CN112584309A - Car locking method, server, system, storage medium and computer equipment - Google Patents

Car locking method, server, system, storage medium and computer equipment Download PDF

Info

Publication number
CN112584309A
CN112584309A CN202011460315.6A CN202011460315A CN112584309A CN 112584309 A CN112584309 A CN 112584309A CN 202011460315 A CN202011460315 A CN 202011460315A CN 112584309 A CN112584309 A CN 112584309A
Authority
CN
China
Prior art keywords
vehicle
user
charging
target vehicle
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011460315.6A
Other languages
Chinese (zh)
Other versions
CN112584309B (en
Inventor
戴震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Anji Zhidian Holding Co Ltd
Original Assignee
Chezhubang Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chezhubang Beijing Technology Co Ltd filed Critical Chezhubang Beijing Technology Co Ltd
Priority to CN202311301777.7A priority Critical patent/CN117596543A/en
Priority to CN202311298289.5A priority patent/CN117714975A/en
Priority to CN202011460315.6A priority patent/CN112584309B/en
Publication of CN112584309A publication Critical patent/CN112584309A/en
Application granted granted Critical
Publication of CN112584309B publication Critical patent/CN112584309B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/30Constructional details of charging stations
    • B60L53/31Charging columns specially adapted for electric vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/7072Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/12Remote or cooperative charging

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Mechanical Engineering (AREA)
  • Power Engineering (AREA)
  • Transportation (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
  • Lock And Its Accessories (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

The invention provides a vehicle locking method, a server, a system, a storage medium and computer equipment, wherein the method comprises the following steps: the method comprises the steps of obtaining a vehicle locking authorization authority sent by a user, and sending a vehicle locking instruction to a charging pile according to the vehicle locking authorization authority so that the charging pile locks a target vehicle in a state of being connected with the target vehicle; even if the vehicle is stolen by the illegal user, the vehicle owner can lock the vehicle through the charging pile, so that the illegal user cannot continue to use the vehicle, loss can be timely stopped, and the legal rights and interests of normal users are ensured.

Description

Car locking method, server, system, storage medium and computer equipment
Technical Field
The invention belongs to the technical field of electric automobile safety protection, and particularly relates to a vehicle locking method, a server, a system, a storage medium and computer equipment.
Background
With the development of the technology level and the social progress, many types of new energy vehicles have appeared on the market, wherein, for example, pure electric vehicles, hybrid vehicles and the like show a well-injection development trend.
The anti-theft performance becomes a more concerned problem for users, and how to timely stop the loss after the automobile is stolen is a serious concern for users. In the prior art, if a user finds that a vehicle is stolen, a monitoring video is called to give an alarm, and the stolen vehicle can be found out possibly in a long time, so that the rights and interests of the user are seriously damaged.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides a vehicle locking method, a server, a system, a storage medium and computer equipment, which are used for solving the technical problem that the rights and interests of a user are seriously damaged because the user cannot stop loss in time after the user finds that the vehicle is stolen in the prior art.
In a first aspect of the present invention, a method for locking a vehicle is provided, the method comprising:
obtaining a vehicle locking authorization authority sent by a user;
and sending a vehicle locking instruction to a charging pile according to the vehicle locking authorization authority so that the charging pile locks the target vehicle in a state of being connected with the target vehicle.
Optionally, the obtaining of the car locking authorization authority sent by the user includes:
acquiring a state of charge value of the target vehicle;
judging whether the state of charge value is lower than a preset charging threshold value or not;
if the state of charge value is lower than the charging threshold value, pushing low-power prompt information to a user,
and receiving the vehicle locking authorization authority returned by the user based on the low-power prompt message.
Optionally, the obtaining of the car locking authorization authority sent by the user includes:
when the target vehicle is connected with a charging pile to be charged, generating charging request information and pushing the charging request information to a user;
and receiving the vehicle locking authorization authority returned by the user based on the charging request information.
Optionally, the obtaining of the car locking authorization authority sent by the user includes:
when the vehicle is charged, generating a charging order and pushing the charging order to a user;
and receiving the vehicle locking authorization authority returned by the user based on the charging order.
Optionally, the obtaining of the car locking authorization authority sent by the user includes:
acquiring position information of the target vehicle;
judging whether the deviation between the position information and the historical driving track exceeds a preset deviation threshold value or not;
if so, pushing the position information of the target vehicle to the user;
and receiving the vehicle locking authorization authority returned by the user based on the position information.
Optionally, after the target vehicle is locked by the charging pile, the method further includes:
obtaining a location query request sent by the user, the location query request including a license plate number, a vehicle identification code, or a vehicle battery number of the target vehicle;
sending the position query request to the vehicle cloud platform;
and receiving the current position information of the target vehicle sent by the vehicle cloud platform, and sending the current position information to the user.
Optionally, the sending a car locking instruction to the charging pile to lock the target vehicle in a state that the charging pile is connected with the target vehicle includes:
obtaining a charging device number used by the target vehicle;
and issuing the locking instruction to the charging pile corresponding to the charging equipment number so that the charging pile locks the target vehicle connected with the charging pile according to the locking instruction.
In a second aspect of the present invention, there is provided a server, comprising:
the acquisition unit is used for acquiring the vehicle locking authorization authority sent by the user;
and the locking unit is used for sending a vehicle locking instruction to the charging pile according to the vehicle locking authorization authority so that the charging pile locks the target vehicle in a state of being connected with the target vehicle.
In a third aspect of the present invention, a vehicle locking system is provided, the system comprising: a charging pile and a server;
the server is configured to: obtaining a vehicle locking authorization authority sent by a user, and sending a vehicle locking instruction to a charging pile according to the vehicle locking authorization authority;
the charging pile is used for: and locking the target vehicle according to the vehicle locking instruction under the state that the target vehicle is connected with the target vehicle.
In a fourth aspect of the invention, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of the first aspects.
In a fifth aspect of the invention, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of the first aspects when executing the program.
The invention provides a vehicle locking method, a server, a system, a storage medium and computer equipment, which can acquire a vehicle locking authorization authority sent by a user under the condition that a target vehicle is determined to be stolen, and send a vehicle locking instruction to a charging pile according to the vehicle locking authorization authority so that the charging pile locks the target vehicle in a state of being connected with the target vehicle; even if the illegal user steals the target vehicle, the user can lock the target vehicle through the charging pile, so that the illegal user can not continue to use the vehicle, further loss can be timely stopped, and the legal rights and interests of normal users are ensured.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a schematic structural diagram of a car locking system according to a first embodiment of the present invention;
fig. 2 is a schematic flow chart of a vehicle locking method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a server in the car locking system according to the third embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a computer device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a computer storage medium according to an embodiment of the present invention.
Detailed Description
In order to solve the technical problem that in the prior art, after a user finds that a vehicle is stolen, the loss cannot be stopped in time, so that the user rights and interests are seriously damaged, the invention provides a vehicle locking method, a server, a system, a storage medium and computer equipment.
In order to better understand the technical solutions, the technical solutions of the embodiments of the present specification are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features of the embodiments and embodiments of the present specification are detailed descriptions of the technical solutions of the embodiments of the present specification, and are not limitations of the technical solutions of the present specification, and the technical features of the embodiments and embodiments of the present specification may be combined with each other without conflict.
Example one
This embodiment provides a lock car system, as shown in fig. 1, lock car system includes: a server 1 and a charging pile 2;
the server 1 is used for: obtaining a vehicle locking authorization authority sent by a user, and sending a vehicle locking instruction to the charging pile 2 according to the vehicle locking authorization authority;
fill electric pile 2 and be used for: and locking the target vehicle 3 according to the vehicle locking instruction under the state that the vehicle is connected with the target vehicle 3.
Here, the system may further include: and the vehicle cloud platform 4 is used for sending the information related to the target vehicle 3 to the server 1, so that the server 1 can judge whether to push the target vehicle 3 to the user dynamically based on the information, and further receive the vehicle locking authorization authority returned by the user.
Specifically, the Vehicle cloud platform 4 may be a Vehicle networking platform (Internet of Vehicle). The vehicle cloud platform 4 can acquire position information of each vehicle, charging parameter information of the vehicle, an SOC state of charge value, vehicle characteristic information, and the like, and can further analyze vehicle information of each vehicle.
The server 1 can be understood as a cloud server which assembles a plurality of pile cloud platforms of different manufacturers; therefore, charging station position information of different manufacturers and information of the charging piles 2 in each charging station are gathered in the server 1.
The user may register information through the user side APP in advance, and then the server 1 may receive the registration information of the user, where the registration information may include: user name, account information, identity information, biometric information, and vehicle characteristic information. In order to ensure the reliability of charging, the charging is generally authenticated by real name, and then the user name may be a user name; the identity information is used for identifying the uniqueness of the user, for example, the identity information can be an identity card number; the account is used for paying charging fee; the biological characteristic information can be at least one of fingerprint information, iris information and voiceprint information; the vehicle characteristic information may be: license plate number, vehicle identification number VIN code, vehicle color, vehicle type, etc.
After the user registration is completed, the server 1 may receive the instruction of the user and execute a corresponding action. Such as: server 1 can receive the charging instruction that the user sent, for the vehicle that needs to charge distributes the charging station and fills electric pile 2 information to with charging station and fill electric pile 2 information routing to the user side APP that server 1 corresponds, with can the suggestion user go corresponding position and charge for the vehicle. For another example: the server 1 may also be used to authenticate the vehicle and the user to which the vehicle belongs before charging. In addition: the server 1 can also receive a vehicle locking authorization permission sent by the user, and sends a vehicle locking instruction to the charging pile 2 according to the vehicle locking authorization permission, so that the charging pile 2 locks the target vehicle 3 in a state of being connected with the target vehicle 3.
It should be noted that the server 1 obtains the vehicle locking authorization authority sent by the user, and sends a vehicle locking instruction to the charging pile 2 according to the vehicle locking authorization authority, so that the specific implementation process of the charging pile 2 for locking the target vehicle 3 in the state of being connected with the target vehicle 3 and the specific implementation process of the user authentication will be described in detail in the following embodiments related to the server 1 side, and therefore details are not described herein again.
The car locking system provided by the embodiment can acquire the car locking authorization authority sent by the user, and when the target vehicle 3 is determined to be in a connection state with the charging pile 2, a car locking instruction is sent to the charging pile 2 according to the car locking authorization authority, so that the charging pile 2 locks the target vehicle 3 in the connection state with the target vehicle 3; even if the illegal user steals the vehicle, the user can lock the vehicle in the state that the target vehicle 3 is connected with the charging pile 2, so that the illegal user cannot continue to use the vehicle, loss can be timely stopped, and the legal rights and interests of normal users are ensured.
Example two
Based on the same inventive concept as the embodiment, the embodiment provides a car locking method applied to the server 1, as shown in fig. 2, the method includes the following steps:
s210, obtaining a vehicle locking authorization authority sent by a user;
and S211, sending a vehicle locking instruction to the charging pile 2 according to the vehicle locking authorization authority so that the charging pile 2 locks the target vehicle 3 in a state of being connected with the target vehicle 3.
In this embodiment, in one case, when the user finds that the vehicle is stolen, the user-side APP may be used to actively send the vehicle-locking authorization right to the server 1.
In another case, when the user does not find that his vehicle is stolen, the server 1 may obtain the vehicle locking authorization authority sent by the user in the following ways.
As an alternative embodiment, obtaining the car-locking authorization authority sent by the user includes:
acquiring a state of charge value of the target vehicle 3;
judging whether the state of charge value is lower than a preset charging threshold value or not;
if the charge state value is lower than the charge threshold value, pushing low-battery prompting information to the user,
and receiving the vehicle locking authorization authority returned by the user based on the low-power prompt message.
Here, since the vehicle-mounted terminal on the target vehicle 3 performs data interaction with the vehicle cloud platform 4, the state of charge value of the target vehicle 3 may be acquired from the vehicle cloud platform 4. The state of charge value of the target vehicle 3 may be obtained by other means, and is not limited herein.
When the server 1 needs to acquire the state of charge value of the target vehicle 3, a first acquisition request may be sent to the vehicle cloud platform 4 to obtain the state of charge value of the target vehicle 3 sent by the vehicle cloud platform 4. The first obtaining request carries a license plate number, a Vehicle Identification Number (VIN) code or a vehicle battery number of the target vehicle 3; the first acquisition request also includes a state of charge value identifier, such as SOC, to indicate that the first acquisition request is for acquiring the state of charge value of the target vehicle 3.
Specifically, for example, the license plate number is carried in the first acquisition request, when the vehicle cloud platform 4 receives the first acquisition request, the vehicle-mounted terminal associated with the license plate number may be found based on the license plate number and the request for acquiring the state of charge value may be issued to the corresponding vehicle-mounted terminal, and after the vehicle-mounted terminal receives the request, the state of charge value of the target vehicle 3 may be sent to the vehicle cloud platform 4. After the vehicle cloud platform 4 obtains the state of charge value, the state of charge value of the target vehicle 3 is sent to the server 1, and when the server 1 determines that the state of charge value is lower than a preset charging threshold value, it is determined that low-power prompt information needs to be pushed to a user.
For example, the preset charging threshold may be set to 15%, and if the state of charge value is lower than 15%, it is determined that a low battery prompt message needs to be pushed to the user, and the low battery message is accompanied with a message asking the user whether the target vehicle 3 needs to be locked, for example: and providing an information column of 'whether the vehicle needs to be locked', and giving the option to the user.
After the user sees the low-power prompt message, if the user feels that the low-power prompt message is not normal (for example, the vehicle has been charged for a long time), further verification may be performed, for example, the vehicle is not stored, and is not borrowed by friends and relatives, and at this time, the user selects "yes" in the information field of "whether to lock the vehicle", and then the server 1 may obtain the authorization right to lock the vehicle.
In another embodiment, if the low power reminding function is not set, obtaining the vehicle locking authorization authority sent by the user includes:
when the target vehicle 3 is connected with the charging pile 2 to be charged, generating charging request information and pushing the charging request information to a user;
and receiving the vehicle locking authorization authority returned by the user based on the charging request information.
Because the electric quantity of the target vehicle 3 cannot be always in a saturated state, once the target vehicle 3 needs to be charged, when an illegal user connects the charging gun 5 to the charging port of the target vehicle 3 to charge the target vehicle 3, at this time, the server 1 sends a charging request message to the user to let the user confirm whether charging can be started or not. For example, the charging request information may be: information on whether or not the charging gun 5 is connected to start charging. At this time, if the user confirms that the vehicle is not lent and there is no possibility of normal charging, it can be determined that the vehicle is stolen, and at this time, the user returns the vehicle locking authorization permission based on the charging request information, so that the server 1 can acquire the vehicle locking authorization permission.
In addition, after the target vehicle 3 is charged, obtaining the vehicle locking authorization authority sent by the user includes:
when the target vehicle 3 is charged, generating a charging order and pushing the charging order to a user;
and receiving the vehicle locking authorization authority returned by the user based on the charging order.
For example, after the charging is completed, the charging order may be pushed to the APP side of the user. After the normal user receives the charging order, if it is determined that the vehicle is not lent at the moment, the possibility of normal charging does not exist, and at the moment, the user sends the vehicle locking authorization permission through the APP at the user side based on the charging order.
In an embodiment in this specification, the obtaining of the car locking authorization authority sent by the user according to the location information may further include:
acquiring position information of the target vehicle 3;
judging whether the deviation between the position information and the historical driving track exceeds a preset deviation threshold value or not;
if yes, pushing the position information of the target vehicle 3 to the user;
and receiving the vehicle locking authorization authority returned by the user based on the position information.
The server 1 may transmit a second acquisition request to the vehicle cloud platform 4 to obtain the position information of the target vehicle 3 transmitted by the vehicle cloud platform 4. The second acquisition request carries the license plate number, the Vehicle Identification Number (VIN) code or the vehicle battery number of the target vehicle 3; the second acquisition request further includes a location identifier, such as a location, to indicate that the second acquisition request is for acquiring the location information of the target vehicle 3.
Specifically, for example, the license plate number is carried in the second acquisition request, when the vehicle cloud platform 4 receives the second acquisition request, the vehicle associated with the license plate number may be found based on the license plate number and the request for acquiring the position information may be issued to the corresponding vehicle terminal, and after the vehicle terminal receives the request, the position information of the target vehicle 3 may be sent to the vehicle cloud platform 4. The vehicle cloud platform 4 acquires the position information and feeds the position information back to the server 1, and when the server 1 determines that the deviation between the position information and the historical driving track exceeds a preset deviation threshold value, the position information needs to be pushed to a user.
For example, assuming that the deviation threshold is 50km, if it is determined that the deviation of the position information from the nearest point in the historical driving track exceeds 50km, it is determined that the position information needs to be pushed to the user.
After the user receives the location information and verifies the location information (for example, it is determined that the vehicle is not lent at this time, and there is no possibility of going out), it may be determined that the vehicle is stolen, and at this time, the user returns the vehicle locking authorization to the server 1 based on the location information.
In the embodiment of the present specification, the user sends the vehicle locking authorization authority to the server 1, and after the server 1 receives the vehicle locking authorization authority, in order to stop loss in time, the server 1 may send a vehicle locking instruction to the charging pile 2 based on the vehicle locking authorization authority, so that the charging pile 2 locks the target vehicle 3 in a state of being connected to the target vehicle 3.
As an alternative embodiment, sending a vehicle locking instruction to the charging pile 2 to lock the target vehicle 3 in a state where the charging pile 2 is connected to the target vehicle 3 includes:
obtaining a charging device number used by the target vehicle 3; the number of the charging equipment can comprise the number of a charging pile 2 and the number of a charging gun 5;
and issuing the locking instruction to the charging pile 2 corresponding to the charging equipment number so that the charging pile 2 locks the target vehicle 3 connected with the charging pile according to the locking instruction, and locking the charging gun 5 in a charging port of the target vehicle 3. Thus, even if the vehicle is fully charged, an abnormal user cannot drive the vehicle away.
In the embodiment of the present specification, after the target vehicle 3 is locked, the current position of the target vehicle 3 may also be queried, so that the target vehicle 3 can be located.
As an alternative embodiment, after the target vehicle 3 is locked by the charging pile 2, the method further includes:
obtaining a position query request sent by a user, wherein the position query request carries a license plate number, a vehicle identification code or a vehicle battery number of a target vehicle 3;
sending the position query request to the vehicle cloud platform 4, so that the vehicle cloud platform 4 can obtain the current position information of the target vehicle 3 based on the position query request;
and receiving the current position information of the target vehicle 3 sent by the vehicle cloud platform 4, and pushing the current position information of the target vehicle 3 to a user.
The implementation process of the vehicle cloud platform 4 obtaining the current location information of the target vehicle 3 based on the location query request is completely the same as the implementation process of the vehicle cloud platform 4 obtaining the location information of the vehicle based on the second obtaining request, and is not repeated herein.
After receiving the current position information, the user can find the stolen vehicle as soon as possible no matter whether the user gives an alarm or carries out self-processing.
Further, in order to prevent the user from operating by mistake and triggering the locking operation, before charging pile 2 locks target vehicle 3 in the state of being connected with target vehicle 3, the method further includes:
obtaining current biometric information of the user to which the target vehicle 3 belongs, which is transmitted by the charging device; and performing authentication according to the current biological characteristic information to obtain an authentication result aiming at the user to which the target vehicle 3 belongs.
Specifically, before charging the target vehicle 3, the user needs to perform a gun insertion operation to insert the charging gun 5 of the charging apparatus into the charging port of the target vehicle 3. If a face image identification area, a fingerprint identification area, a voiceprint identification area and an iris identification area are arranged at the gun head, when a user performs gun inserting operation, the charging gun 5 can immediately acquire face image information, fingerprint information, voiceprint information and iris information of the user, send the face image information, the fingerprint information, the voiceprint information and the iris information of the user to the charging pile 2, and the charging pile 2 sends the face image information, the fingerprint information, the voiceprint information and the iris information to the server 1. The server 1 can perform authentication according to the acquired information.
As an alternative embodiment, the authenticating according to the current biometric information to obtain the authentication result for the user to which the target vehicle 3 belongs includes:
matching the current biological characteristic information with the biological characteristic information in the registration information;
and judging whether the current biological characteristic information can be successfully matched with the biological characteristic information in the registration information, if so, obtaining a first authentication result aiming at the user to which the target vehicle 3 belongs, wherein the first authentication result is successful in authentication.
Here, if the biometric information to be authenticated includes 2 types, the authentication result is determined to be successful only if both the two types of biometric information are successfully matched. And if one piece of biological characteristic information cannot be successfully matched, determining that the authentication result is authentication failure.
And the authentication is realized based on the biological characteristic information of the user. Because the face image, the fingerprint, the voiceprint and the iris are all unique, the authentication precision can be ensured.
After the authentication result is obtained, if the authentication result is authentication failure, it indicates that the normal user has no misoperation, and the charging pile 2 can execute the locking instruction.
If the authentication result is that the authentication is successful, the user is indicated to possibly perform misoperation. Even if the authentication result is successful, the possibility that the biometric information is stolen is not excluded, so the server 1 needs to push query information to the user again, the query information can be 'whether misoperation is performed', if not, the user can click 'no', and at this time, even if the authentication is successful, the charging pile 2 can execute a car locking instruction.
In this way, in the embodiment, under the condition that the target vehicle 3 is determined to be stolen, the vehicle locking authorization authority sent by the user can be obtained, and a vehicle locking instruction is sent to the charging pile 2 according to the vehicle locking authorization authority, so that the charging pile 2 locks the target vehicle 3 in a state of being connected with the target vehicle 3; therefore, even if the illegal user steals the vehicle, the user can lock the target vehicle through locking the vehicle, so that the illegal user cannot continue to use the vehicle, the loss can be timely stopped, and the legal right of the normal user is ensured.
Based on the same inventive concept, the invention also provides a server, which is detailed in the third embodiment.
EXAMPLE III
The present embodiment provides a server, as shown in fig. 3, a server 1 includes: an acquisition unit 31 and a lock unit 32; wherein,
an acquisition unit 31 that acquires a lock authorization authority sent by a user;
and the locking unit 32 is used for sending a vehicle locking instruction to the charging pile 2 according to the vehicle locking authorization authority so that the charging pile 2 locks the target vehicle 3 in a state of being connected with the target vehicle 3.
As an alternative embodiment, the obtaining unit 31 obtains the vehicle locking authorization authority sent by the user, and includes:
acquiring a state of charge value of the target vehicle 3;
judging whether the state of charge value is lower than a preset charging threshold value or not;
if the charge state value is lower than the charging threshold value, pushing low-power prompt information to a user,
and receiving the vehicle locking authorization authority returned by the user based on the low-power prompt message.
In another embodiment, if the low power reminding function is not set, the obtaining unit 31 obtains the car locking authorization authority sent by the user, and may further include:
when the target vehicle 3 is connected with the charging pile 2 to be charged, generating charging request information and pushing the charging request information to a user;
and receiving the vehicle locking authorization authority returned by the user based on the charging request information.
In addition, after the target vehicle 3 is charged completely, the obtaining unit 31 obtains the vehicle locking authorization authority sent by the user, including:
when the target vehicle 3 is charged, generating a charging order and pushing the charging order to a user;
and receiving the vehicle locking authorization authority returned by the user based on the charging order.
In an embodiment in this specification, the obtaining unit 31 may further obtain, according to the location information, a vehicle locking authorization right sent by the user, including:
acquiring position information of the target vehicle 3;
judging whether the deviation between the position information and the historical driving track exceeds a preset deviation threshold value or not;
if yes, pushing the position information of the target vehicle 3 to the user;
and receiving the vehicle locking authorization authority returned by the user based on the position information.
In this embodiment of the present specification, after the obtaining unit 31 receives the vehicle locking authorization authority, in order to stop loss in time, the locking unit 32 may send a vehicle locking instruction to the charging pile 2 based on the vehicle locking authorization authority, so that the charging pile 2 locks the target vehicle 3 in a state of being connected to the target vehicle 3.
As an alternative embodiment, the locking unit 32 sends a vehicle locking instruction to the charging pile 2, so that the charging pile 2 locks the target vehicle 3 in a connected state with the target vehicle 3, and includes:
obtaining a charging device number used by the target vehicle 3; the number of the charging equipment can comprise the number of a charging pile 2 and the number of a charging gun 5;
and issuing the locking instruction to the charging pile 2 corresponding to the charging equipment number so that the charging pile 2 locks the target vehicle 3 connected with the charging pile according to the locking instruction, and locking the charging gun 5 in a charging port of the target vehicle 3. Thus, even if the vehicle is fully charged, an abnormal user cannot drive the vehicle away.
In the embodiment of the present specification, after the target vehicle 3 is locked, the current position of the target vehicle 3 may also be queried, so that the target vehicle 3 can be located.
As an alternative embodiment, after the target vehicle 3 is locked by the charging pile 2, the obtaining unit 31 is further configured to:
obtaining a position query request sent by a user, wherein the position query request carries a license plate number, a vehicle identification code or a vehicle battery number of a target vehicle 3;
sending the position query request to the vehicle cloud platform 4, so that the vehicle cloud platform 4 can obtain the current position information of the target vehicle 3 based on the position query request;
and receiving the current position information of the target vehicle 3 sent by the vehicle cloud platform 4, and pushing the current position information of the target vehicle 3 to a user.
After receiving the current position information, the user can find the stolen vehicle as soon as possible no matter whether the user gives an alarm or carries out self-processing.
Here, referring to fig. 3, the server 1 further includes: an authentication unit 33; in order to prevent the user from mistakenly operating and triggering the vehicle locking operation, before the charging pile 2 locks the target vehicle 3 in a state of being connected with the target vehicle 3, the authentication unit 33 is configured to:
obtaining current biometric information of the user to which the target vehicle 3 belongs, which is transmitted by the charging device; and performing authentication according to the current biological characteristic information to obtain an authentication result aiming at the user to which the target vehicle 3 belongs.
As an alternative embodiment, the authenticating according to the current biometric information to obtain the authentication result for the user to which the target vehicle 3 belongs includes:
matching the current biological characteristic information with the biological characteristic information in the registration information;
and judging whether the current biological characteristic information can be successfully matched with the biological characteristic information in the registration information, if so, obtaining a first authentication result aiming at the user to which the target vehicle 3 belongs, wherein the first authentication result is successful in authentication.
Here, if the biometric information to be authenticated includes 2 types, the authentication result is determined to be successful only if both the two types of biometric information are successfully matched. And if one piece of biological characteristic information cannot be successfully matched, determining that the authentication result is authentication failure.
And the authentication is realized based on the biological characteristic information of the user. Because the face image, the fingerprint, the voiceprint and the iris are all unique, the authentication precision can be ensured.
After the authentication result is obtained, if the authentication result is authentication failure, it indicates that the normal user has no misoperation, and the charging pile 2 can execute the locking instruction.
If the authentication result is that the authentication is successful, the user is indicated to possibly perform misoperation. Even if the authentication result is successful, the possibility that the biometric information is stolen is not excluded, so that the authentication result is successful, the server 1 needs to push query information to the user again, the query information can be 'whether misoperation is performed', if not, the user can click 'no', and at the moment, even if the authentication is successful, the charging pile 2 can execute a car locking instruction.
In this way, the device provided by the embodiment can acquire the vehicle locking authorization authority sent by the user, and send a vehicle locking instruction to the charging pile 2 according to the vehicle locking authorization authority, so that the charging pile 2 locks the target vehicle 3 in a state of being connected with the target vehicle 3; even if the illegal user steals the vehicle, the user can lock the target vehicle 3 through locking the vehicle, so that the illegal user can not continuously use the vehicle, further the loss can be timely stopped, and the legal rights and interests of normal users are ensured.
Example four
The present embodiment provides a computer apparatus 400, as shown in fig. 4, including a memory 410, a processor 420, and a computer program 411 stored in the memory 410 and running on the processor 420, where the processor 420 executes the computer program 411 to implement the following steps:
obtaining a vehicle locking authorization authority sent by a user;
and sending a vehicle locking instruction to the charging pile 2 according to the vehicle locking authorization authority so that the charging pile 2 locks the target vehicle 3 in a state of being connected with the target vehicle 3.
In a specific implementation, when the processor 420 executes the computer program 411, any of the second embodiment may be implemented.
Since the computer device described in this embodiment is a device used for implementing the method for locking a vehicle according to the first embodiment of the present application, a person skilled in the art can understand a specific implementation manner of the computer device of this embodiment and various variations thereof based on the method described in the first embodiment of the present application, and therefore, how to implement the method in the embodiment of the present application by the server is not described in detail herein. The equipment used by those skilled in the art to implement the methods in the embodiments of the present application is within the scope of the present application.
Based on the same inventive concept, the application provides a storage medium corresponding to the fourth embodiment, which is described in detail in the fourth embodiment.
EXAMPLE five
The present embodiment provides a computer-readable storage medium 500, as shown in fig. 5, on which a computer program 511 is stored, the computer program 511 realizing the following steps when executed by a processor:
obtaining a vehicle locking authorization authority sent by a user;
and sending a vehicle locking instruction to the charging pile 2 according to the vehicle locking authorization authority so that the charging pile 2 locks the target vehicle 3 in a state of being connected with the target vehicle 3.
In a specific implementation, when the computer program 511 is executed by a processor, any of the second embodiment may be implemented.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
The above description is only exemplary of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements, etc. that are within the spirit and principle of the present invention should be included in the present invention.

Claims (11)

1. A method for locking a vehicle, comprising:
obtaining a vehicle locking authorization authority sent by a user;
and sending a vehicle locking instruction to a charging pile according to the vehicle locking authorization authority so that the charging pile locks the target vehicle in a state of being connected with the target vehicle.
2. The method of claim 1, wherein obtaining the vehicle locking authorization sent by the user comprises:
acquiring a state of charge value of the target vehicle;
judging whether the state of charge value is lower than a preset charging threshold value or not;
if the state of charge value is lower than the charging threshold value, pushing low-power prompt information to a user,
and receiving the vehicle locking authorization authority returned by the user based on the low-power prompt message.
3. The method of claim 1, wherein obtaining the vehicle locking authorization sent by the user comprises:
when the target vehicle is connected with the charging pile to be charged, generating charging request information and pushing the charging request information to a user;
and receiving the vehicle locking authorization authority returned by the user based on the charging request information.
4. The method of claim 1, wherein obtaining the vehicle locking authorization sent by the user comprises:
when the target vehicle is charged, generating a charging order and pushing the charging order to a user;
and receiving the vehicle locking authorization authority returned by the user based on the charging order.
5. The method of claim 1, wherein obtaining the vehicle locking authorization sent by the user comprises:
acquiring position information of the target vehicle;
judging whether the deviation between the position information and the historical driving track exceeds a preset deviation threshold value or not;
if so, pushing the position information of the target vehicle to the user;
and receiving the vehicle locking authorization authority returned by the user based on the position information.
6. The method of any one of claims 1-5, wherein after the target vehicle is locked by the charging post, the method further comprises:
obtaining a location query request sent by the user, the location query request including a license plate number, a vehicle identification code, or a vehicle battery number of the target vehicle;
sending the position query request to a vehicle cloud platform;
and receiving the current position information of the target vehicle sent by the vehicle cloud platform, and sending the current position information to the user.
7. The method of any one of claims 1-5, wherein sending a vehicle locking command to a charging post to lock a target vehicle while the charging post is connected to the target vehicle comprises:
obtaining a charging device number used by the target vehicle;
and issuing the locking instruction to the charging pile corresponding to the charging equipment number so that the charging pile locks the target vehicle connected with the charging pile according to the locking instruction.
8. A server, comprising:
the acquisition unit is used for acquiring the vehicle locking authorization authority sent by the user;
and the locking unit is used for sending a vehicle locking instruction to the charging pile according to the vehicle locking authorization authority so that the charging pile locks the target vehicle in a state of being connected with the target vehicle.
9. A vehicle locking system, comprising: a charging pile and a server;
the server is configured to: obtaining a vehicle locking authorization authority sent by a user, and sending a vehicle locking instruction to the charging pile according to the vehicle locking authorization authority;
the charging pile is used for: and locking the target vehicle according to the vehicle locking instruction under the state that the charging pile is connected with the target vehicle.
10. A storage medium on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of any one of claims 1 to 7.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1 to 7 when executing the program.
CN202011460315.6A 2020-12-11 2020-12-11 Car locking method, server, system, storage medium and computer equipment Active CN112584309B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202311301777.7A CN117596543A (en) 2020-12-11 2020-12-11 Car locking system and car locking method
CN202311298289.5A CN117714975A (en) 2020-12-11 2020-12-11 Car locking method, system, storage medium and computer equipment
CN202011460315.6A CN112584309B (en) 2020-12-11 2020-12-11 Car locking method, server, system, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011460315.6A CN112584309B (en) 2020-12-11 2020-12-11 Car locking method, server, system, storage medium and computer equipment

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202311301777.7A Division CN117596543A (en) 2020-12-11 2020-12-11 Car locking system and car locking method
CN202311298289.5A Division CN117714975A (en) 2020-12-11 2020-12-11 Car locking method, system, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN112584309A true CN112584309A (en) 2021-03-30
CN112584309B CN112584309B (en) 2023-10-27

Family

ID=75132302

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202011460315.6A Active CN112584309B (en) 2020-12-11 2020-12-11 Car locking method, server, system, storage medium and computer equipment
CN202311301777.7A Pending CN117596543A (en) 2020-12-11 2020-12-11 Car locking system and car locking method
CN202311298289.5A Pending CN117714975A (en) 2020-12-11 2020-12-11 Car locking method, system, storage medium and computer equipment

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN202311301777.7A Pending CN117596543A (en) 2020-12-11 2020-12-11 Car locking system and car locking method
CN202311298289.5A Pending CN117714975A (en) 2020-12-11 2020-12-11 Car locking method, system, storage medium and computer equipment

Country Status (1)

Country Link
CN (3) CN112584309B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113928265A (en) * 2021-10-20 2022-01-14 车主邦(北京)科技有限公司 Vehicle anti-theft method and device based on charging pile
CN114056170A (en) * 2021-10-20 2022-02-18 长园深瑞继保自动化有限公司 Charging authentication method and charging system
CN114363828A (en) * 2022-01-11 2022-04-15 江苏爱玛车业科技有限公司 Distributed Bluetooth vehicle stolen locking method and device
CN117382444A (en) * 2023-11-14 2024-01-12 深圳市大拿能源科技有限公司 Vehicle charging method and device, vehicle-mounted terminal and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012160016A (en) * 2011-01-31 2012-08-23 Canon Marketing Japan Inc Vehicle management system, vehicle management server, vehicle management method, program and storage medium
CN108128277A (en) * 2017-12-20 2018-06-08 江西爱驰亿维实业有限公司 Electric vehicle antitheft tracing method and system
WO2019081250A1 (en) * 2017-10-26 2019-05-02 Phoenix Contact E-Mobility Gmbh Charging station for providing electrical energy
CN109969031A (en) * 2019-04-04 2019-07-05 睿驰达新能源汽车科技(北京)有限公司 A kind of method and apparatus of stolen vehicle safeguard protection
CN111402578A (en) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 Shared vehicle monitoring method and device based on track monitoring and computer equipment
CN111717056A (en) * 2020-06-24 2020-09-29 多伦汽车检测集团有限公司 New energy automobile system of retrieving

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012160016A (en) * 2011-01-31 2012-08-23 Canon Marketing Japan Inc Vehicle management system, vehicle management server, vehicle management method, program and storage medium
WO2019081250A1 (en) * 2017-10-26 2019-05-02 Phoenix Contact E-Mobility Gmbh Charging station for providing electrical energy
CN108128277A (en) * 2017-12-20 2018-06-08 江西爱驰亿维实业有限公司 Electric vehicle antitheft tracing method and system
CN109969031A (en) * 2019-04-04 2019-07-05 睿驰达新能源汽车科技(北京)有限公司 A kind of method and apparatus of stolen vehicle safeguard protection
CN111402578A (en) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 Shared vehicle monitoring method and device based on track monitoring and computer equipment
CN111717056A (en) * 2020-06-24 2020-09-29 多伦汽车检测集团有限公司 New energy automobile system of retrieving

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113928265A (en) * 2021-10-20 2022-01-14 车主邦(北京)科技有限公司 Vehicle anti-theft method and device based on charging pile
CN114056170A (en) * 2021-10-20 2022-02-18 长园深瑞继保自动化有限公司 Charging authentication method and charging system
CN114363828A (en) * 2022-01-11 2022-04-15 江苏爱玛车业科技有限公司 Distributed Bluetooth vehicle stolen locking method and device
CN114363828B (en) * 2022-01-11 2024-04-09 江苏爱玛车业科技有限公司 Distributed Bluetooth vehicle theft locking method and device
CN117382444A (en) * 2023-11-14 2024-01-12 深圳市大拿能源科技有限公司 Vehicle charging method and device, vehicle-mounted terminal and storage medium
CN117382444B (en) * 2023-11-14 2024-05-14 深圳市大拿能源科技有限公司 Vehicle charging method and device, vehicle-mounted terminal and storage medium

Also Published As

Publication number Publication date
CN117714975A (en) 2024-03-15
CN112584309B (en) 2023-10-27
CN117596543A (en) 2024-02-23

Similar Documents

Publication Publication Date Title
CN112584309B (en) Car locking method, server, system, storage medium and computer equipment
CN103035054B (en) NFC intelligent automobile key system with permission and authorization functions
US12065121B2 (en) Vehicle, start control method for vehicle, and start control system of vehicle
US9566943B2 (en) Method of making a vehicle available and corresponding system for making a vehicle available
EP3806384B1 (en) Vehicle unlocking authentication method and apparatus
CN109389709B (en) Unlocking control system and unlocking control method
CN108259484B (en) Safety access method and system for vehicle-mounted controller
CN111224774B (en) Authentication method and system for using rented vehicle and third-party platform
US11433853B2 (en) Vehicle unlocking authentication method and apparatus based on terminal device
CN113905375A (en) Charging authentication method, server, system, medium and computer equipment
CN113103987B (en) Vehicle emergency unlocking control system and method
CN109067745B (en) Method for authenticating vehicle occupant, apparatus, device and storage medium therefor
CN112693425A (en) Vehicle anti-theft method, device, storage medium, vehicle control unit and vehicle
CN105227555B (en) Equipment starting method and system
CN114248722A (en) Control method and device and vehicle
CN113525151B (en) Electric automobile charging method and related equipment
US20220340128A1 (en) Automatic valet parking system
CN113905376B (en) Charging authentication method, server, system, medium and computer equipment
CN113596728B (en) Vehicle parking method and device and terminal equipment
CN114771462A (en) Vehicle anti-theft system and method
CN109388940B (en) Vehicle machine system access method and device, server and engineering U disk
CN111222113B (en) Authentication method, system and authentication platform for using rented vehicles
CN112750212A (en) Vehicle management method and related equipment
CN113911066B (en) Electric automobile anti-theft control method and related equipment
CN117549853A (en) Vehicle control method, vehicle end controller, vehicle key and vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220701

Address after: 313300 room 101-27, building 1, No. 236, Lingyan Road, Lingfeng street, Anji County, Huzhou City, Zhejiang Province (self declaration)

Applicant after: Zhejiang Anji Zhidian Holding Co.,Ltd.

Address before: 100020 building 7, Huitong Times Square, 1 yaojiayuan South Road, Chaoyang District, Beijing

Applicant before: CHEZHUBANG (BEIJING) TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant