B60R25/01

Methods for passenger authentication and door operation for autonomous vehicles

Disclosed are computer systems and techniques for authenticating a passenger of an autonomous vehicle and operating doors of the autonomous vehicle. For passenger authentication, the computer system is configured to receive a ride request, generate a passcode, transmit the passcode to a user account and the autonomous vehicle, authenticate the user using the passcode, and enable departure of the autonomous vehicle. For door operation, the computer system is configured to detect environmental conditions surrounding an autonomous vehicle, determine based on a set of operational conditions whether one or more doors of the autonomous vehicle are desirable for use, and operate a door if the door is safe to operate and desirable for operation.

Methods for passenger authentication and door operation for autonomous vehicles

Disclosed are computer systems and techniques for authenticating a passenger of an autonomous vehicle and operating doors of the autonomous vehicle. For passenger authentication, the computer system is configured to receive a ride request, generate a passcode, transmit the passcode to a user account and the autonomous vehicle, authenticate the user using the passcode, and enable departure of the autonomous vehicle. For door operation, the computer system is configured to detect environmental conditions surrounding an autonomous vehicle, determine based on a set of operational conditions whether one or more doors of the autonomous vehicle are desirable for use, and operate a door if the door is safe to operate and desirable for operation.

Method and apparatus with vehicle control

A processor-implemented vehicle controlling method includes: determining whether an object in a vehicle is a living object based on radio detection and ranging (radar) information received from a radar sensor; in response to a determination that the object is a living object, determining bioinformation of the object based on the radar information; and adjusting a temperature in the vehicle based on the bioinformation and temperature information received from a temperature sensor.

Method and apparatus with vehicle control

A processor-implemented vehicle controlling method includes: determining whether an object in a vehicle is a living object based on radio detection and ranging (radar) information received from a radar sensor; in response to a determination that the object is a living object, determining bioinformation of the object based on the radar information; and adjusting a temperature in the vehicle based on the bioinformation and temperature information received from a temperature sensor.

Method for unlocking vehicle door using mobile terminal
11623612 · 2023-04-11 · ·

The present invention provides a method for unlocking a vehicle door using a mobile terminal. The unlocking method comprises: authenticating, by a mobile key management server, a user and a smartphone of the user; authenticating, by the mobile key management server, a vehicle having a door to be unlocked using the authenticated smartphone; generating, by the mobile key management server, a mobile key issuance algorithm corresponding to the authenticated vehicle and smartphone; issuing, by the mobile key management server, a mobile key, using the generated mobile key issuance algorithm, in response to a request from the smartphone; receiving, at the mobile key management server, the issued mobile key via the smartphone and the vehicle; confirming, by the mobile key management server, whether the issued mobile key matches the received mobile key; and requesting, by the mobile key management server, the vehicle to unlock the door thereof, when the issued mobile key matches the received mobile key.

Method for unlocking vehicle door using mobile terminal
11623612 · 2023-04-11 · ·

The present invention provides a method for unlocking a vehicle door using a mobile terminal. The unlocking method comprises: authenticating, by a mobile key management server, a user and a smartphone of the user; authenticating, by the mobile key management server, a vehicle having a door to be unlocked using the authenticated smartphone; generating, by the mobile key management server, a mobile key issuance algorithm corresponding to the authenticated vehicle and smartphone; issuing, by the mobile key management server, a mobile key, using the generated mobile key issuance algorithm, in response to a request from the smartphone; receiving, at the mobile key management server, the issued mobile key via the smartphone and the vehicle; confirming, by the mobile key management server, whether the issued mobile key matches the received mobile key; and requesting, by the mobile key management server, the vehicle to unlock the door thereof, when the issued mobile key matches the received mobile key.

User-to-vehicle interaction

In some exemplary processes for accessing a vehicle, a transit request is initiated. The transit request summons a vehicle towards a location of a user device. Information generated in response to the transit request is received. The information includes first authentication information and second authentication information. Third authentication information from the vehicle is received using a first wireless communication protocol. A determination is made as to whether the third authentication information corresponds to the first authentication information. In accordance with determining that the third authentication information corresponds to the first authentication information, a wireless communication connection is established with the vehicle using a second wireless communication protocol and the second authentication information. The second wireless communication protocol is different from the first wireless communication protocol. Using the second wireless communication protocol, instructions to unlock a cabin of the vehicle are sent.

User-to-vehicle interaction

In some exemplary processes for accessing a vehicle, a transit request is initiated. The transit request summons a vehicle towards a location of a user device. Information generated in response to the transit request is received. The information includes first authentication information and second authentication information. Third authentication information from the vehicle is received using a first wireless communication protocol. A determination is made as to whether the third authentication information corresponds to the first authentication information. In accordance with determining that the third authentication information corresponds to the first authentication information, a wireless communication connection is established with the vehicle using a second wireless communication protocol and the second authentication information. The second wireless communication protocol is different from the first wireless communication protocol. Using the second wireless communication protocol, instructions to unlock a cabin of the vehicle are sent.

RIDABLE MOVING OBJECT, CONTROL DEVICE FOR RIDABLE MOVING OBJECT, CONTROL METHOD, AND STORAGE MEDIUM
20230107865 · 2023-04-06 ·

A ridable moving object on which a user gets is provided. The ridable moving object includes a processor configured to execute a program to determine that the user has been away from the ridable moving object, detect a usage intention of another person different from the user for the ridable moving object, and generate an action command for causing the ridable moving object to perform a prescribed operation on a basis of setting information set for at least one of the user and the ridable moving object when it is determined that the user has been away from the ridable moving object and the usage intention of the another person for the ridable moving object has been detected.

RIDABLE MOVING OBJECT, CONTROL DEVICE FOR RIDABLE MOVING OBJECT, CONTROL METHOD, AND STORAGE MEDIUM
20230107865 · 2023-04-06 ·

A ridable moving object on which a user gets is provided. The ridable moving object includes a processor configured to execute a program to determine that the user has been away from the ridable moving object, detect a usage intention of another person different from the user for the ridable moving object, and generate an action command for causing the ridable moving object to perform a prescribed operation on a basis of setting information set for at least one of the user and the ridable moving object when it is determined that the user has been away from the ridable moving object and the usage intention of the another person for the ridable moving object has been detected.