Detect presence of two people in a vehicle

ABSTRACT

A system for detecting when two people are in a vehicle. The system detects the presence of two warm bodies with one or two infrared cameras.

This application is a continuation of co-pending U.S. application Ser.No. 15/702,560 filed Sep. 12, 2017 which will issue as U.S. Pat. No.10,531,294 which was a continuation of then co-pending U.S. applicationSer. No. 14/815,830 filed Jul. 31, 2015 which issued as U.S. Pat. No.9,769,663, which was a continuation of U.S. application Ser. No.13/892,287 filed May 12, 2013 which issued as U.S. Pat. No. 9,100,824,which was a continuation of U.S. application Ser. No. 12/804,151 filedJul. 15, 2010 which issued as U.S. Pat. No. 8,442,490. This applicationclaims priority from U.S. provisional patent application 61/308,271filed Feb. 25, 2010, which is incorporated by reference.

BACKGROUND

Driving while looking at a display or keypad on an electronic device isdangerous because it takes the eyes off the road and requires focusedconcentration on interacting with the device. Merely talking on a mobilephone while driving is also dangerous, but not as dangerous because theeyes can be on the road and the concentration required for talking isless than for reading or visual controlled finger manipulation. Thedangers are greater for a solo driver with no adult passenger than for adriver with an adult passenger. A technical solution is needed that willreduce the attractive distraction posed to solo drivers by electronicdevices with keypads or displays, particularly mobile telephones, byrestricting some of their functions when moving.

Systems to automatically restrict uses of moving phones will not beeffective unless service providers make them automatic for most phonesof young solo drivers in a region. This will not happen unless allvendors must implement the system at the same time. This will not happenunless implementation is required by legislation. Legislators will notrequire implementation unless:

-   1. Writing, reading and incoming text message rings are blocked.-   2. Emergency calls can be made and received while driving.-   3. Phones of independent adult passengers are not restricted.-   4. Voice calls are allowed for independent adults when driving is    easy, but calls by dependent children or employees are limited.-   5. Costs to voters and cell phone users are modest.

Objectives

Electronic devices with keypads or displays of all kinds usable inautomobiles (including dashboard electronics with displays,entertainment, and driver assistance) can be programmed so that certainfunctions of the display, keypad, speaker or microphone cannot be usedor have modified functionality at certain times. A core objective is todisable or restrict some of these functions when located in a vehiclemoving at more than a threshold speed and the device is in easy view ofa solo driver but not when in a passenger's hands. The device might bemore restricted when experiencing acceleration from lane changes orturns or speed changes and less completely restricted when moving atconstant speed with no lateral acceleration. The restrictions might begreater for children and employees than for independent adults.

Systems to control restricting uses of dashboard mounted devices shouldbe designed to also control restricting of hand held devices. However,it will be roughly 15 years before such systems are in 80% of thevehicles used by young people. In the meantime, as phones are replacedevery two years on average, we can implement now a solution thatoperates in the phones and the telephone networks. Systems that arefirst implemented in the phone system should be compatible with futurephone restricting systems based in the vehicle.

No User Action Solutions

The preferred solutions are “no user action” (NUA) solutions (all driverphones are automatically restricted when moving by action of the phonesystem) rather than “user action required” solutions (phones are notrestricted when moving unless the owner of the phone or vehicle hasinstalled a system to do so). In the “no user action” (NUA) solutions,cell phones of young solo drivers (and sometimes passengers) will berestricted when moving faster than a threshold such as about 15 mph(plus or minus about 8 mph).

The phones of passengers (and sometimes drivers) may unrestrict if theyconnect to an unrestricting override transmitter. The overridetransmitters may unrestrict the phone if the phone display is not inview of a driver or there is another passenger in the car, which mightbe determined by detecting the presence of another active phone in thecar and the usage patterns of the two phones show they are not typicallyused by just one person.

There are four types of unrestricting override transmitters:

-   1. If there are two active cell phones in the vehicle connected by    Bluetooth and SMS message and their usage patterns show they are not    typically used by a single person, one phone may act as an override    transmitter for the other.-   2. Retrofit override transmitters will be available that any car    owner can buy and install to uncripple passenger phones, whether or    not there is a second cell phone in the car.-   3. Mass transit vehicles will have override transmitters for all new    phones in the vehicle.-   4. Newly manufactured vehicles will be made with override    transmitters that will determine which phones are unrestricted and    when.

Phones issued to children or employees can omit the unrestrictingfeature at the option of the phone owner. They will remain restrictedwhenever they are moving. Alternatively, they can be programmed with adifferent restricting algorithm to be more often restricted or moregreatly restricted than standard phones.

