Vehicle and method of controlling the same

ABSTRACT

A vehicle includes a plurality of cameras configured to capture a surrounding situation of the vehicle, an external speaker configured to output a sound to the outside of the vehicle, a communicator configured to communicate with a first server, and a controller configured to determine a degree of risk of the dangerous situation based on the degree of risk based on a case where a dangerous situation is captured through the plurality of cameras, to control an Ultra Wide Band (UWB) module to detect obstacles around the vehicle, to control at least one of a digital key and an external speaker to output a message for the dangerous situation or an image in which the dangerous situation is captured, and to transmit the image in which the dangerous situation is captured to the first server through the communicator.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is based on and claims priority under 35 U.S.C. § 119to Korean Patent Application No. 10-2020-0146777, filed on Nov. 5, 2020,the disclosure of which is incorporated herein by reference.

BACKGROUND 1. Field

The disclosure relates to a vehicle and a method of controlling thevehicle.

2. Description of Related Art

Recently, a digital key (smart phone) system has been widely applied,and a built-in cam, which is called a black box in a market, is alsobeing applied to a vehicle. In addition, many closed-circuit televisions(CCTVs) are installed near homes and roads.

As such, we are considering a method to keep safety by utilizingtechnologies such as an image, and technological advances are being madeusing a connected concept such as a digital key.

Currently, a development of convergence technology with digital keys andvehicle surrounding images is being carried out in a variety of ways,and a plan to connect the technology proven in a recent IT field to thevehicle is being considered. In addition, as interest in safety andsecurity using the image is increasing, it is sometimes used todetermine a suspicious person in advance using the image as a technologyfor access security. In addition, the vehicles are becoming common inthe era of outdoor and indoor cameras and connected vehicles, but thecurrent vehicle security technology is only a follow-up action after anaccident occurs. In other words, when an impact is detected, the imagesare stored in the front and rear, and there are only follow-up actionssuch as a simple theft alarm notification.

SUMMARY

An aspect of the disclosure is to provide a vehicle that determines inadvance whether a dangerous situation or a suspicious person existsaround the vehicle, and informs a user in various ways according to adegree of risk of the dangerous situation, and a method of controllingthe vehicle.

Additional aspects of the disclosure will be set forth in part in thedescription which follows and, in part, will be obvious from thedescription, or may be learned by practice of the disclosure.

According to an aspect of the disclosure, there is provided a vehicleincluding a plurality of cameras configured to capture a surroundingsituation of the vehicle, an external speaker configured to output asound to the outside of the vehicle, a communicator configured tocommunicate with a first server, and a controller configured todetermine a degree of risk of the dangerous situation, based on thedegree of risk, based on a case where a dangerous situation is capturedthrough the plurality of cameras, to control an Ultra Wide Band (UWB)module to detect obstacles around the vehicle, to control at least oneof a digital key and an external speaker to output a message for thedangerous situation or an image in which the dangerous situation iscaptured, and to transmit the image in which the dangerous situation iscaptured to the first server through the communicator.

The controller may be configured to control a power of some of theplurality of cameras based on at least one of the degree of risk and auser input received on the digital key.

The controller may be configured to search position information of thedigital key based on the case in which the dangerous situation iscaptured through the plurality of cameras, to transmit the image inwhich the dangerous situation is captured to the digital key based onthe position information of the digital key and the degree of risk, andto control to output the captured image from the digital key.

The controller may be configured to control the external speaker tooutput at least one of a user's voice received by the digital key and avoice corresponding to the message for the dangerous situation.

Based on a case where a user input is not received in the digital keyfor a predetermined time after transmitting the message for thedangerous situation to the digital key, the controller may be configuredto retransmit the message for the dangerous situation to another digitalkey.

The controller may be configured to perform a suspect determinationalgorithm to determine whether the situation captured from the pluralityof cameras is the dangerous situation.

Based on the degree of risk, the first server may be configured to storeat least one of the image in which the dangerous situation is captured,the image for the dangerous situation, and position information of thevehicle at a time when the dangerous situation occurs.

The first server may be configured to transmit the image in which thedangerous situation is captured to the second server based on the degreeof risk.

The first server may be an external server of the vehicle that storesinformation related to the vehicle. The second server may be a server ofan external company.

The controller may be configured to provide a push notification to thedigital key based on the degree of risk.

According to another aspect of the disclosure, there is provided amethod of controlling a vehicle including based on a case where adangerous situation is captured through the plurality of cameras,determining, by a controller, a degree of risk of the dangeroussituation, based on the degree of risk, controlling, by the controller,an Ultra Wide Band (UWB) module to detect obstacles around the vehicle,controlling, by the controller, at least one of a digital key and anexternal speaker to output a message for the dangerous situation or animage in which the dangerous situation is captured, and transmitting, bythe controller, the image in which the dangerous situation is capturedto the first server.

The method may further include controlling, by the controller, a powerof some of the plurality of cameras based on at least one of the degreeof risk and a user input received on the digital key.

The method may further include, based on the case in which the dangeroussituation is captured through the plurality of cameras, searching, bythe controller, position information of the digital key; based on theposition information of the digital key and the degree of risk,transmitting, by the controller, the image in which the dangeroussituation is captured to the digital key, and controlling, by thecontroller, to output the captured image from the digital key.

The method may further include controlling, by the controller, theexternal speaker to output at least one of a user's voice received bythe digital key and a voice corresponding to the message for thedangerous situation.

The method may further include, based on a case where a user input isnot received in the digital key for a predetermined time aftertransmitting the message for the dangerous situation to the digital key,retransmitting, by the controller, the message for the dangeroussituation to another digital key.

The method may further include performing, by the controller, a suspectdetermination algorithm to determine whether the situation captured fromthe plurality of cameras is the dangerous situation.

Based on the degree of risk, the first server may be configured to storeat least one of the image in which the dangerous situation is captured,the image for the dangerous situation, and position information of thevehicle at a time when the dangerous situation occurs.

The first server may be configured to transmit the image in which thedangerous situation is captured to the second server based on the degreeof risk.

The first server may be an external server of the vehicle that storesinformation related to the vehicle. The second server may be a server ofan external company.

The method may further include providing, by the controller, a pushnotification to the digital key based on the degree of risk.

BRIEF DESCRIPTION OF THE FIGURES

These and/or other aspects of the disclosure will become apparent andmore readily appreciated from the following description of theembodiments, taken in conjunction with the accompanying drawings ofwhich:

FIG. 1 is a plan view of a vehicle according to an embodiment of thedisclosure.

FIG. 2 is a control block diagram of a vehicle according to anembodiment of the disclosure.

FIG. 3 is a plan view of a vehicle according to another embodiment ofthe disclosure.

FIGS. 4A and 4B are views illustrating a screen output to a digital keyof a vehicle according to an embodiment of the disclosure.

FIGS. 5A, 5B, 5C, 5D, and 5E are views illustrating a message for avoice output to an external speaker of a vehicle according to anembodiment of the disclosure.

FIG. 6 is a flowchart illustrating a method of controlling a vehicleaccording to another embodiment of the disclosure.

FIG. 7 is a flowchart illustrating a method of controlling a vehicleaccording to another embodiment of the disclosure.

DETAILED DESCRIPTION

Like reference numerals refer to like elements throughout thespecification. Not all elements of the embodiments of the disclosurewill be described, and the description of what are commonly known in theart or what overlap each other in the exemplary embodiments will beomitted. The terms as used throughout the specification, such as“˜part,” “˜module,” “˜member,” “˜block,” etc., may be implemented insoftware and/or hardware, and a plurality of “˜parts,” “˜modules,”“˜members,” or “˜blocks” may be implemented in a single element, or asingle “˜part,” “˜module,” “˜member,” or “˜block” may include aplurality of elements.

It will be further understood that the term “connect” and itsderivatives refer both to direct and indirect connection, and theindirect connection includes a connection over a wireless communicationnetwork.

The terms “include (or including)” and “comprise (or comprising)” areinclusive or open-ended and do not exclude additional, unrecitedelements or method steps, unless otherwise mentioned.

Further, when it is stated that a layer is “on” another layer orsubstrate, the layer may be directly on another layer or substrate or athird layer may be disposed therebetween.

It will be understood that, although the terms first, second, third,etc., may be used herein to describe various elements, components,regions, layers and/or sections, these elements, components, regions,layers and/or sections should not be limited by these terms. These termsare only used to distinguish one element, component, region, layer orsection from another region, layer or section.

It is to be understood that the singular forms “a,” “an,” and “the”include plural references unless the context clearly dictates otherwise.

Reference numerals used for method steps are merely used for convenienceof explanation, but not to limit an order of the steps. Thus, unless thecontext clearly dictates otherwise, the written order may be practicedotherwise.

Hereinafter, an operation principle and embodiments of the disclosurewill be described with reference to accompanying drawings.

FIG. 1 is a plan view of a vehicle according to an embodiment of thedisclosure.

FIG. 2 is a control block diagram of a vehicle according to anembodiment of the disclosure.

FIG. 3 is a plan view of a vehicle according to another embodiment ofthe disclosure.

Referring to FIGS. 1 and 2, a vehicle 1 may include a plurality ofcameras 100 (110, 120, 130, 140) for capturing a surrounding situationof the vehicle 1, an external speaker 150 for outputting a sound to theoutside of the vehicle 1, and a communicator 170 communicating with afirst server 210, and a controller 110 for determining a degree of riskof a dangerous situation when the dangerous situation is capturedthrough the plurality of cameras 100 (110, 120, 130, 140).

The controller 110 may control an Ultra Wide Band (UWB) module to detectobstacles around the vehicle 1 based on the degree of risk, control atleast one of a digital key 200 and the external speaker 150 to output amessage for the dangerous situation or an image in which the dangeroussituation is captured, and transmit the image in which the dangeroussituation is captured to the first server 210 based on the degree ofrisk. The first server 210 may transmit the message and the capturedimage to a second server 220 based on the degree of risk.

When the dangerous situation is captured through the cameras 100, thecontroller 10 may store the image of the dangerous situation in astorage in the vehicle 1.

When the dangerous situation is captured, the controller 10 may storethe image of the dangerous situation in the storage in the vehicle 1.

When the dangerous situation is captured, the controller 10 may searchfor position information of the digital key 200. Here, the controller 10may control the UWB module to search for the position information of thedigital key 200, and may search for the position information of thedigital key 200 using the UWB module.

In more detail, when the position information of the digital key 200 issearched, the controller 10 may determine that the position of thedigital key 200 is located in a short distance from the vehicle 1, andmay directly transmit the message for the dangerous situation to thedigital key 200.

In this case, when the position of the digital key 200 is located in theshort distance from the vehicle 1, the controller 10 may control thedigital key 200 to automatically output the message for the dangeroussituation.

In addition, when the position of the digital key 200 is located in theshort distance from the vehicle 1, the controller 10 may directlytransmit the image in which the dangerous situation is captured to thedigital key 200, and may control the digital key 200 so that the imageis automatically output.

Here, when the position of the digital key 200 is located in the shortdistance from the vehicle 1, the controller 10 may control the image inwhich the dangerous situation is captured to be streamed in real timefrom the digital key 200.

When the position information of the digital key 200 is not searched,the controller 10 may determine that the position of the digital key 200according to the position information of the digital key 200 is far fromthe vehicle 1, and it is difficult to directly transmit the message forthe dangerous situation to the digital key 200, so that it can betransmitted to the digital key 200 through the first server 210.

The controller 10 may transmit the message for the dangerous situationto the digital key 200. After automatically outputting the message tothe digital key 200, the controller 10 may determine whether a userinput is received by the digital key 200 after a predetermined time.

In more detail, the controller 10 may periodically transmit a controlsignal to the digital key 200 to determine whether the user input hasbeen received by the digital key 200 for the predetermined time. Whenthe user input is received to the digital key 200 within thepredetermined time, the controller 10 may receive a response signal fromthe digital key 200.

When the response signal is not received from the digital key 200 withinthe predetermined time, the controller 10 may determine that the userinput has not been received by the digital key 200.

When the user input is not received by the digital key 200 for thepredetermined time, the controller 10 may determine that the user hasnot recognized the dangerous situation of the vehicle 1, and mayretransmit or re-output the message about the dangerous situation toanother digital key related to the vehicle 1.

Here, another digital key may be set in advance by the user.

The controller 10 may control a power of some of the cameras 100 (110,120, 130, 140) based on the degree of risk of the dangerous situation.

In more detail, referring to FIG. 1, when the dangerous situation aroundthe vehicle 1 is captured through a first camera 110 as a front cameraand a second camera 120 as a rear camera, the controller 10 may controlthe power of a third camera 130 disposed on a left side of the vehicle 1and a fourth camera 140 disposed on a right side of the vehicle 1 in anON state, in order to enhance a security state of the vehicle 1 based onthe degree of risk of the dangerous situation.

In addition, when the dangerous situation is not captured around thevehicle 1 while the power of the first camera 110 as the front cameraand the second camera 120 as the rear camera is turned on, thecontroller 10 may maintain the power of the third camera 130 disposed onthe left side and the fourth camera 140 disposed on the right side ofthe vehicle 1 in an OFF state.

For example, as illustrated in FIG. 3, when the user parks in an areasurrounded by a wall on the right side and the rear of the vehicle 1,the controller 10 may automatically turn on the first camera 110 and thethird camera 130 and control the power of the second camera 120 and thefourth camera 140 to be turned off.

When a movement of a suspicious person 2 is captured from the firstcamera 110 and the third camera 130 or the dangerous situation iscaptured, the user may input into the digital key 200 to turn on thepower of the second camera 120 and the fourth camera 140 according tothe movement of the suspicious person 2.

At this time, the controller 10 may warn the suspicious person 2 bycontrolling ON and OFF of an emergency light 160 of the vehicle 1according to the position of the suspicious person 2.

The third camera 130 and the fourth camera 140 may be Surround ViewMonitor (SVM), and may be face recognition access cameras, but are notlimited thereto.

The controller 10 may control the power of some of the cameras 100 (110,120, 130, and 140) based on the user input received by the digital key200.

For example, as illustrated in FIG. 3, when the user parks in the areasurrounded by the wall on the right side and the rear of the vehicle 1,the user may input the digital key 200 to turn on the first camera 110and the third camera 130 and turn off the power of the second camera 120and the fourth camera 140.

The controller 10 may automatically execute a long-term recordingfunction of the plurality of cameras 100 when the dangerous situation iscaptured, and automatically terminate the long-term recording functionof the plurality of cameras 100 when the dangerous situation ends.

When the vehicle 1 is parked or stopped, a time to take the image byturning on the cameras 100 and a time to record the image may be a timeinput by the user through the digital key 200.

The controller 10 may periodically control the power of some of theplurality of cameras 100 (110, 120, 130, 140) when the user parks in thedangerous area based on navigation and information related to adangerous area stored in the first server 210.

Here, the danger area may not be an area in which a parking is permittedor may be an accidental area, but is not limited thereto.

Based on at least one of the navigation and information related to thedangerous area stored in the first server 210, the user input receivedin the digital key 200, and the degree of risk of the dangeroussituation, the controller 10 may automatically set an ON or OFFmaintenance time of the emergency light 160 of the vehicle 1.

At this time, a time to maintain the emergency light 160 ON or OFF whenthe vehicle 1 is in the parking and stopping state may be a time inputby the user through the digital key 200.

The controller 10 may control the UWB module to detect obstacles aroundthe vehicle 1 based on the degree of risk of the dangerous situation. Inmore detail, when the degree of risk of the dangerous situation is high,and the degree of risk is high, for security of the vehicle 1, thecontroller 10 may control not only the plurality of cameras 100, butalso the UWB module to detect the obstacles around the vehicle 1.

When the degree of risk of a dangerous situation is changed from a highlevel of a high risk to a low level of a low risk, in order to reducepower consumption, the controller 10 may control the UWB module to stopdetecting the obstacles around the vehicle 1.

The controller 10 may transmit the message corresponding to the degreeof risk of the dangerous situation to the external speaker 150 andcontrol the external speaker 150 so that the external speaker 150outputs a voice corresponding to the message.

The controller 10 may control the external speaker 150 to automaticallyoutput the user's voice received by the digital key 200 from theexternal speaker 150.

The controller 10 may provide a push notification to the digital key 200based on the degree of risk of the dangerous situation.

When there is the user in the vehicle 1, the controller 10 may outputthe message corresponding to the degree of risk on an Audio VideoNavigation (AVN) screen so that the user can recognize it.

The controller 10 may provide the push notification to the AVN based onthe degree of risk of the dangerous situation.

The controller 10 may transmit the image in which the dangeroussituation is captured to the first server 210 based on the degree ofrisk of the dangerous situation.

The controller 10 may transmit the position information of the vehicle 1at the time when the dangerous situation occurs to the first server 210based on the degree of risk of the dangerous situation.

The controller 10 may transmit the image in which the dangeroussituation is captured to the first server 210 based on the degree ofrisk of the dangerous situation.

The controller 10 may provide the image and the message in which thedangerous situation is captured to the digital key 200 and the firstserver 210 by using at least one of Bluetooth, UWB, and LTE, which areshort-range communication, and LTE, which is a long-distancecommunication.

The first server 210 may store the image in which the dangeroussituation is captured and the position information of the vehicle 1 atthe time when the dangerous situation occurs. In more detail, the firstserver 210 may selectively store the image in which the dangeroussituation is captured according to a storage capacity. In addition, thefirst server 210 may selectively store all or only part of the image inwhich the dangerous situation is captured based on the degree of risk ofthe dangerous situation.

Based on the degree of risk, the first server 210 may transmit the imagein which the dangerous situation is captured and the positioninformation of the vehicle 1 at the time when the dangerous situationoccurs to the second server 220. In addition, the first server 210 maytransmit the captured image for the dangerous situation to the secondserver 220.

For example, when a crime related to an area where the vehicle 1 isparked occurs, the controller 10 may transmit the image of the dangeroussituation stored in the first server 210 and the position information ofthe vehicle 1 to the second server 220. In this case, the captured imageand the position information may be anonymized and transmitted to thesecond server 220.

Here, the first server 210 may be one of the external servers of thevehicle 1 that stores information related to the vehicle 1, and thesecond server 220 may be one of the external servers of an externalsecurity company or a police station.

When the dangerous situation is captured, the controller 10 maydetermine whether the situation captured by the cameras 100 is thedangerous situation by performing a suspect determination algorithm.

The controller 10 may determine the degree of risk of the dangeroussituation when it is determined that it is the dangerous situation byperforming the suspect determination algorithm.

Here, the suspect determination algorithm may be an algorithm fordetermining a person who has an intention of the crime through the imagecaptured by the cameras 100. In more detail, by recognizing aphysiological of a person through an image mapping captured by thecameras 100 so as to recognize a minute vibration of the person aroundthe vehicle 1, it is possible to determine the person with the intentionof the crime.

Here, the dangerous situation may be a situation in which a personlooking around the vehicle 1 exists, but is not limited thereto.

The controller 10 may include a non-transitory memory storing analgorithm to control operation of the components in the vehicle 1 ordata about a program that implements the algorithm, and a processorcarrying out the aforementioned operation using the data stored in thememory. The memory and the processor may be implemented in separatechips. Alternatively, the memory and the processor may be implemented ina single chip.

A storage may correspond to a memory that stores the above-mentionedinformation and information described later. In order to store varioustypes of information, the storage may be implemented with at least oneof the non-volatile memory device, such as cache, read only memory(ROM), programmable ROM (PROM), erasable programmable ROM (EPROM),electrically erasable programmable ROM (EEPROM), a volatile memorydevice, such as random access memory (RAM), or a storage medium, such asa hard disk drive (HDD) or a compact disk (CD) ROM, without beinglimited thereto.

The cameras 100 may have a plurality of channels, and may obtain theimage around the vehicle 1.

It goes without saying that the camera 100 can be provided in thevehicle 1 to perform an operation of a Surround View Monitor (SVM).

The camera 100 may be provided on the front, rear, left, or right sideof the vehicle 1, but is not limited thereto. In this case, the camera100 provided on the left and right sides of the vehicle 1 may be theSVM.

The camera 100 may be provided on a window glass inside the vehicle 1,may be provided on a room mirror inside the vehicle 1, and may beprovided with a roof panel, but may be provided to be exposed to theoutside, but is limited thereto.

The camera 100 may include a Charge-Coupled Device (CCD) camera or aCMOS color image sensor. Here, both the CCD and CMOS may refer to asensor that converts and stores light input through a lens of the camera110 into an electrical signal.

The communicator 170 may communicate with the first server 210.

The communicator 170 may transmit and receive information with externalserver using various methods such as Radio Frequency (RF), WirelessFidelity (Wi-Fi), Bluetooth, Zigbee, Near Field Communication (NFC), andUltra-Wide Band (UWB) communication. A method of performingcommunication with the external server is not limited to theabove-described method, and any method may be used as long as it is amethod capable of communicating with the external server.

In more detail, with reference to FIG. 2, the communicator 170 isillustrated as a single configuration factor for transmitting andreceiving signals, but is not limited thereto, and a transmitter fortransmitting the signal and a receiver for receiving the signal may becomposed of a separate existence.

FIGS. 4A-4B are views illustrating a screen output to a digital key of avehicle according to an embodiment of the disclosure.

When the vehicle 1 is parked, the vehicle 1 may capture the situationaround the vehicle 1 through the camera 100 and determine whether thecaptured situation is the dangerous situation.

Referring to FIG. 4A, when the position at which the vehicle 1 is parkedthrough the first server 210 and the navigation is the dangerous area ora no-parking area, the vehicle 1 may determine the user is still insidethe vehicle 1. When the user is inside the vehicle 1, the vehicle 1 mayoutput a message “Parking here is dangerous” on the AVN screen of thevehicle 1.

Referring to FIG. 4B, when the user is outside the vehicle 1, thedigital key 200 may output a message saying “It's dangerous where youpark right now”.

For example, when the degree of risk of the dangerous situation aroundthe vehicle 1 is at the low level, the digital key 200 may only outputthe push notification. When the degree of risk is at a normal level, thedigital key 200 may output the push notification and the messagetogether.

FIGS. 5A-5E are views illustrating a message for a voice output to anexternal speaker of a vehicle according to an embodiment of thedisclosure.

When the vehicle 1 is parked, the vehicle 1 may capture the situationaround the vehicle 1 through the camera 100 and determine whether thecaptured situation is the dangerous situation.

Referring to FIG. 5A, when it is determined that this is the dangeroussituation, the vehicle 1 may output a voice “Please move away from thevehicle” from the external speaker 150.

Referring to FIG. 5B, when the degree of risk of the dangerous situationis normal, the external speaker 150 may output a voice saying “I willstart recording video from now on”.

Referring to FIG. 5C, when the degree of risk of the dangerous situationis high, the external speaker 150 may output a voice saying “If you takea dangerous action, you will be automatically connected to the policestation.”

Referring to FIG. 5D, when the degree of risk in the dangerous situationis high, the external speaker 150 may output a voice input by the useron the digital key 200, “I am the owner of the vehicle. What is goingon?”

Referring to FIG. 5E, when the degree of risk in the dangerous situationis high, the external speaker 150 may output a voice input by the useron the digital key 200, “I am the owner of the vehicle. Please step outof the vehicle. You may get hurt.”

As described above, various messages may be output according to thedegree of risk of the dangerous situation, but is not limited thereto.

FIG. 6 is a flowchart illustrating a method of controlling a vehicleaccording to another embodiment of the disclosure.

Referring to FIG. 6, the vehicle 1 may determine whether a predetermineddangerous situation has been captured through the plurality of cameras100 at 11.

Here, the dangerous situation may be a situation in which the personlooking around the vehicle 1 exists, and for example, when the positionof the vehicle 1 is an accidental area, it may be determined that thesurroundings of the vehicle 1 are the dangerous situation.

When the dangerous situation is captured, the vehicle 1 may determinethe degree of risk of the dangerous situation. In addition, the power ofthe plurality of cameras 100 may be controlled according to the degreeof risk of the dangerous situation.

For example, when the dangerous situation around the vehicle 1 iscaptured through the first camera 110 as the front camera and the secondcamera 120 as the rear camera, in order to enhance the security state ofthe vehicle 1 based on the degree of risk of the dangerous situation,the vehicle 1 may control the power of the third camera 130 disposed onthe left side of the vehicle 1 and the fourth camera 140 disposed on theright side of the vehicle 1 in the ON state.

For example, when the dangerous situation around the vehicle 1 iscaptured through the first camera 110 as the front camera and the secondcamera 120 as the rear camera, the vehicle 1 may control the UWB moduleto detect the obstacles around the vehicle 1. In more detail, when thedegree of risk of the dangerous situation is high and the degree of riskof the vehicle 1 is high, for the security of the vehicle 1, thecontroller 10 may control not only the plurality of cameras 100, butalso the UWB module to detect the obstacles around the vehicle 1.

When the dangerous situation is captured, the vehicle 1 may search forthe position information of the digital key 200 at 12.

When the position information of the digital key 200 is searched, thevehicle 1 may determine that the position of the digital key 200 islocated in a short distance from the vehicle 1, and may directlytransmit the message for the dangerous situation and the image in whichthe dangerous situation is captured to the digital key 200 at 13.

In more detail, based on the degree of risk of the dangerous situation,the vehicle 1 may control the digital key 200 to automatically outputthe message about the dangerous situation and the image in which thedangerous situation is captured.

When the position information of the digital key 200 is not searched,the vehicle 1 may determine that the position of the digital key 200 isfar from the vehicle 1, and may transmit a message and a captured imageto the digital key 200 through the first server 210. Here, the firstserver 210 may selectively store the message and the captured imagereceived from the vehicle 1 based on the degree of risk of the dangeroussituation.

In this case, the vehicle 1 may transmit image information or graphicprocessing data to the digital key 200 using the UWB module.

After transmitting the message and the image information to the digitalkey 200, the vehicle 1 may determine whether the user input has beenreceived by the digital key 200 after a predetermined time elapses at14.

When the user input is received by the digital key 200 after thepredetermined time, the vehicle 1 may operate a warning according to thedegree of risk of the dangerous situation at 15.

When the user input is not received by the digital key 200 after thepredetermined time, the vehicle 1 may transmit the message and the imageinformation to the first server 210 at 16. In addition, the vehicle 1may retransmit or re-output the message and the image information toanother digital key related to the vehicle 1 at 17.

FIG. 7 is a flowchart illustrating a method of controlling a vehicleaccording to another embodiment of the disclosure.

Referring to FIG. 7, a warning method based on the degree of risk of thedangerous situation occurring around the vehicle 1 is illustrated.

When the degree of risk of the dangerous situation is the low risk,which is the low level, the vehicle 1 may warn a suspect by controllingthe emergency light 160 of the vehicle 1. The vehicle 1 may transmit themessage about the dangerous situation to the digital key 200 in responseto a case where the degree of risk is the low risk, so that the user canrecognize the situation around the vehicle 1. For example, a messagetransmitted to the digital key 200 says “There is the suspect around thevehicle” at 15-1.

In addition, in response to the case in which the degree of risk of thedangerous situation is the low risk, the vehicle 1 may be controlled tooutput only the push notification to the digital key 200.

When the degree of risk of the dangerous situation is a medium risk ofan intermediate level, the vehicle 1 may warn the suspect by controllingthe external speaker 150 to output the voice corresponding to themessage. For example, the message output from the external speaker 150may be “Please withdraw from the vehicle.”

In addition, when the degree of risk of the dangerous situation is themedium risk of the intermediate level, the vehicle 1 may inform the userto recognize the surrounding situation of the vehicle 1 by controllingthe digital key 200 to automatically output the voice corresponding tothe message at 15-2.

When the degree of risk of the dangerous situation is the high risk, thevehicle 1 may output a theft alarm, and may warn the suspect bycontrolling the external speaker 150 to output the voice correspondingto the message.

In addition, when the degree of risk of the dangerous situation is thehigh risk, which is the high level, the vehicle 1 may transmit the imageof the dangerous situation captured by the camera 100 to the digital key200.

In addition, by controlling the vehicle 1 to automatically output theimage from the digital key 200, the vehicle 1 may inform the user torecognize the surrounding situation of the vehicle 1 at 15-3.

In addition, when the degree of risk of the dangerous situation is thehigh risk, the vehicle 1 may transmit the image of the dangeroussituation captured by the camera 100 and the position information of thevehicle 1 at the time when the dangerous situation occurs to the firstserver 210.

When the degree of risk of the dangerous situation is the high risk,which is the high level, the first server 210 may transmit the image inwhich the dangerous situation is captured and the position informationof the vehicle 1 at the time when the dangerous situation occurs to thesecond server 220. In addition, the first server 210 may transmit thecaptured image for the dangerous situation to the second server 220.

In addition, the vehicle 1 may transmit the image in which the dangeroussituation is captured and the position information of the vehicle 1 atthe time when the dangerous situation occurs to a designated numbercorresponding to the dangerous situation at 15-4.

Here, the first server 210 may be the one of the external servers of thevehicle 1 that stores the information related to the vehicle 1, and thesecond server 220 may be the one of the external servers of the externalsecurity company or the police station. In this case, the designatednumber may be a number corresponding to the external security company orthe police station, but is not limited thereto.

According to the embodiments of the disclosure, it is possible tominimize the user's anxiety by determining the presence or absence ofthe suspect or the dangerous situation occurring around the vehicle.

In addition, by determining the presence or absence of the suspect,there is an effect of preventing intelligent crime in advance.

The disclosed embodiments may be implemented in the form of a recordingmedium storing computer-executable instructions that are executable by aprocessor. The instructions may be stored in the form of a program code,and when executed by a processor, the instructions may generate aprogram module to perform operations of the disclosed embodiments. Therecording medium may be implemented non-transitory as a non-transitorycomputer-readable recording medium.

The non-transitory computer-readable recording medium may include alltypes of recording media storing commands that may be interpreted by acomputer. For example, the non-transitory computer-readable recordingmedium may be, for example, ROM, RAM, a magnetic tape, a magnetic disc,flash memory, an optical data storage device, and the like.

Embodiments of the disclosure have thus far been described withreference to the accompanying drawings. It should be apparent to thoseof ordinary skill in the art that the disclosure may be practiced inother forms than the embodiments as described above without changing thetechnical idea or essential features of the disclosure. The aboveembodiments are only by way of example, and should not be interpreted ina limited sense.

1. A vehicle comprising: a plurality of cameras configured to capture asurrounding situation of the vehicle; an external speaker configured tooutput a sound to an outside of the vehicle; a communicator configuredto communicate with a first server; and a controller configured to:based on a case where a dangerous situation is captured through theplurality of cameras, determine a degree of risk of the dangeroussituation; based on the degree of risk, control an Ultra Wide Band (UWB)module to detect obstacles around the vehicle; control at least one of adigital key and an external speaker to output a message for thedangerous situation or an image in which the dangerous situation iscaptured; and transmit the image in which the dangerous situation iscaptured to the first server through the communicator.
 2. The vehicleaccording to claim 1, wherein the controller is configured to control apower of some of the plurality of cameras based on at least one of thedegree of risk and a user input received on the digital key.
 3. Thevehicle according to claim 1, wherein the controller is configured to:based on the case in which the dangerous situation is captured throughthe plurality of cameras, search position information of the digitalkey; based on the position information of the digital key and the degreeof risk, transmit the image in which the dangerous situation is capturedto the digital key; and control to output the captured image from thedigital key.
 4. The vehicle according to claim 1, wherein the controlleris configured to control the external speaker to output at least one ofa user's voice received by the digital key and a voice corresponding tothe message for the dangerous situation.
 5. The vehicle according toclaim 1, wherein, based on a case where a user input is not received inthe digital key for a predetermined time after transmitting the messagefor the dangerous situation to the digital key, the controller isconfigured to retransmit the message for the dangerous situation toanother digital key.
 6. The vehicle according to claim 1, wherein thecontroller is configured to perform a suspect determination algorithm todetermine whether the situation captured from the plurality of camerasis the dangerous situation.
 7. The vehicle according to claim 1,wherein, based on the degree of risk, the first server is configured tostore at least one of the image in which the dangerous situation iscaptured, the image for the dangerous situation, and positioninformation of the vehicle at a time when the dangerous situationoccurs.
 8. The vehicle according to claim 1, wherein the first server isconfigured to transmit the image in which the dangerous situation iscaptured to the second server based on the degree of risk.
 9. Thevehicle according to claim 8, wherein: the first server is an externalserver of the vehicle that stores information related to the vehicle;and the second server is a server of an external company.
 10. Thevehicle according to claim 1, wherein the controller is configured toprovide a push notification to the digital key based on the degree ofrisk.
 11. A method of controlling a vehicle comprising: based on a casewhere a dangerous situation is captured through a plurality of cameras,determining, by a controller, a degree of risk of the dangeroussituation; based on the degree of risk, controlling, by the controller,an Ultra Wide Band (UWB) module to detect obstacles around the vehicle;controlling, by the controller, at least one of a digital key and anexternal speaker to output a message for the dangerous situation or animage in which the dangerous situation is captured; and transmitting, bythe controller, the image in which the dangerous situation is capturedto the first server.
 12. The method according to claim 11, furthercomprising: controlling, by the controller, a power of some of theplurality of cameras based on at least one of the degree of risk and auser input received on the digital key.
 13. The method according toclaim 11, further comprising: based on the case in which the dangeroussituation is captured through the plurality of cameras, searching, bythe controller, position information of the digital key; based on theposition information of the digital key and the degree of risk,transmitting, by the controller, the image in which the dangeroussituation is captured to the digital key; and controlling, by thecontroller, to output the captured image from the digital key.
 14. Themethod according to claim 11, further comprising: controlling, by thecontroller, the external speaker to output at least one of a user'svoice received by the digital key and a voice corresponding to themessage for the dangerous situation.
 15. The method according to claim11, further comprising: based on a case where a user input is notreceived in the digital key for a predetermined time after transmittingthe message for the dangerous situation to the digital key,retransmitting, by the controller, the message for the dangeroussituation to another digital key.
 16. The method according to claim 11,further comprising: performing, by the controller, a suspectdetermination algorithm to determine whether the situation captured fromthe plurality of cameras is the dangerous situation.
 17. The methodaccording to claim 11, wherein, based on the degree of risk, the firstserver is configured to store at least one of the image in which thedangerous situation is captured, the image for the dangerous situation,and position information of the vehicle at a time when the dangeroussituation occurs.
 18. The method according to claim 11, wherein thefirst server is configured to transmit the image in which the dangeroussituation is captured to the second server based on the degree of risk.19. The method according to claim 18, wherein: the first server is anexternal server of the vehicle that stores information related to thevehicle; and the second server is a server of an external company. 20.The method according to claim 11, further comprising: providing, by thecontroller, a push notification to the digital key based on the degreeof risk.