throbber
(12) United States Patent
`Brown et al.
`
`USOO6833785B2
`(10) Patent No.:
`US 6,833,785 B2
`(45) Date of Patent:
`Dec. 21, 2004
`
`(54) VEHICLE SECURITY SYSTEM
`(75) Inventors: Michael Wayne Brown, Georgetown,
`TX (US); Rabindranath Dutta, Los
`Angeles, CA (US); Michael A. Paolini,
`Austin, TX (US); Newton James
`Smith, Jr., Austin, TX (US)
`(73) Assignee: International Business Machines
`Corporation, Armonk, NY (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 108 days.
`
`(*) Notice:
`
`(21) Appl. No.: 10/093,446
`(22) Filed:
`Mar. 7, 2002
`(65)
`Prior Publication Data
`US 2003/0169161A1 Sep. 11, 2003
`(51) Int. Cl. .......................... B60R 25/10, B60R 25/04
`(52) U.S. Cl. ............................ 340/426.12; 340/426.19;
`340/426.2
`(58) Field of Search ............ 340/426.1, 426.11-426.23,
`340/425.5, 5.31, 5.72; 307/10.2-10.5: 280/287;
`342/357.07
`
`(56)
`
`3,878,511 A
`4,821,309 A
`5,157.375 A
`5,307,048 A
`
`References Cited
`U.S. PATENT DOCUMENTS
`4/1975 Wagner ..................... 340/5.28
`4/1989 Namekawa .............. 455/404.1
`10/1992 Drori ......................... 340/429
`4/1994 Sonders ................. 340/426.12
`
`:
`
`:
`
`:
`
`:
`
`5,349,329 A * 9/1994 Smith .................... 340/539.21
`5,513,244. A
`4/1996 Joao et al. ............... 455/404.1
`5,635,901. A * 6/1997 Weinblatt .............. 340/426.12
`5.
`A "R. A. G. O. E.
`2Y-
`Igdon et al. .........
`6,018.291. A * 1/2000 Marble et al. ......... 340/426.12
`6,049.269 A * 4/2000 Byrd et al. ............ 340/426.21
`6,067,007 A * 5/2000 Gioia .................... 340/426.19
`6,434,400 B1 * 8/2002 Villevieille et al. ...... 455/550.1
`* cited by examiner
`Primary Examiner Jeffery Hofsass
`ASSistant Examiner Anne V. Lai
`(74) Attorney, Agent, or Firm- Mark S. Walker; Streets &
`Steele; Jeffrey L. Streets
`(57)
`ABSTRACT
`A method, computer program product, and System for alert
`ing authorities during a car theft. A personal identification
`number, either a normal code or a dureSS code, is received
`into an vehicle Security System. If the dureSS code has been
`entered, then the Security System is disarmed, wherein the
`vehicle may be entered and driven away without any indi
`cation of an alarm. However, the dureSS code triggerS a
`process by which authorities are notified and the location of
`the vehicle may be provided. The vehicle is disabled upon a
`certain event or condition, Such as a pre-determined amount
`of time passing or a pre-determined distance driven. The
`method may also require Satisfying a Second event or
`condition before disabling the vehicle, Such as the vehicle
`traveling at a low speed, in order to avoid causing an unsafe
`condition. The dureSS code preferably has an identical
`number of alphanumeric characters as a normal personal
`identification number entered to disarm the Security System.
`30 Claims, 3 Drawing Sheets
`
`102
`
`ENER CODE
`INTOSECURITY
`SYSTEM
`
`104.
`
`ISEERED
`CODEASTORED
`CODE
`2
`
`ES
`OPEN LOCKS,
`MOBILIZE AUTOMOBILE,
`MAKESYSTEM
`APPEARDISARIED
`
`f12
`
`CODE THE
`NORA.
`
`110
`
`
`
`
`
`
`
`
`
`106
`
`EXCEEDEO
`AXPERMISSIBLE
`ATEMPTS
`p
`
`ES
`
`RIPADOAND
`ASALALARMS
`
`108
`
`AELEPHONE
`SALLED
`p
`
`CARTHEFSARS
`\ ENGINEANDDRIVES
`
`REREWE
`TELEPHONE
`NBER FROM
`EMORY
`
`138
`RETRIEWE
`LOCATION FROGPS
`OR TELEPHONE SYSTEM
`
`30
`
`120
`
`22
`
`APREDETERED
`TIME
`
`READODOEER
`ALE
`24 (A)
`
`PERIODICALYOR
`CONTINUOUSLY
`PLAY PRE-RECORDED
`ESSAGETO
`AUTHORITIES
`INSERING CARS
`OCATION
`
`
`
`IPR2022-00602
`Apple EX1036 Page 1
`
`

