CN116390027B - Vehicle management method and system based on internet of things - Google Patents

Vehicle management method and system based on internet of things Download PDF

Info

Publication number
CN116390027B
CN116390027B CN202310615859.2A CN202310615859A CN116390027B CN 116390027 B CN116390027 B CN 116390027B CN 202310615859 A CN202310615859 A CN 202310615859A CN 116390027 B CN116390027 B CN 116390027B
Authority
CN
China
Prior art keywords
information
user
positioning
electronic fence
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310615859.2A
Other languages
Chinese (zh)
Other versions
CN116390027A (en
Inventor
彭炯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Omni Intelligent Technology Co ltd
Original Assignee
Shenzhen Omni Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Omni Intelligent Technology Co ltd filed Critical Shenzhen Omni Intelligent Technology Co ltd
Priority to CN202310615859.2A priority Critical patent/CN116390027B/en
Publication of CN116390027A publication Critical patent/CN116390027A/en
Application granted granted Critical
Publication of CN116390027B publication Critical patent/CN116390027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0283Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0042Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
    • G07F17/0057Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects for the hiring or rent of vehicles, e.g. cars, bicycles or wheelchairs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/35Services specially adapted for particular environments, situations or purposes for the management of goods or merchandise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a vehicle management method and system based on the Internet of things, comprising the following steps: after a user scans unlocking of an electronic lock on a vehicle, charging is started, and unlocking time is recorded; when receiving an instruction of closing the electronic lock by a user, acquiring the current positioning through a built-in GPS, and acquiring a preset electronic fence through a network protocol; judging whether the positioning is in a preset electronic fence or not; if the positioning is in the preset electronic fence, controlling the electronic lock to be closed, and recording the locking time; charging according to a first charging policy according to the unlocking time and the locking time; and if the positioning is not in the preset electronic fence, charging according to a second charging policy according to the unlocking time and the locking time. The invention is based on the internet of things vehicles, and the use of the vehicles is charged in a differentiated way, so that the defects that the management is carried out through a server and the charging cannot be differentiated at present are overcome.

