This invention relates generally to systems that communicate with units in vehicles for road user charging purposes and, more specifically, relates to targeted enforcement for road user charging.
In road user charging systems, an on-board unit (OBU) is placed in each vehicle to be charged. The charging is based on, e.g., distance traveled, zone, time of travel, and the like. For instance, a goal for this type of system may be to managing traffic congestion by setting higher costs for travel on certain roads or in certain areas. Thus, roads or areas that are typically congested have a higher cost for travel. These systems also may include variable pricing based on travel during certain times of the day. That is, it is more expensive to travel during peak hours. These systems also provide taxes for use of the roads.
In many of these systems, the OBU keeps track of locations, times at those locations, and the like. At certain times, the OBU reports this data to a central location, called the “back office.” The back office then bills the user based, e.g., on a road use schedule.
Because these systems are becoming more widespread, abusers of the systems are also becoming more prevalent. For example, software is available to fake user location: information can be stored in the OBU indicating that the vehicle is located in a low cost zone, when actually the vehicle is located in a high cost zone. Additionally, the OBU may also be tampered with, switched off, or put into different vehicles.
Gantries typically serve as enforcement mechanisms. For example, a gantry observes a vehicle being in a high price zone but the vehicle claims to be in a low price zone at the observation time. As another example, a gantry uses automatic number plate recognition (ANPR) to determine that a license plate number viewed on a vehicle is different from a license place associated with the OBU for the vehicle. Such possible evidence of abuse is typically sent to the back office for further analysis and enforcement.
At the back office, this evidence has to be analyzed further, because the gantries and OBUs are not infallible when making observations such as those previously described. For instance, the gantry may make an incorrect ANPR of a license plate. While these observations have a low error rate, an error rate of only a few percent will cause a large volume of data when that error rate is multiplied by many gantries and hundreds or thousands of vehicles passing through the gantries on a daily basis. Currently, this evidence is manually examined, which can be laborious.
What is needed, therefore, are techniques for reducing the amount of manual labor for examining evidence of possible abuses of road user-charging systems and for improving upon errors in observations of gantries.
In an exemplary embodiment, a method is disclosed that includes for a set of passages of a vehicle, where each passage is associated with at least one confidence level, applying at least one heuristic to confidence levels corresponding to the set to determine at least one score. The method also includes performing the applying at least one heuristic for a number of sets of passages of a number of vehicles and selecting a number of the sets based on their associated at least one scores. The method additionally includes outputting identifications corresponding to each of the selected sets.
In another exemplary embodiment, an apparatus is disclosed that includes at least one memory comprising instructions and at least one processor operatively coupled to the at least one memory, the at least one processor configured by the instructions to cause the apparatus to perform operations including for a set of passages of a vehicle, where each passage is associated with at least one confidence level, applying at least one heuristic to confidence levels corresponding to the set to determine at least one score. The operations also include performing the applying at least one heuristic for a number of sets of passages of a number of vehicles and selecting a number of the sets based on their associated at least one scores. The operations further include outputting identifications corresponding to each of the selected sets.
In another exemplary embodiment, a computer readable medium is disclosed that tangibly embodies a program of machine-readable instructions executable by a digital processing apparatus to perform operations including for a set of passages of a vehicle, where each passage is associated with at least one confidence level, applying at least one heuristic to confidence levels corresponding to the set to determine at least one score. The operations include performing the applying at least one heuristic for a number of sets of passages of a number of vehicles and selecting a number of the sets based on their associated at least one scores. The operations further include outputting identifications corresponding to each of the selected sets.
The foregoing and other aspects of embodiments of this invention are made more evident in the following Detailed Description of Exemplary Embodiments, when read in conjunction with the attached Drawing Figures, wherein:
As previously described, all evidence including vehicle information sent to the back office in a road user charging system is not due to system abuse. Errors in license plate recognition (which may amount to around four to six percent error) may result in targeting of innocent individuals. Furthermore, there can be a substantial amount of labor involved in examining evidence of possible abuses of road user charging systems. In order to improve upon these problems and therefore improve enforcement, aspects of the invention provide targeted enforcement for road user charging. In an exemplary embodiment, lists are developed for targeted enforcement based on consistency in OBU data and Gantry data. In particular, one or more heuristics are applied to a multitude of sets of passages, each set corresponding to a number of passages made by a vehicle through one or more gantries. Each passage is associated with a confidence level. The application of the one or more heuristics results in one more scores. The scores are then compared, generally by ranking the scores, to determine which users (e.g., identified by vehicle identifications) are potentially abusing the road user charging system. Such ranking may be output, in an exemplary embodiment, in a ranked vehicle list. Enforcement may be performed using the ranked vehicle list. If it is subsequently determined that innocent users are targeted, the heuristics may be modified.
Turning now to
Each vehicle 120-1, 120-2 has an OBU 121-1, 121-2, respectively. The OBU 121-1 includes a location 122-1 and an identifier (ID) 123-1. Similarly, the OBU 121-2 includes a location 122-2 and an ID 123-2. The IDs 123 may be any item that uniquely identifies the corresponding OBU 121. Locations 122-1 and 122-2 are not addressed herein but are included for completeness.
Each GPU 130 processes information from its associated cameras 115 and RF communication systems RF1-RF4 and produces an associated and respective ANPR value 132-1 and 132-2. If the ANPR value 132-1 does not match the license plate value (not shown) associated with the ID 123-1, the GPU 130-1 will include a certain amount of information to send back to the back office 170 in vehicle list 133-1. Similarly, if the ANPR value 132-2 does not match the license plate value (not shown) associated with an ID 123, the GPU 130-2 will include a certain amount of information to send back to the back office 170 in vehicle list 133-2.
The vehicle lists 133 may contain a variety of different information, based on the policies of the road user charging system 100. For instance, if a vehicle 120 or its associated OBU 121 passes the ANPR observation, little or no information might be placed by the GPU 130 into the vehicle lists 133. This is based primarily on privacy concerns. On the other hand, if a vehicle 120 or its associated OBU 121 fails the ANPR observation, a large set of information might be placed by the GPU 130 into the vehicle lists 133 so that the back office 170 can match the vehicle 120 with the OBU 121 (and a corresponding user).
Thus, each vehicle list 133 may contain information about all vehicles 120 or only those vehicles 120 that fail any tests. Typically, the latter will be the case, such that only information related to suspect vehicles 120 that fail an ANPR observation will be placed into vehicle lists 133-1, 133-2. The vehicles 120 that fail an ANPR observation are “flagged” vehicles and a list containing only information related to flagged vehicles is called a flagged vehicle list herein.
One item of importance not shown in
Referring now to
In Block 220, the back office 170 performs flagged vehicle processing. The flagged vehicle processing results in a ranked list of vehicles 225. In Block 230, enforcement occurs using the list of flagged vehicle and operates on (potential) system abusers 240. If innocent users are indicated as being potential system abusers 240 by the ranked list of vehicles, feedback 235 is performed, which may result in adjustments to the heuristics being used, as described in more detail below.
Turning now to
The flagged vehicle processing engine 365 operates on the sorted flagged vehicle list 390 to create a ranked vehicle list 225. The operations taken by flagged vehicle processing engine 365 are now explained in more detail.
Referring now to
Each passage through a gantry is associated with a corresponding confidence level, CL1, CL2, or CL3. The confidence levels in this example are a determination by a gantry as to the probability that the ANPR determination for the vehicle is correct. In this example, a 100 would indicate a very high probability that the ANPR determination is correct and a zero would indicate a very low probability that the ANPR determination is correct (i.e., a high probability that the ANPR determination is incorrect). It should be noted that the scale may also be reversed, so that 100 indicates a very low probability that the ANPR determination is correct (i.e., a high probability that the ANPR determination is incorrect).
This example shows heuristics 420-1 through 420-4 being applied to the sets of passages and their corresponding confidence levels. Application of the heuristics 420-1 through 420-4 results in scores 450-1 through 450-4, respectively. In this example, the heuristic 420-1 is the following:
1−√{square root over (n)}(1−p1)(1−p2) . . . (1−pn),
where n is the number of passages for a particular set, p1 is the confidence level for passage 1 (one), p2 is the confidence level for passage 2 (two), . . . , and pn is the confidence level for passage n.
Heuristic 420-2 is the following:
1−√{square root over (n/N)}(1−p1)(1−p2) . . . (1−pn),
where N is the total number of passages.
Heuristic 420-3 is the following:
mean(p1, p2, . . . , pn).
Heuristic 420-4 is the following:
median(p1, p2, . . . , pn).
Certain scores 450 can then be selected based (in this example) on the highest values for the scores 450. Typically, this is performed by ranking the scores and then selecting the highest ranking scores (e.g., a number of highest ranking scores or scores above a predetermined score).
The example of
Referring now to
Referring to
In Block 7C, heuristic(s) are applied to each set 430 of gantry passage(s) for a vehicle for each of the sets 430 of gantry passages and corresponding vehicles. Block 7C results in scores 450. Block 7C may be performed by the flagged vehicle processing engine 365. In Block 7D, sets 430 of passages are selected based on heuristic(s) scores. Such sets 430 are typically selected by creating a ranked vehicle list 610. Such a ranked vehicle list 610 can include a predetermined number of sets based on the sets 430 having highest ranked (in one embodiment) scores 450 or sets 430 having scores 450 above (for instance) a predetermined score. Block 7E may be performed by the flagged vehicle processing engine 365.
In Block 7F, enforcement is performed. Such enforcement is typically performed by personnel managing the road user charging system 100, such as by mailing a letter indicating possible abuse to a user. If the enforcement targeted any innocent users (Block 76=YES), then the heuristic(s) may be adjusted (Block 7H) through a technique such as using a different heuristic that does not select the innocent user (e.g., because an associated score for the user would not be in the ranked vehicle list 225). Additionally, scores from heuristics may be combined (thereby combining two heuristics into a single heuristic) to avoid selecting the user.
If the enforcement did not target any innocent users (Block 7G=NO) or after heuristic(s) are adjusted (Block 7H), method 700 continues in Block 7B, when new flagged vehicle lists are analyzed to organize these lists by gantry passages and by vehicles.
As should be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” It is noted that “an entirely software embodiment” would be implemented by, e.g., a digital processing apparatus such as that shown in
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device such as a digital processing apparatus.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or assembly language or similar programming languages. Such computer program code may also include code for field-programmable gate arrays, such as VHDL (Very-high-speed integrated circuit Hardware Description Language).
Aspects of the present invention are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The foregoing description has provided by way of exemplary and non-limiting examples a full and informative description of the best techniques presently contemplated by the inventors for carrying out embodiments of the invention. However, various modifications and adaptations may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings and the appended claims. All such and similar modifications of the teachings of this invention will still fall within the scope of this invention.
Furthermore, some of the features of exemplary embodiments of this invention could be used to advantage without the corresponding use of other features. As such, the foregoing description should be considered as merely illustrative of the principles of embodiments of the present invention, and not in limitation thereof.