SE542863C2 - System and method for controlling access to vehicle functions of a vehicle - Google Patents
System and method for controlling access to vehicle functions of a vehicleInfo
- Publication number
- SE542863C2 SE542863C2 SE1751379A SE1751379A SE542863C2 SE 542863 C2 SE542863 C2 SE 542863C2 SE 1751379 A SE1751379 A SE 1751379A SE 1751379 A SE1751379 A SE 1751379A SE 542863 C2 SE542863 C2 SE 542863C2
- Authority
- SE
- Sweden
- Prior art keywords
- vehicle
- authentication device
- zones
- zone
- wireless
- Prior art date
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/01—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/01—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
- B60R25/04—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2018—Central base unlocks or authorises unlocking
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/30—Detection related to theft or to other events relevant to anti-theft systems
- B60R25/31—Detection related to theft or to other events relevant to anti-theft systems of human presence inside or outside the vehicle
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mechanical Engineering (AREA)
- Lock And Its Accessories (AREA)
Abstract
A system (23) and a method for controlling access to vehicle functions of a vehicle (1), each vehicle function being associated with a zone of a plurality of vehicle zones (6a, 7a, 8a, 9a, 28a) of the vehicle (1). The system (23) comprising a wireless authentication device (11) comprising a wireless transmitter (17) configured to transmit an identity signal identifying the authentication device (11); a wireless detector arrangement (24) arranged to receive the identity signal transmitted by the wireless transmitter (17) and a control arrangement (25) configured: to obtain the identity signal received by the wireless detector arrangement (24); to determine, based on the obtained identity signal, whether the wireless authentication device (11) is present in one or more of the plurality of the vehicle zones (6a, 7a, 8a, 9a, 28a); and to control access to vehicle functions corresponding to the plurality of vehicle zones (6a, 7a, 8a, 9a, 28a), based on the determination.
Description
System and method for controlling access to vehicle functions of a vehicle Technical field The present disclosure relates to technology for vehicles, and in particular to asystem and a method for controlling access to vehicle functions of a vehicle. Thedisclosure also relates to a vehicle comprising the system, a computer program and a computer-readable medium.
BackgroundVehicle technology of today often include an electronic key-less system for opening the doors of the vehicle and starting the vehicle. lt is sufficient that thedriver carries the electronic key in his or her pocket to be able to unlock thevehicle and to get access to the vehicle functions of the vehicle.
However, if the driver leaves the key, either a regular mechanical key or theelectronic key, in the driver cabin, for example, for loading or unloading thevehicle, or for attaching a trailer to the vehicle, someone might take advantage ofthe situation and hijack the vehicle. This might particularly be a problem for trucks,which are long and as it takes time for the driver to return to the cabin from theback of the truck. lf the driver is between the truck and the trailer, it might become very dangerous for the driver if someone suddenly starts driving away the vehicle.
For some vehicles it is also possible to open the tail lift of the vehicle while thedriver, and thus the electronic key, is in the cabin. Thus, if the driver is notcautious, someone might open the tail lift and steal goods while the driver is in thecabin. Also, if the driver brings the electronic key along and operates the tail lift,the electronic system of the vehicle might go into a sleep mode as the ignition ofthe vehicle is turned off. The driver might then have to turn on the ignition of thevehicle before the tail lift is operable again, which of course is annoying and time consuming. 2 From JP2004257207, a locking-unlocking system for a vehicle loading platform isknown. A certain radio frequency identification device is used to allow locking andunlocking of the platform.
However, to have a certain device for operating the platform does not solve theproblem of hijacking the vehicle if the driver has left the key for driving in the cabin.
Summarylt is thus an object of the disclosure to alleviate at least some of the drawbacks with the prior art. lt is a further object of the disclosure to provide a solution thataims to prevent hijacking of the vehicle while the driver is outside the cabin. Theseobject and others are at least partly achieved by the method and the deviceaccording to the independent claims, and by the embodiments according to the dependent claims.
According to one aspect, the disclosure relates to a system for controlling accessto vehicle functions of a vehicle. Each vehicle function is being associated with azone of a plurality of vehicle zones of the vehicle. The system comprises awireless authentication device comprising a wireless transmitter configured totransmit an identity signal identifying the authentication device. The system furthercomprises a wireless detector arrangement arranged to receive the identity signaltransmitted by the wireless transmitter and a control arrangement. The controlarrangement is configured to obtain the identity signal received by the wirelessdetector arrangement, to determine, based on the obtained identity signal,whether the wireless authentication device is present in one or more of theplurality of the vehicle zones; and to control access to vehicle functionscorresponding to the plurality of vehicle zones, based on the determination.
The proposed system forces the driver to keep track of the position theauthentication device to be able to access functions of the vehicle. Thereby, thesystem provides protection against hijacking of the vehicle, as the driver has to bring the authentication device with him to get access to certain vehicle functions and not leave the device in the vehicle.
Further, the control arranqement is arranqed to, upon a determination that the wireless authentication device is present in one of the pluralitv of vehicle zones, enable access to the vehicle function associated to the vehicle zone where the , the authentication device has to wireless authentication device is present. Thus be present in the zone of the associated vehicle function to allow operation of the , the driver has to brinq the authentication device alonq to vehicle function. Thus be able to operate the vehicle function. Accordind to some embodiments, the authentication device has to be present in the zone the whole time the driver , theauthentication device iust has to be in the zone to activate the thereto related wants to operate the related vehicle function. ln some other embodiments function, and can thereafter be removed from the zone and the function will still be activated and possible to operate. This functionalitv mav be confiqured as desired. ln either wav the driver still has to brinq the authentication device from the cabin.
LA ¿\ _» .-\-~ ü s. vw ;.\ _,_\ »q u-w ü N \~.~\-\.^\~.~!\.!n! !\~.\ 3. \>'!!l\.' A 1.:x www ~ ß-*švfi fw t; .\:~~.~ .- wt ,~~ ~ rm:e.
