CN117078992A - Authentication method and device for vehicle accessory, vehicle, electronic device and storage medium - Google Patents

Authentication method and device for vehicle accessory, vehicle, electronic device and storage medium Download PDF

Info

Publication number
CN117078992A
CN117078992A CN202210892353.1A CN202210892353A CN117078992A CN 117078992 A CN117078992 A CN 117078992A CN 202210892353 A CN202210892353 A CN 202210892353A CN 117078992 A CN117078992 A CN 117078992A
Authority
CN
China
Prior art keywords
accessory
vehicle
authentication
identification information
replaced
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210892353.1A
Other languages
Chinese (zh)
Inventor
傅强
丁彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Rockwell Technology Co Ltd
Original Assignee
Beijing Rockwell Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Rockwell Technology Co Ltd filed Critical Beijing Rockwell Technology Co Ltd
Priority to CN202210892353.1A priority Critical patent/CN117078992A/en
Publication of CN117078992A publication Critical patent/CN117078992A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/764Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R16/00Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
    • B60R16/02Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
    • B60R16/023Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements for transmission of signals between vehicle parts or subsystems
    • B60R16/0231Circuits relating to the driving or the functioning of the vehicle
    • B60R16/0232Circuits relating to the driving or the functioning of the vehicle for measuring vehicle parameters and indicating critical, abnormal or dangerous conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/82Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks

Abstract

The application discloses an authentication method and device for vehicle accessories, a vehicle, electronic equipment and a storage medium, and relates to the technical field of vehicles, wherein the main technical scheme comprises the following steps: after detecting that the vehicle accessory is replaced, acquiring accessory identification information of the replaced vehicle accessory; comparing the accessory identification information with a preset authentication accessory information table; and obtaining an authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table. Compared with the prior art, after the vehicle accessory is replaced, the accessory identification information is used for authenticating the replaced accessory, so that the safety of the replaced vehicle accessory can be ensured, and the safety of vehicle driving can be further ensured.

Description

Authentication method and device for vehicle accessory, vehicle, electronic device and storage medium
Technical Field
The disclosure relates to the technical field of vehicles, and in particular relates to a vehicle accessory authentication method and device, a vehicle, electronic equipment and a storage medium.
Background
As people's consumption levels gradually rise, automobiles gradually change from previous consumables to home daily walk-substituting tools. Many, if not all, of the vehicle accessories are replaced by a 4S shop or other repair shop. If the vehicle is replaced with a poor quality accessory, the occurrence of a vehicle accident is easily caused.
Disclosure of Invention
The present disclosure provides an authentication method, an authentication device, a vehicle, an electronic device, and a storage medium for a vehicle accessory.
According to a first aspect of the present disclosure, there is provided a method of authenticating a vehicle accessory, including:
after detecting that the vehicle accessory is replaced, acquiring accessory identification information of the replaced vehicle accessory;
comparing the accessory identification information with a preset authentication accessory information table;
and obtaining an authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table.
Optionally, the obtaining the authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table includes:
if the accessory identification information is consistent with the preset authentication accessory information, determining that the vehicle accessory authentication is successful;
and if the accessory identification information is inconsistent with the preset authentication accessory information, determining that the vehicle accessory authentication fails.
Optionally, if the vehicle accessory is an accessory connected by power, the acquiring accessory identification information of the replaced vehicle accessory after detecting that the vehicle accessory is replaced includes:
after the replaced vehicle accessory is electrified for the first time, the built-in accessory identification information is acquired through electric connection.
Optionally, if the vehicle accessory is an accessory that is not electrically connected in the vehicle, after detecting that the vehicle accessory is replaced, the acquiring accessory identification information of the replaced vehicle accessory includes:
acquiring image information of the replaced vehicle accessories through a preset image acquisition device;
and analyzing the image information to obtain accessory identification information of the replaced vehicle accessory, wherein the accessory identification information comprises accessory types or accessory sizes.
Optionally, the method further comprises:
and outputting prompt information of the safety threat of the replaced vehicle accessory after determining that the vehicle accessory fails to be authenticated.
According to a second aspect of the present disclosure, there is provided an authentication device of a vehicle accessory, including:
an acquisition unit configured to acquire accessory identification information of a replaced vehicle accessory after detecting that the vehicle accessory is replaced;
the comparison unit is used for comparing the accessory identification information with a preset authentication accessory information table;
and the confirmation unit is used for obtaining the authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table.
Optionally, the confirmation unit includes:
the first determining module is used for determining that the vehicle accessory is successfully authenticated when the accessory identification information is consistent with the preset authentication accessory information;
and the second determining module is used for determining that the vehicle accessory authentication fails when the accessory identification information is inconsistent with the preset authentication accessory information.
Optionally, if the vehicle accessory is an electrically connected accessory, the acquiring unit includes:
and the acquisition module is used for acquiring built-in accessory identification information of the replaced vehicle accessories through electric connection after the replaced vehicle accessories are electrified for the first time.
Optionally, if the vehicle accessory is an accessory that is not electrically connected in a vehicle, the acquiring unit includes:
the acquisition module is used for acquiring the image information of the replaced vehicle accessories through a preset image acquisition device;
and the analysis module is used for analyzing the image information to obtain accessory identification information of the replaced vehicle accessory, wherein the accessory identification information comprises accessory types or accessory sizes.
Optionally, the apparatus further includes:
and the output unit is used for outputting prompt information of the safety threat of the replaced vehicle accessory after the determining unit determines that the authentication of the vehicle accessory fails.
According to a third aspect of the present disclosure, there is provided a vehicle comprising the authentication device of the vehicle accessory according to the second aspect.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of the first aspect.
According to a fifth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of the preceding first aspect.
According to a fifth aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the method of the first aspect described above.
The authentication method, the authentication device, the vehicle, the electronic equipment and the storage medium for the vehicle accessories, provided by the disclosure, acquire accessory identification information of the replaced vehicle accessories after detecting that the vehicle accessories are replaced; comparing the accessory identification information with a preset authentication accessory information table; and obtaining an authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table. Compared with the related art, after the vehicle accessory is replaced, the embodiment of the application authenticates the replaced accessory based on the accessory identification information, so that the safety of the replaced vehicle accessory can be ensured, and the safety of vehicle driving can be further ensured.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the application or to delineate the scope of the application. Other features of the present application will become apparent from the description that follows.
Drawings
The drawings are for a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a flowchart of an authentication method of a vehicle accessory according to an embodiment of the disclosure;
fig. 2 is a schematic structural diagram of an authentication device for a vehicle accessory according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an authentication device for a vehicle accessory according to an embodiment of the present disclosure;
fig. 4 is a schematic block diagram of an example electronic device 300 provided by an embodiment of the disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and should be considered as merely exemplary. Accordingly, one of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
The authentication method, apparatus, electronic device, and storage medium of the vehicle accessory of the embodiments of the present disclosure are described below with reference to the accompanying drawings.
Fig. 1 is a flowchart of an authentication method of a vehicle accessory according to an embodiment of the disclosure.
As shown in fig. 1, the method comprises the steps of:
step 101, after detecting that a vehicle accessory is replaced, accessory identification information of the replaced vehicle accessory is acquired.
After the vehicle accessory is replaced, the monitoring and confirmation of the vehicle machine can be carried out, and when the vehicle accessory is electrified for the first time after the replacement or is used for the first time, the safety authentication detection is required for the safety of the replaced vehicle accessory.
The authentication basis is accessory identification information, and the corresponding accessory identification information of different types of vehicle accessories is different, and the types of the vehicle accessories mainly comprise two types: one type is an electrically connected accessory, such as a vehicle master accessory or an executive accessory, and the other type is an in-vehicle non-electrically connected accessory, such as a seat. There are also differences in the manner in which different types of vehicle accessories are obtained. For example, for accessories connected by electricity, corresponding accessory identification information can be obtained through electric connection after the electricity is supplied, and for accessories connected by non-electricity, when the accessory is used for the first time or after the accessory is installed, an image can be acquired through an in-vehicle image acquisition device (such as a camera, an imaging radar and the like) and then sent to a vehicle machine, and the image is analyzed by the vehicle machine to obtain the accessory.
And 102, comparing the accessory identification information with a preset authentication accessory information table.
The preset authentication accessory information table is recorded with information of all authenticated vehicle accessories, such as accessory identification information, generation date, anti-counterfeiting mark and the like, and if the information of the vehicle accessories which do not exist in the preset authentication accessory information table is not displayed, the safety of the vehicle accessories is indicated to be authenticated or the authentication is unsuccessful, and certain potential safety hazards exist for the vehicle accessories.
When the accessory identification information is compared with the preset authentication accessory information table, the accessory identification information can be compared with the preset authentication accessory information table sequentially or can be directly searched, and the comparison mode is not limited in the embodiment of the application.
And step 103, obtaining an authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table.
If the accessory identification information is consistent with any accessory identification information in the preset authentication accessory information table, the replaced vehicle accessory is indicated to be an accessory with successful authentication and can be used with confidence; if the accessory identification information is inconsistent with any accessory identification information in the preset authentication accessory information table, the fact that the replaced vehicle accessory is an accessory with authentication failure is indicated, a certain potential safety hazard exists in the accessory, and prompt information of safety threat of the replaced vehicle accessory needs to be output so as to prompt a user to adjust the vehicle accessory in time, and driving safety is improved.
According to the authentication method of the vehicle accessories, after the vehicle accessories are detected to be replaced, accessory identification information of the replaced vehicle accessories is obtained; comparing the accessory identification information with a preset authentication accessory information table; and obtaining an authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table. Compared with the related art, after the vehicle accessory is replaced, the embodiment of the application authenticates the replaced accessory based on the accessory identification information, so that the safety of the replaced vehicle accessory can be ensured, and the safety of vehicle driving can be further ensured.
