Security and safety processing by a vehicle based computer

ABSTRACT

A vehicle computing device may receive, from a nearby vehicle, a packet with a safety control instruction having a security access code for a vehicle. A processor may be determine whether the security access code is valid and verify a security level associated with the security access code in order to process the safety control instruction.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 14/092,279, filed Nov. 27, 2013, which is a continuation of U.S. patent application Ser. No. 13/550,530, filed Jul. 16, 2012, which issued as U.S. Pat. No. 8,600,422 on Dec. 3, 2013, which is a continuation of U.S. patent application Ser. No. 12/036,732, filed Feb. 25, 2008, which issued as U.S. Pat. No. 8,224,346 on Jul. 17, 2012, which is a continuation of U.S. application Ser. No. 10/705,065, filed Nov. 10, 2003, which is a continuation-in-part of U.S. patent application Ser. No. 09/659,074, filed Sep. 11, 2000, which issued as U.S. Pat. No. 6,647,270 on Nov. 11, 2003, which claims the benefit of U.S. Application No. 60/153,424 filed Sep. 10, 1999, which are all incorporated by reference herein as if fully set forth.

BACKGROUND

The present application generally relates to communication systems. More particularly, the present application relates to a mobile communication system which allows mobile units, such as those in vehicles, to communicate with other mobile units, such as those in neighboring vehicles and roadside communication networks.

Various communication systems have been used by automobile drivers to communicate with other vehicles while the vehicle is in motion. While many advances have been made in vehicle to vehicle communication, numerous disadvantages still remain in using conventional communications systems.

Conventional mobile communication systems include cellular telephones and CB or two-way radio. When using a cell phone as a means of mobile communication, there is no practical way of discovering whether a neighboring vehicle operator possesses a cell phone. Additionally, there is no process for determining the phone number of the targeted cell phone. Accordingly, the cell phone as a communication medium is severely limited.

CB radio is a widely broadcast public medium where mobile users may talk to other mobile or stationary users in their vicinity. However, since there is no ability to prevent others from listening, there is no privacy between mobile communicators.

Automobile accidents are one of the greatest causes of serious injury and fatalities in society. Accordingly, the development of improved control and warning systems to minimize personal and financial losses resulting from automobile accidents is of utmost importance. The limitations of present forms of communication are even more severe when considering the extent to which a communication link can improve both the driving experience and the safety statistics of modern vehicles.

SUMMARY

The present invention provides a communication link among vehicles which eliminates these pitfalls. The system comprises a broadband RF transceiver with antenna, a position determining means (such as a GPS receiver), an audio-visual interface, an electro-mechanical interface, and a microprocessor with associated memory. These components are incorporated into a mobile unit located within each vehicle.

The GPS receiver receives signals from GPS satellites and calculates the position of the vehicle. The microprocessor carries out overall control of the system. The memory includes identification information that is unique to each vehicle. In response to input from the GPS receiver, information received by the transceiver and instructions input by the vehicle operator via the audio-visual interface, the microprocessor determines the necessary subsequent actions.

The transmission from a vehicle may include information describing the status of the vehicle for use by the receiving vehicle. For example, the transmission may provide information regarding the speed, direction, and position of the transmitting vehicle. This information is received and processed by the receiving vehicle to provide a visual or audible display of the position, direction, and speed of the transmitting vehicle.

According to one aspect of the present invention, there is provided a communication system for transmitting information between a mobile unit within a vehicle traveling on a road and a fixed communication network installed on a roadside. The fixed communication network includes a base station having a transceiver for communicating with the vehicle by transmitting and receiving a plurality of communication packets. This communication can include payment instructions, security instructions, and/or access codes which can be transmitted with or without intervention by the vehicle operator.

A system for matching users in a wireless communication system based on proximity of the users and/or user-defined profiles includes at least two mobile units. The mobile units include a requesting unit and at least one target unit, and each mobile unit is capable of operating as both a requesting unit and a target unit. The system also includes profile means for storing a user profile on each of the mobile units and search means for searching for at least one target user by a requesting user. The user profile can also be stored in the system; it need not be stored in the mobile unit. The search means compares the user profiles of each target user with the user profile of the requesting user. The search means can also indicate a match when a target unit is within a predetermined distance of the requesting unit.

A method for matching users in a wireless communication system based on proximity of the users and user-defined profiles begins by providing each user with a mobile unit, including a requesting unit and at least one target unit. Each mobile unit is capable of operating as both a requesting unit and a target unit, and a user profile is stored in each mobile unit. The user profile can also be stored in the system; it need not be stored in the mobile unit. The user profile of each detected target unit is compared with the user profile of the requesting unit. The users are notified when the user profile of the requesting unit matches the user profile of at least one target unit. Lastly, a communication is initiated between the requesting unit and each of the matching target units. The method can also detect target units when they are within a predetermined distance of the requesting unit.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a vehicle communication system embodying the present invention.

FIG. 2 is a block diagram showing a mobile unit in accordance with the preferred embodiment.

FIG. 3A is a diagram illustrating the contents of a communication packet transmitted by the mobile unit shown in FIG. 2.

FIG. 3B illustrates the header of the communication packet.

FIG. 3C illustrates the information fields of the header's transmission administration.

FIG. 3D illustrates the information fields of the header's sender portion.

FIG. 3E illustrates the information fields of the header's receiver portion.

FIG. 3F illustrates the sub fields contained in the identification number field.

FIG. 4A illustrates the memory of a typical mobile unit shown in FIG. 2.

FIG. 4B is a diagram of a vehicle communication log.

FIG. 4C is a diagram of a vehicle user log.

FIG. 4D is a diagram of a vehicle contact log.

FIG. 5 is a flow diagram of the procedure utilized by the microprocessor upon receipt of a communication packet.

FIG. 6 is a flow diagram of the procedure for processing communication packets.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)

The preferred embodiment will be described with reference to the drawing figures where identical numerals represent similar elements throughout.

A vehicle communication system embodying the present invention is shown in FIG. 1. The vehicle communication system 10 generally includes one or more base stations 14, each of which is in wireless communication with a plurality of remote units 16. Although the remote units 16 may be fixed or mobile, they will be referred to hereinafter for simplicity as mobile units 16. Each mobile unit 16 can communicate with another mobile unit 16, the closest base station 14, or the base station 14 which provides the strongest communication signal. The base stations 14 communicate with a base station controller 20, which coordinates communications among base stations 14 and mobile units 16. The communication system 10 may be connected to a public switched telephone network (PSTN) 22, wherein the base station controller 20 also coordinates communications between the base stations 14 and the PSTN 22. Preferably, each base station 14 communicates with the base station controller 20 over a wireless link, although a land line may also be provided. A land line is particularly applicable when a base station 14 is in close proximity to the base station controller 20. The fixed remote units 16 may also communicate with a base station 14 over a land line.

The base station controller 20 performs several functions. Primarily, the base station controller 20 provides all of the operations, administrative, and maintenance (OA&M) signaling associated with establishing and maintaining all of the wireless communications between the mobile units 16, the base stations 14, and the base station controller 20. The base station controller 20 can provide the routing of all communications between mobile units 16, and between the mobile units 16 and the PSTN 22. The base station controller 20 also provides an interface between the mobile units 16 and the PSTN 22. This interface includes multiplexing and demultiplexing of the communication signals that enter and leave the system 10 via the base station controller 20. Although the vehicle communication system 10 is shown employing antennas to transmit RF signals, one skilled in the art should recognize that communications may be accomplished via microwave or satellite uplinks. Additionally, the functions of the base station controller 20 may be combined with a base station 14 to form a “master base station”.

A preferred embodiment of the mobile unit 16 is shown in FIG. 2. Each mobile unit includes a radio frequency (RF) transceiver 32 with an antenna 33 capable of transmitting and receiving a plurality of RF signals, a global positioning system (GPS) receiver 35, a microprocessor 40 with associated memory 41, an interface to the vehicle's electro-mechanical systems 44, and an audio-visual interface 46.

The RF transceiver 32 transmits and receives RF signals at a plurality of RF frequencies to one or more vehicles which include a mobile unit 16. Received signals are downloaded to baseband and forwarded to the microprocessor 40 for further processing. Transmitted signals are forwarded from the microprocessor 40 to the RF transceiver 32 for upconversion and transmission over one of the plurality of RF frequencies. The vehicle communication system 10 also provides for the option of transmitting a communication over currently licensed radio station channels, for example 105.9 FM. This can permit a mobile unit operator to broadcast to non-mobile unit operators. It also can provide a “scanning channel”, such that non-mobile unit operators can listen to broadcast communications.

The GPS receiver 35 is configured to receive signals from GPS satellites and compute the position of the mobile unit 16. There are many commercially available GPS receivers 35 that can perform such a function. GPS readings which are provided to the microprocessor 40 permit the microprocessor 40 to accurately calculate the speed, direction, and acceleration or deceleration rate of the vehicle.

The microprocessor 40 provides central control of the mobile unit 16. As will be explained in greater detail hereinafter, the microprocessor 40 also performs packet handling, including packet assembling for outgoing communication packets 50 and packet disassembling for incoming communication packets 50 received from the RF transceiver 32. Communication packets 50 received by the microprocessor 40 are stored in memory 41. The memory 41 is also used to store identification information that is unique to each vehicle and/or vehicle operator. For example, license and registration for each vehicle can be read if positioned with a bar code or magnetic strip in a specific location of the vehicle. Optionally, the system may have a card reader where the operator must place their card prior to the vehicle starting. This card can be a license with a magnetic strip or a smartcard that identifies the driver and the vehicle. This unique information regarding the vehicle may also include the position of the vehicle, speed of the vehicle, and rate of acceleration or deceleration as calculated by data obtained from the GPS receiver 35.

The audio-visual interface (AVI) 46 preferably includes a microphone, speakers, and graphic display along with alphanumeric and directional keypads. However, those of skill in the art should realize that the AVI 46 may encompass other input devices which are known, such as a voice activated input unit, an infrared remote control, a full keyboard, or any other type of electronic or manual data input means. Additionally, the output portion of the AVI 46 may include any type of output means such as a stereo system or a heads-up display.

The electro-mechanical interface 44 provides an electrical coupling to the electro-mechanical systems of the vehicle over which the mobile unit 16 has control. These systems may include the radio, lights, horn, windows, locks, steering, breaking, and any other electro-mechanical systems of the vehicle.

Communications between mobile units 16 using the vehicle communication system 10 are accomplished through a stream of transmitted communication packets 50. As shown in FIG. 3A, each communication packet 50 includes a header 51 and a payload 53. The header 51 includes a plurality of predefined information fields which provide information regarding the particular communication, the sender which originated the communication, and the receiver to which the communication is destined. It should be recognized that a voice or data communication may be segmented or “packetized” and transmitted using a plurality of packets 50. The present invention is not restricted to transmitting a communication having a predefined length. Accordingly, the payload 53 may include only a portion of the communication that is sent between mobile units 16, and a single communication may be sent using a plurality of packets 50. Communications may include data transmissions, such as uploads from or downloads to the mobile unit 16, or may include voice communications.

Referring to FIG. 3B, the header 51 includes a plurality of information fields which can be generally categorized by three different functional groups: 1) transmission administrative information 55; 2) sender information 56; and 3) receiver information 57. These fields will be explained in greater detail hereinafter.

Referring to FIG. 3C, the information fields associated with the transmission administration 55 are shown. These fields provide information that defines the particular communication being transmitted. Although the number of fields may vary, the type of fields described may change depending on the particular communication and the requirements of the system 10. In one embodiment of the present invention, the fields associated with transmission administration 55 include the following fields: security 61; priority 62; in system/out of system 63; broadcast/point-to-point 64; communication identifier (data/voice) 65; communication type (information/control) 66; and communication length (standalone or continuous) 67.

Since the vehicle communication system 10 in accordance with the present invention permits control of a vehicle and overall control of the communication system 10 by law enforcement authorities via a “security instruction”, the system 10 has a plurality of security levels to ensure that unauthorized individuals will not use the system 10 for subversive purposes. Optionally, driver may override law enforcement. The system 10 may ask for permission for law enforcement to control vehicle. The security field 61 is defined as follows:

0-Access to all functions of the vehicle communication system 10, including the physical control of the vehicle and all of the information stored within the memory 41.

1-Access only to the physical control of the vehicle.

2-Access only to the information stored within the memory 41.

3-Access for transmitting and receiving communications.

4-Access only to receiving communications.

The security field 61 may also include a security code, which permits authentication of the entity sending the security instruction. As aforementioned, it should be understood by those skilled in the art that additional fields may be added or defined as desired to increase the functionality of the system 10 or the security layers. Additionally, it should be recognized that although the system 10 is capable of a broad range of functionality, there are legal implications to implementing all of the functionality. For example, a court order would most likely be necessary before permitting law enforcement officials access to information in, or control of, the mobile unit 16.

The priority field 62 is an indicator of the urgency of the transmitted communication. The priority field 62 can be a numeric priority from one to ten; with urgent communications having the highest priority of one (e.g., communications from law enforcement officials) and non-urgent communications having the lowest priority of ten (e.g., advertisements).

The in system/out of system field 63 indicates whether the communication is destined for, or originated from, another mobile unit 16 or an entity located outside of the vehicle communication system 10. Communications with entities outside the vehicle communication system 10 can be routed between the mobile unit 16 and the outside entity over the PSTN 22.

The broadcast/point-to-point field 64 identifies whether the message is intended for broadcast to all mobile units 16 or whether it is intended to be routed to a particular mobile unit 16. As will be explained in detail hereinafter, the receiver field 57 will specify the particular address, or multiple addresses, of the mobile units 16 to which the communication will be transmitted.

The communication identifier field 65 identifies whether the communication is a voice or data transmission since each transmission may be encoded and processed differently by the receiving microprocessor 40.

The communication type field 66 identifies whether the communication comprises information for output to the user via the AVI 46, or whether the information is a control instruction that will permit electro-mechanical control of the vehicle.

The communication length field 67 indicates whether the entire communication is included within the current packet 50, or whether the packet 50 is part of a multi-packet communication.

Referring to FIG. 3D, the fields associated with the sender portion 56 of the header 51 include identification number 71, position 72, speed 73, acceleration or deceleration 74, direction 75, origination 76, and destination 77, and may include additional optional fields 78 as specified by the vehicle operator.

The identification number 71 provides a unique identification for the sending mobile unit 16. The identification number may be the vehicle license number with two additional letters representing the state where the license plate was issued, such as PA for Pennsylvania. Depending upon system administration, the identification number 71 may further relate to one or more individual operators of the vehicle. As shown in FIG. 3F, the identification number field 71 may include a plurality of subfields including vehicle code 81, number of authorized vehicle operators 82, and a vehicle operator identification number 83 _(a, b . . . n) for each operator. This feature is particularly useful if the vehicle is part of a commercial fleet of vehicles with multiple drivers. Upon turning on the vehicle, the vehicle operator inputs their identification number 71. This number 71 is compared to the list of authorized operators previously stored in memory 41. If the input operator identification number 71 matches favorably with one of the authorized operators previously stored in memory 41, operation of the vehicle is permitted; if not, operation is denied. Optionally, license plate, registration, insurance information, and driver's license information can be additional fields stored with the identification number 71.

Use of a vehicle operator identification number 71, such as a driver's license, also permits different operators to use the vehicle while retaining their distinct identity and storing information particular to that vehicle operator, similar to a screen name for Internet use such as the America Online (AOL) system.

Referring back to FIG. 3D, the next four fields associated with the sender portion 56 of the header 51 include position 72, speed 73, acceleration or deceleration 74, and direction 75, which are automatically created from the information obtained from the sender's GPS receiver 35.

The origination field 76 includes the location of the vehicle when the vehicle was turned on. The destination field 77 includes the destination of the vehicle. This, of course, requires that the destination be input into the mobile unit 16, such as when a destination is input into a navigation system. It should be understood that the mobile unit operator may override certain fields to ensure that this information is not obtained by other mobile unit operators. For example, the origination 76 and destination fields 77, which may include personal information that the mobile unit operator does not desire other mobile unit operators to have access to, may include null data such that the sender's destination and origination will be listed as “not available” to the receiver. The vehicle operator configures their mobile unit 16 as desired to specify which fields should be transmitted with null data.

Referring to FIG. 3E, the fields associated with the receiver portion 57 of the header 51 are shown in greater detail. As discussed with reference to FIG. 3C, the broadcast or point-to-point field 64 indicates whether the communication is destined for one, multiple, or all operators. If the communication is to be broadcast to all mobile unit operators, the number of addressees field 79 is designated as zero, indicating that all operators will receive the communication. For point-to-point or point-to-multipoint communications, (whereby a plurality of operators may be included within a conversation or communication), the number of addressees field 79 includes the number of operators which will be receiving the communication. For example, if a point-to-point communication is desired, the number of addressees field 79 will include the number one (1) and address field number one 80 _(a) will be the only field which includes an address. If a point-to-multipoint communication is desired between, for example four additional mobile unit operators, the number of addressees field 79 will include the number four (4) and address fields one through four 80_(a-d) will include the addresses of the four receivers to be sent the communication.

Once all of the aforementioned fields have been populated with the information, the microprocessor 40 builds each communication packet 50 and forwards the packet 50 to the transceiver 32 for transmission. The packets 50 are preferably transmitted to the base station 14, and then forwarded to the base station controller 20. The base station controller 20 routes all of the communication packets 50 to the specified addresses, either to one or more mobile unit operators, one or more outside entities, or both. This routing function is the same as an Internet router, whereby the destination address or addresses are read by the router and the communication packet 50 is forwarded to those addresses. If the communication packet 50 is to be forwarded to multiple addresses or broadcast to all addresses, the base station controller 20 provides such a routing function.

The base station controller 20 may also confirm to sender whether or not a signal has been received by the recipient. In an alternative embodiment, each communication may require a confirmation packet be sent from the recipient to the sender to provide the confirmation. Using such an embodiment, the sending mobile unit operator will know whether or not the communication packet 50 has reached its destination.

Although the present invention has been explained with reference to a plurality of base stations 14 and a base station controller 20, the system 10 can also use technology similar to Bluetooth wireless technology. Using technology such as Bluetooth allows mobile units and base stations to communicate through other mobile units and base units (i.e., repeaters). This permits a wireless interconnect between mobile devices, and between mobile devices and their peripherals. The mobile devices can form a secure piconet and communicate among the connected devices. Accordingly, using this technology, mobile units 16 can talk directly to other mobile units 16 without the intervention of the base stations 14 and the base station controller 20.

It is intended that the present invention be used with any type of wireless communication standard including Bluetooth or other wireless or data transmission standard. The particular standard used in transmitting the data is not critical since there are many types of wireless technologies and standards that can be used to transfer information between mobile units 16. It should be recognized that any of the communications could be encrypted by currently known technologies so that only certain authorized mobile units can communicate with each other. For example, if two users were communicating with one another and either requested a private conversation, the system can immediately encrypt their communication.

As should be understood by those of skill in the art, if the address of the receiver is outside of the system 10 and must be routed via the PSTN 22, the base station controller 20 formats the communication packet 50 in a format that may be handled by the PSTN 22. Although the present invention has been explained using a general packet 50 “structure” as illustrated by FIGS. 3A-3F, this structure is intended to serve as an example of the information to be transmitted by the system 10 in each communication. It is not the intention herein to specify a new communication standard, since the present invention may be utilized with any current or future wireless communication standard. For example, the packets 50 transmitted over the vehicle communication system 10 may use the Internet protocol (IP) format, such that they may be transmitted seamlessly to any communication system which uses the IP format. The discussion of the particular format and/or conversion to another format for forwarding over the PSTN 22 is outside the scope of the present invention.

As shown in FIGS. 4A and 4B, the memory 41 is used to store information which populates the aforementioned fields. As will be described in greater detail hereinafter with reference to FIG. 4C, the memory 41 is also used to store other detailed information which may be helpful to the mobile unit operator, other mobile unit operators, the base station controller 20, or law enforcement agencies. The information stored in memory 41 may originate from a received communication, or may be input into the mobile unit via the AVI 46. For example, information that is specific to a particular operator, such as those fields illustrated in FIG. 4C, may be input by the mobile unit operator via the AVI 46.

Referring to FIG. 4A, one of the uses of the memory 41 is to automatically store a current vehicle activity log 90 and previously entered logs. The vehicle activity log 90 includes a plurality of fields including the time 90 _(a), date 90 _(b)), position 90 _(c), speed 90 _(d), acceleration/deceleration 90 _(e), and direction 90 _(f) of the vehicle. This log 90 is updated on a periodic basis as determined by the mobile unit operator or can be automatically updated by the system. For example, private individuals may desire the log 90 to be updated every 15 minutes whereas commercial businesses may require the log 90 to be updated every 15 seconds or even less. It should be realized that the vehicle activity log 90, if updated on the order of fractions of a second, would be useful during accident reconstruction.

Referring to FIG. 4B, a vehicle communication log 92 is shown. The communication log 92 includes the following fields: the time of the communication 92 _(a); the date of the communication 92 _(b); an indication of whether the communication was incoming or outgoing 92 _(c); the address(es) of the communicating entity 92 _(d); the priority of the communication 92 _(e); an indication of whether the communication is broadcast or point-to-point 92 _(f); an indication of whether the communicating entity is within the system or outside the system 92 _(g); the security level of the communicating entity 92 _(h); an indication of whether the communication is data or voice 92 _(i); an indication of whether the communication is information or control 92 _(j); and the actual contents of the communication 92 _(k). The vehicle communication log 92 continually tracks each ongoing communication and stores the contents of the communication in the contents field 92 _(k) and all of the related information in the remaining fields 92 _(a-j).

Referring to FIG. 4C, a mobile unit operator may input via the AVI 46 a plurality of fields related to the specific user and/or vehicle in a user log 105. One example of a user log 105 is shown in FIG. 4C which includes the following fields: registration number 105 _(a); insurance company 105 _(b); insurance policy number 105 _(c); vehicle make 105 _(d); vehicle model 105 _(e); vehicle color 105 _(f); other identifying information 105 _(g); vehicle model year 105 _(h); EZpass number 105 _(i); garage parking account number 105 _(j); garage door access code 105 _(k); driving record 105 _(l); and credit card information 105 _(m). There is no limit to the number of fields which may be stored in the user log 105, and all fields can be defined by the mobile unit operator. Since many of these fields include sensitive information, the mobile unit operator may decide not to send any information from the user log 105 and the microprocessor 40, when constructing the data packets, will place null data in those fields.

The procedure utilized by the microprocessor 40 upon receipt of a communication packet 50 is shown in FIG. 5. The microprocessor 40 first determines whether the incoming packet 50 is addressed to the specific mobile unit 16. Accordingly, at step 502, the microprocessor determines whether the incoming packet is a broadcast, and at step 504, the microprocessor determines whether the specific address matches the mobile unit address. If either of these determinations is affirmative, the new packet is stored (step 506). The microprocessor then determines if there are other communication packets pending for processing (step 508). If no other packets are pending, the new packet is processed (step 510). If applicable, any packets in the queue are reprioritized in accordance with the priority of each packet (step 512) which, in the case where no other packets are pending, would not be necessary. The microprocessor then goes on to reviewing the next packet step (514).

If it has been determined in step 508 that other packets are pending, the priority of all of the pending packets are reviewed (step 516) and a determination is made (step 518) whether the pending packets have a lower priority than the new packet. If the new packet has a higher priority then the pending packets, the microprocessor halts processing of the pending packet currently being processed (step 520), re-stores the pending packet into memory (step 522), and proceeds with processing the new packet (step 510).

If, however, the pending packets do not have a lower priority than the new packet, the microprocessor stores the new packet in a queue with all other pending packets (step 524) and continues to process the pending packet (step 526). In this manner, the microprocessor 40 is able to process higher priority packets first, and delay processing of lower priority packets to a more appropriate time when the microprocessor has the proper resources.

Optionally, even if the microprocessor determines in steps 502 and 504 that the communication is not addressed to the particular mobile unit 16, either as point-to-point communication or as part of a broadcast communication, the microprocessor may still undertake minimal processing of such packets. This is performed in step 530 whereby a contact log is created.

As shown in FIG. 4D, the contact log 110 may include a minimum number of fields such as the time 110 _(a), date 110 _(b), address 110 _(c), color 110 _(d), make 110 _(e), and model 110 _(f) of the vehicle related to the incoming communication packet 50. The number and type of fields is determined by the mobile unit operator. The payload of the packet may not be stored. The contact log 110 is used by the microprocessor 40 to search for “matches” with other mobile unit operators. Upon request by the mobile unit operator, the microprocessor 40 searches the contact log 110 for any addresses (i.e., sending addresses) that have multiple entries in the log 110. Once the microprocessor 40 searches the contact log 110 and outputs the addresses which show up on the contact log 110 greater than a certain frequency threshold as set by the mobile unit operator, the operator can determine whether those addresses should be placed in a “commuter” log; which is a list of mobile unit operators as identified by their addresses.

This information is provided to the mobile unit operator via the AVI 46. This permits the operator to identify, either graphically as located on a real-time map or via a list, other mobile unit operators which may be in the vicinity during a certain portion of the day. For example, during a commute to work if other mobile unit operators are typically within the vicinity of the present mobile unit operator during a certain time of day, a “partner log” may be created by each mobile unit operator to permit mobile unit operators to identify, contact and establish a rapport with other mobile unit operators.

Since the communication packet headers 51 include very detailed information about other mobile units 16, the system 10 can provide extreme flexibility in contacting other mobile unit operators in the vicinity. For example, if a mobile unit operator observes a vehicle that they would like to establish a private conversation with, the operator may command the mobile unit 16 to “talk” to the blue car. If more than one mobile unit 16 is in a blue car in the vicinity, the microprocessor 40 can filter the commuter log to vehicles having the color blue. If more than one blue car was in the vicinity, the microprocessor 40 presents the make and model of each blue car and requests further instructions.

Since all of the detailed information is available in the packet header 51, the system 10 can provide the speed, direction, and location of the other vehicle in relation to the present vehicle. This information is also important in order to evaluate whether another mobile unit 16 will be available for a conversation having a duration of a minimum length. For example, if a mobile unit operator notes that one of the mobile unit operators on his partner log is currently traveling in the vicinity, and the mobile unit operator would like to establish communications with the other mobile unit operator, the system 10 can calculate the duration of a potential conversation based upon the speed and direction of both vehicles and their ultimate destinations, if available. The system 10 can combine that information and advise both mobile unit operators by an audible alarm or a voice message that there is a certain amount of time left in the conversation. The microprocessor 40 can also filter out any mobile units 16 that will not be in the range long enough to establish a reasonable conversation.

Referring back to FIG. 5, at step 540, the microprocessor 40 reviews all incoming communication packets 50 to determine if a particular communication packet 50 originates from an address that is on the operator's partner log. As the communication packets 50 are reviewed at step 540, the mobile unit operator is notified and can decide whether or not they want to establish a communication with the particular mobile unit operator having the address that has compared favorably with the partner log. It should be noted that mobile unit operators can block out transmissions being received from particular individuals or cancel conversations at any time. Further, mobile unit operators can require information such as driver's license, license plate, and registration to be provided before they allow any other transmissions to be received.

Referring to FIG. 6, the procedure for processing communication packets 50 by the microprocessor 40 is shown. The microprocessor first parses the packets into separate fields (step 602) and stores all of the fields that do not require additional processing (step 604). The microprocessor then determines whether a packet includes a data communication by viewing the communication identifier field (step 606). If the microprocessor determines that the packet is not carrying a data communication, then it is a voice communication and the microprocessor processes the communication as such (step 608).

If the packet includes a data communication, the microprocessor must make a determination whether the data communication is a control communication (step 610). If it is not a control communication, the data communication is an information communication and it is processed as such (step 612). Examples of packets which include information communications include audio, video, and text files that are downloaded over the Internet, facsimile transmissions, and transmissions from peripheral devices such as laptop computers, handheld devices, and the like.

If it has been determined that the packet includes a control communication, the communication is processed as such (step 614). The microprocessor compares the control instruction to the security level required (step 616). This includes reviewing the security field, including the optional security access code. If the security access code is proper (i.e., authorized), the security level is reviewed and the microprocessor makes a determination of whether the security level is sufficient (step 618). If so, the microprocessor performs the control instruction (step 620). If not, the microprocessor generates a transmission to the sender of the control instruction that they are not authorized to control the particular mobile unit (step 622). The microprocessor 40 also notifies the particular mobile unit operator that a control attempt was made and was unsuccessful. This will alert the mobile unit operator that someone may be utilizing the system for subversive purposes. Optionally, the system may require the mobile unit operator to authorize their vehicle to accept a control instruction, prior to undertaking any control instructions. Once the processing of the packet is performed, the microprocessor goes to the next packet (step 624).

With respect to the step of performing a control instruction (step 620), this may include instructions for the microprocessor to exert electromechanical control over certain aspects of the vehicle's operation, or may simply include a request for the microprocessor to upload data to the recipient. For example, if the control instruction is a request for the microprocessor to upload information, the microprocessor may upload one or a plurality of the fields shown in FIG. 4C.

In a first example relating to a request for information, if the vehicle is entering a toll booth which utilizes the EZpass system, the control instruction from the transmitting toll booth may request that the EZpass number be transmitted. The microprocessor 40 will transmit the number in the EZpass number field shown in FIG. 4C in response thereto.

In a second example relating to a request for information, a request for information may occur in a parking garage, gas station, or any other establishment which requires payment from the vehicle operator, such as a drive-in fast-food restaurant. In this example, the vehicle operator will drive up to an ordering kiosk and order the desired food. After the food has been ordered, the driver pulls up to the window whereby the proper food order is presented to the driver. Meanwhile, the restaurant's communication system sends a communication requesting the credit card information for billing purposes. The information shown in the credit card information field 105 _(m) of FIG. 4C can then be presented to the communication system of the restaurant for payment. Optionally, the vehicle operator may require that they must first approve of any information being released. Moreover, the communication log for both the fast-food restaurant and the vehicle may store the communication noting the charge amount. For the vehicle it can be a “virtual receipt”.

With respect to an instruction which exerts electromechanical control over the vehicle, as shown in FIG. 2, the electromechanical interface 44 will interface with those systems of the vehicle over which the mobile unit 16 has control. These systems may include the radio, lights, horn, steering, breaking, and any other electromechanical systems of the vehicle. For example, if a mobile unit operator is listening to their favorite radio station and a point-to-point or broadcast communication is received by the mobile unit 16, the microprocessor 40 through the electromechanical interface 44 will stop the radio, or turn down the volume of the radio, so that a conversation can commence.

It should be understood that due to the amount of information set forth in the header 51 of each communication packet 50, the system 10 provides flexibility in processing and filtering communications. For example, the microprocessor 40 can be programmed to accept only communications from certain makes and models of vehicles. As such, the system 10 set up as part of a Mercedes can be programmed by the manufacturer to be able to talk to only other Mercedes operators.

The present invention has the ability to increase safety to drivers and can be a valuable resource for emergency services personnel and law enforcement personnel. For example, emergency vehicles can automatically send signals to warn motorists that an emergency vehicle is approaching. This may supplement the emergency light and siren which are standard on emergency vehicles. Since the packets 50 are prioritized, a communication sent from an emergency vehicle in transit may have the highest priority and can override all other signals having a lower priority. At the scene of an accident, the signal output from an emergency vehicle may, at a slightly lower priority, transmit instructions for avoiding the accident scene and may provide detour instructions.

With respect to motor vehicle code enforcement, law enforcement agencies can automatically review the status of a driver, vehicle registration, and insurance and may provide warnings for expired or soon to be expired license, registrations, or insurance policies.

If an authorized operator has gained access to the vehicle and has not input the proper operator identification number, the microprocessor 40 can transmit an emergency instruction to alert law enforcement agencies that the vehicle has been stolen. The signal sent from the vehicle can automatically include the vehicle's position, speed, acceleration or deceleration rate, and direction. Law enforcement officials may send an instruction in response to limit the vehicle speed to no greater than 30 miles per hour until the unauthorized operator of the vehicle is apprehended. It should be noted that various fixed units may be strategically placed along highways, major intersections, toll booths, and bridges to monitor traffic and to relay messages back to law enforcement agencies.

Another law enforcement use can be to limit speeding of vehicles by notifying law enforcement agencies when a vehicle has exceeded a certain speed limit, e.g., 20% over the speed limit. A law enforcement official, in response, may send an instruction for the vehicle to slow down or risk a traffic citation. This can eliminate the need for “speed traps” and high speed police chases.

For public safety applications, specifically located fixed units can warn drivers as the vehicle approaches a traffic light at an intersection that the vehicle must slow down or stop because it will not “make” the green light. The traffic light can make this determination based upon the speed and direction of the mobile unit and the cycle of the traffic light. Other selectively placed fixed units can warn drivers that an intersection or roadway is dangerous for various reasons, such as an accident, a sharp bend, or heavy traffic. The signals output by these locations can be periodically updated as weather and traffic conditions change. In the same manner, vehicles may be warned that a particular vehicle is driving in an erratic manner or that law enforcement officials are currently involved in a pursuit of the vehicle. The warnings to drivers are output through the AVI 46 and may include an audible warning, or may include a status light such as red, yellow, and green being located on the graphical operator interface of the AVI 46. In extreme circumstances, selectively placed fixed units may automatically overtake control of a vehicle, for example, during extremely icy conditions to slow the vehicle prior to the danger zone.

It should be noted that although the mobile units 16 were described hereinbefore as being located in a vehicle or in a fixed location, they can be incorporated as part of a cellular phone or other portable communication device.

When the mobile unit 16 is incorporated into a portable communication device to be used outside a vehicle, the electro-mechanical interface 44 can be eliminated.

Non-vehicle related information can be entered into the user log 105. This information can include personal information such as the user's name, age, sex, occupation, hobbies, interests, and picture and is used to create a user profile. The user profile can be expanded to include any additional personal information desired by the user; the foregoing list is meant to be exemplary and not limiting.

The user profile is utilized to search for other users having a predefined set of characteristics, similar to a matchmaking process. In one embodiment of the present invention, the search can be initiated based upon the physical proximity of one user to another (a requesting user and one or more target users). It is noted that a single mobile unit can be both a requesting unit and a target unit at the same time. When two or more mobile units are within a predetermined distance (which is set by the requesting user), the requesting user's mobile unit polls the other mobile units in the area to determine if there is a match. The match based upon distance can also be set to locate target units that are beyond a predetermined distance.

If a match exists, both the requesting user and the target user are notified via their respective mobile units and can then begin a conversation. It is noted that a “conversation” is not limited to a voice communication, and can include text messages and the like. The amount of information initially exchanged between the mobile units can be set by each user. For example, only limited information can be sent during the initial exchange, and the users can then disclose additional information as the conversation between the users progresses. The users can designate groups of information items to facilitate disclosure during a conversation. For example, an initial exchange could include a first group of information, such as the user's name, age, and sex. Subsequent exchanges could include additional groups of information, such as contact information (telephone number, e-mail address, and home address).

Additional criteria for a match to occur can also be set. For example, a requesting user can require that a target user disclose a minimum amount of information to be considered for a match. If that minimum amount of information is not disclosed, then no match will occur even if it otherwise would. The same criteria can be used in reverse; a target user can select to not match with a requesting user if the requesting user does not disclose a minimum amount of information.

In addition to the more “permanent” type of information entered into a user's profile, temporary items can also be entered, such as “having a bad day, looking for sympathy”, “let's dance the night away”, etc.

Another example of a use of the system of the present invention is in connection with yard sales. A user having a yard sale can provide categories of items for sale. The categories can be selected from predefined categories stored on the mobile unit or can be created by the user. A potential purchaser can designate certain categories in their user profile, and when within a certain distance of a yard sale containing a designated category of items, the purchaser can receive information regarding the yard sale and be directed to the yard sale. Optionally, if the mobile unit is interfaced to a navigation system, the mobile unit can display the location of the yard sale and the user can be provided with directions to the yard sale.

The present invention is particularly adaptable for interfacing with the Internet and providing a wealth of information for all mobile unit operators. In one Internet-related embodiment such as vehicletalk.com, the Web site permits storage of information and system administration through the Internet. A system administrator operating at the Web site or the base station controller 20 monitors and tracks all mobile units 16. Through the system administrator, the fixed locations are provided with weather and traffic updates or advertisements which are specifically geared to the immediate vicinity of the fixed unit. In this manner, advertisers advertise both on the vehicletalk.com Web site and advertise their companies and products as vehicles approach or pass certain properties, stores, or business locations. This also permits stores, to provide information to vehicles arriving or leaving the place of business, such as directions for parking or thanking them for their patronage.

The system administrator also provides centralized housekeeping functions in order to track all different types of information that are typically a nuisance to vehicle operators, such as the date their registration and insurance policy expire. The system administrator also tracks general vehicle maintenance information and traffic violation records. The tracking of vehicle maintenance can be particularly useful when a recall notification is issued from a manufacturer or even when regularly scheduled maintenance is required.

In a second Internet-related embodiment, the system 10 is used to aid law enforcement officials and insurance companies to determine when a traffic accident has occurred and to collect all of the detailed information regarding the traffic accident. This function is centralized in a Web site such as vehicleaccident.com. When an accident occurs, a signal is automatically sent to all vehicles involved (or in the vicinity) to transmit all pertinent information to vehicleaccident.com. This can include time, speed, direction, acceleration and deceleration, duration of trip, and other pertinent information such as the vehicle maintenance records, traffic citation records, insurance, and registration information. The system 10 permits all of this information to be stored in a centralized location at vehicleaccident.com for later review by law enforcement officials. The system 10 also stores law enforcement official reports regarding the accident.

The insurance industry should benefit by having mobile unit operators agree in advance to accept a fact finding by an officer utilizing all of the information from the mobile units 16. This avoids costly litigation and subrogation. A mobile unit operator accepting these terms may be permitted special insurance discounts for agreeing to such.

In another embodiment, the system can provide mobile units that do not include a GPS unit. It can be similar to portable phone(s) operating on the same frequency(s). If a user tunes their radio to a particular station, they can receive a transmission through their car stereo system. The mobile unit, in this instance, can have the microphone inside of it so a user can speak “hands free”. This embodiment allows the mobile unit to beep (or voice activate) if another user comes within range, advising both mobile units that they have someone they can talk to. The mobile unit detects another mobile unit by actually receiving the signal of the other mobile unit. Accordingly, positioning of either mobile unit is not required.

Numerous other variations and modifications can be made to the present invention. For example, the profile searching capability may be turned on and off via a voice command, a graphical user interface, or other means. The profile search can also be automatically set up to be turned on or off on specific days or at a specific time of day. The user profile can be stored in the mobile unit, at an Internet site (either a server or a client site), at a base station, at a base station controller, or at an entity located through the PSTN.

The system may display all potential matches for the requesting user to review, and let the requesting user select the target user to contact. An additional option is to display the target user's physical location on the mobile unit, determined relative to the requesting user's location, or vice versa. The format for entering the profile information can be predefined, to ensure consistency in the formatting of the information entered, which can lead to a higher matching percentage. The user profile can include a specific time frame in which the user is available for contact, and some of the profile information can be available based upon certain times; for example, a contact number can change depending on whether the user is at home or at work. If a match is attempted to be made outside the time frame, some of the information can be blocked from disclosure.

The system can also validate or otherwise verify the information in a user's profile, to provide a layer of security to potential contacts. The system may charge a fee for the verification, and certain information can be locked to prevent changes once verified.

The system can provide multi-party conversations, either with or without a moderator.

Although the invention has been described in part by making detailed reference to preferred embodiments, such detail is intended to be instructive rather than restrictive. It will be appreciated by those skilled in the art that many variations may be made in the structure and mode of operation without departing from the scope of the invention as disclosed in the teachings herein. 

What is claimed is:
 1. A vehicle computing system, located in a vehicle, comprising: a transceiver; an electronic positioning device; a processor operatively coupled to the transceiver and the electronic positioning device; the processor is configured to determine location of the vehicle with information from the electronic positioning device and to send the location to a remote vehicle management center; the processor is configured to receive, from the remote vehicle management center via the transceiver over a cellular data network based on the location and a detected accident of the vehicle, an internet protocol (IP) packet with a safety control instruction having a security access code for the vehicle; the processor configured to process the safety control instruction based on a comparison of a priority of the packet to other packets, wherein the safety control instruction triggers an alarm or alert in the vehicle; wherein the processor is further configured to determine whether the security access code is valid and to verify a security level associated with the security access code in order to process the safety control instruction; and the processor configured to setup voice communications between the vehicle computing system and the remote vehicle management center based on the security level.
 2. The vehicle computing system of claim 1 further comprising: the transceiver is configured to receive authorization from a mobile unit to authorize the processing of the safety control instruction.
 3. The vehicle computing system of claim 1 further comprising: the processor is configured to transmit, when the security access code is invalid via the transceiver, an alert to a mobile unit or a law enforcement system.
 4. The vehicle computing system of claim 3, wherein an invalid security access code indicates that the vehicle was stolen.
 5. A method performed by a vehicle computing system located in a vehicle, the method comprising: determining, by a processor, location of the vehicle with information from an electronic positioning device; sending, by the vehicle computing system, the location to a remote vehicle management center; receiving, from the remote vehicle management center by the processor via a transceiver over a cellular data network based on the location and a detected accident of the vehicle, an internet protocol (IP) packet with a safety control instruction having a security access code for the vehicle; determining, by the processor, whether the security access code is valid; processing the safety control instruction based on a comparison of a priority of the packet to other packets, wherein the safety control instruction triggers an alarm or alert in the vehicle; verifying, by the processor, a security level associated with the security access code in order to process the safety control instruction; and setting up, by the vehicle computing system, voice communications between the vehicle computing system and the remote vehicle management center based on the security level.
 6. The method of claim 5 further comprising: receiving, by the transceiver, authorization from a mobile unit to authorize the processing of the safety control instruction.
 7. The method of claim 5 further comprising: transmitting, when the security access code is invalid by the processor via the transceiver, an alert to a mobile unit or a law enforcement system.
 8. The method of claim 7, wherein an invalid security access code indicates that the vehicle was stolen. 