CN110225298A - Image information providing method, device and system in a kind of car networking - Google Patents

Image information providing method, device and system in a kind of car networking Download PDF

Info

Publication number
CN110225298A
CN110225298A CN201910349981.3A CN201910349981A CN110225298A CN 110225298 A CN110225298 A CN 110225298A CN 201910349981 A CN201910349981 A CN 201910349981A CN 110225298 A CN110225298 A CN 110225298A
Authority
CN
China
Prior art keywords
vehicle
time period
monitoring
preset range
acquisition request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910349981.3A
Other languages
Chinese (zh)
Other versions
CN110225298B (en
Inventor
常凌
袁志伟
赵晓朝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Tongguang Wanglian Technology Co ltd
Original Assignee
Beijing Suddenly Cognitive Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Suddenly Cognitive Technology Co Ltd filed Critical Beijing Suddenly Cognitive Technology Co Ltd
Priority to CN201910349981.3A priority Critical patent/CN110225298B/en
Publication of CN110225298A publication Critical patent/CN110225298A/en
Application granted granted Critical
Publication of CN110225298B publication Critical patent/CN110225298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Tourism & Hospitality (AREA)
  • Development Economics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Educational Administration (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Technology Law (AREA)
  • Human Resources & Organizations (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses image information providing methods, apparatus and system in a kind of car networking, which comprises receives the image acquisition request from first terminal;First verifying is carried out to described image acquisition request, if first is verified, first location information of first vehicle in first time period is then obtained, the one or more monitoring devices being located in first preset range of the first vehicle in the first time period are determined according to acquired first location information;One or more of monitoring devices acquired image information in the first time period is obtained, and sends it to the first terminal.By means of the present invention, the leakage for avoiding image information protects the privacy information of user.

Description

Image information providing method, device and system in a kind of car networking
Technical field
The present embodiments relate to car networking field, in particular to image information providing method, device in a kind of car networking And system.
Background technique
As the typical case of technology of Internet of things, in recent years, car networking technology has obtained quick development, anti-in automobile The fields such as robber, traffic safety are widely used, for example, vehicle is when detecting that itself occurs abnormal, it is available attached Camera acquired image information on other close vehicles, provides it to car owner, so that car owner can in real time, entirely Know vehicle-state to face.
However, the image information obtained by above-mentioned technology may be used maliciously, such as obtain taking the photograph for a large amount of vehicles As head acquired image information, big data analysis is carried out to it, then may result in daily whereabouts, information of vehicles of user etc. Privacy information is leaked, so that the person and property safety to user threaten.
Summary of the invention
For the problems of the prior art, the present invention provides image information providing method, device in a kind of car networking and is System.
The present invention provides image information providing method in a kind of car networking, which comprises
Step 101, the image acquisition request from first terminal is received, described image acquisition request is used for request institute The acquired image in first time period of one or more monitoring devices near corresponding first vehicle of first terminal is stated to believe Breath;
Step 102, the first verifying is carried out to described image acquisition request, if first is verified, executes step 103;
Step 103, first location information of first vehicle in the first time period is obtained, according to acquired First location information determines the one or more being located in first preset range of the first vehicle in the first time period Monitoring device;
Step 104, one or more of monitoring devices acquired image information in the first time period is obtained, And send it to the first terminal.
The present invention provides image information in a kind of car networking and provides device, and described device includes:
First receiving unit, for receiving the image acquisition request from first terminal, described image acquisition request is used for One or more monitoring devices near corresponding first vehicle of first terminal described in request are adopted in first time period The image information of collection;
Authentication unit, if first is verified, triggers prison for carrying out the first verifying to described image acquisition request Control equipment determination unit;
The monitoring device determination unit obtains first vehicle and exists for the triggering in response to the authentication unit First location information in the first time period determines in the first time period according to acquired first location information One or more monitoring devices in first preset range of the first vehicle;
Image information providing unit is adopted in the first time period for obtaining one or more of monitoring devices The image information of collection, and send it to the first terminal.
The present invention provides image information in a kind of car networking and provides device, and described device includes processor and memory, institute The computer program for being stored with and being run in memory on a processor is stated, the computer program is executed by the processor Shi Shixian method as described above.
The present invention provides a kind of computer readable storage medium, which is characterized in that in the computer readable storage medium It is stored with the computer program that can be run on a processor, the computer program realizes side as described above when executed Method.
The present invention provides image information in a kind of car networking and provides system, which is characterized in that the system comprises: institute as above Image information provides device, the first vehicle, one or more monitoring devices in the car networking stated.
By means of the present invention, device and system, in the image of first other monitoring devices of vehicle request acquisition When information, the first verifying is carried out to it, judges whether it has occurred accident really and need to obtain the acquisition of other monitoring devices Image information protects the privacy informations such as daily whereabouts, the information of vehicles of user so as to avoid the leakage of image information, into And protect the person and property safety of user.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it is clear that ground, the accompanying drawings in the following description are this hairs Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is image information providing method in car networking in one embodiment of the invention.
Fig. 2 is image information providing method in car networking in one embodiment of the invention.
Fig. 3 is image information providing method in car networking in one embodiment of the invention.
Fig. 4 is image information providing method in car networking in one embodiment of the invention.
Fig. 5 is that image information provides device in car networking in one embodiment of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.The embodiment of the present invention and the specific features of embodiment are to technical side of the embodiment of the present invention The detailed description of case, rather than the restriction to description of the invention technical solution, in the absence of conflict, the embodiment of the present invention And the technical characteristic of embodiment can be combined with each other.
Method of the invention is illustrated below, referring to Fig. 1, described method includes following steps:
Step 101, the image acquisition request from first terminal is received, described image acquisition request is used for request institute The acquired image in first time period of one or more monitoring devices near corresponding first vehicle of first terminal is stated to believe Breath;
Step 102, the first verifying is carried out to described image acquisition request, if first is verified, executes step 103;
Step 103, first location information of first vehicle in the first time period is obtained, according to acquired First location information determines the one or more being located in first preset range of the first vehicle in the first time period Monitoring device;
Step 104, one or more of monitoring devices acquired image information in the first time period is obtained, And send it to the first terminal.
Preferably, the method is executed by car networking server.
Preferably, the first terminal is mobile terminal or vehicle device.
Preferably, in step 102, the first verifying is carried out to described image acquisition request, specifically, to third-party server Inquiry request is sent, the inquiry request is used to inquire whether first vehicle occurs accident in the first time period, The query response message that the third-party server is sent is received, judges that first vehicle exists based on the query response message Whether accident occurs in the first time period, if accident occurs, first is verified.
Preferably, the third-party server is traffic management department's server and/or insurance company server.Vehicle hair Make trouble thus after, car owner would generally report a case to the security authorities to traffic management department and/or insurance company, therefore, traffic management department's server and/ Or true accident information is had recorded in insurance company server.
Preferably, the accident include first vehicle occur traffic accident, first vehicle it is stolen, described first Vehicle is destroyed, first vehicle is moved.First vehicle is destroyed, including but not limited to vehicle window pounded, car door quilt It agitates, vehicle body is scratched, vehicle fire etc..
Preferably, the unique identification of first vehicle is carried in the inquiry request, the unique identification can be The cell-phone number of the license plate number of the vehicle and/or the first terminal, IMEI etc..
Preferably, incident classification can also be further carried in the query response message, for example, accident does not occur for vehicle When, incident classification 0, the incident classification that vehicle is moved is 1, and the incident classification that vehicle is destroyed is 2, the stolen accident of vehicle Grade is 3, and the incident classification that traffic accident occurs for vehicle is 4, if incident classification is 0, the vehicle is in first time period Accident does not occur, if incident classification is not 0, accident occurs in first time period for the vehicle.Above-mentioned different vehicle Corresponding relationship between accident and incident classification is only for example, and is not construed as the restriction to technical solution of the present invention.This The corresponding relationship between other car accidents and incident classification can be set in field technical staff completely.
Preferably, one or more monitoring devices in first preset range of the first vehicle are specially first vehicle The second vehicle in the first preset range and/or the common monitoring equipment or privately owned in first preset range of the first vehicle Monitoring device, and/or, one or more monitoring devices near first vehicle are specially near first vehicle Common monitoring equipment or privately owned monitoring device near two vehicles and/or first vehicle.The privately owned monitoring device can be with For the monitoring device of the installations such as cell, retail shop near first vehicle.
Preferably, the vehicle in the car networking periodically reports its location information, institute to the car networking server The image information and acquisition time of acquisition, the car networking server is by the location information, image information, acquisition time, described The corresponding storage of the unique identification of vehicle.
Preferably, common monitoring equipment or privately owned monitoring device periodically report it to be adopted to the car networking server The image information and acquisition time of collection, the car networking server is by above-mentioned image information, acquisition time and the common monitoring The corresponding storage of the unique identification of equipment or privately owned monitoring device.Common monitoring equipment has been stored in car networking server in advance Or the corresponding relationship of the location information of privately owned monitoring device and its unique identification, due to common monitoring equipment or privately owned monitoring device Position will not usually change, therefore, give the correct time upper without reporting its location information.
Preferably, in the step 103, first vehicle is obtained described according to the unique identification of first vehicle First location information in first time period.In another embodiment, described in first terminal carries in image acquisition request First location information of first vehicle in the first time period.
Preferably, in the step 103, first preset range is based on the thing carried in the query response message Therefore grade determines, wherein incident classification is higher, the first preset range is bigger.
Preferably, referring to fig. 2, in a step 102, if judging first vehicle in institute based on the query response message It states and accident does not occur in first time period, then the first authentication failed, at this point, step 105 is executed, to described image acquisition request The second verifying is carried out, if second is verified, executes step 106.Step 106, first vehicle is obtained described first First location information in period is determined according to acquired first location information described in being located in the first time period One or more monitoring devices in first the second preset range of vehicle.After step 106, step 104 is executed.
The mode and step 103 of first location information of first vehicle in the first time period are obtained in step 106 In it is similar, details are not described herein again.
Preferably, one or more monitoring devices in second preset range of the first vehicle are specially first vehicle The second vehicle in the second preset range and/or the common monitoring equipment or privately owned in second preset range of the first vehicle Monitoring device.
Preferably, second verifying in the step 105, specifically: judge whether connect in the first time period The security alarm information that first vehicle reports is received, if receiving the peace that first vehicle reports in first time period Full warning information then second is verified, otherwise, the second authentication failed.
In the present invention, one or more safety sensors are installed, when safety sensor is examined on the vehicle in car networking When measuring abnormal, it will report security alarm information to vehicle.The multiple safety sensor may be mounted at the difference of vehicle Position to be more fully monitored to the safety of vehicle, and provides comprehensive security alarm information.Above-mentioned safety sensor It is specifically as follows vibrating sensor, temperature sensor, obliquity sensor etc., wherein the shock sensor is for detecting vehicle body Whether slight vibration (such as vehicle window pounded, car door agitated, vehicle body be scratched, vehicle body may generate slight vibration), temperature are generated Degree sensor is for detecting vehicle temperature (when such as vehicle fire, vehicle temperature can be increased), and obliquity sensor is for detecting vehicle body Whether run-off the straight (when such as vehicle is dragged away vehicle body may run-off the straight), when shock sensor detects that vehicle body has slight shake Dynamic or temperature sensor detects that vehicle temperature is more than that preset temperature or obliquity sensor detect that body sway angle is super When crossing predetermined angle, it will report security alarm information to vehicle.What the vehicle in real time reported above-mentioned safety sensor Security alarm information, alarm time and the location information where it are sent to car networking server, and the car networking server will The corresponding storage of unique identification of above-mentioned security alarm information, location information, alarm time, the vehicle.
Preferably, second preset range is less than first preset range.Since the security alarm information of vehicle is It is reported by vehicle itself, the second confidence level being verified will be lower than the first confidence level being verified, therefore, based on the Two are verified when providing image information, provide that quantity when being verified than first is less, the smaller monitoring device of range is adopted The image information of collection.
Preferably, described image information is picture or video.
Preferably, if second authentication failed, Xiang Suoshu first terminal sends prompting message, and the prompting message is used for Prompt obtains the reason of image information failure.
Preferably, referring to Fig. 3, after the first authentication failed, before executing step 105, step 107 is executed, described in judgement Whether the first vehicle or first terminal obtain in blacklist in image, if not, 105 are thened follow the steps, if it is, ignoring institute State image acquisition request.
Preferably, for first vehicle or first terminal, the second number being verified is carried out within a predetermined period of time Record, specifically, referring to fig. 4, in step 105 second be verified after, then update first vehicle or first terminal exist The second number (for example, the number is added 1) being verified, judges whether the number is greater than threshold value in predetermined amount of time, If so, image, which is added, in first vehicle or first terminal obtains blacklist, at this point, no longer executing step 106, that is, ignore Described image acquisition request executes step 106 when the number is less than or equal to threshold value.Pass through above-mentioned video acquisition blacklist Setting, can prevent criminal from reporting security alarm information by falseness illegally to obtain a large amount of other monitoring devices acquisitions Image information.For example, it is assumed that the reasonable second number being verified is 5 times in 24 hours, then the threshold value can be set Be set to 5, then when a certain vehicle or terminal when 24 is small when the image information of interior 6th other monitoring devices of request acquisition, Even if second is verified, request can also be ignored, and the vehicle or terminal will be added into image and obtain blacklist.
Preferably, after each preset time period (such as 8 hours, one day, one week), the second verifying of threshold value will be less than Number of pass times is reset, for example, when preset time period is one, 24 points of March 23 in 2019, the terminal of user A or vehicle Second be verified number be 3, be less than threshold value 5, then by its second be verified number reset.In another embodiment, institute The form that preset time period is sliding window is stated, i.e., the second accumulative period for being verified number was to pass through the second verifying from this Time point to the time point that pusher preset time period obtains continue to that this passes through the time point of the second verifying, for example, default When period is one day (i.e. 24 hours), the terminal or vehicle of user A is respectively in 9 points of March 22 in 2019,11 points, 13 points, 15 6 points of point and on March 23rd, 2019 by the second verifying, and the terminal of the user A or vehicle 8 points of March 23 in 2019 again Request image is simultaneously verified by second, at this point, the second accumulative period for being verified number was 8 points of March 23 in 2019 To pusher 24 hours, i.e. in 8 points to 2019 8 points of on March 23, of on March 22nd, 2019, therefore, the updated terminal or vehicle existed The second number being verified is 6 times in predetermined amount of time, then image is added in the terminal of the user or vehicle and obtains blacklist In, and if the terminal or vehicle of user A respectively 9 points of March 22 in 2019,11 points, 13 points, 15 points by second verifying, Request image and by the second verifying again when on March 23rd, 2019 12, at this point, second is verified the accumulative of number Period is 12 points to pusher 24 hours of on March 23rd, 2019, i.e. 12 points to 2019 12 points of on March 23, of on March 22nd, 2019, because This, the second number being verified is 3 times within a predetermined period of time for the updated terminal or vehicle, be less than threshold value, then into One step executes step 106.
By means of the present invention, in the image information of first other monitoring devices of vehicle request acquisition, to it The first verifying is carried out, i.e., determines if to send out really using the information that user reports a case to the security authorities to traffic management department or insurance company Raw get over protects so needing to obtain the image information that other monitoring devices acquire so as to avoid the leakage of image information The privacy informations such as the daily whereabouts of user, information of vehicles, and then protect the person and property safety of user.Except the first verifying Outside, the present invention is also provided with the second verifying, avoids traffic management department's server or insurance company server information update not User caused by time can not normally obtain the image information of other monitoring devices acquisition.It is black that the present invention is also provided with image acquisition List can prevent criminal from reporting security alarm information by falseness to obtain the image of a large amount of other monitoring devices acquisitions Information, so that the privacy information, the person and property safety for user provide better protection.
The present invention also provides image informations in a kind of car networking to provide device, and referring to fig. 2, described device includes:
First receiving unit, for receiving the image acquisition request from first terminal, described image acquisition request is used for One or more monitoring devices near corresponding first vehicle of first terminal described in request are adopted in first time period The image information of collection;
Authentication unit, if first is verified, triggers prison for carrying out the first verifying to described image acquisition request Control equipment determination unit;
The monitoring device determination unit obtains first vehicle and exists for the triggering in response to the authentication unit First location information in the first time period determines in the first time period according to acquired first location information One or more monitoring devices in first preset range of the first vehicle;
Image information providing unit is adopted in the first time period for obtaining one or more of monitoring devices The image information of collection, and send it to the first terminal.
Preferably, it is car networking server that image information, which provides device, in the car networking.
Preferably, the authentication unit carries out the first verifying to described image acquisition request, specifically: to third party's service Device sends inquiry request, and the inquiry request is for inquiring whether first vehicle occurs thing in the first time period Therefore the query response message that the third-party server is sent is received, first vehicle is judged based on the query response message Whether accident occurs in the first time period, if accident occurs, described first is verified.
Preferably, incident classification is carried in the query response message.For example, when accident does not occur for vehicle, incident classification It is 0, the incident classification that vehicle is moved is 1, and the incident classification that vehicle is destroyed is 2, and the stolen incident classification of vehicle is 3, vehicle Occur traffic accident incident classification be 4, if incident classification be 0, thing does not occur in first time period for the vehicle Therefore if incident classification is not 0, accident occurs in first time period for the vehicle.Above-mentioned different car accident and accident Corresponding relationship between grade is only for example, and is not construed as the restriction to technical solution of the present invention.Those skilled in the art The corresponding relationship between other car accidents and incident classification can be set in member completely.
Preferably, one or more monitoring devices in first preset range of the first vehicle are specially first vehicle The second vehicle in the first preset range and/or the common monitoring equipment or privately owned in first preset range of the first vehicle Monitoring device, and/or, one or more monitoring devices near first vehicle are specially near first vehicle Common monitoring equipment or privately owned monitoring device near two vehicles and/or first vehicle.The privately owned monitoring device can be with For the monitoring device of the installations such as cell, retail shop near first vehicle.
Preferably, the monitoring device determination unit is also used to based on the incident classification carried in the query response message To determine first preset range, wherein incident classification is higher, and the first preset range is bigger.
Preferably, the authentication unit, is also used to: if judging first vehicle in institute based on the query response message It states and accident does not occur in first time period, then first authentication failed, at this point, carrying out second to described image acquisition request Verifying, if second is verified, triggers the monitoring device determination unit;
The monitoring device determination unit is also used to the triggering in response to the authentication unit, obtains first vehicle First location information in the first time period is determined according to acquired first location information in the first time period Interior one or more monitoring devices in second preset range of the first vehicle.
Preferably, the authentication unit triggers the monitoring device determination unit, specifically, first is verified or the Two verification results being verified are sent to monitoring device determination unit.The monitoring device determination unit is based on authentication unit The verification result judgement of transmission is first to be verified or second is verified, so that it is determined that the position in the first time period One or more monitoring devices in first preset range of the first vehicle or the second preset range.
Preferably, the authentication unit carries out the second verifying to described image acquisition request, specifically: judge described first Whether security alarm information that first vehicle report is received in period, if it is, described second is verified, it is no Then, second authentication failed.
Preferably, described device further includes the second receiving unit and storage unit, and second receiving unit is for receiving Location information, acquired image information and the acquisition time that vehicle in the car networking periodically reports, the storage are single Member is for corresponding to storage for the unique identification of the location information received, image information, acquisition time, the vehicle.
Preferably, second receiving unit is also used to receive common monitoring equipment or privately owned monitoring device periodically reports Its acquired image information and acquisition time, the storage unit be also used to by the above-mentioned image information received, acquisition Time storage corresponding with the unique identification of the common monitoring equipment or privately owned monitoring device.The storage unit is also used to store The corresponding relationship of the location information of common monitoring equipment or privately owned monitoring device and its unique identification.
Preferably, the monitoring device determination unit, the above content for being stored based on the storage unit, according to institute The unique identification for stating the first vehicle obtains first location information of first vehicle in the first time period, and according to institute The first location information of acquisition is determined is located at first preset range of the first vehicle or second in advance in the first time period If one or more monitoring devices in range;Described image information provider unit, for what is stored based on the storage unit Above content obtains one or more of monitoring devices acquired image information in the first time period.
Preferably, second receiving unit is also used to receive the security alarm of the vehicle real-time report in the car networking Information, alarm time and the location information where it, the storage unit are also used to believe above-mentioned security alarm information, position The corresponding storage of unique identification of breath, alarm time, the vehicle.
Preferably, described device further includes prompt unit, in second authentication failed of the authentication unit, Prompting message is sent to the first terminal, the prompting message is for prompting the reason of obtaining image information failure.
Preferably, the authentication unit, is also used to: if judging first vehicle in institute based on the query response message It states and accident does not occur in first time period, then first authentication failed, at this point, judging first vehicle or first terminal Whether obtained in blacklist in image, if first vehicle or first terminal do not obtain in blacklist in image, to institute It states image acquisition request and carries out second verifying, if second is verified, trigger the monitoring device determination unit;Such as First vehicle or first terminal described in fruit obtain in blacklist in image, then ignore described image acquisition request.
Preferably, the authentication unit, is also used to: after second is verified, updating first vehicle or first eventually The second number (for example, the number is added 1) being verified within a predetermined period of time is held, when the number is greater than threshold value, Described image is added in first vehicle or first terminal and obtains blacklist, is determined at this point, no longer triggering the monitoring device Unit ignores described image acquisition request, when the number is less than or equal to threshold value, triggers the monitoring device and determine list Member.
The present invention also provides image informations in a kind of car networking to provide device, which is characterized in that described device includes processing Device and memory are stored with the computer program that can be run on a processor in the memory, and the computer program is in quilt The processor realizes method as described above when executing.
The present invention also provides a kind of computer readable storage mediums, which is characterized in that the computer readable storage medium In be stored with the computer program that can be run on a processor, the computer program realizes side as described above when executed Method.
The present invention also provides image informations in a kind of car networking to provide system, which is characterized in that the system comprises: as above The device, the first vehicle, one or more monitoring devices.
It can be using any combination of one or more computer-readable media.Computer-readable medium can be calculating Machine readable signal medium or computer readable storage medium.Computer readable storage medium can for example be but not limited to electricity, Magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Computer-readable storage Medium may include: the electrical connection with one or more conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), flash memory, erasable programmable read only memory (EPROM), optical fiber, portable compact disc Read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, Computer readable storage medium can be any tangible medium for including or store program, which can be commanded and execute system System, device or device use or in connection.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code.
It is described above to be intended merely to facilitate the example for understanding the present invention and enumerating, it is not used in and limits the scope of the invention.? When specific implementation, those skilled in the art can according to the actual situation change the component of device, increase, reduce, not The step of method, can be changed according to the actual situation on the basis of the function that influence method is realized, increased, reduced or Change sequence.
Although an embodiment of the present invention has been shown and described, it should be understood by those skilled in the art that: do not departing from this These embodiments can be carried out with a variety of change, modification, replacement and modification in the case where the principle and objective of invention, it is of the invention Range is limited by claim and its equivalent replacement, without creative work improvements introduced etc., should be included in this hair Within bright protection scope.

Claims (17)

1. image information providing method in a kind of car networking, which is characterized in that the described method includes:
Step 101, the image acquisition request from first terminal is received, described image acquisition request is for described in request the One or more monitoring devices near corresponding first vehicle of one terminal acquired image information in first time period;
Step 102, the first verifying is carried out to described image acquisition request, if first is verified, executes step 103;
Step 103, first location information of first vehicle in the first time period is obtained, according to acquired first Location information determines the one or more monitoring being located in first preset range of the first vehicle in the first time period Equipment;
Step 104, one or more of monitoring devices acquired image information in the first time period is obtained, and will It is sent to the first terminal.
2. the method according to claim 1, wherein being carried out in the step 102 to described image acquisition request First verifying, specifically, sending inquiry request to third-party server, the inquiry request exists for inquiring first vehicle Whether accident occurs in the first time period, the query response message that the third-party server is sent is received, based on described Query response message judges whether first vehicle occurs accident in the first time period, described if accident occurs First is verified.
3. according to the method described in claim 2, it is characterized in that, carrying incident classification in the query response message.
4. the method according to claim 1, wherein one or more in first preset range of the first vehicle A monitoring device is specially that the second vehicle in first preset range of the first vehicle and/or first vehicle first are default Common monitoring equipment or privately owned monitoring device in range, and/or, one or more monitoring devices near first vehicle The common monitoring equipment or privately owned monitoring near the second vehicle and/or first vehicle near specially described first vehicle Equipment.
5. according to the method described in claim 3, it is characterized in that, first preset range is based on the query response message The incident classification of middle carrying determines, wherein incident classification is higher, the first preset range is bigger.
6. according to the method described in claim 2, it is characterized in that, disappearing in the step 102 if being based on the inquiry response Breath judges that accident does not occur in the first time period for first vehicle, then first authentication failed, at this point, executing Step 105, the second verifying is carried out to described image acquisition request, if second is verified, executes step 106;
The step 106 is specifically, obtain first location information of first vehicle in the first time period, according to institute The first location information of acquisition determines one be located in second preset range of the first vehicle in the first time period Or multiple monitoring devices;
After step 106, the step 104 is executed.
7. according to the method described in claim 6, it is characterized in that, being carried out in the step 105 to described image acquisition request Second verifying, specifically: judge the security alarm information that first vehicle reports whether is received in the first time period, If it is, second is verified.
8. image information provides device in a kind of car networking, which is characterized in that described device includes:
First receiving unit, for receiving the image acquisition request from first terminal, described image acquisition request is for requesting The one or more monitoring devices obtained near corresponding first vehicle of the first terminal are collected in first time period Image information;
Authentication unit, if first is verified, triggers monitoring and sets for carrying out the first verifying to described image acquisition request Standby determination unit;
The monitoring device determination unit obtains first vehicle described for the triggering in response to the authentication unit First location information in first time period determines according to acquired first location information and is located in the first time period One or more monitoring devices in first vehicle, first preset range;
Image information providing unit, it is collected in the first time period for obtaining one or more of monitoring devices Image information, and send it to the first terminal.
9. device according to claim 8, which is characterized in that the authentication unit carries out the to described image acquisition request One verifying, specifically: inquiry request is sent to third-party server, the inquiry request is for inquiring first vehicle in institute It states in first time period and whether accident occurs, receive the query response message that the third-party server is sent, looked into based on described It askes response message and judges whether first vehicle occurs accident in the first time period, if accident occurs, described the One is verified.
10. device according to claim 9, which is characterized in that carry incident classification in the query response message.
11. device according to claim 8, which is characterized in that one in first preset range of the first vehicle or Multiple monitoring devices are specially that the second vehicle in first preset range of the first vehicle and/or first vehicle first are pre- If common monitoring equipment or privately owned monitoring device in range, and/or, one or more monitoring near first vehicle are set Common monitoring equipment near the second vehicle and/or first vehicle or privately owned prison near standby specially described first vehicle Control equipment.
12. device according to claim 8, which is characterized in that first preset range is based on the inquiry response and disappears The incident classification carried in breath determines, wherein incident classification is higher, the first preset range is bigger.
13. device according to claim 9, which is characterized in that the authentication unit is also used to: if being based on the inquiry Response message judges that accident does not occur in the first time period for first vehicle, then first authentication failed, this When, the second verifying is carried out to described image acquisition request, if second is verified, the monitoring device is triggered and determines list Member;
The monitoring device determination unit is also used to the triggering in response to the authentication unit, obtains first vehicle in institute The first location information in first time period is stated, the position in the first time period is determined according to acquired first location information One or more monitoring devices in second preset range of the first vehicle.
14. device according to claim 13, which is characterized in that the authentication unit carries out described image acquisition request Second verifying, specifically: judge the security alarm information that first vehicle reports whether is received in the first time period, If it is, second is verified.
15. image information provides device in a kind of car networking, which is characterized in that described device includes processor and memory, institute The computer program for being stored with and being run in memory on a processor is stated, the computer program is executed by the processor Shi Shixian the method according to claim 1 to 7.
16. a kind of computer readable storage medium, which is characterized in that being stored in the computer readable storage medium can locate Computer program, the computer program run on reason device is realized when executed as claim 1-7 is described in any item Method.
17. image information provides system in a kind of car networking, which is characterized in that the system comprises: such as claim 8-15 institute Device, the first vehicle, one or more monitoring devices stated.
CN201910349981.3A 2019-04-28 2019-04-28 Method, device and system for providing image information in Internet of vehicles Active CN110225298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910349981.3A CN110225298B (en) 2019-04-28 2019-04-28 Method, device and system for providing image information in Internet of vehicles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910349981.3A CN110225298B (en) 2019-04-28 2019-04-28 Method, device and system for providing image information in Internet of vehicles

Publications (2)

Publication Number Publication Date
CN110225298A true CN110225298A (en) 2019-09-10
CN110225298B CN110225298B (en) 2021-08-13

Family

ID=67820190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910349981.3A Active CN110225298B (en) 2019-04-28 2019-04-28 Method, device and system for providing image information in Internet of vehicles

Country Status (1)

Country Link
CN (1) CN110225298B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112794172A (en) * 2021-01-13 2021-05-14 海南大学 Data portrait and information portrait value alternating current conversion oriented carrying method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105849790A (en) * 2015-10-16 2016-08-10 华为技术有限公司 Road condition information acquisition method
US20160323741A1 (en) * 2015-04-30 2016-11-03 Research & Business Foundation Sungkyunkwan University Method and apparatus for transmitting vehicle accident information based on interaction between devices and method and vehicle accident information collection apparatus
CN107274696A (en) * 2016-04-08 2017-10-20 高德信息技术有限公司 A kind of traffic events processing method and processing device
CN107396064A (en) * 2017-08-27 2017-11-24 邱诗妍 A kind of municipal on-site supervision calling system
CN109190402A (en) * 2018-09-13 2019-01-11 北京京东尚科信息技术有限公司 A kind of casualty data wiring method and device, equipment, storage medium
CN109671270A (en) * 2018-12-25 2019-04-23 北京梧桐车联科技有限责任公司 Driving accident processing method and processing device, storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160323741A1 (en) * 2015-04-30 2016-11-03 Research & Business Foundation Sungkyunkwan University Method and apparatus for transmitting vehicle accident information based on interaction between devices and method and vehicle accident information collection apparatus
CN105849790A (en) * 2015-10-16 2016-08-10 华为技术有限公司 Road condition information acquisition method
CN107274696A (en) * 2016-04-08 2017-10-20 高德信息技术有限公司 A kind of traffic events processing method and processing device
CN107396064A (en) * 2017-08-27 2017-11-24 邱诗妍 A kind of municipal on-site supervision calling system
CN109190402A (en) * 2018-09-13 2019-01-11 北京京东尚科信息技术有限公司 A kind of casualty data wiring method and device, equipment, storage medium
CN109671270A (en) * 2018-12-25 2019-04-23 北京梧桐车联科技有限责任公司 Driving accident processing method and processing device, storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112794172A (en) * 2021-01-13 2021-05-14 海南大学 Data portrait and information portrait value alternating current conversion oriented carrying method and system
CN112794172B (en) * 2021-01-13 2022-04-01 海南大学 Data portrait and information portrait value alternating current conversion oriented carrying method and system

Also Published As

Publication number Publication date
CN110225298B (en) 2021-08-13

Similar Documents

Publication Publication Date Title
US10417713B1 (en) Determining whether a vehicle is parked for automated accident detection, fault attribution, and claims processing
CN105480177B (en) Method for preventing vehicle from fraud in danger by using vehicle-mounted intelligent terminal
US10121204B1 (en) Automated accident detection, fault attribution, and claims processing
EP3134883B1 (en) Identifying persons of interest using mobile device information
US20150248836A1 (en) Traffic management server and a traffic recording apparatus
CN106228799B (en) The method and apparatus for monitoring illegal tampering vehicle location information
CN203773681U (en) Power distribution room security and protection system
US11676478B2 (en) Monitoring security
MX2014015475A (en) Mobile gunshot detection.
CN109219836A (en) Pass in and out limited community's monitoring system
CN104960496A (en) Vehicle-mounted driver identifying, authenticating and positioning system
US9622048B2 (en) SNS based incident management
BR102013003578A2 (en) Process and apparatus for determining whether a control channel signal is malicious or not based on a gps location
CN111369797A (en) Vehicle monitoring method, electronic fence construction method, electronic fence and device
CN111934913A (en) Intelligent network management system
KR20150051407A (en) Traffic accident information collection system using black box and smart phone, and method thereof
AU2017225115B2 (en) A method of determining if a vehicle has been stolen and a system therefor
KR101368757B1 (en) Parked vehicle monitoring system and method
CN110225298A (en) Image information providing method, device and system in a kind of car networking
KR20160062259A (en) Method, system and computer readable medium for managing abnormal state of vehicle
CN204895391U (en) On -vehicle driver discerns authentication positioning system
CN112017401A (en) Alarm system for monitoring the safety of persons, corresponding method and storage medium
CN106330886A (en) Method and equipment for protecting video privacy in remote monitoring
US20230153912A1 (en) Systems and methods for detecting digital security breaches of connected assets based on location tracking and asset profiling
CN115534867A (en) Vehicle anti-theft method, device, vehicle and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231214

Address after: Floor 1, No. 50 Middle Street, Shiling Street, Longquanyi District, Chengdu City, Sichuan Province, 610000

Patentee after: Chengdu Tongguang Wanglian Technology Co.,Ltd.

Address before: Room 401, gate 2, block a, Zhongguancun 768 Creative Industry Park, 5 Xueyuan Road, Haidian District, Beijing 100083

Patentee before: BEIJING MORAN COGNITIVE TECHNOLOGY Co.,Ltd.