`
`PCT/US95/12459
`
`3
`
`a printout may be obtained showing these and other data. The owner/operator may
`
`obtain an indication of the period of time the vehicle is operated in ‘excess of the 65
`
`mile per hour overspeed limit. Similarly, apparatus disclosed by Ishibashi, US Patent
`
`No. 5,379,219, and Komatsu, US Patent No. 5,249,127 suggest the tracking of speed
`
`over time and, per Figure 3 of the ’2l9 patent, the allocation of memory among ID
`
`data, speed data, travel distance data and optional area. The ’l27 patent suggests
`
`that, memory size requirements being indeterminate and expensive, data compression
`
`devices be provided for assuring efficient utilization of memory.
`
`It has further been recognized that portability of the collected data is required.
`
`One means of achieving portability is via an external memory module (US 4,757,454,
`5,185,700 or 5,249,127). Also, radio or generally wireless radio communication may
`provide data mobility from one user to another (US 4,804,937, 5,185,700 or W0
`
`90/09645).
`
`The so-called global positioning system described, for example, by Taylor et
`
`al., US Patent No. 4,445,118 and O'Neil et al. US Patent No. 4,839,656 has been
`
`implemented in an electronic vehicle log by Haendel et al., US Patent No. 5,359,528.
`
`Haendel et al. describe that a change in state boundary and a log of miles within a
`
`particular state may be automatically obtained without driver intervention.
`
`All of these systems suffer from a lack of security of access by a particular
`
`user and may be falsified if and when the provided weak security systems fail.
`
`It is
`
`an object therefore of the present invention to describe a system whereby multiple
`
`users of a system may configure or obtain access to memory of an electronic vehicle
`
`log.
`
`It is a further object of the present invention to provide a system wherein
`
`security is enhanced via adaptation of evolving technologies of speech recognition and
`
`speaker verification, public/private key data encryption and decryption, flash or smart
`
`card (key) access and/or electronic signature record verification and access.
`
`SUMMARY OF THE PRESENT INVENTION
`
`In accordance with the present invention, an electronic vehicle log (EVL)
`
`comprises a processor for processing data, a memory for storing software algorithms
`
`and fixed data, preferably non—volatile in nature, a secret key unique to the vehicle
`
`log, and a unit serial number that
`
`is unique to that unit (hereinafter, an EVL
`
`identifier), a removable non—volatile log memory for securely recording data and a
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001486
`
`
`
`W0 97l13208
`
`PCT/US95/12459
`
`4
`
`navigation and time-of—day and date input data circuit. In one embodiment, there may
`
`be further provided a microphone input for receiving user speech coupled to the
`
`processor (for example, via an analog to digital converter) and a memory for storing
`
`digitized voice samples. Optional sensors are coupled to the log for providing for the
`
`input of data for vehicle and cargo, for example, through an external interface, in
`
`particular, a wireless interface. For example, through one external wireless interface,
`
`an EVL may acquire event data such as weight-in-motion (WIM) data. Those who
`
`would obtain access to data or input data are provided with a public key which is
`
`likewise unique to the vehicle log. Moreover, any data entries are signed with an
`
`electronic signature for verifying the entered data,
`
`for example, comprising a
`
`calculated hash value encrypted with the secret key.
`
`When the vehicle is to be used, the driver inserts the removable non-volatile
`
`log memory for the duration of the trip. For example, a driver may obtain access
`
`and log into the EVL by inputing their speech, a password or a biometric after
`
`inserting their card memory. Upon successful verification of the password or
`
`biometric and, if appropriate, verification of the speaker’s identity in a well known
`
`manner, the driver—unique data is used to decrypt a secret key member of a public key
`
`encryption pair. When data is to be logged by the driver, protected data packets
`
`10
`
`15
`
`(PDP’s) containing this log data are generated with digital signatures formed by
`
`20
`
`encrypting digital hash values with this secret key member of the public key pair.
`
`Protected data packets (PDP’s) are transmitted to a requesting user via
`
`electronic means, for example, wireless, telephone modem or a memory card. The
`
`requesting user has a trusted (escrowed) copy of the public key of the above-
`
`referenced public key pair, the public key pair including the secret key (securely
`
`25
`
`stored in and never released from EVL memory) used for forming the electronic
`
`signature. The secret key should be protected and secured as closely as possible and
`
`should not be transmitted (otherwise,
`
`it might be intercepted by an uncertified
`
`individual). The public key is used to verify that the electronic signature of the PDP
`
`is accurate. Correct verification of the electronic signature then confirms the data
`
`30
`
`source (the driver-protected secret key) and the integrity of the data (since the hash
`
`value matches the PDP data).
`
`A governmental authority may obtain access by a defined process. One
`
`Page 001487
`
`
`
`W0 97/13208
`
`PCT/US95/12459
`
`5
`
`example of such a process for obtaining an early transmission of vehicle data in
`
`advance of a border crossing or like event is described by the following. The agency
`
`wishing to receive secure data generates a public key encryption pair different from
`
`that used by the driver and distributes the public key portion to any person or system
`
`desiring to transmit secure data. The public key portion is stored in EVL memory.
`
`A profile of a commercial vehicle and a cargo may be extracted from the vehicle via
`
`a card memory or may be electronically extracted by wireless means prior to the
`
`vehicle’s departure and delivered to the authority with the stored public key portion.
`
`The EVL generates a private encryption key and uses it to encrypt PDP’s with their
`
`corresponding digital signatures. The EVL encrypts this private encryption key using
`the public key and transmits that information to the agency receiving the data. The
`
`receiving agency decrypts the EVL private encryption key using the secret key
`
`portion of the key pair and then decrypts the PDP’s using the decrypted key. The
`
`profile and public key are transmitted via a centralized authority data base to regional
`
`data bases for distribution to checkpoints, port of entry border crossings and the like
`
`along the intended route of the vehicle.
`
`As the vehicle approaches the inspection facility,
`
`the vehicle is polled or
`
`interrogated, for example, preferably by wireless means in advance of reaching the
`
`facility, so the vehicle need not stop its movement. The vehicle transmitted profile
`
`data is compared with the previously transmitted profile data and the inspector may
`
`preclear the vehicle through the inspection station.
`
`If the inspection data is a weigh
`
`station, for example, and data is to be entered into the log by the authority, an
`
`electronic signature is utilized to verify the entered data, preventing subsequent
`
`modifications of the logged information. Moreover, at the time the entry is made,
`
`the vehicle position and time from the global positioning system may be automatically
`
`and simultaneously recorded, allowing detection of fraudulent entries. As the vehicle
`
`crosses the border, a short range communications system may be used to verify that
`
`the vehicle crossing the border is the vehicle which received the preclearnace to
`cross.
`
`It is also possible that the vehicle may carry all the profile information in the
`
`EVL and transmit the data via wireless means to the authority just a few minutes
`
`before the approval (for example, preapproval at a border crossing) event.
`
`In this
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001488
`
`
`
`WO 97/13208
`
`PCT/US95/12459
`
`6
`
`case and in that described above as well, some sort of short-range transmission is
`
`useful as the vehicle crosses the border to physically confirm ‘that
`
`the vehicle
`
`currently crossing the border is the same as the one that provided the profile and
`
`credentials and received preapproval to cross.
`
`An authorized individual such as an inspector or police officer creates a digital
`
`credential in a generating device’s memory, for example, a laptop personal computer.
`
`A secret key of a public key pair is used to generate a digital signature for the
`
`credential data. The credential and signature are transmitted to the EVL using
`
`various means, possibly including wireless means, direct input (typing), or memory
`
`10
`
`card transfer. This transfer may be encrypted as discussed above as desired. for
`
`wireless or other secure data transmission. The credential and signature are formed
`
`into a PDP and logged as described above for the driver data logging operation.
`
`When the credential is subsequently transmitted to a requesting agency, the agency
`
`will use a trusted copy of the public key portion to verify the electronic signature of
`the PDP.
`
`15
`
`Other features and advantages of the present invention will be explained by
`
`reference to the drawings and the following detailed description of the present
`
`invention.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`20
`
`25
`
`30
`
`Figure 1 is an overview drawing of an electronic vehicle log according to the
`
`present invention;
`
`Figure 2A is a system overview drawing showing the interface between a
`
`vehicle 200 carrying an electronic vehicle log of Figure 1 with a governmental or
`
`other authority and Figure 2B shows vehicle 200 with expanded boxes describing data
`
`that may be stored in DPIU 210 including an electronic vehicle log of the present
`
`invention;
`
`Figure 3 is a schematic block diagram of the electronic vehicle log of Figure
`
`1 for maintenance in a vehicle; Figure 3A provides a first embodiment, Figure 3B
`
`provides a second embodiment and Figure 3C provides a third embodiment;
`
`Figure 4A provides an overview of the key and security features of the present
`
`invention in flow diagram form and Figure 4B shows a table showing the use of
`
`different public key pairs by different entities for accessing the data stored in the EVL
`
`Page 001489
`
`
`
`
`
`WO 97113208
`
`PCT/US95/12459
`
`400 of Figure 4A;
`
`Figure 5A provides a table of examples of data maintained‘ in an in-vehicle
`
`data base of memory of the in-vehicle unit of Figure 4; Figure 5B comprises a table
`
`showing data elements and characteristics recoverable through utilization of the
`
`present invention and their characteristics; and
`
`Figures 6A and 6B provide a table showing service, application, technology
`
`or product availability, demonstrable feature and utilization of the present invention.
`
`DETAILED DESCRIPTION OF THE PRESENT INVENTION
`
`Referring to Figure 1, there is shown an overview drawing of the electronic
`
`vehicle log of the present invention. The present device is intended to be placed in
`
`a vehicle, hence,
`
`the present invention is described herein as an in-vehicle data
`
`processing unit. The log is described herein as electronic because it generally
`
`operates via electronic circuits including at
`
`least memory circuits and a data
`
`processor. The present invention is characterized as a log because the memory of the
`
`present invention substitutes for prior art hand-written log books typically used by
`
`drivers of vehicles, especially commercial vehicles.
`
`The electronic vehicle log (EVL) l is described by box la as comprising a
`
`package of elements suitably housed to be mounted in a vehicle, for example, in an
`
`operator compartment or secure area therein or proximate thereto. One mounting
`
`arrangement would be to provide a bracket mounting plate permanently secured to the
`
`vehicle. The EVL housing, herein referred to as a data processing interface unit
`
`(DPIU) then is removably secured thereto by mechanical locking apparatus so that the
`
`DPIU may be removed from the vehicle as necessary. The mechanical locking
`
`apparatus should be tamper-resistant so that the EVL itself cannot be surreptitiously
`
`moved from one vehicle to another without detection.
`
`(To accomplish this objective,
`
`electronic tamper detection may be employed). Preferably, the DPIU housing is
`
`adapted to receive a removable security module as will be further described herein
`
`which is the electronic vehicle log itself.
`
`The EVL housing 1 (DPIU) contains a processor, preferably a microprocessor
`
`and a non-volatile memory coupled thereto for storing at least secret key data, secret
`
`EVL unit serial number data and executable software.
`
`The EVL 1 further may
`
`comprise a random access memory that typically is volatile for storing data on a
`
`10
`
`15
`
`20
`
`30
`
`Page 001490
`
`
`
`W0 97/l 3208
`
`PCTlUS9S/12459
`
`8
`
`temporary basis and a real
`
`time clock (typically a software algorithm that
`
`is
`
`preferably periodically updated). Most processors require a clock "oscillator output
`
`that is controlled for providing processor operation clocking functions. This clock
`
`can provide a clocking input to a real time clock algorithm as is well known in the
`
`art. However, for greater security, an independent clock source may be used or an
`
`internal isolated hardware clock circuit (not shown). A navigation system such as the
`
`Global Positioning System (GPS) or Loran or other system can provide the
`
`independent clock source or periodic indications as to true time for synchronizing a
`
`local real time clock as is likewise known in the art. Of course, another important
`
`10
`
`function of GPS or other known equivalent systems is the provision of periodic
`
`location data in the form of earth latitude and longitude data and even altitude data
`
`that may be compared with a map or intended route and thus provide specific data as
`
`to real
`
`time of day and route location.
`
`A further description of preferred
`
`embodiments of EVL l will be provided in connection with app1icant’s description
`
`15
`
`of Figure 3.
`
`EVL housing 1 has insertable therein a removable non-volatile memory
`
`module 2 described by box 2a which becomes the log in place of known paper logs
`
`or other known electronic logs.
`
`In accordance with the present invention, the log
`
`memory 2 stores secured or protected data packets output from the EVL included
`
`processor as will be further described in connection with Figure 4.
`
`The EVL 1, according to the present
`
`invention, may communicate with
`
`governmental authorities via radio 3, according to box 3a which may be optional or
`
`through wired or other means. Certainly by radio is intended communication via all
`
`radio frequencies including light frequencies or via laser or other known means that
`
`is wireless in nature. As will be further described herein in the example depicted in
`
`Figure 2 of a border crossing, the EVL communicates with an inspection facility for
`
`border preclearance before reaching the border via wireless means, so the vehicle
`
`need not stop.
`
`The EVL 1 may be provided with a display or other output means 4. The
`
`display, as indicated by descriptive box 4a, may be optional. The display may
`
`comprise a liquid crystal display, cathode ray tube display, light emitting diode or
`
`other display. Other output means may comprise a printer or speech synthesis means
`
`20
`
`25
`
`30
`
`Page 001491
`
`
`
`
`
`W0 97/13208
`
`PCT/US95/12459
`
`9
`
`or other output means. All such means provide the user (typically the vehicle
`
`operator) with feedback of proper operation, an indication that the‘vehicle is being
`
`polled, clearance to proceed, log data, if appropriate, and other infonnation.
`
`Controls 5, as described by box 5a, are likewise optional. The controls
`
`typically comprise a keyboard, keypad or related switch control but may comprise
`
`speech receiving means 7 described by box 7a as a microphone such as an electret
`
`microphone or digital microphone. Also, both keys and microphones may be
`
`provided. The microphone may be eliminated if speech input is not contemplated by
`
`one designing a system according to the present invention. The controls may be keys
`
`representing,
`
`for example, numeric or alphabetic characters
`
`for
`
`inputing the
`
`operator's identity, password or other data as will be described further herein.
`
`If
`
`necessary the microphone is coupled to the processor of the present invention via an
`
`analog to digital converter for sampling the voice input and converting the input to
`digital samples.
`T
`
`Finally, in accordance with Figure 1, sensors 6 may be provided which are
`
`only generally described. These may comprise brake sensors, accelerator sensors,
`
`tachometer or mileage sensors, speedometer sensors, steering column sensors, tire
`
`pressure monitoring sensors, cargo bonding sensors, cargo temperature or smoke or
`
`fire sensors, driver alcohol (breath) detection sensors and the like which may be
`
`coupled to EVL 1 by wired or wireless means.
`
`In-transit, cargo and route monitoring data use sensors which are preferably
`
`mounted on the vehicle and locally communicate with the EVL using fixed
`
`communications channels (cabling or short-range radio signals).
`
`Credentials and
`
`event data recording typically requires acquiring data from systems separate from the
`
`EVL housing 1 which are not permanently mounted on the vehicle. For example, a
`
`customs agent may be empowered to record a credential within the EVL which
`
`indicates that paperwork is in place and tariffs paid to allow expedited international
`
`or state border crossings as will be described further in reference to the example of
`
`Figure 2. This credential information is placed within the EVL by any number of
`
`transmission methods and via security means including direct entry, via a removable
`
`credential memory, via direct connection and via radio connection.
`
`In regard to direct entry,
`
`the EVL 1 may provide a keyboard and limited
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001492
`
`
`
`W0 97/l 3208
`
`PCT/US95/12459
`
`10
`
`display for manual entry of the information. This may be relatively tedious and
`
`insecure.
`
`The entry process may include the agent (inspector) specifying an
`
`encryption key, either public or private, which may be used in a signature process for
`
`authenticating entered data. The process may involve speech recognition and voice
`
`entry of the data in combination with a keyboard/display or alone. The process may
`
`further comprise speaker identification or verification processes lcnown in the art for
`
`confirming a subject’s claimed identity based upon a digitized speech sample.
`
`Removable credentials are preferred.
`
`If the EVL memory is removable,
`
`it
`
`may be placed in a data entry device belonging to the agent and the electronic
`
`credential or event data copied into the memory. When the memory device is
`
`replaced into the EVL l, the newly acquired data will be processed as a normal PDP
`
`as described below in connection with Figure 4.
`
`A
`
`Direct connection may be cumbersome. The EVL may be directly cabled to
`
`the agent’s data entry device, using a media such as an RS 232 serial data channel or
`
`equivalent serial or parallel connector. Data processing in this case is comparable to
`
`that when using removable credentials.
`
`Finally radio connection may be preferable for, for example, coupling to
`
`mobile police forces, air such as helicopter carrying radio, or roadside radio polling
`
`stations so the vehicle may transmit in motion. Radio may be used to receive or
`
`transmit credential and event data. One example is a weight in motion (WIM) station
`
`operated by a governmental authority. A WIM sensor may, when interrogated by the
`
`EVL, transmit the vehicle’s weight to the EVL for storage.
`
`As will be further described in connection with Figure 2, an agent uses a
`
`personal computer or workstation to generate,
`
`for example, border crossing or
`
`inspection credential data. An agent-specific secret key is used to embed their
`
`electronic signature within the credential data transferred to the EVL 1. Thus, the
`
`data may not be accessible to the driver or even the vehicle system operator. When
`
`the credential data is later transmitted to an authorizing agent (such as the border
`
`10
`
`15
`
`20
`
`25
`
`crossing inspector),
`
`the corresponding public key is used to decrypt the signature,
`
`30
`
`thereby authenticating the source and permitting preclearance of the vehicle.
`
`Now, referring to Figure 2, one application of the present invention will be
`
`described, namely a border crossing, to demonstrate the interrelationships among the
`
`Page 001493
`
`
`
`
`
`W0 97/1 3208
`
`PCT/US95/12459
`
`1 1
`
`elements of Figure 1 which may be assembled in combination to perform any desired
`
`application of the present invention. Figure 2 generally represents ‘in diagrammatic
`
`form the events at a border crossing of a vehicle 200 equipped with the EVL 1
`
`(Figure 1) of the present invention (represented as box 210). Other applications will
`
`be described subsequently herein. Vehicle 200 may be a truck,
`
`for example,
`
`approaching a border crossing 202 which may be a state or international border along
`
`a route 201. There are three zones of route 201 the vehicle 200 is expected to pass
`
`through.
`
`Zone 205 comprises a reporting zone.
`
`Zone 206 comprises an
`
`evaluation/clearance zone. Zone 207 comprises an inspection zone for performing
`
`a detailed inspection, as necessary, of vehicle 200 or health check of the vehicle's
`
`driver. The arrows on route 201 indicate the expected direction of passage of vehicle
`200.
`
`Referring briefly to Figure 2B, there is shown a typical vehicle 200 and blocks
`
`261-266 summarizing data that may be related thereto. Block 261 describes motor
`
`vehicle data such as ID number, EVL or DPIU identification number and status,
`
`vehicle weight and registration data. Driver data 262 comprises their identification,
`
`their licenses, safety record,
`
`transit log and safety biometrics among other data.
`
`Carrier data 263 includes identification, location, registration, insurance, licenses and
`
`permits, ICC, PUC, USDOT records, violations and offenses and fees paid records.
`
`Cargo data 266 includes trailer identification, invoice, manifest, HAZMAT warnings,
`
`gross and tare weight, export declaration, inspection record, tariff record and crossing
`
`approval data. Together, these data 261, 262, 263 and 266 may be vehicle credential
`
`data as used in the context of the present application.
`
`10
`
`15
`
`20
`
`Transit security block 264 refers to electronic bonding data, route verification
`
`25
`
`data and time-in—travel verification data.
`
`Safety and environmental data block 265 refers to a combination of event data
`
`and in transit data.
`
`In particular, block 265 refers to inspection records, emission
`
`records on-board sensor records and HAZMAT warnings.
`
`Typically at a border 202 or proximate thereto is an inspection facility 203.
`
`30
`
`At the inspection facility, work stations, shown as computer workstations, 204 are
`
`provided governmental employees, such as inspectors. The work stations and/or
`
`inspection facility 203 preferably communicate with vehicle 200 which may be
`
`Page 001494
`
`
`
`W0 97/13208
`
`PCT/US95/12459
`
`12
`
`moving by wireless means. The PC-based inspector workstations 204 are described
`
`by box 220. The workstations function to interface with an interface unit described
`
`by block 210 usually referred to herein as the EVL of vehicle 200 and to roadside
`
`sensors of a polling station (not shown). These sensors respond as a vehicle passes
`
`a polling station in motion to obtain data from the EVL. These may not need be
`
`"roadside" but may be "fly over" and thus mounted in aircraft such as helicopters or
`
`other traveling vehicles such as police vehicles.
`
`In any event, the workstations 220
`
`function to record electronic credentials either downloaded in advance or provided
`
`from the EVL 210 of the vehicle 200. The workstation 204 may interface with
`
`centralized databases to obtain data that is not stored in the workstation as necessary.
`
`Finally,
`
`it
`
`is desirable if the workstations 204 are networked together
`
`for
`
`intercommunication and interchangeability. That is, if one workstation is occupied,
`
`a first spare workstation is allocated to an new incoming vehicle 200 to the system.
`
`The work stations 204 and/or inspection facility 203 generally are provided
`
`with an EVL interface unit for interfacing with the in-vehicle EVL l of vehicle 200.
`
`The functions of this interface unit are described by box 210 which couples the
`
`inspection facility 203 or workstation 204 or both with the EVL resident in vehicle
`
`200. This interface unit carries and provides credentials/manifests/inspection records
`
`collected for a vehicle. The interface unit also collects multi-sensor reports from on-
`
`board sensors on the commercial vehicles such as vehicle 200, for example, on
`
`odometer readings, brakes, cargo bondings and the like as optionally provided.
`
`Moreover, the interface unit provides vehicle to roadside (or fly over) polling stations
`
`communication between the EVL and the governmental employees such as inspectors
`
`and inspection stations such as weight-in-motion measuring stations. The latter data
`
`may be recorded in the EVL as will be described in connection with Figure 4 as
`
`protected data packets. Another function of the interface unit is general information
`
`management and the updating of the EVL data base and records due to governmental
`
`activity. For example, the opportunity for preclearance of a vehicle through an
`
`inspection station is one type of data that may be entered into the EVL. Finally, the
`
`interface unit provides electronic security in accordance with the security features
`
`described by Figure 4. Communications to and from the vehicle 200, especially if
`
`wireless, are preferably secured from interception by coding and/or encryption as
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001495
`
`
`
`W0 97/13208
`
`desired.
`
`1 3
`
`PCT/U S95/l 2459
`
`In operation, a vehicle 200 moves along route 201 into a reporting zone 205.
`
`The vehicle 200 may initiate radio contact with inspection facility 203 or the vehicle
`
`may be polled via roadside or other monitors. Meanwhile, manifests for the vehicle
`
`and associated data are preferably electronically downloaded by a broker (a carrier
`
`or other party) for storage at the facility 203. Current manifests of expected vehicles
`
`are provided to individual inspector workstations 204. Responsive to a polling signal
`
`or associated with a request for preclearance initiated by the vehicle, the vehicle data
`
`of particular vehicle 200 is provided via wireless means to inspection facility 203 and
`
`compared at workstations 204 with downloaded data, such as manifest data. On-
`
`board the vehicle, the driver may be provided with a display indicating the EVL is
`
`being monitored and thereby reported to him. Moreover, a report or record of the
`
`monitoring activity may be stored in the EVL along with a real time of day and
`
`location indication as will be subsequently described herein.
`
`The vehicle then enters an evaluation/clearance zone 206. The governmental
`
`authority such as an inspector assesses the records/data obtained from the EVL at his
`
`workstation 204.
`
`If the inspector is satisfied, the inspector communicates a bypass
`
`or, if not satisfied, a no-go signal to the truck. Of course,
`
`the EVL records and
`
`updates itself according to the bypass or no-go signal. As the vehicle approaches the
`
`border 202, roadside monitors may poll the vehicle in transit as it crosses the border
`
`to assure that the vehicle crossing the border is in fact the vehicle given preclearance
`
`to cross. There exists the possibility that preclearance may not have been received
`
`in a timely manner even though preclearance could have been granted as the vehicle
`
`enters the inspection area 207. Vehicles not receiving timely preclearance and
`
`vehicles whose credentials are suspect may be signaled to stop in inspection zone 207.
`
`As the vehicle 200 moves it will enter a detailed inspection area indicated as
`
`such on route 201.
`
`Inspection zone 207 corresponds thereto and, at the area, a
`
`detailed inspection of vehicles which fail or do not timely receive preclearance
`
`occurs. Vehicles which may not receive preclearance (not permitted to bypass the
`
`station) may include those providing a cargo bonding breakage signal, an indication
`
`of improper or errored credentials or manifest data and the like or presenting safety
`
`issues such as faulty brake or related signals. Whether or not monitored, driver
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001496
`
`
`
`W0 97/1 3208
`
`PCT/US9S/12459
`
`14
`
`health issues may also be checked (for example, vision or drug/alcohol levels). The
`
`inspections may be random, i.e., ordered as a result of proper data reporting but
`
`nevertheless a no-go signal is signaled to the particular vehicle 200.
`
`If the vehicle
`
`safety, driver health or driver safety (overspeed or erratic activity) are signaled as
`
`problematical, each of these in turn may be checked or inspected.
`
`Thus, as described above, an embodiment of the present
`
`invention may
`
`provide for a vehicular data processing method for use by a vehicle in crossing a
`
`border comprising the steps of initiating a request for preclearance or automatically
`
`receiving a polling signal; responsive to a polling signal, transmitting at least vehicle
`
`credential data; and receiving a bypass signal or a stop signal,
`
`the bypass signal
`
`indicating that the vehicle may pass and the stop signal indicating the vehicle must
`
`stop.
`
`Preferably the data is transmitted in a secure manner as will be further
`
`described in connection with Figure 4. Other related methods that will be further
`
`described herein include the automatic monitoring of safety equipment, driver
`
`credential, driver health or driver safety by police, the automatic monitoring of cargo
`
`bonding devices and cargo temperature, cargo weight, tariff payment and the like.
`
`Now referring to Figure 3A, there is shown one alternative embodiment of an
`
`electronic vehicle log according to the present invention. A further embodiment is
`
`described by Figure 3B and yet a third embodiment is described by Figure 3C. From
`
`a study of each embodiment, one of skill in the art will be prepared to design an
`
`electronic vehicle log for a particular application and/or vehicle type and,
`
`in
`
`accordance with Figure 4, design an appropriate security method and means
`
`depending on the level of security desired.
`
`Figure 3A shows an in—vehicle data processing interface unit. Box 300
`
`exemplifies a housing for housing components of an EVL according to the present
`
`invention. The EVL system apparatus 300 includes, for example, a radio or other
`
`vehicle-to-roadside, vehicle-to-vehicle or vehicle-to-aircraft communications apparatus
`
`301. Examples of short range devices that may be used include :1 Hughes Radio or
`
`Mark IV (MkIV) units or other similar radio systems known in the art or so—ca1led
`
`automatic vehicle identification units. Longer range communication may be cellular
`
`radio via telephone modem or 220MHz radio manufactured by Scientif1c—Atlanta and
`
`other suppliers. Also, Qualoomm Omnitrax provides longer range communications.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 001497
`
`
`
`W0 97/l 3208
`
`PCT/US95/12459
`
`15
`
`.
`
`Apparatus 301 is coupled between a suitable antenna (via link 309) and computer
`
`processing unit 302. Similarly situated is systems applications apparatus 303 for, for
`
`example, receiving GPS or Loran or other location and time update data via an
`
`antenna via link 310. Other functions of apparatus 303 include security and built-in-
`
`test (BIT) test circuitry. Processing set 302 and systems applications apparatus 303
`
`may be powered by the vehicle battery via a 12-volt power inverter or other circuitry
`
`304. Computer processing set 302 houses the processor, non-volatile (software
`
`algorithm) memory, PCMCIA (card or module) receiver, analog/digital interfaces as
`
`necessary, operator/machine interfaces as necessary and built—in test circuitry. The
`
`plug-in security EVL module is represented by both 307a and 308a for storing fixed
`
`and variable data respectively via respective links 307 and 308. Fixed data 307a of
`
`an EVL includes and should not be considered to be limited to include cab
`
`identification data, truck line identification data, registration data, location data and
`the like.
`
`Variable data 308a may be considered to include and not be limited to
`
`include driver identification data, trailer identification data, load identification data,
`
`route data, initial weight data, credentials and fees data, hazardous material data and
`
`safety inspection data.
`
`10
`
`15
`
`Of course, one purpose of the device 300 and log 307a, 308a is to provide via
`
`20
`
`antenna(s) 309 certain outputs 310a responsive to certain external inputs 309a. Inputs
`Once the
`
`309a comprise the polling request and the identification of the poller.
`
`polling request is made, data returned a