CN110148262A - A kind of third party's automobile leasing management system and automobile starting authorization method based on recognition of face - Google Patents

A kind of third party's automobile leasing management system and automobile starting authorization method based on recognition of face Download PDF

Info

Publication number
CN110148262A
CN110148262A CN201910417530.9A CN201910417530A CN110148262A CN 110148262 A CN110148262 A CN 110148262A CN 201910417530 A CN201910417530 A CN 201910417530A CN 110148262 A CN110148262 A CN 110148262A
Authority
CN
China
Prior art keywords
face
vehicle
information
car
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910417530.9A
Other languages
Chinese (zh)
Inventor
韩牟
殷志昆
马世典
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu University
Original Assignee
Jiangsu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University filed Critical Jiangsu University
Priority to CN201910417530.9A priority Critical patent/CN110148262A/en
Publication of CN110148262A publication Critical patent/CN110148262A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N33/00Investigating or analysing materials by specific methods not covered by groups G01N1/00 - G01N31/00
    • G01N33/48Biological material, e.g. blood, urine; Haemocytometers
    • G01N33/483Physical analysis of biological material
    • G01N33/497Physical analysis of biological material of gaseous biological material, e.g. breath
    • G01N33/4972Determining alcohol content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/213Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
    • G06F18/2135Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods based on approximation criteria, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/165Detection; Localisation; Normalisation using facial parts and geometric relationships
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0042Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
    • G07F17/0057Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects for the hiring or rent of vehicles, e.g. cars, bicycles or wheelchairs

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Molecular Biology (AREA)
  • Biomedical Technology (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Chemical & Material Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Pathology (AREA)
  • Economics (AREA)
  • Biochemistry (AREA)
  • Marketing (AREA)
  • Immunology (AREA)
  • Medicinal Chemistry (AREA)
  • Computer Security & Cryptography (AREA)
  • Food Science & Technology (AREA)
  • Urology & Nephrology (AREA)
  • Analytical Chemistry (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Geometry (AREA)
  • Development Economics (AREA)
  • Hematology (AREA)
  • Biophysics (AREA)

Abstract

The present invention provides a kind of third party's automobile leasing management system and automobile starting authorization method based on recognition of face, the system comprises entity user, automobile rental corporation, mobile module, third-party platform and onboard systems, comprising: two dimensional code module, main control module, face recognition module, vehicle-mounted control module, alcohol sensor and alcohol detection module.Automobile starting authorization is realized using face recognition technology, car borrowing people by authorization need to only use two dimensional code personal account and vehicle binding before for the first time using the vehicle and stop the several seconds to recognition of face camera and make the expression of requirement, it is detected finally by alcohol, so that it may start automobile.Without the people of authorization, because there is no corresponding face information authorization in system, vehicle can not be started taking the key of the vehicle, the antitheft purpose after reaching key loss.

Description

A kind of third party's automobile leasing management system and automobile starting based on recognition of face is awarded Power method
Technical field
The present invention relates to authorization and technical field of burglary prevention, more particularly to and a kind of third party's automobile rent based on recognition of face Management system of renting and automobile starting authorization method.
Background technique
With the rapid development of society, automobile enters family and is come true by dream, and people's daily trip habit changes Become so that automobile becomes one of main vehicles.However, non-car owner, which authorizes, to be driven with the continuous improvement for borrowing vehicle demand The accident and dispute and vehicle that vehicle causes are stolen repeated for phenomenon, have developed into the social concern got worse. Mass data is the study found that driver drives a vehicle in the case where not drinking, the dangerous situation in discovery front, from visually perceiving The reaction time stepped among brakeage is 0.75 second, and the reaction time will slow down 2-3 in the case where capable of still driving after drinking Times, the braking distance under synchronized traveling also will accordingly extend, and increase a possibility that accident occurs after drinking.And the hair of traffic accident It is raw not only cause a tremendous loss of lives, property loss, also bring on a disaster to countless families, and drastically influence social stability and system About household economy accumulation, and then restrict entire society's economic development.
Currently, so-called car owner authorizes driving vehicle to remain in the original oral stage, it can not be by long-range effective Control vehicle unauthorized driving.Although having developed many relevant technologies in terms of vehicle anti-theft, these technologies exist Certain effect is also functioned in terms of vehicle anti-theft, but the theft problem for caused by key loss still lacks cost and fits In, effective means.
Two dimensional code is with specific geometric figure according to certain rules in the chequered with black and white of plane (on two-dimensional directional) distribution The barcode technology of new generation of rectangle square matrix record data symbol information, which has, to contain much information, and error correcting capability is strong, and recognition speed is fast, protects The characteristics such as close property is high, and traceability is high, and damage resistance is strong, and redundant is big, and cost is cheap.Mobile phone two-dimension code is planar bar code technology in mobile phone On application, have been widely used for asking beam at present, poster is registered, business card, direction board, the various occasions such as exploitation.If making With two dimensional code when certain important events transmitting has the more demanding data of identity information, timeliness, need to calculate its encryption and decryption Method optimizes.
Recognition of face is a kind of biological identification technology for carrying out identification based on facial feature information of people.Face with Other biological characteristics (fingerprint, iris etc.) of human body are equally inherent, its uniqueness and are not easy the superperformance being replicated Necessary premise is provided for identity identification, recognition of face has a characteristic that non-strong compared with other types of bio-identification Property processed;It is untouchable;Concurrency.Face recognition products are widely used to medical treatment, the administration of justice, army, public security, electric power, government, boat It, frontier inspection, factory, education, the fields such as finance and numerous enterprises and institutions.With the further mature and Social Agree of technology Raising, face recognition technology is applied in more fields.
The encryption technologies such as MD5, which are widely used in, encrypts various information, current safety with higher, and in hand It is also easy to realize on machine platform.
Alcohol sensor, for detecting whether human body takes in alcohol and intake alcohol how many degree.It can be used as traffic Driver's wine-drinking how many detection instrument of drinking is detected when police enforces the law, to effectively reduce the generation of major traffic accidents;It can also be with Alcohol content in other occasions detection characteristics of contaminated respiratory droplets gas, avoids the heavy losses of casualties and property, such as some Forbid the enterprise being on duty after drinking in high-risk field.It can be used for judging whether driving when intoxicated.The common detection driven when intoxicated has two Kind method: first is that the blood alcohol concentration of detection human body, one is detection expiration alcohol concentration.In theory, to judge be No to drive when intoxicated, most accurate method should be the alcohol content checked in driver's blood.But illegal activities processing or In person's highway communication routine inspection, scene to extract, blood is often unpractical, and the method for most simple possible is on-site test Alcohol content in driver's expiration.
2DPCA algorithm is the improvement based on PCA (principal component analysis) method, and the method for directly utilizing two-dimensional projection is special Two-dimensional matrix is based on when sign is extracted rather than one-dimensional vector.The covariance matrix calculated using 2DPCA is calculated with PCA Covariance matrix compare, relative straightforward with it is convenient, calculation amount also greatly reduces, time-consuming reduce, extract feature it is more efficient.
In view of the above-mentioned problems, it is necessary to provide a kind of third party's automobile leasing management system and automobile based on recognition of face Start authorization method.
Summary of the invention
The present invention is based on third party's automobile leasing management systems of recognition of face and automobile starting authorization method using two dimension Code technology is combined with recognition of face and alcohol detection, for preventing car stealer from stealing automobile to automobile implementation preferably protection, It prevents car borrowing people from lending others and prevents drunk driving.It introduces now using very extensive face recognition technology, and by that will add Close algorithm, such as MD5 Encryption Algorithm are transplanted to intelligent mobile phone platform, encrypt to the information of transmission.
To achieve the goals above, it is as follows to implement the technical solution provided by the present invention:
The system comprises sequentially connected mobile module, third-party platform and onboard system,
The third-party platform is used for the different vehicle provided according to the demand of each user and each automobile rental corporation Carry out matching recommendation;After user returns the car, automobile rental corporation checks whether vehicle is intact, and third-party platform can be rent It gets in the account of rent-a-car company;User refers to car borrowing people, and automobile rental corporation provides information of hiring a car;
The mobile module places an order payment for car borrowing people's register account number;It is also used to add the information such as car borrowing people's account It is close, and the information generated after encryption is generated into two dimensional code;
The onboard system includes: two dimensional code module, main control module, face recognition module, alcohol detection module and vehicle-mounted Control module;Wherein:
The face recognition module acquires facial image feature, is sent into main control module for scanning face;
The Response Code scan module is for interpreting two-dimensional barcode information;
The alcohol detection module is used to measure the concentration of alcohol in gas;And it is surveyed according to the accurate data that sensor transmits Amount driver drinks situation, generates decision instruction and is sent into main control module;
The main control module is used for decryption and authorization information, and the information after decryption is interpreted by specified protocol, makes and sentencing Disconnected and operation;Facial image feature and inventory's facial image feature for being sent into according to face recognition module compare, and confirm vehicle Owner identification, and generate discriminant information and be sent into vehicle-mounted control module;The main control module, which is also used to identify by the corners of the mouth, to be judged whether Be car owner go forward side by side serve a round of liquor to the guests drive detection identification.
As a further improvement of the present invention, the mobile module places an order payment for car borrowing people's register account number;It is also used to The information such as car borrowing people's account are encrypted, and the information generated after encryption is generated into two dimensional code;
As a further improvement of the present invention, the face recognition module is used to scan face, acquires facial image feature, It is sent into main control module;
As a further improvement of the present invention, the two dimensional code module is for interpreting two-dimensional barcode information;
As a further improvement of the present invention, the main control module is used for decryption and authorization information, and the information after decryption is pressed Specified protocol is interpreted, and is judged and is operated;Facial image feature and inventory for being sent into according to face recognition module Facial image feature compares, and confirms owner identity, and generates discriminant information and be sent into vehicle-mounted control module;
As a further improvement of the present invention, the system also includes the vehicle-mounted control module being connected with main control module, institutes Judgement information of the vehicle-mounted control module for sending according to main control module is stated, vehicle control instruction is generated.
As a further improvement of the present invention, the encryption in the mobile module be by improved md5 encryption algorithm into Row encryption.
As a further improvement of the present invention, the information such as described car borrowing people's account include car borrowing people's identity, car borrowing people's account, Timestamp, binding account password.
As a further improvement of the present invention, the alcohol sensor is used to measure the concentration of alcohol in gas;
As a further improvement of the present invention, the accurate data that the alcohol detection module is used to be transmitted according to sensor is surveyed Amount driver drinks situation, generates decision instruction and is sent into main control module;
As a further improvement of the present invention, which is characterized in that the face recognition algorithms be improved two dimension it is main at Analysis (2DPCA) algorithm.
Correspondingly, a kind of automobile starting authorization method based on recognition of face, which comprises
Step 2.1: if the registered account of car borrowing people, step 2.2 is directly executed, if it is not, then car borrowing people is flat in third party Platform mobile phone app carries out register account number, fills in personal information, uploads identity card picture and driver's license photo, acquires facial image;
Step 2.2: verifying and borrow whether automobile-used family prepays vehicle violation guarantee fund, if so, thening follow the steps 2.3;
Step 2.3 car borrowing people selects the vehicle that oneself to be rented, and places an order, and improves personal information, updates facial image, and determination takes It the vehicle time and returns the car the time, checks order, on-line payment;
Step 2.4: third-party platform according to order information, to automobile rental corporation ask for the vehicle system password and with Machine number generates binding account password on this basis, binding account password and random number is sent on user mobile phone;
Step 2.5: user clicks " generate two dimensional code " on mobile phone order interface, thus the information such as car borrowing people's account by It encrypts and generates two dimensional code;
Step 2.6: car borrowing people can add the personal information of other two driver on third-party platform mobile phone app (identity card picture, driver's license photo etc.), acquires its facial image;
Step 2.7: camera in car is scanned two-dimensional barcode information, interprets two-dimensional barcode information, and judges that two dimensional code is believed Whether breath is effective, if so, onboard system binds its account, the information such as face can be executed by transmission of network into onboard system Step 2.8;If it is not, then interior voice broadcast two dimensional code is wrong, do not respond;
Step 2.8: interior voice broadcast informs that driver will carry out recognition of face, and quotes car borrowing people setting driver and do Human face expression out, judge its face whether be car borrowing people license the face and human face expression that can directly drive vehicle people It is whether correct, if so, step 2.9 is executed, if it is not, not responding;
Step 2.9: interior voice broadcast informs that driver will carry out alcohol detection, and driver is prompted to draw alcohol sensor It blows three times to driver, and after requiring driver to deeply breathe against alcohol sensor, while face identification system is again Driver is monitored, by the corners of the mouth feature extraction for opening one's mouth to blow into Database Systems.If it is detected that generation has without drinking behavior Effect authorization enabled instruction;If it is not, voice broadcast prompt driver please don't drunk driving, vehicle can not start.
Further, the Encryption Algorithm in the mobile module is that improved md5 encryption algorithm is encrypted.
Further, improved md5 encryption algorithm are as follows: first by car borrowing people's identity information, car borrowing people's account, timestamp, binding Account password progress sequence is upset, it is assumed that and random number n will be connected to the tail portion of remaining character string after n character interception before MD, Then using the encryption of a MD5.
Further, the face recognition algorithms in the face recognition module are the two-dimensional principal component analysis 2DPCA improved Algorithm: using the method for characteristic block, will there is the sample of similar features (facial expression, face angle, illuminance) to be divided into one Then a matrix inhibits noise with histogram equalization sample, finally identify the whole minimum area that can represent main feature, Feature extraction and subsequent identification are carried out to pretreated training sample set by 2DPCA algorithm.
Further, two-dimensional principal component analysis (2DPCA) the algorithm detailed process improved are as follows:
(4) partitioning pretreatment:
Due to the complexity in vehicle environmental, often makes the sample of facial image be unable to satisfy Gaussian Profile, lead to figure Noise and redundancy as in cannot accurately be indicated with covariance and variance, caused it that can not obtain and adequately reflected training space Proper subspace, to reduce the discrimination of 2DPCA algorithm.Due to the sample after piecemeal have similar features (facial expression, Face's angle, intensity of illumination), tend to Gaussian Profile, helps to improve algorithm identification.For this defect, present patent application is mentioned Improved method out takes the mode of piecemeal.The detailed process of partitioning pretreatment are as follows: by original standard exercise matrix A= [a11,a12,...,aij]TIt is divided into multiple sub-block matrix As1,A2,...,Am, wherein A1,A2,...,AmIndicate have in training sample Same facial expression, face's angle, the sample intersection of intensity of illumination;
(5) histogram equalization
Histogram equalization can extend the dynamic range of grey scale pixel value, improve contrast, can finally protrude sample Feature.The process of histogram equalization can be g=EQ (f), wherein f is gray value of the original image at (x, y), and g is conversion Gray value of the image afterwards at (x, y), the first step ask original image [f (x, y)]M×NHistogram, use hfIt indicates;Second step, by hfThe intensity profile probability for seeking original image, is denoted as pf,Third step is counted and is calculated Gray value of image distribution situation, is denoted as pa,Step 4: calculating histogram equalization As a result, obtaining image pixel value g (i, j);
(6) noise suppressed
The gray value of pixel is usually bigger than non-noise point grey scale pixel value or small at noise spot, can use some suitable ashes Angle value replaces the gray value of noise spot pixel, and to reach ideal filter effect, the main thought of median filtering is, to entire figure The gray value of picture is resequenced, and the noise spot of (small) that gray value is become larger suddenly is placed on most left (right side) side, at final research In intermediate non-noise point data, to realize the effect for inhibiting noise;
(4) overall Minimum Area is identified
If sample XijIn to become clear with the boundary lines of grey parts be Bi(j), if sample XijEvery row first side from left to right The collection of edge point coordinate is combined into { Li(j) }, if sample XijEvery row is combined into { R from the collection of right first marginal point coordinate of turning lefti(j)}。 If gathering { Li(j) } there is H (X inij) a element, the i.e. height of the image, gather { Li(j) } k-th of element in is image sample This XijFirst marginal point of kth row;If gathering { Ri(j) } there is N (X inij) a element, the i.e. height of the image, gather { Ri (j) } k-th of element in is image pattern XijThe last one marginal point coordinate of row k;
Thus, totality line of demarcation YD are as follows:
Overall leftmost edge point set { YL } are as follows:
Overall the right edge point set { YR } are as follows:
Wherein, c indicates the line number of sample total, and n indicates that the columns of sample total, N indicate sample total;
Therefore, overall Minimum Area may be expressed as: { (x, y) | x ∈ (YL, YR), y > YD }
Finally, using 2DPCA algorithm to pretreated training sample set { XijCarry out face characteristic extraction and identification.
The invention has the following beneficial effects:
Realize automobile starting authorization using face recognition technology, car borrowing people by authorization before using the vehicle for the first time only Two dimensional code need to be used personal account and vehicle binding and stop the several seconds to recognition of face camera and make the expression of requirement, most Automobile can be started by alcohol detection afterwards.Without the people of authorization, because there is no corresponding face information authorization in system, i.e., Make the key for taking the vehicle that can not also start vehicle, the antitheft purpose after reaching key loss, and the driver to drink without Method starts automobile.
