CN111724509A - Vehicle control method, device, vehicle, server and storage medium - Google Patents

Vehicle control method, device, vehicle, server and storage medium Download PDF

Info

Publication number
CN111724509A
CN111724509A CN202010488660.4A CN202010488660A CN111724509A CN 111724509 A CN111724509 A CN 111724509A CN 202010488660 A CN202010488660 A CN 202010488660A CN 111724509 A CN111724509 A CN 111724509A
Authority
CN
China
Prior art keywords
encrypted data
target
vehicle
legal
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010488660.4A
Other languages
Chinese (zh)
Inventor
金亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qisheng Technology Co Ltd
Original Assignee
Beijing Qisheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qisheng Technology Co Ltd filed Critical Beijing Qisheng Technology Co Ltd
Priority to CN202010488660.4A priority Critical patent/CN111724509A/en
Publication of CN111724509A publication Critical patent/CN111724509A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0042Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
    • G07F17/0057Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects for the hiring or rent of vehicles, e.g. cars, bicycles or wheelchairs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The disclosed embodiments relate to a vehicle control method, a vehicle control device, a vehicle, a server, and a storage medium. The method comprises the following steps: acquiring biological information of a target user, and carrying out irreversible encryption on the biological information of the target user to obtain target encryption data; sending the target encrypted data to a server, wherein the target encrypted data is used for sending an unlocking instruction to the vehicle when legal encrypted data matched with the target encrypted data is stored in the server, and the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user; and if the unlocking instruction sent by the server is received, controlling the transportation means to unlock. By adopting the method, the unlocking time consumption of a user when using the vehicle can be reduced, and the unlocking efficiency is improved.

Description

Vehicle control method, device, vehicle, server and storage medium
Technical Field
The embodiment of the disclosure relates to the technical field of internet, in particular to a vehicle control method, a vehicle control device, a vehicle, a server and a storage medium.
Background
With the rapid development of internet technology, a shared mode vehicle is increasingly appearing in people's daily life as a transportation tool with a brand new service mode, such as a shared bicycle, a shared electric bicycle, a shared motor vehicle, and the like.
At present, when a user needs to use the transportation tool, the user terminal is generally used for scanning the two-dimensional code on the transportation tool to unlock the vehicle.
However, in the above manner in which the user uses the transportation means, the user needs to take out the user terminal first, unlock the user terminal, and then open the application program in the user terminal to scan the two-dimensional code on the transportation means to unlock the transportation means, the unlocking process is complex, and the time consumed for unlocking the transportation means is long.
Disclosure of Invention
The embodiment of the disclosure provides a vehicle control method and device, a vehicle, a server and a storage medium, which can be used for reducing time consumed for unlocking when a user uses the vehicle and improving unlocking efficiency.
In a first aspect, an embodiment of the present disclosure provides a vehicle control method, applied to a vehicle, the method including:
acquiring biological information of a target user, and carrying out irreversible encryption on the biological information of the target user to obtain target encryption data;
sending the target encrypted data to a server, wherein the target encrypted data is used for sending an unlocking instruction to the vehicle when legal encrypted data matched with the target encrypted data is stored in the server, and the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
and if the unlocking instruction sent by the server is received, controlling the transportation means to unlock.
In a second aspect, an embodiment of the present disclosure provides a vehicle control method, applied to a server, the method including:
receiving target encrypted data sent by a vehicle, wherein the target encrypted data is obtained by irreversibly encrypting biological information of a target user by the vehicle;
searching legal encryption data matched with the target encryption data in a database of the server, wherein the legal encryption data is obtained by irreversibly encrypting biological information of a legal user;
and if legal encrypted data matched with the target encrypted data are found, sending an unlocking instruction to the vehicle, wherein the unlocking instruction is used for indicating the vehicle to unlock.
In a third aspect, embodiments of the present disclosure provide a vehicle control apparatus, the apparatus comprising:
the first encryption module is used for acquiring biological information of a target user and carrying out irreversible encryption on the biological information of the target user to obtain target encryption data;
the first sending module is used for sending the target encrypted data to a server, and the target encrypted data is used for sending an unlocking instruction to the vehicle when the server stores legal encrypted data matched with the target encrypted data, wherein the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
and the unlocking module is used for controlling the transportation means to unlock if the unlocking instruction sent by the server is received.
In a fourth aspect, embodiments of the present disclosure provide a vehicle control apparatus, the apparatus comprising:
the data receiving module is used for receiving target encrypted data sent by a vehicle, wherein the target encrypted data is obtained by irreversible encryption of biological information of a target user by the vehicle;
the searching module is used for searching legal encrypted data matched with the target encrypted data in a database of the server, wherein the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
the first instruction sending module is used for sending an unlocking instruction to the vehicle if legal encrypted data matched with the target encrypted data are found, and the unlocking instruction is used for indicating the vehicle to unlock.
In a fifth aspect, embodiments of the present disclosure provide a vehicle comprising a biological information collection component, a communication component, a processing component, and a vehicle lock;
the biological information acquisition component is used for acquiring biological information of a target user;
the processing component is used for carrying out irreversible encryption on the biological information of the target user to obtain target encryption data;
the communication component is used for sending the target encrypted data to a server under the control of the processing component and receiving an unlocking instruction; the target encrypted data is used for the server to send the unlocking instruction to the vehicle under the condition that legal encrypted data matched with the target encrypted data is stored, wherein the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
and the processing component is used for controlling the unlocking of the vehicle lock under the condition that the communication component receives the unlocking instruction.
In a sixth aspect, the disclosed embodiments provide a vehicle comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of the first aspect when executing the computer program.
In a seventh aspect, an embodiment of the present disclosure provides a server, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the method of the second aspect when executing the computer program.
In an eighth aspect, the present disclosure provides a storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method of the first and second aspects.
According to the vehicle control method, the vehicle control device, the vehicle, the server and the storage medium, the vehicle conducts irreversible encryption on the collected biological information of the target user, the target encryption data obtained after the irreversible encryption is sent to the server, the server matches the target encryption data with the legal encryption data of the legal user, and receives the unlocking instruction sent by the server and controls the vehicle to unlock under the condition that the server stores the legal encryption data matched with the target encryption data, so that unlocking control on the vehicle according to the biological information of the target user is achieved. When the target user uses the transportation means in the sharing mode, the following fussy unlocking process is not required to be executed: the method comprises the steps of taking out a user terminal, unlocking the user terminal and then opening an application program in the user terminal to scan a two-dimensional code on the vehicle, wherein the vehicle can realize unlocking control on the vehicle by directly acquiring biological information of a target user, and the unlocking process of the vehicle is simplified, so that the time consumed for unlocking the vehicle is reduced, and the unlocking efficiency is improved.
Drawings
FIG. 1 is a diagram of an exemplary vehicle control system;
FIG. 2 is a schematic flow chart diagram of a vehicle control method in one embodiment;
FIG. 3 is a diagram illustrating a refinement of step S100 in one embodiment;
FIG. 4 is a schematic flow chart diagram of a vehicle control method in one embodiment;
FIG. 5 is a schematic flow chart diagram of a vehicle control method in one embodiment;
FIG. 6 is a schematic flow chart diagram of a vehicle control method in one embodiment;
FIG. 7 is a diagram illustrating a refinement of step S20 in one embodiment;
FIG. 8 is a schematic flow chart diagram of a vehicle control method in one embodiment;
FIG. 9 is a schematic flow chart diagram of a vehicle control method in one embodiment;
FIG. 10 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 11 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 12 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 13 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 14 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 15 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 16 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 17 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 18 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 19 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 20 is a block diagram showing the construction of a vehicle control device in one embodiment;
FIG. 21 is an internal structural view of a vehicle in one embodiment;
FIG. 22 is an internal structural view of a vehicle according to an embodiment;
fig. 23 is an internal configuration diagram of a server in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more clearly understood, the embodiments of the present disclosure are described in further detail below with reference to the accompanying drawings and the embodiments. It is to be understood that the specific embodiments described herein are merely illustrative of the embodiments of the disclosure and that no limitation to the embodiments of the disclosure is intended.
First, before specifically describing the technical solution of the embodiment of the present disclosure, a technical background or a technical evolution context on which the embodiment of the present disclosure is based is described.
At present, when a user needs to use a vehicle in a sharing mode, the user terminal is generally used for scanning a two-dimensional code on the vehicle to unlock the vehicle. However, before the user uses the user terminal to scan the two-dimensional code on the vehicle, the user needs to take out the user terminal first to unlock the user terminal, and then open the application program in the user terminal to scan the two-dimensional code on the vehicle to unlock the vehicle, which requires a complicated user operation process and takes a long time to unlock the vehicle.
How to reduce the time consuming of unblanking when the user uses vehicle, promote the efficiency of unblanking, become the difficult problem that awaits a urgent need to solve at present. In addition, it should be noted that, from the technical solutions described in the following embodiments and the determination of the need to reduce the time consumption for unlocking the vehicle, the applicant has paid a lot of creative efforts.
The following describes technical solutions related to the embodiments of the present disclosure with reference to application environments in which the embodiments of the present disclosure are applied.
The vehicle control method provided by the embodiment of the disclosure can be applied to the application environment shown in fig. 1. Among other things, the vehicle 101 has disposed therein a communication component that can communicate with the server 102 over a network. The vehicle 101 may be a shared mode vehicle, the vehicle 101 may be a non-motorized or motorized vehicle such as a bicycle, an electric bicycle, a scooter, a motorcycle, etc., and the server 102 may be implemented by a stand-alone server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a vehicle control method is provided, which is described by taking the example that the method is applied to the vehicle in fig. 1, and comprises the following steps:
and S100, the vehicle acquires the biological information of the target user and performs irreversible encryption on the biological information of the target user to obtain target encryption data.
The target user may be a user needing to use a vehicle, and the biological information of the target user may represent a biological feature of the target user, for example, the biological information of the target user may be a face image, a fingerprint image, an iris image, and the like of the target user.
In the embodiment of the disclosure, the vehicle may be provided with a biological information collecting component, and the vehicle collects biological information of the target user through the biological information collecting component. In a possible implementation mode, an unlocking button can be arranged in the vehicle, when a target user needs to use the vehicle, the unlocking button can be pressed, and after the vehicle receives an unlocking request input by the target user through the unlocking button, biological information of the target user is collected; in another possible implementation, a voice recognition component may be further disposed in the vehicle, when the target user needs to use the vehicle, the voice may be sent out, such as "unlock", "car use", and the like, and when the vehicle recognizes that the voice includes keywords such as "unlock", "car use", and the like through the voice recognition component, the biological information of the target user is collected.
The vehicle carries out irreversible encryption on the collected biological information of the target user to obtain target encryption data, the irreversible encryption does not need to use a secret key in the encryption process, and is irreversible mapping from a plaintext to a ciphertext, namely the biological information of the target user cannot be reversely deduced according to the target encryption data.
In one possible embodiment, the vehicle irreversibly encrypts the biological information of the target user by software encryption, that is, the vehicle irreversibly encrypts the biological information of the target user by using an irreversible encryption algorithm, such as a Hash algorithm.
In another possible implementation, the vehicle irreversibly encrypts the biological information of the target user by means of hardware encryption, and an encryption chip may be disposed in the vehicle, and the vehicle irreversibly encrypts the biological information of the target user by means of the encryption chip. The hardware encryption mode can prevent attacks such as malicious codes and brute force cracking, and the safety of biological information of the target user is improved.
Step S200, the vehicle transmits the target encrypted data to the server.
In the embodiment of the disclosure, the server stores legal encrypted data of a legal user, the legal user may be a registered user, and the legal encrypted data is obtained by irreversibly encrypting biological information of the legal user. As an embodiment, the legal encrypted data may be sent by the vehicle to the server for registration and storage during the user registration process.
The vehicle sends the target encrypted data to the server, and the target encrypted data is used for the server to send an unlocking instruction to the vehicle under the condition that legal encrypted data matched with the target encrypted data are stored. As an implementation manner, after receiving the target encrypted data, the server may search the database of the server for legal encrypted data matching the target encrypted data, and if the legal encrypted data matching the target encrypted data is found, the server sends an unlocking instruction to the vehicle.
In the embodiment of the disclosure, the vehicle sends the target encrypted data obtained after the irreversible encryption to the server, and the biological information of the target user cannot be reversely deduced according to the target encrypted data, so that even if the target encrypted data is leaked, the other party cannot obtain the biological information of the target user according to the target encrypted data, the security of the biological information of the target user is ensured, and the privacy security of the target user is ensured. Meanwhile, the server stores legal encrypted data after irreversibly encrypting the biological information of the legal user, and even if the server is broken by a malicious user and the legal encrypted data in the server is leaked, the biological information of the legal user cannot be reversely deduced according to the legal encrypted data, so that the safety of the biological information of the legal user can be ensured.
And step S300, if the vehicle receives the unlocking instruction sent by the server, controlling the vehicle to unlock.
If the server stores legal encrypted data matched with the target encrypted data, the server represents that the target user is a legal user, the server sends an unlocking instruction to the vehicle, the vehicle controls the vehicle to unlock after receiving the unlocking instruction sent by the server, and the target user can start to use the vehicle after unlocking.
According to the embodiment of the disclosure, the unlocking control of the vehicle is realized according to the biological information of the target user. When the target user uses the transportation means in the sharing mode, the following fussy unlocking process is not required to be executed: the method comprises the steps of taking out a user terminal, unlocking the user terminal and then opening an application program in the user terminal to scan a two-dimensional code on the vehicle, wherein the vehicle can realize unlocking control on the vehicle by directly acquiring biological information of a target user, and the unlocking process of the vehicle is simplified, so that the time consumed for unlocking the vehicle is reduced, and the unlocking efficiency is improved.
In one embodiment, on the basis of the embodiment shown in fig. 2, the present embodiment relates to a process of how a vehicle irreversibly encrypts biometric information of a target user to obtain target encrypted data. As shown in fig. 3, the vehicle irreversibly encrypts the biometric information of the target user to obtain the target encrypted data by performing the following steps S101 and S102:
step S101, the vehicle extracts the characteristics of the biological information of the target user to obtain a plurality of characteristic information.
The biological information of the target user may be a face image of the target user, a fingerprint image of the target user, an iris image of the target user, or the like. As an implementation manner, the vehicle may perform feature extraction on the biological information of the target user through a convolutional neural network to obtain a plurality of feature information, where different feature information may represent different features in the biological information of the target user.
In one possible implementation of step S101, taking biological information as a face image as an example, step S101 may include step a 1:
step a1 is to extract features of each facial part in the face image to obtain a plurality of pieces of feature information.
In a convolutional neural network, different convolution kernels may extract different features. The vehicle according to the embodiment of the disclosure may set different convolution kernels to the convolution neural network to extract the features of each facial region in the face image, for example, different convolution kernels may be set to perform feature extraction on facial regions such as eyes and noses in the face image, so as to obtain feature information of the eye regions and feature information of the nose regions, and so on. Thus, the vehicle can obtain a plurality of feature information, each corresponding to a different facial part.
And S102, the vehicle irreversibly encrypts each characteristic information to obtain target encrypted data, wherein the target encrypted data comprises characteristic encrypted data corresponding to each characteristic information.
The vehicle respectively carries out irreversible encryption on each feature information of the biological information of the target user to obtain feature encryption data corresponding to each feature information, and the feature encryption data corresponding to each feature information is target encryption data.
After the vehicle sends the target encrypted data to the server, the server searches whether a plurality of legal feature encrypted data included in the legal encrypted data are matched with a plurality of feature encrypted data included in the target encrypted data one by one in each legal encrypted data stored in a database of the server, and if the legal feature encrypted data are matched with the plurality of feature encrypted data included in the target encrypted data, the server is determined to store the legal encrypted data matched with the target encrypted data. The plurality of legal feature encrypted data included in one legal encrypted data may be obtained by irreversibly encrypting each feature information of the biometric information of one legal user.
The method and the device have the advantages that the characteristic information of the biological information of the target user is respectively subjected to irreversible encryption, the obtained target encryption data comprise characteristic encryption data corresponding to the characteristic information, namely the target encryption data comprise a plurality of different characteristic encryption data, and the target encryption data of different target users are the same only under the condition that the plurality of characteristic encryption data corresponding to different target users are all the same, so that the possibility that the target encryption data of different target users are the same can be reduced, and the control reliability of unlocking control of a vehicle based on the biological information of the target user can be improved.
In one possible implementation of step S102, step S102 may include step B1 and step B2:
and step B1, carrying out irreversible encryption on each characteristic information to obtain initial encrypted data corresponding to each characteristic information.
And step B2, adding corresponding mark information to each initial encrypted data to obtain characteristic encrypted data corresponding to each characteristic information.
The transportation means performs irreversible encryption on each feature information to obtain initial encrypted data corresponding to each feature information, and further adds corresponding mark information to each initial encrypted data, wherein each mark information is used for indicating the type of the face part corresponding to the initial encrypted data corresponding to each mark information.
As an embodiment, the initial encrypted data may be in the form of a character string, and the vehicle may add a marker character to the character string of the initial encrypted data corresponding to each piece of feature information, where the marker character is the marker information corresponding to the initial encrypted data. For example, the vehicle may add a marker character at the end of the character string of the initial encrypted data corresponding to the feature information of the eye part, the marker character indicating that the face part corresponding to the initial encrypted data is the eye part, and so on.
And the vehicle adds corresponding mark information in each initial encrypted data to obtain the characteristic encrypted data corresponding to each characteristic information, and then sends the target encrypted data comprising the characteristic encrypted data corresponding to each characteristic information to the server. The server acquires legal feature encrypted data corresponding to each feature encrypted data from the database according to the marking information included in each feature encrypted data, wherein the legal feature encrypted data corresponding to each feature encrypted data can be legal feature encrypted data including corresponding marking information. For example, the target encrypted data includes the marker information of each feature encrypted data including the marker character indicating the eye region, the marker character indicating the nose region, the marker character indicating the mouth region, and the like, and the server acquires each valid feature encrypted data including the marker character indicating the eye region, the marker character indicating the nose region, and the marker character indicating the mouth region from the database. The server determines whether each feature encryption data is matched with the corresponding legal feature encryption data, and if so, the server determines that the legal encryption data matched with the target encryption data is stored in the server.
In the embodiment of the disclosure, the vehicle adds the corresponding mark information in each initial encrypted data, and the server can firstly screen out the legal feature encrypted data including each mark information from all the legal feature encrypted data stored in the database in the matching process, and then match each feature encrypted data included in the target encrypted data with each screened legal feature encrypted data, so that the problem of low matching efficiency caused by the fact that the server matches each feature encrypted data included in the target encrypted data with all the legal feature encrypted data in the database can be avoided.
In one embodiment, on the basis of the embodiment shown in fig. 2, the present embodiment relates to a process of how a vehicle performs unlocking control on the vehicle by combining geographic position information of the vehicle. Referring to fig. 4, the vehicle control method of the present embodiment further includes step S400:
step S400, the vehicle sends the geographic location information of the vehicle to the server.
The vehicle carries out irreversible encryption on biological information of a target user to obtain target encryption data, and then sends the target encryption data and geographical position information of the vehicle to the server, wherein the geographical position information is used for the server to search legal encryption data in a database corresponding to the geographical position information.
As an embodiment, the server includes a plurality of databases corresponding to different geographic areas, for example, each city may be considered as one geographic area; after receiving the target encrypted data and the geographic position information of the vehicle, the server firstly determines the geographic area to which the geographic position information belongs, then determines a target database corresponding to the geographic area, then matches the target encrypted data based on the target database, and searches legal encrypted data matched with the target encrypted data from the target database. Therefore, the matching range of the target encrypted data is reduced, and the unlocking efficiency of the vehicle is improved; the server stores the legal encrypted data of the legal user in geographical areas, so that the possibility that the target encrypted data of different target users in the same database are the same can be reduced, and the control reliability of unlocking control of the vehicle based on the biological information of the target users can be improved.
It should be noted that, in the embodiment of the present disclosure, the vehicle sends the target encrypted data to the server, and the vehicle sends the geographic position information of the vehicle to the server, where there is no specific limitation on the execution sequence between the two steps, and the vehicle may first send the target encrypted data to the server, may also first send the geographic position information of the vehicle to the server, and may also send the target encrypted data and the geographic position information of the vehicle to the server at the same time, where there is no specific limitation here.
In one embodiment, on the basis of the embodiment shown in fig. 2 described above, the present embodiment relates to a process of how a vehicle is controlled in a case where a server does not store legitimate encrypted data that matches target encrypted data. Referring to fig. 5, the vehicle control method of the present embodiment further includes step S500:
step S500, if the vehicle receives the registration prompt instruction sent by the server, the vehicle outputs registration prompt information for prompting the target user to register.
In the embodiment of the present disclosure, the registration prompt instruction is sent to the vehicle by the server when the legitimate encrypted data matching the target encrypted data is not stored. After receiving the registration prompt instruction, the vehicle outputs registration prompt information, which may be, for example, voice prompt information for prompting the target user to register.
In a possible implementation, after the vehicle outputs the registration prompt information, the following steps C1, C2 and C3 may be further performed:
and step C1, acquiring the registered biological information of the target user and the identification of the target user.
The vehicle collects registered biological information of the target user, wherein the registered biological information can be a face image of the target user, a fingerprint image of the target user or an iris image of the target user, and collects an identity of the target user, and the identity can be a telephone number or an identity card number of the target user.
And step C2, carrying out irreversible encryption on the registered biological information to obtain legal encrypted data of the target user.
And step C3, sending the legal encrypted data of the target user and the identification of the target user to the server for storage.
The vehicle irreversibly encrypts the registered biological information through an encryption chip or by adopting an irreversible encryption algorithm to obtain legal encrypted data of the target user, and sends the legal encrypted data of the target user and the identity of the target user to a server for storage, so that the target user is registered.
In another possible embodiment, after the vehicle outputs the registration prompt information, the following steps D1 and D2 may be further performed:
and D1, receiving the legal encrypted data of the target user and the identity of the target user, which are sent by the user terminal.
And D2, sending the legal encrypted data of the target user and the identity of the target user to the server for storage.
In the embodiment of the present disclosure, the legal encryption data of the target user is obtained by irreversibly encrypting the registered biometric information of the target user by the user terminal, that is, the process of irreversibly encrypting the registered biometric information of the target user is performed in the user terminal. And the vehicle receives the identification of the target user and the legal encrypted data of the target user obtained after the irreversible encryption of the user terminal, and sends the legal encrypted data of the target user and the identification of the target user to the server for storage, so that the registration of the target user is completed.
After the target user is registered, if the target user needs to use a vehicle, the vehicle acquires biological information of the target user and performs irreversible encryption on the biological information of the target user to obtain target encryption data; the vehicle sends the target encrypted data to the server, the server sends an unlocking instruction to the vehicle when matching that the server stores legal encrypted data matched with the target encrypted data, and the vehicle controls the vehicle to unlock when receiving the unlocking instruction, so that unlocking control of the vehicle according to the biological information of the target user is realized. Therefore, when the target user needs to use the vehicle, the following complicated unlocking process is not required to be executed: the method comprises the steps of taking out the user terminal, unlocking the user terminal, and then opening the application program in the user terminal to scan the two-dimensional code on the vehicle, simplifies the unlocking process of the vehicle, reduces the time consumption for unlocking the vehicle, and improves the unlocking efficiency.
In one embodiment, as shown in fig. 6, a vehicle control method is provided, which is described by taking the application of the method to the server in fig. 1 as an example, and comprises the following steps:
in step S10, the server receives the target encrypted data transmitted by the vehicle.
The target encrypted data is obtained by the vehicle through irreversible encryption of biological information of the target user.
In one embodiment, when the target user needs to use the vehicle, the biological information of the target user is entered through the vehicle, and the biological information of the target user may be a face image, a fingerprint image, an iris image, and the like of the target user. The vehicle adopts an irreversible encryption algorithm or carries out irreversible encryption on the biological information of the target user through an encryption chip to obtain target encryption data, and sends the target encryption data to the server.
In step S20, the server searches the database of the server for legitimate encrypted data that matches the target encrypted data.
The database of the server stores legal encrypted data of a legal user, the legal user can be a registered user, and the legal encrypted data is obtained by irreversibly encrypting biological information of the legal user. And after receiving the target encrypted data sent by the vehicle, the server searches legal encrypted data matched with the target encrypted data in the database.
In a possible implementation manner, both the target encrypted data and the legal encrypted data may be in the form of character strings, the server matches each bit corresponding to the legal encrypted data and the target encrypted data, and if each bit of the legal encrypted data is the same as that of the target encrypted data, it is determined that the legal encrypted data matches the target encrypted data.
In the embodiment of the disclosure, the legal encrypted data may be sent by the vehicle to the server for registration and storage. As an implementation manner, when a user needs to register, the vehicle sends the identity of the user and the legal encrypted data of the user to the server, and the server detects that the data sent by the vehicle includes the identity of the user, stores the identity of the user and the legal encrypted data, and realizes the registration of the user.
In the embodiment of the disclosure, since the legal encrypted data stored in the server is obtained by irreversibly encrypting the biological information of the legal user, and the biological information of the legal user cannot be deduced reversely according to the legal encrypted data, even if the legal encrypted data is leaked, the other party cannot obtain the biological information of the legal user, so that the security of the biological information of the legal user is ensured, and the privacy security of the user is ensured.
And step S30, if the server finds legal encrypted data matched with the target encrypted data, the server sends an unlocking instruction to the vehicle.
And if the server finds legal encrypted data matched with the target encrypted data, determining that the target user is a legal user, and sending an unlocking instruction to the vehicle by the server, wherein the unlocking instruction is used for indicating the vehicle to unlock.
As an implementation manner, after the transportation means successfully unlocks the lock, an unlocking success message can be sent to the server, and after the server receives the unlocking success message, a charging bill is generated according to the identity of the target user stored when the target user registers.
The embodiment of the disclosure realizes unlocking control of the vehicle according to the biological information of the target user. When the target user uses the vehicle, the following fussy unlocking process is not required to be executed: the method comprises the steps of taking out the user terminal, unlocking the user terminal and then opening the application program in the user terminal to scan the two-dimensional code on the vehicle, wherein the vehicle can realize unlocking control on the vehicle by utilizing the biological information of the target user directly acquired
In one embodiment, on the basis of the embodiment shown in fig. 6, the present embodiment relates to how the server searches the database of the server for the legal encrypted data matching the target encrypted data. Referring to fig. 7, the server searches the database of the server for legal encrypted data matching the target encrypted data, which can be implemented by performing the following steps S21 and S22:
step S21 is to determine, for each of the legitimate encrypted data stored in the database, whether or not a plurality of legitimate feature encrypted data included in the legitimate encrypted data match a plurality of feature encrypted data included in the target encrypted data one to one.
In the embodiment of the present disclosure, the target encrypted data includes feature encrypted data corresponding to a plurality of feature information, and each feature information is obtained by performing feature extraction on biological information of a target user. As an implementation manner, the vehicle may perform feature extraction on the biological information of the target user through a convolutional neural network to obtain a plurality of feature information, where different feature information may represent different features in the biological information of the target user, and perform irreversible encryption on each feature information to obtain feature encryption data corresponding to each feature information, to obtain target encryption data, and send the target encryption data to the server. The server receives the target encrypted data sent by the vehicle.
The database of the server can store a plurality of legal encrypted data, and each legal user can correspond to one legal encrypted data. When the legal user is registered, the vehicle can send a plurality of legal feature encrypted data of the legal user, namely the legal feature encrypted data of the legal user to the server, and the plurality of legal feature encrypted data included in the legal encrypted data can be obtained by irreversibly encrypting a plurality of feature information corresponding to the biological information of the legal user by the vehicle.
The server matches a plurality of legal feature encrypted data included in each legal encrypted data in the database with a plurality of feature encrypted data included in the target encrypted data one by one, and if the plurality of legal feature encrypted data included in one legal encrypted data are matched with the plurality of feature encrypted data included in the target encrypted data one by one, the server determines to find out the legal encrypted data matched with the target encrypted data. In one possible implementation of step S21, the biometric information may be a face image, and each feature encryption data includes label information indicating a category of a face part. With respect to step S21, the server may determine whether or not a plurality of legal feature encrypted data included in the legal encrypted data and a plurality of feature encrypted data included in the target encrypted data match one-to-one by performing steps a1 and a2 below:
step a1, according to the mark information included in each feature encrypted data, legal feature encrypted data corresponding to each feature encrypted data is obtained from the plurality of legal feature encrypted data.
Step a2, it is determined whether each feature encrypted data matches the corresponding legitimate feature encrypted data.
In the embodiment of the present disclosure, each feature encrypted data includes label information indicating a category of a face part corresponding to the feature encrypted data, such as label information indicating an eye part, a nose part, a mouth part, and the like, and the label information may be a label character.
And the server acquires legal feature encrypted data with the same mark information as the mark information included in each feature encrypted data from a plurality of legal feature encrypted data stored in the database according to the mark information included in each feature encrypted data, so that the legal feature encrypted data corresponding to each feature encrypted data is acquired. For example, the target encrypted data includes the marker information of each feature encrypted data including the marker character indicating the eye region, the marker character indicating the nose region, the marker character indicating the mouth region, and the like, and the server acquires each valid feature encrypted data including the marker character indicating the eye region, the marker character indicating the nose region, and the marker character indicating the mouth region from the database.
And the server determines whether each feature encryption data is matched with the corresponding legal feature encryption data or not according to the screened legal feature encryption data corresponding to each feature encryption data.
In step S22, if a plurality of pieces of legal feature encrypted data included in the legal encrypted data match a plurality of pieces of feature encrypted data included in the target encrypted data one by one, it is determined that the legal encrypted data matching the target encrypted data is found.
And if the feature encrypted data included in the target encrypted data are matched with the corresponding legal feature encrypted data, the server determines to find the legal encrypted data matched with the target encrypted data.
In the embodiment of the disclosure, in the matching process, the server can firstly select the legal feature encrypted data including the mark information in the database, and then match the feature encrypted data included in the target encrypted data with the selected legal feature encrypted data, so that the problem of low matching efficiency caused by the fact that the server matches the feature encrypted data included in the target encrypted data with all the legal feature encrypted data in the database one by one can be avoided.
In one embodiment, on the basis of the embodiment shown in fig. 6, the present embodiment relates to a process how a server performs unlocking control on a vehicle in combination with geographic location information of the vehicle. The server of the present embodiment includes a plurality of databases corresponding to different geographic areas, and referring to fig. 8, the vehicle control method of the present embodiment further includes step S40:
and step S40, receiving the geographical position information of the vehicle sent by the vehicle.
In the embodiment of the disclosure, the vehicle irreversibly encrypts the biological information of the target user to obtain the target encrypted data, and then sends the target encrypted data and the geographic position information of the vehicle to the server.
In a possible embodiment, the server searches the database of the server for the legal encrypted data matching the target encrypted data, which can be realized by executing the following steps b1 and b 2:
step b1, determining a target database in a plurality of databases according to the geographical position information; the geographic position information is located in a geographic area corresponding to the target database.
Step b2, searching the target database for legal encrypted data matching the target encrypted data.
As an implementation manner, the server may be provided with a plurality of databases corresponding to different geographic areas, for example, each city may be used as one geographic area, and the database corresponding to each geographic area stores the legal encrypted data of the legal users in the geographic area, that is, in the embodiment of the present disclosure, the server stores the legal encrypted data of all the legal users according to the corresponding geographic areas. If the server does not store the legal encrypted data of all legal users in geographic areas, after the server receives the target encrypted data of the target user sent by the vehicle, the server needs to search the legal encrypted data matched with the target encrypted data in the legal encrypted data of all legal users, so that the matching efficiency of the server is low, and further the unlocking efficiency is low. In the embodiment of the disclosure, after receiving the target encrypted data and the geographic position information of the vehicle, the server firstly determines the geographic area to which the geographic position information belongs, then determines the target database corresponding to the geographic area, matches the target encrypted data based on the target database, and searches legal encrypted data matched with the target encrypted data from the target database, so that the matching range of the target encrypted data is reduced, and the unlocking efficiency of the vehicle is improved.
The server stores legal encrypted data of legal users in geographic areas, and the database corresponding to each geographic area stores only the legal encrypted data of the legal users in the geographic area, but not the legal encrypted data of all the legal users, so that the possibility that target encrypted data of different target users in the same database are the same can be reduced by reducing the number of the legal encrypted data in the database, and the control reliability of unlocking control of a vehicle based on the biological information of the target users can be improved.
In one embodiment, on the basis of the embodiment shown in fig. 6 described above, the present embodiment relates to a process of how the server controls the vehicle in the case where the server does not store legitimate encrypted data that matches the target encrypted data. Referring to fig. 9, the vehicle control method of the embodiment further includes step S50:
in step S50, if the server does not find the legal encrypted data matching the target encrypted data, the server sends a registration prompt instruction to the vehicle.
If the server does not find legal encrypted data matched with the target encrypted data in the database, the server determines that the target user is not a legal user, namely the target user is not registered, and sends a registration prompt instruction to the vehicle, wherein the registration prompt instruction is used for indicating the vehicle to output registration prompt information.
In a possible embodiment, after the server sends the registration prompt instruction to the vehicle, the following step c1 may be further performed:
and c1, receiving and storing the legal encrypted data of the target user and the identification of the target user sent by the vehicle.
In the embodiment of the present disclosure, the legal encryption data of the target user is obtained by irreversibly encrypting the registered biometric information of the target user. In one embodiment, after the server sends the registration prompt instruction to the vehicle, the vehicle may output registration prompt information for prompting the target user to register. The vehicle can collect the registered biological information of the target user and the identity of the target user, perform irreversible encryption on the registered biological information to obtain legal encrypted data of the target user, and then send the legal encrypted data of the target user and the identity of the target user to the server for storage.
In another possible implementation manner, after the vehicle outputs registration prompt information for prompting a target user to register, the user terminal may collect registration biological information of the target user and an identity of the target user, and perform irreversible encryption on the registration biological information of the target user by the user terminal to obtain legal encrypted data of the target user, and the user terminal sends the legal encrypted data of the target user and the identity of the target user to the vehicle, and then the vehicle sends the legal encrypted data of the target user and the identity of the target user to the server for storage.
After the target user is registered, if the target user needs to use a vehicle, the vehicle acquires biological information of the target user and performs irreversible encryption on the biological information of the target user to obtain target encryption data; the vehicle sends the target encrypted data to the server, the server sends an unlocking instruction to the vehicle when matching that the server stores legal encrypted data matched with the target encrypted data, and the vehicle controls the vehicle to unlock when receiving the unlocking instruction, so that unlocking control of the vehicle according to the biological information of the target user is realized. Therefore, when the target user needs to use the vehicle, the following complicated unlocking process is not required to be executed: the method comprises the steps of taking out the user terminal, unlocking the user terminal, and then opening the application program in the user terminal to scan the two-dimensional code on the vehicle, simplifies the unlocking process of the vehicle, reduces the time consumption for unlocking the vehicle, and improves the unlocking efficiency.
In one embodiment, on the basis of the above embodiments, the present embodiment relates to a process of how the vehicle and the server interact to realize the vehicle control. The embodiment comprises the following steps:
and S100, the vehicle acquires the biological information of the target user and performs irreversible encryption on the biological information of the target user to obtain target encryption data.
In the embodiment of the disclosure, the vehicle may be provided with a biological information collecting component, and the vehicle collects biological information of the target user through the biological information collecting component.
The vehicle carries out irreversible encryption on the collected biological information of the target user to obtain target encryption data, the irreversible encryption does not need to use a secret key in the encryption process, and is irreversible mapping from a plaintext to a ciphertext, namely the biological information of the target user cannot be reversely deduced according to the target encryption data. In the embodiment of the disclosure, the vehicle may perform irreversible encryption on the biological information of the target user in a hardware encryption manner, an encryption chip may be disposed in the vehicle, and the vehicle may perform irreversible encryption on the biological information of the target user through the encryption chip. The hardware encryption mode can prevent attacks such as malicious codes and brute force cracking, and the safety of biological information of the target user is improved.
In the embodiment of the present disclosure, the vehicle irreversibly encrypts the biological information of the target user to obtain the target encrypted data may be implemented by performing the following steps S101 and S102:
step S101, the vehicle extracts the characteristics of the biological information of the target user to obtain a plurality of characteristic information.
The biological information of the target user can be a face image of the target user, a fingerprint image of the target user, an iris image of the target user and the like, the vehicle can extract the characteristics of the biological information of the target user through the convolutional neural network to obtain a plurality of characteristic information, and different characteristic information can represent different characteristics in the biological information of the target user. Taking biological information as a face image as an example, step S101 may include step a 1:
step a1 is to extract features of each facial part in the face image to obtain a plurality of pieces of feature information.
In a convolutional neural network, different convolution kernels may extract different features. The vehicle according to the embodiment of the disclosure may set different convolution kernels to the convolution neural network to extract the features of each facial region in the face image, for example, different convolution kernels may be set to perform feature extraction on facial regions such as eyes and noses in the face image, so as to obtain feature information of the eye regions and feature information of the nose regions, and so on. Thus, the vehicle can obtain a plurality of feature information, each corresponding to a different facial part.
And S102, the vehicle irreversibly encrypts each characteristic information to obtain target encrypted data, wherein the target encrypted data comprises characteristic encrypted data corresponding to each characteristic information.
The vehicle respectively carries out irreversible encryption on each feature information of the biological information of the target user to obtain feature encryption data corresponding to each feature information, and the feature encryption data corresponding to each feature information is target encryption data.
In the disclosed embodiment, step S102 may include step B1 and step B2:
and step B1, carrying out irreversible encryption on each characteristic information to obtain initial encrypted data corresponding to each characteristic information.
And step B2, adding corresponding mark information to each initial encrypted data to obtain characteristic encrypted data corresponding to each characteristic information.
The transportation means performs irreversible encryption on each feature information to obtain initial encrypted data corresponding to each feature information, and further adds corresponding mark information to each initial encrypted data, wherein each mark information is used for indicating the type of the face part corresponding to the initial encrypted data corresponding to each mark information.
As an embodiment, the initial encrypted data may be in the form of a character string, and the vehicle may add a marker character to the character string of the initial encrypted data corresponding to each piece of feature information, where the marker character is the marker information corresponding to the initial encrypted data. For example, the vehicle may add a marker character at the end of the character string of the initial encrypted data corresponding to the feature information of the eye part, the marker character indicating that the face part corresponding to the initial encrypted data is the eye part, and so on. And the vehicle adds corresponding mark information in each initial encrypted data to obtain characteristic encrypted data corresponding to each characteristic information, and the target encrypted data comprises the characteristic encrypted data corresponding to each characteristic information.
Step S200, the vehicle transmits the target encrypted data to the server.
Step S400, the vehicle sends the geographic location information of the vehicle to the server.
In the embodiment of the disclosure, the vehicle sends the target encrypted data to the server, and the vehicle sends the geographic position information of the vehicle to the server, and there is no specific limitation on the execution sequence between the two steps.
In step S10, the server receives the target encrypted data transmitted by the vehicle.
In step S40, the server receives the geographical location information of the vehicle transmitted by the vehicle.
In step S20, the server searches the database of the server for legitimate encrypted data that matches the target encrypted data.
In the embodiment of the disclosure, after the server receives the target encrypted data sent by the vehicle and the geographic position information of the vehicle, the server may determine the target database in the plurality of databases according to the geographic position information, wherein the geographic position information is located in a geographic area corresponding to the target database. And after the target database is determined, the server searches legal encrypted data matched with the target encrypted data in the target database.
In the embodiment of the present disclosure, the server may be provided with a plurality of databases corresponding to different geographic areas, for example, each city may be regarded as a geographic area, and the database corresponding to each geographic area stores legal encrypted data of a legal user in the geographic area. After receiving the target encrypted data and the geographic position information of the vehicle, the server firstly determines the geographic area to which the geographic position information belongs, then determines a target database corresponding to the geographic area, matches the target encrypted data based on the target database, and searches legal encrypted data matched with the target encrypted data from the target database, so that the matching range of the target encrypted data is reduced, and the unlocking efficiency of the vehicle is improved.
In the embodiment of the present disclosure, the server searches the database of the server for the legal encrypted data matching the target encrypted data, and may perform the following steps S21 and S22:
in step S21, for each of the legitimate encrypted data stored in the database, the server determines whether or not a plurality of legitimate feature encrypted data included in the legitimate encrypted data and a plurality of feature encrypted data included in the target encrypted data match one to one.
The server matches a plurality of legal feature encrypted data included in each legal encrypted data in a database corresponding to a geographic area to which the geographic position information of the vehicle belongs, namely a target database, with a plurality of feature encrypted data included in the target encrypted data one by one, and if the plurality of legal feature encrypted data included in one legal encrypted data are matched with the plurality of feature encrypted data included in the target encrypted data one by one, the server determines to find out the legal encrypted data matched with the target encrypted data.
In the disclosed embodiment, the biological information may be a face image, and each feature encryption data includes label information indicating a category of a face part. With respect to step S21, the server in this embodiment of the present disclosure may determine whether a plurality of legal feature encrypted data included in the legal encrypted data and a plurality of feature encrypted data included in the target encrypted data match one-to-one by performing steps a1 and a2 as follows:
in step a1, the server obtains the legal feature encrypted data corresponding to each feature encrypted data from the plurality of legal feature encrypted data according to the tag information included in each feature encrypted data.
At step a2, the server determines whether each feature encrypted data matches the corresponding legitimate feature encrypted data.
In the embodiment of the present disclosure, each feature encrypted data includes label information indicating a category of a face part corresponding to the feature encrypted data, such as label information indicating an eye part, a nose part, a mouth part, and the like, and the label information may be a label character.
And the server acquires legal feature encrypted data with the same mark information as the mark information included in each feature encrypted data from a plurality of legal feature encrypted data stored in a target database according to the mark information included in each feature encrypted data, so that the legal feature encrypted data corresponding to each feature encrypted data is acquired. For example, the target encrypted data includes the marker information of each feature encrypted data including the marker character indicating the eye region, the marker character indicating the nose region, the marker character indicating the mouth region, and the like, and the server acquires each valid feature encrypted data including the marker character indicating the eye region, the marker character indicating the nose region, and the marker character indicating the mouth region in the target database.
And the server determines whether each feature encryption data is matched with the corresponding legal feature encryption data or not according to the screened legal feature encryption data corresponding to each feature encryption data.
In step S22, if the plurality of legal feature encrypted data included in the legal encrypted data match the plurality of feature encrypted data included in the target encrypted data one by one, the server determines to find the legal encrypted data matching the target encrypted data.
And if the feature encrypted data included in the target encrypted data are matched with the corresponding legal feature encrypted data, the server determines to find the legal encrypted data matched with the target encrypted data.
In the embodiment of the disclosure, in the matching process, the server may first select the legal feature encrypted data including the mark information from the target database, and then match the feature encrypted data included in the target encrypted data with the selected legal feature encrypted data, so that a problem of low matching efficiency caused by the fact that the server matches the feature encrypted data included in the target encrypted data with all the legal feature encrypted data in the target database one by one can be avoided.
And step S30, if the server finds legal encrypted data matched with the target encrypted data, the server sends an unlocking instruction to the vehicle.
And if the server finds legal encrypted data matched with the target encrypted data, determining that the target user is a legal user, and sending an unlocking instruction to the vehicle by the server, wherein the unlocking instruction is used for indicating the vehicle to unlock.
And step S300, if the vehicle receives the unlocking instruction sent by the server, controlling the vehicle to unlock.
After the vehicle receives the unlocking instruction sent by the server, the vehicle is controlled to unlock, and after unlocking, the target user can start to use the vehicle.
According to the embodiment of the disclosure, the unlocking control of the vehicle is realized according to the biological information of the target user. When the target user uses the transportation means in the sharing mode, the following fussy unlocking process is not required to be executed: the method comprises the steps of taking out a user terminal, unlocking the user terminal and then opening an application program in the user terminal to scan a two-dimensional code on the vehicle, wherein the vehicle can realize unlocking control on the vehicle by directly acquiring biological information of a target user, and the unlocking process of the vehicle is simplified, so that the time consumed for unlocking the vehicle is reduced, and the unlocking efficiency is improved.
In a possible implementation, after the step S20, the server may further perform the following step S50:
in step S50, if the server does not find the legal encrypted data matching the target encrypted data, the server sends a registration prompt instruction to the vehicle.
If the server does not find legal encrypted data matched with the target encrypted data in the database, the server determines that the target user is not a legal user, namely the target user is not registered, and sends a registration prompt instruction to the vehicle, wherein the registration prompt instruction is used for indicating the vehicle to output registration prompt information.
Step S500, if the vehicle receives the registration prompt instruction sent by the server, the vehicle outputs registration prompt information for prompting the target user to register.
In the embodiment of the present disclosure, the registration prompt message may be, for example, a voice prompt message, which is used to prompt the target user to perform registration.
In a possible implementation, after the vehicle outputs the registration prompt information, the following steps C1, C2 and C3 may be further performed:
and step C1, acquiring the registered biological information of the target user and the identification of the target user.
The vehicle collects registered biological information of the target user, wherein the registered biological information can be a face image of the target user, a fingerprint image of the target user or an iris image of the target user, and collects an identity of the target user, and the identity can be a telephone number or an identity card number of the target user.
And step C2, carrying out irreversible encryption on the registered biological information to obtain legal encrypted data of the target user.
And step C3, sending the legal encrypted data of the target user and the identification of the target user to the server for storage.
The vehicle irreversibly encrypts the registered biological information through an encryption chip or by adopting an irreversible encryption algorithm to obtain legal encrypted data of the target user, and sends the legal encrypted data of the target user and the identity of the target user to a server for storage, so that the target user is registered.
In another possible embodiment, after the vehicle outputs the registration prompt information, the following steps D1 and D2 may be further performed:
and D1, receiving the legal encrypted data of the target user and the identity of the target user, which are sent by the user terminal.
And D2, sending the legal encrypted data of the target user and the identity of the target user to the server for storage.
The legal encryption data of the target user is obtained by the user terminal irreversibly encrypting the registered biological information of the target user, namely, the process of irreversibly encrypting the registered biological information of the target user is carried out in the user terminal. The vehicle receives the identification of the target user and the legal encrypted data of the target user obtained after the irreversible encryption of the user terminal, and sends the legal encrypted data of the target user and the identification of the target user to the server for storage.
After the vehicle sends the legal encrypted data of the target user and the identification of the target user to the server, the server may perform the following step c1:
in step c1, the server receives and stores the target user's legitimate encrypted data and the target user's identification sent by the vehicle.
In the embodiment of the disclosure, the vehicle sends the legal encrypted data of the target user and the identity of the target user to the server for storage, and the server receives and stores the legal encrypted data of the target user and the identity of the target user sent by the vehicle, so as to complete the registration of the target user.
After the target user is registered, if the target user needs to use a vehicle, the vehicle acquires biological information of the target user and performs irreversible encryption on the biological information of the target user to obtain target encryption data; the vehicle sends the target encrypted data to the server, the server sends an unlocking instruction to the vehicle when matching that the server stores legal encrypted data matched with the target encrypted data, and the vehicle controls the vehicle to unlock when receiving the unlocking instruction, so that unlocking control of the vehicle according to the biological information of the target user is realized. Therefore, when the target user needs to use the vehicle, the following complicated unlocking process is not required to be executed: the method comprises the steps of taking out the user terminal, unlocking the user terminal, and then opening the application program in the user terminal to scan the two-dimensional code on the vehicle, simplifies the unlocking process of the vehicle, reduces the time consumption for unlocking the vehicle, and improves the unlocking efficiency.
It should be understood that although the various steps in the flow charts of fig. 2-9 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-9 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 10, there is provided a vehicle control apparatus including:
the first encryption module 100 is configured to collect biological information of a target user, and perform irreversible encryption on the biological information of the target user to obtain target encryption data;
a first sending module 200, configured to send the target encrypted data to a server, where the target encrypted data is used for the server to send an unlocking instruction to the vehicle when legal encrypted data matched with the target encrypted data is stored, where the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
and the unlocking module 300 is configured to control the vehicle to unlock if the unlocking instruction sent by the server is received.
In one embodiment, based on the embodiment shown in fig. 10, referring to fig. 11, the first encryption module 100 includes:
a feature extraction unit 101, configured to perform feature extraction on biological information of the target user to obtain a plurality of feature information;
an irreversible encryption unit 102, configured to perform irreversible encryption on each piece of feature information to obtain the target encrypted data, where the target encrypted data includes feature encrypted data corresponding to each piece of feature information.
In an embodiment, in addition to the above-mentioned embodiment shown in fig. 11, the biological information is a face image, and the feature extraction unit is configured to perform feature extraction on each facial part in the face image to obtain the plurality of feature information, where each feature information corresponds to a different facial part.
In an embodiment, on the basis of the embodiment shown in fig. 11, the irreversible encryption unit is configured to perform irreversible encryption on each feature information to obtain initial encrypted data corresponding to each feature information, and add corresponding tag information to each initial encrypted data to obtain feature encrypted data corresponding to each feature information, where each tag information is used to indicate a category of a face portion corresponding to the initial encrypted data corresponding to each tag information.
In one embodiment, on the basis of the embodiment shown in fig. 10 described above, referring to fig. 12, the vehicle control apparatus further includes:
a second sending module 400, configured to send geographic location information of the vehicle to the server, where the geographic location information is used for the server to search the legal encrypted data in a database corresponding to the geographic location information.
In an embodiment, on the basis of the embodiment shown in fig. 10, an encryption chip is disposed in the vehicle, and the first encryption module 100 is configured to perform irreversible encryption on the biological information of the target user through the encryption chip to obtain the target encrypted data.
In one embodiment, on the basis of the embodiment shown in fig. 10 described above, referring to fig. 13, the vehicle control apparatus further includes:
an output module 500, configured to output registration prompt information for prompting the target user to register if a registration prompt instruction sent by the server is received, where the registration prompt instruction is sent to the vehicle by the server when legal encrypted data matching the target encrypted data is not stored in the server.
In one embodiment, on the basis of the embodiment shown in fig. 13 described above, referring to fig. 14, the vehicle control apparatus further includes:
an acquisition module 601, configured to acquire registered biometric information of the target user and an identity of the target user;
a second encryption module 602, configured to perform irreversible encryption on the registered biometric information to obtain legal encrypted data of the target user;
a third sending module 603, configured to send the legal encrypted data of the target user and the identity of the target user to the server for storage.
In one embodiment, on the basis of the embodiment shown in fig. 13 described above, referring to fig. 15, the vehicle control apparatus further includes:
a receiving module 701, configured to receive legal encrypted data of the target user and an identity of the target user, where the legal encrypted data of the target user is obtained by the user terminal through irreversible encryption of registered biometric information of the target user;
a fourth sending module 702, configured to send the legal encrypted data of the target user and the identity of the target user to the server for storage.
For specific limitations of the vehicle control device according to the embodiment of the present disclosure, reference may be made to the above limitations of the vehicle control method, and specifically, to the above limitations of the vehicle control method applied to a vehicle, which are not described herein again. The respective modules in the vehicle control apparatus described above may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a processor in a vehicle or independent of the processor in the vehicle in a hardware form, and can also be stored in a memory in the vehicle in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, as shown in fig. 16, there is provided a vehicle control device including:
the data receiving module 10 is configured to receive target encrypted data sent by a vehicle, where the target encrypted data is obtained by irreversibly encrypting biological information of a target user by the vehicle;
the searching module 20 is configured to search, in the database of the server, legal encrypted data that matches the target encrypted data, where the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
the first instruction sending module 30 is configured to send an unlocking instruction to the vehicle if legal encrypted data matched with the target encrypted data is found, where the unlocking instruction is used to instruct the vehicle to unlock.
In an embodiment, on the basis of the embodiment shown in fig. 16, the target encrypted data includes feature encrypted data corresponding to a plurality of feature information, and each of the feature information is obtained by performing feature extraction on biological information of the target user, referring to fig. 17, the search module 20 includes:
a first determining unit 21, configured to determine, for each legal encrypted data stored in the database, whether a plurality of legal feature encrypted data included in the legal encrypted data match a plurality of feature encrypted data included in the target encrypted data one by one;
a second determining unit 22, configured to determine that valid encrypted data matching the target encrypted data is found if multiple valid feature encrypted data included in the valid encrypted data match multiple feature encrypted data included in the target encrypted data one by one.
In one embodiment, on the basis of the embodiment shown in fig. 17, the biometric information is a face image, each of the feature encrypted data includes tag information indicating a category of a face portion, and the first determining unit 21 is configured to obtain legal feature encrypted data corresponding to each of the feature encrypted data from the plurality of legal feature encrypted data according to the tag information included in each of the feature encrypted data, and determine whether each of the feature encrypted data matches the corresponding legal feature encrypted data.
In one embodiment, based on the embodiment shown in fig. 16, the server includes a plurality of databases corresponding to different geographic areas, as shown in fig. 18, and the apparatus further includes:
a position receiving module 40, configured to receive geographic position information of the vehicle sent by the vehicle;
correspondingly, the searching module 20 is configured to determine a target database among the plurality of databases according to the geographic location information, and search legal encrypted data matched with the target encrypted data in the target database, where the geographic location information is located in a geographic area corresponding to the target database.
In one embodiment, based on the embodiment shown in fig. 16, as shown in fig. 19, the apparatus further includes:
and a second instruction sending module 50, configured to send a registration prompt instruction to the vehicle if legal encrypted data matching the target encrypted data is not found, where the registration prompt instruction is used to instruct the vehicle to output registration prompt information.
In one embodiment, on the basis of the embodiment shown in fig. 19, as shown in fig. 20, the apparatus further includes:
the registration module 60 is configured to receive and store the legal encrypted data of the target user and the identity of the target user, where the legal encrypted data of the target user is obtained by irreversibly encrypting the registered biometric information of the target user.
For specific limitations of the vehicle control device according to the embodiment of the present disclosure, reference may be made to the above limitations of the vehicle control method, and specifically, to the above limitations of the vehicle control method applied to the server, which are not described herein again. The respective modules in the vehicle control apparatus described above may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the server, and can also be stored in a memory in the server in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, as shown in fig. 21, there is provided a vehicle comprising a biological information collection component 10, a communication component 20, a processing component 30, and a lock 40;
the biological information acquisition component 10 is used for acquiring biological information of a target user;
the processing component 30 is configured to perform irreversible encryption on the biological information of the target user to obtain target encrypted data;
the communication component 20 is configured to send the target encrypted data to a server under the control of the processing component 30, and is configured to receive an unlocking instruction; the target encrypted data is used for the server to send the unlocking instruction to the vehicle under the condition that legal encrypted data matched with the target encrypted data is stored, wherein the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
the processing component 30 is configured to control the lock 40 to be unlocked when the communication component 20 receives the unlocking instruction.
In one embodiment, on the basis of the embodiment shown in fig. 21, the vehicle further comprises an encryption chip;
the encryption chip is configured to perform irreversible encryption on the biological information of the target user under the control of the processing component 30, so as to obtain the target encrypted data.
For specific definition of the vehicle according to the embodiment of the present disclosure, reference may be made to the above definition of the vehicle control method, and specifically, to the above definition of the vehicle control method applied to the vehicle, which is not described herein again.
Fig. 22 is a block diagram of a vehicle 1300 shown in accordance with an exemplary embodiment. For example, the vehicle 1300 may be a non-motorized or motorized vehicle such as a bicycle, electric bicycle, scooter, motorcycle, or the like.
Referring to fig. 22, a vehicle 1300 may include one or more of the following components: a processing component 1302, a memory 1304, a power component 1306, a biometric acquisition component 1308, an encryption chip 1310, an input/output (I/O) interface 1312, a vehicle lock 1314, and a communication component 1316. Wherein the memory has stored thereon a computer program or instructions for execution on the processor.
The processing component 1302 generally controls the overall operation of the vehicle 1300. The processing component 1302 may include one or more processors 1320 to execute instructions to perform all or part of the steps of the method described above. Further, the processing component 1302 can include one or more modules that facilitate interaction between the processing component 1302 and other components.
The memory 1304 is configured to store various types of data to support operation at the vehicle 1300. Examples of such data include instructions for any application or method operating on the vehicle 1300. The memory 1304 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 1306 provides power to the various components of the vehicle 1300. The power components 1306 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the vehicle 1300.
In some embodiments, the biological information acquisition component 1308 may include a camera for acquiring biological information of the user.
The encryption chip 1310 is used for irreversibly encrypting the biometric information of the user under the control of the processing component 1302.
I/O interface 1312 provides an interface between processing component 1302 and a peripheral interface module, which may be an unlock button or the like.
The communication component 1316 is configured to facilitate communication between the vehicle 1300 and other devices in a wired or wireless manner. The vehicle 1300 may access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1316 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 1316 also includes a Near Field Communications (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the vehicle 1300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors, or other electronic components for performing the vehicle control methods described above.
Fig. 23 is a block diagram illustrating a server 1400 in accordance with an example embodiment. Referring to fig. 23, server 1400 includes a processing component 1420, which further includes one or more processors, and memory resources, represented by memory 1422, for storing instructions or computer programs, e.g., applications, that are executable by processing component 1420. The application programs stored in memory 1422 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1420 is configured to execute instructions to perform the vehicle control methods described above.
The server 1400 may also include a power component 1424 configured to perform power management of the device 1400, a wired or wireless network interface 1426 configured to connect the device 1400 to a network, and an input/output (I/O) interface 1428. The server 1400 may operate based on an operating system stored in memory 1422, such as Window 1414 over, Mac O14 XTM, UnixTM, LinuxTM, FreeB14DTM, or the like.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 1304 comprising instructions, executable by the processor 1320 of the vehicle 1300 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, a storage medium comprising instructions, such as the memory 1422 comprising instructions, executable by the processor of the server 1400 to perform the above-described method is also provided. The storage medium may be a non-transitory computer readable storage medium, which may be, for example, a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided by the embodiments of the disclosure may include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express a few implementation modes of the embodiments of the present disclosure, and the description thereof is specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for those skilled in the art, variations and modifications can be made without departing from the concept of the embodiments of the present disclosure, and these are all within the scope of the embodiments of the present disclosure. Therefore, the protection scope of the patent of the embodiment of the disclosure should be subject to the appended claims.

Claims (35)

1. A vehicle control method, applied to a vehicle, the method comprising:
acquiring biological information of a target user, and carrying out irreversible encryption on the biological information of the target user to obtain target encryption data;
sending the target encrypted data to a server, wherein the target encrypted data is used for sending an unlocking instruction to the vehicle when legal encrypted data matched with the target encrypted data is stored in the server, and the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
and if the unlocking instruction sent by the server is received, controlling the transportation means to unlock.
2. The method according to claim 1, wherein the irreversibly encrypting the biometric information of the target user to obtain target encrypted data comprises:
extracting the characteristics of the biological information of the target user to obtain a plurality of characteristic information;
and carrying out irreversible encryption on each characteristic information to obtain the target encrypted data, wherein the target encrypted data comprises the characteristic encrypted data corresponding to each characteristic information.
3. The method according to claim 2, wherein the biometric information is a face image, and the extracting the features of the biometric information of the target user to obtain a plurality of feature information comprises:
and extracting the features of each facial part in the face image to obtain a plurality of feature information, wherein each feature information corresponds to different facial parts.
4. The method according to claim 3, wherein the irreversibly encrypting each of the feature information to obtain the target encrypted data comprises:
carrying out irreversible encryption on each characteristic information to obtain initial encryption data corresponding to each characteristic information;
and adding corresponding mark information to each piece of initial encrypted data to obtain feature encrypted data corresponding to each piece of feature information, wherein each piece of mark information is used for indicating the type of the face part corresponding to the initial encrypted data corresponding to each piece of mark information.
5. The method of claim 1, further comprising:
and sending the geographical position information of the vehicle to the server, wherein the geographical position information is used for the server to search the legal encrypted data in a database corresponding to the geographical position information.
6. The method according to claim 1, wherein an encryption chip is disposed in the vehicle, and the irreversibly encrypting the biological information of the target user to obtain target encrypted data comprises:
and carrying out irreversible encryption on the biological information of the target user through the encryption chip to obtain the target encryption data.
7. The method according to any one of claims 1 to 6, wherein after sending the target encrypted data to a server, the method further comprises:
and if a registration prompt instruction sent by the server is received, outputting registration prompt information for prompting the target user to register, wherein the registration prompt instruction is sent to the vehicle by the server under the condition that legal encrypted data matched with the target encrypted data are not stored.
8. The method of claim 7, further comprising:
acquiring registered biological information of the target user and an identity of the target user;
carrying out irreversible encryption on the registered biological information to obtain legal encrypted data of the target user;
and sending the legal encrypted data of the target user and the identity of the target user to the server for storage.
9. The method of claim 7, further comprising:
receiving legal encrypted data of the target user and an identity of the target user, which are sent by a user terminal, wherein the legal encrypted data of the target user are obtained by irreversible encryption of registered biological information of the target user by the user terminal;
and sending the legal encrypted data of the target user and the identity of the target user to the server for storage.
10. A vehicle control method, applied to a server, the method comprising:
receiving target encrypted data sent by a vehicle, wherein the target encrypted data is obtained by irreversibly encrypting biological information of a target user by the vehicle;
searching legal encryption data matched with the target encryption data in a database of the server, wherein the legal encryption data is obtained by irreversibly encrypting biological information of a legal user;
and if legal encrypted data matched with the target encrypted data are found, sending an unlocking instruction to the vehicle, wherein the unlocking instruction is used for indicating the vehicle to unlock.
11. The method according to claim 10, wherein the target encrypted data includes feature encrypted data corresponding to a plurality of pieces of feature information, each piece of feature information is obtained by feature extraction of biometric information of the target user, and the searching for the legal encrypted data matching the target encrypted data in the database of the server includes:
for each legal encrypted data stored in the database, determining whether a plurality of legal feature encrypted data included in the legal encrypted data are matched with a plurality of feature encrypted data included in the target encrypted data one by one;
if yes, determining to find legal encrypted data matched with the target encrypted data.
12. The method according to claim 11, wherein the biometric information is a face image, each of the feature encrypted data includes flag information indicating a category of a face portion, and the determining whether a plurality of legitimate feature encrypted data included in the legitimate encrypted data match a plurality of the feature encrypted data included in the target encrypted data on a one-to-one basis includes:
according to the mark information included in each feature encrypted data, legal feature encrypted data corresponding to each feature encrypted data are obtained from the plurality of legal feature encrypted data;
and determining whether each feature encryption data is matched with corresponding legal feature encryption data.
13. The method of claim 10, wherein the server comprises a plurality of the databases corresponding to different geographic regions, the method further comprising:
receiving the geographical position information of the vehicle sent by the vehicle;
correspondingly, the searching for the legal encrypted data matched with the target encrypted data in the database of the server includes:
determining a target database in the plurality of databases according to the geographical location information; the geographic position information is positioned in a geographic area corresponding to the target database;
and searching legal encrypted data matched with the target encrypted data in the target database.
14. The method according to any one of claims 10-13, further comprising:
and if legal encrypted data matched with the target encrypted data are not found, sending a registration prompt instruction to the vehicle, wherein the registration prompt instruction is used for indicating the vehicle to output registration prompt information.
15. The method of claim 14, further comprising:
and receiving and storing legal encrypted data of the target user and the identity of the target user, wherein the legal encrypted data of the target user is obtained by irreversibly encrypting the registered biological information of the target user.
16. A vehicle control apparatus, characterized in that the apparatus comprises:
the first encryption module is used for acquiring biological information of a target user and carrying out irreversible encryption on the biological information of the target user to obtain target encryption data;
the first sending module is used for sending the target encrypted data to a server, and the target encrypted data is used for sending an unlocking instruction to a vehicle when the server stores legal encrypted data matched with the target encrypted data, wherein the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
and the unlocking module is used for controlling the transportation means to unlock if the unlocking instruction sent by the server is received.
17. The apparatus of claim 16, wherein the first encryption module comprises:
the characteristic extraction unit is used for extracting the characteristics of the biological information of the target user to obtain a plurality of characteristic information;
and the irreversible encryption unit is used for carrying out irreversible encryption on each characteristic information to obtain the target encrypted data, and the target encrypted data comprises characteristic encrypted data corresponding to each characteristic information.
18. The apparatus according to claim 17, wherein the biometric information is a face image, and the feature extraction unit is configured to perform feature extraction on each facial part in the face image to obtain the plurality of feature information, each feature information corresponding to a different facial part.
19. The apparatus according to claim 18, wherein the irreversible encryption unit is configured to perform irreversible encryption on each feature information to obtain initial encrypted data corresponding to each feature information, and add corresponding tag information to each initial encrypted data to obtain feature encrypted data corresponding to each feature information, where each tag information is used to indicate a category of a face portion corresponding to the initial encrypted data corresponding to each tag information.
20. The apparatus of claim 16, further comprising:
and the second sending module is used for sending the geographical position information of the vehicle to the server, and the geographical position information is used for the server to search the legal encrypted data in a database corresponding to the geographical position information.
21. The device of claim 16, wherein an encryption chip is disposed in the vehicle, and the first encryption module is configured to perform irreversible encryption on the biometric information of the target user through the encryption chip to obtain the target encrypted data.
22. The apparatus of any one of claims 16 to 21, further comprising:
and the output module is used for outputting registration prompt information for prompting the target user to register if a registration prompt instruction sent by the server is received, wherein the registration prompt instruction is sent to the vehicle by the server under the condition that legal encrypted data matched with the target encrypted data are not stored in the server.
23. The apparatus of claim 22, further comprising:
the acquisition module is used for acquiring the registered biological information of the target user and the identity of the target user;
the second encryption module is used for carrying out irreversible encryption on the registered biological information to obtain legal encrypted data of the target user;
and the third sending module is used for sending the legal encrypted data of the target user and the identity of the target user to the server for storage.
24. The apparatus of claim 22, further comprising:
the receiving module is used for receiving legal encrypted data of the target user and the identity of the target user, which are sent by a user terminal, wherein the legal encrypted data of the target user are obtained by the user terminal through irreversible encryption on registered biological information of the target user;
and the fourth sending module is used for sending the legal encrypted data of the target user and the identity of the target user to the server for storage.
25. A vehicle control apparatus, characterized in that the apparatus comprises:
the data receiving module is used for receiving target encrypted data sent by a vehicle, wherein the target encrypted data is obtained by irreversible encryption of biological information of a target user by the vehicle;
the searching module is used for searching legal encrypted data matched with the target encrypted data in a database of the server, wherein the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
the first instruction sending module is used for sending an unlocking instruction to the vehicle if legal encrypted data matched with the target encrypted data are found, and the unlocking instruction is used for indicating the vehicle to unlock.
26. The apparatus according to claim 25, wherein the target encrypted data includes feature encrypted data corresponding to a plurality of feature information, respectively, each of the feature information being obtained by feature extraction of biometric information of the target user, and the search module includes:
a first determining unit configured to determine, for each legal encrypted data stored in the database, whether a plurality of legal feature encrypted data included in the legal encrypted data match a plurality of feature encrypted data included in the target encrypted data one to one;
a second determining unit, configured to determine that valid encrypted data matching the target encrypted data is found if multiple valid feature encrypted data included in the valid encrypted data match multiple feature encrypted data included in the target encrypted data one by one.
27. The apparatus according to claim 26, wherein the biometric information is a face image, each of the feature encrypted data includes tag information indicating a category of a face portion, and the first determination unit is configured to acquire legitimate feature encrypted data corresponding to each of the feature encrypted data from the plurality of legitimate feature encrypted data based on the tag information included in each of the feature encrypted data, and determine whether each of the feature encrypted data matches the corresponding legitimate feature encrypted data.
28. The apparatus of claim 25, wherein the server comprises a plurality of the databases corresponding to different geographic regions, the apparatus further comprising:
the position receiving module is used for receiving the geographical position information of the vehicle sent by the vehicle;
correspondingly, the searching module is configured to determine a target database among the plurality of databases according to the geographic location information, and search legal encrypted data matched with the target encrypted data in the target database, where the geographic location information is located in a geographic area corresponding to the target database.
29. The apparatus of any one of claims 25-28, further comprising:
and the second instruction sending module is used for sending a registration prompt instruction to the vehicle if legal encrypted data matched with the target encrypted data is not found, wherein the registration prompt instruction is used for indicating the vehicle to output registration prompt information.
30. The apparatus of claim 29, further comprising:
and the registration module is used for receiving and storing the legal encrypted data of the target user and the identity of the target user, which are sent by the vehicle, wherein the legal encrypted data of the target user is obtained by irreversibly encrypting the registered biological information of the target user.
31. A vehicle is characterized by comprising a biological information acquisition component, a communication component, a processing component and a vehicle lock;
the biological information acquisition component is used for acquiring biological information of a target user;
the processing component is used for carrying out irreversible encryption on the biological information of the target user to obtain target encryption data;
the communication component is used for sending the target encrypted data to a server under the control of the processing component and receiving an unlocking instruction; the target encrypted data is used for the server to send the unlocking instruction to the vehicle under the condition that legal encrypted data matched with the target encrypted data is stored, wherein the legal encrypted data is obtained by irreversibly encrypting biological information of a legal user;
and the processing component is used for controlling the unlocking of the vehicle lock under the condition that the communication component receives the unlocking instruction.
32. The vehicle of claim 31, further comprising an encryption chip;
the encryption chip is used for carrying out irreversible encryption on the biological information of the target user under the control of the processing component to obtain the target encryption data.
33. A vehicle comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any one of claims 1 to 9 when executing the computer program.
34. A server comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 10 to 15 are implemented by the processor when executing the computer program.
35. A storage medium having a computer program stored thereon, the computer program, when being executed by a processor, realizing the steps of the method of any one of claims 1 to 15.
CN202010488660.4A 2020-06-02 2020-06-02 Vehicle control method, device, vehicle, server and storage medium Pending CN111724509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010488660.4A CN111724509A (en) 2020-06-02 2020-06-02 Vehicle control method, device, vehicle, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010488660.4A CN111724509A (en) 2020-06-02 2020-06-02 Vehicle control method, device, vehicle, server and storage medium

Publications (1)

Publication Number Publication Date
CN111724509A true CN111724509A (en) 2020-09-29

Family

ID=72565705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010488660.4A Pending CN111724509A (en) 2020-06-02 2020-06-02 Vehicle control method, device, vehicle, server and storage medium

Country Status (1)

Country Link
CN (1) CN111724509A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777115A (en) * 2009-11-25 2010-07-14 中国科学院自动化研究所 Safe fingerprint verification method and system
CN107248305A (en) * 2017-01-22 2017-10-13 上海量明科技发展有限公司 Air navigation aid, system and the client of the shared vehicles
CN107358696A (en) * 2017-07-11 2017-11-17 上海与德科技有限公司 A kind of unlocking method of shared bicycle
CN107481369A (en) * 2017-08-11 2017-12-15 京东方科技集团股份有限公司 A kind of shared vehicles and its unblock locking method, authentication method
CN109376686A (en) * 2018-11-14 2019-02-22 睿云联(厦门)网络通讯技术有限公司 A kind of various dimensions human face data acquisition scheme, acquisition system and acquisition method
CN109840973A (en) * 2019-01-14 2019-06-04 上海钧正网络科技有限公司 A kind of shared bicycle auto-unlocking method and control system based on recognition of face
US20200007338A1 (en) * 2019-08-12 2020-01-02 Lg Electronics Inc. System and method for recognition of biometric information in shared vehicle
CN111161478A (en) * 2020-01-07 2020-05-15 上海钧正网络科技有限公司 Method and device for switching shared vehicles, equipment and medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777115A (en) * 2009-11-25 2010-07-14 中国科学院自动化研究所 Safe fingerprint verification method and system
CN107248305A (en) * 2017-01-22 2017-10-13 上海量明科技发展有限公司 Air navigation aid, system and the client of the shared vehicles
CN107358696A (en) * 2017-07-11 2017-11-17 上海与德科技有限公司 A kind of unlocking method of shared bicycle
CN107481369A (en) * 2017-08-11 2017-12-15 京东方科技集团股份有限公司 A kind of shared vehicles and its unblock locking method, authentication method
CN109376686A (en) * 2018-11-14 2019-02-22 睿云联(厦门)网络通讯技术有限公司 A kind of various dimensions human face data acquisition scheme, acquisition system and acquisition method
CN109840973A (en) * 2019-01-14 2019-06-04 上海钧正网络科技有限公司 A kind of shared bicycle auto-unlocking method and control system based on recognition of face
US20200007338A1 (en) * 2019-08-12 2020-01-02 Lg Electronics Inc. System and method for recognition of biometric information in shared vehicle
CN111161478A (en) * 2020-01-07 2020-05-15 上海钧正网络科技有限公司 Method and device for switching shared vehicles, equipment and medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《信息安全与工程》: "《信息安全与工程》", 30 September 2010, 西安电子科技大学出版社 *
李文,杨方,崔嘉: "《网络安全技术及应用》", 31 March 2017, 吉林大学出版社 *
杨露菁,吉文阳: "《智能图像处理及应用》", 31 March 2019, 中国铁路出版社 *

Similar Documents

Publication Publication Date Title
US11663460B2 (en) Data exchange method, data exchange device and computing device
CN109255444B (en) Federal modeling method and device based on transfer learning and readable storage medium
JP3222165U (en) System to realize universal distributed solution for user authentication by mutual authentication configuration
AU2010282394B2 (en) An intelligent peripheral device and system for the authentication and verification of individuals and/ or documents through a secure multifunctional authentication service with data storage capability
CA2636453C (en) Multisystem biometric token
CN113114700B (en) Method and equipment for processing identity recognition, business processing and biological characteristic information
US11044244B2 (en) Authenticating devices via one or more pseudorandom sequences and one or more tokens
US7930556B2 (en) Fingerprint system and method for access control
US11616776B2 (en) Authority management method and computing device utilizing method
CA3194491A1 (en) Biometric-based identity authentication
TW202024975A (en) Information processing method and device, electronic equipment and computer readable storage medium
CN106487758B (en) data security signature method, service terminal and private key backup server
CN109643473A (en) A kind of method, apparatus and system of identity legitimacy verifying
WO2018010480A1 (en) Network locking method for esim card, terminal, and network locking authentication server
US20050091544A1 (en) Controlling an application provided on a portable object
CN113240836A (en) Bluetooth lock connection method adopting two-dimensional code and related configuration system
CN112995896A (en) Vehicle parking control method and device, vehicle, server, parking peg and system
CN114510178A (en) Shared data distribution method and electronic equipment
CN111724509A (en) Vehicle control method, device, vehicle, server and storage medium
CN116108412A (en) Face identity authentication method, device, equipment, storage medium and program product
KR102117871B1 (en) A method and system for simple authentication through distributed storage of public key and private key elements
CN111726320B (en) Data processing method, device and equipment
US20220182394A1 (en) System and device for ensuring the authentication and integrity of genomic data based on block-chain technology
CN116502260A (en) Biological data storage method, identification method, device, equipment and medium
KR20160042286A (en) System and Method for Processing Authentication by Using Transforming Authentication Code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200929

RJ01 Rejection of invention patent application after publication