throbber
United States Patent [19]
`Rackley
`
`[11] Patent Number:
`[45] Date of Patent:
`
`4,742,357
`May 3, 1988
`
`[54] STOLEN OBJECI‘ LOCATION SYSTEM
`[76] Inventor: Ernie C. Rackley, 1704 Rock?eld,
`Troy, Mich. 48098
`[21] Appl. No.: 908,156
`.
`.
`sep' 17’ 1986
`[22] Elm‘
`[51] Int. Cl.‘ .............................................. .. G015 3/02
`[52] US. Cl. .................................. .. 342/457; 342/450;
`342/463; 342/383
`
`[56]
`
`of Search ....................... ..
`342/457, 450, 463-465, 387, 389, 45, 455, 456
`References Cited
`U‘s' PATENT DOCUMENTS
`Re. 31,962 7/1985 Brodeur ............................ .. 342/389
`3,646,530 2/ 1972 Fuller ct 81-
`' 342/457 X
`3,665,312 5/1972 Jar‘"§_ ------ "
`32/61)‘
`3’747’1o4 7/1973 Panslm ‘ ‘ ' ‘ ' ‘ '
`' ' ' ' "
`2/ 57
`3,886,554 5/1975 Braun et al.
`342/457
`4,023,176 5/1977 Lume et aL n
`342/457 X
`4,145,692 3/1979 Armstrong at a’
`____ __ 342/173
`4,177,466 12/1979 Reagan ............ ..
`340/63 X
`4,229,620 10/1980 Schaible
`342/457 X
`4,494,119 V1935 wimbush
`---- ~ 342/ 457
`
`Assistant Examiner—-Tod R. Swann
`‘$13212; £53?’ or Flrm_James R‘ Ignatowskl; Remy
`'
`P
`ABSTRACT
`[57]
`A stolen object location system having a base station, a
`location network and an object unit which is associated
`with the object to be located. The location system is
`capable of operating in a plurality of different location
`modes ranging from simple triangulation to LORAN.
`The base Station’ upon being noti?ed that the Object has
`been stolen, will transmit a locate request message to
`the1 032cc: unit specifying the locaticfin?rlnode) ‘to in used
`e 0 _]CC unit’s
`e ransmisslon requency o
`an
`transmitter. An electronic control in the object unit will
`control the operation of the object unit’s receiver and
`transmitter in accordance with the location mode and
`transmission frequency speci?ed in the locate request
`message. The electronic control will also initiate the
`.
`.
`.
`.
`.
`transmissioniof an alarm message if the object unit loses
`communicatlon with the base station, and is capable of
`transmitting a tattle-tale message, effectively relaying
`the alarm message of another object unit if the base
`station does not respond to the other object unit’s alarm
`
`4,638,294 l/ 1987 Sakurai . . . . . .
`. . . . . . .. 340/63
`4,651,157 3/1987 Gray et a]. .................... .. 342/450 X
`Primary Examiner—-Thomas H. Tarcza
`
`message_
`
`36 Claims, 10 Drawing Sheets
`
`30“
`
`si/iiinw
`A
`
`LOCATION
`NETWORK
`
`/A
`
`VEHICLE
`UNIT
`
`GOOGLE 1015
`Page 1
`
`

`
`US. Patent
`
`May 3, 1988
`
`10
`Sheet 1 of
`
`4,742,357
`
`30K BASE .
`STATION
`A
`
`l______‘
`' LOCATION
`NETWORK
`
`mp4
`
`VEHICLE
`IT
`
`REC3
`
`‘.SE
`ION
`
`GOOGLE 1015
`Page 2
`
`

`
`US. Patent May3, 1988
`
`Sheet20f10
`
`4,742,357
`
`V
`
`2
`/ \
`I
`‘RECEIVER
`
`‘
`
`/4
`//
`I
`ECO
`I
`
`SS,
`
`/<9
`
`I
`I
`LORAN
`RECEIVER
`
`'
`
`i
`
`ILLEGAL ENTRY
`TRANSMITTER
`I
`L22 7
`PERSONAL
`RECEIvER L ‘
`24
`
`ILLEGAL ENTRY
`OETECTOR
`(
`\20
`
`_
`/F/ _ 5
`9
`
`. V
`/6
`(
`\
`TRANSNIT ER
`I
`T
`26
`A
`V‘SUAL //
`OISPLAY
`
`(/0
`
`V
`
`V
`
`30
`
`34)
`I TRANSMITTER
`I
`
`RECEIVER
`I
`
`36
`
`OPERATOR
`
`ECO
`
`
`
`= 38-)
`
`DECODER
`
`40
`f
`
`» TRANSLATOR 46“
`
`42
`1
`K if
`CRT
`
`‘4"
`
`_
`
`/ 66
`-!
`PA
`
`T
`
`\,.
`“
`5
`1/”
`
`I/64
`(62
`M
`CRT
`7,1
`6Q RECOVERY UNIT
`/72
`68\
`'
`I
`PORTABLE”
`i % <1
`L‘) ,‘L
`‘
`D.F.
`70
`MOBILE ONIT
`VCC
`q
`
`V
`NC DATA
`OATA CLOCK
`CODET
`S-R-E-
`“I
`©——* M1 R0 -———+@
`PHASE
`PROCESSOR W204 L885
`_—’@ E C‘TRCUIT SOOELCR CTR.
`10.2A MHZ %

`(E)
`
`lHg-6
`
`---—-—
`
`44-41‘
`N
`LOCATION
`NETNORR
`L50
`
`ALIOIO
`
`200—\
`
`xTAL
`
`[202 ,
`PD
`M206
`
`Ii'g?._-_>fm vCOv WWW->65)
`% lFlg 8
`%
`- i
`
`. _
`
`i: T
`
`GOOGLE 1015
`Page 3
`
`

`
`US. Patent
`
`May 3, 1988
`
`Sheet 3 0f 10
`
`4,742,357
`
`\ -E
`
`7
`
`
`
`M w: ms - Nil M 1 AW
`
`H; 7:; . HE “E
`
`3 %% VZQ g ‘ 8: .||@
`
`
`Q3 mm mm 5 who
`
`@ mm % \%Q
`@l flit‘ x? U8
`
`GOOGLE 1015
`Page 4
`
`

`
`U.S. Patent
`
`May 3,1988
`
`Sheet 4 of 10
`
`4,742,357
`
`mmz_H
`
`_:o-mzH
`
`
`
`zomzfizzm<4<
`
`ohmmz<:Q
`
`a.mz<zzou
`
`ammm
`
`mu<4¢Q<53
`
`><4¢mHa
`
`><4¢mHa
`
`zomw<mmmz
`
`oH_moz<IU
`
`zm<4<
`
`_ammL
`
`
`
`
`
`m4<H:m4HH<Hmzfikaomm4aHm>H4<-mmm¥
`
`.11:«I:mmz_~
`
`
`
`
`
`mw<4¢moz<:ummokmwm<mm
`
`PflzxckQm>Hmumm
`
`
`
`
`
`m4<+m4He<Hmm<mmmz
`
`A...
`
`WNW
`
`
`
`m>H4<-mmm¥mapqbmgoHmmmmm4<»-m4Hh<H
`
`.41:
`
`pmqhmmm
`
`
`
`moimmzflg
`
`m>H4<-mmm¥
`
`mmzfik
`
`
`
`
`
`<1¥¢_m:H<Hm.0no<+<m
`
`
`
`Hmqkmmxzmqqqmoz<:uw.z__.>mmoem
`
`opmwz<:uu4+~<»maz<Iumw<4LHum
`
`
`
`
`
`zm<4<mw&ww:H<»mm4<Hummwmom
`
`
`
`.emm¢_a.ammLHm4<F-m4»F<+
`
`
`va&wzm<4<mmmwm4<F:m4H+<e
`
`
`opmoz<IuHm<pm
`
`
`
`.amz¢xmzfih
`
`.amm¢
`
`Q»moz<:u
`
`a.Qz<zzou
`
`mH<og
`
`Hmmaemm
`
`momxumzo
`
`azm
`
`Fmmsamm
`
`.amm¢
`
`ohmozqxu
`
`mmmzqzzou
`
`moo:
`
`a.zoummm
`
`H_:mz<mH
`
`GOOGLE 1015
`Page 5
`
`

`
`US. Patent May 3,1988
`
`Sheet 5 0f 10
`
`4,742,357
`
`IDLE
`ROUTIN
`
`UPDATE ALL
`ACTIVE
`TIMERS
`
`254
`,_/
`
`258\
`CLEAR PASS
`COUNTER
`
`/276
`
`SET FLAG FOR
`TATTLHALE
`TRANSMIT
`REQUEST
`T
`
`' TA$%LS.ETTALE TIMER V278
`
`
`
`SET MESSAGE
`STATUS & FLAI5~262
`FoR TRANSMIT
`
`F
`TRANSMITTER
`260 ON START SYNC
`\ PATTERN
`
`I
`
`I
`
`ENCODE v.I.N.
`252
`\ & ALARM CODES
`A
`254\ DELAY T0 NEXT
`+
`
`INg/RgISIENT
`
`COUNT
`
`266~
`
`_
`
`.268
`
`N
`
`270
`294_ \ I
`TRANSMITTER
`OFF
`
`READ
`
`INEL-JT
`ROUTINE
`
`RESTART
`J MERE/NAIF
`272
`LONG NAIT
`
`' CHANGE T0
`288 FREQ REIID BY
`\BASE STATION
`
`‘
`RESET ALARM
`WINDOW
`2901
`TIMER
`
`A
`
`V
`
`GOOGLE 1015
`Page 6
`
`

`
`US. Patent
`
`May 3, 1988
`
`Sheet 6 of 10
`
`4,742,357
`
`CLEAR INPUT.
`MESSAGE
`BUFF:R
`
`START
`
`FIIEAMB LE ' U 'NIMUM TIME
`
`PM
`
`304
`
`:aa?-\,/ STIE\\\‘
`'0' BIT “
`FREQ.
`?
`
`324
`
`Y
`
`P REAMB LE
`’ 0' TIME
`COMPIEETE
`Y
`
`326
`
`PREAl‘S’|RfiET’l'
`SEARCH TIMER
`
`I
`
`328
`Y
`
`~
`
`3E”?
`
`I
`I
`BIT
`FREQ.
`
`I REAES
`BYT
`
`I
`
`N
`///
`,/‘x.
`*E,_
`:
`///1“/-AMBLE ~
`1' SEARCH “
`‘\\\ T1ME¢OVER
`
`‘
`
`E
`
`'\\\\
`\\
`MIN.
`1
`N
`‘E
`MESSAGE "; ‘
`LEN. TIME
`"J E1
`A SP0NE2E'“”
`320
`If
`
`.
`
`2/0
`
`:)-7]
`DLE
`uryu
`
`I
`:1
`-1:
`
`I
`E R0
`
`GOOGLE 1015
`Page 7
`
`

`
`US. Patent May 3,1988
`
`Sheet 7 0f 10
`
`4,742,357
`
`READ
`BYTES
`
`SET BIT &
`BYTE FRAME ~334
`COUNTER
`
`BYTACTRTTNE 362
`RAM POINTER
`
`CLEAR BIT/ /346
`BYTE COUN
`
`BIT FREQ.
`
`STOREIDAT
`A
`YTE /350
`VALUE IN B
`REGISTER
`
`1
`
`UPDATE BI
`BYTE COUN T/ ~352
`
`,224
`DEFINE
`MESSAGE
`
`GOOGLE 1015
`Page 8
`
`

`
`US. Patent
`
`May 3, 1988
`
`Sheet 8 of 10
`
`4,742,357
`
`C
`
`E A L T
`
`3 3
`
`D E N L
`
`\ \ \
`
`6 00 U
`
`
`RUU ATT! I 0 AOB CT R
`SDLLI CEM LT
`TE! NLI DU
`
`
`
`0 A E CTR LTIR N
`
`GOOGLE 1015
`Page 9
`
`

`
`US. Patent May 3, 1988
`
`Sheet 9 0f 10
`
`4,742,357
`
`ALAR
`
`D TNR
`AHWM
`RIE
`
`\
`CHANGE ALARM
`51/8
`MESSAGE FLAGS
`MESSAGE SENT
`
`CHANGE TO
`ALARM FREQ.
`
`M404
`
`CHANGE TO
`REQ' D FREQ. \408
`
`GOOGLE 1015
`Page 10
`
`

`
`US. Patent
`
`May3, 1988
`
`Sheet 10 of 10
`
`4,742,357
`
`~42a
`
`#79745
`
`I
`
`I
`
`r434
`
`
`
`E'T TII-IER
`
`1
`
`448-’
`
`ENABLE EcRD I
`I
`I
`A I
`TRAé?RAISIELO‘
`
`E
`
`IIIRDDII TIIIE
`OVEP
`N
`
`-
`
`II I
`
`442“ TRAIEISIIIIT
`
`RECEIVER
`I
`RE D GEO A36
`
`IIEITIRR ST‘DRE'
`444v FLQEQS/MIEEN-
`T
`AS SENT
`TRANSMIT /438
`STDRED
`GEO. REF. DATA
`
`I
`FLAG LORAN
`DATA
`
`AS SENT
`
`/440
`
`<
`IDLE
`RDuTI-IIE ~20
`
`Y
`A
`
`FIE/SAG EACIHO
`
`SE. T
`
`I
`
`.
`
`/456
`DISABLE ECHO
`TRAACIEMIDN
`l
`
`GOOGLE 1015
`Page 11
`
`

`
`1
`
`STOLEN OBJECI‘ ‘LOCATION SYSTEM
`
`4,742,357
`
`2
`a ground station from the time a location request signal
`is received at each of the three satellites. The well
`known passive LORAN (Long Range Navigation) sys
`tem is still another method that may be used to deter
`mine a vehicle’s location.
`Although the various location techniques are well
`known, the utilization of these techniques for the loca
`tion of a stolen vehicle or object have not been fully
`exploited by the prior art, nor does the prior art teach a
`location system in which the transmission times by the
`vehicle mounted unit are not very short, difficult to
`detect, and dif?cult to jam or confuse.
`
`BACKGROUND OF THE INVENTION
`1. Field of the Invention
`The invention is related to the ?eld of radio location
`systems and, in particular, to a system for locating sto
`len objects or objects removed from the owner’s posses
`sion.
`2. Description of the Prior Art
`One of the major problems facing the owner of an
`object or item having any value is the fact that there is
`a relatively high probability of it being stolen. In partic
`SUMMARY OF THE PRESENT INVENTION
`ular, automobiles, trucks, the contents of trucks, air
`craft, boats, and various types of off-road vehicles are
`The invention is a system for the location of an ob
`the primary targets of thieves. These vehicles may be
`ject. The system includes an object unit associated with
`moved a considerable distance in a very short time,
`the object to be located, a location network, and a base
`making recovery dif?cult, if not impossible. This prob
`station. The object unit has at least one receiver for
`lem has been further aggravated in recent years by the 2
`0 receiving locate request messages and echo pulses trans
`advent of the so called “chop shops” in which a stolen
`mitted by the base station, a variable frequency trans
`vehicle may be disassembled for parts in less than one
`mitter for transmitting messages and relaying the re
`hour, extinguishing any hope of recovery.
`ceived echo pulses, and an electronic control for con
`As is known, it is almost impossible to prevent the
`trolling the operation of the receiver and the variable
`vehicle from being stolen. Experienced thieves can
`frequency transmitter in response to the information
`break into a locked vehicle and drive it away in less than
`contained in the locate request message. The informa
`a minute while others have used a tow truck to steal the
`tion contained in the locate request message includes at
`vehicle. It, therefore, would be advantageous to locate
`least an identi?cation number uniquely identifying the
`the vehicle as soon as possible after it has been stolen to
`object unit associated with the object to be located, a
`prevent it from being disassembled in a “chop shop”,
`temporarily hidden for subsequent resale, or trans
`mode code identifying one of at least two different
`location methods to be used to locate the object, and a
`ported out of the state. In many of these cases, and in
`frequency code identifying the transmission frequency
`particular in the case of the “chop shop”, the owner or
`the police may have less than an hour to locate the
`of the variable frequency transmitter. The electronic
`vehicle if there is to be any hope of recovery.
`controller has means responsive to the identi?cation
`This problem is addressed by the auto theft detection
`number contained in the locate request message being
`system taught by Reagan in U.S. Pat. No. 4,177,466. In
`the same as its own identi?cation number to activate the
`Reagan’s theft detection system, each vehicle is identi
`object unit, means for placing the receiver and transmit
`?ed by a unique code and each vehicle has a transpon
`ter in the location mode identi?ed by the mode code
`der responsive to its unique code to transmit a continu
`and to change the transmission frequency of the vari
`ous locating signal. A plurality of location stations hav—
`able frequency transmitter to the frequency identi?ed
`ing proximity detection receivers and/or direction ?nd
`by the frequency code. The location network cooper
`ing receivers, will generate signals indicative of the
`ates with the messages and signals transmitted by the
`proximity of the vehicle to a particular location station
`base station and the object unit to generate signals and
`or the direction of the vehicle from each of a plurality
`messages to be used to determine the object’s location.
`of receivers so that its location can be determined.
`The base station includes a transmitter for transmitting
`Another location system is taught by Jarvis in U.S.
`the location request messages and the echo pulses, a
`Pat. No. 3,665,312. In Jarvis’ system, a radio alarm is
`receiver for receiving the messages and relayed echo
`activated by an illegal entry detector. Upon the detec
`pulses transmitted by the object unit and an operation’s
`tion of an illegal entry, the detector will activate a mul
`controller responsive to external inputs for ‘activating
`tiple frequency transmitter to transmit a coded signal
`the transmitter to generate the locate request messages
`which uniquely identi?es that particular vehicle. The
`and responsive to the messages and echo pulses re
`transmitter will sequentially shift the transmission fre
`ceived from the object unit and the messages generated
`quency at predetermined and different time intervals.
`by the location network to determine the location of the
`The transmitted signals are received by a plurality of
`object.
`direction ?nder receivers which permit the location of
`55
`One advantage of the location system is that it is
`the vehicle to be determined.
`capable of using several different location modes and
`In addition to proximity detectors and direction
`can be used even if one or the other mode is inoperative
`?nder receivers, various other methods are available for
`so that at least one location method is always available.
`radio location of a transmitting source. Wimbush, in
`Another advantage of the location system is that the
`U.S. Pat. No. 4,494,119, discloses a distress radio loca
`tion system in which remotely located slave repeaters
`transmissions by the object unit are short and at differ
`report the strength of a received distress signal to a
`ent frequencies and, therefore, are difficult to detect and
`jam. Another advantage of the location system is that
`central station. The central station computes the vehi
`cle’s location from the strength of the distress signal at
`the power level of the object unit may be changed to
`each of the various slave repeaters. GEOSTAR is an
`enhance the accuracy of the location system when using
`other type of location system using three remotely posi
`direction ?nding receivers.
`tioned satellites. As described in Popular Science, Febru
`These and other advantages of the stolen object loca
`ary 1984, pp 76-78 and 130, the location is computed by
`tion system will become more apparent from a reading
`
`15
`
`40
`
`45
`
`60
`
`GOOGLE 1015
`Page 12
`
`

