Method and system for authentication in autonomous vehicles

  • US 9,963,106 B1
  • Filed: 12/28/2016
  • Issued: 05/08/2018
  • Est. Priority Date: 11/07/2016
  • Status: Active Grant
  • ×
    • Pin Icon | RPX Insight
    • Pin
First Claim
Patent Images

1. A vehicle, comprising:

  • a vehicle interior for receiving one or more occupants;

    a plurality of sensors to collect sensed information associated with the vehicle interior and an exterior of the vehicle;

    an automatic vehicle location system to determine a current spatial location of the vehicle;

    a computer readable medium to store authentication information and the sensed information when the vehicle is in a Level 4 or 5 level of autonomous operation; and

    a microprocessor, coupled to the automatic vehicle location system and computer readable medium, that, when in the Level 4 or 5 level of autonomous operation and in the absence of interaction of the microprocessor with a driver of the vehicle, is programmed to;

    based on the sensed information collected by the plurality of sensors, construct a three-dimensional map in spatial proximity to the vehicle that enables the microprocessor to identify and spatially locate animate and inanimate objects in the spatial proximity;

    detect, in the three-dimensional map, an individual exterior to the vehicle;

    combine navigation information received from a remote navigation source based on a current spatial location of the vehicle with the three-dimensional map to provide aggregate mapping information;

    select a behavioral model of the detected individual;

    process in real time the aggregate mapping information and the selected behavioral model to determine a command regarding operation of the vehicle;

    based on the three-dimensional map and authentication information, attempt to perform primary authentication to authenticate the detected individual or a computing device associated with the detected individual;

    when the detected individual or computing device is authenticated successfully by the primary authentication, attempt to perform secondary authentication of the detected individual or the computing device using different authentication information than the authentication information used in the primary authentication; and

    when the primary and secondary authentication are successful, perform the vehicle operation command to enable the individual to access the vehicle interior.

View all claims