Key module

ABSTRACT

Measures for use in operating a key module ( 100 ) associated with a vehicle. A proximity of the vehicle key module to a mobile telephony device ( 102 ) associated with an authorized user of the vehicle is monitored at the vehicle key module ( 100 ). In response to the monitoring indicating that a distance between the vehicle key module and the mobile telephony device ( 102 ) has exceeded a predetermined threshold distance, the vehicle key module transmits a lack of proximity alert message to the mobile telephony device. An operational status change code associated with one or more of the vehicle and the vehicle key module ( 100 ) is received by the vehicle key module ( 100 ) from the mobile telephony device ( 102 ). On the basis of the received operational status change code, an operational status change in relation to one or more of the vehicle and the vehicle key module is initiated.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of International Application No.PCT/GB2015/052496, filed Aug. 28, 2015, which claims priority to GreatBritain Application No. GB 1415482.7, filed Sep. 2, 2014. Theabove-referenced patent applications are incorporated by reference intheir entirety.

BACKGROUND OF THE INVENTION

Field of the Invention

The present invention relates to a key module. In particular, but notexclusively, the present invention relates to a key module associatedwith a vehicle.

Description of the Related Technology

The loss of any security access device, be it a house key, car key, fobor even a mobile device with access codes embedded on it is perhaps oneof the most common and stressful everyday occurrences.

When somebody loses their keys, they lose all access to their personalsanctuaries at the same time. In an instant, an individual can be barredfrom their home, office, car, or worse, lose the keys that belong to theproperties of others: this creates problems which can be enormouslystressful and emotionally and financially punishing.

Crime statistics from 2014 show that houses are being targeted byburglars who steal high value car keys from inside the house and thenreturn at a later date and steal the owner's vehicle.

Research conducted in 2013 found that 26% of UK car drivers had losttheir keys at some point. Rolled out nationally (in the UK), thesefigures indicate that next year more than 7 million driver may lose ormislay their keys.

At present, there are no satisfactory ways of overcoming this problem;either purchase replacement keys and or change the locks. If the keysfall into the wrong hands, thieves can simply unlock the vehicle anddrive away. Many modern vehicle keys have a remote opening functionwhich gives a would-be thief the enormous advantage of having thevehicle identify itself. Given so many people lose their keys every day,it would be useful to have another level of security to protect what is,for many people, one of the most expensive items they own.

SUMMARY

According to a first aspect of the present invention, there is provideda method of operating a key module associated with a vehicle, the methodcomprising, at the vehicle key module: monitoring the proximity of thevehicle key module to a mobile telephony device associated with anauthorized user of the vehicle; in response to the monitoring indicatingthat the distance between the vehicle key module and the mobiletelephony device has exceeded a predetermined threshold distance,transmitting a lack of proximity alert message to the mobile telephonydevice; receiving, from the mobile telephony device, an operationalstatus change code associated with one or more of the vehicle and thevehicle key module; and on the basis of the received operational statuschange code, initiating an operational status change in relation to oneor more of the vehicle and the vehicle key module.

According to a second aspect of the present invention, there is provideda vehicle key module associated with a vehicle, the vehicle key modulebeing configured to: monitor the proximity of the vehicle key module toa mobile telephony device associated with an authorized user of thevehicle; in response to the monitoring indicating that the distancebetween the vehicle key module and the mobile telephony device hasexceeded a predetermined threshold distance, transmit a lack ofproximity alert message to the mobile telephony device; receive, fromthe mobile telephony device, an operational status change codeassociated with one or more of the vehicle and the vehicle key module;and on the basis of the received operational status change code,initiate an operational status change in relation to one or more of thevehicle and the vehicle key module.

According to a third aspect of the present invention, there is provideda computer program comprising a set of computer-readable instructionswhich, when executed by a computerized device, cause the computerizeddevice to perform a method of operating a key module associated with avehicle, the method comprising, at the vehicle key module: monitoringthe proximity of the vehicle key module to a mobile telephony deviceassociated with an authorized user of the vehicle; in response to themonitoring indicating that the distance between the vehicle key moduleand the mobile telephony device has exceeded a predetermined thresholddistance, transmitting a lack of proximity alert message to the mobiletelephony device; receiving, from the mobile telephony device, anoperational status change code associated with one or more of thevehicle and the vehicle key module; and on the basis of the receivedoperational status change code, initiating an operational status changein relation to one or more of the vehicle and the vehicle key module.

According to a fourth aspect of the present invention, there is provideda mobile telephony device configured to perform a method according tothe first aspect of the present invention.

According to a fifth aspect of the present invention, there is provideda computer program comprising a set of computer-readable instructionswhich, when executed by a mobile telephony device, cause the mobiletelephony device to perform a method according to the first aspect ofthe present invention.

According to a sixth aspect of the present invention, there is provideda system comprising a key module and a mobile telephone deviceconfigured to perform a method according to the first aspect of thepresent invention.

According to a seventh aspect of the present invention, there isprovided apparatus substantially in accordance with any of the examplesas described herein with reference to and illustrated by theaccompanying drawings.

According to an eighth aspect of the present invention, there isprovided methods substantially in accordance with any of the examples asdescribed herein with reference to and illustrated by the accompanyingdrawings. Further features and advantages of the invention will becomeapparent from the following description of preferred embodiments of theinvention, given by way of example only, which is made with reference tothe accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a system diagram according to embodiments;

FIG. 2 shows a system diagram according to embodiments;

FIG. 3 shows a flow diagram according to embodiments; and

FIG. 4 shows a flow diagram according to embodiments.

DETAILED DESCRIPTION OF CERTAIN INVENTIVE EMBODIMENTS

FIG. 1 shows a system diagram according to embodiments. FIG. 1 comprisesa key module 100, a mobile telephony device 102 and a vehicle softwaresystem 104 of a vehicle.

In embodiments, key module 100 comprises a telephony component andBluetooth proximity tag paired with the vehicle owner's (or otherwiseauthorized user of the vehicle) phone/mobile device 102.

In embodiments, if key module 100 goes out of range (or a predeterminedthreshold distance) of the owner's mobile telephony device 102 for agiven amount of time, an alert will be generated and sent to the mobiletelephony device 102 notifying the owner. This function may for examplebe implemented with use of the Bluetooth Link Loss Service enabled onkey module 100 and mobile telephony device 102.

In embodiments, key module 100 is paired with the vehicle at factory fittime or if applicable after-market using a standalone component.

In embodiments, the telephony component of key module 100 comprisestelephony and Simple Message Service (SMS) functionality allowing theowner to attempt to contact the key module and thus anyone who picks upthe call. A command interpreter processor is also part of the system,for example using programmable application processor architecture. Inembodiments, the interpreter receives coded command(s) via SMS andtriggers the location based services to begin tracking and returninggeographical location data (for example latitude and longitude data) asone or more messages (for example over SMS) to the owner's mobiletelephony device 102. With regard to vehicle software system 104, herefor context and reference purposes, modern vehicles have a number ofcontrol units and software subsystems. However, such functionality isnot yet presented as a standard application programming interface (API)accessible by third parties (not to be confused with dashboardinformation UI which may be used as UI/UX (Stands for User Experience)to smartphone apps using components such as Apple's CarPlay). Inembodiments, beyond id pairing, no direct communication between thevehicle control units and key module 100 is carried out.

With regard to mobile telephony device 102, in embodiments thiscomprises a device such as a smartphone that supports Bluetooth (e.g.Bluetooth 4.0) and can host third party application software (or‘apps’). Such application software is configured to communicate with keymodule 100 including for example sending commands and map and tracefunctionality.

FIG. 2 shows a system diagram according to embodiments. FIG. 2 comprisesa key module 100, a mobile telephony device 102, a vehicle softwaresystem 104 and a web module (or ‘cloud/software as a service’) 106.

In embodiments, key module 100 executes on the application processorusing a standard communication stack thus keeping all processing localto a single hardware component. A number of standards, practices andprogramming requirements (C++/ARM) are referred to; however, the exactimplementation of embodiments should not be limited to those describedin detail and embodiments may be implemented on a number of differentoperating systems and architectures.

Key module 100 comprises software running on a consumer hardware module,the system requirements are for a programmable CPU (applicationprocessor) with installed security and network components. Theapplication processor may be programmable in C/C++/Java and based on aperformance ARM architecture, for example a Google Android port. Theapplicable performance criteria are measured by responsiveness ofhardware module interface (e.g. depressing keys) and connectivitymonitoring (e.g. detect signal drop).

The communications stack of key module 100 allows the owner to make aphone call to key module 100 and thus allows the owner to talk to anyonewho may have found the key module. In embodiments, further functionalityrequires commands to be sent to key module 100, proximity lossdetection, and location/position services for example involving standardsecurity level and secure communications.

In embodiments, the telephony component of key module 100 comprises astandard subscriber identity module (SIM) hardware stack supportingvoice calls and SMS messaging. In embodiments, the telephony componentcomprises a data component which may for example support InternetProtocol (IP) traffic. In embodiments, the SMS content is encrypted andunique (i.e. one time use) such that the application process will needto access the SMS message store (and event trigger) to decrypt andexecute command(s) contained therein. The Open Systems Interconnection(OSI) is included here as an indicator; in embodiments, communicationcomponents may follow the standard model and may be boughtoff-the-shelf. The implementation of the stack deals with networkcommunications and supports Transport Layer Security (TLS). Inembodiments, the SMS messaging stack is a different subsystem.

In embodiments, Bluetooth is used to maintain an active connection forproximity checking, a number of profiles and characteristics (forexample Link Loss Service) and alert level control. In embodiments, keymodule 100 comprises a Wi-Fi 802.11 component which is employed as partof the location based services using a service such as Skyhook to aidpositioning in particular when GPS is insufficient due to broken line ofsight (LOS). Wi-Fi may also be used as a communication conduit both foraccess to any further online services, a peer-to-peer channel with thevehicle or owner's computer/mobile device and potential Voice over IP(VoIP) functionality.

In embodiments, a USB connection is employed as a standard chargingmechanism and high speed bulk data transfer for system updating.

In embodiments, security is a priority to the system which may interfacedirectly with the vehicle management and control unit(s) (supportingadvanced immobilization functions). In embodiments, a Public KeyInfrastructure may be employed. In embodiments, a Secure Link Protocol,specific to key module 100, contains a number of fail-safes and checksto reduce attacks on systems. In embodiments, key module 100 comprises aKeyChain component with a key and certificate management system. Inembodiments, key module 100 comprises an encrypted store for storingsystem, vehicle and owner data and may for example be encrypted usingPublic Key Infrastructure (PKI). The store may be wiped remotely as perproduct requirements specification, say for example by deleting theprivate key thus no longer allowing decryption of the content.

In embodiments, the Pairing IDs are implemented by one of a number ofmethods including using universally unique identifiers (UUIDS) orcertificates/keys, the primary function of which is to only allowcommunications between paired devices (e.g. key module 100 and thevehicle). In embodiments, these IDs are fixed at factory fit where thevehicle is built and the key module is bound to the vehicle.

To enable secure network communications, TLS may be employed.

In embodiments, key module 100 comprises a command framework which isthe hub of the specific application code written for the system. Inembodiments, the command framework comprises an architecture whichcontains an event-driven messaging notification service that receivesand dispatches commands to the system. In embodiments, a commandinterpreter parses and expands incoming commands passing them to theprocessing engine for execution. In embodiments, key module comprises astate machine for managing command transitions, queuing and ordering ofcommands.

In embodiments, key module 100 comprises a device hardware interfacelayer. In embodiments, this is included in the reference architecture toindicate a decoupling between the core software components. Aside frombeing good practice, it can be a requirement that differentmanufacturers will have different industrial designs and interfaceoperations (buttons/touch screens). The communications interface mayalso Change based on required features and component availability. Thehardware user interface (UI) may for example comprise a number ofbuttons including for example ‘call owner’; however, these could be anumber of different combinations and including touch-screens. An updatemanager may comprise a secure subsystem allowing a partial or completesystem update.

With regard to vehicle software system 104, there is currently nostandard vehicle Application Programming Interface (API) for controllingany of the vehicle's subsystems including the engine control unit,transmission control units, immobilizer and the associated array ofsensors and control etc., so communication with these systems requirespecific software installed (for example at factory fit time) accordingto embodiments. In embodiments, a pairing key is implemented. Inembodiments, vehicle software system 104 comprises a key transponder,immobilizer and charging system. In embodiments, an encryptedidentification code unique to that key and vehicle is transmitted toallow the engine to start.

In embodiments, vehicle software system 104 comprises a dashboard headunit API. There are now a number of emerging technologies andproprietary standards being adopted in this domain, for example Apple'sCarPlay, MirrorLink and Google's Open Automotive Alliance. The primaryuse for these systems is to use the vehicle display and interfacefunctionality to access smartphone apps such as navigation and audio. Inembodiments, the vehicle's display and control switches/knobs could beemployed to directly control application software running on key module100 and/or mobile telephony device 102 and may for example have amodified and safety conformant UX.

With regard to mobile device and/or computer 102, the owner communicateswith key module 102 using application software (or ‘app’), and ifrequired handling the voice call thus hiding the key module phonenumber, or allowing communication via a third party call handlingsystem.

In embodiments, the app is native, secure and incorporates tracking,tracing, and configuration management, access to a central services viaweb services or suitable API In embodiments, the app will provide theowner with an interface to support making calls, messaging and findingkeys along with any additional commands defined in the productrequirements specification. In embodiments, the command frameworkreceives requests from the UX component (User experience) and translatesthese to command communications to key module 100 using the Secure LinkProtocol (for example #over TLS).

In embodiments, the architecture exploits modern design patternpractices including Model View Controller, Chain of Command andDelegates to maintain an updatable application and secure code. Inembodiments, the command communications include version stamping,pairing id and auditing information which may be recorded by for examplean insurance company. In embodiments, a suitably decoupled and securearchitecture will provide flexibility of (product) requirements to allowcommunication directly with key module 100 or via a central agency.Embodiments comprise a built-in and hardware based security frameworkfor managing certificates, keys and polices. In embodiments,communications with key module 100 and any web services follow standardAuthentication, Authorization and Accounting protocols.

In embodiments, the phone app may communicate with the vehiclesubsystems and control units there maybe requirements, for example toallow communication of state information to/from the dashboardinstrument cluster.

Typically the owner would use their mobile phone or tablet tocommunicate with key module 100; however, embodiments comprise a desktopversion of the app, for example for use in case the mobile device is notavailable for some reason.

With regard to web module 106, this allows one or more features andtechnical functions to be implemented via a web module (or ‘centralserver’). Embodiments comprise an API encapsulation of one or morefeatures along with security and management functionality. For example,an owner/user is able to contact their key module 100 from any networkeddevice using a website or web-app which is served by this architecture.In embodiments, a unique set of login credentials may be issued in orderto allow identification of the owner as legitimate. In embodiments,third party agencies such as insurance companies or the emergencyservices would be able to access the owner's key module 100 say in acall center scenario where a user calls in having had their keys stolenand the insurance policy require the agency to find and track thevehicle. Embodiments enable more proactive control via the policetracking and shutting down the vehicle remotely. In embodiments,operational requirements for updating software and maintaining commandsymmetry between all parties can be best served by a centrally managedweb module system.

In embodiments, the service software is implemented in a nativeprogramming language such as Java, C# and would be subject to securitypenetration testing.

In embodiments, key module 100 comprises a vehicle ignition moduleconfigured with one or more the following integratedfunctions/capabilities:

-   -   1. Vehicle Stop/Start, Open/Lock.    -   2. Mobile telecommunications network interface, for example        incorporating Universal Mobile Telecommunications Services,        phone, Bluetooth, SMS Text, and GPS Data capabilities.    -   3. Ability to “pair with” other mobile devices so the key module        can be controlled by those devices. 4. Ability to “pair with”        other mobile devices so that the key module has (possibly        limited) control and access to the functions of that device.    -   4. Ability to act as an interface between the vehicle and the        owner via the owner's mobile device.    -   5. Ability to send, receive and issue data instructions between        itself and mobile telephony device 102 and to pass data on to        the vehicle when located into the vehicles electronics systems        or within the vehicle electronics sphere of influence.    -   6. Ability to enable paired mobile phone functions to be        displayed and accessed via the vehicle's on-board electronic        systems.    -   7. Ability to make and receive voice calls, SMS texts, GSM, GPS        and Bluetooth and Data from all platforms as a stand-alone        device.

Embodiments comprise measures, including one or more of a method, a keymodule, apparatus, a computer program, a mobile telephony device and asystem for use in operating a key module associated with a vehicle. Atthe vehicle key module, the proximity of the vehicle key module to amobile telephony device associated with an authorized user of thevehicle is monitored. In response to the monitoring indicating that thedistance between the vehicle key module and the mobile telephony devicehas exceeded a predetermined threshold distance, a lack of proximityalert message is transmitted to the mobile telephony device. Anoperational status change code associated with one or more of thevehicle and the vehicle key module is received from the mobile telephonydevice. On the basis of the received operational status change code, anoperational status change in relation to one or more of the vehicle andthe vehicle key module is initiated.

The predetermined threshold distance may be set according to a comfortzone for the owner, for example 30 m. In embodiments, the predeterminedthreshold distance is user configurable via one or more of the keymodule and the mobile telephony device.

In embodiments, the initiating comprises disabling an ignition functionof the vehicle key module whereby the vehicle key module cannot be usedto start the ignition of the vehicle. In embodiments, the initiatingcomprises disabling a vehicle entry function of the vehicle key modulewhereby the vehicle key module cannot be used to unlock one or moredoors of the vehicle.

In embodiments, the initiating comprises activating a geographicallocation function on the vehicle key module to report a geographicallocation of the vehicle key module to the mobile telephony device.

In embodiments, the initiating comprises activating an audible signalgeneration function on the vehicle key module.

In embodiments, the initiating comprises activating a visible signalgeneration function on the vehicle key module.

Embodiments comprise receiving user input responsive to the activatedvisible signal generation function, and initiating a telephone call fromthe vehicle key module to the mobile telephony device.

In embodiments, the initiating comprises activating a geographicallocation function on the vehicle key module to report a geographicallocation of the vehicle key module to the mobile telephony device.

In embodiments, the initiating comprises activating a vehicle vicinityfunction on the vehicle key module to monitor whether the vehicle keymodule is within a given predetermined threshold distance from thevehicle. In some such embodiments, in response to the activated vehiclevicinity function indicating that the vehicle key module is within thegiven predetermined threshold distance from the vehicle, transmitting avehicle vicinity alert message to the mobile telephony device.

In embodiments, the initiating comprises activating a microphone of thevehicle key module and transmitting audio signals detected by theactivated microphone to the mobile telephony device.

In embodiments, the initiating comprises transmitting, to acommunication interface of the vehicle, a command to change anoperational status of the vehicle.

In embodiments, the operational status change command commands disablingof an ignition system of the vehicle.

In embodiments, the operational status change command commands disablingof an ignition system of the vehicle when the vehicle is nextstationary.

In embodiments, the operational status change command commands lockingof one or more doors of the vehicle. Embodiments comprise a vehicle keymodule associated with a vehicle, the vehicle key module beingconfigured to monitor the proximity of the vehicle key module to amobile telephony device associated with an authorized user of thevehicle, in response to the monitoring indicating that the distancebetween the vehicle key module and the mobile telephony device hasexceeded a predetermined threshold distance, transmit a lack ofproximity alert message to the mobile telephony device, receive, fromthe mobile telephony device, an operational status change codeassociated with one or more of the vehicle and the vehicle key module,and on the basis of the received operational status change code,initiate an operational status change in relation to one or more of thevehicle and the vehicle key module.

Embodiments comprise a computer program comprising a set ofcomputer-readable instructions which, when executed by a computerizeddevice, cause the computerized device to perform a method of operating akey module associated with a vehicle, the method comprising, at thevehicle key module, monitoring the proximity of the vehicle key moduleto a mobile telephony device associated with an authorized user of thevehicle, in response to the monitoring indicating that the distancebetween the vehicle key module and the mobile telephony device hasexceeded a predetermined threshold distance, transmitting a lack ofproximity alert message to the mobile telephony device, receiving, fromthe mobile telephony device, an operational status change codeassociated with one or more of the vehicle and the vehicle key module,and on the basis of the received operational status change code,initiating an operational status change in relation to one or more ofthe vehicle and the vehicle key module.

Embodiments comprise a mobile telephony device configured to performembodiments described herein.

Embodiments comprise a computer program comprising a set ofcomputer-readable instructions which, when executed by a mobiletelephony device, cause the mobile telephony device to performembodiments described herein.

Embodiments comprise a system comprising a key module and a mobiletelephone device configured to perform embodiments described herein.

Embodiments comprise apparatus substantially in accordance with any ofthe examples as described herein with reference to and illustrated bythe accompanying drawings. Embodiments comprise methods substantially inaccordance with any of the examples as described herein with referenceto and illustrated by the accompanying drawings.

Embodiments involve a key module 100 associated with a vehicle. Inembodiments, key module 100 comprises a smart ignition key created as apart of the vehicle which enables indirect communication between thevehicle and a mobile telephony device 102 associated/owned by thevehicle owner (or other authorized user of the vehicle). In embodiments,key module 100 acts as an electronic data-bridge that allows mobile datatraffic between the vehicle and the owner's mobile phone device.

In embodiments, key module 100 does not directly affect the vehicle'ssecurity system, although it can be remotely caused to changes stateswhich in turn causes the vehicle's on-board electronics to changebehavior.

In embodiments, key module 100 has smart phone functionalityincorporated into its design at the point of manufacture, for exampleincluding Universal Mobile Telecommunications Service (UMTS) and/or anyother appropriate telephony/telecommunications functionality.

In embodiments, key module 100 keeps, records and retains data relatingto its parent vehicle's mileage, service history etc. In embodiments, inthe event of unusual circumstances such as an accident, key module 100will log all information as to time, place, conditions etc. Inembodiments, in the event of air bag deployment, key module 100 willcall the emergency services with all the relevant information. Closelyallied to this function, in embodiments key module 100 comprises abuilt-in “Panic Button” facility.

In embodiments, key module 100 draws power from and charges itself viathe vehicle's power supply. When not in use, key module 100 may becharged via a dedicated induction pad or similar device. In embodiments,when key module 100 reaches a minimum power reserve, a low power signalis emitted. In embodiments, if key module 100 powers off in its passivestate, then key module 100 will still allow access to the vehicle in thenormal way. In embodiments, if key module 100 has powered off (e.g. insearch mode) it may need to be charged before allowing access to thevehicle. In embodiments, key module 100 is uniquely electronicallybonded to (or ‘paired with’) the vehicle at a given point in thevehicle's manufacture.

In embodiments, key module 100 is powered by its own built-in battery.This battery may be charged in a number of ways, for example byinduction when located within a specific region in relation to thevehicle's ignition circuit. As another example, key module 100 may becharged by being placed on its own induction pad or via a USBconnection.

In embodiments, system upgrades and hard data information exchangebetween key module 100 and other computing devices is available via abuilt in USB port.

In embodiments, key module 100 comprises an actual physical key embeddedwithin its body. In embodiments, this actual “old fashioned” physicalkey is incorporated into the body of key module 100 in such a way that,in the event of the power supply either dropping below a minimum supportlevel or failing altogether, the key mechanism will be released.However, in embodiments, the physical key will only be released if thepower supply runs down or out without any of the other higher functionsbeing engaged. For example, if “ping” range function has been activatedbecause the key module 100 and mobile telephone device 102 are outsidetheir comfort zone (predetermined threshold distance), the physical keywill not be released. In embodiments, if key module 100 isopened/destroyed in an effort to get at the physical key stem, theactual act of breaking the key module 100 body will break or damage thephysical key in such a way as to render it useless. In embodiments, thephysical key will only allow access to the base level functions of thevehicle or locking mechanism, such as open/close/stop/start.

FIG. 3 shows a flow diagram according to ‘passive state’ or ‘searchmode’ embodiments. In its passive state, only the functions andparameters of key module 100 are changed, accessed or engaged by themobile telephony device 102 of the vehicle owner's (or other authorizeduser of the vehicle). A number of functions on mobile telephony device102 can also be changed, accessed or engaged by key module 100 once thetwo devices have been paired or bonded together. For example Audio, RDF,GPS, SMS and other signal output and data functions may be operated ineither direction between the two devices, so key module 100 can be usedto locate mobile telephony device 102 and if required lock that deviceout until it is found.

In step 3 a, once key module 100 is paired with mobile telephone device102, the key module 100 will typically be in hibernation with most orall systems dormant except for a “ping” or location function. The “ping”function tells the two devices that they are within the owner's pre-setcomfort zone or acceptable range (or ‘predetermined thresholddistance’). Once key module 100 passes outside of the owners pre-setsafe zone, key module 100 is presumed lost or misplaced.

In step 3 b, key module 100 detects that mobile telephony device 102 is“outside” the nominal range or “comfort zone” and sends mobile telephonydevice 102 a text message (and possibly also a vibrate message alert).

In step 3 c, if key module 100 is not easily located, the owner canaccess key module 100 via mobile telephony device 102 to activate eithera radio detection frequency (RDF) transponder of key module 100 and/oran audible signal function of key module 100. If key module 100 cannotbe traced by the audio signal, the RDF feature can be engaged via mobiletelephony device 102 and will be able to zero in on key module 100 if ithas (for example) been lost behind furniture, dropped out of a pocket,left in a shop, etc.

In step 3 d, key module 100 cannot be located and is out of audible andRDF range (or possible is out of the operating parameters of thesefunctions).

In step 3 e, if key module 100 remains undetected, it is reasonable toassume that it is either comprehensively lost or has been picked up. Atthis stage, the owner may choose to either proceed to step 3 g and makea telephone call to key module 100 to see if the call is answered.Alternatively, if there is an element of doubt as to how key module 100has been lost, the owner may enter in user input ‘Code on mobiletelephony device 102. Upon receipt of the ‘Code user input, mobiletelephone device 102 transmits a corresponding operational status changecode to key module 100 in step 3 f. In step 3 f, mobile telephony devicesends an SMS text (or other suitable message) to key module 100 whichcarries a function activation code. Once received this code implementsone or more of the following:

-   -   (i) A GPS signal function of key module 100 is switched to its        On state. This will enable the owner to track and find key        module 100 by tracing the signal using mobile telephony device        102.    -   (ii) A key vehicle entry function of key module 100 is disabled.        This will (“if pressed by the finder) call mobile telephony        device 102 and establish verbal contact between the owner and        the finder.    -   (iii) A visible signal generation function on key module 100 is        activated, for example a flashing light emitting diode (LED)        call button or suchlike. This will “if pressed by the finder        call mobile telephony device 102 and establish verbal contact        between the owner and the finder.    -   (iv) A vehicle vicinity function on key module 100 is activated.        This will send an SMS “Alert” text to the owner with the        information that key module 100 is with or within the immediate        vicinity of the vehicle, that further attempts to locate the        keys should be stopped and that the (Active) Code 2 functions of        key module 100 have been engaged.

Once the vehicle has been rendered secure by “blinding” (in other wordsthe mobile device causes the module to not recognize the vehicle), theowner may then either continue to trace the unit by a combination of theabove functions.

In step 3 g, having made the vehicle safe, the owner may choose to callkey module 100 directly in the knowledge that whatever the outcome thevehicle has been rendered secure.

In step 3 h, either key module 100 has been detected and returned to itsrightful owner or (Code 2, Active State) functions are engaged.

FIG. 4 shows a flow diagram according to ‘active state’ embodimentswhere communication with vehicle software system 104 may be conducted.Key module 100 can be put into its active state in a number of ways asdescribed below. It is important to note that in embodiments, key module100 does not interact with or change any parameters of the on-boardelectronic system of the vehicle (for example when key module 100 isremotely blinded by mobile telephony device 102 so it no longerrecognizes the vehicle). In embodiments, with key module 100 in itsblinded state, the vehicle alarm systems retain their integrity and willremain in that state. In essence, the lock remains the same but the keychanges its state. The term “tripped” used herein means that the one ormore of the key module 100 “active state” functions have been caused torespond, (for example, the alarm has been activated or tripped). Itshould be understood that the FIG. 4 “active state” flow diagramrepresents an example logical sequence of events and other embodimentsmay employ other sequences. In reality, any of these steps may beimmediately activated depending on the circumstances that key module 100senses once a Code 2 instruction is received. For example, inembodiments, if the vehicle has been stolen and is being driven at thetime the Code 2 instruction is received, key module 100 willautomatically transition to step 4 f.

Step 4 a. The Code 2-SMS Text message is received by key module 100. Oneor more of these following “active state” functions are now switched on:

(i) Auto proximity alert.

(ii) Vehicle blinding.

(iii) Engine cut out when vehicle is stationary.

Step 4 b. Step 4 a functions are active, but none have been activated,for example the proximity alarm has not been tripped. The 4 a functionswill remain on standby until any security functions are tripped or aFIG. 3h (code 2) cancel text has been sent by mobile telephony device102.

Step 4 c. One or more of the key module 100 step 4 b functions have beenactivated (or ‘tripped’). For example, key module 100 was within thevehicle vicinity function's pre-set range at the time the Code 2 SMSText was received. The Key Module 100 is assumed stolen.

Step 4 d. The key module 100 automatically sends SMS Text/Datainformation to mobile telephony device 102, such as insurance and policeservices noting the time, date and other relevant information about theevent. Step 4 e. The key module 100 has been introduced into thevehicle's ignition loop. The vehicle itself can now be assumed stolen.In this condition, in some embodiments, all functions as described inthe “active embodiments” are activated.

Step 4 f. Conclusion—here, either the key module 100 functions wereactivated in time to neutralize any threat of theft, or the vehicle wastaken without consent, tracked and disabled when stopped. In accordancewith embodiments, either the vehicle has been rendered secure by theearly activation of the key module 100 built-in passive securityfunctions, or the vehicle can be tracked and secured by the activesecurity functions.

Embodiments of the present invention enable a radical shift of the wholeconcept and existing mind-set of security access devices (for examplekeys). Embodiments promote an actual conscious shift from the status quothat exists at present, where the tendency can be to “put all eggs inone basket”, or more specifically referring to embodiments describedhere “all keys on one chain” (any chain is only as strong as its weakestlink) to a situation where any key or link can be lost or misplaced andthen traced and found by utilizing the functions inherently built intothe other keys or links. All things being bidirectional, if somebodyloses their keys they can find them or at least render them void byusing their mobile phone. Likewise, if somebody loses their phone, theycan find it or void it by using their keys.

The above embodiments are to be understood as illustrative examples ofthe invention. Further embodiments of the invention are envisaged. Forexample, in alternative embodiments, further command codes in additionto Code 1 and Code 2 may be devised and configured on key module 100 andmobile telephony device 102.

The embodiments described above primarily relate to a vehicle securitydevice. However, alternative embodiments apply to non-vehicle scenarios.The key module of embodiments can be used where a sophisticatedelectronic entry system may be advantageous or required. The key moduleof embodiments can be applied wherever a key system/device is present toensure flexibility, personal security and safety for any domestic,office, vehicle or industrial door entry system.

Alternative embodiments do not specifically relate to access or entrysystems or vehicles. For example, embodiments may be used inapplications such as remotely controlled monitoring devices where one ormore features of a module may be directly controlled and accessed by amobile telephony device.

Embodiments comprises a method of operating a controllable module, themethod comprising, at the controllable module: monitoring the proximityof the controllable module to a mobile telephony device associated withan authorized user of the controllable module; in response to themonitoring indicating that the distance between the controllable moduleand the mobile telephony device has exceeded a predetermined thresholddistance, transmitting a lack of proximity alert message to the mobiletelephony device; receiving, from the mobile telephony device, anoperational status change code associated with the controllable module;and on the basis of the received operational status change code,initiating an operational status change in relation to the controllablemodule.

It is to be understood that any feature described in relation to any oneembodiment may be used alone, or in combination with other featuresdescribed, and may also be used in combination with one or more featuresof any other of the embodiments, or any combination of any other of theembodiments. Furthermore, equivalents and modifications not describedabove may also be employed without departing from the scope of theinvention, which is defined in the accompanying claims.

What is claimed is:
 1. A method of operating a key module associatedwith a vehicle, the method comprising, at the vehicle key module:monitoring a proximity of the vehicle key module to a cellular telephonydevice associated with an authorized user of the vehicle; in response tothe monitoring indicating that a distance between the vehicle key moduleand the cellular telephony device has exceeded a predetermined thresholddistance, transmitting a lack of proximity alert message to the cellulartelephony device; receiving, from the cellular telephony device, anoperational status change code associated with one or more of thevehicle and the vehicle key module; and on the basis of the receivedoperational status change code, initiating an operational status changein relation to one or more of the vehicle and the vehicle key module. 2.The method of claim 1, wherein the initiating comprises disabling anignition function of the vehicle key module whereby the vehicle keymodule cannot be used to start the ignition of the vehicle.
 3. Themethod of claim 1, wherein the initiating comprises disabling a vehicleentry function of the vehicle key module whereby the vehicle key modulecannot be used to unlock one or more doors of the vehicle.
 4. The methodof claim 1, wherein the initiating comprises activating a geographicallocation function on the vehicle key module to report a geographicallocation of the vehicle key module to the cellular telephony device. 5.The method of claim 1, wherein the initiating comprises activating anaudible signal generation function on the vehicle key module.
 6. Themethod of claim 1, wherein the initiating comprises activating a visiblesignal generation function on the vehicle key module.
 7. The method ofclaim 6, comprising: receiving user input responsive to the activatedvisible signal generation function; and initiating a telephone call fromthe vehicle key module to the cellular telephony device.
 8. The methodof claim 1, wherein the initiating comprises activating a geographicallocation function on the vehicle key module to report a geographicallocation of the vehicle key module to the cellular telephony device. 9.The method of claim 1, wherein the initiating comprises activating avehicle vicinity function on the vehicle key module to monitor whetherthe vehicle key module is within a given predetermined thresholddistance from the vehicle.
 10. The method of claim 9, comprising, inresponse to the activated vehicle vicinity function indicating that thevehicle key module is within the given predetermined threshold distancefrom the vehicle, transmitting a vehicle vicinity alert message to thecellular telephony device.
 11. The method of claim 1, wherein theinitiating comprises activating a microphone of the vehicle key moduleand transmitting audio signals detected by the activated microphone tothe cellular telephony device.
 12. The method of claim 1, wherein theinitiating comprises transmitting, to a communication interface of thevehicle, a command to change an operational status of the vehicle. 13.The method of claim 12, wherein the operational status change commandcommands disabling of an ignition system of the vehicle.
 14. The methodof claim 13, wherein the operational status change command commandsdisabling of an ignition system of the vehicle when the vehicle is nextstationary.
 15. The method of claim 12, wherein the operational statuschange command commands locking of one or more doors of the vehicle. 16.A vehicle key module associated with a vehicle, the vehicle key modulecomprising: at least one processor; and at least one memory includingcomputer program code, the at least one memory and the computer programcode being configured to, with the at least one processor, cause thevehicle key module to: monitor a proximity of the vehicle key module toa cellular telephony device associated with an authorized user of thevehicle; in response to the monitoring indicating that a distancebetween the vehicle key module and the cellular telephony device hasexceeded a predetermined threshold distance, transmit a lack ofproximity alert message to the cellular telephony device; receive, fromthe cellular telephony device, an operational status change codeassociated with one or more of the vehicle and the vehicle key module;and on the basis of the received operational status change code,initiate an operational status change in relation to one or more of thevehicle and the vehicle key module.
 17. A non-transitorycomputer-readable storage medium program comprising computer-executableinstructions which, when executed by a processor, cause a computingdevice to perform a method of operating a key module associated with avehicle, the method comprising, at the vehicle key module: monitoring aproximity of the vehicle key module to a cellular telephony deviceassociated with an authorized user of the vehicle; in response to themonitoring indicating that a distance between the vehicle key module andthe cellular telephony device has exceeded a predetermined thresholddistance, transmitting a lack of proximity alert message to the cellulartelephony device; receiving, from the cellular telephony device, anoperational status change code associated with one or more of thevehicle and the vehicle key module; and on the basis of the receivedoperational status change code, initiating an operational status changein relation to one or more of the vehicle and the vehicle key module.