-
公开(公告)号:US11124154B1
公开(公告)日:2021-09-21
申请号:US16370787
申请日:2019-03-29
Applicant: Zoox, Inc.
Inventor: Hristo Iankov Bojinov , Bryce Douglas Jones Carter , Jimmy Ming Chiang , Ravi Gogna , Max Ellis Wolotsky
Abstract: Techniques and methods for security vehicle systems. For instance, a control system may receive a reported location of a vehicle. The control system may then receive sensor data generated by the vehicle. After receiving the sensor data, the control system may analyze the sensor data with respect to additional data associated with the reported location. The additional data may include map data representing the reported location and/or additional sensor data received from another vehicle or user device. The control system may determine whether the vehicle is at the reported location. If the control system determines that the vehicle is at the reported location, the control system may determine that the vehicle is not compromised. However, if the control system determines that the vehicle is not at the reported location, the control system may determine that the vehicle is compromised and may then perform one or more remedial actions.
-
公开(公告)号:US12287640B2
公开(公告)日:2025-04-29
申请号:US17675937
申请日:2022-02-18
Applicant: Zoox, Inc.
Inventor: Hristo Iankov Bojinov , Bryce Douglas Jones Carter , Jimmy Ming Chiang , Ravi Gogna , Max Ellis Wolotsky
Abstract: Techniques and methods for securing vehicle systems. For instance, an authorization system may store data representing frequencies at which destination locations are associated pick-up locations for a fleet of autonomous vehicles. The authorization system may then receive a request for an autonomous vehicle to pick up a passenger at a first location and drop off the passenger at a second location. Based on the first location and the second location, the authorization system may determine a frequency for the request. The authorization system may then determine whether a control system for the fleet of autonomous vehicles is compromised based on whether the frequency is less than or equal to a threshold frequency. If the authorization system determines that the control system is compromised, the authorization system may perform a remedial action, such as notifying a teleoperator.
-
公开(公告)号:US20220171404A1
公开(公告)日:2022-06-02
申请号:US17675937
申请日:2022-02-18
Applicant: Zoox, Inc.
Inventor: Hristo Iankov Bojinov , Bryce Douglas Jones Carter , Jimmy Ming Chiang , Ravi Gogna , Max Ellis Wolotsky
Abstract: Techniques and methods for securing vehicle systems. For instance, an authorization system may store data representing frequencies at which destination locations are associated pick-up locations for a fleet of autonomous vehicles. The authorization system may then receive a request for an autonomous vehicle to pick up a passenger at a first location and drop off the passenger at a second location. Based on the first location and the second location, the authorization system may determine a frequency for the request. The authorization system may then determine whether a control system for the fleet of autonomous vehicles is compromised based on whether the frequency is less than or equal to a threshold frequency. If the authorization system determines that the control system is compromised, the authorization system may perform a remedial action, such as notifying a teleoperator.
-
公开(公告)号:US11256268B1
公开(公告)日:2022-02-22
申请号:US16370825
申请日:2019-03-29
Applicant: Zoox, Inc.
Inventor: Hristo Iankov Bojinov , Bryce Douglas Jones Carter , Jimmy Ming Chiang , Ravi Gogna , Max Ellis Wolotsky
Abstract: Techniques and methods for securing vehicle systems. For instance, an authorization system may store data representing frequencies at which destination locations are associated pick-up locations for a fleet of autonomous vehicles. The authorization system may then receive a request for an autonomous vehicle to pick up a passenger at a first location and drop off the passenger at a second location. Based on the first location and the second location, the authorization system may determine a frequency for the request. The authorization system may then determine whether a control system for the fleet of autonomous vehicles is compromised based on whether the frequency is less than or equal to a threshold frequency. If the authorization system determines that the control system is compromised, the authorization system may perform a remedial action, such as notifying a teleoperator.
-
-
-