US20240022873A1 - System and method for monitoring a former convict of an intoxication-related offense - Google Patents
System and method for monitoring a former convict of an intoxication-related offense Download PDFInfo
- Publication number
- US20240022873A1 US20240022873A1 US18/221,249 US202318221249A US2024022873A1 US 20240022873 A1 US20240022873 A1 US 20240022873A1 US 202318221249 A US202318221249 A US 202318221249A US 2024022873 A1 US2024022873 A1 US 2024022873A1
- Authority
- US
- United States
- Prior art keywords
- individual
- verifying
- restricted
- response
- motor vehicle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 30
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000035987 intoxication Effects 0.000 title description 5
- 231100000566 intoxication Toxicity 0.000 title description 5
- 230000006870 function Effects 0.000 claims description 11
- 230000004044 response Effects 0.000 claims description 10
- 230000003213 activating effect Effects 0.000 claims 2
- 238000012545 processing Methods 0.000 description 44
- 238000004891 communication Methods 0.000 description 17
- 238000004590 computer program Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 210000003423 ankle Anatomy 0.000 description 6
- 238000001514 detection method Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012806 monitoring device Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- LFQSCWFLJHTTHZ-UHFFFAOYSA-N Ethanol Chemical compound CCO LFQSCWFLJHTTHZ-UHFFFAOYSA-N 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012015 optical character recognition Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
- H04W4/027—Services making use of location information using location based information parameters using movement velocity, acceleration information
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60Q—ARRANGEMENT OF SIGNALLING OR LIGHTING DEVICES, THE MOUNTING OR SUPPORTING THEREOF OR CIRCUITS THEREFOR, FOR VEHICLES IN GENERAL
- B60Q1/00—Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor
- B60Q1/26—Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic
- B60Q1/50—Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking
- B60Q1/509—Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking specific to unauthorised use, e.g. for indicating stolen vehicles or infringements of traffic rules
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/017—Detecting movement of traffic to be counted or controlled identifying vehicles
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/017—Detecting movement of traffic to be counted or controlled identifying vehicles
- G08G1/0175—Detecting movement of traffic to be counted or controlled identifying vehicles by photographing vehicles, e.g. when violating traffic rules
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/052—Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/53—Network services using third party service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
Definitions
- This disclosure relates to a system for allowing an offender to assist with a booking process in order to streamline the booking process, as well as to free up resources for officers to perform other more critical tasks.
- Former detainees who have been convicted of certain intoxication-related crimes, may be prohibited from operating a motor vehicle. Previously, there was no way to determine whether such an individual was operating a motor vehicle, unless that individual was pulled over. Although the causes may vary for pulling over a motorist, there is a high likelihood that a former convict of an intoxication-related crime will be intoxicated again, and thus may already be intoxicated at the time of being stopped.
- FIG. 1 illustrates a diagram of an exemplary monitoring environment according to embodiments of the present disclosure.
- FIG. 2 illustrates a block diagram of an exemplary monitoring system according to embodiments of the present disclosure.
- FIG. 3 illustrates a block diagram of an exemplary monitoring system, according to embodiments of the present disclosure.
- FIG. 4 illustrates an exemplary monitoring method according to embodiments of the present disclosure.
- FIG. 5 illustrates a block diagram of a general purpose computer that may be used to perform various aspects of the present disclosure.
- Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors.
- a machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device).
- a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others.
- firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
- any reference to the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof.
- each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module.
- multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
- This disclosure pertains to a system for preventing those who have been convicted of select intoxication-related offenses from operating a motor vehicle when they are prohibited from doing so.
- an individual has been convicted of violating certain intoxication laws, such as driving under the influence of alcohol, etc., that person may be restricted from driving for public safety purposes.
- certain intoxication laws such as driving under the influence of alcohol, etc.
- a more effective system for preventing restricted operation of a motor vehicle is described herein.
- the system activates upon detection that the user is traveling faster than a predetermined rate of speed. Once activated, the system uses either RFID or biometrics to verify the identity of the individual. Then, the system acquires information from an application on the individual's phone to verify that the individual is taking transportation from a third-party. Alternatively, the system can analyze photo or other evidence to verify that the individual is not driving. When the system is unable to gain these assurances, authorities can be notified.
- FIG. 1 illustrates a diagram of an exemplary environment 100 in which the monitoring system operates.
- the restricted individual 102 is in possession of a smartphone or similar device 110 .
- the individual 102 is fitted with an ankle bracelet 180 or other monitoring device.
- Ankle bracelets are commonly affixed to certain offenders for a variety of reasons, such as to monitor the individual's location to being within a restricted area.
- the ankle bracelet in this embodiment serves a different purpose.
- the ankle bracelet stores a unique identifier associated specifically with the individual. This positively identifies the individual to the monitoring system running on the smartphone device 110 .
- the individual can be identified to the monitoring system without the use of an ankle bracelet, such as through biometric verification, etc.
- the system does not activate solely because the individual 102 has entered a motor vehicle 105 , but activates when the individual 102 has exceeded a predetermined speed.
- the smartphone interfaces with the ankle bracelet to authenticate the individual, and then carries out a number of subsequent operations to determine whether the restricted individual 102 is driving the vehicle 105 . System operation will be described in further detail with respect to FIGS. 2 and 3 .
- FIG. 2 illustrates a block diagram of an exemplary monitoring system 200 according to embodiments of the present disclosure.
- the system includes a smart device 210 and an RF transmitter 280 .
- the RF transmitter 280 functions using RFID communications, such as near-field load modulation.
- the smart device 210 operates the substantial functionality of the monitoring system, whereas the RF transmitter 280 stores identification information of the individual 202 , and is used to positively verify the presence and usage of the individual.
- the smart device includes monitor processing 230 in the form of one or more hardware processors and/or circuits that performs the processing from the various additional device elements for determining whether the individual is in violation of the driving restrictions. Those additional device elements are connected to the monitor processing 230 , and carry out several additional functions for supporting the monitor processing 230 .
- location 215 provides location information to the monitor processing 230 .
- the location 215 is a GNSS receiver that receives GNSS signals from a network of GNSS satellites, such as GPS.
- the location 215 determines location without the use of GNSS satellite signals, such as by triangulation from signal received from nearby base stations and/or access points.
- the speed 220 determines a speed with which the smart device 210 is moving. In an embodiment, speed 220 makes the speed determination based on information received from location 215 , such as based on a change of GNSS position. However, in other embodiments, speed 220 determines the speed of the smart device 210 without the use of location information, such as by detecting accelerations of the smart device 210 via an accelerometer.
- application processing 255 operates other applications running on the smart device 210 .
- any number of applications may be running on the smart device 210 at any given time, there are certain applications that are particularly pertinent to the present disclosure.
- ride-sharing and ride-hailing apps such as UberTM or LyftTM, operate to request rides or taxi-like services.
- An application monitor 250 provides an interface between the monitor processing 230 and the application processing in order to provide information to the monitor processing 230 from one or more relevant applications operating in the application processing 255 .
- the smart device 210 also includes an input 235 , by which the individual can directly provide certain information to the smart device, such as biometric information. Additionally, a transceiver 240 is connected with an antenna 245 that is used to communicate with outside devices, such as RF transmitter 280 .
- the RF transmitter 280 includes a transceiver 290 connected to an antenna for sending and receiving information from an outside device, such as smart device 210 .
- the RF transmitter 280 also includes an Identification 295 .
- the Identification 295 stores the unique identifier associated with the individual. In an embodiment, the unique identifier is globally unique.
- the speed 220 determines a rate of speed of the smart device 210 , and forwards the result to the monitor processing 230 .
- the speed of the smart device 210 may be determined in a variety of different ways, including determining rate of change of GNSS position based on information received from location 215 , as well as force measurements from one or more force detection sensors (e.g., accelerometer).
- the monitor processing 230 determines, based on the received speed information, whether the smart device 210 is exceeding a predetermined threshold speed. If the monitor processing 230 determines that the threshold speed has been exceeded, the monitor processing carries out further steps to attempt to determine whether the individual associated with the smart device 210 is currently driving a motor vehicle, in violation of the prohibition from doing so.
- the monitor processing 230 first verifies an identity of the individual. This ensures that the restricted individual is present with the device so as to prevent false positives, among other uses.
- the monitor processing causes the transceiver 240 to transmit a signal to the RF transmitter 280 .
- the transmitted signal is received by the RF transmitter 280 , which causes the RF transmitter 280 to retrieve the unique identifier from the Identification 295 .
- the RF transmitter replies to the signal by sending the unique identifier back to the smart device 210 .
- the unique identifier is encoded prior to transmission.
- the RF transmitter 280 is instead configured to communicate using another wireless communication protocol.
- An example of such a protocol is Bluetooth®, such as Bluetooth Low Energy (BLE).
- Bluetooth Low Energy is a wireless personal area network technology designed for low power consumption. Many mobile operating systems natively support BLE.
- the transmitter 280 periodically pulses a notification to the smart device 210 . In order to conserve batter, this pulse is preferably sent relatively infrequently, but often enough to satisfactorily ensure that the user is present when the driving motion is detected. In an embodiment, the pulse is transmitted to the smart device every 4-6 minutes.
- the RF transmitter 280 can operate in a passive mode or an active mode. In the passive mode, the RF transmitter does not require a power source, and is instead activated passively by an outside device. In the active mode, the RF transmitter requires a power source in order to generate the signals transmitted, such as the pulse notifications described above.
- the monitor processing 230 makes a determination as to whether the received unique identifier matches that associated with the restricted individual. If there is no match, then the monitoring goes dormant until after the speed of the smart device has been below the predetermined speed threshold for longer than a predetermined duration, or until after a predetermined amount of time has passed since the monitoring went dormant. On the other hand, if there is a match, then the monitor processing 130 seeks out information to verify whether the restricted individual is operating a motor vehicle.
- the monitor processing 230 causes the application monitor 250 to attempt to retrieve information from one or more ride-sharing and/or ride-hailing applications running in the application processing 255 .
- ride-sharing and/or ride-hailing applications running in the application processing 255 .
- many of those applications such as Uber and Lyft transmit a request along with a location of the individual.
- Many notifications are then exchanged between the smart device 210 and a server of the ride provider. Such notifications indicate that a ride has been scheduled, has picked up, has delivered, or informs as to a projected or final cost of the ride.
- the application monitor 250 Upon receiving the instruction from the monitor processing 230 , the application monitor 250 begins accessing memory registers and cache memory associated with the ride-sharing and/or ride-hailing applications on the phone in order to seek out any such notifications. In other embodiments, the application monitor may seek out the requested information in other manners, such as by monitoring device instructions, monitoring datastreams traversing a data bus or transmitted from the antenna 245 , monitoring screen states, etc.
- the application monitor 250 forwards the information to the monitor processing 230 , which analyzes the received information. As part of this analysis, the monitor processing 230 attempts to determine whether the individual is using any of those applications to travel. The monitor processing 230 will examine numerous data points as part of this determination, and will preferably make a final determination based on an algorithm that takes into account numerous of the data points found. Ultimately, based on that algorithm, the monitor processing 230 will determine whether the individual is likely to be driving, or rather is likely to be riding as a passenger in a motor vehicle. Preferably, the monitor processing examines the data for the presence of a ride request, as well as a date/time stamp and/or identification information. Together, this information evidences that the request was made within a predetermined time of the drive detection, and is associated with the restricted individual.
- the algorithm may consist of calculating a weighted sum of different data points. For example, data points that evidence that the individual is using one of the riding applications being processed in application processing 255 will be assigned certain weights that differ from those data points that evidence against that determination. After averaging the weighted data points, the resulting weighted average is compared against a threshold value. If the weighted average exceeds the threshold, then the monitor processing 230 determines that the individual is utilizing one of the riding applications, and is not driving. As a result, no further action is taken until after a predetermined amount of time as elapsed, or until after the smart device is below the predetermined speed threshold for greater than a predetermined period of time.
- the monitor processing 230 determines based on the algorithm that the individual is unlikely to be utilizing a riding app, then the monitor processing 230 determines that the individual is likely driving. As a result of this determination, the monitor processing 230 generates an alert signal that includes a preset message and a location received from location 215 , and causes the transceiver 240 to transmit the alert signal to appropriate authorities, notifying them of the likely violation and providing them with the location of the individual.
- the monitor processing 230 determines that the individual is not using one of the riding applications to travel, then the monitor processing can first seek out additional information from the individual before determining that the individual is violating his prohibition against driving. For example, after making the negative determination, the monitor processing 230 issues a notification to the individual that authorities will be alerted to a violation of the individual's prohibition against driving unless additional evidence is received to establish the contrary.
- the monitor processing 230 may be capable of, and configured to, analyze a wide variety of additional information received from the user.
- the user may access the riding application and capture a screenshot showing relevant information relating to a current ride, such as date/time, destination, etc.
- the monitor processing 230 employs image processing, such as optical character recognition, to extract the relevant information from the image and update its determination regarding whether the individual is driving.
- the monitor processing 230 may be configured to process a wide variety of additional information.
- the monitor processing 230 may allow for the individual to activate a camera of the smart device in order to take a picture of the individual's environment. Such a picture may show a bicycle or other non-motorized vehicle being used by the individual, or may show another individual driving an automobile in which the individual is a passenger.
- the monitor processing 230 may be configured to employ pattern matching and image recognition in order to identify bicycle handle-bars and/or tire widths, a steering wheel and/or seat locations within an automobile, as well as to detect and identify faces. Through these capabilities, the monitor processing 230 is able to analyze a wide variety of information provided to it by the user in order to ensure accurate detection of a violation.
- FIG. 3 illustrates a block diagram of an exemplary monitoring system 300 , according to embodiments of the present disclosure.
- the monitoring system 300 does not require any communication with an outside device for verifying the identity of the individual, but rather is instead self-encapsulating.
- the smart device 210 also includes an input sensor 365 and an authentication module 360 .
- the smart device 210 must verify the presence of the individual in an alternative manner. Thus, the smart device 210 prompts the user of the device to provide certain personal information using the input sensor 365 .
- the input sensor is any biometric sensor or manual input device.
- a manual input device allows the individual to enter personal verification data, such as name and unique identifier.
- a biometric sensor is more secure and less prone to faking, hacking, etc.
- the authentication module 360 compares the received information to previously-stored information.
- the authentication module 360 performs an analysis of the information in order to carry out a probabilistic comparison between the received biometric information and the previously-stored biometric information of the same type. Such comparison may include comparing voice prints, face prints, facial architectures, iris scans, etc. The result of the comparison is then acted upon in the manner already described with respect to the embodiment of FIG. 2 .
- FIG. 4 illustrates a flowchart diagram of an exemplary monitoring method 400 according to embodiments of the present disclosure.
- the monitoring system monitors a speed of a device on which the monitoring system operates 410 . While monitoring the speed, the system determines whether the speed of the device exceeds a predetermined threshold th 415 . If the speed does not exceed the predetermined threshold ( 415 —N), then functionality returns to speed monitoring 410 .
- the system identifies the individual 420 . As discussed above, this is performed in one of several different ways, including requesting a unique identifier from an RFID transmitter, or by acquiring identification information from the user. Based on the received information, the system verifies whether the user is the restricted individual 425 . If the user is not the restricted individual, then operation returns to speed detection 410 . In an embodiment, there may be some predetermined time elapse or other trigger required before re-initiating the monitoring method.
- the system attempts to acquire information from one or more relevant applications running on the device 430 . During this step, the system will access various data sources associated with different applications on the device in order to gather relevant information that may evidence use or non-use of a ride-sharing or ride-hailing application. After gathering the relevant data, the monitoring system operates an algorithm 440 in order to determine whether the restricted user is driving 445 . If it is determined that the restricted user is not driving ( 445 —N), then functionality returns to speed detection 410 . If, on the other hand, the algorithm determines that there is insufficient information to make a definitive determination with high certainty, then the individual is prompted for more information 460 . After the restricted individual provides more information, such as in the manner described above, then the system makes an updated determination as to whether the individual is driving 445 .
- the system determines that the restricted individual is driving ( 445 — Y)
- the system If the system determines that the restricted individual is driving ( 445 — Y), then the system generates an alert containing the identification of the restricted individual and a location of the device, and transmits the alert to relevant authorities.
- Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system.
- the method of FIG. 4 can be implemented in the environment of one or more computer systems or other processing systems.
- An example of such a computer system 500 is shown in FIG. 5 .
- One or more of the modules depicted in the previous figures can be at least partially implemented on one or more distinct computer systems 500 .
- Computer system 500 includes one or more processors, such as processor 504 .
- Processor 504 can be a special purpose or a general purpose digital signal processor.
- Processor 504 is connected to a communication infrastructure 502 (for example, a bus or network).
- a communication infrastructure 502 for example, a bus or network.
- Computer system 500 also includes a main memory 506 , preferably random access memory (RAM), and may also include a secondary memory 508 .
- Secondary memory 508 may include, for example, a hard disk drive 510 and/or a removable storage drive 512 , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like.
- Removable storage drive 512 reads from and/or writes to a removable storage unit 516 in a well-known manner.
- Removable storage unit 516 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to by removable storage drive 512 .
- removable storage unit 516 includes a computer usable storage medium having stored therein computer software and/or data.
- secondary memory 508 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 500 .
- Such means may include, for example, a removable storage unit 518 and an interface 514 .
- Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and other removable storage units 518 and interfaces 514 which allow software and data to be transferred from removable storage unit 518 to computer system 500 .
- Computer system 500 may also include a communications interface 520 .
- Communications interface 520 allows software and data to be transferred between computer system 500 and external devices. Examples of communications interface 520 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc.
- Software and data transferred via communications interface 520 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 520 . These signals are provided to communications interface 520 via a communications path 522 .
- Communications path 522 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels.
- computer program medium and “computer readable medium” are used to generally refer to tangible storage media such as removable storage units 516 and 518 or a hard disk installed in hard disk drive 510 . These computer program products are means for providing software to computer system 500 .
- Computer programs are stored in main memory 506 and/or secondary memory 508 . Computer programs may also be received via communications interface 520 . Such computer programs, when executed, enable the computer system 500 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor 504 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of the computer system 500 . Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded into computer system 500 using removable storage drive 512 , interface 514 , or communications interface 520 .
- features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays.
- ASICs application-specific integrated circuits
- gate arrays gate arrays
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mechanical Engineering (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
- Traffic Control Systems (AREA)
- Telephone Function (AREA)
Abstract
A system and method are disclosed for preventing a restricted individual from operating a motor vehicle. The system monitors a speed of the individual via a smart device associated with the individual. The system activates a monitoring function based on a detected speed of the device, which may evidence the individual riding in a motor vehicle. The system them verifies that the user of the device is the restricted individual through a variety of different identification methods. Once identified, the system accesses various data sources associated with one or more ride applications running on the smart device in order to determine whether the restricted individual has requested a ride from a third party during a relevant time period. After analyzing the data, a determination is made as to whether the individual is driving, or whether more information is needed.
Description
- This application is a continuation of U.S. patent application Ser. No. 17/703,662 filed Mar. 24, 2022, which is a continuation of U.S. patent application Ser. No. 17/006,412 filed Aug. 28, 2020, now U.S. Pat. No. 11,285,867, which is a continuation of U.S. patent application Ser. No. 16/653,524 filed Oct. 15, 2019, now U.S. Pat. No. 10,759,335, which is a continuation of U.S. patent application Ser. No. 15/874,528, filed on Jan. 18, 2018, now U.S. Pat. No. 10,464,474, which is a continuation of U.S. patent application Ser. No. 15/657,935, filed on Jul. 24, 2017, now U.S. Pat. No. 9,878,660, which are incorporated by reference herein in their entireties.
- This disclosure relates to a system for allowing an offender to assist with a booking process in order to streamline the booking process, as well as to free up resources for officers to perform other more critical tasks.
- Former detainees, who have been convicted of certain intoxication-related crimes, may be prohibited from operating a motor vehicle. Previously, there was no way to determine whether such an individual was operating a motor vehicle, unless that individual was pulled over. Although the causes may vary for pulling over a motorist, there is a high likelihood that a former convict of an intoxication-related crime will be intoxicated again, and thus may already be intoxicated at the time of being stopped.
- The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate embodiments of the present disclosure and, together with the description, further serve to explain the principles of the disclosure and to enable a person skilled in the pertinent art to make and use the embodiments.
-
FIG. 1 illustrates a diagram of an exemplary monitoring environment according to embodiments of the present disclosure. -
FIG. 2 illustrates a block diagram of an exemplary monitoring system according to embodiments of the present disclosure. -
FIG. 3 illustrates a block diagram of an exemplary monitoring system, according to embodiments of the present disclosure. -
FIG. 4 illustrates an exemplary monitoring method according to embodiments of the present disclosure. -
FIG. 5 illustrates a block diagram of a general purpose computer that may be used to perform various aspects of the present disclosure. - The present disclosure will be described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left most digit(s) of a reference number identifies the drawing in which the reference number first appears.
- The following Detailed Description refers to accompanying drawings to illustrate exemplary embodiments consistent with the disclosure. References in the Detailed Description to “one exemplary embodiment,” “an exemplary embodiment,” “an example exemplary embodiment,” etc., indicate that the exemplary embodiment described may include a particular feature, structure, or characteristic, but every exemplary embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same exemplary embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an exemplary embodiment, it is within the knowledge of those skilled in the relevant art(s) to affect such feature, structure, or characteristic in connection with other exemplary embodiments whether or not explicitly described.
- The exemplary embodiments described herein are provided for illustrative purposes, and are not limiting. Other exemplary embodiments are possible, and modifications may be made to the exemplary embodiments within the spirit and scope of the disclosure. Therefore, the Detailed Description is not meant to limit the disclosure. Rather, the scope of the disclosure is defined only in accordance with the following claims and their equivalents.
- Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others. Further, firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
- For purposes of this discussion, any reference to the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof. In addition, it will be understood that each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module. Conversely, multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
- The following Detailed Description of the exemplary embodiments will so fully reveal the general nature of the disclosure that others can, by applying knowledge of those skilled in relevant art(s), readily modify and/or customize for various applications such exemplary embodiments, without undue experimentation, without departing from the spirit and scope of the disclosure. Therefore, such modifications are intended to be within the meaning and plurality of equivalents of the exemplary embodiments based upon the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by those skilled in relevant art(s) in light of the teachings herein.
- This disclosure pertains to a system for preventing those who have been convicted of select intoxication-related offenses from operating a motor vehicle when they are prohibited from doing so. Typically, when an individual has been convicted of violating certain intoxication laws, such as driving under the influence of alcohol, etc., that person may be restricted from driving for public safety purposes. Unfortunately, barring some extreme exceptions, there are not readily available methods to ensure that that individual does not ignore that prohibition against driving.
- For example, there currently exists a system in which an electrical breathalyzer device is wired to a starting apparatus of the individual's vehicle. The automobile will only start after the individual blows into the breathalyzer, and the individual's breath has been analyzed and falls below the predetermined blood-alcohol content (BAC) threshold. However, there are significant problems associated with this system. First, this only prevents the individual from operating his/her own vehicle, and does nothing to prevent the individual from operating a rented or friend's vehicle. Additionally, since there is currently no means for extracting biometric information from a person's breath, any individual could blow into the breathalyzer in place of the restricted individual, thereby subverting the system.
- In light of the above, a more effective system for preventing restricted operation of a motor vehicle is described herein. The system activates upon detection that the user is traveling faster than a predetermined rate of speed. Once activated, the system uses either RFID or biometrics to verify the identity of the individual. Then, the system acquires information from an application on the individual's phone to verify that the individual is taking transportation from a third-party. Alternatively, the system can analyze photo or other evidence to verify that the individual is not driving. When the system is unable to gain these assurances, authorities can be notified. These, and other aspects, are described in detail below.
-
FIG. 1 illustrates a diagram of anexemplary environment 100 in which the monitoring system operates. In an embodiment, the restrictedindividual 102 is in possession of a smartphone orsimilar device 110. Additionally, the individual 102 is fitted with anankle bracelet 180 or other monitoring device. Ankle bracelets are commonly affixed to certain offenders for a variety of reasons, such as to monitor the individual's location to being within a restricted area. However, the ankle bracelet in this embodiment serves a different purpose. The ankle bracelet stores a unique identifier associated specifically with the individual. This positively identifies the individual to the monitoring system running on thesmartphone device 110. In another embodiment, as will be discussed in further detail below, the individual can be identified to the monitoring system without the use of an ankle bracelet, such as through biometric verification, etc. - The system does not activate solely because the individual 102 has entered a
motor vehicle 105, but activates when the individual 102 has exceeded a predetermined speed. Once activated, the smartphone interfaces with the ankle bracelet to authenticate the individual, and then carries out a number of subsequent operations to determine whether the restrictedindividual 102 is driving thevehicle 105. System operation will be described in further detail with respect toFIGS. 2 and 3 . -
FIG. 2 illustrates a block diagram of anexemplary monitoring system 200 according to embodiments of the present disclosure. The system includes asmart device 210 and anRF transmitter 280. In an embodiment, theRF transmitter 280 functions using RFID communications, such as near-field load modulation. Thesmart device 210 operates the substantial functionality of the monitoring system, whereas theRF transmitter 280 stores identification information of the individual 202, and is used to positively verify the presence and usage of the individual. - The smart device includes
monitor processing 230 in the form of one or more hardware processors and/or circuits that performs the processing from the various additional device elements for determining whether the individual is in violation of the driving restrictions. Those additional device elements are connected to themonitor processing 230, and carry out several additional functions for supporting themonitor processing 230. For example,location 215 provides location information to themonitor processing 230. In an embodiment, thelocation 215 is a GNSS receiver that receives GNSS signals from a network of GNSS satellites, such as GPS. In other embodiments, thelocation 215 determines location without the use of GNSS satellite signals, such as by triangulation from signal received from nearby base stations and/or access points. - The
speed 220 determines a speed with which thesmart device 210 is moving. In an embodiment,speed 220 makes the speed determination based on information received fromlocation 215, such as based on a change of GNSS position. However, in other embodiments,speed 220 determines the speed of thesmart device 210 without the use of location information, such as by detecting accelerations of thesmart device 210 via an accelerometer. - Operating alongside the
monitor processing 230,application processing 255 operates other applications running on thesmart device 210. Although any number of applications may be running on thesmart device 210 at any given time, there are certain applications that are particularly pertinent to the present disclosure. For example, ride-sharing and ride-hailing apps, such as Uber™ or Lyft™, operate to request rides or taxi-like services. An application monitor 250 provides an interface between themonitor processing 230 and the application processing in order to provide information to themonitor processing 230 from one or more relevant applications operating in theapplication processing 255. - The
smart device 210 also includes aninput 235, by which the individual can directly provide certain information to the smart device, such as biometric information. Additionally, atransceiver 240 is connected with anantenna 245 that is used to communicate with outside devices, such asRF transmitter 280. - The
RF transmitter 280 includes atransceiver 290 connected to an antenna for sending and receiving information from an outside device, such assmart device 210. TheRF transmitter 280 also includes anIdentification 295. TheIdentification 295 stores the unique identifier associated with the individual. In an embodiment, the unique identifier is globally unique. - In operation, the
speed 220, alone or together with thelocation 215, determines a rate of speed of thesmart device 210, and forwards the result to themonitor processing 230. As discussed above, the speed of thesmart device 210 may be determined in a variety of different ways, including determining rate of change of GNSS position based on information received fromlocation 215, as well as force measurements from one or more force detection sensors (e.g., accelerometer). - The
monitor processing 230 determines, based on the received speed information, whether thesmart device 210 is exceeding a predetermined threshold speed. If themonitor processing 230 determines that the threshold speed has been exceeded, the monitor processing carries out further steps to attempt to determine whether the individual associated with thesmart device 210 is currently driving a motor vehicle, in violation of the prohibition from doing so. - To that end, the
monitor processing 230 first verifies an identity of the individual. This ensures that the restricted individual is present with the device so as to prevent false positives, among other uses. In order to verify the identity of the individual, the monitor processing causes thetransceiver 240 to transmit a signal to theRF transmitter 280. The transmitted signal is received by theRF transmitter 280, which causes theRF transmitter 280 to retrieve the unique identifier from theIdentification 295. The RF transmitter then replies to the signal by sending the unique identifier back to thesmart device 210. In an embodiment, the unique identifier is encoded prior to transmission. - In another embodiment, rather than being configured for RFID communication, the
RF transmitter 280 is instead configured to communicate using another wireless communication protocol. An example of such a protocol is Bluetooth®, such as Bluetooth Low Energy (BLE). Bluetooth Low Energy is a wireless personal area network technology designed for low power consumption. Many mobile operating systems natively support BLE. When thetransmitter 280 and thetransceiver 240 are configured in this manner, thetransmitter 280 periodically pulses a notification to thesmart device 210. In order to conserve batter, this pulse is preferably sent relatively infrequently, but often enough to satisfactorily ensure that the user is present when the driving motion is detected. In an embodiment, the pulse is transmitted to the smart device every 4-6 minutes. As is understood from this example, theRF transmitter 280 can operate in a passive mode or an active mode. In the passive mode, the RF transmitter does not require a power source, and is instead activated passively by an outside device. In the active mode, the RF transmitter requires a power source in order to generate the signals transmitted, such as the pulse notifications described above. - Once received by the
smart device 210, themonitor processing 230 makes a determination as to whether the received unique identifier matches that associated with the restricted individual. If there is no match, then the monitoring goes dormant until after the speed of the smart device has been below the predetermined speed threshold for longer than a predetermined duration, or until after a predetermined amount of time has passed since the monitoring went dormant. On the other hand, if there is a match, then the monitor processing 130 seeks out information to verify whether the restricted individual is operating a motor vehicle. - In the embodiment illustrated in
FIG. 2 , themonitor processing 230 causes theapplication monitor 250 to attempt to retrieve information from one or more ride-sharing and/or ride-hailing applications running in theapplication processing 255. As discussed above, several applications exist that are available on smart devices for acquiring rides from third parties. Many of those applications, such as Uber and Lyft transmit a request along with a location of the individual. Many notifications are then exchanged between thesmart device 210 and a server of the ride provider. Such notifications indicate that a ride has been scheduled, has picked up, has delivered, or informs as to a projected or final cost of the ride. - Upon receiving the instruction from the
monitor processing 230, theapplication monitor 250 begins accessing memory registers and cache memory associated with the ride-sharing and/or ride-hailing applications on the phone in order to seek out any such notifications. In other embodiments, the application monitor may seek out the requested information in other manners, such as by monitoring device instructions, monitoring datastreams traversing a data bus or transmitted from theantenna 245, monitoring screen states, etc. - When relevant data is found, the application monitor 250 forwards the information to the
monitor processing 230, which analyzes the received information. As part of this analysis, themonitor processing 230 attempts to determine whether the individual is using any of those applications to travel. Themonitor processing 230 will examine numerous data points as part of this determination, and will preferably make a final determination based on an algorithm that takes into account numerous of the data points found. Ultimately, based on that algorithm, themonitor processing 230 will determine whether the individual is likely to be driving, or rather is likely to be riding as a passenger in a motor vehicle. Preferably, the monitor processing examines the data for the presence of a ride request, as well as a date/time stamp and/or identification information. Together, this information evidences that the request was made within a predetermined time of the drive detection, and is associated with the restricted individual. - In an embodiment, the algorithm may consist of calculating a weighted sum of different data points. For example, data points that evidence that the individual is using one of the riding applications being processed in
application processing 255 will be assigned certain weights that differ from those data points that evidence against that determination. After averaging the weighted data points, the resulting weighted average is compared against a threshold value. If the weighted average exceeds the threshold, then themonitor processing 230 determines that the individual is utilizing one of the riding applications, and is not driving. As a result, no further action is taken until after a predetermined amount of time as elapsed, or until after the smart device is below the predetermined speed threshold for greater than a predetermined period of time. - On the other hand, if the
monitor processing 230 determines based on the algorithm that the individual is unlikely to be utilizing a riding app, then themonitor processing 230 determines that the individual is likely driving. As a result of this determination, themonitor processing 230 generates an alert signal that includes a preset message and a location received fromlocation 215, and causes thetransceiver 240 to transmit the alert signal to appropriate authorities, notifying them of the likely violation and providing them with the location of the individual. - In embodiments, if the
monitor processing 230 determines that the individual is not using one of the riding applications to travel, then the monitor processing can first seek out additional information from the individual before determining that the individual is violating his prohibition against driving. For example, after making the negative determination, themonitor processing 230 issues a notification to the individual that authorities will be alerted to a violation of the individual's prohibition against driving unless additional evidence is received to establish the contrary. - In response, the
monitor processing 230 may be capable of, and configured to, analyze a wide variety of additional information received from the user. For example, the user may access the riding application and capture a screenshot showing relevant information relating to a current ride, such as date/time, destination, etc. Themonitor processing 230 employs image processing, such as optical character recognition, to extract the relevant information from the image and update its determination regarding whether the individual is driving. - The
monitor processing 230 may be configured to process a wide variety of additional information. For example, in some cases, themonitor processing 230 may allow for the individual to activate a camera of the smart device in order to take a picture of the individual's environment. Such a picture may show a bicycle or other non-motorized vehicle being used by the individual, or may show another individual driving an automobile in which the individual is a passenger. In order to decipher those images, themonitor processing 230 may be configured to employ pattern matching and image recognition in order to identify bicycle handle-bars and/or tire widths, a steering wheel and/or seat locations within an automobile, as well as to detect and identify faces. Through these capabilities, themonitor processing 230 is able to analyze a wide variety of information provided to it by the user in order to ensure accurate detection of a violation. -
FIG. 3 illustrates a block diagram of anexemplary monitoring system 300, according to embodiments of the present disclosure. Themonitoring system 300 does not require any communication with an outside device for verifying the identity of the individual, but rather is instead self-encapsulating. In the embodiment ofFIG. 3 , thesmart device 210 also includes aninput sensor 365 and anauthentication module 360. - Because the
RF transmitter 180 is not available in this embodiment, thesmart device 210 must verify the presence of the individual in an alternative manner. Thus, thesmart device 210 prompts the user of the device to provide certain personal information using theinput sensor 365. In various embodiments, the input sensor is any biometric sensor or manual input device. A manual input device allows the individual to enter personal verification data, such as name and unique identifier. However, a biometric sensor is more secure and less prone to faking, hacking, etc. After theinput sensor 365 receives the input from the individual, theauthentication module 360 compares the received information to previously-stored information. When the received information is biometric information, theauthentication module 360 performs an analysis of the information in order to carry out a probabilistic comparison between the received biometric information and the previously-stored biometric information of the same type. Such comparison may include comparing voice prints, face prints, facial architectures, iris scans, etc. The result of the comparison is then acted upon in the manner already described with respect to the embodiment ofFIG. 2 . -
FIG. 4 illustrates a flowchart diagram of anexemplary monitoring method 400 according to embodiments of the present disclosure. In themethod 400, the monitoring system monitors a speed of a device on which the monitoring system operates 410. While monitoring the speed, the system determines whether the speed of the device exceeds apredetermined threshold th 415. If the speed does not exceed the predetermined threshold (415—N), then functionality returns to speedmonitoring 410. - If, on the other hand, the speed of the device exceeds the predetermined threshold (415—Y), the system identifies the individual 420. As discussed above, this is performed in one of several different ways, including requesting a unique identifier from an RFID transmitter, or by acquiring identification information from the user. Based on the received information, the system verifies whether the user is the restricted
individual 425. If the user is not the restricted individual, then operation returns to speeddetection 410. In an embodiment, there may be some predetermined time elapse or other trigger required before re-initiating the monitoring method. - If the user is the restricted individual, then the system attempts to acquire information from one or more relevant applications running on the
device 430. During this step, the system will access various data sources associated with different applications on the device in order to gather relevant information that may evidence use or non-use of a ride-sharing or ride-hailing application. After gathering the relevant data, the monitoring system operates analgorithm 440 in order to determine whether the restricted user is driving 445. If it is determined that the restricted user is not driving (445—N), then functionality returns to speeddetection 410. If, on the other hand, the algorithm determines that there is insufficient information to make a definitive determination with high certainty, then the individual is prompted formore information 460. After the restricted individual provides more information, such as in the manner described above, then the system makes an updated determination as to whether the individual is driving 445. - If the system determines that the restricted individual is driving (445— Y), then the system generates an alert containing the identification of the restricted individual and a location of the device, and transmits the alert to relevant authorities.
- It will be apparent to persons skilled in the relevant art(s) that various elements and features of the present disclosure, as described herein, can be implemented in hardware using analog and/or digital circuits, in software, through the execution of computer instructions by one or more general purpose or special-purpose processors, or as a combination of hardware and software.
- The following description of a general purpose computer system is provided for the sake of completeness. Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system. For example, the method of
FIG. 4 can be implemented in the environment of one or more computer systems or other processing systems. An example of such acomputer system 500 is shown inFIG. 5 . One or more of the modules depicted in the previous figures can be at least partially implemented on one or moredistinct computer systems 500. -
Computer system 500 includes one or more processors, such asprocessor 504.Processor 504 can be a special purpose or a general purpose digital signal processor.Processor 504 is connected to a communication infrastructure 502 (for example, a bus or network). Various software implementations are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement the disclosure using other computer systems and/or computer architectures. -
Computer system 500 also includes amain memory 506, preferably random access memory (RAM), and may also include asecondary memory 508.Secondary memory 508 may include, for example, ahard disk drive 510 and/or aremovable storage drive 512, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like.Removable storage drive 512 reads from and/or writes to aremovable storage unit 516 in a well-known manner.Removable storage unit 516 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to byremovable storage drive 512. As will be appreciated by persons skilled in the relevant art(s),removable storage unit 516 includes a computer usable storage medium having stored therein computer software and/or data. - In alternative implementations,
secondary memory 508 may include other similar means for allowing computer programs or other instructions to be loaded intocomputer system 500. Such means may include, for example, aremovable storage unit 518 and aninterface 514. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 518 andinterfaces 514 which allow software and data to be transferred fromremovable storage unit 518 tocomputer system 500. -
Computer system 500 may also include acommunications interface 520. Communications interface 520 allows software and data to be transferred betweencomputer system 500 and external devices. Examples ofcommunications interface 520 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred viacommunications interface 520 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received bycommunications interface 520. These signals are provided tocommunications interface 520 via acommunications path 522.Communications path 522 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels. - As used herein, the terms “computer program medium” and “computer readable medium” are used to generally refer to tangible storage media such as
removable storage units hard disk drive 510. These computer program products are means for providing software tocomputer system 500. - Computer programs (also called computer control logic) are stored in
main memory 506 and/orsecondary memory 508. Computer programs may also be received viacommunications interface 520. Such computer programs, when executed, enable thecomputer system 500 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enableprocessor 504 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of thecomputer system 500. Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded intocomputer system 500 usingremovable storage drive 512,interface 514, orcommunications interface 520. - In another embodiment, features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays. Implementation of a hardware state machine so as to perform the functions described herein will also be apparent to persons skilled in the relevant art(s).
- It is to be appreciated that the Detailed Description section, and not the Abstract section, is intended to be used to interpret the claims. The Abstract section may set forth one or more, but not all exemplary embodiments, and thus, is not intended to limit the disclosure and the appended claims in any way.
- The disclosure has been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries may be defined so long as the specified functions and relationships thereof are appropriately performed.
- It will be apparent to those skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the disclosure. Thus, the disclosure should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (21)
1. (canceled)
2. A device, comprising:
a memory that stores authentication information of a user and a travel restriction;
a speed sensor configured to detect a movement speed of the device; and
one or more processors configured to:
detect that the movement speed of the device exceeds a predetermined threshold; and
activating a monitoring function in response to the detecting configured to verify that a restricted individual is not operating a motor vehicle.
3. The device of claim 2 , wherein the one or more processors are further configured to verify a presence of a restricted individual in response to the detecting.
4. The device of claim 3 , wherein the verifying includes:
transmitting a request to an external device for user authentication information;
receive, from the external device, a user identifier; and
verify an identify of the user as being the restricted individual based on the received user identifier.
5. The device of claim 4 , wherein the verifying includes comparing the received user identifier to the stored authentication information.
6. The device of claim 4 , wherein the one or more processors are further configured to:
in response to the verifying, obtain a location of the device;
compare the location to an acceptable location range; and
determine that the device is outside of the acceptable location range.
7. The device of claim 4 , wherein the one or more processors are further configured to determine whether the restricted individual is a driver or a passenger in the motor vehicle.
8. The device of claim 7 , wherein the determining includes accessing a ride-sharing, taxi, or other travel application running on the device.
9. A method, comprising:
detecting a movement speed of a device;
determining that the movement speed exceeds a predetermined threshold; and
activating a monitoring function in response to the detecting, the monitoring function configured to verify that a restricted individual is not operating a motor vehicle.
10. The method of claim 9 , further comprising verifying a presence of a restricted individual in response to the detecting.
11. The method of claim 10 , wherein the verifying includes:
transmitting a request to an external device for user authentication information;
receiving, from the external device, a user identifier; and
verifying an identity of the user as being the restricted individual based on the received user identifier.
12. The method of claim 11 , wherein the verifying includes comparing the received user identifier to stored authentication information.
13. The method of claim 11 , further comprising:
in response to the verifying, obtaining a location of the device;
comparing the location to an acceptable location range; and
determining that the device is outside of the acceptable location range.
14. The device of claim 11 , further comprising determining whether the restricted individual is a driver or a passenger in the motor vehicle.
15. The method of claim 14 , wherein the determining includes accessing a ride-sharing, taxi, or other travel application running on the device.
16. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed by at least one computing device, cause the at least one computing device to perform operations comprising:
detect a movement speed of a device;
determine that the movement speed exceeds a predetermined threshold; and
activate a monitoring function in response to the detecting, the monitoring function configured to verify that a restricted individual is not operating a motor vehicle.
17. The non-transitory computer-readable storage medium of claim 16 , wherein the operations further comprise verifying a presence of a restricted individual in response to the detecting.
18. The non-transitory computer-readable storage medium of claim 17 , wherein the verifying includes:
transmitting a request to an external device for user authentication information;
receiving, from the external device, a user identifier; and
verifying an identity of the user as being the restricted individual based on the received user identifier.
19. The non-transitory computer-readable storage medium of claim 18 , wherein the verifying includes comparing the received user identifier to stored authentication information.
20. The non-transitory computer-readable storage medium of claim 18 , wherein the operations further comprise:
in response to the verifying, obtaining a location of the device;
comparing the location to an acceptable location range; and
determining that the device is outside of the acceptable location range.
21. The non-transitory computer-readable storage medium of claim 18 , wherein the operations further comprise determining whether the restricted individual is a driver or a passenger in the motor vehicle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/221,249 US20240022873A1 (en) | 2017-07-24 | 2023-07-12 | System and method for monitoring a former convict of an intoxication-related offense |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/657,935 US9878660B1 (en) | 2017-07-24 | 2017-07-24 | System and method for monitoring a former convict of an intoxication-related offense |
US15/874,528 US10464474B2 (en) | 2017-07-24 | 2018-01-18 | System and method for monitoring a former convict of an intoxication-related offense |
US16/653,524 US10759335B2 (en) | 2017-07-24 | 2019-10-15 | System and method for monitoring a former convict of an intoxication-related offense |
US17/006,412 US11285867B2 (en) | 2017-07-24 | 2020-08-28 | System and method for monitoring a former convict of an intoxication-related offense |
US17/703,662 US11743684B2 (en) | 2017-07-24 | 2022-03-24 | System and method for monitoring a former convict of an intoxication-related offense |
US18/221,249 US20240022873A1 (en) | 2017-07-24 | 2023-07-12 | System and method for monitoring a former convict of an intoxication-related offense |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/703,662 Continuation US11743684B2 (en) | 2017-07-24 | 2022-03-24 | System and method for monitoring a former convict of an intoxication-related offense |
Publications (1)
Publication Number | Publication Date |
---|---|
US20240022873A1 true US20240022873A1 (en) | 2024-01-18 |
Family
ID=61005236
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/657,935 Active US9878660B1 (en) | 2017-07-24 | 2017-07-24 | System and method for monitoring a former convict of an intoxication-related offense |
US15/874,528 Active US10464474B2 (en) | 2017-07-24 | 2018-01-18 | System and method for monitoring a former convict of an intoxication-related offense |
US16/653,524 Active US10759335B2 (en) | 2017-07-24 | 2019-10-15 | System and method for monitoring a former convict of an intoxication-related offense |
US17/006,412 Active US11285867B2 (en) | 2017-07-24 | 2020-08-28 | System and method for monitoring a former convict of an intoxication-related offense |
US17/703,662 Active US11743684B2 (en) | 2017-07-24 | 2022-03-24 | System and method for monitoring a former convict of an intoxication-related offense |
US18/221,249 Pending US20240022873A1 (en) | 2017-07-24 | 2023-07-12 | System and method for monitoring a former convict of an intoxication-related offense |
Family Applications Before (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/657,935 Active US9878660B1 (en) | 2017-07-24 | 2017-07-24 | System and method for monitoring a former convict of an intoxication-related offense |
US15/874,528 Active US10464474B2 (en) | 2017-07-24 | 2018-01-18 | System and method for monitoring a former convict of an intoxication-related offense |
US16/653,524 Active US10759335B2 (en) | 2017-07-24 | 2019-10-15 | System and method for monitoring a former convict of an intoxication-related offense |
US17/006,412 Active US11285867B2 (en) | 2017-07-24 | 2020-08-28 | System and method for monitoring a former convict of an intoxication-related offense |
US17/703,662 Active US11743684B2 (en) | 2017-07-24 | 2022-03-24 | System and method for monitoring a former convict of an intoxication-related offense |
Country Status (1)
Country | Link |
---|---|
US (6) | US9878660B1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10721624B2 (en) | 2017-02-17 | 2020-07-21 | Global Tel*Link Corporation | Security system for inmate wireless devices |
US9878660B1 (en) | 2017-07-24 | 2018-01-30 | Global Tel*Link Corporation | System and method for monitoring a former convict of an intoxication-related offense |
US11801013B2 (en) | 2020-11-12 | 2023-10-31 | Consumer Safety Technology, Llc | Method and system of deploying portable breath alcohol monitoring device |
US11393264B1 (en) * | 2021-03-29 | 2022-07-19 | Denso International America, Inc. | Apparatus and system for utilizing a mobile device in a vehicle for notifications |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8280682B2 (en) * | 2000-12-15 | 2012-10-02 | Tvipr, Llc | Device for monitoring movement of shipped goods |
US5706199A (en) * | 1995-07-17 | 1998-01-06 | Cummins Engine Company, Inc. | System for controlling engine speed in response to detection of vehicle speed signal tampering |
DE19846803C1 (en) * | 1998-10-10 | 2000-09-07 | Daimler Chrysler Ag | Process for establishing access authorization to a motor-driven vehicle |
US7171331B2 (en) * | 2001-12-17 | 2007-01-30 | Phatrat Technology, Llc | Shoes employing monitoring devices, and associated methods |
US7327242B2 (en) * | 2004-09-16 | 2008-02-05 | International Business Machines Corporation | Limiting and controlling motor vehicle operation functions enabled for each of a group of drivers of the vehicle |
WO2006047877A1 (en) * | 2004-11-03 | 2006-05-11 | Thomas Dewaal | Method system, and apparatus for monitoring vehicle operation |
CN100593487C (en) * | 2005-07-13 | 2010-03-10 | 小松优特力株式会社 | Operation permission control device and machine having the same mounted thereon |
US7489249B2 (en) * | 2005-08-11 | 2009-02-10 | Dmatek Ltd. | Apparatus and method for determining the attitude of a remotely monitored device |
WO2007094988A2 (en) * | 2006-02-13 | 2007-08-23 | All Protect Llc | Method and system for controlling a vehicle given to a third party |
US9848289B2 (en) * | 2006-03-08 | 2017-12-19 | Octo Advisory Inc. | Safe driving monitoring system |
JP2009029233A (en) * | 2007-07-26 | 2009-02-12 | Omron Corp | Entry system for vehicle |
KR101297163B1 (en) * | 2008-10-28 | 2013-08-21 | 에스케이플래닛 주식회사 | A traffic information supply system using personal area network, a traffic information supply method thereby, a service server, a relay method, an application server, a mobile terminal, a navigation terminal, an execution method and a storage means |
US8587403B2 (en) * | 2009-06-18 | 2013-11-19 | Lear Corporation | Method and system of determining and preventing relay attack for passive entry system |
US20110039581A1 (en) * | 2009-08-12 | 2011-02-17 | Yigang Cai | Method and apparatus for restricting the use of a mobile telecommunications device by a vehicle's driver |
US20110071475A1 (en) * | 2009-09-18 | 2011-03-24 | Becton, Dickinson And Company | Outer cover of a pen needle for a drug delivery pen |
US20110121975A1 (en) * | 2009-11-25 | 2011-05-26 | Dasher Dale L | Mobile system for probation release monitoring programs and other security-oriented applications |
JP5685073B2 (en) * | 2010-12-17 | 2015-03-18 | 株式会社東海理化電機製作所 | Electronic key system |
US20170039784A1 (en) * | 2012-06-21 | 2017-02-09 | Autobrain Llc | Automobile diagnostic device using dynamic telematic data parsing |
US9002317B2 (en) * | 2012-09-27 | 2015-04-07 | Pangaea Services, Inc. | Method and apparatus for active defense and emergency response |
US9135420B2 (en) * | 2013-02-06 | 2015-09-15 | GM Global Technology Operations LLC | Biometric data-driven application of vehicle operation settings |
US9679430B2 (en) * | 2013-03-08 | 2017-06-13 | Lear Corporation | Vehicle remote function system and method for determining vehicle FOB locations using adaptive filtering |
US9135758B2 (en) * | 2013-05-13 | 2015-09-15 | Moj.Io Inc. | Vehicle status notification and operator identification |
US9272713B1 (en) * | 2013-06-24 | 2016-03-01 | Imperium Technologies LLC | Compliance device, system and method for machine operation |
US20150025917A1 (en) * | 2013-07-15 | 2015-01-22 | Advanced Insurance Products & Services, Inc. | System and method for determining an underwriting risk, risk score, or price of insurance using cognitive information |
US9148869B2 (en) * | 2013-10-15 | 2015-09-29 | The Toronto-Dominion Bank | Location-based account activity alerts |
JP6162071B2 (en) * | 2014-04-11 | 2017-07-12 | 株式会社Nttドコモ | Locking control device, locking control system, and locking control method |
US9355551B2 (en) * | 2014-10-21 | 2016-05-31 | Toyota Motor Engineering & Manufacturing North America, Inc. | Smart key locator |
US9928735B2 (en) * | 2015-02-09 | 2018-03-27 | Operr Technologies, Inc. | Systems and methods for traffic violation avoidance |
KR20160107636A (en) * | 2015-03-04 | 2016-09-19 | 엘지전자 주식회사 | Device for preventing accident of vehicle and operating method thereof |
TWI547831B (en) * | 2015-07-06 | 2016-09-01 | Dexin Corp | An input device with a Bluetooth module and a method of operating the same |
KR101798517B1 (en) * | 2015-12-09 | 2017-11-16 | 현대자동차주식회사 | Location information system using vehicle and smart device and method for controlling the same |
US9878660B1 (en) | 2017-07-24 | 2018-01-30 | Global Tel*Link Corporation | System and method for monitoring a former convict of an intoxication-related offense |
-
2017
- 2017-07-24 US US15/657,935 patent/US9878660B1/en active Active
-
2018
- 2018-01-18 US US15/874,528 patent/US10464474B2/en active Active
-
2019
- 2019-10-15 US US16/653,524 patent/US10759335B2/en active Active
-
2020
- 2020-08-28 US US17/006,412 patent/US11285867B2/en active Active
-
2022
- 2022-03-24 US US17/703,662 patent/US11743684B2/en active Active
-
2023
- 2023-07-12 US US18/221,249 patent/US20240022873A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US9878660B1 (en) | 2018-01-30 |
US11743684B2 (en) | 2023-08-29 |
US10759335B2 (en) | 2020-09-01 |
US10464474B2 (en) | 2019-11-05 |
US20210046865A1 (en) | 2021-02-18 |
US20200039428A1 (en) | 2020-02-06 |
US20220266746A1 (en) | 2022-08-25 |
US20190023177A1 (en) | 2019-01-24 |
US11285867B2 (en) | 2022-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11743684B2 (en) | System and method for monitoring a former convict of an intoxication-related offense | |
US11866007B2 (en) | Blockchain authentication of a vehicle rider | |
CN112622917B (en) | System and method for authenticating an occupant of a vehicle | |
US20200178030A1 (en) | System and method for controlling mobile services using sensor information | |
US20200082188A1 (en) | Methods and systems for real-time monitoring of vehicles | |
CN104871147B (en) | The user in vehicle is detected to the method, apparatus and system of wireless device association | |
CN109636368B (en) | Internet taxi taking method and device, taxi taking equipment and computer readable storage medium | |
KR101545595B1 (en) | Vehicle control apparatus and method thereof | |
WO2021121273A1 (en) | Authentication method and medium and electronic apparatus thereof | |
US20130265178A1 (en) | Vehicle-related messaging methods and systems | |
US20200074065A1 (en) | Integrated identification and authentication for car sharing and taxi service | |
US20190394159A1 (en) | Vehicle identification and device communication through directional wireless signaling | |
US20180255269A1 (en) | System, device, and method for evidentiary management of digital data associated with a localized miranda-type process | |
US20220142585A1 (en) | Method and system of deploying portable breath alcohol monitoring device | |
US20200380533A1 (en) | Driver verification for ride hailing service | |
KR20210111932A (en) | System and method for handling lost item in autonomous vehicle | |
US20210377383A1 (en) | Assembly and method for preventing wireless communication while driving | |
US11729307B2 (en) | Control of smartphone for drivers while driving | |
CN113734173B (en) | Intelligent vehicle monitoring method, device and storage medium | |
KR20170041480A (en) | Method and computer program for providing image information by taxi all-in-one system | |
KR20210144076A (en) | Vehicle and method for supporting safety driving thereof | |
US10710553B2 (en) | Vehicle control device having user authentication unit performing authentication of user of vehicle and vehicle use permission unit permitting use of vehicle by user | |
US20230237137A1 (en) | Terminal device, method, and storage medium | |
US20240349233A1 (en) | Generating and updating electronic authorization content using automated positioning in a physical environment | |
JP2024051709A (en) | Left-in state in vehicle detection system and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: TEXAS CAPITAL BANK, AS COLLATERAL AGENT, TEXAS Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, INC.;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:068510/0764 Effective date: 20240806 |