[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2024221021A1 - Système et procédé de rapport d'infractions - Google Patents

Système et procédé de rapport d'infractions Download PDF

Info

Publication number
WO2024221021A1
WO2024221021A1 PCT/ZA2024/050016 ZA2024050016W WO2024221021A1 WO 2024221021 A1 WO2024221021 A1 WO 2024221021A1 ZA 2024050016 W ZA2024050016 W ZA 2024050016W WO 2024221021 A1 WO2024221021 A1 WO 2024221021A1
Authority
WO
WIPO (PCT)
Prior art keywords
image data
server
endpoint computing
machine learning
computing device
Prior art date
Application number
PCT/ZA2024/050016
Other languages
English (en)
Inventor
Kevin Lester OLINSKY
Ricardo DA FONSECA
Warren SWALES
Original Assignee
Olinsky Kevin Lester
Da Fonseca Ricardo
Swales Warren
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Olinsky Kevin Lester, Da Fonseca Ricardo, Swales Warren filed Critical Olinsky Kevin Lester
Publication of WO2024221021A1 publication Critical patent/WO2024221021A1/fr

Links

Definitions

  • This present disclosure relates to a system and method for reporting offences. More particularly, but not exclusively, this present disclosure relates to a system and method for reporting traffic offenses or criminal offences.
  • a computer-implemented method for reporting offenses by endpoint computing devices in data communication with a server the method conducted at the server and comprising: registering one or more of the endpoint computing devices, each of the registered endpoint computing devices having at least an associated unique identifier and a camera for capturing image data; receiving image data from one of the registered endpoint computing devices; accessing a machine learning module which is trained by a plurality of training images of offences; inputting the received image data to the machine learning module which automatically analyses the received image data so as to identify an offence therefrom; receiving a result of the analysis from the machine learning module; and responsive to an identified offence, outputting an approval message to the registered endpoint computing device that transmitted the received image data.
  • the method may include, by the server, allocating a reward that is digitally linked to the unique identifier of the registered endpoint computing device from which the image data is received.
  • the reward may be a monetary reward, a coupon or a voucher.
  • the reward may be a digital reward, e.g., an e-gift card, which can be redeemed digitally, or the reward may be in the form of pre-paid airtime via a mobile network, or the reward may be a digital token or other digital asset.
  • the method may include allocating or assigning the reward to the registered endpoint computing device.
  • the method may include uniquely associating the received image data with the unique identifier of the registered endpoint computing device from which the image data is received.
  • the unique association may, optionally, be performed by the server.
  • the method may include establishing a secure communications session between the registered endpoint computing device and the server.
  • the method may include, by the registered endpoint computing device, encrypting or digitally signing the image data by way of an endpoint private key associated with the registered endpoint device.
  • the endpoint private key may, alternatively, or in addition, be associated with the unique identifier of the registered endpoint computing device.
  • the server may be arranged to decrypt encrypted image data received from the registered endpoint computing device, e.g., by way of a public key.
  • the server may be arranged to verify, authenticate, or confirm the authenticity of the received image data, e.g., by decrypting the encrypted received image data. Any cryptographic protocol, including asymmetric cryptography that utilises public and private key pairs may be implemented, or digital endpoint device certificates may be used.
  • the encrypted image data may inhibit duplicate image data or fraudulent image data from being transmitted, or it may enable the server to detect these duplicates or fraud.
  • the method may include, by the server, digitally verifying or digitally authenticating the received image data so as to confirm the authenticity thereof.
  • the received image data may be encrypted by the server using a server-side private key. This may inhibit third parties from accessing the received image data.
  • the method may include outputting a digital infringement notice, fine, or penalty, based on the result of the analysis received from the machine learning module.
  • the method may include inputting the received image data to the machine learning module which may be arranged to automatically analyse the received image data so as to identify an offender therefrom.
  • the method may include receiving an offender identifier from the machine learning module.
  • the offender identifier may, for example, be a vehicle licence plate number, biometric data, facial recognition data relating to the offender, or other data relating to the offender.
  • the offender identifier or other data relating to the offender may, for example, be derived from the image data by the machine learning module.
  • the received image may, alternatively or in addition, be input to an adjudication module by the server.
  • An adjudicator computing device may be in data communication with the adjudicator module.
  • the outputting of an approval message by the server may be preceded by, or succeeded by, an approval input facilitated by the adjudicator module and the adjudicator computing device.
  • the received image data or the encrypted received image data may be stored in a database accessible by the server.
  • the method may include, by the server, storing and/or updating a digital record of the received image data. This may facilitate the server to keep track of the received image data from a plurality of endpoint computing devices.
  • Each endpoint computing device may be a personal handheld electronic device, a security camera such as a closed-circuit television (CCTV) security camera, a dashboard camera, or a traffic camera.
  • a security camera such as a closed-circuit television (CCTV) security camera
  • CCTV closed-circuit television
  • dashboard camera a traffic camera
  • traffic camera a traffic camera
  • Any type of image capturing device, or a data capturing device may for example be used.
  • the method may include receiving geolocation data from the registered endpoint computing device that transmitted the image data.
  • the geolocation data may be associated with the image data.
  • the server may be arranged to uniquely associate the endpoint computing device that transmitted the image data with the geolocation data of the received image data.
  • the method may include associating the unique identifier of the endpoint computing device with the geolocation data. Alternatively, or in addition, the method may include associating the unique identifier of the endpoint computing device with the received image data.
  • the storing and/or updating may include storing and/or updating the geolocations associated with the received image data in the database accessible by the server.
  • the received image data may be photographic data or videographic data.
  • the method may include, by the server, receiving a user input which is indicative of whether the image data relates to a possible traffic offence, and/or to a possible criminal offence.
  • the machine learning module may be arranged to determine whether the image data relates to a possible traffic offence and/or to a possible criminal offence, and to output data relating to this determination to the server.
  • the method may include, during a registration process, prompting a user to input user details via the endpoint computing device, e.g., via a user interface provided at the endpoint computing device.
  • the method may include, by the server, storing the user details in the database accessible by the server.
  • the user details may include a telephone number, an email address, an identification number, a physical address, an Internet Protocol (IP) address or another digital identifier, and the like.
  • IP Internet Protocol
  • the method may include, by a vetting component accessible by the server, using the user details to perform a background check of the user including but not limited to a credit check, a criminal record check, an address verification, and the like.
  • the vetting component may be arranged to accept or reject the registration of the user based on a result of the background check.
  • a computer- implemented method for reporting offenses by endpoint computing devices in data communication with a server the method conducted at a first one of the endpoint computing devices and comprising: registering at the server, the endpoint computing device which has at least an associated unique identifier and a camera for capturing image data; transmitting image data from the registered endpoint computing device to the server which has access to a machine learning module that is trained by a plurality of training images of offences so as to enable the server to input the received image data to the machine learning module which automatically analyses the received image data in order to identify an offence therefrom, the server receiving a result of the analysis from the machine learning module; and responsive to an identified offence, receiving an approval message from the server at the registered endpoint computing device.
  • Further features of the method may include carrying out (or at least partially carrying out), at the first one of the endpoint computing devices, one or more of the method steps defined above.
  • a system for reporting offenses by endpoint computing devices comprising: a server computer in data communication with the endpoint computing devices, the server computer including or having access to a processor and a memory, said memory containing instructions executable by the processor, to execute functions of components including: an endpoint registration component that operatively registers one or more of the endpoint computing devices, each of the registered endpoint computing devices having at least an associated unique identifier and a camera for capturing image data; a receiving component that operatively receives image data from one of the registered endpoint computing devices; a machine learning module interface component that operatively accesses a machine learning module which is trained by a plurality of training images of offences; an inputting component that operatively inputs the received image data to the machine learning module which automatically analyses the received image data so as to identify an offence therefrom; a result receiving component that operatively receives a result of the analysis from the machine learning module; and an output component which, responsive to an identified offence,
  • the system may include additional components for carrying out one or more of the method steps defined above.
  • a computer program product for reporting offenses by endpoint computing devices in data communication with a server
  • the computer program product comprising a non-transitory computer-readable medium having stored computer-readable program code for performing the steps of: registering one or more of the endpoint computing devices, each of the registered endpoint computing devices having at least an associated unique identifier and a camera for capturing image data; receiving image data from one of the registered endpoint computing devices; accessing a machine learning module which is trained by a plurality of training images of offences; inputting the received image data to the machine learning module which automatically analyses the received image data so as to identify an offence therefrom; receiving a result of the analysis from the machine learning module; and responsive to an identified offence, outputting an approval message to the registered endpoint computing device that transmitted the received image data.
  • the computer-readable medium may be a non-transitory computer-readable medium.
  • the computer-readable program code may be executable by a processing circuit.
  • Figure 1 is a schematic diagram which illustrates an exemplary embodiment of a system in accordance with aspects of the present disclosure
  • Figure 2 is a high-level block diagram illustrating components of an exemplary server according to aspects of the present disclosure
  • Figure 3 is a high-level block diagram illustrating components of an exemplary registered endpoint computing device according to aspects of the present disclosure
  • Figure 4 is a schematic flow diagram illustrating an exemplary method in accordance with an aspect of the present disclosure for reporting offenses by an endpoint computing device in data communication with a server;
  • Figure 5 is another schematic diagram which illustrates an exemplary embodiment of a system in accordance with aspects of the present disclosure
  • Figure 6 is a swim-lane flow diagram which illustrates an exemplary method in accordance with an aspect of the present disclosure for reporting offenses by an endpoint computing device in data communication with a server;
  • Figure 7 is a diagram showing an exemplary user interface that may be displayed by an endpoint device, as well as exemplary steps in a method in accordance with aspects of the present disclosure
  • Figure 8 is a schematic diagram which illustrates an exemplary embodiment of a method in accordance with aspects of the present disclosure
  • Figure 9 is another diagram illustrating an exemplary user interface that may be displayed by an endpoint device which may execute a method in accordance with aspects of the present disclosure
  • Figure 10 is a yet further exemplary user interface that may be displayed by an endpoint device which may execute a method in accordance with aspects of the present disclosure.
  • Figure 11 illustrates an example of a computing device in which various aspects of the disclosure may be implemented.
  • an endpoint computing device may also be referred to as a user device.
  • Each endpoint device or user device may be registrable at a central server or backend with which it may be in data communication either constantly or intermittently.
  • Each of the endpoint device(s) may be associated with a unique identifier, or each endpoint device may be uniquely identifiable by the backend or central server.
  • Each endpoint device may be capable of capturing photos and/or videos of offences or suspected offences.
  • the endpoint device need not be limited to any specific form of capturing device, and any image capturing device or data capturing device (e.g., forming part of an electronic device) can be used.
  • image capturing devices that can be implemented by the present disclosure include (but are not limited to) an automated security camera, smart camera, Internet of Things (loT) device, smart traffic camera, or the like.
  • Other examples of endpoint devices that may be implemented by aspects of the present disclosure may be, for example, a smartphone, dashboard camera, or the like.
  • Data in the form of one or more photos or videos of a suspected offence may be uploaded to the server or backend from a registered endpoint device.
  • Data received from an endpoint device may be encrypted to avoid duplication and fraudulent entries such as digitally altered photographs.
  • the offense data may be assessed to determine if an infringement or an offense has been committed.
  • the assessment may be performed by an artificial intelligence model or machine learning (ML) model that may be trained, or pre-trained.
  • the ML model may also be termed a trained classification machine learning model.
  • the machine learning model or module may be a neural network (NN), and it may have a deep learning network architecture.
  • the deep learning network may be a convolutional neural network (CNN), or a fully convolutional deep neural network (FCDNN or FCNN). Other types of artificial neural networks may also be implemented by the present disclosure.
  • the server or backend may implement a machine learning model, or it may have access to a cloud-based machine learning model.
  • An input image (such as image data received by the server or backend from the endpoint device) or a sequence of images may be input to the machine learning module or model according to aspects of the present disclosure.
  • the machine learning model or module may be pre-trained or trained to provide an output that is indicative of whether or not the input image data relates to, or positively identifies, an offence in it.
  • predefined images or image data may have been previously input into the machine learning model/module in order to train it to intelligently identify offences (whether criminal, traffic-related or other types of offences) from received image data, and to generate an output that indicates findings of the analysis performed by the machine learning module/model.
  • the output of the machine learning model/module may be fed back to the central server or backend for further processing.
  • the machine learning model may be trained using machine learning techniques (such as, but not limited to NN, CNN, DNN, FCDNN etc.) to improve accuracy of its predictions and/or the accuracy of the identified offences, or so as to increase efficiency whereby the offences are reported, managed or processed.
  • machine learning techniques such as, but not limited to NN, CNN, DNN, FCDNN etc.
  • the received offense data may be analysed by the central server and/or by a machine learning model to automatically identify and verify offenses.
  • the offender may also be identified from the received images or image data.
  • the machine learning model/module may be trained to automatically perform facial recognition, or other biometric recognition, in order to identify an offender in the image data, e.g., from a database of known offenders.
  • the result of the analysis of the adjudication may be sent to the server. If an offense is verified to have occurred, a reward may be sent to the device that transmitted the offense data and the offender may be issued a penalty. Such a penalty may be a fine or a warning.
  • assessment of the data may also be done by one or more trained and approved members or operators.
  • the system and method of the present disclosure may be implemented for managing, capturing, and/or reporting offences. Traffic and criminal law violations may hence be alleviated by the present disclosure which may increase the safety of roads, and optionally also reward users for participating.
  • Figure 1 is a schematic diagram which illustrates an exemplary embodiment of a system (10) according to aspects of the present disclosure. Various combinations of the described features and aspects may be used in a given implementation.
  • the system (10) may be implemented for reporting offenses by endpoint computing devices (12.1 , 12.2 to 12.n).
  • the endpoint computing devices (12.1 to 12.n) may be in data communication with a server computer (14), and they may be registered at the server (14).
  • Data communication between the server (14) and endpoint computing devices (12.1 to 12.n) may be by way of a communications network such as the Internet.
  • the data communication may be intermittent or continuous.
  • the server computer (14) may include, or it may have access to a processor (16) and a memory (18), said memory containing instructions executable by the processor, to execute functions of components of the system (10).
  • the exemplary embodiment of Figure 1 is described in more detail below.
  • the server (14) may include the processor (16) for executing the functions of components described in the present disclosure, which may be provided by hardware or by software units executing on the processor.
  • the software units may be stored in the memory component (18) and instructions may be provided to the processor (16) to carry out the functionality of the described components.
  • software units arranged to manage and/or process data on behalf of the server (14) may be provided remotely.
  • FIG 2 there is shown a high-level block diagram of the server computer (14) with exemplary components of the server (14).
  • Figure 3 is shown a first one of the registered endpoint computing devices (12.1 , in this case) with exemplary components of the registered endpoint computing device (12.1 ).
  • the endpoint device may be termed a user device, and in the exemplary embodiment of Figure 1 , the first endpoint device (12.1) may be a user device such as a smartphone.
  • the endpoint device may be any electronic device or computing device.
  • the endpoint device may, for example, form part of an Internet of Things (loT) environment. In other words, the endpoint device may, or may not be associated with a specific user.
