Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for ridesharing, how does an owner or first user of one of the vehicles prevent another customer or second user from approaching a vehicle and using it f
Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for ridesharing, how does an owner or first user of one of the vehicles prevent another customer or second user from approaching a vehicle and using it for their own purposes/trips? How does the first customer lock down the vehicle for their use exclusively? How does a user secure any personal data that they may have stored in the vehicle? As one example, software locking, portable device authentication, human identification, biometric, rolling code and/or a physical identification card can be utilized to secure and/or reserve the vehicle for the first user.
대표청구항▼
1. A vehicle security system, comprising: a security license system to lock one or more vehicle systems using encryption;one or more sensors to detect that an authorized user of the vehicle is no longer proximate to the vehicle;a communications system to provide, in response to the one or more senso
1. A vehicle security system, comprising: a security license system to lock one or more vehicle systems using encryption;one or more sensors to detect that an authorized user of the vehicle is no longer proximate to the vehicle;a communications system to provide, in response to the one or more sensors detecting that the authorized user of the vehicle is no longer proximate to the vehicle, a decryption key to a communication device associated with the authorized user, wherein the decryption key is configured to decrypt the encryption used for locking the one or more vehicle systems;the communications system further configured to receive a plurality of factors for authentication in response to a request for authentication, wherein the plurality of factors includes the decryption key;a multi-factor authentication system in communication with the communication system to determine whether access to the vehicle should be provided based on the received plurality of factors;a low-level controller that allows access to the one or more vehicle systems upon authentication confirmation from the multi-factor authentication system; andthe multi-factor authentication system further allowing access to user profile information associated with the authorized user of the vehicle based on the authentication and only when the decryption key is received by the communications system. 2. The vehicle security system of claim 1, wherein the low-level controller operates at a Basic Input-Output System (“BIOS”) level, wherein the low-level controller encrypts a component to prevent use of the component by an unauthenticated user, wherein the component is one or more of the vehicle's navigation, communication, control, and/or sensor, wherein the decryption key must be provided by the first user to decrypt and enable the component, and wherein the plurality of factors includes one or more of user identity information, biometric information, license information, rolling code information, password information, time information, location information, reservation information, secure code information, and/or an authorization code. 3. The vehicle security system of claim 1, wherein the vehicle operates in a high or full automation level, wherein when operating in the high automation level a human driver is separated from controlling all vehicle operations, wherein when operating in the full automation level the vehicle controls all driving operations, wherein, in the high or full automation levels, the vehicle receives sensor information describing a condition of a target in an environment surrounding the vehicle, and autonomously changes to a driving operation of the vehicle in response to the sensor information, wherein the low-level controller operates at a Basic Input-Output System (“BIOS”) level, wherein the communications system receives the plurality of factors for authentication one or more of wirelessly, through direct electrical contact, via a user interface, from a smartphone, from an electronic device, audibly, and/or from a reader, and wherein the low-level controller authenticates the user using one or more of a rolling RSA security license, biometric information, public key/private key encryption technique, and an encryption technique. 4. The vehicle security system of claim 1, wherein the vehicle is a shared vehicle, the vehicle being shared by at least the user and a second user, and one of the plurality of factors for authentication is a reservation for the vehicle at a date and a time, wherein the low-level controller encrypts a component to prevent use of the component by an unauthenticated user, wherein the component is one or more of the vehicle's navigation, communication, control, and/or sensor, wherein the decryption key must be provided by an authenticated user to decrypt and enable the component, wherein the user, but not the second user, is provided with the decryption key at a first time and the second user, but not the user, is provided with the decryption key at a different second time, and wherein the decryption key is provided wirelessly to smartphones of the user and the second user. 5. The vehicle security system of claim 1, wherein the authentication provides access to only some of the vehicle systems, wherein the vehicle is a shared vehicle, the vehicle being shared by at least the user and a second user, and one of the plurality of factors for authentication is a reservation for the vehicle at a date and a time, wherein different first and second tokens are provided to the user and the second user, respectively at different times, wherein the tokens are generated by an RSA SecurID authentication mechanism, and wherein the low-level controller determines that the first token, but not the second token, is valid at a first time and that the second token, but not the first token, is valid at a different second time. 6. The vehicle security system of claim 1, wherein a license associated with the authentication specifies which vehicle systems a particular user can access, wherein a trusted platform module authenticates a key received from the user, wherein the trusted platform module is embedded in a motherboard of an on board vehicle system, and wherein the key is a hardware key. 7. The vehicle security system of claim 1, wherein after authentication the vehicle is subsequently locked and one or more of the one or more vehicle systems are encrypted, wherein a trusted platform module authenticates a key received from the user, wherein the trusted platform module is embedded in a motherboard of an on board vehicle system, wherein the key is the decryption key, and wherein the decryption is wrapped using the trusted platform module, thereby binding a storage device comprising encrypted information that is decrypted by the decryption key to a device comprising the motherboard. 8. The vehicle security system of claim 1, wherein the low-level controller operates at a Basic Input-Output System (“BIOS”) level, wherein the low-level controller encrypts a component to prevent use of the component by an unauthenticated user, wherein the component is one or more of the vehicle's navigation, communication, control, and/or sensor, and wherein the vehicle communicates the decryption key to decrypt the encrypted component to a computational component in a cloud. 9. The vehicle security system of claim 1, wherein successful authentication of the user triggers downloading by the vehicle of the user's information from a remote location. 10. The vehicle security system of claim 1, wherein the user has reserved the vehicle over a specified time period and/or for pickup at a specific location, wherein the request for authentication is triggered by a vehicle sensor detecting a presence of the user, and wherein the low-level controller considers the time and/or location of the user's presence in determining whether to authenticate successfully the user. 11. A method to operate a vehicle security system comprising: determining, via one or more sensors, that an authorized user of a vehicle is no longer proximate to the vehicle;communicating, in response to the one or more sensors determining that the authorized user of the vehicle is no longer proximate to the vehicle, a decryption key to a communication device associated with the authorized user, wherein the decryption key is configured to decrypt an encryption used for locking one or more vehicle systems;receiving, by a low-level controller, a plurality of factors for authentication in response to a communicated request for authentication, wherein the plurality of factors includes the decryption key;determining, by the low-level controller, whether access to the vehicle should be provided based on the received plurality of factors;allowing access, using a low-level controller, to the one or more vehicle systems upon authentication confirmation from the multi-factor authentication system; andallowing, by the low-level controller, access to user profile information associated with the authorized user of the vehicle based on the authentication and only when the decryption key is received by the communications system. 12. The method of claim 11, wherein the low-level controller operates at a Basic Input-Output System (“BIOS”) level, wherein the low-level controller encrypts a component to prevent use of the component by an unauthenticated user, wherein the component is one or more of the vehicle's navigation, communication, control, and/or sensor, wherein the decryption key must be provided by the user to decrypt and enable the component, and wherein the plurality of factors include one or more of user identity information, biometric information, license information, rolling code information, password information, time information, location information, reservation information, secure code information, and/or an authorization code. 13. The method of claim 11, wherein the vehicle operates in a high or full automation level, wherein when operating in the high automation level a human driver is separated from controlling all vehicle operations, wherein when operating in the full automation level the vehicle controls all driving operations, wherein, in the high or full automation levels, the vehicle receives sensor information describing a condition of a target in an environment surrounding the vehicle, and autonomously changes to a driving operation of the vehicle in response to the sensor information, wherein the low-level controller operates at a Basic Input-Output System (“BIOS”) level, wherein a communications system receives the plurality of factors for authentication one or more of wirelessly, through direct electrical contact, via a user interface, from a smartphone, from an electronic device, audibly, and/or from a reader, and wherein the low-level controller authenticates the first user using one or more of a rolling RSA security license, biometric information, public key/private key encryption technique, and an encryption technique. 14. The method of claim 11, wherein the vehicle is a shared vehicle, the vehicle being shared by at least the user and a second user, and one of the plurality of factors for authentication is a reservation for the vehicle at a date and a time, wherein the low-level controller encrypts a component to prevent use of the component by an unauthenticated user, wherein the component is one or more of the vehicle's navigation, communication, control, and/or sensor, wherein the decryption key must be provided by an authenticated user to decrypt and enable the component, wherein the user, but not the second user, is provided with the decryption key at a first time and the second user, but not the user, is provided with the decryption key at a different second time, and wherein the decryption key is provided wirelessly to smartphones of the user and the second user. 15. The method of claim 11, wherein the authentication provides access to only some of the vehicle systems, wherein the vehicle is a shared vehicle, the vehicle being shared by at least the user and a second user, and one of the plurality of factors for authentication is a reservation for the vehicle at a date and a time, wherein different first and second tokens are provided to the user and the second user, respectively at different times, wherein the tokens are generated by an RSA SecurID authentication mechanism, and wherein the low-level controller determines that the first token, but not the second token, is valid at a first time and that the second token, but not the first token, is valid at a different second time. 16. The method of claim 11, wherein a license associated with the authentication specifies which vehicle systems a user can access, wherein a trusted platform module authenticates a key received from the user, wherein the trusted platform module is embedded in a motherboard of an on board vehicle system, and wherein the key is a hardware key. 17. The method of claim 11, wherein after authentication the vehicle is subsequently locked and one or more of the one or more vehicle systems are encrypted, wherein a trusted platform module authenticates a key received from the user, wherein the trusted platform module is embedded in a motherboard of an on board vehicle system, wherein the key is the decryption key, and wherein the decryption is wrapped using the trusted platform module, thereby binding a storage device comprising encrypted information that is decrypted by the decryption key to a device comprising the motherboard. 18. The method of claim 11, wherein the low-level controller operates at a Basic Input-Output System (“BIOS”) level, wherein the low-level controller encrypts a component to prevent use of the component by an unauthenticated user, wherein the component is one or more of the vehicle's navigation, communication, control, and/or sensor, and wherein the vehicle communicates the decryption key to decrypt the encrypted component to a computational component in a distributed network. 19. The method of claim 11, wherein the user has reserved the vehicle over a specified time period and/or for pickup at a specific location, wherein the request for authentication is triggered by a vehicle sensor detecting a presence of the user, and wherein the low-level controller considers the time and/or location of the first user presence in determining whether to authenticate successfully the user. 20. A vehicle, comprising: a sensor system having one or more sensors configured to determine that an authorized user of a vehicle is no longer proximate to the vehicle;a communications system configured to send a decryption key to a communication device associated with the authorized user in response to the one or more sensors determining that the authorized user of the vehicle is no longer proximate to the vehicle, wherein the decryption key is configured to decrypt an encryption used for locking one or more vehicle systems and receive a plurality of factors for authentication of a user in response to a request for authentication;a multi-factor authentication system in communication with the communication system to determine whether access to the vehicle should be provided to the user based on the received plurality of factors wherein the plurality of factors includes the decryption key; anda low-level controller that allows the user access to one or more vehicle systems upon authentication confirmation from the multi-factor authentication system, wherein the low-level controller operates at a Basic Input-Output System (“BIOS”) level, and wherein the low-level controller allows access to user profile information associated with the authorized user of the vehicle based on the authentication and only when the decryption key is received by the communications system.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (209)
McWalter,William F.; Kelly,Lisa M.; Decristo,Dianna L.; Razavi,Behfar, Abstract user interface manager with prioritization.
Abrams, Vincent D.; Izzard, III, Alexander Edwin; Cunningham, Glen; Parker, Kenneth R.; Woods, Timothy E., Appliance communication and control system and appliances for use in same.
Berenz, John J.; McIver, George W.; Niesen, Joseph W.; Dunbridge, Barry; Shreve, Gregory A., Application of human facial features recognition to automobile safety.
Clanton,Charles H.; Ventrella,Jeffrey J.; Paiz,Fernando J., Cinematic techniques in avatar-centric communication during a multi-user online simulation.
Kent Fillmore Hayes, Jr. ; Brett Graham King, Client-server system for maintaining a user desktop consistent with server application user access permissions.
Ohta Takashi,JPX ; Iwatsuki Kunihiro,JPX ; Fukumura Kagenori,JPX, Control system for controlling the behavior of a vehicle based on accurately detected route information.
Aaron, Jeffrey; Streijl, Robert, Devices, methods, and computer-readable media for providing sevices based upon identification of decision makers and owners associated with communication services.
Ashihara, Jun, Driver authentication apparatus and method for identifying automatically-extracted driver's operation feature data with already-registered feature data.
Lepley, Geoffrey Peter; Miles, Dean Anthony; Gallichan, Kevin Langley; Robberts, Nicholas James, Dual-function removable reversable unit for radio and telephone.
Kashima, Koji; Sakaguchi, Tatsumi; Oryoji, Hiroshi; Eshima, Masashi, Electronic apparatus, reproduction control system, reproduction control method, and program therefor.
Leising Maurice B. (Clawson MI) Benford Howard L. (Bloomfield Hills MI) Holbrook Gerald L. (Rochester Hills MI), Electronically-controlled, adaptive automatic transmission system.
Filev, Dimitar Petrov; Gusikhin, Oleg Yurievitch; Syed, Fazal Urrahman; Klampfl, Erica; Giuli, Thomas J.; Chen, Yifan, Emotive engine and method for generating a simulated emotion for an information system.
Chatham Michael D. (Bloomington IL) Fotsch Paul D. (Dunlap IL) Heyveld Doyle G. (Peoria IL) Kelley Edward P. (Chillicothe IL) Lohmann ; Jr. Walter E. (Decatur IL) Roley David R. (Morton IL) Sieck Cha, Fatigue analysis and warning system.
Waeller, Christoph; Wu, Yongmei; Bohnenberger, Thorsten, Information device, preferably in a motor vehicle, and method for supplying information about vehicle data, in particular vehicle functions and their operation.
Shuman, Valerie; Paulauskas, Cynthia; Shields, T. Russell; Weiland, Richard J.; Jasper, John C., Method and system for an in-vehicle computing architecture.
Cataldo, Anthony Joseph; Haggerty, Terry; Ubik, Henry Thomas; Patel, Mona; Harrington, Tim; Bacon, Tom; Wisherd, Dave; Bowman, Doug, Method and system for capturing vehicle data using an RF transmitter.
Uyeki, Robert; Tamura, Kazuya; Ohki, Eric Shigeru; Kurciska, Maja, Method and system for using traffic flow data to navigate a vehicle to a destination.
Bhattacharya, Debojyoti; Chakrabarty, Sugato; Bellur, Bhargav Ramchandra, Method and system of reconstructing a secret code in a vehicle for performing secure operations.
McLaughlin Paul F. (Hatfield PA) Bristow Robert W. (Hatboro PA) Kummer Karl T. (Doylestown PA), Method for enacting failover of a 1:1 redundant pair of slave processors.
Davis, Terry L., Method to use empty slots in onboard aircraft servers and communication devices to install non-proprietary servers and communications interfaces.
Rhoads, Geoffrey B.; Rodriguez, Tony F.; Lord, John D.; MacIntosh, Brian T.; Rhoads, Nicole; Conwell, William Y., Methods and systems for content processing.
Penilla, Angel A.; Penilla, Albert S., Methods and systems for defining vehicle user profiles and managing user profiles via cloud systems and applying learned settings to user profiles.
Baldas Jason Paul ; Simpson Tracy Lee ; Ohashi Hitoshi ; Morrison Gerald Oscar ; Alfano Gregory W. ; Palaski William Edwin ; George Richard David ; Avram Eileen Marie, Overhead console for motor vehicle.
Walker, Richard C., PFN/TRAC system FAA upgrades for accountable remote and robotics control to stop the unauthorized use of aircraft and to improve equipment management and public safety in transportation.
Carnevali, Jeffrey D., Reconfigurable console mount having a plurality of interchangeable tongue-and-groove blank and equipment mounting panels and quick disconnect clamps.
Addepalli, Sateesh K.; Dai, Lillian Lei; Sudhaakar, Raghuram S.; Somers, Robert Edward, System and method for establishing communication channels between on-board unit of vehicle and plurality of nodes.
Addepalli, Sateesh K.; Moghe, Ashok K.; Bonomi, Flavio; Girardot, Marc Jean-Philippe; Thubert, Pascal, System and method for internal networking, data optimization and dynamic frequency selection in a vehicular environment.
Jensen, Peter Strarup; Veselov, Pavel S.; Ayyagari, Venkata S.; Grigoryev, Nikolay G., System and method for managing and deploying functional services to a vehicle client.
Van Wiemeersch, John Robert; Kleve, Robert Bruce; Schondorf, Steven Yellin; Miller, Thomas Lee; Bennie, Brian; Kwon, Dae Wook; Aldighieri, Paul, System and method for remotely controlling vehicle components from a nomadic communication device or computer.
Tomkins, Steve; Dodge, Dan; Van Der Veen, Peter; Tang, Xiaodan; Burgess, Colin, System having user interface using motion based object selection and mouse movement.
Michmerhuizen,Mark; Syfert,Timothy J.; Spencer,John D.; Strazanac,Joseph W., System, method and device for providing communication between a vehicle and a plurality of wireless devices having different communication standards.
Jackson, Dean Kenneth; Klein, Daniel Victor, Systems and methods for updating vehicle behavior and settings based on the locations of vehicle passengers.
Sanders Rudy T. (9520 Rhea Ave. Northridge CA 91324) Fleishman Lee (2169 Brookfield Dr. Thousand Oaks CA 91362), User identifying vehicle control and security device.
Shaw David C. H. (3312 E. Mandeville Pl. Orange CA 92667) Shaw Judy Z. Z. (3312 E. Mandeville Pl. Orange CA 92667), Vehicle collision avoidance system.
Zyburt Jeffrey P. ; Cowan Allan L. ; Grimaudo Donald W. ; Shaffer Frederick J. ; Muzzell Jeffrey ; Nelson James G. ; Gu Zhengang ; Frinkle Marvin L. ; Robinson David T. ; Zuo Kai, Vehicle control system for automated durability road (ADR) facility.
Sato Koji (Mishima JPX) Morita Makoto (Mishima JPX) Kizu Masafumi (Toyota JPX), Vehicle data processing system which can communicate with information center.
Filippov, Mikhail O.; Fitch, Osa; Keller, Scott P.; O'Connor, John; Zendzian, David S.; El Fata, Nadim; Larsen, Kevin; Meuchel, Arlen Eugene; Schmaltz, Mark David; Allard, James; De Roo, Chris A.; Norris, William Robert; Norby, Andrew Julian; Turner, Christopher David Glenn, Versatile robotic control module.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.