Abstract:
A device may receive a request for imaging of a particular location. The device may identify one or more sensors associated with imaging the particular location. The device may select a sensor, of the one or more sensors, for imaging the particular location. The sensor may be associated with an autonomous vehicle. The device may cause the autonomous vehicle to move the sensor to the particular location. The device may receive imaging of the particular location based on causing the autonomous vehicle to move the sensor to the particular location. The device may selectively combine the imaging of the particular location with archived other imaging of the particular location. The device may provide imaging of the particular location to fulfill the request for imaging of the particular location based on selectively combining the imaging of the particular location with archived imaging of the particular location.
Abstract:
An exemplary method includes a monitoring system identifying a time period during which a vehicle equipped with a tracking device travels at least a threshold distance, determining that the tracking device fails to acquire a desired signal for a predetermined amount of time during the time period, and determining, based on the determining that the tracking device fails to acquire the desired signal for the predetermined amount of time during the time period, that the tracking device is potentially being interfered with during the time period. Corresponding systems and methods are also described.
Abstract:
An exemplary method includes a monitoring system identifying a time period during which a vehicle equipped with a tracking device travels at least a threshold distance, determining that the tracking device fails to acquire a desired signal for a predetermined amount of time during the time period, and, in response to determining that the tracking device fails to acquire the desired signal, determining that the tracking device is potentially being interfered with during the time period by a signal jamming device.
Abstract:
An exemplary method includes a monitoring system identifying a time period during which a vehicle equipped with a tracking device travels at least a threshold distance, determining that the tracking device fails to acquire a desired signal for a predetermined amount of time during the time period, and, in response to determining that the tracking device fails to acquire the desired signal, determining that the tracking device is potentially being interfered with during the time period by a signal jamming device.
Abstract:
An exemplary method includes a monitoring system identifying a time period during which a vehicle equipped with a tracking device travels at least a threshold distance, determining that the tracking device fails to acquire a desired signal for a predetermined amount of time during the time period, and determining, based on the determining that the tracking device fails to acquire the desired signal for the predetermined amount of time during the time period, that the tracking device is potentially being interfered with during the time period. Corresponding systems and methods are also described.
Abstract:
A delivery server may generate two separate security codes following a transaction between a user and a vendor, as well as a hash of the combination of the codes. The server may provide the first code to the user and the second code to the vendor, and provide the hash of a combination of the codes to both the vendor and the user. The user's vehicle may receive mapping information for the vendor's location, and may use the mapping information to autonomously navigate to an exchange station at the vendor location. At the exchange station, the vendor and vehicle may exchange security codes, and both vehicle and vendor may create a hash of the combined first code and second code, and use this to authenticate each other (by comparing this hash with the hash received from the delivery server). The vendor may then provide the goods to the vehicle, and the vehicle may automatically receive them and return them to the user.
Abstract:
A delivery server may generate two separate security codes following a transaction between a user and a vendor, as well as a hash of the combination of the codes. The server may provide the first code to the user and the second code to the vendor, and provide the hash of a combination of the codes to both the vendor and the user. The user's vehicle may receive mapping information for the vendor's location, and may use the mapping information to autonomously navigate to an exchange station at the vendor location. At the exchange station, the vendor and vehicle may exchange security codes, and both vehicle and vendor may create a hash of the combined first code and second code, and use this to authenticate each other (by comparing this hash with the hash received from the delivery server). The vendor may then provide the goods to the vehicle, and the vehicle may automatically receive them and return them to the user.