Increased automobile security via use of wireless network
First Claim
1. A method of providing security for a vehicle activated by a keyless ignition system, the method comprising the steps of:
- receiving, via wireless communications, a signal to start an ignition of the vehicle;
transmitting, upon receipt of the signal, a message to a server to provide a security key to the vehicle and to one or more mobile phones registered to a driver of the vehicle; and
starting the ignition when, upon receipt of the security key by the driver and the vehicle, the security key received by the driver and inputted to the vehicle is identical to the security key received by the vehicle.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus are provided to assist in providing security for vehicles with keyless ignition systems. The present invention involves receiving, via wireless communications, a signal to start an ignition of the vehicle. Upon receipt of the signal, a built-in cellular phone in the vehicle transmits a message to a server to provide a security key to the vehicle and the security key and a message to all mobile phones registered to a driver of the vehicle. The message indicates that an attempt has been made to start the vehicle. Upon receipt of the security key, the driver of the vehicle may input the security key into a key pad of the vehicle. If the security key received by the vehicle from the server matches the security key inputted by the driver of the vehicle, then the keyless ignition system may start the vehicle.
72 Citations
25 Claims
-
1. A method of providing security for a vehicle activated by a keyless ignition system, the method comprising the steps of:
-
receiving, via wireless communications, a signal to start an ignition of the vehicle; transmitting, upon receipt of the signal, a message to a server to provide a security key to the vehicle and to one or more mobile phones registered to a driver of the vehicle; and starting the ignition when, upon receipt of the security key by the driver and the vehicle, the security key received by the driver and inputted to the vehicle is identical to the security key received by the vehicle. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus to provide security for a vehicle activated by a keyless ignition system, comprising:
-
means for receiving, via wireless communications, a signal to start an ignition of the vehicle; means for transmitting, upon receipt of the signal, a message to a server to provide a security key to the vehicle and to one or more mobile phones registered to a driver of the vehicle; and means for starting the ignition when, upon receipt of the security key by the driver and the vehicle, the security key received by the driver and inputted to the vehicle is identical to the security key received by the vehicle. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
- 22. An apparatus operable to a) transmit, upon receipt of a signal to start an ignition of a vehicle, a message to a server to provide a security key to the vehicle and to mobile phones registered to a driver of the vehicle, b) receive, in response to the message, the security key transmitted by the server, c) compare the security key received from the server to a second security key received by the driver and inputted in a key pad in the vehicle, d) make a determination as to whether there exists at least one difference between the security key received from the server and the second security key inputted by the driver of the vehicle, and e) start the ignition if the security key received by the vehicle and the second security key inputted by the driver of the vehicle are identical.
-
25. A method of starting a vehicle having a keyless ignition system, the method comprising the steps of:
-
calling a vehicle security call center; responding to one or more inquires from an employee of the vehicle security call center to establish an identity of a driver of the vehicle; and entering a security key into a key pad of the vehicle upon establishing the identity and receipt of the security key.
-
Specification