CN110077361A - A kind of control method for vehicle and device - Google Patents
A kind of control method for vehicle and device Download PDFInfo
- Publication number
- CN110077361A CN110077361A CN201910347647.4A CN201910347647A CN110077361A CN 110077361 A CN110077361 A CN 110077361A CN 201910347647 A CN201910347647 A CN 201910347647A CN 110077361 A CN110077361 A CN 110077361A
- Authority
- CN
- China
- Prior art keywords
- user
- mentioned
- network authentication
- information
- authentication information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2018—Central base unlocks or authorises unlocking
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
Abstract
A kind of control method for vehicle and device.This method comprises: user terminal collects the face information of any user in multiple users, wherein above-mentioned multiple users can control vehicle;Network authentication information is obtained, above-mentioned network authentication information includes resident identification card function line voucher;Above-mentioned user's face information of collection is compared with above-mentioned network authentication information;If comparison result is consistent, control instruction is sent to server, for above-mentioned control instruction for controlling vehicle, above-mentioned control instruction includes the above-mentioned user's face information collected.Implement the application, can use face recognition technology, it is ensured that remote vehicle control system is designated user group and controls, the stolen generation made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages.
Description
Technical field
This application involves field of computer technology more particularly to a kind of control method for vehicle and device.
Background technique
With the development of the society, automobile is more more and more universal.With being skyrocketed through for automobile quantity, people increasingly pursue intelligence
It can convenient and fast vehicle control system.But existing vehicle remote control apparatus is all close by inputting after mobile phone app login
Code carries out vehicle control, then will there are the following problems: cannot recognize whether be specified user's operation, once user name or
Password is known by unspecified persons, then unspecified persons also can be carried out remote vehicle control, thus will increase this vehicle
Control traffic accident that is improper and causing.
Summary of the invention
The application proposes a kind of control method for vehicle and device, utilizes face recognition technology, it can be ensured that remote vehicle control
System processed can only be controlled by designated user group, reduce because the vehicles caused by factors such as account number cipher leakage are stolen and
The generation of vehicle control fault.
In a first aspect, being applied to user terminal this application provides a kind of control method for vehicle, which comprises
Collect the face information of any user in multiple users, wherein the multiple user can control vehicle;
Network authentication information is obtained, the network authentication information includes resident identification card function line voucher;
User's face information of collection is compared with the network authentication information;
If comparison result is consistent, control instruction is sent to server, the control instruction is used to control vehicle,
The control instruction includes the user's face information collected.
In one possible implementation, when user's face information and the similarity of the network authentication information are big
When first threshold, then user's face information is consistent with the comparison result of the network authentication information;As the user people
Face information and the similarity of the network authentication information are less than or equal to second threshold, then user's face information and the net
The comparison result of network authentication information is inconsistent;Wherein, the first threshold is greater than the second threshold.
In one possible implementation, the method also includes:
Receive logging request;
Collect the face information of any user in multiple users;
When user's face information is consistent with the network authentication information, the registration information of the user is obtained, into
Row logs in.
In one possible implementation, the method also includes:
When the registration information of the user has not been obtained, institute is obtained from the server according to the network authentication information
The registration information of user is stated, and is logged in.
In one possible implementation, the method also includes:
After user logs in, the active information of mobile unit is received;
According to the active information, the mobile unit is activated, so as to build between the mobile unit and the server
Vertical connection.
Second aspect, this application provides a kind of control method for vehicle, are applied to server, which comprises
The control instruction that user terminal is sent is received, the control instruction includes multiple users that the user terminal is collected
In any user face information;
Network authentication information is obtained, the network authentication information includes resident identification card function line voucher;
User's face information is compared with the network authentication information;
If comparison result is consistent, the control instruction is sent to mobile unit.
The third aspect, the application propose a kind of user terminal, comprising:
First collector unit, for collecting the face information of any user in multiple users;
First acquisition unit, for obtaining network authentication information, the network authentication information includes that resident identification card is online
Function voucher;
Comparing unit, for the user's face information collected to be compared with the network authentication information;
Transmission unit, if for comparison result it is consistent, to server send control instruction, the control instruction for pair
Vehicle is controlled, and the control instruction includes the user's face information collected.
In one possible implementation, described device further include:
First receiving unit, for receiving logging request;
Second collector unit, for collecting the face information of any user in multiple users;
Second acquisition unit is used for when user's face information is consistent with the network authentication information, described in acquisition
The registration information of user, is logged in.
In one possible implementation, described device further include:
Third acquiring unit, for when the registration information of the user has not been obtained, according to the network authentication information
The registration information of the user is obtained from the server, and is logged in.
In one possible implementation, described device further include:
Second receiving unit, for receiving the active information of mobile unit after user logs in;
Activate unit, for according to the active information, activate the mobile unit so that the mobile unit with it is described
Connection is established between server.
Fourth aspect, the application propose a kind of server, comprising:
Receiving unit, for receiving the control instruction of user terminal transmission, the control instruction includes the user terminal
The face information for any user in multiple users collected;
Acquiring unit, for obtaining network authentication information, the network authentication information includes resident identification card function line
Voucher;
Comparing unit, for user's face information to be compared with the network authentication information;
Transmission unit sends the control instruction to mobile unit if consistent for comparison result.
5th aspect, the application propose a kind of user terminal, comprising: processor, memory and transceiver;Wherein, described
Memory is for storing computer program, and the computer program includes program instruction, and the processor is configured for calling
Described program instruction is executed such as first aspect or the proposed method of any realization.
6th aspect, the application propose a kind of server, comprising: processor, memory and transceiver;Wherein, described to deposit
For reservoir for storing computer program, the computer program includes program instruction, and the processor is configured for calling institute
It states program instruction, executes such as second aspect or the proposed method of any realization.
7th aspect, the application propose a kind of computer readable storage medium, the computer-readable recording medium storage
There is computer program, the computer program includes program instruction, and described program instructs when being executed by a processor, makes the place
Reason device executes the various aspects or any realizes proposed method.
Eighth aspect, the embodiment of the present application provide a kind of computer program product comprising program instruction, when it is being counted
When being run on calculation machine, so that computer executes the various aspects or any realizes proposed method.
Implement the application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through designated user
Group is controlled, the stolen generation made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application or in background technique below will be implemented the application
Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of flow chart for control method for vehicle that the application proposes;
Fig. 2 is the flow chart for another control method for vehicle that the application proposes;
Fig. 3 is a kind of flow chart of the concrete application scene for control method for vehicle that the application proposes;
Fig. 4 is the flow chart for another control method for vehicle that the application proposes;
Fig. 5 is a kind of frame diagram for vehicle control system that the application proposes;
Fig. 6 is a kind of structural schematic diagram for user terminal that the application proposes;
Fig. 7 is a kind of structural schematic diagram for server that the application proposes;
Fig. 8 is the structural schematic diagram for another user terminal that the application proposes;
Fig. 9 is the structural schematic diagram for another server that the application proposes.
Specific embodiment
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, meaning
Figure, which is to cover, non-exclusive includes.Such as contain the process, method, system, product or equipment of a series of steps or units
It is not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also
Including other step or units intrinsic for these process, methods or equipment.
Existing vehicle remote control apparatus is all that input password carries out vehicle control after logging in by mobile phone app, that
It will there are the following problems: cannot recognize whether be specified user's operation, once user name or password are by unspecified persons
Know, then unspecified persons also can be carried out remote vehicle control, it is improper and cause thus to will increase this vehicle control
Traffic accident.
The application proposes a kind of control method for vehicle and device, can use face recognition technology, it is ensured that remote vehicle control
System processed can only be controlled by designated user group, reduce because the vehicles caused by factors such as account number cipher leakage are stolen and
The generation of vehicle control fault.
Fig. 1 is a kind of flow chart for control method for vehicle that the application proposes, is applied to user terminal, and the above method includes
The following contents:
101, the face information of any user in multiple users is collected, wherein above-mentioned multiple users can carry out vehicle
Control.
Any user in multiple users is shot specifically, face recognition technology can be used, collects multiple use
The face information of any user in family;Multiple users can be car owner and its relatives and friends, and user terminal stores multiple users'
Network authentication information can correctly identify the face information of multiple users, so that vehicle be allow to pass through use by designated user group
Family terminal realizes control, both ensure that the safety of vehicle control, and that has also expanded user terminal uses crowd.It is legal to vehicle
The designated user group of control can be selected by car owner, and the personal information of designated user group need to upload to user terminal and service
Device.
Face recognition technology is the face feature based on people, is identified to the facial image or video of input.First
Judge that it then further provides position, size and each major facial organ of face if there is face with the presence or absence of face
Location information.And according to these information, the identity characteristic contained in face is further extracted, and by itself and known face
It compares, to identify the identity of face.
102, network authentication information is obtained.
Specifically, obtaining network authentication information according to the personal information of designated user group, which can be with
Legal control vehicle.Above-mentioned network authentication information includes resident identification card function line voucher.Resident identification card function line with
Card is electronic edition identity card, is to authenticate based on resident identification card, using the trusted identity of living body faces identification technology, by the Ministry of Public Security
First research institute cooperates to combine release with various regions public security organ.The voucher is that " internet+trusted identity certification is flat by country
Platform ", which is signed and issued, demonstrate,proves chip uniquely corresponding electronic document with entity identities.
There are many kinds of the methods for obtaining resident identification card function line voucher, for example, at present many software platforms with public affairs
The cooperation of peace portion possesses the creation of resident identification card function line voucher or shows function, perhaps can also put into effect special resident below
Identity card function line credential software, it is possible to provide Software Development Kit (software development kit, SDK) makes
The access of other software platform, such as: then the SDK access that software A can call software B to provide obtains the net identification in software B
Information is demonstrate,proved, it includes personal head portrait and identity information which, which demonstrate,proves information,.
103, above-mentioned user's face information of collection is compared with above-mentioned network authentication information.
Specifically, when above-mentioned user's face information and the similarity of above-mentioned network authentication information are greater than first threshold, then
Above-mentioned user's face information is consistent with the comparison result of above-mentioned network authentication information;When above-mentioned user's face information and above-mentioned network
The similarity of authentication information is less than or equal to second threshold, the then comparison of above-mentioned user's face information and above-mentioned network authentication information
As a result inconsistent;Wherein, above-mentioned first threshold is greater than above-mentioned second threshold.Implement this step can detect the user identity whether
It is consistent with the identity in network authentication information.
If 104, comparison result is consistent, control instruction is sent to server.
Specifically, when above-mentioned user's face information and the similarity of above-mentioned network authentication information are greater than first threshold, then
Above-mentioned user's face information is consistent with the comparison result of above-mentioned network authentication information.Above-mentioned control instruction is for controlling vehicle
System, above-mentioned control instruction include the above-mentioned user's face information collected.If above-mentioned user's face information and above-mentioned network authentication are believed
The similarity of breath is less than or equal to second threshold, i.e., the comparison result of above-mentioned user's face information and above-mentioned network authentication information is not
Unanimously, then user terminal judges that the operator is not designated user, and user terminal does not send above-mentioned control instruction.Above-mentioned control refers to
It enables for controlling vehicle, above-mentioned control instruction includes the above-mentioned user's face information collected.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger
Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages
It is raw.
Fig. 2 is the flow diagram for another control method for vehicle that the application proposes, is applied to user terminal, above-mentioned side
Method includes the following contents:
201, network authentication information is obtained.
Specifically, above-mentioned network authentication information includes resident identification card function line voucher.
202, logging request is received.
203, the face information of any user in multiple users is collected, wherein above-mentioned multiple users can control vehicle
System.
Specifically, when users log on, triggering the face identification functions of user terminal, user terminal takes the modes such as shooting
Collect user's face information.
Implement this step, when user logs in, it is also desirable to authentication be carried out by recognition of face, to ensure remote vehicle
Control system can only be controlled by designated user group.
204, when above-mentioned user's face information is consistent with above-mentioned network authentication information, the registration letter of above-mentioned user is obtained
Breath, is logged in.
Specifically, user terminal judges the operation when above-mentioned user's face information is consistent with above-mentioned network authentication information
Person is designated user.User terminal further judges whether designated user has registered, if finding the registration letter of the designated user
Breath, that is, show to have registered, then logged in.When above-mentioned user's face information and above-mentioned network authentication information are inconsistent, use
Family terminal judges that the operator is not designated user, and the operator is forbidden to log in.It is logged in, is guaranteed using face recognition technology
Login process is optimized while safety, makes user's more convenient operation.
205, it when the registration information of above-mentioned user has not been obtained, is obtained according to above-mentioned network authentication information from above-mentioned server
The registration information of above-mentioned user is taken, and is logged in.
Specifically, when the registration information of above-mentioned user has not been obtained, user terminal according to above-mentioned network authentication information from
Above-mentioned server obtains the registration information of above-mentioned user, and above-mentioned registration information is stored in user terminal, completes to register and carry out
It logs in.
Implement this step, user terminal helps designated user to carry out registration operation automatically, while utilizing resident identification card net
The uniqueness and authority of upper function voucher are automatically performed real-name authentication, keep operation more convenient.
206, after user logs in, the active information of mobile unit is received.
Specifically, in order to realize the long-range control to vehicle, designated user also needs that mobile unit is activated to make above-mentioned vehicle-mounted
Connection is established between equipment and above-mentioned server.Above-mentioned active information can be the facility information and equipment sequence of mobile unit
Number.
207, according to above-mentioned active information, activate above-mentioned mobile unit so that above-mentioned mobile unit and above-mentioned server it
Between establish connection.
Specifically, pre-stored facility information to be activated is compared with the above-mentioned active information received, verify
By rear, connection is established between above-mentioned mobile unit and above-mentioned server, is active.Mobile unit receives control instruction
Following function can be exercised: as opened the door, starting, car locking etc..
If un-activation success, user terminal output error message remind user to activate failure.
208, the face information of any user in multiple users is collected.
Specifically, triggering the face identification functions of user terminal if user sends control instruction by user terminal, use
Family terminal can take the modes such as shooting to collect user's face information.Implement this step, is conducive to identify user identity.
209, above-mentioned user's face information of collection is compared with above-mentioned network authentication information.
Specifically, when above-mentioned user's face information and the similarity of above-mentioned network authentication information are greater than first threshold, then
Above-mentioned user's face information is consistent with the comparison result of above-mentioned network authentication information;When above-mentioned user's face information and above-mentioned network
The similarity of authentication information is less than or equal to second threshold, the then comparison of above-mentioned user's face information and above-mentioned network authentication information
As a result inconsistent;Wherein, above-mentioned first threshold is greater than above-mentioned second threshold.Implement this step purpose be detection user whether be
Designated user.
If 210, comparison result is consistent, control instruction is sent to server.
Specifically, above-mentioned control instruction can control car door opening, vehicle launch.Above-mentioned control instruction includes the upper of collection
User's face information is stated, so that server identifies user identity.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger
Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages
It is raw.
Fig. 3 is a kind of flow diagram of the concrete application scene for control method for vehicle that the application proposes, is applied to use
Family terminal, the above method include the following contents:
301, network authentication information is obtained.
For example, the network authentication information of designated user group, network authentication letter are obtained from third party's credible platform
Breath includes resident identification card function line voucher.
302, logging request is received.
For example, the logging request of user's first is received.
303, user's face information is collected.
For example, user terminal collects the face information of user's first by way of shooting.
304, when above-mentioned user's face information is consistent with above-mentioned network authentication information, the registration letter of above-mentioned user is obtained
Breath, is logged in.
For example, user terminal is by the resident identification card function line voucher of the face information of user's first and designated user
Head image information be compared, when the head image information of above-mentioned user's first face information and the network authentication information of above-mentioned designated user
When similarity is greater than first threshold, then the comparison knot of the network authentication information of above-mentioned user's first face information and above-mentioned designated user
Fruit is consistent, and above-mentioned first threshold can be 95%.Comparing result unanimously then shows that user's first is designated user.User terminal obtains
The registration information of user's first, is logged in.
305, it when the registration information of above-mentioned user has not been obtained, is obtained according to above-mentioned network authentication information from above-mentioned server
The registration information of above-mentioned user is taken, and is logged in.
For example, when the registration information of user's first has not been obtained, user terminal according to above-mentioned network authentication information from
Above-mentioned server obtains the registration information of above-mentioned user's first, and is logged in.
306, after user logs in, the active information of mobile unit is received.
For example, after user's first logs in, the activation for vehicle-mounted TBOX that user terminal receives the input of user's first is believed
Breath.
307, according to above-mentioned active information, activate above-mentioned mobile unit so that above-mentioned mobile unit and above-mentioned server it
Between establish connection.
For example, vehicle-mounted TBOX is activated, makes to establish connection between the vehicle-mounted TBOX and above-mentioned server.
308, user's face information is collected.
For example, when user's first sends control instruction, the face identification functions of user terminal are triggered, user terminal is adopted
The face information of user's first is collected with the mode of shooting.
309, above-mentioned user's face information of collection is compared with above-mentioned network authentication information.
For example, the face information of user's first of collection is compared with the network authentication information of designated user.
If 310, comparison result is consistent, control instruction is sent to server.
For example, if the face information of user's first is similar to the head image information of the network authentication information of above-mentioned designated user
When degree is greater than first threshold (first threshold can be 95%), then the net of the face information of above-mentioned user's first and above-mentioned designated user
The comparison result of network authentication information is consistent.Comparing result unanimously shows that user's first is designated user, then user terminal is to server
Send control instruction.The control instruction can control car door opening, which includes the face information of user's first.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger
Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages
It is raw.
Fig. 4 be the application propose a kind of control method for vehicle flow chart, be applied to server, the above method include with
Lower content:
401, the control instruction that user terminal is sent is received.
Specifically, server and above-mentioned mobile unit are established and are communicated to connect after user terminal activates mobile unit.Clothes
Business device receives the control instruction that user terminal is sent, which can indicate that mobile unit completes corresponding operation, such as vehicle
Door unlatching, vehicle launch.The control instruction includes user's face information that above-mentioned user terminal is collected.
402, network authentication information is obtained.
Specifically, obtaining the network authentication information of designated user group, which includes resident identification card net
Upper function voucher.
There are many kinds of the methods for obtaining resident identification card function line voucher, for example, at present many software platforms with public affairs
The cooperation of peace portion possesses the creation of resident identification card function line voucher or shows function, perhaps can also put into effect special resident below
Identity card function line credential software, it is possible to provide SDK accesses other software platform, such as: software A can call software B
The SDK of offer is accessed, and is then obtained the net in software B and is demonstrate,proved authentication information, which includes personal head portrait and identity
Information.
403, above-mentioned user's face information is compared with above-mentioned network authentication information.
Specifically, above-mentioned user's face information is compared with the network authentication information of above-mentioned designated user, with verifying
The identity information of user.
Specifically, when above-mentioned user's face information and the similarity of above-mentioned network authentication information are greater than first threshold, then
Above-mentioned user's face information is consistent with the comparison result of above-mentioned network authentication information;When above-mentioned user's face information and above-mentioned network
The similarity of authentication information is less than or equal to second threshold, the then comparison of above-mentioned user's face information and above-mentioned network authentication information
As a result inconsistent;Wherein, above-mentioned first threshold is greater than above-mentioned second threshold.
If 404, comparison result is consistent, above-mentioned control instruction is sent to mobile unit.
Specifically, when above-mentioned user's face information and the similarity of the network authentication information of above-mentioned designated user are greater than first
When threshold value, then above-mentioned user's face information is consistent with the comparison result of the network authentication information of above-mentioned designated user, first threshold
Value can be 95%.Comparison result unanimously then shows that the user identity is designated user, and server sends above-mentioned to mobile unit
Control instruction.The control instruction indicates that mobile unit completes corresponding movement, such as control car door opening, and control car light is opened.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger
Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages
It is raw.
Technical solution of the present invention for ease of understanding, in the following, being done in conjunction with a concrete application scene embodiment to the present invention
Further instruction.
Referring to Fig. 5, Fig. 5 is a kind of frame diagram for vehicle control system that the application proposes.As shown in figure 5, the vehicle
Control system includes but is not limited to user terminal, server and mobile unit.User terminal, server and vehicle equipment communication connect
It connects, the embodiment of the present application does not make uniqueness limit for the communication connection mode between the user terminal, server and mobile unit
It is fixed.
Server receives the control instruction that user terminal is sent, which includes the user that above-mentioned user terminal is collected
First face information, the control instruction indicate car door opening;The network authentication information of server acquisition designated user group;Server
User's first face information is compared with the network authentication information of above-mentioned designated user;When above-mentioned user's first face information with it is upper
When stating the similarity of the network authentication information of designated user greater than 95%, above-mentioned user's first face information is with above-mentioned designated user's
The comparison result of network authentication information is consistent, and server sends above-mentioned control instruction to mobile unit, controls car door opening.
Implement the embodiment of the present application, can use face recognition technology, it is ensured that remote vehicle control system can only pass through finger
Determine user group to control, the stolen hair made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages
It is raw.
Fig. 6 is a kind of structural schematic diagram for user terminal that the application proposes, above-mentioned apparatus includes:
First collector unit 601, for collecting the face information of any user in multiple users, wherein above-mentioned multiple use
Family can control vehicle;
First acquisition unit 602, for obtaining network authentication information, above-mentioned network authentication information includes resident identification card net
Upper function voucher;
Comparing unit 603, for the above-mentioned user's face information collected to be compared with above-mentioned network authentication information;
Transmission unit 604 sends control instruction to server, above-mentioned control instruction is used if consistent for comparison result
It is controlled in vehicle, above-mentioned control instruction includes the above-mentioned user's face information collected.
Further, above-mentioned apparatus further include:
First receiving unit 605, for receiving logging request;
Second collector unit 606, for collecting the face information of any user in multiple users;
Second acquisition unit 607 is used for when above-mentioned user's face information is consistent with above-mentioned network authentication information, in acquisition
The registration information for stating user, is logged in;
Third acquiring unit 608, for being believed according to above-mentioned network authentication when the registration information of above-mentioned user has not been obtained
Breath obtains the registration information of above-mentioned user from above-mentioned server, and is logged in;
Second receiving unit 609, for receiving the active information of mobile unit after user logs in;
Activate unit 610, for according to above-mentioned active information, activate above-mentioned mobile unit so that above-mentioned mobile unit with
Connection is established between above-mentioned server.
It is understood that the specific implementation of device shown in fig. 6 reference may also be made to Fig. 1, Fig. 2 and method shown in Fig. 3, here
No longer it is described in detail one by one.
In the embodiment of the present application, the first collector unit 601 collects the face information of any user in multiple users,
In, above-mentioned multiple users can control vehicle;First acquisition unit 602 obtains network authentication information, above-mentioned network authentication
Information includes resident identification card function line voucher;Comparing unit 603 is by above-mentioned user's face information of collection and above-mentioned network
Authentication information is compared;If comparison result is consistent, transmission unit 604 sends control instruction to server, and above-mentioned control refers to
It enables for controlling vehicle, above-mentioned control instruction includes the above-mentioned user's face information collected.As it can be seen that the embodiment of the present application
It can use face recognition technology, it is ensured that remote vehicle control system can only be controlled by designated user group, be reduced
Because of the generation that the vehicles caused by factors such as account number cipher leakage are stolen and vehicle control is made mistakes.
Fig. 7 is a kind of structural schematic diagram for server that the application proposes, above-mentioned apparatus includes:
Receiving unit 701, for receiving the control instruction of user terminal transmission, above-mentioned control instruction includes that above-mentioned user is whole
Hold the face information of any user in the multiple users collected;
Acquiring unit 702, for obtaining network authentication information, above-mentioned network authentication information includes the online function of resident identification card
It can voucher;
Comparing unit 703, for above-mentioned user's face information to be compared with above-mentioned network authentication information;
Transmission unit 704 sends above-mentioned control instruction to mobile unit if consistent for comparison result.
It is understood that the specific implementation of device shown in Fig. 7 reference may also be made to Fig. 4 and method shown in fig. 5, here no longer
It is described in detail one by one.
In the embodiment of the present application, receiving unit 701 receives the control instruction that user terminal is sent, above-mentioned control instruction packet
Include the face information of any user in multiple users that above-mentioned user terminal is collected;Acquiring unit 702 obtains network authentication information,
Above-mentioned network authentication information includes resident identification card function line voucher;Comparing unit 703 by above-mentioned user's face information with it is upper
Network authentication information is stated to be compared;If comparison result is consistent, transmission unit 704 sends above-mentioned control to mobile unit and refers to
It enables.As it can be seen that the embodiment of the present application can use face recognition technology, it is ensured that remote vehicle control system can only pass through designated user
Group is controlled, the stolen generation made mistakes with vehicle control of vehicle caused by reducing because of factors such as account number cipher leakages.
Referring to Fig. 8, Fig. 8 is the structural schematic diagram of another user terminal provided by the embodiments of the present application.The device packet
It includes: at least one processing 801, such as central processing unit (central processing unit, CPU), at least one processor
802, at least one transceiver 803 and at least one bus 804.Wherein, above-mentioned bus 804 can be one group of parallel data
Line, for realizing the interconnection of above-mentioned processor 801, above-mentioned memory 802 and above-mentioned transceiver 803;Above-mentioned memory 802
It can be high-speed random access memory (random access memory, RAM), be also possible to nonvolatile memory
(non-volatile memory), for example, at least a read-only memory (read only memory, ROM).
Specifically, above-mentioned processor 801 collects the face information of any user in multiple users, wherein above-mentioned multiple use
Family can control vehicle;Above-mentioned processor 801 obtains network authentication information, and above-mentioned network authentication information includes residential identity
Demonstrate,prove function line voucher;Above-mentioned processor 801 compares above-mentioned user's face information of collection with above-mentioned network authentication information
It is right;If comparison result is consistent, above-mentioned transceiver 803 sends control instruction to server, and above-mentioned control instruction is used for vehicle
It is controlled, above-mentioned control instruction includes the above-mentioned user's face information collected.
Further, above-mentioned transceiver 803 receives logging request;Above-mentioned processor 801 collects any use in multiple users
The face information at family;When above-mentioned user's face information is consistent with above-mentioned network authentication information, above-mentioned processor 801 obtains above-mentioned
The registration information of user, is logged in.
Further, when the registration information of above-mentioned user has not been obtained, above-mentioned processor 801 is according to above-mentioned network authentication
Information obtains the registration information of above-mentioned user from above-mentioned server, and is logged in.
Further, after user logs in, above-mentioned transceiver 803 receives the active information of mobile unit;Above-mentioned processor
801, according to above-mentioned active information, activate above-mentioned mobile unit, so that the company of foundation between above-mentioned mobile unit and above-mentioned server
It connects.
Specifically, can store program instruction in above-mentioned memory 802, above-mentioned processor 801 can be used for caller and refer to
It enables and executes Fig. 1, Fig. 2 and method shown in Fig. 3.
Referring to Fig. 9, Fig. 9 is the structural schematic diagram of another server provided by the embodiments of the present application.The device includes:
At least one processing 901, such as central processing unit (central processing unit, CPU), at least one processor
902, at least one transceiver 903 and at least one bus 904.Wherein, above-mentioned bus 904 can be one group of parallel data
Line, for realizing the interconnection of above-mentioned processor 901, above-mentioned memory 902 and above-mentioned transceiver 903;Above-mentioned memory 902
It can be high-speed random access memory (random access memory, RAM), be also possible to nonvolatile memory
(non-volatile memory), for example, at least a read-only memory (read only memory, ROM).
Specifically, above-mentioned transceiver 903 receives the control instruction that user terminal is sent, above-mentioned control instruction includes above-mentioned use
The face information of any user in multiple users that family terminal is collected;Above-mentioned processor 901 obtains network authentication information, above-mentioned net
Network authentication information includes resident identification card function line voucher;Above-mentioned processor 901 is by above-mentioned user's face information and above-mentioned net
Network authentication information is compared;If comparison result is consistent, above-mentioned transceiver 903 sends above-mentioned control instruction to mobile unit.
Specifically, can store program instruction in above-mentioned memory 902, above-mentioned processor 901 can be used for caller and refer to
It enables and executes Fig. 4 and method shown in fig. 5.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in computer readable storage medium, and storage is situated between
Matter include read-only memory (read only memory, ROM), random access memory (random access memory, RAM),
Programmable read only memory (programmable read only memory, PROM), Erasable Programmable Read Only Memory EPROM
(erasable programmable read only memory, EPROM), disposable programmable read-only memory (one-time
Programmable read-only memory, OTPROM), the electronics formula of erasing can make carbon copies read-only memory
(electrically-erasable programmable read-only memory, EEPROM), CD-ROM (compact
Disc read-only memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage or can
For carrying or any other computer-readable medium of storing data.
A kind of control method for vehicle and device disclosed in the embodiment of the present application are described in detail above, answered herein
With specific case, the principle and implementation of this application are described, and the explanation of above example is only intended to help to manage
Solve the present processes and its core concept;At the same time, for those skilled in the art, according to the thought of the application,
There will be changes in specific embodiment and application range.In conclusion the content of the present specification should not be construed as to this Shen
Limitation please.
Claims (10)
1. a kind of control method for vehicle is applied to user terminal, which is characterized in that the described method includes:
Collect the face information of any user in multiple users, wherein the multiple user can control vehicle;
Network authentication information is obtained, the network authentication information includes resident identification card function line voucher;
User's face information of collection is compared with the network authentication information;
If comparison result is consistent, control instruction is sent to server, the control instruction is described for controlling vehicle
Control instruction includes the user's face information collected.
2. the method according to claim 1, wherein
When user's face information and the similarity of network authentication information are greater than first threshold, then user's face information
It is consistent with the comparison result of the network authentication information;
When the similarity of user's face information and the network authentication information is less than or equal to second threshold, then the user
Face information and the comparison result of the network authentication information are inconsistent;
Wherein, the first threshold is greater than the second threshold.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
Receive logging request;
Collect the face information of any user in multiple users;
When user's face information is consistent with the network authentication information, the registration information of the user is obtained, is stepped on
Record.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
When the registration information of the user has not been obtained, the use is obtained from the server according to the network authentication information
The registration information at family, and logged in.
5. according to the method described in claim 3, it is characterized in that, the method also includes:
After user logs in, the active information of mobile unit is received;
According to the active information, the mobile unit is activated, so that the company of foundation between the mobile unit and the server
It connects.
6. a kind of control method for vehicle is applied to server, which is characterized in that the described method includes:
The control instruction that user terminal is sent is received, the control instruction includes in multiple users that the user terminal is collected
The face information of any user;
Network authentication information is obtained, the network authentication information includes resident identification card function line voucher;
User's face information is compared with the network authentication information;
If comparison result is consistent, the control instruction is sent to mobile unit.
7. a kind of user terminal, which is characterized in that described device includes:
First collector unit, for collecting the face information of any user in multiple users, wherein the multiple user can be right
Vehicle is controlled;
First acquisition unit, for obtaining network authentication information;
Comparing unit, for the user's face information collected to be compared with the network authentication information, the network
Authentication information includes resident identification card function line voucher;
Transmission unit sends control instruction to server, the control instruction is used for vehicle if consistent for comparison result
It is controlled, the control instruction includes the user's face information collected.
8. a kind of server, which is characterized in that described device includes:
Receiving unit, for receiving the control instruction of user terminal transmission, the control instruction includes that the user terminal is collected
Multiple users in any user face information;
Acquiring unit, for obtaining network authentication information;
Comparing unit, for user's face information to be compared with the network authentication information, the network authentication letter
Breath includes resident identification card function line voucher;
Transmission unit sends the control instruction to mobile unit if consistent for comparison result.
9. a kind of user terminal, which is characterized in that including processor, memory and transceiver;Wherein, the memory is for depositing
Computer program is stored up, the computer program includes program instruction, and the processor is configured for calling described program instruction,
Execute such as method described in any one of claim 1 to 5.
10. a kind of server, which is characterized in that including processor, memory and transceiver;Wherein, the memory is for depositing
Computer program is stored up, the computer program includes program instruction, and the processor is configured for calling described program instruction,
It executes method as claimed in claim 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910347647.4A CN110077361B (en) | 2019-04-26 | 2019-04-26 | Vehicle control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910347647.4A CN110077361B (en) | 2019-04-26 | 2019-04-26 | Vehicle control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110077361A true CN110077361A (en) | 2019-08-02 |
CN110077361B CN110077361B (en) | 2022-02-22 |
Family
ID=67417179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910347647.4A Active CN110077361B (en) | 2019-04-26 | 2019-04-26 | Vehicle control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110077361B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110843726A (en) * | 2019-12-19 | 2020-02-28 | 北京明朝万达科技股份有限公司 | Automobile door lock control system and method and vehicle |
CN111046368A (en) * | 2019-12-30 | 2020-04-21 | 重庆长安汽车股份有限公司 | Method for logging in intelligent automobile cloud platform based on face recognition |
CN117253279A (en) * | 2023-11-17 | 2023-12-19 | 蓝色火焰科技成都有限公司 | Vehicle remote control method, device and medium based on vehicle-mounted information service unit |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103259800A (en) * | 2013-05-29 | 2013-08-21 | 苏州福丰科技有限公司 | Internet login system based on face recognition and internet login method |
CN103921759A (en) * | 2014-04-18 | 2014-07-16 | 深圳市威富安防有限公司 | Intelligent anti-theft vehicle starting method and system |
CN108734003A (en) * | 2018-05-22 | 2018-11-02 | 深圳市商汤科技有限公司 | Auth method, device, equipment, storage medium and program |
CN108819900A (en) * | 2018-06-04 | 2018-11-16 | 上海商汤智能科技有限公司 | Control method for vehicle and system, vehicle intelligent system, electronic equipment, medium |
-
2019
- 2019-04-26 CN CN201910347647.4A patent/CN110077361B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103259800A (en) * | 2013-05-29 | 2013-08-21 | 苏州福丰科技有限公司 | Internet login system based on face recognition and internet login method |
CN103921759A (en) * | 2014-04-18 | 2014-07-16 | 深圳市威富安防有限公司 | Intelligent anti-theft vehicle starting method and system |
CN108734003A (en) * | 2018-05-22 | 2018-11-02 | 深圳市商汤科技有限公司 | Auth method, device, equipment, storage medium and program |
CN108819900A (en) * | 2018-06-04 | 2018-11-16 | 上海商汤智能科技有限公司 | Control method for vehicle and system, vehicle intelligent system, electronic equipment, medium |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110843726A (en) * | 2019-12-19 | 2020-02-28 | 北京明朝万达科技股份有限公司 | Automobile door lock control system and method and vehicle |
CN111046368A (en) * | 2019-12-30 | 2020-04-21 | 重庆长安汽车股份有限公司 | Method for logging in intelligent automobile cloud platform based on face recognition |
CN111046368B (en) * | 2019-12-30 | 2023-04-21 | 重庆长安汽车股份有限公司 | Face recognition-based intelligent automobile cloud platform login method |
CN117253279A (en) * | 2023-11-17 | 2023-12-19 | 蓝色火焰科技成都有限公司 | Vehicle remote control method, device and medium based on vehicle-mounted information service unit |
Also Published As
Publication number | Publication date |
---|---|
CN110077361B (en) | 2022-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105407042B (en) | A kind of wechat public platform based remote sim card activating method and system | |
CN105468948B (en) | A method of authentication is carried out by social networks | |
CN107483416A (en) | The method and device of authentication | |
US7278028B1 (en) | Systems and methods for cross-hatching biometrics with other identifying data | |
US8483659B2 (en) | Methods and systems for recovering lost or stolen mobile devices | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
CN109711133A (en) | Authentication method, device and the server of identity information | |
US20160127359A1 (en) | Compliant authentication based on dynamically-updated crtedentials | |
US20210089635A1 (en) | Biometric identity verification and protection software solution | |
CN110077361A (en) | A kind of control method for vehicle and device | |
US8850534B2 (en) | Methods and systems for enhancing the accuracy performance of authentication systems | |
CN107464325A (en) | A kind of multi-layer gate control system and its implementation | |
CN107729727B (en) | Real-name authentication method and device for account | |
CN109145560A (en) | The method and device of accessing monitoring equipment | |
CN109389709B (en) | Unlocking control system and unlocking control method | |
CN113724428B (en) | Gate system for identity recognition and health detection of community owners and management method | |
CN106992956A (en) | A kind of methods, devices and systems for realizing inter-device authentication | |
CN109271757A (en) | A kind of offline Activiation method and system of software | |
CN105913513A (en) | Control method and system for door lock system | |
JP2006309491A (en) | Biometrics system | |
CN111831995A (en) | Trusted identity authentication method and system based on eID and human body biological information | |
CN108492429A (en) | Double mode personal identity authentication process and system | |
CN112927408A (en) | Visitor visiting processing method and device | |
CN108347730B (en) | Wireless communication processing method and device | |
CN106469269B (en) | A kind of method, apparatus and terminal of Password Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |