Upgrade kit for an ignition key and methods

ABSTRACT

One variation of an upgrade kit—for an ignition key corresponding to a vehicle and including an immobilizer transponder and a keyless entry transmitter—includes: a wireless jammer configured to interfere with wireless transmission from the immobilizer transponder; a wireless receiver configured to receive an unlock request from an external device; a relay configured to actuate the keyless entry transmitter to unlock a door of the vehicle in response to the unlock request; and an enclosure configured to contain the wireless receiver and a portion of the ignition key.

This application is a continuation of U.S. patent application Ser. No.14/461,754, filed Aug. 18, 2014, which is a continuation of U.S. patentapplication Ser. No. 14/087,666, filed Nov. 22, 2013, now U.S. Pat. No.8,841,987, issued Sep. 23, 2014, which are incorporated herein in theirentireties by specific reference for all purposes.

This application is related to U.S. patent application Ser. No.13/788,836, filed on Mar. 7, 2013, which is incorporated herein in itsentirety by specific reference for all purposes.

FIELD OF INVENTION

This present invention relates generally to the field of vehiclerentals, and more specifically to a new and useful upgrade kit for anignition key and methods for renting a vehicle in the field of vehiclerentals.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a schematic representation of an upgrade kit of a firstembodiment of the invention.

FIG. 2 is a schematic representation of one variation of the upgradekit.

FIG. 3 is a schematic representation of one variation of the upgradekit.

FIG. 4 is a graphical representation of one variation of the upgradekit.

FIG. 5 is a flow chart representation of a first method of theinvention.

FIG. 6 is a flowchart representation of a second method of theinvention;

FIG. 7 is a flowchart representation of a third method of the invention;

FIG. 8 is a flowchart representation of a fourth method of theinvention; and

FIG. 9 is a flowchart representation of a fifth method of the invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

The following description of embodiments of the invention is notintended to limit the invention to these embodiments, but rather toenable any person skilled in the art to make and use this invention.

1. Upgrade Kit and Applications

As shown in FIG. 1, an upgrade kit 100 for an ignition key correspondingto a vehicle and including an immobilizer transponder and a keylessentry transmitter, the upgrade kit 100 including: a wireless jammer 110configured to interfere with wireless transmission from the immobilizertransponder; a wireless receiver 120 configured to receive an unlockrequest from an external device; a relay 130 configured to actuate thekeyless entry transmitter to unlock a door of the vehicle in response tothe unlock request; and an enclosure 140 configured to contain thewireless receiver 120 and a portion of the ignition key.

Generally, the upgrade kit 100 can be installed in and/or coupled to anoriginal equipment manufacturer (OEM) ignition key for a vehicle, suchas a commercial or passenger automobile, to enable access to acorresponding vehicle through an external device that communicatesvehicle with the ignition key. The upgrade kit 100 functions to expandcommunication and security features of an existing ignition key suchthat a user can communicate with the ignition key through a mobilecomputing device (e.g., a smartphone) or a wireless-enabledidentification card to access the corresponding vehicle. In particular,once the upgrade kit 100 is installed in an ignition key, the upgradedignition key can enable universal access to the corresponding vehiclethrough an authorized mobile computing device to rent or lease thevehicle to a user and without costly and/or vehicle make- and/ormodel-specific equipment requiring time-intensive installation into thevehicle itself. Rather, one of a pair of existing keys can beretrofitted with the upgrade kit 100 offsite while a vehicle owner orassociate continues to operate the vehicle with the remaining key. Oncethe upgraded ignition key is returned, the vehicle can be immediatelyready for sharing with (i.e., lease or rental to) another user.

Ignition keys for modern vehicle commonly incorporate an immobilizertransponder that communicates a digital key to a corresponding vehicle,a blade that engages an ignition key receptacle within the vehicle, avariety of access control regions (e.g., lock, unlock, and panic“buttons”), and a wireless transmitter that transmits commandscorresponding to access control region selections to control access tothe vehicle. The upgrade kit 100 can define a universal kit installablein ignition keys of a variety of existing and future vehicle makes andmodels to convert the corresponding vehicles into vehicles that can beshared with various users through their smartphones, wireless-enabledidentification cards, etc. The upgrade kit 100 can therefore circumventa need to retrofit an existing vehicle to enable vehicle-sharing byinstead converting a single key associated with the vehicle, such asoffsite as described above. The upgrade kit 100 can also enable sharingof new vehicles of different makes and models within the samevehicle-share platform or ecosystem without necessitating partnershipsbetween OEMs to standardize equipment (e.g., on-board diagnostics (OBD)ports), without necessitating customized equipment installation acrossthe multiple vehicle makes and models, etc.

The upgrade kit 100 can therefore transform an ignition key into anaccess node into a corresponding vehicle through an external device(e.g., a smartphone, a badge and RFID reader, etc.) without breaching orbypassing security and anti-theft provisions already integrated into theignition key and corresponding vehicle. In particular, the upgrade kit100 can add additional components to existing vehicle ignition keys toleverage security and access features already incorporated into thesekeys by vehicle manufacturers to retroactively provide vehicle-sharingfunctionality to corresponding vehicles of various makes and models.

1.1 Configurations

In one configuration, an upgraded ignition key (i.e., an ignition keywith the upgrade kit 100 installed) can be configured to communicatedirectly with a mobile computing device (e.g., a smartphone) to receivevehicle access commands, such as a vehicle unlock command. In thisconfiguration, the smartphone can execute a native vehicle share (orvehicle rent) application, such as described in U.S. patent applicationSer. No. 13/788,836, to communicate with a remote vehicle-sharingnetwork (or database, server, etc.) to book the vehicle, such as overWi-Fi or cellular communication protocol. Once the vehicle is booked,the native vehicle share application can also download authenticationdata, such as a rolling code, from the vehicle-sharing network to enablecommunication with the upgraded key—and therefore access to thevehicle—such as over Bluetooth Low-Energy (BTLE) wireless communicationprotocol. In one example, an owner of a personal vehicle can have a keyfor his vehicle retrofit with the upgrade kit 100 to enable occasionalsharing of the vehicle without installation of special or vehicle shareplatform-specific equipment into the vehicle itself.

In another configuration, the upgrade kit 100 includes a diagnostic portdongle 190 that installs into a standardized diagnostic port (e.g., OBD2port) of the vehicle, as described below. In this configuration, thedongle 190 can function as a router that communicates access commandsfrom the phone to the upgraded ignition key or from a vehicle-sharingnetwork (e.g., a remote server) to the upgraded ignition key. Similar tothe configuration described above, a user can access a native vehicleshare application executing on his smartphone to book the vehicle withon a vehicle share platform, and the native vehicle share applicationcan download authentication data from the vehicle-sharing network toauthenticate communication with the dongle 190, such as over Wi-Fi orcellular communication protocol. The user can then interface with thenative vehicle share application to send a vehicle unlock command to thedongle 190 (e.g., via Bluetooth 2.0 communication protocol), whichroutes the command to the upgraded ignition key (e.g., via Bluetooth 4.0communication protocol), which then issues an unlock command to thevehicle to unlock a door of the vehicle (e.g., via Zigbee communicationprotocol). Alternatively, once the user books the vehicle through thenative vehicle share application on his smartphone, the user can furtherinterface with the native vehicle share application to send a vehicleunlock command to the vehicle share platform, which transmits thecommand to the dongle 190 (e.g., via cellular communication protocol),which then routes the command to the upgraded ignition key, whichfinally issues an unlock command to the vehicle to unlock a door of thevehicle (e.g., all in less than two seconds). In the foregoingimplementations, the dongle 190, the native vehicle share application,and/or the vehicle-sharing network can default to routing vehicle accesscommands from the smartphone to the dongle 190 via the vehicle-sharingnetwork as long as cellular communication is supported but shift todirect communication between the smartphone and the dongle 190 whencellular communication is lost, such as when the vehicle is underground,in a parking structure, or in a remote area, as described below. In thisconfiguration, the dongle 190 can also collect vehicle diagnosticinformation through the OBD port, such as mileage and fuel or energylevel, and transmit this information to the vehicle-sharing networkdirectly or indirectly through the user's smartphone. In one example, alarge rental vehicle fleet can implement this configuration of theupgrade kit 100 and associated methods across its rental vehicles toprovide customers with quick access to its vehicles through theirsmartphones and without any interaction with a fleet representative andto enable the fleet to collect information about its vehicles before,during, and/or after rental to customers.

In yet another configuration, the upgrade kit 100 can further include acard reader 192 configured to extract data from an adjacent badge,identification (ID) card, or other near-field wireless-enabled deviceplace and to communicate these data to the dongle 190. For example, thecard reader 192 can include an RFID reader mounted inside the vehicleswindshield, a user can tap his employee or student ID card on thewindshield over the RFID reader, the RFID reader can extract informationfrom the ID card and send this information over a hard line to thedongle 190, and the dongle 190 can transmit the information to thevehicle-sharing network (e.g., over cellular or Wi-Fi communicationprotocol). The platform can then retrieve identification information forthe user (e.g., a user rental profile) and stored payment information toconfirm user access to the vehicle. In this example, the platform canthen transmit an unlock command back to the dongle 190 (e.g., overcellular or Wi-Fi communication protocol), and the dongle 190 can routethe command to the upgraded ignition key (e.g., over Bluetooth 4.0communication protocol) to unlock the door for the user and thus providethe user with access to the vehicle (e.g., within two seconds of readingthe user's ID card with the RFID reader). In this example, the user cansubsequently interface directly with the upgraded key to lock and unlockthe vehicle rather than tapping his ID card on the RFID reader each timehe unlocks the car during his rental period. The dongle 190 andadditionally or alternatively sync or pair with the user's mobilecomputing device (e.g., smartphone) such that the user can controlaccess to the vehicle with his mobile computing device, such as througha native vehicle share application executing on the mobile computingdevice. Like the foregoing configuration, the dongle 190 can alsocollect vehicle information through the OBD port, such as vehicle speedand fuel level, and transmit this data to the vehicle share platform.The card reader 192 can also collect user information from multiple IDcards tapped over the reader by multiple users before a single rentalperiod, the dongle 190 can transmit the user information for themultiple users to the vehicle share platform, and the platform can loguse of the vehicle by the set of users during a single rental period andfurther distribute the cost of the rental period across the set ofusers. Furthermore, in this configuration, the card reader 192 canincorporate a visual indicator described in described in U.S. patentapplication Ser. No. 13/788,836 to provide visual access to availabilityof the corresponding vehicle to potential users outside and withinvisual range of the vehicle, and the visual indicator can source powerthrough an OBD port of the vehicle through the dongle 190 and aconnected hard line to the card reader 192. In one example of thisconfiguration, a university or professional campus can implement thisconfiguration of the upgrade kit 100 and associated methods to providestudents and employees, respectively, with access to its fleet ofvehicles through their ID cards.

1.2 Wireless Receiver

The wireless receiver 120 of the upgrade kit 100 is configured toreceive an unlock request from an external device. Generally, thewireless receiver 120 functions to expand the wireless communicationcapability of the existing ignition key to enable transmission ofvehicle access commands to the ignition key from a smartphone, a tablet,a diagnostic port dongle 190, or other external device. For example, thewireless receiver 120 can receive door lock and door unlock commands andignition authorization commands (e.g., to disable the wireless jammer110) from a mobile computing device or the dongle 190.

The wireless receiver 120 can also include a transmitter to enabletwo-way communication with the smartphone, a tablet, a diagnostic portdongle 190, or other external device. For example, the wirelesstransmitter can include a Bluetooth (e.g., Bluetooth LE, BLE, Bluetooth4.0, or Bluetooth Smart) transceiver module with a radio antenna capableof receiving and/or transmitting wireless signals up to a distance often feet.

The wireless receiver 120 (in cooperation with a processor 150 withinthe upgrade kit 100 or the ignition key) can implement securitytechniques to authenticate communication between the upgraded ignitionkey and an external device. For example, the wireless receiver 120 canstore a rolling code algorithm to generate new rolling codes, and thevehicle-sharing network executing on a remote server can store anidentical rolling code algorithm, generate a new rolling code when avehicle rental is confirmed for a user, and then transmit the newrolling code to the user's smartphone. In this example, the smartphonecan then transmit an access request command (e.g., a door unlockcommand) with the rolling code to the upgraded ignition key, wherein thewireless receiver 120 authenticates communication with the user'ssmartphone by comparing the receiver rolling code with thelocally-generated rolling code and implements the access request commandonce communication with the smartphone is authenticated. Alternatively,the wireless receiver 120 and the dongle 190 can store identical rollingcode algorithms, and the dongle 190 can transmit each access requestwith a new rolling code to the upgraded ignition key, wherein thewireless receiver 120 authenticates each new rolling code and relaysselectively implement the access request commands when correspondingrolling codes are authenticated. However, the wireless receiver 120 (andprocess, etc.) can implement any other security and/or authenticationtechnique or protocol during use within the upgraded ignition key.

1.3 Wireless Jammer

The wireless jammer 110 of the upgrade kit 100 is configured tointerfere with wireless transmission from the immobilizer transponder.Modern vehicle ignition keys commonly include a blade that forms aphysical key that engages an ignition key receptacle within the vehicleand an immobilizer transponder that transmits digital key to a receiverwithin the vehicle. A modern vehicle may therefore require bothinsertion of the blade into an ignition receptacle and receipt andauthentication of a digital key from an immobilizer transponder toenable operation of the vehicle, such as to enable vehicle ignition orto unlock the vehicle's steering wheel. The wireless jammer 110therefore functions to prevent and/or interfere with transmission of adigital key from a transponder within a stock key. By inhibitingcommunication from the stock key to the vehicle, wireless jammer canthus prevent vehicle ignition of the vehicle, release a steering lockwithin the vehicle, or otherwise enable vehicle operation.

Modern immobilizer transponders are commonly sealed in plastic or glasshousings and are powered wirelessly from transmitters withincorresponding vehicles, such as transmitters adjacent ignition keyreceptacles. The wireless jammer no can therefore actively or passively“jam” a radio frequency (RF) channel between the key's stock immobilizertransponder and a receiver within the vehicle. In one implementation,the wireless jammer 110 includes a passive load (e.g., a resistor)between an inductive coil that harvests energy from a wireless signalbroadcast by the vehicle and a radio transmitter within the transponder.In this implementation, wireless jammer can also include a switch thatdefaults to closing the passive load into the circuit between theinductive coil and the radio transmitter but that removes the passiveload from the circuit between inductive coil and the radio transmitterwhen operation of the vehicle is authorized.

In another implementation, the wireless jammer no includes a secondtransponder arranged adjacent the stock immobilizer transponder withinthe stock ignition key. In this implementation, the wireless jammer 110jams the immobilizer transponder by transmitting a second signalsimultaneously with the transponder signal such that the receiver withinthe vehicle cannot discern the transponder signal and authorize ignitionof the vehicle. In this implementation, the second transponder can alsoharvest energy from the wireless signal output by the vehicle and thatpowers the immobilizer transponder. For example, the second transpondercan include an energy harvesting induction coil. In this example, thesecond transponder can thus output the second signal whenever theimmobilizer transponder is powered, and the upgraded ignition key candefault to closing a circuit between the energy harvesting inductioncoil and a wireless radio within the second transponder, but a switchwithin the wireless jammer no can open the circuit between the energyharvesting induction coil and the wireless radio within the secondtransponder when operation of the vehicle is authenticated. For example,a processor 150 within the upgraded ignition key open the circuitbetween the energy harvesting induction coil and the wireless radiowithin the second transponder for one minute, five minutes, or theduration of the vehicle rental period once operation of the vehicle isauthenticated.

In the foregoing implementation, the second transponder canalternatively be powered by a battery 160 within the upgraded key (e.g.,a stock battery or a battery 160 included in the upgrade kit 100), andthe second transponder can source power from the battery 160 to transmitthe second signal at a power lever substantially greater than a wirelesspower level of the immobilizer transponder to thus overwhelm a signalfrom the immobilizer transponder and prevent receipt of the signal fromthe immobilizer transponder at the vehicle.

In the foregoing implementations, the second transponder can transmit“gibberish” (e.g., a pseudorandom signal) that is timed with the signalfrom the immobilizer transponder to interfere within receipt of thecomplete digital key at the vehicle. Alternatively, the secondtransponder can transmit an “inverted” digital key that substantiallycancels the signal transmitted from the immobilizer transponder. Yetalternatively, the second transponder can transmit the second signal ata power level substantially greater than the power level of the signaloutput by the immobilizer transponder such that the immobilizertransponder signal is masked or “hidden” from a receiver within thevehicle. However, the second transponder can function in any other wayto interfere with or inhibit transmission of a digital key from thestock immobilizer transmitter within the key to a corresponding vehicle.

In yet another implementation, the wireless jammer no includes aconductive coil configured for arrangement about the immobilizertransponder. In this implementation, the wireless jammer no can powerthe conductive coil to create a magnetic field about the immobilizertransponder to inhibit wireless transmission from the immobilizertransponder beyond the conductive coil. In one example, the conductivecoil is powered by a battery within the upgraded ignition key anddefaults to a powered or “ON” state until ignition authorization isreceived from a smartphone, the dongle 190, or another external device.Alternatively, the conductive coil can be passively powered. Forexample, the conductive coil to a closed-circuit state such that asignal transmitted by the vehicle induces an electrical current throughthe coil, thus jamming wireless transmission from the immobilizertransponder. In this example, the wireless jammer 110 can default toclosing the conductive coil circuit (i.e., closing a circuit betweenends of the coil) but open the conductive coil circuit when ignitionauthorization is received from a smartphone, the dongle 190, or anotherexternal device, such as for a present period of time or for theduration of the vehicle rental period, as described above.

In another implementation, the wireless jammer no includes a shield andan actuator that moves the shield relative to the immobilizertransponder to intermittently block wireless transmission from theimmobilizer transponder to a receiver within in the vehicle. Forexample, the shield can include a lead tube, and the actuator can movethe tube fore and aft to enclose (as a default) and then reveal theimmobilizer transponder. However, the wireless jammer 110 can includeany other component and function in any other way to interfere withwireless transmission of a digital key from the ignition key to thevehicle.

As shown in FIG. 1, one variation of the upgrade kit 100 includes asensor 160 configured to trigger the wireless jammer 110 to inhibitcommunication from the transponder to the vehicle. In this variation,the upgrade kit 100 can also include a processor 150 that actuates thewireless jammer 110 to inhibit transmission of the digital key from theimmobilizer transponder based on an output of the sensor 170 whenoperation of the vehicle is not authorized (e.g., when an authorizationsignal is not received from an external device).

In one implementation, the sensor 170 includes a motion sensor—such asan accelerometer—and the processor 150 actuates the wireless jammer 110when the sensor 170 outputs a signal indicating that the key is moving.For example, when the key is removed from a key dock within the vehicle,the processor 150 can send power to the wireless jammer 110 to inhibittransmission of the digital key from the immobilizer transponder as auser moves the ignition key toward an ignition key receptacle within thevehicle.

In another implementation, the sensor 170 includes an orientationsensor, and the processor 150 is configured to correlate an output ofthe orientation sensor with an orientation of the key blade of theignition key. In this implementation, when the detected orientation ofthe key blade substantially matches a known insertion orientation forthe key blade into the vehicle's ignition receptacle, the processor 150can determine that the insertion of the key blade into the vehicle'signition receptacle is pending or immediate and thus trigger thewireless jammer 110 to prevent ignition of the vehicle if operation ofthe vehicle is not currently authorized. In one example, the sensor 170includes both an accelerometer and a gyroscope, and the processor 150fuses signals from these sensors to determine a current orientation ofthe ignition key and then actuates the wireless jammer 110 accordingly.In this implementation, the sensor 170 can include one or more tiltsensors that trigger when the upgraded ignition key is oriented into aposition that substantially matches a known insertion orientation forthe key blade into the vehicle's ignition receptacle.

In yet another implementation, the sensor 170 is configured to detectproximity of the ignition key to a key dock, and the sensor 170 or theprocessor 150 actuates the wireless jammer 110 in response to removal ofthe upgraded ignition key from the key dock 180 if operation of thevehicle is not currently authorized. For example, the sensor 170 caninclude a Hall effect sensor that outputs a first sensor state when amagnetic region of the key dock 180 is detected and a second sensorstate when the magnetic region of the key dock 180 is not detected, andthe processor 150 can turn the wireless jammer no “ON” when the sensor170 output changes from the first state to the second state and ifoperation of the vehicle is not currently authorized, and the processor150 can turn the wireless jammer no “OFF” when the sensor 170 outputchanges from the second state to the first state. The sensor 170 and theprocessor 150 can thus cooperate to deactivate the wireless transponder(by actuating the wireless jammer no) if removal of the upgradedignition key from the key dock 180 is invalid or unauthorized.

In the foregoing implementation, the upgraded ignition key can thereforeinterface with a key dock 180, as described below and shown in FIGS. 2and 3. In this implementation, the upgrade kit 100 can also include avisual indicator 170, which is configured to display a visual alarmthrough the enclosure 140 in response to detected removal of the keyfrom the key dock 180. For example, the visual alarm can include awarning lamp (e.g., an LED), and the processor 150 can flash the warninglamp when removal of the upgraded ignition key from the key dock 180 isdetected without receipt of authorization of the vehicle for operation.Alternatively, the ignition key can include a speaker, buzzer, or otheractuator, and the processor 150 can similarly drive the speaker, buzzer,or other actuator to deliver an audible, haptic, or other alarm to auser to prompt the user to return the upgraded ignition key to the keydock 180. Once replacement of the upgrade ignition key on the key dock180 is detected, the processor 150 can turn “OFF” or silence the alarm.However, the processor 150 and the sensor 170 can function in any otherway to trigger actuation of the wireless jammer 110 to preventtransmission of the digital key from the key to the vehicle and/or totrigger actuation of an alarm to guide user interaction with the key.

The wireless jammer 110 can further be substantially tamperproof suchthat the wireless jammer no cannot be removed (or would be difficult toremove) from the upgraded ignition key without destroying theimmobilizer transponder. For example, the wireless jammer no can bepotted around or adjacent the immobilizer transponder, such as with anepoxy, such that separation of the wireless jammer no from theimmobilizer transponder is substantially impossible or requiresspecialized equipment. Similarly, the upgrade kit 100 can include asensor configured to detect tampering of the upgraded ignition key, andthe upgrade kit 100 can further include self-destruct module configuredto destroy the immobilizer transponder when tampering is detected. Theupgrade kit 100 can also trigger the self-destruct module when theupgrade ignition key is improperly removed (i.e., without authorization)from the dock. The wireless jammer 110 can therefore be installed in theupgraded ignition key to substantially prevent operation of the vehiclefollowing tampering of the upgraded ignition key, such as after forcedentry into the vehicle.

Additionally or alternatively, for an ignition key without a blade andconfigured to communicate with a vehicle wirelessly rather than througha physical key tumbler, the wireless jammer 110 can implement similarmethods or techniques to control wireless transmission of a pairingsignal from the ignition key to the corresponding vehicle.

1.4 Relay

The relay 130 of the upgrade kit 100 is configured to actuate thekeyless entry transmitter to unlock a door of the vehicle in response tothe unlock request. Generally, the upgrade kit 100 includes one or morerelays configured to bypass a physical vehicle access button within theignition key to enable remote control of the wireless transmission ofvehicle access commands from the upgraded ignition key to the vehicle.For example, the upgrade kit 100 can include a digital relay for each ofthe lock, unlock, trunk-open (or trunk unlock), and panic (or panicsilence) functions integrated into an ignition key. Each relay can thusbe independently controlled to trigger wireless transmission ofcorresponding commands to the vehicle. The relay 130 can include asolid-state transistor, such as a MOSFET or a BJT with a pull-downresistor, or the relay 130 can include an analog relay or any othersuitable type of switch or relay.

In one implementation, the upgrade kit 100 includes a set of relays, anda relay 160 in the set of relays is installed on a printed circuit boardhoused in the enclosure 140. In this implementation, the relay 130 isconnected across the unlock button on the ignition key and defaults toopen. Thus, in response to receipt of an authorized vehicle unlockrequest (e.g., from a smartphone or the dongle 190), the wirelessreceiver 120 can output a signal to toggle the state of the relay 130from open to closed, thus mimicking an selection of the unlock button onignition key and triggering transmission of an unlock command from theupgraded key to the vehicle. Other relays in the set of relays can besimilarly connected across corresponding buttons on the ignition key,and the wireless receiver 120 can distribute signals to toggle states ofthe relay 130 s based on receipt of corresponding authorized vehicleaccess requests. The wireless receiver 120 can similarly toggle thestate of the wireless jammer no in response to confirmation or receiptof authorization of current vehicle operation.

The foregoing configuration can thus enable wireless control of thevehicle access functions within the key without disturbing manualcontrol of physical buttons on the ignition key to control vehicle lock,unlock, and other functions directly with the ignition key. However, therelay 130 can be of any other suitable type and can be coupled to theignition key in any other suitable way.

1.5 Enclosure and Key Dock

The enclosure 140 of the upgrade kit 100 is configured to contain thewireless receiver 120 and a portion of the ignition key. Generally, theenclosure 140 functions to expand the interval volume of the stockignition key to house various components of the upgrade kit 100.

In one implementation, the enclosure 140 is coupled to the stock housingof the ignition key, such as with a mechanical fastener or with anadhesive. In this implementation, the enclosure 140 can fully containthe wireless jammer no, the wireless receiver 120, the processor 150,the sensor 170, the relay 130, the battery 160 (described below), etc.,and leads (e.g., wires) can bridge a junction between the enclosure 140and the stock housing to electrically couple the relay 130 to acorresponding vehicle access button on the ignition key. Alternatively,the wireless jammer 110 can be installed inside the stock housing andconnected to the wireless receiver 120 and/or to the processor 150 via aloose lead (e.g., a wire) that bridges the junction between theenclosure 140 and the stock housing.

In another implementation, electronic (e.g., “smart”) components withinthe stock ignition key are removed from the stock housing and placedinside the housing with any of the foregoing components of the upgradekit 100. The enclosure 140 can thus define a standalone unit or “fob”that houses all “smart” or electronic components of the upgrade kit 100and the ignition key. The fob can then be coupled to the “dumb” ignitionkey, such as with a key ring. The immobilizer transponder transferredinto the enclosure 140 can thus transmit the digital key through theenclosure 140, and a user can insert a blade of the “dumb” ignition keyinto a key receptacle in the vehicle to start the vehicle.

