Methods and systems related to remote power loss detection

ABSTRACT

Remote power loss detection. At least some of the example embodiments are methods including: tracking location of an asset by an onboard device mechanically coupled to the asset, the onboard device electrically coupled to a source of power of the asset, and the onboard device receiving power from the asset; charging a supercapacitor coupled to the onboard device; and then detecting a complete loss of power provided to the onboard device, and the detecting by the onboard device; and after the complete loss of power sending a message by wireless transmission, the sending based on power derived from the supercapacitor, and the message including an indication of a last known voltage provide by the asset prior to the complete loss of power, and the sending by the onboard device after the complete loss of power.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.14/552,631 titled “Methods and Systems Related to Remote TamperDetection,” filed Nov. 25, 2014, which is a continuation of U.S. patentapplication Ser. No. 13/828,182 titled “Methods and Systems Related toRemote Tamper Detection,” filed Mar. 14, 2013 (now U.S. Pat. No.8,928,471). Both applications are incorporated herein by reference as ifreproduced in full below.

BACKGROUND

In situations where an individual has obtained financing for an asset,such as a vehicle, financing institutions may be interested in trackingthe location of the asset. Tracking the location of the asset may bebeneficial in ensuring the borrower does not abscond with the asset, orotherwise fails to make payments. Thus, advancements in trackingfinanced assets may result in a lower payment default.

BRIEF DESCRIPTION OF THE DRAWINGS

For a detailed description of exemplary embodiments, reference will nowbe made to the accompanying drawings in which:

FIG. 1 shows, in block diagram form, a system in accordance with atleast some embodiments;

FIG. 2 shows, in block diagram form, a circuit diagram in accordancewith at least some embodiments;

FIG. 3 shows, in block diagram form, a system in accordance with atleast some embodiments;

FIG. 4 shows, in block diagram form, a system in accordance with atleast some embodiments;

FIG. 5 shows a graph in accordance with at least some embodiments;

FIG. 6 shows a computer system in accordance with at least someembodiments; and

FIG. 7 shows, in block diagram form, a method in accordance with atleast some embodiments.

NOTATION AND NOMENCLATURE

Certain terms are used throughout the following description and claimsto refer to particular system components. As one skilled in the art willappreciate, different companies may refer to a component and/or methodby different names. This document does not intend to distinguish betweencomponents and/or methods that differ in name but not in function.

In the following discussion and in the claims, the terms “including” and“comprising” are used in an open-ended fashion, and thus should beinterpreted to mean “including, but not limited to . . . .” Also, theterm “couple” or “couples” is intended to mean either an indirect ordirect connection. Thus, if a first device couples to a second devicethat connection may be through a direct connection or through anindirect connection via other devices and connections.

“Remote” shall mean one kilometer or more.

“Supercapacitor” shall mean one or more electrical components, eitheralone or in parallel, having a capacitive density of at least 3.0millifarads per cubic millimeter (mF/mm³).

DETAILED DESCRIPTION

The following discussion is directed to various embodiments of theinvention. Although one or more of these embodiments may be preferred,the embodiments disclosed should not be interpreted, or otherwise used,as limiting the scope of the disclosure, including the claims. Inaddition, one skilled in the art will understand that the followingdescription has broad application, and the discussion of any embodimentis meant only to be exemplary of that embodiment, and not intended tointimate that the scope of the disclosure, including the claims, islimited to that embodiment.

Various embodiments are directed to systems and methods of providingauxiliary power to an onboard device coupled to an asset, such as avehicle. In particular, if someone tampers with the onboard device suchthat power to the onboard device is lost or significantly reduced, theonboard device will retain enough stored energy to send an alert relatedto tampering to a remote location. The developmental context is sendingtamper alerts, and thus the specification will be based on thedevelopment context for onboard devices coupled to vehicles; however,the developmental context shall not be read as a limitation as to theapplicability of the various embodiments. The specification first turnsto a high level system overview.

FIG. 1 shows, in block diagram form, a system in accordance with atleast some embodiments. In particular, the system comprises anoperations center 100 communicatively coupled to a vehicle 114 by way ofa wireless network 110. The operations center 100 comprises a processor102. In some embodiments, the processor 102 may be a stand-alonecomputer system, or the processor may comprise a plurality of computersystems communicatively coupled and performing the functions of theoperations center 100, the functions discussed more thoroughly below.The processor 102 may couple to an administrative user interface 104.The administrative user interface 104 may enable an administrative agent106 to control or configure the operation of the system.

In one embodiment, in order to communicate with vehicle 114, theoperations center 100 may further comprise a network interface 108communicatively coupled to the processor 102. By way of the networkinterface 108, the processor 102, and any programs executing thereon,may communicate with vehicle 114, such as by wireless network 110.Wireless network 110 is illustrative of any suitable communicationsnetwork, such as a cellular network, a Wireless Fidelity (Wi-Fi)network, or other mechanism for transmitting information between theoperations center 100 and the vehicle 114.

In accordance with at least some embodiments, the operations center 100is remotely located from the vehicle 114. In some cases, the operationscenter 100 and vehicle 114 may be located within the same city or state.In other cases, the operations center 100 may be many hundreds orthousands of miles from vehicle 114, and thus the illustrative wirelessnetwork 110 may span several different types of communication networks.

Still referring to FIG. 1, the system further comprises a vehicle 114communicatively coupled to operations center 100 by way of theillustrative wireless network 110. The vehicle 114 may comprise onboarddevice 116, where onboard device 116 may have both location trackingcapabilities and/or vehicle disablement capabilities.

In particular, onboard device 116 may comprise a computer system 118.Although not specifically shown, computer system 118 may comprise aprocessor, where the processor may communicate with subsystems of thevehicle, such as a computer system of the vehicle 114 (not specificallyshown). An example onboard device 116 configured to couple to the OBD-IIport may also have the ability to read or determine data associated withthe vehicle 114, and may also have the ability to command computersystems of the vehicle to disable certain functions (e.g. starting,spark ignition, fuel system) such that the vehicle 114 may be disabledat the command of the onboard device 116, discussed in more detailbelow.

Onboard device 116 may further comprise a wireless network interface 112coupled to the computer system 118. By way of the wireless networkinterface 112, programs executed by the computer system 118 maycommunicate with other devices. In some embodiments, the wirelessnetwork interface 112 enables the computer system 118 to communicatewith operations center 100 by way of a wireless transmission through thewireless network 110. The wireless network interface 112 thus implementsa wireless communication system and/or protocol.

In one embodiment, onboard device 116 may comprise a disablement system128 that can selectively disable the vehicle 114. Disablement may takemany forms. For example, the onboard device may disable the vehicle bydisabling the spark ignition system, disabling the fuel pump relay,disabling by way of a starter interrupt, or a combination of disablingmechanisms. In other embodiments, the onboard device 116 may be a relayreplacement device. For example, a starter relay is a device within avehicle that, when activated, provides electrical current to thesolenoid of the starter. In yet another case, the onboard device 116 maybe a relay replacement device for any system that could disable thevehicle (e.g., either prevents the motor from starting, or prevents themotor from continuing to operate).

In addition, onboard device 116 may disable vehicle 114 on command fromthe operations center 100. In particular, the operations center maycomprise disablement services described above, and at the request of anyauthorized entity (e.g., an administrative agent, a lending institution,a dealership), vehicle 114 may be disabled.

The onboard device 116 further comprises a global position system (GPS)receiver 120 coupled to computer system 118. The GPS receiver 120receives signals from an array of GPS satellites orbiting the earth, andbased on timing associated with arrival of those signals, a location ofthe onboard device 116 (and thus the vehicle 114) can be determined. Insome cases, the GPS receiver 120 has sufficient functionality tocalculate location, and thus the data passed to computer system 118 maybe a direct indication of location. In other cases, the functionality todetermine location may be shared between the GPS receiver 120 andsoftware executing on the processor 102, by way of wireless network 110.That is, the GPS receiver 120 may receive the plurality of GPS signalsand pass the information to a program on the processor 102, whichprogram may then make the determination as to location of the onboarddevice 116, and thus the vehicle 114.

In one embodiment, the onboard device 116 tracks the vehicle with highprecision, thus one may be able to identify the street and block atwhich the vehicle is passing at any given time (though the onboarddevice 116 may not necessarily have or contain street level databases).In other cases, the onboard device 116 may act only to determine theend-points of each trip. In another embodiment, location tracking may beaccomplished by way of cellular signal triangulation.

In some cases, the location determined by the onboard device 116 mayonly be a position on the face of the earth, for example, latitude orlongitude. The operations center 100, receiving a stream of locationsfrom the onboard device 116, may correlate to streets and addresses. Inother cases, the onboard device 116 may have sufficient memory andcomputing functionality to not only determine position in a latitude andlongitude sense, but also to correlate the positions to cities, streets,block numbers and addresses. Regardless of how the location tracking isaccomplished, it may be utilized as a way to locate and, in some cases,aid in retrieving the vehicle for repossession in the event of anon-payment.

Consider the following example situation. A driver purchases vehicle 114by receiving financing from a financing institution (e.g., a bank, adealership). The financing institution may request that onboard device116 be installed within vehicle 114 to track the location of the vehicleand/or to disable the vehicle in the event of a non-payment. The driver,aware of the possibility of disablement or repossession in the event ofa non-payment, may attempt to tamper with onboard device 116 bydisconnecting the external power source (such as from the vehiclebattery) to the onboard device, or by removing the onboard device fromthe vehicle completely.

In order to frustrate potential tampering of the onboard device, theonboard device may be located in an inconspicuous location, such aswithin an electrical compartment under the hood or within the luggagecompartment. On the other hand, the onboard device may also be locatedin a more conspicuous location, such as under the dashboard of thevehicle.

If a driver does disconnect power to the onboard device, the onboarddevice may recognize the loss of external power as a tampering event,and may send any of a plurality of messages, data, and/or alerts to theoperations center 100 or to a third party 130 (e.g., an administrativeagent, a lending institution, or a vehicle dealership). In particular,the onboard device may send an indication of last known location, thelast known voltage provided to the onboard device before the power loss,and/or an indication of the trend of voltage provided to the onboarddevice before the power loss.

Due to the fact the onboard device is, at least in some embodiments,powered by a source of power of the vehicle, disconnecting the onboarddevice from the power may render the onboard device lacking in enoughpower to send messages and alerts related to tampering. To combat theissue, the onboard device comprises an auxiliary short-term powersource. In one embodiment, the auxiliary power source may be a battery,such as a lithium-ion battery; however, the use of a battery may haveseveral drawbacks. In particular, a lithium-ion battery may berestricted by temperature; when the temperature is low, the batterypower may be reduced, and when the temperature is too high, the lifespanof the battery may be severely depleted. Furthermore, continuouscharging cycles of a lithium-ion battery may result in a shortenedlifespan, thus resulting in the extra cost and wasted time of replacingbatteries. In another embodiment, the auxiliary short-term power sourcemay be one or a series of capacitors; however, the amount of physicalvolume needed for related-art capacitors of sufficient capacity tooperate the onboard device, even for a short period of time, may beprohibitive.

In other cases, the auxiliary power source for the onboard device may bea supercapacitor, where the supercapacitor is a capacitor having a highenergy density. For example, the supercapacitor 124 shown in FIG. 1 maybe a 0.2 Farad capacitor having an energy or capacitive density of atleast 3.0 millifarads per cubic millimeter (mF/mm³). When the onboarddevice is connected to the external power source (i.e., the vehiclebattery), supercapacitor charges. The interplay between the vehiclebattery, the supercapacitor, and the onboard device is shown in moredetail in FIG. 2.

FIG. 2 shows, in block diagram form, a high level circuit diagram. Inparticular, onboard device 116 may receive power from vehicle battery200. In this specific example, the input voltage to the onboard device116 (shown within the dotted line) may be 12 volts from the vehiclebattery. Voltage regulator 202 converts the incoming voltage toapproximately 3.3 volts in example systems, though any internal voltagemay be used. A diode 204 serves to prevent a backflow of current fromthe supercapacitor 124 during periods of time when battery 200 has beendisconnected from the onboard device 116.

While connected to the vehicle battery 200, the supercapacitor 124charges and the onboard device 116, including tamper detection elements206, receive operating power from the vehicle battery. The tamperdetection elements 206 may comprise a plurality of elements used intamper detection, location tracking, and disablement. Although specificsregarding the tamper detection elements 206 will be described in moredetail below, in general, while connected to the vehicle battery, any orall of the elements of the onboard device may be receiving operatingpower; however, in the situation where external power has been lost, inorder to conserve power stored on the supercapacitor only some of theelements of onboard device 116 (tamper detection elements 206) mayreceive power from the supercapacitor 124.

FIG. 3 shows, in block diagram form, a high level overview of an exampleembodiment. In particular, onboard device 116 is shown as connected to,and receiving power from, vehicle battery 200. In addition, a pluralityof tamper detection elements 206, coupled to the onboard device, arealso receiving power from the vehicle battery 200. For example, whilethe onboard device is receiving power from the vehicle battery, all theelectrical components of the onboard device 116 may be receiving powerfrom the battery 200, including the tamper detection elements. Inaddition during the time the onboard device is receiving power from thevehicle battery, the supercapacitor coupled to the onboard device ischarging or charged.

FIG. 4 shows, in block diagram form, a high level overview of an exampleembodiment. In particular, the onboard device 116 has been disconnectedfrom the vehicle battery (such as by a person tampering with thedevice), and the onboard device 116 is thus no longer receiving powerfrom the external source. During a period of time after the vehiclebattery is not providing power to the onboard device, the onboard deviceis powered by the supercapacitor until such time as the supercapacitorno longer maintains a charge. Due to the amount of charge thesupercapacitor can maintain, it is possible that the onboard device mayonly be powered for small finite period of time, such as three to fourseconds after the loss of external power. As a result, in order toensure the messages and data related to tampering are able to betransmitted to the operations center or third party, the onboard devicemay execute instructions to provide power to only the tamper detectionelements 206 needed for retrieval of power loss relevant information andwireless transmission of messages related to the loss of power.

In one embodiment, the last known location of the onboard devicereceived by the GPS receiver may be stored in memory on the computersystem 118. Thus, in an external power loss situation, the onboarddevice, now powered by the supercapacitor, may shut down power to theGPS receiver and rely on the last stored indication of location inmemory. In another embodiment, the onboard device may executeinstructions to power down the disablement system 128. Thus, during thetime the onboard device is powered by the supercapacitor, thesupercapacitor may be providing power solely to the computer system (ora portion of the computer system) and the wireless network interface.

Regardless of which elements of the onboard device receive power fromthe supercapacitor, if external power is lost to the onboard device, thesupercapacitor provides enough power for the onboard device to send amessage regarding the power loss. In one embodiment, the onboard device,detecting a power loss, may wirelessly transmit an indication of thelast known location of the vehicle, where the last known location of thevehicle may aid in locating the vehicle for repossession. In anotherembodiment, the onboard device may wirelessly transmit an indication ofthe last known voltage provided by the vehicle battery before the lossof power. In yet another embodiment, the onboard device may wirelesslytransmit an indication of the trend of voltage provided by the vehiclebattery prior to the power loss. Data and messages transmitted from theonboard device to the operations center and/or the third party may alertthe operations center and/or third party to a potential tampersituation.

Not every power loss to the onboard device 116 is indicative oftampering. Thus, onboard device 116 may send data to the operationscenter and/or a third party in order to provide context for analysis ofthe power loss situation. For example, in addition to sending anindication of last known location, the onboard device may send a valueindicative of the last known voltage prior to the power loss, and/or avalue indicative of the trend of voltage for a predetermined period oftime prior to the power loss (e.g., the minute before power loss isdetected). In another embodiment, the onboard device 116 mayperiodically send an indication of the voltage during periods of timewhen the vehicle battery is supply power. Thus, the trend of voltage maybe determined and/or analyzed by the operations center. On the otherhand, the onboard device may have the capability to analyze thesituation to determine whether the power loss is or is not indicative oftampering.

FIG. 5 shows example voltages over time for plurality of power losssituations. In particular, FIG. 5 shows, in graphical form, threeexample voltage trend lines for the onboard device 116 receiving voltagefrom the vehicle battery. A sudden change from constant 12 volts to zerovolts, as shown by dashed line 502, may be indicative of a tampersituation. In this example situation, the supercapacitor would power thetamper detection elements of the onboard device to send off appropriatetamper related messages to the operations center and/or third party. Inparticular, the onboard device may send an indication of the last knownlocation of the onboard device, the last known voltage before the powerloss, and/or an indication of a trend of voltage before the power loss.

In the example situation related to dashed line 502, the last knownvoltage and trend of voltage are both approximately 12 volts; thus, thesudden change of voltage between 12 volts and zero volts may beindicative of disconnecting the onboard device 116 from the externalpower supply, and likely indicates tampering with the device. Thelikelihood of tamper in any particular situation may be analyzed at theoperations center, by the onboard device 116, or both.

FIG. 5 further illustrates another potential situation by solid line504. In this example, the voltage trend of a negative slope before avoltage drop to zero may be indicative of a problem with the battery,such as degradation due to extreme temperatures, or a slow drain onpower resulting from leaving a cabin light on in the vehicle. Becausethere is not a sudden drop in voltage from a fully charged state, butrather a trend of power loss, the example shown by line 504 is likelynot indicative of a tamper situation. Nevertheless, in the examplesituation related to dashed line 504 the onboard device 116 (powered bysupercapacitor 124) may still send a message to the operations centerwith any or all the previously discussed information. In another examplesystem, however, the onboard device 116 may judge the situation as not atamper situation, and refrain from sending the tamper message in spiteof the loss of power to the onboard device 116.

In other cases, the last known voltage and the trend of voltagedetermined at the time power is lost to the onboard device may initiallyseem like a tamper situation (i.e., dashed line 502), but may later beindicative of a legitimate, non-tamper situation. In particular, theonboard device may recognize a sudden drop in voltage and power loss, asshown by line 502, and thus, the onboard device reacts by sending tamperrelated messages to the operations center and/or third party. A shorttime later, the vehicle battery may be reconnected to the onboarddevice. The onboard device reacts to the power being restored by sendinga message to the operations center and/or third party that power hasbeen restored. In addition, the onboard device may send data related tothe new trend in voltage, as shown by dashed-dot-dashed line 504. Thisexample situation, while initially indicative of tampering, the powerloss notification may actually be indicative of a legitimate power loss,such as routine maintenance on the vehicle. A situation where the timebetween the loss of power and the regain of power is short, such as 10or fewer seconds, is more likely indicative of a legitimate hiccup inthe power. Additionally, a temporary power loss of a couple of hours maybe indicative of maintenance. On the other hand, however, the longer theperiod of time between the loss of power and the regain of power, themore likely there has been tampering with the onboard board device.Thus, the message received by the remote operations center and/or by thethird party of the return of power provides additional analyticalcontext.

In addition to an analysis of voltages over time, other contextualevidence may be used to determine whether a loss of power is indicativeof a tampering event. For example, the onboard device may detect whetherthe starter has been engaged within a predetermined time period prior tothe power loss (e.g., 10 seconds or less). A situation in which thestarter has been engaged shortly before the loss of power is more likelyindicative of a problem with the battery, and thus more likely of alegitimate power loss. Alternatively, if the onboard device has notdetected any attempt to start the vehicle before a power loss isdetected, it is more likely that a tampering event has occurred.

Although the above description has discussed ascertaining whethertampering has occurred with regard to a single onboard device, anynumber of onboard devices in the system may be contemplated.

FIG. 6 shows a computer system 600, which is illustrative of a computersystem upon which the various embodiments may be practiced. The computersystem 600 may be illustrative of, for example, computer system 118coupled to the onboard device 116. In yet another embodiment, computersystem 600 may be illustrative of processor 102. In particular, computersystem 600 comprises a processor 602, and the processor couples to amain memory 604 by way of a bridge device 606. Moreover, the processor602 may couple to a long term storage device 608 (e.g., a hard drive,solid state disk, memory stick, optical disc) by way of the bridgedevice 606. Programs executable by the processor 602 may be stored onthe storage device 608, and accessed when needed by the processor 602.The program stored on the storage device 608 may comprise programs toimplement the various embodiments of the present specification, such assending an indication of the last known location of vehicle 114 in theevent of device tampering. In some cases, the programs are copied fromthe storage device 608 to the main memory 604, and the programs areexecuted from the main memory 604. Thus, the main memory 604, andstorage device 608 shall be considered computer-readable storagemediums.

The method of remote tamper detection will now be discussed in moredetail. FIG. 7 shows a flow diagram depicting an overall method ofdetecting tampering and issuing an alert related to the tampering. Themethod starts (block 700) by tracking location of an asset by an onboarddevice mechanically coupled to the asset, the onboard deviceelectrically coupled to a source of power of the asset, and the onboarddevice receiving power from the asset (block 702); detecting a loss ofpower provided to the onboard device, the loss of power indicative oftampering with the onboard device, and the detecting by the onboarddevice (block 704); and sending a message by wireless transmission, themessage indicative of tampering with the onboard device, and the sendingby the onboard device during the loss of power (block 706). Thereafter,the method ends (block 708).

From the description provided herein, those skilled in the art arereadily able to combine software created as described with appropriategeneral-purpose or special-purpose computer hardware to create acomputer system and/or computer sub-components in accordance with thevarious embodiments, to create a computer system and/or computersub-components for carrying out the methods of the various embodimentsand/or to create a non-transitory computer-readable medium (i.e., not acarrier wave) that stores a software program to implement the methodaspects of the various embodiments.

References to “one embodiment,” “an embodiment,” “some embodiments,”“various embodiments,” or the like indicate that a particular element orcharacteristic is included in at least one embodiment of the invention.Although the phrases may appear in various places, the phrases do notnecessarily refer to the same embodiment.

The above discussion is meant to be illustrative of the principles andvarious embodiments of the present invention. Numerous variations andmodifications will become apparent to those skilled in the art once theabove disclosure is fully appreciated. For example, the variousembodiments have been described in terms of remote tamper detection.This context, however, shall not be read as a limitation as to the scopeof one or more of the embodiments described—the same techniques may beused for other embodiments. It is intended that the following claims beinterpreted to embrace all such variations and modifications.

We claim:
 1. A method comprising: charging a supercapacitor of anonboard device coupled to an asset, the charging from a source of powerof the asset; and then detecting tampering with the onboard device by acomplete loss of power from the source of power, the detecting by theonboard device; and after the complete loss of power utilizing powerfrom the supercapacitor to send a message by wireless transmission, themessage including an indication of a last known voltage provided by thesource of power prior to the complete loss of power.
 2. The method ofclaim 1 wherein utilizing power further comprises utilizing power fromthe supercapacitor for at least 3 seconds after the complete loss ofpower.
 3. The method of claim 1 wherein utilizing power from thesupercapacitor to send the message further comprises: receiving signalsindicative of a location of the onboard device at the time of completeloss of power, the receiving by the onboard device; and sending anindication of location of the onboard device, the location derived fromthe signals.
 4. The method of claim 1 wherein utilizing power from thesupercapacitor to send the message further comprises sending a lastknown location of the onboard device prior to the complete loss ofpower.
 5. The method of claim 1 utilizing power from the supercapacitorto send the message further comprises sending an indication of a trendof voltage provided by the source of power prior to the complete loss ofpower.
 6. The method of claim 1 wherein detecting tampering furthercomprises detecting tampering as the complete loss of power when, withina predetermined time prior to the complete loss of power, the voltage ofa battery of the asset indicates a charged state.
 7. The method of claim6 wherein the predetermined time is one minute.
 8. The method of claim 1further comprising, responsive to detecting tampering, powering off atleast one component of the onboard device not involved in sending themessage.
 9. An onboard device configured to couple to an asset, theonboard device comprising: a processor; a wireless interface coupled tothe processor; a global position receiver coupled to the processor; ameans for providing power coupled to the processor; a memory coupled tothe processor, the memory storing a program that, when executed by theprocessor, causes the processor to: receive signals indicative of alocation of the onboard device; detect a complete power loss to theonboard device; and then sending a message by way of the wirelessinterface, the sending powered by the means for providing power, and themessage including an indication of a last known voltage provided by theasset prior to the complete power loss.
 10. The onboard device of claim9 wherein the means for providing power is a supercapacitor.
 11. Thesystem of claim 10 wherein the supercapacitor has a capacitive densityof at least 3 millifarads per cubic millimeter.
 12. The system of claim9 wherein the means for providing power further comprises a means forproviding power for at least 3 seconds after the complete power loss.13. The system of claim 9 wherein when the processor sends the message,the program further causes the processor to send an indication oflocation of the onboard device, the location derived from the signals.14. The system of claim 9 wherein when the processor sends the message,the program further causes the processor to send an indication of atrend of voltage provided by the asset prior to the complete power loss.15. The system of claim 9 wherein, responsive to detecting the completepower loss, the program further causes the processor to power off atleast one component of the onboard device not involved in issuing thealert.