CN106994958A - Unmanned vehicle security control method and device - Google Patents
Unmanned vehicle security control method and device Download PDFInfo
- Publication number
- CN106994958A CN106994958A CN201710136734.6A CN201710136734A CN106994958A CN 106994958 A CN106994958 A CN 106994958A CN 201710136734 A CN201710136734 A CN 201710136734A CN 106994958 A CN106994958 A CN 106994958A
- Authority
- CN
- China
- Prior art keywords
- information
- unmanned vehicle
- identity information
- car owner
- security control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/102—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
- B60R25/252—Fingerprint recognition
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
- B60R25/257—Voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of unmanned vehicle security control method and device, and this method includes:The first identity information is gathered, and identification is carried out according to the first identity information, identifies whether the car owner of pre-authentication:It is then to control car door opening;It is no, then generate enabling solicited message and send to the mobile terminal of car owner;And, the configured information that mobile terminal is returned is received, and car door opening is controlled according to configured information or lock-out state is maintained.Wherein, enabling solicited message includes at least one of following:First identity information, to the recognition result of the first identity information.The present invention provides for unmanned vehicle and a kind of effective lends or lease security controlling mechanism.
Description
Technical field
The application is related to unmanned vehicle technology field, and in particular to a kind of unmanned vehicle security control method and device.
Background technology
The popularization and application of unmanned vehicle is expectable, because its price is more high compared to common vehicle, for nobody
For car owner, on the one hand in the presence of compared to common vehicle more urgent daily security demand, on the other hand also exist simultaneously
All kinds of security demands borrowed or lease under scene, for example, remotely easily judge and control whether to lend or lease, and trespasses
During vehicle security control, and vehicle after illegally being shifted security control etc. a variety of demands.
The security control technology scheme of current common vehicle is difficult to directly apply to unmanned vehicle, and can not meet above-mentioned need
Ask.
The content of the invention
In view of drawbacks described above of the prior art or deficiency, expect to provide one kind and meet that unmanned vehicle is daily, lend, lease peace
The unmanned vehicle security control method and device of guarantor's demand.
In a first aspect, the present invention provides a kind of unmanned vehicle security control method, this method includes:
The first identity information is gathered, and identification is carried out according to the first identity information, identifies whether the car owner of pre-authentication:
It is then to control car door opening;
It is no, then generate enabling solicited message and send to the mobile terminal of car owner;And,
The configured information that mobile terminal is returned is received, and car door opening is controlled according to configured information or lock-out state is maintained.
Wherein, enabling solicited message includes at least one of following:First identity information, to the identification knot of the first identity information
Really.
Second aspect, the present invention provides a kind of unmanned vehicle security control device, and the device includes:
Collecting unit, is configured to gather the first identity information;
Recognition unit, is configured to carry out identification according to the first identity information;
Control unit, is configured to control car door opening when recognition result is the car owner of pre-authentication, non-in recognition result
Enabling solicited message is generated during car owner, and, car door opening is controlled according to configured information or lock-out state is maintained;
Communication unit, is configured to send enabling solicited message to the mobile terminal of car owner, and, receive mobile terminal
The configured information of return.
Wherein, enabling solicited message includes at least one of following:First identity information, to the identification knot of the first identity information
Really.
The third aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory
Comprising the instruction that can be performed by the one or more processors to cause the one or more processors to perform according to of the invention each
The unmanned vehicle security control method that embodiment is provided.
Fourth aspect, the present invention also provides a kind of computer-readable recording medium for the computer program that is stored with, the calculating
Machine program makes computer perform the unmanned vehicle security control method provided according to various embodiments of the present invention.
The unmanned vehicle security control method and device that many embodiments of the present invention are provided to the mobile terminal of car owner by sending out
The enabling solicited message generated according to captured identity information and identification is sent so that car owner judges whether to lend or leases, and
The configured information control car door opening returned according to car owner or locking, so as to provide a kind of effective lend for unmanned vehicle
Or lease security controlling mechanism;
The unmanned vehicle security control method and device that some embodiments of the invention are provided in car door further by being forced
It is acquired during unlatching and identification, judges whether that forcing unmanned vehicle to stop starting and sent to car owner or police service platform alarms
Information, so as to further ensure that unmanned vehicle/lends/safety leased under scene daily;
The unmanned vehicle security control method and device that some embodiments of the invention are provided are further by the way that car door is forced
The identity information gathered during unlatching compares with police service information and judges whether alarm, further enhancing the security work(of unmanned vehicle
Energy;
The unmanned vehicle security control method and device that some embodiments of the invention are provided for car owner further by providing far
Journey inquires about the function of unmanned vehicle real time position, automatic Pilot route is configured for car owner, so as to illegally be shifted in unmanned vehicle
Afterwards/unmanned vehicle is lent or leased terminate after etc. scene unmanned vehicle of ordering sail back automatically, further meet all kinds of peaces of unmanned vehicle
Guarantor's demand.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other
Feature, objects and advantages will become more apparent upon:
The flow chart for the unmanned vehicle security control method that Fig. 1 provides for one embodiment of the invention.
Fig. 2 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 3.
Fig. 5 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
The structural representation for the unmanned vehicle security control device that Fig. 6 provides for one embodiment of the invention.
Fig. 7 is a kind of structural representation of preferred embodiment of Fig. 6 shown devices.
Fig. 8 is a kind of structural representation of preferred embodiment of Fig. 6 shown devices.
A kind of structural representation for equipment that Fig. 9 provides for one embodiment of the invention.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that, in order to
It is easy to illustrate only the part related to invention in description, accompanying drawing.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase
Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
The flow chart for the unmanned vehicle security control method that Fig. 1 provides for one embodiment of the invention.
As shown in figure 1, in the present embodiment, the unmanned vehicle security control method that the present invention is provided includes:
S10:The first identity information is gathered, and identification is carried out according to the first identity information, identifies whether pre-authentication
Car owner:
It is then to perform step S12:Control car door opening;
It is no, then perform step S13:Generate enabling solicited message and send to the mobile terminal of car owner;And,
S20:The configured information that mobile terminal is returned is received, and judges whether the configured information indicates to open car door:
Be, then it is same to perform step S12:Control car door opening;
It is no, then perform step S22:Car door is controlled to maintain lock-out state.
Wherein, enabling solicited message includes at least one of following:First identity information, to the identification knot of the first identity information
Really.
Specifically, in the present embodiment, the first identity information and the second identity information described below are main operator seat
Image outside vehicle window, the mode of identification is to carry out recognition of face to acquired image, is with the personnel judged outside vehicle window
The car owner of no pre-authentication.If the car owner of pre-authentication exist it is more personal, judge the personnel whether pre-authentication it is many it is personal in its
In one.
For example, when main driving position vehicle windows of the car owner A close to unmanned vehicle, collecting includes the image of car owner A faces, passes through
Recognition of face, identifies the car owner that the personnel A in image is pre-authentication, then controls unmanned vehicle opening car door.
In another example, when main driving position vehicle windows of the personnel B close to unmanned vehicle, collecting includes the image of personnel B faces, leads to
Recognition of face is crossed, the car owner of personnel B in image not pre-authentication is identified, then according to acquired image and recognition of face knot
Fruit generation enabling solicited message is simultaneously sent to car owner A mobile terminal, so that car owner A is checked and judges whether to lend unmanned vehicle
Or lease to personnel B.If car owner A checks the image of enabling solicited message, confirm the personnel B in image to lend or lease pair
As, you can the security control device in the configured information for agreeing to lend or lease unmanned vehicle, unmanned vehicle is returned to by mobile terminal
Receive after configured information, control car door opening;If car owner A has found that the personnel B in image is not lent or Lease object, can
Security control device in the configured information that unmanned vehicle was lent or leased to refusal, unmanned vehicle is returned to by mobile terminal and receives finger
Show after information, control car door maintains lock-out state.
In more embodiments, can also according to the actual requirements by the first identity information be configured to image information, voiceprint,
Different types of identity information such as finger print information, and corresponding identity information acquisition mode is configured, and, by identification
Mode correspondence is configured to different types of identification modes such as iris recognition, retina identification, Application on Voiceprint Recognition, fingerprint recognition,
Identical technique effect can be achieved.
Above-described embodiment to the mobile terminal of car owner by sending what is generated according to captured identity information and identification
Enabling solicited message so that car owner judges whether to lend or leases, and the configured information returned according to car owner control car door opening or
Locking, a kind of effective security controlling mechanism is lent or leases so as to be provided for unmanned vehicle.
Fig. 2 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
As shown in Fig. 2 in a preferred embodiment, also including after step S22:
S23:Show the refusal driving information generated according to configured information.
Specifically, in the present embodiment, if unmanned vehicle is lent or leased to configured information refusal, it can be generated according to configured information
Refuse driving information, and shown to inform the personnel outside unmanned vehicle by display device.
Wherein, refusal driving information is configurable to according to the selected text message prestored of configured information, audio letter
Breath or video information etc., text message, audio-frequency information or video information that can also be configured to included in configured information etc..
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
As shown in figure 3, in a preferred embodiment, also including after step S22:
S30:When receiving car door and being forced the information warning opened, the second body of current enforced opening car door personnel is gathered
Part information, and identification is carried out according to second identity information, identify whether the car owner of pre-authentication:
It is no, then perform step S32:Control unmanned vehicle to stop starting, generate the first warning message, and send to the shifting of car owner
Dynamic terminal judges whether alarm for car owner, or, sends to police service platform.
Wherein, the first warning message includes at least one of following:Second identity information, to the identification knot of the second identity information
Really.
Specifically, the configuration mode of the second identity information, acquisition mode and identification method and above-mentioned first identity information phase
Together.
For example, after the car owner A personnel B refused to outside unmanned vehicle lend or leased the unmanned vehicle, personnel B attempts pressure and opened
Open the car door of unmanned vehicle.Unmanned vehicle detects car door and is forced unlatching, generates information warning and is sent to security control device.Peace
Protect control device and receive information warning, collection image simultaneously carries out identification, identify personnel B in image not pre-authentication
Car owner, then control unmanned vehicle stop start, generate the first warning message, and send to car owner A mobile terminal for car owner A
Judge whether alarm.
In another example, in the car door of car owner's A enforced opening unmanned vehicles, unmanned vehicle detects car door and is forced unlatching, generation
Information warning is simultaneously sent to security control device.Security control device receives information warning, gathers image and carries out identity knowledge
Not, the car owner that the personnel A in image is pre-authentication is identified, then does not perform above-mentioned steps S32.
Above-described embodiment further by being acquired and identification when car door is forced and opened, judges whether to force
Unmanned vehicle stops starting simultaneously sends warning message to car owner or police service platform, thus further ensured unmanned vehicle it is daily/go out
By means of/lease scene under safety.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 3.
As shown in figure 4, in a preferred embodiment, also including after step S30:
S33:The second identity information is compared according to the police service information of pre-download, if being matched, according to matching
As a result generate the second warning message and send to police service platform.
Wherein, police service information includes at least one of following:Wanted message, children are missing warning information, and other populations are abducted
Relevant information.
In more embodiments, also step S33 can be configured to according to the actual requirements the second identity information and high in the clouds is each
Data message in class database is compared, and identical technique effect can be achieved.
Above-described embodiment further by the way that car door is forced to open when the identity information that is gathered compared with police service information
And judge whether alarm, it further enhancing the security function of unmanned vehicle.
Fig. 5 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
As shown in figure 5, in a preferred embodiment, further comprising after step S12 or step S32:
S40:When receiving the position enquiring request of mobile terminal transmission, real-time position information is returned to, for checking nobody
The real time position of car simultaneously configures traveling to the automatic Pilot information of appointed place;And,
S50:Automatic driving information is received, controls unmanned vehicle to travel to appointed place according to the automatic Pilot information.
Specifically, on the one hand, after lending or leasing and terminate, borrow or car rental personnel without unmanned vehicle be sailed
Return, car owner A can be directly by the position of mobile terminal enquiry unmanned vehicle, and according to the real time position of return in the terminal
Automatic running route or traveling destination are configured, so as to generate automatic Pilot information and send to unmanned vehicle, unmanned vehicle is received from
Automatic running is to appointed place after dynamic driving information.
On the other hand, after criminal by force illegally shifts unmanned vehicle, again may be by above-mentioned steps S40 and
The place that S50 control unmanned vehicle automatic runnings are specified to car owner A.
Above-described embodiment is configured further by providing the function of remote inquiry unmanned vehicle real time position for car owner for car owner
Automatic Pilot route, so as in unmanned vehicle by illegal shifted after/unmanned vehicle the scene such as lends or leases after terminating and order nothing
People's car is sailed back automatically, further meets all kinds of security demands of unmanned vehicle.
The structural representation for the unmanned vehicle security control device that Fig. 6 provides for one embodiment of the invention.Device shown in Fig. 6
Any unmanned vehicle security control method performed shown in above-mentioned Fig. 1-5 can be corresponded to.
As shown in fig. 6, in the present embodiment, the unmanned vehicle security control device 10 that the present invention is provided includes collecting unit
11st, recognition unit 13, control unit 15 and communication unit 17.
Collecting unit 11 is configured to gather the first identity information;
Recognition unit 13 is configured to carry out identification according to the first identity information;
Control unit 15 is configured to control car door opening when recognition result is the car owner of pre-authentication, non-in recognition result
Enabling solicited message is generated during car owner, and, car door opening is controlled according to configured information or lock-out state is maintained;
Communication unit 17 is configured to send enabling solicited message to the mobile terminal 30 of car owner, and, receive the shifting
The configured information that dynamic terminal 30 is returned.
Wherein, enabling solicited message includes at least one of following:First identity information, to the identification knot of the first identity information
Really.
Specifically, in the present embodiment, unmanned vehicle security control device 10 is integrated in the car body of unmanned vehicle, to reduce quilt
Criminal breaks the probability directly destroyed after car door, in more embodiments, and unmanned vehicle security control device 10 can also match somebody with somebody
Individually integrated device is set to, and inside unmanned vehicle.The security controlling mechanism of unmanned vehicle security control device 10
Method with reference to shown in above-mentioned Fig. 1, here is omitted.
In a preferred embodiment, control unit 15 is further configured to drive letter according to configured information generation refusal
Breath, and control the output equipment of unmanned vehicle to export refusal driving information.
In the present embodiment, the output equipment is the main driving position vehicle window as display device, can in more embodiments
All kinds of common output equipments such as all kinds of audio output apparatus or picture output device are configured to according to the actual requirements.
In a preferred embodiment, control unit 15 is further configured to send receiving unmanned vehicle control unit 20
Car door when being forced the information warning opened, control collecting unit 11 gathers the second identity of current enforced opening car door personnel
Information, control recognition unit 13 carries out identification according to the second identity information, and, in the identification knot to the second identity information
Control unmanned vehicle stops starting when fruit is non-car owner, generates the first warning message;
Communication unit 17 is further configured to the first warning message sending the mobile terminal 30 to car owner for car owner
Judge whether alarm, or, send to police service platform.
Wherein, the first warning message includes at least one of following:Second identity information, to the identification knot of the second identity information
Really.The security controlling mechanism of the preferred embodiment can refer to the method shown in above-mentioned Fig. 3, and here is omitted.
Fig. 7 is a kind of structural representation of preferred embodiment of Fig. 6 shown devices.Device shown in Fig. 7, which can be corresponded to, to be held
Method shown in row Fig. 4.
As shown in fig. 7, in a preferred embodiment, unmanned vehicle security control device 10 also includes police service information memory cell
18, it is configured to store the police service information of pre-download.
Recognition unit 13 is further configured to that the second identity information is compared according to police service information;
Control unit 15 is further configured to, when the comparison is obtained and matched, the second alarm signal be generated according to matching result
Breath;
Communication unit 17 is further configured to send the second warning message to police service platform.
Wherein, police service information includes at least one of following:Wanted message, children are missing warning information, and other populations are abducted
Relevant information.
In a preferred embodiment, control unit 15 is further configured to receive mobile terminal 30 in communication unit 17
During the position enquiring request of transmission, obtain real-time position information to unmanned vehicle control unit 20 and returned to by communication unit 17
Control terminal 30, so that car owner checks the real time position of unmanned vehicle and configures traveling to the automatic Pilot information of appointed place;With
And, when communication unit 17 receives automatic Pilot information, control unmanned vehicle to travel to appointed place according to automatic Pilot information.
The security controlling mechanism of the preferred embodiment can refer to the method shown in above-mentioned Fig. 5, and here is omitted.
Fig. 8 is a kind of structural representation of preferred embodiment of Fig. 6 shown devices.
As shown in figure 8, in a preferred embodiment, unmanned vehicle security control device 10 also includes identification authenticating unit 19,
It is configured to the identity information of certification car owner.
Specifically, in the present embodiment, recognition unit 13 need not be to the database configured in diverse locations such as cloud server terminals
The identity information of car owner pre-authentication is separately obtained, and can directly obtain 19 certifications of identification authenticating unit and the car owner stored
Identity information.
A kind of structural representation for equipment that Fig. 9 provides for one embodiment of the invention.
As shown in figure 9, as on the other hand, present invention also provides a kind of equipment 900, including one or more centres
Unit (CPU) 901 is managed, it can add according to the program being stored in read-only storage (ROM) 902 or from storage part 908
The program that is downloaded in random access storage device (RAM) 903 and perform various appropriate actions and processing.In RAM903, also deposit
Contain equipment 900 and operate required various programs and data.CPU901, ROM902 and RAM903 pass through the phase each other of bus 904
Even.Input/output (I/O) interface 905 is also connected to bus 904.
I/O interfaces 905 are connected to lower component:Importation 906 including keyboard, mouse etc.;Penetrated including such as negative electrode
The output par, c 907 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 908 including hard disk etc.;
And the communications portion 909 of the NIC including LAN card, modem etc..Communications portion 909 via such as because
The network of spy's net performs communication process.Driver 910 is also according to needing to be connected to I/O interfaces 905.Detachable media 911, such as
Disk, CD, magneto-optic disk, semiconductor memory etc., are arranged on driver 910, in order to read from it as needed
Computer program be mounted into as needed storage part 908.
Especially, in accordance with an embodiment of the present disclosure, the unmanned vehicle security control method of any of the above-described embodiment description can be with
It is implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer program product, it is included visibly
Comprising computer program on a machine-readable medium, the computer program, which is included, to be used to perform unmanned vehicle security control method
Program code.In such embodiments, the computer program can be downloaded and be pacified from network by communications portion 909
Dress, and/or be mounted from detachable media 911.
As another aspect, present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium
Matter can be the computer-readable recording medium included in the device of above-described embodiment;Can also be individualism, it is unassembled
Enter the computer-readable recording medium in equipment.Computer-readable recording medium storage has one or more than one program, should
Program is used for performing the unmanned vehicle security control method for being described in the application by one or more than one processor.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of various embodiments of the invention, method and computer journey
Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation
The part of one module of table, program segment or code, the part of the module, program segment or code is used comprising one or more
In the executable instruction for realizing defined logic function.It should also be noted that in some realizations as replacement, being marked in square frame
The function of note can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actually
It can perform substantially in parallel, they can also be performed in the opposite order sometimes, depending on this is according to involved function.Also
It is noted that the combination of each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart, Ke Yitong
Function as defined in performing or the special hardware based system of operation is crossed to realize, or can be by specialized hardware with calculating
The combination of machine instruction is realized.
Being described in unit or module involved in the embodiment of the present application can be realized by way of software, can also
Realized by way of hardware.Described unit or module can also be set within a processor, for example, each unit can
With the software program being provided in computer or intelligent movable equipment or the hardware unit being separately configured.Wherein, this
The title of a little units or module does not constitute the restriction to the unit or module in itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art
Member should be appreciated that invention scope involved in the application, however it is not limited to the technology of the particular combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the application design, is appointed by above-mentioned technical characteristic or its equivalent feature
Other technical schemes formed by meaning combination.Such as features described above has similar functions with (but not limited to) disclosed herein
Technical characteristic carry out mutually replace formed by technical scheme.
Claims (14)
1. a kind of unmanned vehicle security control method, it is characterised in that methods described includes:
The first identity information is gathered, and identification is carried out according to first identity information, identifies whether the car owner of pre-authentication:
It is then to control car door opening;
It is no, then generate enabling solicited message and send to the mobile terminal of car owner;And,
The configured information that the mobile terminal is returned is received, and car door opening is controlled according to the configured information or locking shape is maintained
State;
Wherein, the enabling solicited message includes at least one of following:First identity information, to first identity information
Recognition result.
2. unmanned vehicle security control method according to claim 1, it is characterised in that described according to the configured information control
Car door processed maintains also to include after lock-out state:
Export the refusal driving information generated according to the configured information.
3. unmanned vehicle security control method according to claim 1, it is characterised in that also include:
When receiving car door and being forced the information warning opened, the second identity information of current enforced opening car door personnel is gathered,
And identification is carried out according to second identity information, identify whether the car owner of pre-authentication:
It is no, then control unmanned vehicle to stop starting, generate the first warning message, and send to the mobile terminal of car owner so that car owner sentences
It is disconnected whether to alarm, or, send to police service platform;
Wherein, first warning message includes at least one of following:Second identity information, to second identity information
Recognition result.
4. unmanned vehicle security control method according to claim 3, it is characterised in that described according to the second body gathered
Part information, which carries out identification, also to be included:
Second identity information is compared according to the police service information of pre-download, if being matched, according to matching result
Generate the second warning message and send to police service platform;
Wherein, the police service information includes at least one of following:Wanted message, children are missing warning information, and other populations are abducted
Relevant information.
5. the unmanned vehicle security control method according to claim any one of 1-4, it is characterised in that also include:
When receiving the position enquiring request that the mobile terminal is sent, real-time position information is returned to, for checking unmanned vehicle
Real time position simultaneously configures traveling to the automatic Pilot information of appointed place;
The automatic Pilot information is received, controls unmanned vehicle to travel to the appointed place according to the automatic Pilot information.
6. a kind of unmanned vehicle security control device, it is characterised in that described device includes:
Collecting unit, is configured to gather the first identity information;
Recognition unit, is configured to carry out identification according to first identity information;
Control unit, is configured to control car door opening when recognition result is the car owner of pre-authentication, non-described in recognition result
Enabling solicited message is generated during car owner, and, car door opening is controlled according to configured information or lock-out state is maintained;
Communication unit, is configured to send the enabling solicited message to the mobile terminal of car owner, and, receive the movement
The configured information that terminal is returned;
Wherein, the enabling solicited message includes at least one of following:First identity information, to first identity information
Recognition result.
7. unmanned vehicle security control device according to claim 6, it is characterised in that described control unit is further configured
Letter is driven for refusing driving information according to configured information generation, and controlling the output equipment of unmanned vehicle to export the refusal
Breath.
8. unmanned vehicle security control device according to claim 7, it is characterised in that the output equipment is included below extremely
One item missing:It is used as the main driving position vehicle window of display device, audio output apparatus, picture output device.
9. unmanned vehicle security control device according to claim 6, it is characterised in that described control unit is further configured
During for being forced the information warning opened in the car door for receiving the transmission of unmanned vehicle control unit, the collecting unit is controlled to adopt
Collect the second identity information of current enforced opening car door personnel, control the recognition unit to be carried out according to second identity information
Identification, and, to the recognition result of second identity information is non-car owner when control unmanned vehicle stop starting, generation
First warning message;
The communication unit is further configured to send the first warning message to the mobile terminal of car owner so that car owner judges
Whether alarm, or, send to police service platform;
Wherein, first warning message includes at least one of following:Second identity information, to second identity information
Recognition result.
10. unmanned vehicle security control device according to claim 9, it is characterised in that also include:
Police service information memory cell, is configured to store the police service information of pre-download;
The recognition unit is further configured to that second identity information is compared according to the police service information;
Described control unit is further configured to, when the comparison obtains matching, the second alarm signal be generated according to matching result
Breath;
The communication unit is further configured to send second warning message to police service platform;
Wherein, the police service information includes at least one of following:Wanted message, children are missing warning information, and other populations are abducted
Relevant information.
11. the unmanned vehicle security control device according to claim any one of 6-10, it is characterised in that described control unit
Further be configured to when the communication unit receives the position enquiring request that the mobile terminal is sent, to it is described nobody
Car obtains real-time position information and returns to the control terminal by the communication unit, for checking the real-time position of unmanned vehicle
Put and configure traveling to the automatic Pilot information of appointed place;And, receive the automatic Pilot letter in the communication unit
During breath, unmanned vehicle is controlled to travel to the appointed place according to the automatic Pilot information.
12. the unmanned vehicle security control device according to claim any one of 6-10, it is characterised in that also include:
Identification authenticating unit, is configured to the identity information of certification car owner.
13. a kind of equipment, it is characterised in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are by one or more of computing devices so that one or more of processors
Perform the method as any one of claim 1-5.
14. a kind of computer-readable recording medium for the computer program that is stored with, it is characterised in that the program is executed by processor
Methods of the Shi Shixian as any one of claim 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710136734.6A CN106994958A (en) | 2017-03-09 | 2017-03-09 | Unmanned vehicle security control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710136734.6A CN106994958A (en) | 2017-03-09 | 2017-03-09 | Unmanned vehicle security control method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106994958A true CN106994958A (en) | 2017-08-01 |
Family
ID=59431591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710136734.6A Pending CN106994958A (en) | 2017-03-09 | 2017-03-09 | Unmanned vehicle security control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106994958A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107704895A (en) * | 2017-08-17 | 2018-02-16 | 阿里巴巴集团控股有限公司 | A kind of business performs method and device |
CN107909735A (en) * | 2017-11-13 | 2018-04-13 | 广州大学 | Bicycle shared system and its control method based on intelligent management lockset |
CN109388368A (en) * | 2018-09-04 | 2019-02-26 | 顺丰科技有限公司 | Man-machine interaction method, device, unmanned vehicle and its storage medium |
CN109398310A (en) * | 2018-09-26 | 2019-03-01 | 深圳万智联合科技有限公司 | A kind of pilotless automobile |
CN110654345A (en) * | 2018-06-29 | 2020-01-07 | 比亚迪股份有限公司 | Vehicle control method and device and vehicle |
CN111554084A (en) * | 2020-05-19 | 2020-08-18 | 新石器慧通(北京)科技有限公司 | Method for searching unmanned vehicle |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005104327A (en) * | 2003-09-30 | 2005-04-21 | Matsushita Electric Ind Co Ltd | Vehicle moving system and vehicle moving method |
JP2005167943A (en) * | 2003-12-05 | 2005-06-23 | Denso Corp | Suspicious individual imaging apparatus |
CN1742146A (en) * | 2002-12-13 | 2006-03-01 | 松下电器产业株式会社 | Onboard device control system, onboard device controller, and onboard device control method |
CN103057518A (en) * | 2013-01-29 | 2013-04-24 | 阿坝师范高等专科学校 | Car burglar alarm method and device and car burglar alarm system |
CN103456055A (en) * | 2012-05-29 | 2013-12-18 | 沈阳晨讯希姆通科技有限公司 | Door control device, mobile terminal, electronic security system and method thereof |
CN104494564A (en) * | 2014-12-22 | 2015-04-08 | 清华大学苏州汽车研究院(吴江) | Vehicle anti-theft system based on human face recognition |
CN204323291U (en) * | 2014-11-20 | 2015-05-13 | 南京信息工程大学 | Based on the Vehicle Anti-Theft System of cloud computing |
CN204415338U (en) * | 2014-12-22 | 2015-06-24 | 清华大学苏州汽车研究院(吴江) | A kind of Vehicle Anti-Theft System based on recognition of face |
CN105109451A (en) * | 2015-08-26 | 2015-12-02 | 邹民勇 | Automobile security system and method for guarding against theft through automobile security system |
CN105346483A (en) * | 2015-11-04 | 2016-02-24 | 常州加美科技有限公司 | Man-machine interactive system for unmanned vehicle |
CN106218581A (en) * | 2016-08-26 | 2016-12-14 | 张培 | A kind of vehicle-mounted antitheft security system |
CN106296950A (en) * | 2016-09-30 | 2017-01-04 | 深圳市商汤科技有限公司 | A kind of gate control system based on recognition of face |
CN106314356A (en) * | 2016-08-22 | 2017-01-11 | 乐视控股(北京)有限公司 | Control method and control device of vehicle and vehicle |
CN106335469A (en) * | 2016-09-04 | 2017-01-18 | 深圳市云智易联科技有限公司 | Vehicle-mounted authentication method, system, vehicle-mounted device, mobile terminal and server |
-
2017
- 2017-03-09 CN CN201710136734.6A patent/CN106994958A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1742146A (en) * | 2002-12-13 | 2006-03-01 | 松下电器产业株式会社 | Onboard device control system, onboard device controller, and onboard device control method |
JP2005104327A (en) * | 2003-09-30 | 2005-04-21 | Matsushita Electric Ind Co Ltd | Vehicle moving system and vehicle moving method |
JP2005167943A (en) * | 2003-12-05 | 2005-06-23 | Denso Corp | Suspicious individual imaging apparatus |
CN103456055A (en) * | 2012-05-29 | 2013-12-18 | 沈阳晨讯希姆通科技有限公司 | Door control device, mobile terminal, electronic security system and method thereof |
CN103057518A (en) * | 2013-01-29 | 2013-04-24 | 阿坝师范高等专科学校 | Car burglar alarm method and device and car burglar alarm system |
CN204323291U (en) * | 2014-11-20 | 2015-05-13 | 南京信息工程大学 | Based on the Vehicle Anti-Theft System of cloud computing |
CN104494564A (en) * | 2014-12-22 | 2015-04-08 | 清华大学苏州汽车研究院(吴江) | Vehicle anti-theft system based on human face recognition |
CN204415338U (en) * | 2014-12-22 | 2015-06-24 | 清华大学苏州汽车研究院(吴江) | A kind of Vehicle Anti-Theft System based on recognition of face |
CN105109451A (en) * | 2015-08-26 | 2015-12-02 | 邹民勇 | Automobile security system and method for guarding against theft through automobile security system |
CN105346483A (en) * | 2015-11-04 | 2016-02-24 | 常州加美科技有限公司 | Man-machine interactive system for unmanned vehicle |
CN106314356A (en) * | 2016-08-22 | 2017-01-11 | 乐视控股(北京)有限公司 | Control method and control device of vehicle and vehicle |
CN106218581A (en) * | 2016-08-26 | 2016-12-14 | 张培 | A kind of vehicle-mounted antitheft security system |
CN106335469A (en) * | 2016-09-04 | 2017-01-18 | 深圳市云智易联科技有限公司 | Vehicle-mounted authentication method, system, vehicle-mounted device, mobile terminal and server |
CN106296950A (en) * | 2016-09-30 | 2017-01-04 | 深圳市商汤科技有限公司 | A kind of gate control system based on recognition of face |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107704895A (en) * | 2017-08-17 | 2018-02-16 | 阿里巴巴集团控股有限公司 | A kind of business performs method and device |
WO2019034040A1 (en) * | 2017-08-17 | 2019-02-21 | 阿里巴巴集团控股有限公司 | Service execution method and device |
TWI706342B (en) * | 2017-08-17 | 2020-10-01 | 香港商阿里巴巴集團服務有限公司 | Business execution method and device |
CN113570013A (en) * | 2017-08-17 | 2021-10-29 | 创新先进技术有限公司 | Service execution method and device |
TWI759939B (en) * | 2017-08-17 | 2022-04-01 | 開曼群島商創新先進技術有限公司 | Service execution method and device |
CN107909735A (en) * | 2017-11-13 | 2018-04-13 | 广州大学 | Bicycle shared system and its control method based on intelligent management lockset |
CN110654345A (en) * | 2018-06-29 | 2020-01-07 | 比亚迪股份有限公司 | Vehicle control method and device and vehicle |
CN109388368A (en) * | 2018-09-04 | 2019-02-26 | 顺丰科技有限公司 | Man-machine interaction method, device, unmanned vehicle and its storage medium |
CN109388368B (en) * | 2018-09-04 | 2022-08-12 | 顺丰科技有限公司 | Human-computer interaction method and device, unmanned vehicle and storage medium thereof |
CN109398310A (en) * | 2018-09-26 | 2019-03-01 | 深圳万智联合科技有限公司 | A kind of pilotless automobile |
CN111554084A (en) * | 2020-05-19 | 2020-08-18 | 新石器慧通(北京)科技有限公司 | Method for searching unmanned vehicle |
CN111554084B (en) * | 2020-05-19 | 2022-01-21 | 新石器慧通(北京)科技有限公司 | Method for searching unmanned vehicle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106994958A (en) | Unmanned vehicle security control method and device | |
CN108540579B (en) | Driver identity online monitoring method and device and storage medium | |
US11527079B2 (en) | Available vehicle parking space detection using machine learning | |
US10147249B1 (en) | Personal intermediary communication device | |
US20210295692A1 (en) | Available Parking Space Dispatch | |
CN112084942A (en) | Method and device for online monitoring of driver identity in vehicle and storage medium | |
CN103839318B (en) | The gate control system of a kind of remote centralized certification and method | |
CN106895553A (en) | Air-conditioning and its control method and device, alarm method and device | |
CN106530510A (en) | An intelligent express delivery cabinet, and an express delivery cabinet remote control system and method | |
Kamruzzaman et al. | AI-based computer vision using deep learning in 6G wireless networks | |
DE102021126878A1 (en) | SYSTEMS AND PROCEDURES FOR PARENT SECURITY OF A VEHICLE AGAINST MOTION WITH CHILD RECOGNITION | |
DE102021124261A1 (en) | Automated computerized identification of assets | |
CN111294567B (en) | Intelligent case monitoring management method based on Internet of things | |
CN107742268A (en) | The important machine-operated anti-terrorism crime prevention system of country and method | |
CN107230270A (en) | A kind of garage burglary-resisting system and processing method | |
CN112446988A (en) | Access control application method, device and storage medium | |
CN109741559A (en) | A kind of processing method and processing device managing garden safety | |
CN109658316A (en) | A kind of safe emergency advance warning management method in garden and device | |
CN210222869U (en) | A unmanned on duty system for oil depot | |
CN113807117A (en) | Vehicle security check method, system, device, equipment and storage medium | |
CN109035534A (en) | A kind of gate inhibition's monitoring method, controller and system | |
CN109345186A (en) | Business handling method and terminal device based on Internet of Things | |
CN210605849U (en) | Multifunctional intelligent digital management control device and intelligent management control device | |
CN106535168A (en) | Over-the-air (OTA) method and device with risk control function and equipment | |
CN114995167A (en) | Control method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170801 |
|
RJ01 | Rejection of invention patent application after publication |