Vehicles may be used in different ways depending on who is operating the vehicle. For example, a single vehicle may be used for individual use, family use, and business use. Vehicle owners and operators routinely pay for food and services associated with usage of the automobile, such as fuel, tolls, food and the like. Vehicle owners may use a credit card or other payment method in order to facilitate payments for goods and services related to automobile use. Some systems allow for payment methods to be linked to specific vehicles. For example, a driver can place a toll transponder on or in his or her vehicle such that when the vehicle passes through an automated tool booth, the toll booth scans the toll transponder (e.g., via RFID communication) and bills the payment method associated with the toll transponder (e.g., a credit card).
One embodiment relates to a vehicle occupant identity system for use with a vehicle. The system includes a network interface, a computer memory for storing identity information, at least one processor, and a display. The processor or processors execute operations to detect a presence of an individual in or in close proximity to the vehicle, determine the identity of the individual based at least on the stored identity information, receive an additional source of information via the network interface from a device associated with the individual, and use the additional information to identify a reason for taking a trip or otherwise using the vehicle. Authentication takes place by having the system in the vehicle communicate with a mobile device carried by the individual. The system also includes a touchscreen for user input. The additional source of information may be an electronic calendar, electronic appointment book or the like. The one or more processors may further execute operations to detect when an emergency situation is taking or has taken place and transmit information regarding the emergency situation to an outside source.
Another embodiment is a method for using a vehicle occupant identity system in a vehicle or in proximity to a vehicle. The method includes detecting, by a processor of the occupant identity system, a presence of an individual within the vehicle. Determining the identity of the individual is done at least in part by use of the stored identity information accessed by the system. Additional information is received via a network interface from a device associated with the individual. The method further includes identifying a purpose for the trip in the vehicle by using the additional information and configuring a setting of the vehicle based on the purpose and the identity of the individual. The additional source of information may be an electronic calendar, electronic appointment book or the like. The method my further include detecting an emergency situation and transmitting information comprising the existence of the emergency situation to an outside source. The information transmitted to the outside source may contain at least one of the identities of the individuals in the vehicle.
A further embodiment relates to a non-transitory computer-readable media having computer-executable instructions embodied therein that, when executed by one or more processors of a vehicle occupant identity system for use with a vehicle, cause the system to perform a process. The process includes detecting, by a processor of the occupant identity system, a presence of an individual within the vehicle. Determining the identity of the individual is done at least in part by use of the stored identity information accessed by the system. Additional information is received via a network interface from a device associated with the individual. The method further includes identifying a purpose for the trip in the vehicle by using the additional information and configuring a setting of the vehicle based on the purpose and the identity of the individual. The additional source of information may be an electronic calendar, electronic appointment book or the like. The method my further include detecting an emergency situation and transmitting information comprising the existence of the emergency situation to an outside source. The information transmitted to the outside source may contain at least one of the identities of the individuals in the vehicle.
Another embodiment relates to a method of using a vehicle occupant identity system in a vehicle. The method includes detecting, by a processor of an occupant identity system, a presence of an individual within the vehicle. The method further includes determining an identity of the individual based at least in part on stored identity information. The method includes configuring a payment source associated with the vehicle based on the identity of the individual.
These and other features, together with the organization and manner of operation thereof, will become apparent from the following detailed description when taken in conjunction with the accompanying drawings, wherein like elements have like numerals throughout the several drawings described below.
Referring generally to the figures, an occupant identity system for facilitating identifying one or more passengers or users of a vehicle is described. The occupant identity system is integrated in the vehicle or is a separate device positioned in or on the vehicle. The occupant identity system identifies and authenticates one or more individuals inside the vehicle or in close proximity to the vehicle. In some arrangements, the vehicle occupant identity system stores financial information associated with the occupants of the vehicle, which allows for payment of goods or services received from a merchant or service provider to be attributed to the actual occupants of the vehicle.
Referring to
The occupant identity system 108 includes a processor 110 and memory 112. The memory 112 stores programming modules that, when executed by the processor 110, control the operation of the occupant identity system 108. In certain arrangements, the processor 110 and the memory 112 are also associated with the infotainment system of the vehicle 104. The occupant identity system 108 includes a network interface 114. As described in further detail below, the network interface 114 allows the occupant identity system 108 to send and receive data to and from various devices, such as mobile devices associated with the occupants 102, a merchant payment terminal 128 associated with a merchant 106 when the vehicle identity is involved in financial transactions, and a financial institution computing system 130 via a network 132. In some arrangements, the network interface 114 includes the hardware and logic necessary to communicate over multiple channels of data communication. For example, the network interface 114 may include a cellular modem, a Bluetooth transceiver, a Bluetooth beacon, an RFID transceiver, and an NFC transmitter. Data passing through the network interface 114 may be encrypted such that the network interface 114 is a secure communication module. The occupant identity system 108 includes a display 116 and a user input 118. In some arrangements, the display 116 and the user input 118 are combined in the form of a touchscreen device. The display 116 and the user input 118 may also function as the display and user inputs of the infotainment system. The occupant identity system 108 further includes sensors 120. The sensors 120 may include any of location sensors (e.g., GPS, GLONAS, wireless location services, etc.) and vehicle occupancy sensors (e.g., cameras, motion detectors, seat pressure sensors, wireless receivers, etc.). The sensors 120 may include other sensors including accelerometers, gyroscopic sensors, and various biometric sensors. In arrangements where the occupant identity system 108 is connected to the ECU of the vehicle 104, there is additional access to the throttle position sensor, engine coolant temperature sensor, air flow meter, air-fuel ratio meter, crankshaft position sensor. In addition, if present in the vehicle, there is access through the ECU to remote start mechanisms, indicator lights, on-board diagnostics, etc.
The occupant identity system 108 facilitates payment to the merchant 106 based on the vehicle as a singular merged identity based at least in part on the specific occupants 102 in the vehicle 104. The merchant 106 provides goods and/or services to the vehicle 104 and/or to the occupants 102. Accordingly, the occupant identity system 108 includes identity logic which comprises identity information 124. The identity information may include financial information pertaining to the occupants 102. The financial information can be stored in the memory 112 of the occupant identity system 108 or provided by the occupants 102 at the time of identification (e.g., transmitted from an occupant device such as a smart phone, manually entered into the occupant identity system 108 via the user input 118, etc.). The identity logic 122 is programmed or built into the occupant identity system 108 and allows for the storage, selection, and transmission of identity information 124. The identity information 124 may be used to authorize or authenticate occupants in or in proximity of the vehicle 104. The identity information 125 may be used along with an additional information to determine the purpose of the vehicle trip (e.g. business, personal, etc.), and thus, the vehicle identity. The additional information may include an electronic calendar associated with the occupants 102 or the owner of the vehicle 104 (e.g., a business calendar), electronic appointment book, or the like.
The identity information 124 may include user identification information (e.g., user login information, identification tokens, etc.) and payment sources associated with users identified by the user identification information. The payment sources include any of credit card information, debit card information, bank account information, mobile wallet information, or the like. In some arrangements, the identity logic 122 is programmed with a default payment source. For example, the identity logic 122 can be programmed with payment information relating to the owner or primary user of the vehicle 104. The owner's or primary user's payment information may be used as a default payment source for purchases made from a merchant 106 or for payment for other services (e.g., tolls). The identity logic 122 allows for new payment sources to override the default payment source. For example, as described in further detail below, the identity logic may be programmed with new payment sources relating to various occupants 102 that are actually in the vehicle 104 as opposed to the owner or primary user that is not present in the vehicle 104. The identity logic 122 may further allow for the sharing of costs amongst multiple payment sources (e.g., one payment source for each occupant 102), including the default payment method. The identity logic 122 can be programmed with multiple payment sources for different types of expenses (e.g., a first payment source for fuel, a second payment source for tolls, etc.). The identity logic 122 can select different payment sources based on location information received from the sensors 120. For example, a specific payment method may be programmed to be valid only in specific locations (e.g., inside of Seattle). The identity logic 122 can be programmed such that a payment source expires after a set duration (e.g., after two hours). The identity logic 122 can also detect when a new payment source entering the vehicle 104 and prompt the occupants 102 for override instructions. The identity logic 122 can facilitate a car sharing service that allows authorized occupants 102 the use of the vehicle 104. These and other use cases are described in further detail below.
The system 100 may include a merchant payment terminal 128 associated with the merchant 106. The merchant payment terminal 128 includes a processor 134, a memory 136, and a network interface 138. The memory 136 stores programming modules that, when executed by the processor 134, control the operation of the payment terminal 128. In some arrangements, the network interface 138 includes the hardware and logic necessary to communicate over multiple channels of data communication. For example, the network interface 138 includes any of a cellular modem, a Bluetooth transceiver, a Bluetooth beacon, an RFID transceiver, and/or an NFC transmitter. Data passing through the network interface 114 may be encrypted such that the network interface 114 is a secure communication module. The data passing through network interface 114 may be financial payment information which is then communicated through the network 132 to a financial institution computing system 130 to facilitate payment for goods or services.
Still referring to
In the system 100, data communication between the occupant identity system 108, the occupants 102, the payment terminal 128, and the financial institution computing system 130 may be facilitated by the network 132. In some arrangements, the network 132 includes the internet.
Still referring to
The general operation of the occupant identity system 108 of the vehicle 104 within the system 100 is described in further detail below with respect to
Referring now to
Continuing with
Finally, as part of the authentication procedure, the occupant identity system 108 requests personal details that may have to be combined with a proof of identity at 212 to finish authentication in some arrangements. Personal details are biographical information, financial information details, credit report details, etc. Personal details may also include biometric data (e.g. fingerprint scan, iris or retina scan, facial features, voice features). In some arrangements, the personal details along with any biometric data are stored indefinitely in the occupant identity system 108. In other arrangements, the personal details and related data can be set to expire or be deleted after a set period of time or upon certain inputs (e.g., at the request of the user associated with the personal details and biometric data, at the request of the vehicle owner, etc.). The personal details and related data may expire and no longer be valid for authorized use of the vehicle, but remain stored on the system. The set period of time can be a time period, e.g., hour, day, week, or a set period of time coupled to an event, e.g., the duration of a trip or the duration of a rental period. The set period of time can be based on certain inputs, e.g., expiration upon individual exiting the car, expiration upon a new, different user being authorized, expiration upon returning to a certain geographical area, etc.
The authentication procedure at 210 along with the request for personal details and proof of identity at 212 allow the vehicle 104 to store enough data on the individual to recognize the individual when the individual subsequently enters the vehicle 104. In another alternate embodiment, the occupant identity system 108 allows for a security setting that sets off an alarm and/or informs security, authorities, or a security center when an unknown individual has entered the vehicle 104 and cannot be authenticated. In some arrangements, the vehicle 104 prevents vehicle ignition, prevents placing the transmission into gear, or otherwise activates a ‘kill switch’ or other disabling function to prevent unauthorized use by the unknown and unauthenticated individual.
A level of access is determined based on the identity of the authenticated individual in some arrangements. There are different access levels available that offer greater or lesser amounts of information or access to features of the vehicle 104 to individual occupants. In one embodiment, the access is based on the most restricted level of access of each respective individual in the vehicle 104. The presence of an unauthenticated individual corresponds with no access or the most restricted level of access. The level of access in some embodiments can be visualized as rings with the users in the central ring given full access. Referring now to
Returning to
In another embodiment, the vehicle 104 is part of a vehicle sharing service. As part of a sharing service, an individual desires to temporarily use the vehicle 104. The vehicle 104 identifies the individual as an unauthenticated individual and requests further information on identity. The individual then enters input that allows the vehicle 104 to create a profile and account for the individual. In some arrangements, such input includes identification information, biometric sensor input, visual image from camera, payment information, etc. Once the individual has a profile and has created an identity, the individual in future visits is identified as an authenticated individual. Other authentication methods as described above may also be used.
Referring now to
In one example, a business uses the vehicle 104 as a business vehicle, and an individual uses the same vehicle 104 for personal use. Accordingly, the vehicle 104 is used for mixed business and personal use. The occupant identity system 108 tracks the vehicle 104 history for both business and any personal use including individuals using the vehicle 104 and keeps a history of the mileage used and any expenses incurred. Other historical data from the vehicle systems and sensors connected to the occupant identity system 108 is stored. In some arrangements, this data includes sensor information recording wear and tear on the vehicle 104, acceleration and deceleration metrics and the like. When an occupant identity system 108 determines the trip is being made for business reasons, the occupant identity system 108 adjusts settings, permissions, and restrictions based on a business trip at 308. Examples of settings, permissions, and restrictions include enabling fuel economy mode of the vehicle 104, restricting or allowing access to an infotainment system, restricting or allowing access to ECU settings, GPS tracking, restricting categories where cost may be incurred, changing payment sources, etc. The device then tracks vehicle history appropriate for business use at 310 and ends the session when the individuals have left the vehicle 104 at 312. When an occupant identity system 108 determines the trip is being made for personal reasons, the occupant identity system 108 adjust settings, permissions, and restrictions based on a personal trip at 314. The occupant identity system 108 then tracks vehicle history appropriate for personal use at 316 and ends the session when the individuals have left the vehicle 104 at 318. The vehicle history tracked at 316 can include, for example, expense reports, fuel usage reports, passenger identities during the history, and the like. The vehicle history can be transmitted by the occupant identity system 108 to an external device, such as a user device or a company server for record keeping.
Referring now to
Referring now to
Continuing with
In another embodiment, different payment methods may be selected for expenses according to the current location of the vehicle 104 at 510. For example, the user sets a payment method to be used when within the city of Seattle. The location of the vehicle 104 or vehicle 104 is tracked by GPS or other method using the location services of the occupant identity system 108 at 512. In some arrangements, selection of the financial payment information is based upon detecting the purpose of the vehicle trip based upon the identity of the individuals detected. Various additional sources of information may be accessed including electronic calendars, appointment books, emails, etc. in order to determine the reason for the trip such as if it is for business reasons, personal reasons, etc. In some embodiments the sensors are configured to determine the identity of the driver of the vehicle to differentiate from the passengers in the vehicle. The vehicle tracks the payment history and categorizes by both business and any personal use including individuals using the vehicle. In either case, after 508 or 512, the occupant identity system 108 can transmit payment information to a payment terminal 128.
The embodiments of the present invention have been described with reference to drawings. The drawings illustrate certain details of specific embodiments that implement the systems and methods and programs of the present invention. However, describing the invention with drawings should not be construed as imposing on the invention any limitations that may be present in the drawings. The present invention contemplates methods, systems and program products on any machine-readable media for accomplishing its operations. The embodiments of the present invention may be implemented using an existing computer processor, or by a special purpose computer processor incorporated for this or another purpose or by a hardwired system.
As noted above, embodiments within the scope of the present invention include program products comprising machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
Embodiments of the present invention have been described in the general context of method steps which may be implemented in one embodiment by a program product including machine-executable instructions, such as program code, for example in the form of program modules executed by machines in networked environments. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Machine-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represent examples of corresponding acts for implementing the functions described in such steps.
As previously indicated, embodiments of the present invention may be practiced in a networked environment using logical connections to one or more remote computers having processors. Those skilled in the art will appreciate that such network computing environments may encompass many types of computers, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and so on. Embodiments of the invention may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
An example system for implementing the overall system or portions of the invention might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. The system memory may include read only memory (ROM) and random access memory (RAM). The computer may also include a magnetic hard disk drive for reading from and writing to a magnetic hard disk, a magnetic disk drive for reading from or writing to a removable magnetic disk, and an optical disk drive for reading from or writing to a removable optical disk such as a CD ROM or other optical media. The drives and their associated machine-readable media provide nonvolatile storage of machine-executable instructions, data structures, program modules and other data for the computer. It should also be noted that the word “terminal” as used herein is intended to encompass computer input and output devices. Input devices, as described herein, include a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function. The output devices, as described herein, include a computer monitor, printer, facsimile machine, or other output devices performing a similar function.
It should be noted that although the diagrams herein may show a specific order and composition of method steps, it is understood that the order of these steps may differ from what is depicted. For example, two or more steps may be performed concurrently or with partial concurrence. Also, some method steps that are performed as discrete steps may be combined, steps being performed as a combined step may be separated into discrete steps, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative embodiments. Accordingly, all such modifications are intended to be included within the scope of the present invention as defined in the appended claims. Such variations will depend on the software and hardware systems chosen and on designer choice. It is understood that all such variations are within the scope of the invention. Likewise, software and web implementations of the present invention could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps.
The foregoing description of embodiments of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. The embodiments were chosen and described in order to explain the principals of the invention and its practical application to enable one skilled in the art to utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the embodiments without departing from the scope of the present invention as expressed in the appended claims.
This application claims priority to U.S. Provisional Patent Application No. 62/255,854 entitled “SYSTEMS AND METHODS FOR USING A VEHICLE AS MULTIPLE IDENTITIES,” by Honeycutt et al., filed on Nov. 16, 2015, which is herein incorporated by reference in its entirety and for all purposes.
Number | Date | Country | |
---|---|---|---|
62255854 | Nov 2015 | US |