`

`U.S. Patent
`
`Dec. 21, 2004
`
`Sheet 1 of 3
`
`US 6,833,785 B2
`
`
`
`LAW
`ENFORCEMENT
`4 f
`
`COMMUNICATIONS
`NETWORK
`12
`
`10
`1.
`
`
`
`CIRCUIT
`BREAKER
`40
`
`
`
`42
`
`FIG. 1
`
`IPR2022-00602
`Apple EX1036 Page 2
`
`

`

`U.S. Patent
`
`Dec. 21, 2004
`
`Sheet 2 of 3
`
`US 6,833,785 B2
`
`102
`
`ENTER CODE
`INTO SECURITY
`SYSTEM
`
`104
`
`
`
`ISENTERED
`CODEASTORED
`CODE
`2
`ES
`OPEN LOCKS,
`110-NMOBILIZE AUTOMOBILE,
`MAKE SYSTEM
`APPEAR DISARMED
`
`
`
`106
`
`EXCEEDED
`MAXPERMISSIBLE
`ATIEMPTS
`1ES
`TRIPAUDIO AND
`VISUALALARMS
`
`108
`
`114
`END
`
`f 12
`YEs/SEEEDN
`CODE THE
`NORMAL
`CODE
`2
`
`
`
`
`
`
`
`
`
`
`
`
`
`113
`
`DOES THE
`74UTOMOBILE HAVENYES
`A TELEPHONE
`INSTALLED
`
`138
`RETRIEWE
`A.E.RE
`CARTHEISARIS
`ENGINE ANDDRIVES ME 100ATION FROMGPS
`AWAY
`MEMORY
`OR TELEPHONE SYSTEM
`
`
`
`118
`
`130
`
`READ INTIAL
`ODOMETER VALUE
`
`CB)
`120- WAIT PREDETERMINED
`TIME
`
`122-
`
`READ ODOMETER
`WALUE
`
`FIG. 2A
`
`124
`
`(A)
`
`
`
`
`
`
`
`
`
`
`
`
`
`CALL TELEPHONE
`NUMBER
`PERIODICALLYOR
`CONTINUOUSLY
`PLAY PRE-RECORDED
`MESSAGE TO
`AUTHORITIES
`INSERTING CARS
`LOCATION
`
`
`
`IPR2022-00602
`Apple EX1036 Page 3
`
`

`

`U.S. Patent
`
`Dec. 21, 2004
`
`Sheet 3 of 3
`
`US 6,833,785 B2
`
`130
`
`124
`
`
`
`
`
`
`
`
`
`
`
`DETERMINE MILES
`DRIVENSINCE
`INITIAL ODOMETER
`READING
`
`126
`
`TRAVELED
`PRE-DETERMINED
`MILES
`2
`
`129
`
`SAFE TO
`IMMOBILIZE
`CAR
`
`
`
`IMMOBILIZE
`CAR
`
`132
`
`
`
`TRIP VISUAL AND
`AUDIO ALARMS
`
`134
`
`FIG. 2B
`
`IPR2022-00602
`Apple EX1036 Page 4
`
`

`

`1
`VEHICLE SECURITY SYSTEM
`
`US 6,833,785 B2
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The present invention relates to Security Systems for
`vehicles and more Specifically, to methods for notifying or
`Summoning authorities during a crime in progreSS.
`2. Description of the Related Art
`There is good reason for car owners to take precautions
`when approaching their cars in a public parking lot, espe
`cially if they are alone at night. Carthieves will Sometimes
`directly confront or assault a car owner and forcibly take the
`car. When confronted with Such a threat, the first concern of
`the car owner is to escape to Safety, even if escaping requires
`the owner to abandon the car to the thief. Nevertheless, there
`is a need for a vehicle Security System and method that will
`frustrate the purpose of the car thief.
`A conventional car Security System may either Sound an
`alarm or disable the vehicle immediately at the time of theft.
`Such a System may be ineffective since an experienced car
`thief will recognize the existence of the vehicle Security
`System. Furthermore, disabling the vehicle during a forcible
`robbery in the presence of a car owner or operator can be
`dangerous, Since the prolonged contact between the car
`owner and thief allows the thief to direct violence against the
`C OWC.
`Therefore, there is a need for a method and System that
`notifies appropriate law enforcement or Security authorities
`of the crime in progress. It would be desirable if the method
`and System facilitated Separation of the thief and the car
`owner by allowing the car thief to drive off. It would be even
`more desirable if the method and System enabled a quick and
`Simple recovery of the car.
`
`SUMMARY OF THE INVENTION
`The present invention provides a method, computer pro
`gram product, and System for alerting authorities or emer
`gency contacts during a car theft. The method comprises
`receiving a personal identification number into a vehicle
`Security System; determining that a dureSS code has been
`entered; disarming the Security System, wherein the vehicle
`may be entered and driven away without any indication of
`an alarm; and then disabling the vehicle upon Satisfying a
`certain condition, Such as a pre-determined amount of time
`or a predetermined distance. Before disabling the vehicle, it
`may be preferable to also Satisfy a Second condition, Such as
`the vehicle traveling at a low speed, in order to avoid causing
`an unsafe condition. Preferably, the dureSS code has an
`identical number of alphanumeric characters as a normal
`personal identification number entered to disarm the Security
`System.
`The Security System processor or controller within the
`vehicle determines that the duress code has been entered by
`reading the entered code, and then comparing the entered
`code with the duress code that is stored in memory. The
`vehicle is then later disabled by various means, for example,
`by closing a Solenoid valve in a fuel line or by opening a
`circuit breaker in an ignition power circuit. After the vehicle
`has been disabled, the Security System may then alert people
`around the car by Setting off an alarm Selected from Sound
`ing the horn, Sounding an alarm Siren, blinking the
`headlights, blinking the tail lights or combinations thereof.
`If a mobile telephone is installed in the vehicle, then the
`method may further comprise retrieving a telephone number
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`for authorities or other emergency contacts from the Security
`System memory, and then Silently calling authorities at the
`telephone number retrieved in order to notify them of the car
`theft and allow them to determine the vehicle's location. In
`the future, mobile telephone systems will have the capability
`to determine the location of a given mobile telephone (a
`capability referred to as “Enhanced 911') and using this
`feature would serve the present purpose. If a global posi
`tioning System is installed in the vehicle, the method further
`comprises reading the vehicle's location from the global
`positioning System, and then notifying the authorities of the
`vehicle's location. Notification may be by means selected
`from a pre-recorded message or an interactive voice
`response System, or combinations thereof.
`The foregoing and other objects, features and advantages
`of the invention will be apparent from the following more
`particular description of a preferred embodiment of the
`invention, as illustrated in the accompanying drawings
`wherein like reference numbers represent like parts of the
`invention.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a schematic of a system that may be used to
`implement the present invention.
`FIGS. 2A and 2B show a flow chart of a method for
`alerting authorities during a car theft.
`DETAILED DESCRIPTION
`The present invention provides a method for using a
`vehicle Security System in a manner that provides an out
`Ward appearance of a typical use of the Security System or
`other electronic device, but in reality the Security System is
`being used to notify authorities or emergency contacts of a
`crime in progreSS and/or to disable a vehicle shortly after the
`vehicle is Stolen. More specifically, the present invention
`uses an alternate code, or dureSS code, to replace a normal
`Security code that must normally be entered into a Security
`System or other type of device.
`The user's duress code will preferably have a format that
`is similar to that of the user's normal code, So that it is
`improbable that a thief observing the user's entry of the
`dureSS code on the keypad would know that the user's dureSS
`code was entered Since the number Sequence is not readily
`identifiable. In particular, the dureSS code and normal code
`should contain the same number of characters and the same
`type of characters. Especially Since the dureSS code appears
`to result in the disabling of the security system, the thief will
`presumably have no reason to Suspect an alarm has been
`triggered.
`In one embodiment, the System accepts a Security code
`having a certain number of digits assigned to the user and a
`certain number of digits that are option codes. The option
`codes may allow the user to initiate a variety of predeter
`mined actions or enter a variety of predetermined informa
`tion. The predetermined actions may include, without
`limitation, Setting an alarm, triggering a false error message,
`and calling a friend. Such predetermined actions are only
`limited by the nature of electronic communications and
`control, how widely the electronic communication of the
`network of the monitoring Service will reach and the autho
`rization that the user has provided to facilitate the requested
`actions. The predetermined information may include, with
`out limitation, the user's dureSS, the number of thieves, the
`type of weapons carried by the thieves, and how many
`people are with you. For example, assume that a Security
`code is made up of five digits, the first four digits being
`
`IPR2022-00602
`Apple EX1036 Page 5
`
`

`

`3
`dedicated to a unique identification number or password
`asSociated with the account, and the fifth digit dedicated to
`a predetermined option code. Continuing with the example,
`the predetermined option codes may include: “0” to indicate
`no duress; and “1” through “9 to indicate duress with the
`Same number of thieves present as the number entered.
`Consequently, a security code entry of “84632 would be
`entered if the unique identification number was “8463” and
`the transaction was being made under dureSS with "2"
`thieves present. Optionally, Some digits may be dedicated to
`other user-defined action or information as Set out in the
`user's preferences registered and maintained by the Security
`System monitoring Service. In accordance with this format,
`it is possible to have more than one “normal code” and/or
`more than one “duress code”.
`The dureSS code may initiate actions beyond the typical
`use of the device, Such as alerting authorities or emergency
`contacts of a crime in progreSS. It is an advantage that the
`method initiates these actions without alerting the criminal
`or Suspect that additional StepS are being taken, thus pro
`tecting a victim from a possible violent outburst during an
`attempt to summon help. When the victim enters the duress
`code, the criminal or Suspect will believe that the entered
`code is a normally entered code and not realize or be able to
`detect that the entered code is a dureSS code. All responses
`to the entered dureSS code, as far as the victim and criminal
`or Suspect can immediately observe, appear to be as if the
`normal code was entered. The dureSS code is typically
`entered into a vehicle Security System by using a keypad
`when the owner is under dureSS from a car thief.
`An exemplary vehicle Security System includes a central
`processor or controller connected to sensors located
`throughout the vehicle that detect tampering or intrusion.
`The controller has memory capability to Store codes,
`procedures, events, telephone numbers, and other necessary
`information for the operation of the Security System. The
`Security System also operates to give an alarm indication in
`the event of tripping a Sensor or other triggering event. The
`alarm indication may typically be a flashing of the lights
`and/or Sounding of the vehicle horn or a Siren.
`Furthermore, upon occurrence of an alarm condition, Such
`as the entry of a dureSS code, the vehicle fuel Supply and/or
`ignition power may be selectively disabled. These disabling
`functions prevent the car from Starting or, alternatively,
`immobilize the car after it has traveled a pre-defined dis
`tance or after passing of a pre-defined time period. The
`purpose of the delay in immobilizing the car is to allow the
`car, and the car thief, to be Some distance away from the car
`owner at the time the car is immobilized so that the car thief
`does not react violently against the car owner.
`However, recognizing the possibility that the vehicle
`owner may be forced to go with the car thief, the present
`invention preferably includes the option of a Second dureSS
`code that initiates the notification of authorities, but does not
`disable the vehicle. Alternatively, if the vehicle includes
`Sensors capable of detecting the number of people in the
`vehicle, Such as pressure Sensors in the Seats, then the
`number of thieves indicated in the dureSS code is compared
`with the number of people detected to be in the vehicle to
`determined whether the vehicle owner has been forced to g)
`along with the thieves. For example, if the dureSS code has
`an option code of “2, then the vehicle owner is indicating
`the presence of two thieves. If the Seat Sensors indicate that
`three people are then in the car, it is highly likely that the
`third perSon is the vehicle owner. Consequently, the proces
`sor should be prevented from disabling the vehicle to avoid
`putting the vehicle owner in greater danger.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,833,785 B2
`
`4
`FIG. 1 is a schematic of a system that may be used to
`implement the present invention, including a vehicle 44
`having a keypad 32 that is part of the vehicle Security System
`and allows entry to the car after entering a valid Security
`code, Such as a normal code or a dureSS code. Upon entering
`the normal code, the processor 42 compares the Stored
`normal code with the entered code and, if the codes match,
`unlocks the door. Alternatively, the Security keypad may be
`inside the car and, until the normal code is entered, the car
`remains immobilized and cannot be started. Immobilization
`may be accomplished, for example, by closing a Solenoid
`Valve in the fuel Supply line or opening a circuit breaker 40
`in the ignition power circuit. The vehicle may also have a
`mobile telephone 34 and/or a Global Positioning System
`(GPS) 38 mounted in the car. Either or Both of these devices
`may be tied into the Security System making them available
`to the Security System's central processor or controller. The
`processor or controller may then determine the location of
`the vehicle from the mobile telephone, if equipped with a
`mobile telephone location system, or the GPS. The mobile
`telephone may then be used, including the use of antenna 36
`or any other available antenna, to contact authorities and
`report the current location of the vehicle, and to indicate an
`alarm condition if the vehicle Security System determines
`there has been a breach of security. Preferably, the mobile
`telephone will be used in a Silent manner to periodically or
`continuously report the location of the vehicle, thereby
`allowing the vehicle to be tracked and recovered.
`Alternatively, the mobile telephone may be used to con
`tact a telephone service provider or the provider's server 20
`with information regarding the dureSS conditions. The
`mobile telephone service provider will typically have the
`ability to identify the location of the mobile telephone even
`if the mobile telephone itself does not contain its own
`location information or does not have access to a GPS
`device. In this manner, the telephone Service provider can
`append the alarm notification with information pertaining to
`the mobile telephone's location before forwarding the noti
`fication to the law enforcement authorities 14 or other
`emergency contacts. Further advantages of routing the alarm
`Signal or notification through the mobile telephone Service
`provider include access to much greater processing power
`than is available on the vehicle and an Interactive Voice
`Response System (WRS) 26 that can be used for sending
`Voice messages over a telephone System to a mobile or line
`based telephone of the law enforcement authorities or the
`like. Specifically, IVRS is an application program that may
`be run on the telephone service provider's server that
`executes text-to-speech Synthesis programmed instructions
`using ASCII input to generate an audio rendition of that
`ASCII input in a machine synthesized voice. Therefore, for
`example, after retrieving the vehicle owner's name, location,
`and duress conditions, the IVRS may insert this information
`in a pre-Set format for conveying this information through
`Voice Synthesized audio to the authorities.
`If a car thief threatens the car owner, or other authorized
`perSon, and demands that the owner provide the keys to the
`vehicle and disarm the Security System, the owner should
`enter the dureSS code. The dureSS code maybe any combi
`nation of alphanumeric characters, other than the normal
`code, but will preferably have the same number of characters
`as the normal code. Upon entry of a code, the processor
`determines whether the entered code is the Stored normal
`code, the Stored dureSS code, or an incorrect code. If the
`normal code has been entered, the processor disarms the
`Security System, unlocks the doors, and/or mobilizes the
`vehicle by either opening the Solenoid valve in the fuel line
`
`IPR2022-00602
`Apple EX1036 Page 6
`
`

`

`S
`or closing the circuit breaker in the ignition power circuit So
`that the vehicle may be started. The car may then be started
`and driven away by the authorized person who entered the
`normal code.
`If the dureSS code has been entered, the processor first
`follows the same procedure as though the normal code had
`been entered So as not to alert the car thief that the dureSS
`code, and not the normal code, had been entered. Therefore,
`the processor either unlocks the door or mobilizes the car by
`either opening the Solenoid valve in the fuel line or closing
`the circuit breaker in the ignition power circuit So that the
`vehicle may be started. The processor may further indicate
`that the Security System has been disarmed Such as, for
`example, turning off an “armed” signal and turning on an
`“unarmed” Signal, based upon the features of the Safety
`device so that the car thief will not be able to discern that the
`Safety device is aware of the Situation. The car thief may
`then drive away in the car. Optionally, where the vehicle has
`an installed telephone, the processor may make the tele
`phone's microphone active, both during and after the entry
`of the dureSS code, So that Sounds and conversations within
`the vehicle can be monitored by the authorities or emergency
`contacts notified.
`If an incorrect code is entered, the Security System will not
`disarm the System and not unlock the doors. The Security
`System may allow a predetermined number of additional
`attempts to enter the correct normal code. If the correct code
`is not entered within the maximum allowable number of
`attempts, the Security System may trigger an alarm indicat
`ing that there is an attempted breach of Security.
`Either after a pre-set period of time following entry of the
`duress code or after a preset distance driven after entry of the
`dureSS code as measured by the vehicle's odometer, the
`processor immobilizes the vehicle either by closing the
`Solenoid valve in the fuel line or by opening the circuit
`breaker in the ignition power circuit or by any other means
`that will immobilize the vehicle. Optionally, the processor
`may cause the horn or Siren to Sound and cause the head
`lights and tail lights to blink or trigger other attention-getting
`devices or combinations thereof. The advantage of the
`present invention allows the car thief to drive away before
`the vehicle is immobilized, thereby separating the owner and
`the car thief before the car thief has a violent reaction to the
`immobilization of the vehicle. Preferably, the processor will
`monitor the operating condition of the vehicle and only
`disable the vehicle during a safe condition following the
`expiration of the time or distance limitation. For example,
`the processor may monitor the vehicle Speedometer and only
`disable the vehicle at Speeds less than 5 miles per hour or at
`a stop. Alternatively, the processor may gradually reduce the
`throttle or otherwise cause a gradual reduction in operation
`of the vehicle so that the vehicle becomes disabled or
`unusable in a safe manner.
`AS another option, the processor may utilize the mobile
`telephone mounted or installed in the car to Silently report
`the car theft with a pre-recorded message. The number
`dialed by the processor may be a number Stored in the
`Security System memory that connects with a Service, pro
`Vided by the vehicle company, the Security device company,
`or other Service provider, that receives and acts upon Such
`notices. Alternatively, the processor could be programmed to
`dial a Standard emergency telephone number Such as, for
`example, 911. If the vehicle has a Global Positioning System
`(GPS) mounted in the car, the processor could report the
`location of the vehicle by gathering that information from
`the GPS and including that information in the telephone
`message. Furthermore, with a GPS, the processor could
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,833,785 B2
`
`6
`determine the location of the car and, based upon the
`location, retrieve a telephone number Stored in its memory
`by location, for authorities responsible for emergencies in
`the present location of the vehicle. Alternatively, the mobile
`telephone System could provide location information, for
`example through emergency location Services or enhanced
`911.
`FIG. 2 is a flowchart of a method that may be executed on
`the system shown in FIG. 1 during a car theft. In state 102,
`a car owner or authorized driver enters a code into the
`Security System using a keypad. Under normal circum
`stances the entered code is the normal code. However, if the
`perSon entering the code is under dureSS to disarm the
`vehicle's Security System, then the person enters the dureSS
`code into the security system. In state 104, the security
`System's processor compares the entered code with the
`Stored normal code and the Stored dureSS code and deter
`mines whether the entered code matches either of the stored
`codes. If, in state 104, the code does not match one of the
`Stored codes, then, in State 106, the processor determines if
`the entry attempt is greater than a preset number of maxi
`mum allowable attempts to enter a correct code. This allows
`the authorized driver to mistakenly enter the code a few
`times without triggering an alarm. If, in State 106, the
`maximum number of allowable attempts has not been made,
`then the method starts over at state 102. E., in state 106, the
`maximum number of attempts allowed has been exceeded,
`then in state 108, the security system trips the audio and
`Visual alarms, Such as flashing the lights and Sounding the
`horn and/or a Siren for a Set period of time.
`If, in state 104, the entered code matches one of the stored
`codes, then in state 110, the Security System disarms itself,
`unlocks the doors and mobilizes the vehicle by opening the
`Solenoid valve on the fuel line or closing the circuit breaker
`on the ignition power System or by otherwise taking Steps
`necessary to mobilize the vehicle from the immobilized
`State. It is important to note that at this point, the System has
`responded exactly the same whether the normal code was
`entered or the dureSS code was entered. This ensures that the
`perSon imposing the dureSS has no indication that anything
`other than a normal disarming of the vehicle's Security
`System has occurred. If, in State 112, the normal code was
`entered, then in state 114, the method ends with the autho
`rized driver having full access to the vehicle restored. If, in
`State 112, the normal code was not entered, then the dureSS
`code was entered, and the method continues with state 113
`to determine whether the vehicle has a telephone installed.
`If a telephone is determined to be installed in the vehicle in
`state 113, then, in state 136, a telephone number is retrieved
`from memory to contact the authorities and report the crime
`in progreSS. Furthermore, if the vehicle has a Security System
`that communicates with a GPS mounted in the car or a
`mobile telephone location System installed in the telephone,
`then, in State 138, the processor can determine the location
`of the vehicle. In state 140, the processor then places a silent
`telephone call using the telephone to the telephone number
`retrieved from Storage and, in State 142, periodically or
`continuously plays a recorded message to the authorities
`reporting the theft and inserting the current location of the
`vehicle into the message. The Silent telephone call is carried
`out by the processor using the telephone antenna, but
`without Sending any audio signals to the vehicle or tele
`phone Speakers.
`In State 116, the car thief may start the engine and drive
`the vehicle away, thereby removing the car thief from the
`vicinity of the perSon under dureSS So that the person may
`Safely escape and Summon help. In State 118, the Security
`
`IPR2022-00602
`Apple EX1036 Page 7
`
`

`

`7
`System processor reads the initial odometer value and in
`state 120, waits a pre-determined length of time before, in
`State 122, reading the current odometer value again. In State
`124, the method continues to state 124 of FIG. 2B. In state
`126, the processor determines the miles driven Since the
`initial odometer value and if, in state 128, the miles driven
`are not at least the minimum pre-determined amount, then in
`state 130, the method continues back to state 120 of FIG.2A.
`If, in state 128, the number of miles traveled is greater than
`the minimum pre-determined amount, then in State 129, the
`processor determines whether the vehicle is currently being
`operated in a condition that is Safe to be disabled, Such as
`moving at a low speed or Sitting at a stop. If it is not Safe to
`disable the vehicle, then state 129 is repeated. Once a safe
`condition is determined, then in State 132, the processor
`immobilizes the car by, for example, opening the circuit
`breaker on the ignition power circuit and then, in State 134,
`trips the Visual and audio alarms, Such as, for example,
`Sounding the horn and flashing the headlights and taillights.
`It will be understood from the foregoing description that
`various modifications and changes may be made in the
`preferred embodiment of the present invention without
`departing from its true Spirit. It is intended that this descrip
`tion is for purposes of illustration only and should not be
`construed in a limiting Sense. The Scope of this invention
`should be limited only by the language of the following
`claims.
`What is claimed is:
`1. A method of alerting authorities during a car theft
`comprising the Steps:
`receiving a personal identification number into a vehicle
`Security System;
`determining that the personal identification number is a
`dureSS code; then
`disarming the Security System, wherein the vehicle maybe
`entered and driven away without any indication of an
`alarm; and
`disabling the vehicle after one or more predetermined
`eVent.
`2. The method of claim 1, wherein the one or more
`predetermined event is Selected from the passing of a
`pre-determined amount of time, the traveling of a pre
`determined distance, or proximity of a police car.
`3. The method of claim 1, wherein the duress code has an
`identical number of alphanumeric characters as a normal
`personal identification number, wherein the normal personal
`identification number is the number entered to disarm the
`Security System.
`4. The method of claim 1, wherein the step of determining
`that the dureSS code has been entered further comprises:
`reading the entered code;
`retrieving the dureSS code from memory; and
`comparing the entered code with the dureSS code.
`5. The method of claim 1, wherein the step of disabling
`the vehicle is selected from shutting off a fuel line or
`opening a circuit breaker in an ignition power circuit.
`6. The method of claim 1, further comprising:
`determining that the vehicle is in a Safe condition for
`being disabled before disabling the vehicle.
`7. The method of claim 1, after the vehicle has been
`disabled, further comprising:
`Sounding an alarm Selected from Sounding the horn,
`Sounding an alarm Siren, blinking the headlights, blink
`ing the tail lights or combinations thereof.
`8. The method of claim 1, wherein a mobile telephone is
`installed in the vehicle, the method further comprising:
`
`5
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,833,785 B2
`
`8
`retrieving a telephone number for authorities from a
`Security System memory,
`calling authorities at the telephone number; and
`notifying the authorities of the car theft.
`9. The method of claim 8, wherein the authorities are
`Selected from law enforcement, alarm System provider,
`private Security provider or combinations thereof.
`10. The method of claim 8, wherein a Global Positioning
`System is mounted in the vehicle, further comprising:
`reading the location of the vehicle from the global posi
`tioning System; and
`notifying the authorities of the vehicle's location.
`11. The method of claim 8, wherein the step of notifying
`is by means Selected from a pre-recorded message or an
`interactive voice response System, or combinations thereof.
`12. The method of claim 8, wherein the step of calling
`authorities is done Silently.
`13. The method of claim 1, wherein a mobile telephone is
`installed in the vehicle, the method further comprising:
`reading the location of the vehicle from a location System
`using the mobile telephone, and
`notifying the authorities of the vehicle's location.
`14. A computer program product on a computer readable
`medium comprising:
`receiving instructions for receiving a per

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket