Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
CLOUD-ENABLED VEHICLE AUTOSTART MONITORING
Document Type and Number:
WIPO Patent Application WO/2019/226459
Kind Code:
A1
Abstract:
In accordance with one aspect of the disclosure, an apparatus is provided that includes a database configured to store one or more vehicle status parameters of a vehicle and one or more secured space status parameters of a secured space. The apparatus further includes a server-based processor operatively coupled or connected to the database and configured to receive one or more of the one or more vehicle status parameters and one or more of the one or more secured space status parameters. The server-based processor is further configured to determine, based on at least one of the one or more vehicle status parameters and at least one of the one or more secured space status parameters whether to change a state of the vehicle.

Inventors:
CRAWFORD LAURA (US)
HOPKINS GARTH WESLEY (US)
KHAMHARN ODDY (US)
LUKAS EDWARD JAMES (US)
STRUCKMEYER ERICH (US)
TRAINOR JAMES (US)
Application Number:
PCT/US2019/032684
Publication Date:
November 28, 2019
Filing Date:
May 16, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CHAMBERLAIN GROUP INC (US)
International Classes:
F02D41/04; B60K28/00
Foreign References:
US20110030638A12011-02-10
US20130110376A12013-05-02
CA2555837A12008-02-09
US20140149022A12014-05-29
Attorney, Agent or Firm:
KRATZ, Rudy et al. (US)
Download PDF:
Claims:
CLAIMS

1. An apparatus comprising:

a database configured to store one or more vehicle status parameters of a vehicle and one or more secured space status parameters of a secured space; and

a server-based processor operatively coupled or connected to the database, the processor configured to:

receive one or more of the one or more vehicle status parameters and one or more of the one or more secured space status parameters; and

determine, based on at least one of the one or more vehicle status parameters and at least one of the one or more secured space status parameters whether to change a state of the vehicle.

2. The apparatus of claim 1, wherein the processor is configured to determine whether to change the state of the vehicle by at least determining whether to start the vehicle or determining whether to shut off the vehicle.

3. The apparatus of claim 2 wherein the processor is configured to determine whether to start the vehicle based at least in part on a confidence algorithm.

4. The apparatus of claim 3, wherein the processor is configured to use the confidence algorithm to determine whether the vehicle should start, whether a user should decide whether the vehicle should start, or whether the vehicle should not start.

5. The apparatus of claim 4, wherein the processor is further configured to:

send an override request to a user device in response to the confidence algorithm

determining that a user should decide whether the vehicle should start; and cause the vehicle to start in response to the confidence algorithm determining that the vehicle should start.

6. The apparatus of claim 2 wherein the processor is configured to determine whether to shut off the vehicle based at least in part on a confidence algorithm.

7. The apparatus of claim 6, wherein the processor is configured to use the confidence algorithm to determine whether the vehicle should shut off, whether a user should decide whether the vehicle should shut off, or whether the vehicle should not shut off.

8. The apparatus of claim 7, wherein the processor is further configured to:

monitor the one or more vehicle status parameters and the one or more secured space status parameters;

send a permission request to a user device in response to the confidence algorithm

determining, based on at least one of the one or more vehicle status parameters and at least one of the one or more secured space status parameters, that a user should decide whether the vehicle should shut off; and

cause the vehicle to shut off in response to the confidence algorithm determining, based on at least one of the one or more vehicle status parameters and at least one of the one or more secured space status parameters, that the vehicle should be shut off.

9. A vehicle for use in or proximate to a secured space, the vehicle comprising: a processor configured to receive a first command to change a state of the vehicle;

one or more electronic control units operatively coupled to the processor and configured to determine status parameters of the vehicle; and

a communication interface coupled to the processor and configured to send one or more vehicle status parameters of the vehicle to a server;

wherein the communication interface is further configured to receive a second command, based on at least one of the one or more vehicle status parameters and at least one secured space status parameter of the secured space, and

wherein the processor is further configured to change the state of the vehicle based on the second command.

10. The vehicle of claim 9 wherein the processor is further configured to buffer the first command and to execute the first command in response to receiving the second command.

11. The vehicle of claim 9 wherein the processor is further configured to buffer the first command for a period of time and to execute the first command in response to receiving the second command before the period of time passes.

12. The vehicle of claim 9, wherein the second command is determined based at least in part on a confidence algorithm.

13. The vehicle of claim 12, wherein the confidence algorithm determines whether the vehicle should start, whether a user should decide whether the vehicle should start, or whether the vehicle should not start.

