System and method for controlling a vehicle security system

ABSTRACT

A method for selectively controlling a security system comprises receiving a tag identification, determining a security identification based on the tag identification, and transmitting a message comprising the security identification and a security system command. A security system having a unique security identification comprises a control device for controlling the security system, wherein the control device transmits a message to the security system comprising the unique security identification and a function command, the control device comprising keypad for entering a tag identification corresponding to the unique security identification.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of application Ser. No. 10/691,918,filed Oct. 23, 2003, the disclosure of which is incorporated byreference herein in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to remote vehicle control, and moreparticularly to a system and method for selectively controlling one ormore vehicle security systems.

2. Discussion of Related Art

Car dealerships typically have tens or hundreds of cars in inventory atany given time. Protecting the inventory typically involves installing asecurity system in each vehicle.

Vehicles that include a security system prior to a consumer sale arecalled pre-load vehicles. The pre-load lot security systems typicallyuse a set of transmitters or control devices having a shared controlleridentification. The security systems are assigned a shared SecurityIdentification Code (SIC), wherein any of the control devices can beused to control any of the security systems. The transmission range ofthe control devices is reduced so that only vehicles in a closeproximity, e.g., within 5 feet, are responsive. However, even with areduced range, a control device can operate more than one vehicle withinthe reduced range. Further, the reduced range does not guarantee that ifa security system is unintentionally disarmed that it will later bearmed by the control device.

Typically, for lot security systems, every vehicle on the lot isprogrammed with the same SIC. This enables multiple users, each using aRF control device, to access all the pre-load vehicles on the lot.Access to multiple vehicles simultaneously is partially controlled bylimiting the broadcast range of the RF control device. Thus, only asmall number of vehicles respond when a command is sent from the RFcontrol device.

The existence of the control device is a vulnerability of the lotsecurity systems, wherein a thief having obtained the control device cancontrol each vehicle in the dealer inventory.

Therefore, a need exists for a system and method for selectivelycontrolling one or more security system.

SUMMARY OF THE INVENTION

According to an embodiment of the present invention, a security systemhaving a unique security identification comprises a control device forcontrolling the security system, wherein the control device transmits amessage to the security system comprising the unique securityidentification and a function command, the control device comprisingmeans for entering a tag identification corresponding to the uniquesecurity identification.

The control device is a wireless control device. The means for enteringthe tag identification is a keypad.

The security system further comprises an authentication control modulefor granting an operational parameter of the control device. Thesecurity system further comprises a database including the operationalparameter, wherein the database is accessible by the authenticationcontrol module.

The control device comprises a serial number known to a databaseincluding the operational parameter, wherein the database is accessibleby the authentication control module.

The security system further comprises further comprising an interface ofthe authentication control module. The interface is a computer softwareproduct stored in a computer coupled to the authentication controlmodule.

An authentication control module is wirelessly coupled to the controldevice during a time for granting the operational parameter to thecontrol device.

The tag identification is mixed with a base identification to determinethe unique security identification.

According to an embodiment of the present invention, a method forselectively controlling a security system comprises receiving a tagidentification, determining a security identification based on the tagidentification, and transmitting a message comprising the securityidentification and a security system command.

The method comprises comparing the security identification to a storedsecurity identification in the security system. The method comprisesexecuting the security system command upon determining the securityidentification to correspond to a stored security identification in thesecurity system.

The security identification is unique to the security system. Thesecurity system command controls one or more of a lock feature, anunlock feature, a find feature, a panic feature, an arm feature, adisarm feature, a light feature, a start feature, and a trunk feature.

The method comprises broadcasting the message to control at least twosecurity systems.

The method comprises defining functions of the security system in acontrol device.

The method further comprises changing a mode of the security system,wherein changing the mode is permanently defined by a global controldevice. A permission for changing the mode is granted by anauthentication control module.

The method comprises defining, permanently, a base identification of amanagement system in a control device. The method comprises defining apermission for transmitting the security system command according to anauthentication control module message.

The method further comprises defining a base identification of a controldevice according to an authentication control module message. The baseidentification expires after a pre-determined time interval. The baseidentification expires after a time interval that is selectable in anauthentication control module.

A control device has a unique identification.

An authentication control module selectively allows or denies a controldevice's access to a base identification. An authentication controlmodule selectively sets an expiry time for a base identification. Anauthentication control module sets a permission for the security systemfunction. An authentication control module selectively sets a permissionchanging a mode of the security system.

The method comprises communicating wirelessly, two-way, between anauthentication control module and a control device. The method comprisescommunicating, two-way, between an authentication control module and acontrol device via a docking station.

The method further comprises changing a mode of the security systemwirelessly. A dealer mode provides a passive arming function and a testdrive function. A consumer mode provides at least one of a remotesecurity function, a keyless entry function, a security upgrade tokeyless entry function, a remote car start function, and a remote carstart upgrade to keyless entry function.

BRIEF DESCRIPTION OF THE DRAWINGS

Preferred embodiments of the present invention will be described belowin more detail, with reference to the accompanying drawings:

FIG. 1 is a diagram of a system according to an embodiment of thepresent invention;

FIG. 2 a is a diagram of a system according to an embodiment of thepresent invention;

FIG. 2 b is a diagram of a system according to an embodiment of thepresent invention;

FIG. 3 a is a diagram of a system according to an embodiment of thepresent invention;

FIG. 3 b is a diagram of a system according to an embodiment of thepresent invention;

FIG. 4 is a diagram of a control device according to an embodiment ofthe present invention;

FIG. 5 is an illustration of an interface for programming a set ofcontrol devices according to an embodiment of the present invention; and

FIG. 6 is an illustration of an interface for modifying a user profileaccording to an embodiment of the present invention.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

According to an embodiment of the present invention, a system and methodcomprise a set of functions for controlling electronic vehicle securitysystems. A control device is used for controlling individual vehiclesecurity systems, wherein the control device comprises a means forselecting a vehicle security system to be controlled. Each vehiclesecurity system has a unique Security Identification Code (SIC).

It should be noted the vehicle security system comprises one or morefeatures for operating components of a vehicle. For example, the vehiclesecurity system may comprise features for operating door locks, windows,remote start features, and anti-theft features. One of ordinary skill inthe art would recognize that this is not an exhaustive list ofcontemplated features, and that other features can by implemented.

Security systems can be installed at, for example, the car dealer levelor by original equipment manufacturers. A vehicle security system isinstalled on each vehicle in the dealer's inventory. The vehiclesecurity systems help to deter theft and are a form of self-insurancefor the dealer. Further, the control system and method can assist thedealer in managing inventory. Because the security systems are installedat a pre-load level, there is a greater incentive for the dealer to sellthe vehicle security systems.

Dealer tools, e.g., an authentication control module, a control device,and a database, interface with the vehicle security systems. This allowsfor the protection of the vehicles through individualized access to thevehicles with the control device or access tool.

The control device is adapted for a transmission range of, for example,several hundred feet, wherein only the selected vehicle security systemwill respond. A user selects a vehicle security system according to atag identification. The tag identification corresponds to a vehicle inwhich the security system is installed, or may correspond the securitysystem directly. Upon entering the tag identification in the controldevice, a corresponding vehicle security system can be operated. Thecontrol device comprises a keypad for entering the tag identification.Other means can be used to enter the vehicle security system tagidentification, such as by voice command, scroll menu, handwritingrecognition, radio-frequency identification transponder pickup inconjunction with an electronic pellet stored in a vehicle ignition key.

According to an embodiment of the present invention, the system allows auser to command a selected vehicle security system. Accordingly, acontrol device can transmit commands over a wide range, e.g., aboutseveral hundred feet, without regard to the other vehicle securitysystems within the range. Given the range capabilities of the controldevice, the user can locate a particular vehicle in lot by commandingthe particular vehicle security system to sound a horn and/or flashlights. According to an embodiment of the present invention, a remotestart function can be used to keep batteries charged in selectedvehicles. Further, since access is granted to a single vehicle at atime, the user can set functions or features of the selected securitysystem with confidence that no other vehicles are affected.

According to an embodiment of the present invention, each control deviceis serialized and can be removed from the system if it becomes lost orstolen.

It is to be understood that the present invention may be implemented invarious forms of hardware, software, firmware, special purposeprocessors, or a combination thereof. In one embodiment, the presentinvention may be implemented in software as an application programtangibly embodied on a program storage device. The application programmay be uploaded to, and executed by, a machine comprising any suitablearchitecture.

Referring to FIG. 1, according to an embodiment of the presentinvention, a computer system 101 for implementing the present inventioncan comprise, inter alia, a central processing unit (CPU) 102, a memory103 and an input/output (I/O) interface 104. The computer system 101 isgenerally coupled through the I/O interface 104 to a display 105 andvarious input devices 106 such as a mouse and keyboard. The supportcircuits can include circuits such as cache, power supplies, clockcircuits, and a communications bus. The memory 103 can include randomaccess memory (RAM), read only memory (ROM), disk drive, tape drive,etc., or a combination thereof. The present invention can be implementedas a routine 107 that is stored in memory 103 and executed by the CPU102 to process the signal from the signal source 108. As such, thecomputer system 101 is a general purpose computer system that becomes aspecific purpose computer system when executing the routine 107 of thepresent invention.

The computer platform 101 also includes an operating system and microinstruction code. The various processes and functions described hereinmay either be part of the micro instruction code or part of theapplication program (or a combination thereof) which is executed via theoperating system. In addition, various other peripheral devices may beconnected to the computer platform such as an additional data storagedevice and a printing device.

It is to be further understood that, because some of the constituentsystem components and method steps depicted in the accompanying figuresmay be implemented in software, the actual connections between thesystem components (or the process steps) may differ depending upon themanner in which the present invention is programmed. Given the teachingsof the present invention provided herein, one of ordinary skill in therelated art will be able to contemplate these and similarimplementations or configurations of the present invention.

According to an embodiment of the present invention, multiple vehiclescan be protected using individual security systems and one or morehandheld control devices. These control devices are issued to dealershippersonnel. The control devices work in conjunction with the vehiclesecurity systems and a device for enabling and disabling the controldevices based on a parameter, such as a control device controlleridentification, time of day, or day of week. The device for enabling anddisabling the control devices is an Authentication Control Module (ACM).

Referring to FIGS. 2 a and 2 b, a control device 201 sends a message 202to the ACM 203 to request permission to operate. The message 202comprises an authentication request and a controller identification codecorresponding to the control device. The ACM 203 grants or deniespermission to operate based on information within a database 204 of adatabase management system 205. The database 204 can be stored in, forexample, a personal computer or uploaded to the ACM 203. The ACM 203sends a reply according to the information in the database 204 via areply message 206 to the control device 201, the message 206 providingauthentication in a case where the control device is granted permissionto operate. The reply message 206 comprises a response specifyingoperational parameters and a based identification of the database. Theoperational parameters define, for example, daily operational windowsand an expiration date/time for the authentication. The reply message206 can further comprise the controller identification. An authenticatedcontrol device can then be used to control any vehicle on the dealer lotvia a control message 206 comprising an appropriate SIC and functioncommand providing that the vehicle has been fitted with a compatiblesecurity system 507.

As shown in FIG. 2B, the database management system 205 and the ACM 203comprise clocks. These clocks are real-time clocks. The clocks of thedatabase management system 205 and the ACM 203 are synchronized.Further, each control device comprises a timer means. The timer meanscan be a real-time clock or a timer. The time can be used for monitoringoperational parameters, such as the expiry of a time during whichoperational parameters are granted.

The ACM 203 can be accessed by other systems, for example, a videodisplay and data entry device can be connected to the ACM, wherein thedatabase is stored in the ACM. An example of the video display and dataentry device is a personal digital assistant (PDA). It is to beunderstood that other methods for accessing the ACM are contemplated andwould be obvious to one of ordinary skill in the art in light of thepresent disclosure, for example, the ACM can be accessed through anetwork connection and web browser.

Communication between the ACM and the control device is by radiofrequency (RF) signals. The communication is two-way. It should be notedthat communication can be by other means, such as infrared (IR) signals,wired connections, or interface to original-equipment installed ordealer installed telematics system.

Referring to FIG. 3A, a tag identification 301 is input to a controldevice 302, selecting a particular security system known to the controldevice 302 by a SIC. The control device determines the SIC as aproprietary combination or mixture of the tag identification 301 and abase identification. The selected security system responds when acommand is sent from a control device 302. The commands comprises theSIC of the selected security system and a function to be performed bythe selected security system. Each vehicle security system is programmedwith a unique SIC. Therefore, access can be gained to a single vehicleon the dealer lot via a control device without accessing any othervehicle on the dealer lot. This is accomplished by utilizing a 0-9keypad on the control device to enter a vehicle stock tag number orsimilar index corresponding to a stored SIC. Further, groups of vehicles303 can share a group SIC, as shown in FIG. 3 b. Thus, control commandscan be sent to more than one vehicle simultaneously. An example of acontrol device is shown in FIG. 4.

The programming of the security system SIC can be by, for example, codelearning techniques, wherein a security system learns the SIC from afirst control device to operate after the security system is installedor activated for the first time.

Referring to FIG. 4, the control device is a full range remote controltransmitter comprising an alpha/numeric keypad. The control device isactivated for operation by entering a password. The control device canthen access any vehicle having an appropriate security system byentering a vehicle tag identification and pressing the “unlock” button.The tag identification can be, for example, letters, numbers, symbols,or combinations thereof.

Pressing an ON button, followed by entering the password activates thecontrol device. Entering the vehicle's tag identification, followed bypressing the “UNLOCK” button deactivates the security system and unlocksthe doors. Pressing and holding the UNLOCK button will pop the trunk orhatch if the vehicle is equipped with electric trunk or hatch release.One of ordinary skill in the art would appreciate that differentprocedures can be implemented to perform functions using the controldevice.

The security system can be rearmed via the control device or allowed toautomatically rearm at a later time after the system was disarmed. In adealer lot protection mode of operation the systems various securityfunctions are programmable and can be tailored to a specific dealer'sneeds.

Entering a vehicle's tag identification followed by selecting “Find”activates a progressive find function to assist in locating a specificvehicle.

A user enters the vehicle tag identification and selects a controlcommand. The vehicle tag identification is mixed with a baseidentification of the database, which is stored in the control deviceduring authentication to create the SIC. The base identification numbercorresponds to the database from which control devices are authenticatedand is the same for all control devices used by the dealer personnel.The base identification is maintained in the ACM and is transmitted tothe control device when the ACM grants the control device permission tooperate. Alternatively, SICs and tag identifications can be stored in alookup table in the control device.

According to an embodiment of the present invention, a system comprisesindividual control devices. The individual control devices comprise abase identification as programmed before shipment to the dealership. Thecontrol devices are preprogrammed with an operational parameter, e.g.,always enabled, and the ACM is not implemented. Accordingly, to access aparticular vehicle, a vehicle tag identification is entered into thecontrol device having the stored base identification.

According to an embodiment of the present invention, the ACM is accessedthrough a software interface. FIGS. 5 and 6 show examples of individualwindows of the software interface. Through the interface, a user canschedule operating hours of control devices, for example, as illustratedin FIG. 5. One or more control devices are defined as a group 501, andthe group can be granted permission to operate for given days 502 andhours 503. Groups can be added or deleted from the system.

Referring to FIG. 6, a user 601, e.g., dealership salesperson, can beentered into the database as having been issued a control device 602.The control device has a defined controller identification. The controldevice 602 can be assigned individual permissions 603 or havepermissions defined as part of a group 604. Further, the control devicecan be programmed to require the user to enter a personal identificationnumber (PIN) 605 before commands can be issued by the control device tovehicle security systems. Device parameters, e.g., permissions, can beuploaded to the ACM device for granting and denying control devicerequests.

According to an embodiment of the present invention, control devices aregiven permissions for given time periods. For example, a control devicemay be give permission to operate on a daily basis by the ACM. Thus, thecontrol device can operate vehicle security systems outside of acommunications range of the ACM. According to an embodiment of thepresent invention, a control device is given permission on a per usebasis, e.g., each time the control device is used. To determinepermission on a per use basis, the control device is within acommunications range of the ACM for each use. Accordingly, a controldevice that is lost or stolen will cease to have permission to operateafter a given time, for example, after one day or immediately after thelast use of the control device.

Permissions can define operational time periods of a control device andwhat operations are available to a control device. For example, acontrol device may be granted permission to disable a vehicle securitysystem but not to activate a remote start feature of the vehicle.

According to an embodiment of the present invention, a master controldevice has permanent permissions enabling control over the vehiclesecurity systems without ACM granted permissions. Thus, the mastercontrol device can operate even when the ACM device is offline. Themaster control device has a base identification that matches the baseidentification of the database and ACM.

The alarm system has the ability to operate in a dealer only mode usedfor lot protection, but also operate in a consumer mode. The dealerpersonnel can change the vehicle security operating mode through acontrol device without the need for an expert installer to access thevehicle.

Dealer mode and consumer mode relate to the type of remote that is ableto control a vehicle security system. For example, in dealer mode, thedealer control device is used to operate the vehicle security system.The dealer control device is used to switch the vehicle security systemfrom dealer mode to consumer mode. In consumer mode the vehicle securitysystem can be programmed to be responsive to a consumer fob device, ormay operate without a fob.

In addition to providing security features, according to an embodimentof the present invention a system comprising an ACM and control deviceare implemented for managing inventory. The control device reports usageinformation to the ACM. For example, the control device reports back tothe ACM the vehicles and times that the control device was used toaccess. This information is stored in a database and is reportedagainst. Where the control device is assigned to a particular user, suchas a dealer salesperson, the dealer management can determine whichvehicles are being shown to customers, by whom, and when, e.g., howoften. The report can be used for inventory management, securitymanagement of the vehicles, and personnel management. As an inventorymanagement tool a dealer may, for example, arrange vehicles in a lotsuch that the vehicles generating the most interest are positioned in aprominent area. As a security management tool, a dealer may, forexample, position vehicles having higher rates of theft in a securearea, such as within a locked pen. As a personnel management tool, thedealer may, for example, monitor which employees tend to spend more timewith vehicles by determining a time the security system was deactivatedand a later time when the security system is activated.

Having described embodiments for selectively controlling one or morevehicle security systems, it is noted that modifications and variationscan be made by persons skilled in the art in light of the aboveteachings. It is therefore to be understood that changes may be made inthe particular embodiments of the invention disclosed which are withinthe scope and spirit of the invention as defined by the appended claims.Having thus described the invention with the details and particularityrequired by the patent laws, what is claimed and desired protected byLetters Patent is set forth in the appended claims.

1. A security system, comprising: a control device for transmitting arequest to operate a plurality of vehicle security systems, the requestincluding an identification code of the control device; and a controlmodule for receiving the request and granting the control devicepermission to operate the vehicle security systems if the identificationcode matches an identification code of a control device that haspermission to operate the vehicle security systems, wherein whenpermission to operate the vehicle security systems is granted, thecontrol module transmits a reply to the control device, the replyincluding operating parameters that enable the control device toselectively control one or more of the vehicle security systems.
 2. Thesystem of claim 1, wherein the control device transmits usageinformation to the control module.
 3. The system of claim 2, wherein theusage information includes identification codes of vehicles accessed bythe control device and times the vehicles were accessed.
 4. The systemof claim 3, wherein the usage information further includes anidentification of a user assigned to the control device.
 5. The systemof claim 2, wherein the usage information identifies a mode in which thecontrol device was operated.
 6. The system of claim 2, wherein thecontrol module stores the usage information.
 7. The system of claim 6,wherein a report can be created based on the stored usage information.8. A security system, comprising: a computer including a database forstoring operating parameters to be granted to control devices that havepermission to operate a plurality of vehicle security systems; a controlmodule for granting or denying the control devices permission to operatethe vehicle security systems based on the permissions stored in thedatabase; and a plurality of control devices, each control device beinggranted permission to selectively operate one or more of the vehiclesecurity systems if an identification code of the control device isauthenticated by the control module.
 9. The system of claim 8, whereinthe control devices transmit their respective usage information to thecontrol module.
 10. The system of claim 9, wherein the usage informationis transmitted at predetermined or random intervals.
 11. The system ofclaim 9, wherein the control module transmits the usage information tothe computer.
 12. The system of claim 11, wherein the computer generatesa log listing vehicles accessed by the control devices and times thevehicles were accessed by using the usage information.
 13. The system ofclaim 12, wherein the log further lists users of the control devices.14. The system of claim 13, wherein the log further lists modes in whichthe control devices were operated.
 15. The system of claim 8, whereinthe control module transmits authentication information to the computer.16. The system of claim 15, wherein the computer generates a log listingall control devices granted permission to operate on a given day byusing the authentication information.
 17. A system for monitoringvehicle access activities, comprising: a computer for generating reportsthat detail usage of a plurality of control devices; a control modulefor assigning operating parameters to the control devices so that thecontrol devices can selectively operate one or more of a plurality ofvehicle security systems; and a plurality of control devices, eachcontrol device being assigned the operating parameters if anidentification code of the control device is authenticated by thecontrol module.
 18. The system of claim 17, wherein the reports identifyvehicles accessed by the control devices and times the vehicles wereaccessed.
 19. The system of claim 18, wherein the reports identify userswho operated the control devices when the control devices were used toaccess the vehicles.
 20. The system of claim 17, wherein the reports areprinted, displayed or saved by the computer.