Yet alternatively, the stock housing of the ignition key can be replacedby the enclosure 140, and the enclosure 140 can thus house components ofthe upgrade kit 100 and electronic components of the ignition key andfurther support a blade portion of the ignition key (if applicable).

In any of the foregoing implementations, the enclosure 140 can besimilarly installed on, coupled to, or replace the stock housing of astock key fob accompanying a stock “dumb” key for a vehicle.

As shown in FIGS. 2 and 3, one variation of the upgrade kit 100 furtherincludes a key dock configured to support the upgraded ignition key. Inthis variation, the key dock 180 is configured for installation withinthe vehicle to define a “home” for the upgraded ignition key such that auser knows both where to find the upgraded key when first accessing thevehicle and where to replace the upgraded ignition key when returningthe vehicle.

In one example, the key dock 180 can be screwed, bolted, taped, oradhered to a portion of the vehicle, such as to the vehicle's dashboard,rearview mirror, or front windshield. In this example, the upgradedignition key can be shipped with the key dock 180 and double-sided tapesuch that an owner or affiliate of the vehicle can quickly install thekey dock 180 in the vehicle with the double-sided tape. In anotherexample, the key dock 180 includes a claw configured to engage (e.g.,lock into) an air vent within the vehicle. In yet another example, thekey dock 180 includes a lockable plug for a cigarette lighter. In thisand the foregoing examples, the key dock 180 can also include a cableand/or plug to engage a cigarette lighter (or other power port) withinthe vehicle to source power to detect removal of the ignition key fromthe key dock 180 and to activate an alarm accordingly. The key dock 180can additionally or alternatively source power from the vehicle tocharge the battery 160 (described below). For example, the key dock 180can include a pair of conductive pads that contact conductive areas onthe enclosure 140 when the upgraded ignition key is placed on the keydock 180 such that the battery 160 within the upgrade kit 100 can berecharged.

The key dock 180 can further include a magnet, a ferrous plate, a shelf,a hook, or other feature, and the enclosure 140 can define acomplementary feature configured to transiently engage the magnet, theferrous plate, etc. For example, the enclosure 140 can include ferroussection such that the magnet of the housing can retain the ferroussection of the enclosure 140. Similarly, the enclosure 140 can include amagnetic that can retain the upgraded ignition key against the ferrousplate of the key dock 180. Alternatively, the enclosure 140 can includea hoop that can engage the hook on the key dock 180, though theenclosure 140 and the key dock 180 can mate in any other suitable way.

As described above, the upgrade kit 100 can also include a sensor 170configured to output a signal corresponding to proximity of theenclosure 140 (and therefore the upgraded ignition key) to the key dock180. The upgraded ignition key can thus actuate an alarm if the key isremoved from the key dock 180 prior to receipt of authorization tooperate the vehicle, as described above.

Additionally or alternatively, the upgraded ignition key and the keydock 180 can be coupled with a physical leash, such as a braided steelcable. However, the key dock 180 can include any other feature to matewith and/or support the upgraded ignition key, and the key dock 180 canbe mounted within the vehicle in any other suitable way.

1.6 Battery

As shown in FIG. 1, one variation of the upgrade kit 100 includes abattery 160 configured to power the wireless jammer no and the relay130. Generally, the battery 160 functions to provide power to any one ormore of the relay 130, the wireless receiver 120, the wireless jammer110, etc. In one implementation, the battery 160 includes a rechargeablebattery. For example, the battery 160 can recharge through the key dock180, as described above. Alternatively, the battery 160 can include areplaceable coin battery.

1.7 Dongle

As shown in FIG. 3, one variation of the upgrade kit 100 includes adiagnostic port dongle 190 180 configured to engage a diagnostic portwithin the vehicle. Generally, as described above, the diagnostic portdongle 190 can be configured for installation into a standardizeddiagnostic port (e.g., OBD2 port) of the vehicle to expandfunctionalities of the upgraded ignition key and to define a standardinterface between a user and the upgraded ignition key.

In one implementation, the dongle 190 handles wireless communicationbetween the user (e.g., via s smartphone and/or a remote server) and theupgraded ignition key. For example, the dongle 190 can support cellular,Wi-Fi, Bluetooth 2.0, and Bluetooth 4.0 (BTLE) wireless communicationprotocols. In this example, the dongle 190 can communicate with thewireless receiver 120 (or transceiver) over BTLE but communicate with auser's mobile computing device directly over Bluetooth 2.0 or indirectlyover Wi-Fi and/or cellular communication protocols. The dongle 190 cantherefore function as a router to enable a user to communicate vehicleaccess commands to the upgraded ignition key over various protocolsdespite limitations in wireless protocols supported by the wirelessreceiver 120 and despite limitations in wireless protocols supported bythe user's mobile computing device (e.g., the user's smartphone). Thedongle 190 can therefore incorporate any number of wireless transmittersand/or receivers to enable communication with the upgraded ignition key(via the wireless receiver 120), a mobile computing device (e.g., asmartphone), and a remote server (e.g., the vehicle share platform).

The dongle 190 can further collect vehicle diagnostic data through theconnected OBD port, such as vehicle mileage, fuel or energy level, andsystem diagnostics (e.g., a check-engine status, an oil change alarm,etc.). The dongle 190 can additionally or alternatively include one ormore sensors, such as an accelerometer, a gyroscope, and a location(e.g., Global Positioning System) sensor. The dongle 190 can sourcepower for these sensors through the OBD port and store data output bythe sensor 170 s in onboard memory and/or transmit these data to anexternal device. For example, the dongle 190 can upload vehiclediagnostic data and/or internal sensor data to the mobile computingdevice of a user (e.g., via Bluetooth 2.0 or Wi-Fi) during acorresponding rental period, and the mobile computing device cansubsequently offload these data to the vehicle-sharing network (e.g.,over a cellular connection). Alternatively, the dongle 190 can transmitthese data directly to the vehicle-sharing network (or other entity),such as over Wi-Fi when the vehicle is returned to a docking space orover a cellular connection in real-time.

As described above, the dongle 190 can default to communication with theuser's mobile computing device via a remote server (e.g., the vehicleshare platform), such as over cellular communication protocol. In thisimplementation, vehicle-specific security data required to access thevehicle can remain on the remote server and not shared with the user'smobile computing device to maintain a high degree of security for thevehicle. However, when the dongle 190 detects limited communication withthe remote server, such as if cellular signal strength drops below athreshold value, the dongle 190 can resort to direct communication withthe mobile computing device to receive vehicle access requests from theuser. For example, the dongle 190 can enable limited vehicle accessfunctionality directly through the mobile computing device orcommunicate a digital key—that is valid for a limited period of time—tothe mobile computing device to enable direct submission of vehicleaccess requests from the mobile computing device.

However, the diagnostic port dongle 190 can include any other suitablesensor, support any other suitable wireless communication protocol, andcommunication data, authentication codes, vehicle access requests, etc.between the upgraded ignition key and an external device in any othersuitable way.

2. Method of Installation

As shown in FIG. 5, a first method S100 for upgrading an ignition keycorresponding to a vehicle includes: receiving the ignition key from anaffiliate of the vehicle in Block Silo; installing a wireless jammerproximal an immobilizer transponder within the ignition key in BlockS120, coupling a relay to a keyless entry transmitter within theignition key in Block S130, coupling a wireless receiver to the wirelessjammer 110 and the relay 130 in Block S140, enclosing the wirelessreceiver 120 and a portion of the ignition key in Block S150, andreturning the ignition key to the affiliate in Block S160.

Generally, the first method S100 enables remote installation of theupgrade kit 100 into an existing ignition key such that vehicle-sharingand/or vehicle renting functionality can be remotely and retroactivelyenabled for the vehicle. For example, the first method S100 can becompleted by a vehicle-sharing platform associated with thevehicle-sharing platform described above to upgrade ignition keys forconsumers, education campuses, corporate campuses, rental fleets, etc.to thus enable sharing and/or renting of corresponding vehicles owned orleased by a variety of entities of various types.

In one application of the first method S100, the vehicle-sharingplatform (or a representative thereof) sends customized packaging to anaffiliate of a vehicle. Once the customized packaging is received, theaffiliate places one of two ignition keys corresponding to the vehicleinto the customized packaging and returns the customized packaging tothe vehicle-sharing platform. A representative of the vehicle-sharingplatform then opens the stock housing of the received ignition key andremoves a key blade and all electronic components from the stockhousing. The representative further installs the key blade and theelectronic components from the stock key into a new enclosure (i.e., theenclosure 140) with the wireless jammer 110, the wireless receiver 120,the processor 150, the sensor 170, the relay 130, and/or the battery160, etc. During this installation, the wireless jammer 110 can bearranged around or adjacent the immobilizer transponder and then pottedin place, as described above. Once the assembly of the enclosure 140 andcontents is complete, the representative ships the updated ignition keywith a key dock back to the affiliate, who then installs the key dock180 in the corresponding vehicle (e.g., by taping the key dock 180 tothe vehicle's dashboard with double-sided tape) and places the upgradedignition key on the key dock 180. The vehicle can then be rented by orshared with other users through the vehicle-sharing platform, asdescribed below and in U.S. patent application Ser. No. 13/788,836.

In the foregoing application, for the affiliate who desires greatervehicle security and/or access to additional vehicle data, therepresentative of the vehicle-sharing platform can ship the upgradedignition key with a diagnostic port dongle 190 back to the affiliate ofthe vehicle. Once the dongle 190 is received with the upgraded ignitionkey, the affiliate can install the dongle 190 in the vehicle's OBD(e.g., OBD2) port and link the dongle 190 to an associatedvehicle-sharing profile within the vehicle-sharing platform. Theaffiliate can thus access data transmitted from the dongle 190 throughthe associated vehicle-sharing profile, such as through a web browser ornative vehicle-sharing application executing on a smartphone or tablet.

Furthermore, in the foregoing application, for vehicle-sharingapplications within a group of potential users with wireless-enabledbadges or identification cards, the representative of thevehicle-sharing platform can ship the upgraded ignition key with a cardreader 192 back to the affiliate of the vehicle. Once the card reader192 is received, the affiliate can install the card reader 192 bymounting the card reader 192 on the windshield or on the dashboard ofthe vehicle, routing a power and data cable behind an interiordriver's-side A-pillar cover within the vehicle, and plugging the powerand data cable into the OBD port or into the diagnostic port dongle 190.Alternatively, a representative of the vehicle-sharing platform cantravel to the vehicle to personally install the card reader 192, or theaffiliate can bring the vehicle to an automotive dealer, an automotiverepair shop, a shop associated with the vehicle-sharing platform, etc.for professional installation of the card reader 192. The affiliate canthen link the card reader 192 to the associated vehicle-sharing profileto enable vehicle-sharing through the card reader 192.

However, the upgrade kit 100 can be installed in the ignition key and/orthe vehicle in any other suitable way and by any other suitable party.

3. Upgraded Key Operation

As shown in FIG. 6, a second method S200 for controlling an ignition keyassociated with a vehicle includes: enabling a wireless jammer adjacentan immobilizer transponder within the ignition key in Block S210;wirelessly pairing the ignition key with an external device in BlockS220, in response to receiving a door unlock signal from the externaldevice, wirelessly transmitting a door unlock command from the ignitionkey to the vehicle in Block S230, and in response to receiving anauthorization signal from the external device, disabling the wirelessjammer 110 in Block S240.

Generally, the second method S200 is implemented by (or at) the upgradedignition key once the upgrade kit 100 is installed and the correspondingvehicle is activated for rental to or sharing with other users. Inparticular, the wireless jammer 110, the wireless receiver 120, theprocessor 150, the sensor 170, the relay 130, the battery 160, etc. ofthe upgrade kit 100 can cooperate with one or more stock components ofthe ignition key to implement the second method S200, thereby providingaccess to the vehicle—including vehicle unlock and ignition controls—foran authorized user.

Block S210 of the second method S200 recites enabling a wireless jammeradjacent an immobilizer transponder within the ignition key. Generally,Block S210 controls the wireless jammer 110 of the upgrade kit 100 tointerfere or inhibit wireless transmission of a digital key from animmobilizer transponder in the upgraded ignition key to thecorresponding vehicle. Block S210 can therefore function to preventignition of the vehicle until operation of the vehicle is authorized, asdescribed below.

In one implementation, Block S210 actively enables the wireless jammer110 by selectively distributing power from the battery 160 to thewireless jammer no. In another implementation, Block S210 passivelyenables the wireless jammer 110 by selectively closing a circuit betweenthe wireless jammer no and a wireless communication energy harvester(e.g., a energy harvesting induction coil) within the upgraded ignitionkey, as described above. For example, Block S210 can close a circuitbetween a stock wireless communication energy harvester coupled to theimmobilizer transponder and the second transponder within the wirelessjammer 110 to enable the wireless jammer 110. Alternatively, Block S210can close a circuit between a second wireless communication energyharvester and the second transponder within the wireless jammer 110 toenable the wireless jammer 110. Yet alternatively, Block S210 can closea circuit between ends of a conductive coil (i.e., the wireless jammer110) arranged about the immobilizer transponder, as described above.

Block 210 can default to activating the wireless jammer no whenevervehicle operation is not authorized. For example, Block S210 can defaultto closing a circuit between a wireless communication energy harvesterand the second transponder, and Block S240 can open this circuit for alimited period of time only when a vehicle operation authorization isreceived from an external device or is currently pending on the upgradedignition key. Alternatively, Block 210 can interface with a motionsensor (and the processor 150 described above) to determine that theupgraded ignition key is moving and then actively power the wirelessjammer 110 if vehicle operation authorization is not current. Similarly,Block 210 can interface with an orientation sensor (and the processor150) to determine that the upgraded ignition key is arranged in aposition substantially matching a known insertion orientation for thekey blade into the vehicle's ignition receptacle, as described above.For example, Block S210 can be implemented by an analog circuitcontaining a set of tilt sensors arranged along various axes of theupgraded ignition key, wherein the tilt sensors close a circuit betweenthe battery 160 and the second transponder within the wireless jammer nowhen the upgraded ignition key is placed in a particular orientation.Thus in the foregoing implementations, Block S210 can selectivelytransmit power from the battery 160 to the wireless jammer 110 inresponse to a certain detected state (e.g., motion, position, etc.) ofthe upgraded ignition key.

However, Block S210 can passively or actively actuate the wirelessjammer no in any other way and control the wireless jammer no accordingto any other input or state of the upgraded ignition key.

Block S220 of the second method S200 recites wirelessly pairing theignition key with an external device. Generally, Block S220 functions toestablish wireless communication between the wireless receiver 120 (ortransceiver) within the upgraded ignition key and an external device,such as a user's smartphone or the diagnostic port dongle 190.

In one implementation, the wireless receiver 120 in the upgradedignition key includes a Bluetooth (e.g., Bluetooth 4.0) module, andBlock S220 sets the Bluetooth module in a “discoverable mode” when notpaired with an external device. Block S220 can then default toestablishing a Bluetooth connection with a smartphone outputting aBluetooth signal of highest strength according to any suitable Bluetoothpairing method or technique. Alternatively, in the variation of theupgrade kit 100 that includes a dongle, the upgraded ignition key canstore a unique address of the corresponding dongle, and Block S220 candefault to establishing a Bluetooth connection with the dongle 190 basedon the unique address linked. (The dongle 190 can implement similarfunctionality to selectively pair with the upgraded ignition key basedon a unique address assigned to the Bluetooth module within the upgradedignition key.) However, Block S220 can function in any other way toestablish a wireless connection with the external device.

Block S220 can further authenticate communications from the externaldevice to the upgraded ignition key. For example, Block S220 canauthenticate each vehicle access request and/or each vehicle operationauthorization from the external device to the upgraded ignition key. Inone implementation, the upgraded ignition key stores a securityalgorithm, a unique (to upgraded ignition keys) code, and a counter thatis initialized to “o” when the upgrade kit 100 is first installed in theignition key. The vehicle-sharing network (or platform) stores anidentical security algorithm and unique key and maintains an identicalcounter. When a vehicle rental is requested by a user and then confirmedat the vehicle-sharing network, the vehicle-sharing network generates anew token based on the security algorithm, the unique key, and thecounter. The vehicle-sharing network then transmits the token to theuser's mobile computing device (e.g., smartphone) and increments thecounter. Once the user's mobile computing device receives the token, themobile computing device transmits a vehicle unlock request (e.g.,automatically or in response to selection of a vehicle unlock requestinto a native vehicle-sharing application executing on the mobilecomputing device, as shown in FIGS. 4 and 6) with the token to theupgraded ignition key. In response to receiving the unlock request andthe token, Block S220 can generate a local token based on the securityalgorithm, the unique code, and the counter stored locally on theupgraded ignition key, authenticate the communication from the mobilecomputing device if the local token matches the token received from themobile computing device, and index the local counter. If the tokensmatch, Block S230 can trigger the upgraded ignition key to transmit anunlock command to the vehicle; alternatively, Block S230 can disregardthe unlock request and/or trigger an alarm (e.g., after multipleunsuccessful authentication attempts). Subsequently, for each additionalvehicle access request selection into the mobile computing device by theuser (shown in FIGS. 4 and 6), the mobile computing device can request anew token to the vehicle-sharing network, the vehicle-sharing networkcan generate the new token if the user is authorized to use the vehicle,index the counter, and return the new token to the mobile computingdevice. Finally, the mobile computing device can send the new token withthe new vehicle access request, which Block S220 can compare to a newlocal token, and Block S230 can trigger transmission of a correspondingvehicle access command if the new token and new local token match andBlock S220 can index the local counter accordingly.

Alternatively, Block S220 can implement the foregoing method toauthenticate communication between the external device and thesmartphone once, such as at the beginning of a rental period, to enablesubsequent transmission of multiple vehicle access requests and/orvehicle operation authorizations from the external device, such asduring the span of the rental period. For example, Block S220 canreceive a rolling code (i.e., a token) from a smartphone over Bluetoothcommunication protocol, authenticate the rolling code, and pair theignition key with the smartphone. In this example, the upgraded ignitionkey can remain paired to the smartphone or automatically re-pair withthe smartphone if communication with the smartphone is interruptedduring the rental period. Furthermore, in this example, once the rentalperiod expires, Block S220 can discard an authorized token received fromthe smartphone to thereby discontinue remote control of the upgradedignition key through the smartphone.

Block S220 can implement similar functionality to pair and authenticatecommunication between the diagnostic port dongle 190 and the upgradedignition key, such as for each vehicle access request submitted by thedongle 190 or for all vehicle access requests submitted by the dongle190 during a rental period. Furthermore, for variations of the upgradekit 100 and methods in which the dongle 190 communicate vehicle accessrequests from a remote server or a mobile computing device (e.g., asmartphone) to the upgraded ignition key, the dongle 190 canadditionally or alternatively implement similar functionality toauthenticate communications from the remote server and/or from themobile computing device. However, Block S220 can function in any otherway to pair the upgraded ignition key with the dongle 190 (or the dongle190 with a remote server or a mobile computing device) and toauthenticate communications from the external device to the upgradedignition key (or from the remote server or a mobile computing device tothe dongle 190).

Block S230 of the second method S200 recites, in response to receiving adoor unlock signal from the external device, wirelessly transmitting adoor unlock command from the ignition key to the vehicle. Generally,Block 230 functions to enable remote control of stock vehicle accessfunctions of the stock ignition key based on authenticated vehicleaccess requests received from the external device. In oneimplementation, Block S230 toggles a relay coupled to a correspondingvehicle access circuit within the stock electronics of the ignition key.For example, in response to receiving a vehicle unlock request from theexternal device, Block S230 can toggle the state of a first relayconnected across a vehicle unlock button on the stock ignition key PCBto mimic manual selection of the vehicle unlock button. In this example,in response to receiving a vehicle lock request from the externaldevice, Block S230 can similarly toggle the state of a second relayconnected across a vehicle lock button on the stock ignition key PCB tomimic manual selection of the vehicle lock button. Furthermore, in thisexample, in response to receiving a vehicle trunk open (or unlock)request from the external device, Block S230 can toggle the state of athird relay connected across a vehicle trunk open (or unlock) button onthe stock ignition key PCB to mimic manual selection of the vehicletrunk open button. Once manual selection of a vehicle access button isthus replicated, a stock wireless communication module(s) of the stockignition key can transmit corresponding vehicle access commands to areceiver within the vehicle, such as based on stock (i.e., OEM)authentication and encryption techniques integrated into the vehicle andthe stock ignition key.

However, Block S230 can respond in any other way to an authenticatedvehicle access request from the external device to trigger transmissionof a vehicle access command to the vehicle.

Block S240 of the second method S200 recites, in response to receivingan authorization signal from the external device, disabling the wirelessjammer no. Generally, Block S240 functions to deactivate or disable thewireless jammer 110 to enable transmission of a digital key from thetransponder immobilizer to the vehicle and thereby enable ignition andoperation of the vehicle with the upgraded ignition key once operationof the vehicle is authorized.

In one implementation, Block S240 disconnects the wireless jammer 110from a power source. In one example, Block S240 opens a circuit betweenthe wireless jammer 110 and the battery 160. In another example, BlockS240 opens a circuit between the wireless jammer 110 and a wirelesscommunication energy harvester (e.g., a energy harvesting inductioncoil) within the immobilizer transponder or the second transponder ofthe wireless jammer 110. In yet another example, Block S240 candisconnect ends of a conductive coil arranged circumferentially aboutthe immobilizer transponder.

In another implementation, Block S240 sets a flag to disregard triggersto activate the wireless jammer no, such as movement of the ignition keyor orientation of the ignition key that matches an insertion orientationof the upgraded ignition key into an ignition key receptacle within thevehicle. However, Block S240 can function in any other way to disable ordeactivate the wireless jammer 110.

One variation of the second method S200 includes Block S250 (not shown),which recites, in response to detecting a key dock adjacent the ignitionkey and receiving a door lock signal from the external device,transmitting a door lock command from the ignition key to the vehicle.Generally, Block S250 functions to trigger transmission of a door lockcommand from the upgraded ignition key to a receiver in the vehicle oncethe rental period for the vehicle expires and the ignition key isreplaced on the key dock 180.

In one implementation, Block S220 receives a rental period duration fromthe external device, initiates a timer corresponding to the rentalperiod once the vehicle unlock command is transmitted to the vehicle,and tracks the timer. Once the time expires, Block S250 interfaces withthe sensor 170 within the upgraded ignition key to detect the proximityof the upgraded ignition key to the key dock 180 and, if the key dock180 is detected, toggles the relay 130 coupled to the vehicle lockbutton of the ignition key to trigger transmission of a vehicle lockcommand to the vehicle. For example, in this implementation, once therental period expires, the user can place the upgraded ignition key ontothe key dock 180, and Block S250 locks the doors of the vehicleaccordingly. However, as in this example, Block S250 will not lock thedoors of the vehicle until the upgraded ignition is restored to the keydock 180 such that the upgraded ignition key is in the correct (i.e.,known) place for a subsequent user.

In another implementation, Block S250 can interface with the sensor 170to detect the proximity of the upgraded ignition key to the key dock180. Once detected proximity to the key dock 180 persists for athreshold period of time (e.g., one minute), Block S250 can toggles therelay 130 coupled to the vehicle lock button of the ignition key totrigger transmission of a vehicle lock command to the vehicle to thuslock the vehicle. Block S250 can also transmit a vehicle rentaltermination command to the dongle 190, to the user's mobile computingdevice, or to an other external device for subsequent transmission tothe vehicle-sharing network to terminate the vehicle rental (and enabletime-based billing of vehicle usage and flexible vehicle rentalperiods). For example, in this implementation, once a user is finishedusing the vehicle, he can restore the ignition key to key dock and exitthe vehicle, and Block S250 can trigger transmission of the vehicle lockcommand from the upgraded ignition key once the threshold period of timeexpires. Similarly, once proximity of the key dock 180 is detected bythe sensor 170 and the last open door of the vehicle transitions from“open” to “closed,” Block S250 can trigger transmission of the vehiclelock command from the upgraded ignition key. Yet similarly, the user caninterface with his mobile computing device or the card reader 192 toterminate the vehicle rental, and Block S250 can trigger transmission ofthe vehicle lock command from the upgraded ignition key accordingly onceproximity of the key dock 180 is detected by the sensor 170 (and thelast open door of the vehicle transitions from “open” to “closed”).

Block S250 can similarly function to lock the doors of the vehicleduring a vehicle rental period once the user restores the upgradedignition key to the key dock 180. However, Block S250 can function inany other way to trigger transmission of the vehicle lock command fromthe upgrade ignition key.

4. Application: Upgraded Ignition Key

As shown in FIG. 7, a third method S300 for sharing a vehicle includes:receiving a booking request for a vehicle rental by a user in BlockS310, in response to authentication of the booking request, wirelesslypairing a mobile computing device with an ignition key associated withthe vehicle in Block S320; and, in response to an unlock input into themobile computing device, wirelessly transmitting a door unlock commandfrom the mobile computing device to the ignition key in Block S330.

Generally, the third method S300 functions to enable a user to controlthe upgraded ignition key remotely via a mobile computing device (e.g.,a smartphone, a tablet) to access the corresponding vehicle. In one usescenario, once the key is upgraded and installed in the vehicle, asdescribed above in the first method S100, the user can walk up to thevehicle, book the vehicle with his smartphone (in Block S310), pair hissmartphone with the upgraded key (in Block 320 via Block S220 of thesecond method S200), and unlocks the vehicle with the smartphone (inBlock S330 via Block S230 of the second method S200). In this usescenario, the user can then enter the vehicle, take the upgradedignition key from the key dock 180 on the vehicle's dashboard, and startthe vehicle. During the rental period, the user can interface with theupgraded ignition key directly to lock and unlock the vehicle orcommunicate vehicle access commands to the upgraded ignition key throughhis smartphone to lock and unlock the vehicle.

Block S310 of the third method S300 recites receiving a booking requestfor a vehicle rental by a user. Generally, Block S310 functions toreceive a booking request for the vehicle and to confirm the vehicle forrental to the user. For example, Block S310 can receive—through a nativevehicle rental application executing on the user's smartphone—a requestfor any rental vehicle within a prescribed area or at a known location,the native vehicle rental application can transmit the request to thevehicle-sharing network, and the vehicle-sharing network can assign aspecific vehicle to the vehicle or prompt the user to physically selecta vehicle by walking up to a nearby vehicle, by entering a vehicleidentifier (e.g., a fleet ID number or a license plate number) into thenative vehicle rental application, or by selecting from a list ofvehicles displayed within the native vehicle rental application. Oncethe vehicle is selected, Block S310 can receive a rental period orduration, rental start time, a rental end time, an anticipated traveldistance during the rental period, and/or a number of passengers duringthe rental period, etc. from the user, such as through the nativevehicle rental application executing on the user's smartphone. BlockS310 can then assign the selected vehicle to the user and retrieve apersonal user and billing information from the user's rental account(stored on the vehicle rental platform) or prompt the user to enterpersonal and billing information into the native vehicle rentalapplication. (Block S310 can implement similar functionality through aweb browser executing on the smartphone or on another computing device.)

Block S310 can additionally or alternatively implement methods andtechniques described in U.S. patent application Ser. No. 13/788,836 toreceive a booking request from the user and to book a vehicle for theuser accordingly. However, Block S310 can function in any other way toreceive and/or respond to a booking request for a vehicle rental for theuser.

Block S320 of the third method S300 recites, in response toauthentication of the booking request, wirelessly pairing a mobilecomputing device with an ignition key associated with the vehicle.Generally, Block S320 functions to interface with Block S220 of thesecond method S200 to establish and/or authenticate communication withthe upgraded ignition key. For example, as described above, Block S320can download a rolling code (i.e., a token) from the vehicle-sharingnetwork onto the user's mobile computing device and transmit the rollingcode from the mobile computing device to the upgraded ignition key toauthenticate communication therewith. However, Block S320 can functionin any other way to pair the user's mobile computing device with theupgraded ignition key.

Block S330 of the third method S300 recites, in response to an unlockinput into the mobile computing device, wirelessly transmitting a doorunlock command from the mobile computing device to the ignition key.Generally, Block S330 functions to interface with Block S230 of thesecond method S200 to unlock a door of the vehicle by transmitting avehicle access request (i.e., a vehicle unlock request) to the upgradedignition key, as described above. Block S330 can transmit the vehicleunlock request to the upgraded ignition key automatically once theuser's mobile computing device and the upgraded ignition key are firstpaired and/or authenticated following confirmation of a vehicle rentalfor the user. Additionally or alternatively, Block S330 can transmit thevehicle unlock request to the upgraded ignition key in response tomanual selection of an unlock request by the user (or affiliatetherefore) into the mobile computing device.

In one implementation, the native vehicle-sharing applicationdisplays—on a screen of the mobile computing device—a digitalrepresentation of the physical vehicle access buttons of the vehicle'scorresponding ignition key. The user can thus select a displayed virtualvehicle access button on the mobile computing device, and Block S330 cantransmit a corresponding vehicle access request to the upgraded ignitionkey accordingly. Block S330 can therefore provide virtual controls onthe user's mobile computing device to enable remote manipulation ofstock vehicle access features of the ignition key through the mobilecomputing device. However, Block S330 can function in any other way towirelessly transmit a door unlock command from the mobile computingdevice to the upgraded ignition key.

As shown in FIG. 7, one variation of the third method S300 includesBlock S340, which recites transmitting an ignition authorization commandfrom the mobile computing device to the ignition key to disable awireless jammer within the ignition key. Generally, Block S340 functionsto interface with Block S240 of the second method S200 to disable ordeactivate the wireless jammer no within eh upgraded ignition key tothereby enable operation of the vehicle. In one implementation, BlockS340 transmits the ignition authorization command as the rolling code ortoken transmitted to the upgraded ignition code in Block S320 (i.e., theupgraded ignition key can implement the authenticated rolling code ortoken to disable the wireless jammer 110). Alternatively, Block S340 cantransmit the ignition authorization command separately, such as inresponse to transmission of a door unlock request from the mobilecomputing device to the upgraded ignition key. Block S340 can alsoattach a time limit to the ignition authorization command, such asthirty seconds, five minutes, or the duration of the vehicle rentalperiod, and the upgrade ignition key can deactivate the wireless jammer110 until the time limit of the ignition authorization command expires,at which point Block S210—executing on the upgrade ignition key—canreactivate or re-enable the wireless jammer 110. However, Block S340 canfunction in any other way to transmit an ignition authorization commandin any other way and of any other form to the upgraded ignition key.

5. Application: Upgraded Ignition Key and Dongle

As shown in FIG. 8, a fourth method S400 for sharing a vehicle includes:wirelessly pairing a diagnostic port dongle 190 arranged within thevehicle with an ignition key associated with the vehicle in Block S410,in a first mode, receiving a vehicle unlock request from a remotecomputer network in Block S420, and wirelessly transmitting a doorunlock command to the ignition key arranged within the vehicle in BlockS430, and, in a second mode, wirelessly pairing with a mobile computingdevice in Block S440, authenticating the mobile computing device inBlock S442, receiving a vehicle unlock request from the mobile computingdevice in Block S422, and wirelessly transmitting a door unlock commandto the ignition key arranged within the vehicle in Block S432.

Generally, the fourth method S400 functions to enable a user to controlthe upgraded ignition key remotely via a mobile computing device (e.g.,a smartphone, a tablet) by routing vehicle access commands from theuser's mobile computing device through the diagnostic port dongle 190 tothe upgraded ignition key to access the corresponding vehicle. Inparticular, the fourth method S400 functions to selectively enabledirect communication between the user's mobile computing device and thedongle 190 and indirect communication between the user's mobilecomputing device and the dongle 190 via a remote server (e.g., thevehicle-sharing network) based on wireless access to the remote server.For example, the dongle 190 can default to receiving communications fromthe user's mobile computing device via the remote server (or the nativevehicle rental application executing the user's mobile computing devicecan default to communicating with the dongle 190 via the remote server),but the dongle 190 can resort to direct communication with the mobilecomputing device (or the mobile computing device can resort to directcommunication with the dongle 190) if cellular communication isinaccessible and/or if cellular signal strength falls below a thresholdvalue. The fourth method S400 can therefore select communication pathsbetween the user's mobile computing device and the dongle 190 to achievea desired level of security in light of immediacy of user access to thevehicle. For example, communication through the remote server canexhibit greater security than direct communication between the mobilecomputing device and the dongle 190 but communication between the dongle190 and the mobile computing device may be required to provide immediateaccess to the vehicle if communication with the remote server isunavailable, impeded, or substantially reduced.

5.1 Block S410

Block S410 of the fourth method S400 recites wirelessly pairing adiagnostic port dongle 190 arranged within the vehicle with an ignitionkey associated with the vehicle. Generally, Block S410 can function likeBlock S320 to pair with the upgraded ignition key. For example, BlockS410 can store a security algorithm, a unique key, and a counteridentical to those stored on the upgraded ignition key and generate anew token for each communication (e.g., vehicle access request)transmitted to the upgraded ignition key, and the upgraded ignition keycan authenticate each new token received from the dongle 190 asdescribed above. Alternatively, Block S410 can download each new tokenfrom the vehicle-sharing network, such as over encrypted cellularcommunication protocol. However, Block S410 can function in any otherway to wirelessly pair the diagnostic port dongle 190 with an ignitionkey.

3.2 First Mode

Block S420 of the fourth method S400 recites, in a first mode, receivinga vehicle unlock request from a remote computer network in Block S420.Furthermore, Block S430 of the fourth method S400 recites, in the firstmode, wirelessly transmitting a door unlock command to the ignition keyarranged within the vehicle. Generally, when communication with theremote server is supported, the fourth method S400 executes the firstmode with Block S420 receiving vehicle access requests from a remoteserver and Block S430 interfacing with Block S220 and Block S230 of thesecond method S200 to communicate these vehicle access requests to theupgraded ignition key. For example, the dongle 190 can execute BlocksS420 and S430 when a cellular connection and/or Wi-Fi is supportedwithin range of the dongle 190.

Like Block S320, Block S430 can authenticate communication with theupgraded ignition key, such as by generating a token based on a securityalgorithm, a unique code, and a counter stored locally on the dongle 190and that match a security algorithm, a unique code, and a counter storedon the upgraded ignition key. Block S420 can further implementencryption and/or decryption methods to encrypt communications to and/orto decrypt communications from the remote server.

3.3 Second Mode

Block S440 of the fourth method S400 recites, in a second mode,wirelessly pairing with a mobile computing device, and Block S442 of thefourth method S400 recites, in the second mode, authenticating themobile computing device. Furthermore, Block S422 of the fourth methodS400 recites, in the second mode, receiving a vehicle unlock requestfrom the mobile computing device, and Block S432 of the fourth methodS400 recites, in the second mode, wirelessly transmitting a door unlockcommand to the ignition key arranged within the vehicle. Generally,Blocks S422, S430, S440, and S442 function to enable directcommunication between the smartphone and the dongle 190 (e.g., ifcellular or Wi-Fi communication proximal the vehicle is not supported),to receive vehicle access requests directly from mobile computingdevice, and to communicate these vehicle access requests to the upgradedignition key.

In one implementation, Block S440 and Block S442 implement techniquessimilar to Block S220 of the second method S200 to pair the dongle 190to mobile computing device and to authenticate communicationstherebetween. In this implementation, when the booking request is firstreceived from the user via the mobile computing device, the nativevehicle rental application and download a second security algorithm, asecond unique code, and a second counter that are identical to a secondsecurity algorithm, a second unique code, and a second counter stored onthe dongle 190 but which are only valid when communication between thedongle 190 and the vehicle rental network is severed, impaired, orintermittent. Thus, when the fourth method S400 executing on the dongle190 transitions to the second mode, the second security algorithm,second unique code, and second counter can become valid, and the BlocksS440 and S442 can implement methods and techniques described above topair the mobile computing device directly with the dongle 190 and toauthenticate communications therebetween. For example, Block S440 canpair the dongle 190 with the mobile computing device over Bluetooth 2.0wireless communication protocol and authenticate these communicationsbased on a token received from and generated by the mobile computingdevice based on the second security algorithm, the second unique code,and the second counter.

Once communication between the mobile computing device and the dongle190 is established in Block S440 and S442, Block S422 and S432 canimplement methods and techniques similar to Block S330 of the thirdmethod S300 to transmit a vehicle unlock request to the upgradedignition key.

However, Blocks S422, S432, S440, and S442 can function in any other wayto establish, authenticate, and handle communications directly from theuser's mobile computing device to the dongle 190 when wirelesscommunication between the dongle 190 and a remote server is not severed,impaired, or intermittent to enable access to the vehicle through themobile computing device.

6. Application: Upgraded Ignition Key, Dongle, and Card Reader

As shown in FIG. 9, a fifth method S500 for sharing a vehicle includes:wirelessly pairing a diagnostic port dongle 190 arranged within thevehicle with an ignition key associated with the vehicle in Block S510,receiving a login request for a user through a card reader 192 coupledto the diagnostic port dongle 190 in Block S520; and, in response toauthentication of the login request, wirelessly transmitting a doorunlock command to the ignition key arranged within the vehicle in BlockS530.

Generally, the fifth method S500 enables a user to rent the vehicle bytapping a badge or other identification card against a card (e.g., RFID)reader arranged inside the vehicle and coupled to the dongle 190, whichcommunicated vehicle access requests to the upgraded ignition key.

Block S510 of the fifth method S500 recites wirelessly pairing adiagnostic port dongle 190 arranged within the vehicle with an ignitionkey associated with the vehicle. Generally, Block S510 can implementtechniques and methods of Block S410 of the fourth method S400 to pairthe dongle 190 with the upgraded ignition key and/or to authenticatecommunications therebetween.

Block S520 of the fifth method S500 recites receiving a login requestfor a user through a card reader 192 coupled to the diagnostic portdongle 190. Generally, Block S520 functions to extract user identifyinginformation from a card or other wireless-enabled device proximal thecard reader 192 and to transmit the user identifying information to aremote server (e.g., the vehicle-sharing network) to book the vehiclefor rental to the user. For example, Block S520 can implement methods ortechniques described in U.S. patent application Ser. No. 13/788,836 tobook the vehicle for rent by the user based information downloadedwirelessly from the user identification card.

In one implementation, Block S520 powers an RFID transmitter and RFIDreader within the card reader 192 to download data stored on the user'scard when the user taps his wireless-enabled employee badge on thevehicle's windshield proximal the card reader 192, the dongle 190communicates the downloaded information to the dongle 190 via a hardline behind an interior A-pillar cover within the vehicle (describedabove), and the dongle 190 encrypts and then transmits the downloadedinformation with an identifier of the vehicle to the remote server overa cellular connection. The remote server then decrypts the useridentification information, retrieves a user profile and billinginformation from a user database based on the user identifyinginformation, and books the vehicle for the user based on the receivedvehicle identifier. Subsequently, the remote server can return a bookingconfirmation to the dongle 190 over a cellular network, and the dongle190 can handle the confirmed vehicle rental by executing Block S530.

However, Block S520 can collect user data locally at the vehicle anddistribute these data to a remote server in any other suitable toconfirm rental of the vehicle to the user.

Block S530 of the fifth method S500 recites, in response toauthentication of the login request, wirelessly transmitting a doorunlock command to the ignition key arranged within the vehicle.Generally, Block S530 implements methods or techniques described abovein Block S330 of the third method S300 to communicate a vehicle unlockrequest to the upgraded ignition key to trigger transmission of a doorunlock command from the upgraded ignition key to the vehicle. Once thevehicle is thus unlocked for the user responsive to a confirmed vehiclerental, the user can interface with the upgraded ignition key directlyto control access to the vehicle and to start the vehicle. Additionallyor alternatively, Block S320 and Block S330 can repeat to unlock thedoors of the vehicle each time the user taps his card on the vehicleproximal the card reader 192 during the rental period. However, BlockS530 can function in any other way to remotely control the upgradedignition key to provide the user with access to the vehicle.

As shown in FIG. 9, one variation of the fifth method S500 includesBlock S540, which recites wirelessly receiving diagnostic information ofthe vehicle from the card reader 192 module and transmitting thediagnostic information to a remote computer network. Generally, BlockS540 function to transmit vehicle and related information collected bythe dongle 190 through the vehicle's OBD port and/or by one or moresensors within the dongle 190 to the vehicle-sharing network. Forexample, Block S540 can transmit the vehicle and related data inreal-time over cellular communication protocol. Alternatively, BlockS540 can transmit select vehicle and related data to the vehicle-sharingnetwork at the end of the rental period, such as over Wi-Fi if thevehicle is parked within range of an affiliated Wi-Fi router (e.g., aWi-Fi affiliated with a corresponding vehicle rental agency) or over acellular network if Wi-Fi communication is not supported proximal thevehicle. In particular, the dongle 190 can transmit vehicle-related datadirectly, such as over Wi-Fi communication protocol to a local router,over cellular communication protocol to a local cellular tower, or overBluetooth communication protocol to a nearby and related vehicle (e.g.,a vehicle within the same vehicle fleet). For example, the dongle 190can network the corresponding vehicle with other nearby vehicles, suchas to share vehicle and/or user-related data across a vehicle fleet.Alternatively, the dongle 190 can upload vehicle data to a user's mobilecomputing device (e.g., a smartphone), and the mobile computing devicecan pass the data to a remote server or computer network, such as overWi-Fi, cellular, Bluetooth, or other wireless communication protocol.These data can then be implemented by the vehicle-sharing platform tobill the user, track vehicle usage and wear, manage vehicle maintenance,track rental vehicle fleet distribution (over time), etc. However, BlockS540 can function in any other way to communicate vehicle and relatedinformation to a remote computer network.

The systems and methods of the embodiments can be embodied and/orimplemented at least in part as a machine configured to receive acomputer-readable medium storing computer-readable instructions. Theinstructions can be executed by computer-executable componentsintegrated with the application, applet, host, server, network, website,communication service, communication interface,hardware/firmware/software elements of a user computer or mobile device,or any suitable combination thereof. Other systems and methods of theembodiment can be embodied and/or implemented at least in part as amachine configured to receive a computer-readable medium storingcomputer-readable instructions. The instructions can be executed bycomputer-executable components integrated by computer-executablecomponents integrated with apparatuses and networks of the typedescribed above. The computer-readable medium can be stored on anysuitable computer readable media such as RAMs, ROMs, flash memory,EEPROMs, optical devices (CD or DVD), hard drives, floppy drives, or anysuitable device. The computer-executable component can be a processorbut any suitable dedicated hardware device can (alternatively oradditionally) execute the instructions.

As a person skilled in the art will recognize from the previous detaileddescription and from the figures and claims, modifications and changescan be made to the embodiments of the invention without departing fromthe scope of this invention as defined in the following claims.

I claim:
 1. An upgrade kit for an ignition key corresponding to avehicle and including an immobilizer transponder and a keyless entrytransmitter, the upgrade kit comprising: a wireless jammer arrangedadjacent the immobilizer transponder and intermittently interfering withwireless transmission from the immobilizer transponder; a wirelessreceiver configured to receive an unlock request from an externaldevice; a relay configured to actuate the keyless entry transmitter tounlock a door of the vehicle in response to the unlock request; and anenclosure cooperating with a portion of the ignition key to contain thewireless jammer, the immobilizer transponder, the wireless receiver, therelay, and the keyless entry transmitter.