CN106994958A - Unmanned vehicle security control method and device - Google Patents

Unmanned vehicle security control method and device Download PDF

Info

Publication number
CN106994958A
CN106994958A CN201710136734.6A CN201710136734A CN106994958A CN 106994958 A CN106994958 A CN 106994958A CN 201710136734 A CN201710136734 A CN 201710136734A CN 106994958 A CN106994958 A CN 106994958A
Authority
CN
China
Prior art keywords
information
unmanned vehicle
identity information
car owner
security control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710136734.6A
Other languages
Chinese (zh)
Inventor
朱鹏
李军
王道龙
李江利
靳茵茵
邹斌
白振龙
李祎嵩
韩基超
罗云峰
马天骄
罗建鼎
汪可凡
肖秋红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201710136734.6A priority Critical patent/CN106994958A/en
Publication of CN106994958A publication Critical patent/CN106994958A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/102Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry
    • B60R25/252Fingerprint recognition
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry
    • B60R25/257Voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of unmanned vehicle security control method and device, and this method includes:The first identity information is gathered, and identification is carried out according to the first identity information, identifies whether the car owner of pre-authentication:It is then to control car door opening;It is no, then generate enabling solicited message and send to the mobile terminal of car owner;And, the configured information that mobile terminal is returned is received, and car door opening is controlled according to configured information or lock-out state is maintained.Wherein, enabling solicited message includes at least one of following:First identity information, to the recognition result of the first identity information.The present invention provides for unmanned vehicle and a kind of effective lends or lease security controlling mechanism.

Description

Unmanned vehicle security control method and device
Technical field
The application is related to unmanned vehicle technology field, and in particular to a kind of unmanned vehicle security control method and device.
Background technology
The popularization and application of unmanned vehicle is expectable, because its price is more high compared to common vehicle, for nobody For car owner, on the one hand in the presence of compared to common vehicle more urgent daily security demand, on the other hand also exist simultaneously All kinds of security demands borrowed or lease under scene, for example, remotely easily judge and control whether to lend or lease, and trespasses During vehicle security control, and vehicle after illegally being shifted security control etc. a variety of demands.
The security control technology scheme of current common vehicle is difficult to directly apply to unmanned vehicle, and can not meet above-mentioned need Ask.
The content of the invention
In view of drawbacks described above of the prior art or deficiency, expect to provide one kind and meet that unmanned vehicle is daily, lend, lease peace The unmanned vehicle security control method and device of guarantor's demand.
In a first aspect, the present invention provides a kind of unmanned vehicle security control method, this method includes:
The first identity information is gathered, and identification is carried out according to the first identity information, identifies whether the car owner of pre-authentication:
It is then to control car door opening;
It is no, then generate enabling solicited message and send to the mobile terminal of car owner;And,
The configured information that mobile terminal is returned is received, and car door opening is controlled according to configured information or lock-out state is maintained.
Wherein, enabling solicited message includes at least one of following:First identity information, to the identification knot of the first identity information Really.
Second aspect, the present invention provides a kind of unmanned vehicle security control device, and the device includes:
Collecting unit, is configured to gather the first identity information;
Recognition unit, is configured to carry out identification according to the first identity information;
Control unit, is configured to control car door opening when recognition result is the car owner of pre-authentication, non-in recognition result Enabling solicited message is generated during car owner, and, car door opening is controlled according to configured information or lock-out state is maintained;
Communication unit, is configured to send enabling solicited message to the mobile terminal of car owner, and, receive mobile terminal The configured information of return.
Wherein, enabling solicited message includes at least one of following:First identity information, to the identification knot of the first identity information Really.
The third aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory Comprising the instruction that can be performed by the one or more processors to cause the one or more processors to perform according to of the invention each The unmanned vehicle security control method that embodiment is provided.
Fourth aspect, the present invention also provides a kind of computer-readable recording medium for the computer program that is stored with, the calculating Machine program makes computer perform the unmanned vehicle security control method provided according to various embodiments of the present invention.
The unmanned vehicle security control method and device that many embodiments of the present invention are provided to the mobile terminal of car owner by sending out The enabling solicited message generated according to captured identity information and identification is sent so that car owner judges whether to lend or leases, and The configured information control car door opening returned according to car owner or locking, so as to provide a kind of effective lend for unmanned vehicle Or lease security controlling mechanism;
The unmanned vehicle security control method and device that some embodiments of the invention are provided in car door further by being forced It is acquired during unlatching and identification, judges whether that forcing unmanned vehicle to stop starting and sent to car owner or police service platform alarms Information, so as to further ensure that unmanned vehicle/lends/safety leased under scene daily;
The unmanned vehicle security control method and device that some embodiments of the invention are provided are further by the way that car door is forced The identity information gathered during unlatching compares with police service information and judges whether alarm, further enhancing the security work(of unmanned vehicle Energy;
The unmanned vehicle security control method and device that some embodiments of the invention are provided for car owner further by providing far Journey inquires about the function of unmanned vehicle real time position, automatic Pilot route is configured for car owner, so as to illegally be shifted in unmanned vehicle Afterwards/unmanned vehicle is lent or leased terminate after etc. scene unmanned vehicle of ordering sail back automatically, further meet all kinds of peaces of unmanned vehicle Guarantor's demand.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other Feature, objects and advantages will become more apparent upon:
The flow chart for the unmanned vehicle security control method that Fig. 1 provides for one embodiment of the invention.
Fig. 2 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 3.
Fig. 5 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
The structural representation for the unmanned vehicle security control device that Fig. 6 provides for one embodiment of the invention.
Fig. 7 is a kind of structural representation of preferred embodiment of Fig. 6 shown devices.
Fig. 8 is a kind of structural representation of preferred embodiment of Fig. 6 shown devices.
A kind of structural representation for equipment that Fig. 9 provides for one embodiment of the invention.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that, in order to It is easy to illustrate only the part related to invention in description, accompanying drawing.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
The flow chart for the unmanned vehicle security control method that Fig. 1 provides for one embodiment of the invention.
As shown in figure 1, in the present embodiment, the unmanned vehicle security control method that the present invention is provided includes:
S10:The first identity information is gathered, and identification is carried out according to the first identity information, identifies whether pre-authentication Car owner:
