Patent classifications
B60R25/257
VEHICLE UNLOCKING AUTHENTICATION METHOD AND APPARATUS BASED ON TERMINAL DEVICE
The present disclosure relates to the technical field of vehicles and discloses a vehicle unlocking authentication method and apparatus based on a terminal device, including: receiving an authentication request sent by a terminal device, to obtain a device fingerprint and a first authentication code; searching for a prestored service key corresponding to the device fingerprint, and calculating and obtaining a second authentication code according to the device fingerprint and the service key; determining a third authentication code and a fourth authentication code based on the first authentication code, the second authentication code, the device fingerprint, and the service key to complete the vehicle unlocking authentication by the terminal device. Implementing the embodiments of the present disclosure can improve the safety for transmitting data during the process of authentication between the vehicle and the terminal device.
Passenger and vehicle mutual authentication
Aspects of the invention are directed to techniques for mutual authentication between a passenger that has requested a transportation service and a dispatched vehicle for providing the requested transportation service. A user device associated with the passenger verifies the dispatched vehicle using a vehicle access token generated by a transportation service platform and sends a secret key to the dispatched vehicle. The dispatched vehicle uses the secret key to recover passenger biometric information from a passenger secret received from the user device through the transportation service platform, captures passenger biometric information on-site, and compares the recovered passenger biometric information and the passenger biometric information collected on-site to verify the passenger.
SMART VEHICLE
Smart car operations methods are disclosed to access a car includes detecting when a person is alone in a car, adjusting a speech recognizer in the car to focus capturing speech from the person's position in the car; operating the car as requested by the person; when the person exits the car and enters a building, locking the car based on a personal area network (PAN) secured key; and when the person approaches the car, automatically unlocking the car and providing access to the car based on a set of rules. The PAN may be Bluetooth or Zigbee, among others.
Voice response interfacing with multiple smart devices of different types
A computer enabled method of controlling a secondary system with a primary system for taking commands that includes analyzing a historical database to create a probability factor for matching an initial commands to a primary device and a following interaction to generate secondary requests to a second device. The method further includes receiving a user command at the primary device, and determining whether the user command at the primary device matches at least one initial commands having above a threshold value for the probability factor linking the initial command to the primary device to the request the at least one secondary device. The method further includes sending a signal to activate the at least one secondary device to perform the request without requiring an activation command from the user.
VOICE ACTIVATION USING A LASER LISTENER
A voice activation system for a vehicle. The voice activation system for a vehicle which has at least one sound panel capable of providing vibrations of a user's voice from the outside of the vehicle into an inside area of the vehicle. A laser listening device is operably connected to the panel for receiving vibrations from a user's voice. A controller receives a pre-identified command of the user from the laser listener and operates an action in the vehicle in response thereto.
VOICE RESPONSE INTERFACING WITH MULTIPLE SMART DEVICES OF DIFFERENT TYPES
A computer enabled method of controlling a secondary system with a primary system for taking commands that includes analyzing a historical database to create a probability factor for matching an initial commands to a primary device and a following interaction to generate secondary requests to a second device. The method further includes receiving a user command at the primary device, and determining whether the user command at the primary device matches at least one initial commands having above a threshold value for the probability factor linking the initial command to the primary device to the request the at least one secondary device. The method further includes sending a signal to activate the at least one secondary device to perform the request without requiring an activation command from the user.
SYSTEMS AND METHODS FOR SECURING A VEHICLE AND ITS CONTENT AFTER A BAILOUT OPERATION
This disclosure is generally directed to systems and methods for automatically securing a vehicle such as a police truck or an emergency response vehicle and/or the contents of the vehicle after a bailout by the driver. In one exemplary method, a computer is configured to use a sensor system to detect that a driver of a vehicle has bailed out of the vehicle. Based at least in part on detecting that the driver has bailed out of the vehicle, the computer can execute operations such as automatically locking a door of the vehicle, logging out a computer located in the vehicle, locking a first component inside the vehicle such as a gun vault, and/or disabling an operation of another component in the vehicle such as a trunk release or an ignition switch.
Vehicle-carried system and control method for vehicle facilities
The present application provides a vehicle-carried system and a control method for vehicle facilities. The vehicle-carried system includes a characteristic information acquisition unit configured to acquire human body characteristic information; a storage unit configured to store pieces of human body characteristic information and pieces of identity information corresponding to the pieces of human body characteristic information; a matching unit configured to match the human body characteristic information acquired by the characteristic information acquisition unit with the pieces of human body characteristic information stored in the storage unit, and determine identity information corresponding to the human body characteristic information acquired by the characteristic information acquisition unit according to a result of the matching; and a control unit configured to control facilities in a vehicle according to the determined identity information.
MICROPHONE-BASED VEHICLE PASSENGER LOCATOR AND IDENTIFIER
A vehicle passenger locator and identifier system and method is provided herein. Once a vehicle is within a certain vicinity of an intended passenger via conventional mobile device geolocation or geofencing, and/or via a conventional camera-based technology, a plurality of microphones listen for the passenger to utter a predetermined word or phrase. Optionally, this predetermined word or phrase has been uttered to a mobile application used to summon the vehicle such that an accurate voice comparison can be made by the vehicle. Alternatively, the same or a different mobile device can be used to emit an auditory beacon that is detected by the vehicle. Once this word, phrase, or auditory beacon is detected, the passenger can be triangulated, located, identified, and even authorized for pickup. All of this is carried out via an onboard vehicle processor and software and/or a processor and software residing in the cloud.
Method and apparatus for vehicle assisted dynamic multi-factor authentication
A system includes a processor that receives an authentication request, at a vehicle, from an application executing on a device in communication with the vehicle, including a security designation. The receiving vehicle then determines if the vehicle has access to a primary security authentication system corresponding to the security designation. The vehicle also, responsive to the vehicle having access, utilizes the primary authentication system to authenticate a user via the determined primary security authentication system and provide user credentials, obtained based on successful use of the primary authentication system, to the device.