Vehicle monitoring and theft mitigation system

ABSTRACT

Systems and methods are provided for monitoring and mapping a theft of a target vehicle. One method includes grouping a plurality of vehicles in communication with a network to collectively monitor and collect evidence of theft of the target vehicle using camera sensors located in each of the plurality of vehicles. The network is operably connected with at least one processor. At least one input from at least one camera sensor of the plurality of vehicles is obtained and analyzed to determine a direction of travel of the target vehicle. The method includes generating a digital map including an indication of a location and a trajectory based on the direction of travel of the target vehicle. The method provides a communication to a law enforcement agency or a user, with the communication including the digital map.

TECHNICAL FIELD

The present disclosure generally relates to communicating information between vehicles and, more particularly, to forming a network of vehicles for monitoring and mitigating theft of a target vehicle, including sending law enforcement digital maps and tracking information.

BACKGROUND

The background description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventors, to the extent it may be described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present technology.

Although unfortunate, incidents such as vehicle vandalism, unauthorized intrusions into vehicles, and vehicle thefts may occur. While it may not be possible to fully prevent such acts, it remains desirable to be able to provide increased preventative and/or vehicle safety and security assurances, as well as improved mitigation and monitoring once an incident occurs. An increasing number of vehicles are now being equipped with various theft detection technology including cameras and sensor systems. However, these systems and detection technologies can only accomplish a certain level of monitoring when used independently and not in cooperation with one another.

Accordingly, it would be desirable to utilize existing vehicle sensors in order to provide improved and coordinated vehicle monitoring systems that can monitor vehicle theft while it occurs, but yet does not rely on sensors on the stolen vehicle, which may be tampered with or otherwise compromised.

SUMMARY

This section provides a general summary of the disclosure, and is not a comprehensive disclosure of its full scope or all of its features.

In various aspects, the present technology provides a coordinated system of monitoring and mapping a theft of a target vehicle. The system includes a network in communication with a plurality of vehicles and configured to monitor and collect evidence of theft of the target vehicle using camera sensors located in each vehicle in the plurality of vehicles. The system includes at least one processor operably connected to the network and at least one of the plurality of vehicles. A memory device is provided operably connected to the at least one processor. The memory device includes a theft monitoring module having instructions that, when executed by the at least one processor, cause the at least one processor to obtain at least one input from at least one camera sensor of the plurality of vehicles. The memory device also includes a map generating module having instructions that, when executed by the at least one processor, cause the at least one processor to: (1) analyze the input from the at least one camera sensor; (2) determine a direction of travel of the target vehicle; and (3) generate a digital map including an indication of a location and a trajectory based on the direction of travel of the target vehicle. The memory device further includes a communication module having instructions that, when executed by the at least one processor, cause the at least one processor to provide a communication to a law enforcement agency, with the communication including the digital map. In certain aspects, the system designates one of the plurality of vehicles as a master vehicle, wherein the master vehicle is responsible for coordinating monitoring based on (1) different types of camera sensors available from each of the plurality of vehicles, and (2) a direction of travel of each of the plurality of vehicles with respect to a direction of travel of the target vehicle.

In other aspects, the present technology provides a computer-implemented method of monitoring and mapping a theft of a target vehicle. One method includes grouping a plurality of vehicles in communication with a network to collectively monitor and collect evidence of theft of the target vehicle using camera sensors located in each of the plurality of vehicles. The network is operably connected with at least one processor. At least one input from at least one camera sensor of the plurality of vehicles is obtained and analyzed to determine a direction of travel of the target vehicle. The method includes generating a digital map including an indication of a location and a trajectory based on the direction of travel of the target vehicle. The method provides a communication to a law enforcement agency, with the communication including the digital map

In still other aspects, the present technology provides that the described methods and/or their equivalents may be implemented with computer-executable instructions. Thus, in various embodiments, a non-transitory computer-readable medium may be configured with stored computer-executable instructions that when executed by a machine (e.g., processor, computer, and so on) cause the machine (and/or associated components) to perform the methods described herein.

Further areas of applicability and various methods of enhancing the above technology will become apparent from the description provided herein. The description and specific examples in this summary are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate various systems, methods, and other embodiments of the disclosure. It will be appreciated that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent one embodiment of the boundaries. In some embodiments, one element may be designed as multiple elements or multiple elements may be designed as one element. In some embodiments, an element shown as an internal component of another element may be implemented as an external component and vice versa. Furthermore, elements may not be drawn to scale.

FIG. 1 illustrates a general schematic view of various systems provided for monitoring and mapping a theft of a target vehicle according to various aspects of the present technology;

FIG. 2 illustrates an exemplary flow diagram for various methods of monitoring and mapping a theft of a target vehicle according to various aspects;

FIG. 3A provides a schematic illustration of an exemplary intersection with a plurality of vehicles participating in the coordinated monitoring and capturing of data from respective vehicle camera sensors according to various aspects of the present technology;

FIG. 3B illustrates an exemplary digital map made after collecting and analyzing the sensor data, with the digital map including GPS coordinates and an indication of a location and a trajectory based on the direction of travel of a target vehicle at the intersection of FIG. 3A;

FIG. 4A illustrates a schematic representation of a plurality of vehicles participating in the coordinated monitoring and capturing of data using V2X/BLE communications between one another;

FIG. 4B illustrates exemplary communications and instructions that can be made between different vehicles and systems as provided in FIG. 4A;

FIG. 5A illustrates a schematic representation of a plurality of vehicles participating in the coordinated monitoring and capturing of data using LTE/Cellular communications between one another; and

FIG. 5B illustrates exemplary communications and instructions that can be made between different vehicles and systems as provided in FIG. 5A.

DETAILED DESCRIPTION

The present technology provides systems and methods for monitoring and mapping a theft of a target vehicle. As used herein, the term “target vehicle” refers to the vehicle that is being subjected to an unauthorized use or theft, and is the target of the monitoring and mapping efforts that are provided with the present technology. Various methods of the present technology include grouping a plurality of vehicles in communication with a network to collectively monitor and collect evidence of theft of the target vehicle using camera sensors located in each of the plurality of vehicles. The network is operably connected with at least one processor. At least one input from at least one camera sensor of the plurality of vehicles is obtained and analyzed. In various aspects, the processor may include various modules configured to: (1) analyze the input from the at least one camera sensor; (2) determine a direction of travel of the target vehicle; and (3) generate a digital map including an indication of a location and a trajectory based on the direction of travel of the target vehicle. The method provides a communication to a law enforcement agency, with the communication including the digital map. In certain aspects, the one of the plurality of vehicles may be designated as a master vehicle, wherein the master vehicle is responsible for coordinating monitoring based on (1) different types of camera sensors available from each of the plurality of vehicles, and (2) a direction of travel of each of the plurality of vehicles with respect to a direction of travel of the target vehicle.

FIG. 1 is a schematic view of one exemplary coordinated monitoring and mapping system 20 according to various aspects of the present technology. In operation, the coordinated monitoring system 20 includes a plurality of vehicles, with many having at least one vehicle system 22 including a processor 24. The processor 24 may be a single processor or may be multiple processors working in concert. One or more of the processors may be physically located within a particular vehicle system 22 or may be located outside of the vehicle system 22 in a distributed fashion, but in communication with one another. One or more processors may be used that are part of a network or cloud-based system, as will be described in more detail below. As should be understood, the communications between processors, components, and vehicles can be any communication systems, known or yet to be discovered, which can be used with the present technology. By way of example, recent advances provide vehicles with connected systems that communicate with personal mobile phones and devices, other vehicles/infrastructures, as well as networks and remote cloud systems. A sensor system 26 may be provided, including one or more sensors for sensing and monitoring the environment located around the plurality of vehicles. Additional input/output devices 25 may also be used.

As shown in FIG. 1, the exemplary sensor system 26 may include one or more image and/or video cameras 28, a radar sensor 30, a LIDAR (Light Detection and Ranging) sensor 32, a microphone 34, and a sonar sensor 36. These types of sensors, as well as other known sensors, may be capable of sensing the environment and gathering relevant information surrounding one or more vehicles that can be analyzed for suspicious activity and then monitored for theft as described herein. It should be understood that this particular sensor system 26 is but one example of a sensor system, and different types and/or combinations of sensors may be utilized, in addition to those specifically described.

In one example, the camera 28 may be utilized to capture images and/or video of the surroundings and may provide this information to the processor 24, where the processor 24 coordinates with various systems, modules, and other processors, which may include artificial intelligence features, in order to extract input and analyze the input to obtain various information. Input and data from various cameras described herein may be still images or previously recorded video, as well as live images or continuous feed.

The radar sensor 30 and/or the sonar sensor 36 may locate objects by receiving an echo of a signal that is bounced off one or more objects. The LIDAR sensor 32 utilizes reflected light that is reflected from one or more objects. Depending on the size, shape, and other identifying information, the radar sensor 30, the sonar sensor 36, and/or the LIDAR sensor 32 may be able to extract various information from detected objects, such as other vehicles, people, and their respective locations and subsequent changes in location, that can be used to assess whether or not certain activity may be considered inappropriate, potentially leading to a conclusion that a theft or intrusion may be taking place.

In addition to these sensors, the sensor system 26 may also include other sensors, such as an accelerometer 38, a gyroscope 40, a compass 42, and a G-sensor 44. Such sensors may be utilized as is known in the art to determine a movement of a vehicle or a force/shock applied to a vehicle. For example, input/data that falls within a range of values may indicate suspicious activity that could suggest a need for additional monitoring, or indicate that there has been an incident with respect to potential theft, vandalism, or unusual activity in the vehicle, where immediate monitoring would be beneficial.

