Patent classifications
G06F21/31
Method and apparatus for enhancing driver situational awareness
Aspects of the subject disclosure may include, for example, determining, by a system comprising a processor, a driver profile according to a driver identity for a driver of a vehicle, selecting a driver-specific enforcement scenario for the vehicle according to the driver profile and traffic enforcement information that is associated with a vehicle location, and presenting an in-vehicle alert to convey the driver-specific enforcement scenario to the driver. Other embodiments are disclosed.
Method and apparatus for enhancing driver situational awareness
Aspects of the subject disclosure may include, for example, determining, by a system comprising a processor, a driver profile according to a driver identity for a driver of a vehicle, selecting a driver-specific enforcement scenario for the vehicle according to the driver profile and traffic enforcement information that is associated with a vehicle location, and presenting an in-vehicle alert to convey the driver-specific enforcement scenario to the driver. Other embodiments are disclosed.
PROCESSING APPARATUS, METHOD FOR CONTROLLING PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
Provided is a processing apparatus that authenticates a requestor in response to a request for performing predetermined processing. The processing apparatus executes the predetermined processing upon the authentication succeeding. Whether or not authentication is performed is set individually for each of the processing apparatus and an external apparatus of the processing apparatus that serve as the requestor. The authentication is performed in the case where authentication is set to be performed on the requestor that made the request.
PROCESSING APPARATUS, METHOD FOR CONTROLLING PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
Provided is a processing apparatus that authenticates a requestor in response to a request for performing predetermined processing. The processing apparatus executes the predetermined processing upon the authentication succeeding. Whether or not authentication is performed is set individually for each of the processing apparatus and an external apparatus of the processing apparatus that serve as the requestor. The authentication is performed in the case where authentication is set to be performed on the requestor that made the request.
Method for Secure Operation of a Computer Unit, Software Application and Computer Unit
A method for operating a computer unit having a processor on which a software application can run comprises the steps: upon invoking the software application or upon carrying out a transaction with the software application on the computer unit the step of checking whether the computer unit has been restarted since the last invoking of the software application; carrying out a first form of authentication for starting the software application or for carrying out the transaction with the software application if the computer unit has not been restarted since the last invoking of the software application; and carrying out a second form of authentication for starting the software application or for carrying out the transaction with the software application if the computer unit has been restarted since the last invoking of the software application. Further provided are a correspondingly designed software application as well as a correspondingly designed computer unit.
Method for Secure Operation of a Computer Unit, Software Application and Computer Unit
A method for operating a computer unit having a processor on which a software application can run comprises the steps: upon invoking the software application or upon carrying out a transaction with the software application on the computer unit the step of checking whether the computer unit has been restarted since the last invoking of the software application; carrying out a first form of authentication for starting the software application or for carrying out the transaction with the software application if the computer unit has not been restarted since the last invoking of the software application; and carrying out a second form of authentication for starting the software application or for carrying out the transaction with the software application if the computer unit has been restarted since the last invoking of the software application. Further provided are a correspondingly designed software application as well as a correspondingly designed computer unit.
Occluded Gesture Recognition
This document describes techniques and devices for occluded gesture recognition. Through use of the techniques and devices described herein, users may control their devices even when a user's gesture is occluded by some material between the user's hands and the device itself. Thus, the techniques enable users to control their mobile devices in many situations in which control is desired but conventional techniques do permit effective control, such as when a user's mobile computing device is occluded by being in a purse, bag, pocket, or even in another room.
GENERATION AND DELIVERY OF DIGITAL RECEIPTS BASED ON USER PREFERENCES AND TRANSACTION RELATED DATA
A method of delivering a digital receipt relating to a transaction to a user, the method comprising, at a server: receiving transaction related data from a point of sale system, the transaction related data having been intercepted in a data communications path between a point of sale terminal and a peripheral device; analysing transaction related data to extract user identification data; querying a user data module using extracted user identification data to determine user preferences relating to delivery of digital receipts; generating the digital receipt in dependence on the determined user preferences and the received transaction related data; outputting the digital receipt.
GENERATION AND DELIVERY OF DIGITAL RECEIPTS BASED ON USER PREFERENCES AND TRANSACTION RELATED DATA
A method of delivering a digital receipt relating to a transaction to a user, the method comprising, at a server: receiving transaction related data from a point of sale system, the transaction related data having been intercepted in a data communications path between a point of sale terminal and a peripheral device; analysing transaction related data to extract user identification data; querying a user data module using extracted user identification data to determine user preferences relating to delivery of digital receipts; generating the digital receipt in dependence on the determined user preferences and the received transaction related data; outputting the digital receipt.
Communication System and Comparison Method
A communication system and a comparison method for securing a communication path for a legitimate user via a terminal apparatus (“TA”). A vehicle-mounted communication device (“VMCD”) transmits a device ID identifying the VMCD to a TA, acquires a terminal ID from the TA, and transmits the device ID and the terminal ID acquired from the TA to a central apparatus. The TA transmits a terminal ID identifying the TA to the VMCD, acquires a device ID from the VMCD, and transmits the terminal ID and the device ID acquired from the VMCD to the central apparatus. The central apparatus receives a device ID and a terminal ID transmitted from the VMCD and a device ID and a terminal ID transmitted from the TA, and compares the device ID and the terminal ID received from the VMCD with the device ID and the terminal ID received from the TA.