Automatic identification of cloned vehicle identifiers
First Claim
1. A computer-implemented method, comprising:
- determining legitimate trajectory information associated with a plurality of legitimate vehicles;
generating illegitimate trajectory information based on the legitimate trajectory information;
training a decision model to detect a cloned vehicle identifier based on the legitimate trajectory information and the illegitimate trajectory information;
identifying sample vehicle identifier data collected by a plurality of vehicle identifier recognition devices;
determining first suspicious vehicle identifiers based at least in part on the decision model and the sample vehicle identifier data;
identifying common driving sequences between the plurality of vehicle identifier recognition devices based on the sample vehicle identifier data;
determining second suspicious vehicle identifiers based at least in part on the first suspicious vehicle identifiers and the common driving sequences; and
sending the second suspicious vehicle identifiers to an enforcement agency device associated with an enforcement agent.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are system, method, and computer program product embodiments for automatically detecting cloned vehicle identifiers. An embodiment operates by determining legitimate trajectory information and illegitimate trajectory information corresponding to vehicular travel in a geographic area, and training a decision model to detect a cloned vehicle identifier based on the legitimate trajectory information and the illegitimate trajectory information. Furthermore, the embodiment identifies vehicles potentially using a cloned vehicle identifier based on the decision model and common driving patterns within the geographic area. In some embodiments, enforcement agents are notified of the vehicles potentially using a cloned vehicle identifier.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
determining legitimate trajectory information associated with a plurality of legitimate vehicles; generating illegitimate trajectory information based on the legitimate trajectory information; training a decision model to detect a cloned vehicle identifier based on the legitimate trajectory information and the illegitimate trajectory information; identifying sample vehicle identifier data collected by a plurality of vehicle identifier recognition devices; determining first suspicious vehicle identifiers based at least in part on the decision model and the sample vehicle identifier data; identifying common driving sequences between the plurality of vehicle identifier recognition devices based on the sample vehicle identifier data; determining second suspicious vehicle identifiers based at least in part on the first suspicious vehicle identifiers and the common driving sequences; and sending the second suspicious vehicle identifiers to an enforcement agency device associated with an enforcement agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable device having instructions stored thereon that, when executed by at least one computing device, causes the at least one computing device to perform operations comprising:
-
determining legitimate trajectory information associated with a plurality of legitimate vehicles; generating illegitimate trajectory information based on the legitimate trajectory information; training a decision model to detect a cloned vehicle identifier based on the legitimate trajectory information and the illegitimate trajectory information; identifying sample vehicle identifier data collected by a plurality of vehicle identifier recognition devices; determining first suspicious vehicle identifiers based at least in part on the decision model and the sample vehicle identifier data; identifying common driving sequences between the plurality of vehicle identifier recognition devices based on the sample vehicle identifier data; determining second suspicious vehicle identifiers based at least in part on the first suspicious vehicle identifiers and the common driving sequences; and sending the second suspicious vehicle identifiers to an enforcement agency device associated with an enforcement agent. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A cloned vehicle identifier detection system, comprising:
-
a memory; and at least one processor coupled to the memory and configured to; determine legitimate trajectory information associated with a plurality of legitimate vehicles; generate illegitimate trajectory information based on the legitimate trajectory information; train a decision model to detect a cloned vehicle identifier based on the legitimate trajectory information and the illegitimate trajectory information; identify sample vehicle identifier data collected by a plurality of vehicle identifier recognition devices; determine first suspicious vehicle identifiers based at least in part on the decision model and the sample vehicle identifier data; identify common driving sequences between the plurality of vehicle identifier recognition devices based on the sample vehicle identifier data; and determine second suspicious vehicle identifiers based at least in part on the first suspicious vehicle identifiers and the common driving sequences. - View Dependent Claims (17, 18, 19, 20)
-
Specification