System and method for autonomous vehicle ride sharing using facial recognition

ABSTRACT

Methods and systems for identifying autonomous vehicle users are described herein. An autonomous vehicle may receive a request to transport a first user to a first destination location. While travelling along a route to the first destination location, the autonomous vehicle may receive a request to pick up a second user at a second starting location and transport the second user to a second destination location. The autonomous vehicle may travel to the second starting location when the second user is within the threshold distance of the autonomous vehicle. Upon arriving at the second starting location, the autonomous vehicle may detect whether a person approaching the vehicle is the second user by detecting a biometric identifier for the person. As a result, the second user may be allowed to enter the autonomous vehicle and/or the autonomous vehicle may begin travelling to the second destination location.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to and the benefit of the filing date of the following applications: (1) provisional U.S. Patent Application No. 62/286,017 entitled “Autonomous Vehicle Routing, Maintenance, & Fault Determination,” filed on Jan. 22, 2016; (2) provisional U.S. Patent Application No. 62/287,659 entitled “Autonomous Vehicle Technology,” filed on Jan. 27, 2016; (3) provisional U.S. Patent Application No. 62/302,990 entitled “Autonomous Vehicle Routing,” filed on Mar. 3, 2016; (4) provisional U.S. Patent Application No. 62/303,500 entitled “Autonomous Vehicle Routing,” filed on Mar. 4, 2016; (5) provisional U.S. Patent Application No. 62/312,109 entitled “Autonomous Vehicle Routing,” filed on Mar. 23, 2016; (6) provisional U.S. Patent Application No. 62/349,884 entitled “Autonomous Vehicle Component and System Assessment,” filed on Jun. 14, 2016; (7) provisional U.S. Patent Application No. 62/351,559 entitled “Autonomous Vehicle Component and System Assessment,” filed on Jun. 17, 2016; (8) provisional U.S. Patent Application No. 62/373,084 entitled “Autonomous Vehicle Communications,” filed on Aug. 10, 2016; (9) provisional U.S. Patent Application No. 62/376,044 entitled “Autonomous Operation Expansion through Caravans,” filed on Aug. 17, 2016; (10) provisional U.S. Patent Application No. 62/380,686 entitled “Autonomous Operation Expansion through Caravans,” filed on Aug. 29, 2016; (11) provisional U.S. Patent Application No. 62/381,848 entitled “System and Method for Autonomous Vehicle Sharing Using Facial Recognition,” filed on Aug. 31, 2016; (12) provisional U.S. Patent Application No. 62/406,595 entitled “Autonomous Vehicle Action Communications,” filed on Oct. 11, 2016; (13) provisional U.S. Patent Application No. 62/406,600 entitled “Autonomous Vehicle Path Coordination,” filed on Oct. 11, 2016; (14) provisional U.S. Patent Application No. 62/406,605 entitled “Autonomous Vehicle Signal Control,” filed on Oct. 11, 2016; (15) provisional U.S. Patent Application No. 62/406,611 entitled “Autonomous Vehicle Application,” filed on Oct. 11, 2016; (16) provisional U.S. Patent Application No. 62/415,668 entitled “Method and System for Enhancing the Functionality of a Vehicle,” filed on Nov. 1, 2016; (17) provisional U.S. Patent Application No. 62/415,672 entitled “Method and System for Repairing a Malfunctioning Autonomous Vehicle,” filed on Nov. 1, 2016; (18) provisional U.S. Patent Application No. 62/415,673 entitled “System and Method for Autonomous Vehicle Sharing Using Facial Recognition,” filed on Nov. 1, 2016; (19) provisional U.S. Patent Application No. 62/415,678 entitled “System and Method for Autonomous Vehicle Ride Sharing Using Facial Recognition,” filed on Nov. 1, 2016; (20) provisional U.S. Patent Application No. 62/418,988 entitled “Virtual Testing of Autonomous Vehicle Control System,” filed on Nov. 8, 2016; (21) provisional U.S. Patent Application No. 62/418,999 entitled “Detecting and Responding to Autonomous Vehicle Collisions,” filed on Nov. 8, 2016; (22) provisional U.S. Patent Application No. 62/419,002 entitled “Automatic Repair on Autonomous Vehicles,” filed on Nov. 8, 2016; (23) provisional U.S. Patent Application No. 62/419,009 entitled “Autonomous Vehicle Component Malfunction Impact Assessment,” filed on Nov. 8, 2016; (24) provisional U.S. Patent Application No. 62/419,017 entitled “Autonomous Vehicle Sensor Malfunction Detection,” filed on Nov. 8, 2016; (25) provisional U.S. Patent Application No. 62/419,023 entitled “Autonomous Vehicle Damage and Salvage Assessment,” filed on Nov. 8, 2016; (26) provisional U.S. Patent Application No. 62/424,078 entitled “Systems and Methods for Sensor Monitoring,” filed Nov. 18, 2016; (27) provisional U.S. Patent Application No. 62/424,093 entitled “Autonomous Vehicle Sensor Malfunction Detection,” filed on Nov. 18, 2016; (28) provisional U.S. Patent Application No. 62/428,843 entitled “Autonomous Vehicle Control,” filed on Dec. 1, 2016; (29) provisional U.S. Patent Application No. 62/430,215 entitled Autonomous Vehicle Environment and Component Monitoring,” filed on Dec. 5, 2016; (30) provisional U.S. Patent Application No. 62/434,355 entitled “Virtual Testing of Autonomous Environment Control System,” filed Dec. 14, 2016; (31) provisional U.S. Patent Application No. 62/434,359 entitled “Detecting and Responding to Autonomous Environment Incidents,” filed Dec. 14, 2016; (32) provisional U.S. Patent Application No. 62/434,361 entitled “Component Damage and Salvage Assessment,” filed Dec. 14, 2016; (33) provisional U.S. Patent Application No. 62/434,365 entitled “Sensor Malfunction Detection,” filed Dec. 14, 2016; (34) provisional U.S. Patent Application No. 62/434,368 entitled “Component Malfunction Impact Assessment,” filed Dec. 14, 2016; and (35) provisional U.S. Patent Application No. 62/434,370 entitled “Automatic Repair of Autonomous Components,” filed Dec. 14, 2016. The entire contents of each of the preceding applications are hereby expressly incorporated herein by reference.

Additionally, the present application is related to the following co-pending U.S. patent applications: (1) U.S. patent application Ser. No. 15/409,143 entitled “Autonomous Operation Suitability Assessment and Mapping,” filed Jan. 18, 2017; (2) U.S. patent application Ser. No. 15/409,146 entitled “Autonomous Vehicle Routing,” filed Jan. 18, 2017; (3) U.S. patent application Ser. No. 15/409,149 entitled “Autonomous Vehicle Routing During Emergencies,” filed Jan. 18, 2017; (4) U.S. patent application Ser. No. 15/409,159 entitled “Autonomous Vehicle Trip Routing,” filed Jan. 18, 2017; (5) U.S. patent application Ser. No. 15/409,163 entitled “Autonomous Vehicle Parking,” filed Jan. 18, 2017; (6) U.S. patent application Ser. No. 15/409,167 entitled “Autonomous Vehicle Retrieval,” filed Jan. 18, 2017; (7) U.S. patent application Ser. No. 15/409,092 entitled “Autonomous Vehicle Action Communications,” filed Jan. 18, 2017; (8) U.S. patent application Ser. No. 15/409,099 entitled “Autonomous Vehicle Path Coordination,” filed Jan. 18, 2017; (9) U.S. patent application Ser. No. 15/409,107 entitled “Autonomous Vehicle Signal Control,” filed Jan. 18, 2017; (10) U.S. patent application Ser. No. 15/409,115 entitled “Autonomous Vehicle Application,” filed Jan. 18, 2017; (11) U.S. patent application Ser. No. 15/409,136 entitled “Method and System for Enhancing the Functionality of a Vehicle,” filed Jan. 18, 2017; (12) U.S. patent application Ser. No. 15/409,180 entitled “Method and System for Repairing a Malfunctioning Autonomous Vehicle,” filed Jan. 18, 2017; (13) U.S. patent application Ser. No. 15/409,148 entitled “System and Method for Autonomous Vehicle Sharing Using Facial Recognition,” filed Jan. 18, 2017; (14) U.S. patent application Ser. No. 15/409,215 entitled “Autonomous Vehicle Sensor Malfunction Detection,” filed Jan. 18, 2017; (15) U.S. patent application Ser. No. 15/409,248 entitled “Sensor Malfunction Detection,” filed Jan. 18, 2017; (16) U.S. patent application Ser. No. 15/409,271 entitled “Autonomous Vehicle Component Malfunction Impact Assessment,” filed Jan. 18, 2017; (17) U.S. patent application Ser. No. 15/409,305 entitled “Component Malfunction Impact Assessment,” filed Jan. 18, 2017; (18) U.S. patent application Ser. No. 15/409,318 entitled “Automatic Repair of Autonomous Vehicles,” filed Jan. 18, 2017; (19) U.S. patent application Ser. No. 15/409,336 entitled “Automatic Repair of Autonomous Components,” filed Jan. 18, 2017; (20) U.S. patent application Ser. No. 15/409,340 entitled “Autonomous Vehicle Damage and Salvage Assessment,” filed Jan. 18, 2017; (21) U.S. patent application Ser. No. 15/409,349 entitled “Component Damage and Salvage Assessment,” filed Jan. 18, 2017; (22) U.S. patent application Ser. No. 15/409,359 entitled “Detecting and Responding to Autonomous Vehicle Collisions,” filed Jan. 18, 2017; (23) U.S. patent application Ser. No. 15/409,371 entitled “Detecting and Responding to Autonomous Environment Incidents,” filed Jan. 18, 2017; (24) U.S. patent application Ser. No. 15/409,445 entitled “Virtual Testing of Autonomous Vehicle Control System,” filed Jan. 18, 2017; (25) U.S. patent application Ser. No. 15/409,473 entitled “Virtual Testing of Autonomous Environment Control System,” filed Jan. 18, 2017; (26) U.S. patent application Ser. No. 15/409,220 entitled “Autonomous Electric Vehicle Charging,” filed Jan. 18, 2017; (27) U.S. patent application Ser. No. 15/409,213 entitled “Coordinated Autonomous Vehicle Automatic Area Scanning,” filed Jan. 18, 2017; (28) U.S. patent application Ser. No. 15/409,228 entitled “Operator-Specific Configuration of Autonomous Vehicle Operation,” filed Jan. 18, 2017; (29) U.S. patent application Ser. No. 15/409,236 entitled “Autonomous Vehicle Operation Adjustment Based Upon Route,” filed Jan. 18, 2017; (30) U.S. patent application Ser. No. 15/409,239 entitled “Autonomous Vehicle Component Maintenance and Repair,” filed Jan. 18, 2017; and (31) U.S. patent application Ser. No. 15/409,243 entitled “Anomalous Condition Detection and Response for Autonomous Vehicles,” filed Jan. 18, 2017.

FIELD

The present disclosure generally relates to systems and methods for identifying autonomous vehicle users and allowing or denying entry into the autonomous vehicle based upon the identification.

BACKGROUND

Vehicles are typically operated by a human vehicle operator who controls both steering and motive controls. Operator error, inattention, inexperience, misuse, or distraction leads to many vehicle collisions each year, resulting in injury and damage. Autonomous or semi-autonomous vehicles augment vehicle operators' information or replace vehicle operators' control commands to operate the vehicle, in whole or part, with computer systems based upon information from sensors within, or attached to, the vehicle. Such vehicles may be operated with or without passengers, thus requiring different means of control than traditional vehicles. Such vehicles also may include a plurality of advanced sensors, capable of providing significantly more data (both in type and quantity) than is available even from GPS navigation assistance systems installed in traditional vehicles.

Ensuring safe operation of such autonomous or semi-autonomous vehicles is of the utmost importance because the automated systems of these vehicles may not function properly in all environments. Although autonomous operation may be safer than manual operation under ordinary driving conditions, unusual or irregular environmental conditions may significantly impair the functioning of the autonomous operation features controlling the autonomous vehicle. Under some conditions, autonomous operation may become impractical or excessively dangerous. As an example, fog or heavy rain may greatly reduce the ability of autonomous operation features to safely control the vehicle. Additionally, damage or other impairment of sensors or other components of autonomous systems may significantly increase the risks associated with autonomous operation. Such conditions may change frequently, thereby changing the safety of autonomous vehicle operation.

BRIEF SUMMARY

The present embodiments may be related to autonomous or semi-autonomous vehicle operation, including driverless operation of fully autonomous vehicles. The embodiments described herein relate particularly to various aspects of autonomous operation features, components, and software. A user may transmit a request, via a mobile device, for an autonomous vehicle to provide transportation to a destination location selected by the user. When the user transmits the request, the user may provide user identification information, such as login information (a username and password), a user ID, a personal identification number (PIN), a passcode, an email address, etc. Using the user identification information, the autonomous vehicle may obtain a user profile for the user including additional identification information, such as a biometric fingerprint. A biometric fingerprint may define a biometric identifier for each authorized user of the user profile.

In response to the request, the autonomous vehicle may navigate to the current location of the user or some other starting location that the user specifies. Upon arriving at the designated location, the autonomous vehicle may detect a biometric identifier from the person approaching the autonomous vehicle for example, via sensors attached to and/or within the autonomous vehicle. The biometric identifier may be the user's fingerprint, an image of the user's face, a recording of the user's voice, a retinal image, and/or any other suitable biometric identifier. Then the autonomous vehicle may compare the biometric identifier to a corresponding biometric fingerprint in the user's profile.

If the biometric identifier matches a biometric fingerprint in the user's profile, the autonomous vehicle recognizes that the person approaching the autonomous vehicle is the user who requested transportation services. As a result, the autonomous vehicle may provide entry into the autonomous vehicle (e.g., by unlocking the doors) and/or may begin travelling to the destination location. On the other hand, if the biometric identifier does not match any biometric fingerprint in the user's profile, the autonomous vehicle may not recognize the person approaching the autonomous vehicle. Accordingly, the autonomous vehicle may detect another biometric identifier from the person approaching the autonomous vehicle, may deny the person access to the autonomous vehicle, may sound an alarm, may turn off the engine, and/or may not begin travelling to the destination location selected by the user. Specific systems and methods are summarized below. The methods and systems summarized below may include additional, less, or alternate actions, including those discussed elsewhere herein.

In one aspect, a computer-implemented method for identifying autonomous vehicle users may be provided. The method may include receiving in a vehicle having one or more autonomous operation features, an indication of a first destination location for transporting a first user, and/or causing the vehicle to travel to the first destination location. While the vehicle travels along a route to the first destination location, the method may include receiving a request from a second user for transportation to a second destination location, determining whether the second user is within a threshold distance of a current location of the vehicle, and/or causing the vehicle to travel to a location of the second user when the second user is within the threshold distance of the vehicle. The method may further include detecting, via one or more sensors associated with the vehicle, a biometric identifier of a person approaching the vehicle to verify that the person is the second user, and/or causing a control mechanism within the vehicle to allow the second user to enter the vehicle when the biometric identifier matches a biometric fingerprint for the second user.

In some embodiments, the biometric identifier may be detected via an external facing camera attached to the vehicle and the biometric identifier may include at least one of: a fingerprint, a facial scan, and/or a retinal scan. In further embodiments, causing a control mechanism within the vehicle to allow the second user to enter the vehicle includes at least one of i) unlocking a door of the vehicle, ii) turning on a vehicle engine, or iii) turning on the one or more autonomous operation features for the vehicle.

In additional embodiments, the method may include when the biometric identifier does not match the biometric fingerprint, causing the control mechanism within the vehicle not to allow the person to enter the vehicle. In some embodiments, causing the control mechanism within the vehicle not to allow the person to enter the vehicle may include at least one of: i) locking each door of the vehicle, ii) sounding an alarm within the vehicle, iii) transmitting an alert, iv) turning off a vehicle engine, and/or v) shutting down the one or more autonomous operation features for the vehicle. Also in some embodiments, causing the control mechanism within the vehicle not to allow the person to enter the vehicle includes sounding an alarm within the vehicle for a predetermined threshold period of time, and after the predetermined threshold period of time expires, detecting whether the person is within a threshold distance of the vehicle, and/or transmitting an alert to emergency personnel when the person is within the threshold distance of the vehicle.

In further embodiments, the method may include receiving login information for the second user via an application on a mobile device, identifying a user profile associated with the login information, wherein the user profile includes the biometric fingerprint for the second user, and/or comparing the biometric identifier to the biometric fingerprint within the user profile. Moreover, the method may include determining a distance from the current location of the second user to the first destination location and a distance from the current location of the second user to the second destination location, and/or when the second destination location is closer to the current location of the second user than the first destination location, causing the vehicle to travel to the second destination location before traveling to the first destination location. Still further, the method may include causing the vehicle to travel to the first destination location before traveling to the second destination location.

In another aspect, a computer-implemented method for identifying autonomous vehicle users may be provided. The method may include receiving in a vehicle having one or more autonomous operation features, a plurality of requests from a plurality of users for transportation to a destination location for each user, wherein each request includes identification information and a location of each user, and wherein each of the plurality of requests is received within a threshold time period. For each of the plurality of users, the method may include causing the vehicle to travel to the location of the user, and/or prior to the user entering the vehicle, detecting via one or more sensors associated with the vehicle, a biometric identifier of the user, and/or comparing the biometric identifier to the identification information. When the biometric identifier and the identification information correspond to a same user, the method may include causing a control mechanism within the vehicle to allow the user to enter the vehicle and travel to the destination location and/or dividing a cost of insurance for transporting each of the users amongst the plurality of users.

In some embodiments, each of the plurality of users rents the vehicle or rents a plurality of vehicles including the vehicle as part of a subscription service, wherein when one of the plurality of users rents a plurality of vehicles, any of the plurality of vehicles picks up the user in response to receiving the request for transportation depending upon availability. Also in some embodiments, the subscription service may include insurance having insurance premiums on a cost per vehicle usage unit basis, wherein the cost of insurance for transporting each of the users is divided amongst the plurality of users according to an amount of vehicle usage units corresponding to each user, and/or wherein the cost per vehicle usage unit may include at least one of: a cost per mile or a cost per minute.

In additional embodiments, the plurality of requests for transportation may be received via a plurality of applications on a plurality of mobile devices of the plurality of users, wherein the identification information includes login information for retrieving a user profile for each user, and wherein each user profile includes one or more biometric fingerprints for the corresponding user. In some embodiments, comparing the biometric identifier to the identification information may include retrieving the one or more biometric fingerprints associated with the user profile from a database, comparing the biometric identifier to the one or more biometric fingerprints, and/or when the biometric identifier matches at least one of the one or more biometric fingerprints, determining that the biometric identifier and the identification information correspond to the same user.

In further embodiments, the method may include when the biometric identifier and the identification information do not correspond to the same user, causing the control mechanism within the vehicle not to allow the user to enter the vehicle or to travel to the destination location. The cost of insurance for transporting each of the users may be divided amongst a subset of the plurality of users, wherein each of the users in the subset gain entry to the vehicle and users not included in the subset are denied entry.

