A device (100) and method (200, 300) authenticate and secure control event data for a vehicle, wherein the device includes: A) a microcontroller (104), coupled to receive control event information, for attaching a first time stamp and vehicle identification number VIN to the control event information to provide first information and sending the first information to memory (106) in time overlap fashion; B) the memory (106), coupled to the microcontroller (104) and a microprocessor (108), for storing first information and second information in time overlap fashion; and C) the microprocessor (108), coupled to the memory (106) and a plurality of transducers (110), for determining whether received impact data varies from previous impact data, and where received impact data varies, adding a second time stamp and VIN to the received impact data to form second information.
|
0. 52. A method for authenticating and securing control event information, comprising:
attaching a first time stamp and an identification number to control event information to provide information; and
storing the information, wherein said storing comprises storing the information in time overlap fashion with second information.
0. 54. A method of transmitting information from a vehicle to a remote location, the method comprising:
contacting from a vehicle a remote location;
providing a certifiable key from the remote location to the vehicle; and
sending event data from the vehicle in a secure manner to the remote location provided the certifiable key is authenticated as being genuine.
0. 48. A device for authenticating and securing information, comprising:
a processing system to provide information that is a combination of a time stamp and an identification number and sending the information to memory;
the memory, coupled to the processing system, for storing the information; and
a manual lock for sending a signal to the memory to lock the information in unchangeable form.
0. 30. A method for authenticating and securing control event information, comprising:
attaching a first time stamp to control event information to provide first information; and
upon at least one transducer being impacted:
combining a second time stamp to impact data received from the at least one transducer to form second information; and
comparing the first information to the second information.
0. 47. A device for authenticating and securing information, comprising:
a processing system to provide information that is a combination of a time stamp and an identification number and sending the information to memory;
the memory, coupled to the processing system, for storing the information; and
an auto-lock unit coupled to the processing system and sends a signal to the memory to lock the information in unchangeable form.
0. 50. A device for authenticating and securing information, comprising:
a processing system to provide first information and sending the first information to memory;
the memory, coupled to the processing system, for storing the first information and second information; and
a lock unit coupled to the processing system for sending a signal to the memory to lock the first information and the second information in unchangeable form.
0. 39. A device for authenticating and securing information, comprising:
a processing system to provide first information and sending the first information to memory in time overlap fashion with respect to second information; and
the memory, coupled to the processing system, for storing the first information and the second information, wherein the processing system is coupled to the memory and a transducer, for combining a time stamp to impact data received from the transducer to form the second information.
0. 59. A method for authenticating and securing control event information, comprising:
attaching a first time stamp to a first control event information to provide first information;
attaching a second time stamp to a second control event information to provide second information, wherein the second control event occurs subsequent to the first control event;
storing the first information;
storing the second information; and
attaching a third time stamp to impact data that is generated subsequent to the second control event.
0. 45. A device for authenticating and securing information, comprising:
a processing system to provide information that is a combination of a time stamp and an identification number and sending the information to memory; and
the memory, coupled to the processing system, for storing the information, wherein the processing system is coupled to the memory and a transducer, for combining a time stamp to impact data received from the transducer to form second information and wherein the processing system compares the information with the second information.
0. 7. A device for authenticating and securing control event information, comprising:
a processing system, coupled to receive control event information, for attaching a first time stamp to the control event information to provide first information and sending the first information to memory in time overlap fashion;
the memory, coupled to the processing system, for storing the first information and second information; and
the processing system, coupled to the memory and a transducer, for combining a second time stamp to impact data received from the transducer to form the second information.
0. 14. A device for authenticating and securing control event information, comprising:
a processing system, coupled to receive control event information, for providing first information to memory in time overlap fashion, wherein the first information comprises the control event information;
the memory, coupled to the processing system, for storing the first information and second information in time overlap fashion; and
the processing system, coupled to the memory and a transducer, for forming the second information, the second information comprising impact data received from the transducer.
6. A method for interpreting control event data and impact data in a vehicle to provide an analysis of an accident, comprising the steps of:
A) determining whether access is authorized to stored impact data with time stamp two and control event information and data with time stamp one in the vehicle;
B) where access is unauthorized, denying access;
C) where access is authorized, obtaining impact data with time stamp two and control event information and data with time stamp one and interpreting the impact data with time stamp two and control event information and data with time stamp one to provide an analysis of the accident.
0. 25. A device for authenticating and securing control event information, comprising:
a processing system, coupled to receive control event information, for attaching an identification number to the control event information to provide first information and sending the first information to memory;
the memory, coupled to the processing system, for storing the first information and second information; and
the processing system, coupled to the memory and a transducer, for combining the identification number to impact data received from the transducer to form the second information, wherein the processing system compares the first information with the second information.
0. 28. A device for authenticating and securing control event information, comprising:
a processing system, coupled to receive control event information, for attaching an identification number to the control event information to provide first information and sending the first information to memory;
the memory, coupled to the processing system, for storing the first information and second information;
the processing system, coupled to the memory and a transducer, for combining the identification number to impact data received from the transducer to form the second information; and
a manual lock for sending a signal to the memory to lock the first information and the second information in unchangeable form.
0. 27. A device for authenticating and securing control event information, comprising:
a processing system, coupled to receive control event information, for attaching an identification number to the control event information to provide first information and sending the first information to memory;
the memory, coupled to the processing system, for storing the first information and second information;
the processing system, coupled to the memory and a transducer, for combining the identification number to impact data received from the transducer to form the second information; and
an auto-lock unit coupled to the processing system for sending a signal to the memory to lock the first information and the second information in unchangeable form.
1. A device for authenticating and securing control event data for a vehicle, comprising:
A) a microcontroller, coupled to receive control event information, for attaching a first time stamp and vehicle identification number VIN to the control event information to provide first information and sending the first information to memory in time overlap fashion;
B) the memory, coupled to the microcontroller and a microprocessor, for storing first information and second information in time overlap fashion; and
C) the microprocessor, coupled to the memory and a plurality of transducers, for determining whether received impact data varies from previous impact data, and where received impact data varies, adding a second time stamp and VIN to the received impact data to form second information.
5. A method for authenticating impact data and control event information in a vehicle, comprising the steps of:
upon transducers being impacted,
A) sending impact data to a microprocessor;
B) determining whether impact data varies and where impact data fails to vary, ending, and where impact data varies, adding a time stamp two and a vehicle identification number to the impact data to form second information and storing the second information in memory;
C) determining whether a manual lock is in use and:
where the manual lock is in use, using the manual lock to retain the second information unchanged in memory;
and where a manual lock fails to be in use, using an auto lock to retain the second information unchanged in memory;
D) obtaining first information on control events and data and comparing with second information;
E) determining whether the first information and the second information is synchronized;
F) where the first information and the second information fails to be synchronized, reporting unauthenticated data/tampering; and
G) where the first information and second information is synchronized, storing the first information and the second information in memory.
4. A method for authenticating and securing control event data for a vehicle, comprising the steps of:
A) sending control event information and data to a microcontroller;
B) attaching, by the microcontroller, a first time stamp and vehicle identification number to the control event information and data to provide first information and sending the first information to a memory;
C) storing the first information in a list in the memory in time overlap fashion;
D) determining whether one of: an ignition of a vehicle is in off position and a predetermined time has elapsed, and where one of: the ignition is on and the predetermined time is unelapsed, determining whether any other control event has occurred;
E) where another control event has occurred, returning to step A;
F) where another control event has failed to occur, ending;
G) where one of: the ignition is in an off position and the predetermined time has elapsed, sending instructions to the memory to start a new list in overlap fashion;
H) determining whether another control event has occurred;
I) where another control event has occurred, returning to step A; and
J) where another control event has failed to occur, ending.
2. The device of
3. The device of
0. 8. The device of
0. 9. The device of
0. 10. The device of
0. 11. The device of
0. 12. The device of
0. 13. The device of
a microcontroller, coupled to receive the control event information, for attaching the first time stamp to the control event information to provide the first information and sending the first information to the memory in time overlap fashion; and
a microprocessor, separate from the microcontroller and coupled to the memory and the transducer, for combining the second time stamp to the impact data received from the transducer to form the second information.
0. 15. The device of
0. 16. The device of
0. 17. The device of
0. 18. The device of
0. 19. The device of
0. 20. The device of
0. 21. The device of
0. 22. The device of
a microcontroller, coupled to receive the control event information, for providing the first information to the memory in time overlap fashion, wherein the first information comprises the control event information; and
a microprocessor, separate from the microcontroller and coupled to the memory and the transducer, for forming the second information, the second information comprising impact data received from the transducer.
0. 23. The device of
0. 24. The device of
0. 26. The device of
0. 29. The device of
a microcontroller, coupled to receive the control event information, for attaching the identification number to the control event information to provide the first information and sending the first information to the memory; and
a microprocessor, separate from the microcontroller and coupled to the memory and the transducer, for combining the identification number to the impact data received from the transducer to form the second information.
0. 31. The method of
0. 32. The method of
0. 33. The method of
0. 34. The method of
0. 35. The method of
0. 36. The method of
0. 37. The method of
0. 38. The method of
0. 40. The device of
0. 41. The device of
0. 42. The device of
0. 43. The device of
0. 44. The device of
0. 46. The device of
0. 49. The device of
0. 51. The device of
0. 53. The method of
0. 55. The method of
0. 56. The method of
0. 57. The device of
0. 58. The device of
0. 60. The method of
0. 61. The method of
|
The present invention relates to vehicle control events, and more particularly to recording vehicle control events.
For aircraft, vehicle control events are recorded and stored in a “black box” that is typically accessed when an accident occurs and is used to determine the cause of the accident. The “black box” is an airline cockpit voice data recorder that records verbal events. This type of recording device has been shown to be extremely useful in determining whether operator error or mechanical failure was the cause of the accident.
For automotive vehicles, however, no authenticated control event recorder has been developed for the purpose of analyzing and evaluating accident claims. When vehicles collide with one another, or are involved in accidents individually, there is no method currently available to determine the sequence of control events performed by the operator before, during and after the occurrence of the accident. Typically police require a report of the accident, but such a report generally relies upon the memories of the operators involved in the accident and any witnesses to the accident. In addition to an investigation by the police, insurance companies for the vehicle or vehicles involved may interview the operator or operators and witnesses to the accident. Often no factual identification of the operator at fault may be determined by the police or the insurance companies.
Thus there is a need for a method and device for authenticating and securing control event data for a vehicle.
The present invention provides a device and method for authenticating and securing event data for a vehicle that may be utilized to analyze the cause of an accident by the police or an insurance agency to aid in their determination as to which driver was at fault, or alternatively, the failure of a vehicle electromechanical system. The method and device may also be utilized to determine whether a false insurance claim has been made. Authenticating event data, as used herein, is defined as ensuring that genuine event data is being recorded by comparing the time stamps on microcontroller data and microprocessor data. Securing event data, as used herein, is defined as limiting access to the stored authenticated event data to certain predetermined agencies. Authenticating and securing the event data provides tamper-proof information about the chronological history of control events.
The present invention records all control events initiated by a driver and a plurality of data with respect to external agents. Data with respect to external agents may include, for example, the force of impact on an external surface of the vehicle body in a crash. Control event data is typically stored in a memory device by a microcontroller and a microprocessor (See
The events recorded by the microcontroller are “signed” by the microcontroller, i.e., include a time stamp and pre-determined identification value/values to ensure that the recorded events were produced during the operation of the specific vehicle. Thus, data provides information for the microprocessor to compare with its own signed data to determine whether the microcontroller data is genuine. For example, one predetermined identification value is a vehicle identification number (VIN) of the vehicle being driven. The VIN is recorded along with the event information to identify the vehicle uniquely. Event information includes data with respect to impacting transducers and control event information and any other predetermined data collected. The vehicle may also support a recognition mechanism and a driver preference mechanism that allows determination of who was driving the vehicle during the signed period. The microprocessor has its own time stamp mechanism that is associated with the external impact sensors. The combination of the event recording and the impact sensing time stamps may be used to certify that the events were recorded at the time of the accident.
The secured record of events is then securely accessible to agencies like automobile insurance agencies or police agencies. The agencies may then analyze the data by securely accessing the memory device, retrieving and interpreting the secure records. Since only the insurance agencies and the police agencies will have access to the secure records, the accident claims may be monitored securely. The police agencies may use the secure event data to determine the cause of the accident and identify the party at fault.
Information stored on the memory device includes a dual record with a time phase difference to produce records overlapping by a predetermined amount. In this way when the first record is being erased, and an accident occurs at the same time, the initial portion of the out-of-phase record is still available. A cumulative record is not generally possible since an unlimited amount of memory would be required, and a large portion of the record prior to an impact would typically not be helpful. In one embodiment, the event data is only accessed securely, using encryption and public key cryptography. The access mechanism may be implemented using a smart card. A smart card may be used as a mechanism to store the certified data that can be removed from the vehicle to be further processed remotely. The smart card acts as a standardized, modular, portable/removable device of convenience to the accessing authorized agencies. A smart card contains a certifiable key only known to the authorized agencies that can be authenticated by the microprocessor against public keys for those authorized agencies.
A secure mechanism may include deliberately setting the microprocessor time clock out of phase with the microcontroller time clock at a predetermined interval. That out of phase value is known only to the system setting of the microprocessor.
In one embodiment, the event record may be transmitted to a remote location (e.g., insurance agencies and police agencies) by use of a cellular phone or similar radio by sending out the event data utilizing a secure method. If a radio frequency device exists on the vehicle, the microprocessor can be programmed to call an authorized agency databank which will provide certifiable keys only known to the authorized agency that can be authenticated by the microprocessor against public keys for selected authorized agencies. Secure protocol can be used to prevent unauthorized reception of the event record.
The components of the present invention may be embodied as a contacted/contactless smartcard module that is readable through a smart card reader. Alternatively, the components may be embedded in the electronics of an automobile. For example, the components may be embodied as a unified device, a combination of a microcontroller and a microprocessor module in a single integrated circuit integrated with both input/output and memory components. Accordingly, the microcontroller 104 and the micro-processor 108, either as separate components or unified in a single device, can be thought of as a processing system. A third alternative uses a secure memory and a software program that enables use of existing microelectronics in the vehicle. The software functions in accrodance accordance with the method described below in FIG. 2.
The device typically also includes an auto-lock unit coupled to the microprocessor for sending a signal to the memory to lock the first information and the second information in unchangeable form, or alternatively, a manual lock for sending a signal to the memory to lock the first information and the second information in unchangeable form.
Control event information is generated as a result of actions by the driver. Control event information may include acceleration/deceleration information, braking information, hazard light initiation, air bag deployment, turn signal initiation, reverse gear implementation, parking gear initiation, hand brake initiation and the like. The VIN may be optional data sent to the microcontroller by the vehicle. Alternatively, the VIN number may already reside in the microcontroller. Other optional data may include, for example, a personal identification number that identifies the driver of the vehicle.
Storing first information in a list in memory in time overlap fashion means storing another list out of phase with the first list by a predetermined time.
Synchronicity of time stamp one and time stamp two may be determined by utilizing a preset value of time stamp in the microprocessor in a predetermined value so that the preselected synchronization difference is not known to an unauthorized person or device.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Jambhekar, Shrirang Nilkanth, Hara, Jacques, Barr, John Robert
Patent | Priority | Assignee | Title |
10181228, | Feb 08 2016 | Allstate Insurance Company | Telematics authentication |
10275366, | Feb 08 2012 | Bendix Commercial Vehicle Systems LLC | Protect information stored in ECU from unintentional writing and overwriting |
11030702, | Feb 02 2012 | Progressive Casualty Insurance Company | Mobile insurance platform system |
11367319, | Feb 08 2016 | Allstate Insurance Company | Telematics authentication |
8595034, | Jan 29 1996 | Progressive Casualty Insurance Company | Monitoring system for determining and communicating a cost of insurance |
8892451, | Jan 29 1996 | Progressive Casualty Insurance Company | Vehicle monitoring system |
9020657, | May 09 2011 | Joseph D., Uhler | Method for automated VIN acquisition and close proximity VIN verification |
9754424, | Jan 23 2004 | Progressive Casualty Insurance Company | Vehicle monitoring system |
ER839, |
Patent | Priority | Assignee | Title |
3704344, | |||
3864731, | |||
3938092, | Jul 16 1973 | MARK IV TRANSPORTATION PRODUCTS CORPORATION, A CORP OF DELAWARE | System for telecommunicating vehicle operation data between a ground station and a remote data processing station |
4884202, | Feb 04 1986 | Kabushiki Kaisha Meidensha | Programmable driverless vehicle |
4890226, | Feb 29 1984 | Fujitsu Limited | Memory access control apparatus having empty real address storing memory and logical address/reat address pair storing memory |
5289183, | Jun 19 1992 | Transcore, LP | Traffic monitoring and management method and apparatus |
5311197, | Feb 01 1993 | Trimble Navigation Limited | Event-activated reporting of vehicle location |
5446659, | Apr 20 1993 | Awaji Ferryboat Kabushiki Kaisha | Traffic accident data recorder and traffic accident reproduction system |
5550738, | Aug 19 1994 | TeamNet, Inc.; TEAMNET, INC | System for recording and analyzing vehicle trip data |
5784704, | Dec 28 1993 | Mitsubishi Denki Kabushiki Kaisha | Memory card with timer controlled protection of stored data |
5805082, | May 17 1990 | Transcore, LP | Electronic vehicle toll collection system and method |
5815093, | Jul 26 1996 | Lextron Systems, Inc | Computerized vehicle log |
5890219, | Nov 27 1996 | EMC IP HOLDING COMPANY LLC | Redundant writing of data to cached storage system |
6028537, | Jun 14 1996 | Visteon Global Technologies, Inc | Vehicle communication and remote control system |
GB2020127, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jun 11 2002 | Temic Automotive of North America, Inc. | (assignment on the face of the patent) | / | |||
Sep 14 2006 | Motorola, Inc | TEMIC AUTOMOTIVE OF NORTH AMERICA, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018430 | /0695 | |
Dec 10 2009 | CONTINENTAL TEVES, INC | Continental Automotive Systems, Inc | MERGER SEE DOCUMENT FOR DETAILS | 033135 | /0185 | |
Dec 10 2009 | TEMIC AUTOMOTIVE OF NORTH AMERICA, INC, | Continental Automotive Systems, Inc | MERGER SEE DOCUMENT FOR DETAILS | 033135 | /0185 |
Date | Maintenance Fee Events |
Feb 15 2011 | ASPN: Payor Number Assigned. |
Dec 08 2011 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jun 22 2013 | 4 years fee payment window open |
Dec 22 2013 | 6 months grace period start (w surcharge) |
Jun 22 2014 | patent expiry (for year 4) |
Jun 22 2016 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 22 2017 | 8 years fee payment window open |
Dec 22 2017 | 6 months grace period start (w surcharge) |
Jun 22 2018 | patent expiry (for year 8) |
Jun 22 2020 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 22 2021 | 12 years fee payment window open |
Dec 22 2021 | 6 months grace period start (w surcharge) |
Jun 22 2022 | patent expiry (for year 12) |
Jun 22 2024 | 2 years to revive unintentionally abandoned end. (for year 12) |