Patent classifications
H04L2209/84
System and Method for Estimating Arrival Time of a Vehicle at a Destination
Methods and systems for estimating a time of arrival for a vehicle at a destination are disclosed. The system will access an adjacency graph comprising nodes and edges. Each node is associated with a unique location in a geographic area in which the vehicle is traveling. Each edge connects two of the nodes and is associated with an estimated travel time between the two connected nodes. The system will select, from the locations in adjacency graph, a first location that is near the vehicle and a second location that is near the destination. The location and destination are each associated with nodes in adjacency graph. The system will calculate a shortest path along the edges in the adjacency graph from the location and destination nodes, and it will calculate an estimated time of arrival for the vehicle as a function of the estimated travel times along the shortest path.
System and Method for Generating a Planned Path for a Vehicle Using a Cloud Deployment System
Methods and systems for generating a planned path for a vehicle are disclosed. Upon receiving a trip service request, a processor will access a data store containing multiple candidate motion planning systems, each of which is associated with at least one vehicle or fleet. The processor will identify a starting point and a destination for the trip service request, and it will use an identifier for the vehicle or its fleet to select, from the candidate systems, a motion planning system. The processor will use the functions of the selected motion planning system to generate candidate trajectories for the first vehicle from the starting point to the destination in a high definition map. The processor will select a planned route from the candidate trajectories, and it will output trip instructions to cause the vehicle to move along the planned route.
Systems and Methods for Managing Permissions and Authorizing Access to and Use of Services
Systems and methods for managing permissions and authorizing access to a service supported by a computing device. The methods comprise by a computing device: intercepting a request to access the service sent along with a certificate including a first tenant identifier (the first tenant identifier identifying a first business entity other than a second business entity providing the service); using the first tenant identifier to obtain permission information from a datastore (the permission information specifying which resources of a plurality of resources can be returned in response to requests from the first business entity); generating a web authentication token including the first tenant identifier and the permission information; and initiating operations of the service in response to a validation of the web authentication token.
SYSTEMS AND METHODS FOR DEFINING SERVICEABLE AREAS
Methods and systems for obtaining serviceable areas for a robotic system in a metropolitan area are described. A computing device obtains information about places where (i) the system can route to and from in the area and/or (ii) the system can stop in the area. The computing device uses the information to generate clusters of places where the robotic system can route or stop in the metropolitan area. The computing device creates a geometric shape for each cluster, wherein each shape which has a boundary defined by outermost places contained in the cluster. The computing device uses the geometric shapes to define the serviceable areas for the robotic system within the metropolitan area. The computing device uses the serviceable areas to generate a map displaying at least one geographic area representing a portion of the metropolitan area where a concentrated number of the places exist.
Information-based, biometric, asynchronous access control system
An information-based access control system for facilities. The control system includes a mobile app and securely connected central server, which is cloud-based. The app collects and transmits multiple biometric and other authentication factors and the facility enabling the server to verify identity and check to ensure the person is authorized to obtain access. If so, the server issues a limited duration approved biometric, which can be displayed to the facility guards, compared with a on-site image taken with a biometric sensor at the location, and used to control signal lights and electronic gates to obtain access quickly, conveniently, inexpensively, and securely. Also, a vehicle on the move can acquire access without having to slow down or stop if the biometric sensor can obtain an image inside the vehicle.
Blockchain-based method and device for processing driving data
Methods and devices are provided for uploading driving data to a blockchain network. The method is executed at a vehicle node in the blockchain network and includes: packing driving data of the vehicle node within a predetermined time interval every predetermined time interval to obtain a vehicle data packet of the vehicle, and storing the vehicle data packet locally in the vehicle node; broadcasting the vehicle data packet to other vehicle nodes located nearby and in the blockchain network for the other vehicle nodes to receive and store; receiving and storing other vehicle data packets broadcast by the other vehicle nodes located nearby and in the blockchain network; and when connecting to a fixed node that belongs to the blockchain network, synchronizing the vehicle data packet and the other vehicle data packets as stored to the fixed node, wherein the fixed node participates in the consensus of the blockchain network.
Method and system for controlling access to secure data using custodial key data
Methods and systems for controlling access to secure data use a custodial TRNG disk. Source data is encrypted using first key data from a first TRNG disk to generate encrypted data which is stored at a first location by a first entity. A second TRNG disk has second key data which is stored at a second location by a second entity. A first TRNG disk copy and a second TRNG disk copy are made identical to the first TRNG disk and the second TRNG disk, respectively, and are stored at one or more locations by a custodial entity. The first key data and the second key data are encoded together, and then transmitted to one or more of the first or second entities. The first quantity of encrypted data is decryptable using the encoded first key data and the second key data.
Vehicle toll transponder for enabling multiple transaction cards and securely providing transaction card details
A toll transponder may receive transaction card data identifying a transaction card associated with a transaction account. The toll transponder may provide to a toll server device, and via a toll antenna of a toll collection system, a request for a transaction amount for a vehicle toll, and may receive a response requesting authorization for payment of the transaction amount. The toll transponder may determine, based on the response, an authorization request cryptogram for payment of the transaction amount, and generate an encrypted signal identifying the authorization request cryptogram, the transaction card data, and a toll transponder identifier identifying the toll transponder. The toll transponder may provide the encrypted signal to the toll server device via the toll antenna, and may receive from the toll server device, via the toll antenna, data indicating whether the transaction amount for the vehicle toll is approved.
Windshield-mounted vehicle anti-theft apparatus and methods for using same
A vehicle theft-prevention system can include a plurality of sensors configured to sense measurements proximate to a vehicle and a body configured to secure to a window of the vehicle. The body can include a wireless transceiver and at least one computing device coupled to the plurality of sensors and the wireless transceiver. The at least one computing device can be configured to receive, via the wireless transceiver, an indication to enter an armed mode from an unarmed mode. The at least one computing device can be configured to, in response to the indication, transition to the armed mode, wherein transitioning to the armed mode comprises setting a configuration of at least one property of a subset of the plurality of sensors.
Systems And Methods For Enabling Trusted Communications Between Controllers
Systems and methods are described that enable trusted communications between two entities. In one implementation, a controller of a vehicle may include one or more processors configured to receive data and a controller signature from a second controller of the vehicle. The controller signature may be generated based on at least a first portion of the data. The one or more processors may be further configured to transmit the data and the controller signature to a gateway of the vehicle and receive a gateway signature from the gateway. The gateway signature may be generated based on at least a second portion of the data and transmitted to the controller after the gateway verified the controller signature. In addition, the one or more processors may be configured to verify the gateway signature and process the data.