CN114915971A - Vehicle control method, device, storage medium and vehicle - Google Patents

Vehicle control method, device, storage medium and vehicle Download PDF

Info

Publication number
CN114915971A
CN114915971A CN202210369295.4A CN202210369295A CN114915971A CN 114915971 A CN114915971 A CN 114915971A CN 202210369295 A CN202210369295 A CN 202210369295A CN 114915971 A CN114915971 A CN 114915971A
Authority
CN
China
Prior art keywords
vehicle
user
information
environment information
surrounding environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210369295.4A
Other languages
Chinese (zh)
Other versions
CN114915971B (en
Inventor
赵杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jidu Technology Co Ltd
Original Assignee
Jidu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jidu Technology Co ltd filed Critical Jidu Technology Co ltd
Priority to CN202210369295.4A priority Critical patent/CN114915971B/en
Publication of CN114915971A publication Critical patent/CN114915971A/en
Application granted granted Critical
Publication of CN114915971B publication Critical patent/CN114915971B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/68Gesture-dependent or behaviour-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Mechanical Engineering (AREA)
  • Animal Behavior & Ethology (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Social Psychology (AREA)
  • Lock And Its Accessories (AREA)
  • Traffic Control Systems (AREA)

Abstract

The application discloses a vehicle control method, a vehicle control device, a storage medium and a vehicle. In the method, under the condition that a vehicle is in a non-driving state, receiving an acquisition request of surrounding environment information of the vehicle; determining first user information according to the acquisition request; judging whether effective authorization information exists in the first user information, wherein the authorization information corresponds to the first user and is at least related to the acquisition permission of the surrounding environment information of the vehicle, and the first user is different from a vehicle owner user of the vehicle; if valid authorization information exists, the surrounding environment information of the vehicle is acquired based on the acquisition request. The method can start a vehicle monitoring function (such as a sentinel mode) for a user sending an acquisition request in a multi-user vehicle scene, and further improves the vehicle safety.

Description

Vehicle control method, device, storage medium and vehicle
Technical Field
The present disclosure relates to the field of vehicle control technologies, and in particular, to a vehicle control method, an apparatus, a storage medium, and a vehicle.
Background
In general, vehicles often implement safety monitoring by monitoring factors that affect safety performance. This monitoring needs to be performed not only in the case where the first user of the vehicle controls the running condition of the vehicle, but also in the case where the degree of control of the vehicle by the first user of the vehicle is limited.
In the related art, a sentinel mode is taken as an example, and is used for reminding vehicle owners when vehicles are scratched or people walk, so that the property safety of the vehicles is ensured. Since the sentinel model relates to the privacy data of the user (such as the position of the vehicle, the surrounding environment of the vehicle, etc.), in order to avoid disclosure of the user privacy, the first user of the vehicle cannot open the sentinel model in a multi-user vehicle-using scene (such as a vehicle borrowing scene, a family vehicle-using scene, a shared vehicle scene, etc.), so that the vehicle has a safety risk.
Therefore, how to implement vehicle monitoring in a multi-user vehicle scene becomes a technical problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides a vehicle control method, a vehicle control device, a storage medium and a vehicle, and aims to partially solve the problems in the prior art.
The embodiment of the application adopts the following technical scheme:
in a first aspect, the present application provides a vehicle control method, in which a vehicle is in a non-running state, including:
receiving an acquisition request for surrounding environment information of a vehicle;
determining first user information according to the acquisition request;
judging whether effective authorization information exists in the first user information, wherein the authorization information corresponds to the first user and is at least related to the acquisition permission of the surrounding environment information of the vehicle, and the first user is different from a vehicle owner user of the vehicle;
if valid authorization information exists, the surrounding environment information of the vehicle is acquired based on the acquisition request.
In an optional embodiment of the present application, determining whether valid authorization information exists in the first user information includes:
acquiring original authorization information configured for a first user by a vehicle owner user;
judging whether the original authorization information is matched with authorization information in the first user information;
if valid authorization information exists, acquiring surrounding environment information of the vehicle based on the acquisition request, wherein the acquiring comprises the following steps:
if the original authorization information is matched with authorization information in the first user information, determining that effective authorization information exists in the first user information;
triggering monitoring of the vehicle surroundings based on the acquisition request to acquire the surrounding environment information;
and pushing the ambient environment information to an account corresponding to the first user.
In an optional embodiment of the present application, if the original authorization information does not match the authorization information in the first user information, the obtaining request is ignored.
In an alternative embodiment of the present application, the first user comprises a target user who last logged into the vehicle before switching to the non-driving state;
acquiring original authorization information configured for a first user by a vehicle owner user, wherein the original authorization information comprises:
determining a target user who logs in a vehicle control system last before the vehicle is switched to a non-driving state;
and using the authorization information used by the target user for logging in the vehicle control system as the original authorization information.
In an optional embodiment of the present application, the authorization information includes an acquisition right of the surrounding environment information of the vehicle; judging whether the first user information has valid authorization information, including: judging whether a first user logs in a client or not; if the first user logs in the client, judging whether the first user has the authority of acquiring the surrounding environment information of the vehicle or not based on the first user information; and judging whether the client communicates with the vehicle in a near field communication mode.
If valid authorization information exists, acquiring surrounding environment information of the vehicle based on the acquisition request, wherein the steps comprise: if the first user has the acquisition permission and the client communicates with the vehicle in a near field communication mode, monitoring the surrounding environment of the vehicle is triggered based on the acquisition request to acquire surrounding environment information; and pushing the ambient environment information to an account corresponding to the first user.
In an optional embodiment of the present application, the method further includes: establishing communication connection between the client and the vehicle in a near field communication mode; or the communication connection between the client and the vehicle is established through the cloud server.
In an optional embodiment of the present application, pushing the ambient environment information to an account corresponding to the first user includes:
uploading surrounding environment information to a cloud server;
and updating the ambient environment information to an account corresponding to the first user set in the cloud server.
In an optional embodiment of the present application, the method further includes: and pushing the surrounding environment information to an account corresponding to the owner user.
In an optional embodiment of the present application, the pushing the ambient environment information to an account corresponding to the vehicle owner user includes:
judging the risk degree of the environment where the vehicle is located based on the surrounding environment information;
and if the risk degree is higher than the risk degree threshold value, pushing the surrounding environment information to an account corresponding to the owner user.
In an alternative embodiment of the present application, the non-driving state includes the vehicle being unattended and/or the vehicle being parked.
The method further comprises the following steps: if the driving device of the vehicle is in a non-working state, determining that the vehicle is in a parking state; and/or determining that no person is in the vehicle if the distance between the first user and the vehicle is greater than the distance threshold.
In a second aspect, the present application provides a vehicle control apparatus, a vehicle being in a non-running state, the apparatus comprising:
a transceiver module configured to perform: receiving an acquisition request for surrounding environment information of a vehicle;
an acquisition module configured to perform: determining first user information according to the acquisition request;
a determination module configured to perform: judging whether effective authorization information exists in the first user information, wherein the authorization information corresponds to the first user and is at least related to the acquisition permission of the surrounding environment information of the vehicle, and the first user is different from a vehicle owner user of the vehicle;
a monitoring module configured to perform: if valid authorization information exists, the surrounding environment information of the vehicle is acquired based on the acquisition request.
In a third aspect, the present application provides a vehicle comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the vehicle control method when executing the program.
In a fourth aspect, the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the vehicle control method described above.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
according to the vehicle control method, the vehicle control device, the storage medium and the vehicle in the embodiment of the application, for the vehicle in a non-driving state, an acquisition request of ambient environment information of the vehicle is received, first user information is determined according to the monitoring request, whether effective authorization information exists in the first user information or not is judged, the authorization information corresponds to the first user, and the authorization information is at least related to the acquisition permission of the ambient environment information of the vehicle, wherein the first user is different from a vehicle owner user of the vehicle. If valid authorization information exists in the first user information, it is indicated that the first user has the authority to acquire the vehicle surrounding environment information, and in this case, the vehicle surrounding environment information may be acquired based on the acquisition request. By the vehicle control scheme, a vehicle monitoring function (such as a sentinel mode) can be started for a user sending an acquisition request in a multi-user vehicle scene, and the vehicle safety is further improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic diagram of a vehicle control scenario provided by an embodiment of the present application;
FIG. 2 is a schematic flow chart of a vehicle control method provided by an embodiment of the present application;
FIG. 3 is a schematic diagram of a vehicle control process provided by an embodiment of the present application;
fig. 4 is a schematic structural diagram of a vehicle control device provided in an embodiment of the present application;
fig. 5 is a schematic view of a vehicle corresponding to fig. 2 according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person skilled in the art without making any inventive step based on the embodiments in the description belong to the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
The vehicle is an important vehicle for people, and the vehicle can not be driven in all aspects of work and life. Such as daily commutes, logistics shipments, trade. The driving technique for vehicles is also becoming one of the basic skills of people to adapt to productive life, and it follows that there may be a situation that two or more users have the use right of the vehicle during the use of the vehicle. The user with the vehicle use authority is called an authorized user, and the authorization condition of the user can be characterized through authorization information.
It can be understood that the present application mainly focuses on the authority for acquiring the vehicle surrounding environment information, and therefore, the authorized user in the present application mainly refers to a user having the authority for acquiring the vehicle surrounding environment information. The user capable of being authorized by other users is called an owner user, that is, the owner user has the ability to grant the other users the acquisition right of the vehicle surrounding environment information. In practical application, the vehicle master user may also be referred to as a vehicle owner user or other terms, and the application is not limited.
For a vehicle use scene with two or more users, the vehicle owner user can authorize the vehicle to other users for use, and the authorization scope includes but is not limited to vehicle control authority and acquisition authority of vehicle surrounding environment information, so that other users are changed from unauthorized users to authorized users.
For example, in a usage scenario of a home vehicle, an owner user may authorize other family members to obtain rights of the vehicle surrounding environment information, so that two or more family members become authorized users of the home vehicle.
In a use scene of the shared automobile, an authorized user capable of unlocking the shared automobile may be not unique, and in this case, the master user may be an owner user arranged in the cloud server, so that the cloud server dynamically allocates an acquisition permission of the vehicle surrounding environment information to the first user of the shared automobile through an owner user account. In this case, the owner user is not limited to an individual, but may be a vehicle manager or a vehicle authority manager. The identity of the owner user can be set according to the actual application scenario.
In addition, there may be a case where the owner user lends the vehicle to another user, thereby changing the other user from an unauthorized user to an authorized user. In this case, the vehicle control authority and the acquisition authority of the vehicle surrounding environment information can be set as temporary authorities so as to limit the authorization time interval of the authorities, thereby ensuring the privacy of authorized users and owner users.
In the case where no person is present in the vehicle or the vehicle is in a parked state, the vehicle may enter a sentinel mode. In the sentinel mode, the vehicle performs data collection based on at least some of its own sensors (e.g., vision sensors, shock sensors, etc.), including but not limited to security data as described below. For example, the security data includes surrounding environment information of the vehicle. And when the conditions are met, the vehicle sends the data to an account corresponding to the authorized user.
However, in the related art, in a case where the authorized user of the vehicle is not unique, the security data may be transmitted to an account of an authorized user currently logged in the vehicle (i.e., hereinafter, a "first user" of the vehicle), and the security data may be transmitted to accounts of other authorized users than the account of the authorized user currently logged in the vehicle, thereby causing privacy disclosure of the authorized user currently logged in the vehicle.
The authorized users in the application can be represented by the authorization information, and the authorization information corresponds to the authorized users one to one. The authorization information may characterize the authorized user in at least one dimension, such as an Identity Document (ID) of the user, a communication mode of the user, an account number used when the user logs in to the vehicle, and the like. In the application, the authorization information of the vehicle is managed by the owner user of the vehicle.
An authorized user in this application refers to a user that has access to at least part of the functions of the vehicle. The "at least partial function" includes at least a driving function and a monitoring function of the vehicle.
It should be noted that the authorized user in the present application may be a specific person, for example, zhang san; in addition, the authorized user in the present application may also be a virtual owner of a right, such as a cloud management server, an administrator account. Specifically, the authorized user is a user configured with at least one right related to the vehicle by a vehicle owner user, and the at least one right in the application includes an acquisition right of the vehicle surrounding environment information.
In the present application, the first user mainly refers to a user who intends to acquire information on the environment around the vehicle. For example, it is assumed that the first user is a user who makes an acquisition request of the surrounding environment information to the vehicle. In this application, whether the ambient environment information of the vehicle is fed back to the first user depends on whether the first user is an authorized user, and the type or range of authority granted to the first user by the owner user. In this application, the first user is different from an owner user of the vehicle. Based on the above principle, one of the response methods for the acquisition request may be to determine whether the first user has the acquisition right of the vehicle surroundings by determining whether the first user is an authorized user, so as to determine whether to feed back the vehicle surroundings information to the first user. The specific implementation of the above response method and other response methods for obtaining the request can be seen below.
The vehicle control method in the application is executed by the vehicle, and can also be executed by the vehicle in cooperation with other equipment (such as a cloud-end server). In an optional embodiment of the present application, the vehicle control method in the present application is executed by a vehicle management end, where the vehicle management end may be integrally disposed with a vehicle, and at this time, the vehicle management end may be a vehicle machine or an application program loaded on the vehicle machine. In another optional embodiment of the present application, the vehicle management terminal may be disposed non-integrally with the vehicle, and at this time, the vehicle management terminal may be the cloud management server or an application program loaded on the cloud management server.
In the application, taking the vehicle management terminal as an example, a user (including an owner user and an authorized user) may communicate with the vehicle management terminal through the user terminal, so as to obtain the security data from the vehicle management terminal and/or send an instruction and/or a request to the vehicle management terminal. A communication scenario between a user terminal (e.g., any one of the user terminals 1 to n) and a vehicle management terminal is exemplarily shown in fig. 1.
The user terminal in the application can be a hardware device with a physical structure, such as a mobile phone, a bracelet, a tablet personal computer and a PDA; in addition, the user terminal in the present application may also be an application program that performs data processing based on hardware resources provided by hardware devices. The user terminal is loaded with a client.
The type of the vehicle is not particularly limited, and the vehicle may be a vehicle using an internal combustion engine as a driving device, and the vehicle may also be a new energy vehicle.
Fig. 2 is a vehicle control process provided in the embodiment of the present application, and assuming that the vehicle is in a non-driving state, the vehicle control process may specifically include one or more of the following steps:
s201: an acquisition request for surrounding environment information of a vehicle is received.
S202: and determining the first user information according to the acquisition request.
In the application, the request for acquiring the surrounding environment information of the vehicle is used for enabling the vehicle to perform data acquisition on the environment where the vehicle is located based on the sensor arranged on the vehicle. The obtaining request may be generated in a plurality of ways, where an optional way is that after the user leaves the vehicle, the user selects a monitoring control for the vehicle surroundings in a client of a user terminal (e.g., a mobile terminal such as a mobile phone, a bracelet, a tablet, etc.) to trigger the obtaining request for the vehicle surroundings information. Alternatively, the acquisition request is automatically triggered, for example, when the distance between the user terminal and the vehicle is greater than the distance threshold, the client installed in the user terminal sends the acquisition request for the environment around the vehicle to the vehicle. Optionally, the client communicates with the vehicle through any one of near field communication methods such as bluetooth and NFC to issue the request. Optionally, the client may also communicate with the vehicle to issue the request by using the cloud server as an intermediary.
In an alternative embodiment of the present application, the time when no person is in the vehicle or the vehicle is in the parking state in the foregoing steps may be used as the time when the first user leaves the vehicle. In another alternative embodiment of the present application, the time when the first user leaves the vehicle may be further determined based on a determination that no person is present in the vehicle or that the vehicle is in a parked state. For example, when it is monitored that the driving device is in the non-operating state, it is determined that no person is in the vehicle or the vehicle is in a parked state. When the door monitoring sensor detects that the door is locked, the time when the door is locked is taken as the time when the first user leaves the vehicle.
After receiving an acquisition request for the surrounding environment information of the vehicle, first user information is acquired from the acquisition request. The first user information includes, but is not limited to, user identity information and authorization information. The user identity information is used for indicating the identity of the first user sending the acquisition request. Optionally, the identity information of the first user may be registration information input when the user logs in the client, such as a user name, a user identity, a mobile phone number, fingerprint information, and a user face image. In the application, the authorization information corresponds to the first user, and the authorization information is used for indicating the authority configured by the owner user for the first user. The authorization information is related to at least the acquisition right of the surrounding environment information of the vehicle. Based on the above example, the user who issues the acquisition request is, for example, the user who triggers the acquisition request through the monitoring control, or the user who logs in to the client. According to the actual situation of the application scenario, the user who sends the acquisition request may also be of another type, and the application is not limited.
Since the authorized user corresponding to the vehicle is not unique, each user can send an acquisition request for the ambient environment information of the vehicle to the vehicle through the corresponding client, and the acquisition request may be generated by any user.
After receiving an acquisition request for the surrounding environment information of the vehicle, determining identity information capable of representing a first user triggering generation of the acquisition request and authorization information of an owner user for the first user from the acquisition request as first user information of the first user. The first user is different from the owner user of the vehicle in the application.
For example, in a home vehicle scenario, the identity information of the first user may be a family member of the owner user, and the authorization information of the first user includes an acquisition right of the ambient environment information of the vehicle and a vehicle control right. The number of vehicles in the family car scene can be one or more. Optionally, assuming that a plurality of vehicles are bound to one home account, and an owner user for managing vehicle-related permissions is set for the home account, the owner user may configure corresponding permissions for members joining the home account, so as to implement permission sharing under a plurality of vehicle scenarios in a home vehicle scenario.
For example, in a car borrowing scenario, the identity information of the first user may be an authorized user temporarily authorized by the owner user, and the authorization information of the first user includes the acquisition right of the ambient environment information of the vehicle. The owner user can set a corresponding authorization range for the first user according to the vehicle borrowing requirement of the first user.
From the foregoing, it can be seen that the process in the present application is applicable to situations where the authorized user corresponding to the vehicle is not unique. Any one of the users can realize the control of the vehicle (namely, obtain the acquisition right of the vehicle surrounding environment information, the vehicle use right and the like) by logging in the vehicle, and after the authorized user logs in the vehicle, the user identity information is added to the identity attribute of the authorized user. The identity attribute of the authorized user may also be used as the user information contained in the acquisition request issued by the user.
The number of the acquisition requests of the vehicle surrounding environment information received by the vehicle is not particularly limited, and if the number of the acquisition requests received by the vehicle is not unique, the process in the application can be executed for each received acquisition request.
S203: and judging whether the first user information has valid authorization information.
S204: if valid authorization information exists, the surrounding environment information of the vehicle is acquired based on the acquisition request.
Authorized users in this application include, but are not limited to, users granted access to ambient information by owner users. The users with the above-mentioned acquisition right (including the owner user and other authorized users) can trigger the monitoring function of the surrounding environment information of the vehicle. The identity attribute of an authorized user in the present application may be characterized by authorization information. The validity of the authorization information in the application can be understood as that the owner user configures the right to acquire the information of the surrounding environment of the vehicle for the first user, and the right to acquire is within the authorization range configured by the owner user. The authorization scope in this application includes, but is not limited to, the type of authority granted to the first user, the usage period of at least one authority (e.g., date of borrowing in the borrowing scenario, period of time of borrowing, etc.), and the geographic region (e.g., urban area, city, etc. reachable by the vehicle in the borrowing scenario).
It should be noted that the authority for acquiring the vehicle surrounding environment information is managed by the owner user. For example, the owner user may set the identity attributes of authorized users, such as family, friends, shared car users. According to different identity attributes, different vehicle surrounding environment information acquisition authorities can be configured. In short, the type of available ambient information and/or the permission using time are configured according to different identity attributes so as to adapt to the data security requirements in different vehicle using scenes. For example, the owner user may set a use time corresponding to the acquisition right of the vehicle surrounding environment information of the authorized user. For example, in a car borrowing scene or a shared car scene, the owner user may set the validity period of the authority for obtaining the vehicle surrounding information of the authorized user as a car borrowing time period, and automatically cancel the authority for obtaining the vehicle surrounding information after the authorized user returns the car, so as to protect the safety of the car and avoid privacy disclosure. For example, the data security requirement of the family car using scene is weak, the monitoring requirement is strong, and the family members in the family car using scene can be configured with longer authority use time, such as one month, half year and permanence.
In an optional embodiment, in S203, to determine whether the first user is an authorized user authorized by the owner user, optionally, original authorization information configured by the owner user for the first user is obtained, and it is determined whether the original authorization information matches authorization information in the first user information.
For example, assuming that the first user includes a target user who logs in the vehicle last before switching to the non-driving state, in an optional embodiment of S203, the target user who logs in the vehicle control system last before switching to the non-driving state is determined, and the authorization information used by the target user to log in the vehicle control system is used as the original authorization information of the first user. For example, the authorization information configured by the owner user for the first user includes: and obtaining authority of the surrounding environment information of the vehicle.
In practical applications, optionally, the vehicle management end maintains a startup time-login information relation table, and the startup time-login information relation table records a corresponding relation between the startup time and the login information. And the vehicle management terminal takes the moment when the acquisition request is received as the starting moment corresponding to the safety data monitoring of the vehicle, and searches the authorization information of the control system of the logged vehicle, which is closest to the starting moment in the logging moment, from the starting moment-logging information relation table to be used as the original authorization information.
Further, in S203, it is determined whether the original authorization information matches the authorization information in the first user information. The first user information and the original authorization information may include attributes of several (one or more) dimensions, and whether the first user information and the original authorization information are matched may be determined based on a matching degree of the attributes of the first user information and the original authorization information.
In an optional embodiment of the present application, a weight corresponding to an attribute of the first user dimension may be set as a first weight, and weights corresponding to other attributes except the first user dimension may be set as a second weight. The first weight is greater than the second weight. Weighting the matching degree of the first user information and the original authorization information in the attribute of the user dimension by adopting a first weight to obtain a first result; and weighting the matching degrees of the attributes of the first user information and the original authorization information in other dimensions by adopting a second weight to obtain a second result, and taking the sum of the first result and the second result as the matching degree of the attributes of the first user information and the original authorization information. And if the matching degree is greater than the threshold value of the matching degree, determining that the first user information is matched with the original authorization information.
In another optional embodiment of the present application, if the first user information is the same as the original authorization information, the first user information is matched with the original authorization information.
If the original authorization information is matched with the first user information, the first user is an authorized user (namely an authorized user) for obtaining at least one authority authorized by the owner user. In this case, since the first user has the right to acquire the surrounding environment information of the vehicle, in S204, based on the acquisition request issued by the user, monitoring of the surrounding environment of the vehicle may be triggered to acquire the surrounding environment information of the vehicle (such as security data in the surrounding environment of the vehicle), so as to push the surrounding environment information to the account corresponding to the first user.
The surrounding environment information in the present application may be data collected by a sensor mounted on the vehicle, and may also be analysis data extracted after analyzing and processing the collected data, and the surrounding environment information may indicate a risk level of an environment in which the vehicle is located.
Alternatively, the vehicle may respond to the acquisition request by turning on the sentinel mode to perform the monitoring. Thereafter, in order to protect the privacy of the first user and avoid the privacy of the first user (for example, the travel information, the current location information, and the like of the first user) from being revealed to other authorized users and the owner user, the collected ambient information or at least part of the collected ambient information may be sent to an account corresponding to the first user. The first user may view through a client logged into his account. Optionally, in S204, one implementation manner of pushing the ambient environment information to the account corresponding to the first user is to upload the ambient environment information to the cloud server, and update the ambient environment information to the account corresponding to the first user set in the cloud server. For example, the vehicle uploads the ambient environment information to the cloud server, and then updates the ambient environment information to an account corresponding to the first user set in the cloud server.
In addition to pushing the ambient environment information to the account corresponding to the first user, in order to enable the vehicle owner user to timely know that the vehicle is injured and disposed of when the vehicle is considered to be possibly in some environments with higher risk degrees (for example, the vehicle is violently collided, windows of the vehicle are attacked, and the like), the ambient environment information may be optionally pushed to the account corresponding to the vehicle owner user. Specifically, the risk degree of the environment where the vehicle is located is judged based on the surrounding environment information; and if the risk degree of the environment where the vehicle is located is higher than the risk degree threshold value, pushing the surrounding environment information to an account corresponding to the owner user. This is referred to in the examples below, and is not expanded here.
In addition, the surrounding environment information in the present application may further include data generated by the vehicle management side based on a preset logic. For example, attribute data is added to data (monitored data) of an image acquired by a vision sensor to obtain ambient environment information. The attribute data includes time attribute data (for example, the time when the image was captured), geographic location attribute data (for example, the location where the image was captured), first user account attribute data (for example, the account number of the logged-in vehicle when the image was captured), and the like.
It can be seen that the security data, if acquired by an account that is not authorized by the first user, may cause the privacy of the first user to be revealed (for example, revealing the location where the first user stops the vehicle, revealing the location of the first user). Therefore, in a further optional embodiment of the present application, if the first user information does not match the original authorization information, it indicates that the first user is not granted the right to acquire the vehicle surrounding environment information by the owner user, and in this case, the request for acquiring the vehicle surrounding environment information may be ignored.
In addition to determining whether valid authorization information exists in the first user information through the original authorization information, the present application provides another optional embodiment for determining whether valid authorization information exists in the first user information. Specifically, it is assumed that the valid authorization information includes the acquisition right of the surrounding environment information of the vehicle. Based on this, in S203, it is determined whether the first user is logged in to the client. Optionally, authentication information of the user, such as a user name, a user identity, a mobile phone number, fingerprint information, and a user face image, is used in the login process. And then, judging whether the first user has the login authority through the verification information, if so, the login is successful, otherwise, the login is failed. The client in the application can be loaded in a user terminal, and the user terminal includes but is not limited to any one of a mobile phone, a bracelet and an electronic key.
And further, if the first user logs in the client, judging whether the first user has the authority of acquiring the surrounding environment information of the vehicle or not based on the first user information, and judging whether the client communicates with the vehicle in a near field communication mode or not. Since the nfc manner is limited by the distance between the vehicle and the client, in S204, if the first user has the right to acquire the ambient environment information of the vehicle, and the client communicates with the vehicle through the nfc manner, it indicates that the first user has been granted the right to acquire the ambient environment information by the owner user, and the first user is in the vicinity of the vehicle (i.e., within the communication range of the corresponding nfc manner), in S204, the monitoring of the ambient environment of the vehicle is triggered based on the acquisition request to acquire the ambient environment information, and the ambient environment information is pushed to the account corresponding to the first user. Here, the flow of acquiring and pushing the ambient environment information is similar to the above, and is not expanded here. Optionally, before 203, a communication connection between the client on which the first user logs in and the vehicle is established by means of near field communication. Or, a communication connection between the client terminal where the first user logs in and the vehicle can be established through the cloud server. The near field communication method in the present application includes, but is not limited to, bluetooth and NFC.
According to the vehicle control method in the embodiment of the application, for the condition that the vehicle is in a non-driving state, an acquisition request of the ambient environment information of the vehicle is received, the first user information is determined according to the monitoring request, whether effective authorization information exists in the first user information or not is judged, the authorization information corresponds to the first user, and the authorization information is at least related to the acquisition authority of the ambient environment information of the vehicle, wherein the first user is different from a vehicle owner user of the vehicle. If valid authorization information exists in the first user information, it is indicated that the first user has the authority to acquire the vehicle surrounding environment information, and in this case, the vehicle surrounding environment information may be acquired based on the acquisition request. By the vehicle control scheme, a vehicle monitoring function (such as a sentinel mode) can be started for a user sending an acquisition request in a multi-user vehicle scene, and the vehicle safety is further improved.
As can be seen from the foregoing, the vehicle control process in the present application is based on the condition that the vehicle is in a non-driving state (including no person in the vehicle or the vehicle is in a parking state), and in order to determine whether the vehicle is in the non-driving state, reference may be made to the following embodiments:
in an alternative embodiment of the present application, the vehicle management terminal determines whether the vehicle is parked or not based on the monitored data of the operating state of the components of the vehicle (the monitored data may be collected by a monitoring system of the vehicle, and the monitoring system may include a seatbelt buckle monitoring sensor, a door monitoring sensor, and the like). The components of the vehicle include, but are not limited to, a drive device of the vehicle, accessories (e.g., an air conditioner, etc.), safety components of the vehicle (e.g., a seat belt), structural components of the vehicle (e.g., a door). Or the monitoring system can judge whether the vehicle is unmanned or not through the vehicle-interior pressure sensor.
The working state of a driving device is monitored, and if the driving device of the vehicle is in a non-working state, the vehicle is determined to be in a parking state. In addition, if the distance between the first user and the vehicle is monitored to be greater than a distance threshold, it is determined that no person is in the vehicle.
Wherein the location of the first user may be determined by a client corresponding to the first user. In the case where the client is software such as an application program, the user terminal may acquire the location information of the first user by means of a positioning function provided by a hardware device to which the user terminal belongs. For example, when the user terminal installed in the client is a hardware device such as a mobile phone, the first user can be located based on a Positioning function (e.g., Global Positioning System, GPS) provided in the user terminal. The position of the vehicle may be obtained by the vehicle management terminal. In addition, if the client logged in by the first user establishes communication connection with the vehicle in a near field communication mode, the distance between the first user and the vehicle can also be judged by monitoring the connection state of the client and the vehicle. If the communication between the client and the vehicle is interrupted and the communication interruption duration exceeds the preset duration, it can be determined that the distance between the first user and the vehicle is greater than the distance threshold, and in this case, no person is in the vehicle.
Further, the vehicle management end receives data collected by the door monitoring sensor and the safety belt lock catch monitoring sensor, and if the data collected by the door monitoring sensor shows that the door is locked and the data collected by the safety belt lock catch monitoring sensor shows that the safety belt is not fastened, it is determined that no person is in the vehicle or the vehicle is in a parking state.
In another alternative embodiment of the present application, the vehicle management terminal determines whether no person is in the vehicle or the vehicle is parked based on data collected by an image sensor inside the vehicle. Specifically, whether no person is present in the vehicle or the vehicle is in a parked state is detected by means of a living body. The living body detection includes, but is not limited to, human face image detection by a vision sensor. For example, if the face image of the first user is not detected in the vehicle, it is determined that the vehicle is in the non-driving state.
On one hand, privacy protection is emphasized in the vehicle control process, and the privacy of the first user is prevented from being disclosed to other authorized users except the first user; on the other hand, consideration should also be given in terms of maximizing the safety of the vehicle.
In order to improve the safety of the vehicle, in an optional embodiment of the present application, the owner user information of the vehicle is determined under the condition that the surrounding environment information of the vehicle is monitored. As can be seen from the above description, the owner user is a user having higher authority for the vehicle than the authorized user, for example, the owner user may be an administrator in a shared vehicle scenario, an administrator in a home scenario, or a user having authorization authority for monitoring the vehicle in other scenarios.
Optionally, the vehicle management terminal is connected to a storage module, and the storage module stores owner user information of the vehicle in advance. The vehicle management terminal can determine the owner user information of the vehicle from the information stored in the storage module.
In this embodiment, if the ambient environment information indicates that the risk level of the environment in which the vehicle is located is high (for example, higher than a set risk level threshold), it indicates that the vehicle is or may face a high security risk, except that the ambient environment information is sent to the account corresponding to the first user, in order to avoid that the first user fails to take corresponding measures, or that the first user has no processing authority for the risk level, or that the first user hides the risk borne by the vehicle from the vehicle owner user, and the like, in this application, the ambient environment information is optionally sent to the account corresponding to the vehicle owner user, so as to timely notify the vehicle owner user of the risk level, so that at least one end corresponding to the account of the vehicle owner user can store the ambient environment information indicating the high risk for subsequent processing.
In a further optional embodiment of the present application, if the request for obtaining the vehicle surrounding environment information is from an authorized user (such as the first user having valid authorization information mentioned above), the risk level of the environment where the vehicle is located is determined based on the vehicle surrounding environment information. Specifically, when the surrounding environment information shows that the risk degree of the environment where the vehicle is located is higher than a risk degree threshold value, determining an owner user of the vehicle; sending the monitored ambient environment information to an account corresponding to the vehicle owner user; and if the environment of the vehicle is not the high-risk environment, waiting for next execution of judgment on whether the environment is the high-risk environment. In practical application, the risk degree threshold value can be set according to the use scene, and the types and the numerical values of the risk degree threshold values in different types of use scenes are different.
Optionally, besides the account corresponding to the owner user information, the surrounding environment information may be sent to other devices to monitor the safety of the vehicle. Specifically, the access address of the cloud server is determined under the condition that the surrounding environment information is monitored. Then, the cloud server is accessed by the access address to send the monitored ambient environment information to the cloud server (as shown in fig. 1 for example). In this embodiment, the cloud server can at least store the ambient environment information for subsequent processing. In addition, whether the ambient environment information is to be sent to the cloud server can be determined according to the risk degree of the environment where the vehicle is located, which is shown by the ambient environment information.
Exemplarily, an optional processing flow in the high risk environment described above, assuming that the ambient environment information is safety data of the vehicle, the first user is a user of the vehicle, and the owner user is an administrator, as shown in fig. 3, specifically:
s300: and the vehicle management terminal determines that the safety data show that the environment of the vehicle is a high-risk environment.
S302: and the vehicle management terminal sends the safety data to an account corresponding to the user.
S304: and the vehicle management terminal generates an alarm instruction and sends the alarm instruction to the client terminal corresponding to the logged-in user.
S306: the client prompts the user for a high risk environment.
And the client displays a risk confirmation control in an interface for prompting the risk to the user. Such as pushing a reminder text or pop-up window to the user indicating the corresponding risk.
S308: the client determines whether a user' S designated operation (e.g., a click operation) with respect to the risk confirmation control is detected, and if so, executes step S310. If not, go to step S306.
S310: and generating a risk confirmation message and returning the risk confirmation message to the vehicle management terminal.
S312: and the vehicle management terminal judges whether the risk confirmation message is received within a specified time period (the duration of the specified time period is preset duration) after the alarm instruction is sent. If yes, go to step S314; if not, go to step S316.
S314: the monitoring is continued.
S316: and sending the security data to an account and/or a cloud server corresponding to the administrator information.
Based on the same idea, the embodiment of the present application further provides a vehicle control device corresponding to the flow shown in fig. 2, and the vehicle control device is shown in fig. 4.
Fig. 4 is a schematic structural diagram of a vehicle control device provided in an embodiment of the present application, where a vehicle is in a non-driving state, and the vehicle control device may include one or more of the following modules:
a transceiver module 401 configured to perform: receiving an acquisition request for surrounding environment information of a vehicle;
an acquisition module 402 configured to perform: determining first user information according to the acquisition request;
a determining module 403 configured to perform: judging whether effective authorization information exists in the first user information, wherein the authorization information corresponds to the first user and is at least related to the acquisition permission of the surrounding environment information of the vehicle, and the first user is different from a vehicle owner user of the vehicle;
a monitoring module 404 configured to perform: if valid authorization information exists, the surrounding environment information of the vehicle is acquired based on the acquisition request.
In an optional embodiment of the present application, the determining module 403 is specifically configured to perform: acquiring original authorization information configured for the first user by a vehicle owner user; and judging whether the original authorization information is matched with the authorization information in the first user information.
The monitoring module 404 is specifically configured to perform: if the original authorization information is matched with authorization information in the first user information, determining that effective authorization information exists in the first user information; triggering monitoring of the vehicle surroundings based on the acquisition request to acquire the surrounding environment information; and pushing the ambient environment information to an account corresponding to the first user.
In an optional embodiment of the present application, the monitoring module 404 is further configured to perform: and if the original authorization information is not matched with the authorization information in the first user information, ignoring the acquisition request.
In an alternative embodiment of the present application, the authorized user comprises the target user who last logged into the vehicle before switching to the non-driving state.
The determining module 403 obtains the original authorization information configured by the owner user for the first user, and is specifically configured to execute:
determining a target user who logs in a vehicle control system last before the vehicle is switched to a non-driving state; and using the authorization information used by the target user for logging in the vehicle control system as the original authorization information.
In an optional embodiment of the present application, the authorization information includes an acquisition right of the surrounding environment information of the vehicle; the determining module 403 is specifically configured to execute: disconnecting whether the first user logs in a client; if the first user logs in the client, judging whether the first user has the authority of acquiring the surrounding environment information of the vehicle or not based on the first user information; and judging whether the client communicates with the vehicle in a near field communication mode.
The monitoring module 404 is specifically configured to perform: if the first user has the acquisition permission and the client communicates with the vehicle in a near field communication mode, triggering monitoring of the surrounding environment of the vehicle based on an acquisition request to acquire surrounding environment information; and pushing the ambient environment information to an account corresponding to the first user.
In an optional embodiment of the present application, the vehicle control apparatus further comprises an access module configured to perform: establishing a communication connection between the client and the vehicle in a near field communication mode; or establishing communication connection between the client and the vehicle through a cloud server.
In an optional embodiment of the present application, the monitoring module 404 pushes the ambient environment information to an account corresponding to the first user, and is specifically configured to perform:
uploading surrounding environment information to a cloud server; and updating the ambient environment information to an account corresponding to the first user set in the cloud server.
In an alternative embodiment of the present application, the monitoring module 404 is further configured to perform: and pushing the surrounding environment information to an account corresponding to the owner user.
In an optional embodiment of the present application, the monitoring module 404 pushes the ambient environment information to an account corresponding to the vehicle owner user, and is specifically configured to execute:
judging the risk degree of the environment where the vehicle is located based on the surrounding environment information; and if the risk degree of the environment where the vehicle is located is higher than the risk degree threshold value, pushing the surrounding environment information to an account corresponding to the owner user.
In an alternative embodiment of the present application, the non-driving state includes the vehicle being unattended and/or the vehicle being parked.
The vehicle control apparatus further includes a determination module configured to perform: if the driving device of the vehicle is in a non-working state, determining that the vehicle is in a parking state; and/or determining that no person is in the vehicle if the monitored distance between the user and the vehicle is greater than the distance threshold.
In an alternative embodiment of the present application, the authorization information is managed by the owner user.
Embodiments of the present application also provide a computer-readable storage medium, which stores a computer program, where the computer program can be used to execute the process of vehicle control provided in fig. 2.
The embodiment of the application also provides a schematic structural diagram of the vehicle shown in FIG. 5. As shown in fig. 5, at the hardware level, the vehicle may include a processor, an internal bus, a network interface, a memory, and a non-volatile memory, although it may also include hardware required for other services. The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to realize the process of controlling any one of the vehicles.
Of course, besides the software implementation, the present application does not exclude other implementations, such as a combination of logic devices or software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, Programmable Logic Devices (PLDs) (e.g., Field Programmable Gate Arrays (FPGAs)) are integrated circuits whose Logic functions are determined by a user programming the device.a designer, instead of manually programming an integrated circuit chip, may instead "integrate" a digital system onto a PLD using "Logic compiler" software, similar to the software compiler used in program development, but instead of manually programming an integrated circuit chip, the original code before compilation is written in a specific programming Language, known as Hardware Description Language (HDL), such as abel (advanced programming Language), but not just HDL, but any of a variety of languages, such as various types of integrated circuit chips (FPGAs), AHDL (Altera Hardware Description Language), Confluent, CUPL (Central University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALSM, RHDL (Ruby Hardware Description Language), etc., with VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog being most commonly used at present. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, apparatuses, modules or units described in the above embodiments may be specifically implemented by a computer chip or an entity, or implemented by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, respectively. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (13)

1. A control method for a vehicle that is in a non-running state, characterized by comprising:
receiving an acquisition request for the surrounding environment information of the vehicle;
determining first user information according to the acquisition request;
judging whether effective authorization information exists in the first user information, wherein the authorization information corresponds to a first user and is at least related to the acquisition permission of the surrounding environment information of the vehicle, and the first user is different from the owner user of the vehicle;
and if the valid authorization information exists, acquiring the surrounding environment information of the vehicle based on the acquisition request.
2. The method of claim 1, wherein the determining whether valid authorization information exists in the first user information comprises:
acquiring original authorization information configured for the first user by the owner user;
judging whether the original authorization information is matched with authorization information in the first user information;
if the valid authorization information exists, acquiring the surrounding environment information of the vehicle based on the acquisition request, wherein the acquiring comprises:
if the original authorization information is matched with authorization information in the first user information, determining that valid authorization information exists in the first user information;
triggering monitoring of the vehicle surroundings based on the acquisition request to acquire the surrounding environment information;
and pushing the ambient environment information to an account corresponding to the first user.
3. The method of claim 2, wherein the method further comprises:
and if the original authorization information is not matched with the authorization information in the first user information, ignoring the acquisition request.
4. The method of claim 2, wherein the first user comprises a target user who last logged into the vehicle before switching to the non-driving state;
the acquiring of the original authorization information configured by the owner user for the first user includes:
determining a target user who logs in a vehicle control system last before the vehicle is switched to a non-driving state;
and taking authorization information used by the target user for logging in the vehicle control system as the original authorization information.
5. The method according to claim 1, wherein the authorization information includes an acquisition right of the surrounding environment information of the vehicle;
the determining whether valid authorization information exists in the first user information includes:
judging whether the first user logs in a client side or not;
if the first user logs in the client, judging whether the first user has the authority of acquiring the surrounding environment information of the vehicle or not based on the first user information;
judging whether the client communicates with the vehicle in a near field communication mode;
if the valid authorization information exists, acquiring the surrounding environment information of the vehicle based on the acquisition request, wherein the acquiring comprises:
if the first user has the acquisition permission and the client communicates with the vehicle in a near field communication mode, triggering monitoring of the surrounding environment of the vehicle based on the acquisition request to acquire the surrounding environment information;
and pushing the ambient environment information to an account corresponding to the first user.
6. The method of claim 5, further comprising:
establishing a communication connection between the client and the vehicle in a near field communication mode; or
And establishing communication connection between the client and the vehicle through a cloud server.
7. The method of claim 2 or 5, wherein the pushing the ambient environment information to an account corresponding to the first user comprises:
uploading the surrounding environment information to a cloud server;
and updating the ambient environment information to an account corresponding to the first user set in the cloud server.
8. The method of claim 2 or 5, further comprising pushing the ambient environment information to an account corresponding to the vehicle owner-user.
9. The method of claim 8, wherein the pushing the ambient environment information to an account corresponding to the vehicle owner user comprises:
judging the risk degree of the environment where the vehicle is located based on the surrounding environment information;
and if the risk degree is higher than a risk degree threshold value, pushing the ambient environment information to an account corresponding to the vehicle owner user.
10. The method of claim 1, wherein the non-driving state comprises the vehicle being unmanned inside and/or the vehicle being in a parked state;
the method further comprises the following steps:
if the driving device of the vehicle is in a non-working state, determining that the vehicle is in a parking state; and/or
If the distance between the first user and the vehicle is monitored to be larger than a distance threshold value, determining that no person is in the vehicle.
11. A vehicle control apparatus characterized in that the vehicle is in a non-running state, the apparatus comprising:
a transceiver module configured to perform: receiving an acquisition request for the surrounding environment information of the vehicle;
an acquisition module configured to perform: determining first user information according to the acquisition request;
a determination module configured to perform: judging whether effective authorization information exists in the first user information, wherein the authorization information corresponds to a first user and is at least related to the acquisition permission of the surrounding environment information of the vehicle, and the first user is different from a vehicle owner user of the vehicle;
a monitoring module configured to perform: and if the valid authorization information exists, acquiring the surrounding environment information of the vehicle based on the acquisition request.
12. A computer-readable storage medium, characterized in that the storage medium stores a computer program which, when being executed by a processor, carries out the method of any one of the preceding claims 1 to 10.
13. A vehicle comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the method of any of claims 1-10.
CN202210369295.4A 2022-04-08 2022-04-08 Vehicle control method and device, storage medium and vehicle Active CN114915971B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210369295.4A CN114915971B (en) 2022-04-08 2022-04-08 Vehicle control method and device, storage medium and vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210369295.4A CN114915971B (en) 2022-04-08 2022-04-08 Vehicle control method and device, storage medium and vehicle

Publications (2)

Publication Number Publication Date
CN114915971A true CN114915971A (en) 2022-08-16
CN114915971B CN114915971B (en) 2024-08-13

Family

ID=82762865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210369295.4A Active CN114915971B (en) 2022-04-08 2022-04-08 Vehicle control method and device, storage medium and vehicle

Country Status (1)

Country Link
CN (1) CN114915971B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115514575A (en) * 2022-10-08 2022-12-23 阿维塔科技(重庆)有限公司 Vehicle control method, device, equipment and computer readable storage medium
CN115580847A (en) * 2022-12-09 2023-01-06 小米汽车科技有限公司 Vehicle-mounted function control method and device, vehicle and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170129335A1 (en) * 2015-11-03 2017-05-11 GM Global Technology Operations LLC Systems and methods for vehicle system control based on physiological traits
CN107650863A (en) * 2017-09-19 2018-02-02 大陆汽车投资(上海)有限公司 Vehicle sharing method and system
CN108665562A (en) * 2018-03-28 2018-10-16 西安艾润物联网技术服务有限责任公司 Stop field control method, system and computer readable storage medium in hotel
CN110807178A (en) * 2019-10-11 2020-02-18 东风汽车有限公司 Vehicle authorization management method and device, terminal and server
CN111422164A (en) * 2020-02-21 2020-07-17 吉利汽车研究院(宁波)有限公司 Vehicle starting control method, device and equipment
CN112408286A (en) * 2020-11-17 2021-02-26 苏州易信安工业技术有限公司 Anti-collision processing method, device and system based on user identity
CN112785846A (en) * 2020-12-30 2021-05-11 珠海大横琴科技发展有限公司 Vehicle monitoring method and device
CN112836191A (en) * 2019-11-22 2021-05-25 比亚迪股份有限公司 Vehicle authorization method and device, computer equipment and storage medium
CN113015667A (en) * 2020-05-11 2021-06-22 华为技术有限公司 Vehicle self-protection method and system and automatic driving vehicle comprising system
CN113619601A (en) * 2021-08-20 2021-11-09 阿波罗智联(北京)科技有限公司 Vehicle control method and device
WO2022015579A1 (en) * 2020-07-14 2022-01-20 Micron Technology, Inc. Activating a security mode for a vehicle based on driver identification

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170129335A1 (en) * 2015-11-03 2017-05-11 GM Global Technology Operations LLC Systems and methods for vehicle system control based on physiological traits
CN107650863A (en) * 2017-09-19 2018-02-02 大陆汽车投资(上海)有限公司 Vehicle sharing method and system
CN108665562A (en) * 2018-03-28 2018-10-16 西安艾润物联网技术服务有限责任公司 Stop field control method, system and computer readable storage medium in hotel
CN110807178A (en) * 2019-10-11 2020-02-18 东风汽车有限公司 Vehicle authorization management method and device, terminal and server
CN112836191A (en) * 2019-11-22 2021-05-25 比亚迪股份有限公司 Vehicle authorization method and device, computer equipment and storage medium
CN111422164A (en) * 2020-02-21 2020-07-17 吉利汽车研究院(宁波)有限公司 Vehicle starting control method, device and equipment
CN113015667A (en) * 2020-05-11 2021-06-22 华为技术有限公司 Vehicle self-protection method and system and automatic driving vehicle comprising system
WO2022015579A1 (en) * 2020-07-14 2022-01-20 Micron Technology, Inc. Activating a security mode for a vehicle based on driver identification
CN112408286A (en) * 2020-11-17 2021-02-26 苏州易信安工业技术有限公司 Anti-collision processing method, device and system based on user identity
CN112785846A (en) * 2020-12-30 2021-05-11 珠海大横琴科技发展有限公司 Vehicle monitoring method and device
CN113619601A (en) * 2021-08-20 2021-11-09 阿波罗智联(北京)科技有限公司 Vehicle control method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115514575A (en) * 2022-10-08 2022-12-23 阿维塔科技(重庆)有限公司 Vehicle control method, device, equipment and computer readable storage medium
CN115580847A (en) * 2022-12-09 2023-01-06 小米汽车科技有限公司 Vehicle-mounted function control method and device, vehicle and storage medium
CN115580847B (en) * 2022-12-09 2023-04-07 小米汽车科技有限公司 Vehicle-mounted function control method and device, vehicle and storage medium

Also Published As

Publication number Publication date
CN114915971B (en) 2024-08-13

Similar Documents

Publication Publication Date Title
CN110807178B (en) Vehicle authorization management method and device, terminal and server
US9988016B1 (en) Authentication of mobile devices for vehicle communication
JP6074039B2 (en) Gradual access level for vehicles
US10147257B2 (en) Systems and methods for user based vehicle access control
CN107251105B (en) Motor vehicle security and motor vehicle safety system
CN114915971B (en) Vehicle control method and device, storage medium and vehicle
US20170334395A1 (en) Smart key generating device, automobile, and method for controlling the automobile by using the smart key
CN109799801B (en) Unmanned transport system
US20150099500A1 (en) Vehicle operator/driver and wireless device synchronization and uses thereof
KR20190127841A (en) In-vehicle intelligent wireless access systems and methods
US20100273452A1 (en) Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device
US20150091713A1 (en) System and method for vehicle theft detection
KR20190128070A (en) In-vehicle intelligent access systems and methods
EP3471067A1 (en) Security system and method
CN112248967A (en) Unlocking method, system and storage medium
US9489537B2 (en) Personal information protection for navigation systems
CN105459955A (en) Automobile theft resistant method, device and system based on networking technique
US20200247364A1 (en) Safety methods and systems for vehicles
US20130278446A1 (en) Vehicular observation system, apparatus, and server for the vehicular observation system
RU141642U1 (en) TELEMATIC DEVICE FOR CAR
CN108062805B (en) Vehicle-mounted data processing method and server
CN113978414A (en) Vehicle control method, device, storage medium and equipment
KR20220086772A (en) Apparatus and method for performing driver-specific start control and driving information generation for a motorcycle based on biometrics
Alli et al. Design and Construction of a remotely controlled vehicle anti-theft system via GSM network
JP2017144777A (en) Authentication system and authentication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230904

Address after: Room 844, Floor 8, Building 1, No. 10, Hongda North Road, Beijing Economic and Technological Development Zone, Daxing District, Beijing 100176 (Yizhuang Cluster, High end Industrial Zone, Beijing Free Trade Zone)

Applicant after: Beijing Jidu Technology Co.,Ltd.

Address before: Room 611, 6th Floor, Block A, Building A, No. 12, Hongda North Road, Beijing Economic and Technological Development Zone, Beijing 102101 (Beijing Free Trade Pilot Zone High-end Industrial Zone Yizhuang Group)

Applicant before: Jidu Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant