Vehicle security systems and methods

ABSTRACT

Example vehicle security systems and methods are described. In one implementation, a method receives a destination and a driving route to the destination for an autonomous vehicle to follow. A vehicle security system identifies a passkey associated with the driving route and communicates the passkey to a user designated to meet the autonomous vehicle at the destination. The vehicle security system confirms that the user designated to meet the autonomous vehicle possesses the passkey.

TECHNICAL FIELD

The present disclosure relates to vehicular systems and, moreparticularly, to systems and methods that secure the vehicle and itsoccupants.

BACKGROUND

Automobiles and other vehicles provide a significant portion oftransportation for commercial, government, and private entities.Vehicles, such as autonomous vehicles, drive on roadways, parking lots,and other areas when transporting passengers or objects from onelocation to another. An example application of autonomous vehicles isoperating as a taxi or shuttle service that picks up one or morepassengers in response to a transportation request. When operating as ataxi or shuttle service, the autonomous vehicle drives to a pickuplocation such that a passenger requesting the service can enter thevehicle. The vehicle then drives to a destination and allows thepassenger to exit the vehicle. In some situations, additional safetyprecautions are desirable, such as when transporting children withoutany adults in the autonomous vehicle.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the present disclosureare described with reference to the following figures, wherein likereference numerals refer to like parts throughout the various figuresunless otherwise specified.

FIG. 1 is a block diagram illustrating an embodiment of a vehiclecontrol system that includes a vehicle security system.

FIG. 2 is a block diagram illustrating an embodiment of a vehiclesecurity system.

FIG. 3 illustrates an embodiment of a vehicle with multiple cameras andother sensors to monitor the interior and exterior of the vehicle.

FIGS. 4A-4B illustrate an embodiment of a method for providing securetransport of a child in an autonomous vehicle to a destination.

FIG. 5 is a block diagram illustrating an embodiment of validating auser who is picking up a child in an autonomous vehicle at adestination.

FIG. 6 illustrates an embodiment of a method for controlling access toan autonomous vehicle by a child.

FIG. 7 illustrates an embodiment of a method for monitoring a childriding in an autonomous vehicle and detecting potential problems withthe child.

DETAILED DESCRIPTION

In the following disclosure, reference is made to the accompanyingdrawings, which form a part hereof, and in which is shown by way ofillustration specific implementations in which the disclosure may bepracticed. It is understood that other implementations may be utilizedand structural changes may be made without departing from the scope ofthe present disclosure. References in the specification to “oneembodiment,” “an embodiment,” “an example embodiment,” etc., indicatethat the embodiment described may include a particular feature,structure, or characteristic, but every embodiment may not necessarilyinclude the particular feature, structure, or characteristic. Moreover,such phrases are not necessarily referring to the same embodiment.Further, when a particular feature, structure, or characteristic isdescribed in connection with an embodiment, it is submitted that it iswithin the knowledge of one skilled in the art to affect such feature,structure, or characteristic in connection with other embodimentswhether or not explicitly described.

Implementations of the systems, devices, and methods disclosed hereinmay comprise or utilize a special purpose or general-purpose computerincluding computer hardware, such as, for example, one or moreprocessors and system memory, as discussed herein. Implementationswithin the scope of the present disclosure may also include physical andother computer-readable media for carrying or storingcomputer-executable instructions and/or data structures. Suchcomputer-readable media can be any available media that can be accessedby a general purpose or special purpose computer system.Computer-readable media that store computer-executable instructions arecomputer storage media (devices). Computer-readable media that carrycomputer-executable instructions are transmission media. Thus, by way ofexample, and not limitation, implementations of the disclosure cancomprise at least two distinctly different kinds of computer-readablemedia: computer storage media (devices) and transmission media.

Computer storage media (devices) includes RAM, ROM, EEPROM, CD-ROM,solid state drives (“SSDs”) (e.g., based on RAM), Flash memory,phase-change memory (“PCM”), other types of memory, other optical diskstorage, magnetic disk storage or other magnetic storage devices, or anyother medium which can be used to store desired program code means inthe form of computer-executable instructions or data structures andwhich can be accessed by a general purpose or special purpose computer.

An implementation of the devices, systems, and methods disclosed hereinmay communicate over a computer network. A “network” is defined as oneor more data links that enable the transport of electronic data betweencomputer systems and/or modules and/or other electronic devices. Wheninformation is transferred or provided over a network or anothercommunications connection (either hardwired, wireless, or a combinationof hardwired or wireless) to a computer, the computer properly views theconnection as a transmission medium. Transmissions media can include anetwork and/or data links, which can be used to carry desired programcode means in the form of computer-executable instructions or datastructures and which can be accessed by a general purpose or specialpurpose computer. Combinations of the above should also be includedwithin the scope of computer-readable media.

Computer-executable instructions comprise, for example, instructions anddata which, when executed at a processor, cause a general purposecomputer, special purpose computer, or special purpose processing deviceto perform a certain function or group of functions. The computerexecutable instructions may be, for example, binaries, intermediateformat instructions such as assembly language, or even source code.Although the subject matter is described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the described features or acts described herein.Rather, the described features and acts are disclosed as example formsof implementing the claims.

Those skilled in the art will appreciate that the disclosure may bepracticed in network computing environments with many types of computersystem configurations, including, an in-dash vehicle computer, personalcomputers, desktop computers, laptop computers, message processors,hand-held devices, multi-processor systems, microprocessor-based orprogrammable consumer electronics, network PCs, minicomputers, mainframecomputers, mobile telephones, PDAs, tablets, pagers, routers, switches,various storage devices, and the like. The disclosure may also bepracticed in distributed system environments where local and remotecomputer systems, which are linked (either by hardwired data links,wireless data links, or by a combination of hardwired and wireless datalinks) through a network, both perform tasks. In a distributed systemenvironment, program modules may be located in both local and remotememory storage devices.

Further, where appropriate, functions described herein can be performedin one or more of: hardware, software, firmware, digital components, oranalog components. For example, one or more application specificintegrated circuits (ASICs) can be programmed to carry out one or moreof the systems and procedures described herein. Certain terms are usedthroughout the description and claims to refer to particular systemcomponents. As one skilled in the art will appreciate, components may bereferred to by different names. This document does not intend todistinguish between components that differ in name, but not function.

It should be noted that the sensor embodiments discussed herein maycomprise computer hardware, software, firmware, or any combinationthereof to perform at least a portion of their functions. For example, asensor may include computer code configured to be executed in one ormore processors, and may include hardware logic/electrical circuitrycontrolled by the computer code. These example devices are providedherein purposes of illustration, and are not intended to be limiting.Embodiments of the present disclosure may be implemented in furthertypes of devices, as would be known to persons skilled in the relevantart(s).

At least some embodiments of the disclosure are directed to computerprogram products comprising such logic (e.g., in the form of software)stored on any computer useable medium. Such software, when executed inone or more data processing devices, causes a device to operate asdescribed herein.

FIG. 1 is a block diagram illustrating an embodiment of a vehiclecontrol system 100 within a vehicle that includes a vehicle securitysystem 104. An automated driving/assistance system 102 may be used toautomate or control operation of a vehicle or to provide assistance to ahuman driver. For example, the automated driving/assistance system 102may control one or more of braking, steering, seat belt tension,acceleration, lights, alerts, driver notifications, radio, vehiclelocks, or any other auxiliary systems of the vehicle. In anotherexample, the automated driving/assistance system 102 may not be able toprovide any control of the driving (e.g., steering, acceleration, orbraking), but may provide notifications and alerts to assist a humandriver in driving safely. Vehicle control system 100 includes vehiclesecurity system 104 that interacts with various components in thevehicle to control access to the vehicle in certain situations and tocontrol driving routes followed by the vehicle. Although vehiclesecurity system 104 is shown as a separate component in FIG. 1 , inalternate embodiments, vehicle security system 104 may be incorporatedinto automated driving/assistance system 102 or any other vehiclecomponent.

Vehicle control system 100 also includes one or more sensorsystems/devices for detecting a presence of nearby objects (orobstacles) or determining a location of a parent vehicle (e.g., avehicle that includes vehicle control system 100). For example, vehiclecontrol system 100 may include one or more Radar (Radio detection andranging) systems 106, one or more Lidar (Light detection and ranging)systems 108, one or more camera systems 110, a global positioning system(GPS) 112, and/or ultrasound systems 114. The one or more camera systems110 may include a rear-facing camera mounted to the vehicle (e.g., arear portion of the vehicle), a front-facing camera, and one or moreside-facing cameras. Camera systems 110 may also include one or moreinterior cameras that capture images of the vehicle's interior, such aspassengers and other objects inside the vehicle. Lidar systems 108 mayinclude one or more interior Lidar sensors that capture data associatedwith the area inside the vehicle. Vehicle control system 100 may includea data store 116 for storing relevant or useful data for navigation andsafety, such as map data, driving history, or other data. Vehiclecontrol system 100 may also include a transceiver 118 for wirelesscommunication with a mobile or wireless network, other vehicles,infrastructure, or any other communication system.

Vehicle control system 100 may include vehicle control actuators 120 tocontrol various aspects of the driving of the vehicle such as electricmotors, switches or other actuators, to control braking, acceleration,steering, seat belt tension, door locks, or the like. Vehicle controlsystem 100 may also include one or more displays 122, speakers 124,microphones 126, or other devices so that notifications to a humandriver or passenger may be provided. A display 122 may include aheads-up display, dashboard display or indicator, a display screen, orany other visual indicator, which may be seen by a driver or passengerof a vehicle. Speakers 124 may include one or more speakers of a soundsystem of a vehicle or may include a speaker dedicated to driver orpassenger notification. Microphones 126 may include any type ofmicrophone located inside or outside the vehicle to capture soundsoriginating from inside or outside the vehicle.

It will be appreciated that the embodiment of FIG. 1 is given by way ofexample only. Other embodiments may include fewer or additionalcomponents without departing from the scope of the disclosure.Additionally, illustrated components may be combined or included withinother components without limitation.

In one embodiment, automated driving/assistance system 102 is configuredto control driving or navigation of a parent vehicle. For example,automated driving/assistance system 102 may control the vehicle controlactuators 120 to drive a path on a road, parking lot, driveway or otherlocation. In some embodiments, automated driving/assistance system 102may determine a path based on information or perception data provided byany of the components 106-118. A path may also be determined based on aroute that maneuvers the vehicle to avoid or mitigate a potentialcollision with another vehicle or object. The sensor systems/devices106-110 and 114 may be used to obtain real-time sensor data so thatautomated driving/assistance system 102 can assist a driver or drive avehicle in real-time.

FIG. 2 is a block diagram illustrating an embodiment of vehicle securitysystem 104. As described herein, “vehicle security system” 104 may alsobe referred to as a “security system.” As shown in FIG. 2 , vehiclesecurity system 104 includes a communication manager 202, a processor204, and a memory 206. Communication manager 202 allows vehicle securitysystem 104 to communicate with other systems, such as automateddriving/assistance system 102, and communicate with other users andsystems external to the vehicle. Processor 204 executes variousinstructions to implement the functionality provided by vehicle securitysystem 104, as discussed herein. Memory 206 stores these instructions aswell as other data used by processor 204 and other modules andcomponents contained in vehicle security system 104.

Additionally, vehicle security system 104 includes an image processingmodule 208 that receives image data from one or more camera systems 110.Vehicle security system 104 may receive images associated with theinterior of the vehicle (e.g., passengers in the vehicle) or associatedwith areas outside the vehicle (e.g., people or objects located near theexterior of the vehicle). The image data may include one or more stillimages, a sequence of still images captured over a period of time, or avideo stream, such as live video streams or recorded video streams. Asdiscussed herein, image processing module 208 identifies or analyzespeople or objects in the image data and may determine a person'semotional state or level of stress. Image processing module 208 may alsocommunicate image data, such as live video streams, via communicationmanager 202 to a remote user. For example, image processing module 208may communicate live video stream data showing a child passenger in thevehicle to a parent of the child passenger. In some embodiments, imageprocessing module 208 includes an image management algorithm or processthat performs one or more functions, such as the functions discussedherein.

Vehicle security system 104 also includes a route selection module 210that can automatically identify one or more routes to a particulardestination. Additionally, route selection module 210 allows a user(such as a parent of a child passenger) to define a particular route foran autonomous vehicle to follow when driving to a destination. Forexample, if a child is riding alone in an autonomous vehicle, the parentof the child may select a route that follows main roads, avoidshighways, and avoids potentially dangerous areas of town. A passkeymanager 212 handles the creation, distribution, and verification of oneor more passkeys. As discussed herein, passkeys are used to controlaccess to an autonomous vehicle (e.g., controlling who can access theautonomous vehicle at a destination to take custody of a child travelingin the autonomous vehicle). In some embodiments, passkey manager 212 maygenerate a passkey for a specific autonomous vehicle transportationactivity, communicate the passkey to a person designated to take custodyof the child at the destination, and, when the autonomous vehiclereaches the destination, verify that the person at the destination hasthe proper passkey before unlocking the doors of the autonomous vehicle.As discussed herein, the passkey represents any type of digital key orcryptographic key to secure access to the autonomous vehicle. Forexample, the passkey may include public and private key pairs.

A navigation manager 214 assists the autonomous vehicle when following aselected route to a destination. In some situations, the autonomousvehicle must change its route due to road closures, road construction,or traffic accidents. In these situations, navigation manager 214 canassist with rerouting the autonomous vehicle and, if necessary,communicating with a parent of a child passenger to confirm thealternate route recommendation.

Vehicle security system 104 also includes a passenger vital signsmanager 216 that monitors one or more vital signs of a passenger (e.g.,a child passenger) as discussed herein. In some embodiments, passengervital signs manager 216 monitors vital signs such as heart rate,respiration rate, and the like. For example, heart rate sensors in aseat or seatbelt can detect heart rate alone or in combination withimage data from one or more cameras. Additionally, the image data may beused to analyze the passenger's breathing and level of awareness (e.g.,whether the passenger is crying, screaming, or passed out). Also,passenger vital signs manager 216 may monitor a passenger's stresslevel, emotional status, and the like. For example, the passenger'sstress level, emotional status, and so forth can be estimated based onheart rate, breathing, level of awareness, and the like.

A vehicle lock manager 218 controls the locking and unlocking of doors,trunks, hatches, and other vehicle access points associated with anautonomous vehicle. For example, when an autonomous vehicle arrives at adestination with a child passenger, vehicle lock manager 218 may keepthe vehicle doors locked until it is specifically instructed to unlockthe doors by passkey manager 212 or another vehicle system or component.An alert generator 220 generates one or more alerts based on particularsituations associated with the autonomous vehicle and its surroundings.For example, an alert may be generated and communicated to a parent ifan autonomous vehicle traveling with a child needs to change routes orexperiences significant delays. Additionally, alert generator 220 maygenerate an alert if the autonomous vehicle arrives at the destinationbut there is no person at the destination with the appropriate passkey.In some embodiments, alert generator 220 generates an alert for a parentif a child passenger is determined to be distressed or anxious.

A vehicle access module 222 determines when a person (e.g., a passengeror a person picking up a passenger at a destination) can access anautonomous vehicle. In some embodiments, vehicle access module 222 mayprevent access to an autonomous vehicle when traveling with a childpassenger. After the autonomous vehicle reaches the desired destinationand the proper passkey is validated, vehicle access module 222 maypermit access to the autonomous vehicle by the person with the passkeyby instructing vehicle lock manager 218 to unlock one or more doors ofthe autonomous vehicle.

FIG. 3 illustrates an embodiment of a vehicle 300 with multiple camerasand other sensors to monitor the interior and exterior of the vehicle.In some embodiments, vehicle 300 may operate as an autonomous vehicleand perform at least a portion of the functions and operations discussedherein. As shown in FIG. 3 , vehicle 300 has two interior cameras 302and 306 as well as two interior sensors 304, 308. In some embodiments,cameras 302, 306 are positioned and oriented in vehicle 300 such thatpassenger seating locations are in the field of view of at least onecamera 302, 306. Other areas of the interior of vehicle 300 may also bein the field of view of one or more cameras 302, 306. Sensors 304, 308represent any type of sensor associated with, for example, radar systems106, Lidar systems 108, ultrasound systems 114, and the like. In someembodiments, data captured by sensors 304, 308 is used in combinationwith data captured by cameras 302, 306 to identify passengers in vehicle300 as well as the emotional state of the identified passengers.Although two interior cameras 302, 306 are shown in FIG. 3 , inalternate embodiments, vehicle 300 may have any number of interiorcameras positioned in various locations throughout the vehicle and aimedat different angles. Similarly, although two interior sensors 304, 308are shown in FIG. 3 , in alternate embodiments, vehicle 300 may have anynumber of interior sensors positioned in various locations throughoutthe vehicle.

Vehicle 300 also includes two exterior cameras 310 and 312 which arepositioned and oriented such that areas outside the vehicle, but closeto the vehicle, are in the field of view of at least one camera 310,312. Although not shown in FIG. 3 , in some embodiments, vehicle 300also includes one or more exterior sensors, such as sensors associatedwith radar systems 106, Lidar systems 108, ultrasound systems 114, andthe like.

FIGS. 4A-4B illustrate an embodiment of a method 400 for providingsecure transport of a child in an autonomous vehicle to a destination.Initially, an adult user initiates 402 a ride in an autonomous vehiclefor a child passenger. For example, the adult user may initiate 402 theride using a smartphone application or otherwise interacting with anautonomous vehicle or a scheduling service associated with a fleet ofautonomous vehicles. Method 400 continues as a security system in theautonomous vehicle receives 404 a starting location and a destinationfrom the user. In some embodiments, the starting location is the user'scurrent location. The starting location and the destination may becommunicated to the security system via a smartphone applicationoperated by the user or any other user interface that allows the user toidentify the starting location and destination.

The security system in the autonomous vehicle also receives 406 aspecific route from the user. For example, the user may specifyparticular roads to follow (or particular areas to avoid) when theautonomous vehicle drives to the destination. In some embodiments, theuser may prefer that the autonomous vehicle follow main roads, avoidhighways, and avoid certain parts of town or certain geographic areas.In particular implementations, the user may specify a particular routeby drawing on a map or graphically highlighting particular roads tofollow to the destination.

The security system also receives 408 passkey from the user (e.g., theuser's smartphone application). As discussed herein, the passkey is usedto unlock the autonomous vehicle at the destination if an appropriateperson is present who possesses the passkey. In some embodiments, thepasskey is generated by passkey manager 212 (FIG. 2 ). In particularembodiments, the passkey is associated with a particular ride (or aparticular route) in an autonomous vehicle. For example, the passkey isused to validate a person picking up a child from the autonomous vehicleat the destination. After that ride is complete, the passkey is deleted.A new passkey is generated for each future ride initiated by a user. Thepasskey is also communicated 410 to a second user who is designated tomeet the autonomous vehicle at the destination and pick up (e.g., takecustody of) the child passenger at the destination. In some embodiments,the passkey is communicated to a smartphone or other device controlledby the second user.

In some embodiments, any type of computing device may be used toinitiate 402 the ride. When initiating 402 the ride, the adult user mayupload photos of their face as well as the face of the person who willmeet the autonomous vehicle at the destination. A biometric identity maybe created to authenticate the person who will meet the autonomousvehicle at the destination.

The autonomous vehicle then drives 412 to the destination. After theautonomous vehicle arrives at the destination, the security systemconfirms 414 that the second user is present at the destination andverifies the passkey. For example, the security system confirms 414 thatthe second user has a smartphone or other device that contains theappropriate passkey. If the passkey is verified 416, the security systemunlocks 418 the autonomous vehicle doors so the child passenger can exitthe autonomous vehicle. In some embodiments, the security system deletesor deactivates the passkey after the autonomous vehicle is unlocked andthe child passenger exits the autonomous vehicle. In alternateembodiments, the security system may confirm that the second user ispresent at the destination based on detecting a phone number associatedwith the second user's mobile device or by requiring the second user toprovide a specific code that was pre-approved by the adult user whoinitiated the ride. In other embodiments, the security system confirmsthe second user based on facial recognition (e.g., a facial biometricidentity) by the security system or facial recognition by the adult userwho initiated the ride.

In some embodiments, in addition to unlocking 418 the autonomous vehicledoors, the security system also unlocks (or releases) a “smart” seatbelt that is restraining the child passenger. The smart seat belt can beunlocked or released by a remote computing system, such as vehiclecontrol system 100.

If the passkey is not verified 416, the security system was not able toconfirm that the second user is present to take custody of the childpassenger. In this situation, the security system captures 420 imagesand/or a live video stream of the area near the autonomous vehicle atthe destination. The images and/or live video stream may includeinterior portions of the autonomous vehicle and/or exterior areas nearthe vehicle. The images and/or live video stream are communicated 422 tothe adult user who initiated the ride. The images and/or live videostream allow the adult user who initiated the ride to analyze thesituation inside and outside the autonomous vehicle at the destination.If the adult user who initiated the ride sees the second user at thedestination, they may allow the autonomous vehicle's doors to beunlocked. However, if the adult user who initiated the ride does not seethe second user a the destination, they may instruct the autonomousvehicle to return back to the starting location or drive to a differentlocation.

In this situation , the security system requests 424 instructions fromthe adult user who initiated the ride. As discussed above, the securitysystem may request instructions including whether to unlock the doors,return the autonomous vehicle to the starting location, or drive theautonomous vehicle to a different location. Based on the instructionsreceived 426, the security system may unlock the autonomous vehicledoors 428, instruct the autonomous vehicle to drive 430 back to thestarting location, or instruct the autonomous vehicle to drive 432 to adifferent location designated by the adult user who initiated the ride.In some embodiments, the different location designated by the adult userwho initiated the ride may include a different drop off location, apolice station, a school, and the like. In particular implementations,the security system may generate a new passkey associated with thereturn drive back to the starting location or associated with the routeto the different location. In these implementations, the new passkey iscommunicated to the person approved to take custody of the childpassenger at the starting location or the different location.

As described in FIGS. 4A-4B, the security system captures 420 imagesand/or a live video stream of the area near the autonomous vehicle ifthe passkey is not verified at 416. In alternate embodiments, thesecurity system captures 420 images and/or a live video stream of thearea near the autonomous even if the passkey was verified at 416.Additionally, the images and/or live video data are communicated 422 tothe adult user who initiated the ride, thereby allowing the adult userto analyze the situation at the destination (e.g., the activities goingon near the autonomous vehicle) before approving the security system tounlock the autonomous vehicle doors. If the adult user who initiated theride is not comfortable with the situation at the destination, they caninstruct the autonomous vehicle to return to the starting location ordrive to a different location, as discussed above with respect to420-432.

FIG. 5 is a block diagram illustrating an embodiment 500 of validating auser who is picking up a child in an autonomous vehicle at adestination. The example of FIG. 5 shows an autonomous vehicle 502 afterit has arrived at a destination, such as a destination identified by anadult user who initiates a ride in autonomous vehicle 502 for a childpassenger. Autonomous vehicle 502 contains vehicle control system 100(which includes vehicle security system 104), as discussed herein. Auser 504 is present at the destination and is operating a mobile device506, such as a smartphone, tablet computer, or other computing system.Mobile device 506 communicates with vehicle control system 100 via adata communication network 508 or a communication link 510. In someembodiments, data communication network 508 includes a cellularcommunication network, the Internet, or any combination of two or morecommunication networks. Communication link 510 includes any type ofcommunication link using any communication protocol, such as Bluetooth®,WiFi, DSRC (Dedicated Short-Range Communications) ,and the like. In someembodiments, mobile device 506 communicates with vehicle control system100 via communication link 510 using TCP/IP (Transmission ControlProtocol/Internet Protocol). For example, TCP can create message packetsthat are transmitted over IP.

As discussed herein, if user 504 is intended to pick up the childpassenger (as determined by the adult user who initiated the ride), user504 should have received an appropriate passkey when the ride wasinitiated. For example, user 504 may receive the passkey in their mobiledevice 506 using an application executing on mobile device 506 or someother passkey management system or procedure. When autonomous vehicle502 arrives at the destination, vehicle security system 104 in vehiclecontrol system 100 may attempt to communicate with mobile device 506 andverify that mobile device 506 contains the appropriate passkey for thespecific ride associated with the child passenger. If mobile device 506contains the appropriate passkey, vehicle security system 104 unlocksthe doors of autonomous vehicle 502 so user 504 can take custody of thechild passenger. However, if mobile device 506 does not contain theappropriate passkey, vehicle security system 104 keeps the doors ofautonomous vehicle 502 locked to protect the child passenger. Forexample, when the vehicle arrives at the destination, vehicle controlsystem 100 will send an alert to mobile device 506 operated by user 504.Mobile device 506 then attempts to provide an authentication signal orcommunication. This authentication may be a cloud-based authenticationprocess (where both vehicle control system 100 and mobile device 506communicate with a cloud-based server) or mobile device 506 communicatesthe passkey directly to vehicle control system 100.

In the example of FIG. 5 , another person 512 is located near the backof autonomous vehicle 502. In some embodiments, one or more vehiclecameras or other sensors may detect this person and communicate images(still image data or video data) to a user who initiated the ride. Thatuser can view the images and determine whether to unlock the doors ofautonomous vehicle 502. For example, if person 512 appears to be hidingbehind autonomous vehicle 502 or if the user who initiated the ride isfearful of person 512, the user who initiated the ride may instructautonomous vehicle 502 to keep the doors locked and drive to a differentlocation (e.g., an alternate drop off location or return to the startinglocation). If the user who initiated the ride knows person 512 or is notconcerned about the presence of person 512, they can instruct autonomousvehicle 502 to unlock the doors and allow the child passenger to exitautonomous vehicle 502.

FIG. 6 illustrates an embodiment of a method 600 for controlling accessto an autonomous vehicle by a child. For example, method 600 may beappropriate for transporting older children, such as children aged14-18. Initially, an adult user identifies 602 parameters associatedwith approved transportation of a child who may ride alone in anautonomous vehicle. Example parameters include time of day, day of week,approved pickup locations, approved drop off locations, and the like.Some parameters may include multiple factors, such as the child may beapproved to be picked up at school Monday-Friday between 3:00-4:00 pm.The identified parameters are stored 604 by a security system in theautonomous vehicle. In some embodiments, the identified parameters maybe stored in a database, a remote server, a remote storage system, orother storage mechanism that is accessible by one or more users and oneor more autonomous vehicles. The parameters may be retrieved in byautonomous vehicles transporting the child in the future. In particularimplementations, the adult user identifies the parameters using asmartphone application, accessing a web site, and the like. In someembodiments, any modifications to the parameters are restricted to theadult who identified the parameters or another person given permissionby that adult.

Method 600 continues as the security system receives 606 atransportation request from the child (e.g., a child of the adult userwho identified the approved transportation parameters). The securitysystem accesses 608 the parameters associated with the child anddetermines 610 whether the child's transportation request was previouslyapproved based on the accessed parameters. If the child's transportationrequest was previously approved based on the accessed parameters, theautonomous vehicle drives 612 to the requested destination. However, ifthe child's transportation request was not previously approved (e.g.,the transportation request does not satisfy an existing parameter), thenthe security system contacts 614 the adult user who identified theparameters and requests approval of the child's transportation request.In alternate embodiments, other adult users may be contacted 614 toapprove the child's transportation request. In some examples, therequest for approval of the child's transportation request may be amessage or alert communicated to the adult user that indicates the nameof the child requesting transportation, the requested pickup locationand the requested drop off location. The adult user an approve therequest, disapprove the request, or modify the request (e.g., approvethe pickup location, but provide a different drop off location).

If the adult user approves 616 the request, the autonomous vehicledrives 612 to the requested destination (or an alternate destinationprovided by the adult user). However, if the adult user disapproves therequest, the security system denies 618 the child's transportationrequest and provides alternate transportation options. The alternatetransportation options may include, for example, an alternate pickupand/or drop off location provided by an adult user. Additionally, thealternate transportation options may include pickup and/or drop offlocations that were previously approved based on the current day of theweek, time of day, and the like. In some embodiments, when a child isbeing transported based on an approved transportation request, theautonomous vehicle is prevented from making additional stops, such asletting the child out of the vehicle at an unapproved location.Additionally, when the child is being transported based on an approvedtransportation request, the autonomous vehicle may be prevented fromallowing other passengers to enter the autonomous vehicle. Theserestrictions may be overridden by the adult user on a case-by-casebasis.

In some embodiments, the child passenger may be required to approveunlocking the autonomous vehicle's doors at the destination. Forexample, the child passenger may confirm that the autonomous vehicle isat the correct destination and the child feels safe exiting theautonomous vehicle. If confirmed, the child passenger approves unlockingof the autonomous vehicle doors by activating an appropriate button,voice command, and the like. If the child passenger does not feel safeexiting the autonomous vehicle, the child may request a differentdestination or the vehicle security system contacts the adult user toreceive further instructions.

FIG. 7 illustrates an embodiment of a method 700 for monitoring a childriding in an autonomous vehicle and detecting potential problems withthe child. Initially, an adult user initiates 702 a ride in anautonomous vehicle for a child passenger. A security system in theautonomous vehicle receives 704 a starting location, a destination, anda desired route (from the starting location to the destination) from theadult user. The autonomous vehicle begins driving 706 to the destinationfollowing the desired route. While the autonomous vehicle is driving tothe destination, the security system monitors 708 the child's vitalsigns, emotional status, and other characters to detect a problem withthe child, such as a high stress level, illness, a medical condition,and the like.

If a problem is detected 710, the security system sends 712 anotification of the problem to the adult user (e.g., via a text message,a phone call, an alert sent to a mobile device application, and thelike). The notification may include a location of the autonomousvehicle, details regarding the problem detected, and images (still imagedata or a live video stream) showing the face and body of the childpassenger. Additionally, the security system may initiate 714 an audioor video chat session between the child and the adult user. This audioor video chat session allows the child to talk with the adult user andexplain how they are feeling. For example, if the child has a highstress level, the adult user may calmly talk to the child to determinethe cause of the stress and try to calm the child. After initiating 714the chat session, the security system requests 716 instructions from theadult user regarding whether the autonomous vehicle should continue tothe destination. In some embodiments, the adult user may provideinstructions to the security system such as continue to the destination,return to the starting location, or drive to a different location (e.g.,a police station, a hospital, a school, and the like). Based on theinstructions from the adult user, the security system instructs 718 theautonomous vehicle to continue driving to the destination, return to thestarting location, or drive to a different location.

While various embodiments of the present disclosure are describedherein, it should be understood that they are presented by way ofexample only, and not limitation. It will be apparent to persons skilledin the relevant art that various changes in form and detail can be madetherein without departing from the spirit and scope of the disclosure.Thus, the breadth and scope of the present disclosure should not belimited by any of the described exemplary embodiments, but should bedefined only in accordance with the following claims and theirequivalents. The description herein is presented for the purposes ofillustration and description. It is not intended to be exhaustive or tolimit the disclosure to the precise form disclosed. Many modificationsand variations are possible in light of the disclosed teaching. Further,it should be noted that any or all of the alternate implementationsdiscussed herein may be used in any combination desired to formadditional hybrid implementations of the disclosure.

The invention claimed is:
 1. A method comprising: receiving, by avehicle security system and from a first user, a destination and adriving route to the destination for an autonomous vehicle to followwhile transporting a passenger, the passenger requiring guardianshipupon arriving at the destination; identifying, by the vehicle securitysystem, a passkey associated with the driving route; communicating thepasskey to a user designated to meet the autonomous vehicle at thedestination; confirming, by the vehicle security system, that the userdesignated to meet the autonomous vehicle possesses the passkey; andunlocking doors of the autonomous vehicle at the destination responsiveto confirming that the user designated to meet the autonomous vehiclepossesses the passkey and is at the destination in order to allow theuser designated to meet the autonomous vehicle to take custody of thepassenger.
 2. The method of claim 1, wherein the autonomous vehiclefollows the driving route to the destination.
 3. The method of claim 1,further comprising: capturing images or live video of an interior of theautonomous vehicle; and communicating the captured images or live videoto the first user.
 4. The method of claim 3, further comprisingreceiving instructions from the first user indicating whether to unlockthe doors of the autonomous vehicle at the destination aftercommunicating the captured images or live video to the first user. 5.The method of claim 3, further comprising receiving instructions fromthe first user after communicating the captured images or live video tothe first user, wherein the received instructions include one of aninstruction to unlock the doors of the autonomous vehicle, aninstruction to return the autonomous vehicle to a starting location ofthe driving route, and an instruction to drive the autonomous vehicle toa different location.
 6. The method of claim 1, further comprising:capturing images or live video of an area near the autonomous vehicleand external to the autonomous vehicle; and communicating the capturedimages or live video to the first a user who determined the destinationand the driving route, wherein unlocking the doors of the autonomousvehicle is further performed based on confirming that the userdesignated to meet the autonomous vehicle appears in the captured imagesor live video.
 7. The method of claim 6, further comprising receivinginstructions from the first user indicating whether to unlock the doorsof the autonomous vehicle at the destination after communicating thecaptured images or live video to the first user.
 8. The method of claim6, further comprising receiving instructions from the first user aftercommunicating the captured images or live video to the first user,wherein the received instructions include one of an instruction tounlock the doors of the autonomous vehicle, an instruction to return theautonomous vehicle to a starting location of the driving route, and aninstruction to drive the autonomous vehicle to a different location. 9.The method of claim 1, further comprising monitoring at least one of apassenger's vital signs or a passenger's emotional status.
 10. Themethod of claim 9, further comprising: generating an alert indicating aproblem associated with the passenger based on a problem detected withthe passenger's vital signs or emotional status; and communicating thealert to the first user.
 11. The method of claim 9, further comprisinginitiating an audio chat session or a video chat session between thepassenger and the first user.
 12. An apparatus comprising: acommunication manager configured to receive, from an adult user, adestination and a driving route to the destination for an autonomousvehicle to follow with a child passenger, the child passenger requiringguardianship upon arriving at the destination; a passkey managerconfigured to identify a passkey associated with the driving route,wherein the communication manager is further configured to communicatethe passkey to a user designated to meet the autonomous vehicle at thedestination, and wherein the passkey manager is further configured toconfirm that the user designated to meet the autonomous vehicle at thedestination possesses the passkey and is at the destination; and avehicle lock manager configured to unlock doors of the autonomousvehicle responsive to the passkey manager confirming that the userdesignated to meet the autonomous vehicle at the destination possessesthe passkey and is at the destination in order to allow the userdesignated to meet the autonomous vehicle to take custody of the childpassenger.
 13. The apparatus of claim 12, further comprising an imageprocessing module configured to: capture images or live video of aninterior of the autonomous vehicle; and communicate the captured imagesor live video to the adult user, wherein unlocking the doors of theautonomous vehicle is further performed based on confirming that theuser designated to meet the autonomous vehicle appears in the capturedimages or live video.
 14. The apparatus of claim 13, wherein thecommunication manager further receives instructions from the adult userindicating whether to unlock the doors of the autonomous vehicle at thedestination after the adult user receives the captured images or livevideo.
 15. The method of claim 1, further comprising unlocking a seatbelt restraining the passenger responsive to confirming that the userdesignated to meet the autonomous vehicle possesses the passkey and isat the destination.
 16. The method of claim 1, further comprisingcreating a biometric identity used to authenticate the user designatedto meet the autonomous vehicle at the destination, the biometricidentity used in place of the passkey.