TECHNIQUES FOR AUTHORIZING VEHICLE CONTROL SYSTEMS
Techniques and methods for securing vehicle systems. For instance, an authorization system may store data representing frequencies at which destination locations are associated pick-up locations for a fleet of autonomous vehicles. The authorization system may then receive a request for an autonomous...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Techniques and methods for securing vehicle systems. For instance, an authorization system may store data representing frequencies at which destination locations are associated pick-up locations for a fleet of autonomous vehicles. The authorization system may then receive a request for an autonomous vehicle to pick up a passenger at a first location and drop off the passenger at a second location. Based on the first location and the second location, the authorization system may determine a frequency for the request. The authorization system may then determine whether a control system for the fleet of autonomous vehicles is compromised based on whether the frequency is less than or equal to a threshold frequency. If the authorization system determines that the control system is compromised, the authorization system may perform a remedial action, such as notifying a teleoperator. |
---|