Rogue vehicle detection
First Claim
Patent Images
1. A method for rogue vehicle detection, the method comprising:
- receiving at least one violation report for a vehicle from at least one mobile communication device, wherein the at least one violation report is indicative of a traffic violation made by one or more vehicles, and wherein the at least one violation report includes data elements of the vehicle;
extracting the data elements from the at least one violation report for the vehicle;
authenticating the at least one violation report based on an authenticity metric, wherein a value of the authenticity metric is computed by comparing the extracted data elements with reference authenticity measurement data, the reference authenticity measurement data indicates conditions pertaining to a location from which violation by the vehicle is reported;
determining trustworthiness of the at least one violation report using a trustworthiness metric, wherein the trustworthiness metric is based on the authenticity metric and trustworthiness parameters;
categorizing the vehicle as a rogue vehicle, based on the authenticating and the determining trustworthiness; and
compiling a traffic observation record of the rogue vehicle based on at least one of the at least one violation report, the authenticity metric, and the trustworthiness metric.
1 Assignment
0 Petitions
Accused Products
Abstract
The present subject matter relates to a method for rogue vehicle detection. The method includes receiving at least one violation report for a vehicle from at least one mobile communication device. The at least one violation report is indicative of a traffic violation made by the one or more vehicles. The method further includes categorizing the vehicle as a rogue vehicle, based on at least one rogue vehicle detection metric, the at least one rogue vehicle detection metric being determined from the violation report. The method also includes compiling a traffic observation record based on at least one of the violation report and the rogue vehicle detection metric.
-
Citations
14 Claims
-
1. A method for rogue vehicle detection, the method comprising:
-
receiving at least one violation report for a vehicle from at least one mobile communication device, wherein the at least one violation report is indicative of a traffic violation made by one or more vehicles, and wherein the at least one violation report includes data elements of the vehicle; extracting the data elements from the at least one violation report for the vehicle; authenticating the at least one violation report based on an authenticity metric, wherein a value of the authenticity metric is computed by comparing the extracted data elements with reference authenticity measurement data, the reference authenticity measurement data indicates conditions pertaining to a location from which violation by the vehicle is reported; determining trustworthiness of the at least one violation report using a trustworthiness metric, wherein the trustworthiness metric is based on the authenticity metric and trustworthiness parameters; categorizing the vehicle as a rogue vehicle, based on the authenticating and the determining trustworthiness; and compiling a traffic observation record of the rogue vehicle based on at least one of the at least one violation report, the authenticity metric, and the trustworthiness metric. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing system for detecting a rogue vehicle, the system comprising:
-
a processor; and a memory coupled to the processor for executing a plurality of modules present in the memory, the plurality of modules comprising; a validation module for; receiving at least one violation report from at least one mobile communication device, wherein the at least one violation report is indicative of traffic violation made by one or more vehicles, and wherein the at least one violation report includes data elements of the vehicle; extracting the data elements from the at least one violation report for the vehicle; authenticating the at least one violation report based on an authenticity metric, wherein a value of the authenticity metric is computed by comparing the extracted data elements with reference authenticity measurement data, the reference authenticity measurement data indicates conditions pertaining to a location from which violation by the vehicle is reported; determining trustworthiness of the at least one violation report using a trustworthiness metric, wherein the trustworthiness metric is based on the authenticity metric and trustworthiness parameters; and categorizing the vehicle as a rogue vehicle, based on the authenticating and the determining trustworthiness; a compilation module for compiling a traffic observation record of the rogue vehicle based on the at least one violation report, the authenticity metric, and the trustworthiness metric. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium having embodied thereon a computer program for executing a method comprising:
-
receiving at least one violation report for a vehicle from at least one mobile communication device, wherein the at least one violation report is indicative of a traffic violation made by one or more vehicles, and wherein the at least one violation report includes data elements of the vehicle; extracting the data elements from the at least one violation report for the vehicle; authenticating the at least one violation report based on an authenticity metric, wherein, a value of the authenticity metric is computed by comparing the extracted data elements with reference authenticity measurement data, the reference authenticity measurement data indicates conditions pertaining to a location from which violation by the vehicle is reported; determining trustworthiness of the at least one violation report using a trustworthiness metric, wherein the trustworthiness metric is based on the authenticity metric and trustworthiness parameters; categorizing the vehicle as a rogue vehicle, based on the authenticating and the determining trustworthiness; and compiling a traffic observation record of the rogue vehicle based on at least one of the violation report, the authenticity metric, and the trustworthiness metric.
-
Specification