DESCRIPTION OF FIGURES

FIG. 1 shows a conventional phone 2 acting as an unrestricting overridetransmitter for a new phone 1.

FIG. 2 shows a retrofit override transmitter that detects presence oftwo people mounted in a vehicle.

FIG. 3 shows the forward facing side of the retrofit overridetransmitter of FIG. 2.

FIG. 4 shows the rearward facing side of the retrofit overridetransmitter of FIG. 2.

Covering Young Drivers First

The system described herein requires two elements for fullimplementation in a region:

-   -   (1) restricting moving phones in the region, and    -   (2) partially unrestricting selected moving phones at selected        times.

Element 1 can be implemented merely with changes to the phones and nochanges to the network or with small changes to the network. Element 2requires upgrades to the network to prevent abuse to unrestrict driverphones in private vehicles. To optimize early benefits of costs, theimplementation should be done region by region and happen sooner inhigher priority regions than in lower priority regions.

However, where parents or employers want their dependent children oremployees to have phones that are restricted when moving and are willingto accept that the phones may not be unrestricted when the person is apassenger, they can get the new phones for use in any region before suchphones are required in that region. This will implement element 1 forthese new phones but not element 2.

When the system is made mandatory in a region, because young driverspresent a much greater risk to others and themselves than older drivers,to achieve the greatest benefits at lowest cost, the system can beimplemented first for new phone numbers issued after a start date tobilling addresses in the implemented area and adjoining areas and/or tonumbers with a particular area code. This cut off will also cover phonesthat present lower risk, such as those issued to children too young todrive and newly issued numbers for older people, but it will covervirtually all the young drivers. Then, to keep their phones working,people with a recent history of substantial use of their phone in thearea and a phone number issued after a cut-off date in the past can berequired to receive a software download to motion-restriction enabletheir phones or trade in their phones for a new motion-restrictionenabled phone (preferably at no additional cost to the phone ownerbecause other highway users will benefit more than the phone owner). Thecut off to cover older numbers can be set farther back year by year. Bythe time numbers as old as about 15 years are covered, the system may beat an optimum for cost-benefit, in which case phone based restrictionmay never be extended to phones with still older numbers.

Here is a summary of an implementation roll-out plan:

-   -   1. Require all carriers to set up motion triggered display and        ring restricting capability in a specified area by a start date.    -   2. Require public transit that operates in the area to install        override unrestricting transmitters by the start date.    -   3. For subscribers with a billing address or area code in the        selected and surrounding areas, require all carriers to issue        motion-restricting-enabled phones for new phone numbers issued        after the start date.    -   4. By date 1, require that carriers have replaced the phones for        each phone number issued since past date −1 that has a record of        recent substantial use in the area; −by date 2, each number        issued since past date −2; etc.

Forms of Restriction that Allow Emergency Uses and Other Uses WhileDriving

There are myriad situations when an out-going call should be allowed oran in-coming call should be allowed, particularly emergency situations.An optimal system might block all text message alerts or display and allreading, writing, or other user interactions with a display while moving(or moving and accelerating), but, to accommodate emergencies, it shouldnot block all voice communications while moving. The objective is tolimit functions that cause greater driver distraction when the driverneeds more concentration on driving while allowing more importantcommunications that cause less distraction at times when the driverrequires less attention on driving.

Level of attention required for driving can be approximated with anaccelerometer in the phone or sensors the vehicle. The device can beprogrammed to determine when the vehicle is speeding up or slowing downor turning or quickly changing lanes. If mounted in the vehicle, thedevice can receive inputs from various vehicle sensors that suggest whenmore attention is required for driving. At these times, the outgoingvoice signal or the incoming voice signal or both can be interrupted orsuspended (and perhaps replaced with a sound or recorded words) toreduce distraction for the driver and inform the other party to theconversation that the driver needs to pay attention to driving at thistime.

If it can be shown that voice communications while driving present alower risk when headsets are used than when handsets are held to theear, a restriction when the phone is moving and near the driver might beto stop the handset speaker from working and require use of a headsetspeaker.

Conversations with a passenger in a car present less of a distractionthan telephone conversations, because the remote conversant does notknow what else the driver is doing simultaneously and what the driver isseeing, while the passenger does. The passenger understands what ishappening when the driver pauses to concentrate on driving. Theconcentration demands for a telephone conversation can be reduced andmade more like the demands for conversation with a passenger by, whenthe phone in the hands of a driver is moving faster than a thresholdspeed, periodically playing a beep or other signal to both parties toremind them that one of the parties is also driving.

The system can be programmed so that, when a caller calls a phone thatis moving and not allowed by an override transmitter to be unrestricted,before the phone rings, a message is played to the caller saying: “Theperson you are calling appears to be driving. If this call is importantenough to interrupt that person while driving, press 1.” The calledphone would only ring if the caller presses 1. Otherwise, the call isrerouted to voice mail. Implementation details are described in AppendixA.

As described above, for independent adult drivers, restricting phonesthat are moving to block texting and display interactions but onlytemporarily block voice communications while also accelerating may besufficient to solve the problem of distracted driving while alsoallowing sufficient use of phones while driving to satisfy the desiresof drivers. However, for children, or children and certain employees,the parent or employer may prefer a greater level of restriction. Inthis system, the phone owner can have a password that allows greaterrestriction to be placed on the phone when it is moving or allow lesserunrestriction when another person is present.

Here are examples of possible voice call restrictions that may bepreferred in these situations for outgoing calls.

-   -   (1) Only calls to 911 or any other listed emergency number are        allowed.    -   (2) Phone numbers of family members are listed with the cellular        service provider and only calls to these numbers are put through        while the phone is moving.    -   (3) Speed dial calls are allowed but not calls requiring        pressing more than 3 keys.    -   (4) Voice calls to other than listed emergency numbers are cut        off after 3 minutes.

Here are examples of possible restrictions for incoming calls.

-   -   (5) The likely source phone numbers of family members are listed        with the cellular service provider and only calls from these        numbers are put through while the phone is moving.    -   (6) Voice calls from those listed family member numbers are cut        off after 3 minutes.

Methods to Automatically Restrict Moving Phones with No User Action(NUA)

To implement the automatic no-user action restricting, speed of movementof each cell phone can be established by the telephone system by usingone or more of:

-   -   (1) a distinguishable pattern of changes in signal strength        received by cell base stations from phones,    -   (2) cell base station angle of arrival (AOA), which requires at        least two towers, locating the phone at the point where the        lines along the angles from each tower intersect,    -   (3) cell base station time difference of arrival (TDOA), which        works using multilateration,    -   (4) changes in location signature, which uses “fingerprinting”        to store and recall patterns (such as multipath) which mobile        phone signals are known to exhibit at different locations in        each cell,    -   (5) needing a hand-off of phone connection from one cell to        another,    -   (6) GPS in the phone,    -   (7) a distinguishable pattern of changes in signal strength        received by phones from cell base stations, or    -   (8) an accelerometer in the phone with software to integrate        accelerations and periodically reset the zero point.

Methods 1-5 can be implemented in the base station software for eachcell or its switching center. Methods 6-8 must be implemented in thephone. Each cellular service provider can be allowed to determine whichmethod to use and the methods can vary over time or by cell phone.

Speed Determination by Accelerometer in the Phone

As mentioned above, determining speed of the phone with an accelerometerin the phone may be preferred because it can be done with adequaterobustness and very low power drain (in contrast to GPS). If theacceleration data is mathematically integrated over time, which caneasily be done in a processor, the result is a speed value.Imperfections in the system limit the accuracy and precision, but it issufficient for the minimally required robustness. Very low poweraccelerometers can be added to all new phones at low cost.

A significant limitation is that the zero point (a speed of zerorelative to the earth) needs to be reset periodically or it will drift.Each reset can be based on GPS in a phone that includes this circuit orby communication with cellular base stations by one of methods 1-4above. The verification (and the reset) can be programmed to occur onlywhen the phone is receiving a strong GPS signal or only when basestations are not busy. The phone or override transmitter can beinstructed by the base station to reset itself at any time as determinedby the base station. The reset can be done when the phone or overridetransmitter is known to be stopped or when a non-zero speed of movementof the phone or override transmitter is known.

Because the system should be implemented with no user action (NUA)required, speed determination and restricting must be implemented in thephone and/or the phone network for each new phone. However, when a newphone is used in a new automobile, electronics in the vehicle can takeover control of determining speed, as further described below. This willreduce drain on the battery in the phone.

Authentication Required for Override Transmitters

Whether in private vehicles or mass transit vehicles, unrestricting ofmoving phones is determined by receipt at the phone of a wireless signalfrom an override transmitter. It is necessary to include a method foreach phone or its network to authenticate the override transmitter.Otherwise, sociopathic entrepreneurs could make and sell overridetransmitters that will unrestrict phones of solo drivers or children oremployees when they should not be unrestricted. The authenticationmethod need not be strong. It only needs to be strong enough to make itexpensive to make and sell an unauthorized override transmitter thatwill work more than about half of the time for any driver.

Crypto-authenticating chips are well known. They are designed to receiveas input a first data string and, in response, output a second datastring. When both data strings are processed together with a secret key,the result will show the second data string to have been produced by thecrypto-authenticating chip or not. The second string cannot beinexpensively determined from knowing the first string without havingthe key. In an embodiment of the present system, the new phone sends afirst data string to an override transmitter mounted in the vehicle,receives a second data string from the crypto-authenticating chip, andsends them both to its network which makes the comparison with a key. Ifthe network determines that the strings do not match with the key, itresponds with a command to the cell phone that it must not beunrestricted.

The secret key for each crypto-authenticating chip is securely suppliedby the override transmitter manufacturer to a single entity thatcooperates with network operators, which entity operates a securedatabase and comparison service to perform the authentication for thenetwork operators.

Each authenticating chip includes an identifier (a serial number) thatis transmitted by the override transmitter with each overridetransmission and passed on by the unrestricted phone to the network. Aseach authentication is performed, data is tracked to identify anyrepeated use of an override transmitter that is inconsistent with properuse. For example, the data may show that a crypto-authenticating chiphas been duplicated or simulated and appears to be used simultaneouslyin two different places.

The serial numbers also identify the class of vehicle in which thetransmitter is to be installed, whether a small passenger vehicle suchas a taxi, mid-size, such as a van or small bus, or large vehicle. Ifthe transmitter is resold after its first use, it may only be used inthe proper class of vehicle. If it is used in a different class ofvehicle, the verification data base comparison service will flag thatthe uses appear to be incompatible with use in the proper class. Thiswill allow any stolen or improperly resold override transmitter to bediscovered and not allow further unrestricting by the transmitter.

In some cases, the override transmitter may be a neighbor cell phone 2,as described below. In these cases, an identifier of the neighbor phoneknown to the network, such as its phone number or IMSI number, is usedfor authentication to the network.

Communications with Vehicle Mounted Unrestricting Controllers

Each phone with a recently issued phone number will be restricted whenin motion in the implemented area unless the phone receives an overridesignal that verifies the phone may be unrestricted. The speeddetermination for restricting control will be done in each phone and/orits network. However, automobiles made in the future will includeprocessors that control restricting of dashboard mounted electronics andthese same processors should also control restricting of each phone inthe vehicle as a function of input from sensors mounted on the vehiclethat detect speed, passengers present, approaching particularintersections, and other useful inputs.

Communications from the vehicle mounted restriction control processor 21to a hand held communications device, such as a cell phone 1, can beestablished by Bluetooth or WLAN or 802.11 or any other radiocommunications protocol, including cell phone protocols. The user of thenew phone that wants it to be unrestricted while moving presses a key toaccept the connection to the vehicle mounted controller 21, so there isnever a problem with automatic connection to a controller in anothervehicle. The communication protocol is used to exchange theauthentication data strings described above as well as commands tounrestrict or rerestrict.

Each new phone with motion-restriction capability should include thecapability to have control of its motion-restriction taken over by avehicle controller that is then authenticated to the net work by theprocess described above. This will be used in few cars at first, but thenumber of cars with such a feature will increase over time.

Bases for Determining Permission to Unrestrict

Each telephone network can decide which methods for determiningpermission to unrestrict will work with its phones, and these methodscan be changed over time by download. The effect of unrestricting can bemore limited or zero for phones of children or employees. These methodsfall into three classes:

-   -   (1) detection of a passenger who will act as “chaperone” for the        driver, in which case all phones in the vehicle may be        unrestricted,    -   (2) detection that the phone in question 1 does not have a        display in a location where the driver can read it, and    -   (3) the phone is in a mass transit vehicle.

Private vehicles made in the future will include methods 1 or 2 (orboth) in a built-in unrestricting controller with override transmitter.Such methods suitable for manufacturing in vehicles are detailed in aseparate document. Methods that are suitable for retrofit into existingvehicles, and having compatibility with future built-in systems, aredescribed below.

Retrofit Override Transmitter Detects Presence of a Passenger

A simple method for determining unrestricting relies on desire forself-preservation: passengers 3 will watch what the driver 4 is doingand intervene if the driver is doing something dangerous. Therefore,when a competent passenger is present (and acting as a chaperone), it ismuch less important to restrict the driver's phone 2 than when nopassengers are present.

