Movatterモバイル変換


[0]ホーム

URL:


CN110077361B - Vehicle control method and device - Google Patents

Vehicle control method and device
Download PDF

Info

Publication number
CN110077361B
CN110077361BCN201910347647.4ACN201910347647ACN110077361BCN 110077361 BCN110077361 BCN 110077361BCN 201910347647 ACN201910347647 ACN 201910347647ACN 110077361 BCN110077361 BCN 110077361B
Authority
CN
China
Prior art keywords
user
information
network authentication
vehicle
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910347647.4A
Other languages
Chinese (zh)
Other versions
CN110077361A (en
Inventor
刘新
刘俊落
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co LtdfiledCriticalShenzhen Launch Technology Co Ltd
Priority to CN201910347647.4ApriorityCriticalpatent/CN110077361B/en
Publication of CN110077361ApublicationCriticalpatent/CN110077361A/en
Application grantedgrantedCritical
Publication of CN110077361BpublicationCriticalpatent/CN110077361B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

A vehicle control method and apparatus. The method comprises the following steps: the method comprises the steps that a user terminal collects face information of any user in a plurality of users, wherein the users can control a vehicle; acquiring network authentication information, wherein the network authentication information comprises an online function certificate of a resident identification card; comparing the collected face information of the user with the network authentication information; and if the comparison result is consistent, sending a control instruction to a server, wherein the control instruction is used for controlling the vehicle and comprises the collected user face information. By implementing the method and the system, the face recognition technology can be utilized to ensure that the remote vehicle control system is controlled by a specified user group, so that the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.

Description

Vehicle control method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a vehicle control method and apparatus.
Background
With the progress of society, automobiles are more and more popular. With the rapid increase of the number of automobiles, people are pursuing intelligent and convenient vehicle control systems more and more. However, the existing vehicle remote control systems rely on the mobile phone app to log in and then input the password to control the vehicle, so that the following problems exist: if the user name or the password is known by the non-designated user, the non-designated user can perform remote vehicle control, and thus traffic accidents caused by improper vehicle control are increased.
Disclosure of Invention
The application provides a vehicle control method and device, which can ensure that a remote vehicle control system can only be controlled by a designated user group by using a face recognition technology, and reduce the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage.
In a first aspect, the present application provides a vehicle control method applied to a user terminal, the method including:
collecting face information of any one of a plurality of users, wherein the plurality of users can control the vehicle;
acquiring network authentication information, wherein the network authentication information comprises an online function certificate of a resident identification card;
comparing the collected user face information with the network authentication information;
and if the comparison result is consistent, sending a control instruction to a server, wherein the control instruction is used for controlling the vehicle and comprises the collected user face information.
In a possible implementation manner, when the similarity between the user face information and the network authentication information is greater than a first threshold, the comparison result between the user face information and the network authentication information is consistent; when the similarity between the user face information and the network authentication information is smaller than or equal to a second threshold value, the comparison result between the user face information and the network authentication information is inconsistent; wherein the first threshold is greater than the second threshold.
In one possible implementation, the method further includes:
receiving a login request;
collecting face information of any user in a plurality of users;
and when the face information of the user is consistent with the network authentication information, acquiring the registration information of the user and logging in.
In one possible implementation, the method further includes:
and when the registration information of the user is not acquired, acquiring the registration information of the user from the server according to the network authentication information, and logging in.
In one possible implementation, the method further includes:
after a user logs in, receiving activation information of the vehicle-mounted equipment;
and according to the activation information, activating the vehicle-mounted equipment so as to establish connection between the vehicle-mounted equipment and the server.
In a second aspect, the present application provides a vehicle control method, applied to a server, the method including:
receiving a control instruction sent by a user terminal, wherein the control instruction comprises face information of any user in a plurality of users collected by the user terminal;
acquiring network authentication information, wherein the network authentication information comprises an online function certificate of a resident identification card;
comparing the user face information with the network authentication information;
and if the comparison result is consistent, sending the control instruction to the vehicle-mounted equipment.
In a third aspect, the present application provides a user terminal, including:
a first collecting unit for collecting face information of any one of a plurality of users;
the first acquisition unit is used for acquiring network authentication information, and the network authentication information comprises an online function certificate of a resident identification card;
the comparison unit is used for comparing the collected user face information with the network authentication information;
and the sending unit is used for sending a control instruction to the server if the comparison result is consistent, wherein the control instruction is used for controlling the vehicle, and the control instruction comprises the collected face information of the user.
In one possible implementation, the apparatus further includes:
a first receiving unit, configured to receive a login request;
a second collecting unit for collecting face information of any one of the plurality of users;
and the second acquisition unit is used for acquiring the registration information of the user and logging in when the face information of the user is consistent with the network authentication information.
In one possible implementation, the apparatus further includes:
and the third acquisition unit is used for acquiring the registration information of the user from the server according to the network authentication information and logging in when the registration information of the user is not acquired.
In one possible implementation, the apparatus further includes:
the second receiving unit is used for receiving the activation information of the vehicle-mounted equipment after the user logs in;
and the activation unit is used for activating the vehicle-mounted equipment according to the activation information so as to establish connection between the vehicle-mounted equipment and the server.
In a fourth aspect, the present application provides a server, including:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving a control instruction sent by a user terminal, and the control instruction comprises face information of any user in a plurality of users collected by the user terminal;
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring network authentication information which comprises an online function certificate of a resident identification card;
the comparison unit is used for comparing the user face information with the network authentication information;
and the sending unit is used for sending the control instruction to the vehicle-mounted equipment if the comparison result is consistent.
In a fifth aspect, the present application provides a user terminal, including: a processor, a memory, and a transceiver; wherein the memory is adapted to store a computer program comprising program instructions, and the processor is configured to invoke the program instructions to perform the method as set forth in the first aspect or any implementation thereof.
In a sixth aspect, the present application provides a server, including: a processor, a memory, and a transceiver; wherein the memory is used for storing a computer program comprising program instructions, and the processor is configured for calling the program instructions to execute the method as set forth in the second aspect or any implementation thereof.
In a seventh aspect, the present application proposes a computer-readable storage medium storing a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the aspects or any of the implementations of the proposed method.
In an eighth aspect, embodiments of the present application provide a computer program product containing program instructions, which when run on a computer, cause the computer to perform the aspects or any of the methods presented to be implemented.
By implementing the method and the system, the face recognition technology can be utilized, the remote vehicle control system can be controlled only by a designated user group, and the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present application, the drawings required to be used in the embodiments or the background art of the present application will be described below.
FIG. 1 is a flow chart of a vehicle control method as set forth in the present application;
FIG. 2 is a flow chart of another vehicle control method presented herein;
fig. 3 is a flowchart of a specific application scenario of a vehicle control method proposed in the present application;
FIG. 4 is a flow chart of another vehicle control method presented herein;
FIG. 5 is a block diagram of a vehicle control system according to the present application;
fig. 6 is a schematic structural diagram of a user terminal according to the present application;
fig. 7 is a schematic structural diagram of a server proposed in the present application;
fig. 8 is a schematic structural diagram of another user terminal proposed in the present application;
fig. 9 is a schematic structural diagram of another server proposed in the present application.
Detailed Description
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, or apparatus.
The existing vehicle remote control system is controlled by inputting a password after logging in by a mobile phone app, so that the following problems exist: if the user name or the password is known by the non-designated user, the non-designated user can perform remote vehicle control, and thus traffic accidents caused by improper vehicle control are increased.
The vehicle control method and device can ensure that a remote vehicle control system can only be controlled by a designated user group by using a face recognition technology, and reduce vehicle theft and vehicle control errors caused by factors such as account password leakage.
Fig. 1 is a flowchart of a vehicle control method proposed in the present application, applied to a user terminal, where the method includes the following steps:
101. the method includes the steps of collecting face information of any one of a plurality of users, wherein the users can control the vehicle.
Specifically, a face recognition technology can be used to shoot any one of a plurality of users, and the face information of any one of the plurality of users is collected; the multiple users can be owners and friends and relatives thereof, the user terminals store the network authentication information of the multiple users and can correctly identify the face information of the multiple users, so that the vehicles can be controlled by a designated user group through the user terminals, the safety of vehicle control is ensured, and the user groups of the user terminals are expanded. The designated user group legally controlled by the vehicle can be selected by the vehicle owner, and the personal information of the designated user group is uploaded to the user terminal and the server.
The face recognition technology is to recognize an input face image or video based on the facial features of a person. Firstly, judging whether a human face exists, and if so, further giving the position and the size of the face and the position information of each main facial organ. And further extracting the identity characteristics implied in the face according to the information, and comparing the identity characteristics with the known face so as to identify the identity of the face.
102. And acquiring network authentication information.
Specifically, the network authentication information is acquired based on personal information of a specified user group, which can legally control the vehicle. The network authentication information comprises an online function certificate of the resident identification card. The electronic identity card is a credible identity authentication based on the resident identity card and adopting a living body face recognition technology, and is jointly released by cooperation of a first research institute of the ministry of public security and public security institutions of various regions. The certificate is an electronic file which is issued and uniquely corresponds to the entity identity card chip through the national 'Internet + credible identity authentication platform'.
For example, many software platforms have been cooperated with the ministry of public security to have the function of creating or displaying the functional certificate on the resident identification network, or later to obtain a special software for the functional certificate on the resident identification network, and a Software Development Kit (SDK) can be provided to enable other software platforms to access, for example: software A can call the SDK provided by software B to access and then acquire the network authentication information in software B, wherein the network authentication information comprises the personal head portrait and the identity information.
103. And comparing the collected face information of the user with the network authentication information.
Specifically, when the similarity between the user face information and the network authentication information is greater than a first threshold, the comparison result between the user face information and the network authentication information is consistent; when the similarity between the user face information and the network authentication information is smaller than or equal to a second threshold value, the comparison result between the user face information and the network authentication information is inconsistent; wherein the first threshold is greater than the second threshold. This step is implemented to detect whether the identity of the user is consistent with the identity in the network authentication information.
104. And if the comparison result is consistent, sending a control instruction to the server.
Specifically, when the similarity between the user face information and the network authentication information is greater than a first threshold, the comparison result between the user face information and the network authentication information is consistent. The control instruction is used for controlling the vehicle, and the control instruction comprises the collected face information of the user. If the similarity between the user face information and the network authentication information is smaller than or equal to a second threshold value, that is, the comparison result between the user face information and the network authentication information is inconsistent, the user terminal judges that the operator is not the designated user, and does not send the control instruction. The control instruction is used for controlling the vehicle, and the control instruction comprises the collected face information of the user.
By implementing the embodiment of the application, the face recognition technology can be utilized to ensure that the remote vehicle control system can only be controlled by a specified user group, and the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.
Fig. 2 is a schematic flow chart of another vehicle control method proposed in the present application, applied to a user terminal, where the method includes the following steps:
201. and acquiring network authentication information.
Specifically, the network authentication information includes an online function certificate of the resident identification card.
202. A login request is received.
203. The method comprises the steps of collecting face information of any one of a plurality of users, wherein the users can control the vehicle.
Specifically, when a user logs in, a face recognition function of the user terminal is triggered, and the user terminal collects face information of the user in modes of shooting and the like.
When the user logs in, the identity authentication is required to be carried out through face recognition so as to ensure that the remote vehicle control system can only be controlled through a designated user group.
204. And when the face information of the user is consistent with the network authentication information, acquiring the registration information of the user and logging in.
Specifically, when the face information of the user is consistent with the network authentication information, the user terminal determines that the operator is a designated user. The user terminal further judges whether the specified user is registered, and if the registration information of the specified user is found, the registration is indicated, and then login is carried out. And when the face information of the user is inconsistent with the network authentication information, the user terminal judges that the operator is not the designated user and prohibits the operator from logging in. The face recognition technology is adopted for login, so that the login process is optimized while the safety is ensured, and the user operation is more convenient.
205. And when the registration information of the user is not acquired, acquiring the registration information of the user from the server according to the network authentication information, and logging in.
Specifically, when the registration information of the user is not acquired, the user terminal acquires the registration information of the user from the server according to the network authentication information, stores the registration information in the user terminal, and completes registration and login.
By implementing the step, the user terminal automatically helps the appointed user to register, and simultaneously, the uniqueness and authority of the on-line function certificate of the resident identification card are utilized to automatically complete real-name authentication, so that the operation is more convenient.
206. And after the user logs in, receiving the activation information of the vehicle-mounted equipment.
Specifically, in order to implement remote control of the vehicle, the designated user needs to activate the vehicle-mounted device so as to establish a connection between the vehicle-mounted device and the server. The activation information may be device information and a device serial number of the vehicle-mounted device.
207. And according to the activation information, activating the vehicle-mounted equipment so as to establish connection between the vehicle-mounted equipment and the server.
Specifically, the pre-stored information of the device to be activated is compared with the received activation information, and after the verification is passed, the connection is established between the vehicle-mounted device and the server, and the vehicle-mounted device is in an activated state. The following functions may be implemented by the in-vehicle apparatus receiving the control instruction: such as opening the door, starting, locking the car, etc.
And if the activation is not successful, the user terminal outputs error information to remind the user of the failure of the activation.
208. Face information of any one of a plurality of users is collected.
Specifically, if the user sends a control instruction through the user terminal, the face recognition function of the user terminal is triggered, and the user terminal can collect face information of the user by adopting modes such as shooting. The step is beneficial to identifying the user identity.
209. And comparing the collected face information of the user with the network authentication information.
Specifically, when the similarity between the user face information and the network authentication information is greater than a first threshold, the comparison result between the user face information and the network authentication information is consistent; when the similarity between the user face information and the network authentication information is smaller than or equal to a second threshold value, the comparison result between the user face information and the network authentication information is inconsistent; wherein the first threshold is greater than the second threshold. This step is carried out for the purpose of detecting whether the user is a designated user.
210. And if the comparison result is consistent, sending a control instruction to the server.
Specifically, the control instruction can control the opening of the vehicle door and the starting of the vehicle. The control instruction comprises the collected face information of the user, so that the server can identify the identity of the user.
By implementing the embodiment of the application, the face recognition technology can be utilized to ensure that the remote vehicle control system can only be controlled by a specified user group, and the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.
Fig. 3 is a schematic flowchart of a specific application scenario of a vehicle control method, applied to a user terminal, where the method includes the following steps:
301. and acquiring network authentication information.
For example, network authentication information of a specified user group is obtained from a third-party trusted platform, and the network authentication information comprises an online function certificate of the resident identification card.
302. A login request is received.
For example, a login request of a user A is received.
303. And collecting the face information of the user.
For example, the user terminal collects face information of the user nail in a shooting mode.
304. And when the face information of the user is consistent with the network authentication information, acquiring the registration information of the user and logging in.
For example, the user terminal compares the face information of the user a with the head portrait information of the on-line function certificate of the resident identification card of the designated user, and when the similarity between the face information of the user a and the head portrait information of the network authentication information of the designated user is greater than a first threshold, the comparison result between the face information of the user a and the network authentication information of the designated user is consistent, and the first threshold may be 95%. And if the comparison result is consistent, the user A is the designated user. And the user terminal acquires the registration information of the user A and logs in.
305. And when the registration information of the user is not acquired, acquiring the registration information of the user from the server according to the network authentication information, and logging in.
For example, when the registration information of the user a is not acquired, the user terminal acquires the registration information of the user a from the server according to the network authentication information and logs in.
306. And after the user logs in, receiving the activation information of the vehicle-mounted equipment.
For example, when the user A logs in, the user terminal receives activation information for the vehicle TBOX input by the user A.
307. And according to the activation information, activating the vehicle-mounted equipment so as to establish connection between the vehicle-mounted equipment and the server.
For example, the vehicle-mounted TBOX is activated, so that the connection between the vehicle-mounted TBOX and the server is established.
308. And collecting the face information of the user.
For example, when the user a sends a control instruction, the face recognition function of the user terminal is triggered, and the user terminal collects face information of the user a in a shooting mode.
309. And comparing the collected face information of the user with the network authentication information.
For example, the collected face information of the user A is compared with the network authentication information of the specified user.
310. And if the comparison result is consistent, sending a control instruction to the server.
For example, if the similarity between the face information of the user a and the avatar information of the network authentication information of the designated user is greater than a first threshold (the first threshold may be 95%), the comparison result between the face information of the user a and the network authentication information of the designated user is consistent. And if the comparison result is consistent, the user A is the designated user, and the user terminal sends a control instruction to the server. The control instruction can control the opening of the vehicle door, and the control instruction comprises face information of a user A.
By implementing the embodiment of the application, the face recognition technology can be utilized to ensure that the remote vehicle control system can only be controlled by a specified user group, and the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.
Fig. 4 is a flowchart of a vehicle control method proposed by the present application, applied to a server, where the method includes the following steps:
401. and receiving a control instruction sent by the user terminal.
Specifically, after the user terminal activates the vehicle-mounted device, the server establishes a communication connection with the vehicle-mounted device. The server receives a control instruction sent by the user terminal, and the control instruction can instruct the vehicle-mounted equipment to complete corresponding operations, such as vehicle door opening and vehicle starting. The control instruction comprises the user face information collected by the user terminal.
402. And acquiring network authentication information.
Specifically, network authentication information of a specified user group is obtained, and the network authentication information includes an online function certificate of the resident identification card.
For example, many software platforms have been cooperated with the ministry of public security to have the function of creating or displaying the on-line functional certificate of the resident identification card, or later a special software for the on-line functional certificate of the resident identification card may be provided, and the SDK may be provided to enable other software platforms to access, for example: software a may invoke SDK access provided by software B and then obtain network authentication information within software B, including personal avatar and identity information.
403. And comparing the face information of the user with the network authentication information.
Specifically, the face information of the user is compared with the network authentication information of the specified user to verify the identity information of the user.
Specifically, when the similarity between the user face information and the network authentication information is greater than a first threshold, the comparison result between the user face information and the network authentication information is consistent; when the similarity between the user face information and the network authentication information is smaller than or equal to a second threshold value, the comparison result between the user face information and the network authentication information is inconsistent; wherein the first threshold is greater than the second threshold.
404. And if the comparison result is consistent, sending the control instruction to the vehicle-mounted equipment.
Specifically, when the similarity between the user face information and the network authentication information of the designated user is greater than a first threshold, the comparison result between the user face information and the network authentication information of the designated user is consistent, and the first threshold may be 95%. If the comparison result is consistent, the user identity is the designated user, and the server sends the control instruction to the vehicle-mounted equipment. The control instruction instructs the vehicle-mounted equipment to complete corresponding actions, such as controlling the vehicle door to be opened and controlling the vehicle lamp to be opened.
By implementing the embodiment of the application, the face recognition technology can be utilized to ensure that the remote vehicle control system can only be controlled by a specified user group, and the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.
In order to facilitate understanding of the technical solution of the present invention, the present invention is further described below with reference to a specific application scenario embodiment.
Referring to fig. 5, fig. 5 is a block diagram of a vehicle control system according to the present application. As shown in fig. 5, the vehicle control system includes, but is not limited to, a user terminal, a server, and an in-vehicle device. The user terminal, the server and the vehicle-mounted device are in communication connection, and the communication connection mode among the user terminal, the server and the vehicle-mounted device is not limited uniquely in the embodiment of the application.
The server receives a control instruction sent by a user terminal, wherein the control instruction comprises user A face information collected by the user terminal, and the control instruction indicates that a vehicle door is opened; the server acquires network authentication information of a designated user group; the server compares the face information of the user A with the network authentication information of the specified user; and when the similarity between the face information of the user A and the network authentication information of the specified user is more than 95%, the comparison result between the face information of the user A and the network authentication information of the specified user is consistent, and the server sends the control instruction to the vehicle-mounted equipment to control the opening of the vehicle door.
By implementing the embodiment of the application, the face recognition technology can be utilized to ensure that the remote vehicle control system can only be controlled by a specified user group, and the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.
Fig. 6 is a schematic structural diagram of a user terminal according to the present application, where the apparatus includes:
afirst collecting unit 601, configured to collect face information of any one of a plurality of users, where the users can control a vehicle;
a first obtainingunit 602, configured to obtain network authentication information, where the network authentication information includes an online function credential of a resident identification card;
a comparingunit 603, configured to compare the collected user face information with the network authentication information;
a sendingunit 604, configured to send a control instruction to a server if the comparison result is consistent, where the control instruction is used to control a vehicle, and the control instruction includes the collected user face information.
Further, the above apparatus further comprises:
afirst receiving unit 605, configured to receive a login request;
asecond collecting unit 606, configured to collect face information of any user among the multiple users;
a second obtainingunit 607, configured to obtain registration information of the user and log in when the face information of the user is consistent with the network authentication information;
a third obtainingunit 608, configured to, when the registration information of the user is not obtained, obtain the registration information of the user from the server according to the network authentication information, and perform login;
asecond receiving unit 609, configured to receive activation information of the vehicle-mounted device after the user logs in;
an activatingunit 610, configured to activate the vehicle-mounted device according to the activation information, so that a connection is established between the vehicle-mounted device and the server.
It is understood that the specific implementation of the apparatus shown in fig. 6 can also refer to the methods shown in fig. 1, fig. 2 and fig. 3, and will not be described in detail here.
In the embodiment of the present application, thefirst collecting unit 601 collects face information of any one of a plurality of users, where the users can control a vehicle; a first obtainingunit 602 obtains network authentication information, where the network authentication information includes an online function certificate of a resident identification card; the comparingunit 603 compares the collected face information of the user with the network authentication information; if the comparison result is consistent, the sendingunit 604 sends a control instruction to the server, where the control instruction is used to control the vehicle, and the control instruction includes the collected face information of the user. Therefore, the face recognition technology can be utilized in the embodiment of the application, the remote vehicle control system can be controlled only by a designated user group, and the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.
Fig. 7 is a schematic structural diagram of a server according to the present application, where the apparatus includes:
a receivingunit 701, configured to receive a control instruction sent by a user terminal, where the control instruction includes face information of any one of multiple users collected by the user terminal;
an obtainingunit 702, configured to obtain network authentication information, where the network authentication information includes an online function credential of a resident identification card;
a comparingunit 703, configured to compare the user face information with the network authentication information;
a sendingunit 704, configured to send the control instruction to the vehicle-mounted device if the comparison result is consistent.
It is understood that the specific implementation of the apparatus shown in fig. 7 can also refer to the methods shown in fig. 4 and 5, and detailed description thereof is omitted here.
In this embodiment of the present application, a receivingunit 701 receives a control instruction sent by a user terminal, where the control instruction includes face information of any one of a plurality of users collected by the user terminal; the obtainingunit 702 obtains network authentication information, where the network authentication information includes an online function certificate of a resident identification card; the comparingunit 703 compares the user face information with the network authentication information; if the comparison result is consistent, the sendingunit 704 sends the control command to the in-vehicle device. Therefore, the face recognition technology can be utilized in the embodiment of the application, the remote vehicle control system can be controlled only by a designated user group, and the occurrence of vehicle theft and vehicle control errors caused by factors such as account password leakage is reduced.
Referring to fig. 8, fig. 8 is a schematic structural diagram of another ue according to an embodiment of the present disclosure. The device includes: at least oneprocess 801, such as a Central Processing Unit (CPU), at least onememory 802, at least onetransceiver 803, and at least onebus 804. Thebus 804 may be a set of parallel data lines for interconnecting theprocessor 801, thememory 802, and thetransceiver 803; thememory 802 may be a Random Access Memory (RAM) or a non-volatile memory (ROM), such as at least one Read Only Memory (ROM).
Specifically, theprocessor 801 collects face information of any one of a plurality of users, wherein the plurality of users can control the vehicle; theprocessor 801 obtains network authentication information, where the network authentication information includes an online function credential of a resident identification card; theprocessor 801 compares the collected face information of the user with the network authentication information; if the comparison result is consistent, thetransceiver 803 sends a control instruction to the server, where the control instruction is used to control the vehicle, and the control instruction includes the collected face information of the user.
Further, thetransceiver 803 receives a login request; theprocessor 801 collects face information of any one of a plurality of users; when the face information of the user matches the network authentication information, theprocessor 801 acquires registration information of the user and logs in.
Further, when the registration information of the user is not acquired, theprocessor 801 acquires the registration information of the user from the server according to the network authentication information, and logs in.
Further, after the user logs in, thetransceiver 803 receives activation information of the vehicle-mounted device; theprocessor 801 activates the in-vehicle device according to the activation information, so that the in-vehicle device establishes a connection with the server.
In particular, thememory 802 may store program instructions, and theprocessor 801 may be configured to call the program instructions to perform the methods shown in fig. 1, fig. 2, and fig. 3.
Referring to fig. 9, fig. 9 is a schematic structural diagram of another server according to an embodiment of the present application. The device includes: at least oneprocess 901, such as a Central Processing Unit (CPU), at least onememory 902, at least onetransceiver 903, and at least onebus 904. Thebus 904 may be a set of parallel data lines for interconnecting theprocessor 901, thememory 902 and thetransceiver 903; thememory 902 may be a Random Access Memory (RAM) or a non-volatile memory (ROM), such as at least one Read Only Memory (ROM).
Specifically, thetransceiver 903 receives a control instruction sent by a user terminal, where the control instruction includes face information of any one of a plurality of users collected by the user terminal; theprocessor 901 obtains network authentication information, where the network authentication information includes an online function certificate of a resident identification card; theprocessor 901 compares the face information of the user with the network authentication information; if the comparison result is consistent, thetransceiver 903 transmits the control command to the in-vehicle device.
In particular, thememory 902 may store program instructions, and theprocessor 901 may be configured to call the program instructions to execute the methods shown in fig. 4 and 5.
It will be understood by those of ordinary skill in the art that all or part of the steps in the methods of the above embodiments may be performed by associated hardware instructed by a program, and the program may be stored in a computer-readable storage medium, where the storage medium includes Read Only Memory (ROM), Random Access Memory (RAM), Programmable Read Only Memory (PROM), Erasable Programmable Read Only Memory (EPROM), one-time programmable read only memory (OTPROM), Electrically Erasable Programmable Read Only Memory (EEPROM), a compact disc read only memory (CD-ROM), or other memory, a magnetic disk, or a magnetic tape memory, Or any other medium which can be used to carry or store data and which can be read by a computer.
The vehicle control method and the vehicle control device disclosed in the embodiments of the present application are described in detail above, and specific examples are applied herein to illustrate the principles and embodiments of the present application, and the description of the embodiments is only used to help understand the method and the core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, the specific embodiments and the application range may be changed. In view of the above, the description should not be taken as limiting the application.

Claims (8)

CN201910347647.4A2019-04-262019-04-26Vehicle control method and deviceActiveCN110077361B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910347647.4ACN110077361B (en)2019-04-262019-04-26Vehicle control method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910347647.4ACN110077361B (en)2019-04-262019-04-26Vehicle control method and device

Publications (2)

Publication NumberPublication Date
CN110077361A CN110077361A (en)2019-08-02
CN110077361Btrue CN110077361B (en)2022-02-22

Family

ID=67417179

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910347647.4AActiveCN110077361B (en)2019-04-262019-04-26Vehicle control method and device

Country Status (1)

CountryLink
CN (1)CN110077361B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110843726A (en)*2019-12-192020-02-28北京明朝万达科技股份有限公司Automobile door lock control system and method and vehicle
CN111046368B (en)*2019-12-302023-04-21重庆长安汽车股份有限公司Face recognition-based intelligent automobile cloud platform login method
CN117253279A (en)*2023-11-172023-12-19蓝色火焰科技成都有限公司Vehicle remote control method, device and medium based on vehicle-mounted information service unit

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103921759A (en)*2014-04-182014-07-16深圳市威富安防有限公司Intelligent anti-theft vehicle starting method and system
CN108734003A (en)*2018-05-222018-11-02深圳市商汤科技有限公司Auth method, device, equipment, storage medium and program

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103259800A (en)*2013-05-292013-08-21苏州福丰科技有限公司Internet login system based on face recognition and internet login method
CN108819900A (en)*2018-06-042018-11-16上海商汤智能科技有限公司Control method for vehicle and system, vehicle intelligent system, electronic equipment, medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103921759A (en)*2014-04-182014-07-16深圳市威富安防有限公司Intelligent anti-theft vehicle starting method and system
CN108734003A (en)*2018-05-222018-11-02深圳市商汤科技有限公司Auth method, device, equipment, storage medium and program

Also Published As

Publication numberPublication date
CN110077361A (en)2019-08-02

Similar Documents

PublicationPublication DateTitle
CN110808053B (en)Driver identity verification method and device and electronic equipment
CN110011811B (en)Vehicle unlocking authentication method and device based on terminal equipment
CN110758322B (en)Vehicle starting method, device, equipment and storage medium
CN111422163B (en)Vehicle ignition method and system based on face recognition and vehicle
US20140028472A1 (en)Method and Apparatus for User Authentication and Security
CN109389709B (en) Unlocking control system and unlocking control method
CN110077361B (en)Vehicle control method and device
CN114120487B (en)Automobile digital key management method, system, equipment and storage medium
CN112188431B (en)Intelligent vehicle entry system and method thereof
CN109446767A (en)Vehicle personnel identity safety verification method, equipment and system
CN113569218B (en)Vehicle-mounted account authorization method and vehicle-mounted terminal
CN106600083B (en)Management method and equipment for driver order taking
CN109067745B (en)Method for authenticating vehicle occupant, apparatus, device and storage medium therefor
CN112819997A (en)Method, apparatus and computer-readable storage medium for creating vehicle key
CN107437016B (en)Application control method and related product
CN108540357B (en)Voice control method and device and sound equipment
CN111862432B (en)Entrance guard verification method, entrance guard device, server and system
CN105227555B (en)Equipment starting method and system
CN110539723B (en)Automobile trunk control method and system, vehicle-mounted equipment and server
CN110288733A (en)Vehicle enters field control method and control system
CN110217194B (en)Shared automobile control method and device and electronic equipment
CN106797386B (en)Security verification method and device, terminal equipment and server
CN117690427A (en)Voice wakeup control method and device, electronic equipment and vehicle
CN110843728B (en)Automobile keyless starting method, automobile keyless starting equipment, storage medium and automobile keyless starting device
CN111907471B (en) Key prompting method, device, vehicle and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp