CN113313543A - Vehicle control method, server, and vehicle system - Google Patents

Vehicle control method, server, and vehicle system Download PDF

Info

Publication number
CN113313543A
CN113313543A CN202010123892.XA CN202010123892A CN113313543A CN 113313543 A CN113313543 A CN 113313543A CN 202010123892 A CN202010123892 A CN 202010123892A CN 113313543 A CN113313543 A CN 113313543A
Authority
CN
China
Prior art keywords
vehicle
user
image information
biometric image
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010123892.XA
Other languages
Chinese (zh)
Inventor
李巍
孙明娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Volvo Car Corp
Original Assignee
Volvo Car Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Volvo Car Corp filed Critical Volvo Car Corp
Priority to CN202010123892.XA priority Critical patent/CN113313543A/en
Publication of CN113313543A publication Critical patent/CN113313543A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry
    • B60R25/252Fingerprint recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application provides a vehicle control method, a server and a vehicle system. The vehicle is configured to be unlocked using the bio-identifiable image information, the vehicle control method includes: receiving a vehicle using request of a first user for using the vehicle and a vehicle identification of the vehicle; determining a second user according to the vehicle identification and sending the vehicle using request to the second user; receiving the use authentication of the vehicle using request allowed by the second user; transmitting the first user's biometric image information to the vehicle based on the usage authentication to enable the first user to unlock the vehicle by matching the first user's biometric image information in the vehicle. The vehicle control method, the server and the vehicle system efficiently and safely achieve the purpose of sharing the vehicle.