Systems or computer-readable media storing instructions for implementing all or part of the system described above may also be provided in some aspects. Systems for implementing such methods may include one or more of the following: a special-purpose assessment computing device, a mobile computing device, a personal electronic device, an on-board computer, a remote server, one or more sensors, one or more communication modules configured to communicate wirelessly via radio links, radio frequency links, and/or wireless communication channels, and/or one or more program memories coupled to one or more processors of the mobile computing device, personal electronic device, on-board computer, or remote server. Such program memories may store instructions to cause the one or more processors to implement part or all of the method described above. Additional or alternative features described herein below may be included in some aspects.

BRIEF DESCRIPTION OF THE DRAWINGS

Advantages will become more apparent to those skilled in the art from the following description of the preferred embodiments which have been shown and described by way of illustration. As will be realized, the present embodiments may be capable of other and different embodiments, and their details are capable of modification in various respects. Accordingly, the drawings and description are to be regarded as illustrative in nature and not as restrictive.

The figures described below depict various aspects of the applications, methods, and systems disclosed herein. It should be understood that each figure depicts an embodiment of a particular aspect of the disclosed applications, systems and methods, and that each of the figures is intended to accord with a possible embodiment thereof. Furthermore, wherever possible, the following description refers to the reference numerals included in the following figures, in which features depicted in multiple figures are designated with consistent reference numerals.

FIG. 1A illustrates a block diagram of an exemplary autonomous vehicle data system for autonomous vehicle operation, monitoring, communication, and related functions;

FIG. 1B illustrates a block diagram of an exemplary autonomous vehicle communication system, showing a plurality of vehicles and smart infrastructure components;

FIG. 2 illustrates a block diagram of an exemplary on-board computer or mobile device;

FIG. 3 illustrates a flow diagram of an exemplary autonomous vehicle operation method;

FIGS. 4A-B illustrate flow diagrams of exemplary autonomous vehicle operation monitoring methods for obtaining and recording information during vehicle operation;

FIG. 5A illustrates a flow diagram of an exemplary autonomous vehicle user identification method for identifying whether the person entering the autonomous vehicle is the user who requested the autonomous vehicle; and

FIG. 5B illustrates a flow diagram of an exemplary biometric fingerprint capturing method for storing a biometric fingerprint of a user.

DETAILED DESCRIPTION

The systems and methods disclosed herein generally relate to various aspects of autonomous operation features, components, and software. Responses to accidents, collisions, and other events causing malfunctions or damage are discussed below. Assessment of components and features may be performed as part of detecting malfunctions, determining repairs, determining component operating status, or generally evaluating effectiveness or reliability of components and features. To this end, the systems and methods may include collecting, communicating, evaluating, predicting, and/or utilizing data associated with autonomous or semi-autonomous operation features for controlling a vehicle. The autonomous operation features may take full control of the vehicle under certain conditions, viz. fully autonomous operation, or the autonomous operation features may assist the vehicle operator in operating the vehicle, viz. partially autonomous operation. Fully autonomous operation features may include systems within the vehicle that pilot the vehicle to a destination with or without a vehicle operator present (e.g., an operating system for a driverless car). Partially autonomous operation features may assist the vehicle operator in limited ways (e.g., automatic braking or collision avoidance systems). Fully or partially autonomous operation features may perform specific functions to control or assist in controlling some aspect of vehicle operation, or such features may manage or control other autonomous operation features. For example, a vehicle operating system may control numerous subsystems that each fully or partially control aspects of vehicle operation.

In addition to information regarding the position or movement of a vehicle, autonomous operation features may collect and utilize other information, such as data about other vehicles or control decisions of the vehicle. Such additional information may be used to improve vehicle operation, route the vehicle to a destination, warn of component malfunctions, advise others of potential hazards, or for other purposes described herein. Information may be collected, assessed, and/or shared via applications installed and executing on computing devices associated with various vehicles or vehicle operators, such as on-board computers of vehicles or smartphones of vehicle operators. By using computer applications to obtain data, the additional information generated by autonomous vehicles or features may be used to assess the autonomous features themselves while in operation or to provide pertinent information to non-autonomous vehicles through an electronic communication network. Additionally, information may be collected, assessed, and/or shared via applications installed and executing on computing devices associated with passengers requesting transportation by the vehicles. By using these computer applications to obtain data, a vehicle may identify whether the user who requested the vehicle is the person entering the vehicle and/or may take appropriate action. These and other advantages are further described below.

Autonomous operation features utilize data not available to a human operator, respond to conditions in the vehicle operating environment faster than human operators, and do not suffer fatigue or distraction. Thus, the autonomous operation features may also significantly affect various risks associated with operating a vehicle. Alternatively, autonomous operation features may be incapable of some actions typically taken by human operators, particularly when the features or other components of the vehicle are damaged or inoperable. Moreover, combinations of autonomous operation features may further affect operating risks due to synergies or conflicts between features. To account for these effects on risk, some embodiments evaluate the quality of each autonomous operation feature and/or combination of features. This may be accomplished by testing the features and combinations in controlled environments, as well as analyzing the effectiveness of the features in the ordinary course of vehicle operation. New autonomous operation features may be evaluated based upon controlled testing and/or estimating ordinary-course performance based upon data regarding other similar features for which ordinary-course performance is known.

Some autonomous operation features may be adapted for use under particular conditions, such as city driving or highway driving. Additionally, the vehicle operator may be able to configure settings relating to the features or may enable or disable the features at will. Therefore, some embodiments monitor use of the autonomous operation features, which may include the settings or levels of feature use during vehicle operation. Information obtained by monitoring feature usage may be used to determine risk levels associated with vehicle operation, either generally or in relation to a vehicle operator. In such situations, total risk may be determined by a weighted combination of the risk levels associated with operation while autonomous operation features are enabled (with relevant settings) and the risk levels associated with operation while autonomous operation features are disabled. For fully autonomous vehicles, settings or configurations relating to vehicle operation may be monitored and used in determining vehicle operating risk.

In some embodiments, information regarding the risks associated with vehicle operation with and without the autonomous operation features may be used to determine risk categories or premiums for a vehicle insurance policy covering a vehicle with autonomous operation features, as described elsewhere herein. Risk category or price may be determined based upon factors relating to the evaluated effectiveness of the autonomous vehicle features. The risk or price determination may also include traditional factors, such as location, vehicle type, and level of vehicle use. For fully autonomous vehicles, factors relating to vehicle operators may be excluded entirely. For partially autonomous vehicles, factors relating to vehicle operators may be reduced in proportion to the evaluated effectiveness and monitored usage levels of the autonomous operation features. For vehicles with autonomous communication features that obtain information from external sources (e.g., other vehicles or infrastructure), the risk level and/or price determination may also include an assessment of the availability of external sources of information. Location and/or timing of vehicle use may thus be monitored and/or weighted to determine the risk associated with operation of the vehicle.

Exemplary Autonomous Vehicle Operation System

FIG. 1A illustrates a block diagram of an exemplary autonomous vehicle data system 100 on which the exemplary methods described herein may be implemented. The high-level architecture includes both hardware and software applications, as well as various data communications channels for communicating data between the various hardware and software components. The autonomous vehicle data system 100 may be roughly divided into front-end components 102 and back-end components 104. The front-end components 102 may obtain information regarding a vehicle 108 (e.g., a car, truck, motorcycle, etc.) and the surrounding environment. An on-board computer 114 may utilize this information to operate the vehicle 108 according to an autonomous operation feature or to assist the vehicle operator in operating the vehicle 108. To monitor the vehicle 108, the front-end components 102 may include one or more sensors 120 and/or personal electronic devices installed within the vehicle 108 that may communicate with the on-board computer 114. The front-end components 102 may further process the sensor data using the on-board computer 114 or a mobile device 110 (e.g., a smart phone, a tablet computer, a special purpose computing device, smart watch, wearable electronics, etc.) to determine when the vehicle is in operation and information regarding the vehicle.

In some embodiments of the system 100, the front-end components 102 may communicate with the back-end components 104 via a network 130. Either the on-board computer 114 or the mobile device 110 may communicate with the back-end components 104 via the network 130 to allow the back-end components 104 to record information regarding vehicle usage. The back-end components 104 may use one or more servers 140 to receive data from the front-end components 102, store the received data, process the received data, and/or communicate information associated with the received or processed data.

The front-end components 102 may be disposed within or communicatively connected to one or more on-board computers 114, which may be permanently or removably installed in the vehicle 108. The on-board computer 114 may interface with the one or more sensors 120 within the vehicle 108 (e.g., a digital camera, a LIDAR sensor, an ultrasonic sensor, an infrared sensor, an ignition sensor, an odometer, a system clock, a speedometer, a tachometer, an accelerometer, a gyroscope, a compass, a geolocation unit, radar unit, etc.), which sensors may also be incorporated within or connected to the on-board computer 114.

The front end components 102 may further include a communication component 122 to transmit information to and receive information from external sources, including other vehicles, infrastructure, or the back-end components 104. In some embodiments, the mobile device 110 may supplement the functions performed by the on-board computer 114 described herein by, for example, sending or receiving information to and from the mobile server 140 via the network 130, such as over one or more radio frequency links or wireless communication channels. In other embodiments, the on-board computer 114 may perform all of the functions of the mobile device 110 described herein, in which case no mobile device 110 may be present in the system 100.

Either or both of the mobile device 110 or on-board computer 114 may communicate with the network 130 over links 112 and 118, respectively. Either or both of the mobile device 110 or on-board computer 114 may run a Data Application for collecting, generating, processing, analyzing, transmitting, receiving, and/or acting upon data associated with the vehicle 108 (e.g., sensor data, autonomous operation feature settings, or control decisions made by the autonomous operation features) or the vehicle environment (e.g., other vehicles operating near the vehicle 108). Additionally, the mobile device 110 and on-board computer 114 may communicate with one another directly over link 116.

The mobile device 110 may be either a general-use personal computer, cellular phone, smart phone, tablet computer, smart watch, wearable electronics, or a dedicated vehicle monitoring or control device. Although only one mobile device 110 is illustrated, it should be understood that a plurality of mobile devices 110 may be used in some embodiments. The on-board computer 114 may be a general-use on-board computer capable of performing many functions relating to vehicle operation or a dedicated computer for autonomous vehicle operation. Further, the on-board computer 114 may be installed by the manufacturer of the vehicle 108 or as an aftermarket modification or addition to the vehicle 108. In some embodiments or under certain conditions, the mobile device 110 or on-board computer 114 may function as thin-client devices that outsource some or most of the processing to the server 140.

In some embodiments, the mobile device 110 may run another application, such as a Ride Sharing Application for users to request transportation services from the vehicle 108. The vehicle 108 may pick the users up at starting locations and navigate to destination locations. In some scenarios, the owner of the vehicle 108 may request transportation services. For example, the vehicle 108 may be owned by one user who may communicate with the vehicle 108 via the Ride Sharing Application. In another example, the vehicle 108 may be jointly owned by several users who may each communicate with the vehicle 108 via the Ride Sharing Application. In other scenarios, several users may rent the vehicle 108 via a daily, weekly, and/or monthly subscription. In yet other scenarios, several users may rent the vehicle 108 for single vehicle trips, from a starting location to a destination location.

In some embodiments, the vehicle 108 may transport one user at a time and drop the user off at a destination location before picking up another user. In other embodiments, the vehicle 108 may determine whether other requesting users are within a threshold distance from the first user's route. When other requesting users are within the threshold distance, the vehicle 108 may pick up multiple users and drop them off at several respective destination locations.

The sensors 120 may be removably or fixedly installed within the vehicle 108 and may be disposed in various arrangements to provide information to the autonomous operation features. Among the sensors 120 may be included one or more of a GPS unit, a radar unit, a LIDAR unit, an ultrasonic sensor, an infrared sensor, an inductance sensor, a camera, an accelerometer, a tachometer, a speedometer, or a capacitive touch sensor. Some of the sensors 120 (e.g., radar, LIDAR, or camera units) may actively or passively scan the vehicle environment for obstacles (e.g., other vehicles, buildings, pedestrians, etc.), roadways, lane markings, signs, or signals. Other sensors 120 (e.g., GPS, accelerometer, or tachometer units) may provide data for determining the location or movement of the vehicle 108. Other sensors 120 may be directed to the interior or passenger compartment of the vehicle 108, such as cameras, microphones, pressure sensors, thermometers, or similar sensors to monitor the vehicle operator and/or passengers within the vehicle 108. Yet other sensors 120 may be directed to the area surrounding the vehicle 108 (e.g., radar, LIDAR, externally facing camera units, or capacitive touch sensors) to detect biometric identifiers for people approaching the vehicle 108. Information generated or received by the sensors 120 may be communicated to the on-board computer 114 or the mobile device 110 for use in autonomous vehicle operation.

In further embodiments, the front-end components may include an infrastructure communication device 124 for monitoring the status of one or more infrastructure components 126. Infrastructure components 126 may include roadways, bridges, traffic signals, gates, switches, crossings, parking lots or garages, toll booths, docks, hangars, or other similar physical portions of a transportation system's infrastructure. The infrastructure communication device 124 may include or be communicatively connected to one or more sensors (not shown) for detecting information relating to the condition of the infrastructure component 126. The sensors (not shown) may generate data relating to weather conditions, traffic conditions, or operating status of the infrastructure component 126.

The infrastructure communication device 124 may be configured to receive the sensor data generated and determine a condition of the infrastructure component 126, such as weather conditions, road integrity, construction, traffic, available parking spaces, etc. The infrastructure communication device 124 may further be configured to communicate information to vehicles 108 via the communication component 122. In some embodiments, the infrastructure communication device 124 may receive information from one or more vehicles 108, while, in other embodiments, the infrastructure communication device 124 may only transmit information to the vehicles 108. The infrastructure communication device 124 may be configured to monitor vehicles 108 and/or communicate information to other vehicles 108 and/or to mobile devices 110.

In some embodiments, the communication component 122 may receive information from external sources, such as other vehicles or infrastructure. The communication component 122 may also send information regarding the vehicle 108 to external sources. To send and receive information, the communication component 122 may include a transmitter and a receiver designed to operate according to predetermined specifications, such as the dedicated short-range communication (DSRC) channel, wireless telephony, Wi-Fi, or other existing or later-developed communications protocols. The received information may supplement the data received from the sensors 120 to implement the autonomous operation features. For example, the communication component 122 may receive information that an autonomous vehicle ahead of the vehicle 108 is reducing speed, allowing the adjustments in the autonomous operation of the vehicle 108.

In addition to receiving information from the sensors 120, the on-board computer 114 may directly or indirectly control the operation of the vehicle 108 according to various autonomous operation features. The autonomous operation features may include software applications or modules implemented by the on-board computer 114 to generate and implement control commands to control the steering, braking, or throttle of the vehicle 108. To facilitate such control, the on-board computer 114 may be communicatively connected to control components of the vehicle 108 by various electrical or electromechanical control components (not shown). When a control command is generated by the on-board computer 114, it may thus be communicated to the control components of the vehicle 108 to effect a control action. In embodiments involving fully autonomous vehicles, the vehicle 108 may be operable only through such control components (not shown). In other embodiments, the control components may be disposed within or supplement other vehicle operator control components (not shown), such as steering wheels, accelerator or brake pedals, or ignition switches. Control commands may also be used to lock/unlock doors, turn on/turn off the engine, sound an alarm, and/or turn on/turn off autonomous operation features in the vehicle 108.

In some embodiments, the front-end components 102 communicate with the back-end components 104 via the network 130. The network 130 may be a proprietary network, a secure public internet, a virtual private network or some other type of network, such as dedicated access lines, plain ordinary telephone lines, satellite links, cellular data networks, combinations of these. The network 130 may include one or more radio frequency communication links, such as wireless communication links 112 and 118 with mobile devices 110 and on-board computers 114, respectively. Where the network 130 comprises the Internet, data communications may take place over the network 130 via an Internet communication protocol.

The back-end components 104 include one or more servers 140. Each server 140 may include one or more computer processors adapted and configured to execute various software applications and components of the autonomous vehicle data system 100, in addition to other software applications. The server 140 may further include a database 146, which may be adapted to store data related to the operation of the vehicle 108 and its autonomous operation features. Such data might include, for example, dates and times of vehicle use, duration of vehicle use, use and settings of autonomous operation features, information regarding control decisions or control commands generated by the autonomous operation features, speed of the vehicle 108, RPM or other tachometer readings of the vehicle 108, lateral and longitudinal acceleration of the vehicle 108, vehicle accidents, incidents or near collisions of the vehicle 108, hazardous or anomalous conditions within the vehicle operating environment (e.g., construction, accidents, etc.), communication between the autonomous operation features and external sources, environmental conditions of vehicle operation (e.g., weather, traffic, road condition, etc.), errors or failures of autonomous operation features, or other data relating to use of the vehicle 108 and the autonomous operation features, which may be uploaded to the server 140 via the network 130. Such data may also include user profiles for vehicle operators, vehicle owners, and/or other users. The user profile may include biographical data for the user, such as a name, address, phone number, etc. and identification information for the user, such as login information (e.g., a username and password), a user ID, an email address, a PIN number, a passcode, etc. The user profile also may include identification information for the vehicle 108 which is owned or rented by the user. Furthermore, the user profile may include a biometric fingerprint for the user, which may be the user's fingerprint, an image of the user's face, a retinal image for the user, a recording of the user's voice, and/or any other suitable identifier. The server 140 may access data stored in the database 146 when executing various functions and tasks associated with the evaluating feature effectiveness or assessing risk relating to an autonomous vehicle.

Although the autonomous vehicle data system 100 is shown to include one vehicle 108, one mobile device 110, one on-board computer 114, and one server 140, it should be understood that different numbers of vehicles 108, mobile devices 110, on-board computers 114, and/or servers 140 may be utilized. For example, the system 100 may include a plurality of servers 140 and hundreds or thousands of mobile devices 110 or on-board computers 114, all of which may be interconnected via the network 130. Furthermore, the database storage or processing performed by the one or more servers 140 may be distributed among a plurality of servers 140 in an arrangement known as “cloud computing.” This configuration may provide various advantages, such as enabling near real-time uploads and downloads of information as well as periodic uploads and downloads of information. This may in turn support a thin-client embodiment of the mobile device 110 or on-board computer 114 discussed herein.

The server 140 may have a controller 155 that is operatively connected to the database 146 via a link 156. It should be noted that, while not shown, additional databases may be linked to the controller 155 in a known manner. For example, separate databases may be used for various types of information, such as autonomous operation feature information, vehicle accidents, road conditions, vehicle insurance policy information, or vehicle use information. Additional databases (not shown) may be communicatively connected to the server 140 via the network 130, such as databases maintained by third parties (e.g., weather, construction, or road network databases). The controller 155 may include a program memory 160, a processor 162 (which may be called a microcontroller or a microprocessor), a random-access memory (RAM) 164, and an input/output (I/O) circuit 166, all of which may be interconnected via an address/data bus 165. It should be appreciated that although only one microprocessor 162 is shown, the controller 155 may include multiple microprocessors 162. Similarly, the memory of the controller 155 may include multiple RAMs 164 and multiple program memories 160. Although the I/O circuit 166 is shown as a single block, it should be appreciated that the I/O circuit 166 may include a number of different types of I/O circuits. The RAM 164 and program memories 160 may be implemented as semiconductor memories, magnetically readable memories, or optically readable memories, for example. The controller 155 may also be operatively connected to the network 130 via a link 135.

The server 140 may further include a number of software applications stored in a program memory 160. The various software applications on the server 140 may include an autonomous operation information monitoring application 141 for receiving information regarding the vehicle 108 and its autonomous operation features (which may include control commands or decisions of the autonomous operation features), a feature evaluation application 142 for determining the effectiveness of autonomous operation features under various conditions and/or determining operating condition of autonomous operation features or components, a real-time communication application 143 for communicating information regarding vehicle or environmental conditions between a plurality of vehicles, a navigation application 144 for assisting autonomous or semi-autonomous vehicle operation, and an accident detection application 145 for identifying accidents and providing assistance. The various software applications may be executed on the same computer processor or on different computer processors.

FIG. 1B illustrates a block diagram of an exemplary autonomous vehicle communication system 180 on which the exemplary methods described herein may be implemented. In one aspect, system 180 may include a network 130, N number of vehicles 182.1-182.N and respective mobile computing devices 184.1-184.N, one or several personal electronic devices (not shown), an external computing device 186, and/or a smart infrastructure component 188. In one aspect, mobile computing devices 184 may be an implementation of mobile computing device 110, while vehicles 182 may be an implementation of vehicle 108. The vehicles 182 may include a plurality of vehicles 108 having autonomous operation features, as well as a plurality of other vehicles not having autonomous operation features. As illustrated, the vehicle 182.1 may include a vehicle controller 181.1, which may be an on-board computer 114 as discussed elsewhere herein, while vehicle 182.2 may lack such a component. Each of vehicles 182.1 and 182.2 may be configured for wireless inter-vehicle communication, such as vehicle-to-vehicle (V2V) wireless communication and/or data transmission via the communication component 122, directly via the mobile computing devices 184, or otherwise. The personal electronic devices may include any type of electronic device that monitors conditions associated with an individual. For example, the personal electronic device may be a smart watch, a fitness tracker, a personal medical device (e.g., a pace maker, an insulin pump, etc.) and/or monitoring devices thereof, smart implants, and so on. The personal electronic device may monitor the conditions of the individual while the individual is present in one of the vehicles 182 and/or operating one of the vehicles 182 in a semi-autonomous mode.

Although system 180 is shown in FIG. 1A as including one network 130, two mobile computing devices 184.1 and 184.2, two vehicles 182.1 and 182.2, one external computing device 186, and/or one smart infrastructure component 188, various embodiments of system 180 may include any suitable number of networks 130, mobile computing devices 184, vehicles 182, external computing devices 186, and/or infrastructure components 188. The vehicles 182 included in such embodiments may include any number of vehicles 182.i having vehicle controllers 181.i (such as vehicle 182.1 with vehicle controller 181.1) and vehicles 182.j not having vehicles controllers (such as vehicle 182.2). Moreover, system 180 may include a plurality of external computing devices 186 and more than two mobile computing devices 184, any suitable number of which being interconnected directly to one another and/or via network 130.

In one aspect, each of mobile computing devices 184.1 and 184.2 may be configured to communicate with one another directly via peer-to-peer (P2P) wireless communication and/or data transfer. In other aspects, each of mobile computing devices 184.1 and 184.2 may be configured to communicate indirectly with one another and/or any suitable device via communications over network 130, such as external computing device 186 and/or smart infrastructure component 188, for example. In still other aspects, each of mobile computing devices 184.1 and 184.2 may be configured to communicate directly and/or indirectly with other suitable devices, which may include synchronous or asynchronous communication.

Each of mobile computing devices 184.1 and 184.2 and/or personal electronic devices may be configured to send data to and/or receive data from one another and/or via network 130 using one or more suitable communication protocols, which may be the same communication protocols or different communication protocols. For example, mobile computing devices 184.1 and 184.2 may be configured to communicate with one another via a direct radio link 183 a, which may utilize, for example, a Wi-Fi direct protocol, an ad-hoc cellular communication protocol, etc. Mobile computing devices 184.1 and 184.2 and/or personal electronic devices may also be configured to communicate with vehicles 182.1 and 182.2, respectively, utilizing a BLUETOOTH communication protocol (radio link not shown). In some embodiments, this may include communication between a mobile computing device 184.1 and a vehicle controller 181.1. In other embodiments, it may involve communication between a mobile computing device 184.2 and a vehicle telephony, entertainment, navigation, or information system (not shown) of the vehicle 182.2 that provides functionality other than autonomous (or semi-autonomous) vehicle control. Thus, vehicles 182.2 without autonomous operation features may nonetheless be connected to mobile computing devices 184.2 in order to facilitate communication, information presentation, or similar non-control operations (e.g., navigation display, hands-free telephony, or music selection and presentation).

To provide additional examples, mobile computing devices 184.1 and 184.2 and/or personal electronic devices may be configured to communicate with one another via radio links 183 b and 183 c by each communicating with network 130 utilizing a cellular communication protocol. As an additional example, mobile computing devices 184.1 and/or 184.2 may be configured to communicate with external computing device 186 via radio links 183 b, 183 c, and/or 183 e. Still further, one or more of mobile computing devices 184.1 and/or 184.2 and/or personal electronic devices may also be configured to communicate with one or more smart infrastructure components 188 directly (e.g., via radio link 183 d) and/or indirectly (e.g., via radio links 183 c and 183 f via network 130) using any suitable communication protocols. Similarly, one or more vehicle controllers 181.1 may be configured to communicate directly to the network 130 (via radio link 183 b) or indirectly through mobile computing device 184.1 (via radio link 183 b). Vehicle controllers 181.1 may also communicate with other vehicle controllers and/or mobile computing devices 184.2 directly or indirectly through mobile computing device 184.1 via local radio links 183 a. As discussed elsewhere herein, network 130 may be implemented as a wireless telephony network (e.g., GSM, CDMA, LTE, etc.), a Wi-Fi network (e.g., via one or more IEEE 802.11 Standards), a WiMAX network, a Bluetooth network, etc. Thus, links 183 a-183 f may represent wired links, wireless links, or any suitable combination thereof. For example, the links 183 e and/or 183 f may include wired links to the network 130, in addition to, or instead of, wireless radio connections.

In some embodiments, the external computing device 186 may mediate communication between the mobile computing devices 184.1 and 184.2 based upon location or other factors. In embodiments in which mobile computing devices 184.1 and 184.2 communicate directly with one another in a peer-to-peer fashion, network 130 may be bypassed and thus communications between mobile computing devices 184.1 and 184.2 and external computing device 186 may be unnecessary. For example, in some aspects, mobile computing device 184.1 may broadcast geographic location data and/or telematics data directly to mobile computing device 184.2. In this case, mobile computing device 184.2 may operate independently of network 130 to determine operating data, risks associated with operation, control actions to be taken, and/or alerts to be generated at mobile computing device 184.2 based upon the geographic location data, sensor data, and/or the autonomous operation feature data. In accordance with such aspects, network 130 and external computing device 186 may be omitted.

However, in other aspects, one or more of mobile computing devices 184.1 and/or 184.2 and/or personal electronic devices may work in conjunction with external computing device 186 to determine operating data, risks associated with operation, control actions to be taken, and/or alerts to be generated. For example, in some aspects, mobile computing device 184.1 may broadcast geographic location data and/or autonomous operation feature data, which is received by external computing device 186. In this case, external computing device 186 may be configured to determine whether the same or other information should be sent to mobile computing device 184.2 based upon the geographic location data, autonomous operation feature data, or data derived therefrom.

Mobile computing devices 184.1 and 184.2 may be configured to execute one or more algorithms, programs, applications, etc., to determine a geographic location of each respective mobile computing device (and thus their associated vehicle) to generate, measure, monitor, and/or collect one or more sensor metrics as telematics data, to broadcast the geographic data and/or telematics data via their respective radio links, to receive the geographic data and/or telematics data via their respective radio links, to determine whether an alert should be generated based upon the telematics data and/or the geographic location data, to generate the one or more alerts, and/or to broadcast one or more alert notifications. Such functionality may, in some embodiments be controlled in whole or part by a Data Application operating on the mobile computing devices 184, as discussed elsewhere herein. Such Data Application may communicate between the mobile computing devices 184 and one or more external computing devices 186 (such as servers 140) to facilitate centralized data collection and/or processing.

In some embodiments, the Data Application may facilitate control of a vehicle 182 by a user, such as by selecting vehicle destinations and/or routes along which the vehicle 182 will travel. The Data Application may further be used to establish restrictions on vehicle use or store user preferences for vehicle use, such as in a user profile. In further embodiments, the Data Application may monitor vehicle operation or sensor data in real-time to make recommendations or for other purposes as described herein. The Data Application may further facilitate monitoring and/or assessment of the vehicle 182, such as by evaluating operating data to determine the condition of the vehicle or components thereof (e.g., sensors, autonomous operation features, etc.).

External computing device 186 may be configured to execute various software applications, algorithms, and/or other suitable programs. External computing device 186 may be implemented as any suitable type of device to facilitate the functionality as described herein. For example, external computing device 186 may be a server 140 as discuses elsewhere herein. As another example, the external computing device 186 may be another computing device associated with an operator or owner of a vehicle 182, such as a desktop or notebook computer. Although illustrated as a single device in FIG. 1B, one or more portions of external computing device 186 may be implemented as one or more storage devices that are physically co-located with external computing device 186, or as one or more storage devices utilizing different storage locations as a shared database structure (e.g. cloud storage).

In some embodiments, external computing device 186 may be configured to perform any suitable portion of the processing functions remotely that have been outsourced by one or more of mobile computing devices 184.1 and/or 184.2 (and/or vehicle controllers 181.1). For example, mobile computing device 184.1 and/or 184.2 may collect data (e.g., geographic location data and/or telematics data) as described herein, but may send the data to external computing device 186 for remote processing instead of processing the data locally. In such embodiments, external computing device 186 may receive and process the data to determine whether an anomalous condition exists and, if so, whether to send an alert notification to one or more mobile computing devices 184.1 and 184.2 or take other actions.

In one aspect, external computing device 186 may additionally or alternatively be part of an insurer computing system (or facilitate communications with an insurer computer system), and as such may access insurer databases, execute algorithms, execute applications, access remote servers, communicate with remote processors, etc., as needed to perform insurance-related functions. Such insurance-related functions may include assisting insurance customers in evaluating autonomous operation features, limiting manual vehicle operation based upon risk levels, providing information regarding risk levels associated with autonomous and/or manual vehicle operation along routes, and/or determining repair/salvage information for damaged vehicles. For example, external computing device 186 may facilitate the receipt of autonomous operation or other data from one or more mobile computing devices 184.1-184.N, which may each be running a Data Application to obtain such data from autonomous operation features or sensors 120 associated therewith.

In aspects in which external computing device 186 facilitates communications with an insurer computing system (or is part of such a system), data received from one or more mobile computing devices 184.1-184.N may include user credentials (e.g., login information), which may be verified by external computing device 186 or one or more other external computing devices, servers, etc. These user credentials may be associated with an insurance profile, which may include, for example, insurance policy numbers, a description and/or listing of insured assets, vehicle identification numbers of insured vehicles, addresses of insured structures, contact information, premium rates, discounts, etc. In this way, data received from one or more mobile computing devices 184.1-184.N may allow external computing device 186 to uniquely identify each insured customer and/or whether each identified insurance customer has installed the Data Application. In addition, external computing device 186 may facilitate the communication of the updated insurance policies, premiums, rates, discounts, etc., to insurance customers for their review, modification, and/or approval—such as via wireless communication or data transmission to one or more mobile computing devices 184.1-184.N.

In some aspects, external computing device 186 may facilitate indirect communications between one or more of mobile computing devices 184, vehicles 182, and/or smart infrastructure component 188 via network 130 or another suitable communication network, wireless communication channel, and/or wireless link. For example, the mobile computing device 184 may communicate with the external computing device 186 to request transportation services from a starting location to a destination location for a user of the mobile computing device 184. The external computing device 186 may then communicate with the vehicles 182 to identify which vehicles are available for providing transportation services to the user and/or which vehicles are within a predetermined threshold distance of the user's starting location. Then the external computing device 186 may identify a vehicle 182 to respond to the request and navigate to the starting location.

Smart infrastructure components 188 may be implemented as any suitable type of traffic infrastructure components configured to receive communications from and/or to send communications to other devices, such as mobile computing devices 184 and/or external computing device 186. Thus, smart infrastructure components 188 may include infrastructure components 126 having infrastructure communication devices 124. For example, smart infrastructure component 188 may be implemented as a traffic light, a railroad crossing signal, a construction notification sign, a roadside display configured to display messages, a billboard display, a parking garage monitoring device, etc.

In some embodiments, the smart infrastructure component 188 may include or be communicatively connected to one or more sensors (not shown) for detecting information relating to the condition of the smart infrastructure component 188, which sensors may be connected to or part of the infrastructure communication device 124 of the smart infrastructure component 188. The sensors (not shown) may generate data relating to weather conditions, traffic conditions, or operating status of the smart infrastructure component 188. The smart infrastructure component 188 may be configured to receive the sensor data generated and determine a condition of the smart infrastructure component 188, such as weather conditions, road integrity, construction, traffic, available parking spaces, etc.

In some aspects, smart infrastructure component 188 may be configured to communicate with one or more other devices directly and/or indirectly. For example, smart infrastructure component 188 may be configured to communicate directly with mobile computing device 184.2 via radio link 183 d and/or with mobile computing device 184.1 via links 183 b and 183 f utilizing network 130. As another example, smart infrastructure component 188 may communicate with external computing device 186 via links 183 e and 183 f utilizing network 130. To provide some illustrative examples of the operation of the smart infrastructure component 188, if smart infrastructure component 188 is implemented as a smart traffic light, smart infrastructure component 188 may change a traffic light from green to red (or vice-versa) or adjust a timing cycle to favor traffic in one direction over another based upon data received from the vehicles 182. If smart infrastructure component 188 is implemented as a traffic sign display, smart infrastructure component 188 may display a warning message that an anomalous condition (e.g., an accident) has been detected ahead and/or on a specific road corresponding to the geographic location data.

FIG. 2 illustrates a block diagram of an exemplary mobile device 110 or an exemplary on-board computer 114 consistent with the system 100 and the system 180. The mobile device 110 or on-board computer 114 may include a display 202, a GPS unit 206, a communication unit 220, an accelerometer 224, one or more additional sensors (not shown), a user-input device (not shown), and/or, like the server 140, a controller 204. In some embodiments, the mobile device 110 and on-board computer 114 may be integrated into a single device, or either may perform the functions of both. The on-board computer 114 (or mobile device 110) interfaces with the sensors 120 and/or personal electronic devices to receive information regarding the vehicle 108 and its environment, which information is used by the autonomous operation features to operate the vehicle 108.

Similar to the controller 155, the controller 204 may include a program memory 208, one or more microcontrollers or microprocessors (MP) 210, a RAM 212, and an I/O circuit 216, all of which are interconnected via an address/data bus 214. The program memory 208 includes an operating system 226, a data storage 228, a plurality of software applications 230, and/or a plurality of software routines 240. The operating system 226, for example, may include one of a plurality of general purpose or mobile platforms, such as the Android™, iOS®, or Windows® systems, developed by Google Inc., Apple Inc., and Microsoft Corporation, respectively. Alternatively, the operating system 226 may be a custom operating system designed for autonomous vehicle operation using the on-board computer 114. The data storage 228 may include data such as user profiles and preferences, application data for the plurality of applications 230, routine data for the plurality of routines 240, and other data related to the autonomous operation features. In some embodiments, the controller 204 may also include, or otherwise be communicatively connected to, other data storage mechanisms (e.g., one or more hard disk drives, optical storage drives, solid state storage devices, etc.) that reside within the vehicle 108.

As discussed with reference to the controller 155, it should be appreciated that although FIG. 2 depicts only one microprocessor 210, the controller 204 may include multiple microprocessors 210. Similarly, the memory of the controller 204 may include multiple RAMs 212 and multiple program memories 208. Although FIG. 2 depicts the I/O circuit 216 as a single block, the I/O circuit 216 may include a number of different types of I/O circuits. The controller 204 may implement the RAMs 212 and the program memories 208 as semiconductor memories, magnetically readable memories, or optically readable memories, for example.

The one or more processors 210 may be adapted and configured to execute any of one or more of the plurality of software applications 230 or any one or more of the plurality of software routines 240 residing in the program memory 204, in addition to other software applications. One of the plurality of applications 230 may be an autonomous vehicle operation application 232 that may be implemented as a series of machine-readable instructions for performing the various tasks associated with implementing one or more of the autonomous operation features according to the autonomous vehicle operation method 300, described further below. Another of the plurality of applications 230 may be an autonomous communication application 234 that may be implemented as a series of machine-readable instructions for transmitting and receiving autonomous operation information to or from external sources via the communication module 220. Still another application of the plurality of applications 230 may include an autonomous operation monitoring application 236 that may be implemented as a series of machine-readable instructions for sending information regarding autonomous operation of the vehicle to the server 140 via the network 130. The Data Application for collecting, generating, processing, analyzing, transmitting, receiving, and/or acting upon autonomous operation feature data may also be stored as one of the plurality of applications 230 in the program memory 208 of the mobile computing device 110 or on-board computer 114, which may be executed by the one or more processors 210 thereof. Moreover, the Ride Sharing Application for requesting transportation services from one of the vehicles 182.1-182.N may be stored as one of the plurality of application 230 in the program memory 208 of the mobile computing device 110, which may be executed by the one or more processors 210.

The plurality of software applications 230 may call various of the plurality of software routines 240 to perform functions relating to autonomous vehicle operation, monitoring, or communication. One of the plurality of software routines 240 may be a configuration routine 242 to receive settings from the vehicle operator to configure the operating parameters of an autonomous operation feature. Another of the plurality of software routines 240 may be a sensor control routine 244 to transmit instructions to a sensor 120 and receive data from the sensor 120. Still another of the plurality of software routines 240 may be an autonomous control routine 246 that performs a type of autonomous control, such as collision avoidance, lane centering, or speed control. In some embodiments, the autonomous vehicle operation application 232 may cause a plurality of autonomous control routines 246 to determine control actions required for autonomous vehicle operation.

Similarly, one of the plurality of software routines 240 may be a monitoring and reporting routine 248 that transmits information regarding autonomous vehicle operation to the server 140 via the network 130. Yet another of the plurality of software routines 240 may be an autonomous communication routine 250 for receiving and transmitting information between the vehicle 108 and external sources to improve the effectiveness of the autonomous operation features. Any of the plurality of software applications 230 may be designed to operate independently of the software applications 230 or in conjunction with the software applications 230.

When implementing the exemplary autonomous vehicle operation method 300, the controller 204 of the on-board computer 114 may implement the autonomous vehicle operation application 232 to communicate with the sensors 120 to receive information regarding the vehicle 108 and its environment and process that information for autonomous operation of the vehicle 108. In some embodiments including external source communication via the communication component 122 or the communication unit 220, the controller 204 may further implement the autonomous communication application 234 to receive information for external sources, such as other autonomous vehicles, smart infrastructure (e.g., electronically communicating roadways, traffic signals, or parking structures), or other sources of relevant information (e.g., weather, traffic, local amenities). Some external sources of information may be connected to the controller 204 via the network 130, such as the server 140 or internet-connected third-party databases (not shown). Although the autonomous vehicle operation application 232 and the autonomous communication application 234 are shown as two separate applications, it should be understood that the functions of the autonomous operation features may be combined or separated into any number of the software applications 230 or the software routines 240.

When implementing the autonomous operation feature monitoring method 400, the controller 204 may further implement the autonomous operation monitoring application 236 to communicate with the server 140 to provide information regarding autonomous vehicle operation. This may include information regarding settings or configurations of autonomous operation features, data from the sensors 120 regarding the vehicle environment, data from the sensors 120 regarding the response of the vehicle 108 to its environment, communications sent or received using the communication component 122 or the communication unit 220, operating status of the autonomous vehicle operation application 232 and the autonomous communication application 234, and/or control commands sent from the on-board computer 114 to the control components (not shown) to operate the vehicle 108. In some embodiments, control commands generated by the on-board computer 114 but not implemented may also be recorded and/or transmitted for analysis of how the autonomous operation features would have responded to conditions if the features had been controlling the relevant aspect or aspects of vehicle operation. The information may be received and stored by the server 140 implementing the autonomous operation information monitoring application 141, and the server 140 may then determine the effectiveness of autonomous operation under various conditions by implementing the feature evaluation application 142, which may include an assessment of autonomous operation features compatibility. The effectiveness of autonomous operation features and the extent of their use may be further used to determine one or more risk levels associated with operation of the autonomous vehicle by the server 140.

In addition to connections to the sensors 120 that are external to the mobile device 110 or the on-board computer 114, the mobile device 110 or the on-board computer 114 may include additional sensors 120, such as the GPS unit 206 or the accelerometer 224, which may provide information regarding the vehicle 108 for autonomous operation and other purposes. Such sensors 120 may further include one or more sensors of a sensor array 225, which may include, for example, one or more cameras, accelerometers, gyroscopes, magnetometers, barometers, thermometers, proximity sensors, light sensors, Hall Effect sensors, etc. The one or more sensors of the sensor array 225 may be positioned to determine telematics data regarding the speed, force, heading, and/or direction associated with movements of the vehicle 108. Furthermore, the communication unit 220 may communicate with other autonomous vehicles, infrastructure, or other external sources of information to transmit and receive information relating to autonomous vehicle operation. The communication unit 220 may communicate with the external sources via the network 130 or via any suitable wireless communication protocol network, such as wireless telephony (e.g., GSM, CDMA, LTE, etc.), Wi-Fi (802.11 standards), WiMAX, Bluetooth, infrared or radio frequency communication, etc. Furthermore, the communication unit 220 may provide input signals to the controller 204 via the I/O circuit 216. The communication unit 220 may also transmit sensor data, device status information, control signals, or other output from the controller 204 to one or more external sensors within the vehicle 108, mobile devices 110, on-board computers 114, or servers 140.

The mobile device 110 or the on-board computer 114 may include a user-input device (not shown) for receiving instructions or information from the vehicle operator, such as settings relating to an autonomous operation feature. The user-input device (not shown) may include a “soft” keyboard that is displayed on the display 202, an external hardware keyboard communicating via a wired or a wireless connection (e.g., a Bluetooth keyboard), an external mouse, a microphone, or any other suitable user-input device. The user-input device (not shown) may also include a microphone capable of receiving user voice input.

Data Application

The mobile device 110 and/or on-board computer 114 may run a Data Application to collect, transmit, receive, and/or process autonomous operation feature data. Such autonomous operation feature data may include data directly generated by autonomous operation features, such as control commands used in operating the vehicle 108. Similarly, such autonomous operation feature data may include shadow control commands generated by the autonomous operation features but not actually used in operating the vehicle, such as may be generated when the autonomous operation features are disabled. The autonomous operation feature data may further include non-control data generated by the autonomous operation features, such as determinations regarding environmental conditions in the vehicle operating environment in which the vehicle 108 operates (e.g., traffic conditions, construction locations, pothole locations, worn lane markings, corners with obstructed views, etc.). The autonomous operation feature data may yet further include sensor data generated by (or derived from sensor data generated by) sensors 120 utilized by the autonomous operation features. For example, data from LIDAR and ultrasonic sensors may be used by vehicles for autonomous operation. Such data captures a much more detailed and complete representation of the conditions in which the vehicle 108 operates than traditional vehicle operation metrics (e.g., miles driven) or non-autonomous telematics data (e.g., acceleration, position, and time).

Autonomous operation feature data may be processed and used by the Data Application to determine information regarding the vehicle 108, its operation, or its operating environment. The autonomous operation feature data may further be communicated by the Data Application to a server 140 via network 130 for processing and/or storage. In some embodiments, the autonomous operation feature data (or information derived therefrom) may be transmitted directly via radio links 183 or indirectly via network 130 from the vehicle 108 to other vehicles (or to mobile devices 110). By communicating information associated with the autonomous operation feature data to other nearby vehicles, the other vehicles or their operators may make use of such data for routing, control, or other purposes. This may be particularly valuable in providing detailed information regarding a vehicle environment (e.g., traffic, accidents, flooding, ice, etc.) collected by a Data Application of an autonomous vehicle 108 to a driver of a non-autonomous vehicle via a Data Application of a mobile device 110 associated with the driver. For example, ice patches may be identified by an autonomous operation feature of a vehicle controller 181.1 of vehicle 182.1 and transmitted via the Data Application operating in the mobile computing device 184.1 over the network 130 to the mobile computing device 184.2, where a warning regarding the ice patches may be presented to the driver of vehicle 182.2. As another example, locations of emergency vehicles or accidents may be determined and communicated between vehicles 182, such as between an autonomous vehicle 182.1 and a traditional (non-autonomous) vehicle 182.2.

In further embodiments, a Data Application may serve as an interface between the user and an autonomous vehicle 108, via the user's mobile device 110 and/or the vehicle's on-board computer 114. The user may interact with the Data Application to locate, retrieve, park, control, or monitor the vehicle 108. For example, the Data Application may be used to select a destination location and route the vehicle 108 to the destination location, which may include controlling the vehicle to travel to the destination location in a fully autonomous mode. In some embodiments, the Data Application may further determine and/or provide information regarding the vehicle 108, such as the operating status or condition of autonomous operation features, sensors, or other vehicle components (e.g., tire pressure). In yet further embodiments, the Data Application may be configured to assess risk levels associated with vehicle operation based upon location, autonomous operation feature use (including settings), operating conditions, or other factors. Such risk assessment may be further used in recommending autonomous feature use levels, generating warnings to a vehicle operator, or adjusting an insurance policy associated with the vehicle 108.

Data Applications may be installed and running on a plurality of mobile devices 110 and/or on-board computers 114 in order to facilitate data sharing and other functions as described herein. Additionally, such Data Applications may provide data to, and receive data from, one or more servers 140. For example, a Data Application running on a user's mobile device 110 may communicate location data to a server 140 via the network 130. The server 140 may then process the data to determine a route, risk level, recommendation, or other action. The server 140 may then communicate the determined information to the mobile device 110 and/or on-board computer 114, which may cause the vehicle 108 to operate in accordance with the determined information (e.g., travel along a determined optimal route). Thus, the Data Application may facilitate data communication between the front-end components 102 and the back-end components 104, allowing more efficient processing and data storage.

Ride Sharing Application

The mobile device 110 may also run a Ride Sharing Application for requesting transportation services from a vehicle 182.1-182.N. A mobile device user may own or jointly own one of the vehicles 182.1. Accordingly, the Ride Sharing Application may be used to communicate via the network 130 with the vehicle 182.1 to direct the vehicle 182.1 to pick the user up from the user's current location (or another starting location) and to navigate to a destination location. In other scenarios, the mobile device user may not own any of the vehicles 182.1-182.N, but may be renting one of the vehicles 182.1 via a daily, weekly, or monthly subscription and/or may request one time transportation services to a particular destination location. The mobile device user may also rent from a pool of vehicles 182.1-182.5, where any of the pool of vehicles 182.1-182.5 may pick the user up depending upon availability. For example, five users may each rent the same pool of three vehicles. Each time one of the users requests a ride, a different one of the three vehicles may pick the user up based upon availability of the three vehicles. Accordingly, the Ride Sharing Application may be used to communicate via the network 130 with several vehicles 182.1-182.N and/or with the external communicating device 186 to identify a vehicle 182.1 which is available for providing transportation services and/or is within a predetermined threshold distance of the user's current location or other starting location.

In any event, the Ride Sharing Application may include a login screen for entering user login information, such as a username and password, a user ID, a PIN number, a passcode, an email address and/or any other suitable information to uniquely identify the user. In some embodiments, the Ride Sharing Application may transmit the user login information to the server 140 or other external computing device 186, which may in turn compare the user login information to several sets of user login information in the database 146. When there is a match, the server 140 may transmit a corresponding user profile for the user to the mobile device 110.

Upon successfully logging in, the Ride Sharing Application may present a map display on the mobile device 110 for selecting a starting location and a destination location. The Ride Sharing Application may automatically suggest a starting location at the user's current location, for example via the GPS 206. However, the user may adjust the starting location to a different location by for example, dragging a pin, touch-selecting a location on the map display and/or entering a location in a text field. The user may also select the destination location by touch-selecting a location on the map display and/or entering a location in a text field. Once the starting location and destination location are selected, the user may select an option to request transportation services.

In some embodiments, the Ride Sharing Application may transmit user profile data to the server 140 or other the external computing device 186 along with the starting location and/or the request for transportation services. Based upon the user profile data and/or the starting location, the server 140 or other external computing device 186 may identify one of the vehicle 182.1-182.N for providing transportation services for the user. For example, the user profile data may include an indication of a particular vehicle 182.1 which is owner or jointly owned by the user. The indication may be identification information for the vehicle 182.1 such as a make, model, and/or year of the vehicle, a license plate number for the vehicle, a vehicle identification number (VIN) for the vehicle, and/or any other suitable identification information. Then the server 140 or other external computing device 186 may transmit a request for the particular vehicle 182.1 to pick up the user at the starting location.

In another example, the user profile data may include an indication of a vehicle 182.1 or a set of vehicles 182.1-182.5 which are being rented by the user. Accordingly, the server 140 or other external computing device 186 may select a vehicle in the set of vehicles 182.1-182.5 to pick up the user at the starting location. In some embodiments, the server 140 or other external computing device 186 may transmit a communication to each of the vehicles 182.1-182.5 in the set to determine which vehicles are currently not in use and/or the current locations of each of the vehicles 182.1-182.5. Then the server 140 or other external computing device 186 may select the vehicle which is not in use, which is closest to the starting location for the user, which is currently on a route that is within a threshold distance of the starting location, and/or via any suitable combination of these characteristics. In other embodiments, the vehicle may be selected from the set of vehicles 182.1-182.5 in any other suitable manner. In yet another example, the user profile data may not include any indications of vehicles owned or rented by the user. Accordingly, the server 140 or other external computing device 186 may select any of the vehicles 182.1-182.N to pick up the user at the starting location. The server 140 or other external computing device 186 may select one of the vehicles 182.1-182.N in a similar manner as mentioned above for the set of vehicles rented by the user.

In some embodiments, the Ride Sharing Application may also present a biometric fingerprint capture screen on the mobile device 110 for capturing a biometric fingerprint for the user. The biometric fingerprint capture screen may include user controls for entering a biometric fingerprint. For example, the biometric fingerprint capture screen may include a user control, such as a button for capturing an image of the user's face and/or retina and/or a user control for recording the user's voice. Additionally, the biometric fingerprint capture screen may include a user control in communication with a capacitive touch sensor for capturing the user's fingerprint, for example, when the user's finger makes contact with the capacitive touch sensor.

The Ride Sharing Application may then transmit the biometric fingerprint to the server 140 or other external computing device 186, so that the biometric fingerprint may be stored with the user's profile and retrieved at some other time. In some embodiments, the Ride Sharing Application may collect several biometric fingerprints for the user. In this manner, multiple biometric fingerprints may be used to identify a person approaching the vehicle 182 for additional security measures. Moreover, when a first type of biometric identifier cannot be captured at the mobile device (e.g., the camera or capacitive touch sensor is malfunctioning), a second type of biometric identifier may be compared with another biometric fingerprint.

In any event, when the user requests transportation services via the Ride Sharing Application, the Ride Sharing Application may transmit user profile data to the server 140 or other the external computing device 186 including the biometric fingerprint. When the server 140 or other external computing device 186 selects a vehicle 182 for transporting the user, the biometric fingerprint may be transmitted to the vehicle 182.

Then when the vehicle 182 arrives at the starting location, the sensors 120 for the vehicle 182 may detect a biometric identifier for a person approaching the vehicle. For example, the vehicle 182 may request that the person allows the vehicle 182 to capture a facial image, a retinal image, a fingerprint, a voice recording, etc. before entering the vehicle 182. If the person provides permission to detect a biometric identifier, the vehicle 182 may detect and/or compare the biometric identifier to the biometric fingerprint for the user. When there is a match, the vehicle 182 may determine that the person is the user. As a result, the vehicle 182 may allow the user to enter the vehicle and/or may begin navigating to the destination location. On the other hand, when there is no match the vehicle 182 may request that the person allows the vehicle 182 to capture another biometric identifier (e.g., if the fingerprint didn't match, the vehicle 182 may capture a facial image). If none of the biometric identifiers match with a corresponding biometric fingerprint for the user, the vehicle 182 may deny entry and/or may not navigate to the destination location.

Exemplary Autonomous Vehicle Operation Method

FIG. 3 illustrates a flow diagram of an exemplary autonomous vehicle operation method 300, which may be implemented by the autonomous vehicle data system 100. The method 300 may begin when the controller 204 receives a start signal (block 302). The start signal may be a command from the vehicle operator through the user-input device to enable or engage one or more autonomous operation features of the vehicle 108. In some embodiments, the vehicle operator 108 may further specify settings or configuration details for the autonomous operation features. For fully autonomous vehicles, the settings may relate to one or more destinations, route preferences, fuel efficiency preferences, speed preferences, or other configurable settings relating to the operation of the vehicle 108. In some embodiments, fully autonomous vehicles may include additional features or settings permitting them to operate without passengers or vehicle operators within the vehicle. For example, a fully autonomous vehicle may receive an instruction to find a parking space within the general vicinity, which the vehicle may do without the vehicle operator. The vehicle may then be returned to a selected location by a request from the vehicle operator via a mobile device 110 or otherwise. This feature may further be adapted to return a fully autonomous vehicle if lost or stolen.

For other autonomous vehicles, the settings may include enabling or disabling particular autonomous operation features, specifying thresholds for autonomous operation, specifying warnings or other information to be presented to the vehicle operator, specifying autonomous communication types to send or receive, specifying conditions under which to enable or disable autonomous operation features, or specifying other constraints on feature operation. For example, a vehicle operator may set the maximum speed for an adaptive cruise control feature with automatic lane centering. In some embodiments, the settings may further include a specification of whether the vehicle 108 should be operating as a fully or partially autonomous vehicle.

In embodiments where only one autonomous operation feature is enabled, the start signal may consist of a request to perform a particular task (e.g., autonomous parking) or to enable a particular feature (e.g., autonomous braking for collision avoidance). In other embodiments, the start signal may be generated automatically by the controller 204 based upon predetermined settings (e.g., when the vehicle 108 exceeds a certain speed or is operating in low-light conditions). In some embodiments, the controller 204 may generate a start signal when communication from an external source is received (e.g., when the vehicle 108 is on a smart highway or near another autonomous vehicle). In some embodiments, the start signal may be generated by or received by the Data Application running on a mobile device 110 or on-board computer 114 within the vehicle 108. The Data Application may further set or record settings for one or more autonomous operation features of the vehicle 108.

After receiving the start signal at block 302, the controller 204 receives sensor data from the sensors 120 during vehicle operation (block 304). In some embodiments, the controller 204 may also receive information from external sources through the communication component 122 or the communication unit 220. The sensor data may be stored in the RAM 212 for use by the autonomous vehicle operation application 232. In some embodiments, the sensor data may be recorded in the data storage 228 or transmitted to the server 140 via the network 130. The Data Application may receive the sensor data, or a portion thereof, and store or transmit the received sensor data. In some embodiments, the Data Application may process or determine summary information from the sensor data before storing or transmitting the summary information. The sensor data may alternately either be received by the controller 204 as raw data measurements from one of the sensors 120 or may be preprocessed by the sensor 120 prior to being received by the controller 204. For example, a tachometer reading may be received as raw data or may be preprocessed to indicate vehicle movement or position. As another example, a sensor 120 comprising a radar or LIDAR unit may include a processor to preprocess the measured signals and send data representing detected objects in 3-dimensional space to the controller 204.

The autonomous vehicle operation application 232 or other applications 230 or routines 240 may cause the controller 204 to process the received sensor data in accordance with the autonomous operation features (block 306). The controller 204 may process the sensor data to determine whether an autonomous control action is required or to determine adjustments to the controls of the vehicle 108 (i.e., control commands). For example, the controller 204 may receive sensor data indicating a decreasing distance to a nearby object in the vehicle's path and process the received sensor data to determine whether to begin braking (and, if so, how abruptly to slow the vehicle 108). As another example, the controller 204 may process the sensor data to determine whether the vehicle 108 is remaining with its intended path (e.g., within lanes on a roadway). If the vehicle 108 is beginning to drift or slide (e.g., as on ice or water), the controller 204 may determine appropriate adjustments to the controls of the vehicle to maintain the desired bearing. If the vehicle 108 is moving within the desired path, the controller 204 may nonetheless determine whether adjustments are required to continue following the desired route (e.g., following a winding road). Under some conditions, the controller 204 may determine to maintain the controls based upon the sensor data (e.g., when holding a steady speed on a straight road).

In some embodiments, the Data Application may record information related to the processed sensor data, including whether the autonomous operation features have determined one or more control actions to control the vehicle and/or details regarding such control actions. The Data Application may record such information even when no control actions are determined to be necessary or where such control actions are not implemented. Such information may include information regarding the vehicle operating environment determined from the processed sensor data (e.g., construction, other vehicles, pedestrians, anomalous environmental conditions, etc.). The information collected by the Data Application may further include an indication of whether and/or how the control actions are implemented using control components of the vehicle 108.

When the controller 204 determines an autonomous control action is required (block 308), the controller 204 may cause the control components of the vehicle 108 to adjust the operating controls of the vehicle to achieve desired operation (block 310). For example, the controller 204 may send a signal to open or close the throttle of the vehicle 108 to achieve a desired speed. Alternatively, the controller 204 may control the steering of the vehicle 108 to adjust the direction of movement. In some embodiments, the vehicle 108 may transmit a message or indication of a change in velocity or position using the communication component 122 or the communication module 220, which signal may be used by other autonomous vehicles to adjust their controls. As discussed elsewhere herein, the controller 204 may also log or transmit the autonomous control actions to the server 140 via the network 130 for analysis. In some embodiments, an application (which may be a Data Application) executed by the controller 204 may communicate data to the server 140 via the network 130 or may communicate such data to the mobile device 110 for further processing, storage, transmission to nearby vehicles or infrastructure, and/or communication to the server 140 via network 130.

The controller 204 may continue to receive and process sensor data at blocks 304 and 306 until an end signal is received by the controller 204 (block 312). The end signal may be automatically generated by the controller 204 upon the occurrence of certain criteria (e.g., the destination is reached or environmental conditions require manual operation of the vehicle 108 by the vehicle operator). Alternatively, the vehicle operator may pause, terminate, or disable the autonomous operation feature or features using the user-input device or by manually operating the vehicle's controls, such as by depressing a pedal or turning a steering instrument. When the autonomous operation features are disabled or terminated, the controller 204 may either continue vehicle operation without the autonomous features or may shut off the vehicle 108, depending upon the circumstances.

Where control of the vehicle 108 must be returned to the vehicle operator, the controller 204 may alert the vehicle operator in advance of returning to manual operation. The alert may include a visual, audio, or other indication to obtain the attention of the vehicle operator. In some embodiments, the controller 204 may further determine whether the vehicle operator is capable of resuming manual operation before terminating autonomous operation. If the vehicle operator is determined not to be capable of resuming operation, the controller 204 may cause the vehicle to stop or take other appropriate action.

To control the vehicle 108, the autonomous operation features may generate and implement control decisions relating to the control of the motive, steering, and stopping components of the vehicle 108. The control decisions may include or be related to control commands issued by the autonomous operation features to control such control components of the vehicle 108 during operation. In some embodiments, control decisions may include decisions determined by the autonomous operation features regarding control commands such feature would have issued under the conditions then occurring, but which control commands were not issued or implemented. For example, an autonomous operation feature may generate and record shadow control decisions it would have implemented if engaged to operate the vehicle 108 even when the feature is disengaged (or engaged using other settings from those that would produce the shadow control decisions).

Data regarding the control decisions actually implemented and/or the shadow control decisions not implemented to control the vehicle 108 may be recorded for use in assessing autonomous operation feature effectiveness, accident reconstruction and fault determination, feature use or settings recommendations, risk determination and insurance policy adjustments, or other purposes as described elsewhere herein. For example, actual control decisions may be compared against control decisions that would have been made by other systems, software versions, or with additional sensor data or communication data.

As used herein, the terms “preferred” or “preferably made” control decisions mean control decisions that optimize some metric associated with risk under relevant conditions. Such metric may include, among other things, a statistical correlation with one or more risks (e.g., risks related to a vehicle collision) or an expected value associated with risks (e.g., a risk-weighted expected loss associated with potential vehicle accidents). The preferably made, or preferred or recommended, control decisions discussed herein may include control decisions or control decision outcomes that are less risky, have lower risk or the lowest risk of all the possible or potential control decisions given various operating conditions, and/or are otherwise ideal, recommended, or preferred based upon various operating conditions, including autonomous system or feature capability; current road, environmental or weather, traffic, or construction conditions through which the vehicle is traveling; and/or current versions of autonomous system software or components that the autonomous vehicle is equipped with and using.

The preferred or recommended control decisions may result in the lowest level of potential or actual risk of all the potential or possible control decisions given a set of various operating conditions and/or system features or capabilities. Alternatively, the preferred or recommended control decisions may result in a lower level of potential or actual risk (for a given set of operating conditions) to the autonomous vehicle and passengers, and other people or vehicles, than some of the other potential or possible control decisions that could have been made by the autonomous system or feature.

Exemplary Monitoring Method

FIG. 4A is a flow diagram depicting an exemplary autonomous vehicle operation monitoring method 400, which may be implemented by the autonomous vehicle data system 100. The method 400 monitors the operation of the vehicle 108 and transmits information regarding the vehicle 108 to the server 140, which information may then be used to determine autonomous operation feature usage or effectiveness. The method 400 may be used for monitoring the state of the vehicle 108, for providing data to other vehicles 182, for responding to emergencies or unusual situations during vehicle use, for testing autonomous operation features in a controlled environment, for determining actual feature use during vehicle operation outside a test environment, for assessment of feature operation, and/or for other purposes described herein. In alternative embodiments, the method 400 may be implemented whenever the vehicle 108 is in operation (manual or autonomous) or only when the autonomous operation features are enabled. The method 400 may likewise be implemented as either a real-time process, in which information regarding the vehicle 108 is communicated to the server 140 while monitoring is ongoing, or as a periodic process, in which the information is stored within the vehicle 108 and communicated to the server 140 at intervals (e.g., upon completion of a trip or when an incident occurs). In some embodiments, the method 400 may communicate with the server 140 in real-time when certain conditions exist (e.g., when a sufficient data connection through the network 130 exists or when no roaming charges would be incurred). In further embodiments, a Data Application executed by the mobile device 110 and/or on-board computer 114 may perform such monitoring, recording, and/or communication functions, including any of the functions described below with respect to blocks 402-434.

The method 400 may begin when the controller 204 receives an indication of vehicle operation (block 402). The indication may be generated when the vehicle 108 is started or when an autonomous operation feature is enabled by the controller 204 or by input from the vehicle operator, as discussed above. In response to receiving the indication, the controller 204 may create a timestamp (block 404). The timestamp may include information regarding the date, time, location, vehicle environment, vehicle condition, and autonomous operation feature settings or configuration information. The date and time may be used to identify one vehicle trip or one period of autonomous operation feature use, in addition to indicating risk levels due to traffic or other factors. The additional location and environmental data may include information regarding the position of the vehicle 108 from the GPS unit 206 and its surrounding environment (e.g., road conditions, weather conditions, nearby traffic conditions, type of road, construction conditions, presence of pedestrians, presence of other obstacles, availability of autonomous communications from external sources, etc.). Vehicle condition information may include information regarding the type, make, and model of the vehicle 108, the age or mileage of the vehicle 108, the status of vehicle equipment (e.g., tire pressure, non-functioning lights, fluid levels, etc.), or other information relating to the vehicle 108. In some embodiments, vehicle condition information may further include information regarding the sensors 120, such as type, configuration, or operational status (which may be determined, for example, from analysis of actual or test data from the sensors). In some embodiments, the timestamp may be recorded on the client device 114, the mobile device 110, or the server 140.

The autonomous operation feature settings may correspond to information regarding the autonomous operation features, such as those described above with reference to the autonomous vehicle operation method 300. The autonomous operation feature configuration information may correspond to information regarding the number and type of the sensors 120 (which may include indications of manufacturers and models of the sensors 120), the disposition of the sensors 120 within the vehicle 108 (which may include disposition of sensors 120 within one or more mobile devices 110), the one or more autonomous operation features (e.g., the autonomous vehicle operation application 232 or the software routines 240), autonomous operation feature control software, versions of the software applications 230 or routines 240 implementing the autonomous operation features, or other related information regarding the autonomous operation features.

For example, the configuration information may include the make and model of the vehicle 108 (indicating installed sensors 120 and the type of on-board computer 114), an indication of a malfunctioning or obscured sensor 120 in part of the vehicle 108, information regarding additional after-market sensors 120 installed within the vehicle 108, a software program type and version for a control program installed as an application 230 on the on-board computer 114, and software program types and versions for each of a plurality of autonomous operation features installed as applications 230 or routines 240 in the program memory 208 of the on-board computer 114.

During operation, the sensors 120 and/or personal electronic devices may generate sensor data regarding the vehicle 108 and its environment, which may include other vehicles 182 within the operating environment of the vehicle 108. In some embodiments, one or more of the sensors 120 and/or personal electronic devices may preprocess the measurements and communicate the resulting processed data to the on-board computer 114 and/or the mobile device 110. The controller 204 may receive sensor data from the sensors 120 and/or personal electronic devices (block 406). The sensor data may include information regarding the vehicle's position, speed, acceleration, direction, and responsiveness to controls. The sensor data may further include information regarding the location and movement of obstacles or obstructions (e.g., other vehicles, buildings, barriers, pedestrians, animals, trees, or gates), weather conditions (e.g., precipitation, wind, visibility, or temperature), road conditions (e.g., lane markings, potholes, road material, traction, or slope), signs or signals (e.g., traffic signals, construction signs, building signs or numbers, or control gates), or other information relating to the vehicle's environment. In some embodiments, sensors 120 may indicate the number of passengers within the vehicle 108, including an indication of whether the vehicle is entirely empty.

In addition to receiving sensor data from the sensors 120, in some embodiments the controller 204 may receive autonomous communication data from the communication component 122 or the communication module 220 (block 408). The communication data may include information from other autonomous vehicles (e.g., sudden changes to vehicle speed or direction, intended vehicle paths, hard braking, vehicle failures, collisions, or maneuvering or stopping capabilities), infrastructure (road or lane boundaries, bridges, traffic signals, control gates, or emergency stopping areas), or other external sources (e.g., map databases, weather databases, or traffic and accident databases). In some embodiments, the communication data may include data from non-autonomous vehicles, which may include data regarding vehicle operation or anomalies within the operating environment determined by a Data Application operating on a mobile device 110 or on-board computer 114. The communication data may be combined with the received sensor data received to obtain a more robust understanding of the vehicle environment. For example, the server 140 or the controller 204 may combine sensor data indicating frequent changes in speed relative to tachometric data with map data relating to a road upon which the vehicle 108 is traveling to determine that the vehicle 108 is in an area of hilly terrain. As another example, weather data indicating recent snowfall in the vicinity of the vehicle 108 may be combined with sensor data indicating frequent slipping or low traction to determine that the vehicle 108 is traveling on a snow-covered or icy road.

The controller 204 may process the sensor data, the communication data, and the settings or configuration information to determine whether an incident has occurred (block 410). As used herein, an “incident” is an occurrence during operation of an autonomous vehicle outside of normal safe operating conditions, such that one or more of the following occurs: (i) there is an interruption of ordinary vehicle operation, (ii) there is damage to the vehicle or other property, (iii) there is injury to a person, (iv) the conditions require action to be taken by a vehicle operator, autonomous operation feature, pedestrian, or other party to avoid damage or injury, and/or (v) an anomalous condition is detected that requires an adjustment outside of ordinary vehicle operation. Incidents may include collisions, hard braking, hard acceleration, evasive maneuvering, loss of traction, detection of objects within a threshold distance from the vehicle 108, alerts presented to the vehicle operator, component failure, inconsistent readings from sensors 120, or attempted unauthorized access to the on-board computer by external sources. Incidents may also include accidents, vehicle breakdowns, flat tires, empty fuel tanks, or medical emergencies. Incidents may further include identification of construction requiring the vehicle to detour or stop, hazardous conditions (e.g., fog or road ice), or other anomalous environmental conditions.

In some embodiments, the controller 204 may anticipate or project an expected incident based upon sensor or external data, allowing the controller 204 to send control signals to minimize the negative effects of the incident. For example, the controller 204 may cause the vehicle 108 to slow and move to the shoulder of a road immediately before running out of fuel. As another example, adjustable seats within the vehicle 108 may be adjusted to better position vehicle occupants in anticipation of a collision, windows may be opened or closed, or airbags may be deployed.

When an incident is determined to have occurred (block 412), information regarding the incident and the vehicle status may be recorded (block 414), either in the data storage 228 or the database 146. The information recorded may include sensor data, communication data, and settings or configuration information prior to, during, and immediately following the incident. In some embodiments, a preliminary determination of fault may also be produced and stored. The information may further include a determination of whether the vehicle 108 has continued operating (either autonomously or manually) or whether the vehicle 108 is capable of continuing to operate in compliance with applicable safety and legal requirements. If the controller 204 determines that the vehicle 108 has discontinued operation or is unable to continue operation (block 416), the method 400 may terminate. If the vehicle 108 continues operation, then the method 400 may continue as described below with reference to block 418.

FIG. 4B illustrates an alternative portion of the method 400 following an incident. When an incident is determined to have occurred (block 412), the controller 204 or the server 140 may record status and operating information (block 414), as above. In some instances, the incident may interrupt communication between the vehicle 108 and the server 140 via network 130, such that not all information typically recorded will be available for recordation and analysis by the server 140. Based upon the recorded data, the server 140 or the controller 204 may determine whether assistance may be needed at the location of the vehicle 108 (block 430). For example, the controller may determine that a head-on collision has occurred based upon sensor data (e.g., airbag deployment, automatic motor shut-off, LIDAR data indicating a collision, etc.) and may further determine based upon information regarding the speed of the vehicle 108 and other information that medical, police, and/or towing services will be necessary. The determination that assistance is needed may further include a determination of types of assistance needed (e.g., police, ambulance, fire, towing, vehicle maintenance, fuel delivery, etc.). This determination may include analysis of the type of incident, the sensor data regarding the incident (e.g., images from outward facing or inward facing cameras installed within the vehicle, identification of whether any passengers were present within the vehicle, determination of whether any pedestrians or passengers in other vehicles were involved in the incident, etc.). The determination of whether assistance is needed may further include information regarding the determined status of the vehicle 108.

In some embodiments, the determination regarding whether assistance is needed may be supplemented by a verification attempt, such as a phone call or communication through the on-board computer 114. Where the verification attempt indicates assistance is required or communication attempts fail, the server 140 or controller 204 would then determine that assistance is needed, as described above. For example, when assistance is determined to be needed following an accident involving the vehicle 108, the server 140 may direct an automatic telephone call to a mobile telephone number associated with the vehicle 108 or the vehicle operator. If no response is received, or if the respondent indicates assistance is required, the server 140 may proceed to cause a request for assistance to be generated.

When assistance is determined to be needed (block 432), the controller 204 or the server 140 may send a request for assistance (block 434). The request may include information regarding the vehicle 108, such as the vehicle's location, the type of assistance required, other vehicles involved in the incident, pedestrians involved in the incident, vehicle operators or passengers involved in the incident, and/or other relevant information. The request for assistance may include telephonic, data, or other requests to one or more emergency or vehicular service providers (e.g., local police, fire departments, state highway patrols, emergency medical services, public or private ambulance services, hospitals, towing companies, roadside assistance services, vehicle rental services, local claims representative offices, etc.). After sending a request for assistance (block 434) or when assistance is determined not to be needed (block 432), the controller 204 or the server 140 may next determine whether the vehicle is operational (block 416), as described above. The method 400 may then end or continue as indicated in FIG. 4A.

In some embodiments, the controller 204 may further determine information regarding the likely cause of a collision or other incident. Alternatively, or additionally, the server 140 may receive information regarding an incident from the on-board computer 114 and determine relevant additional information regarding the incident from the sensor data. For example, the sensor data may be used to determine the points of impact on the vehicle 108 and another vehicle involved in a collision, the relative velocities of each vehicle, the road conditions at the time of the incident, and the likely cause or the party likely at fault. This information may be used to determine risk levels associated with autonomous vehicle operation, as described below, even where the incident is not reported to the insurer.

The controller 204 may determine whether a change or adjustment to one or more of the settings or configuration of the autonomous operation features has occurred (block 418). Changes to the settings may include enabling or disabling an autonomous operation feature or adjusting the feature's parameters (e.g., resetting the speed on an adaptive cruise control feature). For example, a vehicle operator may selectively enable or disable autonomous operation features such as automatic braking, lane centering, or even fully autonomous operation at different times. If the settings or configuration are determined to have changed, the new settings or configuration may be recorded (block 422), either in the data storage 228 or the database 146. For example, the Data Application may log autonomous operation feature use and changes in a log file, including timestamps associated with the features in use.

Next, the controller 204 may record the operating data relating to the vehicle 108 in the data storage 228 or communicate the operating data to the server 140 via the network 130 for recordation in the database 146 (block 424). The operating data may include the settings or configuration information, the sensor data, and/or the communication data discussed above. In some embodiments, operating data related to normal autonomous operation of the vehicle 108 may be recorded. In other embodiments, only operating data related to incidents of interest may be recorded, and operating data related to normal operation may not be recorded. In still other embodiments, operating data may be stored in the data storage 228 until a sufficient connection to the network 130 is established, but some or all types of incident information may be transmitted to the server 140 using any available connection via the network 130.

The controller 204 may then determine whether operation of the vehicle 108 remains ongoing (block 426). In some embodiments, the method 400 may terminate when all autonomous operation features are disabled, in which case the controller 204 may determine whether any autonomous operation features remain enabled. When the vehicle 108 is determined to be operating (or operating with at least one autonomous operation feature enabled), the method 400 may continue through blocks 406-426 until vehicle operation has ended. When the vehicle 108 is determined to have ceased operating (or is operating without autonomous operation features enabled), the controller 204 may record the completion of operation (block 428), either in the data storage 228 or the database 146. In some embodiments, a second timestamp corresponding to the completion of vehicle operation may likewise be recorded, as above.

Exemplary Autonomous Vehicle User Identification Methods

FIG. 5A illustrates a flow diagram of an exemplary autonomous vehicle user identification method 500 for identifying whether the person entering the autonomous vehicle 182 is the user who requested the autonomous vehicle 182. In some embodiments, the autonomous vehicle user identification method 500 may be implemented on the on-board computer 114 or mobile device 110 in the autonomous vehicle 182. The vehicle 182 may be operating in a fully autonomous mode of operation without any control decisions being made by a vehicle operator, excluding navigation decisions such as selection of a destination location or route. In some embodiments, the vehicle 182 may be operating without any passengers or with only passengers who are physically or legally unable to operate the vehicle 182 in a manual or semi-autonomous mode of operation (e.g., children, persons suffering acute illness, intoxicated or otherwise impaired persons, etc.).

During manual vehicle operation, vehicle operators typically carry a key or other access control device (e.g., a key fob) to gain entry and operate the vehicle. However, this system requires vehicle operators and/or owners to carry devices with them before entering their respective vehicles. Additionally, ride sharing services such as Uber™ have a vehicle operator who identifies passengers by comparing faces to pictures associated with user profiles and/or verifying names associated with user profiles. Such services do not identify users automatically. As a result, someone may claim to be the user requesting the vehicle and may deceive the vehicle operator. The passenger may then get a ride for free and/or the user who requested the vehicle may miss out on a ride while paying for the unauthorized passenger's trip. The autonomous vehicle user identification method 500 addresses these issues by increasing security measures when people attempt to enter the vehicle.

The autonomous vehicle user identification method 500 may begin by receiving a request from a user for transportation by the autonomous vehicle 182 to a destination location (block 502), where the request includes identification information and/or a location of the user. The on-board computer 114 of the autonomous vehicle 182 may cause the autonomous vehicle 182 to travel to the user's location (block 504). Before the user enters the autonomous vehicle 182, a biometric identifier may be detected for the user (block 506), for example via the sensors 120. The biometric identifier may be compared to the identification information for the user (block 508). If there is a match (block 510), the on-board computer 114 may allow the user to enter the autonomous vehicle 182 (block 512) and/or may cause the autonomous vehicle 182 to begin travelling to the destination location (block 514). On the other hand, if the biometric identifier does not match the identification information, the on-board computer 114 may prevent entry into the autonomous vehicle 182 (block 516). Although the method 500 is described with reference to the on-board computer 114 for simplicity, the described method may be easily modified for implementation by other systems or devices, including one or more of mobile devices 110 and/or servers 140.

At block 502, the on-board computer 114 of the autonomous vehicle 182 may receive a request from a user for transportation to a destination location. The request may be received from a mobile device 110 of the user via the Ride Sharing Application for example. Accordingly, the on-board computer 114 may determine whether to accept the request based upon the information provided in the request. Information provided in the request may include a starting location (e.g., the user's current location), a destination location, and/or identification information for the user. The identification information for the user may include user login information (e.g., a username and password, a user ID, a PIN number, a passcode, an email address, etc.) for accessing a user profile corresponding to the user.

In some embodiments, the autonomous vehicle 182 may communicate with the server 140 and/or other external computing device 186 which may retrieve the user profile from the database 146 using the user login information. User profile data may then be transmitted to the autonomous vehicle 182, such as the user's name, an indication of whether the user owns or is renting any vehicle along with identification information for the owned or rented vehicles, and/or biometric fingerprints for the user.

Then the on-board computer 114 may determine whether the user is the owner of the autonomous vehicle 182 or is currently renting the autonomous vehicle 182. If so, the on-board computer 114 may accept the request and/or cause the autonomous vehicle 182 to travel to the user's starting location (block 504). If the user is renting from any of several vehicles 182.1-182.5 or if the user is not renting any vehicles and instead is requesting a one-time trip, the on-board computer 114 may determine whether to accept the request based upon the availability of the autonomous vehicle 182, the distance from the autonomous vehicle 182 to the user's starting location, and/or the availability and distances of other autonomous vehicles 182.1-182.N.

For example, if the autonomous vehicle 182 is transporting a first user to a destination location, the on-board computer 114 may determine the distance that the autonomous vehicle 182 would have to travel off the current route to pick up the second user. If the distance is less than a threshold distance (e.g., half a mile, one mile, etc.), the on-board computer 114 may cause the autonomous vehicle 182 to pick up the second user and/or transport both users to their respective destination locations. The on-board computer 114 may cause the autonomous vehicle 182 to continue along the current route for the first user until reaching the first user's destination location. Then the autonomous vehicle 182 may travel to the second user's destination location. In some embodiments, when the second user's destination location is along or within the threshold distance of the current route and is closer to the starting location than the first user's destination location, the autonomous vehicle 182 may arrive at the second user's destination location before arriving at the first user's destination location.

If the distance exceeds the threshold distance, the on-board computer 114 may communicate with other autonomous vehicles 182.1-182.N to identify whether any are available to pick up the user. If none are available, the on-board computer 114 may cause the autonomous vehicle 182 to pick up the user after dropping off the other user at her destination location.

In another example, if the autonomous vehicle 182 is currently available (not transporting any passengers), the on-board computer 114 may determine the distance between the autonomous vehicle 182 and the user's starting location. The on-board computer 114 may then communicate with other autonomous vehicles 182.1-182.N to determine whether any of the other autonomous vehicles 182.1-182.N are also currently available and closer to the user's starting location. If another autonomous vehicle 182.2 is currently available and closer to the user's starting location, the on-board computer may transmit a request to the other autonomous vehicle 182.2 to pick up the user. Otherwise, the on-board computer 114 may cause the autonomous vehicle 182 to pick up the user.

In other embodiments, the request may be received from a server 140 and/or other external computing device 186 after the server 140 and/or other external computing device 186 selects the autonomous vehicle 182 for picking up the user. More specifically, the user's mobile device 110 may transmit the request to the server 140 and/or other external computing device 186 via the Ride Sharing Application. The server 140 and/or other external computing device 186 may select the autonomous vehicle 182 in a similar manner as provided above.

For example, the selection may be determined based upon whether the user profile data indicates that the autonomous vehicle 182 is owned or currently rented by the user, whether the autonomous vehicle 182 is currently transporting another user, and/or the distance between the autonomous vehicle 182 and the user's starting location. In some embodiments, the server 140 and/or other external computing device 186 may broadcast a request to autonomous vehicles 182.1-182.N to receive indications of their current locations and/or whether they are currently transporting other users. Upon selecting the autonomous vehicle 182, the server 140 and/or other external computing device 186 may forward the request along with the information provided in the request to the autonomous vehicle 182. Accordingly, the on-board computer 114 may cause the autonomous vehicle 182 to travel to the user's starting location (block 504).

To navigate to the user's starting location, the on-board computer 114 may obtain turn-by-turn navigation directions which provide a route from a current location of the autonomous vehicle 182 (e.g., as determined by the GPS within the autonomous vehicle 182) to the starting location. For example, the on-board computer 114 may communicate with the server 140, the external computing device 186, and/or another server such as a navigation server to obtain the navigation directions. The on-board computer 114 may transmit indications of the current and starting locations and/or may receive turn-by-turn navigation directions to the starting location. In other embodiments, the on-board computer 114 may generate the navigation directions.

In any event, the on-board computer 114 may generate control commands to brake, accelerate, and/or steer in accordance with the navigation directions. For example, at a particular waypoint along the route, the navigation directions may direct the autonomous vehicle 182 to turn left. Therefore, the on-board computer 114 may generate a control command to steer to the left and brake and/or accelerate accordingly. The on-board computer 114 may continue to generate control commands causing the autonomous vehicle 182 to follow the navigation direction until the autonomous vehicle 182 arrives at the starting location.

Upon arriving at the user's starting location, the on-board computer 114 may transmit a communication to the user's mobile device 110 that the autonomous vehicle 182 has arrived. Then at block 506, the on-board computer 114 may detect a biometric identifier for a person approaching the autonomous vehicle 182 to verify that the person is the user. The on-board computer 114 may request permission from the person before detecting the biometric identifier. For example, the on-board computer 114 may play an audio message via speakers of the autonomous vehicle 182. The audio message may include a request to either capture a facial image or a retinal image of the person, receive a fingerprint from the person, receive a voice recording of the person, and/or any other biometric identifier. If the person accepts the request, the on-board computer 114 may direct an external facing camera attached to the autonomous vehicle 182 to capture an image of the person's face or eyes and/or may direct a microphone attached to the autonomous vehicle 182 to record the person's voice. In another example, the on-board computer 114 may play an audio message directing the user to place her finger on top of a capacitive touch sensor located on the exterior of the vehicle (e.g., the hood, a side door, a mirror, etc.). The on-board computer 114 may detect one biometric identifier for the person or may detect several biometric identifiers for comparison to the user.

The biometric identifiers may be detected using any suitable biometric identification techniques and/or functionalities, such as facial recognition, facial structure recognition, ear or nose recognition, hair or teeth recognition, eye recognition, edge detection, voice recognition, etc. Using the external facing camera, the capacitive touch sensor, and/or LIDAR, the on-board computer 114 may generate several visual descriptors which may include keypoints within an image that may be used to unique identify a user's face, eyes, fingerprint, etc., and/or may include characteristics of the person's face, eyes, and/or fingerprint. In some embodiments, keypoints may be located at high-contrast regions of the image, such as edges within the image.

For example, the visual descriptors may include the amount and locations of loops, whorls, and/or arches in a fingerprint. In another example, visual descriptors may include eye color, eye size and shape, lip size and shape, skin tone, facial structure, head size and shape, nose width and height, etc. In yet another example, a visual descriptor may include a portion of a facial image which includes the user's nose and lips, or a portion of a facial image which includes the user's forehead. In another example, the on-board computer 114 may analyze the person's voice to identify audio descriptors such as pitch, frequency, amplitude, tone, etc.

In some embodiments, the facial image may be analyzed to identify a portion which corresponds to the user's nose, a portion which corresponds to the user's mouth, a portion which corresponds to the user's hair, a portion which corresponds to the user's eyebrows, etc. In this manner, portions of the biometric identifier may be compared to corresponding portions of the biometric fingerprint for the user rather than comparing the entire biometric identifier to the entire biometric fingerprint for the user (e.g., a nose in the biometric identifier may be compared to the user's nose from the biometric fingerprint, hair in the biometric identifier may be compared to the user's hair from the biometric fingerprint, etc.).

At block 508, the detected biometric identifier may then be compared to the identification information for the user. As mentioned above, the identification information may be used to access a user profile which may include biometric fingerprints for the user. The biometric fingerprints may include a facial image, a retinal image, a fingerprint, a voice recording, etc. of the user. Then the detected biometric identifier and more specifically visual/audio descriptors for the biometric identifier may be compared to the corresponding biometric fingerprint and/or visual/audio descriptors within the corresponding biometric fingerprint. For example, a detected facial image may be compared to the facial image for the biometric fingerprint. When there is a match, the on-board computer 114 may determine that the person approaching the vehicle is the user and/or may allow entry into the autonomous vehicle 182 (block 512).

On the other hand, when there is no match the on-board computer 114 may determine that the person approaching the vehicle is not the user and/or may prevent entry into the autonomous vehicle 182 (block 516). In some embodiments, when the biometric identifier and the biometric fingerprints do not match, the on-board computer 114 may request permission to detect a biometric identifier for the person once again. This biometric identifier may then be compared to the biometric fingerprints to check if there was an error during the initial comparison.

At block 516, the on-board computer may prevent the person from entering the autonomous vehicle 182. For example, as described above, the on-board computer 114 may directly or indirectly control the operation of the autonomous vehicle 182 according to various autonomous operation features. The autonomous operation features may include software applications or modules implemented by the on-board computer 114 to generate and implement control commands to control the steering, braking, or throttle of the autonomous vehicle 182. When a control command is generated by the on-board computer 114, it may thus be communicated to the control components of the autonomous vehicle 182 to effect a control action. The on-board computer 114 may generate control commands to brake, accelerate, steer, lock/unlock doors, turn on/turn off the engine, sound an alarm, and/or turn on/turn off autonomous operation features in the autonomous vehicle 182.

To prevent the person from entering the autonomous vehicle 182, the on-board computer 114 may generate a control command to lock the doors, turn off the engine, sound an alarm, deflate the tires, drive to a police station, and/or turn off the autonomous operation features, such as the software for braking, accelerating, steering, receiving a destination location for generating navigation directions, and/or navigation to the destination location. In this manner, even if the person is able to open the doors and/or gain access to the autonomous vehicle 182 in some other way, the autonomous vehicle 182 will not take the person anywhere or may take the person to a local police station. Moreover, the person will not be able to take over control of the autonomous vehicle 182 because the engine and/or the autonomous operation features are off. Thus, the person may not be able to provide any input to the autonomous vehicle 182. Additionally, in this scenario the on-board computer 114 may not allow users to switch the autonomous vehicle 182 from an autonomous to a manual mode. Further, the on-board computer 114 may shut off partially or fully until the sensors 120 detect another person approaching the autonomous vehicle 182 who may be the user.

For example, while the doors of the autonomous vehicle 182 remain locked, the autonomous vehicle 182 may sound a vehicle alarm indicating to the person to step away from the vehicle. The vehicle alarm may sound for a predetermined threshold period of time (e.g., 10 seconds, 20 seconds, 30 seconds, a minute, etc.). After that if the person does not walk away from the autonomous vehicle and/or continues to attempt to gain entry to the autonomous vehicle 182 (e.g., remains within a threshold distance of the vehicle as determined by the cameras, LIDAR, radar, and/or ultrasonic sensors), the on-board computer 114 may transmit an alert to emergency personnel to report an unauthorized entry. Emergency personnel may include a police department, a fire department, etc. The alert may be a message indicating that an unauthorized person is attempting to gain access to the autonomous vehicle 182 and/or indicating the location of the autonomous vehicle 182. In another example, the autonomous vehicle 182 may transmit an alert to emergency personnel upon detecting that the person is not the user. In some embodiments, the on-board computer 114 may also transmit an alert to the owner of the autonomous vehicle 182 indicating that an unauthorized user attempt to gain entry and/or to the authorized user.

On the other hand, when there is a match, at block 512, the on-board computer 114 may allow the user to enter the autonomous vehicle 182. To allow the user to enter the autonomous vehicle 182, the on-board computer 114 may generate a control command to unlock the doors, turn on the engine, and/or turn on the autonomous operation features, such as the software for braking, accelerating, steering, receiving navigation directions, and/or navigating to a destination location.

At block 514, the on-board computer 114 may cause the autonomous vehicle 182 to navigate to the destination location. To navigate to the destination location, the on-board computer 114 may obtain turn-by-turn navigation directions which provide a route from the starting location to the destination location. For example, the on-board computer 114 may communicate with the server 140, the external computing device 186, and/or another server such as a navigation server to obtain the navigation directions. The on-board computer 114 may transmit indications of the starting and destination locations and/or may receive turn-by-turn navigation directions to the destination location. In other embodiments, the on-board computer 114 may generate the navigation directions.

In any event, the on-board computer 114 may generate control commands to brake, accelerate, and/or steer in accordance with the navigation directions. For example, at a particular waypoint along the route, the navigation directions may direct the autonomous vehicle 182 to turn left. Therefore, the on-board computer 114 may generate a control command to steer to the left and brake and/or accelerate accordingly. The on-board computer 114 may continue to generate control commands causing the autonomous vehicle 182 to follow the navigation direction until the autonomous vehicle 182 arrives at the destination location.

As mentioned above, users may rent the autonomous vehicle 182 and/or may rent from a pool of vehicles 182.1-182.5, where any of the pool of vehicles 182.1-182.5 may pick the user up depending upon availability. For example, five users may each rent the same pool of three vehicles. Each time one of the users requests a ride, a different one of the three vehicles may pick the user up based upon availability of the three vehicles. In some scenarios, users may receive discounts, rewards, refunds, points, etc. on corresponding insurance premiums and/or rates for renting from a pool of vehicles 182.1-182.5 and/or making autonomous vehicles available for others to use while the autonomous vehicles are not needed.

Each user may rent an autonomous vehicle 182 or may rent from a pool of autonomous vehicles via a daily, weekly, via a daily, weekly, monthly, and/or yearly subscription. The subscription service may include insurance for the user while travelling in one of the autonomous vehicles within the pool. In some embodiments, the insurance included in the subscription may provide coverage for a particular amount of vehicle usage units (e.g., a distance or duration) over the course of the subscription. For example, the user may be insured for up to 100 miles per month, up to 10 hours in an autonomous vehicle per week, etc. In another example, the subscription may include insurance at an insurance premium on a cost per vehicle usage unit basis (e.g., a cost per mile, a cost per minute, etc.). More specifically, the subscription may include insurance coverage on a cost per vehicle usage unit basis for an insurance premium up to $20 per month, for example. When the cost per mile is $0.10 per mile for example, the user may travel up to 200 miles per month. The insurance premium may be included in the subscription fee or may be an additional fee. In some scenarios, the user may purchase additional insurance coverage and/or may be charged an additional amount per vehicle usage unit when the user exceeds the amount of vehicle usage units included in the subscription.

In any event, when the autonomous vehicle 182 picks up more than one user and simultaneously transports the users to their respective destinations, the on-board computer 114 and/or the server 140 may divide the cost of insurance for transporting the users amongst themselves. In some embodiments, the cost may be divided in proportion to the distance or duration for which each user was transported by the autonomous vehicle 182. For example, if two users are transported together from the same starting location to the same destination, the cost of insurance may be divided in half, so that each user is assigned the same amount of vehicle usage units (e.g., miles, minutes, etc.). Then each user may be deducted the assigned amount of vehicle usage units from their respective subscriptions. More specifically, two users may both have subscriptions which include insurance for 100 miles per month. When both users travel together in the autonomous vehicle 182 from the same starting location to the same destination on a trip totaling 30 miles, the 30 miles may be split evenly. Accordingly, each user may be deducted 15 miles and may have 85 miles left of vehicle insurance under the subscription for the month.

In another example, two users may be transported together for a portion of their respective vehicle trips. The first user may be in the autonomous vehicle 182 for an hour while the second user may also be in the autonomous vehicle 182 for 20 minutes of the hour. Accordingly, the first user may be assigned the 40 minutes that the second user was not travelling in the autonomous vehicle 182 and half of the 20 minutes in which both users were within the autonomous vehicle 182 for a total of 50 minutes. The second user may be assigned half the 20 minutes in which both users were within the autonomous vehicle 182 for a total of ten minutes. Accordingly, 50 minutes may be deducted from the first user's subscription and 10 minutes may be deducted from the second user's subscription.

As mentioned above, several users may request transportation services from the same autonomous vehicle 182 and/or may be transported by the autonomous vehicle 182 at the same time for at least a portion of their respective routes. Each of the requests may be received from a different mobile device 110 corresponding to the respective user, via the Ride Sharing Application for example. Information provided in each request may include a starting location (e.g., the user's current location), a destination location, and/or identification information for the respective user. The identification information for the user may include user login information (e.g., a username and password, a user ID, a PIN number, a passcode, an email address, etc.) for accessing a user profile corresponding to the user, which may include one or more biometric fingerprints.

The on-board computer 114 may direct the autonomous vehicle 182 to the starting locations for each of the users by for example, obtaining turn-by-turn navigation directions which provide a route from a current location of the autonomous vehicle 182 to the starting location. At each starting location, the on-board computer 114 may transmit a communication to the respective user's mobile device 110 that the autonomous vehicle 182 has arrived. Then, the on-board computer 114 may detect a biometric identifier for a person approaching the autonomous vehicle 182 to verify that the person is the respective user.

The on-board computer 114 may request permission from the person before detecting the biometric identifier. For example, the on-board computer 114 may play an audio message via speakers of the autonomous vehicle 182. The audio message may include a request to either capture a facial image or a retinal image of the person, receive a fingerprint from the person, receive a voice recording of the user, and/or any other biometric identifier. If the person accepts the request, the on-board computer 114 may direct an external facing camera attached to the autonomous vehicle 182 to capture an image of the person's face or eyes and/or may direct a microphone to record the person's voice. In another example, the on-board computer 114 may play an audio message directing the user to place her finger on top of a capacitive touch sensor located on the exterior of the vehicle (e.g., the hood, a side door, a mirror, etc.). The on-board computer 114 may detect one biometric identifier for the person or may detect several biometric identifiers for comparison to the user.

The detected biometric identifier may then be compared to the identification information for the user. As mentioned above, the identification information may be used to access a user profile which may include biometric fingerprints for the user. The biometric fingerprints may include a facial image, a retinal image, a fingerprint, a voice recording, etc. of the user. Then the detected biometric identifier may be compared to the corresponding biometric fingerprint. For example, a detected facial image may be compared to the facial image for the biometric fingerprint.

When there is a match, the on-board computer 114 may determine that the person approaching the vehicle is the user and/or may allow entry into the autonomous vehicle 182. On the other hand, when there is no match, the on-board computer 114 may determine that the person approaching the vehicle is not the user and/or may prevent entry into the autonomous vehicle 182. For example, as described above, the on-board computer 114 may directly or indirectly control the operation of the autonomous vehicle 182 according to various autonomous operation features. The on-board computer 114 may generate control commands to brake, accelerate, steer, lock/unlock doors, turn on/turn off the engine, sound an alarm, and/or turn on/turn off autonomous operation features in the autonomous vehicle 182.

In some embodiments, the cost of insurance for the transportation services may be divided amongst the users who are allowed to enter the autonomous vehicle 182. Users who are denied entry into the autonomous vehicle 182 may not be charged a portion of the cost of insurance for the vehicle trip. For example, if five users request transportation by the autonomous vehicle 182 and only three are allowed entry into the autonomous vehicle 182, the cost of insurance may be divided amongst the three users who are allowed entry into the autonomous vehicle 182. The other two users may not be charged.

While the examples above describe the on-board computer 114 and/or the server 140 dividing the cost of insurance in proportion to the distance or duration for which each user was transported by the autonomous vehicle 182, these are merely for ease of illustration only. The cost of insurance may be divided amongst the users in any suitable manner. In some embodiments, each user may be assigned a weight and the cost of insurance may be divided according to the assigned weights. For example, the first user to request transportation services from the autonomous vehicle 182 may receive a lower weight than subsequent users who request transportation services from the autonomous vehicle 182 while the autonomous vehicle 182 is transporting the first user. Consequently, the first user's portion of the cost of insurance may be reduced by the lower weight and the subsequent users' portions may increase. In this manner, the first user is incentivized/rewarded for allowing the autonomous vehicle 182 to pick up other users while transporting the first user.

Additionally, while the examples above describe scenarios where the autonomous vehicle 182 transports two users at the same time for at least a portion of their respective routes, the autonomous vehicle 182 may transport any suitable number of users at the same time. In some embodiments, the autonomous vehicle 182 may be constrained by the size of the autonomous vehicle 182 and/or the number of passenger seats. For example, the autonomous vehicle 182 may not transport more users simultaneously than the number of seats within the autonomous vehicle 182.

While the method 500 is described in the context of autonomous vehicles, this is for ease of illustration only. More generally, the method of receiving a request from a user, detecting a biometric identifier before allowing entry, and/or preventing or allowing entry based on the results of a comparison between the biometric identifier and identification information for the user may be applied to short term housing, sharing of lawnmowers, power tools, tillers, bicycles, recreational equipment such as kayaks, canoes, sailboats, fishing equipment, golf clubs, swimming pools, computers, pianos, guitars, drones or other remote control devices. For example, when a user requests access to an apartment or home for a short period of time (e.g., a weekend, a week, a month, etc.) for example using a house rental application such as Airbnb®, an externally facing camera at the home may be used to detect a biometric identifier for a person attempting to gain entry to the home. The biometric identifier may be compared to the identification information for the user and if there is a match, the user may be allowed to enter the home. On the other hand, if the biometric identifier does not match the identification information, the user may be denied entry to the home and/or emergency personnel may be alerted of an authorized attempt to gain entry.

Exemplary Biometric Fingerprint Capturing Methods

FIG. 5B illustrates a flow diagram of an exemplary biometric fingerprint capturing method 530 for storing a biometric fingerprint of a user. In some embodiments, the biometric fingerprint capturing method 530 may be implemented on the server 140 and/or other external computing device 186.

The biometric fingerprint capturing method 530 may begin by transmitting a biometric fingerprint capture screen to a user's mobile device 110 (block 532). In response, one or more biometric fingerprints may be received from the mobile device 110 (block 534) and stored in a user profile for the user (block 536). When a person approaches an autonomous vehicle 182 that receives a request from the user for transportation, a biometric identifier may be detected for the person (block 538) to verify that the person is the user. Then the one or more biometric fingerprints for the user may be retrieved from the user profile (block 540) and compared to the biometric identifier (block 542). If there is a match, the person may be identified as the user (block 546). On the other hand, if there is no match, biometric identifiers may continue to be detected for the person (block 538). Although the method 530 is described with reference to the server 140 and/or other external computing device 186 for simplicity, the described method may be easily modified for implementation by other systems or devices, including one or more of mobile devices 110 and/or on-board computers 114. Moreover, in some embodiments the method may be performed by a combination of the server 140, mobile device 110, and/or on-board computer 114. For example, the on-board computer 114 may detect a biometric identifier for the person via sensors 120 in the autonomous vehicle 182 while the server 114 performs the remaining steps in the method.

In any event, at block 532, the server 140 may transmit a biometric fingerprint capture screen to a mobile device 110 of the user. The biometric fingerprint capture screen may be displayed via the Ride Sharing Application and/or may include user controls for entering a biometric fingerprint. For example, the biometric fingerprint capture screen may include a user control, such as a button for capturing an image of the user's face and/or retina via the camera of the mobile device 110. Additionally, the biometric fingerprint capture screen may include a user control in communication with a capacitive touch sensor of the mobile device 110 for capturing the user's fingerprint, for example, when the user's finger makes contact with the capacitive touch sensor. In some embodiments, the biometric fingerprint capture screen may include instructions prompting the user to capture several types of biometric fingerprints, such as a facial image, a retinal image, and a fingerprint. Also in some embodiments, the biometric fingerprint capture screen may include instructions prompting the user to capture several of the same type of biometric fingerprint (e.g., several facial images). In this manner, it may be easier for the server 140 to extract more visual descriptors from several facial images than from one facial image. Moreover, the server 140 may be able to discard one of the facial images if it is blurry or difficult to analyze, for example.

At block 534, the server 140 may receive one or more biometric fingerprints from the mobile device 110 which may be stored in a user profile for the user (block 536). In some embodiments, the server 140 may analyze each biometric fingerprint using facial recognition, facial structure recognition, ear or nose recognition, hair or teeth recognition, eye recognition, edge detection, etc. to generate visual descriptors which may include keypoints within an image that may be used to unique identify a user's face, eyes, fingerprint, etc., and/or may include characteristics of the user's face, eyes, and/or fingerprint. For example, the visual descriptors may include the amount and locations of loops, whorls, and/or arches in a fingerprint. In another example, visual descriptors may include eye color, eye size and shape, lip size and shape, skin tone, facial structure, head size and shape, nose width and height, etc. The visual descriptors may then be stored in the user profile.

At block 536, the server 140 may detect a biometric identifier for a person approaching the autonomous vehicle 182 to verify that the person is the user. In some embodiments, the server 140 may detect the biometric identifier by communicating with the on-board computer 114 of the autonomous vehicle 114.

For example, the on-board computer 114 may request permission from the person before detecting the biometric identifier. More specifically, the on-board computer 114 may play an audio message via speakers of the autonomous vehicle 182. The audio message may include a request to either capture a facial image or a retinal image of the person, receive a fingerprint from the person, and/or any other biometric identifier. If the person accepts the request, the on-board computer 114 may direct an external facing camera attached to the autonomous vehicle 182 to capture an image of the person's face or eyes. In another example, the on-board computer 114 may play an audio message directing the user to place her finger on top of a capacitive touch sensor located on the exterior of the vehicle (e.g., the hood, a side door, a mirror, etc.). The on-board computer 114 may detect one biometric identifier for the person or may detect several biometric identifiers for comparison to the user. Then the on-board computer 114 may transmit the biometric identifier(s) to the server 140.

At block 540, the server 140 may retrieve the one or more biometric fingerprints from the user profile of the user. In some embodiments, the server 140 may also retrieve visual descriptors associated with each biometric fingerprint.

At block 542, the biometric identifier(s) may then be compared to the retrieved biometric fingerprints for the user. The biometric fingerprints may include a facial image, a retinal image, a fingerprint, etc. of the user. Then the detected biometric identifier and in some scenarios, visual descriptors for the biometric identifier may be compared to the corresponding biometric fingerprint and/or visual descriptors for the corresponding biometric fingerprint. For example, a detected facial image may be compared to the facial image for the biometric fingerprint. When there is a match, the server 140 and/or the on-board computer 114 may determine that the person approaching the vehicle is the user (block 546). On the other hand, when there is no match, the server 140 and/or the on-board computing device 114 may continue to detect biometric identifiers for the person (block 538) and/or may determine that the person approaching the vehicle is not the user.

Exemplary Methods of Determining Risk Using Telematics Data

As described herein, telematics data may be collected and used in monitoring, controlling, evaluating, and assessing risks associated with autonomous or semi-autonomous operation of a vehicle 108. In some embodiments, the Data Application installed on the mobile computing device 110 and/or on-board computer 114 may be used to collect and transmit data regarding vehicle operation. This data may include operating data regarding operation of the vehicle 108, autonomous operation feature settings or configurations, sensor data (including location data), data regarding the type or condition of the sensors 120, telematics data regarding vehicle regarding operation of the vehicle 108, environmental data regarding the environment in which the vehicle 108 is operating (e.g., weather, road, traffic, construction, or other conditions). Such data may be transmitted from the vehicle 108 or the mobile computing device 110 via radio links 183 (and/or via the network 130) to the server 140. The server 140 may receive the data directly or indirectly (i.e., via a wired or wireless link 183 e to the network 130) from one or more vehicles 182 or mobile computing devices 184. Upon receiving the data, the server 140 may process the data to determine one or more risk levels associated with the vehicle 108.

In some embodiments, a plurality of risk levels associated with operation of the vehicle 108 may be determined based upon the received data, using methods similar to those discussed elsewhere herein, and a total risk level associated with the vehicle 108 may be determined based upon the plurality of risk levels. In other embodiments, the server 140 may directly determine a total risk level based upon the received data. Such risk levels may be used for vehicle navigation, vehicle control, control hand-offs between the vehicle and driver, settings adjustments, driver alerts, accident avoidance, insurance policy generation or adjustment, and/or other processes as described elsewhere herein.

In some aspects, computer-implemented methods for monitoring the use of a vehicle 108 having one or more autonomous operation features and/or adjusting an insurance policy associated with the vehicle 108 may be provided. In some embodiments, the mobile computing device 110 and/or on-board computer 114 may have a Data Application installed thereon, as described above. Such Data Application may be executed by one or more processors of the mobile computing device 110 and/or on-board computer 114 to, with the customer's permission or affirmative consent, collect the sensor data, determine the telematics data, receive the feature use levels, and transmit the information to the remote server 140. The Data Application may similarly perform or cause to be performed any other functions or operations described herein as being controlled by the mobile computing device 110 and/or on-board computer 114.

The telematics data may include data regarding one or more of the following regarding the vehicle 108: acceleration, braking, speed, heading, and/or location. The telematics data may further include information regarding one or more of the following: time of day of vehicle operation, road conditions in a vehicle environment in which the vehicle is operating, weather conditions in the vehicle environment, and/or traffic conditions in the vehicle environment. In some embodiments, the one or more sensors 120 of the mobile computing device 110 may include one or more of the following sensors disposed within the mobile computing device 110: an accelerometer array, a camera, a microphone, and/or a geolocation unit (e.g., a GPS receiver). In further embodiments, one or more of the sensors 120 may be communicatively connected to the mobile computing device 110 (such as through a wireless communication link).

The feature use levels may be received by the mobile computing device 110 from the on-board computer 114 via yet another radio link 183 between the mobile computing device 110 and the on-board computer 114, such as link 116. The feature use levels may include data indicating adjustable settings for at least one of the one or more autonomous operation features. Such adjustable settings may affect operation of the at least one of the one or more autonomous operation features in controlling an aspect of vehicle operation, as described elsewhere herein.

In some embodiments, the method may further including receiving environmental information regarding the vehicle's environment at the mobile computing device 110 and/or on-board computer 114 via another radio link 183 or wireless communication channel. Such environmental information may also be transmitted to the remote server 140 via the radio link 183 and may be used by the remote server 140 in determining the total risk level. In some embodiments, the remote server 140 may receive part or all of the environmental information through the network 130 from sources other than the mobile computing device 110 and/or on-board computer 114. Such sources may include third-party data sources, such as weather or traffic information services. The environmental data may include one or more of the following: road conditions, weather conditions, nearby traffic conditions, type of road, construction conditions, location of pedestrians, movement of pedestrians, movement of other obstacles, signs, traffic signals, or availability of autonomous communications from external sources. The environmental data may similarly include any other data regarding a vehicle environment described elsewhere herein.

In further embodiments, the method may include collecting addition telematics data and/or information regarding feature use levels at a plurality of additional mobile computing devices 184 associated with a plurality of additional vehicles 182. Such additional telematics data and/or information regarding feature use levels may be transmitted from the plurality of additional mobile computing devices 184 to the remote server 140 via a plurality of radio links 183 and received at one or more processors of the remote server 140. The remote server 140 may further base the determination of the total risk level at least in part upon the additional telematics data and/or feature use levels. Some embodiments of the methods described herein may include determining, adjusting, generating, rating, or otherwise performing actions necessary for creating or updating an insurance policy associated with the vehicle 108.

Autonomous Vehicle Insurance Policies

The disclosure herein relates in part to insurance policies for vehicles with autonomous operation features. Accordingly, as used herein, the term “vehicle” may refer to any of a number of motorized transportation devices. A vehicle may be a car, truck, bus, train, boat, plane, motorcycle, snowmobile, other personal transport devices, etc. Also as used herein, an “autonomous operation feature” of a vehicle means a hardware or software component or system operating within the vehicle to control an aspect of vehicle operation without direct input from a vehicle operator once the autonomous operation feature is enabled or engaged. Autonomous operation features may include semi-autonomous operation features configured to control a part of the operation of the vehicle while the vehicle operator control other aspects of the operation of the vehicle.

The term “autonomous vehicle” means a vehicle including at least one autonomous operation feature, including semi-autonomous vehicles. A “fully autonomous vehicle” means a vehicle with one or more autonomous operation features capable of operating the vehicle in the absence of or without operating input from a vehicle operator. Operating input from a vehicle operator excludes selection of a destination or selection of settings relating to the one or more autonomous operation features. Autonomous and semi-autonomous vehicles and operation features may be classified using the five degrees of automation described by the National Highway Traffic Safety Administration's.

Additionally, the term “insurance policy” or “vehicle insurance policy,” as used herein, generally refers to a contract between an insurer and an insured. In exchange for payments from the insured, the insurer pays for damages to the insured which are caused by covered perils, acts, or events as specified by the language of the insurance policy. The payments from the insured are generally referred to as “premiums,” and typically are paid by or on behalf of the insured upon purchase of the insurance policy or over time at periodic intervals.

Although the exemplary embodiments discussed herein relate to automobile insurance policies, it should be appreciated that an insurance provider may offer or provide one or more different types of insurance policies. Other types of insurance policies may include, for example, commercial automobile insurance, inland marine and mobile property insurance, ocean marine insurance, boat insurance, motorcycle insurance, farm vehicle insurance, aircraft or aviation insurance, and other types of insurance products.

Autonomous Automobile Insurance

Some aspects of some embodiments described herein may relate to assessing and pricing insurance based upon autonomous (or semi-autonomous) operation of the vehicle 108. Risk levels and/or insurance policies may be assessed, generated, or revised based upon the use of autonomous operation features or the availability of autonomous operation features in the vehicle 108. Additionally, risk levels and/or insurance policies may be assessed, generated, or revised based upon the effectiveness or operating status of the autonomous operation features (i.e., degree to which the features are operating as intended or are impaired, damaged, or otherwise prevented from full and ordinary operation). Thus, information regarding the capabilities or effectiveness of the autonomous operation features available to be used or actually used in operation of the vehicle 108 may be used in risk assessment and insurance policy determinations.

Insurance providers currently develop a set of rating factors based upon the make, model, and model year of a vehicle. Models with better loss experience receive lower factors, and thus lower rates. One reason that this current rating system cannot be used to assess risk for vehicles using autonomous technologies is that many autonomous operation features vary for the same vehicle model. For example, two vehicles of the same model may have different hardware features for automatic braking, different computer instructions for automatic steering, and/or different artificial intelligence system versions. The current make and model rating may also not account for the extent to which another “driver,” in this case the vehicle itself, is controlling the vehicle. The present embodiments may assess and price insurance risks at least in part based upon autonomous operation features that replace actions of the driver. In a way, the vehicle-related computer instructions and artificial intelligence may be viewed as a “driver.”

Insurance policies, including insurance premiums, discounts, and rewards, may be updated, adjusted, and/or determined based upon hardware or software functionality, and/or hardware or software upgrades, associated with autonomous operation features. Insurance policies, including insurance premiums, discounts, etc. may also be updated, adjusted, and/or determined based upon the amount of usage and/or the type(s) of the autonomous or semi-autonomous technology employed by the vehicle. In one embodiment, performance of autonomous driving software and/or sophistication of artificial intelligence utilized in the autonomous operation features may be analyzed for each vehicle. An automobile insurance premium may be determined by evaluating how effectively the vehicle may be able to avoid and/or mitigate crashes and/or the extent to which the driver's control of the vehicle is enhanced or replaced by the vehicle's software and artificial intelligence.

When pricing a vehicle with autonomous operation features, artificial intelligence capabilities, rather than human decision making, may be evaluated to determine the relative risk of the insurance policy. This evaluation may be conducted using multiple techniques. Autonomous operation feature technology may be assessed in a test environment, in which the ability of the artificial intelligence to detect and avoid potential crashes may be demonstrated experimentally. For example, this may include a vehicle's ability to detect a slow-moving vehicle ahead and/or automatically apply the brakes to prevent a collision. Additionally, actual loss experience of the software in question may be analyzed. Vehicles with superior artificial intelligence and crash avoidance capabilities may experience lower insurance losses in real driving situations. Results from both the test environment and/or actual insurance losses may be compared to the results of other autonomous software packages and/or vehicles lacking autonomous operation features to determine relative risk levels or risk factors for one or more autonomous operation features. To determine such risk levels or factors, the control decisions generated by autonomous operation features may be assessed to determine the degree to which actual or shadow control decisions are expected to succeed in avoiding or mitigating vehicle accidents. This risk levels or factors may be applicable to other vehicles that utilize the same or similar autonomous operation features and may, in some embodiments, be applied to vehicle utilizing similar features (such as other software versions), which may require adjustment for differences between the features.

Emerging technology, such as new iterations of artificial intelligence systems or other autonomous operation features, may be priced by combining an individual test environment assessment with actual losses corresponding to vehicles with similar autonomous operation features. The entire vehicle software and artificial intelligence evaluation process may be conducted with respect to each of various autonomous operation features. A risk level or risk factor associated with the one or more autonomous operation features of the vehicle could then be determined and applied when pricing insurance for the vehicle. In some embodiments, the driver's past loss experience and/or other driver risk characteristics may not be considered for fully autonomous vehicles, in which all driving decisions are made by the vehicle's artificial intelligence. Risks associated with the driver's operation of the vehicle may, however, be included in embodiments in which the driver controls some portion of vehicle operation in at least some circumstances.

In one embodiment, a separate portion of the automobile insurance premium may be based explicitly on the effectiveness of the autonomous operation features. An analysis of how the artificial intelligence of autonomous operation features facilitates avoiding accidents and/or mitigates the severity of accidents in order to build a database and/or model of risk assessment. After which, automobile insurance risk and/or premiums (as well as insurance discounts, rewards, and/or points) may be adjusted based upon autonomous or semi-autonomous vehicle functionality, such as by individual autonomous operation features or groups thereof. In one aspect, an evaluation may be performed of how artificial intelligence, and the usage thereof, impacts automobile accidents and/or automobile insurance claims. Such analysis may be based upon data from a plurality of autonomous vehicles operating in ordinary use, or the analysis may be based upon tests performed upon autonomous vehicles and/or autonomous operation feature test units.

The adjustments to automobile insurance rates or premiums based upon the autonomous or semi-autonomous vehicle-related functionality or technology may take into account the impact of such functionality or technology on the likelihood of a vehicle accident or collision occurring or upon the likely severity of such accident or collision. For instance, a processor may analyze historical accident information and/or test data involving vehicles having autonomous or semi-autonomous functionality. Factors that may be analyzed and/or accounted for that are related to insurance risk, accident information, or test data may include the following: (1) point of impact; (2) type of road; (3) time of day; (4) weather conditions; (5) road construction; (6) type/length of trip; (7) vehicle style; (8) level of pedestrian traffic; (9) level of vehicle congestion; (10) atypical situations (such as manual traffic signaling); (11) availability of internet connection for the vehicle; and/or other factors. These types of factors may also be weighted according to historical accident information, predicted accidents, vehicle trends, test data, and/or other considerations.

Automobile insurance premiums, rates, discounts, rewards, refunds, points, etc. may be adjusted based upon the percentage of time or vehicle usage that the vehicle is the driver, i.e., the amount of time a specific driver uses each type of autonomous operation feature. In other words, insurance premiums, discounts, rewards, etc. may be adjusted based upon the percentage of vehicle usage during which the autonomous or semi-autonomous functionality is in use. For example, automobile insurance risks, premiums, discounts, etc. for an automobile having one or more autonomous operation features may be adjusted and/or set based upon the percentage of vehicle usage that the one or more individual autonomous operation features are in use, which may include an assessment of settings used for the autonomous operation features. In some embodiments, such automobile insurance risks, premiums, discounts, etc. may be further set or adjusted based upon availability, use, or quality of Vehicle-to-Vehicle (V2V) wireless communication to a nearby vehicle also employing the same or other type(s) of autonomous communication features. In another example, automobile insurance premiums, rates, discounts, rewards, refunds, points, etc. may be split between multiple users. As in the examples described above, when the autonomous vehicle picks up several users and transports them to respective destination locations, the automobile insurance premiums, rates, discounts, rewards, refunds, points, etc. may be split amongst the several users. Additionally, when several users rent one or more autonomous vehicles via a subscription service, the automobile insurance premiums, rates, discounts, rewards, refunds, points, etc. may also be split amongst the several users. A user may receive discounts and/or rewards for allowing other users to receive transportation from an autonomous vehicle when the autonomous vehicle is not in use. Further, a user may receive discounts and/or rewards for allowing the autonomous vehicle to pick up other users while the autonomous vehicle is transporting the user to a destination location.

Insurance premiums, rates, ratings, discounts, rewards, special offers, points, programs, refunds, claims, claim amounts, etc. may be adjusted for, or may otherwise take into account, the foregoing functionalities, technologies, or aspects of the autonomous operation features of vehicles, as described elsewhere herein. For instance, insurance policies may be updated based upon autonomous or semi-autonomous vehicle functionality; V2V wireless communication-based autonomous or semi-autonomous vehicle functionality; and/or vehicle-to-infrastructure or infrastructure-to-vehicle wireless communication-based autonomous or semi-autonomous vehicle functionality.

Machine Learning

Machine learning techniques have been developed that allow parametric or nonparametric statistical analysis of large quantities of data. Such machine learning techniques may be used to automatically identify relevant variables (i.e., variables having statistical significance or a sufficient degree of explanatory power) from data sets. This may include identifying relevant variables or estimating the effect of such variables that indicate actual observations in the data set. This may also include identifying latent variables not directly observed in the data, viz. variables inferred from the observed data points. In some embodiments, the methods and systems described herein may use machine learning techniques to identify and estimate the effects of observed or latent variables such as time of day, weather conditions, traffic congestion, interaction between autonomous operation features, or other such variables that influence the risks associated with autonomous or semi-autonomous vehicle operation.

Some embodiments described herein may include automated machine learning to determine risk levels, identify relevant risk factors, optimize autonomous or semi-autonomous operation, optimize routes, determine autonomous operation feature effectiveness, predict user demand for a vehicle, determine vehicle operator or passenger illness or injury, evaluate sensor operating status, predict sensor failure, evaluate damage to a vehicle, predict repairs to a vehicle, predict risks associated with manual vehicle operation based upon the driver and environmental conditions, recommend optimal or preferred autonomous operation feature usage, estimate risk reduction or cost savings from feature usage changes, determine when autonomous operation features should be engaged or disengaged, determine whether a driver is prepared to resume control of some or all vehicle operations, and/or determine other events, conditions, risks, or actions as described elsewhere herein. Although the methods described elsewhere herein may not directly mention machine learning techniques, such methods may be read to include such machine learning for any determination or processing of data that may be accomplished using such techniques. In some embodiments, such machine-learning techniques may be implemented automatically upon occurrence of certain events or upon certain conditions being met. Use of machine learning techniques, as described herein, may begin with training a machine learning program, or such techniques may begin with a previously trained machine learning program.

A processor or a processing element may be trained using supervised or unsupervised machine learning, and the machine learning program may employ a neural network, which may be a convolutional neural network, a deep learning neural network, or a combined learning module or program that learns in two or more fields or areas of interest. Machine learning may involve identifying and recognizing patterns in existing data (such as autonomous vehicle system, feature, or sensor data, autonomous vehicle system control signal data, vehicle-mounted sensor data, mobile device sensor data, and/or telematics, image, or radar data) in order to facilitate making predictions for subsequent data (again, such as autonomous vehicle system, feature, or sensor data, autonomous vehicle system control signal data, vehicle-mounted sensor data, mobile device sensor data, and/or telematics, image, or radar data). Models may be created based upon example inputs of data in order to make valid and reliable predictions for novel inputs.

Additionally or alternatively, the machine learning programs may be trained by inputting sample data sets or certain data into the programs, such as autonomous system sensor and/or control signal data, and other data discuss herein. The machine learning programs may utilize deep learning algorithms primarily focused on pattern recognition, and may be trained after processing multiple examples. The machine learning programs may include Bayesian program learning (BPL), voice recognition and synthesis, image or object recognition, optical character recognition, and/or natural language processing—either individually or in combination. The machine learning programs may also include natural language processing, semantic analysis, automatic reasoning, and/or machine learning.

In supervised machine learning, a processing element may be provided with example inputs and their associated outputs, and may seek to discover a general rule that maps inputs to outputs, so that when subsequent novel inputs are provided the processing element may, based upon the discovered rule, accurately predict the correct or a preferred output. In unsupervised machine learning, the processing element may be required to find its own structure in unlabeled example inputs. In one embodiment, machine learning techniques may be used to extract the control signals generated by the autonomous systems or sensors, and under what conditions those control signals were generated by the autonomous systems or sensors.

The machine learning programs may be trained with autonomous system data, autonomous sensor data, and/or vehicle-mounted or mobile device sensor data to identify actions taken by the autonomous vehicle before, during, and/or after vehicle collisions; identify who was behind the wheel of the vehicle (whether actively driving, or riding along as the autonomous vehicle autonomously drove); identify actions taken by the human driver and/or autonomous system, and under what (road, traffic, congestion, or weather) conditions those actions were directed by the autonomous vehicle or the human driver; identify damage (or the extent of damage) to insurable vehicles after an insurance-related event or vehicle collision; and/or generate proposed insurance claims for insured parties after an insurance-related event.

The machine learning programs may be trained with autonomous system data, autonomous vehicle sensor data, and/or vehicle-mounted or mobile device sensor data to identify preferred (or recommended) and actual control signals relating to or associated with, for example, whether to apply the brakes; how quickly to apply the brakes; an amount of force or pressure to apply the brakes; how much to increase or decrease speed; how quickly to increase or decrease speed; how quickly to accelerate or decelerate; how quickly to change lanes or exit; the speed to take while traversing an exit or entrance ramp; at what speed to approach a stop sign or light; how quickly to come to a complete stop; and/or how quickly to accelerate from a complete stop.

After training, machine learning programs (or information generated by such machine learning programs) may be used to evaluate additional data. Such data may be related to tests of new autonomous operation feature or versions thereof, actual operation of an autonomous vehicle, or other similar data to be analyzed or processed. The trained machine learning programs (or programs utilizing models, parameters, or other data produced through the training process) may then be used for determining, assessing, analyzing, predicting, estimating, evaluating, or otherwise processing new data not included in the training data. Such trained machine learning programs may, thus, be used to perform part or all of the analytical functions of the methods described elsewhere herein.

Other Matters

In some aspect, customers may opt-in to a rewards, loyalty, or other program. The customers may allow a remote server to collect sensor, telematics, vehicle, mobile device, and other types of data discussed herein. With customer permission or affirmative consent, the data collected may be analyzed to provide certain benefits to customers. For instance, insurance cost savings may be provided to lower risk or risk averse customers. Recommendations that lower risk or provide cost savings to customers may also be generated and provided to customers based upon data analysis. The other functionality discussed herein may also be provided to customers in return for them allowing collection and analysis of the types of data discussed herein.

Although the text herein sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the invention is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possible embodiment, as describing every possible embodiment would be impractical, if not impossible. One could implement numerous alternate embodiments, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.

It should also be understood that, unless a term is expressly defined in this patent using the sentence “As used herein, the term ‘______’ is hereby defined to mean . . . ” or a similar sentence, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based upon any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this disclosure is referred to in this disclosure in a manner consistent with a single meaning, that is done for sake of clarity only so as to not confuse the reader, and it is not intended that such claim term be limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word “means” and a function without the recital of any structure, it is not intended that the scope of any claim element be interpreted based upon the application of 35 U.S.C. § 112(f).

Throughout this specification, plural instances may implement components, operations, or structures described as a single instance. Although individual operations of one or more methods are illustrated and described as separate operations, one or more of the individual operations may be performed concurrently, and nothing requires that the operations be performed in the order illustrated. Structures and functionality presented as separate components in example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements fall within the scope of the subject matter herein.

Additionally, certain embodiments are described herein as including logic or a number of routines, subroutines, applications, or instructions. These may constitute either software (code embodied on a non-transitory, tangible machine-readable medium) or hardware. In hardware, the routines, etc., are tangible units capable of performing certain operations and may be configured or arranged in a certain manner. In example embodiments, one or more computer systems (e.g., a standalone, client or server computer system) or one or more modules of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a module that operates to perform certain operations as described herein.

In various embodiments, a module may be implemented mechanically or electronically. Accordingly, the term “module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. Considering embodiments in which modules are temporarily configured (e.g., programmed), each of the modules need not be configured or instantiated at any one instance in time. For example, where the modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different modules at different times. Software may accordingly configure a processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time.

Modules can provide information to, and receive information from, other modules. Accordingly, the described modules may be regarded as being communicatively coupled. Where multiple of such modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) that connect the modules. In embodiments in which multiple modules are configured or instantiated at different times, communications between such modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple modules have access. For example, one module may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further module may then, at a later time, access the memory device to retrieve and process the stored output. Modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).

The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some example embodiments, comprise processor-implemented modules. Moreover, the systems and methods described herein are directed to an improvement to computer functionality and improve the functioning of conventional computers.

Similarly, the methods or routines described herein may be at least partially processor-implemented. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment or as a server farm), while in other embodiments the processors may be distributed across a number of locations.

The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the one or more processors or processor-implemented modules may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other example embodiments, the one or more processors or processor-implemented modules may be distributed across a number of geographic locations.

Unless specifically stated otherwise, discussions herein using words such as “processing,” “computing,” “calculating,” “determining,” “presenting,” “displaying,” or the like may refer to actions or processes of a machine (e.g., a computer) that manipulates or transforms data represented as physical (e.g., electronic, magnetic, or optical) quantities within one or more memories (e.g., volatile memory, non-volatile memory, or a combination thereof), registers, or other machine components that receive, store, transmit, or display information. Some embodiments may be described using the expression “coupled” and “connected” along with their derivatives. For example, some embodiments may be described using the term “coupled” to indicate that two or more elements are in direct physical or electrical contact. The term “coupled,” however, may also mean that two or more elements are not in direct contact with each other, but yet still co-operate or interact with each other. The embodiments are not limited in this context.

As used herein any reference to “one embodiment” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment. In addition, use of the “a” or “an” are employed to describe elements and components of the embodiments herein. This is done merely for convenience and to give a general sense of the description. This description, and the claims that follow, should be read to include one or at least one and the singular also includes the plural unless it is obvious that it is meant otherwise.

As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For example, a condition A or B is satisfied by any one of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).

This detailed description is to be construed as exemplary only and does not describe every possible embodiment, as describing every possible embodiment would be impractical, if not impossible. One could implement numerous alternate embodiments, using either current technology or technology developed after the filing date of this application. Upon reading this disclosure, those of skill in the art will appreciate still additional alternative structural and functional designs for system and a method for assigning mobile device data to a vehicle through the disclosed principles herein. Thus, while particular embodiments and applications have been illustrated and described, it is to be understood that the disclosed embodiments are not limited to the precise construction and components disclosed herein. Various modifications, changes and variations, which will be apparent to those skilled in the art, may be made in the arrangement, operation and details of the method and apparatus disclosed herein without departing from the spirit and scope defined in the appended claims.

The particular features, structures, or characteristics of any specific embodiment may be combined in any suitable manner and in any suitable combination with one or more other embodiments, including the use of selected features without corresponding use of other features. In addition, many modifications may be made to adapt a particular application, situation or material to the essential scope and spirit of the present invention. It is to be understood that other variations and modifications of the embodiments of the present invention described and illustrated herein are possible in light of the teachings herein and are to be considered part of the spirit and scope of the present invention.

While the preferred embodiments of the invention have been described, it should be understood that the invention is not so limited and modifications may be made without departing from the invention. The scope of the invention is defined by the appended claims, and all devices that come within the meaning of the claims, either literally or by equivalence, are intended to be embraced therein. It is therefore intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that it is the following claims, including all equivalents, that are intended to define the spirit and scope of this invention. 

What is claimed is:
 1. A computer-implemented method for identifying autonomous vehicle users, comprising: receiving, at one or more processors in a vehicle having one or more autonomous operation features, an indication of a first destination location for transporting a first user; in response to picking up the first user, causing, by the one or more processors, the vehicle to travel to the first destination location; while the vehicle travels along a route to the first destination location: receiving, at the one or more processors, a request from a second user for transportation to a second destination location; determining, by the one or more processors, whether the second user is within a threshold distance of a current location of the vehicle; causing, by the one or more processors, the vehicle to travel to a location of the second user when the second user is within the threshold distance of the vehicle; detecting, via one or more sensors associated with the vehicle, a biometric identifier of a person approaching the vehicle to verify that the person is the second user; and causing, by the one or more processors, a control mechanism within the vehicle to shut down the one or more autonomous operation features for the vehicle when the biometric identifier for the person approaching the vehicle does not match a biometric identifier for the second user.
 2. The computer-implemented method of claim 1, further comprising: causing, by the one or more processors, the control mechanism within the vehicle to allow the second user to enter the vehicle when the biometric identifier for the person approaching the vehicle matches the biometric identifier for the second user.
 3. The computer-implemented method of claim 2, wherein when the biometric identifier for the person approaching the vehicle does not match the biometric identifier for the second user, causing the control mechanism within the vehicle to include at least one of: i) locking each door of the vehicle, ii) sounding an alarm within the vehicle, iii) transmitting an alert, or iv) turning off a vehicle engine.
 4. The computer-implemented method of claim 3, further comprising: sounding the alarm within the vehicle for a predetermined threshold period of time, and after the predetermined threshold period of time expires: detecting, by the one or more processors, whether the person is within a threshold distance of the vehicle; and transmitting, by the one or more processors, an alert to emergency personnel when the person is within the threshold distance of the vehicle.
 5. The computer-implemented method of claim 1, further comprising: causing, by the one or more processors, the control mechanism within the vehicle to allow the second user to enter the vehicle when the biometric identifier for the person approaching the vehicle matches the biometric identifier for the second user; wherein causing the control mechanism within the vehicle to allow the second user to enter the vehicle includes at least one of: i) unlocking a door of the vehicle, ii) turning on a vehicle engine, or iii) turning on the one or more autonomous operation features for the vehicle.
 6. The computer-implemented method of claim 1, wherein the biometric identifier is detected via an external facing camera attached to the vehicle and wherein the biometric identifier includes at least one of: a fingerprint, a facial scan, or a retinal scan.
 7. The computer-implemented method of claim 1, further comprising: receiving, at the one or more processors, login information for the second user via an application on a mobile device; identifying, by the one or more processors, a user profile associated with the login information, wherein the user profile includes the biometric identifier for the second user; and comparing, by the one or more processors, the biometric identifier of the person approaching the vehicle to the biometric identifier within the user profile.
 8. The computer-implemented method of claim 1, further comprising: determining, by the one or more processors, the distance from the current location of the second user to the first destination location and the distance from the current location of the second user to the second destination location.
 9. A computer system configured to identify autonomous vehicle users, the computer system comprising one or more local or remote processors, transceivers, and/or sensors configured to: receive, in a vehicle having one or more autonomous operation features, an indication of a first destination location for transporting a first user; in response to picking up the first user, cause the vehicle to travel to the first destination location; while the vehicle travels along a route to the first destination location: receive a request from a second user for transportation to a second destination location; determine whether the second user is within a threshold distance of a current location of the vehicle; cause the vehicle to travel to a location of the second user when the second user is within the threshold distance of the vehicle; detect, via one or more sensors associated with the vehicle, a biometric identifier of a person approaching the vehicle to verify that the person is the second user; and cause a control mechanism within the vehicle to shut down the one or more autonomous operation features for the vehicle when the biometric identifier for the person approaching the vehicle does not match a biometric identifier for the second user.
 10. The computer-implemented method of claim 1, wherein determining whether the second user is within a threshold distance of a current location of the vehicle includes determining whether a distance to the second user from a location on the route to the first destination location is within the threshold distance.
 11. The computer system of claim 9, the one or more local or remote processors, transceivers, and/or sensors configured to: cause the control mechanism within the vehicle to allow the second user to enter the vehicle when the biometric identifier for the person approaching the vehicle matches the biometric identifier for the second user.
 12. The computer system of claim 9, the one or more local or remote processors, transceivers, and/or sensors configured to: determine the distance from the current location of the second user to the first destination location and the distance from the current location of the second user to the second destination location.
 13. The computer-implemented method of claim 1, further comprising in response to picking up the second user causing the vehicle to travel to the second destination location before traveling to the first destination location when the second destination location is closer to the current location of the second user than the first destination location.
 14. The computer-implemented method of claim 13, wherein the second destination location is received prior to causing the vehicle to travel to the location of the second user.
 15. The computer system of claim 9, the one or more local or remote processors, transceivers, and/or sensors configured to, in response to picking up the second user, cause the vehicle to travel to the second destination location before traveling to the first destination location when the second destination location is closer to the current location of the second user than the first destination location.
 16. The computer system of claim 15, wherein the second destination location is received prior to causing the vehicle to travel to the location of the second user.
 17. The computer system of claim 9, wherein when the biometric identifier for the person approaching the vehicle does not match the biometric identifier for the second user causing the control mechanism within the vehicle to perform at least one of: i) lock each door of the vehicle, ii) sound an alarm within the vehicle, iii) transmit an alert, or iv) turn off a vehicle engine. 