14. The vehicle of claims 12 wherein the communication interface is further configured to receive the second command from a user device upon the confidence algorithm determining that the user should decide whether to start the vehicle and the communication interface is configured to receive the second command from the server upon the confidence algorithm determining that the vehicle should start.

15. A vehicle for use in or proximate to a secured space, the vehicle comprising: a processor configured to send one or more vehicle status parameters of the vehicle to a server while the vehicle is in the started state;

a communication interface configured to receive a shut off command from the server while the vehicle is in the started state, the shut off command based at least in part on the one or more vehicle status parameters and at least one secured space status parameter of the secured space.

16. The vehicle of claim 15, wherein the shut off command is determined based at least in part on a confidence algorithm.

17. The vehicle of claim 16, wherein the confidence algorithm determines whether the vehicle should be shut off, whether a user should decide whether the vehicle should be shut off, or whether the vehicle should not be shut off.

18. The vehicle of claims 17 wherein the communication interface is further configured to:

receive the shut off command from a user device upon the confidence algorithm

determining that the user should decide whether to start the vehicle and

receive the shut off command from the server upon the confidence algorithm

determining that the vehicle should be shut off.

19. A method comprising:

receiving, at a server-based processor, at least one vehicle status parameter of a vehicle and at least one secured space status parameter of a secured space;

determining, by the server-based processor, based on the at least one vehicle status parameter and the at least one secured space status parameter whether to change a state of the vehicle; and

causing, by the server-based processor, over a communication network, the vehicle to change state based on the determining.

20. The method of claim 19, wherein causing the vehicle to change state based on the determining causes the vehicle to start.

21. The method of claim 19, wherein causing the vehicle to change state based on the determining causes the vehicle to shut off.

22. The method of claim 19 wherein determining includes determining by a confidence algorithm of the server-based processor.

23. The method of claim 22, further comprising: sending, by the server-based processor, an override request to a user device in response to the determining by the confidence algorithm determining that a user should decide whether to start the vehicle;

receiving, at the server-based processor, an override response to the override request from the user device; and

sending, by the server-based processor, a start command to the vehicle in response to receiving the override response.

24. The method of claim 23, the method further comprising:

sending, by the server-based processor, a permission request to the user device in

response to determining that a user should decide whether to shut off the vehicle; receiving, at the server-based processor, a permission response from the user device; and

sending a shut off command to the vehicle in response to receiving the permission response.

Description:
CLOUD-ENABLED VEHICLE AUTOSTART MONITORING

CROSS-REFERENCE TO RELATED APPLICATION

[0001] This application claims the benefit of U.S. Provisional patent application number 62/674,601, filed May 21, 2018, which is incorporated by reference in its entirety herein.

FIELD

[0002] This disclosure relates to a cloud-enabled movable barrier operator system and, specifically, to a cloud-enabled movable barrier operator system for monitoring and controlling auto-start of a vehicle in or proximate to a secured space controlled by the movable barrier operator.

BACKGROUND

[0003] A garage is a confined space and as automotive technology advances more and more vehicles are coming equipped with auto-start functionality. Auto-start functionality allows for remote starting of a vehicle, and many vehicles that have auto- start functionality have keyless ignitions. Because the user of a vehicle with auto-start functionality does not need to be in the vehicle to start the vehicle, or take the keys out of the ignition, the likelihood that noxious and potentially harmfully gases will fill the garage increases. For example, the user may forget the vehicle is running.

[0004] Electric vehicles are quiet, and users of electric vehicles often forget that they are running. Leaving electric vehicle running drains the vehicle’s batteries and creates the potential for unwanted use of the vehicle. For example, a parent may accidently leave an electric vehicle running, increasing the risk that a child may operate the vehicle.

[0005] Improved control systems for auto-start and auto-shutoff of vehicles parked in or proximate to a secured space such as a garage are needed. A central problem in developing such a system is the development of appropriate data to enable modern control systems to decide when to start a vehicle, when to shut off a vehicle, and when to let a user make that choice. Moreover, modern controls systems must be designed in a way that is intuitive and easy to use for the user while minimizing the potential harm to users or their property.

[0006] The business model of a modern automotive manufacturer is becoming more service oriented. For example, Ford®, in addition to selling the consumer a vehicle, sells the consumer the service that comes along with the vehicle. The quality of that service is telling indicia of the quality of the auto manufacturer’s brand, just like the quality of vehicle itself. As such, auto manufactures need reliable sources of data and reliable algorithms to implement decision based on that data that are intuitive and easy to use for the customer while minimizing the potential harm to customers or their property.

[0007] A system that addresses these concerns is described in detail below.

BRIEF DESCRIPTION OF THE DRAWINGS

[0008] FIG. 1 illustrates a control system for determining when to change the state of a vehicle in or proximate to a secured space.

[0009] FIG. 2 illustrates a control system for determining when to change the state of a vehicle in or proximate to a secured space implemented entirely by a third- party vendor to the vehicle.

[0010] FIG. 3 illustrates the control system of FIG. 1 implemented as an

authorized user in the loop control system.

[0011] FIG. 4 diagrams conditions in which the control system should start a vehicle and conditions in which the control system should not start a vehicle

[0012] FIG. 5 illustrates a problem to be solved by the control system in which more than one vehicle is in or proximate to a secured space.

[0013] FIG. 6 illustrates a vehicle designed to interface with the control system.

[0014] FIG. 7 illustrates the control system of FIG. 3 having a confidence algorithm for determining when to change the state of a vehicle.

[0015] FIG. 8 illustrates the confidence algorithm embodied as a single layer neural expert system having a start process under control. [0016] FIG. 9 illustrates the confidence algorithm embodied as a single layer neural expert system having a turn off process under control.

[0017] FIG. 10 illustrates the confidence algorithm embodied as a multi-layer neural expert system having a start process under control.

[0018] FIG. 11 illustrates the confidence algorithm embodied as a multi-layer neural expert system having a turn off process under control.

[0019] FIG. 12 illustrates the confidence algorithm embodied as a neuro-fuzzy system having a start process under control.

[0020] FIG. 13 illustrates the confidence algorithm embodied as a neuro-fuzzy system having a turn off process under control.

[0021] FIG. 14 illustrates a functional block diagram of a movable barrier operator.

[0022] FIG. 15 illustrates a functional block diagram of a control device.

[0023] FIG. 16 illustrates a functional block diagram of a key fob device.

DETAILED DESCRIPTION

[0024] With reference to Fig. 1, an access control platform server 100 is connected to a telematics service provider (“TSP”) server 130 and an access control platform 110. The TSP associated with the TSP server 130 may provide services such as roadside assistance, emergency response service, automatic crash response, infotainment service, and/or vehicle connectivity service as some examples. The access control platform server 100 may connect to the TSP server 130 and access control platform 110 over one or more networks such as the Internet. The access control platform server 100 may connect to the access control platform 110 through any or all of the access control devices 101 and/or the movable barrier operator 115. The access control platform 100 and the TSP server 130 may have computing resources, including processors 100 A, 130A, located in the cloud.

[0025] Optionally, the access control platform server 100 may communicate directly with a vehicle 120, again, over one or more communications networks such as the Internet. The access control platform server 100 may be configured to send, receive, associate, determine, and cause to be stored one or more status parameters of a vehicle, such as vehicle 120, and/or an access control platform, such as access control platform 110. Additionally, the access control platform server 100 may be configured to send one or more commands to control when a vehicle, such as vehicle 120, is started and when the vehicle is shut off.

[0026] The access control platform 110 may include one or more access control devices 101, 115. For example, the access control platform 110 may include one or more access control devices such as movable barrier operator 115 and/or one or more locking mechanisms, such as access control devices 101, connected over a communications network such as the Internet. The access control devices 101, 115 of the access control platform 110 may also be networked to each other in a peer-to- peer ad hoc fashion using a short-range communication protocol such as Bluetooth® (or Bluetooth Low Energy (BLE), or Near Field Communications (NFC), or Wi-Fi) with at least one of the access control devices 101, 115 of the access control platform 110 being able to access a communications network such as the Internet.

[0027] The access control platform server 100 may be connected or coupled to an access control platform database 105 to store one or more status parameters of a vehicle, such as vehicle 120, or the secured space 15. The status parameters of the secured space 15 may be determined by an access control platform, such as access control platform 110. The access control platform database 105 may be, for example, a cloud storage or computing solution. The access control platform database 105 may be further configured to store one or more commands to control when a vehicle, such as vehicle 120, is started and when the vehicle is shut off.

[0028] The TSP server 130 may be configured to send, receive, associate, determine, and cause to be stored one or more status parameters of a vehicle, such as vehicle 120, or the secured space 15. The status parameters of the secured space 15 may be determined by an access control platform, such as access control platform 110. The TSP server 130 may connect to the access control platform 115 and/or the vehicle 120 over one or more networks such as the Internet. Additionally, the TSP server 130 may be further configured to send one or more commands to control when a vehicle, such as vehicle 120, is started and when it is shut off. The TSP server 130 may receive one or more status parameters or commands from the access control platform server 100, the access control platform 110, or the vehicle 120.

[0029] The TSP server 130 may be connected or coupled to a TSP database 135 to store one or more status parameters of a vehicle, such as vehicle 120, or the secured space 15. The status parameters of the secured space 15 may be determined by an access control platform, such as access control platform 110. The TSP database 135 may be, for example, a cloud storage solution. The TSP database 135 may be further configured to store one or more commands to control when a vehicle, such as vehicle 120, is started and when the vehicle is shut off.

[0030] The movable barrier operator 115 of the access control platform 110 may connect to the one or more access control devices 101, the access control platform server 100, the TSP server 130, and the vehicle 120 over one or more networks such as the Internet. The movable barrier operator 115 may also connect to the vehicle 120 and the one or more access control devices 101 using a short-range

communication protocol such as Bluetooth® (or Bluetooth Low Energy (BLE), or Near Field Communications (NFC), or Wi-Fi). As illustrated in Fig. 14, the movable barrier operator 115 may include a processor 1403 coupled or connected to a memory 1404, a communication interface 1401, and one or more sensors 1402. The communication interface 1401 may be configured to send and receive status parameters or commands to and from the user device 310 (Fig. 3), one or more of the access control devices 101, the vehicle 120, the TSP server 130, or the access control platform server 100. The one or more sensors 1402, may include, for example, a camera, a microphone, one or more noxious gas detectors, and a photo eye. The one or more sensors 1402 may determine one or more of the status parameters of the secured space 15.

[0031] The one or more access control devices 101 of the access control platform 110 may connect to the movable barrier operator 115, the access control platform server 110, the TSP server 130, and the vehicle 120 over one or more networks such as the Internet. The one or more access control devices 101 may also connect to the vehicle 120 or the movable barrier operator 115 using a short-range communication protocol such as Bluetooth® (or Bluetooth Fow Energy (BEE), or Near Field Communications (NFC), or Wi-Fi). As illustrated in Fig. 15, the one or more access control devices 101 may include a processor 1503 coupled or connected to a memory 1504, a communication interface 1501, and one or more sensors 1502. The communication interface 1501 may be configured to send and receive status parameters or commands to and from the user device 310 (Fig. 3), movable barrier operator 115, the vehicle 120, the TSP server 130, or the access control platform server 100. The one or more sensors 1502, may include, for example, an

accelerometer, a gyroscope, a magnetometer, a camera, a microphone, one or more noxious gas detectors, and a photo eye. The one or more sensors 1502 may determine one or more of the status parameters of the secured space 15.

[0032] Access control platform 110 controls access to the secured space 15. The secure space 15 may be, for example, a garage or a home. For example, the movable barrier operator 115 of the access control platform 110 may be disposed in the secured space 15 and may be coupled to a movable barrier 45. The movable barrier operator 110 may be, for example, a garage door opener as illustrated in FIG. 1. The movable barrier operator 110 may be an operator such as a jackshaft operator, a swinging door operator, or a sliding gate operator. The movable barrier operator 110 may have, for example, a belt drive, a chain drive, or a screw drive. The movable barrier 45 may be a garage door that is configured to, for example, move along a track or pivot on a hinge. The access control platform 110 may also control access to a home by controlling the locking mechanism of one or more man doors via one or more of the access control devices 101. The state of a man door may be a status parameter of the secured space 15. For example, the one or more access control devices 101 may determine lock state and movement history of the man door and transmit them to the access control platform server 100 either directly or indirectly through, for example, the movable barrier operator 115.

[0033] The access control platform 110 may receive one or more signals from the vehicle 120 regarding the state of the vehicle 120. The one or more signals regarding the state of the vehicle 120 may be generated by one or more electronic control units (ECUs) (see FIG. 6) and communicated to a central processing unit 620 of the vehicle 120 through an ECU data bus 630. The central processing unit 620 may be configured to send and receive data, including the one or more data generated by the ECUs, to the access control platform 110, the access control platform server 100, the TSP server 130, and the user device 310. The access control platform 110, the access control platform server 100, the TSP server 130, and the user device 310 may communicate with the vehicle 120 through a central

communication interface 610 of the vehicle 120 over one or more communication networks such as the Internet using any one or more various wireless communication protocols such as 3G, 4G, or 5G or it may communicate directly with any one of the individual ECUs to receive one or more signals regarding the state of the vehicle 120. The direct communication with the ECUs of the vehicle 120 and

communication through a central communication interface 610 may also occur a short-range communication protocol such as Bluetooth® (or Bluetooth Low Energy (BLE), or Near Field Communications (NFC), or Wi-Fi. Communication directly with the one or more ECUs of the vehicle 120 improves system response time to commands, reduces data compression errors, and provides a more seamless user experience, whereas communication through the central interface is generally more secure.

[0034] The access control platform 110 may be networked or coupled to one or more peripheral devices such as images sensors, microphones, photo eyes, carbon monoxide or noxious gas detectors, weights sensors, charging devices, or other safety sensors or vehicle service devices. Furthermore, the access control platform 110 may determine status parameters of a secured space 15 from, for example, the peripheral devices. Status parameters may include an indication of whether the garage door is closed or open, an indication of whether, when, and how frequently a beam of a photo eye device was broken, or an indication that a vehicle has been recognized to be in the secured by space 15 by an image sensor coupled or connected to the access control platform 110.

[0035] The vehicle 120 may generate one or more signals via one or more ECUs to be sent to the access control platform 110, the access control platform server 100, or the TSP server 130. For example, the ECUs of the vehicle 120 may include a vehicle location ECU, such as a GPS module for determining the latitude, longitude, and elevation of a vehicle, and the vehicle location ECU may be capable of determining the heading, speed, velocity, and acceleration of the vehicle 120; an odometer ECU that may improve the location estimate of the vehicle 120 and similarly improve dead-reckoning calculation; a wheel pulse ECU for improving dead-reckoning calculations; a tachometer ECU; a wheel position ECU for determining wheel position; an accelerometer ECU; a gyroscope ECU; and a presence ECU for determining whether a driver or passenger is present in the vehicle. The presence ECU may include, for example, weight/pressure sensors, microphones, images sensors, and seat belt sensors for determining if the vehicle 120 is occupied. The vehicle 120 may include one or more of the ECUs discussed above.

[0036] The vehicle 120 may store one or more pieces of data to be sent to the access control platform 110, the access control platform server 100, or the TSP server 130. For example, the vehicle 120 may store an ignition state, vehicle identification number (VIN), key fob identifier data, braking information, blinker information, charge state, and data, obtained by, for example, vehicle to vehicle communication, indicating the presence of another vehicle proximate the vehicle 120. The vehicle 120 may also store historical records or data of any of the aforementioned or any other data collected by the ECUs or obtained by the vehicle. The vehicle 120 may also communicate with other vehicles to determine data regarding a state of the other vehicle upon receiving a command from the access control platform 110, the access control platform server 100, or the TSP server 130. Similarly, the vehicle 120 may transmit any data collected by any one of the one or more ECUs in real-time, at a fixed time interval, or after the size of data payload reaches a threshold amount to the access control platform 110, the access control platform server 100, or the TSP server 130 to be stored or processed.

[0037] The vehicle 120 may have an embedded or third-party application installed as a software module to facilitate communication from the vehicle 120 to the access control platform 110 and/or the access control platform server 100 to assist the vehicle in deciding when to start a vehicle, when to shut off a vehicle, and when to let a user make that choice. For example, a user of vehicle 120 may request remote start of the vehicle 120 from a device, such as device 310, configured to send a remote start signal to the vehicle 120. The device configured to send a remote start signal to the vehicle 120 may be, for example, a radio frequency transmitter such as a key fob, a mobile phone, or another computing system such as a home

management system, and start may be requested by a radio broadcast, a short range wireless communication protocol such as Bluetooth®, or over one or more networks such as the Internet. In another option, the vehicle 120 may receive the command to start via a direct voice command. In the case that the start request is sent over the Internet, it may be received at the TSP server 130, and the TSP server 130 may send the start request to the access control platform server 100 to determine whether to start the vehicle 120.

[0038] With reference to Fig. 2, a system is illustrated that is substantially the same as the system that is illustrated in Fig. 1 except that the device the user uses to request a vehicle, such as vehicle 220, to start communicates directly with the access control platform server 200. The movable barrier operator 215 is coupled to the access control platform 210 having one or more other access control devices 201. The movable barrier operator 215, the access control platform 210, and the one or more access control devices 201 perform the same or similar functions as like parts of the system of Fig. 1. The movable barrier operator 215 operates the movable barrier 65 to control access to the secure space 25 in the same or similar manner to like features of the system of Fig. 1.

[0039] With reference to Fig. 3, the control system of Fig. 1 is illustrated as an authorized-user-in-the-loop control system. In the authorized-user-in-the-loop control system of FIG. 3 a user device 310 is coupled to one or more of the vehicles, such as vehicle 120, the access control platform 110, the TSP server 130, or the access control platform server 100. The user device 310 may be configured to send or receive one or more commands to control when a vehicle, such as vehicle 120, is started and when the vehicle is shut off. For example, a user may request that the vehicle 120 is started from the user device 310, the command may be received, by the vehicle 120, the access control server 100, the access control platform 110 or the TSP server 130. In the case that the start request is received by the vehicle 120, the access control platform 110, or the TSP server 130 the start request may be transmitted or relayed to the access control server 100 for further processing. The access control platform server 100 may then, in response to receiving the start request, determine whether or not the vehicle should be started based one or more status parameters of the secured space 15 or the vehicle 120. The access control platform server 100 may determine from the received status parameters that the vehicle is in the garage and the garage door is closed and, in response to that determination, determine that the vehicle 120 should not be started. Likewise, if the garage door is open the access control platform server 100 may determine that the vehicle 120 can be started, see Fig. 4.

[0040] The user device 310 may be a smart phone, laptop, radio frequency transmitter such as a key fob 1600, another computing system such as a home management system, or any other device. In the case of the user device 310 that is not a key fob 1600 sending a start request, the start request may first be received by the key fob 1600, such as the key fob 1600 illustrated in Fig. 16, designed to grant access to the ignition system of the vehicle 120. A security token for starting the vehicle may be attached to the start request transmitted from the user device 310 by the user key fob 1600. The user key fob 1600 may then transmit the start request to the access control platform server 100 via the communication interface 610 (Fig. 6) of the vehicle 120 and/or one or more other devices such as the access control platform 110. Alternatively, the vehicle 120 will buffer the start request and wait for confirmation from the access control platform server 100 that the vehicle 120 should be or should not be started.

[0041] If the access control platform server 100 determines that the vehicle 120 should not be start based on one or more status parameters of the secured space 15 or the vehicle 120, the access control platform server 100 will not send a command to the access control platform 110, the vehicle 120, or the TSP server 130 to start the vehicle 120. In this case, the buffered start signal held by the vehicle 120 may expire, after a time, and be removed from the buffer. However, an override request may be sent to the user device 310. The override request may ask the user of the user device 310 if they would like to start the vehicle despite potential unsafe condition such as the garage door being closed. The override request may specify one or more reasons that the access control platform server 100 determined that the vehicle 120 should not be started. If the user responds to the override request before that start signal is cleared from the buffer by the central processing unit 610 of the vehicle 120, the vehicle 120 will be started if the user’s response to the override requests indicates that the vehicle 120 should be started.

[0042] If the vehicle 120 is in or proximate to the secured space, the access control platform server 100 may monitor the vehicle 120 is real time to determine if the vehicle 120 should be turned off. For example, if a user starts the vehicle 120 and the vehicle 120 is left running for a period of time and there is no other indicator that the vehicle 120 is intended to be used, for example a user sitting in the seat of the vehicle, the access control server 100 may turn off the vehicle 120. The access control platform server 100 may process one or more status parameters of the secured space 15 and the vehicle 120 to determine if the vehicle 120 should be turned off. If the access control platform server 100 cannot determine whether the vehicle 120 should be shut off, a permission request may be sent to a user device, such as user device 310, requesting permission to shut off the vehicle 120. The permission request may specify one or more reasons the access control platform server 100 decided not to turn off the vehicle.

[0043] Fig. 5 illustrates a problem where more than one vehicle 520, 530 may be associated with an access control platform 110 and where more than one vehicle is in or proximate to the secured space 15. In this case, the access control platform will have to determine which of the vehicles 520, 530 is in the secured space 15 using one or more status parameters of the vehicle 520, 530 and one or more status parameters of the secured space 15. The status parameters of both the vehicles 520, 530 will be used to determine which of the vehicles 520, 530 is in the secured space 15 and which is not. For example, VIN, ambient light sensor data, or vehicle movement history data including data such as GPS, wheel sensor data, and steering wheel position data may be used to determine which of the vehicles 520, 530 is in the secured space 15 and which of the vehicles 520, 530 is not in the secured space 15. If the vehicle for which the user sent a start request for example, from user device 540, is not in the secured space 15, the vehicle will start; otherwise if the vehicle for which the user sent the start request is in the secured space 15, the access control platform 100 will determine whether the vehicle should start.

[0044] In one such implementation, the access control platform tracks the vehicle using multiple signals to determine location (such as GPS data, wheel pulse data, and the like) to learn what it means to be in someone’s garage on a per vehicle basis. For example, person one always parks vehicle one in garage while person two’s vehicle is just outside. We would see a higher confidence interval that person one’s vehicle is in garage because 1) vehicle one’s location is approximate to what has been set up as home, 2) vehicle one’s distance traveled is within a certain amount of the door’s opening, 3) time stamps are compared to see when vehicle one turned off compared to when a door is opened, a beam of a photo eye device was broken, and the door is closed, 4) wheel pulse data is consulted to count the number of clicks to supplement GPS data to help location determination. If person two parks outside the garage but gets inside the house via the garage, the system will see that:

1) location is approximately by garage, 2) vehicle two was shut off before garage door opened, 3) a beam of a photo eye device was broken in a pattern not consistent with a vehicle passing through, 4) wheel clicks do not include the extra amount usually detected when vehicle is in right location, slowing down. Using GDO data or Wifi data, the system could understand if multiple users use the same garage and live in the same household. The users’ data could then be compared to improve confidence in the determinations.

[0045] The access control platform 110 may employ one or more confidence algorithms to determine whether the vehicle 120 should be started in response to the start request from the user. The confidence algorithm may be embodied as a neural system. For example, the confidence algorithm may be implemented as a single layer neural expert system (see Figs. 8, 9), a multilayer neural expert system (see Figs. 10, 11), or a neuro-fuzzy system (see Figs. 12, 13). Though not illustrated the confidence algorithm may be implemented as a neuro-fuzzy adaptive network or a neural adaptive network. The one or more confidence algorithms may have one or more processes under control. For example, it is contemplated that the processes under control may be the starting of the vehicle 120 and the turning off of the vehicle 120. The algorithms including the one or more processes under control can be implemented without the use of a confidence algorithm.

[0046] The neural system controlling the process of starting the vehicle 120 may decide whether to start the vehicle 120, let the user decide whether to start the vehicle 120, or decide not to start the vehicle 120. For example, if in response to an initial user request to start the vehicle 120 from a remote device, such as user device 310, the neural system may determine that it is not confident that the vehicle should be started. In this case, the vehicle will not start and an override request may be sent to the remote device asking the user whether the vehicle 120 should be started regardless. The override request may indicate one or more reasons the confidence algorithm decided not to start the vehicle 120. The override request may further allow the user to indicate which of the reasons are true and which of the reasons are false. The user’s response to the override request may be used to train or tune the confidence algorithm. In one example of this case, the TSP prompts the user with the override request, and data is returned as to whether the user engaged, which can be used to fine tune the algorithm. By responding to the override request, the user creates an override response.

[0047] The confidence algorithm may be executed by the access control platform server 100, as illustrated in Fig. 7. However, the confidence algorithm may also be executed on the TSP server, by the access control platform 110, or the vehicle 120. In one example, the access control platform server may send a confidence level that the vehicle 120 is parked in a garage to the TSP server or vehicle, which will then determine whether the vehicle 120 is allowed to start.

[0048] The neural systems controlling the process of turning off the vehicle 120 will decide whether to turn off the vehicle 120, let the user decide whether to turn off the vehicle 120, or decide not to turn off the vehicle 120. For example, if in response to one or more status parameters of the vehicle 120 or the secure space 15 that indicate that a vehicle should be shut off, the confidence algorithm is not confident that the vehicle 120 should be shut off, a permission request may be sent to a remote device, such as user device 310, asking the user whether not the vehicle may be shut off. The permission request may indicate one or more reasons the confidence algorithm decided not to shut off the vehicle 120. The permission request may further allow the user to indicate which of the reasons are true and which of the reasons are false. The user’s response to the override request may be used to train or tune the confidence algorithm. By responding the permission request, the user creates a permission response.

[0049] In the case of the confidence algorithm being implemented as a neural expert system the confidence algorithm will send the override request if a fuzzy inference of the neural expert system indicates that the user should decide whether or not to start the vehicle 120. Similarly, the neural expert system may, in one

embodiment, send the override request if the inequality of equation (1), below, is false.

[0050] If the inequality of equation (1) above is false no fuzzy inference can be made by the neural expert system for a particular neuron for which the inequality is false. Equation (1) stands for the fact that that the confidence system embodied as a neural expert system cannot infer whether a particular action should execute unless that the sum of the net weighted input to the neuron is greater than the sum of the absolute value of the weights of the unknown inputs. The variable in the equation above represents the value of an input to the neural expert system and the variable w t is the weight corresponding to a given input, X j . The variable W j represents the weight of an unknown input.

[0051] The confidence algorithm embodied as one or more neural expert systems may have one or more processes under control. For example, the confidence algorithm may have a neural expert system for controlling the process of starting a vehicle as illustrated in Figs. 8 and 10. In the single layer neural expert system of Fig. 8 and the multi-layer neural expert system of Fig. 10, the neural expert systems are illustrated as having three inputs: the state of the garage door, for example whether or not the garage door is open; the state of the photo eye, for example whether or not a light beam of a photo eye was broken; and the state of a vehicle, for example one or more vehicle status parameters may indicate that a vehicle is in the garage. Fig. 10 illustrates a multi-layer neural expert system that uses the data of GPS sensors and dead reckoning techniques utilizing vehicle status parameters such as wheel turns and secure space status parameters such as the breaking of a light beam of a photo eye to determine whether the vehicle 120 is in the secure space 15.

[0052] The confidence algorithm may have a neural expert system for controlling the process of turning off a vehicle as illustrated in Figs. 9 and 11. In the single layer neural expert system of Fig. 9 and the multi-layer neural expert system of Fig. 11, the neural expert systems are illustrated as having three inputs: the state of the weight sensor, for example the weight sensor may indicate that a seat is empty; the state of a man door, for example one or more sensors may indicate that a man door has been opened; and the state of a vehicle, for example one or more vehicle status parameters may indicate that a vehicle is in the garage. Fig. 10 illustrates a multi-layer neural expert system that uses the data of GPS sensors and dead reckoning techniques utilizing vehicle status parameters such as wheel turns and secure space status parameters such as the breaking of a light beam of a photo eye to determine whether the vehicle 120 is in the secure space 15.

[0053] The embodiments of Figs. 8-11 are only examples, the systems may have more or less inputs, more or less rules, and more or less outputs. Similarly, the systems may consist of as few or as many layers are necessary to control a process of starting a vehicle or a process of shutting off a vehicle.

[0054] In the case of the confidence algorithm being implemented as a neuro-fuzzy system controlling the process starting a vehicle (Fig. 12), the output of the neuro-fuzzy system may be, for example, a single probability value, x. As such, the determination of whether to start the vehicle 120, to ask the user whether the vehicle should be started, or to not start the vehicle may be determined by a conditional argument such as the conditional argument below:

c ³ 70%, start the vehicle

x < 70% and x ³ 40%, let the user decide

x < 40%, do not start the vehicle

If the confidence algorithm implemented as a neuro-fuzzy system determines that the user should decide whether or not to start the vehicle 120, the access control platform server 100 may send an override request to the user device 310. The override request may indicate one or more reasons the confidence algorithm decided not to start the vehicle 120. The override request may further allow the user to indicate which of the reasons are true and which of the reasons are false. The user’s response to the override request may be used to train or tune the confidence algorithm using techniques such as backpropagation. Both the probability value x and the ranges of the conditional argument may be adjusted. For example, the confidence algorithm may feedforward probability value x or an error value determined from the probability value x to adjust the ranges of the conditional argument prior to making a determination based on the conditional argument.

[0055] In the case of the confidence algorithm being implemented as a neuro-fuzzy system controlling the process shutting off a vehicle (Fig. 13), the output of the neuro- fuzzy system may be, for example, a single probability value, x. As such, the determination of whether to shut off the vehicle 120, to ask the user whether the vehicle should be shut off, or to not shut off the vehicle may be determined by a conditional argument such as the conditional argument below:

If the confidence algorithm implemented as a neuro-fuzzy system determines that the user should decide whether to shut off the vehicle 120, the access control platform server 100 may send a permission request to the user device 310. The permission request may indicate one or more reasons the confidence algorithm decided to shut off the vehicle 120. The permission request may further allow the user to indicate which of the reasons are true and which of the reasons are false. The user’s response to the permission request may be used to train or tune the confidence algorithm using techniques such as backpropagation. Both the probability value x and the ranges of the conditional argument may be adjusted. For example, the system may feedforward probability value x or an error value determined from the probability value x to adjust the ranges of the conditional argument prior to making a determination based on the conditional argument. [0056] The embodiments of Figs. 12 and 13 are only examples, and the systems may have more or less inputs, more or less rules, and more or less outputs. The inputs to the neuro-fuzzy systems of Figs. 12 and 13 may be similar to the inputs to the neural expert system of Figs. 8 and 9 except the one or more status parameters of the vehicle may be used to determine each input and the one or more status parameters may be normalized to a particular universe of discourse before being input into layer 1 as crisp values so that they may be fuzzified by reference to the universe of discourse in layer 2.

[0057] While there have been illustrated and described particular embodiments of the present invention, it will be appreciated that numerous changes and

modifications will occur to those skilled in the art, and it is intended for the present invention to cover all those changes and modifications which fall within the scope of the appended claims.