G06F21/32

Method and apparatus for enhancing driver situational awareness

Aspects of the subject disclosure may include, for example, determining, by a system comprising a processor, a driver profile according to a driver identity for a driver of a vehicle, selecting a driver-specific enforcement scenario for the vehicle according to the driver profile and traffic enforcement information that is associated with a vehicle location, and presenting an in-vehicle alert to convey the driver-specific enforcement scenario to the driver. Other embodiments are disclosed.

Systems and methods for performing commands in a vehicle using speech and image recognition

Systems and methods are disclosed herein for implementation of a vehicle command operation system that may use multi-modal technology to authenticate an occupant of the vehicle to authorize a command and receive natural language commands for vehicular operations. The system may utilize sensors to receive data indicative of a voice command from an occupant of the vehicle. The system may receive second sensor data to aid in the determination of the corresponding vehicular operation in response to the received command. The system may retrieve authentication data for the occupants of the vehicle. The system authenticates the occupant to authorize a vehicular operation command using a neural network based on at least one of the first sensor data, the second sensor data, and the authentication data. Responsive to the authentication, the system may authorize the operation to be performed in the vehicle based on the vehicular operation command.

Systems and methods for performing commands in a vehicle using speech and image recognition

Systems and methods are disclosed herein for implementation of a vehicle command operation system that may use multi-modal technology to authenticate an occupant of the vehicle to authorize a command and receive natural language commands for vehicular operations. The system may utilize sensors to receive data indicative of a voice command from an occupant of the vehicle. The system may receive second sensor data to aid in the determination of the corresponding vehicular operation in response to the received command. The system may retrieve authentication data for the occupants of the vehicle. The system authenticates the occupant to authorize a vehicular operation command using a neural network based on at least one of the first sensor data, the second sensor data, and the authentication data. Responsive to the authentication, the system may authorize the operation to be performed in the vehicle based on the vehicular operation command.

Devices, Systems, and Methods for Security Using Magnetic Field Based Identification

Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.

Devices, Systems, and Methods for Security Using Magnetic Field Based Identification

Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.

Display of Private Content
20180004973 · 2018-01-04 ·

A method including receipt of information indicative of a first viewer being able to visually perceive at least part of a display and information indicative of a second viewer being able to visually perceive at least part of the display, determination of first viewer private content associated with the first viewer, receipt of information indicative of the second viewer being unable to visually perceive at least part of the display, causation of display of the first viewer private content based, at least in part, on the second viewer being unable to visually perceive at least part of the display, receipt of information indicative of the second viewer being able to visually perceive at least part of the display, and termination of display of the first viewer private content based, at least in part, on the second viewer being able to visually perceive at least part of the display is disclosed.

Display of Private Content
20180004973 · 2018-01-04 ·

A method including receipt of information indicative of a first viewer being able to visually perceive at least part of a display and information indicative of a second viewer being able to visually perceive at least part of the display, determination of first viewer private content associated with the first viewer, receipt of information indicative of the second viewer being unable to visually perceive at least part of the display, causation of display of the first viewer private content based, at least in part, on the second viewer being unable to visually perceive at least part of the display, receipt of information indicative of the second viewer being able to visually perceive at least part of the display, and termination of display of the first viewer private content based, at least in part, on the second viewer being able to visually perceive at least part of the display is disclosed.

AUTHENTICATION METHOD
20180004925 · 2018-01-04 ·

An authentication method. The method comprises comparing user voice data received via an electronic device to a stored voice template to determine a voice authentication parameter. A voice authentication threshold is determined and the voice authentication parameter is compared to the voice authentication threshold to determine whether to authenticate the user. Determining the voice authentication threshold comprises determining a current value of an enrolment counter, then comparing the current value of the enrolment counter to an enrolment counter threshold and determining whether the stored voice template is fully enrolled according to the result. If the stored voice template is fully enrolled, the voice authentication threshold is set to a first voice authentication threshold. If the stored voice template is not fully enrolled then a device attribute received from the electronic device is compared to a stored device attribute. If the received device attribute matches the stored device attribute, the voice authentication threshold is set to a second voice authentication threshold determined by the current value of the enrolment counter. If the received device attribute does not match the stored device attribute, the voice authentication threshold is set to a third voice authentication threshold.

AUTHENTICATION METHOD
20180004925 · 2018-01-04 ·

An authentication method. The method comprises comparing user voice data received via an electronic device to a stored voice template to determine a voice authentication parameter. A voice authentication threshold is determined and the voice authentication parameter is compared to the voice authentication threshold to determine whether to authenticate the user. Determining the voice authentication threshold comprises determining a current value of an enrolment counter, then comparing the current value of the enrolment counter to an enrolment counter threshold and determining whether the stored voice template is fully enrolled according to the result. If the stored voice template is fully enrolled, the voice authentication threshold is set to a first voice authentication threshold. If the stored voice template is not fully enrolled then a device attribute received from the electronic device is compared to a stored device attribute. If the received device attribute matches the stored device attribute, the voice authentication threshold is set to a second voice authentication threshold determined by the current value of the enrolment counter. If the received device attribute does not match the stored device attribute, the voice authentication threshold is set to a third voice authentication threshold.

PROCESSING APPARATUS, METHOD FOR CONTROLLING PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
20180004922 · 2018-01-04 ·

Provided is a processing apparatus that authenticates a requestor in response to a request for performing predetermined processing. The processing apparatus executes the predetermined processing upon the authentication succeeding. Whether or not authentication is performed is set individually for each of the processing apparatus and an external apparatus of the processing apparatus that serve as the requestor. The authentication is performed in the case where authentication is set to be performed on the requestor that made the request.