UNLOCK AND AUTHENTICATION FOR AUTONOMOUS VEHICLES
First Claim
1. A method comprising:
- receiving, by one or more computing devices, information assigning a vehicle to a client computing device and a pickup location for the client computing device, the information further including an encryption key for authenticating a client computing device to the vehicle;
when the vehicle is within a given distance of the pickup location using, by the one or more computing devices, the encryption key to authenticate the client computing device to the vehicle;
when the client computing device is authenticated, estimating a first distance, by the one or more computing devices, between the client computing device and the vehicle based on a strength of a signal received from the client computing device;
determining, by the one or more computing devices, when to unlock the vehicle by selecting between a first distance value and a second distance value, wherein the first distance value is selected when the first distance is greater than a threshold value and the second distance value is selected when the first distance is less than a threshold value, and wherein the first distance value is different from the second distance value; and
automatically unlocking the vehicle, by the one or more computing devices, based on the determination.
6 Assignments
0 Petitions
Accused Products
Abstract
In one aspect, a vehicle'"'"'s computing device may receive information identifying a client computing device, a pickup location, and an encryption key. When the vehicle is within a given distance of the pickup location, the computing device uses the encryption key to authenticate the client computing device. When the client computing device is authenticated, the computing device may estimate a first distance between the client computing device and the vehicle based on a strength of a signal received from the client computing device. The computing device may then automatically determine when to unlock the vehicle by selecting between a first distance value and a second distance value. The first value is selected when the first distance is greater than a threshold value, and the second value is selected when the first distance is less than the threshold value. The computing device may unlock the vehicle based on the determination.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by one or more computing devices, information assigning a vehicle to a client computing device and a pickup location for the client computing device, the information further including an encryption key for authenticating a client computing device to the vehicle; when the vehicle is within a given distance of the pickup location using, by the one or more computing devices, the encryption key to authenticate the client computing device to the vehicle; when the client computing device is authenticated, estimating a first distance, by the one or more computing devices, between the client computing device and the vehicle based on a strength of a signal received from the client computing device; determining, by the one or more computing devices, when to unlock the vehicle by selecting between a first distance value and a second distance value, wherein the first distance value is selected when the first distance is greater than a threshold value and the second distance value is selected when the first distance is less than a threshold value, and wherein the first distance value is different from the second distance value; and automatically unlocking the vehicle, by the one or more computing devices, based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising one or more computing devices configured to:
-
receive information assigning a vehicle to a client computing device and a pickup location for the client computing device, the information further including an encryption key for authenticating a client computing device to the vehicle; when the vehicle is within a given distance of the pickup location use the encryption key to authenticate the client computing device to the vehicle; when the client computing device is authenticated, estimate a first distance between the client computing device and the vehicle based on a strength of a signal received from the client computing device; determine when to unlock the vehicle by selecting between a first distance value and a second distance value, wherein the first distance value is selected when the first distance is greater than a threshold value and the second distance value is selected when the first distance is less than a threshold value, and wherein the first distance value is different from the second distance value; and automatically unlock the vehicle based on the determination. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A tangible, non-transitory recording medium on which instructions are stored, the instructions when executed by one or more processors cause the one or more processors to perform a method, the method comprising:
-
receiving information assigning a vehicle to a client computing device and a pickup location for the client computing device, the information further including an encryption key for authenticating a client computing device to the vehicle; when the vehicle is within a given distance of the pickup location using the encryption key to authenticate the client computing device to the vehicle; when the client computing device is authenticated, estimating a first distance between the client computing device and the vehicle based on a strength of a signal received from the client computing device; determining when to unlock the vehicle by selecting between a first distance value and a second distance value, wherein the first distance value is selected when the first distance is greater than a threshold value and the second distance value is selected when the first distance is less than a threshold value, and wherein the first distance value is different from the second distance value; and automatically unlocking the vehicle based on the determination. - View Dependent Claims (19, 20)
-
Specification