The vehicle system 22 may also include a Global Navigation Satellite System (GNSS) device 46, which may be in communication with an antenna 48. The GNSS device 46 may be a satellite navigation system that provides autonomous geo-spatial positioning with global coverage. The GNSS device 46 may include any one of several different GNSS systems, such as GPS (Global Positioning System), GLONASS (Globalnaya Navigatsionnaya Sputnikovaya Sistema), Galileo, Beidou, or other regional systems. The GNSS device 46 may be connected to an antenna 48 that is capable of receiving one or more signals 50 from one or more satellites 52. Based on the one or more signals 50 from one or more satellites 52, the GNSS device 46 may determine the relative location of the vehicle system 22. This relative location may be in the form of a coordinate system that may indicate the latitude, longitude, and/or altitude of a vehicle, or any other type of system, that has the GNSS device 46 installed within.

The vehicle system 22 may also include a network access device 54 that is in communication with the processor 24. The network access device 54, which may be in communication with an antenna 56, may be an electronic circuit that connects, either automatically or manually, the processor 24 to a network 58. The network access device 54 may be in communication with the processor 24 using one of a variety of different networks and/or communication protocols. Examples may include a controller area network (CAN), local area network (LAN), media orientated systems transport (MOST), or any other network capable of providing an electronic communication pathway between the network access device 54 and the processor 24.

The network access device 54 allows the vehicle system 22 and, therefore, the processor 24 to communicate with one or more devices that are connected or in communication with a network 58. The network 58 may be a distributed network such as the Internet, cloud-computing device, or any other device that may be in communication with the network 58, and may include one or more processors. The network access device 54 may be in communication with the network 58 via the use of an antenna 56 that is in communication with the network access device 54. In one example, the antenna 56 may be a cellular antenna configured to connect with one or more cellular networks or long-term evolution (LTE) communication protocols, such as analog cellular networks and/or digital cellular networks, such as 2G, 3G, 4G, 5G networks and protocols, and future iterations thereof. The antenna 56 may also be other types of antennas or combinations thereof, such as antennas that are configured to connect with Wi-Fi networks (IEEE 802.1X), Bluetooth networks, Bluetooth low energy (BLE), and/or vehicle-to-everything (V2X) networks such as vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-infrastructure (V2I) protocols, and combinations thereof. The network access device 54 allows the vehicle system 22 to communicate with other devices to perform any one of several different functions described herein.

The vehicle system 22 may also include a memory device 60 for storing digital information that is either utilized or generated by one or more processor 24. The memory device 60 may be any type of memory device capable of storing information, such as a solid-state memory device, magnetic storage device, optical storage device, and the like. It should be understood that the memory device 60 may be multiple different memory devices of the same or even different types distributed throughout the vehicle system 22 or even distributed outside the vehicle system 22. In addition, the memory device 60 may be integrated within one or more processor 24 or may be separate from the processor 24 (as shown).

In this example of FIG. 1, the memory device 60 includes a control module 62, theft monitoring module 64, a map generating module 66, and a communication module 68. Each of the modules 62, 64, 66, and/or 68 may contain instructions that cause the processor 24 to perform any one of several different tasks, operations, and methodologies disclosed in this specification.

The vehicle system 22 may also communicate with other types of systems, such as a central server 70 that is capable of collecting various inputs and information regarding the monitoring of vehicles, including the collection of data, controlling modules, performing analysis and determination features, and coordinating communications. For example, the central server 70 may include its own processor 72 in communication with a memory device 74 and a network access device 76. The network access device 76 allows the central server 70 to communicate with the network 58 and, therefore, the vehicle system 22. In addition, the central server 70 may include a data store 78. The data store 78 is, in one embodiment, an electronic data structure, such as a database, that is stored in the memory device 74 or another memory and that is configured with routines that may be executed by the processor 72 for analyzing stored data, providing stored data, organizing stored data, and so on.

The central server 70 may receive information regarding the vehicle monitoring from the vehicle system 22 and other systems and other devices 80 working together in the coordinated systems. Various portions, features, or aspects of the vehicle system 22 can also be found in numerous other devices, such as other remote vehicles and/or other devices 80, such as mobile phones, tablet devices, notebook computers, and the like. The central server 70 may collect information from the vehicle system 22 and other related systems regarding the vehicle monitoring. Based on this collected information, the central server 70 may be able to use crowdsourcing type technology and may be provided with machine learning capabilities.

The vehicle system 22 may include a vehicle theft detection system or an advanced driving assistance system 82, which may be part of an existing vehicle alarm system, parking system, or the like. In various aspects, the vehicle theft detection system or advanced driving assistance system 82 can include a security alarm system 84, a vehicle immobilizer system 86, and a communication system 88. The security alarm system may be configured to, for example, detect unauthorized entry into the vehicle, unauthorized use of the vehicle, attempts to obtain access to the vehicle, and the like. The security alarm system 84 may be configured to use any of the sensors of the sensor system 26, discussed above, as well as use dedicated security cameras. For example, the vehicle theft detection system or advanced driving assistance system 82 may be in communication with one or more of a front camera 90, a rear camera 92, side cameras 94 and in-vehicle cameras 96. Each of the cameras 90, 92, 94, 96 may provide a different field of view, as well as have a different viewing angle, focal length, zoom capability, and the like. In certain aspects, the views may be combined into 180 degree and even 360 degree views.

The vehicles useful with the present technology may take any one of several different forms. In various examples, the vehicles are shown to be passenger automobiles. However, it should be understood that the vehicles and groups of vehicles may include other types of vehicles, such as trucks, commercial vehicles, sport utility vehicles, heavy-duty trucks, emergency vehicles, mining vehicles, agricultural vehicles, military vehicles, landscaping vehicles, construction vehicles, single passenger vehicles such as motorized bikes, and the like. Moreover, the vehicles could be any type of vehicle that is capable of transporting persons and/or objects from one location to another. Furthermore, it should be understood that the vehicles may not be limited to land-based vehicles but could also include other types of vehicles as well, such as boats and vessels docked in a harbor, and aircrafts parked in a hanger.

One or more of the vehicles may be autonomous vehicle. An autonomous vehicle may be a vehicle that requires little to no human intervention to properly operate the vehicle. Conversely, one or more of the vehicles may be a non-autonomous vehicle that requires human input to operate the vehicle properly. Further still, the vehicles may have multiple modes of operation and may be able to function as both an autonomous vehicle in one mode and a non-autonomous vehicle in another mode, or combination thereof.

FIG. 2 provides one example of a computer-implemented method 100 of monitoring and mapping a theft of a target vehicle that uses a coordinated system according to the present technology. It should be understood that additional steps may be included that are not necessarily provided in FIG. 2, and certain steps may repeat and/or occur in different orders. As indicated by method box 102, in various aspects, the method may begin by grouping a plurality of vehicles together in communication with a network 58 in order to monitor and collect real time evidence of theft of a target vehicle using camera sensors, as well as other sensors, located in the plurality of vehicles. The grouping of vehicles may be initiated upon a notification being sent out from a target vehicle that it is subjected to a theft or unauthorized use. For example, upon a determination that the target vehicle is being operated in an unauthorized use or manner, it may send a notification to the network 58 with information regarding the incident (shown in FIGS. 5A, 5B). In addition to, or as an alternative to notifying the network 58, the target vehicle may send a notification to vehicles in the surrounding area (shown in FIGS. 4A, 4B). With reference to method step 104 of FIG. 2, the methods may include operably connecting the network with at least one processor. The processor(s) may be located in vehicles as well as having remote processors in various locations in communication with the network.

In various aspects, the participation is voluntary, and there may or may not be a service fee for being able to participate. It is envisioned that each of the plurality of vehicles may be able to actively participate and contribute to various aspects and features of the methods of the coordinated systems in some manner. A grouping of a plurality of vehicles can be made at any time after a determination of a theft has been made. The grouping may be modified if additional vehicles enter an area near the target vehicle, or existing vehicles are no longer in proximity with the target vehicle. The vehicles may communicate their movement, or the movement can be detected by other means, including using dedicated cameras and sensors affiliated with a network. In various aspects, a grouping may be made, passively waiting for any suspicious activity. In other aspects, the grouping may be made at the first detection of movement or of suspicious activity. Various systems and sensors of the systems described herein may be placed in a non-active or passive mode at certain times when there is no detected activity.

It is contemplated that the present technology is most practical with a plurality of vehicles on a roadway, and in motion. In various other aspects, certain or all of the plurality of vehicles may be located in a parking lot or a parking structure. In other aspects, the plurality of vehicles may include a number of vehicles in close proximity in a residential neighborhood, or on a residential street. It is envisioned that the methods of the present technology may be able to use existing theft detection systems 82 and their respective theft detection sensors already located in one or more of the plurality of vehicles participating in the system. Of course, the technology may also include other sensors available in various environments, such as parking lot cameras, street cameras, and even residential use cameras, to the extent they are capable of detecting activity near the vehicles of the group. In one example, referring to FIG. 1, the control module 62 may include instructions that cause the processor 24 to gather information from various vehicles that want to participate in the group monitoring.

In various aspects, the method includes designating one of the plurality of vehicles as a master vehicle responsible for managing at least one control feature, including communicating with other vehicles. The master vehicle should be a vehicle that is able to be operably coupled to the network and at least one processor, and that has certain minimum equipment necessary for completing the various required functions in order to control different features of the present technology. In various aspects, the designation of one of the plurality of vehicles in a group as the master vehicle may be made remotely, selected based on various conditions, and may be changed based on a location of the master vehicle with respect to the target vehicle. In other aspects, the determination may be made by communications between a group of vehicles in close proximity and in communication with one another. In various aspects, the target vehicle that is the subject of a theft or unauthorized use can still directly send input, data, and communication to the master vehicle and/or network 58. Care should be taken, however, to ensure that the information has not been tampered with by a criminal operator.

The control module 62 may also cause the processor 24 to instruct a master vehicle to communicate with the various vehicles and vehicle systems 22 that are in communication with the network 58. The other vehicles in the grouping may also communicate directly with the network 58, and vice-versa. Since the master vehicle may need to provide various communications, and use certain resources that may require a certain allocation of energy or power, it may be beneficial to let certain vehicles alternate having a responsibility of being the master vehicle. For example, in various aspects, the systems and methods of the present technology may use a time plan, or a similar feature, to coordinate a rotation of the responsibilities of being a master vehicle between different vehicles in a grouping. It should be understood that certain vehicles may not have the necessary sensors or equipment to serve as the master vehicle. In other aspects, certain vehicles may have the equipment, but may not be able to contribute to monitoring. For example, a vehicle may have its camera sensor(s) covered in snow. Thus, the present technology provides that in certain aspects, a vehicle that cannot contribute to monitoring may be required to pay a certain compensation, monetary or other types of debit, in order to participate in the coordinated monitoring system. In this regard, where one or more vehicles take on additional responsibility of being the master vehicle, the systems may be organized so that the owners of the master vehicles receive a compensation, monetary or other types of credits, for the time and resources used managing the various monitoring in the coordinated system.

With reference to method step 106 of FIG. 2, the methods may include obtaining at least one input from at least one theft detection system, such as a camera sensor, from the plurality of vehicles. In one example, the theft monitoring module 64 includes instructions that cause the processor 24 to capture input from one or more sensors making up the sensor system 26 of different vehicles. This may also include obtaining input from at least one sensor from a vehicle theft detection system or an advanced driving assistance system 82, such as a camera 90, 92, 94, 96. Input may include still images, live stream video, or a recorded video clip. These captured inputs may be stored within the memory device 60 or elsewhere. In various aspects, the master vehicle may be able to coordinate with various theft monitoring modules 64 in order to initially obtain information that indicates the different types of sensors that may be available from each of the plurality of vehicles. Certain vehicles may have different sensors and different types of monitoring capabilities. For example, certain vehicles may have only forward and rear facing camera sensors, while other vehicles may have between 180-360 degree camera field of view coverage. This information may be sent to the network 58, as well as other systems and vehicles, to better coordinate the collective monitoring efforts. The master vehicle may then ultimately coordinate the monitoring efforts based on the different types of sensors that are available at any given time from each of the plurality of vehicles, and any other sensors from an adjacent parking area, and the like. In various aspects, the master vehicle may work in coordination with the theft monitoring modules 64 to coordinate operations of the theft detection systems and sensors to capture image data, video data, and other sensor input from each of the plurality of vehicles. The coordination may be based on a vehicle's current, projected, and/or predicted future location with respect to the target vehicle. In certain aspects, a monitoring schedule may be used, which may obtain its instructions from the network 58, or other systems that may assist in coordination efforts. The monitoring schedule may be a rotation schedule, and may be based, for example, on a size of the monitoring area, which may be commensurate with a size/type of a roadway and the prediction of a direction of travel of the target vehicle; a monitoring pattern; and a total number of vehicles in the plurality of vehicles that are participating in the coordinated monitoring system, as well as their relative location to the target vehicle.

With reference to method step 108 of FIG. 2, the various inputs from the at least one camera sensor are then analyzed in order to determine a location and direction of travel of the target vehicle. In one example, the theft monitoring module 64 includes instructions that cause the processor 24 to analyze input from at least one camera sensor or other theft detection sensor for movement information, and make or assist with a determination of whether the input represents or contains evidence indicative of a direction of travel. In certain instances, movement may warrant further consideration and monitoring. In various instances, machine learning may be used with existing technology in order to analyze various input and to make a determination of whether the input represents or contains evidence indicative of a movement in a certain direction. FIG. 3A provides a schematic illustration of an exemplary intersection with a plurality of vehicles A, B, and C participating in the coordinated monitoring and capturing of still image data or video clip regarding the target vehicle X from respective vehicle camera sensors. FIG. 3 also provides representative perspective views obtained from each vehicle. In analyzing the inputs from the camera sensors of vehicles A and C, which focus on a front area of the target vehicle X, it clearly show that the target vehicle X appears to be turning at the intersection. While the input from vehicle B, reviewed in isolation, may not be as obvious of indicating a direction of travel, it does not conflict with the analysis of the input from vehicle A and vehicle C. The master vehicle may coordinate further monitoring, or request certain vehicles to actively capture data, for example, obtain further still images or record video, or even transfer live stream video or a recorded video clip that can ultimately be provided to law enforcement or an owner of a vehicle.

With renewed reference to FIG. 1, the map generating module 66 may include instructions that when executed by the one or more processors 24 cause the one or more processors 24 to generate a location description of the target vehicle, referred to herein as a digital map. Thus, once a location and direction of travel is determined, as referenced by method step 110, the method may proceed by using the map generating module 66 to prepare the digital map. For example, the location description may include a location of the target vehicle in a two dimensional or three dimensional space. In one example, the map generating module 66 may generate one or more digital map of an area surrounding the location of the target vehicle and place an indicator on the digital map, with the indicator indicating the location of the target vehicle at a specific point in time. The digital map may also include a current or predicted trajectory that may be based on a current or predicted direction of travel of the target vehicle. Multiple potential digital maps may be created if there are different options for direction of travel of the target vehicle, for example, at an intersection, or at a location adjacent or near an entrance or exit of a highway. In various aspects, each vehicle of the plurality of vehicles may provide vehicle-specific map data to the network 58 or processor(s), and the map generating module collates the vehicle-specific map data in order to generate the digital map, or portions thereof. FIG. 3B illustrates an exemplary digital map made after collecting and analyzing the sensor data, with the digital map including GPS coordinates and an indication of a location (triangle) and a trajectory (arrow) based on the direction of travel of a target vehicle at the intersection of FIG. 3A.

The direction of travel may be determined by any suitable method, which may include artificial intelligence and/or machine learning techniques. In various examples, the direction of travel can be computed or otherwise determined or predicted by analyzing various sensor input or related data using one or more of the control module 62, theft monitoring module 64, map generating module 66, or using any other suitable processor or module. The digital map generated by the map generating module 66 may be stored in the memory device 60 or other suitable location for later use. One or more digital map containing the indicator and trajectory may be communicated to another device, module, processor, or vehicle, for example, using the communication module 68 or other communication device. The digital map may include various terrain data as well as static obstacle data, as is known in the art, which may be obtained from various databases and data stores. In other aspects, the digital map may be a basic design, provided with a minimal amount of information necessary to communicate a GPS location along with a trajectory.

With reference to method step 112, in various aspects, the master vehicle and/or network 58 may coordinate with a communication module 68. For example, a communication may be provided to at least one of a law enforcement agency, another vehicle, or a user such as a vehicle owner, and the network 58, with the communication indicating that the target vehicle may have been subjected to a theft or unauthorized use. In various aspects, communications provided by the communication module may include the digital map and GPS coordinates indicating a location of the theft or unauthorized use. As new digital maps are created and/or updated, they can be communicated in real time to the appropriate device or entity. In certain aspects, each vehicle of the plurality of vehicles may be provided with the digital map. The methods may also include verification steps, where each vehicle separately reviews the digital map for accuracy based on the sensor data obtained from the respective vehicle.

FIG. 4A illustrates a schematic representation of a plurality of vehicles participating in the coordinated monitoring and capturing of data, and sharing the data using V2X/BLE communications between one another. The trapezoidal shapes adjacent the various vehicles indicate a direction of monitoring. FIG. 5A illustrates another schematic representation of a plurality of vehicles participating in the coordinated monitoring, however, they are generally sharing data using LTE/Cellular communications between one another. FIGS. 4B and 5B illustrate exemplary communications and instructions that can be made between the different vehicles and systems as provided in FIGS. 4A and 5A, respectively. It should be understood that the various instructions and responses from systems and vehicles are only exemplary in nature, and various modifications are within the scope of the present technology.

As shown in FIG. 4A, vehicles A and C are entering a communication zone, represented by the circle, as vehicle D has just left the communication zone. The target vehicle X can communicate with vehicles A, B, and C using V2X or BLE communications, or the like. Vehicle B is travelling ahead of the target vehicle X, and provides a direct line of sight using a rear facing camera sensor. As such, it may be designated as the master vehicle in this example, and may coordinate a request to vehicle C to capture data from a forward/side camera, and request vehicle A to capture data from a passenger side camera as it passes the target vehicle X. Communications may also be made with the network 58 though cloud communication, and the like.

It should further be appreciated that any of the systems described in this specification can be configured in various arrangements with separate integrated circuits and/or chips. The circuits are connected via connection paths to provide for communicating signals between the separate circuits. Of course, while separate integrated circuits are discussed, in various embodiments, the circuits may be integrated into a common integrated circuit board. Additionally, the integrated circuits may be combined into fewer integrated circuits or divided into more integrated circuits.

In another embodiment, the described methods and/or their equivalents may be implemented with computer-executable instructions. Thus, in one embodiment, a non-transitory computer-readable medium is configured with stored computer-executable instructions that when executed by a machine (e.g., processor, computer, and so on) cause the machine (and/or associated components) to perform the method.

While for purposes of simplicity of explanation, the illustrated methodologies in the figures are shown and described as a series of blocks, it is to be appreciated that the methodologies are not limited by the order of the blocks, as some blocks can occur in different orders and/or concurrently with other blocks from that shown and described. Moreover, less than all the illustrated blocks may be used to implement an example methodology. Blocks may be combined or separated into multiple components. Furthermore, additional and/or alternative methodologies can employ additional blocks that are not illustrated.

Detailed embodiments are disclosed herein. However, it is to be understood that the disclosed embodiments are intended only as examples. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the aspects herein in virtually any appropriately detailed structure. Further, the terms and phrases used herein are not intended to be limiting but rather to provide an understandable description of possible implementations.

The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments. In this regard, each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.

The systems, components and/or processes described above can be realized in hardware or a combination of hardware and software and can be realized in a centralized fashion in one processing system or in a distributed fashion where different elements are spread across several interconnected processing systems. Any kind of processing system or another apparatus adapted for carrying out the methods described herein is suited. A combination of hardware and software can be a processing system with computer-usable program code that, when being loaded and executed, controls the processing system such that it carries out the methods described herein. The systems, components and/or processes also can be embedded in a computer-readable storage, such as a computer program product or other data programs storage device, readable by a machine, tangibly embodying a program of instructions executable by the machine to perform methods and processes described herein. These elements also can be embedded in an application product which comprises all the features enabling the implementation of the methods described herein and, which when loaded in a processing system, is able to carry out these methods.

Furthermore, arrangements described herein may take the form of a computer program product embodied in one or more computer-readable media having computer-readable program code embodied, e.g., stored, thereon. Any combination of one or more computer-readable media may be utilized. The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium. The phrase “computer-readable storage medium” means a non-transitory storage medium. A computer-readable medium may take forms, including, but not limited to, non-volatile media, and volatile media. Non-volatile media may include, for example, optical disks, magnetic disks, and so on. Volatile media may include, for example, semiconductor memories, dynamic memory, and so on. Examples of such a computer-readable medium may include, but are not limited to, a floppy disk, a flexible disk, a hard disk, a magnetic tape, other magnetic medium, an application-specific integrated circuit (ASIC), a graphics processing unit (GPU), a CD, other optical medium, a RAM, a ROM, a memory chip or card, a memory stick, and other media from which a computer, a processor or other electronic device can read. In the context of this document, a computer-readable storage medium may be any tangible medium that can contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.

The following includes definitions of selected terms employed herein. The definitions include various examples and/or forms of components that fall within the scope of a term, and that may be used for various implementations. The examples are not intended to be limiting. Both singular and plural forms of terms may be within the definitions.

References to “one embodiment,” “an embodiment,” “one example,” “an example,” and so on, indicate that the embodiment(s) or example(s) so described may include a particular feature, structure, characteristic, property, element, or limitation, but that not every embodiment or example necessarily includes that particular feature, structure, characteristic, property, element or limitation. Furthermore, repeated use of the phrase “in one embodiment” does not necessarily refer to the same embodiment, though it may.

“Module,” as used herein, includes a computer or electrical hardware component(s), firmware, a non-transitory computer-readable medium that stores instructions, and/or combinations of these components configured to perform a function(s) or an action(s), and/or to cause a function or action from another logic, method, and/or system. A module may include a microprocessor controlled by an algorithm, a discrete logic (e.g., ASIC), an analog circuit, a digital circuit, a programmed logic device, a memory device including instructions that when executed perform an algorithm, and so on. A module, in one or more embodiments, may include one or more CMOS gates, combinations of gates, or other circuit components. Where multiple modules are described, one or more embodiments may include incorporating the multiple modules into one physical module component. Similarly, where a single module is described, one or more embodiments distribute the single module between multiple physical components.

Additionally, module, as used herein, includes routines, programs, objects, components, data structures, and so on that perform tasks or implement data types. In further aspects, a memory generally stores the noted modules. The memory associated with a module may be a buffer or cache embedded within a processor, a RAM, a ROM, a flash memory, or another suitable electronic storage medium. In still further aspects, a module as envisioned by the present disclosure is implemented as an application-specific integrated circuit (ASIC), a hardware component of a system on a chip (SoC), as a programmable logic array (PLA), as a graphics processing unit (GPU), or as another suitable hardware component that is embedded with a defined configuration set (e.g., instructions) for performing the disclosed functions.

In one or more arrangements, one or more of the modules described herein can include artificial or computational intelligence elements, e.g., neural network, fuzzy logic, or other machine learning algorithms. Further, in one or more arrangements, one or more of the modules can be distributed among a plurality of the modules described herein. In one or more arrangements, two or more of the modules described herein can be combined into a single module.

Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber, cable, RF, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present arrangements may be written in any combination of one or more programming languages, including an object-oriented programming language such as Java™, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).

The terms “a” and “an,” as used herein, are defined as one or more than one. The term “plurality,” as used herein, is defined as two or more than two. The term “another,” as used herein, is defined as at least a second or more. The terms “including” and/or “having,” as used herein, are defined as comprising (i.e., open language). The phrase “at least one of . . . and . . . ” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. As an example, the phrase “at least one of A, B, and C” includes A only, B only, C only, or any combination thereof (e.g., AB, AC, BC, or ABC).

Aspects herein can be embodied in other forms without departing from the spirit or essential attributes thereof. Accordingly, reference should be made to the following claims, rather than to the foregoing specification, as indicating the scope hereof. 

What is claimed is:
 1. A coordinated system of monitoring and mapping a theft of a target vehicle, the coordinated system comprising: a network in communication with a plurality of vehicles and configured to monitor and collect evidence of theft of the target vehicle using camera sensors located in each vehicle in the plurality of vehicles; at least one processor operably connected to the network and at least one of the plurality of vehicles; a memory device operably connected to the at least one processor; the memory device comprising a theft monitoring module having instructions that, when executed by the at least one processor, cause the at least one processor to obtain at least one input from at least one camera sensor of the plurality of vehicles; the memory device comprising a map generating module having instructions that, when executed by the at least one processor, cause the at least one processor to: analyze the input from the at least one camera sensor; determine a direction of travel of the target vehicle; generate a digital map including an indication of a location and a trajectory based on the direction of travel of the target vehicle; and the memory device comprising a communication module having instructions that, when executed by the at least one processor, cause the at least one processor to: provide a communication to a law enforcement agency or a user, with the communication including the digital map.
 2. The coordinated system according to claim 1, wherein the theft monitoring module has further instructions that, when executed by the at least one processor, cause the at least one processor to obtain information indicating different types of camera sensors available from each of the plurality of vehicles, and a direction of travel of each of the plurality of vehicles.
 3. The coordinated system according to claim 1, wherein one of the plurality of vehicles is designated as a master vehicle responsible for coordinating monitoring based on different types of camera sensors available from each of the plurality of vehicles.
 4. The coordinated system according to claim 3, wherein the master vehicle coordinates operations of the camera sensors from the plurality of vehicles based on a direction of travel of each of the plurality of vehicles with respect to a direction of travel of the target vehicle.
 5. The coordinated system according to claim 3, wherein a designation of one of the plurality of vehicles as the master vehicle is made remotely or based on communication between the plurality of vehicles.
 6. The coordinated system according to claim 1, wherein the map generating module further has instructions that, when executed by the at least one processor, cause the at least one processor to analyze the input from each of the plurality of vehicles, and generate the digital map based on input from a plurality of vehicles.
 7. The coordinated system according to claim 6, wherein the input from each of the plurality of vehicles includes a still image or video clip of the target vehicle, and each still image or video clip is analyzed to determine the direction of travel of the target vehicle.
 8. The coordinated system according to claim 1, wherein the camera sensor is a component of a vehicle theft detection system, or an advanced driving assistance system.
 9. The coordinated system according to claim 1, wherein the communication provided by the communication module includes GPS coordinates with the direction of travel of the target vehicle.
 10. The coordinated system according to claim 1, wherein the communication provided by the communication module further includes at least one of a still image, a live stream video, and a recorded video clip.
 11. The coordinated system according to claim 1, wherein each vehicle of the plurality of vehicles communicates with one another using at least one of vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and Bluetooth low energy (BLE) protocols, and the communication module communicates using long-term evolution (LTE) communication.
 12. The coordinated system according to claim 1, wherein each vehicle of the plurality of vehicles communicates with one another using long-term evolution (LTE) communication.
 13. The coordinated system according to claim 1, wherein the communication module further has instructions that, when executed by the at least one processor, cause the at least one processor to provide each vehicle of the plurality of vehicles with the digital map.
 14. The coordinated system according to claim 1, wherein each vehicle of the plurality of vehicles provides vehicle-specific map data to the network, and the map generating module collates the vehicle-specific map data in order to generate the digital map.
 15. A computer-implemented method of monitoring and mapping a theft of a target vehicle, the method comprising: grouping a plurality of vehicles in communication with a network to collectively monitor and collect evidence of theft of the target vehicle using camera sensors located in each of the plurality of vehicles; operably connecting the network with at least one processor; obtaining at least one input from at least one camera sensor of the plurality of vehicles; analyzing the input from the at least one camera sensor to determine a direction of travel of the target vehicle; generating a digital map including an indication of a location and a trajectory based on the direction of travel of the target vehicle; and providing a communication to a law enforcement agency, with the communication including the digital map.
 16. The computer-implemented method according to claim 15, further comprising designating one of the plurality of vehicles as a master vehicle, wherein the master vehicle is responsible for coordinating monitoring based on (1) different types of camera sensors available from each of the plurality of vehicles, and (2) a direction of travel of each of the plurality of vehicles with respect to a direction of travel of the target vehicle.
 17. The computer-implemented method according to claim 15, comprising analyzing the input from each of the plurality of vehicles, and generating the digital map based on input from a plurality of vehicles, wherein the input from each of the plurality of vehicles includes a still image of the target vehicle, and each still image is analyzed to determine the direction of travel of the target vehicle.
 18. The computer-implemented method according to claim 15, wherein each vehicle of the plurality of vehicles provides vehicle-specific map data to the network, and the step of generating a digital map includes collating the vehicle-specific map data.
 19. A non-transitory computer-readable medium for monitoring and mapping a theft of a target vehicle and including instructions that, when executed by one or more processors, cause the one or more processors to: group a plurality of vehicles in communication with a network to collectively monitor and collect evidence of theft of the target vehicle using camera sensors located in each of the plurality of vehicles; operably connect the network with at least one processor; obtain at least one input from at least one camera sensor of the plurality of vehicles; analyze the input from the at least one camera sensor to determine a direction of travel of the target vehicle; generate a digital map including an indication of a location and a trajectory based on the direction of travel of the target vehicle; and provide a communication to a law enforcement agency or a user, with the communication including the digital map.
 20. The non-transitory computer-readable medium according to claim 19, wherein one of the plurality of vehicles is designated as a master vehicle that coordinates monitoring based on (1) different types of camera sensors available from each of the plurality of vehicles, and (2) a direction of travel of each of the plurality of vehicles with respect to a direction of travel of the target vehicle; and the non-transitory computer-readable medium further comprises instructions to analyze the input from each of the plurality of vehicles to determine the direction of travel of the target vehicle. 