There are two methods to detect whether a passenger is present:

-   -   (1) sensing of conducted heat or radiated heat or mass or        capacitance of the passenger's body 3 or some combination of        these, and    -   (2) detecting (with authentication) a wireless electronic        device, such as a cell phone, carried by the passenger.

Two preferred embodiments are described below. In some embodiments, thedetectors cannot distinguish between the body or cell phone of apassenger and that of the driver. In these embodiments, the system isdesigned to detect the presence of two bodies or two cell phones.

Driver's Cell Phone (Conventional or New) Acts as an OverrideTransmitter for the Passenger Phone

A preferred embodiment is to program each new phone 1 with an addedfeature that determines whether there are at least two active phones inthe vehicle and, if there are, unrestricts each new phone 1 orunrestricts each new phone that requests unrestricting if a user of theneighbor phone 2 enters input to approve the unrestricting. Existingphones can accomplish this by one of two ways:

-   -   (1) Establishing a Bluetooth or similar connection 6 and an SMS        connection 7, 8 between the phones and using the two together        for authentication, or    -   (2) Simulating a base station to communicate with the neighbor        phone and obtaining its identifying number for authentication.

New phones can include additional features to act as an unrestrictingoverride transmitter for other new phones by other methods.

Use of SMS and Bluetooth Together

The new phone 1 and any neighbor phone 2 in the vehicle can connect byBluetooth 6 (or any other similar protocol), with a user of each phone3, 4 providing any required user permissions. In a preferred embodiment,an enigmatic data string that would be impractical or impossible for auser to enter at a phone keyboard is passed between the new phone 1 andthe neighbor phone 2 by SMS via their network connections 7, 8 to acellular base station 9. It is also sent between the neighbor phone 2and the new phone 1 by their Bluetooth connection 6 (or by SMS with aseparate validating message sent by their Bluetooth connection).

This pair of transmissions, comprising one communication on each linkand data in one transmission dependent on data in the other, establishesa correct telephone network number for the neighbor phone, and, becausethe phones are connected by Bluetooth establishes that they are neareach other. Having established these two elements, the new phone 1 mayunrestrict itself. The unrestricting may be designed to require a user 4of the neighbor phone 2 to provide input giving permission for the newphone to unrestrict.

After unrestricting, the new phone sends the confirmed number of theneighbor phone 2 to the network Mobile Switching Center 11 (or it wascaptured by the network from the SMS message between the phones) where adetermination is made whether the usage patterns of the two phones showthey are usually used by different people. An algorithm for making thisdetermination is in Appendix B. If the data shows they are not used bydifferent people, the network sends a message back to the new phonecommanding it to rerestrict.

The enigmatic data string may be generated by a pseudo-random numbergenerating algorithm or may be one of many such strings stored in amemory and selected by rotation. It may have as few as 6 bits if it isnot viewable by the sender or not enterable by the receiver (or both).The subterfuge to be avoided is that a solo driver has two phones andsends the enigmatic string to a not-present phone by SMS and then sendsthe same string from his present second phone back to his first phone bythe Bluetooth connection.

New phones can include additional features to act as an unrestrictingoverride transmitter, such as a crypto-chip that securely passes theneighbor's network identifier to the new phone to eliminate the need forthe SMS transmission between the phones, or other secure method totransmit an identifier of the unrestricting phone for authentication bythe network.

Additional details on this SMS plus local radio link (such as Bluetooth)method for authentication are described in Appendix C.

New Phone Simulates a Base Station

This method works by the new phone 1 communicating like a base stationwith each cell phone in the vehicle. If it establishes bi-directionalcommunication with at least one other active phone 2 in the vehicle, itauthorizes itself to be unrestricted. For authentication, the otheractive phone transmits its network identifier to the new phone whichtransmits it to the network where a determination is made whether theusage patterns of the two phones show they are used by different people.Each new phone can include this feature.

The new phone 1 transmits a base station signal for each networkavailable in the area. Each transmitted signal is strong enough to bestronger than the ambient base station signals for any phone withinabout 2 meters. When a nearby phone 2 detects the base station signal,it sends a request to connect if the signal is stronger than any otherfor its network. The new phone 1 responds with a request for anidentifier of the nearby phone and, after it receives the identifier,rejects the request to connect. Communications from the detected phone 2to the new phone 1 are sent at least two times and the phone unrestrictsitself only if the signals have low variation in strength, indicatingthat the two phones are moving together and not in different vehicles.

To minimize subterfuge, the new cell phone obtains the identifier (phonenumber) of each detected active phone in the same vehicle. If a phone isdetected, the new phone is unrestricted. If two such phones aredetected, no further checking step is taken. If only one is detected,the new phone sends its number to the network for the network todetermine whether this number is one that should not allowunrestricting. The number will not allow unrestricting if the networkreports that the new phone and the detected phone have usage patternswhich indicate that the phones are used by a single person, in whichcase the network will respond with a command to the new phone 1 torerestrict.

Retrofit Vehicle Mounted Override Transmitter for General Use

Power drain on the battery of each new phone 1 and each conventionalphone 2 that it might detect can be reduced by adding to the vehicle anoverride transmitter 21, shown in FIGS. 2-4, that detects the presenceof two people 3, 4 in the vehicle 5 and authorizes each new phone in thevehicle to be unrestricted.

The override transmitter 21 establishes bi-directional radiocommunications with each new phone 1 in the vehicle, as described above,and uses this link to authenticate the override transmitter 21 to thenetwork, as described above, and to control unrestricting of the phone1. When the phone 1 is thus controlled while moving faster than thethreshold speed, it does not need to monitor its speed internally,saving battery life. For determining speed, the override transmitter 21includes a GPS circuit, and perhaps an accelerometer to extend batterylife as described above.

The retrofit override transmitter can detect the presence of two people3, 4 by either of the two methods previously mentioned:

-   -   (1) detecting the presence in the vehicle of at least two cell        phones, and    -   (2) sensing of conducted heat or radiated heat or mass or        capacitance of the peoples' bodies 3, 4 or some combination of        these.

For method 1, the phones can be detected by simulating a base station asdescribed above. However, it is preferable for phones in the vehicle tobe sensed by Bluetooth 6 or other local radio connection link built intothe phone. For authentication, the phone to be unrestricted can send atext (SMS) message 8 to the other phone 2 in the vehicle using thatphone's number (network identifier) and then receive from that phone 2 aresponse though the local radio link 6. Or the local radio link 6 can beused to cause the neighbor phone to send an SMS message 7 to the newphone 1. The network performs a verification that the neighbor phone'snumber is valid for unrestricting (usage pattern shows use by separatepeople) and commands the new phone to rerestrict if the number is notvalid.

When designed to use method 2 above (sensing of two people), the vehiclemounted override transmitter 21 has an advantage over method 1 and themethod of using the driver's cell phone as an override transmitter inthat the driver is not required to carry a cell phone to make thisdevice functional. In method 2, authentication may be accomplished witha crypto-authenticating chip mounted in the override transmitter 21 asdescribed above.

For method 2, the vehicle mounted override transmitter 21 can includetwo small cameras 28, 29 mounted so that their fields of vision do noteffectively overlap and diverge at about 80-150 degrees from each other,as shown in FIGS. 2 and 4. The angle can be adjustable provided itcannot be adjusted to achieve effective overlap. Each camera 28, 29 issensitive to radiated heat (infra-red). Each camera is coupled to animage processor that determines whether an object in view is enoughwarmer than its surroundings and large enough (covers enough pixels)that it is adult-human-like. When the override transmitter 21 is mountedin the vehicle 15, one camera 28 is aimed at the driver's seat and theother camera 29 is aimed at the passenger's seat (or any two seats). Thetransmitter 21 sends an override unrestricting signal to any new phonein the vehicle when it detects the apparent presence of twolive-adult-like objects.

The above described retrofit override transmitter with cameras requiresthe following components: (1) power supply, (2) two small IR cameras 28,29 of the size used in cell phones, (3) image processor, (4) Bluetoothcircuit and antenna, (5) crypto-authentication chip, (6) GPS circuit,and (7) control processor. These circuits can be integrated and thedevice can be made quite small with low power drain.

The retrofit override transmitter with cameras 21 can be adjusted tovery rarely fail to detect the presence of two adult bodies (falsenegative). The only substantial risk of a false positive is if a youngsolo driver carries a large dog or a large child or an incompetent adultin the passenger seat. Other large objects would not give a falsepositive because they would not radiate enough heat. If either camera28, 29 is covered or otherwise disabled, no phone will be unrestricted.

The vehicle mounted override transmitter device may get its power fromthe vehicle, such as by plugging into a cigarette lighter. Or it may bebattery powered to eliminate the need for a wire to a power source. Thebattery may be recharged by a solar cell 24. The device may be designedto adhere to the windshield of a vehicle 15, such as via suction cups25, 26, with a solar cell 24 on the adhesive side. To save battery life,the device may include an accelerometer and go to sleep when it detectsno acceleration above a threshold A1 for more than M1 minutes, wakingagain when A1 is exceeded. An LED 30 mounted on the rearward side 22 mayindicate when the device is operating.

Passenger Phone Unrestricting Transmitters for Mass Transit Vehicles

In mass transit vehicles that pass through areas affected by therestricting system, unrestricting override transmitters will beinstalled. The override transmitters will establish bi-directional radiocommunications with each new phone in the vehicle by Bluetooth or 802.11or WLAN or any other similar protocol and unrestrict each phone in thevehicle upon request by the phone user.

The crypto-authenticating chip in each mass transit vehicle will send aspecial number recognized by the network as a number that was issued toa particular mass transit company. The use of the crypto-authenticatingchips will be tracked as described above to detect theft or other abuse.

Drivers of mass transit vehicles can be required by their employers tocarry phones that will not unrestrict in that vehicle. Phones ofchildren or employees that are programmed to be not unrestrict when twoadults are in the vehicle (unlike the phones of independent adults) willstill unrestrict when they are in mass transit vehicles.

Appendix A—Method for Importance Query Before Putting a Call Through toa Driver and Holding Pushed Data

-   1. The new phone 1 is moving at a speed that requires restricting.    The new phone searches for an unrestricting override transmitter. If    one is found, it completes the process of unrestricting, if    available.-   2. If the new phone must remain restricted, it reports this status    to the network. There may be several different restricted status    states, as determined by the phone or the override transmitter.-   3. When the network receives a call for a restricted phone in a    state when only important voice calls will be put through, it plays    a message to the caller such as “The person you are calling is    driving. Is this call important enough to put through? Say yes or no    or press 1 for yes or 2 for no.”-   4. If the answer is yes, the call is put through.-   5. During the driving restricted status state, the network holds SMS    messages and all pushed data such as RSS feeds, Twitter messages and    web messages to put through after the restricted status state ends.-   6. When the phone exits the restricted status state, it reports its    new state to the network.

Appendix B—Algorithm for Comparing Phone Usage Patterns

A usage data set, or derivative of the set, is stored for each phone.Comparisons of the usage data set for the new phone to the usage dataset for the neighbor phone indicate whether the phones are likely usedby a single person.

Each data set contains usage information for a phone over the last D1days. A likely preferred number for D1 is 20. Each data set is updatednightly and the oldest day's information deleted. The data for each dayincludes the start and stop time for each voice call and the numberconnected to, the destination of each text message, and anidentification of the cell in which the phone was located.

When a message is received by the network that a new phone hasunrestricted based on detection of a neighbor phone, the network systemcontacts the system of the network carrier for the neighbor phone andrequests the usage data set (or an update to the set it already has) forthe neighbor phone (unless it already has the full data set from a priorrequest).

A first comparison looks at how often phone A is in use for voice butnot connected to phone B at the same time that phone B is in use but notconnected to phone A, relative to how often each is in use connected toother phones not simultaneously. If the phones are often used but rarelyused simultaneously while not connected to each other, the phones arelikely used by a single person. If this comparison exceeds a threshold,the phones are presumed to be used by a single person and at othercomparisons may rebut this presumption.

A second comparison looks at how often phone A is connected to phone Brelative to phone A's connection to other phones, and how often phone Bis connected to phone A relative to phone B's connection to otherphones, both for voice calls and for text calls. If they are frequentlyconnected to each other relative to other phones, the presumption isrebutted.

A third comparison looks at cell identifications when the phones areconnected to each other. If the cell identifications are different oftenrelative to the number of calls made and/or connections between thephones, the presumption is rebutted.

This algorithm can be changed at any time to avoid scamming abuse.

Appendix C—Details on Bluetooth+SMS Unrestricting Authentication

This authentication method comprises core functionality that will workwith nearly all Bluetooth enabled cell phones plus several levels ofenhanced functionality that will work with phones that have newerBluetooth profiles and protocols. Vehicle owners or drivers who wish tohelp their passengers avoid the automatic restricting can download intotheir Bluetooth enabled phones application programs that add enhancedfunctionality. Steps in the process include:

-   1. The new phone 1 is moving at a speed that requires restricting.-   7. A new phone user 3 starts an action that is not allowed in    restricted mode.-   8. The new phone begins a Bluetooth search for neighbor cell phones.    If one is found, the new phone requests a connection 6. If two or    more neighbor phones are found, it sends requests to each to    determine which has the best profile and protocol support for the    unrestricting authentication and presents to the user options for    the user to choose which one to connect to.-   9. The neighbor phone 2 receives the request to connect and presents    the request to its user 4. If the user has previously allowed this    connection, it connects automatically.-   10. If the network identifier (phone number/IMSI) for the neighbor    phone is not known to the new phone 1 (stored in a memory), the new    phone requests it. It can be sent by the neighbor phone 2 by    Bluetooth 6 or by SMS 7, 8 to the new phone. If it is sent by SMS,    the message can include an enigmatic data string which was    previously sent by the new phone via the Bluetooth link. If it is    not sent by the neighbor phone 2, the new phone user 3 can enter it    manually.-   11. An SMS message must be sent between the phones via their network    connections 7, 8, in either direction, to confirm to the new phone    (and the network) that the number is correct for the neighbor phone    (for authentication of the neighbor phone acting as an override    transmitter). For security, the message may also contain an    enigmatic data string. A separate data packet containing the string    or based on the string must also be sent via the Bluetooth    connection 6, either before or after the SMS message is sent and in    either direction. The enigmatic data string may be generated in    either phone. For simplicity, it is preferably generated in the new    phone 1.-   12. An application program downloaded into the neighbor phone 2    passes the enigmatic data string between the Bluetooth connection 6    and the SMS connection 7. Once the owner of the neighbor phone 2 has    approved the use of this phone as an override transmitter for a    particular new phone 1 (or all new phones), the connections and    transmissions will happen automatically with no action required by    the user of the neighbor phone 2.-   13. If the neighbor phone 2 cannot be programmed to forward a data    string from one connection to the other, the enigmatic data string    can consist of binary numbers that cause a display of strange    characters that are difficult for humans to key into a keypad, i.e.    non-alpha-numerics. The string of strange characters may be copied    and pasted by the user of the neighbor phone from one connection to    the other.-   14. If the neighbor phone is a new phone, it's restricting function    is designed to allow automatic passing of SMS messages described    above, even though user display functions for SMS messaging are    restricted due to motion.-   15. At this point, the new phone 1 unrestricts itself and sends to    the network the phone number (network identifier) of the neighbor    phone 2 and the network compares usage patterns of the new phone and    the neighbor phone using the method described in Appendix B. If the    phones are determined to be typically used by a single person, the    network sends a command back to the new phone 1 to rerestrict and    not accept again that neighbor phone 2 for unrestricting for D2    days. A preferred number for D2 is 4 days.

Here is a particular implementation of the above described method:

New Phone:

1. When speed exceeds about 15 mph, SMS ringing and message displays areprevented. The display looks different to show the restriction: a newbackground color (red) or a large new symbol or the word “Restricted”appears on the display. Display returns to normal about 2 minutes afterspeed drops below threshold.

2. User presses an “unrestrict” button or tries to read or compose aSMS. Phone detects nearby Bluetooth devices and display lists the “old”phone. User instructs to connect. If connection is accepted, phone sendsnew phone's number and a pseudo-random (“enigmatic”) numeric string.

Old Phone:

3. Bluetooth connection request is received. Program causes the phone toaccept the request (perhaps with user input) and uses the data from theBluetooth connection to automatically send an SMS message to the newphone, including the enigmatic data string. Program can be set torequire user acceptance of the Bluetooth connection every time or thefirst time.

New Phone:

4. Receives SMS message (and suppresses the ring and display of the SMSmessage). Unrestricts to show normal display and allow normal use.

5. Every 2-4 minutes, new phone checks for Bluetooth connection. If ithas failed, the connection is reestablished. If it cannot bereestablished and the phone is still moving, the phone is againrestricted and returned to step 1.

Old Phone:

6. Reestablish connection on request (without requiring user input ifeasy to do).

Claims Determine Scope of Inventions:

The scope of inventions taught in this document is not to be limited bythe description above. The scope is as broad as the following claims.

The invention claimed is:
 1. A device for detecting the presence of twolive-human-like bodies in a vehicle, comprising: (a) a first infraredradiation detector aimed to detect presence of a first human-size warmbody; (b) a second infrared radiation detector aimed to detect presenceof a second human-size warm body; and (c) a detected radiation analysiscircuit that determines whether the pattern of radiation appears to beemitted from two live-human-like bodies in the vehicle.
 2. The device ofclaim 1 further comprising a transmitting circuit that transmits radiosignals to report the detection of two live-human-like bodies.
 3. Thedevice of claim 1 further comprising a recoding circuit that makes arecord of the detection of two live-human-like bodies.
 4. The device ofclaim 1 wherein the first detector and the second detector are combinedinto one wide-angle detector.
 5. The device of claim 1 furthercomprising an authentication circuit.