according to claim 1, wherein said theft-detector comprises a connection to at least one of the systems of said vehicle.
18. A system according to claim 1, wherein said theft-detector operates independently of the systems of said vehicle.
19. A system according to claim 1, wherein said security-center comprises a server adapted to interact with a user via said communication channel.
20. A system according to claim 1, wherein said security-center comprises a database for associating a telephone number with a vehicle.
21. A system according to claim 1, wherein said security-center comprises a database for associating a personal identification number with a vehicle.
22.A system according to claim 1, wherein said activating or deactivating is carried out by a password input device installed in said vehicle.
23.A system according to claim 1, wherein said security-center employs different telephone numbers for each of the vehicle's status states.
24.A system according to claim 1, wherein said at least one immobilizer is adapted to immobilize said vehicle only if said vehicle is parking.
25.A system according to claim 1, wherein said immobilizer comprises at least one jack, and connection means of said jack to said vehicle.
26.A system according to claim 25, wherein said at least one jack is hydraulic.
27.A system according to claim 25, wherein said at least one jack is pneumatic.
28.A system according to claim 25, wherein said at least one jack is operated by an electric motor.
29.A system according to claim 25, wherein the end of said at least one jack comprises a tripod.
30. A system according to claim 25, wherein the end of said at least one jack is adaptable to the ground slope.
31. A system according to claim 25, wherein said jack comprises a sensor for indicating a contact between the end of said jack and the ground.
32.A system according to claim 25, further comprising a remote control, for controlling said at least one jack independently from said security- center.
33.A system according to claim 25, wherein said connection means is deployed externally to said jack.
34.A system according to claim 25, wherein said connection means is deployed internally in said jack.
PCT/IL2008/000891 2007-07-17 2008-06-30 Vehicular theft-stultifying system WO2009010954A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL184646A IL184646A0 (en) 2007-07-17 2007-07-17 Vehicular theft-stultifying system
IL184646 2007-07-17

Publications (2)

Publication Number Publication Date
WO2009010954A2 true WO2009010954A2 (en) 2009-01-22
WO2009010954A3 WO2009010954A3 (en) 2010-03-04

Family

ID=40260176

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2008/000891 WO2009010954A2 (en) 2007-07-17 2008-06-30 Vehicular theft-stultifying system

Country Status (2)

Country Link
IL (1) IL184646A0 (en)
WO (1) WO2009010954A2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2625352A (en) * 1950-02-13 1953-01-13 Hydraulic Tools Corp Jack tripod base
US5166694A (en) * 1991-08-20 1992-11-24 Hughes Aircraft Company Vehicle location system having enhanced position location processing
US20020004720A1 (en) * 2000-05-02 2002-01-10 Janoska Ian Zvonko Personal monitoring system
US6404073B1 (en) * 2000-03-17 2002-06-11 Shih-Chung Chiang Device for preventing theft of motor vehicle by jacking up motor vehicle at the time of theft under way

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2625352A (en) * 1950-02-13 1953-01-13 Hydraulic Tools Corp Jack tripod base
US5166694A (en) * 1991-08-20 1992-11-24 Hughes Aircraft Company Vehicle location system having enhanced position location processing
US6404073B1 (en) * 2000-03-17 2002-06-11 Shih-Chung Chiang Device for preventing theft of motor vehicle by jacking up motor vehicle at the time of theft under way
US20020004720A1 (en) * 2000-05-02 2002-01-10 Janoska Ian Zvonko Personal monitoring system

Also Published As

Publication number Publication date
WO2009010954A3 (en) 2010-03-04
IL184646A0 (en) 2008-01-06

Similar Documents

Publication Publication Date Title
US7129852B2 (en) Remote vehicle immobilization
US7561102B2 (en) Method of and system for expanding localized missing customer-vehicle law enforcement-aided VHF recovery networks with location-on-demand supplemental service features via such networks for improved law enforcement-aided recovery, and via the internet for providing supplemental customer service features
US7224261B2 (en) Vehicle security system
US6897762B2 (en) Vehicle immobilization system
US6067007A (en) Method and apparatus for detection, notification and location of vehicle theft
CN1627784B (en) Vehicle security system
US9102294B2 (en) Real-time vehicle alarm communication system
US20050151629A1 (en) Anti-theft system for a motor vehicle
JPS6324395A (en) Burglar proofing position alarm system
WO2010068438A2 (en) Automated geo-fence boundary configuration and activation
US7088219B2 (en) Method for remote vehicle ignition enablement and disablement via broadband enabled security mechanisms
MX2010007451A (en) Vehicle safety system.
CA2394770A1 (en) Vehicle location system using a kinetic network
CN101585352A (en) Method and device for GSM automotive remote monitoring, antitheft and positioning
EP1593564A1 (en) Communication method and system for vehicles
EP1878628B1 (en) Anti-theft system
JP2010221958A (en) Vehicular antitheft system
JP2002362318A (en) Vehicle theft detecting device
WO2009010954A2 (en) Vehicular theft-stultifying system
US6127924A (en) Security system capable of locating a stolen car
KR20000030341A (en) Calling system to driver using vechicle license plat
GB2459642A (en) Vehicle security device
US20070063823A1 (en) Burglarproof apparatus
JP2001010448A (en) Wireless method and device for preventing theft of vehicle
CN201287700Y (en) Anti-theft device of automobile

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08763647

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08763647

Country of ref document: EP

Kind code of ref document: A2