Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
DISTANT CONTROL METHOD OF VEHICLE REGISTRATION AND VEHICLE IDENTIFICATION CONSISTENCY
Document Type and Number:
WIPO Patent Application WO/2013/085470
Kind Code:
A1
Abstract:
The subject of the invention is the method of distant control of consistency between vehicle registration and vehicle identification. The method according to the invention solves technical problems of: control of consistency between vehicle registration and identification, traffic control and automatic collection of fees (tolls, bridge tolls, parking fees etc.), while in addition to solving the problem of vehicle theft, the implementation of the mechanism for distant identification of vehicles opens up a wide range of possible uses of such system for commercial or non-commercial purposes. The identification of the vehicle takes place on the basis of two RFID tags: the RFID tag for vehicle identification, which includes the vehicle code and the RFID tag built into the license plate, which includes the vehicle owner identification code, whereby the relevant code is calculated on the basis of vehicle code. The identification of the vehicle itself is performed in such a manner that the control point reads the two vehicle identification numbers from both RFID tags for every passing vehicle and returns the result on consistency between both RFID tags. The data on a vehicle passing through the control point is recorded and the identified vehicle is checked if it is on the list of vehicles sought. In case of a positive reply, an alarm is triggered on the console used by the police officer in the control centre.

Inventors:
CERAR JANKO (SI)
NOVAK PETER (SI)
NOVAK PETER JR (SI)
STURM MILAN (SI)
Application Number:
PCT/SI2012/000004
Publication Date:
June 13, 2013
Filing Date:
February 03, 2012
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CERAR JANKO (SI)
NOVAK PETER (SI)
NOVAK PETER JR (SI)
STURM MILAN (SI)
International Classes:
B60R25/00; G07B15/00
Domestic Patent References:
WO2007092482A22007-08-16
WO2010008289A12010-01-21
Foreign References:
US20040207526A12004-10-21
KR20090038569A2009-04-21
Other References:
None
Attorney, Agent or Firm:
DELIĆ, Marjan (3210 Slovenske Konjice, SI)
Download PDF:
Claims:
PATENT CLAIMS

1. The method of distant control of consistency between vehicle registration and vehicle identification characterized in that it comprises at least one control, point, at least one server, database of registered vehicles, database of stolen vehicles, information system, RFID tag for identification and RFID tag for registration, whereby both RFID tags are installed on the vehicle in such a manner that they cannot be removed from the vehicle without being destroyed.

2. The method according to claim 1 characterized in that the vehicle code is written on the RFID tag for vehicle identification.

3. The method according to claim 1 characterized in that the vehicle owner identification code is written on the RFID tag for registration.

4. The method according to any claims 1 to 3 characterized in that the vehicle owner identification code is calculated on the basis of the vehicle code.

5. The method according to any of claims 1 to 4 characterized in that the RFID tags on are installed on the vehicle by the RFID installer.

6. The method according to any of claims 1 to 5 characterized in that the RFID tag is attached in such a manner that it is connected to the engine immobiliser system.

7. The method according to any of claims 1 to 6 characterized in that the RFID tags are designed in such a manner that once they have been installed on the surface for the first time, they cannot be removed without being destroyed.

8. The method according to any of claims 1 to 7 characterized in that the control point reads the vehicle identification numbers from both RFID tags for every passing vehicle and compares the numbers.

9. The method according to any of claims 1 to 8 characterized in that the control point records the data on passing vehicles and at the same time checks the consistency between registration and identification data.

10. The method according to any of claims 1 to 9 characterized in that the control point triggers an alarm when it detects an inconsistency between the registration and identification data of a passing vehicle.

11. The method according to any of claims 1 to 9 characterized in that the control point triggers an alarm when it detects the presence of a- vehicle from the list of vehicles sought.

12. The method according to any of claims 1 to 11 characterized in that the system of control points is integrated into the information system via communication channels, where captured data is automatically processed and stored into a database, accessible to the users of the system.

13. The method according to any of claims 1 to 12 characterized in that the RFID system with active tags is used.

14. The method according to any of claims 1 to 13 characterized in that in the absence of both RFID tags the system checks the license plates on the basis of the system for visual detection of vehicles and license plate recognition.

