Authentication rights enhancement on transport services
A secondary authentication and mobile device technology, applied in transportation and packaging, digital data authentication, transmission systems, etc., can solve problems such as hacker attacks, relay attacks, jumping, etc., achieve safe user experience, and reduce security attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The present disclosure will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the disclosure are shown and not intended to be limiting.
[0020] figure 1 Depicted is an exemplary computing environment 100 that may include a vehicle 105 that includes a vehicle computer 145 and a vehicle control unit (VCU) 165 that typically includes a A plurality of electronic control units (ECUs) 117 in communication. The nomadic device 120 (which may be associated with the user 140 and the vehicle 105) may interface with the vehicle computer 145 using wired and / or wireless communication protocols and transceivers. The nomadic device 120 may be communicatively coupled to the vehicle 105 via one or more networks 125, which may communicate via one or more wireless channels 130, and / or the nomadic device may use proximity field communication (NFC) protocol, Protocol, Wi-Fi, Li-Fi, Voice, Ultra Wideband (UWB), and other po...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