  • LoT Internet of Things
  • the server computer (14) may include an endpoint registration component (20) which may be arranged to operatively register one or more of the endpoint computing devices (12.1 to 12.n).
  • Each of the registered endpoint computing devices e.g., 12.1 may have at least an associated unique identifier (22) and a camera (24) for capturing image data.
  • the camera (24) may also be referred to as an image capturing component, or another data capturing component may be implemented instead of a camera.
  • the server (14) may also include a receiving component (26) that may be arranged to operatively receive image data from one of the registered endpoint computing devices (e.g., from 12.1).
  • the server computer (14) may also include a machine learning module interface component (28) that includes, or that operatively accesses a machine learning module (30) which is trained by a plurality of training images (32) of offences.
  • the machine learning module may form part of the server, or it may be hosted by the server.
  • the machine learning module may be accessible by the server, e.g., online over the Internet, or in a cloud computing implementation.
  • the server computer (14) may further include an inputting component (34) that may be arranged to operatively input the received image data to the machine learning module (30).
  • the machine learning module (30) may be arranged to automatically analyse the received image data so as to identify an offence therefrom.
  • the machine learning (ML) module (30) may include an analysing component (36), e.g., for performing this automatic analysis of the received image data.
  • the ML module (30) may be pre-trained. However, embodiments are also envisaged in which the ML module is trained by the server.
  • the server computer (14) may further include a result receiving component (38) which may be arranged to operatively receive a result of the analysis from the machine learning module (30), or from the ML module interface component (28).
  • the server computer (14) may also include an output component (40) which may also be termed a transmitting component.
  • the output component (40) may be arranged, responsive to an identified offence, to operatively output an approval message to the registered endpoint computing device (e.g., 12.1 ) that transmitted the received image data.
  • the server may further include an encrypting component (42) and a database component (44), or the server (14) may have access to a database.
  • the endpoint computing device (12.1 ) may be registered at the server (14).
  • the registered endpoint computing device (12.1 ) may for example be a portable electronic device, such as a mobile phone (or smart phone), tablet computer, wearable computing device, personal digital assistant, laptop computer, digital security camera (e.g., 12.2) or smart security camera, or the like.
  • Any image capturing device or data capturing device (e.g., forming part of an electronic device) may be implemented by the present disclosure, and the present disclosure is not limited to any specific form of capturing device.
  • the registered endpoint computing device (12.1 ) may for example be a mobile device of a first user (15, see Figure 1) which may have been pre-registered or enrolled by the user (15) for use of the system (10).
  • a software application (46) may execute on the registered endpoint device (12.1) and in some implementations, registration of the registered endpoint device (12.1 ) may entail registration of the software application (46), or registration may be facilitated by the software application (46).
  • the registered endpoint device (12.1 ) and/or software application (46) may be associated with the unique identifier (22).
  • the unique identifier may, for example, include or be derived from one or more hardware descriptors of hardware components in the device, such as an International Mobile Equipment Identity (IMEI) number, a central processor unit (CPU) serial number, a hard drive serial number, or the like.
  • the unique identifier (22) may alternatively, or in addition, be a unique device identifier associated with the registered endpoint device (12.1 ) (or registered user device) such as, but not limited to a MAC (Media Access Control) address associated with the registered user device.
  • the identifier may be a communication address associated with the registered user device, such as an Internet Protocol (IP) address.
  • IP Internet Protocol
  • the method may include, by the server, using the unique identifier to ensure that data relating to the offense or the image data is only transmitted once to the server, e.g., once per offence (or a sequence of images may only be transmitted once per offence, per geolocation, or per endpoint device, as the case may be).
  • the server (14) may uniquely associate the received image data with the unique ID (22) of the registered endpoint computing device (12.1 ) so as to inhibit duplication, fraud or the like.
  • a timing component may be implemented by the server, or by the endpoint device, and the transmission of image data may be disabled for a set time period (e.g., after image data of a first suspected offence has been transmitted), before the server again allows the endpoint device to transmit image data (e.g., to prevent duplication or fraud).
  • the endpoint device may include a processor (e.g., 50) for executing the functions of components described in the present disclosure, which may be provided by hardware or by software units executing on the endpoint device (12.1).
  • the software units may be stored in the memory component (52) and instructions may be provided to the processor (50) to carry out the functionality of the described components.
  • software units arranged to manage and/or process data on behalf of the endpoint device (12.1 ) may be provided remotely.
  • Some or all of the components described may be provided by the software application downloadable onto and executable on the endpoint device (e.g. 12.1 ).
  • the server (14) may uniquely associate or link the registered endpoint device (12.1), or the unique device identifier (22), with a user record (48) of the user (15) by way of a suitable enrolment process, as is well known in the art.
  • the user record (48) may be securely stored in a database (44) associated with the server or accessible by the server (14).
  • the registered endpoint computing device (12.1 ) may further be associated with a communication address thereof, such as a mobile station international subscriber directory number (MSISDN) or other identifier or address by way of which messages, notifications, etc. may be transmitted from the server (14) to the registered endpoint device (12.1).
  • MSISDN mobile station international subscriber directory number
  • the server (14) may be enabled to associate the registered endpoint device (12) with the user record (48), so as to be uniquely identifiable by the server.
  • the endpoint computing device (12.1 ) may include the processor (50) and the memory (52), as well as a transmitting component (54) and a receiving component (56).
  • a geolocation determining system (58) of the registered endpoint computing device (12.1 ) may optionally be implemented so as to determine a geolocation of the registered endpoint computing device (12.1) in use.
  • the method (100) may include receiving geolocation data from the registered endpoint computing device (e.g., 12.1) that transmitted the image data. The geolocation data may be associated with the image data.
  • the server may be arranged to uniquely associate the endpoint computing device that transmitted the image data with the geolocation data of the received image data. This may facilitate identification and/or verification of the offence.
  • the ML module (30) may optionally be trained to take the geolocation data into account when analysing the received image data.
  • the method (100) may include associating the unique identifier (22) of the endpoint computing device (12.1) with the geolocation data. Alternatively, or in addition, the method may include associating the unique identifier of the endpoint computing device with the received image data.
  • the geolocation data may optionally be used by the server (14) to inhibit or prevent duplicate image data or fraudulent image data from being received.
  • the method (100) may further include storing and/or updating the geolocations associated with the received image data in the database (44) accessible by the server (14).
  • the application (46) may have, or it may provide an endpoint interface (60) (which may also be termed a user interface in certain embodiments), e.g., which may be arranged to receive user input.
  • a secure communication component (62) may be provided, e.g., by the application (46) and this may facilitate secure communications between the registered endpoint computing device
  • FIG. 4 there is shown a schematic flow diagram of an exemplary method (100) according to aspects of the present disclosure.
  • the system (10) described above may implement a method (100) for reporting offenses by endpoint computing devices (12.1 to 12.n) in data communication with the server (14).
  • One or more aspects of the method may be conducted at the server (14), and one or more aspects of the method may be conducted at the endpoint computing device
  • any one or more of the steps or processes of the method may be conducted either at the server (14), or at the endpoint computing device (e.g., 12.1 ).
  • the server (14) may provide the application (46) (“app”) to the endpoint computing device (12.1) e.g., by making it available to be downloadable and installable on the endpoint device.
  • a web service (64) may optionally also be provided by the server (14) to the endpoint device (12.1).
  • the server (14) may be arranged for registering one or more of the endpoint computing devices (12.1 to 12.n).
  • a user e.g., 15
  • a registration process (65) may be performed.
  • Exemplary steps of the registration process (65) may include prompting the user to input their Name, Surname, Address, Cell phone number, email address, Identification (ID) Number.
