G06K7/10257

System and method for associating user and vehicle information for communication to a third party
10685503 · 2020-06-16 · ·

A vehicle is provided that detects a first presence of a driver in a vehicle, based upon detecting the first presence, provides a user interface for the driver to enter first user information, information, and communicates the first sensitive information to a vendor to authenticate the combines the first user information and the vehicle information to generate the first sensitive driver to enable the vendor to perform a financial transaction with the driver using the first sensitive information while the vehicle is in motion. The processor is programmed to initiate automatically, on behalf of the driver, the financial transaction with the vendor in response to a sensed state or location of the vehicle.

Methods and systems for communicating estimated time of arrival to a third party
10679276 · 2020-06-09 · ·

A vehicle, based on user preferences and while the vehicle is in motion: in response to identification of a first event (e.g., a third party resident being in a vehicle location and/or on the route of the vehicle) and based on the user preferences, determines that the user desires to perform a transaction with the third party, automatically sends a first communication to the third party for the user (the first communication being part of a secure session and enabling authentication of the user by the third party), at a second later time and while the vehicle is in motion, and in response to identification of a second event, automatically sends a different second communication to the third party. The second communication is part of the secure session and enables the third party to complete the transaction with the user.

Methods and systems for automatically sending rule-based communications from a vehicle
10672060 · 2020-06-02 · ·

A vehicle is provided that determines a need for communication with a third party vendor, retrieves the user rule from the memory (the user rule defining to which third party vendor the vehicle can send a first communication to address the need and defining a geographic location of the third party vendor relative to a current location of the vehicle, a monetary amount the vehicle can pay to a third party vendor for a product or service to address the need, and a time limit for the third party vendor to provide the product or service to address the need), based on the user rule, selects a third party vendor from among multiple possible third party vendors, and when determined by the user rule, automatically sends the first communication to the selected third party vendor to order the product or service and provides an authorization to the selected third party vendor to complete the order. The vehicle uses different communication protocols to provide the first communication and authorization to the selected third party vendor.

METHOD, SYSTEM AND APPARATUS FOR NFC SECURITY
20200151402 · 2020-05-14 ·

A method, system and apparatus for providing security to RFID and NFC systems. In some exemplary embodiments, a smart poster may be utilized to provide appropriate or desired communications with an RFID or NFC-enabled device. Such exemplary embodiments may utilize an authorized NFC tag to communicate with an NFC-enabled device, and upon activation of the authorized NFC tag, may trigger activation or appearance of one or more related items, such as visual cues. Additionally, aspects of NFC security systems which can include regions of security, states of activity and actions performed when security violations are detected.

Systems and methods for RFID security

An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.

Securing internet of things (IOT) RF (radio frequency) location tags using source addresses to locate stations on a Wi-Fi network
10579840 · 2020-03-03 · ·

RF tags using source addresses to locate stations on a Wi-Fi network are secured. An RF location server receives a pseudo source address of an RF (radio frequency) tag from a station. The station obtains the pseudo source address while being within radio range of the RF tag and the station receiving a beacon frame from the RF tag. A source address for the RF tag is looked-up utilizing the pseudo source address, and a specific location for the RF tag is looked-up utilizing the source address. Some embodiments store the locations in association with the pseudo address. Either way, the specific location of the station is identified based on the source address of the RF tag. An action is determined in response to at least the specific location of the station. Information related to the action is sent to the station for output to a user of the station. For example, a location-based offer or service can be provided in real-time with a consumer's presence to relevant products or services.

Method, system and apparatus for NFC security

A method, system and apparatus for providing security to RFID and NFC systems. In some exemplary embodiments, a smart poster may be utilized to provide appropriate or desired communications with an RFID or NFC-enabled device. Such exemplary embodiments may utilize an authorized NFC tag to communicate with an NFC-enabled device, and upon activation of the authorized NFC tag, may trigger activation or appearance of one or more related items, such as visual cues. Additionally, aspects of NFC security systems which can include regions of security, states of activity and actions performed when security violations are detected.

CARD READER TERMINAL WITH EXTERNAL CONTACTLESS ANTENNA
20190392416 · 2019-12-26 ·

A secure arrangement for performing secure contactless payments includes an external contactless card reader comprising a short-distance communication antenna. The secure arrangement comprises a card reader terminal comprising a secure controller configured for performing financial transactions, wherein the secure controller is located in a secure area within the card reader terminal, an external contactless card reader comprising a short-distance communication antenna configured for converting an electromagnetic signal comprising card data, received from a contactless payment card, into an analogue signal and a feed line configured for transferring the analogue signal between the external contactless card reader and the card reader terminal. The secure area in the card reader terminal comprises an A/D converter for digitizing the analogue signal to a digital signal that can be processed by the secure controller, within the secure area.

PROTECTION OF PERSONAL DATA CONTAINED ON AN RFID-ENABLED DEVICE
20240078394 · 2024-03-07 ·

A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.

BATTERY AGNOSTIC PROVISIONING OF POWER
20190347873 · 2019-11-14 ·

According to one embodiment, provisioning an amount of power for one or more vehicles can comprise receiving a request indicating a requirement for an amount of power for the one or more vehicles. The request can indicate the requirement for the amount of power for the one or more vehicles individually or in total. A set of management rules can be read from one or more databases. A set of service configuration information and a set of vehicle specific information for the one or more vehicles can also be read from one or more databases. One or more power sources to meet the requirement for the amount of power for the one or more vehicles can be determined based on applying the management rules and using the set of service configuration information and the set of vehicle information and an indication of the determined power sources can be provided.