CN110077361A - A kind of control method for vehicle and device - Google Patents

A kind of control method for vehicle and device Download PDF

Info

Publication number
CN110077361A
CN110077361A CN201910347647.4A CN201910347647A CN110077361A CN 110077361 A CN110077361 A CN 110077361A CN 201910347647 A CN201910347647 A CN 201910347647A CN 110077361 A CN110077361 A CN 110077361A
Authority
CN
China
Prior art keywords
user
mentioned
network authentication
information
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910347647.4A
Other languages
Chinese (zh)
Other versions
CN110077361B (en
Inventor
刘新
刘俊落
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201910347647.4A priority Critical patent/CN110077361B/en
Publication of CN110077361A publication Critical patent/CN110077361A/en
Application granted granted Critical
Publication of CN110077361B publication Critical patent/CN110077361B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/2018Central base unlocks or authorises unlocking
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones

Abstract

A kind of control method for vehicle and device.This method comprises: user terminal collects the face information of any user in multiple users, wherein above-mentioned multiple users can control vehicle;Network authentication information is obtained, above-mentioned network authentication information includes resident identification card function line voucher;Above-mentioned user's face information of collection is compared with above-mentioned network authentication information;If comparison result is consistent, control instruction is sent to server, for above-mentioned control instruction for controlling vehicle, above-mentioned control instruction includes the above-mentioned user's face information collected.Implement the application, can use face recognition technology, it is ensured that remote vehicle control system is designated user group and controls, the stolen generation made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages.

Description

A kind of control method for vehicle and device
Technical field
This application involves field of computer technology more particularly to a kind of control method for vehicle and device.
Background technique
With the development of the society, automobile is more more and more universal.With being skyrocketed through for automobile quantity, people increasingly pursue intelligence It can convenient and fast vehicle control system.But existing vehicle remote control apparatus is all close by inputting after mobile phone app login Code carries out vehicle control, then will there are the following problems: cannot recognize whether be specified user's operation, once user name or Password is known by unspecified persons, then unspecified persons also can be carried out remote vehicle control, thus will increase this vehicle Control traffic accident that is improper and causing.
Summary of the invention
The application proposes a kind of control method for vehicle and device, utilizes face recognition technology, it can be ensured that remote vehicle control System processed can only be controlled by designated user group, reduce because the vehicles caused by factors such as account number cipher leakage are stolen and The generation of vehicle control fault.
In a first aspect, being applied to user terminal this application provides a kind of control method for vehicle, which comprises
Collect the face information of any user in multiple users, wherein the multiple user can control vehicle;
Network authentication information is obtained, the network authentication information includes resident identification card function line voucher;
User's face information of collection is compared with the network authentication information;
If comparison result is consistent, control instruction is sent to server, the control instruction is used to control vehicle, The control instruction includes the user's face information collected.
In one possible implementation, when user's face information and the similarity of the network authentication information are big When first threshold, then user's face information is consistent with the comparison result of the network authentication information;As the user people Face information and the similarity of the network authentication information are less than or equal to second threshold, then user's face information and the net The comparison result of network authentication information is inconsistent;Wherein, the first threshold is greater than the second threshold.
In one possible implementation, the method also includes:
Receive logging request;
Collect the face information of any user in multiple users;
When user's face information is consistent with the network authentication information, the registration information of the user is obtained, into Row logs in.
In one possible implementation, the method also includes:
When the registration information of the user has not been obtained, institute is obtained from the server according to the network authentication information The registration information of user is stated, and is logged in.
In one possible implementation, the method also includes:
After user logs in, the active information of mobile unit is received;
According to the active information, the mobile unit is activated, so as to build between the mobile unit and the server Vertical connection.
Second aspect, this application provides a kind of control method for vehicle, are applied to server, which comprises
The control instruction that user terminal is sent is received, the control instruction includes multiple users that the user terminal is collected In any user face information;
Network authentication information is obtained, the network authentication information includes resident identification card function line voucher;
User's face information is compared with the network authentication information;
If comparison result is consistent, the control instruction is sent to mobile unit.
The third aspect, the application propose a kind of user terminal, comprising:
First collector unit, for collecting the face information of any user in multiple users;
First acquisition unit, for obtaining network authentication information, the network authentication information includes that resident identification card is online Function voucher;
Comparing unit, for the user's face information collected to be compared with the network authentication information;
Transmission unit, if for comparison result it is consistent, to server send control instruction, the control instruction for pair Vehicle is controlled, and the control instruction includes the user's face information collected.
In one possible implementation, described device further include:
First receiving unit, for receiving logging request;
Second collector unit, for collecting the face information of any user in multiple users;
Second acquisition unit is used for when user's face information is consistent with the network authentication information, described in acquisition The registration information of user, is logged in.
In one possible implementation, described device further include:
Third acquiring unit, for when the registration information of the user has not been obtained, according to the network authentication information The registration information of the user is obtained from the server, and is logged in.
In one possible implementation, described device further include:
Second receiving unit, for receiving the active information of mobile unit after user logs in;
Activate unit, for according to the active information, activate the mobile unit so that the mobile unit with it is described Connection is established between server.
Fourth aspect, the application propose a kind of server, comprising:
Receiving unit, for receiving the control instruction of user terminal transmission, the control instruction includes the user terminal The face information for any user in multiple users collected;
Acquiring unit, for obtaining network authentication information, the network authentication information includes resident identification card function line Voucher;
Comparing unit, for user's face information to be compared with the network authentication information;
Transmission unit sends the control instruction to mobile unit if consistent for comparison result.
5th aspect, the application propose a kind of user terminal, comprising: processor, memory and transceiver;Wherein, described Memory is for storing computer program, and the computer program includes program instruction, and the processor is configured for calling Described program instruction is executed such as first aspect or the proposed method of any realization.
6th aspect, the application propose a kind of server, comprising: processor, memory and transceiver;Wherein, described to deposit For reservoir for storing computer program, the computer program includes program instruction, and the processor is configured for calling institute It states program instruction, executes such as second aspect or the proposed method of any realization.
7th aspect, the application propose a kind of computer readable storage medium, the computer-readable recording medium storage There is computer program, the computer program includes program instruction, and described program instructs when being executed by a processor, makes the place Reason device executes the various aspects or any realizes proposed method.
Eighth aspect, the embodiment of the present application provide a kind of computer program product comprising program instruction, when it is being counted When being run on calculation machine, so that computer executes the various aspects or any realizes proposed method.
Implement the application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through designated user Group is controlled, the stolen generation made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application or in background technique below will be implemented the application Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of flow chart for control method for vehicle that the application proposes;
Fig. 2 is the flow chart for another control method for vehicle that the application proposes;
