SYSTEM AND METHOD FOR VEHICLE THEFT DETECTION
2 Assignments
0 Petitions
Accused Products
Abstract
Various systems and methods for vehicle theft detection are described herein. In an embodiment, a driver of the vehicle is identified with an onboard system. The onboard system then determines whether the driver is an authorized operator of the vehicle, where the determination based on sensor data collected from a sensor installed in the vehicle. When the driver is not an authorized operator of the vehicle, a security recovery process is performed.
-
Citations
45 Claims
-
1-25. -25. (canceled)
-
26. An onboard system for detecting vehicle theft, the onboard system installed on a vehicle and comprising:
-
a driver identification module adapted to identify a driver of the vehicle; an authorization module adapted to determine whether the driver is an authorized operator of the vehicle, the determination based on sensor data collected from a sensor installed in the vehicle; and a recovery module adapted to perform a security recovery process when the driver is not an authorized operator of the vehicle. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for detecting vehicle theft of a vehicle, the method comprising:
-
identifying a driver of the vehicle with an onboard system; determining, by the onboard system, whether the driver is an authorized operator of the vehicle, the determination based on sensor data collected from a sensor installed in the vehicle; and performing a security recovery process when the driver is not an authorized operator of the vehicle. - View Dependent Claims (38, 39, 40, 41, 42)
-
-
43. A computer-readable medium comprising instructions for detecting vehicle theft of a vehicle, which when executed by a computer, cause the computer to:
-
identify a driver of the vehicle with an onboard system; determine, by the onboard system, whether the driver is an authorized operator of the vehicle, the determination based on sensor data collected from a sensor installed in the vehicle; and perform a security recovery process when the driver is not an authorized operator of the vehicle. - View Dependent Claims (44, 45)
-
Specification