15. The method according to any of claims 1 to 14 characterized in that on the basis of a comparison of the data on passing vehicles at two successive control points and the expected travelling time between these two control points the inadequate speed of vehicles is determined.

16. The method according to any of claims 1 to 15 characterized in that by accessing the database of motor vehicle registrations, the list of vehicles sought can be automatically updated with vehicles, for which the registration has expired.

17. The method according to any of claims 1 to 16 characterized in that the portable RFID tag readers are used, which enable quick checking of consistency of passing or stationary vehicles.

18. The method according to any claims 1 to 17 characterized in that both RFID tags are installed on every new vehicle.

19. The method according to any claims 1 to 18 characterized in that the RFID tag is installed on the vehicle when it is registered.

20. The method according to any claims 1 to 19 characterized in that during the operation of the system the operator can monitor the operation of all active system control points and related software at any time via control console.

21. The method according to any of claims 1 to 20 characterized in that it is used for automatic collection of fees.

Description:
DISTANT CONTROL METHOD OF VEHICLE REGISTRATION AND VEHICLE

IDENTIFICATION CONSISTENCY

DESCRIPTION OF INVENTION

Technical Field

Vehicle control; recovery of stolen vehicles; detection of expired registration; vehicle speed control; traffic control.

Technical Problem

In general, great number motor vehicles are stolen every year, of which only a minor part are recovered (10 to 20%). The basic indicator for determining whether a certain vehicle was stolen is the established inconsistency between the vehicle identification (chassis number written on the vehicle) and the documentation of ownership (registration number and chassis number listed in the vehicle registration certificate). The chassis number is usually stamped on the vehicle bodywork under the bonnet, while in newer vehicles it is also stamped under the windscreen wiper on the driver's side. In order for police officers to determine the abovementioned inconsistency, at present they must stop the vehicle, check the chassis number on the vehicle and compare it to the chassis number listed in the vehicle registration certificate. If the numbers do not match, the vehicle is stolen.

The inspection of a single vehicle can take up to 5 minutes (depending on the location of the chassis number on the vehicle and the conditions in which the inspection is performed - darkness, rain, snow etc.); therefore, only a small percentage of all vehicles can be examined in such manner within a routine check. By implementing the system for automating the control of consistency and, if possible, distant controlling of vehicles while they are in motion, the effectiveness of detecting stolen vehicles would increase substantially. In addition to solving the problem of vehicle theft, the implementation of the mechanism for distant identification of vehicles opens up a wide range of possible uses of such system for commercial or non-commercial purposes, such as payment for various services, customer loyalty programmes, traffic control, traffic safety etc.

The primary users of the system for distant control of consistency between vehicle registration and vehicle identification may be national authorities responsible for ensuring road traffic safety and preventing vehicle thefts, as well as investigating criminal offences. Secondary users of the system may be all commercial providers who can base their offer on vehicle identification. This can include anti-theft systems, systems for automatic billing for services provided and systems for rewarding customer loyalty.

State of the Art

Several systems for automatic identification of vehicles are already known and have been implemented in practice. The systems for automatic collection of fees (tolls, tunnel and bridge tolls etc.) or the commercial systems for automatic payment of fuel and items of lower value are especially well-known.

None of the known solutions include a comprehensive and completely elaborated solution in terms of technology for the system of identification and control of consistency between vehicle identification and registration, which would at the same time be supported by modern information system, used both for preventing passenger car thefts and controlling traffic safety, i.e. collecting statistical data on traffic load on specific sections of road, and would on the other hand be - provided that the users agree to this - open for automatic identification for commercial purposes.

Description of New Invention

The subject of the invention is the method of distant control of consistency between vehicle registration and vehicle identification. The method according to the invention solves technical problems of:

- control of consistency between vehicle registration and identification,

- traffic control and

- automatic collection of fees (tolls, bridge tolls, parking fees etc.).

The method of distant control of consistency between vehicle registration and vehicle identification comprises at least one control point, at least one server, database of registered vehicles, database of stolen vehicles, information system, RFID tag for identification and RFID tag for registration, both RFID tags being installed on the vehicle in such a manner that they cannot be removed from the vehicle without being destroyed.

The subject of the invention includes the following functionalities or functions within the following limits:

- it support the option of distant verification of data consistency via active, passive or electromagnetic RFID systems;

- it enables connectivity of data on the motor vehicle with data on the motor vehicle registration and owner;

- it enables connectivity of the system with the database of motor vehicle registration and database of stolen motor vehicles;

- it implements protection against unauthorised access to data on the RFID chip (data encryption);

- it enables distant data reading - the current state of the art allows data reading at speeds up to 80 km/h and distance up to 80 m;

- the RFID chip in installed in a visible position;

- the solution is simple and represents low costs of implementation.

In addition to solving the problem of vehicle theft, the implementation of the mechanism of distant identification of vehicles opens up a range of possible uses of the system for commercial and non-commercial purposes, such as:

- automatic recording of tolls without stopping the vehicle or reducing its speed;

- traffic calming on the basis of recording average speeds of vehicles;

- automatic identification of vehicles with expired registration; - automatic recording of parking time in car park buildings;

- implementation of loyalty points for various commercial purposes, for instance at service stations;

- determining whether license plates on a vehicle are stolen - prevention of abuse on the basis of license plate theft (e.g. fuel thefts at service stations);

- traffic count;

- automatic detection of traffic congestions and heavy traffic;

- automatic detection of a stationary vehicle in a tunnel and automatic activation of a relevant alarm;

- automatic detection of driving in the wrong direction on a motorway and automatic activation of a relevant alarm.

The primary users of the system for distant control of consistency between vehicle registration and vehicle identification will be national authorities responsible for ensuring road and traffic safety and preventing vehicle thefts, as well as investigating criminal offences.

The basic indicator for determining whether a certain vehicle was stolen is namely the determined inconsistency between the vehicle identification (chassis number written on the vehicle) and the documentation of ownership (registration number and chassis number listed in the vehicle registration certificate). The implementation of the system for automating the control of consistency will substantially increase the effectiveness of detecting stolen vehicles.

The second scope of use includes the systems for improving road traffic safety, which can prevent certain dangerous situations in traffic, especially on motorways (congestions, stationary vehicles in tunnels, driving in the wrong direction etc.), on the basis of detection of vehicles in motion or stationary vehicles.

Secondary users of the system are all commercial providers who can base their offer on vehicle identification. This can include anti-theft systems, systems for automatic billing for services provided and systems for rewarding customer loyalty. However, the level of accessibility to identification data on the vehicle can be limited with commercial providers due to the observance of personal data on the basis of encryption, unlike with primary users, who have access to all identification data.

None of the known solutions to date include a comprehensive and completely elaborated solution in terms of technology for the system of identification and control of vehicle identification and registration consistency, which would at the same time be supported by modern backend information system, used both for preventing passenger car thefts and controlling traffic safety, i.e. collecting statistical data on traffic load on specific sections of road, and would on the other hand be (provided that the users agree to this) open for automatic identification for commercial purposes.

The subject of the invention enables the setting-up of any number of static consistency checks within the road network and on international border crossing points. Furthermore, with the use of portable readers it will enable quick checking of consistency of passing or stationary vehicles, reducing the time of checking from several minutes to a fraction of a second.

The complete system of checks is integrated into the information system via communication channels, where captured data is automatically processed and saved into a database, accessible to the users of the system. Depending on the user type (national authority or commercial user), the system limits the access to data of a personal nature collected in the database, which may not be publicly accessible.

Due to the requirements for protection against unauthorised access to data on the RFID chip (data encryption) and distant reading of data at a higher speed and greater distance, the RFID system should be used, which includes active labels and priority circularly polarized reader antenna and operates at a frequency that is permitted in the respective country or region. The passive RFID systems have limited applicability, since they do not enable data reading at greater distances or at higher speeds of the vehicle.

The presented system of the invention includes the following actors: - Administrative units, responsible for entering new vehicles into the system and renewing the registrations of existing vehicles. When entering new vehicles into the system, the administrative unit issues an active RFID tag for every vehicle, which includes a read-only vehicle code. The vehicle code is a predetermined sequence of characters that uniquely defines the vehicle. The active tag with the vehicle code may be installed on the vehicle only by a RFID installer. When a vehicle is registered, its owner will receive license plates, equipped with an active RFID tag, which includes the vehicle owner identification code. The vehicle owner identification code is a predetermined sequence of characters that uniquely defines the owner of the vehicle, while at the same time the vehicle owner identification code is such that it allows the calculation of the vehicle code on the basis of predetermined calculation transformations. This feature enables the control points to simply check the consistency between vehicle identification and registration, even without the connection to the system. The administrative unit enters both tags into the system when registering the vehicle for the first time, thus establishing a logical connection between the vehicle and its owner.

- The RFID installer who is authorised for professional installation of an active RFID tag with the included vehicle code on the vehicle. The first owner of the vehicle who imported or manufactured the vehicle for sale must ensure that the vehicle is equipped with the RFID tag, installed on the vehicle in such a manner that when it is removed, it is permanently damaged and at the same time prevents the operation of the engine (engine immobiliser). The documentation on the vehicle code is an integral part of the vehicle documentation for first registration.

- The system operator, responsible for system maintenance, which means in practice that he/she monitors the proper operation of the system via control console and takes appropriate action or sends a service team to the site in the event of problems in the operation of the information system or failure of any of the control points.

- Police officers on the field who perform traffic control use a mobile control point for checking the consistency between the registration and identification of passing vehicles at unannounced locations and if necessary.

- Police officers in the control centre who carry out controls of stationary control points distributed on the road network. If the system signals an inconsistency or if the system detects a passing vehicle from the list of vehicles sought, police officers in the control centre send appropriate instructions to the patrols in the vicinity of the control point that identified the vehicle sought.

- Commercial users who use the infrastructure for various commercial purposes, where unique identification of customers is useful, e.g. for recording the purchase frequency and offering relevant benefits (customer loyalty programmes), for automatic billing of products or services, as well as for checking consistency between the vehicle registration and identification in order to prevent thefts on the basis of stolen license plates (e.g. fuel thefts at service stations). Commercial users have limited access to data and can read only identification data from the vehicle, but not the data on registration and vehicle owner.

- Operators in the traffic control centre who, on the basis of traffic control software used for accessing the database with records of vehicles passing through the control points, determine the following dangerous situations in traffic:

speeding on a road section;

detection of traffic congestions and heavy traffic;

detection of a stationary vehicle in a tunnel or on a specific road section.

In addition, operators in the traffic control centre can provide various analyses of traffic load on road sections in any period of time on the basis of data, collected from control points.

The operation of the method or procedure for the control of distant consistency between the vehicle registration and identification includes the following examples of application, covering all scenarios of application of the system in practice:

- Entering the vehicle into the system: when entering a new vehicle into the system, the administrative unit takes the following steps:

it creates the RFID tag for vehicle identification and enters the vehicle code number on the tag,

after completing the entry, it permanently locks the RFID tag for vehicle identification against modifications, whereby the WORM tags will be used as a priority, when registering the vehicle, it calculates and enters the relevant vehicle owner identification code for the license plate on the RFID tag on the basis of the vehicle code,

after completing the entry, it permanently locks the RFID tag for the license plate against modifications, whereas the WORM tags are used as a priority. The first two abovementioned steps are usually performed by the vehicle seller or importer, who must ensure that the RFID tag for vehicle identification is properly installed. The vehicle cannot be registered without the properly installed identification tag.

- Vehicle registration - when renewing the vehicle registration, the administrative unit takes the following steps:

if the expiry date of the existing active RFID tag installed on the license plate ends before the date of subsequent vehicle registration, the administrative unit issues a new RFID tag,

if the expiry date of the existing active RFID tag for vehicle identification ends before the date of subsequent vehicle registration, the administrative unit issues a new RFID tag.

If both tags are within the expiry date, the administrative unit has no additional work on account of the system, since the data on registration validity is not written on any of the RFID tags, but is read from the relevant database of motor vehicle registrations during the verification of data on registration validity.

- System maintenance - the maintenance of the system includes two types of activities:

detection and repair of faults in the operation of the system and

adjustment of system operation parameters.

For detecting and correcting errors in the operation of the system, the operator may use special software - a system control console, which allows monitoring of the operation of all active control points and related software at any time. The system control console establishes connection with every control point periodically at adjustable intervals and checks its availability and responsiveness. If the control point is unavailable, the console triggers an alarm, on the basis of which the operator can decide for the intervention of the field service support personnel. The control console also checks the operation of all other elements of the information infrastructure - the availability of internal databases on servers, the operation of all system processes and the availability of all external databases connected to the system. In case of failure of any element, the operator notifies the appropriate system administrator on the failure and files a request for corrective action.

Within the adjustment of system operation parameters, the operator can manage the following settings via the control console:

setting of control intervals for checking the availability of control points, adding of control points into the system or their removal from the system, setting of control intervals for checking other elements of the information system,

setting of operation mode of individual control point,

setting of reporting intervals for every control point and

setting of local storage medium usage threshold at which the control point automatically activates the emergency reporting outside the determined reporting interval.

The last three settings are associated with the operation mode of control point. Every control point is in one of the following operation modes at all times:

switched off/inactive,

normal mode or

enhanced traffic control.

In normal mode the control point records data on passing vehicles, checks the consistency between the registration and identification data and writes the data on passing vehicles to the local storage medium within the control point. If the traffic load is such that the usage of local storage medium exceeds the determined threshold (for instance, a 90% usage), the control point immediately establishes connection with the server and transmits the collected data. After the server confirms the successful transmission, the control point clears the space occupied by transmitted data on the local storage medium. If the local storage medium usage threshold is not reached, the control point triggers the transmission of data to the server at the scheduled time of reporting. After the completion of every data transmission to the server, the control point also receives a refreshed list of identifications of vehicles sought from the server. If the control point detects an inconsistency between the registration and identification data of a passing vehicle or detects the presence of a vehicle from the list of vehicles sought, it immediately establishes connection with the system control console used by the police officer in the control centre and triggers an alarm. The control centre receives data on the location of control point, reason for alarm (inconsistency or vehicle sought) and data on the basis of which the alarm was triggered. If the control point is equipped with a digital or video camera, it sends an image of the vehicle with the determined inconsistency as well. The police officer in the control centre then checks the data and requests the intervention of the police patrol on the field, if necessary.

The normal operation mode is suitable for control points on local roads without heavy traffic, where there is no need for real-time monitoring of traffic flow. The normal operation mode is also energy-saving, since the control point in normal mode does not establish a permanent connection with the server, but the connection is established only at the moment of data exchange between the server and the control point, thus substantially reducing the energy consumption. This is crucial with control points that are not connected to the mains supply, but use alternative power supply - e.g. a battery or solar cells.

In enhanced traffic control mode the control point establishes a permanent connection with the server and sends real-time data on passing vehicles to the server. Rules for triggering the alarm are the same as in normal operation mode, with the exception that in this operation mode the control point does not save data to the local storage medium, but sends it to the system server immediately after the decoding. The system control console, used by the operator in the traffic control centre, can automatically trigger relevant alarms or warnings on the basis of a comparison of data on passing vehicles at two successive control points and the expected maximum travelling time between these two control points. This mode namely enables the detection of vehicles driving through the section with excessive or insufficient speed, the detection of congestion on the road section, the detection of stationary vehicles etc.

The third operation mode is the mobile control point, which is not connected to the server, but is used by police officers on the field. This is a manual RFID reader, used by police officers for performing controls and reading read-out identification marks from the vehicles on the field on the display of the manual RFID reader itself, thus detecting inconsistencies.

Vehicle identification: the identification of the vehicles performed on the basis of two RFID tags:

the RFID tag built into the vehicle license plate. When registering the vehicle, the administrative unit enters the vehicle owner identification code into the tag; the RFID tag for vehicle identification. When preparing the vehicle for the first sale, the administrative unit issues the RFID tag to the vehicle owner, which includes the vehicle code that matches the code on the license plate.

The owner of the vehicle must ensure that both RFID tags are installed on the vehicle in such a manner that the system control points can read them efficiently. Professional installation of RFID tags on the vehicle is performed by the RFID installer. The RFID tag for identification is installed in a visible position, preferably on the upper or lower edge of the windscreen inside the vehicle. The RFID tag for registration is installed together with the license plate at the front of the vehicle. Both RFID tags are designed in such a manner that after the first installation on a surface they cannot be removed without being destroyed. In this way, the system prevents identity theft abuse, since tags cannot be transferred to another vehicle once they have been installed.

The identification of the vehicle itself is performed in such a manner that the control point reads the vehicle identification numbers from both RFID tags for every passing vehicle and returns the result, which may be one of the following:

identification numbers match (identification successful),

identification numbers do not match (identification unsuccessful - inconsistency),

vehicle owner identification code is missing (identification unsuccessful - missing identification element),

vehicle code is missing (identification unsuccessful - missing identification element) ,

both codes are missing (identification unsuccessful, if the vehicle has national license plates which are subject to control - otherwise this is a foreign vehicle which is not subject to control). When both RFID tags are missing, the system checks the license plates on the basis of the system for visual detection of vehicles and recognition of license plates. If the system determines that the vehicle in question does not have national license plates which are subject to control, the alarms related to missing identification marks are not triggered.

Consistency check - within the consistency check first the vehicle identification is performed.

If the identification is successful, the system performs the following actions:

If the control point is in normal operation mode, the system records data (identification number) on a vehicle passing through the control point to the local storage medium for later transfer to the server. Next, it checks if the identified vehicle is on the list of vehicles sought and in case of a positive reply, it connects to the server and triggers an alarm on the console used by the police officer in the control centre. The alarm includes at least the following elements: control point location, vehicle identification number and reason for alarm - "Vehicle sought". The established connection is used also for transferring locally recorded data to the server and refreshing the list of vehicles sought.

If the control point is in the enhanced traffic control mode, it sends data on the passing vehicle directly to the server and then checks if the identified vehicle is from the list of vehicles sought and in case of a positive reply, the system triggers an alarm on the console used by the police officer in the control centre. The alarm includes at least the following elements: control point location, vehicle identification number and reason for alarm - "Vehicle sought".

If the identification is unsuccessful - inconsistency, the system performs the following actions:

If the control point is in normal operation mode, the system records data (both inconsistent identification numbers) on a vehicle passing through the control point to the local storage medium for later transfer to the server. Next, it connects to the server and triggers an alarm on the console used by the police officer in the control centre. The alarm includes at least the following elements: control point location, both vehicle identification numbers and reason for alarm - "Inconsistency". The system then checks if any of the two identification numbers are on the list of vehicles sought and in case of a positive reply, it triggers an additional alarm with at least the following elements: control point location, vehicle identification number and reason for alarm - "Vehicle sought". The established connection is used also for transferring locally recorded data to the server and refreshing the list of vehicles sought.

If the control point is in the enhanced traffic control mode, the system sends data (both inconsistent identification numbers) on the passing vehicle directly to the server and triggers an alarm on the console used by the police officer in the control centre. The alarm includes at least the following elements: control point location, both vehicle identification numbers and reason for alarm - "Inconsistency". Next, the system checks if the identified vehicle is on the list of vehicles sought and in case of a positive reply, it triggers an alarm on the console used by the police officer in the control centre. The alarm includes at least the following elements: control point location, vehicle identification number and reason for alarm - "Vehicle sought".

If the identification is unsuccessful due to the missing identification element, the system performs the following actions:

If both marks are missing, the system determines whether the vehicle has national license plates subject to control on the basis of the system for visual detection of vehicles and recognition of license plates. If the system determines that the vehicle in question does not have national license plates subject to control, the alarms related to missing identification marks are not triggered. If the control point is in normal operation mode, the system records data (the identification number that the system managed to read) on the vehicle passing through the control point with insufficient identification to the local storage medium for later transfer to the server. Next, it connects to the server and triggers an alarm on the console used by the police officer in the control centre. The alarm includes at least the following elements: control point location, one of the two read-out vehicle identification numbers and reason for alarm - "Missing identification element". The system then checks if the read-out identification number is on the list of vehicles sought and in case of a positive reply, it triggers an additional alarm with at least the following elements: control point location, vehicle identification number and reason for alarm - "Vehicle sought". The established connection is used also for transferring locally recorded data to the server and refreshing the list of vehicles sought. If the control point is in the enhanced traffic control mode, the system sends data (the identification number that the system managed to read) on the vehicle with insufficient identification passing through the control point directly to the server and triggers an alarm on the console used by the police officer in the control centre. The alarm includes at least the following elements: control point location, one of the two read-out vehicle identification numbers and reason for alarm - "Missing identification element". Next, the system checks if the readout identification number is on the list of vehicles sought and in case of a positive reply, it triggers an additional alarm on the console used by the police officer in the control centre. The alarm includes at least the following elements: • control point location, vehicle identification number and reason for alarm - "Vehicle sought".

Vehicle search - in addition to checking the consistency between the vehicle registration and identification, the system also enables a simple vehicle search. The police officer on the field or the police officer in the control centre adds the identification number of the vehicle sought to the list of vehicles sought via the console and this number automatically sends the list of vehicles sought to all control points through the mechanism for refreshing the lists of vehicles sought. By accessing the database of motor vehicle registrations, the system can every day automatically update the list of vehicles sought with vehicles, for which the registration expired X days ago, where X can be set optionally. The system is also open to all users in the control body, who can add vehicles to the list of vehicles sought via online interface. The system is open to all users in the control body for optionally adding vehicles to the list of vehicles sought via online interface.

After each modification of the list of vehicles sought, the lists on control points in the "enhanced traffic control" mode are immediately refreshed, while the lists on other control points are refreshed next time the connection is established, at the latest after the completed next reporting interval. When the vehicle sought passes through the control point, it triggers the appropriate alarm on the console.

Traffic control - the system also enables the implementation of enhanced traffic control on the optional road section between at least two adjacent control points. In order to enable the execution of enhanced traffic control, the system operator must set the relevant control points into the "enhanced traffic control" mode, which causes the control points to start sending data on passing vehicles to the server database in real time.

On the basis of analysis and comparison of sets of read-out identification numbers between two points, the console enables the determination of the following dangerous situations in traffic:

excessive or insufficient speed on the section - on the basis of the difference in recording times of the vehicles passing through two points, the system calculates the average speed on the section for every identification number and gives warning of the vehicles driving too fast or too slow;

traffic congestions and heavy traffic - if the pass time of identification numbers between two control points is substantially longer than expected, a traffic congestion or heavy traffic is detected;

a stationary vehicle in a tunnel or at a specific road section - if the pass time of the majority of identification numbers between two control points is within the expected time, while one or two substantially exceed this time, it may be concluded that a vehicle breakdown or traffic accident has occurred on this road section.

However, this control is appropriate for motorways or road sections where stopping between both control points is prohibited, otherwise the system may generate false alarms. The console is also adjustable, since it may be determined separately for every section which situations are to be monitored by the system - depending on the characteristics of a specific road section.

For every section between the control points in the "enhanced traffic control" mode the operator in the control centre defines the traffic situations for monitoring and then monitors and analyses the alarms, generated by the console on the basis of the analysis of data from the database. - System maintenance - the system maintenance includes the detection and correction of errors in the operation of the system and setting of system operation parameters.

The system is designed in a star physical topology, which includes a central part, represented by the information centre and branches, represented by a set of control points, distributed on the complete control area.

The control points are connected to the information centre via communication channel, enabling safe communication between the control point and information centre. The control points include the necessary infrastructure for detecting passing vehicles and their identification on the basis of installed RFID tags. On the other hand, the information centre is connected to databases of vehicle registrations and stolen vehicles, while user consoles through which various system users access the data collected by the system in accordance with the allocated authorisations are also connected to the information centre.

The license plate frame enables a simple installation of the RFID tag for registration to the front of the vehicle. The RFID tag for vehicle identification is installed by a qualified RFID installer, who ensures that the tag is installed in newer vehicles in such a manner that it is connected to the engine immobiliser system, while in older used vehicles, where this is not possible for technical reasons, the installation is performed without the combination with the engine immobiliser.

Tags are installed in such a manner that the RFID tag is irrecoverably damaged when attempted to be removed. Once both tags have been installed, they are barely visible to the vehicle user, since their operation is unnoticeable.

Mandatory installation of RFID identification tags on vehicles also enables the development of commercial vehicle anti-theft systems that include engine immobiliser systems in the event of one or both missing prescribed RFID tags. In this way, vehicle thieves have a much more difficult task, since in the event of a theft, the vehicle must be stolen with original license plates, which facilitates the search for stolen vehicles if the control points have been established and the theft is reported in due time. The system has a modular design, therefore, new control points can easily be added. You can start with a small number of control points, which is eventually increased.

Commercial users wanting to use the existing infrastructure of RFID tags on vehicles can purchase a control point and install it at the location of activity, where the service of identification of customers on the basis of their vehicles is required. These control points are still a part of the system and, similar to all non-commercial control points, control and report possible alarms to the control centres, while the software on these control points enables application access to reading identification data via application programming interfaces (API) or web services.

As with every control, attempts to avoid control may occur with the subject of the invention. The most exposed elements of the system are undoubtedly both RFID tags installed on passenger cars. By selecting such active RFID tags that stop functioning when attempted to be removed or when removed from the vehicle and by encrypting the communication between the reader and the RFID tag, it is ensured that no identity theft occurs in the system.

The system includes a video camera for the recognition of license plates. On the basis of an image from the built-in video camera, the system determines whether the detected vehicle has domestic or foreign license plates. There are several commercial systems for license plate recognition, marked by abbreviations ALPR (automatic license plate recognition) or LPR (licence plate recognition). A typical ALPR system consists of two components, a weatherproof video camera with a sunlight filter and its own light source for capturing images at night, and software for processing captured images. For transferring large quantities of data, the video camera connects to the Ethernet bus, while the relevant software is installed to the processing unit with internal memory. Some systems enable image capturing and license plate recognition even at great vehicle speeds (up to 250 km/h).

Possible measures for preventing abuse by destroying both RFID tags and other attempts to avoid control are the following: - if the license plate recognition system determines that a vehicle with national license plates is approaching and the control point does not detect any RFID tags, it can trigger the alarm for insufficient identification on reasonable grounds;

- introduction of high penalties for drivers whose vehicles are not equipped with functional RFID tags;

- introduction of high penalties for drivers of vehicles with stolen foreign license plates;

- every destruction or theft of any RFID tag from a vehicle must be reported to the police, since the administrative unit issues a replacement RFID tag only upon submission of a police report;

- vehicles with destroyed RFID tags cannot be registered without the submitted police report on theft or vandalism.

The basis of the invention is explained in detail below, including the description of the implementation example and enclosed figures, whereby the figure forms a part of this patent application and it shows the following:

Figure 1 shows the vehicle 1, identification tag 2, registration tag 3, area for the installation of the identification tag 4, area for the installation of the registration tag 5.

Figure 2 shows the vehicle 1, identification tag 2, registration tag 3, control point 6, server 7, database of stolen vehicles 8, database of registered vehicles 9, user console 10.

In the implementation example the vehicle 1 is equipped with the RFID tag for identification 2 in the area for the installation of the identification tag 4 and the RFID tag for registration 3 in the area for the installation of the identification tag 5. The RFID system with active tags is used, together with the circularly polarized reader antenna operating at a frequency of 2.4 GHz.

The control point 6 is installed at the tollbooth with the speed limit of 40 km/h. Once a vehicle is within the distance of 50 m from the control points, the system reads the data from one of the RFID tags and then within a short period of time also from the second RFID tag. The data is transferred between the RFID tags and the control point 6 via RFID transfer. The control point 6 records the data on passing vehicles and at the same time checks the consistency between registration and identification data, while the data on passing vehicles is recorded to the local storage medium within the control point 6. If the control point detects an inconsistency between registration and identification data of a passing vehicle or detects the presence of a vehicle from the list of vehicles sought, it immediately establishes connection with the system control console used by the police officer in the control centre and triggers an alarm. The control centre receives data on the location of the control point 6, reason for alarm (inconsistency or vehicle sought) and data on the basis of which the alarm was triggered. The police officer in the control centre then checks the data and requests the intervention of the police patrol on the field, if necessary.

The control point 6 is connected to the server 7 of the information centre via communication channel that enables safe communication between the control point 6 and information centre. The control point 6 includes all necessary infrastructure for detecting passing vehicles and their identification on the basis of installed RFID tags. On the other hand, the server 7 of the information centre is connected to the database of stolen vehicles 8 and database of registered vehicles 9, while user consoles 10 through which various system users access the data collected by the system in accordance with the allocated authorisations are also connected to the information centre.

It is understood that the described solutions may be implemented in a different conceptual version, which does not change the basis of the invention.