Patent attributes
Systems and methods are directed to detecting tampering with a secured area of an autonomous vehicle. In one example, a computing system performs operations including generating a first key pair comprising a first private key and a first public key as part of a vehicle registration process; providing the first public key to one or more remote computing systems; determining whether a reset event occurred at a vehicle; in response to determining that the reset event occurred, discarding the first key pair and generating a second key pair comprising a second private key and a second public key; receiving a status query from one of the one or more remote computing systems; generating a response to the status query, the response being signed using either the first private key or the second private key; and providing the response to the one of the one or more remote computing systems.