CN110225298A - Image information providing method, device and system in a kind of car networking - Google Patents
Image information providing method, device and system in a kind of car networking Download PDFInfo
- Publication number
- CN110225298A CN110225298A CN201910349981.3A CN201910349981A CN110225298A CN 110225298 A CN110225298 A CN 110225298A CN 201910349981 A CN201910349981 A CN 201910349981A CN 110225298 A CN110225298 A CN 110225298A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- time period
- monitoring
- preset range
- acquisition request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000006855 networking Effects 0.000 title claims abstract description 38
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000012806 monitoring device Methods 0.000 claims abstract description 79
- 230000004044 response Effects 0.000 claims description 26
- 238000012544 monitoring process Methods 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 12
- 230000001960 triggered effect Effects 0.000 claims 1
- 230000008859 change Effects 0.000 description 4
- 206010039203 Road traffic accident Diseases 0.000 description 3
- 210000004209 hair Anatomy 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000005291 magnetic effect Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000035939 shock Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Tourism & Hospitality (AREA)
- Development Economics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Educational Administration (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Technology Law (AREA)
- Human Resources & Organizations (AREA)
- Multimedia (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses image information providing methods, apparatus and system in a kind of car networking, which comprises receives the image acquisition request from first terminal;First verifying is carried out to described image acquisition request, if first is verified, first location information of first vehicle in first time period is then obtained, the one or more monitoring devices being located in first preset range of the first vehicle in the first time period are determined according to acquired first location information;One or more of monitoring devices acquired image information in the first time period is obtained, and sends it to the first terminal.By means of the present invention, the leakage for avoiding image information protects the privacy information of user.
Description
Technical field
The present embodiments relate to car networking field, in particular to image information providing method, device in a kind of car networking
And system.
Background technique
As the typical case of technology of Internet of things, in recent years, car networking technology has obtained quick development, anti-in automobile
The fields such as robber, traffic safety are widely used, for example, vehicle is when detecting that itself occurs abnormal, it is available attached
Camera acquired image information on other close vehicles, provides it to car owner, so that car owner can in real time, entirely
Know vehicle-state to face.
However, the image information obtained by above-mentioned technology may be used maliciously, such as obtain taking the photograph for a large amount of vehicles
As head acquired image information, big data analysis is carried out to it, then may result in daily whereabouts, information of vehicles of user etc.
Privacy information is leaked, so that the person and property safety to user threaten.
Summary of the invention
For the problems of the prior art, the present invention provides image information providing method, device in a kind of car networking and is
System.
The present invention provides image information providing method in a kind of car networking, which comprises
Step 101, the image acquisition request from first terminal is received, described image acquisition request is used for request institute
The acquired image in first time period of one or more monitoring devices near corresponding first vehicle of first terminal is stated to believe
Breath;
Step 102, the first verifying is carried out to described image acquisition request, if first is verified, executes step 103;
Step 103, first location information of first vehicle in the first time period is obtained, according to acquired
First location information determines the one or more being located in first preset range of the first vehicle in the first time period
Monitoring device;
Step 104, one or more of monitoring devices acquired image information in the first time period is obtained,
And send it to the first terminal.
The present invention provides image information in a kind of car networking and provides device, and described device includes:
First receiving unit, for receiving the image acquisition request from first terminal, described image acquisition request is used for
One or more monitoring devices near corresponding first vehicle of first terminal described in request are adopted in first time period
The image information of collection;
Authentication unit, if first is verified, triggers prison for carrying out the first verifying to described image acquisition request
Control equipment determination unit;
The monitoring device determination unit obtains first vehicle and exists for the triggering in response to the authentication unit
First location information in the first time period determines in the first time period according to acquired first location information
One or more monitoring devices in first preset range of the first vehicle;
Image information providing unit is adopted in the first time period for obtaining one or more of monitoring devices
The image information of collection, and send it to the first terminal.
The present invention provides image information in a kind of car networking and provides device, and described device includes processor and memory, institute
The computer program for being stored with and being run in memory on a processor is stated, the computer program is executed by the processor
Shi Shixian method as described above.
The present invention provides a kind of computer readable storage medium, which is characterized in that in the computer readable storage medium
It is stored with the computer program that can be run on a processor, the computer program realizes side as described above when executed
Method.
The present invention provides image information in a kind of car networking and provides system, which is characterized in that the system comprises: institute as above
Image information provides device, the first vehicle, one or more monitoring devices in the car networking stated.
By means of the present invention, device and system, in the image of first other monitoring devices of vehicle request acquisition
When information, the first verifying is carried out to it, judges whether it has occurred accident really and need to obtain the acquisition of other monitoring devices
Image information protects the privacy informations such as daily whereabouts, the information of vehicles of user so as to avoid the leakage of image information, into
And protect the person and property safety of user.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it is clear that ground, the accompanying drawings in the following description are this hairs
Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is image information providing method in car networking in one embodiment of the invention.
Fig. 2 is image information providing method in car networking in one embodiment of the invention.
Fig. 3 is image information providing method in car networking in one embodiment of the invention.
Fig. 4 is image information providing method in car networking in one embodiment of the invention.
Fig. 5 is that image information provides device in car networking in one embodiment of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.The embodiment of the present invention and the specific features of embodiment are to technical side of the embodiment of the present invention
The detailed description of case, rather than the restriction to description of the invention technical solution, in the absence of conflict, the embodiment of the present invention
And the technical characteristic of embodiment can be combined with each other.
Method of the invention is illustrated below, referring to Fig. 1, described method includes following steps:
Step 101, the image acquisition request from first terminal is received, described image acquisition request is used for request institute
The acquired image in first time period of one or more monitoring devices near corresponding first vehicle of first terminal is stated to believe
Breath;
Step 102, the first verifying is carried out to described image acquisition request, if first is verified, executes step 103;
Step 103, first location information of first vehicle in the first time period is obtained, according to acquired
First location information determines the one or more being located in first preset range of the first vehicle in the first time period
Monitoring device;
Step 104, one or more of monitoring devices acquired image information in the first time period is obtained,
And send it to the first terminal.
Preferably, the method is executed by car networking server.
Preferably, the first terminal is mobile terminal or vehicle device.
Preferably, in step 102, the first verifying is carried out to described image acquisition request, specifically, to third-party server
Inquiry request is sent, the inquiry request is used to inquire whether first vehicle occurs accident in the first time period,
The query response message that the third-party server is sent is received, judges that first vehicle exists based on the query response message
Whether accident occurs in the first time period, if accident occurs, first is verified.
Preferably, the third-party server is traffic management department's server and/or insurance company server.Vehicle hair
Make trouble thus after, car owner would generally report a case to the security authorities to traffic management department and/or insurance company, therefore, traffic management department's server and/
Or true accident information is had recorded in insurance company server.
Preferably, the accident include first vehicle occur traffic accident, first vehicle it is stolen, described first
Vehicle is destroyed, first vehicle is moved.First vehicle is destroyed, including but not limited to vehicle window pounded, car door quilt
It agitates, vehicle body is scratched, vehicle fire etc..
Preferably, the unique identification of first vehicle is carried in the inquiry request, the unique identification can be
The cell-phone number of the license plate number of the vehicle and/or the first terminal, IMEI etc..
Preferably, incident classification can also be further carried in the query response message, for example, accident does not occur for vehicle
When, incident classification 0, the incident classification that vehicle is moved is 1, and the incident classification that vehicle is destroyed is 2, the stolen accident of vehicle
Grade is 3, and the incident classification that traffic accident occurs for vehicle is 4, if incident classification is 0, the vehicle is in first time period
Accident does not occur, if incident classification is not 0, accident occurs in first time period for the vehicle.Above-mentioned different vehicle
Corresponding relationship between accident and incident classification is only for example, and is not construed as the restriction to technical solution of the present invention.This
The corresponding relationship between other car accidents and incident classification can be set in field technical staff completely.
Preferably, one or more monitoring devices in first preset range of the first vehicle are specially first vehicle
The second vehicle in the first preset range and/or the common monitoring equipment or privately owned in first preset range of the first vehicle
Monitoring device, and/or, one or more monitoring devices near first vehicle are specially near first vehicle
Common monitoring equipment or privately owned monitoring device near two vehicles and/or first vehicle.The privately owned monitoring device can be with
For the monitoring device of the installations such as cell, retail shop near first vehicle.
Preferably, the vehicle in the car networking periodically reports its location information, institute to the car networking server
The image information and acquisition time of acquisition, the car networking server is by the location information, image information, acquisition time, described
The corresponding storage of the unique identification of vehicle.
Preferably, common monitoring equipment or privately owned monitoring device periodically report it to be adopted to the car networking server
The image information and acquisition time of collection, the car networking server is by above-mentioned image information, acquisition time and the common monitoring
The corresponding storage of the unique identification of equipment or privately owned monitoring device.Common monitoring equipment has been stored in car networking server in advance
Or the corresponding relationship of the location information of privately owned monitoring device and its unique identification, due to common monitoring equipment or privately owned monitoring device
Position will not usually change, therefore, give the correct time upper without reporting its location information.
Preferably, in the step 103, first vehicle is obtained described according to the unique identification of first vehicle
First location information in first time period.In another embodiment, described in first terminal carries in image acquisition request
First location information of first vehicle in the first time period.
Preferably, in the step 103, first preset range is based on the thing carried in the query response message
Therefore grade determines, wherein incident classification is higher, the first preset range is bigger.
Preferably, referring to fig. 2, in a step 102, if judging first vehicle in institute based on the query response message
It states and accident does not occur in first time period, then the first authentication failed, at this point, step 105 is executed, to described image acquisition request
The second verifying is carried out, if second is verified, executes step 106.Step 106, first vehicle is obtained described first
First location information in period is determined according to acquired first location information described in being located in the first time period
One or more monitoring devices in first the second preset range of vehicle.After step 106, step 104 is executed.
The mode and step 103 of first location information of first vehicle in the first time period are obtained in step 106
In it is similar, details are not described herein again.
Preferably, one or more monitoring devices in second preset range of the first vehicle are specially first vehicle
The second vehicle in the second preset range and/or the common monitoring equipment or privately owned in second preset range of the first vehicle
Monitoring device.
Preferably, second verifying in the step 105, specifically: judge whether connect in the first time period
The security alarm information that first vehicle reports is received, if receiving the peace that first vehicle reports in first time period
Full warning information then second is verified, otherwise, the second authentication failed.
In the present invention, one or more safety sensors are installed, when safety sensor is examined on the vehicle in car networking
When measuring abnormal, it will report security alarm information to vehicle.The multiple safety sensor may be mounted at the difference of vehicle
Position to be more fully monitored to the safety of vehicle, and provides comprehensive security alarm information.Above-mentioned safety sensor
It is specifically as follows vibrating sensor, temperature sensor, obliquity sensor etc., wherein the shock sensor is for detecting vehicle body
Whether slight vibration (such as vehicle window pounded, car door agitated, vehicle body be scratched, vehicle body may generate slight vibration), temperature are generated
Degree sensor is for detecting vehicle temperature (when such as vehicle fire, vehicle temperature can be increased), and obliquity sensor is for detecting vehicle body
Whether run-off the straight (when such as vehicle is dragged away vehicle body may run-off the straight), when shock sensor detects that vehicle body has slight shake
Dynamic or temperature sensor detects that vehicle temperature is more than that preset temperature or obliquity sensor detect that body sway angle is super
When crossing predetermined angle, it will report security alarm information to vehicle.What the vehicle in real time reported above-mentioned safety sensor
Security alarm information, alarm time and the location information where it are sent to car networking server, and the car networking server will
The corresponding storage of unique identification of above-mentioned security alarm information, location information, alarm time, the vehicle.
Preferably, second preset range is less than first preset range.Since the security alarm information of vehicle is
It is reported by vehicle itself, the second confidence level being verified will be lower than the first confidence level being verified, therefore, based on the
Two are verified when providing image information, provide that quantity when being verified than first is less, the smaller monitoring device of range is adopted
The image information of collection.
Preferably, described image information is picture or video.
Preferably, if second authentication failed, Xiang Suoshu first terminal sends prompting message, and the prompting message is used for
Prompt obtains the reason of image information failure.
Preferably, referring to Fig. 3, after the first authentication failed, before executing step 105, step 107 is executed, described in judgement
Whether the first vehicle or first terminal obtain in blacklist in image, if not, 105 are thened follow the steps, if it is, ignoring institute
State image acquisition request.
Preferably, for first vehicle or first terminal, the second number being verified is carried out within a predetermined period of time
Record, specifically, referring to fig. 4, in step 105 second be verified after, then update first vehicle or first terminal exist
The second number (for example, the number is added 1) being verified, judges whether the number is greater than threshold value in predetermined amount of time,
If so, image, which is added, in first vehicle or first terminal obtains blacklist, at this point, no longer executing step 106, that is, ignore
Described image acquisition request executes step 106 when the number is less than or equal to threshold value.Pass through above-mentioned video acquisition blacklist
Setting, can prevent criminal from reporting security alarm information by falseness illegally to obtain a large amount of other monitoring devices acquisitions
Image information.For example, it is assumed that the reasonable second number being verified is 5 times in 24 hours, then the threshold value can be set
Be set to 5, then when a certain vehicle or terminal when 24 is small when the image information of interior 6th other monitoring devices of request acquisition,
Even if second is verified, request can also be ignored, and the vehicle or terminal will be added into image and obtain blacklist.
Preferably, after each preset time period (such as 8 hours, one day, one week), the second verifying of threshold value will be less than
Number of pass times is reset, for example, when preset time period is one, 24 points of March 23 in 2019, the terminal of user A or vehicle
Second be verified number be 3, be less than threshold value 5, then by its second be verified number reset.In another embodiment, institute
The form that preset time period is sliding window is stated, i.e., the second accumulative period for being verified number was to pass through the second verifying from this
Time point to the time point that pusher preset time period obtains continue to that this passes through the time point of the second verifying, for example, default
When period is one day (i.e. 24 hours), the terminal or vehicle of user A is respectively in 9 points of March 22 in 2019,11 points, 13 points, 15
6 points of point and on March 23rd, 2019 by the second verifying, and the terminal of the user A or vehicle 8 points of March 23 in 2019 again
Request image is simultaneously verified by second, at this point, the second accumulative period for being verified number was 8 points of March 23 in 2019
To pusher 24 hours, i.e. in 8 points to 2019 8 points of on March 23, of on March 22nd, 2019, therefore, the updated terminal or vehicle existed
The second number being verified is 6 times in predetermined amount of time, then image is added in the terminal of the user or vehicle and obtains blacklist
In, and if the terminal or vehicle of user A respectively 9 points of March 22 in 2019,11 points, 13 points, 15 points by second verifying,
Request image and by the second verifying again when on March 23rd, 2019 12, at this point, second is verified the accumulative of number
Period is 12 points to pusher 24 hours of on March 23rd, 2019, i.e. 12 points to 2019 12 points of on March 23, of on March 22nd, 2019, because
This, the second number being verified is 3 times within a predetermined period of time for the updated terminal or vehicle, be less than threshold value, then into
One step executes step 106.
By means of the present invention, in the image information of first other monitoring devices of vehicle request acquisition, to it
The first verifying is carried out, i.e., determines if to send out really using the information that user reports a case to the security authorities to traffic management department or insurance company
Raw get over protects so needing to obtain the image information that other monitoring devices acquire so as to avoid the leakage of image information
The privacy informations such as the daily whereabouts of user, information of vehicles, and then protect the person and property safety of user.Except the first verifying
Outside, the present invention is also provided with the second verifying, avoids traffic management department's server or insurance company server information update not
User caused by time can not normally obtain the image information of other monitoring devices acquisition.It is black that the present invention is also provided with image acquisition
List can prevent criminal from reporting security alarm information by falseness to obtain the image of a large amount of other monitoring devices acquisitions
Information, so that the privacy information, the person and property safety for user provide better protection.
The present invention also provides image informations in a kind of car networking to provide device, and referring to fig. 2, described device includes:
First receiving unit, for receiving the image acquisition request from first terminal, described image acquisition request is used for
One or more monitoring devices near corresponding first vehicle of first terminal described in request are adopted in first time period
The image information of collection;
Authentication unit, if first is verified, triggers prison for carrying out the first verifying to described image acquisition request
Control equipment determination unit;
The monitoring device determination unit obtains first vehicle and exists for the triggering in response to the authentication unit
First location information in the first time period determines in the first time period according to acquired first location information
One or more monitoring devices in first preset range of the first vehicle;
Image information providing unit is adopted in the first time period for obtaining one or more of monitoring devices
The image information of collection, and send it to the first terminal.
Preferably, it is car networking server that image information, which provides device, in the car networking.
Preferably, the authentication unit carries out the first verifying to described image acquisition request, specifically: to third party's service
Device sends inquiry request, and the inquiry request is for inquiring whether first vehicle occurs thing in the first time period
Therefore the query response message that the third-party server is sent is received, first vehicle is judged based on the query response message
Whether accident occurs in the first time period, if accident occurs, described first is verified.
Preferably, incident classification is carried in the query response message.For example, when accident does not occur for vehicle, incident classification
It is 0, the incident classification that vehicle is moved is 1, and the incident classification that vehicle is destroyed is 2, and the stolen incident classification of vehicle is 3, vehicle
Occur traffic accident incident classification be 4, if incident classification be 0, thing does not occur in first time period for the vehicle
Therefore if incident classification is not 0, accident occurs in first time period for the vehicle.Above-mentioned different car accident and accident
Corresponding relationship between grade is only for example, and is not construed as the restriction to technical solution of the present invention.Those skilled in the art
The corresponding relationship between other car accidents and incident classification can be set in member completely.
Preferably, one or more monitoring devices in first preset range of the first vehicle are specially first vehicle
The second vehicle in the first preset range and/or the common monitoring equipment or privately owned in first preset range of the first vehicle
Monitoring device, and/or, one or more monitoring devices near first vehicle are specially near first vehicle
Common monitoring equipment or privately owned monitoring device near two vehicles and/or first vehicle.The privately owned monitoring device can be with
For the monitoring device of the installations such as cell, retail shop near first vehicle.
Preferably, the monitoring device determination unit is also used to based on the incident classification carried in the query response message
To determine first preset range, wherein incident classification is higher, and the first preset range is bigger.
Preferably, the authentication unit, is also used to: if judging first vehicle in institute based on the query response message
It states and accident does not occur in first time period, then first authentication failed, at this point, carrying out second to described image acquisition request
Verifying, if second is verified, triggers the monitoring device determination unit;
The monitoring device determination unit is also used to the triggering in response to the authentication unit, obtains first vehicle
First location information in the first time period is determined according to acquired first location information in the first time period
Interior one or more monitoring devices in second preset range of the first vehicle.
Preferably, the authentication unit triggers the monitoring device determination unit, specifically, first is verified or the
Two verification results being verified are sent to monitoring device determination unit.The monitoring device determination unit is based on authentication unit
The verification result judgement of transmission is first to be verified or second is verified, so that it is determined that the position in the first time period
One or more monitoring devices in first preset range of the first vehicle or the second preset range.
Preferably, the authentication unit carries out the second verifying to described image acquisition request, specifically: judge described first
Whether security alarm information that first vehicle report is received in period, if it is, described second is verified, it is no
Then, second authentication failed.
Preferably, described device further includes the second receiving unit and storage unit, and second receiving unit is for receiving
Location information, acquired image information and the acquisition time that vehicle in the car networking periodically reports, the storage are single
Member is for corresponding to storage for the unique identification of the location information received, image information, acquisition time, the vehicle.
Preferably, second receiving unit is also used to receive common monitoring equipment or privately owned monitoring device periodically reports
Its acquired image information and acquisition time, the storage unit be also used to by the above-mentioned image information received, acquisition
Time storage corresponding with the unique identification of the common monitoring equipment or privately owned monitoring device.The storage unit is also used to store
The corresponding relationship of the location information of common monitoring equipment or privately owned monitoring device and its unique identification.
Preferably, the monitoring device determination unit, the above content for being stored based on the storage unit, according to institute
The unique identification for stating the first vehicle obtains first location information of first vehicle in the first time period, and according to institute
The first location information of acquisition is determined is located at first preset range of the first vehicle or second in advance in the first time period
If one or more monitoring devices in range;Described image information provider unit, for what is stored based on the storage unit
Above content obtains one or more of monitoring devices acquired image information in the first time period.
Preferably, second receiving unit is also used to receive the security alarm of the vehicle real-time report in the car networking
Information, alarm time and the location information where it, the storage unit are also used to believe above-mentioned security alarm information, position
The corresponding storage of unique identification of breath, alarm time, the vehicle.
Preferably, described device further includes prompt unit, in second authentication failed of the authentication unit,
Prompting message is sent to the first terminal, the prompting message is for prompting the reason of obtaining image information failure.
Preferably, the authentication unit, is also used to: if judging first vehicle in institute based on the query response message
It states and accident does not occur in first time period, then first authentication failed, at this point, judging first vehicle or first terminal
Whether obtained in blacklist in image, if first vehicle or first terminal do not obtain in blacklist in image, to institute
It states image acquisition request and carries out second verifying, if second is verified, trigger the monitoring device determination unit;Such as
First vehicle or first terminal described in fruit obtain in blacklist in image, then ignore described image acquisition request.
Preferably, the authentication unit, is also used to: after second is verified, updating first vehicle or first eventually
The second number (for example, the number is added 1) being verified within a predetermined period of time is held, when the number is greater than threshold value,
Described image is added in first vehicle or first terminal and obtains blacklist, is determined at this point, no longer triggering the monitoring device
Unit ignores described image acquisition request, when the number is less than or equal to threshold value, triggers the monitoring device and determine list
Member.
The present invention also provides image informations in a kind of car networking to provide device, which is characterized in that described device includes processing
Device and memory are stored with the computer program that can be run on a processor in the memory, and the computer program is in quilt
The processor realizes method as described above when executing.
The present invention also provides a kind of computer readable storage mediums, which is characterized in that the computer readable storage medium
In be stored with the computer program that can be run on a processor, the computer program realizes side as described above when executed
Method.
The present invention also provides image informations in a kind of car networking to provide system, which is characterized in that the system comprises: as above
The device, the first vehicle, one or more monitoring devices.
It can be using any combination of one or more computer-readable media.Computer-readable medium can be calculating
Machine readable signal medium or computer readable storage medium.Computer readable storage medium can for example be but not limited to electricity,
Magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Computer-readable storage
Medium may include: the electrical connection with one or more conducting wires, portable computer diskette, hard disk, random access memory
(RAM), read-only memory (ROM), flash memory, erasable programmable read only memory (EPROM), optical fiber, portable compact disc
Read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document,
Computer readable storage medium can be any tangible medium for including or store program, which can be commanded and execute system
System, device or device use or in connection.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code.
It is described above to be intended merely to facilitate the example for understanding the present invention and enumerating, it is not used in and limits the scope of the invention.?
When specific implementation, those skilled in the art can according to the actual situation change the component of device, increase, reduce, not
The step of method, can be changed according to the actual situation on the basis of the function that influence method is realized, increased, reduced or
Change sequence.
Although an embodiment of the present invention has been shown and described, it should be understood by those skilled in the art that: do not departing from this
These embodiments can be carried out with a variety of change, modification, replacement and modification in the case where the principle and objective of invention, it is of the invention
Range is limited by claim and its equivalent replacement, without creative work improvements introduced etc., should be included in this hair
Within bright protection scope.
Claims (17)
1. image information providing method in a kind of car networking, which is characterized in that the described method includes:
Step 101, the image acquisition request from first terminal is received, described image acquisition request is for described in request the
One or more monitoring devices near corresponding first vehicle of one terminal acquired image information in first time period;
Step 102, the first verifying is carried out to described image acquisition request, if first is verified, executes step 103;
Step 103, first location information of first vehicle in the first time period is obtained, according to acquired first
Location information determines the one or more monitoring being located in first preset range of the first vehicle in the first time period
Equipment;
Step 104, one or more of monitoring devices acquired image information in the first time period is obtained, and will
It is sent to the first terminal.
2. the method according to claim 1, wherein being carried out in the step 102 to described image acquisition request
First verifying, specifically, sending inquiry request to third-party server, the inquiry request exists for inquiring first vehicle
Whether accident occurs in the first time period, the query response message that the third-party server is sent is received, based on described
Query response message judges whether first vehicle occurs accident in the first time period, described if accident occurs
First is verified.
3. according to the method described in claim 2, it is characterized in that, carrying incident classification in the query response message.
4. the method according to claim 1, wherein one or more in first preset range of the first vehicle
A monitoring device is specially that the second vehicle in first preset range of the first vehicle and/or first vehicle first are default
Common monitoring equipment or privately owned monitoring device in range, and/or, one or more monitoring devices near first vehicle
The common monitoring equipment or privately owned monitoring near the second vehicle and/or first vehicle near specially described first vehicle
Equipment.
5. according to the method described in claim 3, it is characterized in that, first preset range is based on the query response message
The incident classification of middle carrying determines, wherein incident classification is higher, the first preset range is bigger.
6. according to the method described in claim 2, it is characterized in that, disappearing in the step 102 if being based on the inquiry response
Breath judges that accident does not occur in the first time period for first vehicle, then first authentication failed, at this point, executing
Step 105, the second verifying is carried out to described image acquisition request, if second is verified, executes step 106;
The step 106 is specifically, obtain first location information of first vehicle in the first time period, according to institute
The first location information of acquisition determines one be located in second preset range of the first vehicle in the first time period
Or multiple monitoring devices;
After step 106, the step 104 is executed.
7. according to the method described in claim 6, it is characterized in that, being carried out in the step 105 to described image acquisition request
Second verifying, specifically: judge the security alarm information that first vehicle reports whether is received in the first time period,
If it is, second is verified.
8. image information provides device in a kind of car networking, which is characterized in that described device includes:
First receiving unit, for receiving the image acquisition request from first terminal, described image acquisition request is for requesting
The one or more monitoring devices obtained near corresponding first vehicle of the first terminal are collected in first time period
Image information;
Authentication unit, if first is verified, triggers monitoring and sets for carrying out the first verifying to described image acquisition request
Standby determination unit;
The monitoring device determination unit obtains first vehicle described for the triggering in response to the authentication unit
First location information in first time period determines according to acquired first location information and is located in the first time period
One or more monitoring devices in first vehicle, first preset range;
Image information providing unit, it is collected in the first time period for obtaining one or more of monitoring devices
Image information, and send it to the first terminal.
9. device according to claim 8, which is characterized in that the authentication unit carries out the to described image acquisition request
One verifying, specifically: inquiry request is sent to third-party server, the inquiry request is for inquiring first vehicle in institute
It states in first time period and whether accident occurs, receive the query response message that the third-party server is sent, looked into based on described
It askes response message and judges whether first vehicle occurs accident in the first time period, if accident occurs, described the
One is verified.
10. device according to claim 9, which is characterized in that carry incident classification in the query response message.
11. device according to claim 8, which is characterized in that one in first preset range of the first vehicle or
Multiple monitoring devices are specially that the second vehicle in first preset range of the first vehicle and/or first vehicle first are pre-
If common monitoring equipment or privately owned monitoring device in range, and/or, one or more monitoring near first vehicle are set
Common monitoring equipment near the second vehicle and/or first vehicle or privately owned prison near standby specially described first vehicle
Control equipment.
12. device according to claim 8, which is characterized in that first preset range is based on the inquiry response and disappears
The incident classification carried in breath determines, wherein incident classification is higher, the first preset range is bigger.
13. device according to claim 9, which is characterized in that the authentication unit is also used to: if being based on the inquiry
Response message judges that accident does not occur in the first time period for first vehicle, then first authentication failed, this
When, the second verifying is carried out to described image acquisition request, if second is verified, the monitoring device is triggered and determines list
Member;
The monitoring device determination unit is also used to the triggering in response to the authentication unit, obtains first vehicle in institute
The first location information in first time period is stated, the position in the first time period is determined according to acquired first location information
One or more monitoring devices in second preset range of the first vehicle.
14. device according to claim 13, which is characterized in that the authentication unit carries out described image acquisition request
Second verifying, specifically: judge the security alarm information that first vehicle reports whether is received in the first time period,
If it is, second is verified.
15. image information provides device in a kind of car networking, which is characterized in that described device includes processor and memory, institute
The computer program for being stored with and being run in memory on a processor is stated, the computer program is executed by the processor
Shi Shixian the method according to claim 1 to 7.
16. a kind of computer readable storage medium, which is characterized in that being stored in the computer readable storage medium can locate
Computer program, the computer program run on reason device is realized when executed as claim 1-7 is described in any item
Method.
17. image information provides system in a kind of car networking, which is characterized in that the system comprises: such as claim 8-15 institute
Device, the first vehicle, one or more monitoring devices stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910349981.3A CN110225298B (en) | 2019-04-28 | 2019-04-28 | Method, device and system for providing image information in Internet of vehicles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910349981.3A CN110225298B (en) | 2019-04-28 | 2019-04-28 | Method, device and system for providing image information in Internet of vehicles |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110225298A true CN110225298A (en) | 2019-09-10 |
CN110225298B CN110225298B (en) | 2021-08-13 |
Family
ID=67820190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910349981.3A Active CN110225298B (en) | 2019-04-28 | 2019-04-28 | Method, device and system for providing image information in Internet of vehicles |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225298B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112794172A (en) * | 2021-01-13 | 2021-05-14 | 海南大学 | Data portrait and information portrait value alternating current conversion oriented carrying method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105849790A (en) * | 2015-10-16 | 2016-08-10 | 华为技术有限公司 | Road condition information acquisition method |
US20160323741A1 (en) * | 2015-04-30 | 2016-11-03 | Research & Business Foundation Sungkyunkwan University | Method and apparatus for transmitting vehicle accident information based on interaction between devices and method and vehicle accident information collection apparatus |
CN107274696A (en) * | 2016-04-08 | 2017-10-20 | 高德信息技术有限公司 | A kind of traffic events processing method and processing device |
CN107396064A (en) * | 2017-08-27 | 2017-11-24 | 邱诗妍 | A kind of municipal on-site supervision calling system |
CN109190402A (en) * | 2018-09-13 | 2019-01-11 | 北京京东尚科信息技术有限公司 | A kind of casualty data wiring method and device, equipment, storage medium |
CN109671270A (en) * | 2018-12-25 | 2019-04-23 | 北京梧桐车联科技有限责任公司 | Driving accident processing method and processing device, storage medium |
-
2019
- 2019-04-28 CN CN201910349981.3A patent/CN110225298B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160323741A1 (en) * | 2015-04-30 | 2016-11-03 | Research & Business Foundation Sungkyunkwan University | Method and apparatus for transmitting vehicle accident information based on interaction between devices and method and vehicle accident information collection apparatus |
CN105849790A (en) * | 2015-10-16 | 2016-08-10 | 华为技术有限公司 | Road condition information acquisition method |
CN107274696A (en) * | 2016-04-08 | 2017-10-20 | 高德信息技术有限公司 | A kind of traffic events processing method and processing device |
CN107396064A (en) * | 2017-08-27 | 2017-11-24 | 邱诗妍 | A kind of municipal on-site supervision calling system |
CN109190402A (en) * | 2018-09-13 | 2019-01-11 | 北京京东尚科信息技术有限公司 | A kind of casualty data wiring method and device, equipment, storage medium |
CN109671270A (en) * | 2018-12-25 | 2019-04-23 | 北京梧桐车联科技有限责任公司 | Driving accident processing method and processing device, storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112794172A (en) * | 2021-01-13 | 2021-05-14 | 海南大学 | Data portrait and information portrait value alternating current conversion oriented carrying method and system |
CN112794172B (en) * | 2021-01-13 | 2022-04-01 | 海南大学 | Data portrait and information portrait value alternating current conversion oriented carrying method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110225298B (en) | 2021-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10417713B1 (en) | Determining whether a vehicle is parked for automated accident detection, fault attribution, and claims processing | |
CN105480177B (en) | Method for preventing vehicle from fraud in danger by using vehicle-mounted intelligent terminal | |
US10121204B1 (en) | Automated accident detection, fault attribution, and claims processing | |
EP3134883B1 (en) | Identifying persons of interest using mobile device information | |
US20150248836A1 (en) | Traffic management server and a traffic recording apparatus | |
CN106228799B (en) | The method and apparatus for monitoring illegal tampering vehicle location information | |
CN203773681U (en) | Power distribution room security and protection system | |
US11676478B2 (en) | Monitoring security | |
MX2014015475A (en) | Mobile gunshot detection. | |
CN109219836A (en) | Pass in and out limited community's monitoring system | |
CN104960496A (en) | Vehicle-mounted driver identifying, authenticating and positioning system | |
US9622048B2 (en) | SNS based incident management | |
BR102013003578A2 (en) | Process and apparatus for determining whether a control channel signal is malicious or not based on a gps location | |
CN111369797A (en) | Vehicle monitoring method, electronic fence construction method, electronic fence and device | |
CN111934913A (en) | Intelligent network management system | |
KR20150051407A (en) | Traffic accident information collection system using black box and smart phone, and method thereof | |
AU2017225115B2 (en) | A method of determining if a vehicle has been stolen and a system therefor | |
KR101368757B1 (en) | Parked vehicle monitoring system and method | |
CN110225298A (en) | Image information providing method, device and system in a kind of car networking | |
KR20160062259A (en) | Method, system and computer readable medium for managing abnormal state of vehicle | |
CN204895391U (en) | On -vehicle driver discerns authentication positioning system | |
CN112017401A (en) | Alarm system for monitoring the safety of persons, corresponding method and storage medium | |
CN106330886A (en) | Method and equipment for protecting video privacy in remote monitoring | |
US20230153912A1 (en) | Systems and methods for detecting digital security breaches of connected assets based on location tracking and asset profiling | |
CN115534867A (en) | Vehicle anti-theft method, device, vehicle and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231214 Address after: Floor 1, No. 50 Middle Street, Shiling Street, Longquanyi District, Chengdu City, Sichuan Province, 610000 Patentee after: Chengdu Tongguang Wanglian Technology Co.,Ltd. Address before: Room 401, gate 2, block a, Zhongguancun 768 Creative Industry Park, 5 Xueyuan Road, Haidian District, Beijing 100083 Patentee before: BEIJING MORAN COGNITIVE TECHNOLOGY Co.,Ltd. |