Another inventive point of the invention is that interior voice broadcast informs that driver will carry out alcohol detection, and prompt is driven Alcohol sensor is pulled in face of driver by the person of sailing, and is blown several times after requiring driver to deeply breathe against alcohol sensor, Face identification system monitors driver again simultaneously, by the corners of the mouth feature extraction for opening one's mouth to blow into Database Systems, it is contemplated that Environment inside car is complicated, and the influence of shading value unevenness, the present invention improves the Encryption Algorithm in mobile module, while to face Face recognition algorithms in identification module are improved, and the corners of the mouth feature extraction for opening one's mouth to blow is introduced, and improve drunk driving especially It is the precision of indoor drunk driving judgement under complex environment.
Detailed description of the invention
Fig. 1 is total module diagram in the embodiment of the invention;
Fig. 2 is car owner's authorization message data frame format schematic diagram in the embodiment of the invention;
Fig. 3 is the interaction figure between mobile module and main control module in the embodiment of the invention;
Fig. 4 is car owner's mobile phone onboard system special-purpose software authorization interface schematic diagram in the embodiment of the invention;
Fig. 5 is the module diagram of main control module in the embodiment of the invention;
Specific embodiment
Hereinafter, the present invention will be described in detail with reference to various embodiments shown in the accompanying drawings.But these embodiments are not The limitation present invention, structure that those skilled in the art are made according to these embodiments, method or change functionally It changes and is included within the scope of protection of the present invention.
Join shown in Fig. 1, in a specific embodiment of the invention, automobile leasing management system and vapour based on recognition of face Vehicle starts authorization method, and the system comprises user 10, automobile rental corporation 20, mobile module 30, third-party platform 40 and vehicles Loading system 50, wherein onboard system includes: two dimensional code module 60, main control module 70, face recognition module 80, vehicle-mounted control mould Block 90, alcohol detection module 100 and alcohol sensor 110.
Line module 10: referring to car borrowing people, and registrable to place an order, pick-up is returned the car, starting automobile etc..
Automobile rental corporation 20: for providing a user information of hiring a car etc. by third-party platform.
Mobile module 30: it places an order payment for car borrowing people's register account number;It is also used to the information such as car borrowing people's account carrying out MD5 Algorithm for encryption, and the information generated after encryption is generated into two dimensional code.
A third-party platform 40: for being carried out according to the demand of each car borrowing people different vehicle that each company provides of summing With recommendation;After car borrowing people returns the car, company checks whether vehicle is intact (with by means of the state as Chinese herbaceous peony), and third party can be Rent is got in the account of rent-a-car company.
Onboard system 50: for controlling entire onboard system comprising two dimensional code module 60, main control module 70, face are known Other module 80, vehicle-mounted control module 90, alcohol detection module 100 and alcohol sensor 110.
Two dimensional code module 60: for scanning and interpreting two-dimensional barcode information and the authorization message after interpretation is sent into master control mould Block.
Main control module 70: it is used for decryption and authorization information, the information after decryption is interpreted by specified protocol, is judged And operation;Facial image feature and inventory's facial image feature for being sent into according to face recognition module compare, and confirm car owner Identity, and generate discriminant information and be sent into vehicle-mounted control module.
Face recognition module 80: for scanning face, acquiring facial image feature and characteristic information being sent into main control module.
Vehicle-mounted control module 90: the judgement information for being sent into according to main control module generates vehicle control instruction.
Alcohol detection module 100: the accurate data measurement driver for being transmitted according to sensor drinks situation, and generation is sentenced Severed finger, which enables, is sent into main control module;
Alcohol sensor 110: for measuring the concentration of alcohol in gas.
The information such as car borrowing people's account include car borrowing people's identity, car borrowing people's account, timestamp, binding account mouth in the present invention It enables.Ginseng Fig. 2 show two dimensional code authorization message in present embodiment and defines, and data frame format is exemplified below:
(1) car borrowing people's identity information 64bit, is provided by car owner, and system will record in database;
(2) car borrowing people's account 64bit;
(3) timestamp 32bit indicates the generation time of authorization message, onboard system after authorized information, pass through by Also before the deadline whether the value and current time of the field do comparison and judge authorization message;
(4) account password 16bit is bound;
The improved md5 encryption treatment process of the present invention:
First car borrowing people's identity information, car borrowing people's account, timestamp, binding account password progress sequence are upset, it is assumed that with Machine number is n, the tail portion of remaining character string will be connected to after n character interception before MD, then using the encryption of a MD5:
(1) message is filled, so that its bit long is 448 under mould 512, wherein 64 bits reserved are in case (2) step It uses.The message-length of authorization message is 176bit, fills 272.Filling mode is fixed: the 1st is 1, thereafter Everybody is all 0.
(2) length of additional information, before 64 bits reserved with step (1) indicate that message is filled in a manner of small end Length 176bit.If message is long to be greater than 264, then with 264For modulus.Small end mode refers to the least significant word by data Save (byte) preferential sequential storage data.
(3) buffer area MD is initialized, using the buffer area of 128 bit longs to store intermediate result and final hash value, Buffer area is represented by the register (A, B, C, D) of 4 32 bit longs, each register storing data in a manner of small end, Initial value is taken as A=01234567, B=89ABCDEF, C=FEDCBA98, D=76543210 (with storage mode), is actually 67452301, EFCDAB89,98BADCFE, 10325476.
(4) compression function H is carried out to the authorization message of this 512 bit lengthMD5Processing, wherein have 4 wheel treatment processes again, HMD54 wheel processing logical functions be respectively F, G, H, I.The input of every wheel is currently processed information block YqThe buffer area and Current value A, B, C, D.Every wheel treatment process is also needed plus a quarter element in constant table T, respectively T [1..16], T [17..32], T [33..48], T [49..64].Table T has 64 elements, and i-th of element T [i] is 232× abs's (sin (i)) Integer part, wherein sin is SIN function, and i is as unit of radian.Since (sin (i) is greater than 0 less than 1, so T [i] can to abs It is indicated by the word of 32 bits.The defeated people CV that the output of 4th wheel is taken turns with the 1st againqIt is added, by CV when additionqRegard 4 32 bits as Word, each word press mould 2 with the corresponding word of the 4th wheel output32It is added, the result of addition is compression function HMD5Output.
The treatment process of step (3) to step (5) may be summarized as follows:
CV0=IV;
CVq+1=CVq+RFI[Yq,RFH[Yq,RFG[Yq,RFF[Yq,CVq]]]];
MD=CVL
Wherein IV is the initial value for the buffer area ABCD that step (3) is taken, YqIt is the grouping of q-th of 512 bit longs of message, L is message by step (1) and step (2) treated packet count, and L value is 1, CV hereqFor q for handling message The link variable (output of preceding compression function a one by one) of defeated people, RE when groupingxFor the wheel letter for using basic logic function x Number ,+it is the mould 2 for corresponding to word32Addition, MD are final cryptographic Hash.
(5) it is encrypted again according to random number:
The algorithm is MD*=MD5 (MD5 (string (n)+string (0, n)+n)+n)
By upsetting to original character string sequence, to the character string addition random number upset, repeatedly encrypt again, The safety that can guarantee data, improves the safety of former algorithm, while also enhancing the anti-collision of password.Have in MD* Random number, system password, timestamp, attacker want to crack MD*, achieve the purpose that start vehicle, extremely difficult.
In view of the unstable factor of environment in vehicle, improved two-dimensional principal component analysis (2DPCA) algorithm of the invention It is as follows:
Innovatory algorithm of the invention use characteristic block method, will have similar features (facial expression, face angle, Illuminance) sample be divided into a matrix, with histogram equalization sample, then inhibit noise, finally identify can represent it is main The whole minimum area of feature carries out feature extraction and subsequent identification to pretreated training sample set by 2DPCA algorithm. Specifically includes the following steps:
(1) partitioning pretreatment:
Due to the complexity in vehicle environmental, often makes the sample of facial image be unable to satisfy Gaussian Profile, lead to figure Noise and redundancy as in cannot accurately be indicated with covariance and variance, caused it that can not obtain and adequately reflected training space Proper subspace, to reduce the discrimination of 2DPCA algorithm.Due to the sample after piecemeal have similar features (facial expression, Face's angle, intensity of illumination), tend to Gaussian Profile, helps to improve algorithm identification.For this defect, present patent application is mentioned Improved method out takes the mode of piecemeal, improves the ability for detecting to drunk driving and carrying out corners of the mouth identification.Partitioning pretreatment it is specific Process are as follows: by original standard exercise matrix A=[a11,a12,...,aij]TIt is divided into multiple sub-block matrix As1,A2,...,Am.Its Middle A1,A2,...,AmIndicate that there is same facial expression, face's angle, the sample intersection of intensity of illumination in training sample.
(2) histogram equalization
Histogram equalization can extend the dynamic range of grey scale pixel value, improve contrast, can finally protrude sample Feature.The process of histogram equalization can be g=EQ (f), wherein f is gray value of the original image at (x, y), and g is conversion Gray value of the image afterwards at (x, y).The first step asks original image [f (x, y)]M×NHistogram, use hfIt indicates;Second step, by hfThe intensity profile probability for seeking original image, is denoted as pf,Third step is counted and is calculated Gray value of image distribution situation, is denoted as pa,Step 4: calculating histogram equalization As a result, obtaining image pixel value g (i, j).
(3) noise suppressed
The gray value of pixel is usually bigger than non-noise point grey scale pixel value or small at noise spot, can use some suitable ashes Angle value replaces the gray value of noise spot pixel, to reach ideal filter effect.The main thought of median filtering is, to entire figure The gray value of picture is resequenced, and the noise spot of (small) that gray value is become larger suddenly is placed on most left (right side) side, at final research In intermediate non-noise point data, to realize the effect for inhibiting noise.
(4) overall Minimum Area is identified
If sample XijIn to become clear with the boundary lines of grey parts be Bi(j), if sample XijEvery row first side from left to right The collection of edge point coordinate is combined into { Li(j) }, if sample XijEvery row is combined into { R from the collection of right first marginal point coordinate of turning lefti(j)}。 If gathering { Li(j) } there is H (X inij) a element, the i.e. height of the image, gather { Li(j) } k-th of element in is image sample This XijFirst marginal point of kth row;If gathering { Ri(j) } there is N (X inij) a element, the i.e. height of the image, gather { Ri (j) } k-th of element in is image pattern XijThe last one marginal point coordinate of row k.
Thus, totality line of demarcation YD are as follows:
Overall leftmost edge point set { YL } are as follows:
Overall the right edge point set { YR } are as follows:
Wherein, c indicates the line number of sample total, and n indicates that the columns of sample total, N indicate sample total.
Therefore, overall Minimum Area may be expressed as: { (x, y) | x ∈ (YL, YR), y > YD }
Finally, using 2DPCA algorithm to pretreated training sample set { XijCarry out face characteristic extraction and identification.
Automobile starting authorization method in present implementation based on recognition of face includes:
Step 3.1: if the registered account of car borrowing people, step 3.2 is directly executed, if it is not, then car borrowing people is flat in third party Platform mobile phone app carries out register account number, fills in personal information, uploads identity card picture and driver's license photo, acquires facial image;
Step 3.2: verifying and borrow whether automobile-used family prepays vehicle violation guarantee fund, if so, thening follow the steps 3.3;
Step 3.3 car borrowing people selects the vehicle that oneself to be rented, and places an order, and improves personal information, updates facial image, and determination takes It the vehicle time and returns the car the time, checks order, on-line payment;
Step 3.4: third-party platform according to order information, to automobile rental corporation ask for the vehicle system password and with Machine number generates binding account password on this basis, binding account password and random number is sent on user mobile phone;
Step 3.5: user clicks " generate two dimensional code " on mobile phone order interface, thus the information such as car borrowing people's account by It encrypts and generates two dimensional code;
Step 3.6: car borrowing people can add the personal information of other two driver on third-party platform mobile phone app (identity card picture, driver's license photo etc.), acquires its facial image;
Step 3.7: camera in car is scanned two-dimensional barcode information, interprets two-dimensional barcode information, and judges that two dimensional code is believed Whether breath is effective, if so, onboard system binds its account, the information such as face can be executed by transmission of network into onboard system Step 3.8;If it is not, then interior voice broadcast two dimensional code is wrong, do not respond;
Step 3.8: interior voice broadcast informs that driver will carry out recognition of face, and quotes car borrowing people setting driver and do Human face expression out, judge its face whether be car borrowing people license the face and human face expression that can directly drive vehicle people It is whether correct, if so, step 3.9 is executed, if it is not, not responding;
Step 3.9: interior voice broadcast informs that driver will carry out alcohol detection, and driver is prompted to draw alcohol sensor It blows three times to driver, and after requiring driver to deeply breathe against alcohol sensor, while face identification system is again Driver is monitored, by the corners of the mouth feature extraction for opening one's mouth to blow into Database Systems.If it is detected that generation has without drinking behavior Effect authorization enabled instruction;If it is not, voice broadcast prompt driver please don't drunk driving, vehicle can not start.
This method specifically:
It picks up the car as shown in Figure 1, user first registers after placing an order, the two dimensional code and automobile generated with mobile phone is bound, then carries out people Face identification can start automobile.
As shown in Fig. 2, the authorization message to be encrypted is followed successively by car borrowing people's identity, car borrowing people's account, timestamp, binding account Password.
As shown in figure 3, car borrowing people needs that information md5 encryption is generated authorization message with mobile phone, then this information is generated two Code is tieed up, is scanned for two dimensional code module, if information is correct, onboard system binds its account, and the information such as face can pass through net Network is transmitted in onboard system main control module, and automobile can carry out recognition of face vehicle to car borrowing people.
As shown in figure 4, being equipped with the cooperation dedicated licensed software of onboard system in car borrowing people's mobile phone, clicks and " generate two dimension Information is carried out md5 encryption by code ", mobile module first, regenerates two dimensional code;
As shown in figure 5, MD5 decryption is carried out to obtained information first after main control module receives authorization message, it is decrypted Information afterwards is again by using authorization data frame format to be interpreted, then the value of each field is parsed, and judges Authorized operation Whether effectively, this is generated if effectively and generates effective account binding instruction, and sends it to vehicle-mounted control module;Conversely, not It responds.Judge whether recognition of face image feature information is effective, effectively then generates effectively authorization enabled instruction;Conversely, not doing Response.
If someone has stolen the mobile phone of car owner, because it does not know the entry password of mobile phone car loading system special-purpose software, with regard to nothing Method carries out Authorized operation.
It can be seen from embodiment of above compared with prior art, the present invention realizes automobile using face recognition technology Starting authorization, the car borrowing people by authorization need to only use two dimensional code that personal account and the vehicle are bound before using the vehicle for the first time And stop the several seconds to recognition of face camera and make the expression of requirement, automobile can be started finally by alcohol detection.Not By the people of authorization, because not having corresponding face information authorization in system, vehicle can not be started taking the key of the vehicle , the antitheft purpose after reaching key loss.If someone has stolen the mobile phone of car owner, because it does not know that mobile phone car loading system is dedicated The login account password of software can not just carry out Authorized operation.
It should be appreciated that although this specification is described in terms of embodiments, but not each embodiment only includes one A independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should will say As a whole, the technical solution in each embodiment may also be suitably combined to form those skilled in the art can for bright book With the other embodiments of understanding.
The series of detailed descriptions listed above only for feasible embodiment of the invention specifically Protection scope bright, that they are not intended to limit the invention, it is all without departing from equivalent implementations made by technical spirit of the present invention Or change should all be included in the protection scope of the present invention.

Claims (9)

1. a kind of third party's automobile leasing management system based on recognition of face, which is characterized in that the system comprises successively connect Mobile module, third-party platform and the onboard system connect,
The third-party platform is used to be carried out according to the different vehicle that the demand of each user and each automobile rental corporation provide Matching is recommended;After user returns the car, automobile rental corporation checks whether vehicle is intact, and third-party platform can get to rent In the account of rent-a-car company;User refers to car borrowing people, and automobile rental corporation provides information of hiring a car;
The mobile module places an order payment for car borrowing people's register account number;It is also used to encrypt the information such as car borrowing people's account, And the information generated after encryption is generated into two dimensional code;
The onboard system includes: two dimensional code module, main control module, face recognition module, alcohol detection module and vehicle-mounted control Module;Wherein:
The face recognition module acquires facial image feature, is sent into main control module for scanning face;
The Response Code scan module is for interpreting two-dimensional barcode information;
The alcohol detection module is used to measure the concentration of alcohol in gas;And the accurate data measurement transmitted according to sensor is driven The person of sailing drinks situation, generates decision instruction and is sent into main control module;
The main control module be used for decryption and authorization information, the information after decryption is interpreted by specified protocol, judge and Operation;Facial image feature and inventory's facial image feature for being sent into according to face recognition module compare, and confirm car owner's body Part, and generate discriminant information and be sent into vehicle-mounted control module;The main control module is also used to identify judge whether it is vehicle by the corners of the mouth Master, which goes forward side by side to serve a round of liquor to the guests in person, drives detection identification.
2. system according to claim 1, which is characterized in that it further include the vehicle-mounted control module being connected with main control module, The vehicle-mounted control module is used for the judgement information sent according to main control module, generates vehicle control instruction.
3. system according to claim 1, which is characterized in that the information such as described car borrowing people's account include car borrowing people's identity, Car borrowing people's account, timestamp, binding account password.
4. binding account password according to claim 3, which is characterized in that the binding account password is third-party platform Mobile phone user is sent to, for binding car borrowing people's account and vehicle.
5. a kind of automobile starting authorization of third party's automobile leasing management system based on recognition of face as described in claim 1 Method, which is characterized in that the described method includes:
Step 1.1: if the registered account of car borrowing people, step 1.2 is directly executed, if it is not, then car borrowing people is in third-party platform hand Machine app carries out register account number, fills in personal information, uploads identity card picture and driver's license photo, acquires facial image;
Step 1.2: verifying whether car borrowing people prepays vehicle violation guarantee fund, if so, thening follow the steps 1.3;
Step 1.3 car borrowing people selects the vehicle that oneself to be rented, and places an order, and improves personal information, updates facial image, when determining pick-up Between and return the car the time, check order, on-line payment;
Step 1.4: third-party platform asks for the system password of the vehicle and random according to order information, to automobile rental corporation Number generates binding account password on this basis, binding account password and random number is sent on user mobile phone;
Step 1.5: user clicks " generating two dimensional code " on the order interface in mobile module, thus the information such as car borrowing people's account It has been encrypted and has generated two dimensional code;
Step 1.6: car borrowing people can add the personal information (identity of other two driver on third-party platform mobile phone app License piece, driver's license photo etc.), acquire its facial image;
Step 1.7: camera in car is scanned two-dimensional barcode information, interprets two-dimensional barcode information, and judge that two-dimensional barcode information is No effective, if so, onboard system binds its account, the information such as face can execute step by transmission of network into onboard system 1.8;If it is not, then interior voice broadcast two dimensional code is wrong, do not respond;
Step 1.8: interior voice broadcast informs that driver will carry out recognition of face, and quotes car borrowing people and be arranged what driver made Human face expression, judge its face whether be car borrowing people license the face that can directly drive vehicle people and human face expression whether Correctly, if so, step 1.9 is executed, if it is not, not responding;
Step 1.9: interior voice broadcast informs that driver will carry out alcohol detection, prompts driver to be pulled to alcohol sensor and drives In face of the person of sailing, and blow several times after requiring driver to deeply breathe against alcohol sensor, while face identification system is supervised again Driver is controlled, by the corners of the mouth feature extraction for opening one's mouth to blow into Database Systems, if it is detected that generating effective without drinking behavior Authorize enabled instruction;If it is not, voice broadcast prompt driver please don't drunk driving, vehicle can not start.
6. automobile starting authorization method as claimed in claim 5, which is characterized in that the Encryption Algorithm in the mobile module is Improved md5 encryption algorithm is encrypted.
7. automobile starting authorization method as claimed in claim 6, which is characterized in that improved md5 encryption algorithm are as follows: will first borrow Vehicle people identity information, car borrowing people's account, timestamp, binding account password progress sequence are upset, it is assumed that random number n, by n before MD The tail portion of remaining character string is connected to after a character interception, then using the encryption of a MD5.
8. automobile starting authorization method as claimed in claim 5, which is characterized in that the face in the face recognition module is known Other algorithm is the two-dimensional principal component analysis 2DPCA algorithm improved: using the method for characteristic block, will have similar features (face Portion's expression, face angle, illuminance) sample be divided into a matrix, with histogram equalization sample, then inhibit noise, finally It identifies the whole minimum area that can represent main feature, pretreated training sample set is carried out by 2DPCA algorithm special Sign is extracted and subsequent identification.
9. automobile starting authorization method as claimed in claim 8, which is characterized in that the two-dimensional principal component analysis improved (2DPCA) algorithm detailed process are as follows:
(1) partitioning pretreatment:
The detailed process of partitioning pretreatment are as follows: by original standard exercise matrix A=[a11,a12,...,aij]TIt is divided into multiple sub-blocks Matrix A1,A2,...,Am, wherein A1,A2,...,AmIndicate have same facial expression, face's angle, illumination strong in training sample The sample intersection of degree;
(2) histogram equalization
Histogram equalization can extend the dynamic range of grey scale pixel value, improve contrast, can finally protrude sample characteristics; The process of histogram equalization can be g=EQ (f), wherein f is gray value of the original image at (x, y), and g is after converting Gray value of the image at (x, y), the first step ask original image [f (x, y)]M×NHistogram, use hfIt indicates;Second step, by hfIt asks The intensity profile probability of original image, is denoted as pf,Third step counts and calculates image Grey value profile situation, is denoted as pa,Step 4: calculate histogram equalization as a result, Obtain image pixel value g (i, j);
(3) noise suppressed
(4) overall Minimum Area is identified
If sample XijIn to become clear with the boundary lines of grey parts be Bi(j), if sample XijEvery row first marginal point from left to right The collection of coordinate is combined into { Li(j) }, if sample XijEvery row is combined into { R from the collection of right first marginal point coordinate of turning lefti(j) }, if collection Close { Li(j) } there is H (X inij) a element, the i.e. height of the image, gather { Li(j) } k-th of element in is image pattern Xij First marginal point of row k;If gathering { Ri(j) } there is N (X inij) a element, the i.e. height of the image, gather { Ri(j) } in K-th of element be image pattern XijThe last one marginal point coordinate of row k;
Thus, totality line of demarcation YD are as follows:
Overall leftmost edge point set { YL } are as follows:
Overall the right edge point set { YR } are as follows:
Wherein, c indicates the line number of sample total, and n indicates that the columns of sample total, N indicate sample total;
Therefore, overall Minimum Area may be expressed as: { (x, y) x ∈ (YL, YR), y > YD }
Finally, using 2DPCA algorithm to pretreated training sample set { XijCarry out face characteristic extraction and identification.
CN201910417530.9A 2019-05-20 2019-05-20 A kind of third party's automobile leasing management system and automobile starting authorization method based on recognition of face Pending CN110148262A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910417530.9A CN110148262A (en) 2019-05-20 2019-05-20 A kind of third party's automobile leasing management system and automobile starting authorization method based on recognition of face

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910417530.9A CN110148262A (en) 2019-05-20 2019-05-20 A kind of third party's automobile leasing management system and automobile starting authorization method based on recognition of face

Publications (1)

Publication Number Publication Date
CN110148262A true CN110148262A (en) 2019-08-20

Family

ID=67591872

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910417530.9A Pending CN110148262A (en) 2019-05-20 2019-05-20 A kind of third party's automobile leasing management system and automobile starting authorization method based on recognition of face

Country Status (1)

Country Link
CN (1) CN110148262A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826434A (en) * 2019-10-23 2020-02-21 上海能塔智能科技有限公司 Face recognition verification method and device, vehicle-mounted equipment and storage medium
CN110995654A (en) * 2019-11-05 2020-04-10 合肥优尔电子科技有限公司 Remote terminal temporary authorization method, device and system based on dynamic two-dimensional code
CN111127767A (en) * 2019-12-19 2020-05-08 广州赛特智能科技有限公司 Control system, method, equipment and medium for sharing automobile
CN112053505A (en) * 2020-08-21 2020-12-08 杭州小电科技股份有限公司 Mobile power supply leasing method, device and system, electronic device and storage medium
CN114492687A (en) * 2022-01-06 2022-05-13 深圳市锐明技术股份有限公司 Pre-post detection method and device, terminal equipment and computer readable storage medium
CN114655160A (en) * 2021-01-28 2022-06-24 北京新能源汽车股份有限公司 Method and device for controlling vehicle starting
CN114919532A (en) * 2022-04-29 2022-08-19 东风汽车集团股份有限公司 Vehicle control method and system based on face recognition
CN116977037A (en) * 2023-07-06 2023-10-31 重庆蓝鲸智联科技有限公司 Method for lending based on personal vehicle

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130047667A (en) * 2011-10-31 2013-05-08 제너럴 일렉트릭 캄파니 Systems and methods for use in communicating with a charging station
CN103241215A (en) * 2013-04-28 2013-08-14 江苏大学 QR-code-based (quick response code-based) vehicle operation authorization and burglary protection system and method
CN104184589A (en) * 2014-08-26 2014-12-03 重庆邮电大学 Identity authentication method, terminal device and system
CN106094618A (en) * 2016-06-20 2016-11-09 奇瑞汽车股份有限公司 A kind of electric automobile starts authoring system and starts authorization method
US20160325755A1 (en) * 2012-03-14 2016-11-10 Autoconnect Holdings Llc Facial recognition database created from social networking sites
CN107944780A (en) * 2018-01-17 2018-04-20 上海钛捷信息科技有限公司 A kind of vehicle scheduling platform and automobile leasing method based on automobile resources dynamic dispatching with distribution
CN108263336A (en) * 2018-01-29 2018-07-10 程伟 Communal automobile dangerous driving Intelligent preventive control system and method
CN108297823A (en) * 2018-01-27 2018-07-20 厦门市金福冠包装用品有限公司 The intelligence control system of automobile
CN109766870A (en) * 2019-01-26 2019-05-17 南京云计趟信息技术有限公司 A kind of unattended alcohol detection method based on action recognition

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130047667A (en) * 2011-10-31 2013-05-08 제너럴 일렉트릭 캄파니 Systems and methods for use in communicating with a charging station
US20160325755A1 (en) * 2012-03-14 2016-11-10 Autoconnect Holdings Llc Facial recognition database created from social networking sites
CN103241215A (en) * 2013-04-28 2013-08-14 江苏大学 QR-code-based (quick response code-based) vehicle operation authorization and burglary protection system and method
CN104184589A (en) * 2014-08-26 2014-12-03 重庆邮电大学 Identity authentication method, terminal device and system
CN106094618A (en) * 2016-06-20 2016-11-09 奇瑞汽车股份有限公司 A kind of electric automobile starts authoring system and starts authorization method
CN107944780A (en) * 2018-01-17 2018-04-20 上海钛捷信息科技有限公司 A kind of vehicle scheduling platform and automobile leasing method based on automobile resources dynamic dispatching with distribution
CN108297823A (en) * 2018-01-27 2018-07-20 厦门市金福冠包装用品有限公司 The intelligence control system of automobile
CN108263336A (en) * 2018-01-29 2018-07-10 程伟 Communal automobile dangerous driving Intelligent preventive control system and method
CN109766870A (en) * 2019-01-26 2019-05-17 南京云计趟信息技术有限公司 A kind of unattended alcohol detection method based on action recognition

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
任杰麟: "MD5加密算法的安全性分析与改进", 《农业图书情报学刊》 *
周松锋等: "改进的PCA人脸识别算法研究", 《软件导刊》 *
张杨等: "基于改进PCA算法的人脸识别", 《软件导刊》 *
王波涛等: "基于FPGA的MD5算法设计与实现", 《通信技术》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826434A (en) * 2019-10-23 2020-02-21 上海能塔智能科技有限公司 Face recognition verification method and device, vehicle-mounted equipment and storage medium
CN110995654A (en) * 2019-11-05 2020-04-10 合肥优尔电子科技有限公司 Remote terminal temporary authorization method, device and system based on dynamic two-dimensional code
CN110995654B (en) * 2019-11-05 2022-11-18 合肥优尔电子科技有限公司 Terminal temporary authorization method, device and system based on dynamic two-dimensional code
CN111127767A (en) * 2019-12-19 2020-05-08 广州赛特智能科技有限公司 Control system, method, equipment and medium for sharing automobile
CN112053505A (en) * 2020-08-21 2020-12-08 杭州小电科技股份有限公司 Mobile power supply leasing method, device and system, electronic device and storage medium
CN114655160A (en) * 2021-01-28 2022-06-24 北京新能源汽车股份有限公司 Method and device for controlling vehicle starting
CN114492687A (en) * 2022-01-06 2022-05-13 深圳市锐明技术股份有限公司 Pre-post detection method and device, terminal equipment and computer readable storage medium
CN114919532A (en) * 2022-04-29 2022-08-19 东风汽车集团股份有限公司 Vehicle control method and system based on face recognition
CN114919532B (en) * 2022-04-29 2024-04-19 东风汽车集团股份有限公司 Vehicle control method and system based on face recognition
CN116977037A (en) * 2023-07-06 2023-10-31 重庆蓝鲸智联科技有限公司 Method for lending based on personal vehicle

Similar Documents

Publication Publication Date Title
CN110148262A (en) A kind of third party's automobile leasing management system and automobile starting authorization method based on recognition of face
CN103241215B (en) Automobile based on Quick Response Code uses mandate, burglary-resisting system and method
CN107332659B (en) Identity authentication method, storage medium and system based on biological characteristics
US7519558B2 (en) Biometrically enabled private secure information repository
US20030023882A1 (en) Biometric characteristic security system
JP2009543176A (en) Traceless biometric identification system and method
CN101561873B (en) Multimode authentication equipment with functions of iris recognition and USB Key
US20040006699A1 (en) Secure token access distributed database system
CN105261105A (en) Safety access control method
KR20210101313A (en) Face recognition method, neural network training method, apparatus and electronic device
AU2010282394A1 (en) An intelligent peripheral device and system for the authentication and verification of individuals and/ or documents through a secure multifunctional authentication service with data storage capability
CN106971159A (en) A kind of image definition recognition methods, identity identifying method and device
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
US7757942B1 (en) Biometric charge card verification system and associated method
CN111831995A (en) Trusted identity authentication method and system based on eID and human body biological information
CN112905965A (en) Financial big data processing system based on block chain
CN110009780A (en) A kind of car door unlocking method, server and storage medium based on car networking
CN113111330A (en) Enterprise legal identity authentication management method and system based on enterprise chain code
US8316050B2 (en) Identification and authorization system
Ma et al. Mobidiv: A privacy-aware real-time driver identity verification on mobile phone
CN115393997A (en) Automobile electronic unlocking method and device based on multi-dimensional data identification and electronic equipment
CN106203166A (en) A kind of auto navigation information data sharing method
Faisal et al. Autonomous car system using facial recognition and geo location services
Chang et al. [Retracted] Application of Face Recognition in E‐commerce Security Authentication in the Era of Big Data
US20230155836A1 (en) Secure serverless multi-factor authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190820

RJ01 Rejection of invention patent application after publication