Browse Prior Art Database

Extended Incident Information Gathering in Car P2P Networks Disclosure Number: IPCOM000172102D
Original Publication Date: 2008-Jun-27
Included in the Prior Art Database: 2008-Jun-27
Document File: 1 page(s) / 24K

Publishing Venue



Background (Black Box) A car in a P2P mesh network would more than likely be gathering information on the vehicle which could be analyzed upon an incident. When an incident occurs the car could also instantly gather information on external sources which could give more detailed information during incident investigation. Problem A black box typically has a limited storage capacity and may not store information external to the vehicle in a P2P mesh network. Core Idea This inventions presents several solutions to this problem by minimizing storage requirements until the data is needed. This external information may be gathered when an incident occurs such as airbag deployment or impact, or is about to occur based on changing conditions. Identification information collected for all vehicles in the vicinity of an incident, could be used by law enforcement, insurance, or other investigative efforts and to contact other vehicle occupants and collect further recorder data, if available.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Extended Incident Information Gathering in Car P 2P Networks

1. Car maintains log of all messages, not just the ones that the user showed interest in
1. log contains some vehicle identifier and timestamp
1. optionally location of vehicle
1. latitude/longitude
2. number of p2p hops from car
2. Incident occurs
1. airbag deployment
2. impact detection
3. sudden braking
4. user indicates incident
3. Car computer scans logs and gathers data from within some time frame surrounding the accident
4. Car computer resolves identifiers into something that allows the computer to contact the vehicle
5. Car computer sends each vehicle a message
1. In realtime
1. Requesting its data
2. Requesting that it mark its data from that time frame as important and not delete it for some time
2. After the fact
1. requesting its data