In practical applications, there are two types of vehicle accessories commonly found in vehicles, the first type: the vehicle accessories are accessories connected through electricity, and the second type is that: the vehicle accessories are accessories which are not connected in the vehicle in a power-on way, and aiming at different types, the modes for acquiring the accessory identification information of the replaced vehicle accessories are different:
the first type of vehicle accessory acquisition mode: after the replaced vehicle accessory is electrified for the first time, the built-in accessory identification information is acquired through electric connection. The accessories (main control and executing mechanisms) connected with the vehicle are all provided with communication capability, anti-fake identification can be added in accessory identification information, the anti-fake information can be obtained after the vehicle is electrified, the complete identification capability of a vehicle system can be calibrated, the safety of the vehicle accessories is judged through the complete identification capability of the vehicle system, and the vehicle machine directly displays the state of the vehicle accessories after replacement is completed.
The second type of vehicle accessory acquisition mode: the method comprises the steps of collecting image information of replaced vehicle accessories through a preset image collecting device, and analyzing the image information to obtain accessory identification information of the replaced vehicle accessories, wherein the accessory identification information comprises accessory types or accessory sizes. Fittings which are not connected in the vehicle, such as seats, interior decorations and the like, are identified and judged through a camera, and when the vehicle fittings after replacement are identified to influence the driving safety, the vehicle owners are timely reminded, and dangers caused by illegal modification are avoided, such as an anti-rolling frame, an unsafe headrest, an unsafe airbag detonation point fitting and the like are additionally arranged in the vehicle. The embodiment of the application does not limit the specific types of the first type of vehicle accessories and the second type of vehicle accessories.
In summary, the embodiment of the application can identify the normal vehicle-using state and the replacement state of the vehicle, and after the replacement of the vehicle accessories is monitored, the safety of the user in using and maintaining the vehicle is improved by identifying whether the replaced vehicle accessories are the authenticated accessories or not through the authentication flow of the safety of the vehicle accessories.
Corresponding to the authentication method of the vehicle accessory, the application also provides an authentication device of the vehicle accessory. Since the device embodiment of the present application corresponds to the above-mentioned method embodiment, details not disclosed in the device embodiment may refer to the above-mentioned method embodiment, and details are not described in detail in the present application.
In a possible implementation manner of the present embodiment, the embodiment of the present application further provides an authentication device for a vehicle accessory, and fig. 2 is a schematic structural diagram of the authentication device for a vehicle accessory provided in the embodiment of the present disclosure, as shown in fig. 2, including:
an acquisition unit 21 for acquiring accessory identification information of the replaced vehicle accessory after detecting that the vehicle accessory is replaced;
a comparing unit 22, configured to compare the accessory identification information with a preset authentication accessory information table;
and a confirmation unit 23, configured to obtain an authentication result of the vehicle accessory according to a comparison result of the accessory identification information and the preset authentication accessory information table.
The authentication device of the vehicle accessory, provided by the disclosure, acquires accessory identification information of the replaced vehicle accessory after detecting that the vehicle accessory is replaced; comparing the accessory identification information with a preset authentication accessory information table; and obtaining an authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table. Compared with the related art, after the vehicle accessory is replaced, the embodiment of the application authenticates the replaced accessory based on the accessory identification information, so that the safety of the replaced vehicle accessory can be ensured, and the safety of vehicle driving can be further ensured.
Further, in one possible implementation manner of this embodiment, as shown in fig. 3, the confirmation unit 23 includes:
a first determining module 231 configured to determine that the vehicle accessory authentication is successful when the accessory identification information is consistent with preset authentication accessory information;
and a second determining module 232, configured to determine that the vehicle accessory authentication fails when the accessory identification information is inconsistent with the preset authentication accessory information.
Further, in one possible implementation manner of the present embodiment, as shown in fig. 3, if the vehicle accessory is an accessory with an electrical connection, the acquiring unit 21 includes:
the acquisition module 211 is used for acquiring the built-in accessory identification information of the replaced vehicle accessory through electric connection after the replaced vehicle accessory is electrified for the first time.
Further, in one possible implementation manner of this embodiment, as shown in fig. 3, if the vehicle accessory is an accessory that is not electrically connected in the vehicle, the obtaining unit 21 includes:
the acquisition module 212 is used for acquiring image information of the replaced vehicle accessories through a preset image acquisition device;
and a parsing module 213, configured to parse the image information to obtain accessory identification information of the replaced vehicle accessory, where the accessory identification information includes an accessory category or an accessory size.
Further, in a possible implementation manner of this embodiment, as shown in fig. 3, the apparatus further includes:
and an output unit 24, configured to output a prompt message that the replaced vehicle accessory has a security threat after the determining unit determines that the authentication of the vehicle accessory fails.
The foregoing explanation of the method embodiment is also applicable to the apparatus of this embodiment, and the principle is the same, and this embodiment is not limited thereto.
Further, in a possible implementation manner of the present embodiment, the embodiment of the present application further provides a vehicle, where the vehicle includes the authentication device of the vehicle accessory shown in fig. 2 or fig. 3.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
Fig. 4 shows a schematic block diagram of an example electronic device 300 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 4, the apparatus 300 includes a computing unit 301 that can perform various appropriate actions and processes according to a computer program stored in a ROM (Read-Only Memory) 302 or a computer program loaded from a storage unit 308 into a RAM (Random Access Memory ) 303. In the RAM 303, various programs and data required for the operation of the device 300 may also be stored. The computing unit 301, the ROM 302, and the RAM 303 are connected to each other by a bus 304. An I/O (Input/Output) interface 305 is also connected to bus 304.
Various components in device 300 are connected to I/O interface 305, including: an input unit 303 such as a keyboard, a mouse, and the like; an output unit 307 such as various types of displays, speakers, and the like; a storage unit 308 such as a magnetic disk, an optical disk, or the like; and a communication unit 309 such as a network card, modem, wireless communication transceiver, etc. The communication unit 309 allows the device 300 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 301 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 301 include, but are not limited to, a CPU (Central Processing Unit ), a GPU (Graphic Processing Units, graphics processing unit), various dedicated AI (Artificial Intelligence ) computing chips, various computing units running machine learning model algorithms, a DSP (Digital Signal Processor ), and any suitable processor, controller, microcontroller, etc. The computing unit 301 performs the respective methods and processes described above, for example, the authentication method of the vehicle accessory. For example, in some embodiments, the method of authenticating a vehicle accessory may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as storage unit 308. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 300 via the ROM 302 and/or the communication unit 309. When the computer program is loaded into RAM 303 and executed by computing unit 301, one or more steps of the method described above may be performed. Alternatively, in other embodiments, the computing unit 301 may be configured to perform the aforementioned vehicle accessory authentication method in any other suitable way (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit System, FPGA (Field Programmable Gate Array ), ASIC (Application-Specific Integrated Circuit, application-specific integrated circuit), ASSP (Application Specific Standard Product, special-purpose standard product), SOC (System On Chip ), CPLD (Complex Programmable Logic Device, complex programmable logic device), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, RAM, ROM, EPROM (Electrically Programmable Read-Only-Memory, erasable programmable read-Only Memory) or flash Memory, an optical fiber, a CD-ROM (Compact Disc Read-Only Memory), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., CRT (Cathode-Ray Tube) or LCD (Liquid Crystal Display ) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: LAN (Local Area Network ), WAN (Wide Area Network, wide area network), internet and blockchain networks.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service ("Virtual Private Server" or simply "VPS") are overcome. The server may also be a server of a distributed system or a server that incorporates a blockchain.
It should be noted that, artificial intelligence is a subject of studying a certain thought process and intelligent behavior (such as learning, reasoning, thinking, planning, etc.) of a computer to simulate a person, and has a technology at both hardware and software level. Artificial intelligence hardware technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing, and the like; the artificial intelligence software technology mainly comprises a computer vision technology, a voice recognition technology, a natural language processing technology, a machine learning/deep learning technology, a big data processing technology, a knowledge graph technology and the like.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel or sequentially or in a different order, provided that the desired results of the technical solutions of the present disclosure are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (10)

1. A method of authenticating a vehicle accessory, comprising:
after detecting that the vehicle accessory is replaced, acquiring accessory identification information of the replaced vehicle accessory;
comparing the accessory identification information with a preset authentication accessory information table;
and obtaining an authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table.
2. The authentication method according to claim 1, wherein the obtaining the authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table includes:
if the accessory identification information is consistent with the preset authentication accessory information, determining that the vehicle accessory authentication is successful;
and if the accessory identification information is inconsistent with the preset authentication accessory information, determining that the vehicle accessory authentication fails.
3. The authentication method according to claim 1, wherein, if the vehicle accessory is an electrically connected accessory, the acquiring accessory identification information of the replaced vehicle accessory after detecting that the vehicle accessory is replaced includes:
after the replaced vehicle accessory is electrified for the first time, the built-in accessory identification information is acquired through electric connection.
4. The authentication method according to claim 1, wherein, if the vehicle accessory is an accessory that is not electrically connected in a vehicle, the acquiring accessory identification information of the replaced vehicle accessory after detecting that the vehicle accessory is replaced includes:
acquiring image information of the replaced vehicle accessories through a preset image acquisition device;
and analyzing the image information to obtain accessory identification information of the replaced vehicle accessory, wherein the accessory identification information comprises accessory types or accessory sizes.
5. The authentication method of claim 2, wherein the method further comprises:
and outputting prompt information of the safety threat of the replaced vehicle accessory after determining that the vehicle accessory fails to be authenticated.
6. An authentication device for a vehicle accessory, comprising:
an acquisition unit configured to acquire accessory identification information of a replaced vehicle accessory after detecting that the vehicle accessory is replaced;
the comparison unit is used for comparing the accessory identification information with a preset authentication accessory information table;
and the confirmation unit is used for obtaining the authentication result of the vehicle accessory according to the comparison result of the accessory identification information and the preset authentication accessory information table.
7. A vehicle, characterized in that the vehicle comprises an authentication device of the vehicle accessory according to claim 6.
8. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
9. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-5.
10. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any of claims 1-5.
CN202210892353.1A 2022-07-27 2022-07-27 Authentication method and device for vehicle accessory, vehicle, electronic device and storage medium Pending CN117078992A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210892353.1A CN117078992A (en) 2022-07-27 2022-07-27 Authentication method and device for vehicle accessory, vehicle, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210892353.1A CN117078992A (en) 2022-07-27 2022-07-27 Authentication method and device for vehicle accessory, vehicle, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN117078992A true CN117078992A (en) 2023-11-17

Family

ID=88710252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210892353.1A Pending CN117078992A (en) 2022-07-27 2022-07-27 Authentication method and device for vehicle accessory, vehicle, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN117078992A (en)

Similar Documents

Publication Publication Date Title
CN105501158B (en) System and method for identifying and fusing drivers
US20190065994A1 (en) Deep learning-based image recognition method and apparatus
US11749117B1 (en) Facial recognition technology for improving driver safety
US20180075666A1 (en) Method and apparatus for processing point cloud data
WO2016089577A1 (en) Dynamic image recognition model updates
WO2019114603A1 (en) Vehicle detection method and apparatus and vehicle diagnostic device
CN108891413A (en) Vehicle-mounted anti-fatigue-driving system, method, equipment and storage medium
US11893830B2 (en) Method and apparatus for connecting through on-vehicle bluetooth, and storage medium
US20220327928A1 (en) Method of providing prompt for traffic light, vehicle, and electronic device
CN104346035A (en) Indicating automatically corrected words
CN109859085A (en) Safe early warning method and Related product
CN113591580A (en) Image annotation method and device, electronic equipment and storage medium
CN113452760A (en) Verification code synchronization method and device, electronic equipment and storage medium
CN113177497A (en) Visual model training method, vehicle identification method and device
CN117048457A (en) User interface matching method and device for child safety seat and vehicle
CN117078992A (en) Authentication method and device for vehicle accessory, vehicle, electronic device and storage medium
US20230031709A1 (en) Autonomous driving vehicle detection method and apparatus, electronic device and readable storage medium
CN113554062B (en) Training method, device and storage medium for multi-classification model
CN114519900A (en) Riding method and device, electronic equipment and storage medium
WO2019171116A1 (en) Method and device for recognizing object
CN114911813B (en) Updating method and device of vehicle-mounted perception model, electronic equipment and storage medium
CN113806361B (en) Method, device and storage medium for associating electronic monitoring equipment with road
CN117008866A (en) Vehicle-mounted object searching method and device, vehicle, electronic equipment and storage medium
CN117048458A (en) Child safety seat insertion detection method and device, vehicle and electronic equipment
CN111275831B (en) Data processing method, system and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination