G06Q20/308

Provisioning platform for machine-to-machine devices

Techniques described herein include a platform and process for provisioning user information onto a machine-to-machine device in order to enable the machine-to-machine device to conduct transactions utilizing the user information. In some embodiments, a user device is used to relay information between a machine-to-machine device and a provisioning service provider computer. In some embodiments, a machine-to-machine device is connected to the provisioning service provider computer via a network connection. Upon receiving a request to provision the machine-to-machine device, the service provider computer may identify the device from a device identifier. The service provider computer may generate an access credential or token for the machine-to-machine device. The access credential, token, and/or one or more policies may be provisioned onto the machine-to-machine device.

Transaction-enabled systems and methods for royalty apportionment and stacking

Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.

Driverless Vehicle Movement Processing and Cloud Systems
20180012497 · 2018-01-11 ·

A system for navigating a vehicle automatically from a current location to a destination location without a human operator is provided. The system of the vehicle includes a global positioning system (GPS) for identifying a vehicle location and a communications system for communicating with a server of a cloud system. The server is configured to identify that the vehicle location is near or at a parking location. The communications system is configured to receive mapping data for the parking location from the server, and the mapping data is at least in part used to find a path at the parking location to avoid a collision of the vehicle with at least one physical object when the vehicle is automatically moved at the parking location. The mapping data is processed by electronics of the vehicle so that when the vehicle is automatically moved collision with the at least one physical object is avoided and the electronics of the vehicle is configured to process a combination of sensor data obtained by sensors of the vehicle. The processing of the sensor data uses image data obtained from one or more cameras and light data obtained from one or more optical sensors.

Transaction-enabled systems and methods for resource acquisition for a fleet of machines

The present disclosure describes transaction-enabling systems and methods. A system can include a controller and a fleet of machines, each having at least one of a compute task requirement, a networking task requirement, and an energy consumption task requirement. The controller may include a resource requirement circuit to determine an amount of a resource for each of the machines to service the task requirement for each machine, a forward resource market circuit to access a forward resource market, and a resource distribution circuit to execute an aggregated transaction of the resource on the forward resource market.

DUPLICATED WIRELESS TRANSCEIVERS ASSOCIATED WITH A VEHICLE TO RECEIVE AND SEND SENSITIVE INFORMATION
20180013211 · 2018-01-11 ·

A vehicle is provided that comprises two or more radio frequency (RF) antennas and two or more RF transceivers to communicate wirelessly sensitive information associated with a user of the vehicle (the two or more RF antennas being at different physical locations on an exterior of the vehicle). The vehicle determines which one of the two or more RF antennas is receiving a strongest signal from a common signal source, selects a first RF transceiver associated with the RF antenna with the strongest signal to send the sensitive information associated with the user to the common signal source, and sends the sensitive information associated with the user to the first RF transceiver for transmission to the common signal source.

Access Control System for Electric Vehicle Charging
20230005315 · 2023-01-05 ·

An access control system for electric vehicle charging is provided that includes an access device, a secure reservation interface, a reservation server and a smartphone application installed on the smartphone. The access device includes a short-range wireless communication module connected to a processor having control of an electric vehicle charger. The secure reservation interface receives a reservation request for a reservation at a given destination. The reservation server receives the reservation request for the destination, issues a reservation certificate, and transmits the reservation certificate from the reservation server to a smartphone. The smartphone application has access to a short range wireless communication setting corresponding to the access device. The access device receives the reservation certificate from the smartphone application based on use by the smartphone application of the short-range wireless communication setting. The processor activates the electric vehicle charger based on at least the receipt of the reservation certificate.

DECENTRALIZED TRUST USING BLOCKCHAIN FOR TRACKING AND VALIDATION OF VOICE COMMUNICATIONS

Systems and methods of authenticating voice data using a ledger (blockchain). Examples include a scalable and seamless system that uses blockchain technologies to distribute trust of a conversation, authenticate persons in a conversation, track their characteristics and also to keep records of conversations. In some examples, smart phones, wearables, and Internet-of-Things (IoT) devices can be used to record and track conversations between individuals. These devices can each be used to create entries for the blockchain or a single device could be used to keep track of the entirety of the conversation. Fuzzy hashing may be used to compare newly created entries with previous entries on the ledger.

Electric vehicle (EV) charge unit reservations

A computer implemented method for managing charge availability of a charge unit (CU) to obtain charge for a battery of an electric vehicle (EV) is provided. The CU includes a computer for processing at least part of the method and for communicating with a server over a network. The method includes receiving, by the server, status information from the computer of the CU. The method includes sending to the computer of the CU instructions to make a reservation for the CU. The reservation is for a user account that has requested a desire to charge the battery of the electric vehicle of the user at the CU or another CU. The method includes sending, by the server, a confirmation for the reservation to the user account. The confirmation is viewable via a device having access to the server via the user account. The method includes sending, by the server, a data regarding a time of availability of the CU to the user account for the reservation. The computer of the CU is configured to display a visual indicator regarding the reservation of the CU.

Mobile device based identity verification

Apparatuses, systems, methods, and computer program products are presented for mobile device based identity verification. An apparatus includes a data module configured to receive sensor data from a hardware device associated with a user. An apparatus includes a transaction module configured to receive transaction data associated with a transaction. An apparatus includes a verification module configured to verify an identity of a user making a transaction based on received sensor data. A transaction may be allowed in response to verifying a user's identity.

Split Secret Cryptography Based Security in IoT Implemented Payment Transactions or Credentials

The invention provides methods, systems and computer program products for securely provisioning an internet-of-things (IoT) device for implementing an electronic payment transaction. The invention comprises (i) retrieving a first credential element from the client device, and a second credential element from a router, (ii) generating payment credential data by applying split secret cryptography based reconstruction to the first credential element and the second credential element, (iii) retrieving a unique identifier associated with the IoT device, (iv) generating a combined data element comprising the payment credential data and the unique identifier associated with the loT device, (v) applying split secret cryptography based splitting to the combined data element to generate a first verifiable secure element and a second verifiable secure element, (vi) storing the first verifiable secure element and the retrieved unique identifier within the router, and (vii) storing the second verifiable secure element within the IoT device.