It is then to perform step S12:Control car door opening;
It is no, then perform step S13:Generate enabling solicited message and send to the mobile terminal of car owner;And,
S20:The configured information that mobile terminal is returned is received, and judges whether the configured information indicates to open car door:
Be, then it is same to perform step S12:Control car door opening;
It is no, then perform step S22:Car door is controlled to maintain lock-out state.
Wherein, enabling solicited message includes at least one of following:First identity information, to the identification knot of the first identity information Really.
Specifically, in the present embodiment, the first identity information and the second identity information described below are main operator seat Image outside vehicle window, the mode of identification is to carry out recognition of face to acquired image, is with the personnel judged outside vehicle window The car owner of no pre-authentication.If the car owner of pre-authentication exist it is more personal, judge the personnel whether pre-authentication it is many it is personal in its In one.
For example, when main driving position vehicle windows of the car owner A close to unmanned vehicle, collecting includes the image of car owner A faces, passes through Recognition of face, identifies the car owner that the personnel A in image is pre-authentication, then controls unmanned vehicle opening car door.
In another example, when main driving position vehicle windows of the personnel B close to unmanned vehicle, collecting includes the image of personnel B faces, leads to Recognition of face is crossed, the car owner of personnel B in image not pre-authentication is identified, then according to acquired image and recognition of face knot Fruit generation enabling solicited message is simultaneously sent to car owner A mobile terminal, so that car owner A is checked and judges whether to lend unmanned vehicle Or lease to personnel B.If car owner A checks the image of enabling solicited message, confirm the personnel B in image to lend or lease pair As, you can the security control device in the configured information for agreeing to lend or lease unmanned vehicle, unmanned vehicle is returned to by mobile terminal Receive after configured information, control car door opening;If car owner A has found that the personnel B in image is not lent or Lease object, can Security control device in the configured information that unmanned vehicle was lent or leased to refusal, unmanned vehicle is returned to by mobile terminal and receives finger Show after information, control car door maintains lock-out state.
In more embodiments, can also according to the actual requirements by the first identity information be configured to image information, voiceprint, Different types of identity information such as finger print information, and corresponding identity information acquisition mode is configured, and, by identification Mode correspondence is configured to different types of identification modes such as iris recognition, retina identification, Application on Voiceprint Recognition, fingerprint recognition, Identical technique effect can be achieved.
Above-described embodiment to the mobile terminal of car owner by sending what is generated according to captured identity information and identification Enabling solicited message so that car owner judges whether to lend or leases, and the configured information returned according to car owner control car door opening or Locking, a kind of effective security controlling mechanism is lent or leases so as to be provided for unmanned vehicle.
Fig. 2 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
As shown in Fig. 2 in a preferred embodiment, also including after step S22:
S23:Show the refusal driving information generated according to configured information.
Specifically, in the present embodiment, if unmanned vehicle is lent or leased to configured information refusal, it can be generated according to configured information Refuse driving information, and shown to inform the personnel outside unmanned vehicle by display device.
Wherein, refusal driving information is configurable to according to the selected text message prestored of configured information, audio letter Breath or video information etc., text message, audio-frequency information or video information that can also be configured to included in configured information etc..
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
As shown in figure 3, in a preferred embodiment, also including after step S22:
S30:When receiving car door and being forced the information warning opened, the second body of current enforced opening car door personnel is gathered Part information, and identification is carried out according to second identity information, identify whether the car owner of pre-authentication:
It is no, then perform step S32:Control unmanned vehicle to stop starting, generate the first warning message, and send to the shifting of car owner Dynamic terminal judges whether alarm for car owner, or, sends to police service platform.
Wherein, the first warning message includes at least one of following:Second identity information, to the identification knot of the second identity information Really.
Specifically, the configuration mode of the second identity information, acquisition mode and identification method and above-mentioned first identity information phase Together.
For example, after the car owner A personnel B refused to outside unmanned vehicle lend or leased the unmanned vehicle, personnel B attempts pressure and opened Open the car door of unmanned vehicle.Unmanned vehicle detects car door and is forced unlatching, generates information warning and is sent to security control device.Peace Protect control device and receive information warning, collection image simultaneously carries out identification, identify personnel B in image not pre-authentication Car owner, then control unmanned vehicle stop start, generate the first warning message, and send to car owner A mobile terminal for car owner A Judge whether alarm.
In another example, in the car door of car owner's A enforced opening unmanned vehicles, unmanned vehicle detects car door and is forced unlatching, generation Information warning is simultaneously sent to security control device.Security control device receives information warning, gathers image and carries out identity knowledge Not, the car owner that the personnel A in image is pre-authentication is identified, then does not perform above-mentioned steps S32.
Above-described embodiment further by being acquired and identification when car door is forced and opened, judges whether to force Unmanned vehicle stops starting simultaneously sends warning message to car owner or police service platform, thus further ensured unmanned vehicle it is daily/go out By means of/lease scene under safety.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 3.
As shown in figure 4, in a preferred embodiment, also including after step S30:
S33:The second identity information is compared according to the police service information of pre-download, if being matched, according to matching As a result generate the second warning message and send to police service platform.
Wherein, police service information includes at least one of following:Wanted message, children are missing warning information, and other populations are abducted Relevant information.
In more embodiments, also step S33 can be configured to according to the actual requirements the second identity information and high in the clouds is each Data message in class database is compared, and identical technique effect can be achieved.
Above-described embodiment further by the way that car door is forced to open when the identity information that is gathered compared with police service information And judge whether alarm, it further enhancing the security function of unmanned vehicle.
Fig. 5 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
As shown in figure 5, in a preferred embodiment, further comprising after step S12 or step S32:
S40:When receiving the position enquiring request of mobile terminal transmission, real-time position information is returned to, for checking nobody The real time position of car simultaneously configures traveling to the automatic Pilot information of appointed place;And,
S50:Automatic driving information is received, controls unmanned vehicle to travel to appointed place according to the automatic Pilot information.
Specifically, on the one hand, after lending or leasing and terminate, borrow or car rental personnel without unmanned vehicle be sailed Return, car owner A can be directly by the position of mobile terminal enquiry unmanned vehicle, and according to the real time position of return in the terminal Automatic running route or traveling destination are configured, so as to generate automatic Pilot information and send to unmanned vehicle, unmanned vehicle is received from Automatic running is to appointed place after dynamic driving information.
On the other hand, after criminal by force illegally shifts unmanned vehicle, again may be by above-mentioned steps S40 and The place that S50 control unmanned vehicle automatic runnings are specified to car owner A.
Above-described embodiment is configured further by providing the function of remote inquiry unmanned vehicle real time position for car owner for car owner Automatic Pilot route, so as in unmanned vehicle by illegal shifted after/unmanned vehicle the scene such as lends or leases after terminating and order nothing People's car is sailed back automatically, further meets all kinds of security demands of unmanned vehicle.
The structural representation for the unmanned vehicle security control device that Fig. 6 provides for one embodiment of the invention.Device shown in Fig. 6 Any unmanned vehicle security control method performed shown in above-mentioned Fig. 1-5 can be corresponded to.
As shown in fig. 6, in the present embodiment, the unmanned vehicle security control device 10 that the present invention is provided includes collecting unit 11st, recognition unit 13, control unit 15 and communication unit 17.
Collecting unit 11 is configured to gather the first identity information;
Recognition unit 13 is configured to carry out identification according to the first identity information;
Control unit 15 is configured to control car door opening when recognition result is the car owner of pre-authentication, non-in recognition result Enabling solicited message is generated during car owner, and, car door opening is controlled according to configured information or lock-out state is maintained;
Communication unit 17 is configured to send enabling solicited message to the mobile terminal 30 of car owner, and, receive the shifting The configured information that dynamic terminal 30 is returned.
Wherein, enabling solicited message includes at least one of following:First identity information, to the identification knot of the first identity information Really.
Specifically, in the present embodiment, unmanned vehicle security control device 10 is integrated in the car body of unmanned vehicle, to reduce quilt Criminal breaks the probability directly destroyed after car door, in more embodiments, and unmanned vehicle security control device 10 can also match somebody with somebody Individually integrated device is set to, and inside unmanned vehicle.The security controlling mechanism of unmanned vehicle security control device 10 Method with reference to shown in above-mentioned Fig. 1, here is omitted.
In a preferred embodiment, control unit 15 is further configured to drive letter according to configured information generation refusal Breath, and control the output equipment of unmanned vehicle to export refusal driving information.
In the present embodiment, the output equipment is the main driving position vehicle window as display device, can in more embodiments All kinds of common output equipments such as all kinds of audio output apparatus or picture output device are configured to according to the actual requirements.
In a preferred embodiment, control unit 15 is further configured to send receiving unmanned vehicle control unit 20 Car door when being forced the information warning opened, control collecting unit 11 gathers the second identity of current enforced opening car door personnel Information, control recognition unit 13 carries out identification according to the second identity information, and, in the identification knot to the second identity information Control unmanned vehicle stops starting when fruit is non-car owner, generates the first warning message;
Communication unit 17 is further configured to the first warning message sending the mobile terminal 30 to car owner for car owner Judge whether alarm, or, send to police service platform.
Wherein, the first warning message includes at least one of following:Second identity information, to the identification knot of the second identity information Really.The security controlling mechanism of the preferred embodiment can refer to the method shown in above-mentioned Fig. 3, and here is omitted.
Fig. 7 is a kind of structural representation of preferred embodiment of Fig. 6 shown devices.Device shown in Fig. 7, which can be corresponded to, to be held Method shown in row Fig. 4.
As shown in fig. 7, in a preferred embodiment, unmanned vehicle security control device 10 also includes police service information memory cell 18, it is configured to store the police service information of pre-download.
Recognition unit 13 is further configured to that the second identity information is compared according to police service information;
Control unit 15 is further configured to, when the comparison is obtained and matched, the second alarm signal be generated according to matching result Breath;
Communication unit 17 is further configured to send the second warning message to police service platform.
Wherein, police service information includes at least one of following:Wanted message, children are missing warning information, and other populations are abducted Relevant information.
In a preferred embodiment, control unit 15 is further configured to receive mobile terminal 30 in communication unit 17 During the position enquiring request of transmission, obtain real-time position information to unmanned vehicle control unit 20 and returned to by communication unit 17 Control terminal 30, so that car owner checks the real time position of unmanned vehicle and configures traveling to the automatic Pilot information of appointed place;With And, when communication unit 17 receives automatic Pilot information, control unmanned vehicle to travel to appointed place according to automatic Pilot information. The security controlling mechanism of the preferred embodiment can refer to the method shown in above-mentioned Fig. 5, and here is omitted.
Fig. 8 is a kind of structural representation of preferred embodiment of Fig. 6 shown devices.
As shown in figure 8, in a preferred embodiment, unmanned vehicle security control device 10 also includes identification authenticating unit 19, It is configured to the identity information of certification car owner.
Specifically, in the present embodiment, recognition unit 13 need not be to the database configured in diverse locations such as cloud server terminals The identity information of car owner pre-authentication is separately obtained, and can directly obtain 19 certifications of identification authenticating unit and the car owner stored Identity information.
A kind of structural representation for equipment that Fig. 9 provides for one embodiment of the invention.
As shown in figure 9, as on the other hand, present invention also provides a kind of equipment 900, including one or more centres Unit (CPU) 901 is managed, it can add according to the program being stored in read-only storage (ROM) 902 or from storage part 908 The program that is downloaded in random access storage device (RAM) 903 and perform various appropriate actions and processing.In RAM903, also deposit Contain equipment 900 and operate required various programs and data.CPU901, ROM902 and RAM903 pass through the phase each other of bus 904 Even.Input/output (I/O) interface 905 is also connected to bus 904.
I/O interfaces 905 are connected to lower component:Importation 906 including keyboard, mouse etc.;Penetrated including such as negative electrode The output par, c 907 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 908 including hard disk etc.; And the communications portion 909 of the NIC including LAN card, modem etc..Communications portion 909 via such as because The network of spy's net performs communication process.Driver 910 is also according to needing to be connected to I/O interfaces 905.Detachable media 911, such as Disk, CD, magneto-optic disk, semiconductor memory etc., are arranged on driver 910, in order to read from it as needed Computer program be mounted into as needed storage part 908.
Especially, in accordance with an embodiment of the present disclosure, the unmanned vehicle security control method of any of the above-described embodiment description can be with It is implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer program product, it is included visibly Comprising computer program on a machine-readable medium, the computer program, which is included, to be used to perform unmanned vehicle security control method Program code.In such embodiments, the computer program can be downloaded and be pacified from network by communications portion 909 Dress, and/or be mounted from detachable media 911.
As another aspect, present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium Matter can be the computer-readable recording medium included in the device of above-described embodiment;Can also be individualism, it is unassembled Enter the computer-readable recording medium in equipment.Computer-readable recording medium storage has one or more than one program, should Program is used for performing the unmanned vehicle security control method for being described in the application by one or more than one processor.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of various embodiments of the invention, method and computer journey Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation The part of one module of table, program segment or code, the part of the module, program segment or code is used comprising one or more In the executable instruction for realizing defined logic function.It should also be noted that in some realizations as replacement, being marked in square frame The function of note can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actually It can perform substantially in parallel, they can also be performed in the opposite order sometimes, depending on this is according to involved function.Also It is noted that the combination of each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart, Ke Yitong Function as defined in performing or the special hardware based system of operation is crossed to realize, or can be by specialized hardware with calculating The combination of machine instruction is realized.
Being described in unit or module involved in the embodiment of the present application can be realized by way of software, can also Realized by way of hardware.Described unit or module can also be set within a processor, for example, each unit can With the software program being provided in computer or intelligent movable equipment or the hardware unit being separately configured.Wherein, this The title of a little units or module does not constitute the restriction to the unit or module in itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art Member should be appreciated that invention scope involved in the application, however it is not limited to the technology of the particular combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the application design, is appointed by above-mentioned technical characteristic or its equivalent feature Other technical schemes formed by meaning combination.Such as features described above has similar functions with (but not limited to) disclosed herein Technical characteristic carry out mutually replace formed by technical scheme.

Claims (14)

1. a kind of unmanned vehicle security control method, it is characterised in that methods described includes:
The first identity information is gathered, and identification is carried out according to first identity information, identifies whether the car owner of pre-authentication:
It is then to control car door opening;
It is no, then generate enabling solicited message and send to the mobile terminal of car owner;And,
The configured information that the mobile terminal is returned is received, and car door opening is controlled according to the configured information or locking shape is maintained State;
Wherein, the enabling solicited message includes at least one of following:First identity information, to first identity information Recognition result.
2. unmanned vehicle security control method according to claim 1, it is characterised in that described according to the configured information control Car door processed maintains also to include after lock-out state:
Export the refusal driving information generated according to the configured information.
3. unmanned vehicle security control method according to claim 1, it is characterised in that also include:
When receiving car door and being forced the information warning opened, the second identity information of current enforced opening car door personnel is gathered, And identification is carried out according to second identity information, identify whether the car owner of pre-authentication:
It is no, then control unmanned vehicle to stop starting, generate the first warning message, and send to the mobile terminal of car owner so that car owner sentences It is disconnected whether to alarm, or, send to police service platform;
Wherein, first warning message includes at least one of following:Second identity information, to second identity information Recognition result.
4. unmanned vehicle security control method according to claim 3, it is characterised in that described according to the second body gathered Part information, which carries out identification, also to be included:
Second identity information is compared according to the police service information of pre-download, if being matched, according to matching result Generate the second warning message and send to police service platform;
Wherein, the police service information includes at least one of following:Wanted message, children are missing warning information, and other populations are abducted Relevant information.
5. the unmanned vehicle security control method according to claim any one of 1-4, it is characterised in that also include:
When receiving the position enquiring request that the mobile terminal is sent, real-time position information is returned to, for checking unmanned vehicle Real time position simultaneously configures traveling to the automatic Pilot information of appointed place;
The automatic Pilot information is received, controls unmanned vehicle to travel to the appointed place according to the automatic Pilot information.
6. a kind of unmanned vehicle security control device, it is characterised in that described device includes:
Collecting unit, is configured to gather the first identity information;
Recognition unit, is configured to carry out identification according to first identity information;
Control unit, is configured to control car door opening when recognition result is the car owner of pre-authentication, non-described in recognition result Enabling solicited message is generated during car owner, and, car door opening is controlled according to configured information or lock-out state is maintained;
Communication unit, is configured to send the enabling solicited message to the mobile terminal of car owner, and, receive the movement The configured information that terminal is returned;
Wherein, the enabling solicited message includes at least one of following:First identity information, to first identity information Recognition result.
7. unmanned vehicle security control device according to claim 6, it is characterised in that described control unit is further configured Letter is driven for refusing driving information according to configured information generation, and controlling the output equipment of unmanned vehicle to export the refusal Breath.
8. unmanned vehicle security control device according to claim 7, it is characterised in that the output equipment is included below extremely One item missing:It is used as the main driving position vehicle window of display device, audio output apparatus, picture output device.
9. unmanned vehicle security control device according to claim 6, it is characterised in that described control unit is further configured During for being forced the information warning opened in the car door for receiving the transmission of unmanned vehicle control unit, the collecting unit is controlled to adopt Collect the second identity information of current enforced opening car door personnel, control the recognition unit to be carried out according to second identity information Identification, and, to the recognition result of second identity information is non-car owner when control unmanned vehicle stop starting, generation First warning message;
The communication unit is further configured to send the first warning message to the mobile terminal of car owner so that car owner judges Whether alarm, or, send to police service platform;
Wherein, first warning message includes at least one of following:Second identity information, to second identity information Recognition result.
10. unmanned vehicle security control device according to claim 9, it is characterised in that also include:
Police service information memory cell, is configured to store the police service information of pre-download;
The recognition unit is further configured to that second identity information is compared according to the police service information;
Described control unit is further configured to, when the comparison obtains matching, the second alarm signal be generated according to matching result Breath;
The communication unit is further configured to send second warning message to police service platform;
Wherein, the police service information includes at least one of following:Wanted message, children are missing warning information, and other populations are abducted Relevant information.
11. the unmanned vehicle security control device according to claim any one of 6-10, it is characterised in that described control unit Further be configured to when the communication unit receives the position enquiring request that the mobile terminal is sent, to it is described nobody Car obtains real-time position information and returns to the control terminal by the communication unit, for checking the real-time position of unmanned vehicle Put and configure traveling to the automatic Pilot information of appointed place;And, receive the automatic Pilot letter in the communication unit During breath, unmanned vehicle is controlled to travel to the appointed place according to the automatic Pilot information.
12. the unmanned vehicle security control device according to claim any one of 6-10, it is characterised in that also include:
Identification authenticating unit, is configured to the identity information of certification car owner.
13. a kind of equipment, it is characterised in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are by one or more of computing devices so that one or more of processors Perform the method as any one of claim 1-5.
14. a kind of computer-readable recording medium for the computer program that is stored with, it is characterised in that the program is executed by processor Methods of the Shi Shixian as any one of claim 1-5.
CN201710136734.6A 2017-03-09 2017-03-09 Unmanned vehicle security control method and device Pending CN106994958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710136734.6A CN106994958A (en) 2017-03-09 2017-03-09 Unmanned vehicle security control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710136734.6A CN106994958A (en) 2017-03-09 2017-03-09 Unmanned vehicle security control method and device

Publications (1)

Publication Number Publication Date
CN106994958A true CN106994958A (en) 2017-08-01

Family

ID=59431591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710136734.6A Pending CN106994958A (en) 2017-03-09 2017-03-09 Unmanned vehicle security control method and device

Country Status (1)

Country Link
CN (1) CN106994958A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704895A (en) * 2017-08-17 2018-02-16 阿里巴巴集团控股有限公司 A kind of business performs method and device
CN107909735A (en) * 2017-11-13 2018-04-13 广州大学 Bicycle shared system and its control method based on intelligent management lockset
CN109388368A (en) * 2018-09-04 2019-02-26 顺丰科技有限公司 Man-machine interaction method, device, unmanned vehicle and its storage medium
CN109398310A (en) * 2018-09-26 2019-03-01 深圳万智联合科技有限公司 A kind of pilotless automobile
CN110654345A (en) * 2018-06-29 2020-01-07 比亚迪股份有限公司 Vehicle control method and device and vehicle
CN111554084A (en) * 2020-05-19 2020-08-18 新石器慧通(北京)科技有限公司 Method for searching unmanned vehicle

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005104327A (en) * 2003-09-30 2005-04-21 Matsushita Electric Ind Co Ltd Vehicle moving system and vehicle moving method
JP2005167943A (en) * 2003-12-05 2005-06-23 Denso Corp Suspicious individual imaging apparatus
CN1742146A (en) * 2002-12-13 2006-03-01 松下电器产业株式会社 Onboard device control system, onboard device controller, and onboard device control method
CN103057518A (en) * 2013-01-29 2013-04-24 阿坝师范高等专科学校 Car burglar alarm method and device and car burglar alarm system
CN103456055A (en) * 2012-05-29 2013-12-18 沈阳晨讯希姆通科技有限公司 Door control device, mobile terminal, electronic security system and method thereof
CN104494564A (en) * 2014-12-22 2015-04-08 清华大学苏州汽车研究院(吴江) Vehicle anti-theft system based on human face recognition
CN204323291U (en) * 2014-11-20 2015-05-13 南京信息工程大学 Based on the Vehicle Anti-Theft System of cloud computing
CN204415338U (en) * 2014-12-22 2015-06-24 清华大学苏州汽车研究院(吴江) A kind of Vehicle Anti-Theft System based on recognition of face
CN105109451A (en) * 2015-08-26 2015-12-02 邹民勇 Automobile security system and method for guarding against theft through automobile security system
CN105346483A (en) * 2015-11-04 2016-02-24 常州加美科技有限公司 Man-machine interactive system for unmanned vehicle
CN106218581A (en) * 2016-08-26 2016-12-14 张培 A kind of vehicle-mounted antitheft security system
CN106296950A (en) * 2016-09-30 2017-01-04 深圳市商汤科技有限公司 A kind of gate control system based on recognition of face
CN106314356A (en) * 2016-08-22 2017-01-11 乐视控股(北京)有限公司 Control method and control device of vehicle and vehicle
CN106335469A (en) * 2016-09-04 2017-01-18 深圳市云智易联科技有限公司 Vehicle-mounted authentication method, system, vehicle-mounted device, mobile terminal and server

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1742146A (en) * 2002-12-13 2006-03-01 松下电器产业株式会社 Onboard device control system, onboard device controller, and onboard device control method
JP2005104327A (en) * 2003-09-30 2005-04-21 Matsushita Electric Ind Co Ltd Vehicle moving system and vehicle moving method
JP2005167943A (en) * 2003-12-05 2005-06-23 Denso Corp Suspicious individual imaging apparatus
CN103456055A (en) * 2012-05-29 2013-12-18 沈阳晨讯希姆通科技有限公司 Door control device, mobile terminal, electronic security system and method thereof
CN103057518A (en) * 2013-01-29 2013-04-24 阿坝师范高等专科学校 Car burglar alarm method and device and car burglar alarm system
CN204323291U (en) * 2014-11-20 2015-05-13 南京信息工程大学 Based on the Vehicle Anti-Theft System of cloud computing
CN104494564A (en) * 2014-12-22 2015-04-08 清华大学苏州汽车研究院(吴江) Vehicle anti-theft system based on human face recognition
CN204415338U (en) * 2014-12-22 2015-06-24 清华大学苏州汽车研究院(吴江) A kind of Vehicle Anti-Theft System based on recognition of face
CN105109451A (en) * 2015-08-26 2015-12-02 邹民勇 Automobile security system and method for guarding against theft through automobile security system
CN105346483A (en) * 2015-11-04 2016-02-24 常州加美科技有限公司 Man-machine interactive system for unmanned vehicle
CN106314356A (en) * 2016-08-22 2017-01-11 乐视控股(北京)有限公司 Control method and control device of vehicle and vehicle
CN106218581A (en) * 2016-08-26 2016-12-14 张培 A kind of vehicle-mounted antitheft security system
CN106335469A (en) * 2016-09-04 2017-01-18 深圳市云智易联科技有限公司 Vehicle-mounted authentication method, system, vehicle-mounted device, mobile terminal and server
CN106296950A (en) * 2016-09-30 2017-01-04 深圳市商汤科技有限公司 A kind of gate control system based on recognition of face

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704895A (en) * 2017-08-17 2018-02-16 阿里巴巴集团控股有限公司 A kind of business performs method and device
WO2019034040A1 (en) * 2017-08-17 2019-02-21 阿里巴巴集团控股有限公司 Service execution method and device
TWI706342B (en) * 2017-08-17 2020-10-01 香港商阿里巴巴集團服務有限公司 Business execution method and device
CN113570013A (en) * 2017-08-17 2021-10-29 创新先进技术有限公司 Service execution method and device
TWI759939B (en) * 2017-08-17 2022-04-01 開曼群島商創新先進技術有限公司 Service execution method and device
CN107909735A (en) * 2017-11-13 2018-04-13 广州大学 Bicycle shared system and its control method based on intelligent management lockset
CN110654345A (en) * 2018-06-29 2020-01-07 比亚迪股份有限公司 Vehicle control method and device and vehicle
CN109388368A (en) * 2018-09-04 2019-02-26 顺丰科技有限公司 Man-machine interaction method, device, unmanned vehicle and its storage medium
CN109388368B (en) * 2018-09-04 2022-08-12 顺丰科技有限公司 Human-computer interaction method and device, unmanned vehicle and storage medium thereof
CN109398310A (en) * 2018-09-26 2019-03-01 深圳万智联合科技有限公司 A kind of pilotless automobile
CN111554084A (en) * 2020-05-19 2020-08-18 新石器慧通(北京)科技有限公司 Method for searching unmanned vehicle
CN111554084B (en) * 2020-05-19 2022-01-21 新石器慧通(北京)科技有限公司 Method for searching unmanned vehicle

Similar Documents

Publication Publication Date Title
CN106994958A (en) Unmanned vehicle security control method and device
CN108540579B (en) Driver identity online monitoring method and device and storage medium
US11527079B2 (en) Available vehicle parking space detection using machine learning
US10147249B1 (en) Personal intermediary communication device
US20210295692A1 (en) Available Parking Space Dispatch
CN112084942A (en) Method and device for online monitoring of driver identity in vehicle and storage medium
CN103839318B (en) The gate control system of a kind of remote centralized certification and method
CN106895553A (en) Air-conditioning and its control method and device, alarm method and device
CN106530510A (en) An intelligent express delivery cabinet, and an express delivery cabinet remote control system and method
Kamruzzaman et al. AI-based computer vision using deep learning in 6G wireless networks
DE102021126878A1 (en) SYSTEMS AND PROCEDURES FOR PARENT SECURITY OF A VEHICLE AGAINST MOTION WITH CHILD RECOGNITION
DE102021124261A1 (en) Automated computerized identification of assets
CN111294567B (en) Intelligent case monitoring management method based on Internet of things
CN107742268A (en) The important machine-operated anti-terrorism crime prevention system of country and method
CN107230270A (en) A kind of garage burglary-resisting system and processing method
CN112446988A (en) Access control application method, device and storage medium
CN109741559A (en) A kind of processing method and processing device managing garden safety
CN109658316A (en) A kind of safe emergency advance warning management method in garden and device
CN210222869U (en) A unmanned on duty system for oil depot
CN113807117A (en) Vehicle security check method, system, device, equipment and storage medium
CN109035534A (en) A kind of gate inhibition's monitoring method, controller and system
CN109345186A (en) Business handling method and terminal device based on Internet of Things
CN210605849U (en) Multifunctional intelligent digital management control device and intelligent management control device
CN106535168A (en) Over-the-air (OTA) method and device with risk control function and equipment
CN114995167A (en) Control method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170801

RJ01 Rejection of invention patent application after publication