CN114548131A - Battery positioning method, target vehicle, server and system - Google Patents
Battery positioning method, target vehicle, server and system Download PDFInfo
- Publication number
- CN114548131A CN114548131A CN202210093093.1A CN202210093093A CN114548131A CN 114548131 A CN114548131 A CN 114548131A CN 202210093093 A CN202210093093 A CN 202210093093A CN 114548131 A CN114548131 A CN 114548131A
- Authority
- CN
- China
- Prior art keywords
- battery
- radio frequency
- stolen
- server
- position information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 63
- 238000004590 computer program Methods 0.000 claims description 29
- 238000012544 monitoring process Methods 0.000 claims description 23
- 238000004891 communication Methods 0.000 description 22
- 238000010586 diagram Methods 0.000 description 17
- 230000006870 function Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 239000004973 liquid crystal related substance Substances 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S19/00—Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
- G01S19/01—Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
- G01S19/13—Receivers
- G01S19/14—Receivers specially adapted for specific applications
- G01S19/16—Anti-theft; Abduction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/16—Information or communication technologies improving the operation of electric vehicles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Electric Propulsion And Braking For Vehicles (AREA)
Abstract
The present disclosure provides a battery positioning method, a target vehicle, a server and a system, wherein the method comprises the following steps: the target vehicle receives a battery identification which is issued by the server and is used for uniquely identifying the stolen battery; the stolen battery is provided with a radio frequency tag, and the radio frequency tag is provided with the battery identifier; starting the radio frequency reader to perform radio frequency scanning to obtain a radio frequency scanning result; and under the condition that the radio frequency scanning result contains the battery identification of the stolen battery, acquiring first position information of the radio frequency scanning result, and uploading the first position information to a server so that the server can position the stolen battery according to the first position information.
Description
Technical Field
The present disclosure relates to the field of battery positioning technology, and more particularly, to a battery positioning method, a target vehicle, a server, and a battery positioning system.
Background
At present, traveling through a shared bicycle becomes a emerging traveling mode in cities, and traveling requirements of urban crowds can be effectively met. Among the shared bicycles, electric bicycles are increasingly favored because they can provide riding power through a driving motor without being provided by a user.
In the operation process of the electric bicycle, the battery is often stolen, so that the assets of the electric bicycle are lost.
Therefore, in a usage scenario of the electric bicycle, it is necessary to provide a battery locating method capable of locating a stolen battery in a case where the battery of the electric bicycle is stolen.
Disclosure of Invention
It is an object of the present disclosure to provide a new solution for locating stolen batteries.
According to a first aspect of the present disclosure, there is provided a battery location method implemented by a target vehicle provided with a radio frequency reader, the method comprising:
receiving a battery identifier which is issued by a server and is used for uniquely identifying a stolen battery; the stolen battery is provided with a radio frequency tag, and the radio frequency tag is internally provided with the battery identifier;
starting the radio frequency reader to perform radio frequency scanning to obtain a radio frequency scanning result;
and under the condition that the radio frequency scanning result contains the battery identification of the stolen battery, acquiring first position information of the radio frequency scanning result, and uploading the first position information to the server so that the server can position the stolen battery according to the first position information.
Optionally, the method further includes:
and when the time length for starting the radio frequency reader to perform radio frequency scanning reaches a set time length and the radio frequency scanning result does not contain the battery identification of the stolen battery, closing the radio frequency reader.
According to a second aspect of the present disclosure, there is provided a battery location method, implemented by a server, the method comprising:
acquiring a battery identifier for uniquely identifying a stolen battery; the stolen battery is internally provided with a radio frequency tag, and the radio frequency tag is internally provided with the battery identification;
determining a vehicle which corresponds to the stolen battery and is provided with a radio frequency reader as a target vehicle;
sending the battery identification of the stolen battery to the target vehicle for radio frequency scanning of the target vehicle, and returning first position information of the target vehicle to the server under the condition that a radio frequency scanning result contains the battery identification of the stolen battery;
and positioning the stolen battery according to the first position information.
Optionally, the method further includes:
acquiring video monitoring data matched with the positioning information of the stolen battery;
and outputting the video monitoring data so that an operator can track the stolen battery according to the video monitoring data.
Optionally, the method further includes:
acquiring the acquisition time of the first position information;
and generating a moving track of the stolen battery according to the first position information and the acquisition time returned by the target vehicles, so as to obtain the video monitoring data according to the moving track.
Optionally, the determining, as a target vehicle, a vehicle provided with a radio frequency reader and corresponding to the stolen battery includes:
acquiring second position information when the stolen battery is stolen;
and determining the vehicle which is provided with the radio frequency reader and corresponds to the stolen battery as the target vehicle according to the second position information.
Optionally, the method further includes:
detecting whether the battery of the electric bicycle is stolen;
and under the condition that the battery theft event of the electric bicycle is detected, taking the battery of the electric bicycle as the stolen battery, and executing the step of acquiring the battery identification for uniquely identifying the stolen battery.
According to a third aspect of the present disclosure, there is provided a target vehicle comprising a master control module and a radio frequency reader, the master control module being configured to: receiving a battery identifier which is issued by a server and is used for uniquely identifying a stolen battery; starting the radio frequency reader to perform radio frequency scanning to obtain a radio frequency scanning result; under the condition that the radio frequency scanning result contains the battery identification of the stolen battery, acquiring first position information of the radio frequency scanning result, and uploading the first position information to the server so that the server can position the stolen battery according to the first position information;
and a radio frequency tag is arranged on the stolen battery, and the battery identification is arranged in the radio frequency tag.
Optionally, the main control module is further configured to turn off the radio frequency reader when the time duration for starting the radio frequency reader to perform radio frequency scanning reaches a set time duration and the radio frequency scanning result does not include the battery identifier of the stolen battery.
According to a fourth aspect of the present disclosure, there is provided a target vehicle comprising a first processor and a first memory for storing an executable first computer program; the first processor is configured to execute the first computer program to implement the method of the first aspect of the present disclosure.
According to a fifth aspect of the present disclosure, there is provided a server comprising a second processor and a second memory for storing an executable second computer program; the second processor is configured to execute the second computer program to implement the method of the second aspect of the present disclosure.
According to a sixth aspect of the present disclosure, there is provided a battery location system comprising a target vehicle according to the third or fourth aspect of the present disclosure and a server according to the fifth aspect of the present disclosure.
Through this disclosed embodiment, send stolen battery's battery identification to the target vehicle that is provided with the radio frequency reader that corresponds with stolen battery by the server, receive this battery identification's the circumstances by the radio frequency reader, start the radio frequency reader and carry out the radio frequency scanning, under the circumstances that contains this stolen battery's battery identification in the radio frequency scanning result, acquire the first position information of self and send to the server, by the stolen battery of server location according to first position information, can make the operation personnel can in time track and retrieve stolen battery, reduce the loss of battery asset. Moreover, a positioning device does not need to be arranged in the battery of the electric bicycle, so that the hardware cost of the battery can be reduced.
Other features of the present disclosure and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a block diagram showing an example of a hardware configuration of a vehicle system that can be used to implement an embodiment of the present disclosure.
Fig. 2 shows a flowchart of a battery location method of a first embodiment of the present disclosure.
Fig. 3 shows a schematic block diagram of a target vehicle of the first embodiment of the present disclosure.
Fig. 4 shows a flowchart of a battery location method of a second embodiment of the present disclosure.
Fig. 5 shows a schematic block diagram of a server of a second embodiment of the present disclosure.
Fig. 6 shows a schematic block diagram of a battery location system of a third embodiment of the present disclosure.
Fig. 7 shows a flowchart of a battery positioning method of a third embodiment of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
< hardware configuration one >
FIG. 1 is a schematic diagram of a vehicle system 100 that may be used to implement embodiments of the present disclosure. The vehicle system 100 may be applied to a battery positioning scenario of a vehicle as a whole.
As shown in fig. 1, the vehicle system 100 includes a server 1000, a user terminal 2000, and a vehicle 3000.
The server 1000 provides a service point for processes, databases, and communications facilities. The server 1000 may be a unitary server, a distributed server across multiple computers, a computer data center, a cloud server, or a cloud-deployed server cluster, etc. The server may be of various types, such as, but not limited to, a web server, a news server, a mail server, a message server, an advertisement server, a file server, an application server, an interaction server, a database server, or a proxy server. In some embodiments, each server may include hardware, software, or embedded logic components or a combination of two or more such components for performing the appropriate functions supported or implemented by the server. For example, a server, such as a blade server, a cloud server, etc., or may be a server group consisting of a plurality of servers, which may include one or more of the above types of servers, etc.
In one embodiment, the server 1000 may be as shown in fig. 1, including a processor 1100, a memory 1200, an interface device 1300, a communication device 1400, a display device 1500, an input device 1600.
Processor 1100 is used to execute computer programs, which may be written in instruction sets of architectures such as x86, Arm, RISC, MIPS, SSE, and the like. The memory 1200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 1300 includes, for example, various bus interfaces such as a serial bus interface (including a USB interface), a parallel bus interface, and the like. Communication device 1400 is capable of wired or wireless communication, for example. The display device 1500 is, for example, a liquid crystal display, an LED display touch panel, or the like. The input device 1600 may include, for example, a touch screen, a keyboard, and the like.
In this embodiment, the memory 1200 of the server 1000 is used for storing a computer program for controlling the processor 1100 to operate to execute the battery positioning method according to the embodiment of the present invention. The skilled person can design the computer program according to the disclosed solution. How the computer program controls the processor to operate is well known in the art and will not be described in detail here.
Although a plurality of devices of the server 1000 are illustrated in fig. 1, the present invention may only relate to some of the devices, for example, the server 1000 only relates to the memory 1200, the processor 1100 and the communication device 1400.
In this embodiment, the user terminal 2000 is, for example, a mobile phone, a portable computer, a tablet computer, a palm computer, a wearable device, or the like.
The user terminal 2000 is installed with a vehicle use application client to achieve the purpose of using a vehicle by operating the vehicle use application client.
As shown in fig. 1, the user terminal 2000 may include a processor 2100, a memory 2200, an interface device 2300, a communication device 2400, a display device 2500, an input device 2600, a speaker 2700, a microphone 2800, and the like.
The processor 2100 is used to execute a computer program, which may be written in an instruction set of an architecture such as x86, Arm, RISC, MIPS, SSE, and so on. The memory 2200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 2300 includes, for example, a USB interface, a headphone interface, and the like. The communication device 2400 can perform wired or wireless communication, for example, the communication device 2400 may include at least one short-range communication module, for example, any module that performs short-range wireless communication based on a short-range wireless communication protocol such as a Hilink protocol, WiFi (IEEE 802.11 protocol), Mesh, bluetooth, ZigBee, Thread, Z-Wave, NFC, UWB, LiFi, and the like, and the communication device 2400 may also include a long-range communication module, for example, any module that performs WLAN, GPRS, 2G/3G/4G/5G long-range communication. The display device 2500 is, for example, a liquid crystal display panel, a touch panel, or the like. The input device 2600 may include, for example, a touch screen, a keyboard, and the like. The user terminal 2000 may output an audio signal through the speaker 2700 and collect an audio signal through the microphone 2800.
In this embodiment, the memory 2200 of the user terminal 2000 is used to store a computer program for controlling the processor 2100 to operate to execute a battery locating method of a vehicle, for example, including: acquiring a unique identifier of a vehicle 3000, forming an unlocking request aiming at a specific vehicle and sending the unlocking request to a server; and performing bill calculation and the like according to the charge settlement notification sent by the server. A skilled person can design a computer program according to the solution disclosed in the present invention. How computer programs control the operation of the processor is well known in the art and will not be described in detail herein.
As shown in fig. 1, the vehicle 3000 may include a processor 3100, a memory 3200, an interface device 3300, a communication device 3400, an output device 3500, an input device 3600, and the like. Processor 3100 is configured to execute a computer program, which may be written in an instruction set of architectures such as x86, Arm, RISC, MIPS, SSE, and the like. The memory 3200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface 3300 includes, for example, a USB interface, a headphone interface, and the like. The communication device 3400 includes at least one communication module, for example, capable of wired or wireless communication, and for example, capable of short-range and long-range communication. The output device 3500 may be, for example, a device that outputs a signal, may be a display device such as a liquid crystal display screen or a touch panel, or may be a speaker or the like that outputs voice information or the like. The input device 3600 may include, for example, a touch device such as a touch panel, a sound sensing device such as a button or a microphone, a pressure sensing device such as a pressure sensor, and the like.
In one example, the vehicle 3000 is any vehicle that can be time-shared or separately authorized to share the usage rights for different users, such as a shared bicycle, a shared moped, a shared electric vehicle, a shared vehicle, and so on. The vehicle 3000 may be a bicycle, a tricycle, an electric scooter, a motorcycle, a four-wheeled passenger vehicle, or the like.
The vehicle 3000 has an identification code for uniquely identifying the corresponding bluetooth device, which may be a two-dimensional code and/or a number, which may be composed of numbers and/or characters.
The user may scan the two-dimensional code on the vehicle 3000 through the client 2000, and then send the two-dimensional code information to the server 1000 to perform an unlocking operation.
The user may also input or recognize a number on the vehicle 3000 through the client 2000, and then send the number information to the server 1000 to perform an unlocking operation.
When the user scans the two-dimensional code or inputs a number on the vehicle 3000 through the client 2000, it is necessary to use functions of the client 2000, such as a flashlight function, a positioning function, a camera function, and the like of the client 2000.
In another example, vehicle 3000 may also be a take-away vehicle for delivering take-away for a user.
In this embodiment, the vehicle 3000 may report its own position information to the server 1000.
In this embodiment, the memory 3200 of the vehicle 3000 is used to store a computer program for controlling the processor 3100 to operate to perform a battery location method according to any of the embodiments of the invention. The skilled person can design the computer program according to the disclosed solution. How the computer program controls the operation of the processor is well known in the art and will not be described in detail here.
The network 4000 may be a wireless communication network or a wired communication network, and may be a local area network or a wide area network. In the vehicle system 100 shown in fig. 1, the vehicle 3000 and the server 1000, and the user terminal 2000 and the server 1000 can communicate with each other through the network 4000. The vehicle 3000 may be the same as the server 1000, or the network 4000 through which the user terminal 2000 communicates with the server 1000 may be different from the server.
It should be understood that although fig. 1 shows only one server 1000, user terminal 2000, vehicle 3000, the number of each is not meant to be limiting, and the vehicle system 100 may include a plurality of servers 1000, a plurality of user terminals 2000, a plurality of vehicles 3000, and the like.
The vehicle system 100 shown in FIG. 1 is illustrative only and is not intended to limit the invention, its application, or uses in any way.
< first embodiment >
< method >
Fig. 2 shows a schematic flow diagram of a battery location method according to an embodiment. The method steps of the present embodiment are performed by a vehicle, such as vehicle 3000 in fig. 1.
In this embodiment, the vehicle may be provided with a radio frequency reader capable of scanning information recorded in the radio frequency tag within a first set distance from the vehicle.
As shown in fig. 2, the battery positioning method of the present embodiment may include the following steps S2100 to S2300:
step S2100, receiving a battery identification which is issued by the server and is used for uniquely identifying the stolen battery.
The stolen battery is provided with a radio frequency tag, and the radio frequency tag is internally provided with a battery identifier of the stolen battery.
In this embodiment, the server may issue the battery identifier of the stolen battery to the target vehicle executing the method of this embodiment, when receiving the information indicating that the battery of the electric bicycle is stolen.
Step S2200, starting the radio frequency reader to perform radio frequency scanning to obtain a radio frequency scanning result.
In this embodiment, the radio frequency reader may be in an off state when the target vehicle does not receive the battery identifier issued by the server, so as to reduce power consumption of the target vehicle.
And under the condition that the target vehicle receives the battery identification sent by the server, the target vehicle is positioned near the stolen position of the stolen battery, and the radio frequency reader is started to carry out radio frequency scanning, so that the information stored in the radio frequency tag of the stolen battery can be scanned.
In the process of starting the radio frequency reader to perform radio frequency scanning, the target vehicle can scan according to a set scanning frequency to obtain a radio frequency scanning result of each scanning. The scanning frequency may be preset according to an application scenario or specific requirements, and for example, the scanning frequency may be 1 time/second.
The rf scanning result may include information stored in all rf tags within a first set distance from the rf reader. The first set distance may be set in advance according to an application scenario or a specific requirement, or may be determined by a radio frequency characteristic of the radio frequency reader itself. In one example, the first set distance may be, for example, 20 meters.
Step S2300, acquiring first location information of the server when the radio frequency scanning result includes the battery identifier of the stolen battery, and uploading the first location information to the server, so that the server locates the stolen battery according to the first location information.
When the radio frequency scanning result obtained by the radio frequency reader performing the radio frequency scanning at any time contains the battery identifier of the stolen battery, it can be determined that the distance between the stolen battery and the radio frequency reader is less than or equal to a first set distance, that is, the stolen battery is located near the target vehicle. Therefore, the location where the target vehicle is scanned to the battery identification of the stolen battery may be the location of the stolen battery.
The first position information may include absolute position information of the target vehicle. The absolute position information may be provided by a positioning device such as a GPS of the target vehicle, for example. The processor of the target vehicle may read the absolute position information acquired by the positioning device according to the position reporting instruction, and use the absolute position information as the first position information.
The first location information may also be relative location information of the target vehicle with respect to a landmark, which may include at least one of a bluetooth device of another vehicle, a bluetooth device mounted to the parking fence, and a radio frequency identification device mounted to the parking fence.
Taking a parking fence installed with a bluetooth device as an example, after entering the parking fence, the target vehicle can establish bluetooth connection with the bluetooth device, and the relative position information may include a received signal strength value reflecting a distance between the target vehicle and the bluetooth device.
The server can locate the stolen battery according to the first position information under the condition that the server receives the first position information, so that an operator can track the stolen battery according to the locating information of the stolen battery.
According to the method, the battery identification of the stolen battery is sent to the target vehicle which is provided with the radio frequency reader and corresponds to the stolen battery by the server, the radio frequency reader is started to carry out radio frequency scanning under the condition that the radio frequency reader receives the battery identification, the first position information of the radio frequency reader is obtained and sent to the server under the condition that the radio frequency scanning result contains the battery identification of the stolen battery, the stolen battery is positioned by the server according to the first position information, operators can timely track and retrieve the stolen battery, and loss of battery assets is reduced. Moreover, a positioning device does not need to be arranged in the battery of the electric bicycle, so that the hardware cost of the battery can be reduced.
In one embodiment of the present disclosure, the method may further include: and under the conditions that the time length for starting the radio frequency reader to carry out radio frequency scanning reaches the set time length and the radio frequency scanning result does not contain the battery identification of the stolen battery, the radio frequency reader is closed. The set time length may be set in advance according to an application scenario or a specific requirement, and for example, the set time length may be 10 minutes.
In this embodiment, when the time length for turning on the radio frequency reader reaches the set time length and all radio frequency scanning results obtained in the radio frequency scanning process of the radio frequency reader do not include the battery identifier of the stolen battery, it may be determined that the stolen battery is not located near the target vehicle, and therefore, the radio frequency reader may be turned off to reduce the power consumption of the target vehicle.
< target vehicle >
The present embodiment provides a target vehicle 300. In one example, the target vehicle may include a master control module and a radio frequency reader, the master control module configured to: receiving a battery identifier which is issued by a server and is used for uniquely identifying a stolen battery; starting a radio frequency reader to perform radio frequency scanning to obtain a radio frequency scanning result; under the condition that the radio frequency scanning result contains the battery identification of the stolen battery, first position information of the radio frequency scanning result is obtained, and the first position information is uploaded to the server, so that the server can locate the stolen battery according to the first position information. The stolen battery is provided with a radio frequency tag, and the radio frequency tag is provided with a battery identifier.
Furthermore, the main control module is also configured to close the radio frequency reader when the time length for starting the radio frequency reader to perform radio frequency scanning reaches a set time length and the radio frequency scanning result does not contain the battery identifier of the stolen battery.
The present embodiment may specifically refer to the foregoing method embodiments, and details are not repeated herein.
In another example, as shown in fig. 3, the target vehicle 300 may include a first memory 320 and a first processor 310, the first memory 320 being used for storing a first computer program, the first processor 310 being used for controlling the target vehicle 300 to execute any one of the battery locating methods provided in the present embodiment when executing the first computer program.
< second embodiment >
< method >
Fig. 4 shows a schematic flow diagram of a battery location method according to an embodiment. The method steps of the present embodiment are performed by a vehicle, such as server 1000 in fig. 1.
As shown in fig. 4, the battery positioning method of the present embodiment may include the following steps S4100 to S4400:
step S4100 acquires a battery identifier for uniquely identifying a stolen battery.
The stolen battery is internally provided with a radio frequency tag, and the radio frequency tag is internally provided with a battery identifier of the stolen battery.
In one embodiment of the present disclosure, the server may detect whether a battery theft event occurs in the electric bicycle, and in a case that the battery theft event occurs in the electric bicycle, take the battery of the electric bicycle as the stolen battery, and perform steps S4100 to S4400 of the present embodiment.
In the present embodiment, the electric bicycle may determine whether a battery theft event occurs by itself based on at least one of a switch state of a battery compartment for storing the battery, a switch state of a battery lock for locking the battery compartment, and a battery state indicating whether the battery is detached from the battery compartment. When the battery theft event occurs to the electric bicycle, the information indicating the battery theft event occurs to the server, so that the server judges that the battery theft event occurs to the electric bicycle under the condition that the server receives the information.
In one example, the server may store battery identifiers of all batteries of the electric bicycles in advance, and when receiving information that indicates that a battery theft event occurs to any one of the electric bicycles, the server may regard the battery of the electric bicycle as a stolen battery and acquire the battery identifier of the stolen battery from the pre-stored battery identifiers.
In another example, the battery identifier of the battery of the electric bicycle is stored in the electric bicycle, and when the electric bicycle reports the information indicating that the battery of the electric bicycle is stolen, the battery identifier of the battery of the electric bicycle is reported to the server, and the server uses the received battery identifier as the battery identifier of the stolen battery.
And step S4200, determining the vehicle provided with the radio frequency reader corresponding to the stolen battery as a target vehicle.
In this embodiment, the vehicle corresponding to the stolen battery may be a vehicle whose current position is at a distance less than or equal to a second set distance from the stolen position of the stolen battery. The second set distance may be set in advance according to an application scenario or a specific requirement. For example, the second set distance may be 2 km.
Further, the number of target vehicles may be one or more, and is not limited herein.
In one embodiment of the disclosure, determining a vehicle provided with a radio frequency reader corresponding to a stolen battery may include, as a target vehicle, steps S4210 to S4220 as follows:
step S4210 acquires second position information when the stolen battery is stolen.
In one example, when the electric bicycle detects that the battery of the electric bicycle is stolen, the position information of the electric bicycle when the battery of the electric bicycle is stolen is acquired, the second position information is used as the second position information of the stolen battery, and when the information indicating that the battery of the electric bicycle is stolen is reported to the server, the second position information can be reported to the server, so that the server can acquire the second position information of the stolen battery when the battery is stolen.
And step S4220, determining the vehicle which is provided with the radio frequency reader and corresponds to the stolen battery as a target vehicle according to the second position information.
In this embodiment, the vehicle provided with the radio frequency reader may acquire its own location information according to a preset location frequency, and report the latest acquired location information to the server, so that the server locates the vehicle to obtain the current location of the vehicle.
The second position information may include absolute position information of the electric bicycle. The absolute position information may be provided by a positioning device such as a GPS of the electric bicycle, for example. The processor of the electric bicycle may read the absolute position information acquired by the positioning device as the second position information according to the position reporting instruction.
The second position information may also be relative position information of the electric bicycle with respect to a landmark, which may include at least one of a bluetooth device of another vehicle, a bluetooth device mounted to the parking fence, and a radio frequency identification device mounted to the parking fence.
Taking a parking fence to install a bluetooth device as an example, after the electric bicycle enters the parking fence, the electric bicycle can be connected with the bluetooth device through bluetooth, and the relative position information can include a received signal strength value reflecting the distance between the electric bicycle and the bluetooth device.
The server can obtain the stolen position of the stolen battery according to the second position information; and determining the vehicle of the radio frequency reader, the distance between the current position and the stolen position of the stolen battery is less than or equal to a second set distance, and taking the vehicle as a target vehicle.
Step S4300, the battery identification of the stolen battery is sent to the target vehicle for the target vehicle to perform radio frequency scanning, and the first position information of the target vehicle is returned to the server under the condition that the radio frequency scanning result contains the battery identification of the stolen battery.
In this embodiment, when the server sends the battery identifier of the stolen battery to the target vehicle, the target vehicle may execute the method of the first embodiment, receive the battery identifier, start the radio frequency reader to perform radio frequency scanning, obtain a radio frequency scanning result, obtain first location information of the target vehicle when the radio frequency scanning result includes the battery identifier of the stolen battery, and upload the first location information to the server.
Step S4400, locate the stolen battery according to the first location information.
In this embodiment, the server may be used as the location information of the stolen battery according to the first location information. Specifically, the server may be a location where the target vehicle is located when the target vehicle is scanned to the radio frequency tag of the stolen battery, as a location where the radio frequency tag of the stolen battery is located when the target vehicle is scanned.
According to the method, the server sends the battery identification of the stolen battery to the target vehicle which is provided with the radio frequency reader and corresponds to the stolen battery, the radio frequency reader is started to conduct radio frequency scanning under the condition that the radio frequency reader receives the battery identification, under the condition that the radio frequency scanning result contains the battery identification of the stolen battery, the first position information of the radio frequency reader is obtained and sent to the server, the stolen battery is located by the server according to the first position information, operators can timely retrieve the stolen battery, and loss of battery assets is reduced.
In one embodiment of the present disclosure, the method may further include: acquiring video monitoring data matched with the positioning information of the stolen battery; and outputting the video monitoring data so that an operator can track the stolen battery according to the video monitoring data.
In this embodiment, the video monitoring data matched with the positioning information of the stolen battery may be video monitoring data collected by monitoring equipment that monitors a position where a radio frequency tag of the stolen battery is located under a condition that the radio frequency tag is scanned by a target vehicle.
The mode of outputting the video monitoring data can be that the video monitoring data is sent to the terminal equipment used by the operator to be played, or can be that the video monitoring data is directly played in the display equipment connected with the server, so that the operator can track the stolen battery according to the video monitoring data.
Further, the method may further include: acquiring the acquisition time of the first position information; and generating a moving track of the stolen battery according to the first position information and the acquisition time returned by the target vehicles, so as to obtain video monitoring data according to the moving track.
In this embodiment, the position of the stolen battery obtained according to the first position information may be connected according to the sequence of the acquisition time, so that the movement track of the stolen battery may be obtained. On the basis of obtaining the moving track of the stolen battery, video monitoring data collected by monitoring equipment for monitoring any position in the moving track can be obtained, so that an operator can track the stolen battery according to the video monitoring data.
< Server >
The present embodiment provides a server 500. In one example, as shown in fig. 5, the target vehicle 500 may include a second memory 520 and a second processor 510, the second memory 520 is used for storing a second computer program, and the second processor 510 is used for controlling the server 500 to execute the battery positioning method provided in the embodiment when the second computer program is executed.
< third embodiment >
< System >
The present embodiment provides a battery location system, and as shown in fig. 6, the battery location system 600 may include the target vehicle 300 according to the first embodiment, and the server 500 according to the second embodiment.
Fig. 7 shows a flow chart of a battery location method of an embodiment of the present disclosure. As shown in FIG. 7, the method includes steps S7100 to S7900 as follows:
in step S7100, the server 500 detects whether the battery theft event occurs to the electric bicycle, if so, step S7200 is executed, and if not, step S7100 is continuously executed.
In step S7200, the server 500 acquires a battery identifier for uniquely identifying the stolen battery, and second location information when the stolen battery is stolen.
At step S7300, the server 500 determines, according to the second location information, the vehicle provided with the radio frequency reader corresponding to the stolen battery as the target vehicle.
In step S7400, the server 500 sends the battery identification of the stolen battery to the target vehicle.
At step S7500, the target vehicle 300 receives the battery identification of the stolen battery.
Step S7600, the target vehicle 300 starts the rf reader to perform rf scanning, and obtains an rf scanning result.
In step S7700, the target vehicle 300 obtains the first location information of the target vehicle 300 when the radio frequency scanning result includes the battery identifier of the stolen battery.
In step S7800, the target vehicle 300 uploads the first position information to the server.
In step S7900, the server 500 locates the stolen battery according to the first location information.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
Computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, by software, and by a combination of software and hardware are equivalent.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the present disclosure is defined by the appended claims.
Claims (12)
1. A battery location method implemented by a target vehicle provided with a radio frequency reader, the method comprising:
receiving a battery identifier which is issued by a server and is used for uniquely identifying a stolen battery; the stolen battery is provided with a radio frequency tag, and the radio frequency tag is provided with the battery identifier;
starting the radio frequency reader to perform radio frequency scanning to obtain a radio frequency scanning result;
and under the condition that the radio frequency scanning result contains the battery identification of the stolen battery, acquiring first position information of the radio frequency scanning result, and uploading the first position information to the server so that the server can position the stolen battery according to the first position information.
2. The method of claim 1, further comprising:
and when the time length for starting the radio frequency reader to perform radio frequency scanning reaches a set time length and the radio frequency scanning result does not contain the battery identification of the stolen battery, closing the radio frequency reader.
3. A battery location method, implemented by a server, the method comprising:
acquiring a battery identifier for uniquely identifying a stolen battery; the stolen battery is internally provided with a radio frequency tag, and the radio frequency tag is internally provided with the battery identification;
determining a vehicle which corresponds to the stolen battery and is provided with a radio frequency reader as a target vehicle;
sending the battery identification of the stolen battery to the target vehicle for radio frequency scanning of the target vehicle, and returning first position information of the target vehicle to the server under the condition that a radio frequency scanning result contains the battery identification of the stolen battery;
and positioning the stolen battery according to the first position information.
4. The method of claim 3, further comprising:
acquiring video monitoring data matched with the positioning information of the stolen battery;
and outputting the video monitoring data so that an operator can track the stolen battery according to the video monitoring data.
5. The method of claim 4, further comprising:
acquiring the acquisition time of the first position information;
and generating a moving track of the stolen battery according to the first position information and the acquisition time returned by the target vehicles, so as to obtain the video monitoring data according to the moving track.
6. The method of claim 3, wherein the determining, as the target vehicle, a vehicle provided with a radio frequency reader corresponding to the stolen battery comprises:
acquiring second position information when the stolen battery is stolen;
and determining the vehicle which is provided with the radio frequency reader and corresponds to the stolen battery as the target vehicle according to the second position information.
7. The method of claim 3, further comprising:
detecting whether the battery of the electric bicycle is stolen;
and under the condition that the battery theft event of the electric bicycle is detected, taking the battery of the electric bicycle as the stolen battery, and executing the step of acquiring the battery identification for uniquely identifying the stolen battery.
8. A target vehicle comprising a master control module and a radio frequency reader, the master control module being arranged to: receiving a battery identifier which is issued by a server and is used for uniquely identifying a stolen battery; starting the radio frequency reader to perform radio frequency scanning to obtain a radio frequency scanning result; under the condition that the radio frequency scanning result contains the battery identification of the stolen battery, acquiring first position information of the radio frequency scanning result, and uploading the first position information to the server so that the server can position the stolen battery according to the first position information;
and a radio frequency tag is arranged on the stolen battery, and the battery identification is arranged in the radio frequency tag.
9. The target vehicle of claim 8, wherein the main control module is further configured to shut down the rf reader if the rf scanning is started for a predetermined period of time and the rf scanning result does not include the battery identifier of the stolen battery.
10. A target vehicle comprising a first processor and a first memory for storing an executable first computer program; the first processor is configured to execute the first computer program to implement the method of any of claims 1 to 2.
11. A server comprising a second processor and a second memory for storing an executable second computer program; the second processor is configured to execute the second computer program to implement the method of any of claims 3 to 7.
12. A battery location system comprising a target vehicle as claimed in any one of claims 8 to 10 and a server as claimed in claim 11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210093093.1A CN114548131A (en) | 2022-01-26 | 2022-01-26 | Battery positioning method, target vehicle, server and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210093093.1A CN114548131A (en) | 2022-01-26 | 2022-01-26 | Battery positioning method, target vehicle, server and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114548131A true CN114548131A (en) | 2022-05-27 |
Family
ID=81672738
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210093093.1A Pending CN114548131A (en) | 2022-01-26 | 2022-01-26 | Battery positioning method, target vehicle, server and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114548131A (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6414629B1 (en) * | 2001-04-19 | 2002-07-02 | Tektrack, Llc | Tracking device |
US20040046646A1 (en) * | 2002-09-09 | 2004-03-11 | Gregory Eskridge | Aware patrol vehicle |
KR20090016773A (en) * | 2007-08-13 | 2009-02-18 | 권혁숙 | Bicycle registration and management system |
US20110001635A1 (en) * | 2007-11-09 | 2011-01-06 | Motorola, Inc. | Mobile traffic monitoring system |
KR101008707B1 (en) * | 2010-08-23 | 2011-01-17 | 한빛디엔에스 주식회사 | The steal prevention and monitoring system using rfid and zigbee and gps and the method thereof |
CN102169548A (en) * | 2011-03-28 | 2011-08-31 | 上海捷誉信息科技有限公司 | Power battery total life cycle monitoring system based on internet of thing |
CN102663651A (en) * | 2012-03-21 | 2012-09-12 | 镇江邦德信息技术有限公司 | Electric vehicle information management system and management method based on two-dimension code |
CN104442700A (en) * | 2014-12-02 | 2015-03-25 | 江苏舟航网络科技有限公司 | Multi-mode car searching method, multi-mode car searching device and multi-mode car searching system |
CN105006043A (en) * | 2015-06-25 | 2015-10-28 | 苏州木兰电子科技有限公司 | Electric vehicle antitheft management system |
KR20160029547A (en) * | 2014-09-05 | 2016-03-15 | 황병택 | Bike theft and regular inspection system |
CN205545961U (en) * | 2016-03-22 | 2016-08-31 | 重庆甲虫网络科技有限公司 | Theftproof solar cell panel |
CN106412051A (en) * | 2016-09-27 | 2017-02-15 | 浙江天地人科技有限公司 | Urban vehicle tracking anti-theft system |
CN107481475A (en) * | 2017-08-01 | 2017-12-15 | 周佶 | The anti-missing method, apparatus of anti-loss based on internet and RFID technique and system |
CN109949566A (en) * | 2019-04-02 | 2019-06-28 | 梁荷 | A kind of shared bicycle fence management method and system |
JP2019125285A (en) * | 2018-01-19 | 2019-07-25 | 矢崎総業株式会社 | On-vehicle monitoring system |
CN111422161A (en) * | 2020-03-17 | 2020-07-17 | 深圳易优智能科技发展有限公司 | Vehicle management system, search method, computer device, and storage medium |
CN112444833A (en) * | 2020-11-05 | 2021-03-05 | 浙江宝聚通信息科技有限公司 | Method and device for identifying stolen electric vehicle storage points according to loss report records of electric vehicles with locators |
-
2022
- 2022-01-26 CN CN202210093093.1A patent/CN114548131A/en active Pending
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6414629B1 (en) * | 2001-04-19 | 2002-07-02 | Tektrack, Llc | Tracking device |
US20040046646A1 (en) * | 2002-09-09 | 2004-03-11 | Gregory Eskridge | Aware patrol vehicle |
KR20090016773A (en) * | 2007-08-13 | 2009-02-18 | 권혁숙 | Bicycle registration and management system |
US20110001635A1 (en) * | 2007-11-09 | 2011-01-06 | Motorola, Inc. | Mobile traffic monitoring system |
KR101008707B1 (en) * | 2010-08-23 | 2011-01-17 | 한빛디엔에스 주식회사 | The steal prevention and monitoring system using rfid and zigbee and gps and the method thereof |
CN102169548A (en) * | 2011-03-28 | 2011-08-31 | 上海捷誉信息科技有限公司 | Power battery total life cycle monitoring system based on internet of thing |
CN102663651A (en) * | 2012-03-21 | 2012-09-12 | 镇江邦德信息技术有限公司 | Electric vehicle information management system and management method based on two-dimension code |
KR20160029547A (en) * | 2014-09-05 | 2016-03-15 | 황병택 | Bike theft and regular inspection system |
CN104442700A (en) * | 2014-12-02 | 2015-03-25 | 江苏舟航网络科技有限公司 | Multi-mode car searching method, multi-mode car searching device and multi-mode car searching system |
CN105006043A (en) * | 2015-06-25 | 2015-10-28 | 苏州木兰电子科技有限公司 | Electric vehicle antitheft management system |
CN205545961U (en) * | 2016-03-22 | 2016-08-31 | 重庆甲虫网络科技有限公司 | Theftproof solar cell panel |
CN106412051A (en) * | 2016-09-27 | 2017-02-15 | 浙江天地人科技有限公司 | Urban vehicle tracking anti-theft system |
CN107481475A (en) * | 2017-08-01 | 2017-12-15 | 周佶 | The anti-missing method, apparatus of anti-loss based on internet and RFID technique and system |
JP2019125285A (en) * | 2018-01-19 | 2019-07-25 | 矢崎総業株式会社 | On-vehicle monitoring system |
CN109949566A (en) * | 2019-04-02 | 2019-06-28 | 梁荷 | A kind of shared bicycle fence management method and system |
CN111422161A (en) * | 2020-03-17 | 2020-07-17 | 深圳易优智能科技发展有限公司 | Vehicle management system, search method, computer device, and storage medium |
CN112444833A (en) * | 2020-11-05 | 2021-03-05 | 浙江宝聚通信息科技有限公司 | Method and device for identifying stolen electric vehicle storage points according to loss report records of electric vehicles with locators |
Non-Patent Citations (1)
Title |
---|
王来忠: "射频识别车辆信息管理系统", 中国安全科学学报, vol. 16, no. 4, pages 76 - 80 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10514468B2 (en) | Vehicle positioning method and system | |
CN106101628A (en) | The method of a kind of car accident process and terminal | |
CN111461831B (en) | Vehicle parking control method, electronic equipment and vehicle system | |
WO2018196240A1 (en) | Parking management method and system for vehicle, vehicle, parking device, and server | |
CN109448157B (en) | Method, system, server and storage medium for determining fault of electric vehicle | |
CN111591376A (en) | Vehicle returning control method, vehicle, server and vehicle system | |
CN111063120A (en) | Control method of electric bicycle, electric bicycle and electric bicycle system | |
CN114358863A (en) | Shared vehicle returning processing method and device and shared vehicle | |
KR20170035926A (en) | Ticketing method and system | |
CN111976875A (en) | Control method and device for safely using bicycle, electronic equipment and vehicle system | |
CN110728830A (en) | Method, system, server and terminal device for searching lost article | |
CN111275859A (en) | Control method of shared moped and shared moped | |
CN112100445A (en) | Image information processing method and device, electronic equipment and storage medium | |
CN109636118A (en) | Dispatching method, device, server and the system of electric vehicle using motor | |
CN113830209B (en) | Abnormal movement detection method and device, vehicle and server | |
CN113837845A (en) | Returning processing method and device for shared bicycles and server | |
CN113596769A (en) | Vehicle control method and device and terminal equipment | |
CN113470339A (en) | Vehicle control method, device, vehicle and system | |
CN108062805B (en) | Vehicle-mounted data processing method and server | |
CN111199639B (en) | Method, device and system for adjusting parking fence area and server | |
CN111681369A (en) | Parking control method, vehicle, server and vehicle system | |
CN115550847A (en) | Vehicle returning processing method and device for shared vehicles and server | |
CN114548131A (en) | Battery positioning method, target vehicle, server and system | |
CN113873018B (en) | Vehicle communication method and device, server and vehicle | |
CN114463632A (en) | Shared vehicle returning processing method and device and shared vehicle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20220527 |