Trip anomaly detection system
First Claim
Patent Images
1. An anomaly detection system for a service comprising:
- one or more processors; and
one or more memory resources storing instructions that, when executed by the one or more processors, cause the anomaly detection system to;
construct routine route profiles for users of a network service by, for each of the users, (i) collecting historical route data, and (ii) identifying correlated route shapes in the historical route data, wherein the correlated route shapes comprise a plurality of distinct routes between a common start point or region and a common end point or region;
monitor a current route traveled by a respective one of the users;
identify a matching routine route profile of the respective user;
determine a probable anomaly in the current route based on the matching routine route profile; and
in response to determining the probable anomaly, perform one or more actions in accordance with a safety protocol, wherein an initial action of the safety protocol comprises transmitting a status query to a mobile device of the respective user, and wherein a subsequent action in the safety protocol comprises contacting a predetermined user contact to report the probable anomaly.
5 Assignments
0 Petitions
Accused Products
Abstract
An anomaly detection system is provided in connection with a transport service. The anomaly detection system can construct routine route profiles for individual users of the transport service using historical route data. The anomaly detection system can monitor a current route traveled by a user. The anomaly detection system can further identify a matching routine route profile of the respective user. The anomaly detection system can utilize the matching routine route profile to identify a probable anomaly in the current route. In response to detecting the probable anomaly, the anomaly detection system can enable a safety protocol to perform a number of actions.
-
Citations
18 Claims
-
1. An anomaly detection system for a service comprising:
-
one or more processors; and one or more memory resources storing instructions that, when executed by the one or more processors, cause the anomaly detection system to; construct routine route profiles for users of a network service by, for each of the users, (i) collecting historical route data, and (ii) identifying correlated route shapes in the historical route data, wherein the correlated route shapes comprise a plurality of distinct routes between a common start point or region and a common end point or region; monitor a current route traveled by a respective one of the users; identify a matching routine route profile of the respective user; determine a probable anomaly in the current route based on the matching routine route profile; and in response to determining the probable anomaly, perform one or more actions in accordance with a safety protocol, wherein an initial action of the safety protocol comprises transmitting a status query to a mobile device of the respective user, and wherein a subsequent action in the safety protocol comprises contacting a predetermined user contact to report the probable anomaly. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium storing instructions that, when executed by one or more processors of an anomaly detection system, cause the anomaly detection system to:
-
construct routine route profiles for users of a network service by, for each of the users, (i) collecting historical route data, and (ii) identifying correlated route shapes in the historical route data, wherein the correlated route shapes comprise a plurality of distinct routes between a common start point or region and a common end point or region; monitor a current route traveled by a respective one of the users; identify a matching routine route profile of the respective user; determine a probable anomaly in the current route based on the matching routine route profile; and in response to determining the probable anomaly, perform one or more actions in accordance with a safety protocol, wherein an initial action of the safety protocol comprises transmitting a status query to a mobile device of the respective user, and wherein a subsequent action in the safety protocol comprises contacting a predetermined user contact to report the probable anomaly. - View Dependent Claims (17)
-
-
18. A computer-implemented method for detecting route anomalies, the method performed by one or more processors of an anomaly detection system and comprising:
-
constructing routine route profiles for users of a network service by, for each of the users, (i) collecting historical route data, and (ii) identifying correlated route shapes in the historical route data, wherein the correlated route shapes comprise a plurality of distinct routes between a common start point or region and a common end point or region; monitoring a current route traveled by a respective one of the users; identifying a matching routine route profile of the respective user; determining a probable anomaly in the current route based on the matching routine route profile; and in response to determining the probable anomaly, performing one or more actions in accordance with a safety protocol, wherein an initial action of the safety protocol comprises transmitting a status query to a mobile device of the respective user, and wherein a subsequent action in the safety protocol comprises contacting a predetermined user contact to report the probable anomaly.
-
Specification