  • the registration process may also include prompting the user to scan their ID and/or drivers’ licence. It should be appreciated that these are mere examples of data input by the user for the registration process. Many other implementations of the registration process are possible. For example, embodiments are possible in which this registration process takes place by way of an automatic enrolment of the endpoint computing device (12.1 ) at the server (14) e.g., as also described elsewhere in the present disclosure.
  • the registration process (65) may be approved or declined (68) by the server (14) and an appropriate message may be transmitted to the endpoint computing device and/or displayed to the user (15).
  • the user may be enabled to open (70) the app. However, it will be appreciated that the app may also operate autonomously, and it may operate without requiring user input (e.g., on the smart security camera (12.2)).
  • the user may open (70) the app, and the user may be prompted (72) via the app to take a photo or a video of a suspected offence (preferably a digital photo or video) (or scan a license disk/plate, or take a photo thereof (see also Figure 4)).
  • the user (15) may be prompted to take a photograph of a suspected offence, and the user may for example take a digital photograph that includes image data of an offence committed by a motor vehicle, e.g., a motor vehicle (17) that may have driven recklessly.
  • a motor vehicle e.g., a motor vehicle (17) that may have driven recklessly.
  • numerous other types of offences may be witnessed, and/or the user may be enabled via the system to capture image data of various other types of offences, including criminal or traffic offences.
  • the user (15) may be prompted (73) by the app (46) to capture either a traffic offence (74), or a criminal offence (76).
  • the system and method of the present disclosure may implement a first list (78) of offences for traffic offences, and a second list (80) of offences for criminal offences. These lists may include any number of traffic offences, or criminal offences, as the case may be, and the number 100 is merely shown for exemplary purposes.
  • the first list (78) and the second list (80) may be pre-determined.
  • the server (14) may also, for example, dynamically update or change these lists (78, 80) depending on practical considerations.
  • the selection or prompting (73) is optional, and this may be performed automatically, e.g., in the example embodiment where user input is not required.
  • the smart security camera, or traffic camera e.g., 12.2
  • the smart security camera, or traffic camera may automatically perform one or more of the steps (e.g., steps 65, 70, 72, 73), and the type of offence (e.g., traffic or criminal offence) may be preconfigured for that camera.
  • image data may be received (82) at the server (14) from one of the registered endpoint computing devices (e.g., from endpoint device (12.1) in this case).
  • the image data may also be uploaded by the endpoint computing device (12.1) to the server (14). Further image data (e.g., of or relating to further images) may also be added as may be required.
  • the server (14) may be arranged to access the machine learning (“ML”) module (30) which is trained by the plurality of training images of offences.
  • the ML module (30) is also described above with reference to Figure 2.
  • the server (14) may be arranged for inputting the received image data to the machine learning module (30) which automatically analyses the received image data so as to identify an offence therefrom.
  • the server (14) may optionally receive (84) a result of the analysis from the machine learning module (30).
  • the server (14) may further be arranged, responsive to an identified offence, for outputting (86) an approval message to the registered endpoint computing device (e.g., 12.1) that transmitted the received image data.
  • the image data may be declined (90) by the server (14), e.g., based on the result received (84) from the ML module (30).
  • a notification (92) of the declined image data may be transmitted by the server (14) to the endpoint device (12.1 ).
  • an adjudication module (88) may be implemented by the server (14), or the server may have access to it.
  • the adjudication module (88) may, for example, have access to an online traffic information system and/or a national traffic authority computing system.
  • the received image data relating to the offence or infringement may additionally, or alternatively, be adjudicated by one or more trained and approved members (94) to ascertain and/or establish that the captured infringement is legitimate or to verify it.
  • the offence, infringement or crime may be processed and approved by the adjudication team (94) based on the received image data.
  • the adjudication module (88) may for example receive a user input from the adjudication team, or from one or more adjudication users.
  • the adjudication team may for example include police personnel.
  • the received user input may be indicative of the legitimacy of the offence, and it may be used by the server (14) to perform an optional or additional verification step relating to the suspected offence, e.g., before transmitting the approval or decline message(s) (86, 92) to the endpoint device(s) (12.1 to 12.n).
  • the police may approve or decline the image data, and an arrest (96) of a perpetrator, (e.g., a person driving the vehicle 17) if it was a criminal offence, may be performed.
  • the image data transmitted by the endpoint device (12.1 or 12.2) may include data relating to a pedestrian (21) which was the victim of a “hit- and-run” incident, or another type of incident that relates to a criminal offence, or a traffic offence.
  • the ML module (30) may additionally, or alternatively be arranged to automatically identify the criminal offence from the image data.
  • the ML module (30) may also be arranged to automatically identify other types of offences by analysing the image data, e.g., other traffic offences such as crossing a solid line, or running a red light as shown in the further exemplary implementation of the system (100) shown in Figure 5.
  • the endpoint device (12.1 ) may be in data communication with the server, and capable of uploading or transmitting image data relating to the offence to the server computer (14).
  • the server (14) may be arranged to allocate (98) a reward, e.g., based on successfully approving the image data.
  • the method (100) may include, by the server (14), allocating a reward that is digitally linked to the unique identifier (22) of the registered endpoint device (e.g., 12.1) from which the image data is received.
  • the reward may be a monetary reward, a coupon or a voucher.
  • the reward may be a digital reward, e.g., an e-gift card, which can be redeemed digitally, or the reward may be in the form of pre-paid airtime via a mobile network.
  • the reward may be transmitted to the endpoint device (e.g., 12.1 ), or the reward may be redeemed by a user associated with the relevant endpoint device (12.1 , 12.2, to 12.n as the case may be) in another way.
  • the reward allocated by the server may be a digital token or other digital asset which may e.g., be allocated to the registered endpoint computing device by the server.
  • the method (100) may include uniquely associating the received image data with the unique identifier (22) of the registered endpoint computing device (e.g., 12.1) from which the image data is received.
  • the unique association may, optionally, be performed by the server (14).
  • the method (100) may, optionally, include establishing a secure communications session between the registered endpoint computing device (e.g., 12.1 ) and the server (14).
  • the image data may for example be uploaded or transmitted from the registered endpoint computing device to the server computer during the secure communication session.
  • Duplication may also be avoided or alleviated by verification of the date, time, location and the like by the systems and methods of the present disclosure, e.g., to avoid any repeated reports of the infringement or offence on the same day, or during a predefined time period.
  • the method (100) may also include, by the registered endpoint computing device (e.g., 12.1 ), encrypting or digitally signing the image data, e.g., by way of an endpoint private key (23) associated with the registered endpoint device (12.1).
  • An associated encryption/decryption component (53) may optionally be provided by the endpoint device (12.1 ).
  • the server computer (14) may also have an associated encryption/decryption component (99), e.g., which may be arranged to decrypt the encrypted image data received from the endpoint computing device (e.g., 12.1 ), e.g., by way of a public key.
  • the endpoint private key (23) may, alternatively, or in addition, be associated with the unique identifier (22) of the registered endpoint computing device (12.1 ).
  • the server may be arranged to verify, authenticate, or confirm the authenticity of the received image data, e.g., by decrypting the encrypted received image data. Any cryptographic protocol, including asymmetric cryptography that utilises public and private key pairs may be implemented.
  • the encrypted image data may inhibit duplicate image data or fraudulent image data from being transmitted.
  • the received image data may be encrypted or digitally signed by the server (14) using a server-side private key, e.g., in order to uniquely associate the received image data with a specific endpoint computing device (e.g., 12.1) out of the plurality of endpoint computing devices (12.1 , 12.2, to 12.n as the case may be) forming part of (or connected to) the system (10).
  • a server-side private key e.g., in order to uniquely associate the received image data with a specific endpoint computing device (e.g., 12.1) out of the plurality of endpoint computing devices (12.1 , 12.2, to 12.n as the case may be) forming part of (or connected to) the system (10).
  • This may inhibit third parties from accessing or copying the received image data, i.e., to prevent fraud, duplication, etc.
  • the method (100) may further include outputting a digital infringement notice, fine, or penalty, based on the result of the analysis received from the machine learning module (30).
  • a notification or message relating to the digital infringement notice, fine, or penalty may optionally be transmitted by the server to a computing device associated with the relevant offender (e.g., the driver of the vehicle 17).
  • the server may have access to a database having a list of computing devices associated with individuals.
  • the ML module (30) may receive image data relating to an image captured by the user (15) in Figure 5 in which a driver of a vehicle (18) speeds across a pedestrian crossing (27) while also running over a red light (29).
  • the ML module may be trained by the plurality of training images (32) so as to automatically identify one or more of these offences from the image data.
  • the ML module may further be trained to automatically identify a number plate (31 ) or other identification from the image data, which uniquely associates the vehicle (18) with an offender.
  • the server (14) may access the database or list of computing devices associated with individuals and automatically identify the driver of the vehicle associated with the number plate (31 ) and transmit a notification, penalty or fine to an address associated with that offender.
  • the method (100) may include inputting the received image data to the machine learning module (30) which may be arranged to automatically analyse the received image data so as to identify an offender therefrom.
  • the method may include receiving an offender identifier from the machine learning module.
  • the offender identifier may, for example, be a vehicle licence plate number, biometric data, facial recognition data relating to the offender, or other data relating to the offender.
  • the image data may include data relating to biometrics of the offender, e.g., a digital picture of the face of the offender.
  • the ML module and/or the server may be arranged to automatically perform an analysis of the received image data to identify the offender from the image data.
  • the offender identifier or other data relating to the offender may, for example, be derived from the image data by the machine learning module.
  • the received image may, alternatively or in addition, be input to the adjudication module (88) by the server (14).
  • An adjudicator computing device (95) may be in data communication with the adjudicator module (88).
  • the outputting of an approval message by the server may be preceded by, or succeeded by, an approval input facilitated by the adjudicator module (88) and the adjudicator computing device (95), e.g., when an adjudicator (94) inputs an approval to the adjudicator computing device (95) in order to approve the received image data.
  • a decline input may be inputted to the adjudicator computing device (95) and hence to the adjudication module (88) associated with the server (14).
  • the received image data or the encrypted received image data may be stored in the database (44) accessible by the server (14).
  • the method (100) may include, by the server (14), storing and/or updating a digital record of the received image data. This may facilitate the server to keep track of the received image data from the plurality of endpoint computing devices (12.1 , 12.2 to 12. n).
  • Each endpoint computing device may be a personal handheld electronic device, a security camera such as a closed-circuit television (CCTV) security camera, a vehicle mounted camera such as a dashboard camera, or a traffic camera.
  • the received image data may be photographic data or videographic data.
  • the method (100) may optionally include, by the server (14), receiving a user input which is indicative of whether the image data relates to a possible traffic offence (74), or to a possible criminal offence (76).
  • the method (100) may also include, during the registration process (e.g., 65), prompting a user (e.g., 15) to input user details via the endpoint computing device (e.g., 12.1 ). This may be performed, e.g., via a user interface provided at the endpoint computing device (12.1).
  • the method (100) may further include, by the server (14), storing the user details in the database (44) accessible by the server (14).
  • the user details may include any one or more of: a telephone number, an email address, an identification number, a physical address, an Internet Protocol (IP) address or another digital identifier, and the like.
  • IP Internet Protocol
  • the method (100) may also include, by a vetting component (not shown) accessible by the server (14), using the user details to perform a background check of the user (e.g., 15).
  • a verting process may be implemented by the server (14), and this vetting process may include, but need not be limited to, a credit check, a criminal record check, an address verification, and the like.
  • the vetting component may be arranged to accept or reject the registration of the user based on a result of the background check.
  • the server includes the vetting component, or the server may access the vetting component, e.g., in a cloudcomputing or online environment.
  • the system (10) described above may implement an exemplary method for reporting offenses by endpoint computing devices (12.1 to 12.n) in data communication with the server (14).
  • Another exemplary method (1000) for reporting offences is illustrated in the swim-lane flow diagram of Figure 6 (in which respective swim-lanes delineate steps, operations or procedures performed by respective entities or devices).
  • One or more steps of the method (1000) may be performed by the endpoint device (e.g., 12.1 , 12.2, to 12.n) and one or more steps of the method (1000) may be performed by the server (14).
  • the first endpoint device (12.1) is diagrammatically illustrated, but the corresponding steps may just as well be performed at one or more of the other endpoint devices (12.2, to 12.n).
  • the endpoint device (e.g., 12.1) may be registered (1010) at the server (14).
  • Image data may be captured (1012) by the endpoint device (12.1).
  • Image data may be transmitted (1014) or uploaded from the registered endpoint computing device (12.1 ) to the server (14) where it may be received (1016).
  • the server (14) may access (1018) the machine learning module (30) that is trained by a plurality of training images (32) of offences.
  • the server (14) may input the received image data to the machine learning module (30).
  • the ML module (30) may automatically analyse (1020) the received image data in order to identify an offence therefrom (if possible).
  • the ML module may transmit (1022) a result of the analysis to the server (14), e.g., if an offence has been identified from the received image data.
  • the server (14) may receive (1024) a result of the analysis from the machine learning module (30).
  • the server may transmit (1026) an approval message to the endpoint device (12.1).
  • the endpoint device e.g., 12.1
  • the endpoint device may receive (1028) the approval message (86) from the server (14).
  • the endpoint device (12.1) may also receive (1030) the (e.g., digital) reward.
  • the method may optionally include, by a notification component of the server (14), notifying the offender of the offense.
  • the method may also include, providing for the offender a means of payment of the penalty issued by the system either through a payment component associated with the server (14) or one accessible to the server.
  • the app may be provided by the server to the endpoint device on which the app may be installed.
  • the app may be called the ‘UCANFINE Violation Management System’.
  • An endpoint device may capture image data of a suspected infringement or offense (step 1).
  • the endpoint device may be a smartphone operated by a user.
  • the image data may be assigned as either a traffic or a criminal violation and the image or image data may be uploaded to the app.
  • the endpoint device may present a display, e.g., as exemplified in Figure 9, for assigning the image data as either relating to a traffic offence or a criminal offence.
  • the received image data may be analysed by an adjudication module, or by the machine learning model/module so as to determine if a violation or offence has occurred. Means may be put in place to ensure that the user of the app is also not infringing traffic rules. If the violation/offence is approved, the offender may be identified (step 3), and the violation/offence may be processed as described in the present disclosure. Verification may be performed by the system, e.g., by analysing or digitally recognizing a vehicle licence plate number from the received image data, analysing biometric data, facial recognition data relating to the offender, or other data captured by the endpoint device (step 4).
  • the system and method of the present disclosure may be digitally connected or linked to a government system such as eNATIS to verify the offender.
  • a government system such as eNATIS to verify the offender.
  • an infringement or fine may be sent to a metropolitan or traffic agency such as RTMC or RTIA (step 5).
  • RTMC or RTIA a metropolitan or traffic agency
  • One of these entities may send the notice or fine to the offender (step 6), preferably transmitted digitally.
  • the user who uploaded the image data may be notified of the successful reporting and may be rewarded e.g., by monetary means (step 7) or another type of reward such as a digital asset or other digital reward.
  • the app may provide means through which the offender may pay the fine or infringement fee (step 8).
  • Endpoint devices may be registered and use the app following vetting by a vetting component accessible by the server.
  • more officials may be employed and a new type and level of Traffic Policing Officials with the relevant training in Technology Law Enforcement may be created. It may be desirable for both means to be implemented in conjunction.
  • the present disclosure may also be used to generate several forms of revenue. There may be potential to sell advertising space on the app or via an associated website or web service provided by the systems and methods of the present disclosure. These sources of revenue may be facilitated through banners, videos and the like, e.g., see Figure 10. An agreed percentage commission or transactional fee may be charged when payment of infringements and fines are paid by offenders through the app. This may create a so-called “earn as you fine” system to reward any reported offence resulting in an infringement and incentivise continued reporting. The monetary reward may alleviate unemployment while also enhancing road safety.
  • the system and method of the present disclosure may allow the registration of personal vehicles, notifications may be transmitted to endpoint device(s) regarding vehicle licence expiries, and this may facilitate the renewals of licence disks or vehicle licences.
  • Multiple training facilities may be created for learnership programs to train existing traffic officers and approved public members on how to use the system. Individuals may attend a training course which may be funded through the government to increase the overall skilled workforce and create employment. The course may cost R10,000 per member, for example.
  • the present disclosure may increase surveillance of road traffic activity and enhance the reporting efficiency of road traffic law violations.
  • the present disclosure may also incorporate the greater community through various already existing structures including private security entities, community security forums and trained community members. This may drastically reduce traffic infringements through the promotion of safe driving and the changing of road user behaviours due to the knowledge that road users are being monitored. This may save many lives lost on public roads and save government expenditure on health care, emergency services and road infrastructure repairs. Community involvement may also increase awareness of infringement of the law as well as create jobs.
  • the present disclosure may also contribute to the financial health of local government without having to incur additional costs since traffic fines are one of the largest sources of alternative revenue for municipalities.
  • the present disclosure may benefit the government’s current systems with cheaper, more effective, paperless, and data-recorded reporting.
  • the present disclosure may enable traffic officers to easily capture evidence of violations, resulting in more fines.
  • the present disclosure may reduce state expenses as it eliminates the need for manual handwritten fines, thereby creating an electronic, paperless, and eco-friendly system.
  • Corporate Social Investment (CSI) projects may also be created to assist victims of traffic violations associated with the captured image data (e.g., the pedestrian victim (21 ) of Figure 1 ).
  • FIG 11 illustrates an example of a computing device (1 100) in which various aspects of the disclosure may be implemented, for example the server (14) or the endpoint device(s) (12.1 to 12.n).
  • the computing device (1100) may be embodied as any form of data processing device including a personal computing device (e.g., laptop or desktop computer), a server computer (which may be self-contained, physically distributed over a number of locations), a client computer, or a communication device, such as a mobile phone (e.g., cellular telephone), satellite phone, tablet computer, personal digital assistant or the like.
  • a mobile phone e.g., cellular telephone
  • satellite phone e.g., tablet computer, personal digital assistant or the like.
  • Different embodiments of the computing device may dictate the inclusion or exclusion of various components or subsystems described below.
  • the computing device (1100) may be suitable for storing and executing computer program code.
  • the various participants and elements in the previously described system diagrams may use any suitable number of subsystems or components of the computing device (1100) to facilitate the functions described herein.
  • the computing device (1100) may include subsystems or components interconnected via a communication infrastructure (1105) (for example, a communications bus, a network, etc.).
  • the computing device (1100) may include one or more processors (1 110) and at least one memory component in the form of computer-readable media.
  • the one or more processors (11 10) may include one or more of: CPUs, graphical processing units (GPUs), microprocessors, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs) and the like.
  • a number of processors may be provided and may be arranged to carry out calculations simultaneously.
  • various subsystems or components of the computing device (1100) may be distributed over a number of physical locations (e.g., in a distributed, cluster or cloud-based computing configuration) and appropriate software units may be arranged to manage and/or process data on behalf of remote devices.
  • the memory components may include system memory (1 115), which may include read only memory (ROM) and random access memory (RAM).
  • ROM read only memory
  • RAM random access memory
  • BIOS basic input/output system
  • System software may be stored in the system memory (1115) including operating system software.
  • the memory components may also include secondary memory (1120).
  • the secondary memory (1120) may include a fixed disk (1121), such as a hard disk drive, and, optionally, one or more storage interfaces (1122) for interfacing with storage components (1123), such as removable storage components (e.g., magnetic tape, optical disk, flash memory drive, external hard drive, removable memory chip, etc.), network attached storage components (e.g., NAS drives), remote storage components (e.g., cloud-based storage) or the like.
  • removable storage components e.g., magnetic tape, optical disk, flash memory drive, external hard drive, removable memory chip, etc.
  • network attached storage components e.g., NAS drives
  • remote storage components e.g., cloud-based
  • the computing device (1100) may include an external communications interface (1130) for operation of the computing device (1100) in a networked environment enabling transfer of data between multiple computing devices (1100) and/or the Internet.
  • Data transferred via the external communications interface (1 130) may be in the form of signals, which may be electronic, electromagnetic, optical, radio, or other types of signal.
  • the external communications interface (1130) may enable communication of data between the computing device (1100) and other computing devices including servers and external storage facilities. Web services may be accessible by and/or from the computing device (1100) via the communications interface (1130).
  • the external communications interface (1 130) may be configured for connection to wireless communication channels (e.g., a cellular telephone network, wireless local area network (e.g., using Wi-FiTM), satellite-phone network, Satellite Internet Network, etc.) and may include an associated wireless transfer element, such as an antenna and associated circuitry.
  • the external communications interface (1130) may include a subscriber identity module (SIM) in the form of an integrated circuit that stores an international mobile subscriber identity and the related key used to identify and authenticate a subscriber using the computing device (1100).
  • SIM subscriber identity module
  • One or more subscriber identity modules may be removable from or embedded in the computing device (1100).
  • the computer-readable media in the form of the various memory components may provide storage of computer-executable instructions, data structures, program modules, software units and other data.
  • a computer program product may be provided by a computer-readable medium having stored computer-readable program code executable by the central processor (1110).
  • a computer program product may be provided by a non-transient or non-transitory computer- readable medium, or may be provided via a signal or other transient or transitory means via the communications interface (1130).
  • Interconnection via the communication infrastructure (1105) allows the one or more processors (1110) to communicate with each subsystem or component and to control the execution of instructions from the memory components, as well as the exchange of information between subsystems or components.
  • Peripherals such as printers, scanners, cameras, or the like
  • input/output (I/O) devices such as a mouse, touchpad, keyboard, microphone, touch-sensitive display, input buttons, speakers and the like
  • I/O controller may couple to or be integrally formed with the computing device (1100) either directly or via an I/O controller (1135).
  • One or more displays (1145) (which may be touch-sensitive displays) may be coupled to or integrally formed with the computing device (1100) via a display or video adapter (1140).
  • the computing device (1100 may include a geographical location element (1155) which is arranged to determine the geographical location of the computing device (1100).
  • the geographical location element (1155) may for example be implemented by way of a global positioning system (GPS), or similar, receiver module.
  • GPS global positioning system
  • the geographical location element (1155) may implement an indoor positioning system, using for example communication channels such as cellular telephone or Wi-FiTM networks and/or beacons (e.g., BluetoothTM Low Energy (BLE) beacons, iBeaconsTM, etc.) to determine or approximate the geographical location of the computing device (1100).
  • the geographical location element (1155) may implement inertial navigation to track and determine the geographical location of the communication device using an initial set point and inertial measurement data.
  • any of the steps, operations, components or processes described herein may be performed or implemented with one or more hardware or software units, alone or in combination with other devices.
  • Components or devices configured or arranged to perform described functions or operations may be so arranged or configured through computer-implemented instructions which implement or carry out the described functions, algorithms, or methods.
  • the computer- implemented instructions may be provided by hardware or software units.
  • a software unit is implemented with a computer program product comprising a non-transient or non- transitory computer-readable medium containing computer program code, which can be executed by a processor for performing any or all of the steps, operations, or processes described.
  • Software units or functions described in this application may be implemented as computer program code using any suitable computer language such as, for example, JavaTM, C++, or PerlTM using, for example, conventional or object-oriented techniques.
  • the computer program code may be stored as a series of instructions, or commands on a non-transitory computer-readable medium, such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive, or an optical medium such as a CD-ROM. Any such computer-readable medium may also reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

La présente divulgation concerne un procédé mis en œuvre par ordinateur pour rapporter des infractions par des dispositifs informatiques de point d'extrémité (12.1) en communication de données avec un serveur (14). Le procédé peut consister à enregistrer un ou plusieurs des dispositifs informatiques de point d'extrémité (12.1) ayant chacun un identifiant unique associé et un appareil de prise de vues pour capturer des données d'image ; recevoir des données d'image provenant de l'un des dispositifs informatiques de point d'extrémité (12.1) ; accéder à un module d'apprentissage automatique (ML) (30) entraîné par apprentissage d'images d'infractions ; entrer les données d'image reçues dans le module ML (30) qui analyse automatiquement les données pour identifier une infraction à partir de celles-ci ; recevoir un résultat d'analyse du module ML (30) ; et en réponse à une infraction identifiée, délivrer un message d'approbation au dispositif informatique de point d'extrémité (12.1) qui a transmis les données d'image. La présente divulgation s'étend à un système pour rapporter des infractions par des dispositifs informatiques de point d'extrémité (12.1) et à un produit de programme informatique pour rapporter des infractions par des dispositifs informatiques de point d'extrémité (12.1) en communication de données avec un serveur (14).
PCT/ZA2024/050016 2023-04-20 2024-04-11 Système et procédé de rapport d'infractions WO2024221021A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA202304569 2023-04-20
ZA2023/04569 2023-04-20

Publications (1)

Publication Number Publication Date
WO2024221021A1 true WO2024221021A1 (fr) 2024-10-24

Family

ID=93153309

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2024/050016 WO2024221021A1 (fr) 2023-04-20 2024-04-11 Système et procédé de rapport d'infractions

Country Status (1)

Country Link
WO (1) WO2024221021A1 (fr)

Similar Documents

Publication Publication Date Title
US11966994B2 (en) Blockchain-based method and system for processing traffic violation event
US11995213B2 (en) Event-based community creation for data sharing platform
US10440014B1 (en) Portable secure access module
US9253251B2 (en) System and method for determining a vehicle proximity to a selected address
Gipp et al. Securing video integrity using decentralized trusted timestamping on the bitcoin blockchain
US10943104B2 (en) System and method for increasing safety during traffic stops
US10535021B2 (en) Application-based commercial ground transportation management system
US9843611B2 (en) Incident data collection for public protection agencies
CN104778831A (zh) 一种高效、低成本交通违章监督系统和方法
US11776293B2 (en) System and method for increasing safety during law enforcement stops
US11769086B2 (en) Application-based commercial ground transportation clearinghouse system
US20220011999A1 (en) Visual verification of virtual credentials and licenses
KR102338589B1 (ko) 블록체인 기반의 신분증을 이용한 선행포인트 관리 시스템
US11928201B2 (en) Mobile credential with online/offline delivery
KR102081777B1 (ko) 블록체인을 이용한 교통위반 과태료 관리방법
CA2765987C (fr) Methode de validation d'une transaction de controle de la circulation routiere
US20240087354A1 (en) System and method for increasing safety during law enforcement stops
WO2024221021A1 (fr) Système et procédé de rapport d'infractions
KR20210013814A (ko) 블록체인 기술 기반 운전자 간의 블랙박스 영상의 p2p 거래/공유 서비스를 위한 플랫폼 및 그 구현 방법
Jameela et al. Crowdsourced system to report traffic violations
Galgano et al. Connected Vehicle Pilot Deployment Program Phase 1, System Requirements Specification (SyRS)–New York City.
Reddy Blockchain-Enabled Decentralization Service for Automated Parking Systems
WO2022108633A1 (fr) Système et procédé pour augmenter la sécurité lors des contrôles par les forces de l'ordre
BRPI0804913A2 (pt) sistema automatizado de estacionamento público para o gerenciamento das etapas envolvidas no processo de estacionamento público