AUTONOMOUS VEHICLE THEFT PREVENTION
First Claim
Patent Images
1. A system comprising:
- a server configured toreceive, over a network from a requesting device, an encrypted payload of a destination request specifying a destination location for an autonomous vehicle,validate uniqueness of a timestamp of the destination request,decrypt the encrypted payload to identify the destination location using a long key indexed to a key offset determined using the timestamp, andsend a driving command to the autonomous vehicle specifying the destination location.
1 Assignment
0 Petitions
Accused Products
Abstract
A destination request may specify a destination location for an autonomous vehicle identified by a vehicle identifier. The request may be for uniqueness of a timestamp of the destination request. An encrypted payload of the request may be decrypted to identify the destination location using a long key associated with the vehicle identifier and indexed to a key offset determined using the timestamp. A driving command may be sent to the autonomous vehicle specifying the destination location.
83 Citations
20 Claims
-
1. A system comprising:
a server configured to receive, over a network from a requesting device, an encrypted payload of a destination request specifying a destination location for an autonomous vehicle, validate uniqueness of a timestamp of the destination request, decrypt the encrypted payload to identify the destination location using a long key indexed to a key offset determined using the timestamp, and send a driving command to the autonomous vehicle specifying the destination location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A system comprising:
a mobile device configured to receive a destination location for an autonomous vehicle; generate a destination request specifying the destination location; identify a key offset into a long key using a timestamp of the destination request; encrypt a payload of the destination request using the key offset; and send the destination request to a server to forward to the autonomous vehicle. - View Dependent Claims (9, 10, 11, 12, 13)
-
14. A computer-implemented method comprising:
-
receiving a request specifying a destination for an autonomous vehicle identified by a vehicle identifier; validating uniqueness of a request timestamp for the vehicle identifier; decrypting a request payload to identify the destination using a long key associated with the vehicle identifier and indexed to a key offset determined using the timestamp; and sending a driving command to the autonomous vehicle specifying the destination. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification