(12) United States Patent ao) Patent No.: Us 7,124,027 Bi
Ernst, Jr. et al. (45) Date of Patent: Oct. 17,2006
(54) VEHICULAR COLLISION AVOIDANCE SYSTEM
(75) Inventors: Raymond P. Ernst, Jr., Canton, MI (US); Terry B. Wilson, Chandler, AZ (US)
(73) Assignee: Yazaki North America, Inc., Canton, MI (US)
( * ) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 U.S.C. 154(b) by 343 days.
(21) Appl. No.: 10/193,512
(22) Filed: Jul. 11, 2002
(51) Int. CI.
(52) U.S. CI 701/301; 701/96; 340/435;
340/436; 340/438; 342/29
(58) Field of Classification Search 701/1,
701/300, 301, 45, 96; 340/435, 436, 438;
342/29, 70, 72 See application file for complete search history.
(56) References Cited
U.S. PATENT DOCUMENTS
4,417,248 A * 11/1983 Mathews 342/29
5,357,438 A 10/1994 Davidian
5,465,079 A 11/1995 Bouchard et al.
5,959,552 A * 9/1999 Cho 340/903
5,979,586 A * 11/1999 Farmer et al 180/274
5,999,092 A 12/1999 Smith et al.
6,163,755 A * 12/2000 Peer et al 701/301
6,215,415 Bl 4/2001 Schroder
6,222,447 Bl 4/2001 Schofield et al.
6,232,874 Bl * 5/2001 Murphy 340/426.19
6,420,996 Bl * 7/2002 Stopczynski et al 342/70
6,443,400 Bl 9/2002 Murata et al.
6,498,972 Bl * 12/2002 Rao et al 701/45
A collision avoidance system for use in a vehicle. The system facilitates the avoidance of other vehicles and other potential hazards or obstacles. A sensor subsystem is used to capture sensor data relating to one or more areas outside the vehicle. Sensor data is sent from the sensor subsystem to a threat assessment subsystem for generating a threat assessment from the sensor data. The threat assessment is then sent to a feedback subsystem so that if appropriate, a response is generated by the system. The response can take the form of a visual, audio, and/or haptic warning. The response can also take the form of changes with respect to the vehicle itself, such as an automatic reduction in speed. The system can incorporate user-based attributes, vehicle-based attributes, and environment-based attributes in evaluating potential threats and contemplating system responses to those threats. A wide variety of different heuristics can be applied by the system. The system can be configured to minimize nuisance alarms and accommodate distinctions between users based on user preferences, user history, and other factors.
63 Claims, 24 Drawing Sheets