Secured vehicle for user use only
First Claim
1. A vehicle security system, comprising:
- a security license system to lock one or more vehicle systems using encryption;
one or more sensors to detect that an authorized user of the vehicle is no longer proximate to the vehicle;
a communications system to provide, in response to the one or more sensors detecting that the authorized user of the vehicle is no longer proximate to the vehicle, a decryption key to a communication device associated with the authorized user, wherein the decryption key is configured to decrypt the encryption used for locking the one or more vehicle systems;
the communications system further configured to receive a plurality of factors for authentication in response to a request for authentication, wherein the plurality of factors includes the decryption key;
a multi-factor authentication system in communication with the communication system to determine whether access to the vehicle should be provided based on the received plurality of factors;
a low-level controller that allows access to the one or more vehicle systems upon authentication confirmation from the multi-factor authentication system; and
the multi-factor authentication system further allowing access to user profile information associated with the authorized user of the vehicle based on the authentication and only when the decryption key is received by the communications system.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for ridesharing, how does an owner or first user of one of the vehicles prevent another customer or second user from approaching a vehicle and using it for their own purposes/trips? How does the first customer lock down the vehicle for their use exclusively? How does a user secure any personal data that they may have stored in the vehicle? As one example, software locking, portable device authentication, human identification, biometric, rolling code and/or a physical identification card can be utilized to secure and/or reserve the vehicle for the first user.
-
Citations
20 Claims
-
1. A vehicle security system, comprising:
-
a security license system to lock one or more vehicle systems using encryption; one or more sensors to detect that an authorized user of the vehicle is no longer proximate to the vehicle; a communications system to provide, in response to the one or more sensors detecting that the authorized user of the vehicle is no longer proximate to the vehicle, a decryption key to a communication device associated with the authorized user, wherein the decryption key is configured to decrypt the encryption used for locking the one or more vehicle systems; the communications system further configured to receive a plurality of factors for authentication in response to a request for authentication, wherein the plurality of factors includes the decryption key; a multi-factor authentication system in communication with the communication system to determine whether access to the vehicle should be provided based on the received plurality of factors; a low-level controller that allows access to the one or more vehicle systems upon authentication confirmation from the multi-factor authentication system; and the multi-factor authentication system further allowing access to user profile information associated with the authorized user of the vehicle based on the authentication and only when the decryption key is received by the communications system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method to operate a vehicle security system comprising:
-
determining, via one or more sensors, that an authorized user of a vehicle is no longer proximate to the vehicle; communicating, in response to the one or more sensors determining that the authorized user of the vehicle is no longer proximate to the vehicle, a decryption key to a communication device associated with the authorized user, wherein the decryption key is configured to decrypt an encryption used for locking one or more vehicle systems; receiving, by a low-level controller, a plurality of factors for authentication in response to a communicated request for authentication, wherein the plurality of factors includes the decryption key; determining, by the low-level controller, whether access to the vehicle should be provided based on the received plurality of factors; allowing access, using a low-level controller, to the one or more vehicle systems upon authentication confirmation from the multi-factor authentication system; and allowing, by the low-level controller, access to user profile information associated with the authorized user of the vehicle based on the authentication and only when the decryption key is received by the communications system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A vehicle, comprising:
-
a sensor system having one or more sensors configured to determine that an authorized user of a vehicle is no longer proximate to the vehicle; a communications system configured to send a decryption key to a communication device associated with the authorized user in response to the one or more sensors determining that the authorized user of the vehicle is no longer proximate to the vehicle, wherein the decryption key is configured to decrypt an encryption used for locking one or more vehicle systems and receive a plurality of factors for authentication of a user in response to a request for authentication; a multi-factor authentication system in communication with the communication system to determine whether access to the vehicle should be provided to the user based on the received plurality of factors wherein the plurality of factors includes the decryption key; and a low-level controller that allows the user access to one or more vehicle systems upon authentication confirmation from the multi-factor authentication system, wherein the low-level controller operates at a Basic Input-Output System (“
BIOS”
) level, and wherein the low-level controller allows access to user profile information associated with the authorized user of the vehicle based on the authentication and only when the decryption key is received by the communications system.
-
Specification