US 11,706,027 B2
Systems and methods for managing a compromised autonomous vehicle server
Jiang Zhang, San Jose, CA (US); Xiaoyong Yi, Fremont, CA (US); and Liwei Ren, San Jose, CA (US)
Assigned to Beijing Voyager Technology Co., Ltd., Beijing (CN)
Filed by Beijing Voyager Technology Co., Ltd., Beijing (CN)
Filed on Jun. 13, 2022, as Appl. No. 17/838,656.
Application 17/838,656 is a continuation of application No. 17/413,889, granted, now 11,405,206, previously published as PCT/US2018/068084, filed on Dec. 30, 2018.
Prior Publication US 2022/0303135 A1, Sep. 22, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/32 (2006.01); B60W 60/00 (2020.01); H04L 9/08 (2006.01)
CPC H04L 9/32 (2013.01) [B60W 60/001 (2020.02); H04L 9/0819 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for managing a compromised autonomous vehicle server, the system comprising:
one or more processors; and
one or more memories storing instructions that, when executed by the one or more processors, cause the system to perform:
obtaining an indication of a first server configured to control an autonomous vehicle being compromised, the autonomous vehicle having previously been provisioned with a first public key, the first public key being paired with a first private key;
compiling command information, the command information including a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in an event of the first server being compromised, the digital certificate including a second public key and being signed with the first private key, the command being signed with a second private key associated with the second server, the second private key being paired with the second public key; and
wherein the autonomous vehicle is part of a fleet of autonomous vehicles such that operations of the system are performed for an individual autonomous vehicle of the fleet of autonomous vehicles, and the command information facilitates:
verifying, at the autonomous vehicle, the digital certificate using the first public key;
in response to the digital certificate being verified, extracting, from the digital certificate, the second public key;
verifying, at the autonomous vehicle, the command using the second public key; and
in response to the command being verified, executing, at the autonomous vehicle, the command.