CN112776736A - Privacy protection configuration/implementation method/system, storage medium and vehicle terminal - Google Patents

Privacy protection configuration/implementation method/system, storage medium and vehicle terminal Download PDF

Info

Publication number
CN112776736A
CN112776736A CN201911088930.6A CN201911088930A CN112776736A CN 112776736 A CN112776736 A CN 112776736A CN 201911088930 A CN201911088930 A CN 201911088930A CN 112776736 A CN112776736 A CN 112776736A
Authority
CN
China
Prior art keywords
vehicle
privacy
protection
instruction
control instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911088930.6A
Other languages
Chinese (zh)
Inventor
应臻恺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pateo Electronic Equipment Manufacturing Co Ltd
Original Assignee
Shanghai Pateo Electronic Equipment Manufacturing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pateo Electronic Equipment Manufacturing Co Ltd filed Critical Shanghai Pateo Electronic Equipment Manufacturing Co Ltd
Priority to CN201911088930.6A priority Critical patent/CN112776736A/en
Publication of CN112776736A publication Critical patent/CN112776736A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R16/00Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
    • B60R16/02Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
    • B60R16/023Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements for transmission of signals between vehicle parts or subsystems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention provides a configuration/implementation method/system for privacy protection, a storage medium and a vehicle terminal, wherein the implementation method for privacy protection comprises the following steps: acquiring a first mode switching instruction, wherein the switching instruction is used for switching a normal mode into a designated driving mode; when the vehicle enters the designated driving mode, searching a protection control instruction corresponding to the privacy content of the vehicle determined when the vehicle is in the designated driving mode; and sending the protection control instructions to the controlled components associated with the protection control instructions one by one so that the controlled components execute the protection control instructions. The invention can carry out safer vehicle protection on the vehicle, protect privacy and protect facilities in the vehicle, and the user can finish the operation more quickly, thereby improving the experience of the user.

Description

Privacy protection configuration/implementation method/system, storage medium and vehicle terminal
Technical Field
The invention belongs to the technical field of vehicle management, relates to a processing/implementation method, and particularly relates to a configuration/implementation method/system for privacy protection, a storage medium and a vehicle terminal.
Background
The designated driving is the behavior that when the vehicle owner can not drive by himself to reach the destination, a professional driver drives the vehicle owner to send the vehicle to a designated place and charge a certain fee. The wine bottle is generally used in the catering industry, a car owner goes to a restaurant to collect meals and drink wine, and the car cannot be driven after drinking, so that other people drive the car instead.
The designated driver slowly becomes hot air, so that more inconvenient people have more time and safety. There are two broad categories of presence patterns for designated driving services, one being that many larger hotels, clubs, etc. provide designated driving labor for a particular customer, or that there are entities or individual customers who temporarily need a driver. Such as: providing vehicle driving service for drunkens, incapacitated and unauthorized people; another is that the club, car service company rents cars. Mainly provides special service for the vehicle and the driver to the client.
However, handing over the vehicle to a stranger presents problems with respect to vehicle privacy and safety. Therefore, how to provide a privacy protection configuration/implementation method/system, a storage medium and a vehicle end to solve the defects that the prior art cannot implement privacy protection in a designated driving mode more quickly and conveniently, and the user experience is poor, has become a technical problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the above drawbacks of the prior art, an object of the present invention is to provide a method/system for configuring/implementing privacy protection, a storage medium, and a vehicle end, which are used to solve the problems that the prior art cannot implement privacy protection in a designated driving mode more quickly and conveniently, and the user experience is poor.
In order to achieve the above and other related objects, an aspect of the present invention provides a method for configuring privacy protection, applied to a vehicle end, the method for configuring privacy protection includes: setting a designated driving mode of the vehicle; defining vehicle privacy content to be protected; the vehicle privacy content to be protected is the vehicle privacy content determined when the vehicle is in the designated driving mode; according to the privacy content of the vehicle, searching controlled components of the vehicle corresponding to the privacy content of the vehicle, and forming a protection control instruction associated with each controlled component; the protection control instruction is a control instruction identified by the controlled component corresponding to the protection control instruction; and the protection control instruction is automatically sent to the corresponding controlled component only when the slave vehicle is in the designated driving mode, so that the controlled component can execute the protection control instruction.
In an embodiment of the present invention, the controlled component includes: the system comprises an automobile speed limiter, an automobile end, an automobile display screen, a driving recorder, an entertainment system, a Bluetooth module and/or an in-automobile storage box; the protection control instruction comprises: a speed limit control instruction associated with the automobile speed limiter; limiting a non-vehicle owner login control instruction associated with a vehicle end; a screen locking control instruction associated with the display screen of the vehicle machine; a recording instruction associated with the tachograph; control instructions associated with the entertainment system that prohibit non-owner use; a control instruction associated with the bluetooth module for prohibiting non-owner bluetooth connection; and/or a locking storage compartment control command associated with an in-vehicle storage compartment.
In an embodiment of the present invention, the method for configuring privacy protection further includes: after the controlled component is searched, a search data table is formed by the defined privacy content of the vehicle to be protected and the controlled component of the vehicle corresponding to the privacy content of the vehicle, and the search data table is stored in a database at the vehicle end.
The invention also provides a privacy protection implementation method based on the privacy protection configuration method, which is applied to a vehicle terminal configured with privacy protection, and the privacy protection implementation method comprises the following steps: acquiring a first mode switching instruction, wherein the switching instruction is used for switching a normal mode into a designated driving mode; when the vehicle enters the designated driving mode, searching a protection control instruction corresponding to the privacy content of the vehicle determined when the vehicle is in the designated driving mode; and sending the protection control instructions to the controlled components associated with the protection control instructions one by one so that the controlled components execute the protection control instructions.
In an embodiment of the present invention, the method for implementing privacy protection further includes: after a second mode switching instruction is acquired, switching the vehicle from the designated driving mode to a normal mode; the second mode switching instruction is a voiceprint unlocking instruction, a password unlocking instruction, an iris unlocking instruction or a fingerprint unlocking instruction.
In an embodiment of the present invention, the step of switching the vehicle from the designated driving mode to the normal mode includes: and forming a cancellation instruction of the protection control instruction, and respectively sending the cancellation instruction to corresponding controlled components.
Another aspect of the present invention further provides a processing system for privacy protection, which is applied to a vehicle end, and the processing system for privacy protection includes: the setting module is used for setting a designated driving mode of the vehicle; the definition module is used for defining the privacy content of the vehicle to be protected; the vehicle privacy content to be protected is the vehicle privacy content determined when the vehicle is in the designated driving mode; the first processing module is used for searching the controlled components of the vehicle corresponding to the privacy content of the vehicle according to the privacy content of the vehicle and forming a protection control instruction associated with each controlled component; the protection control instruction is a control instruction identified by the controlled component corresponding to the protection control instruction; and the protection control instruction is automatically sent to the corresponding controlled component through the communication module only when the slave vehicle is in the designated driving mode, so that the controlled component can execute the protection control instruction.
The invention also provides a privacy protection implementation system based on the privacy protection processing system, which is applied to a vehicle end and comprises the following steps: the system comprises an acquisition module, a switching module and a switching module, wherein the acquisition module is used for acquiring a first mode switching instruction, and the switching instruction is used for switching a normal mode into a designated driving mode; the searching module is used for searching a protection control instruction corresponding to the privacy content of the vehicle determined when the vehicle is in the designated driving mode when the vehicle enters the designated driving mode; and the communication module is used for sending the protection control instructions to the controlled components associated with the protection control instructions one by one so that the controlled components can execute the protection control instructions.
A further aspect of the invention provides a storage medium on which a computer program is stored which, when being executed by a processor, implements the method of configuring and/or implements the method of privacy protection.
In a final aspect, the present invention provides a vehicle end, comprising: a processor and a memory; the memory is used for storing computer programs, and the processor is used for executing the computer programs stored in the memory, so that the vehicle end executes the configuration method of the privacy protection and/or the implementation method of the privacy protection.
As described above, the privacy protection configuration/implementation method/system, the storage medium, and the vehicle end according to the present invention have the following advantages:
the configuration/implementation method/system for privacy protection, the storage medium and the vehicle terminal can perform safer vehicle protection on the vehicle, protect the privacy and protect facilities in the vehicle, and a user can complete the operation more quickly, so that the user experience is improved.
Drawings
Fig. 1 is a flowchart illustrating a configuration method of privacy protection according to an embodiment of the present invention.
Fig. 2 is a flowchart illustrating a method for implementing privacy protection according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a privacy protection configuration system according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of an implementation system of privacy protection according to an embodiment of the present invention.
Description of the element reference numerals
3 Privacy protected configuration system
31 Setting module
32 Definition module
33 First processing module
4 Implementation system for privacy protection
41 Acquisition module
42 Search module
43 Communication module
44 Switching module
45 Second processing module
S11~S15 Step (ii) of
S21~S24 Step (ii) of
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
Example one
The embodiment provides a privacy protection configuration method, which is applied to a vehicle end, and the privacy protection configuration method comprises the following steps:
setting a designated driving mode of the vehicle;
defining vehicle privacy content to be protected; the vehicle privacy content to be protected is the vehicle privacy content determined when the vehicle is in the designated driving mode;
according to the privacy content of the vehicle, searching controlled components of the vehicle corresponding to the privacy content of the vehicle, and forming a protection control instruction associated with each controlled component; the protection control instruction is a control instruction identified by the controlled component corresponding to the protection control instruction; and the protection control instruction is automatically sent to the corresponding controlled component only when the slave vehicle is in the designated driving mode, so that the controlled component can execute the protection control instruction.
A privacy protection implementation method based on a privacy protection configuration method is applied to a vehicle end, and comprises the following steps:
acquiring a first mode switching instruction, wherein the switching instruction is used for switching a normal mode into a designated driving mode;
when the vehicle enters the designated driving mode, searching a protection control instruction corresponding to the privacy content of the vehicle determined when the vehicle is in the designated driving mode;
and sending the protection control instructions to the controlled components associated with the protection control instructions one by one so that the controlled components execute the protection control instructions.
The following describes in detail a configuration method of privacy protection and an implementation method of privacy protection based on the configuration method of privacy protection according to the present embodiment with reference to the drawings. The privacy protection configuration method is applied to a vehicle end. The implementation method of privacy protection is implemented before the implementation method of privacy protection described in this embodiment. Please refer to fig. 1, which is a flowchart illustrating a configuration method for privacy protection in an embodiment. As shown in fig. 1, the configuration method of privacy protection specifically includes the following steps:
and S11, setting the designated driving mode of the vehicle.
In the present embodiment, the designated driving mode of the vehicle is set by providing a command input interface. The instruction includes a password instruction, a voiceprint instruction, or a fingerprint instruction. And after receiving the instruction through the instruction input interface, the vehicle is indicated to be switched from the normal mode to the designated driving mode.
S12, defining the privacy content of the vehicle to be protected; the vehicle privacy content to be protected is the vehicle privacy content determined when the vehicle is in the designated driving mode.
In this embodiment, the vehicle privacy content to be protected includes:
the vehicle speed is limited to 70-100 steps;
limiting non-vehicle owners from logging in the vehicle machine;
locking the display screen;
starting a vehicle event data recorder;
forbidding non-vehicle owners to use the in-vehicle entertainment system;
forbidding a non-owner to connect the Bluetooth in the vehicle;
prohibiting non-vehicle owners from opening the storage box in the vehicle, and the like.
In this embodiment, the vehicle privacy content to be protected may be defined by receiving a manual input from the owner of the vehicle, or by receiving a voice input from the owner of the vehicle.
And S13, reading the privacy content of the vehicle, and searching the controlled component of the vehicle corresponding to the privacy content of the vehicle according to the privacy content of the vehicle.
For example, if vehicle privacy is read that requires the vehicle speed to be limited to between 70-100 miles, then the corresponding controlled component of the vehicle is the car speed limiter.
For example, if the privacy content of the vehicle limiting the non-owner logged-in vehicle is read, the controlled component of the corresponding vehicle is the vehicle end.
For example, if the privacy content of the vehicle limiting the non-owner login vehicle is read, the controlled component of the corresponding vehicle is the vehicle display screen
For example, the vehicle privacy content of the lock screen of the display screen is read, and the corresponding controlled component of the vehicle is the display screen.
For example, if the privacy content of the vehicle that starts the automobile data recorder is read, the corresponding controlled component of the vehicle is the automobile data recorder.
For example, if private vehicle content is read that prohibits non-vehicle owners from using the in-vehicle entertainment system, then the corresponding controlled component of the vehicle is the entertainment system.
For example, if private contents of the vehicle that prohibit the non-owner from connecting the Bluetooth in the vehicle are read, the corresponding controlled component of the vehicle is a Bluetooth module
For example, if the private contents of the vehicle that prohibit the non-owner from opening the storage box in the vehicle are read, the corresponding controlled components of the vehicle are various storage boxes.
And S14, after the controlled component is searched, forming a search data table by the defined privacy content of the vehicle to be protected and the controlled component of the vehicle corresponding to the privacy content of the vehicle, and storing the search data table in a database at the vehicle end.
S15, a protection control command associated with each controlled component is formed. In this embodiment, the protection control instruction is a control instruction identified by the controlled component corresponding to the protection control instruction; and the protection control instruction is automatically sent to the corresponding controlled component only when the slave vehicle is in the designated driving mode, so that the controlled component can execute the protection control instruction.
The protection control instruction comprises:
a speed limit control instruction associated with the automobile speed limiter;
limiting a non-vehicle owner login control instruction associated with a vehicle end;
a screen locking control instruction associated with the display screen of the vehicle machine;
a recording instruction associated with the tachograph;
control instructions associated with the entertainment system that prohibit non-owner use;
a control instruction associated with the bluetooth module for prohibiting non-owner bluetooth connection; and/or
A control command to lock the storage bin associated with the storage bin in the vehicle.
Example two
The embodiment provides a method for realizing privacy protection, which is applied to a vehicle end configured with privacy protection. The method for configuring the privacy protection at the vehicle end is not limited to the method for configuring the privacy protection in the embodiment. Any method capable of configuring privacy protection for the vehicle end is applicable to the embodiment.
And starting the privacy protection implementation method when the user needs to drive in the designated mode. Please refer to fig. 2, which is a flowchart illustrating an implementation method of privacy protection in an embodiment. As shown in fig. 2, the method for implementing privacy protection based on the configuration method of privacy protection specifically includes the following steps:
and S21, acquiring a first mode switching instruction, wherein the switching instruction is used for switching from the normal mode to the substitute driving mode.
The first mode switching instruction is a voice instruction or a touch instruction.
And S22, when the vehicle enters the designated driving mode, searching a protection control instruction corresponding to the privacy content of the vehicle determined when the vehicle is in the designated driving mode. After entering the designated driving mode, the determined vehicle privacy content needs to limit the vehicle speed to 70-100 steps; limiting non-vehicle owners from logging in the vehicle machine; locking the display screen; starting a vehicle event data recorder; forbidding non-vehicle owners to use the in-vehicle entertainment system; forbidding a non-owner to connect the Bluetooth in the vehicle; prohibiting non-vehicle owners from opening the storage box in the vehicle, and the like. Finding out that the corresponding protection control instruction comprises a speed limit control instruction associated with the automobile speed limiter; limiting a non-vehicle owner login control instruction associated with a vehicle end; a screen locking control instruction associated with the display screen of the vehicle machine; a recording instruction associated with the tachograph; control instructions associated with the entertainment system that prohibit non-owner use; a control instruction associated with the bluetooth module for prohibiting non-owner bluetooth connection; and/or a locking storage compartment control command associated with an in-vehicle storage compartment.
And S23, sending the protection control instructions to the controlled components associated with the protection control instructions one by one so that the controlled components execute the protection control instructions.
Specifically, a speed limit control instruction related to the automobile speed limiter is sent to the automobile speed limiter
Sending a restricted non-vehicle owner login control instruction associated with a vehicle end to the vehicle end;
sending a screen locking control instruction associated with the vehicle-mounted display screen to the vehicle-mounted display screen;
sending a recording instruction associated with the automobile data recorder to the automobile data recorder;
sending a control instruction associated with the entertainment system that prohibits non-owner use to the entertainment system;
sending a control instruction associated with the Bluetooth module and forbidding non-owner Bluetooth connection to the Bluetooth module; and/or
And sending a control command of locking the storage box associated with the storage box in the vehicle to each storage box in the vehicle.
And after each controlled component receives the protection control instruction, executing the protection control instruction.
And S24, after the second mode switching instruction is acquired, switching the vehicle from the designated driving mode to the normal mode.
The second mode switching instruction is a voiceprint unlocking instruction, a password unlocking instruction, an iris unlocking instruction or a fingerprint unlocking instruction.
In this embodiment, the S24 includes: and forming a cancellation instruction of the protection control instruction, and respectively sending the cancellation instruction to corresponding controlled components.
The cancel instruction of the protection control instruction includes:
canceling a speed limit control instruction related to the automobile speed limiter;
canceling a non-vehicle owner login limiting control instruction associated with a vehicle end;
canceling a screen locking control instruction associated with a vehicle machine display screen;
canceling a recording instruction associated with the automobile data recorder;
canceling a control directive associated with the entertainment system that prohibits non-owner use;
canceling a control instruction associated with the Bluetooth module for forbidding non-owner Bluetooth connection; and/or
Cancel a control command to lock a storage compartment associated with a storage compartment in the vehicle, and so on.
The present embodiment further provides a storage medium (also referred to as a computer-readable storage medium) on which a computer program is stored, which when executed by a processor implements the method for configuring privacy protection and/or implements the method for implementing privacy protection based on the method for configuring privacy protection.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the above method embodiments may be performed by hardware associated with a computer program. The aforementioned computer program may be stored in a computer readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
According to the privacy protection implementation method, safer vehicle protection can be performed on the vehicle, privacy is protected, facilities in the vehicle are protected, a user can operate the vehicle more quickly, and user experience is improved.
EXAMPLE III
The embodiment provides a configuration system for privacy protection, which is applied to a vehicle end, and comprises:
the setting module is used for setting a designated driving mode of the vehicle;
the definition module is used for defining the privacy content of the vehicle to be protected; the vehicle privacy content to be protected is the vehicle privacy content determined when the vehicle is in the designated driving mode;
the processing module is used for searching the controlled components of the vehicle corresponding to the privacy content of the vehicle according to the privacy content of the vehicle and forming a protection control instruction associated with each controlled component; the protection control instruction is a control instruction identified by the controlled component corresponding to the protection control instruction; and the protection control instruction is automatically sent to the corresponding controlled component through the communication module only when the slave vehicle is in the designated driving mode, so that the controlled component can execute the protection control instruction.
The embodiment further provides a system for implementing privacy protection, which is applied to a vehicle end configured with privacy protection, and the system for implementing privacy protection includes:
the system comprises an acquisition module, a switching module and a switching module, wherein the acquisition module is used for acquiring a first mode switching instruction, and the switching instruction is used for switching a normal mode into a designated driving mode;
the searching module is used for searching a protection control instruction corresponding to the privacy content of the vehicle determined when the vehicle is in the designated driving mode when the vehicle enters the designated driving mode;
and the communication module is used for sending the protection control instructions to the controlled components associated with the protection control instructions one by one so that the controlled components can execute the protection control instructions.
The following will illustrate a configuration system of privacy protection and an implementation system of privacy protection described for the present embodiment with reference to the drawings.
Referring to fig. 3, a schematic structural diagram of a configuration system for privacy protection is shown. The privacy protection configuration system 3 includes a setting module 31, a defining module 32, and a first processing module 33.
The setting module 31 is used for setting a designated driving mode of the vehicle.
In the present embodiment, the designated driving mode of the vehicle is set by providing a command input interface. The instruction includes a password instruction, a voiceprint instruction, or a fingerprint instruction. And after receiving the instruction through the instruction input interface, the vehicle is indicated to be switched from the normal mode to the designated driving mode.
The definition module 32 is used for defining the vehicle privacy content to be protected; the vehicle privacy content to be protected is the vehicle privacy content determined when the vehicle is in the designated driving mode.
The first processing module 33 is configured to read the vehicle privacy content, and search for a controlled component of the vehicle corresponding to the vehicle privacy content according to the vehicle privacy content.
After the processing module 33 finds the controlled component, a look-up data table is formed by the defined privacy content of the vehicle to be protected and the controlled component of the vehicle corresponding to the privacy content of the vehicle, the look-up data table is stored in a database at the vehicle end, and a protection control instruction associated with each controlled component is formed. In this embodiment, the protection control instruction is a control instruction identified by the controlled component corresponding to the protection control instruction; and the protection control instruction is automatically sent to the corresponding controlled component only when the slave vehicle is in the designated driving mode, so that the controlled component can execute the protection control instruction.
The privacy protection implementation system is applied to the vehicle end configured with privacy protection. Any system capable of configuring privacy protection for the vehicle end is suitable for the embodiment.
Please refer to fig. 4, which is a schematic diagram illustrating a schematic structure of a system for implementing privacy protection. As shown in fig. 4, the privacy protection implementation system 4 includes: the device comprises an acquisition module 41, a search module 42, a communication module 43, a switching module 44 and a second processing module 45.
The obtaining module 41 is configured to obtain a first mode switching instruction, where the switching instruction is used to switch from a normal mode to a designated driving mode. The first mode switching instruction is a voice instruction or a touch instruction.
The searching module 42 is configured to search a protection control instruction corresponding to the privacy content determined when the vehicle is in the designated driving mode when the vehicle enters the designated driving mode. After entering the designated driving mode, the determined vehicle privacy content needs to limit the vehicle speed to 70-100 steps; limiting non-vehicle owners from logging in the vehicle machine; locking the display screen; starting a vehicle event data recorder; forbidding non-vehicle owners to use the in-vehicle entertainment system; forbidding a non-owner to connect the Bluetooth in the vehicle; prohibiting non-vehicle owners from opening the storage box in the vehicle, and the like. Finding out that the corresponding protection control instruction comprises a speed limit control instruction associated with the automobile speed limiter; limiting a non-vehicle owner login control instruction associated with a vehicle end; a screen locking control instruction associated with the display screen of the vehicle machine; a recording instruction associated with the tachograph; control instructions associated with the entertainment system that prohibit non-owner use; a control instruction associated with the bluetooth module for prohibiting non-owner bluetooth connection; and/or a locking storage compartment control command associated with an in-vehicle storage compartment.
The communication module 43 is configured to send the protection control commands to the controlled components associated therewith one by one, so that the controlled components execute the protection control commands.
After the obtaining module 41 obtains the second mode switching instruction, the switching module 44 is configured to switch the designated driving mode of the vehicle to the normal mode.
The second mode switching instruction is a voiceprint unlocking instruction, a password unlocking instruction, an iris unlocking instruction or a fingerprint unlocking instruction.
The second processing module 45 is configured to form a cancellation instruction of the protection control instruction, and send the cancellation instruction to the corresponding controlled components through the communication module 43.
It should be noted that the division of the modules of the above system is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And the modules can be realized in a form that all software is called by the processing element, or in a form that all the modules are realized in a form that all the modules are called by the processing element, or in a form that part of the modules are called by the hardware. For example: the x module can be a separately established processing element, and can also be integrated in a certain chip of the system. In addition, the x-module may be stored in the memory of the system in the form of program codes, and may be called by one of the processing elements of the system to execute the functions of the x-module. Other modules are implemented similarly. All or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software. These above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), one or more microprocessors (DSPs), one or more Field Programmable Gate Arrays (FPGAs), and the like. When a module is implemented in the form of a Processing element scheduler code, the Processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor capable of calling program code. These modules may be integrated together and implemented in the form of a System-on-a-chip (SOC).
Example four
The embodiment of the application provides a car end, the car end includes: a processor, memory, transceiver, communication interface, or/and system bus; the memory and the communication interface are connected with the processor and the transceiver through a system bus and are used for mutually communicating, the memory is used for storing a computer program, the communication interface is used for communicating with other equipment, and the processor and the transceiver are used for running the computer program, so that the vehicle end executes each step of the configuration method of the privacy protection and each step of the implementation method of the privacy protection.
The above-mentioned system bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The system bus may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus. The communication interface is used for realizing communication between the database access device and other equipment (such as a client, a read-write library and a read-only library). The Memory may include a Random Access Memory (RAM), and may further include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components.
The protection scope of the privacy protection configuration method and the privacy protection implementation method described in the present invention is not limited to the execution sequence of the steps listed in this embodiment, and all the solutions implemented by adding or subtracting steps and replacing steps in the prior art according to the principles of the present invention are included in the protection scope of the present invention.
The processing system for privacy protection and the system for implementing privacy protection based on the processing system for privacy protection according to the present invention can implement the method for configuring privacy protection and the method for implementing privacy protection according to the present invention, but the apparatus for implementing the method for configuring privacy protection and the method for implementing privacy protection according to the present invention includes, but is not limited to, the structures of the processing system for privacy protection and the system for implementing privacy protection based on the processing system for privacy protection recited in the present embodiment, and all structural modifications and substitutions in the prior art made according to the principles of the present invention are included in the scope of the present invention.
In summary, the processing/implementation method/system for privacy protection, the storage medium and the vehicle end of the present invention can perform safer vehicle protection on the vehicle, protect privacy and protect facilities in the vehicle, and the user can complete the operation more quickly, thereby improving the user experience. The invention effectively overcomes various defects in the prior art and has high industrial utilization value.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (10)

1. A configuration method for privacy protection is characterized by being applied to a vehicle end, and comprises the following steps:
setting a designated driving mode of the vehicle;
defining vehicle privacy content to be protected; the vehicle privacy content to be protected is the vehicle privacy content determined when the vehicle is in the designated driving mode;
according to the privacy content of the vehicle, searching controlled components of the vehicle corresponding to the privacy content of the vehicle, and forming a protection control instruction associated with each controlled component; the protection control instruction is a control instruction identified by the controlled component corresponding to the protection control instruction; and the protection control instruction is automatically sent to the corresponding controlled component only when the slave vehicle is in the designated driving mode, so that the controlled component can execute the protection control instruction.
2. The privacy protection configuration method of claim 1,
the controlled component includes: the system comprises an automobile speed limiter, an automobile end, an automobile display screen, a driving recorder, an entertainment system, a Bluetooth module and/or an in-automobile storage box;
the protection control instruction comprises:
a speed limit control instruction associated with the automobile speed limiter;
limiting a non-vehicle owner login control instruction associated with a vehicle end;
a screen locking control instruction associated with the display screen of the vehicle machine;
a recording instruction associated with the tachograph;
control instructions associated with the entertainment system that prohibit non-owner use;
a control instruction associated with the bluetooth module for prohibiting non-owner bluetooth connection; and/or
A control command to lock the storage bin associated with the storage bin in the vehicle.
3. The privacy protection configuration method according to claim 1, further comprising:
after the controlled component is searched, a search data table is formed by the defined privacy content of the vehicle to be protected and the controlled component of the vehicle corresponding to the privacy content of the vehicle, and the search data table is stored in a database at the vehicle end.
4. A method for realizing privacy protection is characterized in that the method is applied to a vehicle end configured with privacy protection, and the method for realizing privacy protection comprises the following steps:
acquiring a first mode switching instruction, wherein the switching instruction is used for switching a normal mode into a designated driving mode;
when the vehicle enters the designated driving mode, searching a protection control instruction corresponding to the privacy content of the vehicle determined when the vehicle is in the designated driving mode;
and sending the protection control instructions to the controlled components associated with the protection control instructions one by one so that the controlled components execute the protection control instructions.
5. The method of claim 3, further comprising:
after a second mode switching instruction is acquired, switching the vehicle from the designated driving mode to a normal mode;
the second mode switching instruction is a voiceprint unlocking instruction, a password unlocking instruction, an iris unlocking instruction or a fingerprint unlocking instruction.
6. The method of claim 4, wherein the step of switching the vehicle from the designated driving mode to the normal mode comprises: and forming a cancellation instruction of the protection control instruction, and respectively sending the cancellation instruction to corresponding controlled components.
7. A privacy protection configuration system is applied to a vehicle end, and comprises:
the setting module is used for setting a designated driving mode of the vehicle;
the definition module is used for defining the privacy content of the vehicle to be protected; the vehicle privacy content to be protected is the vehicle privacy content determined when the vehicle is in the designated driving mode;
the first processing module is used for searching the controlled components of the vehicle corresponding to the privacy content of the vehicle according to the privacy content of the vehicle and forming a protection control instruction associated with each controlled component; the protection control instruction is a control instruction identified by the controlled component corresponding to the protection control instruction; and the protection control instruction is automatically sent to the corresponding controlled component through the communication module only when the slave vehicle is in the designated driving mode, so that the controlled component can execute the protection control instruction.
8. An implementation system of privacy protection is applied to a vehicle end configured with privacy protection, and comprises:
the system comprises an acquisition module, a switching module and a switching module, wherein the acquisition module is used for acquiring a first mode switching instruction, and the switching instruction is used for switching a normal mode into a designated driving mode;
the searching module is used for searching a protection control instruction corresponding to the privacy content of the vehicle determined when the vehicle is in the designated driving mode when the vehicle enters the designated driving mode;
and the communication module is used for sending the protection control instructions to the controlled components associated with the protection control instructions one by one so that the controlled components can execute the protection control instructions.
9. A storage medium on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out a method of configuring privacy protection according to any one of claims 1 to 3 and/or a method of implementing privacy protection according to a method of configuring privacy protection according to any one of claims 4 to 6.
10. A vehicle end, comprising: a processor and a memory;
the memory is used for storing a computer program, and the processor is used for executing the computer program stored in the memory so as to enable the vehicle end to execute the configuration method of the privacy protection according to any one of claims 1 to 3 and/or the implementation method of the privacy protection according to any one of claims 4 to 6.
CN201911088930.6A 2019-11-08 2019-11-08 Privacy protection configuration/implementation method/system, storage medium and vehicle terminal Pending CN112776736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911088930.6A CN112776736A (en) 2019-11-08 2019-11-08 Privacy protection configuration/implementation method/system, storage medium and vehicle terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911088930.6A CN112776736A (en) 2019-11-08 2019-11-08 Privacy protection configuration/implementation method/system, storage medium and vehicle terminal

Publications (1)

Publication Number Publication Date
CN112776736A true CN112776736A (en) 2021-05-11

Family

ID=75748436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911088930.6A Pending CN112776736A (en) 2019-11-08 2019-11-08 Privacy protection configuration/implementation method/system, storage medium and vehicle terminal

Country Status (1)

Country Link
CN (1) CN112776736A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013114383A (en) * 2011-11-28 2013-06-10 Denso Corp Privacy protection method, device for vehicle, communication system for vehicle and portable terminal
CN103661243A (en) * 2012-09-18 2014-03-26 上海通用汽车有限公司 Method and system for managing pilot modes of vehicles
CN104343316A (en) * 2013-07-25 2015-02-11 现代摩比斯株式会社 A vehicle safe box device applying NFC and a running method thereof
CN106604234A (en) * 2017-02-15 2017-04-26 赵立 Smart mobile phone-based parking peccancy relevant car moving alerting method
CN207340192U (en) * 2017-10-27 2018-05-08 安徽江淮汽车集团股份有限公司 In a kind of generation, drives pattern auxiliary system
CN108023943A (en) * 2017-11-23 2018-05-11 李党 APP controls Vehicular system
CN108173820A (en) * 2017-12-15 2018-06-15 蔚来汽车有限公司 Vehicle authorization method and system based on particular account
CN108749765A (en) * 2018-06-07 2018-11-06 爱驰汽车有限公司 Vehicular intelligent unlocking method, system, equipment and storage medium
CN109249896A (en) * 2017-07-13 2019-01-22 上海擎感智能科技有限公司 A kind of control method and device of automobile, storage medium, terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013114383A (en) * 2011-11-28 2013-06-10 Denso Corp Privacy protection method, device for vehicle, communication system for vehicle and portable terminal
CN103661243A (en) * 2012-09-18 2014-03-26 上海通用汽车有限公司 Method and system for managing pilot modes of vehicles
CN104343316A (en) * 2013-07-25 2015-02-11 现代摩比斯株式会社 A vehicle safe box device applying NFC and a running method thereof
CN106604234A (en) * 2017-02-15 2017-04-26 赵立 Smart mobile phone-based parking peccancy relevant car moving alerting method
CN109249896A (en) * 2017-07-13 2019-01-22 上海擎感智能科技有限公司 A kind of control method and device of automobile, storage medium, terminal
CN207340192U (en) * 2017-10-27 2018-05-08 安徽江淮汽车集团股份有限公司 In a kind of generation, drives pattern auxiliary system
CN108023943A (en) * 2017-11-23 2018-05-11 李党 APP controls Vehicular system
CN108173820A (en) * 2017-12-15 2018-06-15 蔚来汽车有限公司 Vehicle authorization method and system based on particular account
CN108749765A (en) * 2018-06-07 2018-11-06 爱驰汽车有限公司 Vehicular intelligent unlocking method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
US20200193751A1 (en) Key information management device, key information management method, and non-transitory computer-readable recording medium
CN106921647B (en) Automobile management system and method
US10875499B2 (en) Vehicle occupant authentication system
US8055032B2 (en) Digital camera with fingerprint identification function
WO2016070101A2 (en) Automatic connected vehicle subsequent owner enrollment process
US20200079320A1 (en) Biometric authentication and vehicle function control based on a vehicle operation pattern
EP3477979A1 (en) Service support device, service support method, and non-transitory computer-readable recording medium
US20160347282A1 (en) Keyless handoff control
CN111490966A (en) Processing method and device of access control policy and computer readable storage medium
US20200353893A1 (en) Secure temporary access for portions of remotely operable vehicles
CN110232608B (en) Reservation management system, reservation management method, and computer-readable storage medium
CN112776736A (en) Privacy protection configuration/implementation method/system, storage medium and vehicle terminal
CN106254942A (en) A kind of control the method for television system, television system and mobile terminal
CN110239486A (en) Unlocking method, system, computer readable storage medium and the terminal of automobile
CN111049802A (en) Non-inductive login method, system, storage medium and vehicle terminal
US11443313B2 (en) Methods and systems for authorizing a real-time transaction with a third party platform
CN106911671A (en) The long-range control method and system of mobile phone control vehicle
Saufi et al. FoRent: vehicle forensics for car rental system
CN109325153A (en) Storing approaches to IM, electronic equipment and computer-readable deposit medium
CN109063435A (en) Vehicle functions permission unlocking method and device
DE102012209466A1 (en) SYSTEM FOR RECOVERY OF A LOCKING CODE
KR20190032581A (en) A method and key device for operating at least one function of an automobile by means of a portable key device
JP6941132B2 (en) Input information management system
US11539714B2 (en) Assigning categories for messages and symmetric key per category to localize the impact in case of key compromise
CN110766840A (en) Access control password setting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 201822 No.208, building 4, no.1411, Yecheng Road, Jiading Industrial Zone, Jiading District, Shanghai

Applicant after: Botai vehicle networking technology (Shanghai) Co.,Ltd.

Address before: 201822 No.208, building 4, no.1411, Yecheng Road, Jiading Industrial Zone, Jiading District, Shanghai

Applicant before: SHANGHAI PATEO ELECTRONIC EQUIPMENT MANUFACTURING Co.,Ltd.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210511

WD01 Invention patent application deemed withdrawn after publication