Description

Vehicle control method, server, and vehicle system
Technical Field
The invention relates to the technical field of vehicles, in particular to a vehicle control method, a server and a vehicle system.
Background
Today, shared economy is spreading worldwide, and shared vehicles (e.g., shared motor vehicles such as shared cars, shared electric vehicles, and shared bicycles, etc.) are also rapidly developing as one of the important branches of shared economy. In order to simplify the cumbersome procedure that users face when requesting and allocating shared vehicle use rights, various virtual keys capable of replacing the physical keys of the vehicle have been studied so that users holding the virtual keys can temporarily unlock the vehicle under prescribed conditions. However, as the virtual key can also be used to unlock the vehicle, how to efficiently and safely share the vehicle using the virtual key becomes a problem.
Disclosure of Invention
An object of the present invention is to provide an efficient and safe vehicle control method, server, and vehicle system.
To this end, the present application provides in one aspect thereof a vehicle control method, the vehicle being configured to be unlocked by using bio-identifiable image information, the method including:
receiving a vehicle using request of a first user for using the vehicle and a vehicle identification of the vehicle;
determining a second user according to the vehicle identification and sending the vehicle using request to the second user;
receiving the use authentication of the vehicle using request allowed by the second user;
transmitting the first user's biometric image information to the vehicle based on the usage authentication to enable the first user to unlock the vehicle by matching the first user's biometric image information in the vehicle.
According to an alternative embodiment, the first user's biometric image information includes image information corresponding to at least one of a facial feature and a fingerprint of the first user.
According to an alternative embodiment, the biometric image information is encrypted.
According to an alternative embodiment, the usage authentication includes a car passing condition including at least one of a car passing period, a car passing zone, and a car returning period during which the second user allows the vehicle usage right to be passed.
According to an alternative embodiment, the vehicle using request includes a vehicle using request condition, the vehicle using request condition includes at least one of a vehicle using period, a vehicle using region and a vehicle returning period, in which the first user requests to use the vehicle, and optionally, the vehicle using yielding condition can be different from the vehicle using request condition.
According to an alternative embodiment, the first user can unlock the vehicle by matching the biometric image information of the first user in the vehicle only if the vehicle yielding condition is met.
According to an alternative embodiment, a shared vehicle network is employed, wherein members of the shared vehicle network are able to select a shared vehicle available for requesting use, wherein a first user is required to participate in the shared vehicle network via the first user's biometric image information, and a second user is required to participate in the shared vehicle network via the second user's biometric image information and the second user's vehicle.
According to an alternative embodiment, a shared vehicle sub-network is employed, members of the shared vehicle sub-network being able to select a shared vehicle available for requesting use, a first user being required to participate in the shared vehicle network via the first user's biometric image information and the first user's vehicle, and a second user being required to participate in the shared vehicle network via the second user's biometric image information and the second user's vehicle.
According to an alternative embodiment, a priority identification of the biometric image information of the first user is transmitted to the vehicle on the basis of the usage authentication, wherein the biometric image information of the second user is stored in the vehicle, during the period in which the first user can unlock the vehicle by matching the biometric image information of the first user in the vehicle, when the priority identification is high, the second user cannot unlock the vehicle by matching the biometric image information of the second user in the vehicle, and when the priority identification is low, the second user can still unlock the vehicle by matching the biometric image information of the second user in the vehicle.
The present application provides, in another aspect thereof, a server, including: a memory for storing executable instructions; and the processor operates the server to execute the vehicle control method according to the control of the executable instruction.
The present application provides, in yet another aspect thereof, a vehicle system, including: the server described above; a client configured to send at least one of a vehicle use request and a use authentication; and a vehicle configured to be unlocked using the bio-identifiable image information.
The vehicle control method can reliably confirm the actual identity of the user requesting the vehicle use right, prevent people except the user requesting the vehicle use right, particularly people without the vehicle driving ability from unlocking the vehicle, and ensure the traffic safety; meanwhile, the vehicle owners can remotely and operatively give away the vehicle use right to users requesting the vehicle use right, so that more vehicle owners are willing to deliver own vehicles to a shared vehicle market, the utilization efficiency of the vehicles is improved, and the vehicle management system is energy-saving and environment-friendly; further, the identity of the driver can be confirmed more easily, and the person in charge can be confirmed in case of need, for example, a traffic accident or a vehicle damage. According to the vehicle control method, the privacy of the user can be better protected, the identity information of the user cannot be sent to the vehicle under the condition of normal vehicle use, and the biological identifiable image information of the user is encrypted in the transmission process.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The foregoing and other aspects of the present application will be more fully understood from the following detailed description, taken with reference to the accompanying drawings, in which:
fig. 1 is an exemplary block diagram of a hardware configuration for implementing a vehicle system according to an embodiment of the present application.
Fig. 2 is a flowchart of a vehicle control method according to an embodiment of the present application.
Fig. 3 is a first exemplary block diagram for implementing an unlocking device of a vehicle system according to an embodiment of the present application.
Fig. 4 is a second exemplary block diagram for implementing an unlocking device of a vehicle system according to an embodiment of the present application.
Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
Fig. 1 is an exemplary block diagram of a hardware configuration for implementing a vehicle system according to an embodiment of the present application. As shown in fig. 1, the vehicle system 100 includes a server 1000, a client 2000, a vehicle 3000, and a network 4000.
The server 1000 is a service point that provides processing, databases, and communications facilities. The server 1000 may be a unitary server or a distributed server across multiple computers or computer data centers. The servers may be of various types, such as, but not limited to, web servers, news servers, mail servers, message servers, advertisement servers, file servers, application servers, interaction servers, database servers, or proxy servers. In some embodiments, each server may include hardware, software, or embedded logic components or a combination of two or more such components for performing the appropriate functions supported or implemented by the server. For example, a server, such as a blade server, a cloud server, etc., or may be a server group consisting of a plurality of servers, which may include one or more of the above types of servers, etc.
In one example, the server 1000 may be as shown in fig. 1, including a processor 1100, a memory 1200, an interface device 1300, a communication device 1400, a display device 1500, an input device 1600. Although the server may also include speakers, microphones, etc., these components are not relevant to the present invention and are omitted here.
The processor 1100 may be, for example, a central processing unit CPU, a microprocessor MCU, or the like. The memory 1200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 1300 includes, for example, a USB interface, a serial interface, an infrared interface, and the like. Communication device 1400 is capable of wired or wireless communication, for example. The display device 1500 is, for example, a liquid crystal display, an LED display touch panel, or the like. The input device 1600 may include, for example, a touch screen, a keyboard, and the like.
In the present embodiment, the client 2000 is an electronic device having a communication function and a service processing function. The client 2000 may be a mobile terminal, such as a mobile phone, a laptop, a tablet, a palmtop, etc. In one example, the client 2000 is a device that performs control operations on the vehicle 3000, for example, a mobile phone installed with an Application (APP) that supports operation and control of the vehicle.
As shown in fig. 1, the client 2000 may include a processor 2100, a memory 2200, an interface device 2300, a communication device 2400, a display device 2500, an input device 2600, an output device 2700, a camera device 2800, and the like. The processor 2100 may be a central processing unit CPU, a microprocessor MCU, or the like. The memory 2200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 2300 includes, for example, a USB interface, a headphone interface, and the like. Communication device 2400 is capable of wired or wireless communication, for example. The display device 2500 is, for example, a liquid crystal display panel, a touch panel, or the like. The input device 2600 may include, for example, a touch screen, a keyboard, or a microphone. The output device 2700 is, for example, a camera.
Vehicle 3000 is any vehicle that can give access to different users for shared use on a time-shared or case-by-case basis, e.g., shared motor vehicles such as shared cars, shared electric vehicles, and shared bicycles, shared mopeds, etc.
As shown in fig. 1, vehicle 3000 may include a processor 3100, a memory 3200, an interface device 3300, a communication device 3400, an output device 3500, an input device 3600, a positioning device 3700, an unlocking device 3800, and so forth. The processor 3100 may be a central processing unit CPU, a microprocessor MCU, or the like. The memory 3200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface 3300 includes, for example, a USB interface, a headphone interface, and the like.
The communication device 3400 can perform wired or wireless communication, for example. The output device 3500 may be, for example, a device that outputs a signal, may be a display device such as a liquid crystal display panel or a touch panel, or may be a speaker or the like that outputs voice information or the like. The input device 3600 may include, for example, a touch panel, a keyboard, or the like, and may input voice information through a microphone. The positioning device 3700 is used to provide positioning function, and may be, for example, a GPS positioning module, a beidou positioning module, etc. The unlocking device 3800 is configured to unlock the vehicle under certain conditions, which will be described in detail below.
The network 4000 may be a wireless communication network or a wired communication network, and may be a local area network or a wide area network. In the article control system shown in fig. 1, a vehicle 3000 and a server 1000, and a client 2000 and a server 1000 can communicate with each other through a network 4000. The vehicle 3000 may be the same as the server 1000, and the network 4000 through which the client 2000 communicates with the server 1000 may be different from each other.
It should be understood that although fig. 1 shows only one server 1000, client 2000, vehicle 3000, it is not meant to limit the corresponding number, and multiple servers 1000, clients 2000, vehicles 3000 may be included in the vehicle system 100.
Taking vehicle 3000 as an example of a shared motor vehicle, server 1000 is used to provide all the functions necessary to support control of the shared motor vehicle. The client 2000 may be a cell phone with a shared vehicle control application installed thereon, which may assist the user in controlling the vehicle 3000, and so on.
The vehicle system 100 shown in FIG. 1 is illustrative only and is not intended to limit the invention, its application, or uses in any way.
In an embodiment of the present invention, the memory 1200 of the server 1000 is used for storing instructions for controlling the processor 1100 to operate so as to execute the vehicle control method provided by the embodiment of the present invention.
Although a number of devices are shown in fig. 1 for server 1000, the present invention may relate to only some of the devices, for example, server 1000 may relate to only memory 1200 and processor 1100.
In an embodiment of the present invention, the memory 2200 of the client 2000 is configured to store instructions for controlling the processor 2100 to operate the client 2000 to execute the vehicle control method according to the embodiment of the present invention.
Although a number of devices are shown in fig. 1 for client 2000, the present invention may relate to only some of the devices, for example, client 2000 may relate to only memory 2200 and processor 2100.
In an embodiment of the present invention, the memory 3200 of the vehicle 3000 is used for storing instructions for controlling the processor 3100 to operate the vehicle 3000 (in particular, the unlocking device 3800) to execute the vehicle control method provided by the embodiment of the present invention.
Although a plurality of devices are shown for the vehicle 3000 in fig. 1, the present invention may relate only to some of the devices, for example, the client 2000 relates only to the memory 3200 and the processor 3100.
In the above description, the skilled person will be able to design instructions in accordance with the disclosed solution. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
Fig. 2 is a flowchart of a vehicle control method according to an embodiment of the present application. In the present embodiment, a vehicle control method is provided. The vehicle is a transportation device, for example, a motor vehicle such as an automobile or an electric vehicle, which is put on the market for different users to acquire the use right in a time-sharing or time-sharing mode or the like.
The vehicle is capable of being unlocked using the biometric image information, wherein the vehicle being unlocked represents the door being capable of being opened and the vehicle being capable of being actuated. The biometric image information includes information corresponding to facial features and fingerprints. Currently, face or fingerprint recognition technology has been widely used for authentication and identification, and thus a detailed description of this technology is omitted here.
The real name of ownership of a vehicle is subject to a particular owner of the vehicle, which may be an individual or a company, and a single individual or company as the owner of the vehicle may have ownership of one or more vehicles.
In the embodiment, the vehicle control method is implemented by a server, which may be configured to have various suitable entity forms, for example, may be the server 1000.
As shown in fig. 2, the vehicle control method includes steps S100 to S160.
In step S100, a first user request to use a car using request of the vehicle and a vehicle identification of the vehicle are received.
The first client is subordinate to the first user in real name, and the first user can send the vehicle using request through the first client. The first user first registers and/or registers with the shared vehicle application through the first client to participate in the shared vehicle network built in the shared vehicle application. In one embodiment, as part of the registration and/or enrollment, the first user is asked to provide actual identification information, including identification card photos, driver's license photos, identification number information, etc., including identification number, driver's license number, etc., which are uploaded to the server for verification of the first user's identity and driving qualifications. Additionally, the first user is also required to selectively provide voluntary disclosure information related to the skill and credit of the user, including, for example, the user's occupation, employment status (e.g., full time, part time, or unemployed), driving age, frequency of driving the vehicle, whether or not a traffic accident has been experienced, whether or not there is history of traffic offences, whether or not insurance was purchased, the kind of insurance purchased, and the like, which is uploaded to the server along with the identity information for use in evaluating the first user's driving qualification if necessary. Optionally, the voluntary disclosure information of the first user is encrypted and then uploaded to the server. At the same time, the first user is also required to provide biometric image information of the first user, e.g., information corresponding to facial features or fingerprints. The first user's biometric image information may be obtained live by a camera device or fingerprint obtaining device of the first client, or may be retrieved by allowing the shared vehicle application to access other applications of the first user (e.g., WeChat, microblog, Payment treasures, etc.) that have been stored in other applications of the first client. Optionally, the first user's biometric image information is encrypted and then uploaded to the server, and the server does not decrypt the first user's biometric image information to ensure the security of the first user's private information.
After registration and/or registration, the first user may access the shared vehicle application by logging into the shared vehicle application to select a vehicle available for requested use (i.e., driving). The vehicle available for use on request can be located based on a Global Positioning System (GPS) to provide the first user with convenient and intuitive options. Each vehicle includes a unique vehicle identification, which may alternatively be the vehicle's license plate number, vehicle identification code, or other unique vehicle identification for identifying the vehicle. The vehicle identification is further configured for determining an owner (i.e., a second user) of the vehicle and a second client affiliated with the owner of the vehicle with a real name. And if the first user selects a target vehicle through a shared vehicle application program of the first client based on the car using time period, the car using region and the car using model number expected by the first user, the first client sends a car using request of the first user for using the vehicle to the server.
In an alternative embodiment, the shared vehicle application may be configured to ask the first user if the first user owns the vehicle property right when the first user registers and/or registers, and to invite the first user to further register and/or register as the owner of the vehicle providing the shared vehicle if the first user owns the vehicle property right. If the first user desires to register and/or register as an owner of the vehicle providing the shared vehicle, the first user needs to provide a document of proof of possession of the corresponding vehicle ownership and the first user's vehicle will be assigned a vehicle identification.
In step S120, a second user is determined according to the vehicle identifier and the car using request is sent to the second user.
In an optional embodiment, the vehicle using request further includes a vehicle using request condition, and the vehicle using request condition includes a vehicle using time period, a vehicle using region, a vehicle returning time period, a vehicle returning position and the like of the first user requesting to use the vehicle. It should be noted that the returning time period is a time period near the end of the using time period, the first user should drive the vehicle towards the returning position, and if the vehicle is found to be driving away from the returning position according to the positioning of the vehicle, the first user will be reminded. Alternatively, the time period for using the vehicle may be determined according to the distance between the vehicle and the position of returning the vehicle.
In principle, the in-vehicle request may not include the first user's identity information, voluntary disclosure information, and biometric image information, as the first user has already provided relevant information for authenticating identity at the time of enrollment and/or registration with the shared vehicle application. In some cases, however, the owner may prefer to relinquish the right to use his vehicle to a "familiar" person or friend. Thus, in an alternative embodiment, the first user may actively or on demand provide his identity information and/or voluntary disclosure information to the owner of the vehicle. It is contemplated that whether the first user's identity information and/or voluntary disclosure information is included in the vehicle request or provided on the vehicle owner's request may be determined based on the particular application.
In step S140, a usage authentication requested by the second user to allow the vehicle is received.
The second user, i.e. the owner of the vehicle, can decide whether to give the right of use of the vehicle after receiving the request for using the vehicle through the second client. In an optional embodiment, the vehicle-using request may optionally include voluntary disclosure information of the first user in addition to the vehicle-using request condition including the vehicle-using time period, the vehicle-using region, the vehicle-returning time period, the vehicle-returning position, and the like of the first user requesting to use the vehicle, at this time, the vehicle owner may objectively determine whether the vehicle is in a usable state according to the vehicle-using request condition, and further subjectively consider whether to give the right of use of the vehicle according to the voluntary disclosure information of the first user. In the event that the owner of the vehicle is still concerned, provision of identity information of the first user may be required. And if the vehicle usage right is determined to be transferred, the vehicle owner sends the usage authentication allowing the vehicle usage request to the server through the second client. And if the vehicle use right is determined not to be given away, the vehicle owner sends a rejection notice for rejecting the vehicle use request to the server through the second client.
In an alternative embodiment, the usage authentication includes a car passing condition, and the car passing condition includes a car passing period, a car passing region, a car returning period, a car returning position, and the like, in which the second user allows the vehicle usage right to be passed. The vehicle passing condition may be the same as or different from the vehicle request condition, in other words, the vehicle passing condition may be slightly different from the vehicle request condition within a specified range, so as to balance the vehicle passing requirement of the vehicle owner and the vehicle using requirement of the first user.
In this manner, a second user, the owner of the vehicle, can be remotely operable to temporarily relinquish the right of use of the vehicle to other users requesting the vehicle without the need for on-site delivery and recovery of the vehicle's physical key.
In step S160, the first user' S biometric image information is transmitted to the vehicle based on the usage authentication, so that the first user can unlock the vehicle by matching the biometric image information of the first user in the vehicle.
The server transmits the first user's biometric image information to the vehicle based on the vehicle owner's authentication for use, i.e., the server transmits the first user's biometric image information in memory to memory in the vehicle through the communication device, the first user having uploaded the first user's biometric image information into the server's memory at the time of registration and/or registration to the shared vehicle application. In normal vehicle use, the identity information of the first user, such as an identification card photograph, a driver's license photograph, etc., is not transmitted to the vehicle. The first user's biometric image information is also used only to unlock the vehicle.
After the server sends the first user's biometric image information to the vehicle, the vehicle's unlocking device will perform vehicle unlocking verification on the first user when the first user approaches the vehicle or activates the unlocking device of the vehicle.
Fig. 3 is a first exemplary block diagram for implementing an unlocking device of a vehicle system according to an embodiment of the present application, which, as shown in fig. 3, includes: a facial sensing component 3802 configured for sensing and capturing facial features of a desired unlock vehicle; and a face comparison component 3804 configured to compare the facial features sensed and captured by the face sensing component 3802 with historical facial information in memory. At this time, the memory in the vehicle has stored therein historical facial information of the first user, the historical facial information including information relating to frontal facial features of the first user within the nose, eyes, ears, and the like. When the face sensing component 3802 is activated, facial features of the first user currently within the detectable range of the face sensing component 3802 will be sensed and captured. Subsequently, the face comparison section 3804 compares the facial features of the first user collected by the face sensing section 3802 with historical face information stored in a memory in the vehicle. When the facial features sensed and collected by the face sensing part 3802 match the historical face information stored in the memory in the vehicle, that is, when the similarity between the facial features of the vehicle desired to be unlocked and the historical face information stored in the memory is greater than or equal to the similarity threshold value, the vehicle is unlocked.
Fig. 4 is a second exemplary block diagram for implementing an unlocking device of a vehicle system according to an embodiment of the present application, which includes, as shown in fig. 4: a fingerprint scanner 3812 configured to sense and acquire a fingerprint of a desired unlock vehicle; and a fingerprint comparison component 3814 configured to compare the fingerprint sensed and acquired by the fingerprint scanner with historical fingerprint information in the memory. Similar to the embodiments of the face sensing component 3802 and the face comparison component 3804, the vehicle unlocks when the fingerprint sensed and captured by the fingerprint scanner 3812 matches the historical fingerprint information stored in the memory in the vehicle.
As shown in fig. 3 and 4, the unlocking apparatus of the vehicle further includes vehicle unlocking parts 3806, 3816, and the vehicle unlocking parts 3806, 3816 are configured to unlock the vehicle when the face comparing part 3804 or the fingerprint comparing part 3812 determines that the information of the first user matches. The vehicle unlocking parts 3806, 3816 are connected to the face comparing part 3804 or the fingerprint comparing part 3812, and the vehicle unlocked by the vehicle unlocking parts 3806, 3816 can perform an operation specified by the first user, for example, opening/closing (locking) of the vehicle door, turning on/off of the vehicle power supply, or starting/stopping of the vehicle engine, or the like, so that the first user can open the vehicle door, start, and operate the vehicle.
As shown in fig. 3 and 4, the unlocking apparatus of the vehicle further includes alarm parts 3808, 3818, the alarm parts 3808, 3818 being connected to the face comparison part 3804 or the fingerprint comparison part 3812, the alarm parts 3808, 3818 giving an alarm when the face comparison part 3804 or the fingerprint comparison part 3812 continuously identifies a user who is not matched, i.e., a user who is not authenticated. For example, the first user may sometimes continue to request use of the vehicle, either intentionally or unintentionally, without complying with the vehicle yielding condition, at which time the first user's biometric image information has been invalid for unlocking the vehicle.
Thus, in an alternative embodiment, the first user can unlock the vehicle by matching the first user's biometric image information in the vehicle only if the vehicle yielding condition is met. After the vehicle passing condition is not met, the first user's biometric image information stored in the vehicle may be deleted or invalidated to wait for the server to send new information related to controlling the vehicle.
In an alternative embodiment, historical information of the first user using the vehicle may be recorded, including the time the first user unlocked the vehicle, the first user's driving trajectory of the vehicle, and the maximum speed at which the vehicle was driven, among other things, for use in maintaining the vehicle and providing evidence if needed.
In an alternative embodiment, a shared vehicle network is provided in the vehicle control method of the present application. As described above, the first user first registers and/or registers with the shared vehicle application through the first client to participate in the shared vehicle network built in the shared vehicle application. Members of the shared vehicle network join the shared vehicle network in the absence of a vehicle member when they do not provide their own vehicle as a shared vehicle available for other members to request, and select a vehicle available for request in the shared vehicle application. Meanwhile, when the member of the shared vehicle network provides the own vehicle as the shared vehicle available for other members to request, the member participates in the shared vehicle network in the qualification of the member of the vehicle, and selects the vehicle available for the request in the shared vehicle application program.
The shared vehicle application may be configured to ask the first user whether the first user owns the vehicle property right at the time of registration and/or registration of the first user, and to invite the first user to further register as a member of the vehicle having the right to relinquish the vehicle under certain conditions, the member of the vehicle having the right to relinquish the vehicle being free to select in advance a period and a region where the vehicle can relinquish the right to use, and preferably, the member of the vehicle having the right to return the vehicle being free to select in advance a location of the vehicle.
In some cases, the member with the car prefers to give the right to use the vehicle to other members with the car to avoid the worry of using the vehicle by a novice driving. Thus, in an alternative embodiment, a shared vehicle sub-network exists in the shared vehicle network, in which a more targeted shared vehicle service is provided only among the vehicle-owned members. Members employing the shared vehicle sub-network are all required to participate in the shared vehicle network through the biometric image information and the own vehicle.
Typically, the second user is the owner of the vehicle, and the second user's biometric image information, e.g., information corresponding to the second user's facial features or fingerprints, has been stored in the vehicle's memory, and the second user can unlock the vehicle by matching the second user's biometric image information in the vehicle. In particular, when a company has the right of use of one or more vehicles as a vehicle owner, the biometric image information of one or more employees under the company may be stored in the memory of the corresponding one or more vehicles, respectively, so that the one or more employees can unlock the one or more vehicles by matching the biometric image information in the one or more vehicles corresponding thereto. In other words, the employees under the company can have the right of use of the one or more vehicles as a representative of the company.
When the owner does not give the right to use the vehicle, the owner can unlock the vehicle directly through the biological recognizable image information of the owner, so that the inconvenience caused by forgetting a physical key of the vehicle is avoided.
And during the first user being able to unlock the vehicle by matching the first user's biometric image information in the vehicle, the second user is unable to unlock the vehicle by matching the second user's biometric image information in the vehicle. Since the owner of the vehicle should avoid his own opportunity to operate the vehicle after he/she decides to give the right to use the vehicle.
In some cases, the owner of the vehicle may wish to have his or her own friends or relatives in common with himself or herself with the right to use the vehicle, at which point, during the time that a first user can unlock the vehicle by matching biometric image information of a first user in the vehicle, a second user can still unlock the vehicle by matching biometric image information of a second user in the vehicle. As such, there will be multiple one accounts in the memory in the vehicle that provide biometric image information of different users for comparing the identity of the user requesting use of the vehicle and unlocking the vehicle. Therefore, different priority levels need to be set for different accounts. When the server transmits the usage authentication, a priority level identification of the first user's biometric image information is also transmitted to the vehicle, and during the period when the first user can unlock the vehicle by matching the first user's biometric image information in the vehicle, when the priority level identification is high, the second user cannot unlock the vehicle by matching the second user's biometric image information in the vehicle, and when the priority level identification is low, the second user can still unlock the vehicle by matching the second user's biometric image information in the vehicle. In other words, the single vehicle can be unlocked by one or more users through the biometric image information.
Although the present application has been described herein with reference to particular embodiments, the scope of the present application is not intended to be limited to the details shown. Various modifications may be made to these details without departing from the underlying principles of the application.

Claims (11)

1. A vehicle control method, the vehicle being configured to be unlocked using bio-identifiable image information, the method comprising:
receiving a vehicle using request of a first user for using the vehicle and a vehicle identification of the vehicle;
determining a second user according to the vehicle identification and sending the vehicle using request to the second user;
receiving the use authentication of the vehicle using request allowed by the second user;
transmitting the first user's biometric image information to the vehicle based on the usage authentication to enable the first user to unlock the vehicle by matching the first user's biometric image information in the vehicle.
2. The vehicle control method according to claim 1,
the first user's biometric image information includes image information corresponding to at least one of a facial feature and a fingerprint of the first user.
3. The vehicle control method according to claim 1 or 2, wherein,
the biometric image information is encrypted.
4. The vehicle control method according to any one of claims 1 to 3,
the usage authentication includes a vehicle use yielding condition including at least one of a vehicle yielding period, a vehicle yielding region, and a vehicle returning period during which the second user allows the vehicle usage right to be yielded.
5. The vehicle control method according to claim 4,
the vehicle using request comprises a vehicle using request condition, the vehicle using request condition comprises at least one of a vehicle using time period, a vehicle using region and a vehicle returning time period of the first user requesting to use the vehicle,
alternatively, the in-vehicle yielding condition can be different from the in-vehicle request condition.
6. The vehicle control method according to claim 4 or 5, wherein,
only if the vehicle yielding condition is met, the first user can unlock the vehicle by matching the first user's biometric image information in the vehicle.
7. The vehicle control method according to any one of claims 1 to 6, comprising:
with the shared vehicle network, members in the shared vehicle network can select a shared vehicle available for request, the first user is required to participate in the shared vehicle network through the first user's biometric image information, and the second user is required to participate in the shared vehicle network through the second user's biometric image information and the second user's vehicle.
8. The vehicle control method according to any one of claims 1 to 7, comprising:
with the shared vehicle sub-network, members of the shared vehicle sub-network are able to select a shared vehicle available for request, a first user is required to participate in the shared vehicle network through the first user's biometric image information and the first user's vehicle, and a second user is required to participate in the shared vehicle network through the second user's biometric image information and the second user's vehicle.
9. The vehicle control method according to any one of claims 1 to 8, comprising:
transmitting a priority level identification of the first user's biometric image information to the vehicle based on the usage authentication, wherein biometric image information of a second user is stored in the vehicle, during which the first user is able to unlock the vehicle by matching the biometric image information of the first user in the vehicle, the second user is unable to unlock the vehicle by matching the biometric image information of the second user in the vehicle when the priority level identification is high, and the second user is still able to unlock the vehicle by matching the biometric image information of the second user in the vehicle when the priority level identification is low.
10. A server, comprising:
a memory for storing executable instructions;
a processor, under control of the executable instructions, operating the server to perform the vehicle control method of any one of claims 1-9.
11. A vehicle system, comprising:
the server of claim 10;
a client configured to send at least one of a vehicle use request and a use authentication; and
a vehicle configured to be unlocked using the bio-identifiable image information.
CN202010123892.XA 2020-02-27 2020-02-27 Vehicle control method, server, and vehicle system Pending CN113313543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010123892.XA CN113313543A (en) 2020-02-27 2020-02-27 Vehicle control method, server, and vehicle system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010123892.XA CN113313543A (en) 2020-02-27 2020-02-27 Vehicle control method, server, and vehicle system

Publications (1)

Publication Number Publication Date
CN113313543A true CN113313543A (en) 2021-08-27

Family

ID=77370294

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010123892.XA Pending CN113313543A (en) 2020-02-27 2020-02-27 Vehicle control method, server, and vehicle system

Country Status (1)

Country Link
CN (1) CN113313543A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105480192A (en) * 2015-12-08 2016-04-13 智车优行科技(北京)有限公司 Automobile use right sharing device, control device and intelligent automobile
CN107564191A (en) * 2017-08-30 2018-01-09 北京新能源汽车股份有限公司 Share the control system and control method of vehicle
JP2019031874A (en) * 2017-08-09 2019-02-28 トヨタ自動車株式会社 Unlocking control system
CN110490466A (en) * 2018-08-22 2019-11-22 泰康保险集团股份有限公司 For sharing method, apparatus, storage medium and the electronic equipment of vehicle distribution

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105480192A (en) * 2015-12-08 2016-04-13 智车优行科技(北京)有限公司 Automobile use right sharing device, control device and intelligent automobile
JP2019031874A (en) * 2017-08-09 2019-02-28 トヨタ自動車株式会社 Unlocking control system
CN107564191A (en) * 2017-08-30 2018-01-09 北京新能源汽车股份有限公司 Share the control system and control method of vehicle
CN110490466A (en) * 2018-08-22 2019-11-22 泰康保险集团股份有限公司 For sharing method, apparatus, storage medium and the electronic equipment of vehicle distribution

Similar Documents

Publication Publication Date Title
US11444933B2 (en) Onboard vehicle digital identification transmission
US10875499B2 (en) Vehicle occupant authentication system
JP2019523513A (en) Communication flow for confirmation and ID check
US11564088B2 (en) Vehicular communication of emergency information
US10032042B1 (en) Digital identification enrollment
US9135763B2 (en) System and method for wireless state identification
US20170334395A1 (en) Smart key generating device, automobile, and method for controlling the automobile by using the smart key
WO2014126987A1 (en) Authentication to a first device using a second device
CN111460413B (en) Identity recognition system, identity recognition method, identity recognition device, electronic equipment and storage medium
US10095853B2 (en) Methods and systems for ensuring that an individual is authorized to conduct an activity
EP3503608B1 (en) Authentication system and authentication device
CN112005231A (en) Biometric authentication method, system and computer program
CN108900536B (en) Authentication method, authentication device, computer equipment and storage medium
US9838468B2 (en) System and method for directing entrants at a checkpoint using a mobile device
EP3142079B1 (en) Identity assurance
KR20220028836A (en) Method for driver's license authentication service using decentralized identifier based on blockchain networks and user device executing driver's license authentication service
CN113313543A (en) Vehicle control method, server, and vehicle system
JP2010282446A (en) System, management server, and method for the system
JP3581092B2 (en) Method for driver authentication, system thereof, and recording medium thereof
CN111355586A (en) Decentralized cloud-based authentication and associated transactions for vehicles
CN111222113A (en) Authentication method, system and authentication platform for using rented vehicles
US11783626B2 (en) Biometric gallery management using wireless identifiers
JP7239047B1 (en) Authentication system, authentication method, and program
WO2023139972A1 (en) Use management system, use control device, management device, use management method, and program
Gala et al. Electric Bike Security: Biometric & GPS Integration for Intrusion Detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210827