CN115131933A - Security method, related device and vehicle - Google Patents

Security method, related device and vehicle Download PDF

Info

Publication number
CN115131933A
CN115131933A CN202210759829.4A CN202210759829A CN115131933A CN 115131933 A CN115131933 A CN 115131933A CN 202210759829 A CN202210759829 A CN 202210759829A CN 115131933 A CN115131933 A CN 115131933A
Authority
CN
China
Prior art keywords
vehicle
security
information
area
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210759829.4A
Other languages
Chinese (zh)
Inventor
张婷
王倩
李雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAIC Motor Corp Ltd
Original Assignee
SAIC Motor Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SAIC Motor Corp Ltd filed Critical SAIC Motor Corp Ltd
Priority to CN202210759829.4A priority Critical patent/CN115131933A/en
Publication of CN115131933A publication Critical patent/CN115131933A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19647Systems specially adapted for intrusion detection in or around a vehicle
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19652Systems using zones in a single scene defined for different treatment, e.g. outer zone gives pre-alarm, inner zone gives alarm
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Abstract

The application discloses a security method, a related device and a vehicle. It is thus clear that the external environment that the vehicle was located is detected through the outside camera of automobile body, can reflect the external environment condition that the vehicle was located based on this vehicle external information who gathers, and then analyzes vehicle external information and confirms security protection tip information to send this security protection tip information for the target user of vehicle, make the vehicle user can pay attention to and know the external environment condition that the vehicle was located at any time from this, in time deal with the safety problem that external environment changes and bring.

Description

Security method, related device and vehicle
Technical Field
The application relates to the technical field of vehicles, in particular to a security method, a related device and a vehicle.
Background
The caravan is called as 'home on wheels' and is widely popular with tourists. At present, motor home vehicles are equipped with related living facilities meeting basic requirements of clothes, food, live, walking and the like. If the multifunctional electric car is provided with electrical products such as storage compartments, refrigerators, air conditioners, televisions and the like, a user can more conveniently and freely live in a car home, and the user is not puzzled for finding accommodation places during traveling any more.
However, there is a certain safety risk in the caravan while providing convenience to the user. For example, when a motor home vehicle arrives at a remote area, a user cannot know the surrounding environment and is easily disturbed by a lawbreaker, and especially the user has a rest in the vehicle or leaves the vehicle for a short time, so that potential safety hazards are brought.
Disclosure of Invention
In order to solve the technical problems, the application provides a security method, a related device and a vehicle, so that a vehicle user can pay attention to and know the external environment condition of the vehicle at any time and timely cope with the security problem caused by the change of the external environment.
The embodiment of the application discloses the following technical scheme:
in one aspect, an embodiment of the present application provides a security method, where the method includes:
acquiring vehicle external information through a vehicle body external camera arranged on a vehicle;
analyzing the external information of the vehicle to determine security prompt information;
and sending the security protection prompt information to a target user corresponding to the vehicle.
Optionally, the analyzing the vehicle external information to determine the security prompt information includes:
analyzing the external information of the vehicle, and determining that the biological characteristic information of the illegal user is acquired in a target area where the vehicle is located; the illegal user is a user except the target user;
if the stay time of the illegal user in the target area is longer than the preset time, generating a collected video for collecting the biological characteristic information;
and determining the security prompt information according to the acquired video.
Optionally, the method further includes:
dividing the target area into a first area and a second area; the first region is used for identifying a region which is less than or equal to a first preset distance and greater than a second preset distance away from the vehicle, and the second region is used for identifying a region which is less than or equal to the second preset distance away from the vehicle.
Optionally, if the target area is the second area, the method further includes:
analyzing the vehicle external information, and determining that the illegal user touches the vehicle;
and controlling to start the warning equipment of the vehicle.
Optionally, the sending the security prompt information to the target user corresponding to the vehicle includes:
acquiring cloud communication equipment corresponding to the vehicle;
and sending the security protection prompt information to the target user through the cloud communication equipment.
Optionally, the method further includes:
if the fact that the camera head outside the vehicle body is abnormal is detected, generating abnormal prompt information;
and sending the abnormal prompt information to the target user.
On the other hand, the embodiment of the application provides a security protection device, the device includes acquisition unit, confirms unit and sending unit:
the acquisition unit is used for acquiring vehicle external information through a vehicle body external camera arranged on a vehicle;
the determining unit is used for analyzing the external information of the vehicle and determining security prompt information;
and the sending unit is used for sending the security prompt information to a target user corresponding to the vehicle.
Optionally, the determining unit is further configured to:
analyzing the external information of the vehicle, and determining that the biological characteristic information of the illegal user is acquired in a target area where the vehicle is located; the illegal user is a user except the target user;
if the stay time of the illegal user in the target area is longer than the preset time, generating a collected video for collecting the biological characteristic information;
and determining the security prompt information according to the acquired video.
Optionally, the method further includes a dividing unit:
the dividing unit is used for dividing the target area into a first area and a second area; the first area is used for identifying an area which is less than or equal to a first preset distance and greater than a second preset distance away from the vehicle, and the second area is used for identifying an area which is less than or equal to the second preset distance away from the vehicle.
Optionally, if the target area is the second area, the determining unit is further configured to:
analyzing the vehicle external information, and determining that the illegal user touches the vehicle;
and controlling to start the warning equipment of the vehicle.
Optionally, the sending unit is further configured to:
acquiring cloud communication equipment corresponding to the vehicle;
and sending the security protection prompt information to the target user through the cloud communication equipment.
Optionally, the sending unit is further configured to:
if the fact that the camera head outside the vehicle body is abnormal is detected, generating abnormal prompt information;
and sending the abnormal prompt information to the target user.
In yet another aspect, an embodiment of the present application provides a computer device, including a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is used for executing the security method according to the instructions in the program codes.
In still another aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, where the computer program is used to execute the security method described in the above aspect.
In another aspect, an embodiment of the present application provides a vehicle, where the vehicle includes a security system, and the security system is configured to execute the security method in the foregoing aspect.
According to the technical scheme, the camera is mounted outside the vehicle body of the vehicle, the camera is further used for collecting the external information of the vehicle, the collected external information of the vehicle is analyzed to determine the security prompt information, and finally the security prompt information is sent to the target user corresponding to the vehicle. It is thus clear that the external environment that the vehicle was located is detected through the outside camera of automobile body, can reflect the external environment condition that the vehicle was located based on this vehicle external information who gathers, and then analyzes vehicle external information and confirms security protection tip information to send this security protection tip information for the target user of vehicle, make the vehicle user can pay attention to and know the external environment condition that the vehicle was located at any time from this, in time deal with the safety problem that external environment changes and bring.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a security method provided in an embodiment of the present application;
FIG. 2 is a schematic view of a vehicle according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a security system provided in an embodiment of the present application;
fig. 4 is a structural diagram of a security device provided in an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Touring cars are popular with tourists, and at present, touring cars are equipped with facilities meeting basic requirements of related living such as clothes, food, live, and walk. If the multifunctional electric car is provided with electrical products such as storage cabins, refrigerators, air conditioners, televisions and the like, a user can more conveniently and freely live in a car as a house, and the user is not puzzled for finding accommodation sites during traveling.
However, there is a certain safety risk in the caravan while providing convenience to the user. For example, when a motor home vehicle arrives at a remote area, a user cannot know the surrounding environment and is easily disturbed by a lawbreaker, and especially the user has a rest in the vehicle or leaves the vehicle for a short time, so that potential safety hazards are brought.
Therefore, the application provides a security method, a related device and a vehicle, so that a vehicle user can pay attention to and know the external environment condition of the vehicle at any time and timely cope with the safety problem caused by the change of the external environment.
The security method provided by the embodiment of the application can be implemented through computer equipment, the computer equipment can be terminal equipment or a server, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud computing service. The terminal devices include, but are not limited to, mobile phones, computers, intelligent voice interaction devices, intelligent household appliances, vehicle-mounted terminals, and the like. The terminal device and the server may be directly or indirectly connected through wired or wireless communication, which is not limited in this application.
The following examples are intended to illustrate in particular:
fig. 1 is a flowchart of a security method provided in an embodiment of the present application, which is described by taking a terminal device as the foregoing computer device as an example, and the method includes S101 to S103:
s101: the vehicle external information is collected through a vehicle body external camera installed on the vehicle.
When the vehicle runs in a remote area or the like, the external environment where the vehicle is located can be detected through a security system of the vehicle, so that a target user of the vehicle such as a vehicle owner can pay attention to and know the surrounding environment where the vehicle is located at any time. It can be understood that the security system of the vehicle may be automatically started for detection after the vehicle is powered on, or may be actively started by a vehicle owner and other users according to a specific driving scene, for example, when the user drives a vehicle to a remote area, the security system of the vehicle may be actively started to detect the surrounding environment where the vehicle is located, which is not limited in this application. That is, before executing S101, turning on a security system of the vehicle may be further included.
It should be noted that, in order to detect an external environment of a vehicle by linking existing devices of the vehicle, the security system may be deployed in the vehicle, and a host of the vehicle may be used as a security host in the security system, that is, the security host is the terminal device.
After the security system of the vehicle is started, the external information of the vehicle can be collected through a camera arranged outside the vehicle body of the vehicle, so that corresponding security prompt information can be generated to prompt a user. That is to say, the security system comprises an external camera of the vehicle body, which is installed outside the vehicle body of the vehicle and used for collecting external information of the vehicle.
In order to detect the surrounding environment of the vehicle more comprehensively, in a possible implementation manner, one camera may be mounted at each of the front, the rear, the left and the right outside the vehicle body of the vehicle, and the mounting manner shown in fig. 2 may be referred to. It should be noted that, the installation manner and the installation number of the cameras may be selected according to actual situations, and the present application is not limited to this.
It can be understood that the function of the vehicle body external camera is to detect the external environment condition of the vehicle, and in order to avoid that detection cannot be performed due to abnormality of the vehicle body external camera, in a possible implementation manner, if abnormality occurs in the vehicle body external camera, abnormality prompt information is generated, and then the abnormality prompt information is sent to the target user. For example, when the camera outside the vehicle body is maliciously shielded by others, an abnormality occurs, or objects such as trees around which the vehicle stops shield the camera outside the vehicle body.
S102: and analyzing the external information of the vehicle to determine the security prompt information.
After vehicle external information is collected by the vehicle body external camera, the collected vehicle external information can be sent to the security host, and then the security host can analyze the vehicle external information so as to determine security prompt information.
Generally, the vehicle external information collected by the vehicle body external camera may be in the form of a recorded video file or other file, and the vehicle external information may reflect the environmental conditions around the vehicle within a period of time. In practical application, when the environment within a certain distance from the vehicle changes, it can be considered that a danger exists, and at this time, security prompt information needs to be sent to a user according to the dangerous situation. Thus, in one possible implementation, S102 may include the steps of:
analyzing the external information of the vehicle, and determining that the biological characteristic information of the illegal user is acquired in a target area where the vehicle is located; the illegal user is a user except the target user;
if the stay time of the illegal user in the target area is longer than the preset time, generating a collected video for collecting the biological characteristic information;
and determining security protection prompt information according to the acquired video.
Specifically, when the camera detects that an illegal user breaks into the target area and the stay time of the illegal user in the target area is longer than a preset time, the camera can be considered to be dangerous, a collected video of biological characteristic information collected by the camera can be generated at the moment, the collected video is sent to the security host, and then the security host can determine security prompt information according to the collected video.
The target area is used for identifying a range in which the distance from the vehicle is less than or equal to a first preset distance, for example, the first preset distance may be set to five meters; the first preset duration may be set by the target user, for example, the first preset duration may be set to sixty seconds. That is, when the biometric information of the illegal user is detected within five meters and the illegal user stays in the target area for more than sixty seconds, it is determined that a certain danger exists at this time, the illegal user is a user other than the target user, the target user is a co-operating user corresponding to the vehicle, such as a vehicle owner user and a vehicle owner user, and the biometric information may be a human face and a human intrusion action. It can be understood that when a plurality of illegal users are detected, the information of the number of people for determining the illegal users can be counted.
The mode of determining the security prompt information according to the collected video can be set according to actual conditions, and the method and the device are not limited to this. For example, the collected video may be directly used as the security prompt information, a key frame image in the collected video may also be captured as the security prompt information, a current security level (or a danger level) may also be determined based on the collected video, and then the corresponding security prompt information may be determined based on the security level (or the danger level).
In a possible implementation manner, the target area may be further divided into a first area and a second area; the first region is used for identifying a region with a distance from the vehicle being smaller than or equal to a first preset distance and larger than a second preset distance, and the second region is used for identifying a region with a distance from the vehicle being smaller than or equal to a second preset distance.
It is understood that the first predetermined distance is greater than the second predetermined distance, for example, the first predetermined distance may be set to five meters, and the second predetermined distance may be set to two meters. That is, the second region is a region closer to the vehicle than the first region.
If the camera detects biological characteristic information of an illegal user in the first area, for example, a person intruding within five meters and two meters away from the vehicle is detected, and the intruding user stays for more than sixty seconds and then leaves, the event can be defined as a three-level security level.
If the camera detects the biological characteristic information of the illegal user in the second area, for example, the illegal user is detected to break into the second area within two meters away from the vehicle, and the break-into user stays for more than thirty seconds, because the second area identifies the area close to the vehicle, when the illegal user is detected in the second area, the event can be defined as a second-level security level, compared with a third-level security level, the security warning degree is higher, and then a key frame image capable of reflecting the break-into of other people in the collected video can be intercepted to serve as security prompt information corresponding to the event.
Since the second area identifies an area closer to the vehicle, when an illegal user is detected in the second area, the method may further include:
analyzing the external information of the vehicle, and determining that an illegal user touches the vehicle;
and controlling to start the warning equipment of the vehicle.
Specifically, when an illegal user is detected in the second area and touches the vehicle by the illegal user, the illegal user is considered to have a higher threat to a target user of the vehicle and the like, the event can be defined as a primary security level, and the security warning degree is higher compared with a secondary security level. And then a section of video which can reflect the touch operation of an illegal user within a certain time before and after the touch operation of the illegal user in the collected video can be intercepted and taken as security prompt information. Meanwhile, in order to improve the safety protection of the target user in the vehicle, the warning device of the vehicle can be controlled to be started, so that the target user in the vehicle can be reminded more directly and an illegal user who breaks away from the vehicle can be driven away.
The touch operation can be to touch a car body, a car handle and the like, and the warning equipment can be a horn of a car and the like. It can be understood that, if the environment where the vehicle is located is the night environment, the warning device can also be used for driving away the intruded illegal user in a manner of starting light flashing, such as a flash lamp of the vehicle, a sunshade shed lamp outside the vehicle body and the like.
In addition, if an illegal user is detected in the second area, and the illegal user carries out operations such as malicious shielding on the external camera of the vehicle body, so that the external camera of the vehicle body is abnormal, the event can be defined as a first-level security level, and then a section of video which can reflect a certain period of time before and after the illegal user shields the external camera of the vehicle body in the collected video can be intercepted and taken as security prompt information, meanwhile, abnormal prompt information is generated, and the security prompt information and the abnormal prompt information are sent to a target user, so that the target user can process the security event in time.
S103: and sending security protection prompt information to a target user corresponding to the vehicle.
The vehicle external information is detected and collected through the vehicle body external camera, so that the vehicle external information can reflect the external environment condition of the vehicle, the security prompt information determined based on the vehicle external information can reflect the security condition and other information of the external environment of the vehicle, and the security prompt information is sent to a target user of the vehicle, so that the vehicle user can pay attention to and know the external environment condition of the vehicle at any time, and the safety problem caused by the external environment change can be solved in time.
Generally, if a target user is in a vehicle, security prompt information can be directly displayed through a display device of a vehicle host, so that the user can view the security prompt information in time.
In addition, the cloud communication equipment corresponding to the vehicle can be obtained, and then security prompt information is sent to the target user through the cloud communication equipment. For example, in a scene that the vehicle is in a parking state and the target user temporarily leaves the vehicle, the security prompt information can be sent to the target user through the cloud communication device connected with the vehicle, so that the target user can know the environment condition around the vehicle at any time. The cloud communication device can be a smart phone of a target user and other devices. For example, the smart phone of the target user is in communication connection with the vehicle at the cloud, and the security prompt information can be checked through an APP (Application) on the smart phone.
Because different security levels correspond to security events with different risk degrees, in order to facilitate a target user to timely make corresponding security measures for the security event with higher risk degree, and simultaneously reduce excessive prompt for the target user (for example, for the security event with lower risk degree, which is detected only after a person in a first area breaks into the security event, the security event leaves the security event), in a possible implementation manner, a manner of sending security prompt information to the target user can be determined according to the security level. Specifically, if the security level is determined to be two-level or three-level, security prompt information can be sent to the target user in an APP prompt mode, if the security level is determined to be one-level, it is indicated that the risk degree of the security event is high, the target user needs to be reminded in time, at the moment, the security prompt information can be sent to the target user in a short message prompt mode or the like, and therefore the target user can respond in time and make corresponding security measures.
It can be understood that after the security host determines to generate the security prompt information, the security prompt information may be stored locally, so that the target user may view the security prompt information record and the like.
According to the technical scheme, the camera is mounted outside the vehicle body of the vehicle, the camera is further used for collecting the external information of the vehicle, the collected external information of the vehicle is analyzed to determine the security prompt information, and finally the security prompt information is sent to the target user corresponding to the vehicle. It is thus clear that the external environment that the vehicle was located is detected through the outside camera of automobile body, can reflect the external environment condition that the vehicle was located based on this vehicle external information who gathers, and then analyzes vehicle external information and confirms security protection tip information to send this security protection tip information for the target user of vehicle, make the vehicle user can pay attention to and know the external environment condition that the vehicle was located at any time from this, in time deal with the safety problem that external environment changes and bring.
Fig. 2 is a schematic view of a vehicle according to an embodiment of the present application, specifically, a target user may start a security system of the vehicle through a remote controller, and further acquire external information of the vehicle through front, rear, left, and right cameras installed outside a vehicle body of the vehicle, where the external information of the vehicle acquired by the cameras outside the vehicle body may be sent to a built-in hard disk of a security host through a 4-wire cable (the built-in hard disk of the security host shown in fig. 2 is a built-in 1TB hard disk), a high-definition video output based on the external information of the vehicle may be displayed through a display device of the vehicle, and data transmission is performed through an infrared receiver, where the data refers to the external information of the vehicle and security prompt information; the vehicle can also be internally provided with a 4G vehicle-mounted router, so that WiFi information is provided for the vehicle based on the router; in addition, the vehicle can realize communication connection with the cloud communication equipment corresponding to the vehicle through the base station, so that the security host of the vehicle can send security prompt information to a target user of the vehicle.
It is understood that it corresponds substantially to the method embodiment, so that reference may be made to the part of the description of the method embodiment where relevant.
Fig. 3 is a schematic diagram of a security system provided in an embodiment of the present application, which specifically includes a CCM (Central Control Module), a security ECU (Electronic Control Unit), a front camera, a left camera, a right camera, a rear camera, a display screen, a 4G router, a WiFi Module, a display screen, a security Provider TSP (Total Service Provider), a main Service TSP, a mobile phone APP, and the like. Wherein, the CCM that fig. 3 shows is CCM2.0, this security protection ECU is aforementioned security protection host computer promptly, the vehicle mounted power of vehicle is KL30, supply power to the ECU through the relay, each camera can send the vehicle external information who gathers to security protection ECU, and then can show corresponding vehicle external information and the security protection suggestion information that generates based on vehicle external information on the display screen, cell-phone APP can be through big expert TSP and security protection provider TSP, the mode and the security protection ECU interconnection of 4G router, receive and look over security protection suggestion information. In addition, the security ECU CAN send the contents such as security prompt information to the car home manager module and the ICGM module through a CAN (Control Area Network).
It is understood that it corresponds substantially to the method embodiment, so that reference may be made to the part of the description of the method embodiment for the relevant points.
Fig. 4 is a structural diagram of a security device provided in an embodiment of the present application, where the device includes an acquisition unit 401, a determination unit 402, and a sending unit 403:
the acquisition unit 401 is configured to acquire vehicle external information through a camera mounted on an exterior of a vehicle body of the vehicle;
the determining unit 402 is configured to analyze the vehicle external information and determine security prompt information;
the sending unit 403 is configured to send the security prompt information to a target user corresponding to the vehicle.
Optionally, the determining unit is further configured to:
analyzing the vehicle external information, and determining that the biological characteristic information of the illegal user is acquired in a target area where the vehicle is located; the illegal user is a user except the target user;
if the stay time of the illegal user in the target area is longer than the preset time, generating a collected video for collecting the biological characteristic information;
and determining the security prompt information according to the acquired video.
Optionally, the method further includes a dividing unit:
the dividing unit is used for dividing the target area into a first area and a second area; the first area is used for identifying an area which is less than or equal to a first preset distance and greater than a second preset distance away from the vehicle, and the second area is used for identifying an area which is less than or equal to the second preset distance away from the vehicle.
Optionally, if the target area is the second area, the determining unit is further configured to:
analyzing the vehicle external information, and determining that the illegal user touches the vehicle;
and controlling to start the warning equipment of the vehicle.
Optionally, the sending unit is further configured to:
acquiring cloud communication equipment corresponding to the vehicle;
and sending the security protection prompt information to the target user through the cloud communication equipment.
Optionally, the sending unit is further configured to:
if the fact that the camera head outside the vehicle body is abnormal is detected, generating abnormal prompt information;
and sending the abnormal prompt information to the target user.
According to the technical scheme, the camera is mounted outside the vehicle body of the vehicle, the camera is further used for collecting the external information of the vehicle, the collected external information of the vehicle is analyzed to determine the security prompt information, and finally the security prompt information is sent to the target user corresponding to the vehicle. It is thus clear that the external environment that the vehicle is located is detected through the vehicle body external camera, the external environment condition that the vehicle is located can be reflected based on the vehicle external information that this was gathered, and then carry out the analysis to vehicle external information and determine security protection tip information, and send this security protection tip information for the target user of vehicle, make the vehicle user can pay attention to and know the external environment condition that the vehicle is located at any time from this, in time deal with the safety problem that external environment changes and bring.
In yet another aspect, an embodiment of the present application provides a computer device, including a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is used for executing the security method provided by the embodiment according to the instruction in the program code.
The computer device may comprise a terminal device or a server, and the security device may be configured in the computer device.
In another aspect, an embodiment of the present application further provides a storage medium, where the storage medium is used to store a computer program, and the computer program is used to execute the security method provided in the foregoing embodiment.
In addition, the embodiment of the application also provides a vehicle, the vehicle comprises a security system, and the security system is used for executing the security method.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium may be at least one of the following media: various media that can store program codes, such as Read-only Memory (ROM), RAM, magnetic disk, or optical disk.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The security method, the related device and the vehicle provided by the embodiment of the present application are described in detail above, a specific example is applied in the description to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method of the present application. Also, variations in the specific embodiments and applications of the methods of the present application will occur to those skilled in the art.
In summary, the present disclosure should not be construed as limiting the present application, and any changes or substitutions that can be easily conceived by one skilled in the art within the technical scope of the present disclosure should be covered within the protection scope of the present application. Moreover, the present application can be further combined to provide more implementations on the basis of the implementations provided by the above aspects.

Claims (10)

1. A security method is characterized by comprising the following steps:
acquiring vehicle external information through a vehicle body external camera arranged on a vehicle;
analyzing the external information of the vehicle to determine security prompt information;
and sending the security protection prompt information to a target user corresponding to the vehicle.
2. The method of claim 1, wherein the parsing the vehicle external information to determine the security prompt comprises:
analyzing the vehicle external information, and determining that the biological characteristic information of the illegal user is acquired in a target area where the vehicle is located; the illegal user is a user except the target user;
if the stay time of the illegal user in the target area is longer than the preset time, generating a collected video for collecting the biological characteristic information;
and determining the security prompt information according to the acquired video.
3. The method of claim 2, further comprising:
dividing the target area into a first area and a second area; the first area is used for identifying an area which is less than or equal to a first preset distance and greater than a second preset distance away from the vehicle, and the second area is used for identifying an area which is less than or equal to the second preset distance away from the vehicle.
4. The method of claim 3, wherein if the target region is the second region, further comprising:
analyzing the vehicle external information, and determining that the illegal user touches the vehicle;
and controlling to start the warning equipment of the vehicle.
5. The method according to any one of claims 1 to 4, wherein the sending the security prompt information to the target user corresponding to the vehicle includes:
acquiring cloud communication equipment corresponding to the vehicle;
and sending the security protection prompt information to the target user through the cloud communication equipment.
6. The method according to any one of claims 1-4, further comprising:
if the camera outside the vehicle body is detected to be abnormal, generating abnormal prompt information;
and sending the abnormal prompt information to the target user.
7. The utility model provides a security protection device which characterized in that, the device includes acquisition unit, confirms unit and sending unit:
the acquisition unit is used for acquiring vehicle external information through a vehicle body external camera arranged on a vehicle;
the determining unit is used for analyzing the external information of the vehicle and determining security prompt information;
and the sending unit is used for sending the security prompt information to a target user corresponding to the vehicle.
8. A computer device, the computer device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the method of any of claims 1-6 according to instructions in the program code.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium is used to store a computer program for performing the method of any of claims 1-6.
10. A vehicle comprising a security system for performing the method of any one of claims 1-6.
CN202210759829.4A 2022-06-30 2022-06-30 Security method, related device and vehicle Pending CN115131933A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210759829.4A CN115131933A (en) 2022-06-30 2022-06-30 Security method, related device and vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210759829.4A CN115131933A (en) 2022-06-30 2022-06-30 Security method, related device and vehicle

Publications (1)

Publication Number Publication Date
CN115131933A true CN115131933A (en) 2022-09-30

Family

ID=83382418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210759829.4A Pending CN115131933A (en) 2022-06-30 2022-06-30 Security method, related device and vehicle

Country Status (1)

Country Link
CN (1) CN115131933A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214249A (en) * 2017-07-04 2019-01-15 北京航天长峰科技工业集团有限公司 A kind of intelligent video analysis method for safety and protection monitoring system
CN110316153A (en) * 2018-03-30 2019-10-11 比亚迪股份有限公司 Vehicle monitoring system, method and vehicle based on vehicle-mounted display terminal
CN110855976A (en) * 2019-10-08 2020-02-28 南京云计趟信息技术有限公司 Camera abnormity detection method and device and terminal equipment
CN113055651A (en) * 2021-03-19 2021-06-29 佛山市龙生光启科技有限公司 Artificial intelligence type vehicle security system and computer readable storage medium
CN113436464A (en) * 2021-06-29 2021-09-24 东风汽车集团股份有限公司 Vehicle danger early warning method, device, equipment and storage medium
CN114120561A (en) * 2021-11-09 2022-03-01 中国第一汽车股份有限公司 Reminding method, device, equipment and storage medium
CN114446004A (en) * 2022-01-29 2022-05-06 贵州中烟工业有限责任公司 Security protection system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214249A (en) * 2017-07-04 2019-01-15 北京航天长峰科技工业集团有限公司 A kind of intelligent video analysis method for safety and protection monitoring system
CN110316153A (en) * 2018-03-30 2019-10-11 比亚迪股份有限公司 Vehicle monitoring system, method and vehicle based on vehicle-mounted display terminal
CN110855976A (en) * 2019-10-08 2020-02-28 南京云计趟信息技术有限公司 Camera abnormity detection method and device and terminal equipment
CN113055651A (en) * 2021-03-19 2021-06-29 佛山市龙生光启科技有限公司 Artificial intelligence type vehicle security system and computer readable storage medium
CN113436464A (en) * 2021-06-29 2021-09-24 东风汽车集团股份有限公司 Vehicle danger early warning method, device, equipment and storage medium
CN114120561A (en) * 2021-11-09 2022-03-01 中国第一汽车股份有限公司 Reminding method, device, equipment and storage medium
CN114446004A (en) * 2022-01-29 2022-05-06 贵州中烟工业有限责任公司 Security protection system

Similar Documents

Publication Publication Date Title
CN111086410B (en) Charging control method and device, electronic equipment and system
CN108891413B (en) Vehicle-mounted fatigue driving prevention system, method, equipment and storage medium
JP4702598B2 (en) Monitoring system, monitoring apparatus and method, recording medium, and program
CN106515724B (en) Traffic control method and terminal in a kind of tunnel
CN110796834B (en) Vehicle flooding alarm method and system, vehicle and readable storage medium
CN104816704A (en) Self-monitoring and alert system for intelligent vehicle
CN110759189A (en) Elevator management method, device and system
US10762354B1 (en) System and method for parking a vehicle in a camera's field of view
CN109816908A (en) Oil-stealing method, mobile terminal, server, electronic equipment, storage medium
CN106314290A (en) Vehicle-mounted intelligent rear viewing mirror device
CN107592246B (en) Data processing method and device
CN110481480A (en) Vehicle and its vehicle automatic control method based on vital signs information
CN105096546A (en) Cloud air condition based security and protection method and cloud air condition
CN103888722A (en) Separate type wireless parking recorder system
CN205281786U (en) Alarm system
KR101368757B1 (en) Parked vehicle monitoring system and method
US20130265151A1 (en) Method for monitoring an object and use of a sensor to monitor an object
US10671863B2 (en) Methods and systems for managing vehicles to enhance safety
CN115131933A (en) Security method, related device and vehicle
CN114119297A (en) Intelligent community management system based on Internet of things
CN115439989A (en) Object detection method and device and smart home system
CN111860105A (en) Driving behavior generation supervision method, device and equipment
CN112333410A (en) Intelligent doorbell, control method thereof and computer-readable storage medium
CN112758028B (en) Number display method, system, vehicle and computer readable storage medium
CN115079164A (en) Vehicle exterior detection system, method, vehicle and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination