Method and apparatus for vehicle radio station privacy mode control

ABSTRACT

A system includes a processor configured to receive a request to enable a privacy screen. The processor is further configured to receive a privacy screen engage trigger. Also, the processor is configured to change a current radio station to a predefined station, upon receipt of the engage trigger when a privacy screen is enabled.

TECHNICAL FIELD

The illustrative embodiments generally relate to a method and apparatusfor vehicle radio station privacy mode control.

BACKGROUND

Satellite subscription radio (Sirius/XM) offers a few dozen stationswith adult content that is not suitable to be heard by children due toeither the subject matter and/or the language. When passengers enter aparked vehicle before or along with the driver (ex., their spouse,children, work colleagues, boss, clients, friends, neighbors, etc.) thelast station the driver had listened to from the previous drive cyclewill come on and may allow unpredictable content or language to beaudible. Further, some automotive OEMs, such as Ford, also allow theradio control head to operate without a key (for up to an hour or untilbattery charge is at risk) such that the radio can be turned on evenwithout the key and/or present.

Additionally, even if the audio was or is turned down, the presetsfavorites on the radio display can visually show the listeningpreferences of the driver to passengers. Depending on thepersonality/life preferences of both the driver and the passengers, thismay create an awkward and uncomfortable situation for the vehicledriver, potential embarrassment, and even potentially harm relationshipssuch as those with clients, employers, or others that may not approve.Such situations can change relationships.

The same risks may also exist with less controversial subject mattersuch as a genre of music, political talk radio, NASCAR, religiousprogramming, or other topics on which passengers may have opinions thatcould affect their relationship with the driver. The driver may wish tokeep their personal life/interests private.

The same privacy principles could also apply to terrestrial radiostations and imported multimedia formats a driver may bring to thevehicle such as Cassettes, MP3 players, jump drives, CDs, SD cards,Bluetooth Streaming, WiFi streaming, and any method of playback.Concerned drivers could just shut down these media formats or radiobands when they leave the vehicle, but they may forget or did not expectto have passengers for the next drive cycle when they parked.

SUMMARY

In a first illustrative embodiment, a system includes a processorconfigured to receive a request to enable a privacy screen. Theprocessor is further configured to receive a privacy screen engagetrigger. Also, the processor is configured to change a current radiostation to a predefined station, upon receipt of the engage trigger whena privacy screen is enabled.

In a second illustrative embodiment, a computer-implemented methodincludes receiving a request to enable a privacy screen. The method alsoincludes receiving a privacy screen engage trigger. Further, the methodincludes changing a current radio station to a predefined station, via acomputing system, upon receipt of the engage trigger when a privacyscreen is enabled.

In a third illustrative embodiment, a non-transitory computer readablestorage medium stores instructions that, when executed by a processor,cause the processor to perform a method including receiving a request toenable a privacy screen. The method also includes receiving a privacyscreen engage trigger. Further, the method includes changing a currentradio station to a predefined station, via a computing system, uponreceipt of the engage trigger when a privacy screen is enabled.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an illustrative vehicle computing system;

FIG. 2 shows an illustrative example of a privacy mode control process;

FIG. 3 shows an illustrative example of a privacy mode enablementrequest handling process;

FIG. 4 shows an illustrative example of an automatically controlledprivacy mode control process; and

FIG. 5 shows an illustrative example of a privacy screening process.

DETAILED DESCRIPTION

As required, detailed embodiments of the present invention are disclosedherein; however, it is to be understood that the disclosed embodimentsare merely exemplary of the invention that may be embodied in variousand alternative forms. The figures are not necessarily to scale; somefeatures may be exaggerated or minimized to show details of particularcomponents. Therefore, specific structural and functional detailsdisclosed herein are not to be interpreted as limiting, but merely as arepresentative basis for teaching one skilled in the art to variouslyemploy the present invention.

FIG. 1 illustrates an example block topology for a vehicle basedcomputing system 1 (VCS) for a vehicle 31. An example of such avehicle-based computing system 1 is the SYNC system manufactured by THEFORD MOTOR COMPANY. A vehicle enabled with a vehicle-based computingsystem may contain a visual front end interface 4 located in thevehicle. The user may also be able to interact with the interface if itis provided, for example, with a touch sensitive screen. In anotherillustrative embodiment, the interaction occurs through, button presses,audible speech and speech synthesis.

In the illustrative embodiment 1 shown in FIG. 1, a processor 3 controlsat least some portion of the operation of the vehicle-based computingsystem. Provided within the vehicle, the processor allows onboardprocessing of commands and routines. Further, the processor is connectedto both non-persistent 5 and persistent storage 7. In this illustrativeembodiment, the non-persistent storage is random access memory (RAM) andthe persistent storage is a hard disk drive (HDD) or flash memory.

The processor is also provided with a number of different inputsallowing the user to interface with the processor. In this illustrativeembodiment, a microphone 29, an auxiliary input 25 (for input 33), auniversal serial bus (USB) input 23, a global positioning system (GPS)input 24 and a BLUETOOTH input 15 are all provided. An input selector 51is also provided, to allow a user to swap between various inputs. Inputto both the microphone and the auxiliary connector is converted fromanalog to digital by a converter 27 before being passed to theprocessor. Although not shown, numerous of the vehicle components andauxiliary components in communication with the VCS may use a vehiclenetwork (such as, but not limited to, a controller area network (CAN)bus) to pass data to and from the VCS (or components thereof).

Outputs to the system can include, but are not limited to, a visualdisplay 4 and a speaker 13 or stereo system output. The speaker isconnected to an amplifier 11 and receives its signal from the processor3 through a digital-to-analog converter 9. Output can also be made to aremote BLUETOOTH device such as personal navigation device (PND) 54 or aUSB device such as vehicle navigation device 60 along the bi-directionaldata streams shown at 19 and 21 respectively.

In one illustrative embodiment, the system 1 uses the BLUETOOTHtransceiver 15 to communicate 17 with a user's nomadic device 53 (e.g.,cell phone, smart phone, personal digital assistant (PDA), or any otherdevice having wireless remote network connectivity). The nomadic devicecan then be used to communicate 59 with a network 61 outside the vehicle31 through, for example, communication 55 with a cellular tower 57. Insome embodiments, tower 57 may be a WiFi access point.

Exemplary communication between the nomadic device and the BLUETOOTHtransceiver is represented by signal 14.

Pairing a nomadic device 53 and the BLUETOOTH transceiver 15 can beinstructed through a button 52 or similar input. Accordingly, thecentral processing unit (CPU) is instructed that the onboard BLUETOOTHtransceiver will be paired with a BLUETOOTH transceiver in a nomadicdevice.

Data may be communicated between CPU 3 and network 61 utilizing, forexample, a data-plan, data over voice, or dual-tone multi-frequency(DTMF) tones associated with nomadic device 53. Alternatively, it may bedesirable to include an onboard modem 63 having antenna 18 in order tocommunicate 16 data between CPU 3 and network 61 over the voice band.The nomadic device 53 can then be used to communicate 59 with a network61 outside the vehicle 31 through, for example, communication 55 with acellular tower 57. In some embodiments, the modem 63 may establishcommunication 20 with the tower 57 for communicating with network 61. Asa non-limiting example, modem 63 may be a USB cellular modem andcommunication 20 may be cellular communication. In this example, link 16may represent any LAN, which can support, for example, WiFi, WiMax andother non-cellular communication.

In one illustrative embodiment, the processor is provided with anoperating system including an API to communicate with modem applicationsoftware. The modem application software may access an embedded moduleor firmware on the BLUETOOTH transceiver to complete wirelesscommunication with a remote BLUETOOTH transceiver (such as that found ina nomadic device). Bluetooth is a subset of the IEEE 802 PAN (personalarea network) protocols. IEEE 802 LAN (local area network) protocolsinclude WiFi and have considerable cross-functionality with IEEE 802PAN. Both are suitable for wireless communication within a vehicle.Another communication means that can be used in this realm is free-spaceoptical communication (such as infrared data association (IrDA)) andnon-standardized consumer infrared (IR) protocols.

In another embodiment, nomadic device 53 includes a modem for voice bandor broadband data communication. In the data-over-voice embodiment, atechnique known as frequency division multiplexing may be implementedwhen the owner of the nomadic device can talk over the device while datais being transferred. At other times, when the owner is not using thedevice, the data transfer can use the whole bandwidth (300 Hz to 3.4 kHzin one example). While frequency division multiplexing may be common foranalog cellular communication between the vehicle and the internet, andis still used, it has been largely replaced by hybrids with Code DomainMultiple Access (CDMA), Time Domain Multiple Access (TDMA), orSpace-Domain Multiple Access (SDMA) for digital cellular communication.These are all ITU IMT-2000 (3G) compliant standards and offer data ratesup to 2 mbs for stationary or walking users and 385 kbs for users in amoving vehicle. 3G standards are now being replaced by IMT-Advanced (4G)which offers 100 mbs for users in a vehicle and 1 gbs for stationaryusers. If the user has a data-plan associated with the nomadic device,it is possible that the data-plan allows for broad-band transmission andthe system could use a much wider bandwidth (speeding up data transfer).In still another embodiment, nomadic device 53 is replaced with acellular communication device (not shown) that is installed to vehicle31. In yet another embodiment, the ND 53 may be a wireless local areanetwork (LAN) device capable of communication over, for example (andwithout limitation), an 802.11g network (i.e., WiFi) or a WiMax network.

In one embodiment, incoming data can be passed through the nomadicdevice via a data-over-voice or data-plan, through the onboard BLUETOOTHtransceiver and into the vehicle's internal processor 3. In the case ofcertain temporary data, for example, the data can be stored on the HDDor other storage media 7 until such time as the data is no longerneeded.

Additional sources that may interface with the vehicle include apersonal navigation device 54, having, for example, a USB connection 56and/or an antenna 58, a vehicle navigation device 60 having a USB 62 orother connection, an onboard GPS device 24, or remote navigation system(not shown) having connectivity to network 61. USB is one of a class ofserial networking protocols. IEEE 1394 (firewire), EIA (ElectronicsIndustry Association) serial protocols, IEEE 1284 (Centronics Port),S/PDIF (Sony/Philips Digital Interconnect Format) and USB-IF (USBImplementers Forum) form the backbone of the device-device serialstandards. Most of the protocols can be implemented for eitherelectrical or optical communication.

Further, the CPU could be in communication with a variety of otherauxiliary devices 65. These devices can be connected through a wireless67 or wired 69 connection. Auxiliary device 65 may include, but are notlimited to, personal media players, wireless health devices, portablecomputers, and the like.

Also, or alternatively, the CPU could be connected to a vehicle basedwireless router 73, using for example a WiFi 71 transceiver. This couldallow the CPU to connect to remote networks in range of the local router73.

In addition to having exemplary processes executed by a vehiclecomputing system located in a vehicle, in certain embodiments, theexemplary processes may be executed by a computing system incommunication with a vehicle computing system. Such a system mayinclude, but is not limited to, a wireless device (e.g., and withoutlimitation, a mobile phone) or a remote computing system (e.g., andwithout limitation, a server) connected through the wireless device.Collectively, such systems may be referred to as vehicle associatedcomputing systems (VACS). In certain embodiments particular componentsof the VACS may perform particular portions of a process depending onthe particular implementation of the system. By way of example and notlimitation, if a process has a step of sending or receiving informationwith a paired wireless device, then it is likely that the wirelessdevice is not performing the process, since the wireless device wouldnot “send and receive” information with itself. One of ordinary skill inthe art will understand when it is inappropriate to apply a particularVACS to a given solution. In all solutions, it is contemplated that atleast the vehicle computing system (VCS) located within the vehicleitself is cap able of performing the exemplary processes.

The illustrative embodiments provide a driver with a preference mode onthe radio or other interface that allows selection of a privacy defaultmode (or similarly functioning, otherwise named mode). If the privacydefault mode is enabled, at key-off events the audio system may behavein a pre-configured manner as defined by a driver during a configurationprocess.

For example, without limitation, the process may default to a local newsor weather station, default to a certain music or other radio station,clear defined objectionable stations (e.g., without limitation, adult,political, religious, etc.) or perform other “sterilization” processes.For example, certain selections may only be available within definedgeo-fence zones or outside of geo-fence zones.

Enablement of privacy mode can also be based on, for example, time ofday, detected secondary occupant entry, location of vehicle, etc. Activeprivacy mode can also be indicated by discreet indicia, such as a colorof radio buttons or other indicator, so that the enablement of privacymode is not telegraphed to passengers. The system could also betriggered based on the presence or absence of an identified vehicle keyused to start the vehicle and/or the presence or absence of anothersecondary key detected in the cabin, but not used to for starting, suchas a wireless smart key assigned to a secondary driver other than thesystem administrator of the privacy mode. In another example, thepresence of an unrecognized mobile device in the vehicle could triggerthe privacy mode.

FIG. 2 shows an illustrative example of a privacy mode control process.In this illustrative example, the privacy screen mode is currentlyenabled in a vehicle 201, having been set and triggered prior to aprevious key off. The process then reads an ignition state of thevehicle 219 (in this example, the vehicle was just entered by thedriver). If the key is not yet on 217, the process will wait until akey-on state.

Once the key is on, the process will search for a specific identifiedvehicle key 213, such as a FORD MYKEY. This key identifies the driverand can be associated with a corresponding series of privacy settingsthat were previously configured by the driver. For example, a child maybe provided with a certain key, so when the child is using the vehicle,the process may set the privacy default to “ON” 207. In this instance,once the screen is enabled, the screening process can occur immediatelybefore waiting for a key-off event. In other instances, the presence ofthe key may automatically disable a screen, depending on who the keyrepresents.

If there is not a “child” key in this case, the process will turn theprivacy screen off 203. The screen remains off until a driver requeststhat the privacy screen be turned on 205. Similarly, once the screen isenabled, it may (during that drive-period, at least), remain enableduntil a driver requests that the screen be turned off 209. At thatpoint, the process will turn the screen off 211, which is how the screenwill remain until enabled. Automatic events may also trigger or disablethe screen, as will be discussed with respect to FIG. 4.

FIG. 3 shows an illustrative example of a privacy mode enablementrequest handling process. In this illustrative embodiment, the processreceives a request to enable the privacy screening 301. If the requestis a verbal request 303, the process will set the screening to thedesired state 317 and notify the driver of the setting 319. In thisexample, the process assumes that if the driver is verbally requestingthe screen, the driver is not attempting to be discrete in theenablement of the screen. As such, verbal commands to disable theprivacy mode may be allowed even if an unrecognized phone or secondarykey has been detected in the cabin. Enablement of the screen can also,for example, give the driver an option to immediately change to thescreened state, or to, for example, engage the screened state uponvehicle key-off or other suitable trigger.

If the request is non-verbal, it may have come from an automatic triggeror through a driver button press. First, the process checks to see ifthe screen is already enabled or disabled, based on the type of actionrequested 305. Additionally, in this example, the process checks to seeif any associated conditionals for screening states are met 307.

For example, a driver may have preset a screen to always be enabled whenan unknown device is present in a vehicle, or when the vehicle islocated within predefined coordinates (e.g., at work). If the driver,for example, requests disabling of an active screen, the process maynotice that an unidentified device is present in the vehicle, or thatthe vehicle is within “screen” coordinates. If the conditionals are suchthat a screen would typically be set 309, the process may alert thedriver 313 before disabling the screen. If the driver still wishes toproceed, the screen may then be disabled.

In another example, screening may be automatically disabled whenever arestricted station is requested, via, for example, verbal or manualinput. Once the user tunes or requests to tune to a restricted station,the system may assume that any privacy mode is no longer necessary, andthus will disable the privacy mode until a future conditional forenabling the privacy mode is met.

Similar steps may be taken for enabling a screen, with respect toconditionals under which a screen would typically be disabled. Again, ifthe driver consents, the process may change the screen state 311. Thiscan be useful, because a driver may inadvertently request a statechange, or may attempt to enable a screen, thinking that the screen isdisabled, or vice versa.

FIG. 4 shows an illustrative example of an automatically controlledprivacy feature control process. In this illustrative example, theprocess assumes that the feature can be enabled and disabled in by thecustomer or the manufacturer. For example, the customer may use vehicleHMI to disable the feature if he finds it not valuable, or themanufacturer may configure it on and off at the dealer or plant. Theprocess then begins with the privacy screen feature enabled, prior to adriver exiting a vehicle 401. Once the key is turned off 403, theprocess enables the privacy screen, taking actions such as those shownin example FIG. 5.

The process then sits dormant until a triggering state, such as, forexample, a key on state 405. In this example, screening can beenabled/disabled when a vehicle is within certain zones. For example, toprotect children, screening may be enabled while a vehicle is within a“home” zone. This helps ensure that young children are not exposed toundesirable content, such as raunchy comedy, for example. Other triggerstates can also work in conjunction with a geo-fence, for example,passenger detection. If, for example, a secondary passenger is present,a privacy screen may remain enabled, even if the vehicle leaves thescreen zone, until a driver explicitly disables the screen.

In this example, if the vehicle exits the “screening zone” 407, theprivacy screen is disabled 409, so the driver can enjoy preselectedlistening stations. Or, if the vehicle is within the zone, and thedriver selects a “Screen off,” 411 the screen can be disabled.

While the screen is disabled, the process can check to see if apassenger door opens at any point 413. Typically, this will mean that anoccupant will be entering the vehicle. Also, the process can check tosee if any additional occupants are present 415, which may indicate thepresence of those to be sheltered from typical listening preferences. Ifthe door is opened, or if the occupant sensor detects secondaryoccupants, the screen may be enabled 421, until the driver explicitlydisables the screen.

If there are no additional passengers or interruptions, the process maywait until a vehicle re-enters a “safe” zone 417. Once the safe zone isentered, the screening process is re-enabled, and the screen will beengaged upon key off 419. In this example, if the screen is disabledbecause the vehicle is traveling in a no-screen zone, and the vehiclemoves into a screen zone, the screen will not be activated until acondition to trigger the screen (e.g., door open, key off, etc.) Occurs.

FIG. 5 shows an illustrative example of a privacy screening process. Inthis illustrative example, the process receives instructions to activatea privacy screen state 501. Once the screen is activated, the processwill “scrub” the vehicle entertainment system temporarily, in order toprotect against undesirable content being delivered unintentionally.Media imported into the vehicle can undergo a similar scrubbing process,with meta data indicating song “ratings” and/or song titles beingchecked for improper words. Song names and/or artists can also bechecked against a list of questionable content for additionalprotection, if desired.

In this example, the process checks to see the setting of a currentradio station 503. If the radio station is not set to a “benign” station505, the process can change the station to an acceptable preset station507. Further, the process checks a list of visible preset stations 509.

If the visible preset correspond to “acceptable” presets 511, no changesmay be made. Otherwise, the process will temporarily swap the presets todefined acceptable preset stations 513. Finally, in this example, theprocess provides a visual or other indicia of the privacy screen beingenabled (which can help avoid driver confusion, for example, as to whythe presets have changed, and can also alert the driver that the screenis enabled).

Since the user may set up personalized privacy settings, these settingscan be imported to rental vehicles as well. The settings may be storedto the cloud, and, when appropriate, accessed by a rental vehicleequipped with a telematics unit capable of accessing the cloud. Then, inthat vehicle, they could function in the same manner as they would inthe user's personal vehicle. The settings could function based on, forexample, the presence of a user's phone in the vehicle. (thus preventingthem from being implemented for all future renters).

While exemplary embodiments are described above, it is not intended thatthese embodiments describe all possible forms of the invention. Rather,the words used in the specification are words of description rather thanlimitation, and it is understood that various changes may be madewithout departing from the spirit and scope of the invention.Additionally, the features of various implementing embodiments may becombined to form further embodiments of the invention.

What is claimed is:
 1. A system comprising: a processor configured to:receive a request to enable a privacy screen based on a vehicle crossinga geo-fence into a predefined enablement zone; receive a privacy screenengage trigger, including at least one of: detection of a non-drivervehicle occupant, detection of a non-driver door opening, and a vehiclekey-off event; change a current radio station to a predefined station,upon engage trigger receipt when a privacy screen is enabled.
 2. Thesystem of claim 1, wherein the processor is further configured to changea radio preset to a predefined preset, upon receipt of the engagetrigger when a privacy screen is enabled.
 3. The system of claim 2,wherein the processor is configured to receive a privacy screendisengage trigger and change at least one of a station or a preset to aprevious state, changed when the engage trigger was received.
 4. Thesystem of claim 3, wherein the disengage trigger includes a drivermanual input.
 5. The system of claim 3, wherein the disengage triggerincludes a vehicle crossing a predefined geo-fence into a disengagementzone.
 6. The system of claim 5, wherein the processor is configured todisable the privacy screen when the vehicle crosses into thedisengagement zone.
 7. A computer-implemented method comprising:receiving a request to enable a privacy screen based on a vehiclecrossing a geo-fence into a predefined enablement zone; receiving aprivacy screen engage trigger, including at least one of: detection of anon-driver vehicle occupant, detection of a non-driver door opening, anda vehicle key-off event; changing a current radio station to apredefined station, via a computing system, upon receipt of the engagetrigger when a privacy screen is enabled.
 8. The method of claim 7,wherein method further includes changing a radio preset to a predefinedpreset, upon receipt of the engage trigger when a privacy screen isenabled.
 9. The method of claim 8, wherein the method further includesreceiving a privacy screen disengage trigger and changing at least oneof a station or a preset to a previous state, changed when the engagetrigger was received.
 10. The method of claim 9, wherein the disengagetrigger includes a driver manual input.
 11. The method of claim 9,wherein the disengage trigger includes a vehicle crossing a predefinedgeo-fence into a disengagement zone.
 12. The method of claim 11, whereinthe method further includes disabling the privacy screen when thevehicle crosses into the disengagement zone.
 13. A non-transitorycomputer readable storage medium, storing instructions that, whenexecuted by a processor, cause the processor to perform a methodcomprising: receiving a request to enable a privacy screen, based on avehicle crossing a geo-fence into a predefined enablement zone;receiving a privacy screen engage trigger, including at least one of:detection of a non-driver vehicle occupant, detection of a non-driverdoor opening, and a vehicle key-off event; changing a current radiostation to a predefined station, via a computing system, upon receipt ofthe engage trigger when a privacy screen is enabled.