Nec corporation (20240134383). MOBILE BODY AUTHENTICATION APPARATUS, MOBILE BODY AUTHENTICATION SYSTEM, MOBILE BODY AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM simplified abstract
Contents
- 1 MOBILE BODY AUTHENTICATION APPARATUS, MOBILE BODY AUTHENTICATION SYSTEM, MOBILE BODY AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 MOBILE BODY AUTHENTICATION APPARATUS, MOBILE BODY AUTHENTICATION SYSTEM, MOBILE BODY AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
MOBILE BODY AUTHENTICATION APPARATUS, MOBILE BODY AUTHENTICATION SYSTEM, MOBILE BODY AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
Organization Name
Inventor(s)
MOBILE BODY AUTHENTICATION APPARATUS, MOBILE BODY AUTHENTICATION SYSTEM, MOBILE BODY AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240134383 titled 'MOBILE BODY AUTHENTICATION APPARATUS, MOBILE BODY AUTHENTICATION SYSTEM, MOBILE BODY AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
Simplified Explanation
The abstract describes a mobile body authentication apparatus that prevents an autonomously movable mobile body from moving without permission. The apparatus acquires remote identification information, position information, time information, and authentication information from the mobile body, collates this information, and outputs the result of the collation.
- The mobile body authentication apparatus prevents unauthorized movement of an autonomously movable mobile body.
- The apparatus acquires and collates various information from the mobile body to authenticate its movement.
Potential Applications
This technology could be applied in:
- Autonomous vehicles
- Drones
- Robotics
Problems Solved
This technology solves the problem of unauthorized movement of autonomously movable mobile bodies.
Benefits
The benefits of this technology include:
- Enhanced security for mobile bodies
- Prevention of theft or misuse
- Improved control over remote operations
Potential Commercial Applications
Title: Applications of Mobile Body Authentication Technology This technology could be commercially applied in:
- Security systems
- Fleet management
- Logistics and transportation industry
Possible Prior Art
There are existing technologies in the field of mobile body authentication, such as:
- Biometric authentication systems
- GPS tracking devices
Unanswered Questions
How does the apparatus communicate with the mobile body to acquire information?
The abstract does not specify the communication method used by the apparatus to gather information from the mobile body. This could involve wireless communication, Bluetooth, or other technologies.
What measures are in place to ensure the accuracy and reliability of the collation process?
The abstract does not detail the specific mechanisms or algorithms used to collate the information acquired from the mobile body. It is important to understand how the system ensures the accuracy and reliability of the authentication process.
Original Abstract Submitted
a mobile body authentication apparatus capable of preventing an autonomously movable mobile body from illegally moving without permission is provided. a mobile body authentication apparatus includes at least one memory configured to store instructions, and at least one processor configured to execute the instructions to: acquire, from an autonomously movable mobile body, remote identification information, which is information for managing a remote operation of the mobile body, position information indicating the current position of the mobile body, time information that indicates the current time in the mobile body, and authentication information; and execute collation based on the whole of part of the information; and output the result of collation.