Description

Vehicle management method and system based on Internet of things
Technical Field
The invention relates to the technical field of the Internet of things, in particular to a vehicle management method and system based on the Internet of things.
Background
With the technical development of the Internet of things, sharing vehicles such as sharing bicycles and sharing automobiles invade daily life, so that the life of people becomes more convenient. At present, a user scans a two-dimensional code at a designated position on a vehicle to perform an unlocking request, sends the unlocking request to a management server to obtain authorization, and performs management through the server, and when the server performs management, the efficiency is generally low, so that real-time management is inconvenient. Meanwhile, different charging standards are not adopted according to different vehicle use states, and the vehicle use cannot be differently represented.
Disclosure of Invention
The invention mainly aims to provide a vehicle management method and system based on the Internet of things, which aim to charge the use of vehicles in a differentiated way based on the vehicles of the Internet of things and overcome the defects that the management is carried out through a server and the differentiated charging cannot be carried out at present.
In order to achieve the above object, the present invention provides a vehicle management method based on internet of things, which is applied to a vehicle accessing a network, and comprises the following steps:
after a user scans unlocking of an electronic lock on a vehicle, charging is started, and unlocking time is recorded;
when receiving an instruction of closing the electronic lock by a user, acquiring the current positioning through a built-in GPS, and acquiring a preset electronic fence through a network protocol;
Judging whether the positioning is in a preset electronic fence or not;
if the positioning is in the preset electronic fence, controlling the electronic lock to be closed, and recording the locking time; charging according to a first charging policy according to the unlocking time and the locking time;
if the positioning is not in the preset electronic fence, a prompt for prohibiting parking is sent out; when a secondary confirmation instruction of closing the electronic lock by a user is received, controlling the electronic lock to be closed, and recording the closing time; and charging according to a second charging policy according to the unlocking time and the locking time.
Further, after the step of starting charging and recording the unlocking time after the user scans the unlocking of the electronic lock on the vehicle, the method further comprises the following steps:
acquiring vehicle speed information of vehicle running and running road information;
acquiring road section information of the current running of the vehicle through a network protocol, wherein the road section information comprises road speed limit information and road traffic limit information;
judging whether the vehicle speed information of the vehicle running meets the requirement of the road speed limit information or not; if not, controlling the vehicle to adjust the speed so as to meet the requirement of the road speed limit information;
Judging whether the running road information of the vehicle meets the requirement of the road traffic limiting information or not; if not, a prompt for prohibiting running is sent out.
Further, the step of determining whether the positioning is within a preset electronic fence includes:
displaying a positioning mark corresponding to the positioning and the preset electronic fence on a preset map;
taking a screenshot of an electronic fence area in the map by adopting a preset screenshot frame to obtain a first screenshot picture; the first screenshot picture at least comprises the electronic fence;
carrying out picture recognition on the first screenshot picture by adopting a preset picture recognition model, and detecting whether the positioning mark exists in the first screenshot picture;
if the positioning mark does not exist, judging that the positioning is not in the preset electronic fence;
if the positioning mark exists, identifying whether the positioning mark exists in the electronic fence area in the first screenshot picture; if yes, determining that the positioning is in a preset electronic fence; if the positioning is not in the preset electronic fence, judging that the positioning is not in the preset electronic fence.
Further, the step of determining whether the positioning is within a preset electronic fence includes:
Displaying the preset electronic fence on a preset map to obtain a first map;
capturing a screenshot of an electronic fence area in the map in a preset mode to obtain a second screenshot picture; the size of the second screenshot picture is larger than that of the electronic fence area;
carrying out edge tracing on the electronic fence area in the second screenshot picture to obtain a first closed tracing frame, and deleting all images outside the first closed tracing frame from the second screenshot picture to obtain a third screenshot picture;
displaying the positioning mark of the positioning on the first map to obtain a second map;
capturing a screenshot of an electronic fence area in the second map in a preset mode to obtain a fourth screenshot picture; the size of the fourth screenshot picture is larger than that of the electronic fence area;
carrying out edge tracing on the electronic fence area in the fourth screenshot picture to obtain a second closed tracing frame, and deleting all images outside the second closed tracing frame from the fourth screenshot picture to obtain a fifth screenshot picture;
respectively carrying out hash calculation on the third screenshot picture and the fifth screenshot picture to obtain a corresponding first hash value and a corresponding second hash value;
Judging whether the first hash value and the second hash value are the same or not; if the positioning is the same, judging that the positioning is not in the preset electronic fence; if the positioning is different, the positioning is judged to be in the preset electronic fence.
Further, after the step of unlocking the electronic lock on the vehicle, the method further comprises the following steps:
acquiring user information of the user; wherein the user information comprises account names, registered telephone information and user names of the users;
encoding the user information through a first encoder to obtain first encoded information;
performing forging processing on the registered telephone information and the user name in the user information according to a first forging mode to obtain first forging information;
performing forging processing on the registered telephone information and the user name in the user information according to a second forging mode to obtain second forging information;
encoding the first fake information through a second encoder to obtain second encoded information;
encoding the second fake information through a third encoder to obtain third encoded information; wherein the first encoder, the second encoder, and the third encoder are different from each other;
The first coding information, the second coding information and the third coding information are sent to a management server for storage; and the management server only stores a decoder corresponding to the first encoder, and the decoder is used for decoding the first encoded information to obtain the user information.
Further, the step of performing forgery processing on the registered phone information and the user name in the user information according to the first forgery manner to obtain first forgery information includes:
randomly generating an eight-digit number; randomly selecting numbers at three positions from the last eight bits of the registered telephone information to serve as target numbers; replacing the target number to the corresponding position of the randomly generated eight-digit number to obtain a replacement number;
acquiring the registration telephone information, keeping the first three digits of the registration telephone information unchanged, and replacing the last eight digits of the registration telephone information with the replacement number to obtain a forged registration telephone;
randomly acquiring an object name from a preset database; wherein, a plurality of names with the number of the duplicate names higher than a threshold value are stored in the database;
Acquiring the surnames and the first names in the user names, keeping the surnames unchanged, and randomly replacing the first names with the target names to obtain forged user names;
and combining the account name of the user, the forged registered telephone and the forged user name to obtain the first forged information.
Further, the step of performing forgery processing on the registered phone information and the user name in the user information according to the second forgery manner to obtain second forgery information includes:
acquiring the last eight digits of the registered telephone information to obtain a first number group;
adding the first bit in the first number group and the number on the second bit to obtain a first number; wherein ten digits of the first number are represented by 0 when the first number is less than 10;
adding the numbers on the third bit and the fourth bit in the first number group to obtain a second number; wherein ten digits of the second number are represented by 0's when the second number is less than 10;
adding the number on the fifth bit and the sixth bit in the first number group to obtain a third number; wherein ten digits of the third number are represented by 0 when the third number is less than 10;
Adding the seventh bit in the first number group and the number on the eighth bit to obtain a fourth number; wherein ten digits of the fourth number are represented by 0 when the fourth number is less than 10;
sequentially combining the fourth number, the first number, the second number and the third number to obtain a second number group;
and keeping the first three-digit number of the registered telephone information unchanged, and combining the first three-digit number of the registered telephone information with the second number group to obtain the forged registered telephone.
Further, the step of performing forgery processing on the registered phone information and the user name in the user information according to the second forgery manner to obtain second forgery information further includes:
acquiring the stroke numbers of the surnames in the user names, and matching target surnames with the same stroke numbers in a surname database, wherein the target surnames are different from the surnames in the user names; if the target surname with the same stroke number does not exist in the surname database, keeping the surname in the user name unchanged;
acquiring the pronunciation of the name in the user name, and matching the target name with the same pronunciation in a name database, wherein the target name is different from the name in the user name; if the target names with the same pronunciation do not exist in the name database, keeping the names in the user names unchanged;
And combining the target surname with the target first name to obtain the forged user name.
The invention also provides a vehicle management system based on the Internet of things, which is applied to a vehicle accessing a network and comprises the following steps:
the unlocking unit is used for starting charging after a user scans the unlocking of the electronic lock on the vehicle and recording the unlocking time;
the positioning unit is used for acquiring the current positioning through a built-in GPS when receiving an instruction of closing the electronic lock by a user, and acquiring a preset electronic fence through a network protocol;
the judging unit is used for judging whether the positioning is in a preset electronic fence or not;
the first charging unit is used for controlling the electronic lock to be closed and recording the locking time if the positioning is in a preset electronic fence; charging according to a first charging policy according to the unlocking time and the locking time;
the second charging unit is used for sending out a prompt of prohibiting parking if the positioning is not in the preset electronic fence; when a secondary confirmation instruction of closing the electronic lock by a user is received, controlling the electronic lock to be closed, and recording the closing time; and charging according to a second charging policy according to the unlocking time and the locking time.
Further, the vehicle management system based on the internet of things further comprises:
an acquisition unit configured to acquire user information of the user; wherein the user information comprises account names, registered telephone information and user names of the users;
the first coding unit is used for coding the user information through a first coder to obtain first coded information;
the first forging unit is used for forging the registered telephone information and the user name in the user information according to a first forging mode to obtain first forging information;
the second forging unit is used for forging the registered telephone information and the user name in the user information according to a second forging mode to obtain second forging information;
the second coding unit is used for coding the first fake information through a second coder to obtain second coded information;
the third coding unit is used for coding the second fake information through a third coder to obtain third coded information; wherein the first encoder, the second encoder, and the third encoder are different from each other;
the sending unit is used for sending the first coding information, the second coding information and the third coding information to the management server for storage; and the management server only stores a decoder corresponding to the first encoder, and the decoder is used for decoding the first encoded information to obtain the user information.
The invention also provides a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of any of the methods described above when the computer program is executed.
The invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method of any of the preceding claims.
The invention provides a vehicle management method and system based on the Internet of things, comprising the following steps: after a user scans unlocking of an electronic lock on a vehicle, charging is started, and unlocking time is recorded; when receiving an instruction of closing the electronic lock by a user, acquiring the current positioning through a built-in GPS, and acquiring a preset electronic fence through a network protocol; judging whether the positioning is in a preset electronic fence or not; if the positioning is in the preset electronic fence, controlling the electronic lock to be closed, and recording the locking time; charging according to a first charging policy according to the unlocking time and the locking time; if the positioning is not in the preset electronic fence, a prompt for prohibiting parking is sent out; when a secondary confirmation instruction of closing the electronic lock by a user is received, controlling the electronic lock to be closed, and recording the closing time; and charging according to a second charging policy according to the unlocking time and the locking time. The invention is based on the internet of things vehicles, and the use of the vehicles is charged in a differentiated way, so that the defects that the management is carried out through a server and the charging cannot be differentiated at present are overcome.
Drawings
FIG. 1 is a schematic diagram of steps of a vehicle management method based on the Internet of things according to an embodiment of the invention;
FIG. 2 is a block diagram of a vehicle management system based on the Internet of things in an embodiment of the invention;
fig. 3 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, in one embodiment of the present invention, a vehicle management method based on internet of things is provided, which is applied to a vehicle accessing a network, and includes the following steps:
step S1, after a user scans unlocking of an electronic lock on a vehicle, charging is started, and unlocking time is recorded;
step S2, when an instruction of closing the electronic lock by a user is received, acquiring the current positioning through a built-in GPS, and acquiring a preset electronic fence through a network protocol;
Step S3, judging whether the positioning is in a preset electronic fence or not;
step S4a, if the positioning is in the preset electronic fence, controlling the electronic lock to be closed, and recording the locking time; charging according to a first charging policy according to the unlocking time and the locking time;
step S4b, if the positioning is not in the preset electronic fence, a prompt for prohibiting parking is sent out; when a secondary confirmation instruction of closing the electronic lock by a user is received, controlling the electronic lock to be closed, and recording the closing time; and charging according to a second charging policy according to the unlocking time and the locking time.
In this embodiment, the vehicle may be a shared vehicle, which is accessed to an internet system through a network, and performs real-time communication through a network protocol, so as to implement deployment of an internet of things system of the vehicle. The vehicle is provided with an electronic lock for locking and unlocking the vehicle; the vehicle is also provided with a charging system for charging the use of the vehicle. The vehicle is managed by accessing the Internet, a server is not needed to manage, and management efficiency is improved.
After the user scans the electronic lock on the vehicle to unlock by using the camera on the mobile terminal as described in step S1, the vehicle starts charging, and records the unlocking time at that time, so that the user can start using the vehicle. After the user finishes using the vehicle, the user needs to send a corresponding instruction for closing the electronic lock on the mobile terminal, and when the vehicle receives the instruction for closing the electronic lock, the user first obtains the current location through the built-in GPS and obtains the preset electronic fence through the network protocol. The electronic fence is a parking area defined in advance for the vehicle. In general, when a user returns a car, the user should park the car in the electronic fence, and if the car is not parked correctly, additional management cost is incurred for the enterprise providing the car. Meanwhile, unreasonable traffic management trouble may be caused. Therefore, as described in the steps S3, S4a, S4b, it is determined whether the positioning is within the preset electronic fence, if the positioning is within the preset electronic fence, it indicates that the user parks according to the rule; at the moment, the electronic lock is controlled to be closed, and the closing time is recorded; charging according to a first charging policy according to the unlocking time and the locking time; only the time of the user is needed to be considered in the first charging strategy.
If the positioning is not in the preset electronic fence, the user is indicated to park according to the specification, a prompt for prohibiting parking is sent out at the moment, and after receiving the prompt for prohibiting parking, the user can park again to park the vehicle to the specified area; if the user still holds the vehicle and triggers a corresponding secondary confirmation instruction, the vehicle can receive the secondary confirmation instruction of closing the electronic lock by the user, then the electronic lock is controlled to be closed, and the locking time is recorded; charging according to a second charging policy according to the unlocking time and the locking time; in the second charging policy, not only the time of use of the user but also the illegal parking fee for the user to park the vehicle in the specified area need to be considered, that is, the illegal parking fee needs to be additionally charged.
In an embodiment, after the step S1 of starting charging after the user scans the unlocking of the electronic lock on the vehicle and recording the unlocking time, the method further includes:
step S11, obtaining vehicle speed information and road information of vehicle running;
step S12, road section information of the current running of the vehicle is obtained through a network protocol, wherein the road section information comprises road speed limit information and road traffic limit information;
Step S13, judging whether the vehicle speed information of the vehicle running meets the requirement of the road speed limit information; if not, controlling the vehicle to adjust the speed so as to meet the requirement of the road speed limit information;
step S14, judging whether the running road information of the vehicle running meets the requirement of the road traffic limiting information; if not, a prompt for prohibiting running is sent out.
In this embodiment, the vehicle further has a traffic control function, which can control the speed of the vehicle, and can generally control the limit requirement in the road section of the vehicle, so as to avoid overspeed or other illegal driving of the vehicle.
In an embodiment, the step S3 of determining whether the location is within a preset electronic fence includes:
step S31, displaying a positioning mark corresponding to the positioning and the preset electronic fence on a preset map; in this embodiment, a manner of comparing whether the positioning is within the preset electronic fence is generally a manner of comparing longitude and latitude, but in this embodiment, a manner of comparing in a picture form is more clear, and data processing capacity is smaller.
Step S32, capturing a screen of an electronic fence area in the map by adopting a preset screen capturing frame to obtain a first screen capturing picture; the first screenshot picture at least comprises the electronic fence; in this embodiment, the screenshot attribute of the screenshot box is preset, such as screenshot size, resolution, and the like. All areas including the electronic fence are needed in the first screenshot picture.
Step S33, carrying out picture recognition on the first screenshot picture by adopting a preset picture recognition model, and detecting whether the positioning mark exists in the first screenshot picture; in this embodiment, a neural network model is trained in advance to obtain the picture recognition model, the feature extraction is performed on the first screenshot picture based on the picture recognition model, the extracted feature is input into a convolution layer to perform convolution operation, and then the extracted feature is input into a classification layer to be classified, so as to obtain a result of whether the positioning mark exists in the first screenshot picture.
Step S34, if the positioning mark does not exist, determining that the positioning is not in the preset electronic fence;
step S35, if the positioning mark exists, identifying whether the positioning mark exists in the electronic fence area in the first screenshot picture; if yes, determining that the positioning is in a preset electronic fence; if the positioning is not in the preset electronic fence, judging that the positioning is not in the preset electronic fence.
In this embodiment, the positioning and the electronic fence are displayed in the map, and then picture processing is performed to determine whether the positioning is within the preset electronic fence. The picture processing mode is adopted, so that the method is more reliable, the operation amount is small, and the result is accurate.
In another embodiment, another scheme for determining whether the location is within a preset electronic fence is provided.
Specifically, the step S3 of determining whether the positioning is within a preset electronic fence includes:
step S301, displaying the preset electronic fence on a preset map to obtain a first map;
step S302, capturing a screenshot of an electronic fence area in the map in a preset mode to obtain a second screenshot picture; the size of the second screenshot picture is larger than that of the electronic fence area, so that the second screenshot picture comprises all areas of the electronic fence;
step S303, the electronic fence area in the second screenshot picture is traced to obtain a first closed tracing frame, and all images outside the first closed tracing frame are deleted from the second screenshot picture to obtain a third screenshot picture; in this embodiment, in order to avoid interference of image data outside the electronic fence area, the image data outside the electronic fence area is deleted.
Step S304, displaying the positioning mark of the positioning on the first map to obtain a second map;
step S305, capturing a screenshot of the electronic fence area in the second map in a preset mode to obtain a fourth screenshot picture; the size of the fourth screenshot picture is larger than that of the electronic fence area; it can be understood that the above-mentioned preset manner is consistent with the screenshot manner of the second screenshot picture.
Step S306, the electronic fence area in the fourth screenshot picture is traced to obtain a second closed tracing frame, and all images outside the second closed tracing frame are deleted from the fourth screenshot picture to obtain a fifth screenshot picture; to avoid data interference when the location markers are present outside the electronic fence area. In this embodiment, the image data outside the electronic fence area is deleted.
Step S307, performing hash computation on the third screenshot picture and the fifth screenshot picture respectively to obtain a corresponding first hash value and a corresponding second hash value;
step S308, judging whether the first hash value and the second hash value are the same; if the positioning is the same, judging that the positioning is not in the preset electronic fence; if the positioning is different, the positioning is judged to be in the preset electronic fence.
In this embodiment, the processing manners of the third screenshot picture and the fifth screenshot picture are completely consistent, and if the third screenshot picture and the fifth screenshot picture are different when positioned in the electronic fence, the result obtained by performing the hash calculation correspondingly is also different; if the positioning is not in the electronic fence, the third screenshot picture and the fifth screenshot picture are completely different, and the result obtained by corresponding hash calculation is the same; in this embodiment, whether the positioning is within the preset electronic fence is determined by performing hash operation on the picture, so that the processing mode is accurate and the operation speed is high.
In yet another embodiment, after the step S1 of the user scanning the electronic lock on the vehicle to unlock, the method further includes:
acquiring user information of the user; wherein the user information comprises account names, registered telephone information and user names of the users;
encoding the user information through a first encoder to obtain first encoded information;
performing forging processing on the registered telephone information and the user name in the user information according to a first forging mode to obtain first forging information; the registered telephone information and the user name are private, so that the registered telephone information and the user name need to be forged, and the account name of the user does not need to be forged.
Performing forging processing on the registered telephone information and the user name in the user information according to a second forging mode to obtain second forging information; the registered telephone information and the user name are private, so that the registered telephone information and the user name need to be forged, and the account name of the user does not need to be forged.
Encoding the first fake information through a second encoder to obtain second encoded information;
encoding the second fake information through a third encoder to obtain third encoded information; wherein the first encoder, the second encoder, and the third encoder are different from each other;
the first coding information, the second coding information and the third coding information are sent to a management server for storage; and the management server only stores a decoder corresponding to the first encoder, and the decoder is used for decoding the first encoded information to obtain the user information.
In this embodiment, when the user uses the vehicle, the user needs to upload corresponding user information to the management server, and when the user information is uploaded, the user needs to pay attention to leakage prevention of the information, so that information security is ensured. Specifically, uploading the user information of the user, and encoding the user information by a first encoder to obtain first encoded information; the first encoded information can only be decoded by a corresponding decoder in the management server to obtain the user information. At this time, the user information may be secured in the first aspect.
Furthermore, two pieces of user information, namely first fake information and second fake information, can be forged, and the first fake information is encoded through a second encoder to obtain second encoded information; encoding the second fake information through a third encoder to obtain third encoded information; wherein the first encoder, the second encoder, and the third encoder are different from each other. Thus, even if the encoded information is obtained by other users, the difficulty of decoding the encoded information by other users is high due to the difference of corresponding decoders, and the user information in the encoded information is difficult to obtain. Even if the other users decode all the encoded information, two pieces of fake user information and one piece of real user information are obtained, and at this time, the other users cannot easily distinguish the real user information. In this embodiment, the security of the user information is increased, and the difficulty of other users to acquire the real user information is increased.
In a specific embodiment, the step of forging the registered phone information and the user name in the user information according to the first forging manner to obtain first forged information includes:
Randomly generating an eight-digit number; randomly selecting numbers at three positions from the last eight bits of the registered telephone information to serve as target numbers; replacing the target number to the corresponding position of the randomly generated eight-digit number to obtain a replacement number; in order to improve the confidence of the forged number, the number at three positions needs to be randomly selected from the last eight digits of the registered telephone information to be used as a target number and replaced to the corresponding position of the randomly generated eight-digit number, so that the defect of excessively low confidence of the randomly generated number is avoided.
Acquiring the registration telephone information, keeping the first three digits of the registration telephone information unchanged, and replacing the last eight digits of the registration telephone information with the replacement number to obtain a forged registration telephone;
randomly acquiring an object name from a preset database; wherein, a plurality of names with the number of the duplicate names higher than a threshold value are stored in the database;
acquiring the surnames and the first names in the user names, keeping the surnames unchanged, and randomly replacing the first names with the target names to obtain forged user names; in order to avoid revealing of the user name, the method is adopted to forge the name in the user name
And combining the account name of the user, the forged registered telephone and the forged user name to obtain the first forged information. It will be appreciated that the first forgery information includes not only the fake registered phone, the fake user name, but also the real account name.
In another embodiment, the step of forging the registered phone information and the user name in the user information according to the second forging manner to obtain second forged information includes:
acquiring the last eight digits of the registered telephone information to obtain a first number group;
adding the first bit in the first number group and the number on the second bit to obtain a first number; wherein ten digits of the first number are represented by 0 when the first number is less than 10;
adding the numbers on the third bit and the fourth bit in the first number group to obtain a second number; wherein ten digits of the second number are represented by 0's when the second number is less than 10;
adding the number on the fifth bit and the sixth bit in the first number group to obtain a third number; wherein ten digits of the third number are represented by 0 when the third number is less than 10;
Adding the seventh bit in the first number group and the number on the eighth bit to obtain a fourth number; wherein ten digits of the fourth number are represented by 0 when the fourth number is less than 10;
sequentially combining the fourth number, the first number, the second number and the third number to obtain a second number group;
and keeping the first three-digit number of the registered telephone information unchanged, and combining the first three-digit number of the registered telephone information with the second number group to obtain the forged registered telephone. In this embodiment, not only the above-mentioned registered telephone is counterfeited, but also the counterfeited registered telephone obtained by adopting the above-mentioned method can be used as verification of the true registered telephone; specifically, when verifying whether a phone number is a true registered phone, only eight digits of the phone number are processed in the above manner to obtain a processed number group, and whether the processed number group is consistent with the second number group is judged, if so, the phone number is the true registered number. Obviously, the above-mentioned counterfeiting scheme is not only substantially different from the current counterfeiting scheme, but also has unexpected technical effects. It can be understood that if it is not known which number is the second number group, only the true registered phone and the other two forged registered phones are required to be processed in the above manner, and it is determined whether the processed number group is identical to the last eight digits in any one of the other two numbers, and if it is identical to the last eight digits in any one of the other two numbers, the processed registered phone is the true registered phone.
In another embodiment, the step of forging the registered phone information and the user name in the user information according to the second forging manner to obtain second forged information further includes:
acquiring the stroke numbers of the surnames in the user names, and matching target surnames with the same stroke numbers in a surname database, wherein the target surnames are different from the surnames in the user names; if the target surname with the same stroke number does not exist in the surname database, keeping the surname in the user name unchanged;
acquiring the pronunciation of the name in the user name, and matching the target name with the same pronunciation in a name database, wherein the target name is different from the name in the user name; if the target names with the same pronunciation do not exist in the name database, keeping the names in the user names unchanged;
and combining the target surname with the target first name to obtain the forged user name.
In this embodiment, the surnames and the first names in the user names are forged respectively, wherein when the surnames are forged, the target surnames with the same stroke number are matched in the surname database according to the stroke number characteristics of the surnames; when the name is forged, the target name with the same pronunciation is matched in a name database according to the pinyin characteristics of the name. The pronunciation of the forged user name is more similar to that of the forged user name, but the surnames are different, so that the forged name is more like a real name, and the difficulty of distinguishing the real name by other users is increased.
Referring to fig. 2, in an embodiment of the present invention, there is further provided a vehicle management system based on the internet of things, applied to a vehicle accessing a network, including:
the unlocking unit is used for starting charging after a user scans the unlocking of the electronic lock on the vehicle and recording the unlocking time;
the positioning unit is used for acquiring the current positioning through a built-in GPS when receiving an instruction of closing the electronic lock by a user, and acquiring a preset electronic fence through a network protocol;
the judging unit is used for judging whether the positioning is in a preset electronic fence or not;
the first charging unit is used for controlling the electronic lock to be closed and recording the locking time if the positioning is in a preset electronic fence; charging according to a first charging policy according to the unlocking time and the locking time;
the second charging unit is used for sending out a prompt of prohibiting parking if the positioning is not in the preset electronic fence; when a secondary confirmation instruction of closing the electronic lock by a user is received, controlling the electronic lock to be closed, and recording the closing time; and charging according to a second charging policy according to the unlocking time and the locking time.
Further, the vehicle management system based on the internet of things further comprises:
an acquisition unit configured to acquire user information of the user; wherein the user information comprises account names, registered telephone information and user names of the users;
the first coding unit is used for coding the user information through a first coder to obtain first coded information;
the first forging unit is used for forging the registered telephone information and the user name in the user information according to a first forging mode to obtain first forging information;
the second forging unit is used for forging the registered telephone information and the user name in the user information according to a second forging mode to obtain second forging information;
the second coding unit is used for coding the first fake information through a second coder to obtain second coded information;
the third coding unit is used for coding the second fake information through a third coder to obtain third coded information; wherein the first encoder, the second encoder, and the third encoder are different from each other;
the sending unit is used for sending the first coding information, the second coding information and the third coding information to the management server for storage; and the management server only stores a decoder corresponding to the first encoder, and the decoder is used for decoding the first encoded information to obtain the user information.
In this embodiment, for specific implementation of each unit in the above system embodiment, please refer to the description in the above method embodiment, and no further description is given here.
Referring to fig. 3, in an embodiment of the present invention, there is further provided a computer device, which may be a server, and an internal structure thereof may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing vehicle management data and the like based on the Internet of things. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a vehicle management method based on the internet of things.
It will be appreciated by those skilled in the art that the architecture shown in fig. 3 is merely a block diagram of a portion of the architecture in connection with the present inventive arrangements and is not intended to limit the computer devices to which the present inventive arrangements are applicable.
An embodiment of the present invention further provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements a vehicle management method based on the internet of things. It is understood that the computer readable storage medium in this embodiment may be a volatile readable storage medium or a nonvolatile readable storage medium.
In summary, the vehicle management method and system based on the internet of things provided in the embodiment of the invention include: after a user scans unlocking of an electronic lock on a vehicle, charging is started, and unlocking time is recorded; when receiving an instruction of closing the electronic lock by a user, acquiring the current positioning through a built-in GPS, and acquiring a preset electronic fence through a network protocol; judging whether the positioning is in a preset electronic fence or not; if the positioning is in the preset electronic fence, controlling the electronic lock to be closed, and recording the locking time; charging according to a first charging policy according to the unlocking time and the locking time; if the positioning is not in the preset electronic fence, a prompt for prohibiting parking is sent out; when a secondary confirmation instruction of closing the electronic lock by a user is received, controlling the electronic lock to be closed, and recording the closing time; and charging according to a second charging policy according to the unlocking time and the locking time. The invention is based on the internet of things vehicles, and the use of the vehicles is charged in a differentiated way, so that the defects that the management is carried out through a server and the charging cannot be differentiated at present are overcome.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present invention and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes using the descriptions and drawings of the present invention or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (8)

1. The vehicle management method based on the Internet of things is characterized by being applied to a vehicle accessing a network and comprising the following steps of:
after a user scans unlocking of an electronic lock on a vehicle, charging is started, and unlocking time is recorded;
When receiving an instruction of closing the electronic lock by a user, acquiring the current positioning through a built-in GPS, and acquiring a preset electronic fence through a network protocol;
judging whether the positioning is in a preset electronic fence or not;
if the positioning is in the preset electronic fence, controlling the electronic lock to be closed, and recording the locking time; charging according to a first charging policy according to the unlocking time and the locking time;
if the positioning is not in the preset electronic fence, a prompt for prohibiting parking is sent out; when a secondary confirmation instruction of closing the electronic lock by a user is received, controlling the electronic lock to be closed, and recording the closing time; charging according to a second charging policy according to the unlocking time and the locking time;
the step of judging whether the positioning is in a preset electronic fence or not comprises the following steps:
displaying the preset electronic fence on a preset map to obtain a first map;
capturing a screenshot of an electronic fence area in the map in a preset mode to obtain a second screenshot picture; the size of the second screenshot picture is larger than that of the electronic fence area;
carrying out edge tracing on the electronic fence area in the second screenshot picture to obtain a first closed tracing frame, and deleting all images outside the first closed tracing frame from the second screenshot picture to obtain a third screenshot picture;
Displaying the positioning mark of the positioning on the first map to obtain a second map;
capturing a screenshot of an electronic fence area in the second map in a preset mode to obtain a fourth screenshot picture; the size of the fourth screenshot picture is larger than that of the electronic fence area;
carrying out edge tracing on the electronic fence area in the fourth screenshot picture to obtain a second closed tracing frame, and deleting all images outside the second closed tracing frame from the fourth screenshot picture to obtain a fifth screenshot picture;
respectively carrying out hash calculation on the third screenshot picture and the fifth screenshot picture to obtain a corresponding first hash value and a corresponding second hash value;
judging whether the first hash value and the second hash value are the same or not; if the positioning is the same, judging that the positioning is not in the preset electronic fence; if the positioning is different, the positioning is judged to be in the preset electronic fence.
2. The internet of things-based vehicle management method according to claim 1, wherein after the step of starting charging after the user scans the unlocking of the electronic lock on the vehicle and recording the unlocking time, further comprising:
Acquiring vehicle speed information of vehicle running and running road information;
acquiring road section information of the current running of the vehicle through a network protocol, wherein the road section information comprises road speed limit information and road traffic limit information;
judging whether the vehicle speed information of the vehicle running meets the requirement of the road speed limit information or not; if not, controlling the vehicle to adjust the speed so as to meet the requirement of the road speed limit information;
judging whether the running road information of the vehicle meets the requirement of the road traffic limiting information or not; if not, a prompt for prohibiting running is sent out.
3. The internet of things-based vehicle management method according to claim 1, further comprising, after the step of the user scanning for unlocking the electronic lock on the vehicle:
acquiring user information of the user; wherein the user information comprises account names, registered telephone information and user names of the users;
encoding the user information through a first encoder to obtain first encoded information;
performing forging processing on the registered telephone information and the user name in the user information according to a first forging mode to obtain first forging information;
Performing forging processing on the registered telephone information and the user name in the user information according to a second forging mode to obtain second forging information;
encoding the first fake information through a second encoder to obtain second encoded information;
encoding the second fake information through a third encoder to obtain third encoded information; wherein the first encoder, the second encoder, and the third encoder are different from each other;
the first coding information, the second coding information and the third coding information are sent to a management server for storage; and the management server only stores a decoder corresponding to the first encoder, and the decoder is used for decoding the first encoded information to obtain the user information.
4. The internet of things-based vehicle management method according to claim 3, wherein the step of performing forgery processing on the registered phone information and the user name in the user information according to the first forgery manner to obtain first forgery information includes:
randomly generating an eight-digit number; randomly selecting numbers at three positions from the last eight bits of the registered telephone information to serve as target numbers; replacing the target number to the corresponding position of the randomly generated eight-digit number to obtain a replacement number;
Acquiring the registration telephone information, keeping the first three digits of the registration telephone information unchanged, and replacing the last eight digits of the registration telephone information with the replacement number to obtain a forged registration telephone;
randomly acquiring an object name from a preset database; wherein, a plurality of names with the number of the duplicate names higher than a threshold value are stored in the database;
acquiring the surnames and the first names in the user names, keeping the surnames unchanged, and randomly replacing the first names with the target names to obtain forged user names;
and combining the account name of the user, the forged registered telephone and the forged user name to obtain the first forged information.
5. The internet of things-based vehicle management method according to claim 3, wherein the step of performing forgery processing on the registered phone information and the user name in the user information according to the second forgery manner to obtain second forgery information includes:
acquiring the last eight digits of the registered telephone information to obtain a first number group;
adding the first bit in the first number group and the number on the second bit to obtain a first number; wherein ten digits of the first number are represented by 0 when the first number is less than 10;
Adding the numbers on the third bit and the fourth bit in the first number group to obtain a second number; wherein ten digits of the second number are represented by 0's when the second number is less than 10;
adding the number on the fifth bit and the sixth bit in the first number group to obtain a third number; wherein ten digits of the third number are represented by 0 when the third number is less than 10;
adding the seventh bit in the first number group and the number on the eighth bit to obtain a fourth number; wherein ten digits of the fourth number are represented by 0 when the fourth number is less than 10;
sequentially combining the fourth number, the first number, the second number and the third number to obtain a second number group;
and keeping the first three-digit number of the registered telephone information unchanged, and combining the first three-digit number of the registered telephone information with the second number group to obtain the forged registered telephone.
6. The internet of things-based vehicle management method according to claim 5, wherein the step of performing forgery processing on the registered phone information and the user name in the user information according to the second forgery manner to obtain second forgery information further comprises:
Acquiring the stroke numbers of the surnames in the user names, and matching target surnames with the same stroke numbers in a surname database, wherein the target surnames are different from the surnames in the user names; if the target surname with the same stroke number does not exist in the surname database, keeping the surname in the user name unchanged;
acquiring the pronunciation of the name in the user name, and matching the target name with the same pronunciation in a name database, wherein the target name is different from the name in the user name; if the target names with the same pronunciation do not exist in the name database, keeping the names in the user names unchanged;
and combining the target surname with the target first name to obtain the forged user name.
7. The utility model provides a vehicle management system based on thing networking which characterized in that is applied to the vehicle of access network, includes:
the unlocking unit is used for starting charging after a user scans the unlocking of the electronic lock on the vehicle and recording the unlocking time;
the positioning unit is used for acquiring the current positioning through a built-in GPS when receiving an instruction of closing the electronic lock by a user, and acquiring a preset electronic fence through a network protocol;
The judging unit is used for judging whether the positioning is in a preset electronic fence or not;
the first charging unit is used for controlling the electronic lock to be closed and recording the locking time if the positioning is in a preset electronic fence; charging according to a first charging policy according to the unlocking time and the locking time;
the second charging unit is used for sending out a prompt of prohibiting parking if the positioning is not in the preset electronic fence; when a secondary confirmation instruction of closing the electronic lock by a user is received, controlling the electronic lock to be closed, and recording the closing time; charging according to a second charging policy according to the unlocking time and the locking time;
the judging unit is specifically configured to:
displaying the preset electronic fence on a preset map to obtain a first map;
capturing a screenshot of an electronic fence area in the map in a preset mode to obtain a second screenshot picture; the size of the second screenshot picture is larger than that of the electronic fence area;
carrying out edge tracing on the electronic fence area in the second screenshot picture to obtain a first closed tracing frame, and deleting all images outside the first closed tracing frame from the second screenshot picture to obtain a third screenshot picture;
Displaying the positioning mark of the positioning on the first map to obtain a second map;
capturing a screenshot of an electronic fence area in the second map in a preset mode to obtain a fourth screenshot picture; the size of the fourth screenshot picture is larger than that of the electronic fence area;
carrying out edge tracing on the electronic fence area in the fourth screenshot picture to obtain a second closed tracing frame, and deleting all images outside the second closed tracing frame from the fourth screenshot picture to obtain a fifth screenshot picture;
respectively carrying out hash calculation on the third screenshot picture and the fifth screenshot picture to obtain a corresponding first hash value and a corresponding second hash value;
judging whether the first hash value and the second hash value are the same or not; if the positioning is the same, judging that the positioning is not in the preset electronic fence; if the positioning is different, the positioning is judged to be in the preset electronic fence.
8. The internet of things-based vehicle management system of claim 7, further comprising:
an acquisition unit configured to acquire user information of the user; wherein the user information comprises account names, registered telephone information and user names of the users;
The first coding unit is used for coding the user information through a first coder to obtain first coded information;
the first forging unit is used for forging the registered telephone information and the user name in the user information according to a first forging mode to obtain first forging information;
the second forging unit is used for forging the registered telephone information and the user name in the user information according to a second forging mode to obtain second forging information;
the second coding unit is used for coding the first fake information through a second coder to obtain second coded information;
the third coding unit is used for coding the second fake information through a third coder to obtain third coded information; wherein the first encoder, the second encoder, and the third encoder are different from each other;
the sending unit is used for sending the first coding information, the second coding information and the third coding information to the management server for storage; and the management server only stores a decoder corresponding to the first encoder, and the decoder is used for decoding the first encoded information to obtain the user information.
CN202310615859.2A 2023-05-29 2023-05-29 Vehicle management method and system based on internet of things Active CN116390027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310615859.2A CN116390027B (en) 2023-05-29 2023-05-29 Vehicle management method and system based on internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310615859.2A CN116390027B (en) 2023-05-29 2023-05-29 Vehicle management method and system based on internet of things

Publications (2)

Publication Number Publication Date
CN116390027A CN116390027A (en) 2023-07-04
CN116390027B true CN116390027B (en) 2023-08-22

Family

ID=86980932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310615859.2A Active CN116390027B (en) 2023-05-29 2023-05-29 Vehicle management method and system based on internet of things

Country Status (1)

Country Link
CN (1) CN116390027B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107093320A (en) * 2017-03-13 2017-08-25 曾庆义 A kind of parking guide method and device
CN206921143U (en) * 2017-02-21 2018-01-23 上海量明科技发展有限公司 Shared bicycle based on shared bicycle stop position charging and order car terminal
CN108596745A (en) * 2018-06-07 2018-09-28 超威电源有限公司 A kind of vehicle
CN109697889A (en) * 2019-01-16 2019-04-30 福州大学 A kind of shared bicycle fence parks management method
CN111524379A (en) * 2020-03-27 2020-08-11 上海钧正网络科技有限公司 Riding warning method, system, controller, lock, vehicle and medium
CN112466047A (en) * 2020-10-26 2021-03-09 深圳市云伽智能技术有限公司 Dual offline vehicle management method and related device
CN114219439A (en) * 2021-12-15 2022-03-22 写逸网络科技(上海)有限公司 Batch social software registration method for preventing feature recognition

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206921143U (en) * 2017-02-21 2018-01-23 上海量明科技发展有限公司 Shared bicycle based on shared bicycle stop position charging and order car terminal
CN107093320A (en) * 2017-03-13 2017-08-25 曾庆义 A kind of parking guide method and device
CN108596745A (en) * 2018-06-07 2018-09-28 超威电源有限公司 A kind of vehicle
CN109697889A (en) * 2019-01-16 2019-04-30 福州大学 A kind of shared bicycle fence parks management method
CN111524379A (en) * 2020-03-27 2020-08-11 上海钧正网络科技有限公司 Riding warning method, system, controller, lock, vehicle and medium
CN112466047A (en) * 2020-10-26 2021-03-09 深圳市云伽智能技术有限公司 Dual offline vehicle management method and related device
CN114219439A (en) * 2021-12-15 2022-03-22 写逸网络科技(上海)有限公司 Batch social software registration method for preventing feature recognition

Also Published As

Publication number Publication date
CN116390027A (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN108280524B (en) System and method for identifying vehicles and generating reservation information
CN107580196B (en) Video data sharing system and method
CN105678879A (en) Visitor's vehicle management method and system
JP2009116600A (en) Entering and leaving management system
CN106228449A (en) Vehicle insurance Claims Resolution antifraud method and apparatus
CN110356363A (en) A kind of driver identity authentication method, device, system and server
US20120162432A1 (en) Method for capturing images of vehicles
CN107424317B (en) Charging equipment sharing method and system
EP3140825B1 (en) Authentication method for vehicular number plate recognition
CN109729208A (en) A kind of shifting vehicle notification method, device, computer equipment and storage medium
CN106570758A (en) Car insurance claim evidence information collection method and device
CN110310018B (en) License plate information processing method and device, electronic equipment and storage medium
CN116390027B (en) Vehicle management method and system based on internet of things
KR101234347B1 (en) Black box service providing method for vehicles enhanced security based on watermarking technique
EP1570451B1 (en) Image authenticating methods
CN110077361A (en) A kind of control method for vehicle and device
CN111368621B (en) Method, device, equipment and storage medium for judging personnel relationship
CN110991558A (en) Accident processing method and device based on image recognition and computer equipment
JP2005301377A (en) Vehicle reference system and vehicle reference method for it
CN111047876B (en) Dynamic social contact method and device based on license plate number
Pawade et al. Blockchain based secure traffic police assistant system
CN114093193B (en) District parking sharing system
CN111415150B (en) Mobile payment method and device based on vehicle-mounted terminal and computer equipment
CN115424451A (en) Charging pile reservation system and method
CN110807630B (en) Payment method and device based on face recognition, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant