GB2568859A - Authentication system - Google Patents

Authentication system Download PDF

Info

Publication number
GB2568859A
GB2568859A GB1715880.9A GB201715880A GB2568859A GB 2568859 A GB2568859 A GB 2568859A GB 201715880 A GB201715880 A GB 201715880A GB 2568859 A GB2568859 A GB 2568859A
Authority
GB
United Kingdom
Prior art keywords
user
subject
location
identifier
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1715880.9A
Other versions
GB201715880D0 (en
Inventor
William Patrick Hennebery Thomas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1715880.9A priority Critical patent/GB2568859A/en
Publication of GB201715880D0 publication Critical patent/GB201715880D0/en
Publication of GB2568859A publication Critical patent/GB2568859A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method of authenticating a subject, the method comprising: obtaining an identifier identifying the subject to be authenticated; comparing said identifier to a database containing identifiers and authentication information; and obtaining information from said database authenticating said subject (Fig 1). The subject may be a product or service including a vehicle, person or location. The identifier may be a model/license plate of a vehicle, photograph of a person’s face, QR code, bar code, or signal transmitted by NFC or Bluetooth. The method may also notify a third party of user location if user location strays outside an expected location range of said user, said range being related to a journey of said user. The method may also notify a third party if an expected arrival time of the user is exceeded.

Description

Authentication system
This invention relates to an authentication system, apparatus and method, in particular in relation to transportation via taxis.
Presently there is no reliable way to ensure that a product or service is registered with a regulatory body even if certification is presented by this subject, as often certificates can be faked. Therefore it can be difficult for a potential user to confirm that a product or service is registered with a relevant regulatory body. One solution to this would be to only use services which have been ordered by the user in advance, so that the user can check registration details ahead of any action, however there are numerous reasons why a user may not be able to, or desire to plan ahead in this way. For example many people would like to be able to use a service on short notice, such as using a nearby taxi instead of ordering from a taxi service and having to wait. Even in the case of an ordered service, a user may wish to ensure that the subject is properly registered before proceeding with their activity (e.g. entering the taxi). A solution to one or more of the above problems is therefore desired.
According to one aspect of the present invention there is provided a method for authenticating a subject by: obtaining one or more identifiers related to said subject; comparing said identifiers to a database containing identifiers and authentication information, and obtaining authentication information from said server.
Preferably said subject is in the proximity of the user.
Preferably said identifier will comprise one or more features of said subject.
Optionally said subject may comprise a vehicle. This method could, for example, be used to identify a licensed taxi. Alternatively the subject may comprise a person, such as a potential dating partner. The subject may also comprise a location, so that a shop could be authenticated; this could be useful when in an unknown location to ensure that the shop is selling reliable goods.
The identifiers of a vehicle may be the make and model or the license plate. Alternatively a scannable code could be used where, for example, this code could be a Quick Response (QR) code, or a barcode. This code could be, affixed to the subject, so that it
-2could be contained in a vehicle or on the wall of a location. Similarly it could be worn by a person, such as on a name badge.
Preferably an image of the subject could be used, such as a photograph of a person’s face. For a vehicle, this person could be the operator, for a location, this person could be an employee.
Optionally the identifier could be a signal transmitted by the subject, this transmission could use Near Field Communication (NFC) or Bluetooth. This would allow authentication to take place from a distance.
Preferably the database would be accessed using a server, where this server could be accessed using an area network, such as the internet.
In some areas, it may not be possible, or desirable, to connect to a server. Therefore a database contained on a user device, could be used instead. Preferably this database would be encrypted to prevent sensitive information being accessed.
The authentication information could be a notification that the subject is registered with a registration authority, for a vehicle this may be a taxi licensing agency, for a location it may be a registration with a business bureau.
Preferably further authenticating information would also be received. Information authenticating a vehicle could comprise a license plate number. Other information could authenticate an operator, such as a driver or shopkeeper. This could comprise a name, and/or a photograph.
In certain situations, likely those where the authentication information is not considered to be wholly convincing, it will be desirable to share a location with one or more third parties through a notification. Preferably it would be possible for numerous connected users to share their location using the same notification means, for example a group of users may wish to see each member of the group’s location on as a single map.
-3The third parties with which the location is shared could be selected by the user, such as friends and family. Alternatively it may be desired to have a previously vetted person as a third party, as they may be certain to be monitoring a user.
Optionally this third party would be notified automatically when the user performed a certain action. This action could be transmitting an identifier. If the user is taking a vehicle, it may be desirable to share their location for the duration of a journey.
Additionally, it may be desirable for a user to share their location automatically upon entering or leaving a selected area. For example a user may wish to inform the people that they live with when they have left their home and when they have returned.
Furthermore, it may be desirable to share a location at a predefined time, for example to ensure that a child had returned home by an expected time.
The user may choose to share their location, or the location sharing request could come from a third party, such as a parent who wanted to know the whereabouts of their child, ora friend who wanted to ensure the user had arrived at their home.
Preferably, this third party could acknowledge that they have received the location of the user.
When a location is shared, an expected location could also be determined. This could be based upon journey information, which could be generated by an expected destination being given.
Preferably a third party would be informed if the user’s location was outside of an expected location range, for example if a vehicle was taking the user the wrong way.
Optionally, an expected arrival time could also be determined. A third party could then be notified if the arrival time were exceeded, for example if a vehicle taking a user home had not arrived by the expected time.
According to a further aspect of the present invention there is provided a method for alerting one or more users regarding a user’s location by: determining the location of a
-4user, determining an expected location of the user, based upon the determined location and the expected location, determining a deviation from the expected location, and alerting one or more third parties in dependence on this determined deviation.
Preferably the expected location would be determined in dependence on a user’s destination and/or a predicted route, where this route could consist of a number of possible routes, so that a vehicle may be able to take one of a number of routes to complete a journey.
This destination could be selected either by the user or a third party, so that a parent could ensure that their child is going to a location chosen by the parent.
This location could be a recurring location, such as a school or a home, so that a parent could ensure each day that their parent had arrived.
In addition to any previous feature, it may be desirable to enable the user to transmit a signal to a third party upon performing an action, such as clicking a screen three times, performing a certain movement, or speaking a certain word and/or phrase. This may be used in situations where the user may feel uncomfortable or threatened.
The third party may be selected before the action is performed, so that the method can be performed quickly.
Optionally a signal could also be sent if the user does not then perform a second identifying action within a set time. This time could be chosen by the user, or based upon an expected journey time.
Preferably the user could perform a second identifying action to send another signal. The signal could alert the police, so that the feature may be used to first send notice of an uncomfortable situation and the police can then be alerted if the situation escalates.
Any of these signals may contain information about the location of the user.
The third parties may be those aforementioned, for example user selected third parties or a previously vetted person.
-5Any information, for example a user’s location or a notification, could be sent when the user interacts with a certain application on a user device, this could include a game, which may encourage the application to be regularly opened.
The subject may be offering a service which required payment, the user may be able to pay for such a service using means stored upon a server. This means could, for example, be bank account information, an online payments system, prepaid credit, credit from the operator of the server, ora means provided by a third party.
According to a further aspect of the present invention is provided a method of authenticating a subject by: receiving an identifier identifying the subject to be authenticated, comparing the received identifier with a database of identifiers and authentication information, transmitting said authentication information to a user.
This authentication information may accessed by accessing an external database.
Preferably, if the identifiers do not result in a unique subject being identified, a prompt may be transmitted which requests further information.
Optionally accessing the authentication information may involve a further security step, as the database may contain sensitive information.
According to a further aspect of the present invention is provided an apparatus for authenticating a subject comprising: means for obtaining an identifier identifying the subject to be authenticated, means for comparing said identifier to a database containing identifiers and authentication information, and means for obtaining information from said database authenticating said subject.
According to further aspect of the present invention is provided an apparatus for authenticating a subject comprising: means for receiving an identifier identifying the subject to be authenticated, means for comparing said identifier to a database containing identifiers and authentication information, and means for transmitting information authenticating said subject.
-6The invention extends to any novel aspects or features described and/or illustrated herein. Further features of the invention are characterised by the other independent and dependent claims.
Any feature in one aspect of the invention may be applied to other aspects of the invention, in any appropriate combination. In particular, method aspects may be applied to apparatus aspects, and vice versa.
Furthermore, features implemented in hardware may be implemented in software, and vice versa. Any reference to software and hardware features herein should be construed accordingly.
Any apparatus feature as described herein may also be provided as a method feature, and vice versa. As used herein, means plus function features may be expressed alternatively in terms of their corresponding structure, such as a suitably programmed processor and associated memory.
It should also be appreciated that particular combinations of the various features described and defined in any aspects of the invention can be implemented and/or supplied and/or used independently.
The invention also provides a computer program and a computer program product comprising software code adapted, when executed on a data processing apparatus, to perform any of the methods described herein, including any or all of their component steps.
The invention also provides a computer program and a computer program product comprising software code which, when executed on a data processing apparatus, comprises any of the apparatus features described herein.
The invention also provides a computer program and a computer program product having an operating system which supports a computer program for carrying out any of the methods described herein and/or for embodying any of the apparatus features described herein.
-7The invention also provides a computer readable medium having stored thereon the computer program as aforesaid.
The invention also provides a signal carrying the computer program as aforesaid, and a method of transmitting such a signal.
The invention extends to methods and/or apparatus substantially as herein described with reference to the accompanying drawings.
The invention will now be described by way of example, with references to the accompanying drawings in which:
Figure 1 is a flowchart for an exemplary method of authenticating a vehicle;
Figure 2 is a diagram of an apparatus adapted to implement the method shown in Figure 1;
Figure 3a shows a screen shot of an app indicating that a vehicle is a registered vehicle; Figure 3b shows a screen shot of an app indicating that a vehicle is not registered;
Figure 4 is a flowchart demonstrating an exemplary method of sharing location with a third party;
Figure 5 shows a screen shot of an app enabling location sharing;
Figure 6 shows a screen shot of an app showing a user’s location;
Figure 7 is a flowchart showing an exemplary third party notification method;
Figure 8 demonstrates an exemplary method of activating the third party notification; and Figure 9 is a flowchart for an exemplary method of paying for a service, in this case a vehicle.
As used herein, unless otherwise specified, the term ‘service’ may refer to any object or agency that may provide the user with a desired subject - for example a service may refer to an agency which directly provides a subject, such as a vehicle rental agency, through which the user could rent a vehicle. In some circumstances the operator of a vehicle may be considered a rental agency, so that the subject and service may be a single entity. Alternatively a service may refer to a connecting agency, such as a dating service, whereby the user could find a potential partner who may not be known to the service. The authentication may then refer to the users of such a service, so that such a potential partner could be authenticated upon meeting. Alternatively a service may refer to a physical location, such as a shop, where the subject may also be this shop, for
-8example a user may wish to authenticate a shop to confirm that this shop is selling reliable products.
As used herein, unless otherwise specified, the term ‘subject’ may refer to a product or service which could be registered, regulated, or vetted. A subject may refer to a vehicle, which could be registered with an appropriate regulatory agency. Alternatively a subject may be a person, who could have been vetted in some form, for example to ensure a lack of criminal convictions, or identify a connection to an event or service.
As used herein, unless otherwise specified, the term ‘regulated’ may refer to a procedure performed by an official body, for example a regulated vehicle may refer to a vehicle registered with a local authority. Alternatively, an unofficial body may provide a regulation, for example a regulated product or service may refer to a product or service reviewed by a third party (such as previous users of the product or service).
As used herein, unless otherwise specified, the term ‘vehicle’ may refer to either a vehicle or combination of vehicle and operator - for example so that where the terms ‘registered’ or ‘registration’ are used, this may refer to either a registration granted to vehicle, or a registration granted to an operator to use a vehicle, or both. Similarly where the terms ‘authenticated’ or ‘authentication’ are used, this authentication may refer to either the vehicle, the operator of the vehicle, or the combination of vehicle and operator.
As used herein, unless otherwise specified, the term Operator’ may refer to the controller or provider of a vehicle. This may refer to a person driving the vehicle or to the processor of a self-driving vehicle. In the case of a self-driving vehicle, the operator could be: the vehicle itself; a controller within the car, for example a controller operating as a safety override; or a separate controller which could be either a remote processor or a remote person acting as a controller. Similarly, in the case of a remote controlled car, the controller may be a person or processor at a remote site. Furthermore, operator may refer to a plurality of persons and/or computers, for example the owner of a vehicle and the driver of a vehicle may be considered jointly as operators of said vehicle.
As used herein, unless otherwise specified, the term ‘user’ may refer either to a person, an apparatus, ora combination of person and apparatus using the described method.
As used herein, unless otherwise specified, the term ‘authentication’ may refer to the receipt, or lack of receipt, of authenticating information, whether positive or negative. As
-9such, receiving information stating that a subject is registered may be considered a form of authentication, as may receiving information stating that a subject is not registered. Additionally receiving information indicating that no information is available could be considered a form of authentication.
As used herein, unless otherwise specified, the term ‘identifier’ refers to a feature of a subject to be authenticated. This feature could be on, within, or otherwise associated with the subject. An identifier could be unique, such as a vehicle license plate or a shop postcode, but is not necessarily unique, for example the colour of the vehicle could be used as an identifier (preferably in combination with other identifiers) even though many vehicles may share the same colour.
As used herein, unless otherwise specified, the term ‘database’, refers to a store of information. A database could be physical or virtual, a database could be accessed through physical means, via a network, or through offline means on a user device. A database may be considered as a combination of physical and virtual, such as a hard drive.
As used herein, unless otherwise specified, the term ‘location’ may refer to either a location or combination of a location and one or more people within that location - for example a location could refer to a shop, in which case a building may be the subject of authentication. Alternatively a person within that shop, such as an employee or an owner, could be the subject of authentication. In this situation either an identifier of the location, such as a postcode, or an identifier of the people working at the location could be used as the identifier.
In general, a method of authenticating a subject is provided by way of a user obtaining an identifier associated with this subject, for example a vehicle they intend to travel in. The user then compares this identifier to a database containing identifiers and authentication information, and obtains information informing the user whether or not the vehicle has been registered with an appropriate authority, or is otherwise authenticated, for example through positive reviews.
Figure 1 illustrates an example a method of identifying and authenticating a subject, here the subject is a vehicle.
- 10The user identifies one or more distinguishing characteristics (identifiers) of the subject at step 102. In one example, the subject is a vehicle, and the identifier comprises a Quick Response (QR) code or barcode affixed to the vehicle. Such an identifier is easily scanned and transmitted by way of an app on a mobile device 180. Alternatively, the identifier may include details relating to the vehicle itself, such as the make and model, colour, and/or the license plate. A feature visible from a distance may be preferable if the user is separated from the vehicle, this could occur if the user would have to cross the road to reach the vehicle, or if the vehicle were stopped a distance from a safe location where a user wished to remain until the vehicle was authenticated.
Alternatively the vehicle may transmit an identifier which is received by the user, for example using Near Field Communication (NFC) or Bluetooth. This may be necessary where the lighting is not sufficient for the user to identify otherwise visible features. Such a method may also mean authentication can occur from a greater distance and/or passively without direct user action.
The identifier is transmitted to a server 104, which could access a database containing authentication information. Transmission to such a server could occur via an area network such as the internet. As the user may not be able to access the internet, there may be an option to use an alternative, such as a messaging server. This could be a multimedia messaging service, which could be used to send a picture of the vehicle, or a simple messaging service, where the number of the license plate could be sent.
Alternatively or in addition, a downloaded database stored on the user device 180 may be used. This could be advantageous as it would enable the method to be used in situations where the user cannot, or does not want to, use a network. However, this database would need to be obtained prior to use of the method, and may not be up to date at the time of use. Therefore it could also be advantage to allow a messaging service to be used.
If a downloaded database is used, it would preferably be periodically updated so as to reduce the risk of out of date data being provided to a user. The updating could be initiated by the user, or it could update automatically (i.e. ‘pushed’) whenever the user’s device connects to a database containing more recent information. In order to reduce data charges, database updates may be limited to when a WiFi connection is available. Similarly, only a portion of the data may be downloaded depending on the connection
- 11 type - for example text may be downloaded using mobile data, while images may require a WiFi connection.
The identifier(s) are then compared to this database 106 which contains information about registered vehicles.
The database may be populated through a registration process initiated by the service providers, for example a taxi operator may submit their details as part of the process. Alternatively or in addition, the registration process could take place without any input from the providers - for example a background check may be undertaken by a third party and entered on the database. Alternatively or in addition, a third party, such as a review site, may enter details about a service provider without the input of that service provider.
The registration process could be Open’, where anyone can enter details, or ‘closed1, where an invite is required. A closed system would reduce the risk of unwanted / fraudulent entries on the database, but would require significantly more oversight than an open system. In either case, a cross-check to a regulatory database such as a local authority may be desired.
Registration could require providing information such as a certification, or a background check. Examples of data which may be required are: name, age, address, car information, driving license, details of accidents or points on a license, the provider of the service, e.g. a taxi company, details of insurance, a company certification, images of either the operator of the service, e.g. an image of a vehicle.
It may be possible to enter this data by scanning and uploading the relevant documents, taking photographs of the relevant documents, or using a third party service which may hold the data. This may be beneficial if this third party had already verified the data, for example a vetting service may be asked to provide data, this could provide assurance that the data had not been falsified.
Any of the above details could be used as an identifier - for example, the user may take a photograph of the taxi driver (or of the registration document showing a photograph of the driver) and this is compared to photographs of registered taxi drivers.
- 12The database compares said identifier(s) to the database entries 106, determines whether the vehicle is registered 108, and then returns this information to the user 110. In the case of accessing the database via a server, the method of receiving the identifier(s) may be related to the sending method. The determination of whether the vehicle is registered could then take place solely on the server, by searching a database.
Further information may be included alongside the registration information 130 so as to provide further reassurance to the user that the vehicle is indeed registered with an appropriate authority. This further information may include details relating to the vehicle or the operator: such as the license plate number, make, model or colour of the vehicle, the name of the operator, and/or an image of the operator. This further information would make it more difficult for an operator to fake being registered: if the model of the vehicle did not match it may suggest that the QR code has been stolen; if the operator information did not match, it may suggest that the vehicle has been stolen.
The information is received by the user 112 and then displayed to the user 114, allowing them to make an informed decision as to whether they should enter the vehicle.
A record of the shared information may be kept alongside data related to the service being used, so that at a later date the details of the request could be accessed. This service data could contain information about the time and location of the user identifying a subject or using a service. This may be useful for either a user or an operator of a service to ascertain whether an event has occurred. For example, if a user has left an item in a vehicle, they may wish to contact the operator of that vehicle. Alternatively if the user is unsatisfied with a service, they may wish to contact the operator of the service, in the case of a taxi this could be the service owner, and not the driver. Additionally the operator of the service could wish to contact the user, or the user, the operator, or a third party may wish to access details about the service to determine whether an event occurred. An example of this would be if a crime had occurred, the user may wish to provide their whereabouts.
The method of obtaining information, such as an identifier or authentication information, may limit the information that can be obtained; for example it may not be possible to send an image of the operator using a simple messaging service. Optionally, a downloaded database may not contain each type of authentication information; it may be desirable to only store text entries in a downloaded database to limit the size of such a database. In this case, only text entries would be obtainable.
- 13The authentication information will then be presented to the user in a relevant format, so that information about a vehicle may be accompanied by an image of that (or a similar) vehicle, and information about the operator may be accompanied by an image of the operator. Preferably the data would be displayed, for example using the screen of a mobile phone. Other presentations methods could be used such as an audible method using a phone’s loudspeaker, or a vibration signal. This could be preferable if the user either cannot look at their phone, or the user does not feel safe displaying their phone.
Figure 2 illustrates an exemplary apparatus used to implement the method shown in Figure 1, again where the subject is a vehicle.
The vehicle 292 presents at least one identifier which could be used by the user 102, including external identifiers, such as the license plate and the model 202, 204, scannable identifiers, such as the QR code 206, and transmitted identifiers, such as Near Field Communication (NFC) 208.
Information about these identifiers is captured by one of the identifier input means 294, which would be operated using a user interface 210, the capture method would depend upon the identifier used, for example, a QR code 206 would be scanned using the camera 216. Certain features, such as the license plate number, could be captured by the user typing or writing, a license plate number could be entered directly into a messaging system 226.
The processor 236 can then search through a local database stored in memory 232 to obtain authentication information 110.
Alternatively information could be accessed via a networked server. In this case, the processor uses a transceiver 296 to transmit the identifier(s) to a server 190, preferably this would use a network adapter 222 to transmit the identifier(s).
Alternatively a messaging service may be used, this may require a further adapter, where a service which could connect to the network 242 may be used to send the information contained within the message. The message may be sent through an antenna 224, there may be different antennas or different sending methods depending on the sending method being used.
- 14The data may be transmitted to a server 104, 190 using a network 242, this data is received by the server, before the server compares the received identifier(s) to a database 264 containing identifiers and authentication information in order to ascertain whether the vehicle is registered 108. This database 246 could be an onsite or offsite database in relation to the server 190, and could be a physical or a virtual database. This database could be operated through a network, so that information is automatically returned.
Once the vehicle has been checked, further information about the vehicle could be obtained 130, from an external database 246. The registration information, along with any additional information is then transmitted to the user 110 through any of the means which could be used to send the information. Preferably this transmission could use the network 242 and be received by the user 112 using a transceiver 296.
If a local database is used, the database could be contained inside the user operated apparatus 180, so that a network would not be needed to access the authentication information and no transmission to a server would be required. Alternatively the database could be contained on an external media, such as an SD card, that would connect to the user operated apparatus 180. A local database would allow authentication information to be accessed in regions where the user could not access a network and could also be used to obtain authentication information more quickly.
Optionally, a local database would require encryption or another securing feature to ensure that a user could not access sensitive information, for example it may be necessary to protect personal information about the drivers, such as their names and the vehicles which they operate until required by the user.
The processor obtains information from either the transceiver 296 or the local memory 232 and presents the data to the user 114 using presentation means 298. The presentation means may comprise a display 252. Other presentation means could be used, such as a speaker 254 or a vibration means 256.
Preferably, a smartphone would be used as the user-operated apparatus 180. An application (‘app’) could then be used to implement this method. A smartphone camera could be used to identify the identifier(s) 102. A QR code scanner or NFC receiving method could be included in the application, or other applications could be used to obtain
- 15the identifier(s). The data could then be transmitted to the server 104 using an inbuilt transceiver 296. Authentication information could be received using this transceiver 112, before being displayed on a screen 114 as part of the application. Optionally the smartphone could vibrate, or play sounds, to present the authentication information 114.
The authentication information database 264 (or a portion of the database) could be downloaded, so that it could be accessed offline (e.g. ‘cached’). This would enable the user to authenticate vehicles in areas without a network connection. It could also be preferable if the user had a limited amount of data, or had turned off a network adapter to conserve battery.
Optionally the downloaded authentication information could be limited in order to minimise the size of the downloaded data. Downloaded data could contain only registration information, and not further authentication information such as images of drivers, or may be limited to a particular region or area.
Figure 3 (a) shows a smartphone ‘app’ confirming that a vehicle is found to be registered.
Figure 3 (b) shows a smartphone ‘app’ indicating that a vehicle’s registration has not been found and showing a warning message.
In certain circumstances the user may want to share their location with one or more third parties, such as chosen friends or family members. Examples of uses are: as a safety precaution, a means of giving a time estimate for arrival somewhere, as a means for setting a meeting point. Another use would be if the user chose to enter an unregistered taxi, they may wish to alert a third party and share their location. This suggestion appears in Figure 3 (b).
This location tracking system may also be useful for other situations where the user may wish to be tracked, either for convenience or safety, for example: festivals; when meeting for a date; stag or hen parties; or when on holiday (particularly if undertaking an activity such as skiing where it is easy to become separated from a group).
Figure 4 illustrates such a location sharing feature. Location sharing may be initiated by the user pressing a specific button to share the location, a third party requesting the
- 16location, or it could occur automatically once a subject is identified (e.g. when a user attempts to authenticate a vehicle). The user’s location is then sent to third parties.
The third parties may need to be previously authorised by the user, in which case this authorisation could occur at the time of sending, or a predetermined list could be used.
The third party could be chosen using any form of contact information, such as an email address or phone number. Another existing system may be used alongside this method, for example a social media service, such as Facebook™, or a messaging service, such as WhatsApp™. When using such a system, there may be numerous ways to select a third part, such as selecting all contact, selecting a user chosen subset, or selecting from a group. This group could be a pre-existing group or it could be created as a step in the method described here.
If an existing system, such as a social media service, is used, other aspects of this method could be integrated, so that the location sharing or notification systems may be integrated with this service. Optionally, location could be shared within a group, in this way numerous users could share their location and/or notifications in the same space. This could be desirable for group occasions, where each member of the group could quickly check on the expected arrival times of other members as well as ensuring each member arrived home safely. Additionally, this could avoid a situation where numerous people are simultaneously contacting a user, as within a group it may be seen that somebody had already attempted to contact this user.
Preferably, it may be possible for multiple users to share their location upon the same map, so that within a group the location of numerous members of this group could be viewed on the same map.
Alternatively, the third party may be able to access the location without being proactively authorised by the user. This could be useful for situations in which the location of the user may be desired even when that user cannot proactively consent to sharing their location. This could be used for vulnerable people such as the elderly, people suffering from mental illnesses, or children.
Optionally location could be shared continuously so that a third party can automatically access location upon request. Optionally a third party may need to request authorisation
- 17by the user when the third party requests location sharing. These options may be preferable in different situations. Sharing location continuously may drain the battery of a phone, or may be undesirable for privacy reasons. This may lead a user to wish to only share their location at certain times.
In one example, the location sharing feature may be combined with a game so as to encourage children to regularly open and interact with the app - thus enabling regular location updates. Combining these features may also discourage children from deleting the app - or encouraging them to install it in the first place.
An automatic share, such as upon transmitting an identifier, could be desirable for a user who may forget to share their location, or as a time saving method for a user who regularly wishes to share their location upon entering a possibly registered vehicle or upon arriving home. Additionally, an automatic share may be triggered by an unusual or potentially concerning event. This could be a user leaving an area unexpectedly, such as a user leaving an area earlier than expected, a user leaving their house at an unusual time, or a pupil exiting the school before the end of a school day.
In some embodiments a destination being entered 406 may trigger an expected route being calculated 408. If an unexpected route is taken 412, the user and/or a third party could be notified 414. This could be a useful feature that would alert the user and/or third party that the user’s location is different to what is expected. This could be an indicator of a dangerous situation, for example if a taxi is heading away from the destination. There could be a number of expected routes, as there may be numerous reasonable ways to reach a desired destination. There may be included an option for a user to select a desired route at any time before, or during, the journey. This selection may be made from a list of suggested routes.
Alternatively this may be used for an event, such as a stag party, where there is a preplanned route and the location alert would prevent the user from accidentally straying from the route. Another desirable situation would be for a dependent, such as a child, where the parent/guardian may wish to be notified if the dependent exhibits unexpected behaviour, such as not going towards their home after leaving school, or leaving school during the middle of the day.
- 18This expected location may be calculated taking into account recent events, for example the local traffic or any roadworks may be accounted for when considering an expected route.
This destination may be entered by the user, or by a third party, and may be entered at the time of the journey or beforehand. In the case of a taxi, the user may enter the destination when they enter, or call, the taxi. Optionally this method could be combined with an existing taxi service, such as Uber™, where the destination is entered when a taxi is called.
Alternatively the destination could be entered by a third party, such as a parent. This could be used to ensure that a dependent is not going to an undesirable location. Optionally, the destination could be entered in advance of the journey, and could be a recurring destination. This may be used for expected or regular events, for example it may be expected that every day a child leaves school and goes home, so this could be set as a recurring destination.
Optionally, an expected arrival time could be calculated 408. If the vehicle takes longer than expected to arrive 422, the user and/or a third party could be notified 424. This could serve as a reminder for the user to check their location and update the third party as to the progress of the user. Alternatively it could act as a reminder to the third party to check that the user is safe and on their way.
Similarly, a third party could be notified upon arrival of the user, as the friends or family of the user may wish to know that they have arrived safely. The notifications sent may differ depending on the situation, so that a user entering a taxi may trigger the sending of one type of notification, and upon exiting a different “arrived safely” notification may be sent. Similarly, a user not arriving by an expected time may trigger a “user not arrived” notification, which may use another means of notification, such as an alarm, to notify the third party.
Figure 5 illustrates an exemplary method of the user deciding whether to share their location and which third parties are allowed to see said location.
Figure 6 illustrates an exemplary method of displaying this location to third parties.
- 19In some situations, for example if the user enters an unregistered taxi, or if the operator is acting unusually, the user may wish to send a notification to a third party. This notification could be a message, a location, or some other form of information which may clarify the reason for the user sending the notification. Optionally this notification method could be used to request the sharing of a location 402.
Figure 7 illustrates the use of such a third party notification system.
When the user performs an identifying action 702, a third party is notified 704. This would likely be used when the user is in a potentially dangerous situation. This third party could either be preselected or selected at the time of notification. Preselection would increase the speed at which the notification could be sent.
The third party notified may be dependent upon either a setting, or the action itself, for example one mode may act as a panic button for a potentially dangerous situation, while another may act as a lost button, which would be especially useful for children. This may result in different parties being notified, for example a lost child may wish to alert authorities with their location, while an uncomfortable adult may wish to alert a friend.
The emergency identifying action 702 in one example comprises a user pressing a button three times in quick succession. Such an action is unlikely to occur by accident (for example, when a smartphone is in the user’s pocket) but can be performed surreptitiously without raising suspicion as it can be performed without the user having to look at their device.
Optionally the identifying action could comprise a movement of the user operated apparatus 180, or a word or phrase spoken by the user. This would be advantageous in situations where the user could not readily use their hands. Such a method could also be used to disguise the identifying action - in particular an identifying word could be used in conversation.
In some embodiments there could be a time limit by which a second identifying action must be performed 722, 724, or a third party can be notified 730. This third party could be the same third party that was initially notified, or a different third party, such as the police. This would act to notify that third party if the user were separated from their device and
-20thus unable to perform this identifying action. In some embodiments this time limit could be extended.
In some embodiments there could be an emergency identifying action 712 which the user could perform to immediately notify a third party 730, this may be useful if the user feels in immediate danger.
Figure 8 illustrates an exemplary method for sending a location to a third party. The requirement to press a button 3 times prevents a notification being sent accidentally and thereby unnecessarily concerning those receiving notifications.
In certain situations it may be desirable to be able to pay for a service indirectly, whereby the operator of said service is paid using information held on a server. Such a method would be particularly useful if the user did not possess means of paying for a service, such as the hire of a vehicle. It may also be used to reduce the time taken to access a service or to simplify the accessing process, for example it may be quicker and easier to pay for a hired vehicle using such an indirect method, than using payment means held by the user.
Figure 9 illustrates the use of a payment method whereby, when hiring a vehicle, the user may optionally pay the operator of said vehicle directly or may pay using information on a server.
In order to pay indirectly, the vehicle would need to be registered, if this were not the case there would be no way to identify the vehicle in order to pay the operator. If the vehicle is registered 902 there would be a choice where the user may choose to either pay directly or to pay indirectly using payment means stored upon the server 930.
If the user is paying indirectly, information about the means for this payment would preferably be registered on the server. In order to accept funds indirectly from users, the vehicle may need to have registered a payment receiving means 906.
The amount owed to the operator could be stored on a server until the operator has registered payment details. The operator could choose when to withdraw his money from this server.
-21 The user would also need to have added payment means 930 to the server beforehand 908, such payment means could comprise: a link to a bank account or bank card 932, a link to a bank card 934, or a one-time payment to the server owner 936.
Alternatively the user may be able to pay using credit from the server 940, whereby the amount owed by the user would be stored upon the server, or a third party (such as a third party who receives notifications) could pay remotely 942. The fare could then be paid to the operator immediately using funds from the server controller, or paid once the user has added payment means to the server.
In the situation where payment will not be immediate, the driver may be informed 950 and may then have the option to accept the user, reject the user, or demand direct payment 910.
Depending upon the payment means stored by each party, upon accepting the user 910 the driver may be immediately paid 912, or the amount owed to the driver may be stored upon the server 914. As described above, the server could contain payment and amount owed information on the server itself, or it may use one or more external service(s) 246 to store this information, for example a remote database may be used. This could be desirable in order to store sensitive payment information more securely.
In order to efficiently use the method described, a service map may be provided to the user showing (for example) a map of nearby taxis. Such a map could be presented on a mobile device or a desktop and could be accessed by the user or a third party. This map could be provided by a third party, such as a taxi ordering service.
Various other modifications will be apparent to those skilled in the art; for example the description has suggested the use of a smartphone application to implement the method. Alternatively a computer, tablet, smartwatch, or any other technology capable of capturing an identifier and presenting authentication information could be used.
In another alternative, the description above refers to a user proactively transmitting an identifier (for example by pressing a ‘send’ button). However, the apparatus may transmit the identifier without further user intervention following the user inputting the identifier.
-22While the detailed description primarily describes embodiment relating to registration of a single vehicle used by a single operator, it will be understood that this registration could be valid for a plurality of vehicles to be used by a single operator. Alternatively a registration could be valid for a single vehicle to be used by a plurality of operators, or a plurality of vehicles to be used by a plurality of operators.
While the detailed description primarily describes embodiments where a user is informed in a binary manner if a particular vehicle is, or is not authenticated, it will be appreciated that a more probabilistic method may be employed. For example, if the user only submits identifiers relating to the make, model and colour of the vehicle - the system may respond informing the user that there are certain registered taxis that fit that description, and prompt the user for further identifying information such as the driver’s name, or the license plate number so as to provide more certainty. In such way, authenticating a vehicle may not be a binary process - receiving the model of a vehicle may be considered a form of authentication, but not a guarantee that a certain vehicle is registered.
While the detailed description primarily describes embodiments wherein the subject refers to a vehicle, it will be appreciated that similar identification and authentication could take place where the subject was any other local feature with identifying features, such as a location, or a person. In the former case an address, a postcode, or an identifier identifying a person working at the location could be used as an identifier. In the latter case, a name, or physical characteristics such as height and eye colour, could be used as an identifier. This method could then be used for a range of services and subjects, for example physical services, such as shops, or virtual services, such as dating websites, where the subject may be another user of such a service. One exemplary use may be a dating service at a physical location, where an identifier could be used to authenticate other participants, as well as giving information about them, for example a common interest, or a compatibility score.
It will be understood that the present invention has been described above purely by way of example, and modifications of detail can be made within the scope of the invention.
Reference numerals appearing in the claims are by way of illustration only and shall have no limiting effect on the scope of the claims.

Claims (25)

Claims
1. A method of authenticating a subject, the method comprising:
obtaining an identifier identifying the subject to be authenticated;
comparing said identifier to a database containing identifiers and authentication information; and obtaining information from said database authenticating said subject.
2. A method according to Claim 1 wherein said identifier comprises one or more features of the subject.
3. A method according to any preceding claim wherein said subject is in the proximity of a user.
4. A method according to any preceding claim wherein said subject comprises a vehicle.
5. A method according to Claim 4 wherein said one or more features comprises a model of a vehicle.
6. A method according to Claim 4 wherein said one or more features comprises a license plate of a vehicle.
7. A method according to Claims 1 or 2 wherein said subject comprises a person.
8. A method according to Claims 1 or 2 wherein said subject comprises a location.
9. A method according to any preceding claim wherein said one or more features comprises a photograph of a person’s face.
10. A method according to any preceding claim wherein obtaining an identifier comprises scanning a code affixed to the subject.
11. A method according to Claim 10 wherein said code comprises a Quick Response (QR) code.
12. A method according to Claim 10 wherein said code comprises a barcode.
13. A method according to any of Claims 1 to 9 wherein obtaining an identifier comprises receiving a signal being transmitted by said subject.
14. A method according to Claim 13 wherein said signal is transmitted using Near Field Communication (NFC).
15. A method according to Claim 13 wherein said signal is transmitted using Bluetooth.
16. A method according to any preceding claim wherein said database is accessed by transmitting said identifier to a server.
17. A method according to any Claim 16 wherein said identifier is transmitted using an area network.
18. A method according to Claim 17 wherein said area network is the Internet.
19. A method according to any of Claim 16 wherein the identifier is transmitted using a messaging system.
20. A method according to any preceding claim wherein at least a portion of said database is contained on a user device.
21. A method according to Claim 20 wherein said database is encrypted so that the user cannot directly view information.
22. A method according to any preceding claim wherein receiving information authenticating said subject comprises receiving a notification that said subject is registered with a registration authority.
23. A method according to any preceding claim wherein receiving information authenticating said subject comprises receiving a licence plate number.
24. A method according to any preceding claim wherein receiving information authenticating said subject comprises receiving information identifying an operator.
25. An apparatus for authenticating a subject, the apparatus comprising:
means for receiving an identifier identifying the subject to be authenticated;
means for comparing said identifier to a database containing identifiers and authentication information; and means for transmitting information authenticating said subject.
25. A method according to Claim 24 wherein the information identifying the operator comprises an operator’s name.
26. A method according to Claim 24 or 25 wherein the information identifying the operator comprises a photograph.
27. A method according to any preceding claim further comprising notifying one or more third parties of a location of the user.
28. A method according to Claim 27 wherein said one or more third parties comprise one or more previously vetted persons.
29. A method according to any of Claims 27 or 28 wherein said one or more third parties comprise one or more persons selected by the user.
30. A method according to any of Claims 27 to 29 further comprising notifying said one or more third parties once the user transmits said identifier.
31. A method according to any of Claims 27 to 30 wherein said location is shared with said one or more third parties for the duration of a journey.
32. A method according to any of Claims 27 to 31 wherein said location is shared once the user enters or leaves a selected area.
33. A method according to any of Claims 27 to 32 wherein said location is shared at a predefined time.
34. A method according to any of Claims 27 to 31 further comprising sharing said location with said one or more third parties following receiving a request from said one or more third parties.
35. A method according to any of Claims 27 to 34 further comprising receiving acknowledgement of receipt of said location from said one or more third parties.
36. A method according to any of Claims 27 to 35 further comprising determining an expected location range for a user.
37. A method according to Claim 36 wherein said expected location range for a user is based upon information relating to a journey.
38. A method according to Claim 37 wherein said information relating to a journey comprises an expected destination.
39. A method according to any of Claims 36 to 38 further comprising notifying said one or more third parties if the user’s location is outside of said expected location range.
40. A method according to any of Claims 27 to 39 further comprising determining an expected arrival time.
41. A method according to Claim 40 further comprising notifying said one or more third parties if said expected arrival time is exceeded.
42. A method of alerting one or more third parties regarding a user’s location, the method comprising:
determining the location of the user;
determining an expected location of the user;
based on said determined location and expected location, determining a deviation from said expected location; and alerting said one or more third parties in dependence on said determined deviation.
43. A method according to Claim 42 wherein said expected location is determined in dependence on a user’s destination and/or a predicted route.
44. A method according to Claim 43 wherein said destination is selected by a third party.
45. A method according to Claims 43 or 44 wherein said destination is a recurring destination.
46. A method according to any of claims 42 to 45 further comprising the user selecting said third parties prior to performing the identifying action.
47. A method according to any preceding claim wherein upon a user performing an identifying action, a signal is transmitted to said one or more third parties.
48. A method according to Claim 47 wherein said identifying action comprises a user clicking a screen three or more times.
49. A method according to Claim 47 wherein said identifying action comprises a movement of a user device.
50. A method according to Claim 47 wherein said identifying action comprises a user speaking a specific word and/or phrase.
51. A method according to any of Claims 47 to 50 further comprising transmitting a signal to one or more third parties if the user does not perform a second identifying action within a set time.
52. A method according to Claim 51 wherein said set time is based upon an expected journey time.
53. A method according to Claim 51 wherein said set time is chosen by the user.
54. A method according to any of Claims 47 to 53 wherein said signal contains information about the location of said user.
55. A method according to any of Claims 47 to 54 further comprising transmitting a signal to a third party if a subsequent emergency identifying action is performed.
56. A method according to Claim 55 wherein said third party comprises the third party of Claim 47.
57. A method according to Claim 55 wherein said third party comprises the police.
58. A method according to any of Claims 42 to 57 further comprising initiating the method when a user opens or interacts with an application on a user device.
59. A method according to Claim 58 wherein said application comprises a game.
60. A method according to any of the preceding claims wherein the user can pay for the service using a payment means stored on said server.
61. A method according to Claim 60 wherein said payment means is bank account information.
62. A method according to Claim 60 wherein said payment means is an online payments system.
63. A method according to Claim 60 wherein said payment means is prepaid credit.
64. A method according to Claim 60 wherein said payment means is credit from the operator of said server.
65. A method according to Claim 60 wherein said payment means is given by a third party.
66. A method of authenticating a subject, the method comprising: receiving an identifier identifying a subject to be authenticated;
comparing said received identifier with a database containing identifiers and authentication information; and transmitting said authenticating information to a user.
67. A method according to Claim 66, wherein said accessing authentication information includes accessing an external database.
68. A method according to any of Claims 66 to 67 wherein a prompt for further information is transmitted if the identifier could refer to a plurality of subjects.
69. A method according to any of Claims 66 to 68 wherein said accessing authentication information involves a further security step.
70. An apparatus for authenticating a subject, the apparatus comprising: means for obtaining an identifier identifying the subject to be authenticated; means for comparing said identifier to a database containing identifiers and authentication information; and means for obtaining information from said database authenticating said subject.
71. An apparatus for authenticating a subject, the apparatus comprising:
means for receiving an identifier identifying the subject to be authenticated; means for comparing said identifier to a database containing identifiers and authentication information; and means for transmitting information authenticating said subject.
28 09 18
Amendments to the claims are as follows:
Claims
1. A method of authenticating a subject, the method comprising: obtaining an identifier identifying the subject to be authenticated;
comparing said identifier to a database containing identifiers and authentication information; and obtaining information from said database authenticating said subject.
2. A method according to Claim 1 wherein said identifier comprises one or more features of the subject.
3. A method according to any preceding claim wherein said subject is in the proximity of a user.
4. A method according to any preceding claim wherein said subject comprises a vehicle, a model of a vehicle or a license plate of a vehicle.
5. A method according to Claims 1 or 2 wherein said subject comprises a person or a location.
6. A method according to any preceding claim wherein said one or more features comprises a photograph of a person’s face.
7. A method according to any preceding claim wherein obtaining an identifier comprises scanning a code affixed to the subject, such as a Quick Response (QR) code or a barcode.
8. A method according to any of Claims 1 to 7 wherein obtaining an identifier comprises receiving a signal being transmitted by said subject, preferably transmitted using Near Field Communication (NFC) or Bluetooth.
9. A method according to any preceding claim wherein said database is accessed by transmitting said identifier to a server.
10. A method according to any Claim 9 wherein said identifier is transmitted using an area network, such as the Internet or using a messaging system.
28 09 18
11. A method according to any preceding claim wherein at least a portion of said database is contained on a user device, preferably encrypted so that the user cannot directly view information.
12. A method according to any preceding claim wherein receiving information authenticating said subject comprises receiving a notification that said subject is registered with a registration authority.
13. A method according to any preceding claim wherein receiving information authenticating said subject comprises receiving a licence plate number and/or information identifying an operator, such as operator’s name ora photograph.
14. A method according to any preceding claim further comprising notifying one or more third parties of a location of the user, preferably wherein said one or more third parties comprise one or more previously vetted persons, such as ones selected by the user.
15. A method according to Claim 14 further comprising notifying said one or more third parties once the user transmits said identifier.
16. A method according to Claim 14 or 15 wherein said location is shared with said one or more third parties for the duration of a journey and/or once the user enters or leaves a selected area and/or at a predefined time and/or following receiving a request from said one or more third parties.
17. A method according to any of Claims 14 to 16 further comprising receiving acknowledgement of receipt of said location from said one or more third parties.
18. A method according to any of Claims 14 to 17 further comprising determining an expected location range for a user, preferably based upon information relating to a journey, such as an expected destination.
19. A method according to Claim 18 further comprising notifying said one or more third parties if the user’s location is outside of said expected location range.
20. A method according to any of Claims 14 to 19 further comprising determining an expected arrival time, preferably further comprising notifying said one or more third parties if said expected arrival time is exceeded.
28 09 18
21. A method of alerting one or more third parties regarding a user’s location, the method comprising:
determining the location of the user;
determining an expected location of the user;
based on said determined location and expected location, determining a deviation from said expected location; and alerting said one or more third parties in dependence on said determined deviation.
22. A method according to Claim 21 wherein said expected location is determined in dependence on a user’s destination and/or a predicted route.
23. A method of authenticating a subject, the method comprising:
receiving an identifier identifying a subject to be authenticated;
comparing said received identifier with a database containing identifiers and authentication information; and transmitting said authenticating information to a user.
24. An apparatus for authenticating a subject, the apparatus comprising:
means for obtaining an identifier identifying the subject to be authenticated; means for comparing said identifier to a database containing identifiers and authentication information; and means for obtaining information from said database authenticating said subject.
GB1715880.9A 2017-09-29 2017-09-29 Authentication system Withdrawn GB2568859A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1715880.9A GB2568859A (en) 2017-09-29 2017-09-29 Authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1715880.9A GB2568859A (en) 2017-09-29 2017-09-29 Authentication system

Publications (2)

Publication Number Publication Date
GB201715880D0 GB201715880D0 (en) 2017-11-15
GB2568859A true GB2568859A (en) 2019-06-05

Family

ID=60270171

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1715880.9A Withdrawn GB2568859A (en) 2017-09-29 2017-09-29 Authentication system

Country Status (1)

Country Link
GB (1) GB2568859A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11830290B2 (en) 2021-05-07 2023-11-28 Bendix Commercial Vehicle Systems, Llc Systems and methods for driver identification using driver facing camera of event detection and reporting system
WO2024060655A1 (en) * 2022-09-19 2024-03-28 中兴通讯股份有限公司 Bar code information processing method, electronic device, and computer readable medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050047669A (en) * 2003-11-18 2005-05-23 주식회사 에스원 Service system of taxi safety home-coming and supplying method thereof, service system of safety fence and supplying method thereof, service system of safety in building and supplying method thereof
US20070179978A1 (en) * 2005-11-14 2007-08-02 Lee Kin K Systems and methods for anti-counterfeit authentication
US20120203665A1 (en) * 2011-02-09 2012-08-09 American Express Travel Related Services Company, Inc. Systems and methods for facilitating secure transactions
US20120233246A1 (en) * 2010-09-10 2012-09-13 Emilio Guemez Safety system for taxi users combining reputation mechanisms and community notifications
US20140038544A1 (en) * 2008-01-16 2014-02-06 Martin Kelly Jones Interactive Personal Surveillance and Security (IPSS) Systems and Methods
WO2017205856A1 (en) * 2016-05-27 2017-11-30 Authenticate Me LLC Authentication of retailers and distributors

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050047669A (en) * 2003-11-18 2005-05-23 주식회사 에스원 Service system of taxi safety home-coming and supplying method thereof, service system of safety fence and supplying method thereof, service system of safety in building and supplying method thereof
US20070179978A1 (en) * 2005-11-14 2007-08-02 Lee Kin K Systems and methods for anti-counterfeit authentication
US20140038544A1 (en) * 2008-01-16 2014-02-06 Martin Kelly Jones Interactive Personal Surveillance and Security (IPSS) Systems and Methods
US20120233246A1 (en) * 2010-09-10 2012-09-13 Emilio Guemez Safety system for taxi users combining reputation mechanisms and community notifications
US20120203665A1 (en) * 2011-02-09 2012-08-09 American Express Travel Related Services Company, Inc. Systems and methods for facilitating secure transactions
WO2017205856A1 (en) * 2016-05-27 2017-11-30 Authenticate Me LLC Authentication of retailers and distributors

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11830290B2 (en) 2021-05-07 2023-11-28 Bendix Commercial Vehicle Systems, Llc Systems and methods for driver identification using driver facing camera of event detection and reporting system
WO2024060655A1 (en) * 2022-09-19 2024-03-28 中兴通讯股份有限公司 Bar code information processing method, electronic device, and computer readable medium

Also Published As

Publication number Publication date
GB201715880D0 (en) 2017-11-15

Similar Documents

Publication Publication Date Title
ES2910077T3 (en) Transmission of digital identification on board vehicle
US20190172111A1 (en) Identity Authentication And Verification
US20220156870A1 (en) Safety protection system for passengers and drivers of online ride-hailing and taxi services
US9586596B2 (en) Vehicle use and performance restrictions based on detected users
US20120233246A1 (en) Safety system for taxi users combining reputation mechanisms and community notifications
US20130290201A1 (en) Systems and methods for assessing the legitimacy of a transportation provider
US20080214111A1 (en) Lost phone alarm system and method
US20240048520A1 (en) Vehicle identification and device communication through directional wireless signaling
WO2015005948A1 (en) Identity authentication and verification
GB2568859A (en) Authentication system
US20220011999A1 (en) Visual verification of virtual credentials and licenses
EP3559849B1 (en) Mobile credential with online/offline delivery
US20150193779A1 (en) Method and system of monitoring driver information
US20210358233A1 (en) Ride monitoring system
JP2019086904A (en) Image management server and image management method
WO2008109436A1 (en) Lost phone alarm system and method
US10438138B2 (en) Reliable aftermarket event ticket transfer: method and apparatus
US20220253445A1 (en) Method and system to facilitate access to and use of contextual identity information during law enforcement encounters for minimizing confrontational tensions
US20230116941A1 (en) System and a method for authenticating information during a police inquiry
EP4070266A1 (en) Personal security system and method
WO2012160114A1 (en) An application for a portable computing device

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)