Methods for monitoring safety belt usage
First Claim
1. A method for monitoring and reporting safety belt use, comprising:
- detecting, via a first monitoring device, motion of a vehicle having an occupant seated on a seat therein;
detecting, via a second monitoring device, non-engagement of a safety belt of the seat of the occupant;
sending a notification, via a software application resident on an occupant'"'"'s computing device, to a third party when non-engagement of the safety belt is detected; and
playing an audio alert, via the software application, from the third party, at an interior of the vehicle to remind the occupant to apply the safety belt.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems detect motion of a motor vehicle and detect whether the driver, and/or other occupants, are wearing their safety belts. A third party can be notified, in real-time, that the vehicle is being driven without the safety belts engaged. The user can then deliver an audio message to the user, either pre-recorded or live, to remind the user to fasten their safety belts. The third party also has an option of delivering a consequence to the user as a result of the detection of the safety belt not being engaged. Such consequence can include automatically limiting access to certain applications of the driver'"'"'s smart phone for a certain period of time. The system can include a seat belt application detector, a vehicle motion detector, and wireless communication means to send a signal of safety belt application to the third party.
5 Citations
20 Claims
-
1. A method for monitoring and reporting safety belt use, comprising:
-
detecting, via a first monitoring device, motion of a vehicle having an occupant seated on a seat therein; detecting, via a second monitoring device, non-engagement of a safety belt of the seat of the occupant; sending a notification, via a software application resident on an occupant'"'"'s computing device, to a third party when non-engagement of the safety belt is detected; and playing an audio alert, via the software application, from the third party, at an interior of the vehicle to remind the occupant to apply the safety belt. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for monitoring and reporting safety belt use, comprising:
-
detecting, via a first monitoring device, motion of a vehicle having an occupant seated in a seat therein; sending a motion signal from the first monitoring device to an occupant computing device running an occupant software application; detecting, via a second monitoring device, non-engagement of a safety belt of the seat of the occupant; sending a safety belt non-engagement signal from the second monitoring device to the occupant computing device; sending a notification, from the occupant computing device, to a third party when non-engagement of the safety belt is detected; and playing an audio alert, from the third party, on the occupant computing device to remind the occupant to apply the safety belt. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for monitoring and reporting safety belt use, comprising:
-
detecting, via a first monitoring device, motion of a vehicle having an occupant seated in a seat therein; sending a motion signal from the first monitoring device to an occupant computing device running an occupant software application; detecting, via a second monitoring device, non-engagement of a safety belt of the seat of the occupant; sending a safety belt non-engagement signal from the second monitoring device to the occupant computing device; sending a notification, from the occupant computing device, to a third party computing device when non-engagement of the safety belt is detected; playing an audio alert, from the third party computing device, on the occupant computing device to remind the occupant to apply the safety belt; and providing an electronic consequence to the occupant by the third party after the third party computing device receives a preset number of the notifications, the electronic consequence including limiting access to one or more software applications on the occupant computing device for a period of time. - View Dependent Claims (20)
-
Specification