\ Yi Pl ïaà ~.~\ ~-,-\ ¿\ _,~\ »vs ¿\ u .q 5 t.. .w T s svt f; : ü s > . P l\-' ' t: .xt-w .-: :\\.M s. .~\.~.: .usa s. .- \.~\,~~~.~\.: According to some embodiments, the wireless detector arrangement is arrangedto receive the identity signal transmitted by the wireless transmitter at a plurality ofreception points, wherein each reception points is associated with one vehiclezone of the plurality of vehicle zones. Thereby, different locations of the wirelessauthentication device can more easily be distinguished, and the strength of theidentity signal is allowed to be lower than if only one reception point was arrangedin the vehicle. According to some other embodiments, the wireless detectorarrangement is arranged to receive the identity signal transmitted by the wirelesstransmitter at a single reception point.
According to some embodiments, the control arrangement is configured todetermine whether the wireless authentication device is present in one or more ofthe plurality of the vehicle zones based on that the identity signal meets one orseveral criteria, for the identity of the authentication device, for a signal strength ofthe identity signal, for which reception point the identity signal was received atand/or for the direction of the identity signal. Thus, in order to distinguish which zone or zones the authentication device is located in, one or several methods are available. The methods may be combined in order to enhance the determination.
According to some embodiments, the control arrangement is arranged to, upon a determination that the wireless authentication device is not present in one of theplurality of vehicle zones, disable access of the vehicle function being associatedto the vehicle zone where the wireless authentication device is not present. Thus,if the authentication device is removed from the zone, or has never been in the zone, the access to the associated vehicle function is blocked.
I* .If ' .I .I" .\_ 'i i “ i I: '.'t. ' \ \ t ti”. t!_.__. ,. _. .t.t__tt_tt .tt .t_.._.t,tt_.\ _. .tt._.\_..,t_._.t,tt,.t..vt svt.. t ..tt,. __.\_.~t_ tt -_-.-t-~~-\.~ w -tw-vt t.-~¿-\_»\ _» tt, www .~t th» ~t_. t,._æ\\x*ëiæ*s§s\š~\ï\ršïš§t\feæsš=æxšësš¥sä~ïse*šššë\\ëßä._ _. .ïfsštstšs . .. _ »sätšzïtssšm _ ..t*.~*=~*š~.\\\*š=*.~\f§t.\*šfi§\tt\*= š“\§~*>%*èš~äëï~*¥+t\=r\ä==>*æ*š*š~*šw\*štëšïst..' _.. .^'É^. f. 11... *f O. ... I. ' .t t.. t.t_.... t ...tt ~ .t t .tt _.t. .tc.t. I. t .lät “_ .. . 'fšàvïäsšššæ-'s-.Äïàett t .ti-tr t: .- It-t .-t.- .-t.- -...-t-». .-.'~.-t.~=~'-t-t.¿\t. _tt;....t. _54. nt: pt. t ...t¿.t:_.t¿.t. :tr_t t t.=_t~_t_. _.t-t;.\_.._-.;_.\.. .\;,. ..:_.t. :___ :_. _.. Wie.. :_ ,.t.t_.\.._.t1_.._t,.t_.\: .V35 _. ___ _.\.-.,.\.._.._~:_. .t 41- -\.-\¿-t-=-ï.-t~ fli-tfl t. . t _ ...G at\->.-.._..=.~.«\t-..«\;>~.»~~“--v\>~ v- ~~~_\ -\-;.~\t»\ ;t\__-.~t.~\- g-pvw-ï-wg* Ä ß v* Nw ¿__~-_w ;¿\~\*_t~.-_=~~\ »www _ n' š-wfi* -v\.>\~ ~ ~t>\ -§~-_~¿\~- +-w \~ iv; -Ä _. _ t.. ttuëfis. t .. .. .tv-eëå-gs-æwtæ... t... .-s..__ t. ...ett .. tesšäsæst. t. .tt stå»- t . _ 't __. . . . . . ._ ._~.-t_-_-.\_tt.-t .tt 1,1., t.-t .-t.-\=.-.-t,.~.-t+.-t.~t~ .tt-tm wtt .tt twt t-.~;,.-t;-.«t .- _». x ~I~ . . .\. . I 1» t t ~.\ t n .. t. t - ~ _. _. .t .. ._ . . ..-t_..-.-~tt-..~t.t v; ;.-t_~\;_-,.-..-\_-\ _~~+ gets-_ tt.- yttftzft »tt-tt'm »_ .tttt.. .t tt .t ,.. _. .ttt .t ,. . .Ü t... t-tttttt ~\.~ ~_~~ .t t., txm.. .t t .qttt *xxx *w ~à *\~=-~š x ~\ 1\ -tw\t tt-t-ty: \ \tt .At-_ 47: i~\.~\{\š\t>\-\t~\ s>\>\.»\~ ~ -~-^\É.~\{\*\ \* ~ wf- n * ^ ~ ïwcxïm H* “tf-w > \ \ n u ~. x t» g š* t \' \*- Nfi fšæ-s t .. s. . _ . .t _ . . t . - \_ ,t t¿.~:~“-æ~>--=t\§- t .åt-fw Wat t. . s* _. .-t. .tt-t :uft-“ttt -..~:-t .tu-t t t .tti- t. t t btw-t tttttt t~tt~ _ ~ .t . -t .t_ g ~ a t \tt\\t\: q a \t t. .V . . t tt-. .t t t t t tt .. t t t tt. - _. . . . t. . . tt.. ._.t .ttutwt _t:,.t_. _.t._ _._,..: ..t_,.. ,. .»._ _.._tt_~.._t\.t “tt ,.\. ._ __..t~._.-_.t..t . . t t . att-_: att-cv.. .st- tttyhnsttttu 2 .\.:. t\.\.\.~t . :wa *mt-t t. x. \t«.
According to some embodiments, the vehicle zone related to operating vehiclefunctions is a vehicle zone limited to the cabin of the vehicle, and is separatedfrom the other vehicle zones related to the auxiliary vehicle functions. Thus, thenthe zone of the important operating vehicle functions that are crucial for driving thevehicle is clearly separated from the zones of the auxiliary vehicle functions. 6 Thereby the authentication device cannot be left behind, the driver has to bring the device along to get access to functions of the other zones.
According to some embodiments, the system is arranged to use short range radiotransmission to detect the position of the wireless authentication device. Thus, an efficient, secure and proven technology can be used.
According to a second aspect, the disclosure relates to a vehicle comprising thesystem as described herein.
According to a third aspect, the disclosure relates to a method for controllingaccess to vehicle functions of a vehicle. Each vehicle function is associated with azone of a plurality of vehicle zones of the vehicle. The method comprisesreceiving an identity signal from a wireless authentication device; determining,based on the identity signal, whether the wireless authentication device is presentin one or more of the plurality of vehicle zones; and controlling access to thevehicle functions corresponding to the plurality of vehicle zones based on the determining.
The same benefits as of the system may be obtained with the correspondingmethod claims, and reference is made to these claims.
According to some embodiments, the method comprises receiving the identitysignal transmitted by the wireless authentication device at a plurality of receptionpoints, wherein each reception points is associated with one vehicle zone of the plurality of vehicle zones.
According to some embodiments, the determining comprises determining whetherthe wireless authentication device is present in one or more of the plurality of thevehicle zones based on that the identity signal meets one or several criteria, forthe identity of the authentication device, for a signal strength of the identity signal, 7 for which reception point the identity signal was received at and/or for the directionof the identity signal.
According to some embodiments, the method comprises upon determining thatthe wireless authentication device is present in one of the plurality of vehiclezones, enabling access to the vehicle function related to the vehicle zone where the wireless authentication device is present.
According to some embodiments, the method comprises upon determining thatthe wireless authentication device is not present in one of the plurality of vehiclezones, disabling access of the vehicle function related to the vehicle zone where the wireless authentication device is not present.
According to some embodiments, the vehicle functions includes operating thevehicle; and one or several auxiliary functions of the vehicle.
According to some embodiments, the one or several auxiliary functions is one orseveral of: control of tail lift, control of outside light of the vehicle and trailerattachment/detachment.
According to some embodiments, the vehicle zone related to driving the vehicle isa vehicle zone limited to the cabin of the vehicle, and is separated from the othervehicle zones related to the auxiliary functions of the vehicle.
According to some embodiments, the method comprises determining whether thewireless authentication device is present in one of the plurality of vehicle zones using short range radio communication.
According to a fourth aspect, the disclosure relates to a computer programcomprising instructions which, when the program is executed by a computer,cause the computer to carry out the method according to any one of theembodiments described herein.
According to a fifth aspect, the disclosure relates to a computer-readable mediumcomprising instructions which, when executed by a computer, cause the computerto carry out the method according to any of the embodiments described herein.
Brief description of the drawinds Fig. 1 i||ustrates an example of a vehicle with an open tail lift.
Fig. 2 i||ustrates a system for controlling access to vehicle functions of the vehiclein Fig. 1 according to some embodiments.
Fig. 3 i||ustrates an authentication device according to some embodiments.
Fig. 4 i||ustrates a wireless receiver according to some embodiments.
Fig. 5 i||ustrates a control unit according to some embodiments.
Fig. 6 i||ustrates a flow chart of a method for controlling access to vehicle functions of the vehicle according to some embodiments.
Detailed descriptionln the following a system and methods for controlling access to vehicle functions of a vehicle will be described, which e.g. have the purpose of forcing a driver tocarry the driver's key/authentication device with him/her to be able to accessfunctions of the vehicle. Thereby, the risk that the vehicle is hijacked because thedriver has left the key/authentication device in the cabin of the vehicle is reduced.The system monitors where the authentication device is positioned/located, andbased on the location the driver carrying the authentication device is grantedaccess or not granted access to certain functions of the vehicle.
The vehicle may be arranged with a keyless system, comprising an immobilizer.The immobiliser or immobilizer is an electronic security function that prevents theengine from running unless the correct key (or other token) is present. Theimmobilizer may be included in a keyless drive system, where the driver only hasto carry the electronic key with her to be able to start and lock/unlock the doors ofthe vehicle. An exemplary keyless drive system comprises a plurality of antennasarranged to the vehicle, that transmit low frequency (~125kHz) signals to the 9 electronic key. The key becomes activated if it is sufficiently close to the vehicleand transmits its ID back to the vehicle via radio frequency > 300MHz, to areceiver located in the vehicle. lf the key has the correct ID, the vehicle isunlocked and the driver gets access to the vehicle. However, the keyless drivesystems of today typically do not recognize the exact location or vehicle zone ofthe electronic key, and can therefore not, based on the more precise location ofthe key, give access to different vehicle functions. The present system may thusbe a complement or improvement to a keyless drive system. ln the following the system for controlling access to vehicle functions of a vehiclewill be explained with reference to the Figs. 1-5, where the system is implementedin a vehicle. Thereafter methods for executing the invention will be explained withreference to Fig. 6.
Fig. 1 illustrates a vehicle 1 where the system 23 can be implemented. However,also other kinds of vehicles are suitable to be used with the system 23, andespecially other kinds of working vehicles such as garbage trucks, busses, orregular trucks. The vehicle 1 here comprises a tractor 2a and a thereto attachedtrailer 2b. The vehicle trailer 2b is detachably arranged to the trailer 2b. The trailer2b comprises a tail lift 4 at its tail end that is operated via a control panel 5 toclose or open the tail end of the trailer 2b. The control panel 5 may be arranged toan outer side of the trailer 2b. The tail lift 4 may also be operated with a remotecontrol (not shown) that often is connected to the control panel 5 by wire.Alternatively, the remote control may be wirelessly connected to the control panel5. This is for example convenient if the operator is standing on the tail lift 4 or isinside the trailer 2b and simultaneously wants to operate the tail lift 4. The vehicle1 also comprises working lamps or lights, of which on working lamp 27 is shown inFig. 1 attached to the outside of the tractor 2a, and another one 26 is shownattached to the opposite side of the tractor 2a. The working lights 26, 27 have thetask of illuminating the immediate surroundings of the vehicle 1, such that e.g. thedriver can work with the vehicle 1 when it is dark. A vehicle function may be anyof: starting the vehicle 1 (including powering the ignition circuit of the vehicle), lO driving the vehicle (including steering, control of throttle, control of brakes etc),control of tail lift 4 of the vehicle 1, control of outside lights of the vehicle 1, andcontrol of vehicle trailer 2b attachment/detachment. The vehicle functions: controlof tail lift 4 of the vehicle 1, control of outside lights of the vehicle 1, and control ofvehicle trailer 2b attachment/detachment may be referred to as auxiliary functions,as they are not directly related to operating the vehicle 1. Another kind of auxiliaryvehicle function may be to get permission to fuel the vehicle 1, e.g. open the fuelcap. The auxiliary functions relate to vehicle functions that are accessible from theoutside of the vehicle 1, when the driver has to go outside the cabin 3 (Fig. 2) tobe able to work and access the function. The vehicle functions: starting thevehicle 1 and driving the vehicle 1 may be referred to as operating vehiclefunctions, as they are directly related to operating the vehicle 1 and crucial to beable to drive the vehicle 1. ln other words, the operating vehicle functions relate to functions for driving the vehicle.
Fig. 2 illustrates the vehicle 1 of Fig. 1, with the system 23 for controlling accessto vehicle functions is implemented. Here, the vehicle functions described aboveare each being associated with one individual, unique vehicle zone, from herebyreferred to simply as zones, of a plurality of vehicle zones 6a, 7a, 8a, 9a, 28a ofthe vehicle 1. Some zones are completely separated from each other, while somezones may be overlapping. The zones are illustrated with dashed lines in thefigure. Each zone defines a certain three-dimensional space, here for ease ofillustration defined in two dimensions. The zone 6a defines a space around adrivers' cabin 3 of the vehicle 1, including the drivers' cabin 3. The zone 6a maybe limited to the drivers' cabin 3, or include the drivers' cabin 6 and up to 0.5meter outside the drivers' cabin 3. This zone 6a is related to the operating vehiclefunctions. The zone 7a defines a space along on of the sides the vehicle 1 with anextension of 1-2 meters from the side, and the zone 8a defines a space along anopposite one of the sides the vehicle 1 with an extension of 1-2 meters from theside. These zones 7a, 8a relate to the control of respective outside working light26, 27 of the vehicle 1. The zone 9a defines a space around and including the taillift 4 of the vehicle 1. This zone 9a has an extension such that it covers a driver ll interacting with the control panel 5 and thus the tail lift 4, and covers the tail life 4and a working space around the tail lift 4 when the tail lift 4 is being maneuvered.For example, the zone 9a has an extension of one meter around the tail lift 4 in ahorizontal direction, and three meters in the vertical direction above the tail lift 4,when the tail lift 4 is in its lowermost working position. This zone 9a is related tothe control of the tail lift 4. The zone 28a is related to the control of vehicle trailer2b attachment/detachment. The zone 28a defines a space around the vehicletrailer 2b attachment/detachment point. The zone 28a has an extension to allowthe driver to work with attachment/detachment of a trailer 2b, and for example hasan extension of two meters around the attachment/detachment point. As shown,some of the zones might be overlapping. As understood, the zones illustratedhere may be more or less as desired. However, the zone 6a, and at least oneother zone not overlapping with the zone 6a, are required. The vehicle zone 6arelated to operating vehicle functions of the vehicle 1 is a vehicle zone limited tothe cabin 3 of the vehicle 1, optionally including the immediate surrounding of thecabin 3, and is separated from the other vehicle zones 7a, 8a, 9a, 28a related tothe auxiliary vehicle functions.
The system 23 further comprises a wireless authentication device 11, a wirelessdetector arrangement 24 and a control arrangement 25. The system 23 isarranged to use short range radio transmission to detect the location/presence ofthe wireless authentication device 11. Alternatively, a Global Positioning System(GPS) may be used to monitor the location of the authentication device 11, andthe authentication device 11 will then include a GPS receiver.
The wireless authentication device 11 is in Fig. 2 illustrated carried by the driver10, and also in Fig. 3. The wireless authentication device 11 may be a mobiledevice such as a mobile phone or tablet, a tag or an electronic key. The wirelessauthentication device 11 may be the same key device as used in a keyless drivesystem. As shown in Fig. 4, the wireless authentication device 11 comprises awireless transmitter 17. The wireless transmitter is typically a short range radiotransmitter operating in the un-licensed frequency band, such as a Bluetooth, 12 Zigbee or LoRa transmitter. The range of the transmitter is typically selected tomatch the vehicle e.g. 1-10 meters. The wireless transmitter 17 is configured totransmit an identity signal identifying the authentication device 11, for example inresponse to that the driver interacts with the authentication device 11, e.g.presses a button of the same. The identity signal e.g. comprises a digital key thatis unique to the authentication device 11. The communication between theauthentication device 11 and the wireless detector arrangement 24 is typicallyencrypted using any suitable encryption protocol.
The wireless transmitter 17 may alternatively or additionally be a transceiver andthus configured to receive e.g. an activation signal from one or severaltransmitting points/transmitters in the vehicle 1, and in response transmit theidentity signal. The wireless detector arrangement 24 in the vehicle 1 may be setup such that the transmitters in the vehicle 1 are emitting activation signals continuously, as soon as the driver is moving, as soon as the driver is touching a part of a vehicle function or similar, and/or while the driver is not in the cabin 3 etc.
Dedicated detectors (not shown) may be used to monitor such behavior. Thewireless authentication device 11 further comprises a processor 30 and a memory16. The memory 16 stores identification data of the wireless authentication device11.
The transmission of the identity signal may also be triggered by any other suitablemeans. lt may also be configured to be periodically transmitted without anytrigger.
The wireless detector arrangement 24 is arranged to receive the identity signaltransmitted by the wireless transmitter 17. The wireless detector arrangement 24may be arranged in a plurality of ways, but has to be arranged such that thewireless detector arrangement can distinguish in which zone the wirelessauthentication device 11 is located. ln Fig. 2, the wireless detector arrangement24 comprises a plurality of reception points 6b, 7b, 8b, 9b, 28b. Each receptionpoint 6b, 7b, 8b, 9b, 28b then includes a receiving antenna. A reception point may 13 be a passive device, i.e. an analogue device that simply forwards the received identity signal to a control unit.
The reception point may alternatively be a two-way device such as a transceiver.Thus, the reception point may also include a transmitting point arranged totransmit an activation signal to wake up or activate the wireless authenticationdevice 11. ln some embodiments the reception point and the transmitting point are separate devices.
An example of a reception point 6b, 7b, 8b, 9b, 28b is illustrated in Fig. 4. Thereception point 6b, 7b, 8b, 9b, 28b is here embodied as a transceiver unit andcomprises an antenna, a processor 18 and a memory 19. The transceiver is e.g.arranged to receive the electromagnetic signal and to demodulate and decode itin order to e.g. acquire a digital identity signal such as an ID number of theauthentication device 11. The reception points 6b, 7b, 8b, 9b, 28b may howeveras mentioned be more simple devices and principally only include a receivingantenna. Then, one common transceiver may be used for transmission andreception at several reception points 6b, 7b, 8b, 9b, 28b. The reception points are then connected with the common transceiver e.g. with cables. ln case the wireless detector arrangement 24 comprises a plurality of receptionpoints 6b, 7b, 8b, 9b, 28b, the wireless detector arrangement 24 is arranged toreceive the identity signal transmitted by the wireless transmitter at the plurality ofreception points. For example, each reception point 6b, 7b, 8b, 9b, 28b isassociated with one vehicle zone of the plurality of vehicle zones 6a, 7a, 8a, 9a,28a. For that purpose, each reception point 6b, 7b, 8b, 9b, 28b is located inrelation to the respective vehicle zone 6a, 7a, 8a, 9a, 28a such that it can receivethe identity signal from the authentication device 11 when the authentication device 11 is within the respective zone.
The control arrangement 25 comprises one or several control units, arranged tocontrol different functions of the vehicle. A control unit may be an Electronic 14 Control Unit (ECU). The control arrangement 25 may include a main control unit14. The main control unit 14 is a master of the other control unit and supervisesthem. The control arrangement 25 may thus include other control units, such asECUs that each is responsible for one or several vehicle functions. Such controlunits may include, for example, an engine control unit, a power train control unit, abrake control unit (commonly referred to as 12 in Fig. 2, and these control units 12are thus arranged to control the operating vehicle functions), a light control unit 13arranged to control the working lights 26, 27, a trailer attachment control unit 29arranged to control trailer attachment/detachment, and a tail lift control unit 15arranged to control the tail lift 4. The functions of different control units mayinstead be incorporated in other control units, such as the main control unit 14. Acontrol unit 12, 13, 14, 15, 29 is generally depicted in Fig. 5, and each comprisesa processor 21 and a memory 22.
The processors described herein generally each comprises e.g. one or severalCentral Processing Units (CPU). A memory as described herein generallycomprises e.g. one or several memory units. A memory unit may comprise avolatile and/or a non-volatile memory, such as a flash memory or Random AccessMemory (RAM). The control arrangement 25, e.g. the main control unit 14 or anyof the other control units, further comprises a computer program comprisinginstructions which, when the program is executed by a computer, cause thecomputer to carry out the method that will be described in the following. Theprogram may be downloaded from a computer-readable medium, e.g. a memorystick or memory from another computer. Thus, the computer-readable mediumcomprises instructions, which, when executed by a computer, cause the computer to carry out the method that will be described in the following.
The internal units of the vehicle 1, such as control arrangements, control units,devices, sensors, detectors, reception points, transmitting points, transpondersetc., are arranged to communicate via a communication bus, for example a CAN-bus (Controller Area Network), which uses a message based protocol.Alternatively, other communication protocols may be used e.g. TTP (Time- Triggered Protocol), Flexray, Ethernet, etc. ln this way signals and data describedherein may be exchanged between different units, devices, sensors and/ordetectors etc. in the vehicle 1. Sometimes signals and data are transferredwirelessly between the different units, devices, sensors and/or detectors etc.
The control arrangement 25 is configured to control access to vehicle functions ofa vehicle 1, as will now be explained in further detail.
The control arrangement 25 is configured to obtain the identity signal received bythe wireless detector arrangement 24 and to determine, based on the obtainedidentity signal, whether the wireless authentication device 11 is present in one ormore of the plurality of the vehicle zones 6a, 7a, 8a, 9a, 28a. The identity signalmay be received from the reception point 6b, 7b, 8b, 9b, 28b as an analoguesignal. Alternatively, some processing is done in the reception point 6b, 7b, 8b,9b, 28b and the control arrangement 25 may then e.g. receive a digital identitysignal and corresponding property data. The control arrangement 25 is furtherconfigured to control access to vehicle functions corresponding to the plurality ofvehicle zones 6a, 7a, 8a, 9a, 28a, based on the determination. The identity signalis thus received at, at least one of the reception points 6b, 7b, 8b, 9b, 28b of thevehicle 1, and is then sent to the control arrangement 25. For example, theidentity signal is sent to the main control unit 14.
The control arrangement 25, e.g. the main control unit 14, is further configured todetermine whether the wireless authentication device 11 is present in one or moreof the plurality of the vehicle zones 6a, 7a, 8a, 9a, 28a based on that the identitysignal meets one or several criteria, for the identity of the authentication device11, for a received signal strength indicator of the identity signal, for whichreception point the identity signal was received at, and/or for the direction of theidentity signal. Thus, by e.g. processing the identity signal, information can beretrieved that can be used for determining in which zone the authentication device11 is located. ln other words, the control arrangement 25 is configured to analyzeone or more properties of the identity signal and to determine whether the 16 wireless authentication device 11 is present in one or more of the plurality of thevehicle zones 6a, 7a, 8a, 9a, 28a based on the analysis. For example, the identityof the authentication device 11 must be previously known to the controlarrangement 25. The identity is e.g. registered in the vehicle in a workshop, whichis a procedure that requires high security, e.g. it requires the so called immobilizercodes of the vehicle 1. lf the identity of the authentication device 11 cannot beauthenticated, the driver cannot get access to any functions. So, at first, theauthentication device 11 has to be authenticated by the control arrangement 25.Further, depending on which reception point the identity signal was received at, itcan be distinguished in which zone the authentication device 11 is located. Thus,the control arrangement 25 keeps track on which reception point the identitysignal was received at. Also, by determining the signal strength, e.g. the receivedsignal strength indicator (RSSI), of the identity signal, it can be distinguishedwhich zone the authentication device 11 is located in. The higher the strength, thecloser the authentication device 11 is to the reception point. Thus, if the identitysignal has been received at a plurality of reception points, by determining andcomparing the signal strength of the received signals, the reception pointreceiving the identity signal with the highest strength can be distinguished andthus the zone where the authentication device 11 is located. The signal strengthcan also be used for defining the zones. To be within a zone of a reception point,the reception point of that zone has to receive an identity signal with a signalstrength of at least a predetermined threshold. This predetermined threshold is adesign parameter of the whole system 23 and depends e.g. on the wavelength ofthe transmitted signal. Further, depending on the direction of the identity signal, itcan be distinguished in which zone the authentication device 11 is located. Forexample, a reception point may be shielded from receiving the identity signal fromsome directions outside the zone of the reception point. Thus, if that shieldedreception point receives an identity signal, it can be determined that theauthentication device 11 is within the zone of the reception point. Some or all ofthe above described criteria may of course be combined to establish a moresecure and reliable determination of in which zone the authentication device 11 is located. 17 Thus, when it has been determined which zone or zones the authentication device11 is located in, and thereby also in which zone or zones the authenticationdevice 11 is not located, the control arrangement 25 can react upon theinformation and give access or restrict access to vehicle functions related to thezones. For example, upon a determination that the wireless authentication device11 is present in one of the plurality of vehicle zones 6a, 7a, 8a, 9a, 28a, thecontrol arrangement 25 is arranged to enable access to the vehicle functionrelated to the vehicle zone 6a, 7a, 8a, 9a, 28a where the wireless authenticationdevice 11 is present. ln some embodiments, the main control unit 14 sendsinformation to the other control units 12, 13, 15 where the authentication device11 is located, and the other control units independently determine if theauthentication device 11 is located within a zone of the function the respectivecontrol unit is responsible for and independently grants access to the vehiclefunction if the authentication device 11 is present within the zone. The granting ofaccess, or unblocking, may include that the function is powered, that is, thecontrol circuit for the specific function is powered, or wakened up. For example,when the driver 10 is standing with the authentication device 11 in the zone 9a ofthe tail gate 4, the control circuitry of the function of the tail gate 4 in the controlunit 15, and any control circuitry of the function of the tail gate 4 in the controlpanel 5 are powered.
Further, upon a determination that the wireless authentication device 11 is notpresent in one of the plurality of vehicle zones 6a, 7a, 8a, 9a, 28a, the controlarrangement 25 is arranged to disable, or block, access of the vehicle functionbeing associated to the vehicle zone 6a, 7a, 8a, 9a, 28a where the wirelessauthentication device 11 is not present. Also here, the main control unit 14 sendsinformation to the other control units 12, 13, 15 where the authentication device 11 is located, and the other control units independently determine if theauthentication device 11 is not located within a zone of the function the respectivecontrol unit is responsible for, and independently block access to the vehiclefunction if the authentication device is not present within the zone. The blocking of 18 the function, or disabling ofthe function, may include to stop powering thefunction, that is, power to the control circuit for the specific function is stopped, orthe specific function is set into a sleep mode.
The system 23 may have different areas of operation, for example, when thevehicle 1 is in a mechanical workshop the system 23 may be disabled. Thesystem 23 may include more than one authentication device 11, e.g. if there areseveral operators of the vehicle 1. The system 23 may be set up in a standardconfiguration that may be changed according to needs. For example, differentzones and functions may be connected.
The disclosure also relates to a method for controlling access to vehicle functionsof a vehicle, for example the vehicle 1 in Fig. 1 and 2. As previously explained,each vehicle function is associated with a zone of a plurality of the vehicle zones6a, 7a, 8a, 9a, 28a. The vehicle functions include operating functions of thevehicle 1 and one or several auxiliary functions of the vehicle 1. Further, the oneor several auxiliary functions comprises one or several of: control of tail lift 4,control of outside light of the vehicle 1 and trailer 2b attachment/detachment. Thevehicle zone 6a related to driving the vehicle 1 is a vehicle zone limited to thecabin 3 of the vehicle 1, and is separated from the other vehicle zones 7a, 8a, 9a,28a related to the auxiliary functions of the vehicle 1.
The proposed method will now be described with reference to the flowchart in Fig. 6. The method may for example be implemented with the previously describedsystem 23. Thus, a driver 10 is wearing an authentication device 11 and wants toaccess one of the vehicle functions that has previously been described. Thewireless authentication device 11 sends out an identity signal, in response to adriver pressing a button on the device 11 or in response to receiving a wake-upsignal from the vehicle 1. The method comprises receiving S0 the identity signalfrom the wireless authentication device 11, in one or several of the previouslydescribed reception points. For example, the method comprises receiving S0 theidentity signal transmitted by the wireless authentication device 11 at a plurality of 19 reception points, wherein each reception points 6b, 7b, 8b, 9b, 28b is associatedwith one vehicle zone of the plurality of vehicle zones 6a, 7a, 8a, 9a, 28a. Themethod further comprises determining S1, based on the received identity signal,whether the wireless authentication device 11 is present in one or more of theplurality of vehicle zones 6a, 7a, 8a, 9a, 28a.
For example, the determining S1 comprises determining whether the wirelessauthentication device 11 is present in one or more of the plurality of the vehiclezones 6a, 7a, 8a, 9a, 28a based on that the identity signal meets one or severalcriteria, for the identity of the authentication device 11, for a signal strength of theidentity signal, for which reception point the identity signal was received at and/orfor the direction of the identity signal.
The method further comprises controlling access S2 to the vehicle functionscorresponding to the plurality of vehicle zones based on the determining S1. Forexample, upon determining S1 that the wireless authentication device 11 ispresent in one of the plurality of vehicle zones 6a, 7a, 8a, 9a, 28a, the methodcomprises enabling access S2 to the vehicle function related to the vehicle zone6a, 7a, 8a, 9a, 28a where the wireless authentication device 11 is present.
Further, the method comprises upon determining S1 that the wirelessauthentication device 11 is not present in one of the plurality of vehicle zones 6a,7a, 8a, 9a, 28a, disabling access S2 of the vehicle function related to the vehiclezone 6a, 7a, 8a, 9a, 28a where the wireless authentication device 11 is not present. ln one example user scenario, the driver 10 stops the vehicle 1 for unloadingsome goods. The vehicle 1 is implementing the system 23 as previouslydescribed. The driver 10 climbs out of the vehicle 1 and walks towards the end tailof the vehicle 1. When he tries to operate the tail lift 4, the tail lift control terminal 5is blocked. The system 23 cannot find that the authentication device 11 is in the zone 9a where the authentication device 11 has to be to allow operation of the tail lift 4, and thereby block operation of the tail lift 4. The driver 10 realizes that hehas forgotten the authentication device 11 in the cabin 3. He walks back to thecabin 3, finds the authentication device 11 and walks back to the tail lift 4. He isnow in the zone 9a of the tail lift function. He presses a button on theauthentication device 11, whereupon the authentication device 11 sends out anidentity signal. The identity signal is received at a plurality of reception points,among them the reception points 9b for the tail lift function and the reception point8b for the working lights 27 on the left-hand side of the vehicle 1 (seen from thefront). As mentioned above, the identity signal may also be transmitted withoutinteraction of the driver, e.g. in response to a wake-up signal transmitted by thevehicle or it may be periodically transmitted or triggered by any other action suchas a motion sensor in the authentication device 11. The identity signal isforwarded to the main control unit 14 from the two reception points 8b, 9b. Themain control unit 14 received the identity signal and authenticates the identity ofthe authentication device 11 using the received identity signals, and compares thesignal strength of the identity signal from the respective reception points withrespective thresholds. The respective signal strength of the signals is within therespective threshold. Based on the information that the device 11 is authenticated,is received at both the reception points 8b and 9b and is within both the zones 8aand 9b, the driver gets access both to the function of the tail lift 4 and to theworking light 27. The working light 27 is configured to be automatically switchedwhen accessible, so the working light 27 is switched on. As the authenticationdevice 11 is no longer in the cabin 3, the operating functions of the vehicle 1 arebeing blocked and are not accessible. According to one embodiment, the vehicleengine may still be running, but the functions for driving the vehicle 1 such as the throttle are blocked for usage.
The present disclosure is not limited to the above-described preferredembodiments. Various alternatives, modifications and equivalents may be used.Therefore, the above embodiments should not be taken as limiting the scope of the disclosure, which is defined by the appending claims.
Claims (11)
1. A system (23) for controlling access to vehicle functions of a vehicle (1 ), eachvehicle function being associated with a zone of a plurality of vehicle zones(6a, 7a, 8a, 9a, 28a) of the vehicle (1 ), the system (23) comprising: o a wireless authentication device (11) comprising a wireless transmitter(17) configured to transmit an identity signal identifying theauthentication device (11) ; o a wireless detector arrangement (24) arranged to receive the identitysignal transmitted by the wireless transmitter (17) and o a control arrangement (25) configured: o to obtain the identity signal received by the wireless detectorarrangement (24); o to determine, based on the obtained identity signal, whether thewireless authentication device (11) is present in one or more ofthe plurality of the vehicle zones (6a, 7a, 8a, 9a, 28a); and o to control access to vehicle functions corresponding to theplurality of vehicle zones (6a, 7a, 8a, 9a, 28a), based on thedetermination, such as to, upon a determination that thewireless authentication device (11) is present in one of theplurality of vehicle zones (6a, 7a, 8a, 9a, 28a), enable access tothe vehicle function related to the vehicle zone (6a, 7a, 8a, 9a,28a) where the wireless authentication device (11) is present,and wherein the vehicle functions includes driving the vehicle (1)and one or several auxiliary functions of the vehicle (1) andwherein the one or several auxiliary functions of the vehicle (1) isone or several of: control of tail lift (4) of the vehicle (1 ), control ofoutside light of the vehicle (1 ), and vehicle trailer (3)attachment/detachment.
2. The system (23) according to claim 1, wherein the wireless detectorarrangement (24) is arranged to receive the identity signal transmitted by the wireless transmitter at a plurality of reception points (6b, 7b, 8b, 9b, 28b), 2 wherein each reception point (6b, 7b, 8b, 9b, 28b) is associated with one vehicle zone of the plurality of vehicle zones (6a, 7a, 8a, 9a, 28a).
3. _ The system (23) according to claim 1 or 2, wherein the control arrangement (25) is configured to determine whether the wireless authentication device (11)is present in one or more of the plurality of the vehicle zones (6a, 7a, 8a, 9a,28a) based on that the identity signal meets one or several criteria, for theidentity of the authentication device (11), for a signal strength of the identitysignal, for which reception point the identity signal was received at and/or for the direction of the identity signal.
4. _ The system (23) according to any of the preceding claims, wherein the control arrangement (25) is arranged to, upon a determination that the wirelessauthentication device (11) is not present in one of the plurality of vehicle zones(6a, 7a, 8a, 9a, 28a), disable access of the vehicle function being associatedto the vehicle zone (6a, 7a, 8a, 9a, 28a) where the wireless authentication device (11) is not present.
5. _ The system (23) according to claim 1, wherein the vehicle zone (6a) related to driving the vehicle (1) is a vehicle zone limited to the cabin (2) of the vehicle(1 ), and is separated from the other vehicle zones (7a, 8a, 9a, 28a) related to the auxiliary vehicle functions.
6. _ A vehicle (1) comprising the system (23) according to any of the preceding claims.
7. _ A method for controlling access to vehicle functions of a vehicle (1 ), each vehicle function being associated with a zone of a plurality of vehicle zones(6a, 7a, 8a, 9a, 28a) of the vehicle (1 ), the method comprising:- receiving (S0) an identity signal from a wireless authenticationdevice (11), 3 - determining (S1), based on the identity signal, whether thewireless authentication device (11) is present in one or more ofthe plurality of vehicle zones (6a, 7a, 8a, 9a, 28a); and - controlling access (S2) to the vehicle functions corresponding tothe plurality of vehicle zones based on the determining (S1 ), suchas to, upon determining (S1) that the wireless authenticationdevice (11) is present in one of the plurality of vehicle zones (6a,7a, 8a, 9a, 28a), enabling access to the vehicle function related tothe vehicle zone (6a, 7a, 8a, 9a, 28a) where the wirelessauthentication device (11) is present, and wherein the vehiclefunctions includes driving the vehicle (1) and one or severalauxiliary functions of the vehicle (1) and wherein the one orseveral auxiliary functions of the vehicle (1) is one or several of:control of tail lift (4) of the vehicle (1 ), control of outside light of the vehicle (1 ), and vehicle trailer (3) attachment/detachment.
8. The method according to claim 7, comprising receiving (S0) the identity signaltransmitted by the wireless authentication device (11) at a plurality of receptionpoints, wherein each reception points (6b, 7b, 8b, 9b, 28b) is associated with one vehicle zone of the plurality of vehicle zones (6a, 7a, 8a, 9a, 28a).
9. The method according to any of the claims 7-8, comprising upon determining(S1) that the wireless authentication device (11) is not present in one of theplurality of vehicle zones (6a, 7a, 8a, 9a, 28a), disabling access (S2) of thevehicle function related to the vehicle zone (6a, 7a, 8a, 9a, 28a) where thewireless authentication device (11) is not present.
10.A computer program comprising instructions which, when the program isexecuted by a computer, cause the computer to carry out the methodaccording to any one of the claims 7-9. 4
11.A computer-readable medium comprising instructions which, when executedby a computer, cause the computer to carry out the method according to anyone of the claims 7-9.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SE1751379A SE542863C2 (en) | 2017-11-08 | 2017-11-08 | System and method for controlling access to vehicle functions of a vehicle |
| PCT/SE2018/051135 WO2019093950A1 (en) | 2017-11-08 | 2018-11-06 | System and method for controlling access to vehicle functions of a vehicle |
| DE112018005078.5T DE112018005078T5 (en) | 2017-11-08 | 2018-11-06 | System and method for controlling access to vehicle functions of a vehicle |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SE1751379A SE542863C2 (en) | 2017-11-08 | 2017-11-08 | System and method for controlling access to vehicle functions of a vehicle |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| SE1751379A1 SE1751379A1 (en) | 2019-05-09 |
| SE542863C2 true SE542863C2 (en) | 2020-07-21 |
Family
ID=66438964
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| SE1751379A SE542863C2 (en) | 2017-11-08 | 2017-11-08 | System and method for controlling access to vehicle functions of a vehicle |
Country Status (3)
| Country | Link |
|---|---|
| DE (1) | DE112018005078T5 (en) |
| SE (1) | SE542863C2 (en) |
| WO (1) | WO2019093950A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2024181950A1 (en) * | 2023-02-28 | 2024-09-06 | Tirsan Treyler Sanayi̇ Ve Ti̇caret Anoni̇m Şi̇rketi̇ | Safe driving system |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE19839350B4 (en) * | 1998-08-28 | 2005-06-30 | Daimlerchrysler Ag | vehicle locking |
| FR2810946B3 (en) * | 2000-07-03 | 2002-04-19 | Valeo Electronique | MOTOR VEHICLE EQUIPPED WITH AN IMPROVED "HANDS-FREE" ACCESS SYSTEM FOR LOCATING A PORTABLE BADGE |
| US7119709B2 (en) * | 2002-08-06 | 2006-10-10 | Tri/Mark Corporation | Electronic access security and keyless entry system |
| US8350669B2 (en) * | 2002-08-06 | 2013-01-08 | Trimark Corporation | Electronic access security and keyless entry system |
| JP4297412B2 (en) | 2003-02-28 | 2009-07-15 | 株式会社シブタニ | Locking and unlocking system for vehicle bed |
| US20070040649A1 (en) * | 2005-08-17 | 2007-02-22 | Alps Automotive, Inc. | Multifunction keyless entry system |
| WO2008053274A1 (en) * | 2006-10-31 | 2008-05-08 | Renault Trucks | Keyless access system and method for a truck and truck equipped with such a system |
| US9008917B2 (en) * | 2012-12-27 | 2015-04-14 | GM Global Technology Operations LLC | Method and system for detecting proximity of an end device to a vehicle based on signal strength information received over a bluetooth low energy (BLE) advertising channel |
| FR3011790B1 (en) * | 2013-10-15 | 2016-12-09 | Johnson Controls Automotive Electronics Sas | ACCESS CONTROL SYSTEM FOR A MOTOR VEHICLE |
| US20170200334A1 (en) * | 2016-01-08 | 2017-07-13 | Ford Global Technologies, Llc | Personal device location authentication for secured function access |
-
2017
- 2017-11-08 SE SE1751379A patent/SE542863C2/en unknown
-
2018
- 2018-11-06 DE DE112018005078.5T patent/DE112018005078T5/en active Pending
- 2018-11-06 WO PCT/SE2018/051135 patent/WO2019093950A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| SE1751379A1 (en) | 2019-05-09 |
| DE112018005078T5 (en) | 2020-07-02 |
| WO2019093950A1 (en) | 2019-05-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3078001B1 (en) | Remote vehicle access systems for fleet vehicles | |
| CN108162914B (en) | Enabling vehicle access based on wireless key speed | |
| CN108173809B (en) | Authentication of mobile devices for vehicular communication | |
| US10322694B2 (en) | Bluetooth verification for vehicle access systems | |
| US10737659B2 (en) | Protocols for remote vehicle access systems | |
| US10131319B2 (en) | Multi-range vehicle access systems | |
| US11084460B2 (en) | Method for activation of at least one security function of a security system of a vehicle | |
| US9972150B2 (en) | Method of verifying user intent in activation of a device in a vehicle | |
| US9396597B2 (en) | Smart entry system | |
| US9852628B2 (en) | Vacant parking spot notification | |
| US11120653B2 (en) | Access device for a vehicle (as amended) | |
| EP3447216A1 (en) | Key security device | |
| KR20160081509A (en) | Operating method of smart key system | |
| JP2008509611A (en) | Two-way radio monitoring system | |
| KR102407870B1 (en) | Vehicle door lock control system and method thereof | |
| US10993076B2 (en) | Lighting control apparatus and lighting control method | |
| US7319875B2 (en) | Method for interior-space/exterior-space detection of a response transmitter which communicates in wire-free fashion with a base station, and a communications system | |
| JP2013001327A (en) | Communication system | |
| SE542863C2 (en) | System and method for controlling access to vehicle functions of a vehicle | |
| JP7080012B2 (en) | Vehicle control system, vehicle control device | |
| JP2008184770A (en) | Lamp control device for vehicle | |
| WO2020011802A1 (en) | System and method for enabling functions of an object | |
| KR20190064519A (en) | Method for locating a vehicle, method for operating a vehicle as well as system |