WO2001094165A2 - A method and apparatus for securing a machine - Google Patents
A method and apparatus for securing a machine Download PDFInfo
- Publication number
- WO2001094165A2 WO2001094165A2 PCT/US2001/015788 US0115788W WO0194165A2 WO 2001094165 A2 WO2001094165 A2 WO 2001094165A2 US 0115788 W US0115788 W US 0115788W WO 0194165 A2 WO0194165 A2 WO 0194165A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- machine
- key
- response
- security system
- operating characteristic
- Prior art date
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
Definitions
- the present invention relates generally to the operation of an earth moving machine, and more particularly, to a method and apparatus for securing an earth moving machine .
- Machine security systems are increasing in complexity to overcome the efforts aimed at stealing the machines. While increased functionality is needed in a machine security system, the system needs to be easy to operate and maintain. In a work environment such as a construction site, or a mine, there may be periods of time when the machine security system is preferably deactivated to enable easy access of multiple people to the machine during normal working hours . After normal working hours the security system may be preferably activated such that access to the machine requires a special authorization.
- the present invention is directed to overcome one or more of the problems set forth above .
- a method of securing an earth moving machine having a machine security system includes a primary controller and a key switch associated with the primary controller.
- the key switch is adapted to receive a key, and is configurable to a plurality of positions.
- the method comprises the steps of delivering power to the primary controller in response to the key switch being configured in a predetermined position, activating the security system in response to the power delivery, receiving an identification code from the key in response to the security system remaining active, and determining whether to enable operation of the machine in response to the key code .
- a method of securing a machine having a machine security system is disclosed.
- the machine security system includes a primary controller, and a key switch associated with the primary controller.
- the key switch is adapted to receive a key and is configurable to a plurality of positions .
- the method comprises the steps of delivering power to the primary controller in response to the key switch being configured in a predetermined position, activating the security system in response to the power delivery, determining whether to maintain activation of the security system, receiving an identification code from the key in response to the security system remaining active, determining whether to enable operation of the machine in response to the identification code.
- a security apparatus adapted to secure an earth moving machine.
- the apparatus comprises a • key switch adapted to receive a key, the key switch having a plurality of positions, a power source for delivering a power signal, an antenna adapted to receive a key identification code signal, and responsively generate a received key identification signal, a primary controller adapted to receive the power signal in response to the key switch being configured in a predetermined position, the primary controller adapted to receive the key identification signal, the primary controller including at least one key identification code, the primary controller, being further adapted to activate the security system in response to receiving the power signal, determine whether to maintain activation of the security system, determine whether to enable machine operation in response to the identification code comparison.
- a method of securing a machine having a machine security system includes a primary controller, and a key switch associated with the primary controller.
- the key switch is adapted to receive a key and is configurable to a plurality of positions.
- the method comprises the steps of delivering power to the primary controller in response to the key switch being configured in a predetermined position, activating the security system in response to the power delivery, determining whether to enable machine operation, receiving an identification code from the key in response to the security system remaining active, determining whether to enable operation of the machine in response to the identification code.
- a method of securing a machine having a machine security system includes a primary controller, and a key switch associated with the primary controller.
- the key switch is adapted to receive a key and is configurable to a plurality of positions.
- the method comprises the steps of delivering power to the primary controller in response to the key switch being configured in a predetermined position, activating the security system in response to a first operating characteristic, determining whether to maintain activation of the security system, receiving an identification code from the key in response to the security system remaining active, determining whether to enable operation of the machine in response to the identification code.
- Fig. 1 is an illustration of one embodiment of a machine security system
- FIG. 2 is an illustration of an alternative embodiment of a machine security system
- FIG. 3 is an illustration of one embodiment of a method of securing an earth moving machine having a machine security system
- Fig. 4 is an illustration of one embodiment of a secondary controller and an associated machine element or system.
- FIG. 1 is an illustration of one embodiment of a machine security system 102.
- the machine security system 102 is located on an earth moving machine, however, the invention is equally applicable to other applications and machines such as generator sets, pumps, and stationary and marine engine applications .
- the security system 102 includes a key switch 106 adapted to receive a key 108.
- the key switch 106 has a plurality of positions that it may be configured, or placed in. For example, in one embodiment, the key switch 106 has an "OFF", "ON", and "START" position.
- the key switch 106 may also include an accessory position.
- the key switch 106 may be manipulated from one position to the next by inserting and turning the key 108. That is, the key switch 106 is configured in an "OFF" position prior to receiving the key 108. Once the key 108 is inserted, the key 108 and corresponding key switch 106 may be rotated, such that the key switch 106 is rotated between the
- power may be delivered to the primary controller 104 when the key switch 106 is rotated to the "ON” position.
- the engine may be started when the key switch 106 is rotated to the "START" position.
- the key switch 106 may be manipulated by a key 108.
- the key may be either a non-electronic key, or an electronic key.
- an electronic key is adapted to receive a polling signal from the machine security system 102, and responsively generate an identification code signal.
- the identification code of an electronic key 108 is specific to that key 108.
- one or more electronic keys may include a master identification code.
- the master identification code indicates the associated key 108 is a master key.
- the master key provides the user additional capabilities, as will be discussed below.
- the key 108 may be a universal machine key.
- the key may be able to operate multiple machines of the same make or model of a manufacturer .
- the universal machine key may be either an electronic, or non-electronic key.
- the security system 102 also includes an antenna 118 adapted to receive the identification code signal generated by the key 108.
- the antenna 118 is associated with the key switch 106.
- the antenna 118 generates a received key identification code signal in response to receiving the identification code signal .
- the security system 102 includes a primary controller 104.
- the primary controller 104 is adapted to: activate the security system 102 in response to receiving power, determine a first operating characteristic of the machine, determine whether to maintain activation of the security system 102 in response to the first operating characteristic, receive the key identification code signal, and determine whether to enable operation of the machine in response to the key code .
- the primary controller 104 may include one or more authorized key codes.
- the primary controller 104 includes a plurality of authorized key codes located in an access key list.
- the access key list preferably includes a list of each of the key identification codes that have been approved to enable machine operation.
- the key codes are associated with electronic keys that have been approved to disarm the security system 102 when the security system 102 is active.
- the primary controller 104 will include additional information, such as an access level associated with each key.
- the access level may be either user or master user.
- a master user access level, associated with a master key enables the user to have additional privileges regarding the machine security system 102.
- the additional privileges may include, for example, the ability to modify the access list, e.g., to add/delete/modify key identification codes.
- the primary controller 104 may also include a key activation period associated with each key identification code, which will be described below.
- the access list is one embodiment of storing the authorized key codes. Other forms of list or maps may also be used.
- the security system 102 may interact with a starter 112 adapted to start the engine (not shown) of the machine.
- the starter is energized by a solenoid 110.
- other devices such as a relay may be used to energize the starter 112.
- the solenoid 110 energizes the starter 112 in response to a signal received from the primary controller 104, e.g., one the appropriate security measures have been satisfied.
- the solenoid 110 may receive power when the primary controller 104 does, and the starter 112 may be energized by the solenoid 110 when the key switch 106 is placed in the "START" position. However, in this case, the machine will not start until the security measures performed by the security system 102 have been satisfied.
- Fig. 3 illustrates one embodiment of the method of the present invention.
- the present invention includes a method of securing a machine having a machine security system 102.
- a first control block 302 power is delivered to the primary controller 104 in response to the key switch 106 being configured in a predetermined position.
- the key switch 108 is placed in the "ON" position from the "OFF" position.
- a connection between the primary controller 104 and the power source 116 is closed, thereby providing power to the primary controller 104.
- the security system 102 is activated in response to the primary controller 104 receiving power.
- the security system 102 is deactivated, or disarmed, as will be discussed below, the machine may not be operated. Therefore, when the primary controller 104 receives power, the security ⁇ system 102 is initialized in a manner that will prevent the machine from being operated, i.e., the security system 102 is activated. .
- a first operating characteristic of the machine is determined.
- the first operating characteristic of the machine is time of day.
- other characteristics could be determined including one or more of the following: day of the week, date, or service hours, or other machine operating characteristics.
- Service hours is one indication of duration of machine operation. In one embodiment , service hours may be obtained from a service hour meter.
- the first operating characteristic may be used to determine whether to enable operation of the machine. For example, in one embodiment, in a first decision block 308, a determination is made as to whether the security system 102 should remain activated in response to the first operating characteristic. If the security system 102 remains activated, the machine is prevented from being operated, unless additional security measures are satisfied, as will be described below.
- the system 102 is deactivated, and machine operation is enabled.
- the security system 102 if the security system 102 is deactivated, then the machine may be started with either an electronic key, or a non-electronic key.
- the first operating characteristic may be compared to a system activation period.
- a system activation period is an operating condition during which the security system 102 is desired to be activated.
- the system activation period is a time period. In a construction site, for example, normal, or desired hours of operation may be from eight in the morning to five in the afternoon. For easy access to the machine, the construction site may desire to deactivate the security system 102 during the desired time of normal operation, and activate the system 102 during the other time period (the system activation period) .
- the system activation period may include an indication of the service hours, or operating time of the machine.
- a user who has rented the machine may have access to the machine for a period of time based upon a number of days, or the number of service hours the machine is operated.
- the system activation period may vary over time. For example, if the machine was leased for a specified number of service hours, then during one time period, e.g., until the agreed upon service hours have been utilized, the system activation period may be from five in the afternoon to eight in the morning, deactivating the system 102 during normal hours of operation.
- the system activation period may change, e.g., extend to twenty four hours a day, such that an authorized electronic key is required to enable the machine to operate, as described below. That is, once the authorized service hours have been utilized, the security system 102 remains active whenever the primary controller 104 is powered, thereby enabling machine operation to occur only with an authorized electronic key. Accordingly, the system activation period is configurable to support the user's needs. Therefore, with reference to the decision block 308, in the preferred embodiment, the first operating characteristic, e.g., one or more of the time of day, date, and/or service hours, is compared with the user configurable system activation period.
- the first operating characteristic e.g., one or more of the time of day, date, and/or service hours
- the security system 102 If the first operating characteristic is within the system activation period then the security system 102 remains active, and control passes to a second decision block 310. If the first operating characteristic is not within the system activation period then the security system 102 is deactivated and control passes to a fourth control block 312.
- the security system 102 is deactivated, and the machine may be enabled to operate, using either an electronic or nonelectronic key.
- the system 102 delivers an enable signal to the starter solenoid 110 and to the main power solenoid 114.
- the key switch 106 is placed in the "START" position, a contact is formed between the primary controller 104 and the starter solenoid 110 such that the solenoid 110 energizes the starter 112 upon receipt of the enable signal.
- an identification code is received from the key 108.
- a polling signal is generated by the primary controller 104 in response to the security system 102 remaining active.
- the polling signal is generated to prompt an electronic key 108 to generate an identification code signal .
- the polling signal may be a pulsed signal which is delivered to a coil (not shown) located in the key switch 106. The coil is magnetically coupled to electronic . circuitry (not shown) in the key 108.
- the pulsed signal may energize the circuitry in the key 108, and a transponder (not shown) located in the key 108 generates a key identification code signal, in response to the polling signal.
- the key identification code is delivered to the primary controller 104 via the antenna 118.
- a data validity check is performed on the identification code signal to ensure the data received is valid, e.g., not corrupted with noise.
- One technique of performing data validity is checking the parity bit of the received messages.
- the primary controller 104 polls the key 108 until three consecutive identification signals are received containing valid data. If three consecutive valid data signals are not received after a period of time, or a predetermined number of polling attempts, then the reading of the key 108 is determined to have failed, control proceeds to a fifth control block 318, and the security system 102 remains activated.
- the received data may be used without validity checks, the first valid data signal may be used, or some variation thereof of number of valid data signals needed to be received before determining valid data was received.
- control may proceed to a sixth control block 314 to compare the received identification code, containing valid data or otherwise. In this manner, even if invalid data is received, the received identification code will not match the codes located on the access list.
- an identification code is received from the electronic key 108, a determination is made whether to enable machine operation in response to the received key code. For example, if the key code is an appropriate code, machine operation may be enabled. In one embodiment, the control proceeds to a sixth control block 314, and the key identification code is compared with the authorized key identification code(s) stored on the primary controller 104. The received key identification code is compared with the stored authorized key code(s) to determine if the received code may be matched. In one embodiment each authorized key code may have an associated key activation period. Alternatively one key activation period may be associated with multiple authorized key codes.
- the key activation period may be indicative of an operating characteristic during which the key identification code is authorized to operate the machine, e.g., period of time, day of the week, date, or service hours. Therefore, a second operating characteristic may be established and compared with the key activation period of the associated key code.
- the second operating characteristic may include one or more of the following: the current time, day of the week, date, or service hours of the machine. In addition, the second operating characteristic may be the same as the first operating characteristic. If the second operating characteristic falls within the key activation period, then machine operation may be enabled.
- a dealer may rent a machine to an end-user.
- the dealer may provide the user with one or more electronic keys and non-electronic keys.
- the dealer may configure the access list such that the electronic keys are only authorized for the duration of the rental agreement . For example, if the rental agreement is for a one month period, e.g., June 1 - June 30th, then, on July 1st, the key identification code will match with an access key code, but the current time or date, July 1st, is outside the key activation period June 1 - 30th.
- the key activation period may be for a number of hours, e.g., eight to midnight, during the work week, or even a designated number of service hours, where the service hour is an indicator of the amount of time the machine has been operated.
- the key activation period may last for 1000 service hours, starting from an activation date, until the machine has been operated for the designated number of hours.
- the key activation period may be a combination of the above characteristics.
- the key activation period is specific to a key identification code. However the same activation period may apply to multiple key identification codes on the access list .
- the security system 102 may be disarmed. Once the system 102 is disarmed, the machine is enabled to operate, as when the system 102 is deactivated. Disarming the system 102 is similar to deactivating the system 102. The difference being that the system 102 may be disarmed based upon performing and satisfying all the security measures of the system 102, such as key identification code verification. However, the security system 102 may be deactivated for example, without checking for an authorized key identification code, for example.
- the system 102 operates the same, e.g., the machine is enabled to start. Therefore, in one embodiment, the system 102 is initially activated. The system 102 may be either deactivated or remain activated in response to a first operating characteristic. If the system remains activated, the system 102 may later be disarmed. In an alternative embodiment, the system may be referred to simply as being activated or deactivated, or machine operation may be referred to as enabled or disabled. Therefore, in one embodiment, the seventh control block 320 may be the same as the fourth control block 312 since the machine is enabled to operate once control reaches these procedures .
- the security system 102 may be initialized in a deactivated state upon power up, and then the first operating characteristic may be determined, as before in the third control block 306. The security system 102 may then remain deactivated if the operating characteristic satisfies the system activation period, or may be activated if the operating characteristic is within the system activation period.
- the machine security system 202 includes at least one secondary controller 220, as illustrated in Fig. 2.
- a secondary controller 220 may be responsible for controlling one or more machine elements, functions, or systems 222.
- an engine controller 220a may control the engine/fuel system 222a
- a transmission controller 220b may control the transmission system 222b
- a hydraulic system controller 220c may control the hydraulic system 222c.
- the controller when a secondary controller 220 receives power, the controller initializes itself in a manner that the security measures it is responsible for are activated.
- the engine controller 220a powers up, the security system 102 is active, and no commands, such as fuel injection commands, are delivered to the engine system 222a.
- a secondary controller 220 and all or part of a particular system/function/element 222 may be enclosed in a secure, tamper resistant encasement.
- Fig. 4 illustrates one embodiment of an encased controller (secondary controller) 220 connected to a relay, or solenoid 406 of an engine system 222a.
- the controller 220 and solenoid 406 may be contained within a secure casing, or shielding 404 such that they may not be tampered with.
- the normal state of the solenoid 406, is a closed state, i.e.
- the fuel line 408 may be encased in a protective or tamper resistant shielding.
- the controller 220 Upon receiving power the controller 220 begins communicating with the primary controller across data line 402. Upon receiving a signal from the primary controller 202 indicating to enable operation of the machine, the controller 220 may command the solenoid 406 to an open state, enabling fuel to flow through the fuel line 408. Alternative embodiments may be provided to enable a controller 220 to prevent the operation of the machine, e.g., starting of the engine, such as disabling a fuel pump etc.
- secure, tamper resistant encasement may be used, as described above, for the engine, transmission, and/or implement controllers 220, and the associated system/function/element 222.
- the transmission system 222b may be prevented from operating because the security measures associated with the transmission controller 220B, which are activated upon power up, will not enable any commands to be sent to the transmission system 222b, such as commands to fill the clutches (not shown) to enable changing of the gears (not shown) .
- the security measures associated with the hydraulic controller 220C also activated upon power up, will not enable any commands be delivered to the fluid pumps (not shown) to pump fluid, or the valves to open from a closed position. Therefore, the hydraulically controlled implements (not shown) may not be operated.
- the secondary controller 220 will poll the primary controller 104 to determine the activation status of the overall security system 102. For example, whether the security system 102 is activated or deactivated or disarmed.
- the primary controller 104 receives the request for status, and delivers an encrypted security system status message to the polling secondary controller 220.
- the secondary controller 220 decodes the encrypted message to determine whether to enable the machine system/function/element.
- the message is indicative of whether to enable machine operation.
- the message may be indicative of the status of the security system 102. If the security system 102 is activated then the security measures associated with secondary controller 220 will remain activated, thereby preventing operation of the system/function/element that the secondary controller 220 is responsible for. However, if the encrypted message indicates that the security system is deactivated, or disarmed, then the security measures the secondary controller 220 is associated with are deactivated, enabling operation of the associate system/function/element.
- the engine controller 220a upon determining the security system 102 is deactivated or disarmed, the engine controller 220a will begin monitoring the desired speed, e.g., throttle commands, and the actual speed, which may be initially zero, to determine, among other issues, the appropriate fuel commands to deliver to the injectors (not shown) to achieve the desired speed.
- the secondary controller 220 may enable fuel to flow in the fuel line 408, illustrated in Fig. 4. Therefore, operation of the machine system/function/element may be enabled when the secondary controllers determine the security system 102 is deactivated or disarmed.
- the primary controller 104 may include the responsibilities of one or more of the secondary controllers 220. For example, if an engine controller 220 was not included in the embodiment, then the primary controller 104 may control the engine system 222 directly. Therefore, the primary controller 104 would prevent operation of the engine . system 222 until all of the appropriate security measures were satisfied.
- enabling machine operation includes enabling the engine of the machine to start and run. That is, if the appropriate security measures are satisfied, the machine engine is enabled to start.
- machine operation may also include control of the transmission system 222b and hydraulic system 222c.
- machine operation may refer to the transmission system 222b or hydraulic system 222c alone.
- the machine engine may be started without any security measures, when the key switch 106 is configured in a predetermined position.
- the security system 102 may be used to control useage of the transmission and/or hydraulic systems 222b, 222c by locking out, or disabling these systems, as discussed, until the appropriate security measures are satisfied.
- a key with no identification code, or a key code that is not on the authorized key list may disarm the security system 102, i.e., enable operation of the machine, when the appropriate procedures are performed.
- the key 108 and associated key switch 106 may be cycled a predetermined number of times.
- a security system light e.g., located on the dashboard of the machine, may flash.
- the system 102 may then be disarmed using a security code. For example, once the light has flashed the number of times corresponding to the first character of the security code, the user may cycle the key 108 once. The light will then continue to flash.
- the primary controller 104 may have an unswitched connection (not shown) to the power source 116.
- the primary controller 104 relies on an initial connection to the power source via the key switch 106. Once the primary controller 104 is operating, the unswitched connection may be utilized to maintain power for a period of time, e.g., ten seconds, after the key 108 has been removed and the associated switched connection to power opened.
- authorized key codes may be added, deleted and/or modified in several ways.
- a service tool may be connected to the machine, and in particular to the primary controller 104 of the security system 102. If the user of the service tool has master user privileges, e.g., master password, they may configure the authorized key code(s) . For example, if the authorized codes are stored in an access list, the user, having master user privileges, may configure the access key list as desired, e.g., add/delete identification codes and associated key activation periods or modify the system activation period. .
- the machine may be connected to a remote data facility through a communication path such as a satellite connection.
- a user located at the remote data facility may deliver a message, including secure password, to the primary controller 104.
- the message may contain modifications to the system activation period, access key list, or a completely new list.
- Alternative forms of communication may be available with a remote data facility, such as a land based network, satellite data link, or cellular network.
- the master key 108 may be inserted into the key switch 106 and cycled a predetermined number of times.
- the primary controller 104 utilizing the method described above, will identify the key as a master key.
- the primary controller 104 will detect the master key cycling the key switch 106 a predetermined number of times. After cycling the key switch 106 the predetermined number of times, the next key identification code that is received will be stored in the primary controller 104, if the code is not already there. For example, the master key 106 may be removed and another electronic key may be inserted. The identification code of the electronic key will be received and added to the access key list.
- the information regarding system activation period and access key list may be stored at a remote data facility (not shown) .
- a remote data facility not shown
- the primary controller 104 when the primary controller 104 receives power, communication is established with the remote data facility to perform the security measures and checks described above. For example, once the primary controller 104 receives power, the controller 104 would communicate with the remote data facility to establish the system activation period. If the first operating characteristic, for example, was within the system activation period, then the security system 102 remains activated. The primary controller 104 may then receive the key identification code, and through communication with the remote data facility determine if the key code is on the access list and the second operating characteristic, for example, is within the key activation period.
- both a system activation period, and a key identification code are analyzed, as described above, to determine whether to enable operation of the machine.
- an analysis of a system activation period may be omitted, and therefore machine operation will be based upon the key identification code analysis.
- power is delivered to the primary controller in response to the key switch being configured in a predetermined position
- the security system is activated in response to the power delivery
- an identification code is received from the key
- the received identification code is compared to at least one authorized key identification codes
- a determination is made regarding whether to enable machine operation in response to the key code comparison.
- the present invention includes a method and apparatus to secure a machine having a machine security system.
- the machine security system includes a primary controller, and a key switch associated with the primary controller.
- the key switch is adapted to receive a key, and is configurable to a plurality of positions.
- the method includes the steps of delivering power to the primary controller in response to the key switch being configured in a predetermined position, activating the security system in response to the power delivery, determining a first operating characteristic of the machine, determining whether to maintain activation of the security system in response to the first operating characteristic, receiving an identification code from the key, and determining whether to enable operation of the machine in response to the received key code .
- the key switch is adapted to receive a universal key which may be either an electronic key or a nonelectronic key.
- the first operating characteristic e.g., time of day
- the security system is deactivated and may be started using either an electronic or non-electronic key.
- a key identification code is received from the key and compared with one or more authorized key codes.
- the authorized key codes may be stored on an access list located in the primary controller 104.
- the access list includes at least one key identification code.
- the access list also includes a key activation period.
- the primary controller may establish a second operating characteristic, e.g., time of day or service hours, etc., and compare the second operating characteristic with the key activation period. If the key identification code matches a code on the access list, and the criteria for the associated key activation period is satisfied, then machine operation will be enabled.
- enable signals are delivered to the appropriate devices, such as a starter or a secondary controller, such as an engine controller, to enable the devices to operate a machine system/function/element , thereby enabling operating of the machine.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10196323T DE10196323T1 (en) | 2000-06-07 | 2001-05-16 | Method and device for securing an earth moving machine |
JP2002501699A JP4889907B2 (en) | 2000-06-07 | 2001-05-16 | Method and apparatus for protecting machine security |
CA002409671A CA2409671A1 (en) | 2000-06-07 | 2001-05-16 | A method and apparatus for securing a machine |
AU2001266584A AU2001266584B2 (en) | 2000-06-07 | 2001-05-16 | Method and apparatus for securing an earth moving machine |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/589,261 | 2000-06-07 | ||
US09/589,261 US6522251B1 (en) | 2000-06-07 | 2000-06-07 | Method and apparatus for securing an earth moving machine |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001094165A2 true WO2001094165A2 (en) | 2001-12-13 |
WO2001094165A3 WO2001094165A3 (en) | 2003-10-30 |
Family
ID=24357281
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/015788 WO2001094165A2 (en) | 2000-06-07 | 2001-05-16 | A method and apparatus for securing a machine |
Country Status (6)
Country | Link |
---|---|
US (1) | US6522251B1 (en) |
JP (1) | JP4889907B2 (en) |
AU (1) | AU2001266584B2 (en) |
CA (1) | CA2409671A1 (en) |
DE (1) | DE10196323T1 (en) |
WO (1) | WO2001094165A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10203462A1 (en) * | 2002-01-28 | 2003-07-31 | Kostal Leopold Gmbh & Co Kg | Electronic control device e.g. for safety related applications in automobiles, includes authentication module spatially separate from electronic actuator |
EP1367543A3 (en) * | 2002-05-27 | 2005-09-07 | Kobelco Construction Machinery Co., Ltd. | Anti-theft system for construction machines and method for managing construction machines |
CN109840970A (en) * | 2017-11-29 | 2019-06-04 | 南京奥拓电子科技有限公司 | A kind of gate inhibition's identifier and gate inhibition's recognition methods |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6952156B2 (en) * | 2000-12-28 | 2005-10-04 | Cnh America Llc | Transponder communication and control system for a vehicle |
US6998956B2 (en) * | 2000-12-28 | 2006-02-14 | Cnh America Llc | Access control system for a work vehicle |
US6870458B2 (en) * | 2001-07-27 | 2005-03-22 | Magnadyne Corporation | Dealer remote transmitter with time limited operability |
DE10323402B3 (en) * | 2003-05-23 | 2005-01-05 | Siemens Ag | Access and use authorization system, in particular of a motor vehicle |
US20040263316A1 (en) * | 2003-06-24 | 2004-12-30 | Case, Llc | Reprogrammable vehicle access control system |
US7042333B2 (en) * | 2003-11-12 | 2006-05-09 | Cnh America Llc | Central access control system |
US20050246040A1 (en) * | 2004-04-29 | 2005-11-03 | Caterpillar Inc. | Operator profile control system for a work machine |
US20050264396A1 (en) * | 2004-05-28 | 2005-12-01 | Caterpillar, Inc. | Machine security system having remote access code management |
DE102004032886A1 (en) * | 2004-07-07 | 2006-02-09 | Hella Kgaa Hueck & Co. | Headlight control method for motor vehicles, for right hand or left-hand drive comparing activation or deactivation data with a reference date and on agreement sending control signal to headlight |
DE102006019142B4 (en) * | 2005-07-01 | 2018-02-15 | Elan Schaltelemente Gmbh & Co. Kg | Key selector |
US20090143878A1 (en) * | 2007-12-04 | 2009-06-04 | Caterpillar Inc. | Operator profile control system for a machine |
TWI503743B (en) * | 2009-04-13 | 2015-10-11 | Icm Inc | A method for controlling the information gateway of the vehicle controller and controlling the vehicle controller |
DE102010010529B4 (en) * | 2010-03-05 | 2012-04-19 | Teratron Gmbh | Control of an access authorization for a motor vehicle |
ITTO20100366A1 (en) * | 2010-04-29 | 2011-10-30 | Cnh Italia Spa | SAFETY SYSTEM FOR AN AGRICULTURAL VEHICLE |
US9530086B1 (en) | 2015-10-27 | 2016-12-27 | Cnh Industrial America Llc | Scanned software activation codes in agricultural and contruction work equipment systems |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4338106A1 (en) * | 1993-11-08 | 1995-05-11 | Wallinger Josef M Dr Ing | Security device for motor vehicles |
DE19601816A1 (en) * | 1996-01-19 | 1997-07-24 | Bayerische Motoren Werke Ag | Vehicle security system |
DE19812210C1 (en) * | 1998-03-19 | 1999-05-06 | Siemens Ag | Motor vehicle unauthorised usage prevention device |
WO1999044869A1 (en) * | 1998-03-02 | 1999-09-10 | Toyota Jidosha Kabushiki Kaisha | Car stealing prevention device |
Family Cites Families (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2564892B1 (en) | 1984-05-22 | 1986-09-05 | Neiman Sa | LOCK WITH MECHANICAL AND ELECTRICAL CONTROL. |
DE3624707A1 (en) | 1985-07-22 | 1987-01-22 | Aisin Seiki | LOCK CONTROL DEVICE FOR VEHICLES |
JPS6393649A (en) | 1986-10-07 | 1988-04-23 | Tokai Rika Co Ltd | Key device for vehicle |
JPH0747910B2 (en) | 1986-10-24 | 1995-05-24 | 日産自動車株式会社 | Remote control device |
US4852680A (en) | 1988-04-07 | 1989-08-01 | J. I. Case Company | Vehicle anti-theft system with remote security module |
US5079435A (en) | 1988-12-20 | 1992-01-07 | Honda Giken Kogyo Kabushiki Kaisha | Vehicle anti-theft system using second key means |
US5543665A (en) | 1992-11-23 | 1996-08-06 | Demarco; Vincent | Optical key and lock code authentication |
US5675490A (en) | 1993-08-20 | 1997-10-07 | Siemens Aktiengesellschaft | Immobilizer for preventing unauthorized starting of a motor vehicle and method for operating the same |
JP2823491B2 (en) * | 1993-08-30 | 1998-11-11 | 株式会社東海理化電機製作所 | Vehicle anti-theft device |
KR0162932B1 (en) | 1993-12-27 | 1998-12-15 | 쯔지 요시후미 | Anti-theft device for a vehicle |
WO1995022475A1 (en) | 1994-02-17 | 1995-08-24 | Rover Group Limited | Vehicle security system |
DE4411435A1 (en) | 1994-03-31 | 1995-10-05 | Bayerische Motoren Werke Ag | Method for controlling the use of a motor vehicle using a two-part code signal |
JP3099642B2 (en) | 1994-07-14 | 2000-10-16 | トヨタ自動車株式会社 | Vehicle anti-theft device |
JP3319230B2 (en) | 1994-08-05 | 2002-08-26 | 株式会社デンソー | Remote control device |
US5734330A (en) | 1994-10-11 | 1998-03-31 | Calsonic Corporation | Anti-theft car protection device |
US5686883A (en) | 1994-10-19 | 1997-11-11 | Honda Giken Kogyo Kabushiki Kaisha | Vehicle anti-theft system |
DE69533966T2 (en) | 1994-11-11 | 2005-06-30 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | METHOD FOR REGISTERING AN IDENTIFICATION CODE |
DE69515165T2 (en) | 1994-12-28 | 2000-07-13 | Mazda Motor | Anti-theft device for motor vehicles |
JP3073904B2 (en) * | 1995-02-17 | 2000-08-07 | 本田技研工業株式会社 | Vehicle data processing device |
DE19516316C2 (en) | 1995-05-04 | 1998-11-26 | Kiekert Ag | Safety device on a motor vehicle, which only allows a person authorized to open the motor vehicle to open the motor vehicle |
DE19516992C1 (en) | 1995-05-09 | 1996-04-04 | Siemens Ag | Operating system for automobile anti-theft device |
JP3380368B2 (en) | 1995-06-05 | 2003-02-24 | 三菱電機株式会社 | Vehicle anti-theft device |
DE19526530C1 (en) | 1995-07-20 | 1996-08-14 | Siemens Ag | Vehicle immobiliser initialising system |
DE19530720B4 (en) | 1995-08-18 | 2004-07-22 | Kiekert Ag | central locking system |
DE19533309A1 (en) | 1995-09-08 | 1997-03-13 | Bayerische Motoren Werke Ag | Keys for motor vehicles |
JPH09188224A (en) | 1996-01-11 | 1997-07-22 | Tokai Rika Co Ltd | Communication system for vehicle |
JP3275691B2 (en) | 1996-03-01 | 2002-04-15 | 日産自動車株式会社 | Vehicle anti-theft device |
EP0888940B1 (en) * | 1996-04-16 | 2005-08-17 | Toyota Jidosha Kabushiki Kaisha | Machine start controlling apparatus |
US5693987A (en) | 1996-07-29 | 1997-12-02 | Krucoff; Darwin | Vehicle keyless deadbolt locking system |
DE19630747C1 (en) | 1996-07-30 | 1997-09-25 | Siemens Ag | Theft protection system for motor vehicle |
DE29613136U1 (en) * | 1996-08-02 | 1997-11-27 | Roesler Klaus Dieter Dipl Ing | Lock or access authorization system |
JPH1081201A (en) * | 1996-09-11 | 1998-03-31 | Toyota Motor Corp | Engine start controlling device |
US5821631A (en) | 1997-02-07 | 1998-10-13 | Clark Equipment Company | Keyless ignition system with delayed security |
DE19721286C1 (en) * | 1997-05-21 | 1998-09-17 | Siemens Ag | Initialising motor vehicle anti-theft protection system with several portable electronic keys |
JP3184153B2 (en) * | 1998-07-17 | 2001-07-09 | 住友建機株式会社 | Anti-theft equipment for civil engineering and construction machinery |
-
2000
- 2000-06-07 US US09/589,261 patent/US6522251B1/en not_active Expired - Lifetime
-
2001
- 2001-05-16 DE DE10196323T patent/DE10196323T1/en not_active Withdrawn
- 2001-05-16 CA CA002409671A patent/CA2409671A1/en not_active Abandoned
- 2001-05-16 AU AU2001266584A patent/AU2001266584B2/en not_active Ceased
- 2001-05-16 WO PCT/US2001/015788 patent/WO2001094165A2/en active Search and Examination
- 2001-05-16 JP JP2002501699A patent/JP4889907B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4338106A1 (en) * | 1993-11-08 | 1995-05-11 | Wallinger Josef M Dr Ing | Security device for motor vehicles |
DE19601816A1 (en) * | 1996-01-19 | 1997-07-24 | Bayerische Motoren Werke Ag | Vehicle security system |
WO1999044869A1 (en) * | 1998-03-02 | 1999-09-10 | Toyota Jidosha Kabushiki Kaisha | Car stealing prevention device |
DE19812210C1 (en) * | 1998-03-19 | 1999-05-06 | Siemens Ag | Motor vehicle unauthorised usage prevention device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10203462A1 (en) * | 2002-01-28 | 2003-07-31 | Kostal Leopold Gmbh & Co Kg | Electronic control device e.g. for safety related applications in automobiles, includes authentication module spatially separate from electronic actuator |
EP1367543A3 (en) * | 2002-05-27 | 2005-09-07 | Kobelco Construction Machinery Co., Ltd. | Anti-theft system for construction machines and method for managing construction machines |
CN109840970A (en) * | 2017-11-29 | 2019-06-04 | 南京奥拓电子科技有限公司 | A kind of gate inhibition's identifier and gate inhibition's recognition methods |
Also Published As
Publication number | Publication date |
---|---|
CA2409671A1 (en) | 2001-12-13 |
DE10196323T1 (en) | 2003-07-17 |
WO2001094165A3 (en) | 2003-10-30 |
AU2001266584B2 (en) | 2003-12-18 |
JP4889907B2 (en) | 2012-03-07 |
US6522251B1 (en) | 2003-02-18 |
JP2004509797A (en) | 2004-04-02 |
AU6658401A (en) | 2001-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001266584B2 (en) | Method and apparatus for securing an earth moving machine | |
US5637929A (en) | Method and apparatus for enhanced vehicle protection | |
US6501369B1 (en) | Vehicle security system having unlimited key programming | |
US5708308A (en) | Apparatus for protecting automobile against unauthorized operation | |
EP0704353B1 (en) | Method and apparatus for enhanced vehicle protection | |
US20220080923A1 (en) | Method and a system for controlling and monitoring operation of a device | |
EP0903271A2 (en) | Security device for vehicle | |
HU221220B1 (en) | Immobilizer equipment for vehicles | |
US6696919B1 (en) | Method of starting a device protected against unauthorized use by a PIN without using an input | |
US5861816A (en) | Vehicle anti-theft device | |
JP3861768B2 (en) | Construction machine anti-theft device and construction machine management method | |
US20090302999A1 (en) | Security and monitoring control system methods for vehicles | |
AU2001266584A1 (en) | Method and apparatus for securing an earth moving machine | |
US6828694B2 (en) | Vehicle security system for deleting temporary master remote transmitter and related methods | |
JP3756772B2 (en) | Vehicle monitoring method and monitoring system therefor | |
JP4131446B2 (en) | Engine start control system | |
US7692531B2 (en) | Remote starting control system | |
EP1785339B1 (en) | System for controlling the tilting function of a cab of a motor vehicle preventing unauthorized cab-tilt operations, a motor vehicle comprising such system, a corresponding method of controlling a cab tilting function and a computer program and a computer readable medium therefore | |
KR20070059378A (en) | A system and a control method for immobilizer using controller area network communication | |
EP1177956A1 (en) | Method and apparatus for vehicle security system | |
JP3630433B2 (en) | Mobility prohibition device with short unlock time | |
JP2006348744A (en) | Anti-theft device of construction machinery and management method of construction machinery | |
JP3309676B2 (en) | Vehicle anti-theft device | |
JP2003320922A (en) | Antitheft device for electric vehicle | |
EP0993999A2 (en) | Fuel pump immobilization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2001266584 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2409671 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2002 501699 Country of ref document: JP Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase | ||
RET | De translation (de og part 6b) |
Ref document number: 10196323 Country of ref document: DE Date of ref document: 20030717 Kind code of ref document: P |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10196323 Country of ref document: DE |
|
WWG | Wipo information: grant in national office |
Ref document number: 2001266584 Country of ref document: AU |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) |