Methods and systems for location-based authentication using neighboring sensors
First Claim
1. A method of determining the veracity of vehicle information corresponding to autonomous vehicles, comprising:
- determining, via a processor in a server computing device, whether vehicle information received from a reporting vehicle should be evaluated based on a result of comparing the received vehicle information to contextual information, wherein the processor in the server computing device determines whether the vehicle information includes suspicious information that should be evaluated with greater scrutiny, wherein the processor in the server computing device compares the received vehicle information to previous reports from the same vehicle, reports received from other vehicles or information in a road condition database;
in response to determining that the vehicle information includes suspicious information, identifying, by the server computing device, sensors for polling based on the received vehicle information to identify a location of a segment of a road reported as blocked or area near a reported emergency and in response to determining, based on the result of comparing the received vehicle information to the contextual information, that the received vehicle information should be evaluated;
polling, by the server computing device, the identified sensors to receive sensor information; and
verifying, in the server computing device, the received vehicle information based on the received sensor informationin response to determining that the vehicle information has not been successfully verified, the server computing device discarding the vehicle information and determining whether the reporting vehicle has been infected with malware or is experiencing a cyber-attack; and
sending, by the server computing device, a control message to the reporting vehicle that includes information suitable for invoking a malware detection system in the reporting vehicle.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments include methods, and computing devices implementing the methods, for authenticating vehicle information by polling selected sensors. A server computing device receiving vehicle information from a reporting vehicle may compare the received vehicle information to contextual information to generate a comparison result, and determine whether the received vehicle information should be evaluated with greater scrutiny based on the comparison result. The server computing device may select sensors for polling based on the received vehicle information (and in response to determining that the received vehicle information should be evaluated with greater scrutiny), and poll the selected sensors to received sensor information. The server computing device may use the received sensor information to corroborate the received vehicle information, and perform a responsive action based on the result of the corroboration.
-
Citations
30 Claims
-
1. A method of determining the veracity of vehicle information corresponding to autonomous vehicles, comprising:
-
determining, via a processor in a server computing device, whether vehicle information received from a reporting vehicle should be evaluated based on a result of comparing the received vehicle information to contextual information, wherein the processor in the server computing device determines whether the vehicle information includes suspicious information that should be evaluated with greater scrutiny, wherein the processor in the server computing device compares the received vehicle information to previous reports from the same vehicle, reports received from other vehicles or information in a road condition database; in response to determining that the vehicle information includes suspicious information, identifying, by the server computing device, sensors for polling based on the received vehicle information to identify a location of a segment of a road reported as blocked or area near a reported emergency and in response to determining, based on the result of comparing the received vehicle information to the contextual information, that the received vehicle information should be evaluated; polling, by the server computing device, the identified sensors to receive sensor information; and verifying, in the server computing device, the received vehicle information based on the received sensor information in response to determining that the vehicle information has not been successfully verified, the server computing device discarding the vehicle information and determining whether the reporting vehicle has been infected with malware or is experiencing a cyber-attack; and sending, by the server computing device, a control message to the reporting vehicle that includes information suitable for invoking a malware detection system in the reporting vehicle. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A server computing device, comprising:
a processor configured with processor-executable instructions to; determine whether vehicle information received from a reporting vehicle should be evaluated based on a result of a comparison of the received vehicle information to contextual information, wherein the processor determines whether the vehicle information includes suspicious information that should be evaluated with greater scrutiny, wherein the processor compares the received vehicle information to previous reports from the same vehicle, reports received from other vehicles or information in a road condition database; in response to determining that the vehicle information includes suspicious information, identify sensors for polling based on the received vehicle information to identify a location of a segment of a road reported as blocked or area near a reported emergency and in response to determining, based on the result of the comparison of the received vehicle information to the contextual information, that the received vehicle information should be evaluated; poll identified sensors to receive sensor information; and verify the received vehicle information based on the received sensor information in response to determining that the vehicle information has not been successfully verified, discarding the vehicle information and determining whether the reporting vehicle has been infected with malware or is experiencing a cyber-attack; and sending a control message to the reporting vehicle that includes information suitable for invoking a malware detection system in the reporting vehicle. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
21. A non-transitory computer readable storage medium having stored thereon processor-executable software instructions configured to cause a processor in a server computing device to perform operations comprising:
-
determining whether vehicle information received from a reporting vehicle should be evaluated based on a result of comparing the received vehicle information to contextual information, wherein the processor in the server computing device determines whether the vehicle information includes suspicious information that should be evaluated with greater scrutiny, wherein the processor in the server computing device compares the received vehicle information to previous reports from the same vehicle, reports received from other vehicles or information in a road condition database; in response to determining that the vehicle information includes suspicious information, identifying sensors for polling based on the received vehicle information to identify a location of a segment of a road reported as blocked or area near a reported emergency and in response to determining that the received vehicle information should be evaluated; polling identified sensors to receive sensor information; and verifying the received vehicle information based on the received sensor information, in response to determining that the vehicle information has not been successfully verified, the server computing device discarding the vehicle information and determining whether the reporting vehicle has been infected with malware or is experiencing a cyber-attack; and sending, by the server computing device, a control message to the reporting vehicle that includes information suitable for invoking a malware detection system in the reporting vehicle. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A server computing device, comprising:
-
means for determining whether vehicle information received from a reporting vehicle should be evaluated based on a result of comparing the received vehicle information to contextual information, wherein the server computing device determines whether the vehicle information includes suspicious information that should be evaluated with greater scrutiny, wherein the server computing device compares the received vehicle information to previous reports from the same vehicle, reports received from other vehicles or information in a road condition database; in response to determining that the vehicle information includes suspicious information, means for identifying sensors for polling based on the received vehicle information to identify a location of a segment of a road reported as blocked or area near a reported emergency and in response to determining, based on the result of comparing the received vehicle information to the contextual information, that the received vehicle information should be evaluated; means for polling identified sensors to receive sensor information;
means for verifying the received vehicle information based on the received sensor information;in response to determining that the vehicle information has not been successfully verified, means for discarding the vehicle information and means for determining whether the reporting vehicle has been infected with malware or is experiencing a cyber-attack; and means for sending a control message to the reporting vehicle that includes information suitable for invoking a malware detection system in the reporting vehicle.
-
Specification