throbber
W0 97/1 3208
`
`PCT/US95/12459
`
`3
`
`a printout may be obtained showing these and other data. The owner/operator may
`
`obtain an indication of the period of time the vehicle is operated in ‘excess of the 65
`
`mile per hour overspeed limit. Similarly, apparatus disclosed by Ishibashi, US Patent
`
`No. 5,379,219, and Komatsu, US Patent No. 5,249,127 suggest the tracking of speed
`
`over time and, per Figure 3 of the ’2l9 patent, the allocation of memory among ID
`
`data, speed data, travel distance data and optional area. The ’l27 patent suggests
`
`that, memory size requirements being indeterminate and expensive, data compression
`
`devices be provided for assuring efficient utilization of memory.
`
`It has further been recognized that portability of the collected data is required.
`
`One means of achieving portability is via an external memory module (US 4,757,454,
`5,185,700 or 5,249,127). Also, radio or generally wireless radio communication may
`provide data mobility from one user to another (US 4,804,937, 5,185,700 or W0
`
`90/09645).
`
`The so-called global positioning system described, for example, by Taylor et
`
`al., US Patent No. 4,445,118 and O'Neil et al. US Patent No. 4,839,656 has been
`
`implemented in an electronic vehicle log by Haendel et al., US Patent No. 5,359,528.
`
`Haendel et al. describe that a change in state boundary and a log of miles within a
`
`particular state may be automatically obtained without driver intervention.
`
`All of these systems suffer from a lack of security of access by a particular
`
`user and may be falsified if and when the provided weak security systems fail.
`
`It is
`
`an object therefore of the present invention to describe a system whereby multiple
`
`users of a system may configure or obtain access to memory of an electronic vehicle
`
`log.
`
`It is a further object of the present invention to provide a system wherein
`
`security is enhanced via adaptation of evolving technologies of speech recognition and
`
`speaker verification, public/private key data encryption and decryption, flash or smart
`
`card (key) access and/or electronic signature record verification and access.
`
`SUMMARY OF THE PRESENT INVENTION
`
`In accordance with the present invention, an electronic vehicle log (EVL)
`
`comprises a processor for processing data, a memory for storing software algorithms
`
`and fixed data, preferably non—volatile in nature, a secret key unique to the vehicle
`
`log, and a unit serial number that
`
`is unique to that unit (hereinafter, an EVL
`
`identifier), a removable non—volatile log memory for securely recording data and a
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001486
`
`

`
`W0 97l13208
`
`PCT/US95/12459
`
`4
`
`navigation and time-of—day and date input data circuit. In one embodiment, there may
`
`be further provided a microphone input for receiving user speech coupled to the
`
`processor (for example, via an analog to digital converter) and a memory for storing
`
`digitized voice samples. Optional sensors are coupled to the log for providing for the
`
`input of data for vehicle and cargo, for example, through an external interface, in
`
`particular, a wireless interface. For example, through one external wireless interface,
`
`an EVL may acquire event data such as weight-in-motion (WIM) data. Those who
`
`would obtain access to data or input data are provided with a public key which is
`
`likewise unique to the vehicle log. Moreover, any data entries are signed with an
`
`electronic signature for verifying the entered data,
`
`for example, comprising a
`
`calculated hash value encrypted with the secret key.
`
`When the vehicle is to be used, the driver inserts the removable non-volatile
`
`log memory for the duration of the trip. For example, a driver may obtain access
`
`and log into the EVL by inputing their speech, a password or a biometric after
`
`inserting their card memory. Upon successful verification of the password or
`
`biometric and, if appropriate, verification of the speaker’s identity in a well known
`
`manner, the driver—unique data is used to decrypt a secret key member of a public key
`
`encryption pair. When data is to be logged by the driver, protected data packets
`
`10
`
`15
`
`(PDP’s) containing this log data are generated with digital signatures formed by
`
`20
`
`encrypting digital hash values with this secret key member of the public key pair.
`
`Protected data packets (PDP’s) are transmitted to a requesting user via
`
`electronic means, for example, wireless, telephone modem or a memory card. The
`
`requesting user has a trusted (escrowed) copy of the public key of the above-
`
`referenced public key pair, the public key pair including the secret key (securely
`
`25
`
`stored in and never released from EVL memory) used for forming the electronic
`
`signature. The secret key should be protected and secured as closely as possible and
`
`should not be transmitted (otherwise,
`
`it might be intercepted by an uncertified
`
`individual). The public key is used to verify that the electronic signature of the PDP
`
`is accurate. Correct verification of the electronic signature then confirms the data
`
`30
`
`source (the driver-protected secret key) and the integrity of the data (since the hash
`
`value matches the PDP data).
`
`A governmental authority may obtain access by a defined process. One
`
`Page 001487
`
`

`
`W0 97/13208
`
`PCT/US95/12459
`
`5
`
`example of such a process for obtaining an early transmission of vehicle data in
`
`advance of a border crossing or like event is described by the following. The agency
`
`wishing to receive secure data generates a public key encryption pair different from
`
`that used by the driver and distributes the public key portion to any person or system
`
`desiring to transmit secure data. The public key portion is stored in EVL memory.
`
`A profile of a commercial vehicle and a cargo may be extracted from the vehicle via
`
`a card memory or may be electronically extracted by wireless means prior to the
`
`vehicle’s departure and delivered to the authority with the stored public key portion.
`
`The EVL generates a private encryption key and uses it to encrypt PDP’s with their
`
`corresponding digital signatures. The EVL encrypts this private encryption key using
`the public key and transmits that information to the agency receiving the data. The
`
`receiving agency decrypts the EVL private encryption key using the secret key
`
`portion of the key pair and then decrypts the PDP’s using the decrypted key. The
`
`profile and public key are transmitted via a centralized authority data base to regional
`
`data bases for distribution to checkpoints, port of entry border crossings and the like
`
`along the intended route of the vehicle.
`
`As the vehicle approaches the inspection facility,
`
`the vehicle is polled or
`
`interrogated, for example, preferably by wireless means in advance of reaching the
`
`facility, so the vehicle need not stop its movement. The vehicle transmitted profile
`
`data is compared with the previously transmitted profile data and the inspector may
`
`preclear the vehicle through the inspection station.
`
`If the inspection data is a weigh
`
`station, for example, and data is to be entered into the log by the authority, an
`
`electronic signature is utilized to verify the entered data, preventing subsequent
`
`modifications of the logged information. Moreover, at the time the entry is made,
`
`the vehicle position and time from the global positioning system may be automatically
`
`and simultaneously recorded, allowing detection of fraudulent entries. As the vehicle
`
`crosses the border, a short range communications system may be used to verify that
`
`the vehicle crossing the border is the vehicle which received the preclearnace to
`cross.
`
`It is also possible that the vehicle may carry all the profile information in the
`
`EVL and transmit the data via wireless means to the authority just a few minutes
`
`before the approval (for example, preapproval at a border crossing) event.
`
`In this
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001488
`
`

`
`WO 97/13208
`
`PCT/US95/12459
`
`6
`
`case and in that described above as well, some sort of short-range transmission is
`
`useful as the vehicle crosses the border to physically confirm ‘that
`
`the vehicle
`
`currently crossing the border is the same as the one that provided the profile and
`
`credentials and received preapproval to cross.
`
`An authorized individual such as an inspector or police officer creates a digital
`
`credential in a generating device’s memory, for example, a laptop personal computer.
`
`A secret key of a public key pair is used to generate a digital signature for the
`
`credential data. The credential and signature are transmitted to the EVL using
`
`various means, possibly including wireless means, direct input (typing), or memory
`
`10
`
`card transfer. This transfer may be encrypted as discussed above as desired. for
`
`wireless or other secure data transmission. The credential and signature are formed
`
`into a PDP and logged as described above for the driver data logging operation.
`
`When the credential is subsequently transmitted to a requesting agency, the agency
`
`will use a trusted copy of the public key portion to verify the electronic signature of
`the PDP.
`
`15
`
`Other features and advantages of the present invention will be explained by
`
`reference to the drawings and the following detailed description of the present
`
`invention.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`20
`
`25
`
`30
`
`Figure 1 is an overview drawing of an electronic vehicle log according to the
`
`present invention;
`
`Figure 2A is a system overview drawing showing the interface between a
`
`vehicle 200 carrying an electronic vehicle log of Figure 1 with a governmental or
`
`other authority and Figure 2B shows vehicle 200 with expanded boxes describing data
`
`that may be stored in DPIU 210 including an electronic vehicle log of the present
`
`invention;
`
`Figure 3 is a schematic block diagram of the electronic vehicle log of Figure
`
`1 for maintenance in a vehicle; Figure 3A provides a first embodiment, Figure 3B
`
`provides a second embodiment and Figure 3C provides a third embodiment;
`
`Figure 4A provides an overview of the key and security features of the present
`
`invention in flow diagram form and Figure 4B shows a table showing the use of
`
`different public key pairs by different entities for accessing the data stored in the EVL
`
`Page 001489
`
`

`
`
`
`WO 97113208
`
`PCT/US95/12459
`
`400 of Figure 4A;
`
`Figure 5A provides a table of examples of data maintained‘ in an in-vehicle
`
`data base of memory of the in-vehicle unit of Figure 4; Figure 5B comprises a table
`
`showing data elements and characteristics recoverable through utilization of the
`
`present invention and their characteristics; and
`
`Figures 6A and 6B provide a table showing service, application, technology
`
`or product availability, demonstrable feature and utilization of the present invention.
`
`DETAILED DESCRIPTION OF THE PRESENT INVENTION
`
`Referring to Figure 1, there is shown an overview drawing of the electronic
`
`vehicle log of the present invention. The present device is intended to be placed in
`
`a vehicle, hence,
`
`the present invention is described herein as an in-vehicle data
`
`processing unit. The log is described herein as electronic because it generally
`
`operates via electronic circuits including at
`
`least memory circuits and a data
`
`processor. The present invention is characterized as a log because the memory of the
`
`present invention substitutes for prior art hand-written log books typically used by
`
`drivers of vehicles, especially commercial vehicles.
`
`The electronic vehicle log (EVL) l is described by box la as comprising a
`
`package of elements suitably housed to be mounted in a vehicle, for example, in an
`
`operator compartment or secure area therein or proximate thereto. One mounting
`
`arrangement would be to provide a bracket mounting plate permanently secured to the
`
`vehicle. The EVL housing, herein referred to as a data processing interface unit
`
`(DPIU) then is removably secured thereto by mechanical locking apparatus so that the
`
`DPIU may be removed from the vehicle as necessary. The mechanical locking
`
`apparatus should be tamper-resistant so that the EVL itself cannot be surreptitiously
`
`moved from one vehicle to another without detection.
`
`(To accomplish this objective,
`
`electronic tamper detection may be employed). Preferably, the DPIU housing is
`
`adapted to receive a removable security module as will be further described herein
`
`which is the electronic vehicle log itself.
`
`The EVL housing 1 (DPIU) contains a processor, preferably a microprocessor
`
`and a non-volatile memory coupled thereto for storing at least secret key data, secret
`
`EVL unit serial number data and executable software.
`
`The EVL 1 further may
`
`comprise a random access memory that typically is volatile for storing data on a
`
`10
`
`15
`
`20
`
`30
`
`Page 001490
`
`

`
`W0 97/l 3208
`
`PCTlUS9S/12459
`
`8
`
`temporary basis and a real
`
`time clock (typically a software algorithm that
`
`is
`
`preferably periodically updated). Most processors require a clock "oscillator output
`
`that is controlled for providing processor operation clocking functions. This clock
`
`can provide a clocking input to a real time clock algorithm as is well known in the
`
`art. However, for greater security, an independent clock source may be used or an
`
`internal isolated hardware clock circuit (not shown). A navigation system such as the
`
`Global Positioning System (GPS) or Loran or other system can provide the
`
`independent clock source or periodic indications as to true time for synchronizing a
`
`local real time clock as is likewise known in the art. Of course, another important
`
`10
`
`function of GPS or other known equivalent systems is the provision of periodic
`
`location data in the form of earth latitude and longitude data and even altitude data
`
`that may be compared with a map or intended route and thus provide specific data as
`
`to real
`
`time of day and route location.
`
`A further description of preferred
`
`embodiments of EVL l will be provided in connection with app1icant’s description
`
`15
`
`of Figure 3.
`
`EVL housing 1 has insertable therein a removable non-volatile memory
`
`module 2 described by box 2a which becomes the log in place of known paper logs
`
`or other known electronic logs.
`
`In accordance with the present invention, the log
`
`memory 2 stores secured or protected data packets output from the EVL included
`
`processor as will be further described in connection with Figure 4.
`
`The EVL 1, according to the present
`
`invention, may communicate with
`
`governmental authorities via radio 3, according to box 3a which may be optional or
`
`through wired or other means. Certainly by radio is intended communication via all
`
`radio frequencies including light frequencies or via laser or other known means that
`
`is wireless in nature. As will be further described herein in the example depicted in
`
`Figure 2 of a border crossing, the EVL communicates with an inspection facility for
`
`border preclearance before reaching the border via wireless means, so the vehicle
`
`need not stop.
`
`The EVL 1 may be provided with a display or other output means 4. The
`
`display, as indicated by descriptive box 4a, may be optional. The display may
`
`comprise a liquid crystal display, cathode ray tube display, light emitting diode or
`
`other display. Other output means may comprise a printer or speech synthesis means
`
`20
`
`25
`
`30
`
`Page 001491
`
`

`
`
`
`W0 97/13208
`
`PCT/US95/12459
`
`9
`
`or other output means. All such means provide the user (typically the vehicle
`
`operator) with feedback of proper operation, an indication that the‘vehicle is being
`
`polled, clearance to proceed, log data, if appropriate, and other infonnation.
`
`Controls 5, as described by box 5a, are likewise optional. The controls
`
`typically comprise a keyboard, keypad or related switch control but may comprise
`
`speech receiving means 7 described by box 7a as a microphone such as an electret
`
`microphone or digital microphone. Also, both keys and microphones may be
`
`provided. The microphone may be eliminated if speech input is not contemplated by
`
`one designing a system according to the present invention. The controls may be keys
`
`representing,
`
`for example, numeric or alphabetic characters
`
`for
`
`inputing the
`
`operator's identity, password or other data as will be described further herein.
`
`If
`
`necessary the microphone is coupled to the processor of the present invention via an
`
`analog to digital converter for sampling the voice input and converting the input to
`digital samples.
`T
`
`Finally, in accordance with Figure 1, sensors 6 may be provided which are
`
`only generally described. These may comprise brake sensors, accelerator sensors,
`
`tachometer or mileage sensors, speedometer sensors, steering column sensors, tire
`
`pressure monitoring sensors, cargo bonding sensors, cargo temperature or smoke or
`
`fire sensors, driver alcohol (breath) detection sensors and the like which may be
`
`coupled to EVL 1 by wired or wireless means.
`
`In-transit, cargo and route monitoring data use sensors which are preferably
`
`mounted on the vehicle and locally communicate with the EVL using fixed
`
`communications channels (cabling or short-range radio signals).
`
`Credentials and
`
`event data recording typically requires acquiring data from systems separate from the
`
`EVL housing 1 which are not permanently mounted on the vehicle. For example, a
`
`customs agent may be empowered to record a credential within the EVL which
`
`indicates that paperwork is in place and tariffs paid to allow expedited international
`
`or state border crossings as will be described further in reference to the example of
`
`Figure 2. This credential information is placed within the EVL by any number of
`
`transmission methods and via security means including direct entry, via a removable
`
`credential memory, via direct connection and via radio connection.
`
`In regard to direct entry,
`
`the EVL 1 may provide a keyboard and limited
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001492
`
`

`
`W0 97/l 3208
`
`PCT/US95/12459
`
`10
`
`display for manual entry of the information. This may be relatively tedious and
`
`insecure.
`
`The entry process may include the agent (inspector) specifying an
`
`encryption key, either public or private, which may be used in a signature process for
`
`authenticating entered data. The process may involve speech recognition and voice
`
`entry of the data in combination with a keyboard/display or alone. The process may
`
`further comprise speaker identification or verification processes lcnown in the art for
`
`confirming a subject’s claimed identity based upon a digitized speech sample.
`
`Removable credentials are preferred.
`
`If the EVL memory is removable,
`
`it
`
`may be placed in a data entry device belonging to the agent and the electronic
`
`credential or event data copied into the memory. When the memory device is
`
`replaced into the EVL l, the newly acquired data will be processed as a normal PDP
`
`as described below in connection with Figure 4.
`
`A
`
`Direct connection may be cumbersome. The EVL may be directly cabled to
`
`the agent’s data entry device, using a media such as an RS 232 serial data channel or
`
`equivalent serial or parallel connector. Data processing in this case is comparable to
`
`that when using removable credentials.
`
`Finally radio connection may be preferable for, for example, coupling to
`
`mobile police forces, air such as helicopter carrying radio, or roadside radio polling
`
`stations so the vehicle may transmit in motion. Radio may be used to receive or
`
`transmit credential and event data. One example is a weight in motion (WIM) station
`
`operated by a governmental authority. A WIM sensor may, when interrogated by the
`
`EVL, transmit the vehicle’s weight to the EVL for storage.
`
`As will be further described in connection with Figure 2, an agent uses a
`
`personal computer or workstation to generate,
`
`for example, border crossing or
`
`inspection credential data. An agent-specific secret key is used to embed their
`
`electronic signature within the credential data transferred to the EVL 1. Thus, the
`
`data may not be accessible to the driver or even the vehicle system operator. When
`
`the credential data is later transmitted to an authorizing agent (such as the border
`
`10
`
`15
`
`20
`
`25
`
`crossing inspector),
`
`the corresponding public key is used to decrypt the signature,
`
`30
`
`thereby authenticating the source and permitting preclearance of the vehicle.
`
`Now, referring to Figure 2, one application of the present invention will be
`
`described, namely a border crossing, to demonstrate the interrelationships among the
`
`Page 001493
`
`

`
`
`
`W0 97/1 3208
`
`PCT/US95/12459
`
`1 1
`
`elements of Figure 1 which may be assembled in combination to perform any desired
`
`application of the present invention. Figure 2 generally represents ‘in diagrammatic
`
`form the events at a border crossing of a vehicle 200 equipped with the EVL 1
`
`(Figure 1) of the present invention (represented as box 210). Other applications will
`
`be described subsequently herein. Vehicle 200 may be a truck,
`
`for example,
`
`approaching a border crossing 202 which may be a state or international border along
`
`a route 201. There are three zones of route 201 the vehicle 200 is expected to pass
`
`through.
`
`Zone 205 comprises a reporting zone.
`
`Zone 206 comprises an
`
`evaluation/clearance zone. Zone 207 comprises an inspection zone for performing
`
`a detailed inspection, as necessary, of vehicle 200 or health check of the vehicle's
`
`driver. The arrows on route 201 indicate the expected direction of passage of vehicle
`200.
`
`Referring briefly to Figure 2B, there is shown a typical vehicle 200 and blocks
`
`261-266 summarizing data that may be related thereto. Block 261 describes motor
`
`vehicle data such as ID number, EVL or DPIU identification number and status,
`
`vehicle weight and registration data. Driver data 262 comprises their identification,
`
`their licenses, safety record,
`
`transit log and safety biometrics among other data.
`
`Carrier data 263 includes identification, location, registration, insurance, licenses and
`
`permits, ICC, PUC, USDOT records, violations and offenses and fees paid records.
`
`Cargo data 266 includes trailer identification, invoice, manifest, HAZMAT warnings,
`
`gross and tare weight, export declaration, inspection record, tariff record and crossing
`
`approval data. Together, these data 261, 262, 263 and 266 may be vehicle credential
`
`data as used in the context of the present application.
`
`10
`
`15
`
`20
`
`Transit security block 264 refers to electronic bonding data, route verification
`
`25
`
`data and time-in—travel verification data.
`
`Safety and environmental data block 265 refers to a combination of event data
`
`and in transit data.
`
`In particular, block 265 refers to inspection records, emission
`
`records on-board sensor records and HAZMAT warnings.
`
`Typically at a border 202 or proximate thereto is an inspection facility 203.
`
`30
`
`At the inspection facility, work stations, shown as computer workstations, 204 are
`
`provided governmental employees, such as inspectors. The work stations and/or
`
`inspection facility 203 preferably communicate with vehicle 200 which may be
`
`Page 001494
`
`

`
`W0 97/13208
`
`PCT/US95/12459
`
`12
`
`moving by wireless means. The PC-based inspector workstations 204 are described
`
`by box 220. The workstations function to interface with an interface unit described
`
`by block 210 usually referred to herein as the EVL of vehicle 200 and to roadside
`
`sensors of a polling station (not shown). These sensors respond as a vehicle passes
`
`a polling station in motion to obtain data from the EVL. These may not need be
`
`"roadside" but may be "fly over" and thus mounted in aircraft such as helicopters or
`
`other traveling vehicles such as police vehicles.
`
`In any event, the workstations 220
`
`function to record electronic credentials either downloaded in advance or provided
`
`from the EVL 210 of the vehicle 200. The workstation 204 may interface with
`
`centralized databases to obtain data that is not stored in the workstation as necessary.
`
`Finally,
`
`it
`
`is desirable if the workstations 204 are networked together
`
`for
`
`intercommunication and interchangeability. That is, if one workstation is occupied,
`
`a first spare workstation is allocated to an new incoming vehicle 200 to the system.
`
`The work stations 204 and/or inspection facility 203 generally are provided
`
`with an EVL interface unit for interfacing with the in-vehicle EVL l of vehicle 200.
`
`The functions of this interface unit are described by box 210 which couples the
`
`inspection facility 203 or workstation 204 or both with the EVL resident in vehicle
`
`200. This interface unit carries and provides credentials/manifests/inspection records
`
`collected for a vehicle. The interface unit also collects multi-sensor reports from on-
`
`board sensors on the commercial vehicles such as vehicle 200, for example, on
`
`odometer readings, brakes, cargo bondings and the like as optionally provided.
`
`Moreover, the interface unit provides vehicle to roadside (or fly over) polling stations
`
`communication between the EVL and the governmental employees such as inspectors
`
`and inspection stations such as weight-in-motion measuring stations. The latter data
`
`may be recorded in the EVL as will be described in connection with Figure 4 as
`
`protected data packets. Another function of the interface unit is general information
`
`management and the updating of the EVL data base and records due to governmental
`
`activity. For example, the opportunity for preclearance of a vehicle through an
`
`inspection station is one type of data that may be entered into the EVL. Finally, the
`
`interface unit provides electronic security in accordance with the security features
`
`described by Figure 4. Communications to and from the vehicle 200, especially if
`
`wireless, are preferably secured from interception by coding and/or encryption as
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001495
`
`

`
`W0 97/13208
`
`desired.
`
`1 3
`
`PCT/U S95/l 2459
`
`In operation, a vehicle 200 moves along route 201 into a reporting zone 205.
`
`The vehicle 200 may initiate radio contact with inspection facility 203 or the vehicle
`
`may be polled via roadside or other monitors. Meanwhile, manifests for the vehicle
`
`and associated data are preferably electronically downloaded by a broker (a carrier
`
`or other party) for storage at the facility 203. Current manifests of expected vehicles
`
`are provided to individual inspector workstations 204. Responsive to a polling signal
`
`or associated with a request for preclearance initiated by the vehicle, the vehicle data
`
`of particular vehicle 200 is provided via wireless means to inspection facility 203 and
`
`compared at workstations 204 with downloaded data, such as manifest data. On-
`
`board the vehicle, the driver may be provided with a display indicating the EVL is
`
`being monitored and thereby reported to him. Moreover, a report or record of the
`
`monitoring activity may be stored in the EVL along with a real time of day and
`
`location indication as will be subsequently described herein.
`
`The vehicle then enters an evaluation/clearance zone 206. The governmental
`
`authority such as an inspector assesses the records/data obtained from the EVL at his
`
`workstation 204.
`
`If the inspector is satisfied, the inspector communicates a bypass
`
`or, if not satisfied, a no-go signal to the truck. Of course,
`
`the EVL records and
`
`updates itself according to the bypass or no-go signal. As the vehicle approaches the
`
`border 202, roadside monitors may poll the vehicle in transit as it crosses the border
`
`to assure that the vehicle crossing the border is in fact the vehicle given preclearance
`
`to cross. There exists the possibility that preclearance may not have been received
`
`in a timely manner even though preclearance could have been granted as the vehicle
`
`enters the inspection area 207. Vehicles not receiving timely preclearance and
`
`vehicles whose credentials are suspect may be signaled to stop in inspection zone 207.
`
`As the vehicle 200 moves it will enter a detailed inspection area indicated as
`
`such on route 201.
`
`Inspection zone 207 corresponds thereto and, at the area, a
`
`detailed inspection of vehicles which fail or do not timely receive preclearance
`
`occurs. Vehicles which may not receive preclearance (not permitted to bypass the
`
`station) may include those providing a cargo bonding breakage signal, an indication
`
`of improper or errored credentials or manifest data and the like or presenting safety
`
`issues such as faulty brake or related signals. Whether or not monitored, driver
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001496
`
`

`
`W0 97/1 3208
`
`PCT/US9S/12459
`
`14
`
`health issues may also be checked (for example, vision or drug/alcohol levels). The
`
`inspections may be random, i.e., ordered as a result of proper data reporting but
`
`nevertheless a no-go signal is signaled to the particular vehicle 200.
`
`If the vehicle
`
`safety, driver health or driver safety (overspeed or erratic activity) are signaled as
`
`problematical, each of these in turn may be checked or inspected.
`
`Thus, as described above, an embodiment of the present
`
`invention may
`
`provide for a vehicular data processing method for use by a vehicle in crossing a
`
`border comprising the steps of initiating a request for preclearance or automatically
`
`receiving a polling signal; responsive to a polling signal, transmitting at least vehicle
`
`credential data; and receiving a bypass signal or a stop signal,
`
`the bypass signal
`
`indicating that the vehicle may pass and the stop signal indicating the vehicle must
`
`stop.
`
`Preferably the data is transmitted in a secure manner as will be further
`
`described in connection with Figure 4. Other related methods that will be further
`
`described herein include the automatic monitoring of safety equipment, driver
`
`credential, driver health or driver safety by police, the automatic monitoring of cargo
`
`bonding devices and cargo temperature, cargo weight, tariff payment and the like.
`
`Now referring to Figure 3A, there is shown one alternative embodiment of an
`
`electronic vehicle log according to the present invention. A further embodiment is
`
`described by Figure 3B and yet a third embodiment is described by Figure 3C. From
`
`a study of each embodiment, one of skill in the art will be prepared to design an
`
`electronic vehicle log for a particular application and/or vehicle type and,
`
`in
`
`accordance with Figure 4, design an appropriate security method and means
`
`depending on the level of security desired.
`
`Figure 3A shows an in—vehicle data processing interface unit. Box 300
`
`exemplifies a housing for housing components of an EVL according to the present
`
`invention. The EVL system apparatus 300 includes, for example, a radio or other
`
`vehicle-to-roadside, vehicle-to-vehicle or vehicle-to-aircraft communications apparatus
`
`301. Examples of short range devices that may be used include :1 Hughes Radio or
`
`Mark IV (MkIV) units or other similar radio systems known in the art or so—ca1led
`
`automatic vehicle identification units. Longer range communication may be cellular
`
`radio via telephone modem or 220MHz radio manufactured by Scientif1c—Atlanta and
`
`other suppliers. Also, Qualoomm Omnitrax provides longer range communications.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001497
`
`

`
`W0 97/l 3208
`
`PCT/US95/12459
`
`15
`
`.
`
`Apparatus 301 is coupled between a suitable antenna (via link 309) and computer
`
`processing unit 302. Similarly situated is systems applications apparatus 303 for, for
`
`example, receiving GPS or Loran or other location and time update data via an
`
`antenna via link 310. Other functions of apparatus 303 include security and built-in-
`
`test (BIT) test circuitry. Processing set 302 and systems applications apparatus 303
`
`may be powered by the vehicle battery via a 12-volt power inverter or other circuitry
`
`304. Computer processing set 302 houses the processor, non-volatile (software
`
`algorithm) memory, PCMCIA (card or module) receiver, analog/digital interfaces as
`
`necessary, operator/machine interfaces as necessary and built—in test circuitry. The
`
`plug-in security EVL module is represented by both 307a and 308a for storing fixed
`
`and variable data respectively via respective links 307 and 308. Fixed data 307a of
`
`an EVL includes and should not be considered to be limited to include cab
`
`identification data, truck line identification data, registration data, location data and
`the like.
`
`Variable data 308a may be considered to include and not be limited to
`
`include driver identification data, trailer identification data, load identification data,
`
`route data, initial weight data, credentials and fees data, hazardous material data and
`
`safety inspection data.
`
`10
`
`15
`
`Of course, one purpose of the device 300 and log 307a, 308a is to provide via
`
`20
`
`antenna(s) 309 certain outputs 310a responsive to certain external inputs 309a. Inputs
`Once the
`
`309a comprise the polling request and the identification of the poller.
`
`polling request is made, data returned a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket