G07C9/25

Verified driver system for a motor vehicle

A system and method for verifying a driver seated in a driver's seat of a vehicle is disclosed. The method includes scanning a license of the driver seated in the driver's seat of the vehicle to obtain a driver profile and detecting biometric information of the driver using one or more sensors in the vehicle. The driver profile includes biometric information. The method compares the detected biometric information with the biometric information of the driver profile to verify that the license of the driver seated in the vehicle matches the driver seated in the vehicle. The method may notify a provider computer system as to whether the license of the driver matches the driver seated in the vehicle. The method may adjust vehicle components based on preferences of the driver profile.

SYSTEM AND METHOD FOR THE AUTOMATED PROCESSING OF PHYSICAL OBJECTS
20230161913 · 2023-05-25 ·

Methods and systems for verifying authenticity of a physical object and/or for verifying possession of the object by an individual are described. In one embodiment, the object is registered with a remote processing system. Data representing at least one characteristic of the object is obtained and stored in the remote system and the identity of the individual or entity possessing the object is authenticated. After authenticating the individual, an identifier is collocated (or an existing mechanism is activated or modified to replicate the identifier) with the object, where the identifier uniquely identifies the object and the individual possessing the object. The object and the identity of the individual possessing the object can be authenticated at a future time by sensing the collocated identifier and sending the sensed identifier to the remote system. The remote system can send instructions to an entity wishing to authenticate the object and its association with the individual possessing the object. The instructions can be set up at the time the object is registered in the remote system. The remote system can perform an interactive or automated session with the entity wishing to authenticate the object, thereby saving time and providing a robust method of authentication and means for carrying out additional processing functions.

INFORMATION PROCESSING DEVICE, VEHICLE, AND STORAGE MEDIUM

The information processing device includes a processor configured to control setting and cancellation of a power supply mode in which the power supply device operates, for a vehicle including the power supply device that supplies electric power to the outside. The processor outputs information requesting an input of authentication information when a canceling request of the power supply mode that is set is acquired.

INFORMATION PROCESSING DEVICE, VEHICLE, AND STORAGE MEDIUM

The information processing device includes a processor configured to control setting and cancellation of a power supply mode in which the power supply device operates, for a vehicle including the power supply device that supplies electric power to the outside. The processor outputs information requesting an input of authentication information when a canceling request of the power supply mode that is set is acquired.

Wearable misplacement

An access control system is described in which a primary credential device has a master key and a secondary credential device has a key derived from the master key. Both the master key and the derivative key are required to gain access to the resource protected by the access control system. If the secondary credential device is lost, misplaced, or stolen, it cannot be used to gain illicit access to the protected resource, and it can be easily replaced by providing a different secondary credential device with another key derived from the master key.

Camera and systems for integrated, secure, and verifiable home services

Systems and methods for providing integrated, secure, and verifiable home services, such as delivery of physical items within a home and execution of services within a home, are disclosed. In certain embodiments, the system includes cameras, sensors and locks wirelessly connected and configured to provide information to a server associated with the delivery of items and services. In one embodiment, the disclosed methods track and deliver a package in a secure and verifiable manner through use of a time-limited electronic key. Other embodiments include apparatuses having wirelessly connected cameras that allow monitoring of the status of the delivery of an item or of services.

SHOP SYSTEM, AND SHOP SERVER
20220335483 · 2022-10-20 · ·

In a delivery network system, deliver a server that holds requested content is determined, using information included in a content request message from a communication terminal. A file or stream of the requested content is read from the determined server. When the content is moving image content, a bandwidth of a mobile network is estimated, based on a response signal or a congestion state notification signal from the communication terminal. The moving content is transmitted by controlling a timing of transmitting the read file or the read stream so as not exceed the estimated bandwidth.

SHOP SYSTEM, AND SHOP SERVER
20220335483 · 2022-10-20 · ·

In a delivery network system, deliver a server that holds requested content is determined, using information included in a content request message from a communication terminal. A file or stream of the requested content is read from the determined server. When the content is moving image content, a bandwidth of a mobile network is estimated, based on a response signal or a congestion state notification signal from the communication terminal. The moving content is transmitted by controlling a timing of transmitting the read file or the read stream so as not exceed the estimated bandwidth.

METHOD FOR AUTHENTICATING A USER USING BIOMETRICS AND DIGITIZED HANDWRITTEN SIGNATURE, AND SYSTEM IMPLEMENTING THE SAME
20230141242 · 2023-05-11 ·

A method for authenticating a user using biometrics and digitized handwritten signature is provided. A biometric stylus performs fingerprint recognition on the user who uses the biometric stylus to create a handwriting pattern on a handwriting input device, and transmits encrypted identification data to the handwriting input device when the fingerprint recognition is successful. The handwriting input device transmits the encrypted identification data and the handwriting pattern to a verification server. The verification server verifies the handwriting pattern, and decrypts the encrypted identification data for verifying an identity of the user when the handwriting pattern is successfully verified.

DISTRIBUTED ALGORITHM FOR AUTOMIXING SPEECH OVER WIRELESS NETWORKS

Systems and methods are disclosed for operating a wireless audio network including a plurality of wireless microphone units (e.g., wireless delegate units) and a central access point having a mixer. The wireless microphone units may perform voice detection and level sensing, and make a preliminary gating decision. The central access point may make a final gating decision, determine the granting of wireless communications channels, and generate a final mixed audio output signal.