`Brown et al.
`
`USOO6833785B2
`(10) Patent No.:
`US 6,833,785 B2
`(45) Date of Patent:
`Dec. 21, 2004
`
`(54) VEHICLE SECURITY SYSTEM
`(75) Inventors: Michael Wayne Brown, Georgetown,
`TX (US); Rabindranath Dutta, Los
`Angeles, CA (US); Michael A. Paolini,
`Austin, TX (US); Newton James
`Smith, Jr., Austin, TX (US)
`(73) Assignee: International Business Machines
`Corporation, Armonk, NY (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 108 days.
`
`(*) Notice:
`
`(21) Appl. No.: 10/093,446
`(22) Filed:
`Mar. 7, 2002
`(65)
`Prior Publication Data
`US 2003/0169161A1 Sep. 11, 2003
`(51) Int. Cl. .......................... B60R 25/10, B60R 25/04
`(52) U.S. Cl. ............................ 340/426.12; 340/426.19;
`340/426.2
`(58) Field of Search ............ 340/426.1, 426.11-426.23,
`340/425.5, 5.31, 5.72; 307/10.2-10.5: 280/287;
`342/357.07
`
`(56)
`
`3,878,511 A
`4,821,309 A
`5,157.375 A
`5,307,048 A
`
`References Cited
`U.S. PATENT DOCUMENTS
`4/1975 Wagner ..................... 340/5.28
`4/1989 Namekawa .............. 455/404.1
`10/1992 Drori ......................... 340/429
`4/1994 Sonders ................. 340/426.12
`
`:
`
`:
`
`:
`
`:
`
`5,349,329 A * 9/1994 Smith .................... 340/539.21
`5,513,244. A
`4/1996 Joao et al. ............... 455/404.1
`5,635,901. A * 6/1997 Weinblatt .............. 340/426.12
`5.
`A "R. A. G. O. E.
`2Y-
`Igdon et al. .........
`6,018.291. A * 1/2000 Marble et al. ......... 340/426.12
`6,049.269 A * 4/2000 Byrd et al. ............ 340/426.21
`6,067,007 A * 5/2000 Gioia .................... 340/426.19
`6,434,400 B1 * 8/2002 Villevieille et al. ...... 455/550.1
`* cited by examiner
`Primary Examiner Jeffery Hofsass
`ASSistant Examiner Anne V. Lai
`(74) Attorney, Agent, or Firm- Mark S. Walker; Streets &
`Steele; Jeffrey L. Streets
`(57)
`ABSTRACT
`A method, computer program product, and System for alert
`ing authorities during a car theft. A personal identification
`number, either a normal code or a dureSS code, is received
`into an vehicle Security System. If the dureSS code has been
`entered, then the Security System is disarmed, wherein the
`vehicle may be entered and driven away without any indi
`cation of an alarm. However, the dureSS code triggerS a
`process by which authorities are notified and the location of
`the vehicle may be provided. The vehicle is disabled upon a
`certain event or condition, Such as a pre-determined amount
`of time passing or a pre-determined distance driven. The
`method may also require Satisfying a Second event or
`condition before disabling the vehicle, Such as the vehicle
`traveling at a low speed, in order to avoid causing an unsafe
`condition. The dureSS code preferably has an identical
`number of alphanumeric characters as a normal personal
`identification number entered to disarm the Security System.
`30 Claims, 3 Drawing Sheets
`
`102
`
`ENER CODE
`INTOSECURITY
`SYSTEM
`
`104.
`
`ISEERED
`CODEASTORED
`CODE
`2
`
`ES
`OPEN LOCKS,
`MOBILIZE AUTOMOBILE,
`MAKESYSTEM
`APPEARDISARIED
`
`f12
`
`CODE THE
`NORA.
`
`110
`
`
`
`
`
`
`
`
`
`106
`
`EXCEEDEO
`AXPERMISSIBLE
`ATEMPTS
`p
`
`ES
`
`RIPADOAND
`ASALALARMS
`
`108
`
`AELEPHONE
`SALLED
`p
`
`CARTHEFSARS
`\ ENGINEANDDRIVES
`
`REREWE
`TELEPHONE
`NBER FROM
`EMORY
`
`138
`RETRIEWE
`LOCATION FROGPS
`OR TELEPHONE SYSTEM
`
`30
`
`120
`
`22
`
`APREDETERED
`TIME
`
`READODOEER
`ALE
`24 (A)
`
`PERIODICALYOR
`CONTINUOUSLY
`PLAY PRE-RECORDED
`ESSAGETO
`AUTHORITIES
`INSERING CARS
`OCATION
`
`
`
`IPR2022-00602
`Apple EX1036 Page 1
`
`
`
`U.S. Patent
`
`Dec. 21, 2004
`
`Sheet 1 of 3
`
`US 6,833,785 B2
`
`
`
`LAW
`ENFORCEMENT
`4 f
`
`COMMUNICATIONS
`NETWORK
`12
`
`10
`1.
`
`
`
`CIRCUIT
`BREAKER
`40
`
`
`
`42
`
`FIG. 1
`
`IPR2022-00602
`Apple EX1036 Page 2
`
`
`
`U.S. Patent
`
`Dec. 21, 2004
`
`Sheet 2 of 3
`
`US 6,833,785 B2
`
`102
`
`ENTER CODE
`INTO SECURITY
`SYSTEM
`
`104
`
`
`
`ISENTERED
`CODEASTORED
`CODE
`2
`ES
`OPEN LOCKS,
`110-NMOBILIZE AUTOMOBILE,
`MAKE SYSTEM
`APPEAR DISARMED
`
`
`
`106
`
`EXCEEDED
`MAXPERMISSIBLE
`ATIEMPTS
`1ES
`TRIPAUDIO AND
`VISUALALARMS
`
`108
`
`114
`END
`
`f 12
`YEs/SEEEDN
`CODE THE
`NORMAL
`CODE
`2
`
`
`
`
`
`
`
`
`
`
`
`
`
`113
`
`DOES THE
`74UTOMOBILE HAVENYES
`A TELEPHONE
`INSTALLED
`
`138
`RETRIEWE
`A.E.RE
`CARTHEISARIS
`ENGINE ANDDRIVES ME 100ATION FROMGPS
`AWAY
`MEMORY
`OR TELEPHONE SYSTEM
`
`
`
`118
`
`130
`
`READ INTIAL
`ODOMETER VALUE
`
`CB)
`120- WAIT PREDETERMINED
`TIME
`
`122-
`
`READ ODOMETER
`WALUE
`
`FIG. 2A
`
`124
`
`(A)
`
`
`
`
`
`
`
`
`
`
`
`
`
`CALL TELEPHONE
`NUMBER
`PERIODICALLYOR
`CONTINUOUSLY
`PLAY PRE-RECORDED
`MESSAGE TO
`AUTHORITIES
`INSERTING CARS
`LOCATION
`
`
`
`IPR2022-00602
`Apple EX1036 Page 3
`
`
`
`U.S. Patent
`
`Dec. 21, 2004
`
`Sheet 3 of 3
`
`US 6,833,785 B2
`
`130
`
`124
`
`
`
`
`
`
`
`
`
`
`
`DETERMINE MILES
`DRIVENSINCE
`INITIAL ODOMETER
`READING
`
`126
`
`TRAVELED
`PRE-DETERMINED
`MILES
`2
`
`129
`
`SAFE TO
`IMMOBILIZE
`CAR
`
`
`
`IMMOBILIZE
`CAR
`
`132
`
`
`
`TRIP VISUAL AND
`AUDIO ALARMS
`
`134
`
`FIG. 2B
`
`IPR2022-00602
`Apple EX1036 Page 4
`
`
`
`1
`VEHICLE SECURITY SYSTEM
`
`US 6,833,785 B2
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The present invention relates to Security Systems for
`vehicles and more Specifically, to methods for notifying or
`Summoning authorities during a crime in progreSS.
`2. Description of the Related Art
`There is good reason for car owners to take precautions
`when approaching their cars in a public parking lot, espe
`cially if they are alone at night. Carthieves will Sometimes
`directly confront or assault a car owner and forcibly take the
`car. When confronted with Such a threat, the first concern of
`the car owner is to escape to Safety, even if escaping requires
`the owner to abandon the car to the thief. Nevertheless, there
`is a need for a vehicle Security System and method that will
`frustrate the purpose of the car thief.
`A conventional car Security System may either Sound an
`alarm or disable the vehicle immediately at the time of theft.
`Such a System may be ineffective since an experienced car
`thief will recognize the existence of the vehicle Security
`System. Furthermore, disabling the vehicle during a forcible
`robbery in the presence of a car owner or operator can be
`dangerous, Since the prolonged contact between the car
`owner and thief allows the thief to direct violence against the
`C OWC.
`Therefore, there is a need for a method and System that
`notifies appropriate law enforcement or Security authorities
`of the crime in progress. It would be desirable if the method
`and System facilitated Separation of the thief and the car
`owner by allowing the car thief to drive off. It would be even
`more desirable if the method and System enabled a quick and
`Simple recovery of the car.
`
`SUMMARY OF THE INVENTION
`The present invention provides a method, computer pro
`gram product, and System for alerting authorities or emer
`gency contacts during a car theft. The method comprises
`receiving a personal identification number into a vehicle
`Security System; determining that a dureSS code has been
`entered; disarming the Security System, wherein the vehicle
`may be entered and driven away without any indication of
`an alarm; and then disabling the vehicle upon Satisfying a
`certain condition, Such as a pre-determined amount of time
`or a predetermined distance. Before disabling the vehicle, it
`may be preferable to also Satisfy a Second condition, Such as
`the vehicle traveling at a low speed, in order to avoid causing
`an unsafe condition. Preferably, the dureSS code has an
`identical number of alphanumeric characters as a normal
`personal identification number entered to disarm the Security
`System.
`The Security System processor or controller within the
`vehicle determines that the duress code has been entered by
`reading the entered code, and then comparing the entered
`code with the duress code that is stored in memory. The
`vehicle is then later disabled by various means, for example,
`by closing a Solenoid valve in a fuel line or by opening a
`circuit breaker in an ignition power circuit. After the vehicle
`has been disabled, the Security System may then alert people
`around the car by Setting off an alarm Selected from Sound
`ing the horn, Sounding an alarm Siren, blinking the
`headlights, blinking the tail lights or combinations thereof.
`If a mobile telephone is installed in the vehicle, then the
`method may further comprise retrieving a telephone number
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`for authorities or other emergency contacts from the Security
`System memory, and then Silently calling authorities at the
`telephone number retrieved in order to notify them of the car
`theft and allow them to determine the vehicle's location. In
`the future, mobile telephone systems will have the capability
`to determine the location of a given mobile telephone (a
`capability referred to as “Enhanced 911') and using this
`feature would serve the present purpose. If a global posi
`tioning System is installed in the vehicle, the method further
`comprises reading the vehicle's location from the global
`positioning System, and then notifying the authorities of the
`vehicle's location. Notification may be by means selected
`from a pre-recorded message or an interactive voice
`response System, or combinations thereof.
`The foregoing and other objects, features and advantages
`of the invention will be apparent from the following more
`particular description of a preferred embodiment of the
`invention, as illustrated in the accompanying drawings
`wherein like reference numbers represent like parts of the
`invention.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a schematic of a system that may be used to
`implement the present invention.
`FIGS. 2A and 2B show a flow chart of a method for
`alerting authorities during a car theft.
`DETAILED DESCRIPTION
`The present invention provides a method for using a
`vehicle Security System in a manner that provides an out
`Ward appearance of a typical use of the Security System or
`other electronic device, but in reality the Security System is
`being used to notify authorities or emergency contacts of a
`crime in progreSS and/or to disable a vehicle shortly after the
`vehicle is Stolen. More specifically, the present invention
`uses an alternate code, or dureSS code, to replace a normal
`Security code that must normally be entered into a Security
`System or other type of device.
`The user's duress code will preferably have a format that
`is similar to that of the user's normal code, So that it is
`improbable that a thief observing the user's entry of the
`dureSS code on the keypad would know that the user's dureSS
`code was entered Since the number Sequence is not readily
`identifiable. In particular, the dureSS code and normal code
`should contain the same number of characters and the same
`type of characters. Especially Since the dureSS code appears
`to result in the disabling of the security system, the thief will
`presumably have no reason to Suspect an alarm has been
`triggered.
`In one embodiment, the System accepts a Security code
`having a certain number of digits assigned to the user and a
`certain number of digits that are option codes. The option
`codes may allow the user to initiate a variety of predeter
`mined actions or enter a variety of predetermined informa
`tion. The predetermined actions may include, without
`limitation, Setting an alarm, triggering a false error message,
`and calling a friend. Such predetermined actions are only
`limited by the nature of electronic communications and
`control, how widely the electronic communication of the
`network of the monitoring Service will reach and the autho
`rization that the user has provided to facilitate the requested
`actions. The predetermined information may include, with
`out limitation, the user's dureSS, the number of thieves, the
`type of weapons carried by the thieves, and how many
`people are with you. For example, assume that a Security
`code is made up of five digits, the first four digits being
`
`IPR2022-00602
`Apple EX1036 Page 5
`
`
`
`3
`dedicated to a unique identification number or password
`asSociated with the account, and the fifth digit dedicated to
`a predetermined option code. Continuing with the example,
`the predetermined option codes may include: “0” to indicate
`no duress; and “1” through “9 to indicate duress with the
`Same number of thieves present as the number entered.
`Consequently, a security code entry of “84632 would be
`entered if the unique identification number was “8463” and
`the transaction was being made under dureSS with "2"
`thieves present. Optionally, Some digits may be dedicated to
`other user-defined action or information as Set out in the
`user's preferences registered and maintained by the Security
`System monitoring Service. In accordance with this format,
`it is possible to have more than one “normal code” and/or
`more than one “duress code”.
`The dureSS code may initiate actions beyond the typical
`use of the device, Such as alerting authorities or emergency
`contacts of a crime in progreSS. It is an advantage that the
`method initiates these actions without alerting the criminal
`or Suspect that additional StepS are being taken, thus pro
`tecting a victim from a possible violent outburst during an
`attempt to summon help. When the victim enters the duress
`code, the criminal or Suspect will believe that the entered
`code is a normally entered code and not realize or be able to
`detect that the entered code is a dureSS code. All responses
`to the entered dureSS code, as far as the victim and criminal
`or Suspect can immediately observe, appear to be as if the
`normal code was entered. The dureSS code is typically
`entered into a vehicle Security System by using a keypad
`when the owner is under dureSS from a car thief.
`An exemplary vehicle Security System includes a central
`processor or controller connected to sensors located
`throughout the vehicle that detect tampering or intrusion.
`The controller has memory capability to Store codes,
`procedures, events, telephone numbers, and other necessary
`information for the operation of the Security System. The
`Security System also operates to give an alarm indication in
`the event of tripping a Sensor or other triggering event. The
`alarm indication may typically be a flashing of the lights
`and/or Sounding of the vehicle horn or a Siren.
`Furthermore, upon occurrence of an alarm condition, Such
`as the entry of a dureSS code, the vehicle fuel Supply and/or
`ignition power may be selectively disabled. These disabling
`functions prevent the car from Starting or, alternatively,
`immobilize the car after it has traveled a pre-defined dis
`tance or after passing of a pre-defined time period. The
`purpose of the delay in immobilizing the car is to allow the
`car, and the car thief, to be Some distance away from the car
`owner at the time the car is immobilized so that the car thief
`does not react violently against the car owner.
`However, recognizing the possibility that the vehicle
`owner may be forced to go with the car thief, the present
`invention preferably includes the option of a Second dureSS
`code that initiates the notification of authorities, but does not
`disable the vehicle. Alternatively, if the vehicle includes
`Sensors capable of detecting the number of people in the
`vehicle, Such as pressure Sensors in the Seats, then the
`number of thieves indicated in the dureSS code is compared
`with the number of people detected to be in the vehicle to
`determined whether the vehicle owner has been forced to g)
`along with the thieves. For example, if the dureSS code has
`an option code of “2, then the vehicle owner is indicating
`the presence of two thieves. If the Seat Sensors indicate that
`three people are then in the car, it is highly likely that the
`third perSon is the vehicle owner. Consequently, the proces
`sor should be prevented from disabling the vehicle to avoid
`putting the vehicle owner in greater danger.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,833,785 B2
`
`4
`FIG. 1 is a schematic of a system that may be used to
`implement the present invention, including a vehicle 44
`having a keypad 32 that is part of the vehicle Security System
`and allows entry to the car after entering a valid Security
`code, Such as a normal code or a dureSS code. Upon entering
`the normal code, the processor 42 compares the Stored
`normal code with the entered code and, if the codes match,
`unlocks the door. Alternatively, the Security keypad may be
`inside the car and, until the normal code is entered, the car
`remains immobilized and cannot be started. Immobilization
`may be accomplished, for example, by closing a Solenoid
`Valve in the fuel Supply line or opening a circuit breaker 40
`in the ignition power circuit. The vehicle may also have a
`mobile telephone 34 and/or a Global Positioning System
`(GPS) 38 mounted in the car. Either or Both of these devices
`may be tied into the Security System making them available
`to the Security System's central processor or controller. The
`processor or controller may then determine the location of
`the vehicle from the mobile telephone, if equipped with a
`mobile telephone location system, or the GPS. The mobile
`telephone may then be used, including the use of antenna 36
`or any other available antenna, to contact authorities and
`report the current location of the vehicle, and to indicate an
`alarm condition if the vehicle Security System determines
`there has been a breach of security. Preferably, the mobile
`telephone will be used in a Silent manner to periodically or
`continuously report the location of the vehicle, thereby
`allowing the vehicle to be tracked and recovered.
`Alternatively, the mobile telephone may be used to con
`tact a telephone service provider or the provider's server 20
`with information regarding the dureSS conditions. The
`mobile telephone service provider will typically have the
`ability to identify the location of the mobile telephone even
`if the mobile telephone itself does not contain its own
`location information or does not have access to a GPS
`device. In this manner, the telephone Service provider can
`append the alarm notification with information pertaining to
`the mobile telephone's location before forwarding the noti
`fication to the law enforcement authorities 14 or other
`emergency contacts. Further advantages of routing the alarm
`Signal or notification through the mobile telephone Service
`provider include access to much greater processing power
`than is available on the vehicle and an Interactive Voice
`Response System (WRS) 26 that can be used for sending
`Voice messages over a telephone System to a mobile or line
`based telephone of the law enforcement authorities or the
`like. Specifically, IVRS is an application program that may
`be run on the telephone service provider's server that
`executes text-to-speech Synthesis programmed instructions
`using ASCII input to generate an audio rendition of that
`ASCII input in a machine synthesized voice. Therefore, for
`example, after retrieving the vehicle owner's name, location,
`and duress conditions, the IVRS may insert this information
`in a pre-Set format for conveying this information through
`Voice Synthesized audio to the authorities.
`If a car thief threatens the car owner, or other authorized
`perSon, and demands that the owner provide the keys to the
`vehicle and disarm the Security System, the owner should
`enter the dureSS code. The dureSS code maybe any combi
`nation of alphanumeric characters, other than the normal
`code, but will preferably have the same number of characters
`as the normal code. Upon entry of a code, the processor
`determines whether the entered code is the Stored normal
`code, the Stored dureSS code, or an incorrect code. If the
`normal code has been entered, the processor disarms the
`Security System, unlocks the doors, and/or mobilizes the
`vehicle by either opening the Solenoid valve in the fuel line
`
`IPR2022-00602
`Apple EX1036 Page 6
`
`
`
`S
`or closing the circuit breaker in the ignition power circuit So
`that the vehicle may be started. The car may then be started
`and driven away by the authorized person who entered the
`normal code.
`If the dureSS code has been entered, the processor first
`follows the same procedure as though the normal code had
`been entered So as not to alert the car thief that the dureSS
`code, and not the normal code, had been entered. Therefore,
`the processor either unlocks the door or mobilizes the car by
`either opening the Solenoid valve in the fuel line or closing
`the circuit breaker in the ignition power circuit So that the
`vehicle may be started. The processor may further indicate
`that the Security System has been disarmed Such as, for
`example, turning off an “armed” signal and turning on an
`“unarmed” Signal, based upon the features of the Safety
`device so that the car thief will not be able to discern that the
`Safety device is aware of the Situation. The car thief may
`then drive away in the car. Optionally, where the vehicle has
`an installed telephone, the processor may make the tele
`phone's microphone active, both during and after the entry
`of the dureSS code, So that Sounds and conversations within
`the vehicle can be monitored by the authorities or emergency
`contacts notified.
`If an incorrect code is entered, the Security System will not
`disarm the System and not unlock the doors. The Security
`System may allow a predetermined number of additional
`attempts to enter the correct normal code. If the correct code
`is not entered within the maximum allowable number of
`attempts, the Security System may trigger an alarm indicat
`ing that there is an attempted breach of Security.
`Either after a pre-set period of time following entry of the
`duress code or after a preset distance driven after entry of the
`dureSS code as measured by the vehicle's odometer, the
`processor immobilizes the vehicle either by closing the
`Solenoid valve in the fuel line or by opening the circuit
`breaker in the ignition power circuit or by any other means
`that will immobilize the vehicle. Optionally, the processor
`may cause the horn or Siren to Sound and cause the head
`lights and tail lights to blink or trigger other attention-getting
`devices or combinations thereof. The advantage of the
`present invention allows the car thief to drive away before
`the vehicle is immobilized, thereby separating the owner and
`the car thief before the car thief has a violent reaction to the
`immobilization of the vehicle. Preferably, the processor will
`monitor the operating condition of the vehicle and only
`disable the vehicle during a safe condition following the
`expiration of the time or distance limitation. For example,
`the processor may monitor the vehicle Speedometer and only
`disable the vehicle at Speeds less than 5 miles per hour or at
`a stop. Alternatively, the processor may gradually reduce the
`throttle or otherwise cause a gradual reduction in operation
`of the vehicle so that the vehicle becomes disabled or
`unusable in a safe manner.
`AS another option, the processor may utilize the mobile
`telephone mounted or installed in the car to Silently report
`the car theft with a pre-recorded message. The number
`dialed by the processor may be a number Stored in the
`Security System memory that connects with a Service, pro
`Vided by the vehicle company, the Security device company,
`or other Service provider, that receives and acts upon Such
`notices. Alternatively, the processor could be programmed to
`dial a Standard emergency telephone number Such as, for
`example, 911. If the vehicle has a Global Positioning System
`(GPS) mounted in the car, the processor could report the
`location of the vehicle by gathering that information from
`the GPS and including that information in the telephone
`message. Furthermore, with a GPS, the processor could
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,833,785 B2
`
`6
`determine the location of the car and, based upon the
`location, retrieve a telephone number Stored in its memory
`by location, for authorities responsible for emergencies in
`the present location of the vehicle. Alternatively, the mobile
`telephone System could provide location information, for
`example through emergency location Services or enhanced
`911.
`FIG. 2 is a flowchart of a method that may be executed on
`the system shown in FIG. 1 during a car theft. In state 102,
`a car owner or authorized driver enters a code into the
`Security System using a keypad. Under normal circum
`stances the entered code is the normal code. However, if the
`perSon entering the code is under dureSS to disarm the
`vehicle's Security System, then the person enters the dureSS
`code into the security system. In state 104, the security
`System's processor compares the entered code with the
`Stored normal code and the Stored dureSS code and deter
`mines whether the entered code matches either of the stored
`codes. If, in state 104, the code does not match one of the
`Stored codes, then, in State 106, the processor determines if
`the entry attempt is greater than a preset number of maxi
`mum allowable attempts to enter a correct code. This allows
`the authorized driver to mistakenly enter the code a few
`times without triggering an alarm. If, in State 106, the
`maximum number of allowable attempts has not been made,
`then the method starts over at state 102. E., in state 106, the
`maximum number of attempts allowed has been exceeded,
`then in state 108, the security system trips the audio and
`Visual alarms, Such as flashing the lights and Sounding the
`horn and/or a Siren for a Set period of time.
`If, in state 104, the entered code matches one of the stored
`codes, then in state 110, the Security System disarms itself,
`unlocks the doors and mobilizes the vehicle by opening the
`Solenoid valve on the fuel line or closing the circuit breaker
`on the ignition power System or by otherwise taking Steps
`necessary to mobilize the vehicle from the immobilized
`State. It is important to note that at this point, the System has
`responded exactly the same whether the normal code was
`entered or the dureSS code was entered. This ensures that the
`perSon imposing the dureSS has no indication that anything
`other than a normal disarming of the vehicle's Security
`System has occurred. If, in State 112, the normal code was
`entered, then in state 114, the method ends with the autho
`rized driver having full access to the vehicle restored. If, in
`State 112, the normal code was not entered, then the dureSS
`code was entered, and the method continues with state 113
`to determine whether the vehicle has a telephone installed.
`If a telephone is determined to be installed in the vehicle in
`state 113, then, in state 136, a telephone number is retrieved
`from memory to contact the authorities and report the crime
`in progreSS. Furthermore, if the vehicle has a Security System
`that communicates with a GPS mounted in the car or a
`mobile telephone location System installed in the telephone,
`then, in State 138, the processor can determine the location
`of the vehicle. In state 140, the processor then places a silent
`telephone call using the telephone to the telephone number
`retrieved from Storage and, in State 142, periodically or
`continuously plays a recorded message to the authorities
`reporting the theft and inserting the current location of the
`vehicle into the message. The Silent telephone call is carried
`out by the processor using the telephone antenna, but
`without Sending any audio signals to the vehicle or tele
`phone Speakers.
`In State 116, the car thief may start the engine and drive
`the vehicle away, thereby removing the car thief from the
`vicinity of the perSon under dureSS So that the person may
`Safely escape and Summon help. In State 118, the Security
`
`IPR2022-00602
`Apple EX1036 Page 7
`
`
`
`7
`System processor reads the initial odometer value and in
`state 120, waits a pre-determined length of time before, in
`State 122, reading the current odometer value again. In State
`124, the method continues to state 124 of FIG. 2B. In state
`126, the processor determines the miles driven Since the
`initial odometer value and if, in state 128, the miles driven
`are not at least the minimum pre-determined amount, then in
`state 130, the method continues back to state 120 of FIG.2A.
`If, in state 128, the number of miles traveled is greater than
`the minimum pre-determined amount, then in State 129, the
`processor determines whether the vehicle is currently being
`operated in a condition that is Safe to be disabled, Such as
`moving at a low speed or Sitting at a stop. If it is not Safe to
`disable the vehicle, then state 129 is repeated. Once a safe
`condition is determined, then in State 132, the processor
`immobilizes the car by, for example, opening the circuit
`breaker on the ignition power circuit and then, in State 134,
`trips the Visual and audio alarms, Such as, for example,
`Sounding the horn and flashing the headlights and taillights.
`It will be understood from the foregoing description that
`various modifications and changes may be made in the
`preferred embodiment of the present invention without
`departing from its true Spirit. It is intended that this descrip
`tion is for purposes of illustration only and should not be
`construed in a limiting Sense. The Scope of this invention
`should be limited only by the language of the following
`claims.
`What is claimed is:
`1. A method of alerting authorities during a car theft
`comprising the Steps:
`receiving a personal identification number into a vehicle
`Security System;
`determining that the personal identification number is a
`dureSS code; then
`disarming the Security System, wherein the vehicle maybe
`entered and driven away without any indication of an
`alarm; and
`disabling the vehicle after one or more predetermined
`eVent.
`2. The method of claim 1, wherein the one or more
`predetermined event is Selected from the passing of a
`pre-determined amount of time, the traveling of a pre
`determined distance, or proximity of a police car.
`3. The method of claim 1, wherein the duress code has an
`identical number of alphanumeric characters as a normal
`personal identification number, wherein the normal personal
`identification number is the number entered to disarm the
`Security System.
`4. The method of claim 1, wherein the step of determining
`that the dureSS code has been entered further comprises:
`reading the entered code;
`retrieving the dureSS code from memory; and
`comparing the entered code with the dureSS code.
`5. The method of claim 1, wherein the step of disabling
`the vehicle is selected from shutting off a fuel line or
`opening a circuit breaker in an ignition power circuit.
`6. The method of claim 1, further comprising:
`determining that the vehicle is in a Safe condition for
`being disabled before disabling the vehicle.
`7. The method of claim 1, after the vehicle has been
`disabled, further comprising:
`Sounding an alarm Selected from Sounding the horn,
`Sounding an alarm Siren, blinking the headlights, blink
`ing the tail lights or combinations thereof.
`8. The method of claim 1, wherein a mobile telephone is
`installed in the vehicle, the method further comprising:
`
`5
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,833,785 B2
`
`8
`retrieving a telephone number for authorities from a
`Security System memory,
`calling authorities at the telephone number; and
`notifying the authorities of the car theft.
`9. The method of claim 8, wherein the authorities are
`Selected from law enforcement, alarm System provider,
`private Security provider or combinations thereof.
`10. The method of claim 8, wherein a Global Positioning
`System is mounted in the vehicle, further comprising:
`reading the location of the vehicle from the global posi
`tioning System; and
`notifying the authorities of the vehicle's location.
`11. The method of claim 8, wherein the step of notifying
`is by means Selected from a pre-recorded message or an
`interactive voice response System, or combinations thereof.
`12. The method of claim 8, wherein the step of calling
`authorities is done Silently.
`13. The method of claim 1, wherein a mobile telephone is
`installed in the vehicle, the method further comprising:
`reading the location of the vehicle from a location System
`using the mobile telephone, and
`notifying the authorities of the vehicle's location.
`14. A computer program product on a computer readable
`medium comprising:
`receiving instructions for receiving a per