Fig. 3 is a kind of flow chart of the concrete application scene for control method for vehicle that the application proposes;
Fig. 4 is the flow chart for another control method for vehicle that the application proposes;
Fig. 5 is a kind of frame diagram for vehicle control system that the application proposes;
Fig. 6 is a kind of structural schematic diagram for user terminal that the application proposes;
Fig. 7 is a kind of structural schematic diagram for server that the application proposes;
Fig. 8 is the structural schematic diagram for another user terminal that the application proposes;
Fig. 9 is the structural schematic diagram for another server that the application proposes.
Specific embodiment
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, meaning Figure, which is to cover, non-exclusive includes.Such as contain the process, method, system, product or equipment of a series of steps or units It is not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also Including other step or units intrinsic for these process, methods or equipment.
Existing vehicle remote control apparatus is all that input password carries out vehicle control after logging in by mobile phone app, that It will there are the following problems: cannot recognize whether be specified user's operation, once user name or password are by unspecified persons Know, then unspecified persons also can be carried out remote vehicle control, it is improper and cause thus to will increase this vehicle control Traffic accident.
The application proposes a kind of control method for vehicle and device, can use face recognition technology, it is ensured that remote vehicle control System processed can only be controlled by designated user group, reduce because the vehicles caused by factors such as account number cipher leakage are stolen and The generation of vehicle control fault.
Fig. 1 is a kind of flow chart for control method for vehicle that the application proposes, is applied to user terminal, and the above method includes The following contents:
101, the face information of any user in multiple users is collected, wherein above-mentioned multiple users can carry out vehicle Control.
Any user in multiple users is shot specifically, face recognition technology can be used, collects multiple use The face information of any user in family;Multiple users can be car owner and its relatives and friends, and user terminal stores multiple users' Network authentication information can correctly identify the face information of multiple users, so that vehicle be allow to pass through use by designated user group Family terminal realizes control, both ensure that the safety of vehicle control, and that has also expanded user terminal uses crowd.It is legal to vehicle The designated user group of control can be selected by car owner, and the personal information of designated user group need to upload to user terminal and service Device.
Face recognition technology is the face feature based on people, is identified to the facial image or video of input.First Judge that it then further provides position, size and each major facial organ of face if there is face with the presence or absence of face Location information.And according to these information, the identity characteristic contained in face is further extracted, and by itself and known face It compares, to identify the identity of face.
102, network authentication information is obtained.
Specifically, obtaining network authentication information according to the personal information of designated user group, which can be with Legal control vehicle.Above-mentioned network authentication information includes resident identification card function line voucher.Resident identification card function line with Card is electronic edition identity card, is to authenticate based on resident identification card, using the trusted identity of living body faces identification technology, by the Ministry of Public Security First research institute cooperates to combine release with various regions public security organ.The voucher is that " internet+trusted identity certification is flat by country Platform ", which is signed and issued, demonstrate,proves chip uniquely corresponding electronic document with entity identities.
There are many kinds of the methods for obtaining resident identification card function line voucher, for example, at present many software platforms with public affairs The cooperation of peace portion possesses the creation of resident identification card function line voucher or shows function, perhaps can also put into effect special resident below Identity card function line credential software, it is possible to provide Software Development Kit (software development kit, SDK) makes The access of other software platform, such as: then the SDK access that software A can call software B to provide obtains the net identification in software B Information is demonstrate,proved, it includes personal head portrait and identity information which, which demonstrate,proves information,.
103, above-mentioned user's face information of collection is compared with above-mentioned network authentication information.
Specifically, when above-mentioned user's face information and the similarity of above-mentioned network authentication information are greater than first threshold, then Above-mentioned user's face information is consistent with the comparison result of above-mentioned network authentication information;When above-mentioned user's face information and above-mentioned network The similarity of authentication information is less than or equal to second threshold, the then comparison of above-mentioned user's face information and above-mentioned network authentication information As a result inconsistent;Wherein, above-mentioned first threshold is greater than above-mentioned second threshold.Implement this step can detect the user identity whether It is consistent with the identity in network authentication information.
If 104, comparison result is consistent, control instruction is sent to server.
Specifically, when above-mentioned user's face information and the similarity of above-mentioned network authentication information are greater than first threshold, then Above-mentioned user's face information is consistent with the comparison result of above-mentioned network authentication information.Above-mentioned control instruction is for controlling vehicle System, above-mentioned control instruction include the above-mentioned user's face information collected.If above-mentioned user's face information and above-mentioned network authentication are believed The similarity of breath is less than or equal to second threshold, i.e., the comparison result of above-mentioned user's face information and above-mentioned network authentication information is not Unanimously, then user terminal judges that the operator is not designated user, and user terminal does not send above-mentioned control instruction.Above-mentioned control refers to It enables for controlling vehicle, above-mentioned control instruction includes the above-mentioned user's face information collected.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages It is raw.
Fig. 2 is the flow diagram for another control method for vehicle that the application proposes, is applied to user terminal, above-mentioned side Method includes the following contents:
201, network authentication information is obtained.
Specifically, above-mentioned network authentication information includes resident identification card function line voucher.
202, logging request is received.
203, the face information of any user in multiple users is collected, wherein above-mentioned multiple users can control vehicle System.
Specifically, when users log on, triggering the face identification functions of user terminal, user terminal takes the modes such as shooting Collect user's face information.
Implement this step, when user logs in, it is also desirable to authentication be carried out by recognition of face, to ensure remote vehicle Control system can only be controlled by designated user group.
204, when above-mentioned user's face information is consistent with above-mentioned network authentication information, the registration letter of above-mentioned user is obtained Breath, is logged in.
Specifically, user terminal judges the operation when above-mentioned user's face information is consistent with above-mentioned network authentication information Person is designated user.User terminal further judges whether designated user has registered, if finding the registration letter of the designated user Breath, that is, show to have registered, then logged in.When above-mentioned user's face information and above-mentioned network authentication information are inconsistent, use Family terminal judges that the operator is not designated user, and the operator is forbidden to log in.It is logged in, is guaranteed using face recognition technology Login process is optimized while safety, makes user's more convenient operation.
205, it when the registration information of above-mentioned user has not been obtained, is obtained according to above-mentioned network authentication information from above-mentioned server The registration information of above-mentioned user is taken, and is logged in.
Specifically, when the registration information of above-mentioned user has not been obtained, user terminal according to above-mentioned network authentication information from Above-mentioned server obtains the registration information of above-mentioned user, and above-mentioned registration information is stored in user terminal, completes to register and carry out It logs in.
Implement this step, user terminal helps designated user to carry out registration operation automatically, while utilizing resident identification card net The uniqueness and authority of upper function voucher are automatically performed real-name authentication, keep operation more convenient.
206, after user logs in, the active information of mobile unit is received.
Specifically, in order to realize the long-range control to vehicle, designated user also needs that mobile unit is activated to make above-mentioned vehicle-mounted Connection is established between equipment and above-mentioned server.Above-mentioned active information can be the facility information and equipment sequence of mobile unit Number.
207, according to above-mentioned active information, activate above-mentioned mobile unit so that above-mentioned mobile unit and above-mentioned server it Between establish connection.
Specifically, pre-stored facility information to be activated is compared with the above-mentioned active information received, verify By rear, connection is established between above-mentioned mobile unit and above-mentioned server, is active.Mobile unit receives control instruction Following function can be exercised: as opened the door, starting, car locking etc..
If un-activation success, user terminal output error message remind user to activate failure.
208, the face information of any user in multiple users is collected.
Specifically, triggering the face identification functions of user terminal if user sends control instruction by user terminal, use Family terminal can take the modes such as shooting to collect user's face information.Implement this step, is conducive to identify user identity.
209, above-mentioned user's face information of collection is compared with above-mentioned network authentication information.
Specifically, when above-mentioned user's face information and the similarity of above-mentioned network authentication information are greater than first threshold, then Above-mentioned user's face information is consistent with the comparison result of above-mentioned network authentication information;When above-mentioned user's face information and above-mentioned network The similarity of authentication information is less than or equal to second threshold, the then comparison of above-mentioned user's face information and above-mentioned network authentication information As a result inconsistent;Wherein, above-mentioned first threshold is greater than above-mentioned second threshold.Implement this step purpose be detection user whether be Designated user.
If 210, comparison result is consistent, control instruction is sent to server.
Specifically, above-mentioned control instruction can control car door opening, vehicle launch.Above-mentioned control instruction includes the upper of collection User's face information is stated, so that server identifies user identity.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages It is raw.
Fig. 3 is a kind of flow diagram of the concrete application scene for control method for vehicle that the application proposes, is applied to use Family terminal, the above method include the following contents:
301, network authentication information is obtained.
For example, the network authentication information of designated user group, network authentication letter are obtained from third party's credible platform Breath includes resident identification card function line voucher.
302, logging request is received.
For example, the logging request of user's first is received.
303, user's face information is collected.
For example, user terminal collects the face information of user's first by way of shooting.
304, when above-mentioned user's face information is consistent with above-mentioned network authentication information, the registration letter of above-mentioned user is obtained Breath, is logged in.
For example, user terminal is by the resident identification card function line voucher of the face information of user's first and designated user Head image information be compared, when the head image information of above-mentioned user's first face information and the network authentication information of above-mentioned designated user When similarity is greater than first threshold, then the comparison knot of the network authentication information of above-mentioned user's first face information and above-mentioned designated user Fruit is consistent, and above-mentioned first threshold can be 95%.Comparing result unanimously then shows that user's first is designated user.User terminal obtains The registration information of user's first, is logged in.
305, it when the registration information of above-mentioned user has not been obtained, is obtained according to above-mentioned network authentication information from above-mentioned server The registration information of above-mentioned user is taken, and is logged in.
For example, when the registration information of user's first has not been obtained, user terminal according to above-mentioned network authentication information from Above-mentioned server obtains the registration information of above-mentioned user's first, and is logged in.
306, after user logs in, the active information of mobile unit is received.
For example, after user's first logs in, the activation for vehicle-mounted TBOX that user terminal receives the input of user's first is believed Breath.
307, according to above-mentioned active information, activate above-mentioned mobile unit so that above-mentioned mobile unit and above-mentioned server it Between establish connection.
For example, vehicle-mounted TBOX is activated, makes to establish connection between the vehicle-mounted TBOX and above-mentioned server.
308, user's face information is collected.
For example, when user's first sends control instruction, the face identification functions of user terminal are triggered, user terminal is adopted The face information of user's first is collected with the mode of shooting.
309, above-mentioned user's face information of collection is compared with above-mentioned network authentication information.
For example, the face information of user's first of collection is compared with the network authentication information of designated user.
If 310, comparison result is consistent, control instruction is sent to server.
For example, if the face information of user's first is similar to the head image information of the network authentication information of above-mentioned designated user When degree is greater than first threshold (first threshold can be 95%), then the net of the face information of above-mentioned user's first and above-mentioned designated user The comparison result of network authentication information is consistent.Comparing result unanimously shows that user's first is designated user, then user terminal is to server Send control instruction.The control instruction can control car door opening, which includes the face information of user's first.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages It is raw.
Fig. 4 be the application propose a kind of control method for vehicle flow chart, be applied to server, the above method include with Lower content:
401, the control instruction that user terminal is sent is received.
Specifically, server and above-mentioned mobile unit are established and are communicated to connect after user terminal activates mobile unit.Clothes Business device receives the control instruction that user terminal is sent, which can indicate that mobile unit completes corresponding operation, such as vehicle Door unlatching, vehicle launch.The control instruction includes user's face information that above-mentioned user terminal is collected.
402, network authentication information is obtained.
Specifically, obtaining the network authentication information of designated user group, which includes resident identification card net Upper function voucher.
There are many kinds of the methods for obtaining resident identification card function line voucher, for example, at present many software platforms with public affairs The cooperation of peace portion possesses the creation of resident identification card function line voucher or shows function, perhaps can also put into effect special resident below Identity card function line credential software, it is possible to provide SDK accesses other software platform, such as: software A can call software B The SDK of offer is accessed, and is then obtained the net in software B and is demonstrate,proved authentication information, which includes personal head portrait and identity Information.
403, above-mentioned user's face information is compared with above-mentioned network authentication information.
Specifically, above-mentioned user's face information is compared with the network authentication information of above-mentioned designated user, with verifying The identity information of user.
Specifically, when above-mentioned user's face information and the similarity of above-mentioned network authentication information are greater than first threshold, then Above-mentioned user's face information is consistent with the comparison result of above-mentioned network authentication information;When above-mentioned user's face information and above-mentioned network The similarity of authentication information is less than or equal to second threshold, the then comparison of above-mentioned user's face information and above-mentioned network authentication information As a result inconsistent;Wherein, above-mentioned first threshold is greater than above-mentioned second threshold.
If 404, comparison result is consistent, above-mentioned control instruction is sent to mobile unit.
Specifically, when above-mentioned user's face information and the similarity of the network authentication information of above-mentioned designated user are greater than first When threshold value, then above-mentioned user's face information is consistent with the comparison result of the network authentication information of above-mentioned designated user, first threshold Value can be 95%.Comparison result unanimously then shows that the user identity is designated user, and server sends above-mentioned to mobile unit Control instruction.The control instruction indicates that mobile unit completes corresponding movement, such as control car door opening, and control car light is opened.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages It is raw.
Technical solution of the present invention for ease of understanding, in the following, being done in conjunction with a concrete application scene embodiment to the present invention Further instruction.
Referring to Fig. 5, Fig. 5 is a kind of frame diagram for vehicle control system that the application proposes.As shown in figure 5, the vehicle Control system includes but is not limited to user terminal, server and mobile unit.User terminal, server and vehicle equipment communication connect It connects, the embodiment of the present application does not make uniqueness limit for the communication connection mode between the user terminal, server and mobile unit It is fixed.
Server receives the control instruction that user terminal is sent, which includes the user that above-mentioned user terminal is collected First face information, the control instruction indicate car door opening;The network authentication information of server acquisition designated user group;Server User's first face information is compared with the network authentication information of above-mentioned designated user;When above-mentioned user's first face information with it is upper When stating the similarity of the network authentication information of designated user greater than 95%, above-mentioned user's first face information is with above-mentioned designated user's The comparison result of network authentication information is consistent, and server sends above-mentioned control instruction to mobile unit, controls car door opening.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages It is raw.
Fig. 6 is a kind of structural schematic diagram for user terminal that the application proposes, above-mentioned apparatus includes:
First collector unit 601, for collecting the face information of any user in multiple users, wherein above-mentioned multiple use Family can control vehicle;
First acquisition unit 602, for obtaining network authentication information, above-mentioned network authentication information includes resident identification card net Upper function voucher;
Comparing unit 603, for the above-mentioned user's face information collected to be compared with above-mentioned network authentication information;
Transmission unit 604 sends control instruction to server, above-mentioned control instruction is used if consistent for comparison result It is controlled in vehicle, above-mentioned control instruction includes the above-mentioned user's face information collected.
Further, above-mentioned apparatus further include:
First receiving unit 605, for receiving logging request;
Second collector unit 606, for collecting the face information of any user in multiple users;
Second acquisition unit 607 is used for when above-mentioned user's face information is consistent with above-mentioned network authentication information, in acquisition The registration information for stating user, is logged in;
Third acquiring unit 608, for being believed according to above-mentioned network authentication when the registration information of above-mentioned user has not been obtained Breath obtains the registration information of above-mentioned user from above-mentioned server, and is logged in;
Second receiving unit 609, for receiving the active information of mobile unit after user logs in;
Activate unit 610, for according to above-mentioned active information, activate above-mentioned mobile unit so that above-mentioned mobile unit with Connection is established between above-mentioned server.
It is understood that the specific implementation of device shown in fig. 6 reference may also be made to Fig. 1, Fig. 2 and method shown in Fig. 3, here No longer it is described in detail one by one.
In the embodiment of the present application, the first collector unit 601 collects the face information of any user in multiple users, In, above-mentioned multiple users can control vehicle;First acquisition unit 602 obtains network authentication information, above-mentioned network authentication Information includes resident identification card function line voucher;Comparing unit 603 is by above-mentioned user's face information of collection and above-mentioned network Authentication information is compared;If comparison result is consistent, transmission unit 604 sends control instruction to server, and above-mentioned control refers to It enables for controlling vehicle, above-mentioned control instruction includes the above-mentioned user's face information collected.As it can be seen that the embodiment of the present application It can use face recognition technology, it is ensured that remote vehicle control system can only be controlled by designated user group, be reduced Because of the generation that the vehicles caused by factors such as account number cipher leakage are stolen and vehicle control is made mistakes.
Fig. 7 is a kind of structural schematic diagram for server that the application proposes, above-mentioned apparatus includes:
Receiving unit 701, for receiving the control instruction of user terminal transmission, above-mentioned control instruction includes that above-mentioned user is whole Hold the face information of any user in the multiple users collected;
Acquiring unit 702, for obtaining network authentication information, above-mentioned network authentication information includes the online function of resident identification card It can voucher;
Comparing unit 703, for above-mentioned user's face information to be compared with above-mentioned network authentication information;
Transmission unit 704 sends above-mentioned control instruction to mobile unit if consistent for comparison result.
It is understood that the specific implementation of device shown in Fig. 7 reference may also be made to Fig. 4 and method shown in fig. 5, here no longer It is described in detail one by one.
In the embodiment of the present application, receiving unit 701 receives the control instruction that user terminal is sent, above-mentioned control instruction packet Include the face information of any user in multiple users that above-mentioned user terminal is collected;Acquiring unit 702 obtains network authentication information, Above-mentioned network authentication information includes resident identification card function line voucher;Comparing unit 703 by above-mentioned user's face information with it is upper Network authentication information is stated to be compared;If comparison result is consistent, transmission unit 704 sends above-mentioned control to mobile unit and refers to It enables.As it can be seen that the embodiment of the present application can use face recognition technology, it is ensured that remote vehicle control system can only pass through designated user Group is controlled, the stolen generation made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages.
Referring to Fig. 8, Fig. 8 is the structural schematic diagram of another user terminal provided by the embodiments of the present application.The device packet It includes: at least one processing 801, such as central processing unit (central processing unit, CPU), at least one processor 802, at least one transceiver 803 and at least one bus 804.Wherein, above-mentioned bus 804 can be one group of parallel data Line, for realizing the interconnection of above-mentioned processor 801, above-mentioned memory 802 and above-mentioned transceiver 803;Above-mentioned memory 802 It can be high-speed random access memory (random access memory, RAM), be also possible to nonvolatile memory (non-volatile memory), for example, at least a read-only memory (read only memory, ROM).
Specifically, above-mentioned processor 801 collects the face information of any user in multiple users, wherein above-mentioned multiple use Family can control vehicle;Above-mentioned processor 801 obtains network authentication information, and above-mentioned network authentication information includes residential identity Demonstrate,prove function line voucher;Above-mentioned processor 801 compares above-mentioned user's face information of collection with above-mentioned network authentication information It is right;If comparison result is consistent, above-mentioned transceiver 803 sends control instruction to server, and above-mentioned control instruction is used for vehicle It is controlled, above-mentioned control instruction includes the above-mentioned user's face information collected.
Further, above-mentioned transceiver 803 receives logging request;Above-mentioned processor 801 collects any use in multiple users The face information at family;When above-mentioned user's face information is consistent with above-mentioned network authentication information, above-mentioned processor 801 obtains above-mentioned The registration information of user, is logged in.
Further, when the registration information of above-mentioned user has not been obtained, above-mentioned processor 801 is according to above-mentioned network authentication Information obtains the registration information of above-mentioned user from above-mentioned server, and is logged in.
Further, after user logs in, above-mentioned transceiver 803 receives the active information of mobile unit;Above-mentioned processor 801, according to above-mentioned active information, activate above-mentioned mobile unit, so that the company of foundation between above-mentioned mobile unit and above-mentioned server It connects.
Specifically, can store program instruction in above-mentioned memory 802, above-mentioned processor 801 can be used for caller and refer to It enables and executes Fig. 1, Fig. 2 and method shown in Fig. 3.
Referring to Fig. 9, Fig. 9 is the structural schematic diagram of another server provided by the embodiments of the present application.The device includes: At least one processing 901, such as central processing unit (central processing unit, CPU), at least one processor 902, at least one transceiver 903 and at least one bus 904.Wherein, above-mentioned bus 904 can be one group of parallel data Line, for realizing the interconnection of above-mentioned processor 901, above-mentioned memory 902 and above-mentioned transceiver 903;Above-mentioned memory 902 It can be high-speed random access memory (random access memory, RAM), be also possible to nonvolatile memory (non-volatile memory), for example, at least a read-only memory (read only memory, ROM).
Specifically, above-mentioned transceiver 903 receives the control instruction that user terminal is sent, above-mentioned control instruction includes above-mentioned use The face information of any user in multiple users that family terminal is collected;Above-mentioned processor 901 obtains network authentication information, above-mentioned net Network authentication information includes resident identification card function line voucher;Above-mentioned processor 901 is by above-mentioned user's face information and above-mentioned net Network authentication information is compared;If comparison result is consistent, above-mentioned transceiver 903 sends above-mentioned control instruction to mobile unit.
Specifically, can store program instruction in above-mentioned memory 902, above-mentioned processor 901 can be used for caller and refer to It enables and executes Fig. 4 and method shown in fig. 5.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in computer readable storage medium, and storage is situated between Matter include read-only memory (read only memory, ROM), random access memory (random access memory, RAM), Programmable read only memory (programmable read only memory, PROM), Erasable Programmable Read Only Memory EPROM (erasable programmable read only memory, EPROM), disposable programmable read-only memory (one-time Programmable read-only memory, OTPROM), the electronics formula of erasing can make carbon copies read-only memory (electrically-erasable programmable read-only memory, EEPROM), CD-ROM (compact Disc read-only memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage or can For carrying or any other computer-readable medium of storing data.
A kind of control method for vehicle and device disclosed in the embodiment of the present application are described in detail above, answered herein With specific case, the principle and implementation of this application are described, and the explanation of above example is only intended to help to manage Solve the present processes and its core concept;At the same time, for those skilled in the art, according to the thought of the application, There will be changes in specific embodiment and application range.In conclusion the content of the present specification should not be construed as to this Shen Limitation please.

Claims (10)

1. a kind of control method for vehicle is applied to user terminal, which is characterized in that the described method includes:
Collect the face information of any user in multiple users, wherein the multiple user can control vehicle;
Network authentication information is obtained, the network authentication information includes resident identification card function line voucher;
User's face information of collection is compared with the network authentication information;
If comparison result is consistent, control instruction is sent to server, the control instruction is described for controlling vehicle Control instruction includes the user's face information collected.
2. the method according to claim 1, wherein
When user's face information and the similarity of network authentication information are greater than first threshold, then user's face information It is consistent with the comparison result of the network authentication information;
When the similarity of user's face information and the network authentication information is less than or equal to second threshold, then the user Face information and the comparison result of the network authentication information are inconsistent;
Wherein, the first threshold is greater than the second threshold.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
Receive logging request;
Collect the face information of any user in multiple users;
When user's face information is consistent with the network authentication information, the registration information of the user is obtained, is stepped on Record.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
When the registration information of the user has not been obtained, the use is obtained from the server according to the network authentication information The registration information at family, and logged in.
5. according to the method described in claim 3, it is characterized in that, the method also includes:
After user logs in, the active information of mobile unit is received;
According to the active information, the mobile unit is activated, so that the company of foundation between the mobile unit and the server It connects.
6. a kind of control method for vehicle is applied to server, which is characterized in that the described method includes:
The control instruction that user terminal is sent is received, the control instruction includes in multiple users that the user terminal is collected The face information of any user;
Network authentication information is obtained, the network authentication information includes resident identification card function line voucher;
User's face information is compared with the network authentication information;
If comparison result is consistent, the control instruction is sent to mobile unit.
7. a kind of user terminal, which is characterized in that described device includes:
First collector unit, for collecting the face information of any user in multiple users, wherein the multiple user can be right Vehicle is controlled;
First acquisition unit, for obtaining network authentication information;
Comparing unit, for the user's face information collected to be compared with the network authentication information, the network Authentication information includes resident identification card function line voucher;
Transmission unit sends control instruction to server, the control instruction is used for vehicle if consistent for comparison result It is controlled, the control instruction includes the user's face information collected.
8. a kind of server, which is characterized in that described device includes:
Receiving unit, for receiving the control instruction of user terminal transmission, the control instruction includes that the user terminal is collected Multiple users in any user face information;
Acquiring unit, for obtaining network authentication information;
Comparing unit, for user's face information to be compared with the network authentication information, the network authentication letter Breath includes resident identification card function line voucher;
Transmission unit sends the control instruction to mobile unit if consistent for comparison result.
9. a kind of user terminal, which is characterized in that including processor, memory and transceiver;Wherein, the memory is for depositing Computer program is stored up, the computer program includes program instruction, and the processor is configured for calling described program instruction, Execute such as method described in any one of claim 1 to 5.
10. a kind of server, which is characterized in that including processor, memory and transceiver;Wherein, the memory is for depositing Computer program is stored up, the computer program includes program instruction, and the processor is configured for calling described program instruction, It executes method as claimed in claim 6.
CN201910347647.4A 2019-04-26 2019-04-26 Vehicle control method and device Active CN110077361B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910347647.4A CN110077361B (en) 2019-04-26 2019-04-26 Vehicle control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910347647.4A CN110077361B (en) 2019-04-26 2019-04-26 Vehicle control method and device

Publications (2)

Publication Number Publication Date
CN110077361A true CN110077361A (en) 2019-08-02
CN110077361B CN110077361B (en) 2022-02-22

Family

ID=67417179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910347647.4A Active CN110077361B (en) 2019-04-26 2019-04-26 Vehicle control method and device

Country Status (1)

Country Link
CN (1) CN110077361B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110843726A (en) * 2019-12-19 2020-02-28 北京明朝万达科技股份有限公司 Automobile door lock control system and method and vehicle
CN111046368A (en) * 2019-12-30 2020-04-21 重庆长安汽车股份有限公司 Method for logging in intelligent automobile cloud platform based on face recognition
CN117253279A (en) * 2023-11-17 2023-12-19 蓝色火焰科技成都有限公司 Vehicle remote control method, device and medium based on vehicle-mounted information service unit

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259800A (en) * 2013-05-29 2013-08-21 苏州福丰科技有限公司 Internet login system based on face recognition and internet login method
CN103921759A (en) * 2014-04-18 2014-07-16 深圳市威富安防有限公司 Intelligent anti-theft vehicle starting method and system
CN108734003A (en) * 2018-05-22 2018-11-02 深圳市商汤科技有限公司 Auth method, device, equipment, storage medium and program
CN108819900A (en) * 2018-06-04 2018-11-16 上海商汤智能科技有限公司 Control method for vehicle and system, vehicle intelligent system, electronic equipment, medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259800A (en) * 2013-05-29 2013-08-21 苏州福丰科技有限公司 Internet login system based on face recognition and internet login method
CN103921759A (en) * 2014-04-18 2014-07-16 深圳市威富安防有限公司 Intelligent anti-theft vehicle starting method and system
CN108734003A (en) * 2018-05-22 2018-11-02 深圳市商汤科技有限公司 Auth method, device, equipment, storage medium and program
CN108819900A (en) * 2018-06-04 2018-11-16 上海商汤智能科技有限公司 Control method for vehicle and system, vehicle intelligent system, electronic equipment, medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110843726A (en) * 2019-12-19 2020-02-28 北京明朝万达科技股份有限公司 Automobile door lock control system and method and vehicle
CN111046368A (en) * 2019-12-30 2020-04-21 重庆长安汽车股份有限公司 Method for logging in intelligent automobile cloud platform based on face recognition
CN111046368B (en) * 2019-12-30 2023-04-21 重庆长安汽车股份有限公司 Face recognition-based intelligent automobile cloud platform login method
CN117253279A (en) * 2023-11-17 2023-12-19 蓝色火焰科技成都有限公司 Vehicle remote control method, device and medium based on vehicle-mounted information service unit

Also Published As

Publication number Publication date
CN110077361B (en) 2022-02-22

Similar Documents

Publication Publication Date Title
CN105407042B (en) A kind of wechat public platform based remote sim card activating method and system
CN105468948B (en) A method of authentication is carried out by social networks
CN107483416A (en) The method and device of authentication
US7278028B1 (en) Systems and methods for cross-hatching biometrics with other identifying data
US8483659B2 (en) Methods and systems for recovering lost or stolen mobile devices
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
CN109711133A (en) Authentication method, device and the server of identity information
US20160127359A1 (en) Compliant authentication based on dynamically-updated crtedentials
US20210089635A1 (en) Biometric identity verification and protection software solution
CN110077361A (en) A kind of control method for vehicle and device
US8850534B2 (en) Methods and systems for enhancing the accuracy performance of authentication systems
CN107464325A (en) A kind of multi-layer gate control system and its implementation
CN107729727B (en) Real-name authentication method and device for account
CN109145560A (en) The method and device of accessing monitoring equipment
CN109389709B (en) Unlocking control system and unlocking control method
CN113724428B (en) Gate system for identity recognition and health detection of community owners and management method
CN106992956A (en) A kind of methods, devices and systems for realizing inter-device authentication
CN109271757A (en) A kind of offline Activiation method and system of software
CN105913513A (en) Control method and system for door lock system
JP2006309491A (en) Biometrics system
CN111831995A (en) Trusted identity authentication method and system based on eID and human body biological information
CN108492429A (en) Double mode personal identity authentication process and system
CN112927408A (en) Visitor visiting processing method and device
CN108347730B (en) Wireless communication processing method and device
CN106469269B (en) A kind of method, apparatus and terminal of Password Management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant