Vehicular safety monitoring

ABSTRACT

Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of and priority to U.S. ProvisionalPatent Application No. 63/141,248, filed Jan. 25, 2021, entitled“VEHICULAR SAFETY MONITORING,” and is a continuation-in-part of U.S.Non-Provisional patent application Ser. No. 17/157,369. Filed Jan. 25,2021, entitled “PHYSICALLY SECURED DEVICE FOR VEHICLE INTRUSTIONDETECTION,” which is a continuation of U.S. Non-Provisional patentapplication Ser. No. 16/988,447, filed Aug. 7, 2020, entitled“PHYSICALLY SECURED DEVICE FOR VEHICLE INTRUSION DETECTION,” whichclaims the benefit of and priority to U.S. Provisional PatentApplication No. 62/883,875, filed Aug. 7, 2019 and entitled “SYSTEMS,METHODS, AND APPARATUSES FOR AUTOMOBILE ACCESS AND INTRUSION DETECTION,”all of which are incorporated herein by reference in their entireties.

TECHNICAL FIELD

The present systems and processes relate generally to detecting andresponding to activity in and around a vehicle.

BACKGROUND

Previous approaches to monitoring vehicle safety typically rely ondetecting potential safety issues such as impacts, rapid acceleration,and aggressive braking. However, such approaches may fail to account forother common safety issues including infant abandonment, passengerendangerment, and hazardous driving. For example, previous vehiclesafety systems are typically agnostic as to the presence of an infantwithin a vehicle and, therefore, are unable to alert a driver that theyhave left the infant in the vehicle (e.g., where temperature and airconditions may quickly approach hazardous levels). As another example,previous vehicle safety systems may be unable to detect that a teenagedriver operates a vehicle in violation of a curfew, with an illegalnumber of passengers, and in the presence of marijuana vapors. Inanother example, previous solutions may allow for a senior citizen orother at-risk person to operate a vehicle without alerting a careprovider. In the same example, safety solutions may be incapable ofaddressing vehicle safety issues commonly experienced by the elderly,such as, for example, loss of direction or driving outside of daylighthours.

Therefore, there is a long-felt but unresolved need for a system orprocess that detects and responds to potentially hazardousvehicle-related events and activities.

BRIEF SUMMARY OF THE DISCLOSURE

Briefly described, and according to one embodiment, aspects of thepresent disclosure generally relate to systems and processes formonitoring a vehicle and subjects therein.

In various embodiments, the present disclosure provides systems andprocesses for detecting and responding to various vehicle-relatedevents. Non-limiting examples of vehicle-related events include thepresence and absence of one or more subjects in a vehicle, endangermentor distress of the subjects, and various statuses of the vehicle. In oneexample, the present system monitors for abandonment of an infant in thevehicle and/or occurrence of potentially hazardous conditions therein(e.g., excess heat, carbon monoxide, etc.). In another example, thesystem monitors behavior and vehicle operation of teenage occupants,such as, for example, reckless driving, curfew violation, and controlledsubstance consumption. In another example, the system monitors drivingperformance and safety of a senior driver. The system can performvarious response actions based on detecting one or more events.Non-limiting examples of actions include, but are not limited to,transmitting an alert (e.g., to a mobile device, emergency contacts, lawenforcement, etc.), generating various effects within and around thevehicle (e.g., lights and sounds for attracting attention of passersby),controlling one or more vehicle elements (e.g., preventing engineignition, controlling locks, (de)activating an air conditioner,(de)activating a heater, (de)activating an entertainment system, etc.),generating reports of driver and vehicle performance, and generatinguser interfaces for controlling system functions and for monitoring thevehicle and/or subjects therein.

According to a first aspect, a system, comprising: A) a data storecomprising event configuration data; B) at least one sensor configuredto sense at least one type of measurement corresponding to a vehicle;and C) at least one computing device coupled to the at least one sensor,the at least one computing device configured to: 1) read a plurality ofmeasurements from the at least one sensor; 2) determine that aparticular event has occurred by analyzing the plurality of measurementsbased on the event configuration data; and 3) in response to determiningthat the particular event has occurred, perform at least one remedialaction.

According to a further aspect, the system of the first aspect or anyother aspect, wherein the at least one computing device is furtherconfigured to: A) generate at least one driving score corresponding tothe vehicle based on the plurality of measurements; B) determine alocation associated with the vehicle; and C) generate at least one roadcondition score corresponding to the location, wherein determining thatthe particular event has occurred comprises analyzing the at least onedriving score and the at least one road condition score.

According to a further aspect, the system of the first aspect or anyother aspect, wherein the at least one computing device is furtherconfigured to: A) determine a geographical identifier for a locationassociated with the vehicle; and B) download a weather reportcorresponding to the geographical identifier, wherein determining theparticular event has occurred by analyzing the plurality of measurementsis further based on the weather report.

According to a further aspect, the system of the first aspect or anyother aspect, wherein the at least one computing device is furtherconfigured to analyze the plurality of measurements by comparing theplurality of measurements to at least one predefined threshold.

According to a further aspect, the system of the first aspect or anyother aspect, wherein the at least one computing device is furtherconfigured to: A) compute at least one metric on the plurality ofmeasurements over a predefined time window; and B) analyze the pluralityof measurements by comparing the at least one metric to at least onepredefined threshold.

According to a further aspect, the system of the first aspect or anyother aspect, wherein the event configuration data comprises a pluralityof events, at least one respective threshold associated with individualones of the plurality of events, and at least one respective remedialaction associated with the individual ones of the plurality of events,and the at least one computing device is further configured to determinethe particular event from the plurality of events by determining thateach of the at least one respective threshold associated with theparticular event is met, wherein the at least one remedial actioncomprises the at least one respective remedial action associated withthe particular event.

According to a further aspect, the system of the first aspect or anyother aspect, wherein the at least one remedial action comprisesrestricting a speed of the vehicle.

According to a second aspect, a method, comprising: A) sensing, via atleast one sensor, at least one type of measurement corresponding to avehicle; B) reading, via at least one computing device, a plurality ofmeasurements from the at least one sensor; C) determining, via the atleast one computing device, that a particular event has occurred byanalyzing the plurality of measurements based on event configurationdata; and D) in response to determining that the particular event hasoccurred, performing, via the at least one computing device, at leastone remedial action.

According to a further aspect, the method of the second aspect or anyother aspect, further comprising: A) determining, via the at least onecomputing device, a count of individuals in the vehicle based on theplurality of measurements; and B) determining, via the at least onecomputing device, that the particular event has occurred by analyzingthe plurality of measurements based further on the count of individualsin the vehicle.

According to a further aspect, the method of the second aspect or anyother aspect, wherein reading the plurality of measurements comprises:A) determining, via the at least one computing device, a speed and adirection of the vehicle; and B) applying, via the at least onecomputing device, a plurality of rules to the plurality of measurementsto determining that the particular event has occurred, wherein the eventconfiguration data comprises the plurality of rules.

According to a further aspect, the method of the second aspect or anyother aspect, wherein the at least one remedial action comprisesgenerating an alert on a mobile device associated with an administrativeuser.

According to a further aspect, the method of the second aspect or anyother aspect, further comprising determining, via the at least onecomputing device, that the vehicle has lost traction on a road based onthe plurality of measurements, wherein the particular event isdetermined based further on the vehicle losing traction.

According to a further aspect, the method of the second aspect or anyother aspect, further comprising: A) determining, via the at least onecomputing device, a current position of the vehicle on a particularroad; B) determining, via the at least one computing device, a currentspeed limit for the current position on the particular road; C)comparing, via the at least one computing device, a current vehiclespeed of the vehicle to the current speed limit to determine a speeddelta of the vehicle relative to the current speed limit; and D)determining, via the at least one computing device, that the particularevent has occurred further by determining that the speed delta meets apredefined speed delta threshold based on the event configuration data.

According to a further aspect, the method of the second aspect or anyother aspect, further comprising: A) determining, via the at least onecomputing device, at least one adverse driving condition based on theplurality of measurements; and B) modifying, via the at least onecomputing device, the predefined speed delta threshold based on the atleast one adverse driving condition.

According to a third aspect, a non-transitory computer-readable mediumembodying a program that, when executed by at least one computingdevice, causes the at least one computing device to: A) read a pluralityof measurements from at least one sensor configured to sense at leastone type of measurement corresponding to a vehicle; B) determine that aparticular event has occurred by analyzing the plurality of measurementsbased on event configuration data stored in a memory associated with theat least one computing device; and C) perform at least one remedialaction based on the particular event occurring.

According to a further aspect, the non-transitory computer-readablemedium of the third aspect or any other aspect, wherein the at least oneremedial action comprises disabling the vehicle.

According to a further aspect, the non-transitory computer-readablemedium of the third aspect or any other aspect, wherein the programfurther causes the at least one computing device to: A) determine acurrent driver of the vehicle; and B) load the event configuration dataassociated with the current driver from a plurality of eventconfiguration data.

According to a further aspect, the non-transitory computer-readablemedium of the third aspect or any other aspect, wherein the programfurther causes the at least one computing device to determine thecurrent driver of the vehicle based on reading an identifier from anelectronic device in the vehicle.

According to a further aspect, the non-transitory computer-readablemedium of the third aspect or any other aspect, wherein the electronicdevice comprises at least one of: a key FOB, a smart phone, a tablet, ora laptop.

According to a further aspect, the non-transitory computer-readablemedium of the third aspect or any other aspect, wherein the particularevent comprises a vehicular accident and the at least one remedialaction comprises generating a notification to emergency responseservices.

According to a fourth aspect, a method, comprising: A) capturing, via atleast one image sensor, a plurality of video frames corresponding to avehicle; B) reading, via at least one computing device, a plurality ofmeasurements from at least one sensor; C) determining, via the at leastone computing device, that a particular event has occurred in thevehicle by analyzing the plurality of measurements and the plurality ofvideo frames based on event configuration data; and D) in response todetermining that the particular event has occurred, performing, via theat least one computing device, at least one remedial action.

According to a further aspect, the method of the fourth aspect or anyother aspect, wherein the at least one sensor comprises an infraredcamera and the method further comprises: A) reading, via the at leastone computing device, a plurality of infrared frames from the infraredcamera; B) identifying, via the at least one computing device, an areawith a thermal variance in at least one of the plurality of infraredframes; and C) monitor a temperature of the area with the thermalvariance, wherein determining that the particular event has occurredfurther comprises determining that the temperature of the area exceeds atemperature threshold.

According to a further aspect, the method of the fourth aspect or anyother aspect, further comprising: A) monitoring, via the at least onecomputing device, to determine whether the particular event has ended;and B) performing, via the at least one computing device, a plurality ofadditional remedial actions over time until the particular event ends.

According to a further aspect, the method of the fourth aspect or anyother aspect, further comprising determining a temperature in thevehicle exceeds a predetermined temperature threshold based on theplurality of measurements, wherein the at least one remedial action isfurther performed in response to the temperature exceeding thepredetermined temperature threshold.

According to a further aspect, the method of the fourth aspect or anyother aspect, further comprising: A) monitoring a length of time sincethe particular event started; and B) determining that the length of timeexceeds a time threshold, wherein the at least one remedial action isfurther performed in response to the length of time exceeding the timethreshold.

According to a further aspect, the method of the fourth aspect or anyother aspect, wherein the particular event comprises one of: a childbeing left in the vehicle or a pet being left in the vehicle.

According to a further aspect, the method of the fourth aspect or anyother aspect, wherein the at least one remedial action comprisesgenerating an alert on a mobile device associated with an administrativeuser.

According to a fifth aspect, a system, comprising: A) a data storecomprising event configuration data; B) at least one sensor configuredto sense at least one type of measurement corresponding to a vehicle;and C) at least one computing device coupled to the at least one sensor,the at least one computing device configured to: 1) read a plurality ofmeasurements from the at least one sensor; 2) determine that aparticular event has occurred by analyzing the plurality of measurementsbased on the event configuration data; and 3) in response to determiningthat the particular event has occurred, perform at least one remedialaction.

According to a further aspect, the system of the fifth aspect or anyother aspect, further comprising a body of a sensing device, wherein theat least one sensor and the at least one computing device are disposedwithin the body and the body is configured to be affixed to an interiorof the vehicle.

According to a further aspect, the system of the fifth aspect or anyother aspect, wherein the at least one sensor comprises a camera, theparticular event comprises leaving an infant in the vehicle, and the atleast one computing device is configured to analyzing the plurality ofmeasurements by performing image analysis on a plurality of frames fromthe camera to identify the infant in the vehicle.

According to a further aspect, the system of the fifth aspect or anyother aspect, wherein the at least one sensor comprises a camera, theparticular event comprises leaving a pet in the vehicle, and the atleast one computing device is further configured to determine that aparticular event has occurred by analyzing the plurality of measurementsby: A) performing image analysis on a plurality of frames from thecamera to identify the pet in the vehicle; B) monitoring the pet in thevehicle in the plurality of frames over a period of time; C) determiningthat the period of time exceeds a time threshold; and D) determiningthat the particular event has occurred responsive to the period of timeexceeding the time threshold.

According to a further aspect, the system of the fifth aspect or anyother aspect, wherein the at least one computing device is furtherconfigured to enter into an arm mode in response to the pet beingidentified in the vehicle.

According to a further aspect, the system of the fifth aspect or anyother aspect, wherein the at least one computing device is configured toperforming the at least one remedial action by: A) initiating a videocall to a mobile device associated with a particular user account; B)streaming an audio and video feed of an interior of the vehicle to themobile device; and C) outputting, via a speaker in the interior of thevehicle, an audio signal from the mobile device.

According to a further aspect, the system of the fifth aspect or anyother aspect, wherein the at least one sensor comprises a microphone,the particular event comprises leaving an infant in the vehicle, and theat least one computing device is configured to analyzing the pluralityof measurements by performing audio analysis on an audio stream from themicrophone to identify the infant in the vehicle.

According to a sixth aspect, a non-transitory computer-readable mediumembodying a program that, when executed by at least one computingdevice, causes the at least one computing device to: A) read a pluralityof measurements from at least one sensor configured to sense at leastone type of measurement corresponding to a vehicle; B) determine that aparticular event has occurred by analyzing the plurality of measurementsbased on event configuration data stored in a memory associated with theat least one computing device; and C) perform at least one remedialaction based on the particular event occurring.

According to a further aspect, the non-transitory computer-readablemedium of the sixth aspect or any other aspect, wherein the at least onesensor comprises a camera and the program further causes the at leastone computing device to: A) read the plurality of measurements from theat least one sensor comprises receiving a plurality of video frames fromthe camera; and B) track a movement pattern of a pet within a subset ofthe plurality of video frames.

According to a further aspect, the non-transitory computer-readablemedium of the sixth aspect or any other aspect, wherein the programfurther causes the at least one computing device to: A) analyze aplurality of frames from a camera device, wherein the at least onesensor comprises the camera device; B) identify an animal in at leastone frame of the plurality of frames; and C) determine a currenttemperature in the vehicle meets or exceeds a predefined thresholdstored in the event configuration data, wherein determining that theparticular event has occurred is responsive to the animal beingidentified and the current temperature in the vehicle meeting orexceeding the predefined threshold.

According to a further aspect, the non-transitory computer-readablemedium of the sixth aspect or any other aspect, wherein the at least oneremedial action comprises starting the vehicle.

According to a further aspect, the non-transitory computer-readablemedium of the sixth aspect or any other aspect, wherein the at least oneremedial action comprises at least partially opening at least one windowin the vehicle.

According to a further aspect, the non-transitory computer-readablemedium of the sixth aspect or any other aspect, wherein the programfurther causes the at least one computing device to determine a lastdriver of the vehicle, wherein the at least one remedial actioncomprises sending an alert to a mobile device associated with the lastdriver.

These and other aspects, features, and benefits of the claimedinvention(s) will become apparent from the following detailed writtendescription of the preferred embodiments and aspects taken inconjunction with the following drawings, although variations andmodifications thereto may be effected without departing from the spiritand scope of the novel concepts of the disclosure.

BRIEF DESCRIPTION OF THE FIGURES

The accompanying drawings illustrate one or more embodiments and/oraspects of the disclosure and, together with the written description,serve to explain the principles of the disclosure. Wherever possible,the same reference numbers are used throughout the drawings to refer tothe same or like elements of an embodiment, and wherein:

FIG. 1A illustrates an exemplary security device according to oneembodiment of the present disclosure;

FIG. 1B illustrates an exemplary security device according to oneembodiment of the present disclosure;

FIG. 2 illustrates an exemplary monitoring system according to oneembodiment of the present disclosure;

FIG. 3 is a flowchart of an exemplary detection process according to oneembodiment of the present disclosure;

FIG. 4 is a flowchart of an exemplary vehicle monitoring processaccording to one embodiment of the present disclosure;

FIG. 5 is a flowchart of an exemplary vehicle monitoring processaccording to one embodiment of the present disclosure; and

FIG. 6A illustrates exemplary vehicle environments according to oneembodiment of the present disclosure;

FIG. 6B also illustrates exemplary vehicle environments according to oneembodiment of the present disclosure;

FIG. 7 also illustrates exemplary vehicle environments according to oneembodiment of the present disclosure;

FIG. 8 also illustrates exemplary vehicle environments according to oneembodiment of the present disclosure;

FIG. 9 also illustrates exemplary vehicle environments according to oneembodiment of the present disclosure;

FIG. 10 also illustrates exemplary vehicle environments according to oneembodiment of the present disclosure; and

FIG. 11 illustrates an exemplary user interface on the mobile deviceaccording to on embodiment of the present disclosure.

DETAILED DESCRIPTION

For the purpose of promoting an understanding of the principles of thepresent disclosure, reference will now be made to the embodimentsillustrated in the drawings and specific language will be used todescribe the same. It will, nevertheless, be understood that nolimitation of the scope of the disclosure is thereby intended; anyalterations and further modifications of the described or illustratedembodiments, and any further applications of the principles of thedisclosure as illustrated therein are contemplated as would normallyoccur to one skilled in the art to which the disclosure relates. Alllimitations of scope should be determined in accordance with and asexpressed in the claims.

Whether a term is capitalized is not considered definitive or limitingof the meaning of a term. As used in this document, a capitalized termshall have the same meaning as an uncapitalized term, unless the contextof the usage specifically indicates that a more restrictive meaning forthe capitalized term is intended. However, the capitalization or lackthereof within the remainder of this document is not intended to benecessarily limiting unless the context clearly indicates that suchlimitation is intended.

FIG. 1A is a perspective view of a security device 101 according to oneembodiment of the present disclosure. It will be understood that thesecurity devices shown in FIGS. 1A and 1 n other drawings are providedfor exemplary purposes of illustration and description. The securitydevice 101 can include a body 103 with a generally cylindrical shape.The shape of the body can correspond to a shape of a target site withina vehicle 204 (FIG. 2 ). For example, the body 103 can be shaped toconform to a cup-holder, side door receptacle, or other structure withinthe vehicle 204. In some embodiments, multiple devices 101 of varyingshapes are included. For example, a vehicle (not shown) can include afirst security device of a generally cylindrical shape for conforming toa cup-holder and a second security device of a generally rectangular andlow profile shape for conforming to a side door receptacle or to mountto the front of back of a seat. The body 103 can include one or morematerials including, but not limited to, high-strength plastics,polymers, resins, metals, such as stainless steel, and other resilientor semi-resilient materials.

The body 103 can include a first portion 105 and a second portion 107.The first portion 105 can rotate about the second portion 107. The firstportion 105 can freely rotate about the second portion 107.Alternatively, the first portion 107 can rotate freely only between afirst and a second position that correspond to particular functions ofthe security device 101. In one example, the rotation of the firstportion 105 about the second portion 107 can engage a locking mechanism(not shown in FIG. 1A).

The second portion 107 can include one or more legs 109 that areconfigured to extend or protrude outward from the body 103 in responseto the engaging of the locking mechanism. In one example, rotation ofthe first portion 105 about the second portion 107 causes the pluralityof legs 109 to extend outward and contact and apply pressure to thewalls of a target site, such as a cup holder. As shown in FIG. 1A, theleg 109 is in an unextended position. The leg 109 can include one ormore materials, such as stainless steel or high-strength plastics. Adistal end 111 of the leg 109 can include one or more friction materialsconfigured to contact and generate frictional forces with the walls of atarget site. The friction materials can demonstrate a greatercoefficient of friction than other materials from which the leg 109 isformed. Such frictional materials may include rubber, foam, or othermaterials with high coefficients of friction.

One or more sensors 218 can be disposed on or within the first portion105 and/or the second portion 107. In one example, the first portion 105includes a first sensor 218 attached to a sensor mount 110, and aplurality of secondary sensors 218 configured externally on the body103. In another example, the first portion 105 includes a first sensorfor detecting motion of a person and the second portion 107 includes asecond sensor for detecting tilt of the vehicle 204. In another example,the first portion 105 includes a first sensor for detecting pressure andthe second portion 107 includes a second sensor for detecting sound. Thebody 103 can include one or more sensor mounts 110 to which one or moresensors 218 are mounted. The sensor 218 can detect activity occurringwithin the security device 101 and/or within and around a vehicle withinwhich the security device 101 is installed.

The first portion 105 can include a cup holder 113 for receiving abeverage or other item. In some embodiments, the first portion 105includes a slot that can receive a mobile device, such as a smartphone.The first portion 105 can include a magnetic or rubberized phone mountfor securely holding a smartphone. The security device 101 can include adevice for generating alarms of varying frequency, volume, composition,and duration. The body 103 can include perforations 115 or other voidsfor improved transmission of alarms and other sounds originating withinthe body 103. The first portion 105 can include one or more grooves 117formed into the body 103 that provide means for easier extraction ofitems, such as a smartphone or beverage, placed within the cup holder113.

According to one embodiment, the security device 101 includes one ormore speakers (not shown) for transmitting audible alarms and othernotifications. The cup holder 113 and/or other portions of the body 103can be configured to amplify sounds from the speaker. For example, thesecond portion 107 can be shaped to cause a reverberation of soundswithin the cup holder 113. In an exemplary scenario, sound from thespeaker is projected downward into the cup holder 113 and isreverberated by the second portion 107 such that a clarity and/or volumeof the sound is enhanced. In a similar example, the second portion 107is shaped to reverberate sound through one or more perforations 115throughout the body 103.

FIG. 1B is a perspective view of the security device 101 according toone embodiment of the present disclosure. In the embodiment shown inFIG. 1B, the first portion 105 has been rotated from a first position(e.g., as shown in FIG. 1A) to a second position and, in response to therotation, a plurality of legs 109 extend outward from the second portion107. In one example, the first portion 105 is rotated about 45 degreescounterclockwise, thereby engaging a locking mechanism (not shown) thatextends the plurality of legs 109 outward.

FIG. 2 illustrates an exemplary networked environment 200. As will beunderstood and appreciated, the networked environment 200 shown in FIG.2 represents merely one approach or embodiment of the present system,and other aspects are used according to various embodiments of thepresent system.

The networked environment 200 can include one or more security devices101, a computing environment 203, one or more mobile devices 206, avehicle 204, and one or more remote devices 209 in communication via anetwork 212. In some embodiments, the security device 101 maycommunicate with the vehicle 204 over a first network (e.g., via an OBDport), the remote device 209 via a second network 212, and communicateto the computing environment 203 and the mobile device 206 via thirdnetwork 212. In at least one embodiment, the security device 101 may notcommunicate with the vehicle 204 and/or any remote devices 209.

The security device 101 can include a monitor application 215, one ormore sensors 218 a, one or more transceivers 221 a, one or more storagedevices 224 a, one or more power sources 227 a, and one or more lockingmechanism 230. The security device 101 can include a circuit board withan embedded computing device or system-on-a-chip (SOC) architecture. Thesecurity device 101 can include a computing device with a processor andmemory to execute the monitoring application 215. The monitoringapplication 215 can read measurements from each of the sensors 218 a.Based on the measurements, the monitor application 215 can determinewhether a particular event or activity has taken place. Non-limitingexamples of activities and events include, but are not limited to,unlawful or unpermitted vehicle operation, vehicle collision, infantplacement and/or abandonment, operation of the vehicle 204 by aparticular subject (e.g., a teenager, senior citizen, etc.), andpresence of controlled substances within the vehicle 204.

The monitor application 215 can be executed by a processor of thesecurity device 101 to receive measurements from the sensors 218 a,which can be stored in the storage device 224 a. The monitor application215 can send the measurements from the storage device 224 a to thesecurity service 233 via the network 212 using the transceiver 221 a.The network 212 includes, for example, the Internet, intranets,extranets, wide area networks (WANs), local area networks (LANs), wirednetworks, wireless networks, or other suitable networks, etc., or anycombination of two or more such networks. For example, such networks caninclude satellite networks, cable networks, Ethernet networks, and othertypes of networks.

The sensors 218 can sense various aspects of inside or outside of thevehicle 204 and potentially areas proximate the vehicle 204. In someembodiments, the sensor 218 senses various aspects of the securitydevice 101. The sensor 218 can include, but is not limited to, passiveinfrared (PIR) sensors, microwave sensors, ultrasound sensors, auditorysensors including microphones and glass break sensors, pressure sensors,temperature sensors (e.g., for measuring internal and external vehicletemperature, subject temperature, etc.), air quality sensors, ambientlight sensors, video and still image cameras, proximity sensors, globalpositioning system (GPS) sensors, speed sensors, accelerometers,compass, barometer, motion sensors including gyroscopic sensors,pressure sensors, weight sensors, radio frequency sensors includingBluetooth, WiFi, NFC and other RF sensors, tilt sensors, radar sensors,light detecting and ranging (LiDAR) sensors, chemical sensors,capacitive touch sensors, flame sensors, and road condition sensors(e.g., for measuring grip, road surface temperature, dew point,humidity, rain, snow, ice, frost, etc.).

The monitor application 215 can utilize various sensors to detect eventsand generate an alert to an administrative user or local authorities,such as a medical response unit, a police service, or a fire service. Inone example, the monitor application 215 can read from a chemical sensorto detect carbon monoxide, tobacco, alcohol, marijuana, and/or otherchemical signatures. In another example, a camera sensor captures animage of a vehicle interior and performs facial recognition or anothercalibration process to detect the presence of a subject (e.g., aninfant, teenager, etc.) within the vehicle. The monitor application 215can analyze a stream from the camera sensor to detect smoke or specificactions in the vehicle. In another example, the monitor application 215can read a radio frequency sensor to detects a mobile device 206 withina predetermined proximity of the vehicle 204 or security device 101. Inanother example, the monitor application 215 can read from an audiosensor to detect a key word or phrase (e.g., a curse word or blacklistedphrase, a predetermined emergency phrase, etc.). The words or phrasesmay be from a predetermined list of words or phrases. In one example,the list of words or phrases is a blacklist of words or phrasesdetermined as inappropriate for a particular driver (e.g., a teen). Inanother example, the list of words or phrases includes commands, such as“help”, that can alert local authorities, for example, if an elderlydriver is having a medical emergency.

In another example, the monitor application 215 can read from a lightsensor to determine that a vehicle 204 is being operated after sundown.The monitor application 215 can receive an indication from the vehicle204 that an ignition event has occurred outside of a preconfiguredoperating schedule. In response to an ignition event, the monitorapplication 215 may attempt to determine a current driver, such as, forexample, by searching for a Bluetooth wireless device associated with aparticular individual, by scanning for an identifier in a key fobassociated with a particular individual, by analyzing a video feed, bymonitoring a driving style and comparing the driving style to profilesassociated with one or more individuals, or through some other manner.In another example, the monitor application 215 can read from a roadcondition sensor and/or a weather service to detect moisture and/ortemperature levels associated with potentially icy road conditions. Inanother example, the monitor application 215 can read from anaccelerometer to detect and record speed, acceleration, sideways motion,and breaking patterns of the vehicle 204 (e.g., to assess drivingperformance, determine a likelihood of racing or driving aggressively,determine a likelihood of driving under a speed limit, or determine alikelihood that an accident occurred or is about to occur). The monitorapplication 215 can utilize a GPS location and direction of travel toidentify a current street and identify the speed limit for that streetfrom a database or remote service. The monitor application 215 canmonitor for unsafe lane changes, for example, by identifying when a turnsignal is enabled when a vehicle is in an adjacent lane or identifyingan incomplete lane change.

The sensor 218 can include one or more emitting components, such asradar-emitting, laser light-emitting, visible light-emitting, infraredlight-emitting, ultraviolet light-emitting, sound wave-emitting, ormicrowave-emitting elements for use with various sensors 218. In oneexample, the sensors 218 include one more video recording devices thateach comprise an upwardly, outward, downward (or other direction) facingwide-angle camera for detecting a 360 degree view of the interior of thevehicle 204 from one or more perspectives. In certain embodiments, a PIRsensor 218, a speaker, a GPS sensor 218, and other sensors 218 may bepositioned in optimal locations within the apparatus for optimizingperformance (e.g., the PIR sensor 218 may be positioned on the driver'sside of the apparatus to better detect driver behavior or positionedhanging from a backseat headrest to view down on a child seat to betterdetect presence of an infant).

The one or more sensors 218 may operate simultaneously, and each sensor218 may communicate the sensor data including readings, measurements,and/or a feed to the monitor application 215. In various embodiments,the sensor data may be communicated along a wired or wirelessconnection. Each sensor 218 may include its own designated GPIO line ofa processor, its own buffer circuit, such as I2C, RS232, RS485, etc., ormay share a data bus to communicate with the monitor application. Insome embodiments, one or more sensors 218 may communicate wirelesslywith the security device 101 and include separate power sources 227 a.Examples of sensor data include, but are not limited to, captured image,video, or audio data and values for pressure, temperature (e.g.,discrete temperature or a rate of change of temperature), humidity,distance, orientation (e.g., tilt), weight, reflected signal strength,and other measurements.

The monitor application 215 can manage the configurations of each of thesensors 218 individually or in the aggregate. In some embodiments, areading from a first sensor 218 can cause the monitor application 215 tomake a configuration change to a second sensor 218. The monitorapplication 215 can configure the various sensors according to one ormore rules in the configuration data 245. In some embodiments, theconfiguration settings for each sensor are determined by the securityservice 233 and sent to the monitor application 215 to apply to thesensors 218. In other embodiments, the monitor application 215 canreceive the rules from the security service 233 and apply the rules toconfigure the security device 101 (e.g., the sensors 218 a and othercomponents) and potentially other devices, such as the vehicle 204 andthe remote devices 209. In one embodiment, the monitor application mayreceive feedback of one or more false identifications of an event andadjust a configuration of the security device 101 based on the sensordata that resulted in the false identification. As an example, a weightassociated with measurements from a particular motion sensor 218 can bereduced in response to false identifications of events resulting frommeasurements from the particular motion sensor 218 (e.g., if theparticular motion sensor 218 captures movement of trees outside of awindow while parked. The configuration adjustments based on falseidentification can be limited to a particular geofence, such as whenparked in a particular driveway. Measurements from a first sensor 218can be processed and analyzed in a local computing environment anddeterminations generated therefrom can be used to initiate aconfiguration change of a second sensor 218 from a low power mode to ahigh power mode (or vice versa).

In some examples, configuring the sensor corresponds to adjusting theway the monitor application 215 interacts with the sensor. The monitorapplication 215 may receive a stream of a video from a camera sensor 218and only store at the predetermined frequency according to theconfiguration. In one example, the monitor application 215 can configurea camera sensor to continuously operate in a low frequency mode and asound sensor to continuously operate in a high frequency mode. In thissame example, upon the sound sensor detecting a sound of a frequency anddecibel level that satisfies a predetermined threshold (e.g., such as awindow breaking or door handle being operated), the camera sensor isre-configured to a high-frequency mode and captures a continuous videoof the vehicle interior for a predetermined time period.

The sensor 218 can be configured to continuously record a predeterminedperiod of activity at a predetermined refresh rate. In one example, acamera sensor continuously captures a threshold duration of video datain a buffer in real time, the buffer being overwritten by eachsubsequent capture. In the same example, in response to determining thatan event has occurred, the most-recent buffer of video data can beretrieved to provide analyzable data for activity occurring in or aroundthe vehicle 204 during the time period immediately preceding the event.

In some embodiments, one or more sensors 218 may correspond to one ormore electrical components in communication with the monitor application215 via one or more general purpose input and output pins. The monitorapplication 215 may generate a signal, such as an RS232 signal, an RS485signal, an I2C signal, or another signal, to communicate with, readfrom, or configure the sensor 218. The sensor 218 may include an onboardmemory with configuration options to store the configuration from themonitor application 215. In other embodiments, the sensor 218 may beconfigured based on an input voltage at one or more pins, and themonitoring application 215 can control the output voltage (e.g., via adigital to analog converter, through pulse width modulation, or similarcontrol) on the one or more pins to configure the sensor 218. In anotherembodiment, the sensor 218 may be configured based on a resistancebetween two or more pins, and the monitoring application 215 can adjusta variable resistance to configure the sensor 218.

The monitor application 215 can be configured to perform variousprocesses for supporting functions of the security device 101 including,but not limited to, processing sensor readings, analyzing sensorreadings, and, based on the analyses, determining if an event hasoccurred. In some embodiments, the monitor application 215 can cause thesecurity device 101 to undergo a change in operating mode. For example,the monitor application 215 can determine that readings from a sensor218 exceed a predetermined threshold and, in response to thedetermination, the security device 101 can transition from a low powermode associated with passive sensor processing to a high power modeassociated with transmitting sensor readings and generating alerts.

The monitor application 215 can enable or disable the transceiver 221 a.The transceiver 221 can communicate with the network 212 via an internetconnection. The internet connection can correspond to a cellular dataconnection, a satellite data connection, a WiFi connection, or someother connection. In one embodiment, the security device 101 can connectto a WiFi network provided by the vehicle 204. In another embodiment,the security device 101 can use a first transceiver 221 to access orprovide a cellular or satellite data connection, and the security device101 can use a second transceiver 221 to provide a WiFi hotspot in thevehicle 204. The vehicle 204 or a mobile device 206 may utilize the WiFihotspot to access the internet via the first transceiver and the secondtransceiver.

The transceiver 221 can be configured for sending and receiving data viathe network 212. The monitor application 215, via the transceiver 221 a,can transmit and receive various commands from the computing environment203 and/or the mobile device 206. In response to commands received atthe transceiver 221, various behaviors and parameters of the securitydevice 101 (or components connected thereto) can be changed. Forexample, the monitor application 215 can receive a command instructingthe security device 101 to enter a normal or high power mode. Inresponse to receiving the command, the monitor application 215 canautomatically re-configure the security device 101 from a low power modeto the normal or high power mode. As another example, the monitorapplication 215 can receive a request for sensor readings including avideo of the interior of the vehicle 204. In this example, in responseto receiving the request, the monitor application 215 can retrieve andtransmit buffer data comprising the video to the computing environment203, to the mobile device 206, or to a particular destination providedin the request.

The storage 224 can provide data storage for interim data being used bythe monitor application 215, such as historical sensor measurementsincluding video and audio data among other data. The monitor application215 may store and maintain one or more sensor data buffers on thestorage 224 with a configured amount of sensor history. As an example,the storage 224 may include a video buffer with the most recent thirtyseconds of video being stored. When an unauthorized event is detected,the monitor application 215 may capture and store sensor data (e.g.,video, audio, or other sensor data) during the unauthorized event. Themonitor application 215 may copy or otherwise initialize the sensor datafor the unauthorized event with a portion or all of the sensor databuffers. The monitor application 215 may transmit the stored sensor datato the computing environment 203, either in real-time or in segmentsaccording to predetermined criteria. In some embodiments, the storage224 includes information associated with one or more user accountsregistered with the security device 101. For example, the storage 224can include lists of contacts, payment processing information,addresses, and other data.

As an illustrative example, a senior may walk around the vehicle 204from 1:00:01 PM to 1:00:27 PM, then proceed to enter the vehicle 204from 1:00:28 PM to 1:00:45 PM. The monitor application 215 may sense thesenior entering the vehicle 204, via one or more sensors 218 at 1:00:29PM. At 1:00:29 PM, the sensor data buffer may include historical datameasurements from 12:59:59 PM (e.g., if configured for a 30 secondbuffer), and the monitor application 215 can capture and store sensordata including the sensor data buffer from 12:59:59 PM (or a subsetthereof).

The power source 227 can include a battery, a capacitor, a DC powersource, an AC power source, another power source, or a combinationthereof. As an example, the security device 101 may have a batterymounted inside of a case to provide power to circuitry and sensors 218included therein. As another example, the security device 101 mayreceive power from the vehicle 204, such as from a cigarette lighter, apower outlet, a USB port, an OBD port, a wireless charging connection,or through another connection. In one example, the vehicle 204 mayinclude a wireless power source 227 (e.g., a QI or other inductivecharger) in a cup holder or another location, and the security device101 can receive electrical energy from the wireless charger. Thesecurity device 101 may store the electrical energy in an onboardbattery or other onboard power source 227.

The security device 101 can be mounted into the vehicle 204 to provide auser of the vehicle 204 with monitoring and notification when amalicious party interacts with the vehicle 204. The security device 101can be secured into the vehicle 204 via the locking mechanism 230 toprevent the malicious party from being able to remove or disable thesecurity device 101 during an unauthorized interaction with the vehicle204, e.g., a break-in event. In one embodiment, the security device 101has a form factor that fits within a cup holder of the vehicle 204. Abody of the security device 101 can include a first portion and a secondportion that can be rotated relative to one another. The lockingmechanism 230 may engage when the first portion rotates relative to thesecond portion in a first direction and disengage when the first portionrotates relative to the second portion in a second direction. The firstdirection may be opposite the second direction.

The locking mechanism 230 can include an engaging component that can beenabled or disabled electronically, for example, in response to acommand or in response to a particular sensor reading or determinationgenerated therefrom. In some embodiments, the engaging and disengagingof the locking mechanism can be enabled or disabled by the monitorapplication 215. In one example, the security device 101 may include asolenoid that may extend or retract to enable or disable the lockingmechanism 230. As another example, the locking mechanism 230 can includea cam that may rotate to engage or disengage a clutch mechanism. Whenthe engagement component is disabled, rotating the first portionrelative to the second portion does not engage or disengage the lockingmechanism 230. In contrast, when the engagement component is enabled,rotating the first portion relative to the second portion does engageand/or disengage the locking mechanism 230. In one example, the securitydevice 101 receives a command from the mobile device 206 to disable thelocking mechanism 230 and, in response, the locking mechanism 230receives a signal causing the engaging component to be disabled. Inanother example, a sensor 218 measures an RFID key fob and the monitorapplication 215 determines that the RFID key fob is within apredetermined distance and is associated with an identifier. In thisexample, in response to the determination, the locking mechanism 230automatically disables the engaging component.

The remote device 209 may also include a locking mechanism 230 (notshown). The locking mechanism 230 can include shackle style lock thatgoes around a component (e.g., a metal tube supporting the headrest) ofa headrest associated with a headrest or attaches to some other area ofthe vehicle to secure the security device 101 or remote device 209. Insome embodiment, the locking mechanism 230 serves as a warning mechanismrather than a prevention mechanism. As an example, the locking mechanism230 may include a magnet that adheres to a part of the vehicle, such asa door or metallic/magnetic portion. The locking mechanism 230 caninclude a sensor to differentiate when the magnet is affixed to thevehicle and when it is free from the vehicle. The monitor application215 may trigger an alarm if the remote device 209 or the security device101 is removed from an affixed surface of the vehicle.

When engaging, the locking mechanism 230 may include extending one ormore legs or protrusions outward from the body. The protrusions maycontact and apply a pressure to an interior surface of the cup holdersuch that the protrusions create static friction to prevent removal whenan upward or extracting force is applied to the security device. Thelocking mechanism 230 may include a clutch mechanism or other forcelimiting mechanism to prevent damage to the cup holder of the vehicle204. As an example, once the outward force of the protrusions meets orexceeds a threshold, the clutch mechanism can disengage or slip to allowrotation of the first portion relative to the second portion in thefirst direction without further engaging the locking mechanism 230. Insome embodiments, the monitor application 215 may sense the activationof the clutch mechanism or that the locking mechanism 230 is fullyengaged. The monitor application 215 may provide feedback to a user ofthe security device 101. The feedback can include providing visualfeedback via a light (e.g., a light ring), providing audible feedback(e.g., a chirp or ding), send a message (e.g., a text message, anotification, or an email), or through some other feedback. In alternateembodiments, the locking mechanism 230 is a motorized locking system, ascrew lock system (e.g., without a clutch mechanism), or anothernon-clutch-based mechanism for extending the plurality of legs 109. Inat least one embodiment, the locking mechanism 230 engages based onnon-friction-based mechanisms, such as, for examples, suction elements,magnets, and adhesives, among others.

The computing environment 203 can include one or more mobile devices206, a security service 233, and a data store 236. The elements of thecomputing environment 203 can be provided via a plurality of computingdevices that may be arranged, for example, in one or more server banksor computer banks or other arrangements. Such computing devices can belocated in a single installation or may be distributed among manydifferent geographical locations. For example, the computing environment203 can include a plurality of computing devices that together mayinclude a hosted computing resource, a grid computing resource, and/orany other distributed computing arrangement. In some cases, thecomputing environment 203 can correspond to an elastic computingresource where the allotted capacity of processing, network, storage, orother computing-related resources may vary over time.

The data store 236 can store various data that is accessible to thesecurity device 101 and/or the mobile device 206, and is used by thenetworked environment to execute various processes and functionsdiscussed herein. The data store 236 can be representative of aplurality of data stores 112 as can be appreciated. The data store 236can include, but is not limited to, user data 239, operation data 242,and configuration data 245. In some embodiments, the user data 239,operation data 242, and/or configuration data 245 (or subsets thereof)are stored in storage 224, such as on the security device 101.

The user data 239 can include information associated with one or moreuser accounts. For example, for a particular user account, the user data239 can include, but is not limited to, an identifier, user credentials(e.g., a username and password, biometric information, such as a facialor fingerprint image, cryptographic keys such as public/private keys,etc.), a name of an owner of the vehicle 204 in which the securitydevice 101 is installed, contact information (e.g., phone number, email,etc.) for a user associated with the user account, user preferences forcontrolling processes in the networked environment 200, paymentprocessing information (e.g., credit card number, expiration date,etc.), and information related to the vehicle 204 (e.g., a make, model,license plate number, etc.). In some embodiments, the user data 239, ora subset thereof, is stored in an encrypted format. For example,personally identifiable information (PII) associated with the user orthe vehicle 204 can be encrypted such that access thereto requires adual-authentication process, authentication of a public-private keypair, and/or other security measures.

The operation data 242 can include readings or measurements from thesensors 218 or other information related to the operation of thesecurity device 101. The operation data 242 can include other historicalinformation such as a history of mode transitions, a history of problems(e.g., data transmission errors, storage errors on storage 224 includingfile system corruptions, interruptions or disruptions to the powersource 227, failure of the locking mechanism 230, identification of anattempt to remove the security device 101 from vehicle 204, etc.). Thereadings and historical information can include timestamps such that theoperation data 242 provides a time-series of data describing activitiesoccurring in or around the vehicle 204.

The configuration data 245 can include parameters for controllingoperation of each sensor 218. Non-limiting examples of parametersinclude, but are not limited to, sensor modes, schedules for controllingsensor behavior, sensitivity levels, power levels, thresholds, and othersuitable parameters. The configuration data 245 can include anidentifier corresponding to each sensor 218. In some embodiments,portions of the configuration data 245 that are co-temporal can bestored as a multi-dimensional storage object in which each dimensioncorresponds to a particular sensor 218 and/or sensing mode (e.g., video,audio, environmental, etc.).

The configuration data 245 can include various threshold values,benchmark values, or ranges of values for controlling processesdescribed herein. In some embodiments, the storage 224 includesconfiguration data 245 associated with each sensor 218 in communicationwith the security device 101. The configuration data 245 can include oneor more rules and configuration options for each security device 101.The rules can be configured by a user via the mobile device 206. As anexample, a first rule for a first security device 101 may relate toprivacy and specify that the GPS location of the vehicle is not to betransmitted or stored in the data store 236. A second rule for a secondsecurity device 101 may specify that the GPS location should bedetermined and sent continuously or at a predetermined frequencywhenever an event is detected (e.g., whenever the vehicle 204 exceedspredetermined speed limits, a subject enters or exits the vehicle 204,etc.). In some embodiments, a rule may be dependent on an identifiedcurrent driver of the vehicle. As an example, the GPS location may becontinuously sent when a teen son or daughter of an owner is driving thevehicle but not when an owner of the vehicle is driving. Other rules mayinclude power usage restrictions (e.g. converting to low-power modeautomatically at a preset battery level, disabling a particular sensor218 until a measurement from another sensor 218 meets a configuredthreshold, etc.), authentication requirements (e.g., multi-factorauthentication, etc.), and other rules.

The configuration data 245 can be send to the security device 101, forexample, upon setup of the security device 101 and upon changesthereafter. When the security device 101 is offline, any changes toconfiguration data 245 may be held until the next communication with thesecurity device 101 or upon a scheduled event, such as while parked in agarage with high-speed internet. Changes to the configuration data 245can be pushed by the security service 233 or pulled by the monitorapplication 215. The changes to the configuration data 245 may be sentas a complete set of configuration data 245 or can be sent as a deltasuch that only changed, added, or removed data is sent. Othernon-limiting examples of configuration data 245 include, but are notlimited to, audio level thresholds, temperature thresholds, humiditythresholds, pressure change thresholds, emitted or reflected signalthresholds (e.g., heat signals, ultrasonic signals, etc.), tiltthresholds, weight thresholds, vehicle-specific profiles, andcombinations of thresholds. In one example, a first threshold for anaudio sensor 218 comprises a value that, upon being exceeded by areading of the audio sensor 218, causes the audio sensor 218 totransition from a lower power mode to a high power mode.

The security service 233 can be executed in the computing environment203 to receive contextual data including sensor readings and other datafrom the security device 101. The security service 233 can receive,process, and respond to requests from the mobile device 206. Thesecurity service 233 can provide real-time data analyses, which can beused to determine a current status of the vehicle 204. The securityservice 233 can process the readings, compare the readings to user data239, historical operation data 242, or configuration data 245, andgenerate various determinations based on the comparisons and otheranalyses. In one example, the security service 233 can receive andprocess a video stream from the security device 101. In this example,the security service 233 can execute object detection algorithms,machine learning algorithms, etc., on the video data for identifyingfeatures therein and determining if an event occurred, such as placementof an infant into the vehicle 204 or entrance of multiple subjects.

The mobile device 206 can include one or more displays 248, a securityapplication 251, and one or more input devices 254. The securityapplication 251 can be executed to monitor and control the securitydevice 101. In some embodiments, the security application 251 cancommunicate with the monitor application 215 directly or via thesecurity service 233. The security application 251 can communicate withthe security service 233 to determine various information about thesecurity device 101 including determining a current mode, a currentlocation, a history of events, sensor measurement information, a lockstage of the locking mechanism 230, and various other details. Thesecurity application 251 can generate user interfaces to display thevarious information and receive edits from a user. The securityapplication 251 can communicate those edits to the security service 233or monitor application 215 to adjust configuration properties of thesecurity device 101 and vehicle 204 and cause actions to be performedthereby. As used herein, “location” can refer to any suitableidentifier, metric, measurement, or other value for indicatinggeographical position. Non-limiting examples of location include zipcode, longitude and latitude, address, geocodes, and geohashes.

The mobile device 206 can be any network-capable device including, butnot limited to, smartphones, computers, tablets, smart accessories, suchas a smart watch, key fobs, and other external devices. The mobiledevice 206 can include a computing device with a processor and memory.The mobile device 206 can include a display 248 on which various userinterfaces can be rendered by the security application 251 to configure,monitor, and control the security device 101. The security application251 can correspond to a web browser and a web page, a mobile app, anative application, a service, or other software that can be executed onthe mobile device 206. The security application 251 can displayinformation associated with processes of the security device 101. Themobile device 206 can include an input device 254 for providing inputs,such as requests and commands, to the mobile device 206. The inputdevices 254 can include a keyboard, mouse, pointer, touch screen,speaker for voice commands, camera or light sensing device to reachmotions or gestures, or other input device. The security application 251can process the inputs and transmit commands, requests, or responses tothe security device 101 or the computing environment 203 based thereon.According to some embodiments, the mobile device 206 is maintained by asystem user and is often physically separate and remote from thesecurity device 101.

The security application 251 can implement an application programminginterface (API) for facilitating communication with the security device101 and/or computing environment 203. The security application 251 cantransmit, modify, and store various data on the mobile device 206, suchas, for example, an identifier corresponding to the security device 101(or a user thereof) and other user data 239, operation data 242, orconfiguration data 245. In one example, the security application 251 cantransmit commands to the security device 101 or computing environment203 that cause effect generation (e.g., audiovisual alerts, micenablement, etc.) and/or adjust functions of the security device 101 orvehicle 204. In another example, the security application 251 transmitslocation data comprising a location of the mobile device 206 to thecomputing environment 203 that processes the location data to determineif the user is within a predetermined range of the vehicle 204.

When proximate to the security device 101, the security application 251can communicate with the monitor application 215 via a local wirelesscommunication, such as near field communication (NFC), Bluetooth, WiFi,or other wireless communications. The mobile device 206 may beconsidered proximate to the security device 101 when the mobile device206 is within a wireless range of the security device 101 for the localwireless communication technology. In some embodiments, the monitorapplication 215 can transition to a different mode based on one or moremobile devices 206 entering or leaving the range of the wirelesscommunication technology.

The remote device 209 can include one or more sensors 218 b, one or moreprocessors 216, one or more transceivers 221 b, one or more storagedevices 224 b, and one or more power sources 227 b. The remote device209 can include a computing device with a processor and memory toexecute an application to perform various functionality discussedherein. The remote device 209 may comprise a secondary device to receivesensor measurements remote from the security device 101. As an example,the remote device 209 may be positioned further toward a rear of thevehicle 204 than the security device 101 such that measurements fromsensors 218 b (e.g., a PIR sensor 218 b or microwave sensor 218 b, etc.)can collect measurements from a different perspective or position withinthe vehicle. In one example, the remote device 209 can be positioned ina rear cup holder, a door cup holder, a door storage area, affixed to awindow, positioned in the truck, or located in another position. Inanother example, the remote device 209 is mounted to a rim of a wheeland includes GPS sensors (e.g., allowing for tracking of the location oftire if removed from the vehicle 204). The remote device 209 can includea battery power source 227 b, a solar power source 227 b, and/or may becoupled to a power source 227 b of the vehicle 204. In some embodiments,the remote device 227 b has a battery power source 227 b and thesecurity device 101 has a power source 227 a that receives electricalenergy from the vehicle 204.

The remote device 209 can communicate with the security device 101 via atransceiver 221 b. The communication may utilize a close proximity andlow power technology that may be wireless or wired, such as Bluetooth,NFC, Zigbee, Z-Wave, WiFi, or similar localized wireless RFcommunication. The remote device 209 may transmit measurements fromsensors 218 b to the monitor application 215 for further processing andtransmission to the computing environment 203. In one embodiment, theremote device 209 reads measurements from sensors 218 b at a frequencythat is below the frequency of measurements read from sensors 218 a toconserve power from power source 227 b. In some embodiments, the remotedevice 209 only communicates with the security device 101. In at leastone embodiment, the remote device 209 reads measurements at a lowersensitivity than the security device 101 to conserve power. As anexample, the sensitivity of a first microwave sensor 218 a is configuredto be higher and use more power than the sensitivity of a secondmicrowave sensor 218 b. Similar to the security device 101, the remotedevice 209 can store sensor data locally on a storage 224 b and transmitthe sensor data from the storage 224 b or can transmit the sensor datadirectly as read.

In some embodiments, the remote devices 209 are distributed around theinterior and/or exterior of the vehicle 204, and each of the remotedevices 209 can communicate with the security device 101 from itsrespective location. Accordingly, each of the remote devices 209 can belocated in a position for optimally recording particular regions of thevehicle 204, for optimally detecting infant placement and abandonment,or other suitable goal.

The vehicle 204 can include one or more sensors 218 c, an on-boarddiagnostics (OBD) port 257, and one or more transceivers 221 c. Thevehicle 204 can communicate with the network 212 via a wirelesstransceiver 221 c or wired connection. It can be appreciated thatvehicles 106 include various technologies for collecting data such asGPS systems, diagnostic systems, vehicle status systems, and othersystems. The vehicle 204 may obtain vehicle information natively such astire pressure, a current location, an engine temperature, vehicleinterior temperature, exterior temperature, a status of whether thevehicle 204 is running, a position of each window of the vehicle 204,any outstanding service or maintenance issues of the vehicle 204, aspeed of the vehicle 204, a direction of travel of the vehicle 204, acount of miles traveled since starting the vehicle 204, a status ofwhether each door is opened or closed, a status of whether or not eachdoor is locked or unlocked, a status of whether the hood or trunk isopen or closed, a status as to whether the gas cap is secured, engineignition attempts, a change in fuel levels, changes in pedal positions,a status of whether the vehicle 204 is in drive, reverse, park, neutralor other drive configuration, a status of which gear the vehicle is in,a status of whether a seatbelt is buckled or unbuckled, a status ofwhether a seat is occupied (e.g., by a mass exceeding one or morepredetermined thresholds), a deployment and/or integrity status of oneor more airbags, entertainment system activity (e.g., current mediainput, output, and other information), and other information related tothe current or historical state of the vehicle 204.

The security device 101 can communicate with the vehicle 204 to obtainthe vehicle information via a wireless connection or a wired connection.As an example, the security device 101 may have a cable plugged into aUSB port, the OBD system 257, or some other wired standard to requestand receive the vehicle information. In some embodiments, the securitydevice 101 includes an external component that is inserted into an OBDport or USB port, and transmits data therefrom to the security device101. In some embodiments, the security device 101 can also receive apower supply from a wired connection with the vehicle 204. As anotherexample, the vehicle information can be obtained by the security device101 via a wireless connection, such as WiFi or Bluetooth. In someembodiments, the vehicle information is gathered from the mobile device206, such as, for example, via CarPlay or Android Auto and sent to thesecurity service 233 or monitor application 215 for further processing(or processed on the mobile device 206). In one embodiment, the monitorapplication 215, security service 233, or security application 251 cancommunicate with an API of a service provided by the vehiclemanufacturer or a third party to obtain the vehicle information, suchas, for example, Mercedes®'s MBUX®, General Motor®'s OnStar® service,Chrysler®'s UConnect®, Amazon®'s Alexa®, SiriusXM®, or some otherservice. The vehicle 204 may natively transmit some or all of thevehicle information to the third party service natively.

The networked environment 200 can include one or more external systems259 with which the security device 101, vehicle 204, computingenvironment 203, mobile device 206, and remote device 209 communicate.The external system 259 can include, for example, a manufacturer orother third party system associated with the vehicle 204 (e.g., OnStar®,UConnect®, etc.). The external system 259 can include an e-commercesystem, such as, for example, systems provided by Amazon® or Uber®, aswell as various payment processing services, and systems associated withparticular businesses such as a restaurant or retailer. The externalsystem 259 can include one or more POS devices 261 that are configuredto facilitate transactions. In one example, a POS device 261 includes anear-field communication-based (NFC) payment device configured to detectand communicate with the security device 101 to obtain paymentprocessing information. The payment processing information (e.g., creditcard information, etc.) can be stored on the security device 101 and/orin a profile stored at the computing environment 203 or mobile device206.

The external system 259 can include a commerce service 263 configured toprocess requests and commands. In one example, the commerce serviceauthenticates commands or requests associated with a POS device 161. Inanother example, the commerce service 263 receives requests to generateorders for products and/or services, such as food items at a restaurantor a car wash service. In response to receiving requests or commands,the commerce service 263 can authenticate the command or request basedon user data 239 and/or other user data stored at the external system259. In one example, the commerce service 263 requests user credentialsfrom the computing environment 203 to verify an identity of a useraccount with which a command is associated. The commerce service 263 canreceive readings, such as sensor readings from the sensor 218. In oneexample, the commerce service 263 receives location data from the sensor218, and determines that the vehicle 204 is within a predeterminedgeofence associated with a business. In this example, in response to thedetermination, the commerce service 263 transmits one or more offers orother notifications (such as operating hours, navigation instructions,etc.) to the security device 101 or the mobile device 206. The monitorapplication 215 or security application 251 can process the offers orother notifications and cause the security device 101 to announce theoffer as an audible alert.

Reference is made to FIGS. 3-5 , which illustrate exemplary flowchartsand workflows of the present system. As will be understood by one havingordinary skill in the art, the steps and processes shown in FIGS. 3-5(and those of all other flowcharts and sequence diagrams shown anddescribed herein) may operate concurrently and continuously, aregenerally asynchronous and independent, and are not necessarilyperformed in the order shown. In the proceeding description of FIGS. 3-5, various processes and functions are described as being performed by asecurity device (e.g., a security device 101 as shown in FIGS. 1A-B)and, in particular, a monitoring application running thereon (e.g., amonitoring application 215 as shown in FIG. 2 ); however, it will beunderstood embodiments are contemplated in which one or more of thedescribed functions and processes are performed by other suitableelements of a networked environment in communication with the securitydevice.

With reference to FIG. 3 , shown is a flowchart of an exemplarydetection process 300 according to one aspect of the present disclosure.For the purposes of describing exemplary performance of the presenttechnology, the process 300 is described in the context of detecting thepresence and absence of an infant within a vehicle. In variousembodiments, by the process 300, a security device 101 is configuredwithin a vehicle to detect the presence of an infant in the vehicle, andperform one or more appropriate actions based on monitoring the presence(or absence) of the infant. In one example, the security device detectsa placement of an infant in the vehicle, determines that a driver exitsthe vehicle while the infant remains inside, and executes a first levelof response by transmitting an electronic communication to a mobiledevice 206 that alerts the driver of the abandoned infant. In the sameexample, the security device 101 detects the continued presence of theinfant, determines that an internal vehicle temperature and/or carbonmonoxide level exceeds a predetermined safety range, and executes asecond level of response by automatically sounding an audible alarm(e.g., the vehicle's car alarm, a sound system, etc.) and transmittingan emergency alert to local authorities.

At step 303, the process 300 includes configuring one or more securitydevices 101 and potentially one or more remote devices 209 within avehicle 204. In one example, a security device 101 is installed in a cupholder and connected to a power source. In another example, the remotedevice 209 is inserted into a door receptacle, coupled to a seat,mounted in a dome light, or placed elsewhere in the vehicles. Othernon-limiting examples of target sites include, but are not limited to,dashboards, compartments (e.g., glovebox, center console, etc.), airvents, arm rests, buckles, steering wheels, and windows. The securitydevice 101 can be inserted in a disarmed state in which a lockingmechanism 230 is disabled and an engaging component thereof is enabled.Inserting the security device 101 can include connecting the securitydevice 101 to a power source 227, such as an auxiliary power outlet. Insome embodiments, step 303 includes attaching one or more sensors 218and/or remote devices 209 in or around the vehicle 204. For example, asensor 218 for reading data from an OBD system 128 is inserted into anOBD port. In another example, a camera sensor 218 is secured to thedashboard. A sensor 218 can be oriented such that a viewing anglethereof includes a particular area, such as a rear interior of thevehicle 204. Multiple sensors 218 can be positioned such that phenomenamay be detected in a substantial area of the vehicle 204 interior. Insome embodiments, the remote device 209 can be mounted to a collar of apet for precise measurements of body temperature, movement, position,and other aspects. Similarly, the remote device 209 can be positioned ina sock of an individual such as an infant or toddler.

Configuring the security device 101 can include connecting to a network(e.g., 3G, 4G, 5G, LTE, Bluetooth, Wi-Fi, internet, etc.), registeringthe security application 251 with the security device 101, powering-upthe security device 101, initializing one or more of the sensors 218,and downloading and installing the security application 251 onto amobile device 206 of the user. In some embodiments, registering includesproviding the security application 251 with an identification numberassociated with the security device 101 (and/or the sensors 218).Configuring the security device 101 can include pairing the securitydevice 101 with the mobile device 206, vehicle 204, a user account,and/or other computing devices or profiles. In at least one embodiment,pairing the security device 101 can include receiving informationassociated with the vehicle 204 and/or the user. For example, inresponse to receiving the activation signal, the security application251 can launch a window or provide a form requesting a license plate,vehicle make, and vehicle model of the vehicle 204. In another example,the security application 251 can request the user capture a facial imageof themselves or another subject (e.g., an infant, teenager, senior,etc.) and/or provides other credentials for use in securing access tothe security device 101 and controlling performance of the same. Thesecurity application 251 may capture the facial image from variousangles to build a 3D model of the subject for future comparison andrecognition.

Configuring the security device 101 can include downloading a profilefor configuring one or more sensors 218 and/or for communicating with anOBD system 257. The profile can be based on a make, model, and/orproperties of the vehicle 204, a user account with which the securitydevice 101 is associated, a desired operating mode of the securitydevice 101, or other factors, such as physical characteristics of asubject to be monitored). In one example, the computing environment 203receives subject characteristics including an age, height, weight, andfacial image of a subject to be monitored. In response to receiving thecharacteristics, the computing environment 203 retrieves and transmits aparticular profile from a plurality of profiles stored in the data store236 or that is downloaded from a third party service. In response toreceiving the particular profile, the monitor application 215 canrecalibrate, for example, a PR sensor 218A and a weight sensor 218(and/or one or more other sensor 218) to improve a quality of readingstherefrom and/or to reduce a likelihood of false positives occurring.For example, based on the profile, a range parameter of the PIR sensor218A is reduced to conform to the reduced dimensions of the subject. Inanother example, a profile for a vehicle 204 indicates that the vehicle204 is a convertible. In this example, audio sensors are deactivated(e.g., to prevent false positives) and a camera sensor is calibrated tocompensate for changing light quality (e.g., to reduce a risk of ambientlight triggering a false positive or negative determination of vehicleoccupancy). Configuring the security device 101 can include providingproperties of a pet, such as a weight, age, color, type, breed, and sizeof a pet.

A selection can be received for a particular profile from a plurality ofprofiles and the selected profile can be downloaded and/or transmittedto the security device 101. The security device 101 can download aprofile of the vehicle 204 based on make, model, and other information,such as information provided by a user to a security application 251. Inone example, the security device 101 determines that vehicle 204 ismanufactured by Buick™. In this example, the monitor application 215communicates with the security service 233 and/or an external system 259(e.g., hosted by the manufacturer) to identify and download a profileassociated with the make of the vehicle 204. Continuing this example,the profile is processed and one or more calibration parameters areextracted that correspond to one or more sensors 218. The calibrationparameter includes, for example, an updated value for a predeterminedthreshold that is used by audio sensors for detecting window breaks. Thethreshold can be a frequency and/or decibel threshold that is lowered tothe updated value in response to the vehicle 204 having thicker windowsthan vehicles of other makes (e.g., which may result in sounds of windowbreaks having a lower frequency and/or lower volume).

In some embodiments, the security device 101 configures to a particularmode or setting based on a profile or user input. Non-limiting examplesof modes include subject detection or monitoring modes (e.g., such asinfant, child, teenager, or senior monitoring modes), vehicleentertainment system control modes, and commercial interaction modes(e.g., for facilitating transactions such as tolls, drive-thru's, etc.).In one or more embodiments, configuring the security device 101 includesselecting one or more, thresholds, actions, and/or workflows by whichthe security device 101 detects and responds to events.

In some embodiments, the security device 101 can include one or morespeed delta thresholds, one or more predetermined safety threshold,sensor thresholds, or other thresholds. The speed delta threshold can bedefined as an upper and/or lower bound of speed differential thattriggers a security event. As an example, the user may configure thespeed delta threshold of 10 miles per hour or 20% of total speed limitas an upper and/or lower threshold. Continuing this example, thesecurity device 101 can trigger an event if a user meets or exceedsthose thresholds (e.g. the user is traveling at or greater than 10 milesper hour over the speed limit, the user is traveling at or less than 10miles per hour under the speed limit). Another user may set the speeddelta threshold to 5 miles per hour.

The security device 101 can determine that one or more hazardousconditions or adverse driving conditions are present proximate to thevehicle, such as on a roadway that the vehicle is driving, within apredetermine radius of where the vehicle is driving, within apredetermined distance from a path along directions to a specificlocation, scheduled in a particular city that the vehicle is in or isintended to drive through (e.g., intended to drive through as percurrently programmed GPS directions). The security device 101 can modifyone or more thresholds based on the one or more hazardous conditions oradverse driving conditions. As an example, the security device 101 canincrease or reduce the speed delta threshold based on the one or morehazardous conditions or adverse driving conditions. As an example, thesecurity device 101 can determine that the roads may be icy based on atemperature in the current city being below 32 degrees Fahrenheit or 0degrees Celsius. In response to determining that the roads may be icy,the speed delta threshold can be reduced to 50% of the configured value,75% of the configured value, 10 mph less than the configured value orsome other configured change. For example, the security device candetermine the roads may be icy and reduce the speed delta threshold from10 mph down to 5 mph. Each hazardous conditions and/or adverse drivingconditions can be configured to modify or change the speed deltathreshold (or other threshold value) a different or a same amount. Insome embodiments, the thresholds can be configured on a driver by driverbasis. As another example, in response to determining that it may beraining, one or more sensor thresholds can be modified. As an example, asensor that detects proximity of objects to the vehicle (e.g., amicrowave sensor, LiDAR sensor, etc.) may be configured for reducedsensitivity to avoid falsely identifying rain as an object that coulddamage the vehicle.

In one example, the security application 251 generates a user interfacefor configuring the security device 101 including selectable fields forresponse actions and escalating response workflows. In this example,based on one or more selections, the security application 251 generatesa policy by which the security performs detection, monitoring, and alertprocesses. It will be understood and appreciated that modes, settings,rules, actions, thresholds, and policies may be suitably combined toachieve a desired performance state. For example, the monitorapplication 215 configures the security device 101 to an infantmonitoring mode and an entertainment control mode. In some embodiments,a first security device 101 configures to a first mode, such as acommercial interaction mode, and a second security device 101 configuresto a second mode, such as an infant detection mode.

In one example, the security application 251 receives a selection for a“child monitoring” mode and, in response, the monitor application 215retrieves a profile (e.g., or other set of operating parameters andpolicies) and configures the security device 101 based thereon.Configuring the security device 101 to the child monitoring mode caninclude adjusting sensor threshold levels or other rules to detect thepresence (or absence) of an infant within the vehicle 204. For example,a PIR sensor threshold is decreased such that presence of a largersubject is differentiable from a PIR signature of a child-sized subject.As another example, a weight sensor threshold positioned under a carseat is calibrated to a weight range associated with the seat weight andaverage child weight. The adjustment of sensor threshold levels andother rules can be performed based on one or more criteria of a subjectto-be-monitored, such as, for example, age, weight, and height. Forexample, the monitor application 215 calibrates an ultrasonic sensorthreshold to a first range in response to an age selection of 0-18months and calibrates the ultrasonic sensor threshold to a second range,exceeding the first range, in response to an age selection of 3-5 years.

At step 306, the process 300 includes collecting sensor data, such as,for example, readings from a PIR sensor 218. Non-limiting examples ofsensor data include vehicle statuses, signal intensities, temperaturelevels, weight values, audio recordings, visual recordings, and chemicalsignatures. In one example, as an infant is placed in a child safetyseat within a vehicle, a PIR sensor 218 records an increase in signalintensity and a camera sensor captures a facial image of the infant. Inanother example, a sensor 218 connected to a vehicle's OBD portdetermines that a passenger door has been opened and records an increasein weight of a passenger seat. In the same example, the sensor 218further determines that the vehicle is in motion and a seatbelt of thepassenger seat is not engaged. In another example, an audio sensorrecords a subject's vocal command (e.g., “infant mode,” “baby on board,”“pet in car,” or another phrase or keyword).

At step 309, the process 300 includes analyzing sensor data. Analyzingsensor data includes, but is not limited to, comparing sensor data toone or more threshold values, rules, and/or policies. In one example,the monitor application 215 compares a signal value from a PIR sensor toa predetermined threshold. In another example, the monitor application215 applies a facial recognition or object recognition process to imagesfrom a camera sensor 218. In this example, the monitor application 215computes a confidence score that corresponds to a likelihood of theimages including an infant's face or body or pet. In another example,the monitor application 215 analyzes image data from a camera sensor toidentify an animal in one or more frames of the image data and generateand track a movement pattern of the animal based on the image data.

In another example, the monitor application 215 compares readings from aPR sensor 218 to one or more predetermined threshold values fordetecting live human presence. In another example, the monitorapplication 215 analyzes readings from multiple sensors 218 to identifya particular event or pattern, such as placement of an infant into thevehicle and engagement of an infant restraint system. In yet anotherexample, the monitor application 215 analyzes readings from a heatsensor to determine if an infant body is generating body heat in theseat location. In one example, the monitor application 215 determinesthat, within a predetermined time period (e.g., 10 seconds, 1 minutes, 5minutes, etc.), a PIR sensor 218A recorded a spike in reflected signalintensity and a door sensor 218B registered opening and closing of apassenger door. In another example, the monitor application 215 analyzesaudio to detect a baby crying or making other baby noises.

At step 312, the process 300 includes determining that one or morethresholds are met. The threshold can include, for example, a discretevalue or range of values to which sensor readings (or analyses thereof)are compared. In some embodiments, the threshold is referred to as an“infant detection” threshold. In response to determining that thethreshold is met, the process 300 can proceed to step 315. In responseto determining that the threshold is not met, the process 300 canproceed to step 306. It can be appreciated that the monitor application215 can continue to monitor sensor data in steps 306, 309, and 312,while simultaneously proceeding to step 315 when activity is detected.

In one example, the monitoring application 215 computes a confidencescore that readings from a camera sensor include a facial image of aninfant or an object in an image is a pet. In this example, themonitoring application 215 compares the confidence score to apredetermined infant/pet detection threshold (e.g., a predeterminedminimum confidence score) and confirms that the infant/pet detectionthreshold is met based on the confidence score meeting or exceeding thepredetermined minimum confidence score.

In some embodiments, a plurality of thresholds are evaluated forsatisfaction in order to determine that an infant detection threshold ismet. In one example, the monitoring application confirms an infantweight threshold is met by comparing a weight recording to apredetermined range and determining that the weight recording fallswithin the predetermined infant weight range. In the same example, themonitoring application confirms an infant PIR threshold is met based oncomparing a recorded PIR signal to a predetermined PIR value range(e.g., a pre-calibrated measurement associated with PIR-reflectivesubjects of infant/pet size). In this example, the monitoringapplication confirms an infant/pet detection threshold based on thedetermination that both the infant/pet weight threshold and infant/petPIR threshold are met.

In another example, the monitoring application 215 confirms an infantdetection threshold, one or more of facial recognition, proximitydetection (e.g., from an ultrasonic sensor, PIR sensor, radar sensor,etc.), increased weight, seatbelt activation, detecting remote device,detecting voice command, or other aspect. The monitoring application 215can calculate a weighted likelihood that the infant is present based onmultiple sensors.

At step 315, the process 300 includes performing one or more appropriateactions. Non-limiting examples of actions include transmitting an alert,generating effects at the security device 101 and/or vehicle 204,opening one or more windows a predefined amount, dispensing water for apet, changing a mode or other property of the security device 101, andgenerating user interfaces. In one example, in response to determiningan infant is present in the vehicle, the monitoring applicationautomatically transmits an electronic communication (e.g., a textmessage, email, push notification, or other electronic communication) tothe vehicle 204, the mobile device 206, and/or a computing environment203. In this example, in response to receiving the electroniccommunication, a security application 251 running on the mobile device206 generates a user interface for controlling the security device 101and/or monitoring the vehicle 204 and infant. In another example, thesecurity application 251 renders a status alert indicia (e.g., apredetermined message or symbol) on a notification bar of the mobiledevice. In this example, the status alert indicia is configured to beunrenderable until the presence of the infant is no longer detected. Inanother example, the monitor application 215 activates a light source,such as an LED strip on the security device 101, thereby providing avisual indication of the infant's presence. In another example, themonitor application 215 plays an audio alert through the security device101 or a sound system of the vehicle 204.

At step 318, the process 300 includes collecting second sensor data.Step 318 can occur continuously following the configuration of thesecurity device 101 (e.g., step 303). Non-limiting examples of secondsensor data include vehicle statuses, mobile device statuses, signalintensities, temperature levels, weight values, audio recordings, visualrecordings, and chemical signatures. In one example, a PIR sensor 218Arecords a decrease in signal intensity in the front seat and a camerasensor 218B captures an image of the rear seat including a facial imageof the infant or an image of a pet. In another example, a sensor 218connected to a vehicle's OBD port determines that the vehicle doors havebeen locked via a key fob and/or that the key fob has moved out of rangeof the vehicle 204. In another example, a temperature sensor 218Ameasures an internal vehicle temperature and a thermal sensor 218Bmeasures a temperature of the infant and/or pet. In another example, themonitor application 215 receives a GPS location from the mobile device206. In another example, an audio sensor 218 records an internal vehicleaudio feed capturing infant noise, such as breathing or crying or petnoise, such as barking, panting, meowing, scratching, or other petnoise.

At step 321, the process 300 includes analyzing second sensor data.Analyzing the second sensor data can include comparing the second sensordata to one or more predetermined thresholds, applying one or more rulesor policies, and/or identifying a particular data sequence or pattern.In one example, the monitor application 215 computes a distance betweena location of the mobile device 206 to a location of the security device101 (or vehicle 204). In another example, the monitor application 215compares a recorded audio clip of the vehicle interior to one or morereference audio clips of infant noise. In another example, the monitorapplication 215 computes a rate of temperature increase within andexterior to the vehicle 204. In this example, the monitor application215 generates an estimated time period at which internal vehicletemperature may approach hazardous levels. In another example, themonitor application 215 identifies a particular pattern including alocking of the vehicle doors, a decrease in PR signal intensity from aPIR sensor 218A near a driver's seat of the vehicle 204, and/or anincrease in signal intensity from an ultrasonic sensor 218B recording anexterior of the vehicle 204.

At step 324, the process 300 includes determining that an eventoccurred, is occurring, or is predicted to occur. In response todetermining that an event occurred, the process 300 can proceed to step327. In response to determining that an event did not occur, the process300 can proceed to step 318. Non limiting examples of events include thedriver, the infant, the security device 101, the mobile device 206,and/or a key fob exiting the vehicle 204, internal or external vehicleconditions becoming unsafe, detecting a particular input or signal(e.g., infant respiration or crying), and passage of a predeterminedtime period (e.g., following detection of infant presence or executionof an action, such as alerting a driver to infant abandonment). In oneexample, in response to a determination that readings from a carbonmonoxide sensor 218 meet a predetermined threshold, the monitorapplication 215 determines an event is occurring (e.g., potential carbonmonoxide poisoning).

In another example, in response to determining that an audio clipsubstantially matches a pattern for infant crying, the monitorapplication 215 determines an infant distress event occurred. Themonitoring application 215 can determine an infant distress event byanalyzing audio data, video data, and/or any other particular data setrecorded by the security device 101 using machine learning techniques,natural language processing techniques, or a combination thereof. Themonitoring application 215 can receive recorded data or stream livedata. The monitoring application 215 can parse or analyze the data forpertinent information. For example, the monitoring application 215 canreceive recorded audio measured by the security device 101. The recordedaudio can include a baby crying or any other distinguishable baby sound.The monitoring application 215 can identify sound events in the audiorecording. The monitor application 215 can analyze each sound event todetermine if the sound event corresponds to a known sound. Themonitoring application 215 can extract and/or isolate the sound events.The monitor application 215 can classify each sound event based on thesound events features (e.g., frequency, tone, range), results from atext to speech analysis, and/or comparison to known sounds (e.g., carhorn, baby crying, loud music, etc.). The monitoring application 215 canemploy machine learning techniques to extract and classify particularfeatures from the recorded/streamed audio data. Once classified, themonitoring application 215 can compare the perceived audio extractionsto known thresholds and recordings to determine if an infant or otherindividual is in the vehicle.

In another example, the monitor application 215 determines that thedriver has exited the vehicle in response to detecting a decrease insignal from a PIR sensor 218, determining that a recorded seat weightdecreased, and/or detecting opening and closing of the driver door. Inthis example, the monitor application 215 further determines that theinfant is still present in the vehicle based on one or more sensorreadings. Continuing this example, in response to determining that thedriver has exited the vehicle and the infant potentially remains in thevehicle, the monitor application 215 determines that an infantabandonment event is occurring.

In another example, the monitor application 215 detects deployment of anairbag and/or a rapid deceleration of the vehicle 204, and, in response,determines that an accident has occurred. In another example, themonitor application 215 records a shift in acceleration (e.g., from stopto start) or gear (e.g., park to drive, neutral to drive, etc.) of thevehicle 204 and determines that a passenger seatbelt of the seatoccupied by the infant is not buckled. In this example, based on thedetected vehicle movement and unlatched seatbelt, the monitorapplication 215 determines that a hazardous event is occurring. Inanother example, the monitor application 215 detects activation of a keyfob for locking the vehicle 204. In this example, the monitorapplication 215 determines that readings from one or more sensorsrecording the infant's activity have not significantly deviated ascompared to historical readings from when infant presence was detected.Continuing the example, the monitor application 215 determines that theinfant has been locked in the vehicle 204.

The process 300 (and other processes shown and described herein) caninclude an escalating workflow by which the monitor application 215and/or other networked environment elements detect multiple events, suchas, for example, abandonment of an infant and subsequent failure toaddress the abandonment within a predetermined time period. In oneexample, the monitor application 215 determines a first level event ofinfant abandonment has occurred and transmits an alert to the mobiledevice 206 (e.g., at step 327 described below). In this example, themonitor application 215 determines that a predetermined time period(e.g., 2 minutes, 5 minutes, 15 minutes, etc.) has elapsed and theinfant is still present in the vehicle 204. Continuing the example, themonitor application 215 determines that a second level of eventabandonment has occurred and transmits a notification to localauthorities including the location of the vehicle 204. At step 327, theprocess 300 includes performing one or more response actions.

Non-limiting examples of actions include transmitting an alert,generating effects at the security device 101 and/or vehicle 204,changing a mode or other property of the security device 101 or vehicle204, and generating user interfaces. In one example, the monitorapplication 215 transmits an alert to one or more emergency contacts. Inthis example, the alert includes the event detected (e.g., infantabandonment, infant distress, unsafe vehicle conditions, etc.), atimestamp at which the event occurred, and a current location of thevehicle 204 or security device 101. In another example, the monitorapplication 215 causes one or more vehicle effects including, but notlimited to, activating a horn of the vehicle system 204, causingspeakers of the vehicle 204 or security device 101 to emit a prerecordedalert, locking or unlocking the vehicle doors, and raising or loweringthe vehicle windows. In another example, the security application 251generates and renders a user interface by which a user monitors readingsfrom the security device 101. In this example, the user interfaceincludes selectable commands for performing various response actions,such as dismissing an alert, contacting emergency services, engaging acamera sensor 218, and re-calibrating the security device 101 (e.g.,resetting and/or recalibrating thresholds of one or more sensors 218).In another example, the monitor application 215 determines a previousdriver of the vehicle 204 and transmits an alert to a computing deviceassociated with the previous driver. The monitor application 215 candetermine a history of drivers, for example, by analyzing a record ofwhen drivers' computing devices were present in or proximate to thevehicle 204, a record of current and historical driver seatconfigurations and/or weight readings, or a record of user interactionsor inputs with the security device 101 and/or security application 251.

The response action can be based on a particular event determined tohave occurred at step 324. In one example, the monitor application 215determines that the infant has been abandoned in the vehicle 204 and, inresponse, transmits a notification to the mobile device 206. In anotherexample, the monitor application 215 determines that a potential carbonmonoxide poisoning event is occurring and automatically transmits amessage to one or more emergency contacts. Escalating response actionscan be performed in response to a predetermined schedule and/ordeterminations of one or more events. In an exemplary scenario, inresponse to the security device 101 detecting an infant abandonmentevent, the security application 251 performs a first level responseaction by generating an alert on an associated user's mobile device 206.In the same example, in response to detecting an unsafe vehiclecondition (e.g., increase in vehicle cabin temperature beyond apredetermined threshold), the monitor application 215 performs a secondlevel response action by activating a panic alarm of the vehicle 204.Continuing the example, in response to determining that a predeterminedtime period (e.g., 10 minutes) passes and the infant is still present inthe vehicle 204, the monitor application 215 performs a third levelresponse action by contacting emergency authorities and/or unlocking thevehicle doors.

FIG. 4 shows an exemplary vehicle monitoring process 400 according toone embodiment. For the purposes of describing exemplary performance ofthe present technology, the process 400 is described in the context ofmonitoring the activities of a teenager operating a vehicle in which oneor more security devices are configured. In various embodiments, by theprocess 400, a security device determines that a subject (e.g., ateenager) enters a vehicle, detects potentially anomalous orpolicy-violating activity of the vehicle or subject, and, based on thedetected activity, performs one or more appropriate response actions. Inone example, the security device determines a teenager entered thevehicle by determining that the teenager's mobile device enters within apredetermined proximity of the vehicle and/or by detecting acommunication pairing (e.g., a Bluetooth pairing, WiFi connection, etc.)between the mobile device and the vehicle. In the same example, based onreadings from one or more sensors, the security device determines thatthe vehicle is being operated outside of a predetermined window orcurfew (e.g., 6:00 AM-10:00 PM, after sundown, etc.), the vehicle iscurrently located outside of a predetermined geofence, the vehicle speedis in excess of a predetermined threshold, the vehicle speed is over acurrent speed limit in excess of a predetermined threshold, a number ofsubjects in the vehicle exceeds a predetermined maximum, and one or moreseatbelts of occupied seats are not engaged. Continuing the example, thesecurity device transmits an alert to a second mobile device (e.g., amobile device of the vehicle owner, a parent, or guardian) and/or emitsan audible warning within the vehicle, thereby alerting the teenager andother occupants to the detected activity.

At step 403, the process 400 includes configuring one or more securitydevices 101. Configuring the security device 101 can be performedsimilar to step 303 of the process 300 (FIG. 3 ). In one exampleconfiguring the security device 101 includes registering one or moremobile devices 206 with the security device 101, a security application251, and/or the computing environment 203. In another example,configuring the security device 101 includes receiving selections for adriving curfew (e.g., a time period during which the teenager ispermitted free use of the vehicle 204) and a safety region (e.g., ageofence defining an area in which the vehicle 204 may be freelyoperated). In another example, configuring the security device 101includes receiving a blacklist of audio content (e.g., music, artists,vocabulary, etc.) forbidden within the vehicle 204. In one embodiment,the monitor application 215 can record an audio segment and process theaudio segment to identify a song in the audio segment. In anotherexample, configuring the security device 101 includes linking a securityapplication 251 with one or more applications, such as, for example,navigation applications, vehicle control applications, and messagingapplications.

In an exemplary scenario, a parent desires to monitor driving safety andbehavior of their teenager by configuring the security device 101 withina vehicle 204. In this scenario, configuring the security device 101includes downloading one or more versions of a security application 251to a first mobile device 206A controlled by the parent and a secondmobile device 206B controlled by the teenager application 251. From thefirst mobile device 206A, the monitor application 215 receivesselections for a teenager monitoring mode, an identifier with which thesecurity device 101 is associated, and an identifier with which thesecond mobile device 206B is associated. The security application 251running on the second mobile device 206B receives a command to pair thesecond mobile device 206B with the security device 101, for example, byenabling location tracking of the second mobile device 206B within apredetermined proximity of the security device 101 and enablingapplication monitoring functions (e.g., to detect whether the teenageris distracted by their device while driving).

At step 406, the process 400 includes detecting a subject entering thevehicle 204. Exemplary processes for detecting entrance of the subjectto the vehicle 204 are described in U.S. patent application Ser. No.16/988,447, which is incorporated herein by reference as if set forth inits entirety. In one example, detecting the subject entrance includesdetermining that a PIR sensor 218A and/or an ultrasonic sensor 218Brecords an increased signal intensity. In another example, detecting thesubject entrance includes determining that a location of an associatedmobile device 206 is within a predetermined range of the security device101 or vehicle 204. In another example, detecting the subject entranceincludes successful Bluetooth, NFC, Zigbee, WiFi connection between themobile device 206 and the security device 101 or vehicle 204.

At step 409, the process 400 includes collecting sensor data.Non-limiting examples of sensor data include vehicle statuses, mobiledevice statuses, signal intensities, temperature levels, weight values,audio recordings, visual recordings, and chemical signatures. In oneexample, a chemical sensor 218 detects air quality and tests for aplurality of chemical signatures. In another example, an audio sensor218 collects an audio clip of conversation occurring in the vehicle 204and/or music playing through a sound system. In another example, asensor 218 in communication with an OBD port records weight values fromweight sensors built into vehicle seats. In the same example, the sensorrecords seatbelt engagement statuses for each vehicle seat. In anotherexample, a location sensor 218 records a speed and current location ofthe vehicle 204.

At step 412, the process 400 includes analyzing sensor data. Analysis ofthe sensor data can be performed substantially similar to steps 309and/or 321 of the process 300 (FIG. 3 ). In one example, the monitorapplication 215 compares chemical signature intensities to a calibrationscale for determining the presence of controlled substances. In anotherexample, the monitor application 215 performs a speech processingtechnique on a recorded audio clip to determine if one or more portionsinclude particular language (e.g., forbidden language and music or apredetermined keyword, such as a panic word). In another example, themonitor application 215 compares a location of the vehicle 204 to apredetermine geozone. In another example, the monitor application 215computes a number of vehicle passengers by comparing seat weight valuesto a predetermined threshold. In another example, the monitorapplication 215 compares a current speed of the vehicle 204 topredetermined speed limits associated with a current vehicle or securitydevice location.

At step 415, the process 400 includes determining that one or moreactivities are occurring, have occurred, or are predicted to occur. Inresponse to determining that an activity occurred, the process 400 canproceed to step 418. In response to determining that no activityoccurred, the process 400 can proceed to step 409. Non-limiting examplesof activities include reckless, unpermitted, or illegal driving,consumption or transportation of controlled substances, presence ofadditional passengers, playing of blacklisted media, discussingblacklisted terms, deploying vehicle safety measures (e.g., airbags,locks, etc.), and interacting with a mobile device 206. In one example,the monitor application 215 computes an average volume (e.g., indecibels) of a vehicle audio feed and compares the average volume to apredetermined threshold. In this example, the monitor application 215determines that the average volume exceeds the predetermined thresholdand, therefore, distractive activity is occurring in the vehicle 204.

In another example, the monitor application 215 determines that achemical signature for marijuana (or other drug/substance) exceeds apredetermined parts-per-million threshold. In this example, the monitorapplication 215 determines that transportation or consumption ofmarijuana occurred in the vehicle 204. In another example, the monitorapplication 215 computes a similarity score between a vehicle audio clipand blacklisted media content. In the same example, based on thesimilarity score satisfying a predetermined threshold, the monitorapplication 215 determines that blacklisted media content is playing inthe vehicle 204. In another example, the monitor application 215determines that the mobile device 206 received inputs while the vehicle204 was in motion. In this example, the monitor application 215determines that the teenage driver is engaging in distracted drivingbehavior. In another example, the security application 251 determinesdistracted driving behavior occurs by reading a state of the mobiledevice 206 and detecting interaction with one or more applications(e.g., texting applications, social media applications, etc.). Inanother example, the monitor application 215 determines that unpermitteddriving is occurring based on a determination that the vehicle 204 isoperating outside of a predetermined time period (e.g., 6 AM-10 PM)and/or geofence (e.g., 10 miles, 50 miles, or 100 miles from apredetermined location). In another example, the monitor application 215determines that illegal driving is occurring based on a determinationthat the vehicle speed violates speed limits or a detected number ofvehicle passengers (e.g., 3 passengers, 4 passengers, etc.) exceeds alegal limit (e.g., 1 passenger). In another example, the monitorapplication 215 determines that an airbag deployed and an accelerationof the vehicle 204 decreased in excess of a predetermined threshold. Inthis example, the monitor application 215 determines that a collision orother accident potentially occurred.

The monitor application 215 can calculate a safety score for driving ofthe user. The safety score can be based on a variety of factors asdiscussed herein, such as on the frequency of lane changes, the amountof maneuvering performed, a rate of breaking, a rate of acceleration,and other driving skill-based factors. The score can be calculated overtime and updated in real-time. Multiple scores can be calculated fordifferent time periods. For example, the monitor application 215 cancalculate a score from when the driving started and a score for the mostrecent five minutes of driving to ensure that the driver continues safedriving consistently over the course of a drive. The monitor application215 can also monitor for changes in behavior, such as decreases in scoreover time. If the score falls below or meets a predetermined threshold(e.g., below 65 out of 100 points), the monitor application 215 candetermine unpermitted driving is occurring. At step 418, the process 400includes performing one or more response actions.

Non-limiting examples of response actions include transmitting alerts(e.g., to emergency services or to a mobile device 206 of a vehicleowner, parent, guardian, etc.), disabling applications on the mobiledevice 206 of the teenager, shutting down the vehicle 204, engaging oneor more safety features (e.g., such as a governor limiting a maximumspeed or acceleration of the vehicle 204), disabling a media system ofthe vehicle 204, generating in-vehicle behavior and driving performancereports, and initiating a speaker function to allow a remote user tomake announcements via the security device 101 and a second mobiledevice 206. In one example, the monitor application 215 causes thesecurity device 101 to emit a prerecorded message, such as a curfewwarning or other safety alert. In another example, the monitorapplication 215 causes the vehicle 204 to artificially limit vehiclespeed to a predetermined level. In another example, the securityapplication 251 blocks interaction of the teenager with otherapplications while the vehicle 204 is running.

FIG. 5 shows an exemplary vehicle monitoring process 500 according toone embodiment. For the purposes of describing exemplary performance ofthe present technology, the process 500 is described in the context ofdetecting and monitoring the activities of a senior citizen (referred toherein as the “senior) operating a vehicle in which one or more securitydevices are configured. In various embodiments, by the process 500, asecurity device alerts a subject (e.g., a senior) as to potentiallyhazardous road conditions, determines the subject enters a vehicle,monitors and evaluates driving behavior of the subject, and, based onthe evaluation, performs one or more appropriate actions. In oneexample, the security device determines potentially hazardous roadconditions including ice and rain and transmits an alert to a subject'smobile device. In the same example, the security device determines thatthe subject has entered and is operating the vehicle. In the sameexample, based on readings from one or more sensors, the security devicedetermines that the vehicle speed is in excess of a predeterminedthreshold and detects anomalous braking behavior. Continuing theexample, the security device transmits an alert to a second mobiledevice (e.g., a mobile device of an emergency contact, such as arelative or care center), generates a report of the subject's drivingbehavior, and uploads the report to a computing environment such thatthe report is accessible the second mobile device (e.g., via a securityapplication running on the device).

At step 503, the process 500 includes determining current conditions,such as for example, weather, traffic, and safety conditions in a regionat which the security device 101 is located. Step 503 can be initiatedin response to detecting interaction of a subject (e.g., a senior) witha vehicle 204 or can be performed continuously to monitor as conditionschange. In one example, the monitor application 215 performs step 503 inresponse to determining that the senior or a mobile device 206 has movedwith a predetermined proximity of the vehicle 204. Step 503 can beinitiated according to a predetermined schedule or in response toreceiving user input (e.g., at the security application 251). In oneexample, the security application 251 automatically performs step 503each morning at 7:00 AM. In another example, the security application251 or monitor application 215 receive a voice command requestingcurrent conditions.

In some embodiments, the security device 101 communicates with anexternal system (e.g., a weather system, traffic monitoring system,etc.), to identify current conditions such as precipitation, airquality, visibility, road quality, temperature, wind speed, and reportedaccidents. The monitor application 215 or security application 251 cancompare the current conditions and/or forecasted conditions (wherecurrent conditions and/or forecasted conditions will be referred to onlyas current conditions herein) within a predefined window of time topredetermined thresholds and, based on the comparison, determine ifpotentially hazardous conditions are present. Potentially hazardousconditions, or adverse driving conditions, can include but are notlimited to icy roads, dense fog, inclement forest fire, heavy rain,strong winds, heavy snow, potholes, construction, police radar, anycombination thereof, or any particular condition that is detrimental todrive in. For example, the monitor application 215 compares a currentprecipitation level and temperature to predetermined thresholds anddetermines that icy conditions may be present. In another example, thesecurity application 251 determines that a level of traffic congestionexceeds a predetermined maximum. The monitor application 215 or securityapplication 251 can provide a summary of current conditions.

At step 506, the process 500 includes transmitting an alert to one ormore mobile devices 206 with which a senior is associated. The alert caninclude a summary of current conditions and/or determinations thatcurrent conditions are potentially hazardous. The alert can betransmitted to a mobile device 206 of the senior and a second mobiledevice 206 of a predetermined contact (e.g., a care provider, child,etc., of the senior). The alert can include a current location of thevehicle 204 and/or the senior's mobile device 206. The alert can begenerated in the vehicle 204 via a speaker or display associated withthe security device 101 or vehicle 204.

At step 509, the process 500 includes collecting sensor data. The sensordata can be collected during operation of the vehicle 204, before orafter operation, or without the vehicle being operated. Non-limitingexamples of sensor data include vehicle performance data (e.g., speed,braking, acceleration, etc.), vehicle statuses (e.g., airbag deployment,seatbelt engagement, in drive including a current gear, in reverse,whether a trailer or other device is connected, etc.), road conditions(e.g., temperature, grip, current bank of the road, the existence ofpotholes or other road hazards, roadwork zones, etc.), location data,audio and visual data, signal intensity data (e.g., from a PIR sensor,ultrasonic sensor, etc.), and biometric data (e.g., facial recognitionresults, body temperature, etc.). In one example, a sensor 218 connectedto the vehicle OBD port reads a status of the driver's seatbelt. Inanother example, a light sensor 218 measures an estimated visibilitylevel through the windshield of the vehicle 204. In another example, acamera sensor 218 determines that the posture and/or gaze of the senioris outside of a predetermined range of positions (e.g., the senior isnot properly oriented in the seat, is not focused on the road, etc.). Inanother example, an audio sensor 218 records a vocal command from thesenior. In another example, a sensor 218 detects the entrance of thesenior into the vehicle 204.

At step 512, the process 500 includes analyzing sensor data. Analyzingthe sensor data can include comparing sensor readings to predeterminedthresholds, applying rules or policies to the sensor data, andidentifying particular data sequences and patterns. In one example, themonitor application 215 performs voice recognition on an audio clip anddetermines that the audio clip includes a particular keyword or phrase(e.g., cries for help, “I am lost,” “take me home,” “call my daughter,”etc.). In some embodiments, the keyword may be preceded by a signal wordsuch that if the signal word is not determined, further audio processingis not performed for privacy reasons. In another example, the monitorapplication 215 compares a visibility level to a predeterminedvisibility threshold. In another example, the monitor application 215compares a measured vehicle speed to a posted speed limit with which alocation of the vehicle 204 is associated. In another example, themonitor application 215 computes a distance between a current vehiclelocation and a predetermined location (e.g., the senior's home address),and compares the distance to a predetermined distance threshold.

At step 515, the process 500 includes determining that one or moreactivities occurred, are occurring, or are predicted to occur. Inresponse to determining that an activity occurred, the process 500 canproceed to step 518. In response to determining that no activityoccurred, the process 500 can proceed to step 509. Non-limiting examplesof activities include driving too fast or slow (e.g., as compared to aflow of traffic, posted speed limits, etc.), aggressive, hesitant, orslow maneuvering or braking, entering or exiting a predetermined region(e.g., a geofence), unsafe vehicle conditions (e.g., mechanical orelectrical failure, over- or under-pressured tires, unbuckled seat belt,deployed airbag, etc.), unsafe subject conditions (e.g., the subjectappears to be sleeping, unfocused, or unresponsive), when a drivingscore associated as discussed herein falls below a predefined threshold,and detection of unsafe road conditions (e.g., icy roads, poorvisibility, high winds, etc.). In some embodiments, an activity includesreceiving a particular input from the subject, such as a predeterminedkeyword. In one example, the monitor application 215 determines that thesenior spoke a predetermined key phrase “I am lost,” thereby indicatingthat the subject requires directional guidance or additional assistance.In another example, the monitor application 215 determines that thevehicle 204 is being operated during a prohibited time period (e.g.,11:00 PM-5:00 AM, after sundown, etc.). In another example, the monitorapplication 215 determines a location or travel path of the vehicle 204deviates from a predetermined location or travel path. In this example,the monitor application 215 determines that the senior is potentiallylost or confused. The monitor application 215 can determine that adirection of travel differs from an expected direction of travel. Insome examples, the monitor application 215 may determine that a time ordistance of travel in an unexpected direction exceeds a predefinedthreshold and determine the driver is likely lost. The monitorapplication 215 can determine that the vehicle 204 has entered onto ahighway or freeway and determine that configuration data 245 indicateshighway or freeway driving is not permitted.

At step 518, the process 500 includes performing one or more appropriateactions based on the detected activity. Non-limiting examples ofappropriate actions include transmitting an alert, generating a reportof the subject's driving behavior, generating a user interface formonitoring the subject and/or vehicle, generating one or more effectsvia the security device or vehicle (e.g., prerecorded sounds, lights,etc.), communicating with emergency services, initiating a microphonefunction by which a second subject uses a mobile device to speak throughthe security device, causing a GPS system to display navigationinstructions to a requested or predetermined destination, adjusting oneor more properties, functions, or processes of the vehicle, orperforming other activities as described herein.

The alert can include, for example, an email, push alert, text message,instant message, phone call, or other notification. The alert caninclude, for example, an electronic message indicating one or moreactivities. In one example, in response to determining that the seniorentered the vehicle 204, the monitor application 215 transmits a pushnotification to a mobile device 206 of a predetermined emergencycontact. In another example, in response to detecting a key phrase “I amlost,” the monitor application 215 transmits a location of the vehicle204 to a mobile device 206 of an emergency contact. In this example, asecurity application 251 and/or computing environment 203 streams avirtually live feed of data from the security device 101, therebyproviding the emergency contact with a substantially real-time overviewof vehicle location and status. In one example, the monitor application215 detects airbag deployment and determines that the vehicle 204 likelyexperienced a collision. The mobile application 215 can verify that acollision occurred using one or more other sensors, such as, forexample, an accelerometer to verify that both 1) an airbag was deployed,and 2) a large change in speed occurred. In this example, the monitorapplication 215 automatically transmits a location of the vehicle 204 toemergency services and causes the security device 101 to emit anotification alerting the senior that emergency services have beencontacted.

Adjusting the properties functions, or processes of the vehicleincludes, but is not limited to, automatically shutting down the vehicleengine, enabling a speed limiter or governor, and activating vehicleheadlights. In one example, the monitor application 215 determines thatthe senior entered the vehicle 204 during a predetermined time period(e.g., sundown) and prevents ignition of the vehicle engine. In anotherexample, the monitor application 215 detects icy road conditions andautomatically engages a traction control function of the vehicle 204. Inanother example, the monitor application 215 detects that the vehicle204 has experienced a loss of traction and, in response, automaticallyengages a traction control function of the vehicle 204. The monitorapplication 215 can trigger effects, such as, for example, playing acomputer voice alert that describes current road and weather conditions.In one example, the monitor application 215 automatically plays acondition alert upon detecting entrance of the senior to the vehicle204. The monitor application 215 can generate or update a drivingperformance report based on sensor readings and/or detected behavior.

The monitor application 215 can analyze the driving performance report,including historical driving performance data, to determine if thesenior's driving ability is improving or degrading over time. In oneexample, the monitor application 215 determines that five instances ofexcess speed and seven instances of aggressive braking occurred during asenior's operation of the vehicle 204. In this example, the monitorapplication 215 compares the excess speed event count and aggressivebraking event count to historical levels and determines that the seniordemonstrates increasing levels of potentially hazardous or recklessdriving. In the same example, the monitor application 215 automaticallyincreases a frequency and/or volume of assistive alerts, such as speedadvisories, played through the security device 101 or sound system ofthe vehicle 204. In another example, in response to detecting aggressivebrake application, the monitor application 215 causes the vehicle 204 toadjust a sensitivity of the vehicle brake pedal and/or limit a maximumacceleration of the vehicle 204. In some embodiments, the monitorapplication 215 transmits vehicle performance and driver behaviorreports to a third party, such as a rental company, insurance agency, oremergency service.

It is understood that while various features and types of sensors may bedescribed with respect to monitoring of a type of person, such as a pet,infant, baby, toddler, teen, or senior, the processes and featuresdescribed herein can be applied to any person including a pet, infant,baby, teen, or senior, among others. As a non-limiting example, themonitor application 215 can detect that a senior or pet has been left ina vehicle and according to process 300.

The security device 101, computing environment 203, and mobile device206 can record sensor data during an event and provide a user interfaceon the display 248 (or via a non-mobile computer) that replays theevent. As an example, a parent may sit with a teen and discuss theevents that occurred while playing back the teen using drugs, speeding,and picking up a group of friends. The playback may be provided inincreased or reduced speed (e.g., 0.5× speed, 1× speed, 2× speed, 4×speed, or some other playback speed). In some embodiments, the user maysave the event data for later use. The data stored can also correspondto all interactions with the vehicle, not just those during an event. Asone example, a parent may playback a teen driver not speeding whenpulled over by authorities and given a ticket for doing so. In oneembodiment, the system can provide an exported version or rasterizedversion for use as evidence as to a cause of an accident or to prove theinnocence of an alleged crime, such as a speeding ticket or a hit andrun. The data can include measurements from various sensors (includingcalculated values) such as speed and direction of travel, impact dataand data on any maneuvers prior to, during, or subsequent to the impact,GPS or location data, cellular phone connectivity and usage data, videoand audio feeds, and other data as discussed herein.

FIG. 6A shows an exemplary vehicle environment 600A including a vehicle601 and a driver 603. The vehicle 601 can be substantially similar to avehicle 204 (FIG. 2 ). A security device 101 (FIG. 1 ) can be positionedand secured into the vehicle 601. The security device 101 can beconfigured in various locations including, but not limited to, cupholders, door frames, door panels, safety grips, windows, windshields,dashboards, seats, seat backs, seat headrests, seatbelts, under-seatcompartments, above-seat compartments (e.g., sunglass holders, etc.),vehicle cabin ceiling, vehicle cabin flooring, trunk compartments,vehicle exterior, and other suitable locations. Multiple securitydevices 101 can be configured in and/or on the vehicle 601.

The security device 101 can receive readings from sensors 607A, 607B todetect various activities occurring in and around the vehicle 601, suchas, for example, entrance and exit of the driver 603 or presence of aninfant 605. The sensors 607A, 607B can be substantially similar tosensors 218 (FIG. 2 ). In some embodiments, the sensor 607A and/or thesensor 607B are security devices (e.g., security devices 101) or remotedevices (e.g., remote devices 209 as shown in FIG. 2 ). In an exemplaryscenario, the driver 603 places the infant 605 into a car seat 606. Thesensor 607A is located on the back of the driver seat and opposite thecar seat 606. The monitor application 215 can use the sensor 607A tocapture an image of the car seat 606 including the face of the infant605. The sensor 607B is located on a rear door 608 and measures anincrease in PR signal intensity. The security device 101 determines thatthe PR signal intensity meets a predetermined threshold and the image ofthe car seat 606 includes an infant face. In response to determiningthreshold satisfaction and the presence of an infant face, the securitydevice 101 determines that the infant 605 has been placed into thevehicle 601. The security device 101 performs appropriate actions, suchas emitting an audible alert to the driver 603 and causing a securityapplication running on a smartphone of the driver 603 to render alertindicia in a notification bar.

FIG. 6B shows an exemplary vehicle environment 600B including thevehicle 601 and the infant 605. The vehicle environment 600B may besubsequent in time to vehicle environment 600A. As shown, the driver 603(FIG. 6A) has exited the vehicle 601 while leaving the infant 605therewithin. In an exemplary scenario, the security device 101determines that the driver 603 has exited the vehicle 601 by detecting alocking signal from a key fob, by determining that a computing device ofthe driver 603 exits a predetermined area, by detecting a decrease inweight at the driver's seat, by detecting a decrease in PIR or radarsignal intensity, or by other suitable processes.

In the same scenario, the security device 101 determines that the infant605 remains in the vehicle 601 following exit of the driver 603. Inresponse to determining infant abandonment, the security device 101executes a first level response action by activating a horn of thevehicle 601 and/or by transmitting an alert to the computing device ofthe driver 603. In response to determining that one or morepredetermined factors are present (e.g., passage of predetermined timeperiod, increase in temperature or carbon monoxide, etc.) and the infant605 remains in the vehicle 601, the security device 101 executes asecond level response action by transmitting an alert to local emergencyservices.

FIG. 7 shows an exemplary vehicle environment 700 including a vehicle701 occupied by driver 703 and passengers 705A, 705B. A security device101 and sensors 707A, 707B can be configured in the vehicle 701 tomonitor the vehicle 701 and activities of the driver 703 and passengers705A, 705B. In an exemplary scenario, based on increased audio readingsfrom the sensor 707B, the security device 101 detects entrance of ateenage driver 703 and teenage passengers 705A, 705B into the vehicle701. In the same scenario, the security device 101 receives images fromthe sensor 707A and determines that two faces are included in theimages. The security device 101 computes a total passenger count of twoand determines that the total passenger count violates a maximumpassenger policy (e.g., one passenger). The security device 101 mayidentify passenger 705B as “Kevin” based on a list of friends withphotos associated with the teen driver 703 (e.g., comparing an image ofthe passengers 705A, 705B to images uploaded by the parents, uploaded byanother user, imported from a contact list of the teen/parent/user, froma social network friends list, from a third-party identificationservice, or through some other mechanism). The security device 101 candetermine that “Kevin” is included on a list of troublesome individualsand generating a policy violation. In response to detecting the policyviolation, the security device 101 logs the event and transmits an alertto a computing device of the driver 703 and/or an owner of the vehicle701 (e.g., a parent of the driver 603).

Continuing the scenario, the security device 101 processes audioreadings from the sensor 707B and detects blacklisted language includinga swear word. The security device 101 also determines, based on locationand accelerometer data received from the vehicle 701, that the vehicle701 is operating in excess of posted speed limits and outside of apredetermined area, thereby violating predetermined speed and locationpolicies. In response to detecting the various policy violations, thesecurity device 101 generates and transmits a report of driver safety(e.g., including the policy violations) to a mobile computing device ofa guardian or parent of the driver 703. Continuing the scenario, asecurity application running on the mobile computing device receives aninput to initiate communication with the security device 101. Inresponse, the security device 101 receives a command to initiate anaudio feed between the security device 101 and the mobile computingdevice, thereby allowing the guardian or parent of the driver 703 toadvise the vehicle occupants of their policy-violating behavior.

In some embodiments, the security device 101 communicates with a sensoror other computing device for monitoring a status of the driver 703. Thesecurity device 101 can communicate with, or have integrated within, asubstance detection device, such as a breathalyzer, or a trackingdevice, such as a monitoring bracelet. In one example, the securitydevice 101 alerts a predetermined entity, such as a parent, guardian, orlegal authority, if the vehicle 701 is operated without receipt of asignal from a substance detection device. In another example, thesecurity device 101 prevents ignition of the vehicle 701 in response todetermining that readings from a breathalyzer device exceed apredetermined threshold (e.g., 0.10 blood alcohol content (BAC), 0.08BAC, 0.04 BAC, etc.). As another example, the security device 101 mayprevent ignition of the vehicle 701 or transmit a notification if amonitoring device (e.g., an ankle monitor) is within the vehicle 701outside of a time window or geofence (e.g., a court ordered curfew orcourt order not to leave the state). In some embodiments, the securitydevice 101 (or a system in communication therewith) updates and stores alog of sensor readings, such as, for example, a log of BAC readings froma breathalyzer device.

FIG. 8 shows an exemplary vehicle environment 800 including a vehicle801 and a driver 803. Security devices 101A, 101B are configured in thevehicle 801. For example, the security device 101A installs into a cupholder and the security device 101B installs into an air conditionervent. The security devices 101A, 101B can detect entrance and exit ofthe driver 803 and other activities occurring in or around the vehicle801. In an exemplary scenario, the driver 803 is an elderly person thatenters the vehicle 801 at 11:00 PM. The security device 101A detects theentrance of the driver 803 based on detecting opening and closing of thevehicle door and an increase in driver seat weight. The security device101B, or a sensor in communication therewith, captures an image of thedriver 803, processes the image, and confirms an identity of the driver803 as the elderly person.

In the same scenario, the security device 101A detects vehicle ignitionand the security device 101B determines that the driver 803 is operatingthe vehicle 801 outside of a predetermined window (e.g., 5:00 AM-9:00PM). In response to detecting operation outside of the predeterminedwindow, the security device 101B transmits an alert to a mobilecomputing device associated with a guardian of the driver 803 (e.g., afamily member, caretaker, etc.). The security devices 101A, 101B monitorthe driving performance of the driver 803 throughout vehicle operation.The security device 101A detects aggressive braking and accelerationbehavior, and the security device 101B determines, based on capturedfacial images, that the driver 803 may be distracted or impaired (e.g.,lack of focused gaze, etc.). The security devices 101A, 101B transmit areport of the driving behavior to a remote computing environment atwhich historical driving behavior of the driver 803 is stored. Theremote computing environment retrieves and compares the historicaldriving behavior of the driver 803 to the received report. Based on thecomparison, the remote computing environment generates a report ofprogressive driver health and safety, and transmits the report to themobile computing device of the guardian and/or another entity (e.g.,emergency services, an insurer, a physician, etc.).

FIG. 9 shows an exemplary vehicle environment 900 including a vehicle901 and a driver 903. A security device 101 can detect the presence ofthe driver 903, an infant 905, and/or an accessory 907, such as aninfant seat. The security device 101 can receive and process readingsfrom sensors configured within or around the vehicle 901, such assensors 909A-C.

The accessory 907 can include a remote device or other element forcommunication with or detection by the security device 101 or sensors909A-C. The device or other element can include, but is not limited to,passive or active radio frequency identification (RFID) elements andBluetooth, WiFi, Zigbee, or other near field communication-enableddevices. In one example, the sensor 909B detects an RFID element of theaccessory 907 when the accessory 907 moves within a predeterminedproximity (e.g., 1 foot, 1 yard, etc.). In response to detection of theaccessory 907, appropriate actions can be performed including, but notlimited to, transmitting an alert, generating an effect at the securitydevice 101 or vehicle 901, configuring properties of the security device101 a sensor, generating a user interface, and requesting input from thedriver 903. In one example, the monitor application 215 automaticallyconfigures the security device 101 and/or sensors 909A-C to an infantdetection mode. In another example, the security application 215automatically renders an alert on a mobile device 206, the alertprompting the driver 903 to inspect a status of the accessory 907 and/orinfant 905.

FIG. 10 shows an exemplary vehicle environment 1000 including a vehicle1001 in which a security device 101 is configured. The security device101 can detect the presence of an animal 1003, such as a dog, and anaccessory 1005, such as a pet carrier. The security device 101 canreceive and analyze readings from one or more sensors 1007 to detect theanimal 1003 and/or accessory 1005. The sensor 1007 can detect a heat,radar, sonar, PIR, or other signal signature and, based thereon, themonitor application 215 can detect the presence or absence of the animal1003. For example, the sensor 1007 captures radar readings of thevehicle 1001 interior at a first and a second time point, and themonitor application 215 determines that a difference between the firstand second radar readings satisfies a predetermined threshold fordetecting the animal 1003. The sensor 1007 can detect a remote device orother electronic element configured in or on the animal 1003 oraccessory 1005. For example, the sensor 1007 detects an RFID chipembedded in a collar of the animal 1003. In another example, the sensor1007 reads a near field communication element configured in or on theaccessory 1005.

In response to detecting the animal 1003, accessory 1005, and/or adriver (not shown), various actions can be performed. The monitorapplication 215 can configure the security device 101 and/or sensor 1007to a pet mode. The monitor application 215 can stream sensor readings,such as a virtually live video stream, to a networking address and thesecurity application 251 can access the networking address to provideanimal monitoring in virtually real time. The monitor application 215can determine that current or forecasted conditions of the vehicle 1001may be harmful to the animal 1003. For example, the monitor application215 communicates with an external weather reporting system anddetermines that a forecasted external temperature may heat the vehicle1001 in excess of a predetermined threshold. In another example, themonitor application 215 computes a rate of vehicle interior temperatureincrease and determines that the rate exceeds a predetermined safetythreshold. The monitor application 215 can perform various responseactions including, but not limited to, transmitting alerts, unlockingthe vehicle 1001, activating a horn or sound system, generating effectsat the security device 101, starting the vehicle 1001, and activating anair conditioner of the vehicle 1001. In one example, in response todetermining that the animal 1003 has been left in the vehicle 1001 for afirst time period, the monitor application 215 automatically transmitsan alert to a computing device 206. In the same example, in response todetermining that the animal 1003 remains in the vehicle 1001 for asecond time period, the monitor application 214 automatically transmitsan alert to local emergency services.

Referring now to FIG. 11 , illustrated is an exemplary user interface1100 on the mobile device 206, according to one embodiment of thepresent disclosure. In various embodiments, the user interface 1100 isdisplayed on the mobile device 206 through the display 248. The userinterface 1100 can present the user with a variety of setting andfeatures related to the security device 101. The user interface 1100 candisplay information gathered from various sources located on the network212. For example, the mobile device 206 can aggregate live video feedrecorded by the security device 101 and display the live video feed onthe user interface 1100. In another example, the mobile device 206 canreceive data analytics processed by the computing environment 203 anddisplay it on the user interface 1100.

In at least one embodiment, the user interface 1100 can include a seatmap 1101, a security device toggle 1102, a settings icon 1103, and anotification banner 1104. The seat map 1101 can illustrate a digitalrendition of the seats of the vehicle 204 being monitored by thesecurity device 101. For example, in a five seat car, the seat map 1101can include a driver seat to the front left or front right (depending onregion) and four remaining passenger seats. The seat map 1101 caninclude seats 1114 that represent each seat in the vehicle. In someembodiments, each seat 1114 is selectable to display particularattributes of the selected seat. For example, when the driver seat isselected, the user interface 1100 can display a pop up that details theunique attributes of that position. In another example, the rearpassenger seat with an infant can be selected, where the user interface1100 can display a live video recording of the current selected seat anddescribe any identifiable features of the video. In particularembodiments, the seat map 1101 can include a seat notification 1115. Aseat notification 1115 can be any recognizable phrase or symbol thatdescribes an attribute of the particular seat 1114. Seat notificationscan include, but are not limited to, text, check marks, cross signs,unbuckled seatbelt symbols, buckled seatbelt symbols, and specificcolors. The seat notification 1115 can be displayed inside of the seat1114. In various embodiments, the seat 1114 can vary in color and havecolored outlines that correspond to particular events. For example, ifan infant is left in the vehicle 204, the boarders of the seat 1114 willflash a bright red color.

The user interface 1100 can display the location of the security device101 relative to the vehicle it sits in through the security devicetoggle 1102. The security device toggle 1102 can be a selectable iconthat displays attributes of the security device 101. For example, theuser interface 1100 can display all live sensor readings after selectingthe security device toggle 1102. In another example, the user interface1100 can display a voice command feature after selecting the securitydevice toggle 1102. After selecting the voice command feature, the usercan press a speech button (not pictured) on the user interface 1100,which activates the microphone of the mobile device 206. Continuing thisexample, the user can speak into the mobile device 206 while holding thespeech button and the mobile device 206 can transmit the audio in realtime through the speakers of the security device 101.

In certain embodiments, the settings icon 1103 is a selectable buttonthat allows the user to change settings related to the environment.Particular settings can include, but are not limited to, time, date,user preferences, user profile details, security settings, networkedenvironment 200 settings, mobile device 206 settings, user interface1100 settings, security device 101 settings, power controls, and vehicle204 settings. After selecting the settings icon 1103, the user interface1100 can display a new screen with various setting options.

The notification banner 1104 can display any pertinent information tothe user. The notification banner can include a slide icon 1113, whichcan be activated by swiping up the display 248. Toggling the slide icon1113 can display greater information related to the particularnotification by providing a larger area to display information. Forexample, the user interface 1100 can display a security alert throughthe notification banner 1104. Continuing this example, if a user leavesa child in the vehicle 204, the notification banner 1104 can display“Child left in car! Please remove child immediately”. By activating theslide icon 1113 in this particular scenario, the user interface 1100 candisplay live feed of the child left in the vehicle 204.

The user interface 1100 can include an alarm toggle 1111 and variousswitch toggles 1112. By selecting the alarm toggle 1111, the mobiledevice 206 can send an alarm alert to the security device 101. In someembodiments, the security device 101 will activate an alarm when thealarm toggle 1111 is activated. In some embodiments, the switch toggles1112 can activate or deactivate any particular aspect of the vehicle204, the security device 101, or any other particular device connectedto the networked environment 200. For example, a switch toggle 1112 canbe used to lock or unlock the car. In another example, a switch toggle1112 can be used to activate or deactivate the security mode of thesecurity device 101. In various embodiments, the switch toggles 1112 canbe a variable scale instead of a binary choice between on or off. Forexample, a switch toggle 1112 can change the speaker output volume ofthe security device 101. Continuing this example, the switch toggle 1112can be moved continuously from no sound to max sound for the securitydevice 101.

From the foregoing, it will be understood that various aspects of theprocesses described herein are software processes that execute oncomputer systems that form parts of the system. Accordingly, it will beunderstood that various embodiments of the system described herein aregenerally implemented as specially-configured computers includingvarious computer hardware components and, in many cases, significantadditional features as compared to conventional or known computers,processes, or the like, as discussed in greater detail herein.Embodiments within the scope of the present disclosure also includecomputer-readable media for carrying or having computer-executableinstructions or data structures stored thereon. Such computer-readablemedia can be any available media which can be accessed by a computer, ordownloadable through communication networks. By way of example, and notlimitation, such computer-readable media can comprise various forms ofdata storage devices or media such as RAM, ROM, flash memory, EEPROM,CD-ROM, DVD, or other optical disk storage, magnetic disk storage, solidstate drives (SSDs) or other data storage devices, any type of removablenon-volatile memories such as secure digital (SD), flash memory, memorystick, etc., or any other medium which can be used to carry or storecomputer program code in the form of computer-executable instructions ordata structures and which can be accessed by a general purpose computer,special purpose computer, specially-configured computer, mobile device,etc.

When information is transferred or provided over a network or anothercommunications connection (either hardwired, wireless, or a combinationof hardwired or wireless) to a computer, the computer properly views theconnection as a computer-readable medium. Thus, any such connection isproperly termed and considered a computer-readable medium. Combinationsof the above should also be included within the scope ofcomputer-readable media. Computer-executable instructions comprise, forexample, instructions and data which cause a general purpose computer,special purpose computer, or special purpose processing device such as amobile device processor to perform one specific function or a group offunctions.

Those skilled in the art will understand the features and aspects of asuitable computing environment in which aspects of the disclosure may beimplemented. Although not required, some of the embodiments of theclaimed systems may be described in the context of computer-executableinstructions, such as program modules or engines, as described earlier,being executed by computers in networked environments. Such programmodules are often reflected and illustrated by flow charts, sequencediagrams, exemplary screen displays, and other techniques used by thoseskilled in the art to communicate how to make and use such computerprogram modules. Generally, program modules include routines, programs,functions, objects, components, data structures, application programminginterface (API) calls to other computers whether local or remote, etc.that perform particular tasks or implement particular defined datatypes, within the computer. Computer-executable instructions, associateddata structures and/or schemas, and program modules represent examplesof the program code for executing steps of the methods disclosed herein.The particular sequence of such executable instructions or associateddata structures represent examples of corresponding acts forimplementing the functions described in such steps.

Those skilled in the art will also appreciate that the claimed and/ordescribed systems and methods may be practiced in network computingenvironments with many types of computer system configurations,including personal computers, smartphones, tablets, hand-held devices,multi-processor systems, microprocessor-based or programmable consumerelectronics, networked PCs, minicomputers, mainframe computers, and thelike. Embodiments of the claimed system are practiced in distributedcomputing environments where tasks are performed by local and remoteprocessing devices that are linked (either by hardwired links, wirelesslinks, or by a combination of hardwired or wireless links) through acommunications network. In a distributed computing environment, programmodules may be located in both local and remote memory storage devices.

An exemplary system for implementing various aspects of the describedoperations, which is not illustrated, includes a computing deviceincluding a processing unit, a system memory, and a system bus thatcouples various system components including the system memory to theprocessing unit. The computer will typically include one or more datastorage devices for reading data from and writing data to. The datastorage devices provide nonvolatile storage of computer-executableinstructions, data structures, program modules, and other data for thecomputer.

Computer program code that implements the functionality described hereintypically comprises one or more program modules that may be stored on adata storage device. This program code, as is known to those skilled inthe art, usually includes an operating system, one or more applicationprograms, other program modules, and program data. A user may entercommands and information into the computer through keyboard, touchscreen, pointing device, a script containing computer program codewritten in a scripting language or other input devices (not shown), suchas a microphone, etc. These and other input devices are often connectedto the processing unit through known electrical, optical, or wirelessconnections.

The computer that effects many aspects of the described processes willtypically operate in a networked environment using logical connectionsto one or more remote computers or data sources, which are describedfurther below. Remote computers may be another personal computer, aserver, a router, a network PC, a peer device or other common networknode, and typically include many or all of the elements described aboverelative to the main computer system in which the systems are embodied.The logical connections between computers include a local area network(LAN), a wide area network (WAN), virtual networks (WAN or LAN), andwireless LANs (WLAN) that are presented here by way of example and notlimitation. Such networking environments are commonplace in office-wideor enterprise-wide computer networks, intranets, and the Internet.

When used in a LAN or WLAN networking environment, a computer systemimplementing aspects of the system is connected to the local networkthrough a network interface or adapter. When used in a WAN or WLANnetworking environment, the computer may include a modem, a wirelesslink, or other mechanisms for establishing communications over the widearea network, such as the Internet. In a networked environment, programmodules depicted relative to the computer, or portions thereof, may bestored in a remote data storage device. It will be appreciated that thenetwork connections described or shown are exemplary and othermechanisms of establishing communications over wide area networks or theInternet may be used.

While various aspects have been described in the context of a preferredembodiment, additional aspects, features, and methodologies of theclaimed systems will be readily discernible from the description herein,by those of ordinary skill in the art. Many embodiments and adaptationsof the disclosure and claimed systems other than those herein described,as well as many variations, modifications, and equivalent arrangementsand methodologies, will be apparent from or reasonably suggested by thedisclosure and the foregoing description thereof, without departing fromthe substance or scope of the claims. Furthermore, any sequence(s)and/or temporal order of steps of various processes described andclaimed herein are those considered to be the best mode contemplated forcarrying out the claimed systems. It should also be understood that,although steps of various processes may be shown and described as beingin a preferred sequence or temporal order, the steps of any suchprocesses are not limited to being carried out in any particularsequence or order, absent a specific indication of such to achieve aparticular intended result. In most cases, the steps of such processesmay be carried out in a variety of different sequences and orders, whilestill falling within the scope of the claimed systems. In addition, somesteps may be carried out simultaneously, contemporaneously, or insynchronization with other steps.

Aspects, features, and benefits of the claimed devices and methods forusing the same will become apparent from the information disclosed inthe exhibits and the other applications as incorporated by reference.Variations and modifications to the disclosed systems and methods may beeffected without departing from the spirit and scope of the novelconcepts of the disclosure.

It will, nevertheless, be understood that no limitation of the scope ofthe disclosure is intended by the information disclosed in the exhibitsor the applications incorporated by reference; any alterations andfurther modifications of the described or illustrated embodiments, andany further applications of the principles of the disclosure asillustrated therein are contemplated as would normally occur to oneskilled in the art to which the disclosure relates.

The foregoing description of the exemplary embodiments has beenpresented only for the purposes of illustration and description and isnot intended to be exhaustive or to limit the devices and methods forusing the same to the precise forms disclosed. Many modifications andvariations are possible in light of the above teaching.

The embodiments were chosen and described in order to explain theprinciples of the devices and methods for using the same and theirpractical application so as to enable others skilled in the art toutilize the devices and methods for using the same and variousembodiments and with various modifications as are suited to theparticular use contemplated. Alternative embodiments will becomeapparent to those skilled in the art to which the present devices andmethods for using the same pertain without departing from their spiritand scope. Accordingly, the scope of the present devices and methods forusing the same is defined by the appended claims rather than theforegoing description and the exemplary embodiments described therein.

What is claimed is:
 1. A method, comprising: capturing, via at least one image sensor, a plurality of video frames corresponding to a vehicle; reading, via at least one computing device, a plurality of measurements from at least one additional sensor; determining, via the at least one computing device, that a driver has exited the vehicle; in response to determining that the driver has exited the vehicle, determining, via the at least one computing device, that a particular event has occurred in a particular seat of the vehicle by analyzing the plurality of measurements and the plurality of video frames based on event configuration data; and in response to determining that the particular event has occurred, performing, via the at least one computing device, at least one remedial action comprising causing a user interface to be rendered on a mobile device of a user comprising a plurality of icons individually associated with a respective seat of a plurality of seats of the vehicle, wherein a particular icon of the plurality of icons associated with the particular seat comprises a seat notification corresponding to the particular event.
 2. The method of claim 1, wherein the at least additional one sensor comprises an infrared camera and the method further comprises: reading, via the at least one computing device, a plurality of infrared frames from the infrared camera; identifying, via the at least one computing device, an area with a thermal variance in at least one of the plurality of infrared frames; and monitor a temperature of the area with the thermal variance, wherein determining that the particular event has occurred further comprises determining that the temperature of the area exceeds a temperature threshold.
 3. The method of claim 1, further comprising: monitoring, via the at least one computing device, to determine whether the particular event has ended; and performing, via the at least one computing device, a plurality of additional remedial actions over time until the particular event ends.
 4. The method of claim 1, further comprising determining a temperature in the vehicle exceeds a predetermined temperature threshold based on the plurality of measurements, wherein the at least one remedial action is further performed in response to the temperature exceeding the predetermined temperature threshold.
 5. The method of claim 1, further comprising: monitoring a length of time since the particular event started; and determining that the length of time exceeds a time threshold, wherein the at least one remedial action is further performed in response to the length of time exceeding the time threshold.
 6. The method of claim 1, wherein the particular event comprises one of: a child being left in the vehicle or a pet being left in the vehicle.
 7. The method of claim 1, wherein the at least one remedial action comprises generating an alert on the mobile device associated with an administrative user.
 8. A system, comprising: a data store comprising event configuration data; at least one sensor configured to sense at least one type of measurement corresponding to a vehicle; and at least one computing device coupled to the at least one sensor, the at least one computing device configured to: read a plurality of measurements from the at least one sensor; determine that a driver has exited the vehicle; in response to determining that the driver has exited the vehicle, determine that a particular event has occurred in a particular seat of the vehicle by analyzing the plurality of measurements based on the event configuration data; and in response to determining that the particular event has occurred, perform at least one remedial action comprising causing a user interface to be rendered on a mobile device of a user comprising a plurality of icons individually associated with a respective seat of a plurality of seats of the vehicle, wherein a particular icon of the plurality of icons associated with the particular seat comprises a seat notification corresponding to the particular event.
 9. The system of claim 8, further comprising a body of a sensing device, wherein the at least one sensor and the at least one computing device are disposed within the body and the body is configured to be affixed to an interior of the vehicle.
 10. The system of claim 8, wherein the at least one sensor comprises a camera, the particular event comprises leaving an infant in the vehicle, and the at least one computing device is configured to analyzing the plurality of measurements by performing image analysis on a plurality of frames from the camera to identify the infant in the vehicle.
 11. The system of claim 8, wherein the at least one sensor comprises a camera, the particular event comprises leaving a pet in the vehicle, and the at least one computing device is further configured to determine that the particular event has occurred by analyzing the plurality of measurements by: performing image analysis on a plurality of frames from the camera to identify the pet in the vehicle; monitoring the pet in the vehicle in the plurality of frames over a period of time; determining that the period of time exceeds a time threshold; and determining that the particular event has occurred responsive to the period of time exceeding the time threshold.
 12. The system of claim 11, wherein the at least one computing device is further configured to: enter into an armed mode in response to the pet being identified in the vehicle; and determine an intrusion into the vehicle while in the armed mode.
 13. The system of claim 8, wherein the at least one computing device is configured to performing the at least one remedial action by: initiating a video call to the mobile device associated with a particular user account; streaming an audio and video feed of an interior of the vehicle to the mobile device; and outputting, via a speaker in the interior of the vehicle, an audio signal from the mobile device.
 14. The system of claim 8, wherein the at least one sensor comprises a microphone, the particular event comprises leaving an infant in the vehicle, and the at least one computing device is configured to analyzing the plurality of measurements by performing audio analysis on an audio stream from the microphone to identify the infant in the vehicle.
 15. A non-transitory computer-readable medium embodying a program that, when executed by at least one computing device, causes the at least one computing device to: read a plurality of measurements from at least one sensor configured to sense at least one type of measurement corresponding to a vehicle; determine that a driver has exited the vehicle; in response to determining that the driver has exited the vehicle, determine that a particular event has occurred in a particular seat of the vehicle by analyzing the plurality of measurements based on event configuration data stored in a memory associated with the at least one computing device; and perform at least one remedial action comprising causing a user interface to be rendered on a mobile device of a user comprising a plurality of icons individually associated with a respective seat of a plurality of seats of the vehicle, wherein a particular icon of the plurality of icons associated with the particular seat comprises a seat notification corresponding to the particular event based on the particular event occurring.
 16. The non-transitory computer-readable medium of claim 15, wherein the at least one sensor comprises a camera and the program further causes the at least one computing device to: read the plurality of measurements from the at least one sensor comprises receiving a plurality of video frames from the camera; and track a movement pattern of a pet within a subset of the plurality of video frames.
 17. The non-transitory computer-readable medium of claim 15, wherein the program further causes the at least one computing device to: analyze a plurality of frames from a camera device, wherein the at least one sensor comprises the camera device; identify an animal in at least one frame of the plurality of frames; and determine a current temperature in the vehicle meets or exceeds a predefined threshold stored in the event configuration data, wherein determining that the particular event has occurred is responsive to the animal being identified and the current temperature in the vehicle meeting or exceeding the predefined threshold.
 18. The non-transitory computer-readable medium of claim 15, wherein the at least one remedial action comprises starting the vehicle.
 19. The non-transitory computer-readable medium of claim 15, wherein the at least one remedial action comprises at least partially opening at least one window in the vehicle.
 20. The non-transitory computer-readable medium of claim 15, wherein the program further causes the at least one computing device to determine a last driver of the vehicle, wherein the at least one remedial action comprises sending an alert to the mobile device associated with the last driver. 