Skip to main content

Connected Car offers plug-and-play remote vehicle access

Connected Car, Delphi’s plug-and-play connectivity device, connects into an OBDII port on any vehicle sold in the US from 1996 onwards and allows consumers to quickly lock and unlock their vehicle’s doors, as well as locate, track and even monitor their vehicles through a smartphone app or the internet. Delphi has teamed up with Verizon Wireless to ensure data transmitted through the device and via the internet remains secure and encrypted, allowing users to safely lock their vehicles remotely, track their
March 1, 2013 Read time: 2 mins
Connected Car, 7207 Delphi’s plug-and-play connectivity device, connects into an OBDII port on any vehicle sold in the US from 1996 onwards and allows consumers to quickly lock and unlock their vehicle’s doors, as well as locate, track and even monitor their vehicles through a smartphone app or the internet. Delphi has teamed up with 1984 Verizon Wireless to ensure data transmitted through the device and via the internet remains secure and encrypted, allowing users to safely lock their vehicles remotely, track their cars, monitor overall vehicle status, diagnose the engine’s health, receive alerts for driving behaviour and vehicle performance issues, and set up geofences.

“Drivers can now easily buy a connectivity device that plugs into most vehicles produced over the past sixteen years, instantly furnishing seamless interaction and connectivity inside and outside the vehicle,” said Jeffrey Owens, Delphi chief technology of cer. “Our device will help keep vehicles secure and operating optimally.”

The Delphi connectivity system’s key fob service operates over the Verizon Wireless network or via Bluetooth to remotely lock or unlock doors, open the trunk, start or stop the engine and operate a panic horn on selected vehicles.

For more information on companies in this article

Related Content

  • EdgeVis removes bandwidth barriers to mobile streamed video
    October 26, 2017
    A new generation of video compression can lower transmission costs of data and make streaming from mobile and body-worn cameras a reality, as Colin Sowman discovers. Bandwidth limitations have long been the bottleneck restricting the expanded use of video streaming for ITS, monitoring and surveillance purposes. Recent years have seen this countered to some degree by the introduction of ‘edge processing’ whereby ANPR, incident detection and other image processing is moved into (or close to) the camera, so
  • Keeping a watching brief over traffic flows
    March 11, 2015
    Monitoring traffic flows is set to become an even bigger challengebut a revolution in camera technology can help, as Patrik Anderson explains. By 2025 almost 60% of the world’s population will live in urban areas and in those cities there will be an estimated 6.2 billion private motorised trips every day. In order to manage this level of traffic growth, traffic management centres (TMCs) will need to both increase their monitoring capabilities and be able to detect traffic problems quickly, efficiently and r
  • The new multi-technology MACE Smart reader from Nedap reads virtual credentials on smartphones for faster and better access cont
    January 18, 2018
    Nedap Identification Systems has developed a new, multi-technology reader for mobile access control as part of its MACE suite of products. The MACE Smart reader “is able to read virtual credentials on smartphones” says Nedap, as well as “conventional smartcards.” ”We are committed to unlocking the potential of smartphones as identification technology in access control systems,” says Maarten Mijwaart, General Manager of Nedap Identification Systems. This “new reader is proof of this commitment. In addition
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take