CN115465224B - Control method and device for automobile trunk, vehicle and storage medium - Google Patents

Control method and device for automobile trunk, vehicle and storage medium Download PDF

Info

Publication number
CN115465224B
CN115465224B CN202211097892.2A CN202211097892A CN115465224B CN 115465224 B CN115465224 B CN 115465224B CN 202211097892 A CN202211097892 A CN 202211097892A CN 115465224 B CN115465224 B CN 115465224B
Authority
CN
China
Prior art keywords
user
vehicle
unlocked
face
facial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211097892.2A
Other languages
Chinese (zh)
Other versions
CN115465224A (en
Inventor
黄敏
龙美元
段朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Changan New Energy Automobile Technology Co Ltd
Original Assignee
Deep Blue Automotive Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deep Blue Automotive Technology Co ltd filed Critical Deep Blue Automotive Technology Co ltd
Priority to CN202211097892.2A priority Critical patent/CN115465224B/en
Publication of CN115465224A publication Critical patent/CN115465224A/en
Application granted granted Critical
Publication of CN115465224B publication Critical patent/CN115465224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/01Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application relates to a control method and device of a trunk of an automobile, a vehicle and a storage medium, wherein the method comprises the following steps: acquiring face images of each user to be unlocked within a preset range; calculating the facial feature value of each user to be unlocked according to the facial image of each user to be unlocked, and generating the facial mark of each user to be unlocked according to the facial feature value of each user to be unlocked; and sending the facial identifier of each user to be unlocked to the server, receiving a matching result obtained by the server by searching in a preset login certificate database by utilizing the facial identifier, and opening a trunk of the vehicle when the matching result is matching. The embodiment of the application can realize the contactless unlocking of the trunk based on facial recognition and login certificate matching, increase the intelligent level of the vehicle and avoid the risk of local leakage of the face information of the user.

Description

Control method and device for automobile trunk, vehicle and storage medium
Technical Field
The application relates to the technical field of intelligent automobiles, in particular to a control method and device for an automobile trunk, a vehicle and a storage medium.
Background
The trunk is used as an automobile storage part, the use frequency is extremely high, and the traditional method for unlocking the trunk door mainly comprises three methods:
1. the mechanical key is inserted into the tail door lock hole, so that the trunk door can be unlocked, and the mechanical method is the most mechanical method;
2. the vehicle door trunk is opened and closed through a trunk unlocking key of the vehicle-mounted console;
3. the remote control key opens the car trunk door.
In summary, the conventional scheme can only perform manual unlocking through a key or a vehicle-mounted console, and when the hand state of the user is occupied, at least one hand needs to be liberated to realize the opening of the trunk.
In the related art, the technical scheme for realizing the unlocking of the trunk based on face recognition can effectively solve the problems, for example, whether a person target is judged in a preset range of an aperture, and an unlocking response is carried out; the unlocking response can also be performed by judging whether the user holds the object in double hands and then verifying whether the object is a preset role through identity recognition.
However, in the related art, the scheme of judging whether the person targets are within the preset aperture range has poor anti-interference capability, and passers-by, extreme bad weather and other obstacles may cause abnormal opening of the trunk; when judging whether a user holds objects, the user needs to identify the images of the hands first and then carry out face recognition, the need to capture and judge the images frequently is greatly improved, the service life of equipment is further influenced, the face information is directly stored locally or uploaded to an app, the risk of information leakage of the user exists, and the improvement is needed.
Disclosure of Invention
The application provides a control method, a device, a vehicle and a storage medium of an automobile trunk, which are used for solving the technical problems that in the related art, the anti-interference capability is poor, frequent capturing and judging images are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of leakage of user information exists.
An embodiment of a first aspect of the present application provides a control method for a trunk of an automobile, including the steps of: acquiring face images of each user to be unlocked within a preset range; calculating the facial feature value of each user to be unlocked according to the facial image of each user to be unlocked, and generating the facial mark of each user to be unlocked according to the facial feature value of each user to be unlocked; and sending the facial identifier of each user to be unlocked to a server, receiving a matching result obtained by the server by searching in a preset login certificate database by utilizing the facial identifier, and opening a trunk of the vehicle when the matching result is matching.
According to the technical means, the face identification of each user to be unlocked can be obtained according to the face image of the user to be unlocked, the login certificate database is matched based on the server, and when the matching result is the matching, the trunk of the vehicle is opened, so that the trunk is unlocked in a contactless manner, the intelligent level of the vehicle is increased, and the risk of local leakage of face information of the user can be avoided.
Optionally, in one embodiment of the present application, before sending the facial identifier of each user to be unlocked to the server, the method further includes: acquiring a face image of an unlockable user; calculating the facial feature value of the user capable of unlocking according to the facial image of the user capable of unlocking; generating the face identification of the user capable of unlocking according to the face characteristic value, sending the face identification to the server so that the server generates a login certificate associated with the face identification, and storing the encrypted associated login certificate into a preset login certificate database.
According to the technical means, the embodiment of the application can generate the login certificate at the cloud end, and complete the identification by utilizing the encrypted login certificate and the facial identification, so that the method is safe and controllable, the information security risk caused by the disclosure of the face information of the user is avoided, and the privacy of the user is protected.
Optionally, in one embodiment of the present application, before the capturing the person image of each user to be unlocked within the preset range, the method further includes: detecting whether the current state of the vehicle meets a preset trunk opening condition; and when the vehicle is detected to meet the preset trunk opening condition, controlling the vehicle to enter a face image scanning mode.
According to the technical means, the embodiment of the application can avoid the problem of high power consumption caused by frequent identification of the acquisition equipment.
Optionally, in one embodiment of the present application, before acquiring the face image of each user to be unlocked within the preset range, the method further includes: acquiring the duration time of at least one user in the preset range; and when the continuous direct current time is greater than or equal to a preset time length, judging that the at least one user is the user to be unlocked.
According to the technical means, the embodiment of the application can reduce the false recognition probability caused by environmental interference and reduce the frequency of capturing the human face.
Optionally, in one embodiment of the present application, before the capturing the person image of each user to be unlocked within the preset range, the method further includes: detecting whether the vehicle starts a face starting function of an automobile trunk or not; and when the face opening function is detected to be started, the trunk is allowed to be started when the matching result is that the face is matched.
According to the technical means, the embodiment of the application can avoid the problem of excessively high power consumption caused by frequent identification or invalid identification of the acquisition equipment, and simultaneously save the electric quantity.
Optionally, in one embodiment of the present application, after acquiring the face image of each user to be unlocked within the preset range, the method further includes: judging whether a face identifier corresponding to the face image is stored or not; if the facial identifier corresponding to the facial image is stored, acquiring at least one facial identifier of the user to be unlocked from the local storage device, and if not, calculating a facial feature value.
According to the technical means, the facial marker can be stored locally, repeated facial feature value calculation is not needed, and calculation force is saved.
An embodiment of a second aspect of the present application provides a control device for a trunk of an automobile, including: the acquisition module is used for acquiring face images of each user to be unlocked within a preset range; the first calculation module is used for calculating the facial feature value of each user to be unlocked according to the facial image of each user to be unlocked and generating the facial mark of each user to be unlocked according to the facial feature value of each user to be unlocked; and the first control module is used for sending the facial identifier of each user to be unlocked to the server, receiving a matching result obtained by the server by searching in a preset login certificate database by utilizing the facial identifier, and opening a trunk of the vehicle when the matching result is matching.
Optionally, in one embodiment of the present application, further includes: the first acquisition module is used for acquiring face images of the user which can be unlocked; the second calculation module is used for calculating the facial feature value of the user capable of unlocking according to the facial image of the user capable of unlocking; and the association module is used for generating the facial mark of the user capable of unlocking according to the facial feature value, sending the facial mark to the server so that the server generates an associated login certificate with the facial mark, and storing the encrypted associated login certificate into a preset login certificate database.
Optionally, in one embodiment of the present application, further includes: the first detection module is used for detecting whether the current state of the vehicle meets a preset trunk opening condition or not; and the second control module is used for controlling the vehicle to enter a face image scanning mode when the vehicle is detected to meet the preset trunk opening condition.
Optionally, in one embodiment of the present application, further includes: the second acquisition module is used for acquiring the duration time of at least one user in the preset range; and the judging module is used for judging that the at least one user is the user to be unlocked when the continuous direct current time is greater than or equal to the preset time length.
Optionally, in one embodiment of the present application, further includes: the second detection module is used for detecting whether the vehicle starts a face opening function of the trunk of the automobile or not; and the third control module is used for allowing the trunk to be opened when the matching result is matching when the face opening function is detected to be opened.
Optionally, in one embodiment of the present application, further includes: the judging module is used for judging whether the face identification corresponding to the face image is stored or not; and the matching module is used for acquiring at least one facial identifier of the user to be unlocked from the local storage equipment when the facial identifier corresponding to the facial image is stored, and otherwise, calculating the facial feature value.
An embodiment of a third aspect of the present application provides a vehicle including: the control system comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the program to realize the control method of the automobile trunk as described in the embodiment.
A fourth aspect of the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements a method of controlling a trunk of a vehicle as above.
The embodiment of the application has the beneficial effects that:
(1) According to the embodiment of the application, the facial identification of each user to be unlocked can be obtained according to the facial image of the user to be unlocked, and then the matching of the login certificate database is carried out based on the server, and when the matching result is the matching, the trunk of the vehicle is opened, so that the contactless unlocking of the trunk is realized, and meanwhile, the risk of local leakage of the facial information of the user can be avoided;
(2) According to the embodiment of the application, the frequency of capturing the face can be reduced by recognizing the face information of the user in a non-inductive way, meanwhile, the environment interference is overcome, the trunk of the automobile is unlocked more simply and quickly, the use experience of the user is greatly improved, and the intelligent level of the vehicle is improved.
Additional aspects and advantages of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flowchart of a control method of a trunk of an automobile according to an embodiment of the present application;
FIG. 2 is a flow chart of a method of controlling a trunk of an automobile according to one embodiment of the application;
fig. 3 is a schematic structural view of a control device for a trunk of an automobile according to an embodiment of the present application;
Fig. 4 is a schematic structural diagram of a vehicle according to an embodiment of the present application.
Wherein, 10-the controlling means of the car trunk; 100-acquisition module, 200-first calculation module, 300-first control module.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative and intended to explain the present application and should not be construed as limiting the application.
The following describes a control method, a device, a vehicle and a storage medium of an automobile trunk according to an embodiment of the present application with reference to the accompanying drawings. Aiming at the technical problems that in the related technology mentioned in the background technology center, the anti-interference capability is poor, frequent image capturing and judging are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of user information leakage exists, the application provides a control method of an automobile trunk. Therefore, the technical problems that in the related technology, the anti-interference capability is poor, frequent image capturing and judging are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of user information leakage exists are solved.
Specifically, fig. 1 is a schematic flow chart of a control method of an automobile trunk according to an embodiment of the present application.
As shown in fig. 1, the control method of the trunk of the automobile comprises the following steps:
In step S101, face images of each user to be unlocked within a preset range are acquired.
In the actual implementation process, the face image of each user to be unlocked in the preset range can be acquired through the acquisition device, such as a camera, wherein the preset range can be set correspondingly by a person skilled in the art according to the size of a vehicle type, the precision of the acquisition device, the environment where the vehicle is located, such as the distance between a trunk and a wall of the vehicle, and the like, and the embodiment of the application is not limited in detail.
Optionally, in one embodiment of the present application, before acquiring the person image of each user to be unlocked within the preset range, the method further includes: detecting whether the current state of the vehicle meets a preset trunk opening condition; and when the vehicle is detected to meet the preset trunk opening condition, controlling the vehicle to enter a face image scanning mode.
As a possible implementation manner, the embodiment of the application can detect whether the current state of the vehicle meets the preset trunk opening condition, for example, by using the acquisition device, the camera or the radar, determine the distance between the vehicle and the rear obstacle, and when the distance between the vehicle and the rear obstacle allows the trunk to be opened, control the vehicle to enter the face image scanning mode, thereby avoiding meaningless recognition by the acquisition device and causing overhigh power consumption.
Optionally, in one embodiment of the present application, before acquiring the face image of each user to be unlocked within the preset range, the method further includes: acquiring the duration time of at least one user in a preset range; and when the continuous direct current time is greater than or equal to the preset time length, judging that at least one user is the user to be unlocked.
In some embodiments, because there may be a situation that a person passes behind the vehicle when the vehicle is parked, in order to avoid frequent invalid recognition, the embodiments of the present application may acquire a duration of at least one user in a preset range based on the acquisition device, and determine that the at least one user is a user to be unlocked when the duration of the direct current is greater than or equal to a preset duration, thereby reducing a probability of false recognition caused by pedestrian interference and reducing a frequency of capturing a face.
It should be noted that the preset duration may be set by the vehicle owner or a person skilled in the art according to the actual situation, which is not particularly limited herein.
Optionally, in one embodiment of the present application, before acquiring the person image of each user to be unlocked within the preset range, the method further includes: detecting whether a vehicle starts a face starting function of an automobile trunk or not; when the face opening function is detected to be started, the trunk is allowed to be started when the matching result is that the face is matched.
In the actual execution process, the embodiment of the application can allow the automobile trunk to be opened when the matching result is matched after the automobile starts the face opening function of the automobile trunk, thereby avoiding frequent recognition of the acquisition equipment or invalid recognition, resulting in overhigh power consumption and saving electric quantity.
Optionally, in one embodiment of the present application, after acquiring a face image of each user to be unlocked within a preset range, the method further includes: judging whether a face identifier corresponding to the face image is stored or not; if the facial identifier corresponding to the facial image is stored, acquiring at least one facial identifier of the user to be unlocked from the local storage device, otherwise, calculating a facial feature value.
Specifically, after face images of each user to be unlocked within a preset range are collected, face identification retrieval associated with the face images of the user can be carried out in local vehicle-mounted terminal data, and when the associated face identification is retrieved at the local vehicle-mounted terminal, the face identification can be extracted, so that the follow-up cloud uploading is facilitated to carry out login certificate generation; otherwise, when the associated face identification is not retrieved, the embodiment of the application can calculate the face characteristic value aiming at the collected face image of the user, thereby being convenient for generating the face identification subsequently.
In step S102, a facial feature value of each user to be unlocked is calculated according to the facial image of each user to be unlocked, and a facial identifier of each user to be unlocked is generated according to the facial feature value of each user to be unlocked.
As a possible implementation manner, the embodiment of the application can convert the face image into the face feature value through the face recognition model after acquiring the face image of each user to be unlocked, generate the face identification of each user to be unlocked according to the face feature value of each user to be unlocked, and store the generated face identification in the local vehicle-mounted terminal after associating the generated face identification with the face image of the user to be unlocked.
In the embodiment of the application, the Face identifier can be defined as the Face ID, so that the identity of the user to be unlocked can be identified through the Face ID.
In step S103, the facial identifier of each user to be unlocked is sent to the server, the matching result obtained by the server searching in the preset login certificate database by using the facial identifier is received, and when the matching result is matching, the trunk of the vehicle is opened.
In some embodiments, the method and the device can search the locally stored facial identifiers after obtaining the facial identifiers of each user to be unlocked, further generate a login request, send the facial identifiers of each user to be unlocked to a server, and after receiving the login request, the server can generate a special login certificate and send the special login certificate to the vehicle-mounted terminal to be matched with the locally stored corresponding facial identifier login certificate, and the terminal initiates an instruction for opening the trunk of the vehicle.
The server can be an intelligent vehicle cloud platform.
Optionally, in one embodiment of the present application, before sending the facial identifier of each user to be unlocked to the server, the method further includes: acquiring a face image of an unlockable user; calculating a face characteristic value of the user capable of being unlocked according to the face image of the user capable of being unlocked; generating a face mark of an unlockable user according to the face characteristic value, sending the face mark to a server, enabling the server to generate a login certificate associated with the face mark, and storing the encrypted associated login certificate into a preset login certificate database.
It may be understood that before the face identification of the user to be unlocked is matched, the embodiment of the application may perform face identification of the user to be unlocked, for example, the user may log in the vehicle-mounted terminal when performing authentication, perform face identification authentication, the vehicle-mounted terminal may acquire a face image of the target user through the front-mounted camera, convert the face image into a face feature value through the face identification model, generate a face identification according to the face feature value, the terminal may bind the user information with the face identification, thereby generating the face identification of the user to be unlocked, store the face identification in the local terminal, upload the face identification to the server, store the face identification of the user after receiving the face identification of the user, generate a face identification association login certificate, and store the face identification association login certificate in a preset login certificate database after encrypting, so as to reduce the probability of information leakage of the user.
It should be noted that the preset login certificate database may be set by those skilled in the art according to actual situations, and is not limited herein.
The working principle of the control method of the trunk of the automobile according to the embodiment of the application will be described in detail with reference to fig. 2.
As shown in fig. 2, taking the intelligent vehicle cloud platform as an example of a server, the embodiment of the application may include the following steps:
s1: user authentication
In order to realize accurate and rapid non-inductive identification face unlocking trunk technology, the embodiment of the application can complete the mapping identification of the user identity according to FaceID and login certificate retrieval and complete the vehicle relation, and authenticate the user.
When a user authenticates, the user can log in the vehicle-mounted terminal, a FaceID registration page is found for authentication, the vehicle-mounted terminal can acquire a face image of a target user through the front-facing camera, the face image is converted into a face characteristic value through the face recognition model, faceID capable of unlocking the user is generated according to the face characteristic value, the terminal can bind the user information with FaceID information, the information is stored in the vehicle-mounted terminal, faceID information is uploaded to the intelligent vehicle cloud platform, a special login certificate is generated through encryption, and the special login certificate is stored.
S2: the vehicle-mounted terminal acquires the relationship between the person and the vehicle
After the real-name authentication of the target vehicle is completed, the vehicle-mounted flow is obtained, and the network connection with the intelligent vehicle cloud platform is successfully established, the vehicle-mounted terminal can send an instruction for obtaining the certificate ID to the intelligent vehicle cloud platform through uploading face information of the user, the intelligent vehicle cloud platform can search the vehicle information of the target vehicle, search all FaceID bound with the vehicle according to the request information and the vehicle information and send the vehicle information to the vehicle-mounted terminal, and the vehicle-mounted terminal encrypts and stores FaceID of the corresponding user and a special login certificate.
S3: non-inductive identification of user face information
After the user completes authentication, the trunk camera of the embodiment of the application can comprise a low power consumption and a normal mode, and the trunk camera is set to be a non-sensing mode by default, wherein the non-sensing mode is characterized in that: the vehicle-mounted trunk camera is in a closed state and still has the capability of scanning the face of a user; the normal mode is a default on scan mode.
When the vehicle-mounted trunk camera is in a non-sensing mode, and a user is in a preset range (such as within 3 m) of the vehicle-mounted trunk camera, the vehicle-mounted terminal can capture face information of the user to be unlocked through the trunk camera, convert the face information into a face characteristic value through a face recognition model, acquire FaceID of the captured user according to the face characteristic value, perform local retrieval, further initiate a login request to the intelligent vehicle cloud platform, generate a special login certificate after the intelligent vehicle cloud platform receives the login request, send the special login certificate to the vehicle-mounted terminal to match with a corresponding FaceID login certificate stored locally, and open the vehicle trunk after matching is completed.
S4: instruction opens vapour car trunk
The terminal can initiate the instruction of opening the car trunk to the car controller, and the car controller sends drive signal to driving motor, and driving motor received drive signal drives the hydraulic stem that struts the trunk door and rotates forward, opens the trunk door.
According to the control method of the automobile trunk provided by the embodiment of the application, the face identification of each user to be unlocked can be obtained according to the face image of the user to be unlocked, the login certificate database is matched based on the server, and when the matching result is that the login certificate database is matched, the automobile trunk of the automobile is opened, so that the contactless unlocking of the trunk is realized, the intelligent level of the automobile is increased, and the risk of local leakage of the face information of the user can be avoided. Therefore, the technical problems that in the related technology, the anti-interference capability is poor, frequent image capturing and judging are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of user information leakage exists are solved.
Next, a control device for a trunk of an automobile according to an embodiment of the present application will be described with reference to the accompanying drawings.
Fig. 3 is a block diagram schematically illustrating a control apparatus for a trunk of an automobile according to an embodiment of the present application.
As shown in fig. 3, the control device 10 of the automobile trunk includes: the system comprises an acquisition module 100, a first calculation module 200 and a first control module 300.
Specifically, the acquisition module 100 is configured to acquire a face image of each user to be unlocked within a preset range.
The first calculating module 200 is configured to calculate a facial feature value of each user to be unlocked according to a facial image of each user to be unlocked, and generate a facial identifier of each user to be unlocked according to the facial feature value of each user to be unlocked.
The first control module 300 is configured to send a facial identifier of each user to be unlocked to the server, receive a matching result obtained by the server by searching in a preset login certificate database using the facial identifiers, and open a trunk of the vehicle when the matching result is matching.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: the device comprises a first acquisition module, a second calculation module and an association module.
The first acquisition module is used for acquiring face images of the unlockable user.
And the second calculation module is used for calculating the face characteristic value of the unlockable user according to the face image of the unlockable user.
And the association module is used for generating a face identifier of the user capable of being unlocked according to the face characteristic value, sending the face identifier to the server, enabling the server to generate an associated login certificate with the face identifier, and storing the encrypted associated login certificate into a preset login certificate database.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: the device comprises a first detection module and a second control module.
The first detection module is used for detecting whether the current state of the vehicle meets the preset trunk opening condition.
And the second control module is used for controlling the vehicle to enter a face image scanning mode when the vehicle is detected to meet the preset trunk opening condition.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: and the second acquisition module and the judgment module.
The second acquisition module is used for acquiring the duration time of at least one user in a preset range.
And the judging module is used for judging that at least one user is the user to be unlocked when the continuous direct current time is greater than or equal to the preset time length.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: the system comprises a second detection module and a third control module.
The second detection module is used for detecting whether the vehicle starts a face opening function of the trunk or not.
And the third control module is used for allowing the trunk to be opened when the matching result is matching when the face opening function is detected to be opened.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: the device comprises a judging module and a matching module.
The judging module is used for judging whether the face identification corresponding to the face image is stored or not.
And the matching module is used for acquiring at least one facial identifier of the user to be unlocked from the local storage equipment when the facial identifier corresponding to the facial image is stored, and otherwise, calculating the facial feature value.
It should be noted that the foregoing explanation of the embodiment of the control method of the trunk is also applicable to the control device of the trunk of the embodiment, and will not be repeated here.
According to the control device for the automobile trunk provided by the embodiment of the application, the face identification of each user to be unlocked can be obtained according to the face image of the user to be unlocked, the login certificate database is matched based on the server, and when the matching result is that the login certificate database is matched, the automobile trunk of the automobile is opened, so that the contactless unlocking of the trunk is realized, the intelligent level of the automobile is increased, and the risk of local leakage of the face information of the user can be avoided. Therefore, the technical problems that in the related technology, the anti-interference capability is poor, frequent image capturing and judging are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of user information leakage exists are solved.
Fig. 4 is a schematic structural diagram of a vehicle according to an embodiment of the present application. The vehicle may include:
memory 401, processor 402, and a computer program stored on memory 401 and executable on processor 402.
The processor 402 implements the control method of the trunk provided in the above embodiment when executing a program.
Further, the vehicle further includes:
A communication interface 403 for communication between the memory 401 and the processor 402.
A memory 401 for storing a computer program executable on the processor 402.
Memory 401 may comprise high-speed RAM memory or may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
If the memory 401, the processor 402, and the communication interface 403 are implemented independently, the communication interface 403, the memory 401, and the processor 402 may be connected to each other by a bus and perform communication with each other. The bus may be an industry standard architecture (Industry Standard Architecture, abbreviated ISA) bus, an external device interconnect (PERIPHERAL COMPONENT, abbreviated PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated EISA) bus, among others. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, only one thick line is shown in fig. 4, but not only one bus or one type of bus.
Alternatively, in a specific implementation, if the memory 401, the processor 402, and the communication interface 403 are integrated on a chip, the memory 401, the processor 402, and the communication interface 403 may complete communication with each other through internal interfaces.
Processor 402 may be a central processing unit (Central Processing Unit, abbreviated as CPU), or an Application SPECIFIC INTEGRATED Circuit (ASIC), or one or more integrated circuits configured to implement embodiments of the application.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the method for controlling a trunk of a vehicle as above.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, "N" means at least two, for example, two, three, etc., unless specifically defined otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and additional implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order from that shown or discussed, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or N wires, a portable computer cartridge (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). In addition, the computer readable medium may even be paper or other suitable medium on which the program is printed, as the program may be electronically captured, via optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the N steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
Those of ordinary skill in the art will appreciate that all or a portion of the steps carried out in the method of the above-described embodiments may be implemented by a program to instruct related hardware, where the program may be stored in a computer readable storage medium, and where the program, when executed, includes one or a combination of the steps of the method embodiments.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product.
The above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, or the like. While embodiments of the present application have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the application, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the application.

Claims (8)

1. The control method of the automobile trunk is characterized by comprising the following steps of:
Acquiring face images of each user to be unlocked within a preset range;
Calculating the facial feature value of each user to be unlocked according to the facial image of each user to be unlocked, and generating the facial mark of each user to be unlocked according to the facial feature value of each user to be unlocked; and
Sending the facial identifier of each user to be unlocked to a server, receiving a matching result obtained by the server by searching in a preset login certificate database by utilizing the facial identifier, and opening a trunk of the vehicle when the matching result is matching; before sending the face identification of each user to be unlocked to the server, the method further comprises the following steps:
acquiring a face image of an unlockable user;
calculating the facial feature value of the user capable of unlocking according to the facial image of the user capable of unlocking;
generating the face identification of the user capable of unlocking according to the face characteristic value, binding the user information with the face identification of the user by the vehicle-mounted terminal, storing the user information and the face identification in the vehicle-mounted terminal, sending the face identification to the server so that the server encrypts and generates a login certificate associated with the face identification, and storing the encrypted associated login certificate in a preset login certificate database;
After the real name authentication of the target vehicle is completed, the vehicle-mounted flow is obtained, and the network connection is successfully established with the server, the vehicle-mounted terminal can unlock the face identification of the user through uploading, an instruction for obtaining the associated login certificate is sent to the server, the server searches the vehicle information of the target vehicle, searches all the face identifications bound with the target vehicle according to the request information and the vehicle information and sends the face identifications to the vehicle-mounted terminal, and the vehicle-mounted terminal encrypts the face identification of the corresponding user and the associated login certificate and stores the face identifications locally.
2. The method of claim 1, further comprising, prior to acquiring the image of the person of each user to be unlocked that is within a preset range:
Detecting whether the current state of the vehicle meets a preset trunk opening condition;
and when the vehicle is detected to meet the preset trunk opening condition, controlling the vehicle to enter a face image scanning mode.
3. The method of claim 1, further comprising, prior to acquiring the face image of each user to be unlocked that is within a preset range:
acquiring the duration time of at least one user in the preset range;
and when the duration time is greater than or equal to a preset duration time, judging that the at least one user is the user to be unlocked.
4. The method of claim 1, further comprising, prior to acquiring the face image of each user to be unlocked that is within a preset range:
detecting whether the vehicle starts a face starting function of an automobile trunk or not;
And when the face opening function is detected to be started, the trunk is allowed to be started when the matching result is that the face is matched.
5. The method according to claim 1, further comprising, after acquiring the face image of each user to be unlocked that is within a preset range:
judging whether a face identifier corresponding to the face image is stored or not;
If the facial identifier corresponding to the facial image is stored, acquiring at least one facial identifier of the user to be unlocked from the local storage device, and if not, calculating a facial feature value.
6. A control device of an automobile trunk, characterized by comprising:
The acquisition module is used for acquiring face images of each user to be unlocked within a preset range;
The first calculation module is used for calculating the facial feature value of each user to be unlocked according to the facial image of each user to be unlocked and generating the facial mark of each user to be unlocked according to the facial feature value of each user to be unlocked; and
The first control module is used for sending the facial identifier of each user to be unlocked to the server, receiving a matching result obtained by the server by searching in a preset login certificate database by utilizing the facial identifier, and opening a trunk of the vehicle when the matching result is matching;
before sending the face identification of each user to be unlocked to the server, the method further comprises the following steps:
the acquisition module is used for acquiring face images of the user which can be unlocked;
the second calculation module is used for calculating the facial feature value of the user capable of unlocking according to the facial image of the user capable of unlocking;
The association module is used for generating the face identification of the user capable of unlocking according to the face characteristic value, binding the user information with the face identification of the user by the vehicle-mounted terminal, storing the user information and the face identification in the vehicle-mounted terminal, sending the face identification to the server so that the server generates an associated login certificate with the face identification in an encryption mode, and storing the encrypted associated login certificate in a preset login certificate database;
After the target vehicle completes real-name authentication, vehicle-mounted flow is acquired, and network connection is successfully established with a server, the vehicle-mounted terminal can unlock the facial identifiers of users through uploading, an instruction for acquiring the associated login credentials is sent to the server, the server retrieves vehicle information of the target vehicle, retrieves all facial identifiers bound with the target vehicle and login credentials associated with the facial identifiers according to request information and the vehicle information, and sends the facial identifiers and the associated login credentials to the vehicle-mounted terminal, and the vehicle-mounted terminal encrypts the facial identifiers of the corresponding users and the associated login credentials and locally stores the facial identifiers and the login credentials.
7. A vehicle, characterized by comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the program to implement the method of controlling a trunk of a vehicle as claimed in any one of claims 1 to 5.
8. A computer-readable storage medium, on which a computer program is stored, characterized in that the program is executed by a processor for realizing the control method of an automobile trunk as claimed in any one of claims 1-5.
CN202211097892.2A 2022-09-08 2022-09-08 Control method and device for automobile trunk, vehicle and storage medium Active CN115465224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211097892.2A CN115465224B (en) 2022-09-08 2022-09-08 Control method and device for automobile trunk, vehicle and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211097892.2A CN115465224B (en) 2022-09-08 2022-09-08 Control method and device for automobile trunk, vehicle and storage medium

Publications (2)

Publication Number Publication Date
CN115465224A CN115465224A (en) 2022-12-13
CN115465224B true CN115465224B (en) 2024-07-23

Family

ID=84370933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211097892.2A Active CN115465224B (en) 2022-09-08 2022-09-08 Control method and device for automobile trunk, vehicle and storage medium

Country Status (1)

Country Link
CN (1) CN115465224B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110936920A (en) * 2019-11-20 2020-03-31 中国第一汽车股份有限公司 Vehicle trunk opening method and device, vehicle and storage medium
CN112330846A (en) * 2019-07-31 2021-02-05 比亚迪股份有限公司 Vehicle control method and device, storage medium, electronic equipment and vehicle
CN112606796A (en) * 2020-12-10 2021-04-06 东风汽车集团有限公司 Automatic opening and closing control method and system for vehicle trunk and vehicle
CN112633150A (en) * 2020-12-22 2021-04-09 中国华戎科技集团有限公司 Target trajectory analysis-based retention loitering behavior identification method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205168435U (en) * 2015-10-30 2016-04-20 中山市澳威电子有限公司 Realize control system that car boot opened through mobile terminal
CN106951842A (en) * 2017-03-09 2017-07-14 重庆长安汽车股份有限公司 Automobile trunk intelligent opening system and method
CN109243024B (en) * 2018-08-29 2024-08-06 上海交通大学 Automobile unlocking method based on face recognition
CN114581960A (en) * 2022-01-22 2022-06-03 宁波圣达智能科技有限公司 Bank business library tail box management method, system, storage medium and intelligent terminal
CN114670849A (en) * 2022-03-14 2022-06-28 重庆长安汽车股份有限公司 Account login method and system based on face recognition and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330846A (en) * 2019-07-31 2021-02-05 比亚迪股份有限公司 Vehicle control method and device, storage medium, electronic equipment and vehicle
CN110936920A (en) * 2019-11-20 2020-03-31 中国第一汽车股份有限公司 Vehicle trunk opening method and device, vehicle and storage medium
CN112606796A (en) * 2020-12-10 2021-04-06 东风汽车集团有限公司 Automatic opening and closing control method and system for vehicle trunk and vehicle
CN112633150A (en) * 2020-12-22 2021-04-09 中国华戎科技集团有限公司 Target trajectory analysis-based retention loitering behavior identification method and system

Also Published As

Publication number Publication date
CN115465224A (en) 2022-12-13

Similar Documents

Publication Publication Date Title
KR102185103B1 (en) Luggage management system and luggage management method
CN102145683A (en) Video recording instrument of vehicle
US9530310B2 (en) Method and system for detecting and tracking a vehicle of interest utilizing a network of traffic image-capturing units
CN108068737B (en) Vehicle driver positioning system
US20140289082A1 (en) Electric charging management of electric vehicle
JP5783426B2 (en) Portable device
CN104085371A (en) Motor vehicle engine control system with fingerprint and pulse dual recognition functions
CN107729867A (en) Identify the method and system illegally driven
JP2022122981A (en) Method and apparatus for connecting through on-vehicle bluetooth, electronic device, and storage medium
CN110239485B (en) Vehicle and vehicle-mounted access method
CN112298102A (en) Vehicle control method and device, storage medium, electronic equipment and vehicle
CN112819997A (en) Method, apparatus and computer-readable storage medium for creating vehicle key
Pawar et al. IoT based embedded system for vehicle security and driver surveillance
CN115465224B (en) Control method and device for automobile trunk, vehicle and storage medium
CN202138339U (en) Video recorder for vehicles
CN103914896A (en) Fault tolerance system for vehicle access and exit control, and control method adopting fault tolerance system
CN108062805B (en) Vehicle-mounted data processing method and server
JP2021127574A (en) Vehicle control apparatus, vehicle control method, and program for vehicle control
CN112462658A (en) Parking space lock control method, parking space lock control system and storage medium
JP4209303B2 (en) Vehicle face image processing apparatus
JP2021127575A (en) Vehicle control apparatus, vehicle control method, and program for vehicle control
CN107187420B (en) Pilotless automobile and its starting method, computer-readable medium
US11829133B2 (en) Distance based vehicle remote control systems and methods for using same
CN111959517B (en) Distance prompting method and device, computer equipment and storage medium
CN113503106A (en) Control system, method, device and storage medium for automobile window

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20221215

Address after: 401133 room 208, 2 house, 39 Yonghe Road, Yu Zui Town, Jiangbei District, Chongqing

Applicant after: CHONGQING CHANGAN NEW ENERGY AUTOMOBILE TECHNOLOGY Co.,Ltd.

Address before: Changan Automobile Global R&D Center, Yuzui Town, Jiangbei District, Chongqing 400020

Applicant before: Chongqing Changan Automobile Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: No. 588 Shuguang Road, Longxing Town, Yubei District, Chongqing, 401135

Applicant after: Deep Blue Automotive Technology Co.,Ltd.

Address before: 401133 room 208, 2 house, 39 Yonghe Road, Yu Zui Town, Jiangbei District, Chongqing

Applicant before: CHONGQING CHANGAN NEW ENERGY AUTOMOBILE TECHNOLOGY Co.,Ltd.

Country or region before: China

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant