Limitations on the use of an autonomous vehicle

ABSTRACT

A method for controlling an autonomous vehicle includes determining whether a primary user is present in an autonomous vehicle, allowing use of a plurality of functions of the autonomous vehicle in response to determining that the primary user is present in the autonomous vehicle, and receiving and storing preferences input by the primary user, wherein the preferences identify a limitation on one or more of the plurality of functions of the autonomous vehicle that should be enforced during use of the autonomous vehicle if the primary user is not present in the autonomous vehicle. The method further includes limiting use of the one or more of the plurality of functions of the autonomous vehicle as specified by the preferences in response to determining that the primary user is not present in the autonomous vehicle.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.14/180,422 filed on Feb. 14, 2014, which application is incorporated byreference herein.

BACKGROUND

1. Field of the Invention

The present invention relates to the control and operation of anautonomous vehicle.

2. Background of the Related Art

An autonomous vehicle is a vehicle that is capable of navigatingroadways without a person controlling the vehicle. The autonomousvehicle may use a variety of sensors, data and processing capacity inorder to navigate to a destination, avoid hazards and obey trafficsigns. Examples of sensors used by an autonomous vehicle include globalpositioning system (GPS) receivers, cameras, radar and lidar.

Autonomous cars are now in existence and have logged hundreds ofthousands of miles on public roads. Several states, such as Texas andCalifornia, have passed laws that allow use of autonomous vehicles.While the basic technology has been largely proven and laws now permituse of such vehicles on public roads, autonomous vehicles are not yet inwidespread distribution and use.

BRIEF SUMMARY

One embodiment of the present invention provides a method that comprisesdetermining whether a primary user is present in an autonomous vehicle,allowing use of a plurality of functions of the autonomous vehicle inresponse to determining that the primary user is present in theautonomous vehicle, and receiving and storing preferences input by theprimary user, wherein the preferences identify a limitation on one ormore of the plurality of functions of the autonomous vehicle that shouldbe enforced during use of the autonomous vehicle if the primary user isnot present in the autonomous vehicle. The method further compriseslimiting use of the one or more of the plurality of functions of theautonomous vehicle as specified by the preferences in response todetermining that the primary user is not present in the autonomousvehicle.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a diagram of a computer system controlling an autonomousvehicle.

FIG. 2 is a diagram of an autonomous vehicle including the controlsystem of FIG. 1.

FIG. 3 is a diagram of a graphical user interface for entering andstoring preferences input by a primary user.

FIG. 4 is a diagram of a graphical user interface for entering andstoring user priorities and identification parameters for the primaryuser and all secondary users.

FIG. 5 is a flowchart of a method for controlling an autonomous vehiclein accordance with one embodiment of the present invention.

DETAILED DESCRIPTION

One embodiment of the present invention provides a method that comprisesdetermining whether a primary user is present in an autonomous vehicle,allowing use of a plurality of functions of the autonomous vehicle inresponse to determining that the primary user is present in theautonomous vehicle, and receiving and storing preferences input by theprimary user, wherein the preferences identify a limitation on one ormore of the plurality of functions of the autonomous vehicle that shouldbe enforced during use of the autonomous vehicle if the primary user isnot present in the autonomous vehicle. The method further compriseslimiting use of the one or more of the plurality of functions of theautonomous vehicle as specified by the preferences in response todetermining that the primary user is not present in the autonomousvehicle.

The presence of the primary user in an autonomous vehicle may bedetermined using various techniques or systems. On example includesdetecting sound within the autonomous vehicle, analyzing the detectedsound using voice recognition to identify a voice, and comparing one ormore voice parameter of the identified voice with one or more previouslystored voice parameter associated with the primary user. Another exampleincludes detecting a local wireless transmission from a mobilecommunication device associated with the primary user. Yet anotherexample includes detection of a radio-frequency identification (RFID)tag that uniquely identifies the primary user, such as an RFID tagattached to, or included within, a wallet, driver's license, key, watch,or other item that would typically be carried with the primary user.Other detection technologies may also be used, such as electronic odorsensors, weight sensors, and facial recognition systems. Thetechnologies mentioned above may be used in various combinations toincrease the accuracy and confidence that the primary user has beenproperly identified as being present.

An autonomous vehicle may perform any of a plurality of functions. Someof these functions may be unique to an autonomous vehicle, such as theinteraction between hazard detection and automatic steering control toavoid any detected hazards. Many of the functions are common to vehiclesgenerally, such as speed control, audio and video systems, airconditioning and heating, door locks, window controls, operating modes,and the like.

Preferences or rules are input by the primary user and received andstored in memory accessible to a control system of the autonomousvehicle. The preferences may, among other things, identify a limitationon one or more of the plurality of functions of the autonomous vehiclethat should be enforced during use of the autonomous vehicle if theprimary user is not present in the autonomous vehicle. For example, thepreferences may identify a secondary user and a limitation on the one ormore of the plurality of functions of the autonomous vehicle that shouldbe enforced on the secondary user if the primary user is not present inthe autonomous vehicle. The method may further comprise determiningwhether the secondary user is present in the autonomous vehicle, and thestep of limiting the use of the one or more of the plurality offunctions of the autonomous vehicle as specified by the preferences mayinclude limiting the use of the one or more of the plurality offunctions of the autonomous vehicle that should be enforced on thesecondary user if the primary user is not present in the autonomousvehicle in response to determining that the secondary user is present inthe autonomous vehicle.

Optionally, the manner in which the preferences identify a limitation onthe one or more of the plurality of functions of the autonomous vehiclemay include affirmatively identifying a subset of the plurality offunctions of the autonomous vehicle that may be used by a secondary userif the primary user is not present in the autonomous vehicle.Accordingly, the limitation on a function may be imposed by failing toaffirmatively grant or identify that function as being available to aparticular secondary user. Specifically, a limitation on one or more ofthe plurality of functions of the autonomous vehicle may be identifiedby specifying a subset of the plurality of functions that may be used bysecondary users if the primary user is not present in the autonomousvehicle.

The preferences established by the primary user may identify a pluralityof secondary users and, for each of the plurality of secondary users, alimitation on one or more of the plurality of functions of theautonomous vehicle that should be enforced on the secondary user if theprimary user is not present in the autonomous vehicle. For example, thepreferences may identify a limitation on where (i.e., locations orplaces) the autonomous vehicle may travel if the primary user is notpresent in the autonomous vehicle. More specifically, the preferencesmay identify a limitation one or more destinations wherein theautonomous vehicle may not stop if the primary user is not present inthe autonomous vehicle. Alternatively, the preference may identifydestinations where the autonomous vehicle may stop even if the primaryuser is not present. Such destinations may include, for example, certaintypes of destinations (i.e., gas stations), residences or workplacessecondary users (i.e., family, friends and coworkers), emergencydestinations (i.e., police stations and hospitals), a defined area(i.e., a city or county), or a range of distance from the owner (i.e.,10 mile radius). Still further, the preferences may limit an amount ofenergy usage, identify prohibited or blacklisted locations. Thepreferences may impose a separate set of limitations based uponcharacteristics of the occupants in the autonomous vehicle, such as theage of one or more individual.

In other non-limiting example, the preferences may prevent a secondaryuser from performing a function or limit how a secondary user performs afunction, where the function is selected from accessing a media file,accessing onboard internet, controlling audio volume, using onboardnetwork access, controlling volume of media performance, traveling abovea speed limit or other manners of aggressive driving, taking over manualdriving, navigating to a prohibited destination, and navigating along aprohibited route. Such limitations may facilitate ride sharing and othercarpooling arrangements without requiring the primary user to always bepresent.

In a specific example, the method may further comprise the autonomousvehicle transporting the primary user and the secondary user to a firstdestination without any limitations on use of the plurality of functionsof the autonomous vehicle, and the autonomous vehicle transporting thesecondary user to a second destination without the primary user presentin the autonomous vehicle. This may be the case if the autonomousvehicle is used in a carpool situation where the primary and secondaryusers are headed to different destinations. However, the method mayprevent the autonomous vehicle from transporting the secondary user to athird destination without the primary user present in the autonomousvehicle, wherein the preferences identify that the autonomous vehiclemay not stop at the third destination if the primary user is not presentin the autonomous vehicle. In this manner, the primary user mayimplement controls on how the autonomous vehicle is used even after theprimary user is no longer in the vehicle. Traditionally, a persondriving in a carpool (i.e., a primary user) will drop off the otherindividuals in the carpool before ending the trip at their ownworkplace, and then reverse the route at the end of the day. By lettingan autonomous vehicle transport the other individuals without theprimary user being present, those in the carpool may be dropped off andpicked up in a different order that is perhaps more efficient.

The preferences input by the primary user may also identify one or moresecondary users as being authorized to use the autonomous vehicle whenthe primary user is not present in the autonomous vehicle. For example,the preferences may identify a name or other identifier associated witha secondary user. However, the preferences or some othercross-referenced data storage should maintain a record, logicallyassociated with the name or other identifier, which includes parametersthat may be used to identify the secondary user. For example, such arecord may identify the secondary user's mobile communication device,weight, RFID tag, facial image, voice sample, or password.

An association between two data elements may be a logical association,for example, by storing a logical association between an identifier of asecondary user and detectable parameters for the secondary user.Furthermore, an association might be established by storing thesecondary user's identifier (name) in a common record or a list (i.e., arow of a table) along with one or more parameter. As another example, anassociation might be established by storing the name of the secondaryuser and the parameters for the secondary user in separate records usinga common reference ID (as in a relational database). The logicalassociation between two data elements can be established using any datastorage or programming technique.

Optionally, the preferences may identify a plurality of secondary usersauthorized to use the autonomous vehicle when the primary user is notpresent in the autonomous vehicle. The preferences may further identifya priority associated with each of the plurality of secondary users. Insuch an embodiment, when the primary user is not present in theautonomous vehicle, the method may grant control of the autonomousvehicle to a selected secondary user that is present in the autonomousvehicle, wherein the selected secondary user has the highest priorityamong all of the secondary users present in the autonomous vehicle.

In a further option, the method may further comprise receiving a requestfrom an authorized secondary user for an exception to a limitation,forwarding the request to the primary user and prompting the primaryuser to approve or deny the exception, receiving a reply message fromthe primary user approving or denying the exception, and the autonomousvehicle modifying the limitation in response to the reply messageindicating approval of the exception and maintaining the limitation inresponse to the reply message indicating denial of the exception.

In a still further option, the preferences may identify an authorizedgroup of secondary users as being authorized to use the autonomousvehicle when the primary user is not present in the autonomous vehicle.Such an authorized group might be, without limitation, employees of acertain company, members of a civic organization, or participants in aproject. Accordingly, the method may further comprise authorizing asecondary user to use the autonomous vehicle in response to determiningthat the secondary user is a member of the authorized group. Membershipin a group may be previously determined and stored in a data file, butmay also be determined as needed by searching social media or other datasources.

The preferences may also identify a prohibited item that the primaryuser does not want to be taken within the autonomous vehicle.Accordingly, the method may limit the use of one or more of theplurality of functions of the autonomous vehicle in response todetecting a prohibited item within the autonomous vehicle. A prohibiteditem may, for example, be selected from food, alcohol, an animal, orcombinations thereof. Any item that is detectable may be prohibited. Forexample, cigarette smoke may be detected by a smoke detector and used asinput to a control system that limits one or more function of theautonomous vehicle.

Conversely, the method may limit use of one or more function of theautonomous vehicle unless a mandatory item is detected within theautonomous vehicle. For example, the mandatory item may be a radiofrequency identification (RFID) tag or a wireless transmitter that maybe physically secured to or within a device selected from a driver'slicense, a key, and combinations thereof.

Still further, the method may include receiving and storing aninstruction from the primary user, in advance of executing theinstruction, instructing the autonomous vehicle to travel from a firstlocation and arrive at a predetermined second location at apredetermined time. Accordingly, the primary user may park theautonomous vehicle and establish a time and place for the autonomousvehicle to pick up the primary user. Alternatively, the primary user mayinstruct the autonomous vehicle to park itself in an identified parkinglot after the primary user exits the vehicle. This embodiment may beused to the advantage that a parking lot may be remote to a user'sdestination without an inconvenience to the user, such as requiring along walk from and to the parking lot.

Another embodiment of the present invention provides a computer programproduct for controlling an autonomous vehicle. The computer programproduct comprises a computer readable storage medium having programinstructions embodied therewith, wherein the program instructions areexecutable by a processor to cause the processor to perform a method.The method comprises determining whether a primary user is present in anautonomous vehicle, allowing use of a plurality of functions of theautonomous vehicle in response to determining that the primary user ispresent in the autonomous vehicle, and receiving and storing preferencesinput by the primary user, wherein the preferences identify a limitationon one or more of the plurality of functions of the autonomous vehiclethat should be enforced during use of the autonomous vehicle if theprimary user is not present in the autonomous vehicle. The methodfurther comprises limiting the use of the one or more of the pluralityof functions of the autonomous vehicle as specified by the preferencesin response to determining that the primary user is not present in theautonomous vehicle.

The foregoing computer program products may further include programinstructions for implementing or initiating any one or more aspects ofthe methods described herein. Accordingly, a separate description of themethods will not be duplicated in the context of a computer programproduct.

FIG. 1 is a diagram of a computer system 10 controlling an autonomousvehicle. The system 10 may include a processor 12, memory 14, a DC powersource or battery 16, a Radar or Lidar unit 18, one or more cameras 28,and an audio codec 20 coupled to a speaker 22 and a microphone 24. Oneor more detectors 26 are included for detecting identificationparameters associated with occupants or users within the autonomousvehicle. Such detectors 26 may include a camera providing input forfacial recognition, a microphone for providing input for voicerecognition, weight sensors for measuring each occupant's weight, orother detectors. The computer system 10 further includes a vehiclecontrol interface 30 which provides signals to a steering controller 32and a speed controller 34. Other components may also be included.

The system 10 may also include a Wi-Fi transceiver 40 and correspondingantenna 42 allowing the system to communicate with a Wi-Fi router 54, amobile communications transceiver 44 and corresponding antenna 46allowing the system to communicate over a mobile/cellular/satellitenetwork 58, and a global positioning system (GPS) transceiver 48 andcorresponding antenna 50 allowing the system to obtain signals from aglobal positioning system or satellites 60. In a non-limiting example,the mobile/cellular/satellite network 58 may be connected to a globalcommunications network 56, such as the Internet. Accordingly, themobile/cellular/satellite network 58 may include or access a first datasource 59, such as a server, for the purpose of obtaining navigationdata. Alternatively, navigation data may be obtained from a second datasource 55 via the Wi-Fi router 54. As shown, the memory 14 storesvehicle function control logic 62, preferences data 64, primary andsecondary user identification parameters 66, and a voice recognitionand/or facial recognition module 68.

FIG. 2 is a diagram of an autonomous vehicle 70 including the controlsystem of FIG. 1. Only a portion of the control system 10 of FIG. 1 isshown in FIG. 2, but it will be understood that the entire controlsystem may be incorporated into the autonomous vehicle 70. As shown, thevehicle 70 include the processor 12, memory 14 and vehicle controlinterface 30. The vehicle also includes one or more detectors 26, whichare shown as a dash mounted device but may be integrated into one ormore components of the vehicle. The one or more detectors 26 may includea camera providing input for facial recognition, a microphone forproviding input for voice recognition, weight sensors for measuring eachoccupant's weight, an electronic nose for detecting odors, or otherdetectors.

FIG. 3 is a diagram of a graphical user interface 80 for entering andstoring preferences input by a primary user. While the autonomousvehicle may store and utilize additional preferences, the preferencesshown in the graphical user interface 80 are directed to establishinglimitations on how secondary users may use the autonomous vehicle whenthe primary user is not in the vehicle. Specifically, the graphical userinterface 80 includes a table having a first column 81 identifyingauthorized secondary users by name, a second column 82 identifying anyprohibited destinations for each of the secondary users, a third column83 identifying a maximum distance that may be traveled by the secondaryusers, and a fourth column 84 that specifies any other limitations onuse of the autonomous vehicle, such as time, day of the week, and mediaaccess.

A further area 85 of the graphical user interface 80 allows the primaryuser to select prohibited items from a list of options. As shown, theprimary user has checked “Animals” and “Smoking” as prohibiteditems/activities that should not be in the autonomous vehicle. While theautonomous vehicle may not have means for actually preventing an animalfrom entering the vehicle or to stopping someone from smoking, thevehicle could prevent the autonomous vehicle from leaving the locationwhere the animal was picked up or send a message to the primary userreporting that someone is smoking in the vehicle.

FIG. 4 is a diagram of a graphical user interface 90 for entering andstoring user identification parameters for the primary user and allsecondary users. A representative table includes a first column 91identifying a user name, a second column 92 identifying whether the useris the primary user or a secondary user, and a third column 93specifying a priority for each of the secondary users. Since the primaryuser does not have limitations on the functions of the autonomousvehicle that may be used, the primary user is not listed in the firstgraphical user interface 80 of FIG. 3. Still, the primary user isidentified in the second graphical user interface 90 of FIG. 4 for thepurpose of determining whether the primary user is present in theautonomous vehicle. The secondary user priority specified in the thirdcolumn 93 is for determining which one of multiple secondary users cancontrol the autonomous vehicle if the primary user is not present.

A fourth column 94 identifies an identification for a mobilecommunication device associated with each user, and a fifth column 95identifies the availability of a voice sample for voice recognition or afacial image for facial recognition. Other types of identifyinginformation may also be used as available. In one example, a mobilecommunication device being carried with a secondary user will bedetected by a short range wireless device, such as a BLUETOOTH device(maintained by the Bluetooth Special Interest Group and standardized inIEEE 802.15.1). Where a facial image is available in memory, an imagecaptured by a camera (i.e., one of the detectors 26 of FIGS. 1-2) may beused to identify occupants of the vehicle. Similarly, where a voicesample is available in memory, sounds captured by a microphone withinthe vehicle (i.e., one of the detectors 26 of FIGS. 1-2) may be used toidentify occupants of the vehicle. Combinations of voice recognition,facial recognition, and other detection methods may be used to increasethe accuracy of identifying occupants, such as where an occupant iswearing sunglasses that inhibit facial recognition.

FIG. 5 is a flowchart of a method 100 for controlling an autonomousvehicle in accordance with one embodiment of the present invention. Instep 102, the method determines whether a primary user is present in anautonomous vehicle. In step 104, the method allows use of a plurality offunctions of the autonomous vehicle in response to determining that theprimary user is present in the autonomous vehicle. Preferences input bythe primary user are received and stored in step 106, wherein thepreferences identify a limitation on one or more of the plurality offunctions of the autonomous vehicle that should be enforced during useof the autonomous vehicle if the primary user is not present in theautonomous vehicle. Step 108 limits the use of the one or more of theplurality of functions of the autonomous vehicle as specified by thepreferences in response to determining that the primary user is notpresent in the autonomous vehicle.

The present invention may be a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Java, Smalltalk, C++ or the like,and conventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,components and/or groups, but do not preclude the presence or additionof one or more other features, integers, steps, operations, elements,components, and/or groups thereof. The terms “preferably,” “preferred,”“prefer,” “optionally,” “may,” and similar terms are used to indicatethat an item, condition or step being referred to is an optional (notrequired) feature of the invention.

The corresponding structures, materials, acts, and equivalents of allmeans or steps plus function elements in the claims below are intendedto include any structure, material, or act for performing the functionin combination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but it is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Theembodiment was chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

What is claimed is:
 1. A method, comprising: determining whether aprimary user is present in an autonomous vehicle; allowing use of aplurality of functions of the autonomous vehicle in response todetermining that the primary user is present in the autonomous vehicle;receiving and storing preferences input by the primary user, wherein thepreferences identify a limitation on one or more of the plurality offunctions of the autonomous vehicle that should be enforced during useof the autonomous vehicle if the primary user is not present in theautonomous vehicle; and limiting the use of the one or more of theplurality of functions of the autonomous vehicle as specified by thepreferences in response to determining that the primary user is notpresent in the autonomous vehicle.
 2. The method of claim 1, wherein thepreferences identify a secondary user and a limitation on the one ormore of the plurality of functions of the autonomous vehicle that shouldbe enforced on the secondary user if the primary user is not present inthe autonomous vehicle.
 3. The method of claim 2, further comprising:determining whether the secondary user is present in the autonomousvehicle; and wherein limiting the use of the one or more of theplurality of functions of the autonomous vehicle as specified by thepreferences in response to determining that the primary user is notpresent in the autonomous vehicle, includes limiting the use of the oneor more of the plurality of functions of the autonomous vehicle thatshould be enforced on the secondary user if the primary user is notpresent in the autonomous vehicle in response to determining that thesecondary user is present in the autonomous vehicle.
 4. The method ofclaim 2, wherein the preferences identify a limitation on the one ormore of the plurality of functions of the autonomous vehicle byidentifying a subset of the plurality of functions of the autonomousvehicle that may be used by a secondary user if the primary user is notpresent in the autonomous vehicle.
 5. The method of claim 1, wherein thepreferences identify a plurality of secondary users and, for each of theplurality of secondary users, a limitation on one or more of theplurality of functions of the autonomous vehicle that should be enforcedon the secondary user if the primary user is not present in theautonomous vehicle.
 6. The method of claim 1, wherein the preferencesidentify a limitation on one or more of the plurality of functions ofthe autonomous vehicle by identifying a subset of the plurality offunctions that may be used by secondary users if the primary user is notpresent in the autonomous vehicle.
 7. The method of claim 1, wherein thepreferences identify a limitation on where the autonomous vehicle maytravel if the primary user is not present in the autonomous vehicle. 8.The method of claim 7, wherein the preferences identify a limitation oneor more destinations wherein the autonomous vehicle may not stop if theprimary user is not present in the autonomous vehicle.
 9. The method ofclaim 8, further comprising: the autonomous vehicle transporting theprimary user and the secondary user to a first destination without anylimitations on use of the plurality of functions of the autonomousvehicle; the autonomous vehicle transporting the secondary user to asecond destination without the primary user present in the autonomousvehicle; and preventing the autonomous vehicle from transporting thesecondary user to a third destination without the primary user presentin the autonomous vehicle, wherein the preferences identify that theautonomous vehicle may not stop at the third destination if the primaryuser is not present in the autonomous vehicle.
 10. The method of claim1, wherein the preferences identify one or more secondary users as beingauthorized to use the autonomous vehicle when the primary user is notpresent in the autonomous vehicle.
 11. The method of claim 10, whereinthe preferences identify a plurality of secondary users authorized touse the autonomous vehicle when the primary user is not present in theautonomous vehicle, and wherein the preferences further identify apriority associated with each of the plurality of secondary users, themethod further comprising: when the primary user is not present in theautonomous vehicle, granting control of the autonomous vehicle to aselected secondary user that is present in the autonomous vehicle,wherein the selected secondary user has the highest priority among allof the secondary users present in the autonomous vehicle.
 12. The methodof claim 10, further comprising: receiving a request from an authorizedsecondary user for an exception to a limitation; forwarding the requestto the primary user and prompting the primary user to approve or denythe exception; receiving a reply message from the primary user approvingor denying the exception; and the autonomous vehicle modifying thelimitation in response to the reply message indicating approval of theexception and maintaining the limitation in response to the replymessage indicating denial of the exception.
 13. The method of claim 10,wherein the preferences identify an authorized group of secondary usersas being authorized to use the autonomous vehicle when the primary useris not present in the autonomous vehicle, the method further comprising:authorizing a secondary user to use the autonomous vehicle in responseto determining that the secondary user is a member of the authorizedgroup.
 14. The method of claim 1, wherein the preferences prevent asecondary user from performing a function selected from accessing amedia file, using onboard network access, controlling volume of mediaperformance, traveling above a speed limit, navigating to a prohibiteddestination, and navigating along a prohibited route.
 15. The method ofclaim 1, wherein determining whether the primary user is present in anautonomous vehicle includes detecting sound within the autonomousvehicle, analyzing the detected sound using voice recognition toidentify a voice, and comparing one or more voice parameter of theidentified voice with one or more previously stored voice parameterassociated with the primary user.
 16. The method of claim 1, whereindetermining whether the primary user is present in an autonomous vehicleincludes detecting a local wireless transmission from a mobilecommunication device associated with the primary user.
 17. The method ofclaim 1, wherein the preferences identify a prohibited item, and whereinlimiting the use of the one or more of the plurality of functions of theautonomous vehicle as specified by the preferences in response todetermining that the primary user is not present in the autonomousvehicle, includes limiting the use of the one or more of the pluralityof functions of the autonomous vehicle in response to detecting aprohibited item within the autonomous vehicle.
 18. The method of claim17, wherein the prohibited item is selected from food, alcohol, ananimal, or combinations thereof.
 19. The method of claim 1, furthercomprising: limiting use of one or more function of the autonomousvehicle unless a mandatory item is detected within the autonomousvehicle, wherein the mandatory item includes a radio frequencyidentification tag or a wireless transmitter, and wherein the mandatoryitem is physically secured to or within a device selected from adriver's license, a key, and combinations thereof.
 20. The method ofclaim 1, further comprising: receiving and storing an instruction fromthe primary user, in advance of executing the instruction, instructingthe autonomous vehicle to travel from a first location and arrive at apredetermined second location at a predetermined time.