CN112150719A - Vehicle management method, device, electronic equipment and storage medium - Google Patents

Vehicle management method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112150719A
CN112150719A CN202011025829.9A CN202011025829A CN112150719A CN 112150719 A CN112150719 A CN 112150719A CN 202011025829 A CN202011025829 A CN 202011025829A CN 112150719 A CN112150719 A CN 112150719A
Authority
CN
China
Prior art keywords
vehicle
request
generating
application program
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011025829.9A
Other languages
Chinese (zh)
Inventor
韩梦雯
范兴龙
阴荣生
杨志伟
陈明星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qisheng Technology Co Ltd
Original Assignee
Beijing Qisheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qisheng Technology Co Ltd filed Critical Beijing Qisheng Technology Co Ltd
Priority to CN202011025829.9A priority Critical patent/CN112150719A/en
Publication of CN112150719A publication Critical patent/CN112150719A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0042Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
    • G07F17/0057Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects for the hiring or rent of vehicles, e.g. cars, bicycles or wheelchairs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

A vehicle management method, apparatus, electronic device, and storage medium are disclosed. The method comprises the steps of reading a vehicle identification of a target vehicle through Near Field Communication (NFC), generating an operation request through an application program of vehicle management, and sending the operation request to a server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.

Description

Vehicle management method, device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of vehicle technologies, and in particular, to a vehicle management method and apparatus, an electronic device, and a storage medium.
Background
At present, the shared vehicle trip becomes a emerging trip mode in a city, and the trip demand of urban people can be effectively solved. The existing shared vehicles include bicycles, electric motorcycles, electric automobiles and the like.
For various shared vehicles, the existing main unlocking mode is unlocking by scanning a two-dimensional code, a user scans the two-dimensional code on a vehicle body by using a mobile phone, then a vehicle identifier is sent to a server through a network by using the mobile phone, and the server controls unlocking of the vehicle.
However, the two-dimensional code is easily covered or damaged by people intentionally, so that a user cannot scan the two-dimensional code for a vehicle, meanwhile, the user needs to place the mobile phone at a position suitable for the two-dimensional code when the two-dimensional code is scanned, and if the mobile phone is too far away from the two-dimensional code, too close to the two-dimensional code, too large inclination angle of the mobile phone, dark light and the like, the user can be caused to fail in scanning the two-dimensional code, so that the user is inconvenient to.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a vehicle management method, a vehicle management apparatus, an electronic device, and a storage medium, which are convenient for a user to use a vehicle and improve the work efficiency of operation and maintenance staff.
In a first aspect, an embodiment of the present invention provides a vehicle management method, where the method includes:
reading tag information of a target vehicle through Near Field Communication (NFC), wherein the tag information comprises a vehicle identification;
generating, by an application, an operation request, the operation request including the vehicle identification; and
and sending the operation request to a server.
In a second aspect, an embodiment of the present invention provides a vehicle management apparatus, including:
a reading unit configured to read tag information of a target vehicle through near field communication NFC, the tag information including a vehicle identification;
a generation unit configured to generate an operation request including the vehicle identifier by an application; and
and the sending unit is used for sending the operation request to a server.
In a third aspect, an embodiment of the present invention provides an electronic device, including a memory and a processor, where the memory is used to store one or more computer program instructions, where the one or more computer program instructions are executed by the processor to implement the method according to the first aspect.
In a fourth aspect, embodiments of the present invention provide a computer-readable storage medium on which computer program instructions are stored, which when executed by a processor implement the method according to the first aspect.
According to the technical scheme of the embodiment of the invention, the vehicle identification of the target vehicle is read through Near Field Communication (NFC), the operation request is generated through an application program of vehicle management, and the operation request is sent to the server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent from the following description of the embodiments of the present invention with reference to the accompanying drawings, in which:
FIG. 1 is a schematic diagram of a shared vehicle system of an embodiment of the present invention;
FIG. 2 is a schematic diagram of a shared vehicle system of an embodiment of the present invention;
FIG. 3 is a schematic view of a split lock for a vehicle according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a near field communication configuration according to an embodiment of the present invention;
FIG. 5 is a flow chart of a vehicle management method of an embodiment of the present invention;
FIG. 6 is a flowchart of the user borrowing a car according to the first embodiment of the present invention;
FIG. 7 is a flowchart of a user borrowing a vehicle according to a second embodiment of the present invention;
FIG. 8 is a flowchart of the user returning the car according to the first embodiment of the present invention;
FIG. 9 is a flow chart of a user returning a car according to a second embodiment of the present invention;
FIG. 10 is a flow chart of a user returning a car according to an embodiment of the present invention;
FIG. 11 is a flow chart of an operation and maintenance management vehicle according to an embodiment of the present invention;
FIG. 12 is a schematic view of a vehicle management apparatus of an embodiment of the invention;
fig. 13 is a schematic diagram of an electronic device of an embodiment of the invention.
Detailed Description
The present invention will be described below based on examples, but the present invention is not limited to only these examples. In the following detailed description of the present invention, certain specific details are set forth. It will be apparent to one skilled in the art that the present invention may be practiced without these specific details. Well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention.
Further, those of ordinary skill in the art will appreciate that the drawings provided herein are for illustrative purposes and are not necessarily drawn to scale.
Unless the context clearly requires otherwise, throughout the description, the words "comprise", "comprising", and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is, what is meant is "including, but not limited to".
In the description of the present invention, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present invention, "a plurality" means two or more unless otherwise specified.
Fig. 1 and 2 are schematic diagrams of a shared vehicle system according to an embodiment of the present invention. Fig. 1 is a schematic diagram of a shared vehicle based on a borrower, and fig. 2 is a schematic diagram of a shared vehicle based on an operation and maintenance person.
As shown in fig. 1, the shared bicycle system of the embodiment of the present invention includes at least one server 1, at least one vehicle, and at least one user terminal. The embodiment of the present invention is explained by taking an example in which the control system includes one server 1, three vehicles 2a to 2c, and three user terminals 3a to 3 c.
In an alternative implementation manner, as shown in fig. 1, for a vehicle borrowing user, each user terminal can only borrow one vehicle at the same time, and cannot simultaneously borrow a plurality of vehicles, so as to facilitate the management and operation of the vehicles.
In another optional implementation manner, for a vehicle borrowing user, each user terminal can borrow a plurality of vehicles (for example, two or three vehicles and the like) at the same time, so that when a plurality of people go together, the plurality of vehicles can be borrowed by using only one terminal, and a person who does not install a specific application program can ride the vehicle, thereby facilitating the use of the vehicle by the user.
As shown in fig. 2, the shared bicycle system of the embodiment of the present invention includes at least one server 1, at least one vehicle, and at least one user terminal. The embodiment of the present invention is explained taking as an example that the control system includes one server 1, four vehicles 2a-2d, and one user terminal 3.
Further, as shown in fig. 2, for the operation and maintenance personnel, each user terminal may control a plurality of vehicles at the same time, so as to facilitate the management and operation of the operation and maintenance personnel on the vehicles.
In this embodiment, the server 1 may be an independent server or a server cluster.
Further, the server 1 is a shared vehicle platform.
In the present embodiment, the vehicle is a shared vehicle, and can communicate with the server 1 in a wireless manner.
Further, the vehicle may be a bicycle, an electric bicycle, a tricycle, a motorcycle, or the like.
In this embodiment, the user terminal is a terminal device used by a vehicle borrower or an operation and maintenance person.
Further, the user terminal may be a mobile phone, a tablet computer, or other special-purpose device, and the embodiment of the present invention is described by taking a mobile phone as an example.
Further, fig. 3 is a schematic circuit structure diagram of a vehicle according to an embodiment of the present invention. As shown in fig. 3, the vehicle of the embodiment of the invention includes a control part a and a lock B. The control component A is used for communicating with the user terminal and the server and controlling unlocking and locking of the lockset B.
Further, when the vehicle is a shared bicycle, the control part A and the lock B are respectively installed at different positions of the vehicle to form a split lock and are connected in a wired or wireless mode.
Preferably, the control part a is installed under the seat.
Further, when the vehicle is a shared electric vehicle, the control component a is a vehicle central control. Preferably, the control part a is mounted on the handlebar.
It should be understood that the above is only one example of the present invention, and the installation positions of the control component a and the lock B are not limited in the embodiments of the present invention, and may be determined according to a specific application scenario. For example, the vehicle of the embodiment of the present invention may also employ an integral lock, i.e., the control part a and the lock B are installed at the same position of the vehicle.
Further, the control part a includes a processor 21, a memory 22, and an NFC (Near Field Communication) module 23.
In the present embodiment, the memory 22 is used to store one or more computer program instructions that are executed by the processor 21 to implement the vehicle management method of the present embodiment.
Further, the Processor may be implemented by an MCU (micro Controller Unit), a PLC (Programmable Logic Controller), an FPGA (Field-Programmable Gate Array), a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), or the like.
In the present embodiment, the NFC module 23 is configured to perform near field communication with the user terminal.
Specifically, NFC is developed by combining a Radio Frequency Identification (RFID) technology with a wireless interconnection technology, and is a short-range high-Frequency Radio technology. The NFC operation mode is divided into a passive mode and an active mode.
In the passive mode, the NFC initiator (also referred to as a master) requires a power supply device, and the master provides a radio frequency field using the power of the power supply device and transmits data to the NFC target (also referred to as a slave). The slave device does not generate a radio frequency field, so that a power supply device is not needed, the radio frequency field generated by the master device is converted into electric energy, the circuits of the slave device are powered, data sent by the master device are received, and the data of the slave device are transmitted back to the master device at the same speed by using a load modulation technology. The slave device in this operating mode is called passive mode because it does not generate a radio frequency field, but passively receives a radio frequency field generated by the master device, in which mode the NFC master device can detect a contactless card or an NFC target device and establish a connection therewith.
In the active mode, both the initiator device and the target device must actively generate the radio frequency field when transmitting data to each other, so they are called active modes, which require the power supply device to provide the energy for generating the radio frequency field. This communication mode is a standard mode of peer-to-peer network communication, and a very fast connection rate can be obtained.
Further, fig. 4 is a schematic structural diagram of near field communication according to an embodiment of the present invention. As shown in fig. 4, the user terminal is close to or attached to the NFC region, so that the near field communication between the user terminal and the vehicle NFC module can be completed.
In an optional implementation manner, the NFC module of the vehicle and the user terminal of the embodiment of the present invention may adopt a passive mode when performing wireless communication. Specifically, in the passive mode, the user terminal is a master device, and the vehicle NFC module is a slave device. The NFC near field wireless communication technology utilizes mutual coupling of inductors, and the basic principle is equivalent to a transformer. User terminal and vehicle NFC module all have an inductance coil respectively, when being close to corresponding NFC module with user terminal, the inductive coupling coil in the user terminal has acted as the effect of transformer primary on the one hand, for the NFC module power supply of vehicle, the inductance coil of the NFC module of vehicle is equivalent to the secondary coil of transformer this moment, on the other hand, the chip of the NFC module of vehicle modulates the information of its inside storage on the coil of the NFC module of vehicle, thereby its modulation principle is the impedance of regular change coil and regular load that changes inductance primary, user terminal changes the law through the impedance that detects its inside inductance coil, alright read out the information in the NFC module of vehicle.
In another alternative implementation manner, the NFC module of the vehicle according to the embodiment of the present invention and the user terminal may also adopt an active mode when performing wireless communication. Specifically, in the active mode, the NFC modules of the user terminal and the vehicle have a power supply. The chip in the NFC module of the vehicle modulates the information stored in the chip on the coil of the NFC module of the vehicle, and the user terminal can read the information in the NFC module of the vehicle by detecting the impedance change rule of the inductance coil in the user terminal.
Therefore, near field communication between the user terminal and the NFC module of the vehicle can be achieved, and then the user terminal can acquire the tag information of the NFC module of the vehicle.
Further, the tag information includes a vehicle identification. Specifically, each vehicle has a corresponding unique identification.
Further, the tag information includes a resource locator (URL), which is a representation method for specifying an information location, for specifying at least one application.
Preferably, the tag information further includes other information of the vehicle, for example, the tag information includes a vehicle state indicating that the vehicle is in an idle state, a reserved state, a service state, and the like. For another example, the tag information may further include electric quantity information, preferably, the electric quantity is displayed in a percentage manner, further, the electric quantity information is battery information, and in the case that the vehicle is an electric vehicle, the electric quantity information may further include electric quantity information of a battery of the electric vehicle. Therefore, the user can determine whether to continue using the vehicle according to the acquired electric quantity condition. Specifically, the tag information may be set according to an actual application scenario, which is not limited in this embodiment of the present invention.
Further, the control section a further includes a close range communication module 24 for close range communication with the user terminal.
Preferably, the short-range communication module 24 is a bluetooth module, and is configured to communicate with the user terminal in a bluetooth manner. In particular, bluetooth is a small-range wireless connection technology, and can realize convenient, fast, flexible, safe, low-cost and low-power-consumption data communication among devices.
Further, the near field communication module 24 may be triggered to establish a connection with the user terminal through a code scanning of the user terminal or an NFC module, and the triggering mode may use various existing technologies, which is not limited in the embodiment of the present invention.
Thereby, the short-distance communication between the user terminal and the vehicle is realized.
Further, the control section a further includes a remote communication module 25 for remote wireless communication with the server.
Specifically, the long-distance communication module 25 may be a GSM (Global System for Mobile Communications) module, a GPRS (General packet radio service) module, an eMTC (enhanced machine communication) module, an NB-IoT (Narrow Band Internet of Things) module, or the like.
Thus, the server and the vehicle can communicate remotely.
Further, the control component a further includes a positioning module (not shown in the figure) for acquiring the position information of the vehicle.
Specifically, the method for acquiring the position information of the vehicle may adopt one or more combinations of various existing technologies, such as GPS (Global Positioning System) Positioning, WIFI (wireless internet access) Positioning, base station Positioning, satellite Positioning, and the like.
Preferably, the control component a further comprises a state detection module (not shown in the figure), and the user acquires the state information of the vehicle.
Further, the state detection module may be one or more of a gravity sensor, a wheel motion sensor, or the like.
Specifically, the gravity Sensor is a G-Sensor, also called an acceleration Sensor, which is a Sensor capable of measuring acceleration. The damper is generally composed of a mass block, a damper, an elastic element, a sensitive element, an adjusting circuit and the like. In the acceleration process, the sensor obtains an acceleration value by measuring the inertial force borne by the mass block and utilizing Newton's second law. The wheel motion sensor can be realized by a Hall sensor, a light-transmitting speed measuring sensor, a reflecting speed measuring sensor and the like. For the Hall sensor, when the Hall sensor is close to a magnetic conduction object, a magnetic field in the Hall sensor changes, and different Hall electromotive forces are generated due to the Hall effect, so that whether the magnetic conduction object is close to the Hall sensor can be judged. Specifically, the hall sensor can be fixedly installed on the frame, and meanwhile, the magnetic steel is installed on the wheel, and in the rotating process of the wheel, the hall sensor considers that the wheel rotates for one circle every time the magnetic steel is close to the hall sensor, so that the rotating speed of the wheel is calculated. The light-transmitting speed sensor generally comprises a disc with holes or notches, a light source, a photoelectric tube and the like. The disc is fixed on the wheel and rotates together with the wheel, and when the disc rotates, light can only irradiate on the photoelectric tube through the hole or the notch. When the photoelectric tube is irradiated, the reverse resistance of the photoelectric tube is low, and an electric pulse signal is output. When the light source is shielded by the disc, the reverse resistance of the photoelectric tube is large, and no signal is output from the output end. Thus, the wheel speed can be measured according to the number of holes or notches on the disc. The principle of the reflective speed sensor is basically the same as that of the light transmission type, the light change sensed by the photoelectric tube is converted into the electric signal change, but the pulse signal is obtained by the reflection of light, and usually, a reflecting material is adhered to a proper part of a wheel to form a reflecting surface. The commonly used reflecting material is a special speed measuring reflecting paper tape (adhesive tape), can also be replaced by reflecting materials such as aluminum foil and the like, or can also be coated with white paint as a reflecting surface at the measured part. When the measured shaft rotates, the photoelectric element receives the pulsating light and outputs a corresponding electric signal to the electronic counter, so that the rotating speed of the wheel is measured.
Thereby, the state information of the vehicle can be acquired.
In this embodiment, the lock B is an automatic lock, and can be controlled to open or close by an electronic signal, and is controlled by the control signal of the controller 21 to open or close the lock.
Further, the lock B may be implemented by various existing electronic locks, such as an electronic band-type brake lock, an electronic horseshoe lock, and the like.
Fig. 5 is a flowchart of a vehicle management method of an embodiment of the present invention. As shown in fig. 5, the vehicle management method according to the embodiment of the present invention is based on a user terminal, and specifically includes the following steps:
and step S510, reading the label information of the target vehicle through Near Field Communication (NFC).
In this embodiment, the tag information includes a vehicle identification.
Step S520, an operation request is generated by the application.
In this embodiment, the operation request includes the vehicle identification.
Step S530, sending the operation request to a server.
Thus, vehicle management can be realized.
Further, the vehicle management method of the embodiment of the invention can be divided into a plurality of embodiments based on different application scenarios, specifically as follows:
fig. 6 is a flowchart of the user borrowing the vehicle according to the first embodiment of the present invention. In this embodiment, the user terminal of the car borrowing user unlocks in a front-end manner. The method specifically comprises the following steps:
and step S601, starting the application program.
In this embodiment, the user terminal starts the application program in response to receiving an application program starting request input by a user.
Further, the application program may be software or an applet, or the like.
Furthermore, the unlocking in a front-end mode is to unlock the screen and manually start the software or the small program of the user terminal when the user needs to borrow the car.
Further, the user needs to register and log in the account, and the specific implementation manner may adopt various existing methods, which are not described herein again.
And step S602, reading the label information of the target vehicle.
In this embodiment, when a user needs to borrow a vehicle, the user manually starts software or an applet of the user terminal, the user terminal with the NFC function is brought close to a predetermined area of the vehicle, and the user terminal reads tag information of a target vehicle, specifically, reading the tag information of the target vehicle is as described above, and is not described herein again.
Further, the tag information includes a vehicle identification of the target vehicle.
And step S603, generating a first prompt interface.
In this embodiment, after the user terminal reads the tag information of the target vehicle, a first prompt interface is generated.
Step S604, an operation request is generated.
In this embodiment, the user terminal reads tag information of a target vehicle and then generates an operation request.
Further, the operation request includes the vehicle identification.
Specifically, the operation request is an unlocking request.
It should be understood that the steps S603 and S604 do not distinguish the execution order, and may be executed sequentially or executed successively.
Further, the first prompt interface is used for displaying the operation request.
Specifically, the first prompt interface is used for displaying the unlocking operation to the user so as to prompt the user that the operation is performed.
Further, the operation request generated for the user terminal and the first prompt interface may be determined according to a current state of the vehicle.
Correspondingly, the tag information further includes a state of the vehicle. The states include an idle state, a reservation state, a service state, and an execution state.
The idle state indicates that the vehicle can be borrowed at any time, and when the user terminal acquires that the state of the vehicle is the idle state, the generated operation request is a borrowing unlocking request.
The reserved state indicates that the vehicle is reserved. The user can acquire the vehicles within the preset range through the user terminal and select one or more vehicles for reservation, so that the user can reserve the vehicles in advance, the user can timely find the target vehicle according to the positioning of the reserved vehicle, and meanwhile, the situation that the vehicle cannot be lent in time due to improper travel time can be avoided. Meanwhile, the vehicle can be switched into an idle state after the reserved time of the vehicle exceeds the preset reserved time through the preset reserved time, so that the situation that other users cannot borrow the vehicle due to the fact that the time for the user to reserve the vehicle is too long can be avoided, and meanwhile, the utilization rate of the vehicle can be improved. When the user terminal acquires that the state of the vehicle is a reserved state, judging whether the user terminal has a reserved vehicle, if so, judging whether the vehicle identifier of the reserved vehicle is consistent with the vehicle identifier of the target vehicle, and if so, generating an operation request of a borrowing unlocking request. If the user terminal does not reserve the vehicle, or the user terminal has a reserved vehicle and the vehicle identifier of the reserved vehicle is not consistent with the vehicle identifier of the target vehicle, the operation request is not generated, and the generated first prompt interface prompts the user that the vehicle is reserved by other users.
The service status indicates that the vehicle is being used. When the state of the vehicle acquired by the user terminal is the service state, whether the vehicle in use exists in the user terminal is judged, if yes, whether the identifiers of the vehicle in use and the target vehicle are consistent is judged, and if yes, the generated operation request is a lock closing request, which is specifically described in the following embodiments of lock closing, and is not described herein again. If the user terminal does not have a vehicle in use, a first prompt interface is generated to prompt the user that the vehicle is in use by other users.
The execution state indicates that the vehicle is executing an unlocking operation. Specifically, if a plurality of user terminals simultaneously read the tag identifier, the vehicle selects the user terminal binding which reads the tag identifier first, and marks the status as the execution status. When the user terminal acquires that the state of the vehicle is an execution state, a first prompt interface is generated to prompt the user that the vehicle is being unlocked by other users.
It should be understood that, in the above steps S603 to S604, the first prompt interface and the operation request are respectively generated by the user terminal as an example for illustration, but the embodiment of the present invention is not limited to this, and for example, the following manners may also be implemented:
and step S603', generating a second prompt interface.
In this embodiment, after the user terminal reads the tag information of the target vehicle, a second prompt interface is generated, where the second prompt interface includes a second control.
Specifically, the method for generating the second prompt interface may be the method for generating the first prompt interface as described above, except that the first prompt interface is used to show the ongoing operation to the user, and the second prompt interface further includes a second control.
Further, the second control is an unlocking control.
Step S604', an operation request is generated.
In this embodiment, the user terminal generates the operation request in response to detecting that the second control is triggered.
It should be understood that the above steps S603-S604 and steps S603 '-S604' are two different implementations, wherein the implementations of the steps S603-S604 are that the user does not need to click the unlocking control, the user terminal directly generates the unlocking request by borrowing, the implementations of the steps S603 '-S604' are that the user confirms unlocking after clicking the unlocking control, and the user terminal generates the unlocking request by borrowing.
And step S605, sending a borrowing operation request.
In this embodiment, after the user terminal generates the borrowing unlocking request, the borrowing unlocking request is sent to the server.
And step S606, acquiring a key.
In this embodiment, after the user terminal generates a borrowing unlocking request, the borrowing unlocking request is sent to the server, where the borrowing unlocking request includes a vehicle identifier. The server obtains a vehicle identifier after receiving a borrowing unlocking request, and obtains a secret key according to the vehicle identifier, wherein the secret key is used for encrypting data.
Further, the key may be the same as a bluetooth key.
And step S607, generating an encryption operation instruction.
In this embodiment, after obtaining the key, the server generates an operation instruction, and encrypts the operation instruction by using the key to generate an encrypted operation instruction.
Further, the key encryption is an encryption method in which both of transmission and reception of data perform encryption and decryption operations on a plaintext using the same or a symmetric key. The key is typically a string of characters and can be changed as often as necessary to secure network transmissions in an open environment.
And step S608, sending an encryption operation instruction.
In this embodiment, the server sends the encryption operation instruction to the user terminal.
Further, the encryption operation instruction is an unlocking instruction.
And step S609, sending an encryption operation instruction.
In this embodiment, after receiving the encryption operation instruction, the user terminal sends the encryption operation instruction to the target vehicle, and specifically, the user terminal may send the encryption operation instruction to the target vehicle through the NFC module or the near field communication module.
And step S610, sending an encryption operation instruction.
In this embodiment, the server transmits the encryption operation instruction to the target vehicle.
It should be understood that the steps S607 to S608 and S609 do not distinguish the execution order, and may be executed sequentially or executed successively.
And step S611, executing the operation.
In the present embodiment, the target vehicle receives the encrypted operation instruction, and performs the operation.
Further, the encryption operation instruction is an unlocking instruction, and the execution operation is to generate a control signal to control the unlocking of the lockset.
In an optional implementation manner, after receiving the encryption operation instruction sent by the server and the user terminal, the target vehicle performs competition execution, and executes the encryption operation instruction received first.
In another optional implementation manner, after the target vehicle receives the encryption operation instruction sent by the server and the user terminal at the same time, the encryption operation instruction is executed.
And step S612, transmitting the operation result.
In the present embodiment, the target vehicle transmits the operation result to the user terminal.
In an optional implementation manner, the target vehicle executes the encryption operation instruction and sends an operation result to the server, regardless of whether unlocking is successful.
In another optional implementation manner, after detecting that the unlocking is successful, the target vehicle generates an operation result and sends the operation result to the user terminal, wherein the operation result is used for indicating whether the unlocking is successful or not.
Step S613, the operation result is transmitted.
In this embodiment, the user terminal transmits the received operation result to the server.
Therefore, the user can complete the vehicle borrowing through the steps.
Alternatively, the target vehicle may directly transmit the operation result to the server through the remote communication module.
The embodiment of the invention reads the vehicle identification of the target vehicle through near field communication NFC, generates the operation request through the application program of vehicle management, and sends the operation request to the server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.
Fig. 7 is a flowchart of the user borrowing the vehicle according to the second embodiment of the present invention. In this embodiment, the user terminal of the car borrowing user unlocks in a backend manner. The method specifically comprises the following steps:
and step S701, reading the label information of the target vehicle.
In this embodiment, when a user borrows a vehicle, the screen is unlocked, the user terminal with the NFC function is brought close to a predetermined area of the vehicle without manually starting software or an applet of the user terminal, and the user terminal reads tag information of a target vehicle, specifically, reading the tag information of the target vehicle is as described above, and is not described herein again.
Further, the tag information includes a vehicle identifier and a resource locator (URL) of the target vehicle, where the resource locator is a representation method for specifying an information location and is used for specifying at least one application program.
And step S702, starting the application program.
In this embodiment, the user terminal starts the application according to the resource locator.
Further, the application program may be software or an applet, or the like.
Furthermore, the lock is unlocked in a backend mode, when a user borrows a vehicle, the user only needs to unlock the screen, and software or small programs of the user terminal do not need to be manually started.
Further, the user needs to register and log in the account, and the specific implementation manner may adopt various existing methods, which are not described herein again.
And step S703, generating a first prompt interface.
Step S704, an operation request is generated.
And step S703', generating a second prompt interface, wherein the second prompt interface comprises a second control.
Step S704', in response to the second control being triggered, an operation request is generated.
It should be understood that the above steps S703-S704 and steps S703 '-S704' are two different implementations, wherein the implementation of steps S703-S704 is that the user does not need to click the unlocking control, the user terminal directly generates the unlocking request by borrowing, the implementation of steps S703 '-S704' is that the user confirms unlocking after clicking the unlocking control, and the user terminal generates the unlocking request by borrowing again.
And step S705, sending a borrowing operation request.
And step S706, acquiring a key.
Step S707 generates an encryption operation instruction.
And step S708, sending an encryption operation instruction.
And step S709, sending an encryption operation instruction.
And step S710, sending an encryption operation instruction.
Step S711 executes the operation.
And step S712, sending the operation result.
Step S713, the operation result is sent.
The steps S705 to S713 may refer to the steps S605 to S613, which are not described herein.
Therefore, the user can complete the vehicle borrowing through the steps.
The embodiment of the invention reads the vehicle identification of the target vehicle through near field communication NFC, generates the operation request through the application program of vehicle management, and sends the operation request to the server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.
It should be understood that, the foregoing steps S601-S613 unlock the lock for the user foreground, that is, the user needs to unlock the software or application program manually, and then unlock the lock. The above steps S701-S713 are unlocking after the user has unlocked, that is, the user only needs to unlock the screen, and the user terminal automatically starts the software or the application program. In actual use, the mobile phone can be set according to the type of the mobile phone of the user or the preference of the user.
Fig. 8 is a flowchart of the user returning the car according to the first embodiment of the present invention. In this embodiment, the user terminal of the car returning user is locked in a front-end manner. The method specifically comprises the following steps:
and step S801, starting the application program.
In this embodiment, the user terminal starts the application program in response to receiving an application program starting request input by a user.
Further, the application program may be software or an applet, or the like.
Furthermore, the lock is closed in a front-end mode, when the user needs to return the vehicle, the screen is unlocked, and the software or the small program of the user terminal is manually started.
Further, the user needs to register and log in the account, and the specific implementation manner may adopt various existing methods, which are not described herein again.
And step S802, reading the label information of the target vehicle.
In this embodiment, when the user needs to go back, the user manually starts the software or the applet of the user terminal, and brings the user terminal with the NFC function close to the predetermined area of the vehicle, and the user terminal reads the tag information of the target vehicle, specifically, the reading of the tag information of the target vehicle is as described above, and is not described herein again.
Further, the tag information includes a vehicle identification of the target vehicle.
Step S803 acquires the position information of the vehicle.
In the present embodiment, the user terminal acquires the position information of the vehicle.
In an optional implementation manner, the user terminal may obtain the positioning information through a positioning function of the terminal, where the positioning information is used to represent the position information of the target vehicle.
In another optional implementation manner, after detecting the operation of reading the tag of the user terminal, the target vehicle acquires the positioning information through the positioning module, and sends the positioning information to the user terminal through the near field communication module. Thereby, the user terminal acquires the position information of the target vehicle.
In yet another optional implementation manner, after detecting the operation of reading the tag of the user terminal, the target vehicle acquires the positioning information through the positioning module, and sends the positioning information to the server through the remote communication module, and then the server sends the positioning information of the target vehicle to the user terminal. Thus, the user terminal can acquire the position information of the target vehicle.
And step S804, generating a first prompt interface.
In this embodiment, after the user terminal reads the tag information of the target vehicle, a first prompt interface is generated.
Step S805, an operation request is generated.
In this embodiment, the user terminal reads tag information of a target vehicle and then generates an operation request.
Further, the operation request includes the vehicle identification.
Specifically, the operation request is a vehicle returning and locking request.
It should be understood that the steps S804 and S805 do not distinguish the execution order, and may be executed sequentially or executed successively.
Further, the first prompt interface is used for displaying the operation request.
Specifically, the first prompt interface is used for displaying the locking operation to the user so as to prompt the user that the operation is performed.
Further, the operation request generated for the user terminal and the first prompt interface may be determined according to a current state of the vehicle.
Correspondingly, the tag information further includes a state of the vehicle. The states include an idle state, a reservation state, a service state, and an execution state, as described above.
Wherein the service status indicates that the vehicle is being used. When the state of the vehicle acquired by the user terminal is the service state, judging whether the user terminal has the vehicle in use, if so, judging whether the identifier of the vehicle in use is consistent with that of the target vehicle, and if so, generating an operation request as a locking request.
It should be understood that, in the above steps S804 to S805, the first prompt interface and the operation request generated by the user terminal are taken as an example for illustration, but the embodiment of the present invention is not limited to this, and for example, the following manners may also be implemented:
and step S804', generating a second prompt interface.
In this embodiment, after the user terminal reads the tag information of the target vehicle, a second prompt interface is generated, where the second prompt interface includes a second control.
Specifically, the method for generating the second prompt interface may be the method for generating the first prompt interface as described above, except that the first prompt interface is used to show the ongoing operation to the user, and the second prompt interface further includes a second control.
Further, the second control is a lock closing control.
Step S805', an operation request is generated.
In this embodiment, the user terminal generates the operation request in response to detecting that the second control is triggered.
It should be understood that the above steps S804-S805 and steps S804 '-S805' are two different implementations, where the implementations of the steps S804-S805 are that the user does not need to click the lock closing control, the user terminal directly generates the lock closing request by the vehicle, and the implementations of the steps S804 '-S805' are that the user confirms the lock closing after clicking the lock closing control, and the user terminal generates the lock returning request.
And step S806, sending an operation request.
In this embodiment, after the user terminal generates the car-returning lock-closing request, the car-returning lock-closing request is sent to the server.
Step S807, a key is acquired.
And step S808, generating an encryption operation instruction.
And step S809, sending an encryption operation instruction.
And step S810, sending an encryption operation instruction.
And step S811, sending an encryption operation instruction.
Step S812, an operation is performed.
In the present embodiment, the target vehicle receives the encrypted operation instruction, and performs the operation.
Further, the encryption operation instruction is a lock closing instruction, and the execution operation is to generate a control signal to control the lock to be closed.
Step S813, the operation result is sent.
And step S814, sending the operation result.
The above steps S808-S814 can refer to the steps S606-S613, except that the steps S606-S613 are the borrowing unlocking process, and the steps S808-S814 are the returning locking process.
The embodiment of the invention reads the vehicle identification of the target vehicle through near field communication NFC, generates the operation request through the application program of vehicle management, and sends the operation request to the server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.
Fig. 9 is a flowchart of the user returning the car according to the second embodiment of the present invention. The embodiment is that the user terminal of the car returning user is locked in a rear-end mode. The method specifically comprises the following steps:
step S901 reads tag information of the target vehicle.
In this embodiment, when the user needs to go back, the screen is unlocked, the user terminal with the NFC function is brought close to the predetermined area of the vehicle without manually starting software or an applet of the user terminal, and the user terminal reads the tag information of the target vehicle, specifically, the reading of the tag information of the target vehicle is as described above, and is not described herein again.
Further, the tag information includes a vehicle identification and a resource locator of the target vehicle.
And step S902, starting the application program.
In this embodiment, the user terminal starts the application according to the resource locator.
Further, the application program may be software or an applet, or the like.
Furthermore, the lock is closed in a rear-end mode, when a user needs to return the vehicle, the user only needs to unlock the screen to enable the mobile phone to be close to the preset position of the vehicle, and software or small programs of the user terminal do not need to be manually started.
Further, the user needs to register and log in the account, and the specific implementation manner may adopt various existing methods, which are not described herein again.
And step S903, acquiring the position information of the vehicle.
And step S904, generating a first prompt interface.
Step S905 generates an operation request.
And step S904', generating a second prompt interface, wherein the second prompt interface comprises a second control.
Step S905', in response to detecting that the second control is triggered, an operation request is generated.
And step S906, sending an operation request.
And step S907, acquiring a key.
Step S908, an encryption operation instruction is generated.
Step S909, send the encryption operation instruction.
And step S910, sending an encryption operation instruction.
And step S911, sending an encryption operation instruction.
And step S912, executing operation.
Step S913, the operation result is sent.
And step S914, sending the operation result.
The steps S903 to S914 can refer to the steps S803 to S814, and are not described herein again.
The embodiment of the invention reads the vehicle identification of the target vehicle through near field communication NFC, generates the operation request through the application program of vehicle management, and sends the operation request to the server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.
Further, in step S803 or S903, after the user terminal acquires the location information of the target vehicle, a method of generating an operation request based on the location information is as shown in fig. 10, and includes the following steps:
step S1001, the tag information is read.
In this embodiment, when the user arrives at a destination and needs to return to the destination, the user terminal is brought close to a predetermined area of the target vehicle, and tag information of the target vehicle is read.
Specifically, the method of reading the tag information of the target vehicle may refer to steps S801 to S802 or steps S901 to S902.
Step S1002, position information of the target vehicle is acquired.
In the present embodiment, the user terminal acquires the position information of the vehicle.
In an optional implementation manner, the user terminal may obtain the positioning information through a positioning function of the terminal, where the positioning information is used to represent the position information of the target vehicle.
In another optional implementation manner, after detecting the operation of reading the tag of the user terminal, the target vehicle acquires the positioning information through the positioning module, and sends the positioning information to the user terminal through the near field communication module. Thereby, the user terminal acquires the position information of the target vehicle.
In yet another optional implementation manner, after detecting the operation of reading the tag of the user terminal, the target vehicle acquires the positioning information through the positioning module, and sends the positioning information to the server through the remote communication module, and then the server sends the positioning information of the target vehicle to the user terminal. Thus, the user terminal can acquire the position information of the target vehicle.
Step S1003 determines whether the target vehicle is in the parking area.
In the present embodiment, the user terminal acquires a predetermined parking area in advance. The predetermined parking area may be a roadside, a centralized management area, or other places, etc. The user terminal determines whether the target vehicle is within the parking area.
And step S1004, generating a vehicle returning locking request.
In this embodiment, the user terminal determines whether the target vehicle is in the parking area according to the detected position information, and generates a lock-off request through the application program in response to detecting that the parking position information is in the parking area.
And step S1005, sending the locking request.
In this embodiment, the user terminal sends the lock closing request to the server.
And step S1006, generating a fourth prompt interface.
In this embodiment, the user terminal determines whether the target vehicle is in the parking area according to the detected position information, and generates the fourth prompt interface through the application program in response to detecting that the parking position information is not in the parking area, where the fourth prompt interface is used to prompt the user that the current vehicle is not in the parking area.
Further, the fourth prompt interface includes a fourth control, and the fourth control is a continuous car returning control.
And step 1007, detecting whether the fourth control is triggered.
In this embodiment, the user terminal detects whether the fourth control is triggered.
Further, in response to detecting that the fourth control is triggered, indicating that the user needs to return to the car immediately, the method proceeds to steps S1004-S1005.
Further, for vehicles not returning in the parking area, the server may charge the user an additional management fee according to a preset.
And step S1008, parking spot navigation.
In this embodiment, the user terminal detects that the fourth control is not triggered, and generates the parking spot navigation through the application program, so that the user can find the parking area in time.
Therefore, the vehicle utilization of the user can be standardized, and the operation and maintenance management is convenient.
The embodiment of the invention reads the vehicle identification of the target vehicle through near field communication NFC, generates the operation request through the application program of vehicle management, and sends the operation request to the server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.
FIG. 11 is a flow chart of an operation and maintenance management vehicle according to an embodiment of the present invention. As shown in fig. 11, the operation and maintenance management vehicle according to the embodiment of the present invention includes the following steps:
and step S1101, starting the application program.
In this embodiment, the user terminal starts the application program in response to receiving an application program starting request input by a user.
Further, the application program may be software or an applet, or the like.
Further, the user needs to register and log in the account, and the specific implementation manner may adopt various existing methods, which are not described herein again, and it should be understood that the user in this embodiment is an operation and maintenance person.
And step S1102, generating a third prompt interface.
In this embodiment, after the operation and maintenance personnel open the application program, the management module in the application program is started, and a third prompt interface is generated.
Further, the third prompt interface includes a third control, and the third control is a batch unlocking control or a batch locking control.
Optionally, there are two third controls, one third control is a batch unlocking control, and the other third control is a batch locking control.
Step S1103, the batch management process is entered.
In this embodiment, the operation and maintenance personnel select the batch unlocking control or the batch locking control according to the requirement and click to enter the batch management process.
And step S1104, reading tag information of the target vehicle.
In this embodiment, the operation and maintenance person brings the user terminal with the NFC function close to the predetermined area of the vehicle, and the user terminal reads the tag information of the target vehicle, specifically, the tag information of the target vehicle is read as described above, which is not described herein again.
Further, the tag information includes a vehicle identification of the target vehicle.
Step S1105 generates an operation request.
In this embodiment, the user terminal reads tag information of a target vehicle and then generates an operation request.
Further, the operation request includes the vehicle identification.
Specifically, the operation request is a batch unlocking request or a batch locking request.
Step S1106, an operation request is sent.
In this embodiment, after the user terminal generates the operation request, the operation request is sent to the server.
Step S1107, a key is acquired.
In this embodiment, after the user terminal generates an operation request, the operation request is sent to the server, where the operation request includes the vehicle identifier. And after receiving the operation request, the server acquires a vehicle identifier, acquires a key according to the vehicle identifier, and encrypts data by using the key.
Further, the key may be the same as a bluetooth key.
Step S1108 generates an encryption operation instruction.
In this embodiment, after obtaining the key, the server generates an operation instruction, and encrypts the operation instruction by using the key to generate an encrypted operation instruction.
Further, the key encryption is an encryption method in which both of transmission and reception of data perform encryption and decryption operations on a plaintext using the same or a symmetric key. The key is typically a string of characters and can be changed as often as necessary to secure network transmissions in an open environment.
And step S1109, sending an encryption operation instruction.
In this embodiment, the server sends the encryption operation instruction to the user terminal.
Step S1110, an encryption operation instruction is sent.
In this embodiment, after receiving the encryption operation instruction, the user terminal sends the encryption operation instruction to the target vehicle, and specifically, the user terminal may send the encryption operation instruction to the target vehicle through the NFC module or the near field communication module.
And step S1111, sending an encryption operation instruction.
In this embodiment, the server transmits the encryption operation instruction to the target vehicle.
It should be understood that the steps S1109-S1110 and S1111 do not distinguish the execution order, and may be executed sequentially or executed successively.
Step S1112, an operation is performed.
In the present embodiment, the target vehicle receives the encrypted operation instruction, and performs the operation.
Further, the encryption operation instruction is an unlocking instruction, and the execution operation is to generate a control signal to control the unlocking of the lockset.
In an optional implementation manner, after receiving the encryption operation instruction sent by the server and the user terminal, the target vehicle performs competition execution, and executes the encryption operation instruction received first, so that the target vehicle can respond quickly.
In another optional implementation manner, after the target vehicle receives the encryption operation instruction sent by the server and the user terminal at the same time, the encryption operation instruction is executed.
And S1113, sending the operation result.
In the present embodiment, the target vehicle transmits the operation result to the user terminal.
In an optional implementation manner, the target vehicle sends the operation result to the server after executing the encryption operation instruction, and whether the operation is successful or not is not considered.
In another optional implementation manner, after detecting that the operation is successful, the target vehicle generates an operation result and sends the operation result to the user terminal, wherein the operation result is used for indicating whether the operation is successful or not.
Step S1114, sending the operation result.
In this embodiment, the user terminal transmits the received operation result to the server.
Therefore, the user can perform batch management through the steps.
Alternatively, the target vehicle may directly transmit the operation result to the server through the remote communication module.
Therefore, the operation and maintenance personnel can unlock or lock the vehicle only by enabling the user terminal to be close to the preset area of the vehicle, so that the vehicle can be rapidly managed without scanning the two-dimensional codes one by one.
The embodiment of the invention reads the vehicle identification of the target vehicle through near field communication NFC, generates the operation request through the application program of vehicle management, and sends the operation request to the server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.
It should be understood that the above embodiments are all processing methods in the case that the vehicle and the user terminal can establish a connection with the server, but in some special scenarios (e.g. poor signal), neither the vehicle nor the user terminal may be able to establish a connection with the server, and at this time, the user may perform the lock on/off by other means, as described below:
when the user terminal cannot establish connection with the server and the vehicle can establish connection with the server, the following operations can be implemented: after the user terminal obtains the label information of the target vehicle, when the situation that networking cannot be achieved is detected, a fifth prompt interface is generated through an application program, the fifth prompt interface comprises a fifth control, the fifth control is a network-free operation control, and the operation is unlocking or locking. Specifically, the method for generating the fifth prompt interface through the application program may be implemented by the method described in any one of the embodiments in fig. 5 to fig. 10, and details are not repeated here. And clicking the fifth control by the user to perform the wireless operation. When the user terminal detects that the fifth control is triggered, an operation request is generated and sent to the vehicle through the near-field communication module, and then the vehicle sends the operation request to the server through the far-field communication module, wherein the operation request comprises a user identifier, a timestamp and the like, and the user identifier can be a user terminal identifier, a user account or other identity information and the like. The server generates an encryption operation instruction and sends the encryption operation instruction to the vehicle, and the vehicle executes operation after receiving the encryption operation instruction. Optionally, the server generates billing information according to the user identifier and the timestamp, and sends the billing information to the user terminal when the user terminal can be networked, so that the user can use the vehicle without a network.
When the user terminal can establish connection with the server and the vehicle cannot establish connection with the server, the operation mode may be as shown in any one of the embodiments of fig. 6 to 11, except that the server cannot directly send the encryption operation instruction to the vehicle.
When neither the user terminal nor the vehicle is able to establish a connection with the server, the following operations may be implemented: after the user terminal obtains the label information of the target vehicle, when the situation that networking cannot be achieved is detected, a fifth prompt interface is generated through an application program, the fifth prompt interface comprises a fifth control, the fifth control is a network-free operation control, and the operation is unlocking or locking. Specifically, the method for generating the fifth prompt interface through the application program may be implemented by the method described in any one of fig. 6 to 11, and details are not repeated here. And clicking the fifth control by the user to perform the wireless operation. And when the user terminal detects that the fifth control is triggered, generating an operation request. When the vehicle detects that the connection with the server cannot be established, determining whether to execute the operation according to the operation request and the current state of the vehicle, when the vehicle state meets the execution condition, generating an operation instruction and executing the operation instruction, and simultaneously recording operation information by the vehicle, wherein the operation information comprises a user identifier, a time stamp and the like, and the user identifier can be a user terminal identifier, a user account or other identity information and the like. And when the vehicle detects that networking is available, the operation information is sent to the server. And after receiving the operation information, the server generates bill information and sends the bill information to the user terminal if the current user finishes using the vehicle.
Therefore, the method can realize the wireless operation and provide convenience for the user to use the vehicle.
Fig. 12 is a schematic diagram of a vehicle management apparatus according to an embodiment of the present invention, which includes, as shown in fig. 12, a reading unit 121, a generating unit 122, and a transmitting unit 123. The reading unit 12 is configured to read tag information of a target vehicle through near field communication NFC, where the tag information includes a vehicle identifier. The generating unit 122 is configured to generate an operation request through an application, where the operation request includes the vehicle identifier. The sending unit 123 is configured to send the operation request to the server.
Preferably, the operation request comprises a borrowing unlocking request and a returning locking request.
Preferably, the tag information further includes a resource locator for specifying at least one application.
Preferably, the generating unit includes:
an application opening subunit, configured to open an application; and
and the operation request generation subunit is used for generating the operation request through the application program.
Preferably, the application program opening subunit is configured to open the application program according to the resource locator.
Preferably, the apparatus further comprises:
and the starting request receiving subunit is used for responding to the received application program starting request input by the user and starting the application program.
Preferably, the operation request generating subunit is configured to generate the operation request and a first prompt interface through the application program, where the first prompt interface is configured to display the operation request.
Preferably, the operation request generation subunit includes:
the second prompt interface generating module is used for generating a second prompt interface according to the resource locator through the application program, and the second prompt interface comprises a second control; and
and the second control trigger detection module is used for responding to the detection that the second control is triggered and generating the operation request.
Preferably, the operation requests comprise batch unlocking requests and batch locking requests.
Preferably, the apparatus further comprises:
the starting unit is used for responding to an application program starting request input by a user and starting an application program;
a third prompt interface generating unit, configured to generate a third prompt interface through the application program, where the third prompt interface includes a third control, and the third control is a batch unlocking control or a batch locking control; and
and the third control element triggering detection unit is used for responding to the detection that the third control element is triggered and entering a batch unlocking flow or a batch locking flow.
Preferably, the apparatus further comprises:
the instruction receiving unit is used for receiving an encryption operation instruction sent by the server; and
and the instruction sending unit is used for sending the encryption operation instruction to the target vehicle.
Preferably, the apparatus further comprises:
a result receiving unit for receiving an operation result transmitted by the target vehicle; and
and the result sending unit is used for sending the operation result to the server.
Preferably, in response to the operation request being a vehicle-returning lock request, the apparatus further includes:
a position acquisition unit for acquiring parking position information of a target vehicle;
the generating unit is used for responding to the detection that the parking position information is in the parking area and generating a locking request through an application program.
Preferably, the apparatus further comprises:
the fourth prompt interface generating unit is used for responding to the fact that the parking position information is not in the parking area, and generating a fourth prompt interface through an application program, wherein the fourth prompt interface comprises a fourth control;
and the fourth control triggering detection unit is used for responding to the detection that the fourth control is triggered and generating the vehicle returning locking request.
The embodiment of the invention reads the vehicle identification of the target vehicle through near field communication NFC, generates the operation request through the application program of vehicle management, and sends the operation request to the server. Therefore, the vehicle can be managed through the electronic equipment with the NFC function, a vehicle renting user can conveniently use the vehicle, and the working efficiency of operation and maintenance personnel is improved.
Fig. 13 is a schematic diagram of an electronic device of an embodiment of the invention. The electronic device shown in fig. 13 is a general-purpose data processing apparatus comprising a general-purpose computer hardware structure including at least a processor 131 and a memory 132. The processor 131 and the memory 132 are connected by a bus 133. The memory 132 is adapted to store instructions or programs executable by the processor 131. The processor 131 may be a stand-alone microprocessor or a collection of one or more microprocessors. Thus, processor 131 implements the processing of data and the control of other devices by executing instructions stored by memory 132 to perform the method flows of embodiments of the present invention as described above. The bus 133 connects the above components together, as well as to the display controller 124 and the display device and input/output (I/O) device 135. Input/output (I/O) devices 135 may be a mouse, keyboard, modem, network interface, touch input device, motion sensing input device, printer, and other devices known in the art. Typically, the input/output devices 135 are coupled to the system through input/output (I/O) controllers 136.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus (device) or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations of methods, apparatus (devices) and computer program products according to embodiments of the application. It will be understood that each flow in the flow diagrams can be implemented by computer program instructions.
These computer program instructions may be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows.
These computer program instructions may also be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (30)

1. A vehicle management method, characterized in that the method comprises:
reading tag information of a target vehicle through Near Field Communication (NFC), wherein the tag information comprises a vehicle identification;
generating, by an application, an operation request, the operation request including the vehicle identification; and
and sending the operation request to a server.
2. The method of claim 1, wherein the operation requests include a borrow unlock request and a return lock close request.
3. The method of claim 2, wherein the tag information further comprises a resource locator, the resource locator specifying at least one application.
4. The method of claim 3, wherein generating, by the application, the operation request comprises:
opening an application program; and
generating, by the application, the operation request.
5. The method according to claim 4, wherein the starting of the application is specifically:
and starting the application program according to the resource locator.
6. The method of claim 4, wherein prior to the obtaining vehicle information of a target vehicle, the method further comprises:
and in response to receiving an application program starting request input by a user, starting the application program.
7. The method according to claim 4, wherein the generating of the operation request by the application program is specifically:
and generating the operation request and a first prompt interface through the application program, wherein the first prompt interface is used for displaying the operation request.
8. The method of claim 4, wherein the generating, by an application, the operation request comprises:
generating a second prompt interface according to the resource locator through the application program, wherein the second prompt interface comprises a second control; and
generating the operation request in response to detecting that the second control is triggered.
9. The method of claim 1, wherein the operation requests comprise batch unlock requests and batch lock close requests.
10. The method of claim 9, wherein prior to the obtaining vehicle information of a target vehicle, the method further comprises:
in response to receiving an application program starting request input by a user, starting an application program;
generating a third prompt interface through the application program, wherein the third prompt interface comprises a third control, and the third control is a batch unlocking control or a batch locking control; and
and entering a batch unlocking flow or a batch locking flow in response to detecting that the third control element is triggered.
11. The method of claim 1, further comprising:
receiving an encryption operation instruction sent by a server; and
and sending the encryption operation instruction to the target vehicle.
12. The method of claim 1, further comprising:
receiving an operation result sent by the target vehicle; and
and sending the operation result to the server.
13. The method of claim 2, wherein in response to the operation request being an off-lock request, prior to the generating, by the application, the operation request, the method further comprises:
acquiring parking position information of a target vehicle;
the generating of the operation request by the application program specifically includes:
generating, by an application, a lock-off request in response to detecting that the parking location information is within a parking area.
14. The method of claim 13, further comprising:
generating a fourth prompt interface through an application program in response to detecting that the parking position information is not in the parking area, wherein the fourth prompt interface comprises a fourth control;
generating the vehicle returning lock request in response to detecting that the fourth control is triggered.
15. A vehicle management apparatus, characterized in that the apparatus comprises:
a reading unit configured to read tag information of a target vehicle through near field communication NFC, the tag information including a vehicle identification;
a generation unit configured to generate an operation request including the vehicle identifier by an application; and
and the sending unit is used for sending the operation request to a server.
16. The apparatus of claim 15, wherein the operation request comprises a borrow unlock request and a return lock close request.
17. The apparatus of claim 16, wherein the tag information further comprises a resource locator, the resource locator specifying at least one application.
18. The apparatus of claim 17, wherein the generating unit comprises:
an application opening subunit, configured to open an application; and
and the operation request generation subunit is used for generating the operation request through the application program.
19. The apparatus of claim 18, wherein the application opening subunit is configured to open the application according to the resource locator.
20. The apparatus of claim 18, further comprising:
and the starting request receiving subunit is used for responding to the received application program starting request input by the user and starting the application program.
21. The apparatus according to claim 18, wherein the operation request generation subunit is configured to generate, by the application program, the operation request and a first prompt interface, and the first prompt interface is configured to present the operation request.
22. The apparatus of claim 18, wherein the operation request generation subunit comprises:
the second prompt interface generating module is used for generating a second prompt interface according to the resource locator through the application program, and the second prompt interface comprises a second control; and
and the second control trigger detection module is used for responding to the detection that the second control is triggered and generating the operation request.
23. The apparatus of claim 15, wherein the operation requests comprise batch unlock requests and batch lock close requests.
24. The apparatus of claim 23, further comprising:
the starting unit is used for responding to an application program starting request input by a user and starting an application program;
a third prompt interface generating unit, configured to generate a third prompt interface through the application program, where the third prompt interface includes a third control, and the third control is a batch unlocking control or a batch locking control; and
and the third control element triggering detection unit is used for responding to the detection that the third control element is triggered and entering a batch unlocking flow or a batch locking flow.
25. The apparatus of claim 15, further comprising:
the instruction receiving unit is used for receiving an encryption operation instruction sent by the server; and
and the instruction sending unit is used for sending the encryption operation instruction to the target vehicle.
26. The apparatus of claim 15, further comprising:
a result receiving unit for receiving an operation result transmitted by the target vehicle; and
and the result sending unit is used for sending the operation result to the server.
27. The apparatus of claim 16, wherein in response to the operation request being a return car off lock request, the apparatus further comprises:
a position acquisition unit for acquiring parking position information of a target vehicle;
the generating unit is used for responding to the detection that the parking position information is in the parking area and generating a locking request through an application program.
28. The apparatus of claim 27, further comprising:
the fourth prompt interface generating unit is used for responding to the fact that the parking position information is not in the parking area, and generating a fourth prompt interface through an application program, wherein the fourth prompt interface comprises a fourth control;
and the fourth control triggering detection unit is used for responding to the detection that the fourth control is triggered and generating the vehicle returning locking request.
29. An electronic device comprising a memory and a processor, wherein the memory is configured to store one or more computer program instructions, wherein the one or more computer program instructions are executed by the processor to implement the method of any of claims 1-14.
30. A computer-readable storage medium on which computer program instructions are stored, which, when executed by a processor, implement the method of any one of claims 1-14.
CN202011025829.9A 2020-09-25 2020-09-25 Vehicle management method, device, electronic equipment and storage medium Pending CN112150719A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011025829.9A CN112150719A (en) 2020-09-25 2020-09-25 Vehicle management method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011025829.9A CN112150719A (en) 2020-09-25 2020-09-25 Vehicle management method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112150719A true CN112150719A (en) 2020-12-29

Family

ID=73897374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011025829.9A Pending CN112150719A (en) 2020-09-25 2020-09-25 Vehicle management method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112150719A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114419790A (en) * 2021-12-31 2022-04-29 武汉小安科技有限公司 Operation and maintenance method and system for shared electric bicycle
TWI784856B (en) * 2022-01-03 2022-11-21 郭朝誠 Management system for rental vehicle
CN115471928A (en) * 2021-05-24 2022-12-13 北京骑胜科技有限公司 Information interaction method and device, server, vehicle and user terminal

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101261631A (en) * 2008-02-27 2008-09-10 陈军辉 Technology for accessing website by electronic label and feeding back corresponding information timely
CN105023365A (en) * 2015-07-31 2015-11-04 华南理工大学 NFC-based public bike management system and method
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106779968A (en) * 2016-12-30 2017-05-31 上海挚极信息科技有限公司 A kind of support 4G networks rent the method and system returned the car
CN107093320A (en) * 2017-03-13 2017-08-25 曾庆义 A kind of parking guide method and device
CN107195117A (en) * 2017-06-29 2017-09-22 西安培华学院 A kind of shared bicycle is returned the car Verification System and method
CN107481364A (en) * 2017-08-04 2017-12-15 深圳欧米智能科技有限公司 A kind of communication means and electronic lock for controlling shared electronic lock for bicycle
CN107895417A (en) * 2017-11-20 2018-04-10 东峡大通(北京)管理咨询有限公司 Vehicle shuts management method, vehicle and server
CN108133161A (en) * 2017-12-25 2018-06-08 横琴国际知识产权交易中心有限公司 A kind of mobile terminal reads the method and system of data information
CN108280912A (en) * 2018-02-07 2018-07-13 天津安中通讯电子有限公司 A kind of shared bicycle smart lock and its application method using fiscard unlocking
CN108416931A (en) * 2018-01-30 2018-08-17 浙江齐享科技有限公司 The system and method for returning the car of Moped Scooter is shared in a kind of no stake
CN108961583A (en) * 2018-06-15 2018-12-07 杭州后博科技有限公司 A kind of shared bicycle based on account authentication borrows returning method and system
CN109636537A (en) * 2018-12-19 2019-04-16 睿驰达新能源汽车科技(北京)有限公司 A kind of returning method and device and pick-up method and device
CN110103886A (en) * 2019-04-22 2019-08-09 无锡天脉聚源传媒科技有限公司 A kind of mobile device-based Car's door controlling method and system
CN111031523A (en) * 2019-12-16 2020-04-17 安徽信息工程学院 Shared bicycle control system and method based on NFC technology
CN111402456A (en) * 2018-12-29 2020-07-10 北京骑胜科技有限公司 Unlocking method and device
CN111402455A (en) * 2018-12-29 2020-07-10 北京骑胜科技有限公司 Unlocking method and device
CN111462361A (en) * 2020-04-08 2020-07-28 上海钧正网络科技有限公司 Parking management system, method, apparatus, computer device and storage medium
CN111507116A (en) * 2019-01-31 2020-08-07 北京骑胜科技有限公司 Code scanning method and device, code scanning equipment and computer readable storage medium

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101261631A (en) * 2008-02-27 2008-09-10 陈军辉 Technology for accessing website by electronic label and feeding back corresponding information timely
CN105023365A (en) * 2015-07-31 2015-11-04 华南理工大学 NFC-based public bike management system and method
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106779968A (en) * 2016-12-30 2017-05-31 上海挚极信息科技有限公司 A kind of support 4G networks rent the method and system returned the car
CN107093320A (en) * 2017-03-13 2017-08-25 曾庆义 A kind of parking guide method and device
CN107195117A (en) * 2017-06-29 2017-09-22 西安培华学院 A kind of shared bicycle is returned the car Verification System and method
CN107481364A (en) * 2017-08-04 2017-12-15 深圳欧米智能科技有限公司 A kind of communication means and electronic lock for controlling shared electronic lock for bicycle
CN107895417A (en) * 2017-11-20 2018-04-10 东峡大通(北京)管理咨询有限公司 Vehicle shuts management method, vehicle and server
CN108133161A (en) * 2017-12-25 2018-06-08 横琴国际知识产权交易中心有限公司 A kind of mobile terminal reads the method and system of data information
CN108416931A (en) * 2018-01-30 2018-08-17 浙江齐享科技有限公司 The system and method for returning the car of Moped Scooter is shared in a kind of no stake
CN108280912A (en) * 2018-02-07 2018-07-13 天津安中通讯电子有限公司 A kind of shared bicycle smart lock and its application method using fiscard unlocking
CN108961583A (en) * 2018-06-15 2018-12-07 杭州后博科技有限公司 A kind of shared bicycle based on account authentication borrows returning method and system
CN109636537A (en) * 2018-12-19 2019-04-16 睿驰达新能源汽车科技(北京)有限公司 A kind of returning method and device and pick-up method and device
CN111402456A (en) * 2018-12-29 2020-07-10 北京骑胜科技有限公司 Unlocking method and device
CN111402455A (en) * 2018-12-29 2020-07-10 北京骑胜科技有限公司 Unlocking method and device
CN111507116A (en) * 2019-01-31 2020-08-07 北京骑胜科技有限公司 Code scanning method and device, code scanning equipment and computer readable storage medium
CN110103886A (en) * 2019-04-22 2019-08-09 无锡天脉聚源传媒科技有限公司 A kind of mobile device-based Car's door controlling method and system
CN111031523A (en) * 2019-12-16 2020-04-17 安徽信息工程学院 Shared bicycle control system and method based on NFC technology
CN111462361A (en) * 2020-04-08 2020-07-28 上海钧正网络科技有限公司 Parking management system, method, apparatus, computer device and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115471928A (en) * 2021-05-24 2022-12-13 北京骑胜科技有限公司 Information interaction method and device, server, vehicle and user terminal
CN114419790A (en) * 2021-12-31 2022-04-29 武汉小安科技有限公司 Operation and maintenance method and system for shared electric bicycle
TWI784856B (en) * 2022-01-03 2022-11-21 郭朝誠 Management system for rental vehicle

Similar Documents

Publication Publication Date Title
CN112150719A (en) Vehicle management method, device, electronic equipment and storage medium
JP5978414B1 (en) Online rental system and online rental method
JP5997858B1 (en) Vehicle rental system and vehicle rental management method
KR102511176B1 (en) Vehicle access control services and platform
CN107027096A (en) The tele-control system of vehicle
CN110024361A (en) Method and system for integrated management travel condition of vehicle
JP6186531B1 (en) Parking lot management system
JP2012160016A (en) Vehicle management system, vehicle management server, vehicle management method, program and storage medium
KR20200012403A (en) Electrically-powered vehicle, method and application for electrically-powered vehicle rental
CN107086331A (en) A kind of electric vehicle management system, electric car, electronic vehicle main body and cell apparatus
JP6140354B1 (en) Object identification system and parking lot management system
US20200204995A1 (en) System for operating a refuse container and method for operating a refuse container
KR20100020871A (en) Bicycle lent control system
JP6755522B2 (en) Vehicle rental system and vehicle rental management method
JP2017182762A (en) On-line rental system, and on-line rental method
TWI672682B (en) Community shared parking system
JP6550578B2 (en) Rental target management method
CN113643481B (en) Detection method, lockset, vehicle and storage medium
JP6502607B1 (en) Parking lot management system
JP2019169179A (en) Object management method
CN107021153A (en) Electric bicycle method for managing security, apparatus and system
JP6887669B2 (en) Object identification systems, programs and recording media
KR101333588B1 (en) Toll payment system using mobile device
JP6482152B2 (en) Object identification method and parking lot management method
JP6383845B2 (en) Object identification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201229

RJ01 Rejection of invention patent application after publication