`
`5
`
`20
`
`25
`
`4,742,357
`4
`3
`?cation number, to the direction ?nding receivers. The
`of the detailed description in conjunction with the
`drawings appended hereto.
`direction ?nding receivers will lock on to the message
`transmitted by the vehicle unit 10 and each generate a
`BRIEF DESCRIPTION OF THE DRAWINGS
`message which is communicated to the base station 30.
`These messages will contain data indicative of the direc
`FIG. 1 is a block diagram showing the basic elements
`tion from which the transmission was received. The
`of the location system of the present invention;
`data transmitted by the receivers will correspond to the
`FIG. 2 is a block diagram of the location system in
`angle measured from a reference direction, such as true
`the direction or distance-triangulation location modes;
`north, as shown in FIG. 2. For example, the directional
`FIG. 3 is a block diagram of the location system in
`receiver RECI will transmit the angle 01, REC2 will
`the distance-direction location mode;
`transmit O2, and REC3 will transmit 03. The base sta
`FIG. 4 is a block diagram of the location system in
`tion 30, knowing the location of the three direction
`the LORAN location mode;
`?nding receivers RECl, REC2, and REC3, and the
`FIG. 5 is a block diagram of the vehicle unit 10;
`angles at which each receives the signal transmitted
`FIG. 6 is a block diagram of the base station 30;
`from the vehicle unit 10, can compute the exact location
`FIG. 7 is a circuit diagram of the vehicle unit’s re
`of the vehicle using a well-known triangulation algo
`ceiver and transmitter;
`rithm. This location can then be converted to the grid
`FIG. 8 is a block diagram of the ECU 14;
`coordinates of a map identifying the location of the
`FIG. 9 is an overall flow diagram of the system;
`vehicle. As is possible, the vehicle may be suf?ciently
`FIG. 10 is a ?ow diagram of the idle routine;
`FIG. 11 is a flow diagram of the read input routine;
`close to one or more of the direction ?nding receivers
`such that the transmitted signal will saturate their direc
`FIG. 12 is a flow diagram of the read bytes routine;
`tion ?nding receivers and degrade its angle detection
`FIG. 13 is a ?ow diagram of the de?ne message rou
`accuracy. In this case, the direction ?nder receiver will
`tine;
`transmit a code to the base station signifying that its
`FIG. 14 is a ?ow diagram of the keep alive routine;
`receiver was saturated. In response to this code, the
`and
`base station 30 will transmit another message to the
`FIG. 15 is a flow diagram of the location request
`vehicle unit 10 requesting that it repeat its transmission
`routine.
`at a reduced power level. This procedure will be re
`peated until none of the direction ?nding receivers
`report a saturated condition, insuring maximum accu
`racy of the measured angle.
`The second mode is a distance-triangulation (DST)
`mode in which the distance of the stolen vehicle is
`measured from three remotely located receivers, such
`as receivers RECl, REC2, and REC3, in FIG. 2. In this
`location mode, the base station 30, upon being noti?ed
`that the vehicle is stolen, will transmit a message to the
`vehicle unit 10. This message will contain at least the
`vehicle identi?cation number, a ?ag or code identifying
`the location method as the distance-triangulation mode,
`and the frequency at which the vehicle unit 10 is to
`transmit. This same information is transmitted to the
`three receivers so they can adjust their reception fre
`quency to the same frequency. In response to this mes
`sage, the vehicle unit 10 will activate an echo channel
`and await the transmission of an echo pulse by the base
`station 30. After a short period of time, the base station
`30 will transmit an echo pulse which is received by the
`vehicle unit 10 and the three remotely located receivers.
`The vehicle unit 10 will echo pulse to the three receiv
`ers after a predetermined delay. Each of the receivers
`will start a timer in response to the echo pulse transmit
`ted by the base station 30 which will be stopped in
`response to receiving the echo pulse retransmitted by
`the vehicle unit 10. Each receiver will report to the base
`station 30 the time between the reception of the echo
`pulse transmitted by the base station 30 and the echo
`pulse transmitted by the vehicle unit 10. The base sta
`tion will then be able to determine from these time
`measurements the distance of the vehicle unit from each
`of the three receivers.
`The third location method that is capable of being
`used by the vehicle unit 10 is a distance-direction mea
`suring (DDM) mode, illustrated in FIG. 3. In this loca
`tion mode, the location network includes a single direc~
`tion ?nding receiver REC4 located adjacent to the base
`station 30, to prevent ambiguity. The direction ?nding
`receiver REC4 may be one of the three direction ?nd
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`The location system-will be described with reference
`to a stolen vehicle; however, the location system is not
`limited to stolen vehicles, but may be used to locate any
`object which may be stolen or removed from the own
`er’s posession. FIG. 1 is a block diagram of a stolen
`vehicle location system. The system includes a vehicle
`unit 10 which is mounted in the vehicle which is to be
`located, a stationary base station 30 having a transceiver
`capable of communicating with the vehicle unit 10, and
`a location network 50 capable of receiving transmis
`sions from or transmitting to the vehicle unit 10 for
`location purposes. The vehicle may be an automobile,
`truck, aircraft, boat, or off-road vehicle. The location
`network 50 may consist of one or more receivers or
`transmitters, which are in direct communication with
`the vehicle unit 10 and/or the base station 30 as shall be
`explained hereinafter.
`The vehicle or object unit 10 is capable of operating
`in at least two, but preferably three or four, different
`types of location modes upon command from the base
`station 30. The ?rst location mode is a direction-triangu
`lation (DRT) mode in which a transmission by the vehi
`cle unit 10 is received by a location network, which
`consists of at least three remotely located direction
`?nding receivers designated RECl, REC2, and REC3,
`as shown in FIG. 2. In this vehicle location mode, the
`base station 30, upon being noti?ed that the vehicle is
`stolen, will transmit a message to the vehicle unit 10.
`This message will contain, at least, a vehicle identi?ca
`tion number uniquely identifying the stolen vehicle, a
`?ag or code identifying the location method as the
`direction-triangulation mode, and the frequency at
`which the vehicle unit 10 is to transmit. The same infor
`mation is also transmitted to the direction ?nding re
`ceivers so that they can adjust their reception frequency
`to the vehicles unit’s transmission. In response to this
`message a transmitter in the vehicle unit 10 will transmit
`a short message, normally containing the vehicle identi
`
`45
`
`50
`
`55
`
`65
`
`GOOGLE 1015
`Page 13
`
`

`
`5
`
`25
`
`30
`
`4,742,357
`5
`ing receivers REC], RECZ, or REC3, used in the trian
`gulation method illustrated in FIG. 2, or a separate
`direction ?nding receiver. As before, the base station
`30, upon being noti?ed that the vehicle has been stolen,
`will transmit a message to the vehicle unit 10 which,
`again, will contain its vehicle identi?cation number, a
`flag or code identifying the location mode as the dis
`tance-direction measuring mode, and a code specifying
`the frequency at which the vehicle unit 10 is to transmit.
`In response to this message, the vehicle unit 10 will
`activate its echo channel and await a second transmis
`sion by the base station 30. After a short period of time
`the base station 30 will transmit an echo pulse and simul
`taneously start a timer. As in the distance-triangulation
`method, the vehicle unit 10 will receive the echo pulse,
`then retransmit it back to the base station 30 after a
`precise ?xed period of time. The timer in the base sta
`tion 30 will measure elapsed time between the transmis
`sion of the echo pulse and the receipt of its transmission
`from the vehicle unit 10. The base station 30 will then
`subtract the precise delay period from the elapsed time
`and compute the distance “d” of the vehicle from the
`base station 30. The algorithm for computing distance
`“d” is the same as used for radar ranging, which is well
`known in the art. Simultaneously, the direction ?nder
`receiver REC4 will measure the angle 04, which is the
`direction of the vehicle from the base station 30. Know
`ing both the direction and distance of the stolen vehicle
`from the base station 30, its position can be converted to
`map coordinates for pin-pointing its location.
`The fourth method for locating the vehicle is based
`on the well known LORAN (Long Range Navigation)
`system developed by the Coast Guard during World
`War II. In this mode, the location network 50 includes
`a master transmitter MTX and two remotely located
`slave transmitters SXl and SX2 as shown in FIG. 4. In
`the LORAN location mode, the base station 30, in re
`sponse to being noti?ed that the vehicle is stolen, trans
`mits a message to the vehicle unit 10 in which the loca
`tion method is identi?ed as the LORAN location mode.
`The base station 30 will then wait until it receives loca
`tion data transmitted by the vehicle unit 10. The vehicle
`unit 10, in response to receipt of the message from the
`base station 30, will activate a LORAN receiver 18 as
`shown in FIG. 5. The LORAN receiver 18 is of a type
`corresponding to those commercially available for pri
`vate aircraft or small boats. In the LORAN system, the
`master transmitter MTX will repeatedly transmit a mas
`ter pulse signal at a known repetition rate. The two
`slave transmitters, SX1 and SC2, will also transmit slave
`pulse signals at predetermined times after the master
`pulse signal is transmitted. The delay times of the slave
`pulses are differnet so that the LORAN receiver can
`distinguish between the two. Using the well known
`LORAN algorithm, the LORAN receiver 18 will deter
`mine its geographical position with respect to the mas
`ter and salve transmitters which are stored in the vehi
`cle unit 10, then transmitted back to the base station 30.
`The base station 30 will then convert this location data
`to map coordinates.
`The stolen vehicle unit 10 may also have a alarm
`mode of operation in which, for some reason, the vehi
`cle unit 10 is no longer able to communicate with the
`base station 30. This may be caused because the vehicle
`is taken outside the range of the base station’s transmit
`ter or because the vehicle unit’s antenna or receiver is
`disabled.
`
`6
`In the operation of the stolen vehicle location system,
`the base station 30 periodically transmits a “keep alive”
`signal received by each vehicle having a vehicle unit 10.
`In response to the “keep alive” signal, the vehicle unit
`10 sets a “keep alive” timer, which will time out at a
`predetermined time which is slightly longer than the
`interval between the “keep alive” signals. As long as the
`vehicle unit 10 keeps on receiving “keep alive” signals,
`its “keep alive” timer is reset before it times out and the
`system remains passive. However, if the vehicle unit 10
`for any reason fails to receive a “keep alive” signal, its
`“keep alive” timer will time out and activate the vehcile
`unit 10 to transmit an alarm message containing the
`vehicle identi?cation number and an alarm code.
`Any vehicle within the transmission range of the
`vehicle transmitting the alarm message will receive and
`temporarily store the alarm message and set a tattle-tale
`timer. It then will wait a predetermined period of time,
`determined by the tattle-tale timer, for a response by the
`base station 30 to the alarm message. If the base station
`30 responds by sending a locate request message con
`taining the vehicle identi?cation number contained in
`the alarm message, the other vehicle units 10 temporar
`ily storing this alarm signal will dump it since they
`know the alarm message was received by the base sta
`tion 30. However, if the other vehicle units 10 do not
`receive a locate request message containing the vehicle
`identi?cation number contained in the alarm message
`before their tattle-tale timer times out, they will activate
`their own transmitter to transmit a tattle-tale message
`containing both its own vehicle identi?cation number,
`the vehicle identi?cation number contained in the alarm
`message, and a code or ?ag identifying it as a tattle-tale
`message. The base station 30 will respond to the tattle
`tale message and send a locate request message to the
`vehicle unit 10 which sent the tattle-tale message re
`questing that it transmit in one of the four location
`modes described above so that its location can be deter
`mined. Although the exact location of the vehicle gen
`erating the alarm message cannot be pin-pointed by the
`tattle-tale message, its general location and/or direction
`from the base station 30 can be determined. Further,
`since it is possible that more than one vehicle unit 10
`may transmit a tattle-tale message, the location of all of
`these vehicles may be used to help pin-point the vehicle
`transmitting the alarm signal.
`The details of the vehicle unit 10 are shown in FIG.
`5. Referring FIG. 5, the vehicle unit 10 includes a re
`ceiver 12 responsive to the messages sent by base station
`30, an electronic control unit (ECU) 14, a transmitter
`16, and the LORAN receiver 18. The vehicle unit 10
`may also contain a visual display 26 and an illegal entry
`alert detection system consisting of an illegal entry
`detector 20, an illegal entry transmitter 22, and a per
`sonal receiver 24.
`The illegal entry detector 20 may be any of the con
`ventional detectors used to detect illegal entry of the
`vehicle, such as a seat pressure sensor, a motion sensor,
`an infrared (IR) sensor, or a combination of several
`sensors. Upon the detection of an illegal entry, the ille
`gal entry detector 20 will activate the illegal entry trans
`mitter 22v to transmit a signal activating the personal
`receiver 24 to generate an audio and/or visual signal.
`The personal receiver 24 is normally carried by the
`owner or operator of the vehicle when he leaves the
`vehicle. Preferably, the personal receiver 24 can re
`spond to the signal transmitted by the illegal entry
`transmitter 22 up to 1,000 yards. Upon being alerted of
`
`45
`
`50
`
`65
`
`GOOGLE 1015
`Page 14
`
`

`
`7
`an illegal entry of the vehicle, the owner or operator
`will check to see if the vehicle has actually been stolen.
`If it has, he will contact the base station 30, informing an
`operator that the vehicle has been stolen and giving the
`operator the vehicle’s identi?cation number (VIN).
`This vehicle identi?cation number will then be entered
`into the base station 30, which will transmit a locate
`request message to activate the stolen vehicle’s unit 10.
`To avoid accidental activation, the base station 30 will
`transmit two identical locate request messages sepa
`rated by a ?xed time period. The vehicle unit 10 will
`only respond to the receipt of both the ?rst and second
`locate request messages within the ?xed time period.
`The ECU 14 may be a hard-wired logic control but,
`preferably, is a programmed microprocessor, such as an
`INTEC 8086 or any other comparable commercially
`available microprocessor. The ECU 14 will decode the
`?rst locate request message and set a flag indicating its
`receipt. It will then set a delay timer and wait for the
`second locate request message. Upon receipt of the
`second locate request message, the ECU 14 will activate
`the transmitter 16 or the LORAN receiver 18 in accor
`dance with the location mode contained in the message.
`If the location mode is the direction-triangulation mode,
`the transmitter 16 will transmit at the designated fre
`quency a short message stored in the ECU 14 which
`contains only its vehicle identi?cation code. The base
`station 30 will continue to transmit similar messages to
`the vehicle unit 10 each time changing the frequency of 30
`the signal to be transmitted so that it would be very
`dif?cult for the thieves to generate a signal which
`would interfere with the transmission of the transmitter
`16. The subsequent messages may also instruct the vehi
`cle unit to change the power level of its transmitted
`message as previously described.
`In a like manner, if the location method code or ?ag
`in the received message is indicative of the distance
`triangulation or distance-direction mode, the transmit
`ter 16 will await the receipt of the echo pulse transmit
`ted by the base station 30. It will then delay this echo
`pulse a precise period of time, then transmit it to the
`remotely located receivers or transmit it back to the
`base station 30; at the frequency contained in the locate
`request message.
`Finally, if the location method code or flag is indica
`tive of the LORAN mode, the vehicle unit 10 will acti
`vate its LORAN receiver 18. The LORAN receiver 18
`will then receive the transmission by the LORAN net
`work and determine its geographical location, which is
`communicated to the ECU 14 where it is stored. The
`ECU 14 will then construct a message containing the
`geographical data generated by the LORAN receiver
`18 which is transmitted back to the base station 30 by
`the transmitter 16. For these latter transmissions, the
`base station 30 will have the capabilities to compute the
`map coordinates of the vehicle from the received infor
`mation.
`The ECU 14 also includes the “keep alive” timer and
`will activate the transmitter 16 when the “keep alive”
`timer times out and output the alarm message to the
`transmitter 16 for transmission. Any alarm messages
`received by the receiver 12 from a different vehicle unit
`10 will be stored in the ECU’s memory and the tattle
`tale timer activated. A response message from the base
`station 30 before the tattle-tale timer times out will
`cause the ECU 14 to dump the stored alarm message.
`Otherwise, the ECU 14 will construct a tattle-tale mes
`
`4,742,357
`8
`sage, as previously described, which will be transmitted
`by the transmitter 16 after the tattle-tale timer times out.
`The details of the base station 30 are shown in FIG. 6.
`Referring to FIG. 6, the base station 30 includes a base
`station electronic control unit (ECU) 32, which is capa
`ble of receiving inputs from an external source, such as
`an operator, and receive inputs from a receiver 36, and
`from the location network 50 through a modem 44. The
`ECU 32 stores the vehicle identi?cation number of each
`vehicl

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket