Nothing Special   »   [go: up one dir, main page]

US20240022873A1 - System and method for monitoring a former convict of an intoxication-related offense - Google Patents

System and method for monitoring a former convict of an intoxication-related offense Download PDF

Info

Publication number
US20240022873A1
US20240022873A1 US18/221,249 US202318221249A US2024022873A1 US 20240022873 A1 US20240022873 A1 US 20240022873A1 US 202318221249 A US202318221249 A US 202318221249A US 2024022873 A1 US2024022873 A1 US 2024022873A1
Authority
US
United States
Prior art keywords
individual
verifying
restricted
response
motor vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/221,249
Inventor
Stephen L. Hodge
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Tel Link Corp
Original Assignee
Global Tel Link Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Global Tel Link Corp filed Critical Global Tel Link Corp
Priority to US18/221,249 priority Critical patent/US20240022873A1/en
Publication of US20240022873A1 publication Critical patent/US20240022873A1/en
Assigned to TEXAS CAPITAL BANK, AS COLLATERAL AGENT reassignment TEXAS CAPITAL BANK, AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: 3V TECHNOLOGIES INCORPORATED, DSI-ITI, INC., GLOBAL TEL*LINK CORPORATION, INTELMATE LLC, RENOVO SOFTWARE, INC., TOUCHPAY HOLDINGS, LLC, VALUE-ADDED COMMUNICATIONS, INC.
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • H04W4/027Services making use of location information using location based information parameters using movement velocity, acceleration information
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60QARRANGEMENT OF SIGNALLING OR LIGHTING DEVICES, THE MOUNTING OR SUPPORTING THEREOF OR CIRCUITS THEREFOR, FOR VEHICLES IN GENERAL
    • B60Q1/00Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor
    • B60Q1/26Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic
    • B60Q1/50Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking
    • B60Q1/509Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking specific to unauthorised use, e.g. for indicating stolen vehicles or infringements of traffic rules
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/017Detecting movement of traffic to be counted or controlled identifying vehicles
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/017Detecting movement of traffic to be counted or controlled identifying vehicles
    • G08G1/0175Detecting movement of traffic to be counted or controlled identifying vehicles by photographing vehicles, e.g. when violating traffic rules
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/052Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Definitions

  • This disclosure relates to a system for allowing an offender to assist with a booking process in order to streamline the booking process, as well as to free up resources for officers to perform other more critical tasks.
  • Former detainees who have been convicted of certain intoxication-related crimes, may be prohibited from operating a motor vehicle. Previously, there was no way to determine whether such an individual was operating a motor vehicle, unless that individual was pulled over. Although the causes may vary for pulling over a motorist, there is a high likelihood that a former convict of an intoxication-related crime will be intoxicated again, and thus may already be intoxicated at the time of being stopped.
  • FIG. 1 illustrates a diagram of an exemplary monitoring environment according to embodiments of the present disclosure.
  • FIG. 2 illustrates a block diagram of an exemplary monitoring system according to embodiments of the present disclosure.
  • FIG. 3 illustrates a block diagram of an exemplary monitoring system, according to embodiments of the present disclosure.
  • FIG. 4 illustrates an exemplary monitoring method according to embodiments of the present disclosure.
  • FIG. 5 illustrates a block diagram of a general purpose computer that may be used to perform various aspects of the present disclosure.
  • Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors.
  • a machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device).
  • a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others.
  • firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
  • any reference to the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof.
  • each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module.
  • multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
  • This disclosure pertains to a system for preventing those who have been convicted of select intoxication-related offenses from operating a motor vehicle when they are prohibited from doing so.
  • an individual has been convicted of violating certain intoxication laws, such as driving under the influence of alcohol, etc., that person may be restricted from driving for public safety purposes.
  • certain intoxication laws such as driving under the influence of alcohol, etc.
  • a more effective system for preventing restricted operation of a motor vehicle is described herein.
  • the system activates upon detection that the user is traveling faster than a predetermined rate of speed. Once activated, the system uses either RFID or biometrics to verify the identity of the individual. Then, the system acquires information from an application on the individual's phone to verify that the individual is taking transportation from a third-party. Alternatively, the system can analyze photo or other evidence to verify that the individual is not driving. When the system is unable to gain these assurances, authorities can be notified.
  • FIG. 1 illustrates a diagram of an exemplary environment 100 in which the monitoring system operates.
  • the restricted individual 102 is in possession of a smartphone or similar device 110 .
  • the individual 102 is fitted with an ankle bracelet 180 or other monitoring device.
  • Ankle bracelets are commonly affixed to certain offenders for a variety of reasons, such as to monitor the individual's location to being within a restricted area.
  • the ankle bracelet in this embodiment serves a different purpose.
  • the ankle bracelet stores a unique identifier associated specifically with the individual. This positively identifies the individual to the monitoring system running on the smartphone device 110 .
  • the individual can be identified to the monitoring system without the use of an ankle bracelet, such as through biometric verification, etc.
  • the system does not activate solely because the individual 102 has entered a motor vehicle 105 , but activates when the individual 102 has exceeded a predetermined speed.
  • the smartphone interfaces with the ankle bracelet to authenticate the individual, and then carries out a number of subsequent operations to determine whether the restricted individual 102 is driving the vehicle 105 . System operation will be described in further detail with respect to FIGS. 2 and 3 .
  • FIG. 2 illustrates a block diagram of an exemplary monitoring system 200 according to embodiments of the present disclosure.
  • the system includes a smart device 210 and an RF transmitter 280 .
  • the RF transmitter 280 functions using RFID communications, such as near-field load modulation.
  • the smart device 210 operates the substantial functionality of the monitoring system, whereas the RF transmitter 280 stores identification information of the individual 202 , and is used to positively verify the presence and usage of the individual.
  • the smart device includes monitor processing 230 in the form of one or more hardware processors and/or circuits that performs the processing from the various additional device elements for determining whether the individual is in violation of the driving restrictions. Those additional device elements are connected to the monitor processing 230 , and carry out several additional functions for supporting the monitor processing 230 .
  • location 215 provides location information to the monitor processing 230 .
  • the location 215 is a GNSS receiver that receives GNSS signals from a network of GNSS satellites, such as GPS.
  • the location 215 determines location without the use of GNSS satellite signals, such as by triangulation from signal received from nearby base stations and/or access points.
  • the speed 220 determines a speed with which the smart device 210 is moving. In an embodiment, speed 220 makes the speed determination based on information received from location 215 , such as based on a change of GNSS position. However, in other embodiments, speed 220 determines the speed of the smart device 210 without the use of location information, such as by detecting accelerations of the smart device 210 via an accelerometer.
  • application processing 255 operates other applications running on the smart device 210 .
  • any number of applications may be running on the smart device 210 at any given time, there are certain applications that are particularly pertinent to the present disclosure.
  • ride-sharing and ride-hailing apps such as UberTM or LyftTM, operate to request rides or taxi-like services.
  • An application monitor 250 provides an interface between the monitor processing 230 and the application processing in order to provide information to the monitor processing 230 from one or more relevant applications operating in the application processing 255 .
  • the smart device 210 also includes an input 235 , by which the individual can directly provide certain information to the smart device, such as biometric information. Additionally, a transceiver 240 is connected with an antenna 245 that is used to communicate with outside devices, such as RF transmitter 280 .
  • the RF transmitter 280 includes a transceiver 290 connected to an antenna for sending and receiving information from an outside device, such as smart device 210 .
  • the RF transmitter 280 also includes an Identification 295 .
  • the Identification 295 stores the unique identifier associated with the individual. In an embodiment, the unique identifier is globally unique.
  • the speed 220 determines a rate of speed of the smart device 210 , and forwards the result to the monitor processing 230 .
  • the speed of the smart device 210 may be determined in a variety of different ways, including determining rate of change of GNSS position based on information received from location 215 , as well as force measurements from one or more force detection sensors (e.g., accelerometer).
  • the monitor processing 230 determines, based on the received speed information, whether the smart device 210 is exceeding a predetermined threshold speed. If the monitor processing 230 determines that the threshold speed has been exceeded, the monitor processing carries out further steps to attempt to determine whether the individual associated with the smart device 210 is currently driving a motor vehicle, in violation of the prohibition from doing so.
  • the monitor processing 230 first verifies an identity of the individual. This ensures that the restricted individual is present with the device so as to prevent false positives, among other uses.
  • the monitor processing causes the transceiver 240 to transmit a signal to the RF transmitter 280 .
  • the transmitted signal is received by the RF transmitter 280 , which causes the RF transmitter 280 to retrieve the unique identifier from the Identification 295 .
  • the RF transmitter replies to the signal by sending the unique identifier back to the smart device 210 .
  • the unique identifier is encoded prior to transmission.
  • the RF transmitter 280 is instead configured to communicate using another wireless communication protocol.
  • An example of such a protocol is Bluetooth®, such as Bluetooth Low Energy (BLE).
  • Bluetooth Low Energy is a wireless personal area network technology designed for low power consumption. Many mobile operating systems natively support BLE.
  • the transmitter 280 periodically pulses a notification to the smart device 210 . In order to conserve batter, this pulse is preferably sent relatively infrequently, but often enough to satisfactorily ensure that the user is present when the driving motion is detected. In an embodiment, the pulse is transmitted to the smart device every 4-6 minutes.
  • the RF transmitter 280 can operate in a passive mode or an active mode. In the passive mode, the RF transmitter does not require a power source, and is instead activated passively by an outside device. In the active mode, the RF transmitter requires a power source in order to generate the signals transmitted, such as the pulse notifications described above.
  • the monitor processing 230 makes a determination as to whether the received unique identifier matches that associated with the restricted individual. If there is no match, then the monitoring goes dormant until after the speed of the smart device has been below the predetermined speed threshold for longer than a predetermined duration, or until after a predetermined amount of time has passed since the monitoring went dormant. On the other hand, if there is a match, then the monitor processing 130 seeks out information to verify whether the restricted individual is operating a motor vehicle.
  • the monitor processing 230 causes the application monitor 250 to attempt to retrieve information from one or more ride-sharing and/or ride-hailing applications running in the application processing 255 .
  • ride-sharing and/or ride-hailing applications running in the application processing 255 .
  • many of those applications such as Uber and Lyft transmit a request along with a location of the individual.
  • Many notifications are then exchanged between the smart device 210 and a server of the ride provider. Such notifications indicate that a ride has been scheduled, has picked up, has delivered, or informs as to a projected or final cost of the ride.
  • the application monitor 250 Upon receiving the instruction from the monitor processing 230 , the application monitor 250 begins accessing memory registers and cache memory associated with the ride-sharing and/or ride-hailing applications on the phone in order to seek out any such notifications. In other embodiments, the application monitor may seek out the requested information in other manners, such as by monitoring device instructions, monitoring datastreams traversing a data bus or transmitted from the antenna 245 , monitoring screen states, etc.
  • the application monitor 250 forwards the information to the monitor processing 230 , which analyzes the received information. As part of this analysis, the monitor processing 230 attempts to determine whether the individual is using any of those applications to travel. The monitor processing 230 will examine numerous data points as part of this determination, and will preferably make a final determination based on an algorithm that takes into account numerous of the data points found. Ultimately, based on that algorithm, the monitor processing 230 will determine whether the individual is likely to be driving, or rather is likely to be riding as a passenger in a motor vehicle. Preferably, the monitor processing examines the data for the presence of a ride request, as well as a date/time stamp and/or identification information. Together, this information evidences that the request was made within a predetermined time of the drive detection, and is associated with the restricted individual.
  • the algorithm may consist of calculating a weighted sum of different data points. For example, data points that evidence that the individual is using one of the riding applications being processed in application processing 255 will be assigned certain weights that differ from those data points that evidence against that determination. After averaging the weighted data points, the resulting weighted average is compared against a threshold value. If the weighted average exceeds the threshold, then the monitor processing 230 determines that the individual is utilizing one of the riding applications, and is not driving. As a result, no further action is taken until after a predetermined amount of time as elapsed, or until after the smart device is below the predetermined speed threshold for greater than a predetermined period of time.
  • the monitor processing 230 determines based on the algorithm that the individual is unlikely to be utilizing a riding app, then the monitor processing 230 determines that the individual is likely driving. As a result of this determination, the monitor processing 230 generates an alert signal that includes a preset message and a location received from location 215 , and causes the transceiver 240 to transmit the alert signal to appropriate authorities, notifying them of the likely violation and providing them with the location of the individual.
  • the monitor processing 230 determines that the individual is not using one of the riding applications to travel, then the monitor processing can first seek out additional information from the individual before determining that the individual is violating his prohibition against driving. For example, after making the negative determination, the monitor processing 230 issues a notification to the individual that authorities will be alerted to a violation of the individual's prohibition against driving unless additional evidence is received to establish the contrary.
  • the monitor processing 230 may be capable of, and configured to, analyze a wide variety of additional information received from the user.
  • the user may access the riding application and capture a screenshot showing relevant information relating to a current ride, such as date/time, destination, etc.
  • the monitor processing 230 employs image processing, such as optical character recognition, to extract the relevant information from the image and update its determination regarding whether the individual is driving.
  • the monitor processing 230 may be configured to process a wide variety of additional information.
  • the monitor processing 230 may allow for the individual to activate a camera of the smart device in order to take a picture of the individual's environment. Such a picture may show a bicycle or other non-motorized vehicle being used by the individual, or may show another individual driving an automobile in which the individual is a passenger.
  • the monitor processing 230 may be configured to employ pattern matching and image recognition in order to identify bicycle handle-bars and/or tire widths, a steering wheel and/or seat locations within an automobile, as well as to detect and identify faces. Through these capabilities, the monitor processing 230 is able to analyze a wide variety of information provided to it by the user in order to ensure accurate detection of a violation.
  • FIG. 3 illustrates a block diagram of an exemplary monitoring system 300 , according to embodiments of the present disclosure.
  • the monitoring system 300 does not require any communication with an outside device for verifying the identity of the individual, but rather is instead self-encapsulating.
  • the smart device 210 also includes an input sensor 365 and an authentication module 360 .
  • the smart device 210 must verify the presence of the individual in an alternative manner. Thus, the smart device 210 prompts the user of the device to provide certain personal information using the input sensor 365 .
  • the input sensor is any biometric sensor or manual input device.
  • a manual input device allows the individual to enter personal verification data, such as name and unique identifier.
  • a biometric sensor is more secure and less prone to faking, hacking, etc.
  • the authentication module 360 compares the received information to previously-stored information.
  • the authentication module 360 performs an analysis of the information in order to carry out a probabilistic comparison between the received biometric information and the previously-stored biometric information of the same type. Such comparison may include comparing voice prints, face prints, facial architectures, iris scans, etc. The result of the comparison is then acted upon in the manner already described with respect to the embodiment of FIG. 2 .
  • FIG. 4 illustrates a flowchart diagram of an exemplary monitoring method 400 according to embodiments of the present disclosure.
  • the monitoring system monitors a speed of a device on which the monitoring system operates 410 . While monitoring the speed, the system determines whether the speed of the device exceeds a predetermined threshold th 415 . If the speed does not exceed the predetermined threshold ( 415 —N), then functionality returns to speed monitoring 410 .
  • the system identifies the individual 420 . As discussed above, this is performed in one of several different ways, including requesting a unique identifier from an RFID transmitter, or by acquiring identification information from the user. Based on the received information, the system verifies whether the user is the restricted individual 425 . If the user is not the restricted individual, then operation returns to speed detection 410 . In an embodiment, there may be some predetermined time elapse or other trigger required before re-initiating the monitoring method.
  • the system attempts to acquire information from one or more relevant applications running on the device 430 . During this step, the system will access various data sources associated with different applications on the device in order to gather relevant information that may evidence use or non-use of a ride-sharing or ride-hailing application. After gathering the relevant data, the monitoring system operates an algorithm 440 in order to determine whether the restricted user is driving 445 . If it is determined that the restricted user is not driving ( 445 —N), then functionality returns to speed detection 410 . If, on the other hand, the algorithm determines that there is insufficient information to make a definitive determination with high certainty, then the individual is prompted for more information 460 . After the restricted individual provides more information, such as in the manner described above, then the system makes an updated determination as to whether the individual is driving 445 .
  • the system determines that the restricted individual is driving ( 445 — Y)
  • the system If the system determines that the restricted individual is driving ( 445 — Y), then the system generates an alert containing the identification of the restricted individual and a location of the device, and transmits the alert to relevant authorities.
  • Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system.
  • the method of FIG. 4 can be implemented in the environment of one or more computer systems or other processing systems.
  • An example of such a computer system 500 is shown in FIG. 5 .
  • One or more of the modules depicted in the previous figures can be at least partially implemented on one or more distinct computer systems 500 .
  • Computer system 500 includes one or more processors, such as processor 504 .
  • Processor 504 can be a special purpose or a general purpose digital signal processor.
  • Processor 504 is connected to a communication infrastructure 502 (for example, a bus or network).
  • a communication infrastructure 502 for example, a bus or network.
  • Computer system 500 also includes a main memory 506 , preferably random access memory (RAM), and may also include a secondary memory 508 .
  • Secondary memory 508 may include, for example, a hard disk drive 510 and/or a removable storage drive 512 , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like.
  • Removable storage drive 512 reads from and/or writes to a removable storage unit 516 in a well-known manner.
  • Removable storage unit 516 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to by removable storage drive 512 .
  • removable storage unit 516 includes a computer usable storage medium having stored therein computer software and/or data.
  • secondary memory 508 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 500 .
  • Such means may include, for example, a removable storage unit 518 and an interface 514 .
  • Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and other removable storage units 518 and interfaces 514 which allow software and data to be transferred from removable storage unit 518 to computer system 500 .
  • Computer system 500 may also include a communications interface 520 .
  • Communications interface 520 allows software and data to be transferred between computer system 500 and external devices. Examples of communications interface 520 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc.
  • Software and data transferred via communications interface 520 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 520 . These signals are provided to communications interface 520 via a communications path 522 .
  • Communications path 522 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels.
  • computer program medium and “computer readable medium” are used to generally refer to tangible storage media such as removable storage units 516 and 518 or a hard disk installed in hard disk drive 510 . These computer program products are means for providing software to computer system 500 .
  • Computer programs are stored in main memory 506 and/or secondary memory 508 . Computer programs may also be received via communications interface 520 . Such computer programs, when executed, enable the computer system 500 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor 504 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of the computer system 500 . Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded into computer system 500 using removable storage drive 512 , interface 514 , or communications interface 520 .
  • features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays.
  • ASICs application-specific integrated circuits
  • gate arrays gate arrays

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mechanical Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Traffic Control Systems (AREA)
  • Telephone Function (AREA)

Abstract

A system and method are disclosed for preventing a restricted individual from operating a motor vehicle. The system monitors a speed of the individual via a smart device associated with the individual. The system activates a monitoring function based on a detected speed of the device, which may evidence the individual riding in a motor vehicle. The system them verifies that the user of the device is the restricted individual through a variety of different identification methods. Once identified, the system accesses various data sources associated with one or more ride applications running on the smart device in order to determine whether the restricted individual has requested a ride from a third party during a relevant time period. After analyzing the data, a determination is made as to whether the individual is driving, or whether more information is needed.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 17/703,662 filed Mar. 24, 2022, which is a continuation of U.S. patent application Ser. No. 17/006,412 filed Aug. 28, 2020, now U.S. Pat. No. 11,285,867, which is a continuation of U.S. patent application Ser. No. 16/653,524 filed Oct. 15, 2019, now U.S. Pat. No. 10,759,335, which is a continuation of U.S. patent application Ser. No. 15/874,528, filed on Jan. 18, 2018, now U.S. Pat. No. 10,464,474, which is a continuation of U.S. patent application Ser. No. 15/657,935, filed on Jul. 24, 2017, now U.S. Pat. No. 9,878,660, which are incorporated by reference herein in their entireties.
  • BACKGROUND Field
  • This disclosure relates to a system for allowing an offender to assist with a booking process in order to streamline the booking process, as well as to free up resources for officers to perform other more critical tasks.
  • Background
  • Former detainees, who have been convicted of certain intoxication-related crimes, may be prohibited from operating a motor vehicle. Previously, there was no way to determine whether such an individual was operating a motor vehicle, unless that individual was pulled over. Although the causes may vary for pulling over a motorist, there is a high likelihood that a former convict of an intoxication-related crime will be intoxicated again, and thus may already be intoxicated at the time of being stopped.
  • BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES
  • The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate embodiments of the present disclosure and, together with the description, further serve to explain the principles of the disclosure and to enable a person skilled in the pertinent art to make and use the embodiments.
  • FIG. 1 illustrates a diagram of an exemplary monitoring environment according to embodiments of the present disclosure.
  • FIG. 2 illustrates a block diagram of an exemplary monitoring system according to embodiments of the present disclosure.
  • FIG. 3 illustrates a block diagram of an exemplary monitoring system, according to embodiments of the present disclosure.
  • FIG. 4 illustrates an exemplary monitoring method according to embodiments of the present disclosure.
  • FIG. 5 illustrates a block diagram of a general purpose computer that may be used to perform various aspects of the present disclosure.
  • The present disclosure will be described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left most digit(s) of a reference number identifies the drawing in which the reference number first appears.
  • DETAILED DESCRIPTION
  • The following Detailed Description refers to accompanying drawings to illustrate exemplary embodiments consistent with the disclosure. References in the Detailed Description to “one exemplary embodiment,” “an exemplary embodiment,” “an example exemplary embodiment,” etc., indicate that the exemplary embodiment described may include a particular feature, structure, or characteristic, but every exemplary embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same exemplary embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an exemplary embodiment, it is within the knowledge of those skilled in the relevant art(s) to affect such feature, structure, or characteristic in connection with other exemplary embodiments whether or not explicitly described.
  • The exemplary embodiments described herein are provided for illustrative purposes, and are not limiting. Other exemplary embodiments are possible, and modifications may be made to the exemplary embodiments within the spirit and scope of the disclosure. Therefore, the Detailed Description is not meant to limit the disclosure. Rather, the scope of the disclosure is defined only in accordance with the following claims and their equivalents.
  • Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others. Further, firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
  • For purposes of this discussion, any reference to the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof. In addition, it will be understood that each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module. Conversely, multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
  • The following Detailed Description of the exemplary embodiments will so fully reveal the general nature of the disclosure that others can, by applying knowledge of those skilled in relevant art(s), readily modify and/or customize for various applications such exemplary embodiments, without undue experimentation, without departing from the spirit and scope of the disclosure. Therefore, such modifications are intended to be within the meaning and plurality of equivalents of the exemplary embodiments based upon the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by those skilled in relevant art(s) in light of the teachings herein.
  • This disclosure pertains to a system for preventing those who have been convicted of select intoxication-related offenses from operating a motor vehicle when they are prohibited from doing so. Typically, when an individual has been convicted of violating certain intoxication laws, such as driving under the influence of alcohol, etc., that person may be restricted from driving for public safety purposes. Unfortunately, barring some extreme exceptions, there are not readily available methods to ensure that that individual does not ignore that prohibition against driving.
  • For example, there currently exists a system in which an electrical breathalyzer device is wired to a starting apparatus of the individual's vehicle. The automobile will only start after the individual blows into the breathalyzer, and the individual's breath has been analyzed and falls below the predetermined blood-alcohol content (BAC) threshold. However, there are significant problems associated with this system. First, this only prevents the individual from operating his/her own vehicle, and does nothing to prevent the individual from operating a rented or friend's vehicle. Additionally, since there is currently no means for extracting biometric information from a person's breath, any individual could blow into the breathalyzer in place of the restricted individual, thereby subverting the system.
  • In light of the above, a more effective system for preventing restricted operation of a motor vehicle is described herein. The system activates upon detection that the user is traveling faster than a predetermined rate of speed. Once activated, the system uses either RFID or biometrics to verify the identity of the individual. Then, the system acquires information from an application on the individual's phone to verify that the individual is taking transportation from a third-party. Alternatively, the system can analyze photo or other evidence to verify that the individual is not driving. When the system is unable to gain these assurances, authorities can be notified. These, and other aspects, are described in detail below.
  • Exemplary Environment
  • FIG. 1 illustrates a diagram of an exemplary environment 100 in which the monitoring system operates. In an embodiment, the restricted individual 102 is in possession of a smartphone or similar device 110. Additionally, the individual 102 is fitted with an ankle bracelet 180 or other monitoring device. Ankle bracelets are commonly affixed to certain offenders for a variety of reasons, such as to monitor the individual's location to being within a restricted area. However, the ankle bracelet in this embodiment serves a different purpose. The ankle bracelet stores a unique identifier associated specifically with the individual. This positively identifies the individual to the monitoring system running on the smartphone device 110. In another embodiment, as will be discussed in further detail below, the individual can be identified to the monitoring system without the use of an ankle bracelet, such as through biometric verification, etc.
  • The system does not activate solely because the individual 102 has entered a motor vehicle 105, but activates when the individual 102 has exceeded a predetermined speed. Once activated, the smartphone interfaces with the ankle bracelet to authenticate the individual, and then carries out a number of subsequent operations to determine whether the restricted individual 102 is driving the vehicle 105. System operation will be described in further detail with respect to FIGS. 2 and 3 .
  • Exemplary Monitoring System
  • FIG. 2 illustrates a block diagram of an exemplary monitoring system 200 according to embodiments of the present disclosure. The system includes a smart device 210 and an RF transmitter 280. In an embodiment, the RF transmitter 280 functions using RFID communications, such as near-field load modulation. The smart device 210 operates the substantial functionality of the monitoring system, whereas the RF transmitter 280 stores identification information of the individual 202, and is used to positively verify the presence and usage of the individual.
  • The smart device includes monitor processing 230 in the form of one or more hardware processors and/or circuits that performs the processing from the various additional device elements for determining whether the individual is in violation of the driving restrictions. Those additional device elements are connected to the monitor processing 230, and carry out several additional functions for supporting the monitor processing 230. For example, location 215 provides location information to the monitor processing 230. In an embodiment, the location 215 is a GNSS receiver that receives GNSS signals from a network of GNSS satellites, such as GPS. In other embodiments, the location 215 determines location without the use of GNSS satellite signals, such as by triangulation from signal received from nearby base stations and/or access points.
  • The speed 220 determines a speed with which the smart device 210 is moving. In an embodiment, speed 220 makes the speed determination based on information received from location 215, such as based on a change of GNSS position. However, in other embodiments, speed 220 determines the speed of the smart device 210 without the use of location information, such as by detecting accelerations of the smart device 210 via an accelerometer.
  • Operating alongside the monitor processing 230, application processing 255 operates other applications running on the smart device 210. Although any number of applications may be running on the smart device 210 at any given time, there are certain applications that are particularly pertinent to the present disclosure. For example, ride-sharing and ride-hailing apps, such as Uber™ or Lyft™, operate to request rides or taxi-like services. An application monitor 250 provides an interface between the monitor processing 230 and the application processing in order to provide information to the monitor processing 230 from one or more relevant applications operating in the application processing 255.
  • The smart device 210 also includes an input 235, by which the individual can directly provide certain information to the smart device, such as biometric information. Additionally, a transceiver 240 is connected with an antenna 245 that is used to communicate with outside devices, such as RF transmitter 280.
  • The RF transmitter 280 includes a transceiver 290 connected to an antenna for sending and receiving information from an outside device, such as smart device 210. The RF transmitter 280 also includes an Identification 295. The Identification 295 stores the unique identifier associated with the individual. In an embodiment, the unique identifier is globally unique.
  • In operation, the speed 220, alone or together with the location 215, determines a rate of speed of the smart device 210, and forwards the result to the monitor processing 230. As discussed above, the speed of the smart device 210 may be determined in a variety of different ways, including determining rate of change of GNSS position based on information received from location 215, as well as force measurements from one or more force detection sensors (e.g., accelerometer).
  • The monitor processing 230 determines, based on the received speed information, whether the smart device 210 is exceeding a predetermined threshold speed. If the monitor processing 230 determines that the threshold speed has been exceeded, the monitor processing carries out further steps to attempt to determine whether the individual associated with the smart device 210 is currently driving a motor vehicle, in violation of the prohibition from doing so.
  • To that end, the monitor processing 230 first verifies an identity of the individual. This ensures that the restricted individual is present with the device so as to prevent false positives, among other uses. In order to verify the identity of the individual, the monitor processing causes the transceiver 240 to transmit a signal to the RF transmitter 280. The transmitted signal is received by the RF transmitter 280, which causes the RF transmitter 280 to retrieve the unique identifier from the Identification 295. The RF transmitter then replies to the signal by sending the unique identifier back to the smart device 210. In an embodiment, the unique identifier is encoded prior to transmission.
  • In another embodiment, rather than being configured for RFID communication, the RF transmitter 280 is instead configured to communicate using another wireless communication protocol. An example of such a protocol is Bluetooth®, such as Bluetooth Low Energy (BLE). Bluetooth Low Energy is a wireless personal area network technology designed for low power consumption. Many mobile operating systems natively support BLE. When the transmitter 280 and the transceiver 240 are configured in this manner, the transmitter 280 periodically pulses a notification to the smart device 210. In order to conserve batter, this pulse is preferably sent relatively infrequently, but often enough to satisfactorily ensure that the user is present when the driving motion is detected. In an embodiment, the pulse is transmitted to the smart device every 4-6 minutes. As is understood from this example, the RF transmitter 280 can operate in a passive mode or an active mode. In the passive mode, the RF transmitter does not require a power source, and is instead activated passively by an outside device. In the active mode, the RF transmitter requires a power source in order to generate the signals transmitted, such as the pulse notifications described above.
  • Once received by the smart device 210, the monitor processing 230 makes a determination as to whether the received unique identifier matches that associated with the restricted individual. If there is no match, then the monitoring goes dormant until after the speed of the smart device has been below the predetermined speed threshold for longer than a predetermined duration, or until after a predetermined amount of time has passed since the monitoring went dormant. On the other hand, if there is a match, then the monitor processing 130 seeks out information to verify whether the restricted individual is operating a motor vehicle.
  • In the embodiment illustrated in FIG. 2 , the monitor processing 230 causes the application monitor 250 to attempt to retrieve information from one or more ride-sharing and/or ride-hailing applications running in the application processing 255. As discussed above, several applications exist that are available on smart devices for acquiring rides from third parties. Many of those applications, such as Uber and Lyft transmit a request along with a location of the individual. Many notifications are then exchanged between the smart device 210 and a server of the ride provider. Such notifications indicate that a ride has been scheduled, has picked up, has delivered, or informs as to a projected or final cost of the ride.
  • Upon receiving the instruction from the monitor processing 230, the application monitor 250 begins accessing memory registers and cache memory associated with the ride-sharing and/or ride-hailing applications on the phone in order to seek out any such notifications. In other embodiments, the application monitor may seek out the requested information in other manners, such as by monitoring device instructions, monitoring datastreams traversing a data bus or transmitted from the antenna 245, monitoring screen states, etc.
  • When relevant data is found, the application monitor 250 forwards the information to the monitor processing 230, which analyzes the received information. As part of this analysis, the monitor processing 230 attempts to determine whether the individual is using any of those applications to travel. The monitor processing 230 will examine numerous data points as part of this determination, and will preferably make a final determination based on an algorithm that takes into account numerous of the data points found. Ultimately, based on that algorithm, the monitor processing 230 will determine whether the individual is likely to be driving, or rather is likely to be riding as a passenger in a motor vehicle. Preferably, the monitor processing examines the data for the presence of a ride request, as well as a date/time stamp and/or identification information. Together, this information evidences that the request was made within a predetermined time of the drive detection, and is associated with the restricted individual.
  • In an embodiment, the algorithm may consist of calculating a weighted sum of different data points. For example, data points that evidence that the individual is using one of the riding applications being processed in application processing 255 will be assigned certain weights that differ from those data points that evidence against that determination. After averaging the weighted data points, the resulting weighted average is compared against a threshold value. If the weighted average exceeds the threshold, then the monitor processing 230 determines that the individual is utilizing one of the riding applications, and is not driving. As a result, no further action is taken until after a predetermined amount of time as elapsed, or until after the smart device is below the predetermined speed threshold for greater than a predetermined period of time.
  • On the other hand, if the monitor processing 230 determines based on the algorithm that the individual is unlikely to be utilizing a riding app, then the monitor processing 230 determines that the individual is likely driving. As a result of this determination, the monitor processing 230 generates an alert signal that includes a preset message and a location received from location 215, and causes the transceiver 240 to transmit the alert signal to appropriate authorities, notifying them of the likely violation and providing them with the location of the individual.
  • In embodiments, if the monitor processing 230 determines that the individual is not using one of the riding applications to travel, then the monitor processing can first seek out additional information from the individual before determining that the individual is violating his prohibition against driving. For example, after making the negative determination, the monitor processing 230 issues a notification to the individual that authorities will be alerted to a violation of the individual's prohibition against driving unless additional evidence is received to establish the contrary.
  • In response, the monitor processing 230 may be capable of, and configured to, analyze a wide variety of additional information received from the user. For example, the user may access the riding application and capture a screenshot showing relevant information relating to a current ride, such as date/time, destination, etc. The monitor processing 230 employs image processing, such as optical character recognition, to extract the relevant information from the image and update its determination regarding whether the individual is driving.
  • The monitor processing 230 may be configured to process a wide variety of additional information. For example, in some cases, the monitor processing 230 may allow for the individual to activate a camera of the smart device in order to take a picture of the individual's environment. Such a picture may show a bicycle or other non-motorized vehicle being used by the individual, or may show another individual driving an automobile in which the individual is a passenger. In order to decipher those images, the monitor processing 230 may be configured to employ pattern matching and image recognition in order to identify bicycle handle-bars and/or tire widths, a steering wheel and/or seat locations within an automobile, as well as to detect and identify faces. Through these capabilities, the monitor processing 230 is able to analyze a wide variety of information provided to it by the user in order to ensure accurate detection of a violation.
  • FIG. 3 illustrates a block diagram of an exemplary monitoring system 300, according to embodiments of the present disclosure. The monitoring system 300 does not require any communication with an outside device for verifying the identity of the individual, but rather is instead self-encapsulating. In the embodiment of FIG. 3 , the smart device 210 also includes an input sensor 365 and an authentication module 360.
  • Because the RF transmitter 180 is not available in this embodiment, the smart device 210 must verify the presence of the individual in an alternative manner. Thus, the smart device 210 prompts the user of the device to provide certain personal information using the input sensor 365. In various embodiments, the input sensor is any biometric sensor or manual input device. A manual input device allows the individual to enter personal verification data, such as name and unique identifier. However, a biometric sensor is more secure and less prone to faking, hacking, etc. After the input sensor 365 receives the input from the individual, the authentication module 360 compares the received information to previously-stored information. When the received information is biometric information, the authentication module 360 performs an analysis of the information in order to carry out a probabilistic comparison between the received biometric information and the previously-stored biometric information of the same type. Such comparison may include comparing voice prints, face prints, facial architectures, iris scans, etc. The result of the comparison is then acted upon in the manner already described with respect to the embodiment of FIG. 2 .
  • FIG. 4 illustrates a flowchart diagram of an exemplary monitoring method 400 according to embodiments of the present disclosure. In the method 400, the monitoring system monitors a speed of a device on which the monitoring system operates 410. While monitoring the speed, the system determines whether the speed of the device exceeds a predetermined threshold th 415. If the speed does not exceed the predetermined threshold (415—N), then functionality returns to speed monitoring 410.
  • If, on the other hand, the speed of the device exceeds the predetermined threshold (415—Y), the system identifies the individual 420. As discussed above, this is performed in one of several different ways, including requesting a unique identifier from an RFID transmitter, or by acquiring identification information from the user. Based on the received information, the system verifies whether the user is the restricted individual 425. If the user is not the restricted individual, then operation returns to speed detection 410. In an embodiment, there may be some predetermined time elapse or other trigger required before re-initiating the monitoring method.
  • If the user is the restricted individual, then the system attempts to acquire information from one or more relevant applications running on the device 430. During this step, the system will access various data sources associated with different applications on the device in order to gather relevant information that may evidence use or non-use of a ride-sharing or ride-hailing application. After gathering the relevant data, the monitoring system operates an algorithm 440 in order to determine whether the restricted user is driving 445. If it is determined that the restricted user is not driving (445—N), then functionality returns to speed detection 410. If, on the other hand, the algorithm determines that there is insufficient information to make a definitive determination with high certainty, then the individual is prompted for more information 460. After the restricted individual provides more information, such as in the manner described above, then the system makes an updated determination as to whether the individual is driving 445.
  • If the system determines that the restricted individual is driving (445— Y), then the system generates an alert containing the identification of the restricted individual and a location of the device, and transmits the alert to relevant authorities.
  • Exemplary Computer Implementation
  • It will be apparent to persons skilled in the relevant art(s) that various elements and features of the present disclosure, as described herein, can be implemented in hardware using analog and/or digital circuits, in software, through the execution of computer instructions by one or more general purpose or special-purpose processors, or as a combination of hardware and software.
  • The following description of a general purpose computer system is provided for the sake of completeness. Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system. For example, the method of FIG. 4 can be implemented in the environment of one or more computer systems or other processing systems. An example of such a computer system 500 is shown in FIG. 5 . One or more of the modules depicted in the previous figures can be at least partially implemented on one or more distinct computer systems 500.
  • Computer system 500 includes one or more processors, such as processor 504. Processor 504 can be a special purpose or a general purpose digital signal processor. Processor 504 is connected to a communication infrastructure 502 (for example, a bus or network). Various software implementations are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement the disclosure using other computer systems and/or computer architectures.
  • Computer system 500 also includes a main memory 506, preferably random access memory (RAM), and may also include a secondary memory 508. Secondary memory 508 may include, for example, a hard disk drive 510 and/or a removable storage drive 512, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like. Removable storage drive 512 reads from and/or writes to a removable storage unit 516 in a well-known manner. Removable storage unit 516 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to by removable storage drive 512. As will be appreciated by persons skilled in the relevant art(s), removable storage unit 516 includes a computer usable storage medium having stored therein computer software and/or data.
  • In alternative implementations, secondary memory 508 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 500. Such means may include, for example, a removable storage unit 518 and an interface 514. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and other removable storage units 518 and interfaces 514 which allow software and data to be transferred from removable storage unit 518 to computer system 500.
  • Computer system 500 may also include a communications interface 520. Communications interface 520 allows software and data to be transferred between computer system 500 and external devices. Examples of communications interface 520 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred via communications interface 520 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 520. These signals are provided to communications interface 520 via a communications path 522. Communications path 522 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels.
  • As used herein, the terms “computer program medium” and “computer readable medium” are used to generally refer to tangible storage media such as removable storage units 516 and 518 or a hard disk installed in hard disk drive 510. These computer program products are means for providing software to computer system 500.
  • Computer programs (also called computer control logic) are stored in main memory 506 and/or secondary memory 508. Computer programs may also be received via communications interface 520. Such computer programs, when executed, enable the computer system 500 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor 504 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of the computer system 500. Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded into computer system 500 using removable storage drive 512, interface 514, or communications interface 520.
  • In another embodiment, features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays. Implementation of a hardware state machine so as to perform the functions described herein will also be apparent to persons skilled in the relevant art(s).
  • CONCLUSION
  • It is to be appreciated that the Detailed Description section, and not the Abstract section, is intended to be used to interpret the claims. The Abstract section may set forth one or more, but not all exemplary embodiments, and thus, is not intended to limit the disclosure and the appended claims in any way.
  • The disclosure has been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries may be defined so long as the specified functions and relationships thereof are appropriately performed.
  • It will be apparent to those skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the disclosure. Thus, the disclosure should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (21)

1. (canceled)
2. A device, comprising:
a memory that stores authentication information of a user and a travel restriction;
a speed sensor configured to detect a movement speed of the device; and
one or more processors configured to:
detect that the movement speed of the device exceeds a predetermined threshold; and
activating a monitoring function in response to the detecting configured to verify that a restricted individual is not operating a motor vehicle.
3. The device of claim 2, wherein the one or more processors are further configured to verify a presence of a restricted individual in response to the detecting.
4. The device of claim 3, wherein the verifying includes:
transmitting a request to an external device for user authentication information;
receive, from the external device, a user identifier; and
verify an identify of the user as being the restricted individual based on the received user identifier.
5. The device of claim 4, wherein the verifying includes comparing the received user identifier to the stored authentication information.
6. The device of claim 4, wherein the one or more processors are further configured to:
in response to the verifying, obtain a location of the device;
compare the location to an acceptable location range; and
determine that the device is outside of the acceptable location range.
7. The device of claim 4, wherein the one or more processors are further configured to determine whether the restricted individual is a driver or a passenger in the motor vehicle.
8. The device of claim 7, wherein the determining includes accessing a ride-sharing, taxi, or other travel application running on the device.
9. A method, comprising:
detecting a movement speed of a device;
determining that the movement speed exceeds a predetermined threshold; and
activating a monitoring function in response to the detecting, the monitoring function configured to verify that a restricted individual is not operating a motor vehicle.
10. The method of claim 9, further comprising verifying a presence of a restricted individual in response to the detecting.
11. The method of claim 10, wherein the verifying includes:
transmitting a request to an external device for user authentication information;
receiving, from the external device, a user identifier; and
verifying an identity of the user as being the restricted individual based on the received user identifier.
12. The method of claim 11, wherein the verifying includes comparing the received user identifier to stored authentication information.
13. The method of claim 11, further comprising:
in response to the verifying, obtaining a location of the device;
comparing the location to an acceptable location range; and
determining that the device is outside of the acceptable location range.
14. The device of claim 11, further comprising determining whether the restricted individual is a driver or a passenger in the motor vehicle.
15. The method of claim 14, wherein the determining includes accessing a ride-sharing, taxi, or other travel application running on the device.
16. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed by at least one computing device, cause the at least one computing device to perform operations comprising:
detect a movement speed of a device;
determine that the movement speed exceeds a predetermined threshold; and
activate a monitoring function in response to the detecting, the monitoring function configured to verify that a restricted individual is not operating a motor vehicle.
17. The non-transitory computer-readable storage medium of claim 16, wherein the operations further comprise verifying a presence of a restricted individual in response to the detecting.
18. The non-transitory computer-readable storage medium of claim 17, wherein the verifying includes:
transmitting a request to an external device for user authentication information;
receiving, from the external device, a user identifier; and
verifying an identity of the user as being the restricted individual based on the received user identifier.
19. The non-transitory computer-readable storage medium of claim 18, wherein the verifying includes comparing the received user identifier to stored authentication information.
20. The non-transitory computer-readable storage medium of claim 18, wherein the operations further comprise:
in response to the verifying, obtaining a location of the device;
comparing the location to an acceptable location range; and
determining that the device is outside of the acceptable location range.
21. The non-transitory computer-readable storage medium of claim 18, wherein the operations further comprise determining whether the restricted individual is a driver or a passenger in the motor vehicle.
US18/221,249 2017-07-24 2023-07-12 System and method for monitoring a former convict of an intoxication-related offense Pending US20240022873A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/221,249 US20240022873A1 (en) 2017-07-24 2023-07-12 System and method for monitoring a former convict of an intoxication-related offense

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US15/657,935 US9878660B1 (en) 2017-07-24 2017-07-24 System and method for monitoring a former convict of an intoxication-related offense
US15/874,528 US10464474B2 (en) 2017-07-24 2018-01-18 System and method for monitoring a former convict of an intoxication-related offense
US16/653,524 US10759335B2 (en) 2017-07-24 2019-10-15 System and method for monitoring a former convict of an intoxication-related offense
US17/006,412 US11285867B2 (en) 2017-07-24 2020-08-28 System and method for monitoring a former convict of an intoxication-related offense
US17/703,662 US11743684B2 (en) 2017-07-24 2022-03-24 System and method for monitoring a former convict of an intoxication-related offense
US18/221,249 US20240022873A1 (en) 2017-07-24 2023-07-12 System and method for monitoring a former convict of an intoxication-related offense

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US17/703,662 Continuation US11743684B2 (en) 2017-07-24 2022-03-24 System and method for monitoring a former convict of an intoxication-related offense

Publications (1)

Publication Number Publication Date
US20240022873A1 true US20240022873A1 (en) 2024-01-18

Family

ID=61005236

Family Applications (6)

Application Number Title Priority Date Filing Date
US15/657,935 Active US9878660B1 (en) 2017-07-24 2017-07-24 System and method for monitoring a former convict of an intoxication-related offense
US15/874,528 Active US10464474B2 (en) 2017-07-24 2018-01-18 System and method for monitoring a former convict of an intoxication-related offense
US16/653,524 Active US10759335B2 (en) 2017-07-24 2019-10-15 System and method for monitoring a former convict of an intoxication-related offense
US17/006,412 Active US11285867B2 (en) 2017-07-24 2020-08-28 System and method for monitoring a former convict of an intoxication-related offense
US17/703,662 Active US11743684B2 (en) 2017-07-24 2022-03-24 System and method for monitoring a former convict of an intoxication-related offense
US18/221,249 Pending US20240022873A1 (en) 2017-07-24 2023-07-12 System and method for monitoring a former convict of an intoxication-related offense

Family Applications Before (5)

Application Number Title Priority Date Filing Date
US15/657,935 Active US9878660B1 (en) 2017-07-24 2017-07-24 System and method for monitoring a former convict of an intoxication-related offense
US15/874,528 Active US10464474B2 (en) 2017-07-24 2018-01-18 System and method for monitoring a former convict of an intoxication-related offense
US16/653,524 Active US10759335B2 (en) 2017-07-24 2019-10-15 System and method for monitoring a former convict of an intoxication-related offense
US17/006,412 Active US11285867B2 (en) 2017-07-24 2020-08-28 System and method for monitoring a former convict of an intoxication-related offense
US17/703,662 Active US11743684B2 (en) 2017-07-24 2022-03-24 System and method for monitoring a former convict of an intoxication-related offense

Country Status (1)

Country Link
US (6) US9878660B1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10721624B2 (en) 2017-02-17 2020-07-21 Global Tel*Link Corporation Security system for inmate wireless devices
US9878660B1 (en) 2017-07-24 2018-01-30 Global Tel*Link Corporation System and method for monitoring a former convict of an intoxication-related offense
US11801013B2 (en) 2020-11-12 2023-10-31 Consumer Safety Technology, Llc Method and system of deploying portable breath alcohol monitoring device
US11393264B1 (en) * 2021-03-29 2022-07-19 Denso International America, Inc. Apparatus and system for utilizing a mobile device in a vehicle for notifications

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8280682B2 (en) * 2000-12-15 2012-10-02 Tvipr, Llc Device for monitoring movement of shipped goods
US5706199A (en) * 1995-07-17 1998-01-06 Cummins Engine Company, Inc. System for controlling engine speed in response to detection of vehicle speed signal tampering
DE19846803C1 (en) * 1998-10-10 2000-09-07 Daimler Chrysler Ag Process for establishing access authorization to a motor-driven vehicle
US7171331B2 (en) * 2001-12-17 2007-01-30 Phatrat Technology, Llc Shoes employing monitoring devices, and associated methods
US7327242B2 (en) * 2004-09-16 2008-02-05 International Business Machines Corporation Limiting and controlling motor vehicle operation functions enabled for each of a group of drivers of the vehicle
WO2006047877A1 (en) * 2004-11-03 2006-05-11 Thomas Dewaal Method system, and apparatus for monitoring vehicle operation
CN100593487C (en) * 2005-07-13 2010-03-10 小松优特力株式会社 Operation permission control device and machine having the same mounted thereon
US7489249B2 (en) * 2005-08-11 2009-02-10 Dmatek Ltd. Apparatus and method for determining the attitude of a remotely monitored device
WO2007094988A2 (en) * 2006-02-13 2007-08-23 All Protect Llc Method and system for controlling a vehicle given to a third party
US9848289B2 (en) * 2006-03-08 2017-12-19 Octo Advisory Inc. Safe driving monitoring system
JP2009029233A (en) * 2007-07-26 2009-02-12 Omron Corp Entry system for vehicle
KR101297163B1 (en) * 2008-10-28 2013-08-21 에스케이플래닛 주식회사 A traffic information supply system using personal area network, a traffic information supply method thereby, a service server, a relay method, an application server, a mobile terminal, a navigation terminal, an execution method and a storage means
US8587403B2 (en) * 2009-06-18 2013-11-19 Lear Corporation Method and system of determining and preventing relay attack for passive entry system
US20110039581A1 (en) * 2009-08-12 2011-02-17 Yigang Cai Method and apparatus for restricting the use of a mobile telecommunications device by a vehicle's driver
US20110071475A1 (en) * 2009-09-18 2011-03-24 Becton, Dickinson And Company Outer cover of a pen needle for a drug delivery pen
US20110121975A1 (en) * 2009-11-25 2011-05-26 Dasher Dale L Mobile system for probation release monitoring programs and other security-oriented applications
JP5685073B2 (en) * 2010-12-17 2015-03-18 株式会社東海理化電機製作所 Electronic key system
US20170039784A1 (en) * 2012-06-21 2017-02-09 Autobrain Llc Automobile diagnostic device using dynamic telematic data parsing
US9002317B2 (en) * 2012-09-27 2015-04-07 Pangaea Services, Inc. Method and apparatus for active defense and emergency response
US9135420B2 (en) * 2013-02-06 2015-09-15 GM Global Technology Operations LLC Biometric data-driven application of vehicle operation settings
US9679430B2 (en) * 2013-03-08 2017-06-13 Lear Corporation Vehicle remote function system and method for determining vehicle FOB locations using adaptive filtering
US9135758B2 (en) * 2013-05-13 2015-09-15 Moj.Io Inc. Vehicle status notification and operator identification
US9272713B1 (en) * 2013-06-24 2016-03-01 Imperium Technologies LLC Compliance device, system and method for machine operation
US20150025917A1 (en) * 2013-07-15 2015-01-22 Advanced Insurance Products & Services, Inc. System and method for determining an underwriting risk, risk score, or price of insurance using cognitive information
US9148869B2 (en) * 2013-10-15 2015-09-29 The Toronto-Dominion Bank Location-based account activity alerts
JP6162071B2 (en) * 2014-04-11 2017-07-12 株式会社Nttドコモ Locking control device, locking control system, and locking control method
US9355551B2 (en) * 2014-10-21 2016-05-31 Toyota Motor Engineering & Manufacturing North America, Inc. Smart key locator
US9928735B2 (en) * 2015-02-09 2018-03-27 Operr Technologies, Inc. Systems and methods for traffic violation avoidance
KR20160107636A (en) * 2015-03-04 2016-09-19 엘지전자 주식회사 Device for preventing accident of vehicle and operating method thereof
TWI547831B (en) * 2015-07-06 2016-09-01 Dexin Corp An input device with a Bluetooth module and a method of operating the same
KR101798517B1 (en) * 2015-12-09 2017-11-16 현대자동차주식회사 Location information system using vehicle and smart device and method for controlling the same
US9878660B1 (en) 2017-07-24 2018-01-30 Global Tel*Link Corporation System and method for monitoring a former convict of an intoxication-related offense

Also Published As

Publication number Publication date
US9878660B1 (en) 2018-01-30
US11743684B2 (en) 2023-08-29
US10759335B2 (en) 2020-09-01
US10464474B2 (en) 2019-11-05
US20210046865A1 (en) 2021-02-18
US20200039428A1 (en) 2020-02-06
US20220266746A1 (en) 2022-08-25
US20190023177A1 (en) 2019-01-24
US11285867B2 (en) 2022-03-29

Similar Documents

Publication Publication Date Title
US11743684B2 (en) System and method for monitoring a former convict of an intoxication-related offense
US11866007B2 (en) Blockchain authentication of a vehicle rider
CN112622917B (en) System and method for authenticating an occupant of a vehicle
US20200178030A1 (en) System and method for controlling mobile services using sensor information
US20200082188A1 (en) Methods and systems for real-time monitoring of vehicles
CN104871147B (en) The user in vehicle is detected to the method, apparatus and system of wireless device association
CN109636368B (en) Internet taxi taking method and device, taxi taking equipment and computer readable storage medium
KR101545595B1 (en) Vehicle control apparatus and method thereof
WO2021121273A1 (en) Authentication method and medium and electronic apparatus thereof
US20130265178A1 (en) Vehicle-related messaging methods and systems
US20200074065A1 (en) Integrated identification and authentication for car sharing and taxi service
US20190394159A1 (en) Vehicle identification and device communication through directional wireless signaling
US20180255269A1 (en) System, device, and method for evidentiary management of digital data associated with a localized miranda-type process
US20220142585A1 (en) Method and system of deploying portable breath alcohol monitoring device
US20200380533A1 (en) Driver verification for ride hailing service
KR20210111932A (en) System and method for handling lost item in autonomous vehicle
US20210377383A1 (en) Assembly and method for preventing wireless communication while driving
US11729307B2 (en) Control of smartphone for drivers while driving
CN113734173B (en) Intelligent vehicle monitoring method, device and storage medium
KR20170041480A (en) Method and computer program for providing image information by taxi all-in-one system
KR20210144076A (en) Vehicle and method for supporting safety driving thereof
US10710553B2 (en) Vehicle control device having user authentication unit performing authentication of user of vehicle and vehicle use permission unit permitting use of vehicle by user
US20230237137A1 (en) Terminal device, method, and storage medium
US20240349233A1 (en) Generating and updating electronic authorization content using automated positioning in a physical environment
JP2024051709A (en) Left-in state in vehicle detection system and server

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: TEXAS CAPITAL BANK, AS COLLATERAL AGENT, TEXAS

Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, INC.;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:068510/0764

Effective date: 20240806