Unauthorized Access Detection
Methods, computer-readable media, software, and apparatuses include receiving sensor data from a sensor system associated with a vehicle during operation of the vehicle over a plurality of modes of operation, computing, based on the sensor data, a vehicle fingerprint comprising one or more vehicle c...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Isaac, Emad S |
description | Methods, computer-readable media, software, and apparatuses include receiving sensor data from a sensor system associated with a vehicle during operation of the vehicle over a plurality of modes of operation, computing, based on the sensor data, a vehicle fingerprint comprising one or more vehicle characteristics over the plurality of modes of operation, monitoring additional received sensor data from the sensor system during further operation of the vehicle, determining whether an anomaly exists based on comparing the additional received sensor data to the vehicle fingerprint, and based upon determining that an anomaly exists, providing an alert to a communication interface associated with the vehicle. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022024414A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022024414A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022024414A13</originalsourceid><addsrcrecordid>eNrjZJANzUssLcnIL8qsSk1RcExOTi0uVnBJLUlNLsnMz-NhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGRkBkYmJo4mhoTJwqAGexJRU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Unauthorized Access Detection</title><source>esp@cenet</source><creator>Isaac, Emad S</creator><creatorcontrib>Isaac, Emad S</creatorcontrib><description>Methods, computer-readable media, software, and apparatuses include receiving sensor data from a sensor system associated with a vehicle during operation of the vehicle over a plurality of modes of operation, computing, based on the sensor data, a vehicle fingerprint comprising one or more vehicle characteristics over the plurality of modes of operation, monitoring additional received sensor data from the sensor system during further operation of the vehicle, determining whether an anomaly exists based on comparing the additional received sensor data to the vehicle fingerprint, and based upon determining that an anomaly exists, providing an alert to a communication interface associated with the vehicle.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; HANDLING RECORD CARRIERS ; PERFORMING OPERATIONS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; TRANSPORTING ; VEHICLES IN GENERAL ; VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISEPROVIDED FOR</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220127&DB=EPODOC&CC=US&NR=2022024414A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220127&DB=EPODOC&CC=US&NR=2022024414A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Isaac, Emad S</creatorcontrib><title>Unauthorized Access Detection</title><description>Methods, computer-readable media, software, and apparatuses include receiving sensor data from a sensor system associated with a vehicle during operation of the vehicle over a plurality of modes of operation, computing, based on the sensor data, a vehicle fingerprint comprising one or more vehicle characteristics over the plurality of modes of operation, monitoring additional received sensor data from the sensor system during further operation of the vehicle, determining whether an anomaly exists based on comparing the additional received sensor data to the vehicle fingerprint, and based upon determining that an anomaly exists, providing an alert to a communication interface associated with the vehicle.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PERFORMING OPERATIONS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>TRANSPORTING</subject><subject>VEHICLES IN GENERAL</subject><subject>VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISEPROVIDED FOR</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJANzUssLcnIL8qsSk1RcExOTi0uVnBJLUlNLsnMz-NhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGRkBkYmJo4mhoTJwqAGexJRU</recordid><startdate>20220127</startdate><enddate>20220127</enddate><creator>Isaac, Emad S</creator><scope>EVB</scope></search><sort><creationdate>20220127</creationdate><title>Unauthorized Access Detection</title><author>Isaac, Emad S</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022024414A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PERFORMING OPERATIONS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>TRANSPORTING</topic><topic>VEHICLES IN GENERAL</topic><topic>VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISEPROVIDED FOR</topic><toplevel>online_resources</toplevel><creatorcontrib>Isaac, Emad S</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Isaac, Emad S</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Unauthorized Access Detection</title><date>2022-01-27</date><risdate>2022</risdate><abstract>Methods, computer-readable media, software, and apparatuses include receiving sensor data from a sensor system associated with a vehicle during operation of the vehicle over a plurality of modes of operation, computing, based on the sensor data, a vehicle fingerprint comprising one or more vehicle characteristics over the plurality of modes of operation, monitoring additional received sensor data from the sensor system during further operation of the vehicle, determining whether an anomaly exists based on comparing the additional received sensor data to the vehicle fingerprint, and based upon determining that an anomaly exists, providing an alert to a communication interface associated with the vehicle.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2022024414A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING HANDLING RECORD CARRIERS PERFORMING OPERATIONS PHYSICS PRESENTATION OF DATA RECOGNITION OF DATA RECORD CARRIERS TRANSPORTING VEHICLES IN GENERAL VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISEPROVIDED FOR |
title | Unauthorized Access Detection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T15%3A36%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Isaac,%20Emad%20S&rft.date=2022-01-27&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022024414A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |