WO2023101601A1 - Method and device for authenticating a driver of a vehicle - Google Patents
Method and device for authenticating a driver of a vehicle Download PDFInfo
- Publication number
- WO2023101601A1 WO2023101601A1 PCT/SG2022/050847 SG2022050847W WO2023101601A1 WO 2023101601 A1 WO2023101601 A1 WO 2023101601A1 SG 2022050847 W SG2022050847 W SG 2022050847W WO 2023101601 A1 WO2023101601 A1 WO 2023101601A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- driver
- mobile phone
- selfie
- user
- request
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000004044 response Effects 0.000 claims abstract description 10
- 238000004590 computer program Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 description 16
- 238000007405 data analysis Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000029305 taxis Effects 0.000 description 1
- 230000002747 voluntary effect Effects 0.000 description 1
Classifications
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/117—Identification of persons
- A61B5/1171—Identification of persons based on the shapes or appearances of their bodies or parts thereof
- A61B5/1176—Recognition of faces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- Various aspects of this disclosure relate to methods and devices for authenticating a driver of a vehicle.
- an e-hailing server may maintain a database storing information of a driver, such as whether the driver is white listed or blacklisted for the e-hailing service. This is done by giving each driver an account and storing information in association with the account. However, it may occur that a driver lets the driver’s account be used by another driver, i.e. multiple persons may share the same account.
- Driver account sharing is a common problem in e-hailing and similar transport services (which may also be for food, parcels etc.).
- Driver account sharing here means that a driver has an account with the transport service’s operator to sign up (register) for taking transport tasks but another person drives, i.e. performs the transport tasks. The actual driver is thus not properly authenticated (because the driver uses the account of another driver). This creates security and safety issues. There are a wide variety of reasons why this happens, e.g. the same vehicle is being driven by multiple people, or additional drivers do not intend to go through rigorous background checks, or simply the original driver (i.e. for whom the account was created) is outsourcing the job for monetary gains. Regardless of intent, an alternate driver is a safety risk for the transport service’s operator and it erodes passenger trust in that the transport service’s operator ensures drivers are properly vetted.
- Various embodiments concern a method for authenticating a driver of a vehicle, including sending a request to a mobile phone to provide a selfie of a user of the mobile phone by means of the mobile phone, wherein the mobile phone is registered to receive orders for transport tasks, determining a time the user takes to provide a selfie in response to the request, sending additional requests to the mobile phone to provide selfies by means of the mobile phone if the determined time exceeds a predetermined threshold with a higher frequency than if the determined time does not exceed the predetermined threshold and performing authentication of the user as legitimate driver using selfies provided in response to the additional requests.
- the method includes, if the determined time exceeds the predetermined threshold, triggering the sending of an additional request at each of a set of predetermined events.
- the method includes avoiding triggering sending an additional request by the predetermined events if the determined time does not exceed the predetermined threshold.
- the predetermined events includes the user toggling an availability state for taking transport tasks from not available to available and/or the user having completed a transport task.
- the predetermined threshold is in the range of 5 minutes to 30 minutes (e.g. 15 minutes).
- the mobile phone is registered under a user account to receive orders for transport tasks and the method includes flagging the user account as suspicious if the determined time exceeds the predetermined threshold and sending additional requests to the mobile phone if the account is flagged as suspicious than if the account is not flagged as suspicious.
- the method includes flagging the account as suspicious if a number of passengers which report a different vehicle or a different driver for their rides than expected according to the user’s profile within a first predetermined period exceeds a first further predetermined threshold and/or including flagging the account as suspicious if the frequency with which different mobile phones have been used to register under the user account within a second predetermined period exceeds a second further predetermined threshold.
- the method includes sending the additional requests to the mobile phone with a minimum time buffer period between the sending of the additional requests.
- the time buffer period is in the range of 5 minutes to 30 minutes.
- the method includes sending an additional request after a predetermined request interval if the determined time does not exceed the predetermined threshold.
- an authentication server configured to perform the method of one of the embodiments described above.
- a computer program element including program instructions, which, when executed by one or more processors, cause the one or more processors to perform the method of one of the embodiments described above.
- a computer-readable medium including program instructions, which, when executed by one or more processors, cause the one or more processors to perform the method of one of the embodiments described above.
- FIG. 1 shows a communication arrangement for usage of an e-hailing service including a smartphone and a server.
- FIG. 2 shows an arrangement for taking transport tasks.
- FIG. 3 illustrates results of a data analysis (for an e-hailing service) with regard to patterns how long drivers take to respond to a selfie request.
- FIG. 4 shows a histogram of gap length between two selfie events.
- FIG. 5 shows two examples of data sequences related to selfie authentication.
- FIG. 6 illustrates a process to request selfies depending on a driver being suspicious due to having taken too long to react to an earlier selfie request.
- FIG. 7 shows a flow diagram illustrating a method for authenticating a driver according to an embodiment.
- FIG. 8 shows an authentication server according to an embodiment.
- Embodiments described in the context of one of the devices or methods are analogously valid for the other devices or methods. Similarly, embodiments described in the context of a device are analogously valid for a vehicle or a method, and vice-versa.
- the articles “a”, “an” and “the” as used with regard to a feature or element include a reference to one or more of the features or elements.
- An e-hailing app typically used on a smartphone, allows its user to hail a taxi (or also a private driver) through his or her smartphone for a trip.
- FIG. 1 shows a communication arrangement including a smartphone 100 and a server (computer) 106.
- the smartphone 100 has a screen showing the graphical user interface (GUI) of an e-hailing app that the smartphone’s user has previously installed on his smartphone and has opened (i.e. started) to e-hail a ride (taxi or private driver).
- GUI graphical user interface
- the GUI 101 includes a map 102 of the vicinity of the user’s position (which the app may determine based on a location service, e.g. a GPS-based location service). Further, the GUI 101 includes a box for point of departure 103 (which may be set to the user’s present location obtained from location service) and a box for destination 104 which the user may touch to enter a destination (e.g. opening a list of possible destinations). There may also be a menu (not shown) allowing the user to select various options, e.g. how to pay (cash, credit card, credit balance of the e-hailing service). When the user has selected a destination and made any necessary option selections, he or she may touch a “find car” button 105 to initiate searching of a suitable car.
- a location service e.g. a GPS-based location service
- a box for point of departure 103 which may be set to the user’s present location obtained from location service
- a box for destination 104 which the user may touch to enter
- the e-hailing app communicates with the server 106 of the e-hailing service via a radio connection.
- the server 106 may consult a memory 109 or a data storage 108 having information about the current location of registered vehicles 111, about when they are expected to be free, about traffic jams etc. From this, a processor 110 of the server 106 selects the most suitable vehicle (if available, i.e. if the request can be fulfilled) and provides an estimate of the time when the driver will be there to pick up the user, a price of the ride and how long it will take to get to the destination. The server communicates this back to the smartphone 100 and the smartphone 100 displays this information on the GUI 101. The user may then accept (i.e. book) by touching a corresponding button. If the user accepts, the server 106 informs the selected vehicle 111 (or, equivalently, its driver), i.e. the vehicle the server 106 has allocated for fulfilling the transport request.
- server 106 is described as a single server, its functionality, e.g. for providing an e-hailing service for a whole city including distribution of transport tasks, driver authentication etc., will in practical application typically be provided by an arrangement of multiple server computers (e.g. implementing a cloud service). Accordingly, the functionality described in the following provided by the server 106 may be understood to be provided by an arrangement of servers or server computers.
- the data storage 108 may for example be part of a cloud-based system 107 provided by a cloud storage provider to store and access data which it may use for taking decisions, such as information about the location of passengers and vehicles, their history (earlier bookings and routes taken) etc.
- the server 106 together with the vehicles 111 provides the e-hailing service, i.e. forms a transport system.
- a mobile device usually a mobile phone (smartphone), as illustrated in FIG. 2.
- FIG. 2 shows an arrangement for taking transport tasks.
- a driver 201 of a vehicle 111 has a mobile phone 202 by which the driver 201 signs up (registers) at a server 203 (e.g. corresponding to server 106).
- the driver 201 signs up under an account 204 which the driver 201 has made earlier 204 with the server 203 (by subscription).
- the driver 201 indicates that he or she wants to be provided with orders for transport tasks.
- the server 203 provides transport tasks to the mobile phone 202 that the driver 201 may accept and perform using his or her vehicle.
- the server 203 and the mobile phone 202 may communicate using a mobile communication network.
- the server 203 stores (e.g. in data base 108), an account 204 for each driver.
- a driver 201 signs up with the server 203 to drive a certain vehicle 111.
- accounts may be shared, i.e. an account of a certain driver may be used to sign up for driving a vehicle 111 but another (i.e. alternate or fake) driver actually drives the vehicle. Since, for example, the alternate driver may be a much worse driver or even a criminal, this creates safety and security issues for the transport system.
- the server 203 requests the driver (by a selfie request 205 sent to the driver’s mobile phone 202) to provide a photo of him or herself (i.e. a self-portrait) by means of the mobile phone 202 via which the driver also receives orders for transport tasks.
- the driver 201 is requested to provide a selfie 206 to the server 203.
- the server 203 e.g. operating as transport system controller
- a typical e-hailing service drivers are repeatedly subjected to selfie verification e.g. at least once in every 8-72 hours. While selfie verification allows verifying that the face of the person currently holding the device (to which orders are sent) matches the reference picture of the account used by the device, an account’s owner can hand over the device to another person after taking the selfie (i.e. after responding to the selfie request). A driver knows that it will be another 8-72 hours before he or she is asked for a selfie again.
- Selfie verification may for example be implemented as the following process: a backend service logic (e.g. of server 106) determines whether a driver 201 should be asked for a selfie. If the result is “yes”, the server 203 sends a request 205 to the driver’s device (i.e. smartphone) 202 and the driver is presented with a popup that he or she needs to take a selfie since otherwise, the driver 201 will not be able to take a next job (i.e. transport task). The server 203 compares received selfies with the reference picture in the corresponding account 204 and authenticates the driver’s device 202 if the selfies match the reference pictures.
- a backend service logic e.g. of server 106
- the selfie verification process has the following four 4 states: Selfie_Requested, Selfie_Verified, Selfie_Failed, Selfie_UnknownState (a rarely occurring error state).
- FIG. 3 illustrates results of a data analysis (for an e-hailing service) with regard to patterns how long drivers take to respond to a selfie request.
- driver#2 knows that if he or she proceeds with taking a selfie in response to the selfie request authentication would fail. Therefore, driver#2, when having received the selfie request, drives back to driver#l, acquires the correct selfie from driver#l and continues accepting transport tasks with an authenticated device for 8 hours or longer.
- each execution of the selfie verification process is represented by a “selfie sequence” of the above states.
- FIG. 4 shows a histogram of gap length between two selfie events.
- the pick-up is in this example due to selfie verification being repeated after 8 hours.
- 8 hours selfie verification interval is a good terminating condition for selfie sequences (i.e. selfie sequences are assumed to be 8 hours or shorter).
- sequences are for example bucketed into Fibonacci time segments (observing the power law nature of the curve of FIG. 4). Otherwise sequence processing becomes too complex and expensive for the analysis task at hand.
- two strategies may be applied: last selfie state as the bucket’s overall state, or establishing precedence and setting the precedent state as the bucket’s state. There is not a huge difference between the two and in the following, the latter is used.
- Fibonacci bucket ranges are as follows (given in minutes)
- FIG. 5 shows two examples 501, 502 of data sequences according to the above segmentation into Fibonacci time segments.
- Each driver has an entry (feature value) for each of the above patterns, depending on whether he or she has participated in a selfie verification having that pattern.
- a driver account can exhibit one or more of the above patterns, i.e. each driver has entries for multiple of these patterns (wherein entries may be zero, depending on whether they occurred for the driver).
- a driver may selfie verify himself or herself right away (pattern V ), other cases he or she may wait (short wait: RV ). In other cases the same driver may wait a while (long wait R V ).
- each pair of data point (request— > verification) included for the driver in the data contributes to one of the feature values of the driver.
- Suspicious drivers usually exhibit long wait for verification once on a while.
- the drivers are clustered using these entries (feature values) for the various patterns.
- Each of the 40 columns represent one of the most common sequences (i.e. the above patterns). For example, V sequence is most common, where drivers selfie verify themselves within 15 seconds, then where selfie request is never answered within 8 hours, followed by RV where driver selfie verifies within 30 seconds, and so on. Rows are normalized to represent fraction of total cases for that driver in the data. In this fashion a table with 1,040,173 drivers, 40 columns of their selfie pattern is assembled.
- Clustering shows that drivers who were involved in suspicious activities separate themselves out from regular drivers of good standing.
- Clusters are for example generated by using k-means.
- SSE summed squared error
- Cluster #2 pop: 141,524
- Cluster #3 pop: 57,030
- Cluster#0 contains drivers which behave in a weird manner by not react to selfie request.
- Drivers of Clusters#5, 7 seem to comport themselves correctly but have some overlap with suspicious activity.
- Drivers of Cluster#3 show a suspicious behaviour: their selfie patterns show high variation and include patterns where taking the selfie was delayed for a long time. It includes in fact a driver with major criminal behaviour included in the exemplary data set.
- drivers showing routine behaviour of delaying selfies are targeted for a repeat selfie loop with higher frequency, i.e. are more often requested to provide a selfie. This may for example be deployed in one region and a data analysis as above may be done for comparison.
- a driver is marked as suspicious if based on the time the driver takes to react to a selfie request, i.e. if the time exceeds a predetermined threshold (e.g. above 15 minutes).
- a predetermined threshold e.g. above 15 minutes
- an authentication server e.g. part of server 203 or implemented by server 203 among other functions performs detection of suspicious drivers (and flagging of detected drivers) and, depending on whether a driver is suspicious, triggering the request for a selfie.
- FIG. 6 illustrates a process to request selfies depending on a driver being suspicious due to having taken too long to react to an earlier selfie request.
- the authentication server sends selfie requests 205 to a driver 201 according to a first loop 601 as long as the driver reacts to selfie requests 603 within 15 minutes successfully (i.e. with a selfie that matches the respective reference picture).
- the authentication server requests the driver to provide a selfie according to a certain request interval, e.g. with 8-72 hours length.
- the authentication server sends selfie requests 205 to the driver 201 according to a second loop 602. This means that for one or more selfie requests (e.g. until the driver has provided successful selfies for a certain number of requests) the authentication server sends the request upon events which usually occur much faster than the request interval of the first loop. For example, according to the second loop 602, the authentication server sends a selfie request to the driver
- the authentication server may ensure that drivers flagged as suspicious do not have upcoming transport tasks assigned to them so as not to interfere with task allocation.
- the authentication server may also apply, before requesting a selfie, a time buffer measured from the previous selfie request so as to maximize the probability that the selfie is requested while the driver is sufficiently away from the account owner, if it is a fake driver.
- a driver may also be flagged suspicious (and be treated according to the second loop 602) according to other criteria such as
- FIG. 7 a method is provided as illustrated in FIG. 7.
- FIG. 7 shows a flow diagram 700 illustrating a method for authenticating a driver of a vehicle.
- a request is sent to a mobile phone to provide a selfie of a user of the mobile phone by means of the mobile phone, wherein the mobile phone is registered to receive orders for transport tasks.
- a time the user takes to provide a selfie in response to the request is determined.
- This selfie may be used for a first driver authentication.
- additional requests are sent to the mobile phone to provide selfies by means of the mobile phone if the determined time exceeds a predetermined threshold with a higher frequency than if the determined time does not exceed the predetermined threshold.
- driver authentication is performed, i.e. authentication of the user as legitimate driver is performed using selfies provided in response to the additional requests.
- selfies are requested more often from a user if the user takes too long to respond to a selfie request.
- FIG. 7 allows reducing account sharing substantially (experiments show up to 75%). This is of high importance for an e-hailing service since, in particular, it improves how the service is perceived by its consumer base (i.e. improves trustworthiness), as drivers pretending to be someone else are typically also involved in criminal behaviour. On top of that, passengers may lose confidence if a driver’s face does not match with the picture of a booked driver in an e-hailing app.
- FIG. 7 The method of FIG. 7 is for example carried out by an authentication server as illustrated in FIG. 8.
- FIG. 8 shows an authentication server 800 according to an embodiment.
- the authentication server 800 e.g. implemented by a server computer, includes a communication interface 801 (e.g. configured to receive requests for transport tasks).
- the authentication server 800 further includes a processing unit 802 and a memory 803.
- the memory 803 may be used by the processing unit 802 to store, for example, account data in particular reference pictures and logs of the times users took to respond to selfie requests.
- the authentication server 800 is configured to perform the method of FIG. 7.
- the memory 803 stores program code which makes the authentication server 800 perform the method of FIG. 7.
- a "circuit” may be understood as any kind of a logic implementing entity, which may be hardware, software, firmware, or any combination thereof.
- a "circuit” may be a hard-wired logic circuit or a programmable logic circuit such as a programmable processor, e.g. a microprocessor.
- a "circuit” may also be software being implemented or executed by a processor, e.g. any kind of computer program, e.g. a computer program using a virtual machine code. Any other kind of implementation of the respective functions which are described herein may also be understood as a "circuit" in accordance with an alternative embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Primary Health Care (AREA)
- Human Resources & Organizations (AREA)
- Life Sciences & Earth Sciences (AREA)
- Multimedia (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Human Computer Interaction (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Biomedical Technology (AREA)
- Molecular Biology (AREA)
- Surgery (AREA)
- Animal Behavior & Ethology (AREA)
- Public Health (AREA)
- Veterinary Medicine (AREA)
- Medical Informatics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Heart & Thoracic Surgery (AREA)
- Educational Administration (AREA)
- Pathology (AREA)
- Biophysics (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/711,225 US20250014384A1 (en) | 2021-12-01 | 2022-11-21 | Method and device for authenticating a driver of a vehicle |
CN202280079634.3A CN118369944A (en) | 2021-12-01 | 2022-11-21 | Method and device for authenticating a vehicle driver |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10202113347S | 2021-12-01 | ||
SG10202113347S | 2021-12-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023101601A1 true WO2023101601A1 (en) | 2023-06-08 |
Family
ID=86613208
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2022/050847 WO2023101601A1 (en) | 2021-12-01 | 2022-11-21 | Method and device for authenticating a driver of a vehicle |
Country Status (3)
Country | Link |
---|---|
US (1) | US20250014384A1 (en) |
CN (1) | CN118369944A (en) |
WO (1) | WO2023101601A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016164834A1 (en) * | 2015-04-10 | 2016-10-13 | Uber Technologies, Inc. | Augmenting transport services using driver profiling |
CN110751530A (en) * | 2018-08-20 | 2020-02-04 | 北京嘀嘀无限科技发展有限公司 | Identity information security verification method, server, passenger end and driver end |
WO2020128455A2 (en) * | 2018-12-17 | 2020-06-25 | Switalski, Gillian | Method and system for determining driving information |
-
2022
- 2022-11-21 US US18/711,225 patent/US20250014384A1/en active Pending
- 2022-11-21 WO PCT/SG2022/050847 patent/WO2023101601A1/en active Application Filing
- 2022-11-21 CN CN202280079634.3A patent/CN118369944A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016164834A1 (en) * | 2015-04-10 | 2016-10-13 | Uber Technologies, Inc. | Augmenting transport services using driver profiling |
CN110751530A (en) * | 2018-08-20 | 2020-02-04 | 北京嘀嘀无限科技发展有限公司 | Identity information security verification method, server, passenger end and driver end |
WO2020128455A2 (en) * | 2018-12-17 | 2020-06-25 | Switalski, Gillian | Method and system for determining driving information |
Also Published As
Publication number | Publication date |
---|---|
CN118369944A (en) | 2024-07-19 |
US20250014384A1 (en) | 2025-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11710055B2 (en) | Processing machine learning attributes | |
US11017100B2 (en) | Identity fraud risk engine platform | |
US12045371B2 (en) | Consent-driven privacy disclosure control processing | |
US20160269419A1 (en) | Application platform with flexible permissioning | |
CN112073289B (en) | Instant messaging control method and device | |
US10110578B1 (en) | Source-inclusive credential verification | |
US20140310786A1 (en) | Integrated interactive messaging and biometric enrollment, verification, and identification system | |
CN111552942B (en) | Identity authentication method, system, device and computer storage medium | |
US11869004B2 (en) | Mobile authentification method via peer mobiles | |
US20220141217A1 (en) | Authentication server, and non-transitory storage medium | |
CN111010368A (en) | Authority authentication method, device and medium based on authentication chain and electronic equipment | |
US20190018868A1 (en) | Method of inputting document information, device, server, and storage medium | |
CN103415847A (en) | A system and method for accessing a service | |
CN111435503A (en) | Method and apparatus for obtaining electronic credentials | |
US20250014384A1 (en) | Method and device for authenticating a driver of a vehicle | |
CN112965821A (en) | Service request processing method and device and electronic equipment | |
JP7598349B2 (en) | PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD | |
US20200226241A1 (en) | Securing access to group accounts on a computer system | |
JP2023521901A (en) | Mobile application forgery/falsification detection method, computer program, computer-readable recording medium and computer device using user identifier and signature collection | |
CN113438223A (en) | Bank card security setting method and device | |
US20240112187A1 (en) | Money handling system and money handling method | |
HK40034955A (en) | Instant messaging control method and apparatus | |
EP3944581A1 (en) | Authentication method and system | |
HK40034955B (en) | Instant messaging control method and apparatus | |
WO2014172502A1 (en) | Integrated interactive messaging and biometric enrollment, verification, and identification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22901927 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18711225 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202280079634.3 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22901927 Country of ref document: EP Kind code of ref document: A1 |