WO2023164818A1 - 车辆认证方法、装置、控制设备和换电站 - Google Patents

车辆认证方法、装置、控制设备和换电站 Download PDF

Info

Publication number
WO2023164818A1
WO2023164818A1 PCT/CN2022/078691 CN2022078691W WO2023164818A1 WO 2023164818 A1 WO2023164818 A1 WO 2023164818A1 CN 2022078691 W CN2022078691 W CN 2022078691W WO 2023164818 A1 WO2023164818 A1 WO 2023164818A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication data
battery
vehicle
authentication
target
Prior art date
Application number
PCT/CN2022/078691
Other languages
English (en)
French (fr)
Inventor
王清明
Original Assignee
时代电服科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 时代电服科技有限公司 filed Critical 时代电服科技有限公司
Priority to CN202280037015.8A priority Critical patent/CN117413303A/zh
Priority to PCT/CN2022/078691 priority patent/WO2023164818A1/zh
Publication of WO2023164818A1 publication Critical patent/WO2023164818A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/017Detecting movement of traffic to be counted or controlled identifying vehicles

Definitions

  • the present application relates to the technical field of vehicle authentication, and in particular, relates to a vehicle authentication method, device, control equipment, and switching station.
  • Vehicles have become a more common means of transportation in life, and with the popularization of license plates, more and more services related to vehicles have also emerged, such as vehicle maintenance, vehicle cleaning, and vehicle parking.
  • vehicle maintenance In order to provide better services for the vehicle, it is generally necessary to authenticate the vehicle before performing other processing on the vehicle.
  • the current authentication of the vehicle is relatively simple, which leads to insufficient reliability of the results of the vehicle authentication.
  • the purpose of the embodiments of the present application is to provide a vehicle authentication method, device, control device and switching station, so as to improve the problem of inaccurate vehicle identification results.
  • the embodiment of the present application provides a vehicle authentication method, including: acquiring the image data of the target vehicle, the image data including the target license plate information of the target vehicle; A set of authentication data; acquiring a second set of authentication data of the target vehicle; comparing the first set of authentication data with the second set of authentication data to determine an authentication result for the target vehicle.
  • the determining the first set of authentication data according to the target license plate information includes: acquiring the first set of authentication data associated with the target license plate information transmitted by a server.
  • the method also includes:
  • the first set of authentication data is determined according to the target license plate information, including:
  • the method also includes:
  • the first set of authentication data is determined according to the target license plate information, including:
  • a first set of authentication data associated with the target vehicle is obtained from the server.
  • the acquiring the second set of authentication data of the target vehicle includes:
  • a second set of authentication data of the target vehicle is obtained through the communication.
  • the comparing the first set of authentication data with the second set of authentication data to determine an authentication result for the target vehicle includes:
  • the first vehicle identifier matches the second vehicle identifier
  • the first battery identifier matches the second battery identifier
  • the first set of authentication data includes multiple first battery identifiers
  • the second set of authentication data includes multiple second battery identifiers
  • the first set of authentication data in the first set The battery identification is compared with the second battery identification in the second set of authentication data to determine whether the first battery identification matches the second battery identification, including:
  • each first battery identifier and the position identifier of the first battery identifier in the first set of authentication data with each second battery identifier and the second battery identifier in the second set of authentication data comparing the location identifiers of the first battery identifiers to determine whether the first battery identifiers match the second battery identifiers;
  • the method further includes:
  • the target license plate information of the target vehicle, the target vehicle identification and the battery identification after battery replacement are sent to the server.
  • the embodiment of the present application provides a vehicle authentication device, including:
  • a first acquiring module configured to acquire image data of the target vehicle, the image data including target license plate information of the target vehicle;
  • a determining module configured to determine a first set of authentication data according to the target license plate information
  • a second acquisition module configured to acquire a second set of authentication data of the target vehicle
  • An authentication module configured to compare the first set of authentication data with the second set of authentication data to determine an authentication result for the target vehicle.
  • the embodiment of the present application provides a control device, including: a processor, a memory, the memory stores machine-readable instructions executable by the processor, and when the electronic device is running, the machine-readable When the instructions are executed by the processor, the above-mentioned steps of the vehicle authentication method are executed.
  • the embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps of the above-mentioned vehicle authentication method are executed.
  • the embodiment of the present application provides a power station, including: a conveying system, a battery compartment, and the above-mentioned control device.
  • the vehicle authentication method, device, control device, and exchange station used in the embodiments of the present application to match a set of authentication data, and then based on the authentication data transmitted by the vehicle, compared with only authenticating the license plate, it can authenticate the identity of the vehicle. Other data can reduce the inaccurate authentication due to abnormalities such as fake license plates.
  • FIG. 1 is a schematic diagram of the operating environment of the vehicle authentication method provided by the embodiment of the present application.
  • FIG. 2 is a schematic diagram of a power exchange station provided in an embodiment of the present application.
  • FIG. 3 is a flowchart of a vehicle authentication method provided in an embodiment of the present application.
  • Fig. 4 is a partial flowchart of the vehicle authentication method provided by the embodiment of the present application.
  • Fig. 5 is another part of the flow chart of the vehicle authentication method provided by the embodiment of the present application.
  • FIG. 6 is a detailed flowchart of step 350 of the vehicle authentication method provided by the embodiment of the present application.
  • FIG. 7 is a detailed flowchart of step 370 of the vehicle authentication method provided by the embodiment of the present application.
  • Fig. 8 is a schematic diagram of functional modules of the vehicle authentication device provided by the embodiment of the present application.
  • different car models have different sizes, different required batteries, and different positions for accommodating the batteries. Therefore, different car models have different actions for changing batteries.
  • the basic information of the vehicle for example, the model of the vehicle.
  • the vehicle can be identified by identifying the license plate number of the vehicle, so that the battery can be replaced more accurately.
  • the inventor of the present application made further in-depth research and learned that there may be some vehicle license plate numbers that do not match the vehicle, for example, the license plate number has a false plate. Therefore, even if the license plate is certified, the certified license plate cannot fully represent the vehicle.
  • the vehicle authentication method provided in this application can authenticate data other than the license plate, so as to improve the reliability of the authentication result.
  • the vehicle authentication method provided by this application is described below through several embodiments.
  • an operating environment for executing a vehicle authentication method disclosed in the embodiment of the present application is firstly introduced.
  • FIG. 1 it is a schematic diagram of the operating environment of the vehicle authentication method provided by the embodiment of the present application.
  • the operating environment of the vehicle authentication method may include a server 200 and a power exchange station 100 .
  • the server 200 communicates with one or more switching stations through a network for data communication or interaction.
  • the server may be a web server, a database server, or the like.
  • the battery exchange station 100 is used for battery exchange of electric vehicles.
  • the power exchange station 100 may include: a conveying system 110 , a battery compartment 120 and a control device 130 .
  • the conveying system 110 is used to transport the batteries replaced from the electric vehicle, and can also be used to transport the batteries taken from the battery compartment 120 .
  • the conveying system 110 may include: a conveying tool, a conveying track, and a programmable logic controller (Programmable Logic Controller, PLC for short). Conveyors can travel on this conveyor track to move the batteries that need to be processed.
  • a programmable logic controller Programmable Logic Controller, PLC for short. Conveyors can travel on this conveyor track to move the batteries that need to be processed.
  • the delivery tool can be controlled by the above-mentioned programmable logic controller, and the delivery tool moves according to the control instructions of the programmable logic controller.
  • the programmable logic controller may control the delivery means based on data provided by the control device 130 .
  • the switching station 100 can communicate with the server 200 through the control device 130 .
  • the control device 130 can also establish a communication connection with the electric vehicle whose battery is to be replaced, so as to acquire the data transmitted by the electric vehicle whose battery is to be replaced.
  • control device 130 may include a memory and a processor.
  • the components of the above-mentioned memory and processor are directly or indirectly electrically connected to each other to realize data transmission or interaction.
  • these components can be electrically connected to each other through one or more communication buses or signal lines.
  • the processor mentioned above is used to execute the executable modules stored in the memory.
  • the memory can be, but not limited to, random access memory (Random Access Memory, referred to as RAM), read-only memory (Read Only Memory, referred to as ROM), programmable read-only memory (Programmable Read-Only Memory, referred to as PROM) , Erasable Programmable Read-Only Memory (EPROM for short), Electric Erasable Programmable Read-Only Memory (EEPROM for short), etc.
  • RAM Random Access Memory
  • ROM Read Only Memory
  • PROM programmable read-only memory
  • PROM Programmable Read-Only Memory
  • EPROM Erasable Programmable Read-Only Memory
  • EEPROM Electric Erasable Programmable Read-Only Memory
  • the above-mentioned processor may be an integrated circuit chip with signal processing capability.
  • the above-mentioned processor can be a general-purpose processor, including a central processing unit (Central Processing Unit, referred to as CPU), a network processor (Network Processor, referred to as NP), etc.; it can also be a digital signal processor (digital signal processor, referred to as DSP) , Application Specific Integrated Circuit (ASIC for short), Field Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • control device 130 may also include more or fewer components, or a different configuration.
  • control device 130 may further include a display unit, which provides an interactive interface (such as a user operation interface) between the control device 130 and the user or is used to display image data for the user's reference.
  • the display unit may be a liquid crystal display or a touch display. If it is a touch display, it can be a capacitive touch screen or a resistive touch screen supporting single-point and multi-touch operations. Supporting single-point and multi-touch operations means that the touch display can sense simultaneous touch operations from one or more positions on the touch display, and hand over the sensed touch operations to the processor calculation and processing.
  • the battery swap station 100 may further include one or more parking spaces 140 (only one is shown in the figure), and the parking spaces 140 are arranged adjacent to the battery compartment 120 .
  • the parking space 140 is used to park vehicles that need battery replacement.
  • the control device 130 in this embodiment may be used to execute each step in each method provided in the embodiment of this application.
  • the implementation process of the vehicle authentication method will be described in detail below through several embodiments.
  • FIG. 3 is a flow chart of the vehicle authentication method provided by the embodiment of the present application. The specific process shown in FIG. 3 will be described in detail below.
  • Step 310 acquiring image data of the target vehicle.
  • the image data includes target license plate information of the target vehicle.
  • the vehicle can be authenticated first before parts are replaced or the vehicle passes through a key intersection.
  • the key intersection may be an expressway intersection, an expressway toll station, a garage intersection, and the like.
  • the collection device for collecting the image data of the target vehicle can be set at the entrance of the parts replacement station, or on both sides of the key intersection.
  • the accessory replacement station may be a replacement station, an auto repair station, a vehicle washing station, and the like.
  • the target license plate information of the target vehicle can be extracted from the image data.
  • the target license plate information in the image data can be recognized through image recognition technology.
  • the car body in the image data can be recognized first, and then the license plate on the car body can be recognized.
  • extracting the target license plate information of the target vehicle from the image data may include: performing edge detection on the image data of the target vehicle to determine the outline of the target vehicle; cutting out the target vehicle image based on the outline of the target vehicle ; Extract the character string contained in the target vehicle image; determine the target license plate information of the target vehicle based on the character string.
  • the character strings conforming to the rules may be determined according to the license plate rules.
  • the naming rule of the vehicle is place name plus vehicle number
  • the first character of the license plate of the vehicle is the abbreviation of any province, or the first few characters of the license plate of the vehicle are the abbreviation of the place name
  • the naming rule of the vehicle is purpose plus vehicle number
  • the first character of the license plate of the vehicle is a character representing the purpose, and the character string whose first character is the purpose is filtered out from the multiple strings.
  • the naming rules of the license plate of the vehicle can also be other rules, and the rules for filtering character strings can be determined according to the specific naming rules of the license plate, which is not limited here in this application.
  • extracting the license plate information of the target vehicle from the image data may also include: performing key point detection on the image data of the target vehicle to determine a target area image; extracting the target vehicle image from the target area image Included character string; determine the target license plate information of the target vehicle based on the character string.
  • the above-mentioned key points may be points on the lights, points on the front of the car, points on the roof, etc.
  • the target area image determined through the key points may be the head image of the vehicle containing the license plate image, and then the character string contained in the head image is identified, and the target license plate information of the target vehicle is determined based on the character string.
  • Step 330 Determine the first set of authentication data according to the target license plate information in the image data.
  • the vehicle before a vehicle is authenticated, the vehicle may be registered through an on-vehicle device on the vehicle or other user terminals.
  • vehicle information may be stored after registration.
  • the vehicle information may include: license plate, vehicle model, vehicle identification, battery identification, and the like.
  • the above-mentioned first set of authentication data may include: one or more parameters among parameters such as vehicle model, vehicle identification, and battery identification.
  • the battery in the target vehicle may be different from the battery at the time of registration.
  • the battery identifier in the first set of authentication data may be the battery identifier of the battery currently installed in the target vehicle.
  • the first set of authentication data may also include: vehicle model and/or vehicle identification.
  • the first set of authentication data may include: vehicle model and/or vehicle identification.
  • the data of all registered vehicles can be stored in advance.
  • the first set of authentication data can be filtered out from the data of all registered vehicles by using the target license plate information as a filtering condition.
  • Step 350 acquiring the second set of authentication data of the target vehicle.
  • the number of parameters and parameter types contained in the second set of authentication data may be the same as those contained in the first set of authentication data.
  • the number of parameters and parameter types included in the second set of authentication data may also be greater than the number of parameters and parameter types included in the first set of authentication data.
  • the second set of authentication data also includes at least the battery identification code and the vehicle identification.
  • the second set of authentication data transmitted by the target vehicle may be obtained by establishing communication with the target vehicle.
  • the target vehicle may establish a short-distance communication connection with the control device, for example, the short-distance communication connection may be a Bluetooth connection, a Wi-Fi connection, a Near Field Communication (Near Field Communication, NFC for short) or the like.
  • the short-distance communication connection may be a Bluetooth connection, a Wi-Fi connection, a Near Field Communication (Near Field Communication, NFC for short) or the like.
  • Step 370 comparing the first set of authentication data with the second set of authentication data to determine the authentication result of the target vehicle.
  • each parameter in the first set of authentication data may be compared with each corresponding parameter in the second set of authentication data to determine whether each parameter is the same. If each parameter is the same, the authentication result is passed; if any parameter is different, the authentication result is failed.
  • each parameter in the second set of authentication data can be compared with the corresponding parameter in the first set of authentication data to determine whether each parameter in the second set of authentication data is the same as that in the first set of authentication data. Any parameter is the same. If every parameter in the second set of authentication data can find the same parameter in the first set of authentication data, the authentication result is that the authentication is passed; if any parameter in the second set of authentication data cannot be found in the first set of authentication data If the same parameter is found in the group authentication data, the authentication result is that the authentication fails.
  • each parameter in the first set of authentication data can be compared with the corresponding parameter in the second set of authentication data to determine whether each parameter in the first set of authentication data is consistent with that in the second set of authentication data. Any parameter is the same. If every parameter in the first set of authentication data can find the same parameter in the second set of authentication data, the authentication result is passed; if any parameter in the first set of authentication data cannot be found in the second set of authentication data If the same parameter is found in the group authentication data, the authentication result is that the authentication fails.
  • the authentication of the vehicle can be realized not only on the license plate, but also on other data on the vehicle, which can improve the reliability of the vehicle authentication result and provide a basis for the subsequent processing of the vehicle. basis to increase the effectiveness of the vehicle's handling.
  • step 330 may include: obtaining the first information associated with the target vehicle information transmitted by the server. Group authentication data.
  • the target license plate information of the target vehicle may be authenticated first to determine whether the target license plate information is a license plate that has ever been registered. If the target license plate information is license plate information that has been registered and is currently valid, the authentication of the target license plate information is passed.
  • the authentication of the target license plate information can be performed in the control device or in the server.
  • the vehicle authentication method further includes: step 321 and step 322 .
  • Step 321 acquire the first updated authentication data set currently stored in the server from the server.
  • the first updated authentication data set currently stored in the server may be acquired from the server according to the first time rule.
  • the first time regularity may be every specified time interval.
  • the first updated authentication data set currently stored in the server may be acquired from the server at specified time intervals.
  • the specified time interval may be a one-day interval, a two-day interval, or the like.
  • the first updated authentication data set may include authentication data of all vehicles currently registered.
  • the authentication data set can be periodically obtained from the server to determine that the authentication data set locally stored in the control device is the latest data, so as to improve the accuracy of vehicle authentication.
  • Step 322 updating the locally stored historical authentication data to the first updated authentication data set.
  • step 330 may include step 331 of obtaining a first set of authentication data associated with the target license plate information from the first updated authentication data set.
  • the first group of authentication data can be filtered out from the first updated authentication data set by using the target license plate information as a filtering condition.
  • the authentication of the vehicle can be realized even when the control device has no network, the applicability of the vehicle authentication can be improved, the time for the user to wait for the authentication of the vehicle can be reduced, and the user experience can be improved.
  • step 330 the vehicle authentication method further includes: step 323 and step 324.
  • Step 323 acquiring the first updated authentication data set currently stored in the server from the server.
  • Step 324 updating the locally stored historical authentication data to the first updated authentication data set.
  • Step 323 and step 324 are implemented similarly to step 321 and step 322, and other details about step 323 and step 324 can be referred to in the description of step 321 and step 322, and will not be repeated here.
  • step 330 may include: step 332 and step 333 .
  • Step 332 query the authentication data associated with the target license plate information in the first updated authentication data set.
  • step 333 is executed.
  • Step 333 obtaining the first set of authentication data associated with the target vehicle from the server.
  • the first set of authentication data is obtained from the local first, and the number of interactions with the server is reduced. Only when the authentication data of the target license plate information cannot be found in the local data, communicate with the server and obtain The first set of authentication data, so that the situation of giving wrong authentication results can be reduced, and the accuracy of the authentication results can be further ensured.
  • step 350 may include: step 351 to step 353 .
  • Step 351 initiate a communication connection request to the target vehicle.
  • the communication connection request may be a short-range communication connection request.
  • the communication connection request may also be a request for other communication connections.
  • a communication connection request that the target vehicle can implement may be sent to the target vehicle according to the requirements of the actual scene.
  • the communication connection request may also be a network communication connection request or the like.
  • the timing when the control device initiates a communication connection request to the target vehicle may be when the vehicle enters the collection range of the collection device that collects the image data of the target vehicle.
  • the timing for the control device to initiate a communication connection request to the target vehicle may also be after confirming that the target vehicle license plate information is authenticated.
  • Step 352 after receiving the connection response from the target vehicle, establish a communication connection with the target vehicle.
  • the target vehicle can establish short-distance communication with the control device through its vehicle-mounted device.
  • Step 353 acquire the second set of authentication data of the target vehicle through the communication.
  • Obtaining the second set of authentication data of the target vehicle through the above-mentioned communication for example, obtaining the second set of authentication data of the target vehicle through short-distance communication can reduce the requirements on the target vehicle and realize the authentication of the vehicle more conveniently.
  • the first set of authentication data includes the first vehicle identifier and the first battery identifier
  • the second set of authentication data may include the second vehicle expression and the second battery identifier.
  • step 370 may include: step 371 and step 372 .
  • Step 371 Compare the first vehicle identifier in the first set of authentication data with the second vehicle identifier in the second set of authentication data to determine whether the first vehicle identifier matches the second vehicle identifier.
  • Step 372 Compare the first battery identifier in the first set of authentication data with the second battery identifier in the second set of authentication data to determine whether the first battery identifier matches the second battery identifier.
  • the first vehicle identification when the first vehicle identification is the same as the second vehicle identification, it may mean that the first vehicle identification matches the second vehicle identification.
  • the first set of authentication data includes a battery identifier
  • the second set of authentication data also includes a battery identifier
  • the first battery identifier of the first set of authentication data and the second battery identifier of the second set of authentication data If the battery identifiers match, the first battery identifier matches the second battery identifier.
  • each battery identifier in the first set of authentication data is consistent with the battery identifier in the second set of authentication data
  • One of the battery identifications is the same.
  • the vehicle certification can be better, and the vehicle certification results can also be made more accurate.
  • the installation position of the battery is also uniquely determined.
  • the position of the installed battery can also be authenticated .
  • the first set of authentication data includes a plurality of first battery identifiers
  • the second set of authentication data includes a plurality of second battery identifiers.
  • Step 372 may include: The first battery identifier and the location identifier of the first battery identifier are compared with the second battery identifiers in the second set of authentication data and the location identifiers of the second battery identifier to determine the first battery identifier and the location identifier of the second battery identifier. Whether the second battery ID matches.
  • each of the first battery identifiers matches each of the second battery identifiers, which means that each of the first battery identifiers is the same as one of the second battery identifiers.
  • the location identifier of the first battery identifier and the location identifier of the second battery identifier also match, indicating that the location identifier of the target first battery identifier is the same as the location identifier of the target second battery identifier, wherein the target first The battery ID is the same as the target second battery ID, and the target first battery ID is any first battery ID.
  • the identification of the vehicle's battery and the installation position of the battery are authenticated, which can make the authentication result more accurate.
  • the vehicle authentication method may further include: Step 370, after the battery of the target vehicle is replaced, send the target license plate information and the updated battery identification of the target vehicle to the server.
  • the data sent to the server may also include the target vehicle identifier.
  • the updated battery identification may be the battery identification of the battery installed in the target vehicle after the battery is replaced at the battery exchange station.
  • the embodiment of this application also provides a vehicle authentication device corresponding to the vehicle authentication method. Since the problem-solving principle of the device in the embodiment of the application is similar to the aforementioned embodiment of the vehicle authentication method, in this embodiment For the implementation of the device, reference may be made to the description in the embodiments of the above method, and repeated descriptions will not be repeated.
  • FIG. 8 is a schematic diagram of functional modules of the vehicle authentication device provided by the embodiment of the present application.
  • Each module in the vehicle authentication device in this embodiment is used to execute each step in the above method embodiment.
  • the vehicle authentication device includes: a first acquisition module 410 , a determination module 420 , a second acquisition module 430 and an authentication module 440 ; the contents of each module can be as follows.
  • the first obtaining module 410 is used to obtain the image data of the target vehicle, including the target license plate information of the target vehicle in the image data;
  • a determining module 420 configured to determine a first set of authentication data according to the target license plate information
  • the second obtaining module 430 is used to obtain the second set of authentication data transmitted by the target vehicle;
  • the authentication module 440 is configured to compare the first set of authentication data with the second set of authentication data to determine the authentication result of the target vehicle.
  • the determining module 420 is configured to acquire the first set of authentication data associated with the target vehicle information transmitted by the server.
  • the vehicle authentication device may further include: a third acquisition module and a first storage module.
  • the third obtaining module is used to obtain the first updated authentication data set currently stored in the server from the server;
  • a first storage module configured to update locally stored historical authentication data to the first updated authentication data set
  • the determining module 420 is configured to obtain a first set of authentication data associated with the target license plate information from the first updated authentication data set.
  • the vehicle authentication device may further include: a fourth acquisition module and a second storage module.
  • the fourth obtaining module is used to obtain the first update authentication data set currently stored in the server from the server;
  • the second storage module is used to update the locally stored historical authentication data to the first updated authentication data set
  • the determining module 420 is configured to query the authentication data associated with the target license plate information in the first updated authentication data set; if no authentication data associated with the target license plate information is found in the first updated authentication data set, the Obtain the first set of authentication data associated with the target vehicle.
  • the second acquiring module 430 is configured to:
  • the second set of authentication data of the target vehicle is obtained through the communication.
  • the authentication module 440 includes: a first authentication unit and a second authentication unit.
  • the first authentication unit is configured to compare the first vehicle identifier in the first set of authentication data with the second vehicle identifier in the second set of authentication data to determine whether the first vehicle identifier and the second vehicle identifier are match;
  • the second authentication unit is configured to compare the first battery identifier in the first set of authentication data with the second battery identifier in the second set of authentication data to determine whether the first battery identifier and the second battery identifier are match;
  • the first set of authentication data includes multiple first battery identifiers
  • the second set of authentication data includes multiple second battery identifiers
  • the second authentication unit is configured to:
  • the first battery identification in the first set of authentication data and the position identification of the first battery identification are compared with the second battery identification and the position identification of the second battery identification in the second set of authentication data Comparing to determine whether the first battery identification matches the second battery identification;
  • the vehicle authentication device further includes:
  • the sending module is configured to send the target license plate information and the updated battery identification of the target vehicle to the server after the target vehicle is replaced with a battery.
  • an embodiment of the present application also provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is run by a processor, the steps of the vehicle authentication method described in the above-mentioned method embodiments are executed. .
  • the computer program product of the vehicle authentication method provided by the embodiment of the present application includes a computer-readable storage medium storing program codes, and the instructions included in the program code can be used to execute the steps of the vehicle authentication method described in the above method embodiments
  • the instructions included in the program code can be used to execute the steps of the vehicle authentication method described in the above method embodiments
  • each block in a flowchart or block diagram may represent a module, program segment, or part of code that includes one or more Executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented by a dedicated hardware-based system that performs the specified function or action , or may be implemented by a combination of dedicated hardware and computer instructions.
  • each functional module in each embodiment of the present application may be integrated to form an independent part, each module may exist independently, or two or more modules may be integrated to form an independent part.
  • the functions are implemented in the form of software function modules and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disc, etc., which can store program codes.
  • relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply that there is a relationship between these entities or operations. There is no such actual relationship or order between them.
  • the term “comprises”, “comprises” or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes elements not expressly listed. other elements of or also include elements inherent in such a process, method, article, or device. Without further limitations, an element defined by the statement "comprising" does not exclude the presence of additional same elements in the process, method, article or device comprising said element.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
  • Lock And Its Accessories (AREA)

Abstract

一种车辆认证方法、装置、控制设备和换电站。该方法包括:获取目标车辆的图像数据,该图像数据中包括该目标车辆的目标车牌信息;根据该目标车牌信息,确定出第一组认证数据;获取该目标车辆的第二组认证数据;将该第一组认证数据与该第二组认证数据进行对比,以确定出对该目标车辆的认证结果。该方法可以提高车辆认证的可靠性。

Description

车辆认证方法、装置、控制设备和换电站 技术领域
本申请涉及车辆认证技术领域,具体而言,涉及一种车辆认证方法、装置、控制设备和换电站。
背景技术
车辆成为生活中较为普遍的交通工具,伴随车牌的普及也越来越多与车辆相关的服务也产生了,例如,车辆检修、车辆清洗、车辆停放等。为了更好地为车辆提供服务,一般在对车辆进行其他处理之前需要先对车辆进行认证,但是目前车辆的认证相对简单,导致车辆认证的结果的可靠性存在不足。
发明内容
有鉴于此,本申请实施例的目的在于提供一种车辆认证方法、装置、控制设备和换电站,以改善车辆识别结果不准确的问题。
第一方面,本申请实施例提供了一种车辆认证方法,包括:获取目标车辆的图像数据,所述图像数据中包括所述目标车辆的目标车牌信息;根据所述目标车牌信息,确定出第一组认证数据;获取所述目标车辆的第二组认证数据;将所述第一组认证数据与所述第二组认证数据进行对比,以确定出对所述目标车辆的认证结果。
可选地,所述根据所述目标车牌信息,确定出第一组认证数据,包括:获取服务器传输的所述目标车牌信息关联的第一组认证数据。
可选地,所述方法还包括:
从服务器中获取所述服务器中当前存储的第一更新认证数据集;
将本地存储的历史认证数据更新为所述第一更新认证数据集;
所述根据所述目标车牌信息,确定出第一组认证数据,包括:
从所述第一更新认证数据集中,获取所述目标车牌信息关联的第一组认证数据。
可选地,所述方法还包括:
从服务器中获取所述服务器中当前存储的第一更新认证数据集;
将本地存储的历史认证数据更新为所述第一更新认证数据集;
所述根据所述目标车牌信息,确定出第一组认证数据,包括:
在所述第一更新认证数据集中查询所述目标车牌信息关联的认证数据;
若在所述第一更新认证数据集中未查询到与所述目标车牌信息关联的认证数据,从所述服务器中获取与所述目标车辆关联的第一组认证数据。
可选地,所述获取所述目标车辆的第二组认证数据,包括:
向所述目标车辆发起通信连接请求;
在接收到所述目标车辆的连接响应后,与所述目标车辆建立通信连接;
通过所述通信获取所述目标车辆的第二组认证数据。
可选地,所述将所述第一组认证数据与所述第二组认证数据进行对比,以确定出对所述目标车辆的认证结果,包括:
将所述第一组认证数据中的第一车辆标识与所述第二组认证数据中的第二车辆标识进行对比,以确定所述第一车辆标识与所述第二车辆标识是否匹配;
将所述第一组认证数据中的第一电池标识与所述第二组认证数据中的第二电池标识进行对比,以确定所述第一电池标识与所述第二电池标识是否匹配;
当所述第一车辆标识与所述第二车辆标识匹配,且所述第一电池标识与所述第二电池标识匹配,则确定所述目标车辆的认证结果为认证通过。
可选地,所述第一组认证数据中包括多项第一电池标识,所述第二组认证数据中包括多项第二电池标识;所述将所述第一组认证数据中的第一电池标识与所述第二组认证数据中的第二电池标识进行对比,以确定所述第一电池标识与所述第二电池标识是否匹配,包括:
将所述第一组认证数据中的各项第一电池标识和所述第一电池标识的位置标识,与所述第二组认证数据中的各项第二电池标识和所述第二电池标识的位置标识进行对比,以确定所述第一电池标识与所述第二电池标识是否匹配;
其中,各项所述第一电池标识与各项所述第二电池标识匹配,且所述第一电池标识的位置标识和所述第二电池标识的位置标识也匹配时,表征所述第一电池标识与所述第二电池标识匹配。
可选地,应用于换电站中的控制设备,所述方法还包括:
在所述目标车辆换电池后,向所述服务器发送所述目标车辆的目标车牌信息、目标车辆标识和更换电池后的电池标识。
第二方面,本申请实施例提供了一种车辆认证装置,包括:
第一获取模块,用于获取目标车辆的图像数据,所述图像数据中包括所述目标车辆的目标车牌信息;
确定模块,用于根据所述目标车牌信息,确定出第一组认证数据;
第二获取模块,用于获取所述目标车辆的第二组认证数据;
认证模块,用于将所述第一组认证数据与所述第二组认证数据进行对比,以确定出对所述目标车辆的认证结果。
第三方面,本申请实施例提供了一种控制设备,包括:处理器、存储器,所述存储器存储有所述处理器可执行的机器可读指令,当电子设备运行时,所述机器可读指令被所述处理器执行时执行上述的车辆认证方法的步骤。
第四方面,本申请实施例提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,该计算机程序被处理器运行时执行上述的车辆认证方法的步骤。
第五方面,本申请实施例提供了一种换电站,包括:输送系统、电池仓和上述的控制设备。
本申请实施例提供的车辆认证方法、装置、控制设备和换电站,采用车牌匹配出一组认证数据,然后再基于车辆传输的认证数据,相较于仅对车牌进行认证,其能够认证车辆的其他数据,可以降低因为假车牌等异常存在的认证不准确的情况。
为使本申请的上述目的、特征和优点能更明显易懂,下文特举实施例,并配合所附附图,作详细说明如下。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本申请的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。
图1为本申请实施例提供的车辆认证方法的运行环境示意图;
图2为本申请实施例提供的换电站的示意图;
图3为本申请实施例提供的车辆认证方法的流程图;
图4为本申请实施例提供的车辆认证方法的部分流程图;
图5为本申请实施例提供的车辆认证方法的另一部分流程图;
图6为本申请实施例提供的车辆认证方法的步骤350的详细流程图;
图7为本申请实施例提供的车辆认证方法的步骤370的详细流程图;
图8为本申请实施例提供的车辆认证装置的功能模块示意图。
具体实施方式
需要下面将结合本申请实施例中附图,对本申请实施例中的技术方案进行描述。
应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。同时,在本申请的描述中,术语“第一”、“第二”等仅用于区分描述,而不能理解为指示或暗示相对重要性。
随着对环境保护的重视,更加环保的新能源电动车也得到了较为快速的发展。然而电动车充电速度较慢,如果在用车过程中,电动车电量不足,驾驶员需要等待较长时间,这无疑会影响驾驶员的使用体验。
基于此现状,现出现了一种新的技术,可以直接将电动车上的电池更换为满电电池,而更换电池所需时间远小于为电池充满电所需时间。
经发明人研究了解到,不同的车型的尺寸不一样、所需的电池不一样、容纳电池的位置也不一样,因此,不同的车型换电池的动作存在不同。为了使换电池能够更加准确,在换电池之前,需要获知车辆的基本信息,例如,车辆型号。在一些可选的操作方式中,可以通过识别车辆的车牌号,以确定车辆,进而能够更准确的换电池。
本申请发明人进一步深入研究了解到,可能会存在一些车辆的车牌号与车辆不匹配,例如,车牌号存在假牌的情况。因此,车牌认证通过,认证通过的车牌也不能完全表示车辆。
基于此,本申请提供的一种车辆认证方法,可以对车牌以外的其他数据进行认证,以提高认证结果的可靠性。下面通过几个实施例来描述本申请提供的车辆认证方法。
为便于对本实施例进行理解,首先对执行本申请实施例所公开的一种车辆认证方法的运行环境进行介绍。
如图1所示,是本申请实施例提供的车辆认证方法的运行环境示意图。该车辆认证方法的运行环境中可以包括服务器200和换电站100。该服务器200通过网络与一个或多个换电站进行通信连接,以进行数据通信或交互。该服务器可以是网络服务器、数据库服务器等。
该换电站100用于为电动车辆更换电池。
如图2所示,该换电站100中可以包括:输送系统110、电池仓120以及控制设备130。
该输送系统110用于运输从电动车辆换下来的电池,也可以用于运输从电池仓120中拿取的电池。
示例性地,该输送系统110可以包括:输送工具、输送轨道和可编程逻辑控制器(Programmable Logic Controller,简称:PLC)。输送工具可以在该输送轨道上行驶,以移动需要处理的电池。
该输送工具可以由上述的可编程逻辑控制器控制,该输送工具根据该可编程逻辑控制器的控制指令移动。该可编程逻辑控制器可以基于控制设备130提供的数据控制输送工具。
该换电站100可以通过控制设备130与服务器200实现通信。该控制设备130还可以与待换电池的电动车辆建立通信连接,以获取该待换电池的电动车辆传输的数据。
本实施例中,该控制设备130可以包括存储器和处理器。
上述的存储器和处理器各元件相互之间直接或间接地电性连接,以实现数据的传输或交互。例如,这些元件相互之间可通过一条或多条通讯总线或信号线实现电性连接。上述的处理器用于执行存储器中存储的可执行模块。
其中,存储器可以是,但不限于,随机存取存储器(Random Access Memory,简称RAM),只读存储器(Read Only Memory,简称ROM),可编程只读存储器(Programmable Read-Only Memory,简称PROM),可擦除只读存储器(Erasable Programmable Read-Only Memory,简称EPROM),电可擦除只读存储器(Electric Erasable Programmable Read-Only Memory,简称EEPROM)等。其中,存储器用于存储计算机程序,该处理器在接收到执行指令后,执行所述程序,本申请实施例任一实施例揭示的过程定义的控制设备130所执行的方法可以应用于处理器中,或者由处理器实现。
上述的处理器可能是一种集成电路芯片,具有信号的处理能力。上述的处理器可以是 通用处理器,包括中央处理器(Central Processing Unit,简称CPU)、网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(digital signal processor,简称DSP)、专用集成电路(Application Specific Integrated Circuit,简称ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
本领域普通技术人员可以理解,本申请实施例上述对控制设备所包含的组件的举例不应该对该控制设备130的结构造成限定。例如,控制设备130还可包括更多或者更少的组件,或者不同的配置。
例如,该控制设备130还可以包括显示单元,该显示单元在控制设备130与用户之间提供一个交互界面(例如用户操作界面)或用于显示图像数据给用户参考。在本实施例中,该显示单元可以是液晶显示器或触控显示器。若为触控显示器,其可为支持单点和多点触控操作的电容式触控屏或电阻式触控屏等。支持单点和多点触控操作是指触控显示器能感应到来自该触控显示器上一个或多个位置处同时产生的触控操作,并将该感应到的触控操作交由处理器进行计算和处理。
可以再次参阅图2所示,该换电站100中还可以包括一个或多个停车位140(图中仅示出了一个),该停车位140设置在电池仓120的相邻位置。
该停车位140用于停放需要换电池的车辆。
本实施例中的控制设备130可以用于执行本申请实施例提供的各个方法中的各个步骤。下面通过几个实施例详细描述车辆认证方法的实现过程。
请参阅图3,是本申请实施例提供的车辆认证方法的流程图。下面将对图3所示的具体流程进行详细阐述。
步骤310,获取目标车辆的图像数据。
该图像数据中包括该目标车辆的目标车牌信息。
为了提高车辆处理的安全性,在对车辆进行配件更换或者车辆经过关键路口,可以先对车辆进行认证。该关键路口可以是高速路口、高速路收费站、车库路口等。
示例性地,用于采集目标车辆的图像数据的采集设备可以设置在配件更换站的站门口,或者关键路口的两侧。例如,该配件更换站可以是换电站、汽修站、车辆清洗站等。
可选地,可以从该图像数据中提取该目标车辆的目标车牌信息。
示例性地,可以通过图像识别技术,识别出图像数据中的目标车牌信息。
为了使识别结果更加准确,可以先识别出该图像数据中的车体,然后再识别车体上的车牌。
可选地,从该图像数据中提取该目标车辆的目标车牌信息可以包括:通过对目标车辆的图像数据进行边缘检测,以确定出目标车辆的轮廓;基于该目标车辆的轮廓剪裁出目标车辆图 像;提取该目标车辆图像中包含的字符串;基于该字符串确定出目标车辆的目标车牌信息。
示例性地,若目标车辆图像中包含多串字符串时,可以根据车牌规则确定出符合规则的字符串。在一个实例中,若该车辆的命名规则是地名加车号,则该车辆的车牌的首个字符为任意一个省份的简称,或者,该车辆的车牌的前几个字符为地名的简写,则可以从多串字符串中筛选出首字符为地名的字符串。在另一个实例中,若该车辆的命名规则是用途加车号,则车辆的车牌的首个字符为表示用途的字符,则从多串字符串中筛选出首字符为用途的字符串。当然,车辆的车牌的命名规则还可以是其他的规则,可以根据具体车牌的命名规则确定出筛选字符串的规则,本申请此处不做限定。
可选地,从该图像数据中提取该目标车辆的车牌信息也可以包括:通过对目标车辆的图像数据进行关键点检测,以确定出目标区域图像;在该目标区域图像提取该目标车辆图像中包含的字符串;基于该字符串确定出目标车辆的目标车牌信息。
上述的关键点可以是车灯上的点、车头上的点、车顶上的点等。通过该关键点确定出的目标区域图像可以是包含车牌图的车辆的头部图像,然后识别该头部图像中所包含的字符串,基于该字符串确定出目标车辆的目标车牌信息。
步骤330,根据该图像数据中的目标车牌信息,确定出第一组认证数据。
在一些实现方式中,在对一辆车辆进行认证之前,可以先通过车辆上的车载设备,或者其他用户终端对该车辆进行注册。示例性地,注册后可以存储车辆信息。该车辆信息可以包括:车牌、车辆型号、车辆标识、电池标识等。
上述第一组认证数据可以包括:车辆型号、车辆标识、电池标识等参数中一种或多种参数。
在一个实例中,若车辆认证方法应用于换电站中的控制设备,该目标车辆中的电池可能与注册时的电池不同。在该实例中,该第一组认证数据中包括电池标识时,则该第一组认证数据中的电池标识可以是该目标车辆当前安装的电池的电池标识。当然,在此实例中,该第一组认证数据中还可以包括:车辆型号和/或车辆标识。
在另一个实例中,若车辆认证方法应用于汽修站或高速路收费站中的控制设备,该第一组认证数据可以包括:车辆型号或/及车辆标识。
本实施例中,可以预先存储已经注册的所有车辆的数据。可以以目标车牌信息为筛选条件,在已经注册的所有车辆的数据中筛选出第一组认证数据。
步骤350,获取该目标车辆的第二组认证数据。
其中,第二组认证数据中所包含的参数数量以及参数种类可以与第一组认证数据中包含的参数数量以及参数种类相同。该第二组认证数据中所包含的参数数量以及参数种类也可以与第一组认证数据中包含的参数数量以及参数种类更多。例如,该第一组认证数据包括电池标识码和车辆标识时,则该第二组认证数据也至少包括电池标识码和车辆标识。
可选地,可以通过与目标车辆建立通信,以获得该目标车辆传输的第二组认证数据。
该目标车辆可以与控制设备建立近距离通信连接,例如,该近距离通信连接可以是蓝牙连接、Wi-Fi连接、近场通信(Near Field Communication,简称NFC)等。
步骤370,将该第一组认证数据与该第二组认证数据进行对比,以确定出对该目标车辆的认证结果。
示例性地,若第一组认证数据中所包含的参数数量与第二组认证数据中所包含的参数数量相同。则可以将第一组认证数据中的每一项参数,与第二组认证数据中对应的每一项参数进行对比,以确定出每一项参数是否相同。如果每一项参数都相同,则认证结果为认证通过;若任意一项参数不同,则认证结果为认证未通过。
示例性地,若第一组认证数据中所包含的参数数量比第二组认证数据中所包含的参数数量更多。则可以将第二组认证数据中的每一项参数,与第一组认证数据中对应的参数进行对比,以确定出第二组认证数据中的每一项参数是否与第一组认证数据中的任一参数相同。如果第二组认证数据中的每一项参数都能够在第一组认证数据中找到相同的参数,则认证结果为认证通过;若第二组认证数据中的任意一项参数不能够在第一组认证数据中找到相同的参数,则认证结果为认证未通过。
示例性地,若第二组认证数据中所包含的参数数量比第一组认证数据中所包含的参数数量更多。则可以将第一组认证数据中的每一项参数,与第二组认证数据中对应的参数进行对比,以确定出第一组认证数据中的每一项参数是否与第二组认证数据中的任一参数相同。如果第一组认证数据中的每一项参数都能够在第二组认证数据中找到相同的参数,则认证结果为认证通过;若第一组认证数据中的任意一项参数不能够在第二组认证数据中找到相同的参数,则认证结果为认证未通过。
基于上述步骤对车辆进行认证,可以实现车辆的认证不仅仅是在车牌上的认证,还可以对车辆上的其他数据进行认证,可以提高车辆认证结果的可靠性,也为后续对车辆的处理提供基础,提高车辆的处理的有效性。
考虑一般车辆的注册行为不会直接与控制设备交互实现,通常注册后的车辆的数据没有直接存储在控制设备中,因此,步骤330可以包括:获取该服务器传输的该目标车辆信息关联的第一组认证数据。
可选地,在从服务器中获取第一组认证数据之前,可以先对目标车辆的目标车牌信息进行认证,以确定该目标车牌信息是否为曾经注册过的车牌。若该目标车牌信息是已经被注册过的车牌信息,且当前有效的车牌信息,则对该目标车牌信息的认证通过。
示例性地,可以通过从存储的注册数据中查找,确定该注册数据中所包含的车牌信息是否存在该目标车牌信息,如果该注册数据中的车牌信息中存在目标车牌信息,则对该目标车牌信息的认证通过。
可选地,对该目标车牌信息的认证可以是在控制设备中进行,也可以在服务器中进行。
通过上述实现方式,可以实现车辆认证的可靠性的同时,还能够降低控制设备中数据处理需求。
考虑控制设备偶尔可能存在没有网络的情况,如果每次车辆认证都必须与服务器进行通信,则可能会导致车辆认证时需要驾驶员或用户等待较长时间,还可能会导致车辆认证失败,基于此研究,可以通过以下方式对确定出第一组认证数据。如图4所示,在步骤330之前,车辆认证方法还包括:步骤321和步骤322。
步骤321,从服务器中获取该服务器中当前存储的第一更新认证数据集。
可选地,可以按照第一时间规律从服务器中获取该服务器中当前存储的第一更新认证数据集。
该第一时间规律可以是每隔指定时间间隔。示例性地,可以每隔指定时间间隔从服务器中获取该服务器中当前存储的第一更新认证数据集。该指定时间间隔可以是间隔一天、间隔两天等。其中,该第一更新认证数据集中可以包含目前已经注册的所有车辆的认证数据。
可能一直会存在新的车辆注册的情况,因此可以定时从服务器中获得认证数据集,以确定控制设备中本地存储的认证数据集是最新数据,以提高车辆认证的准确性。
步骤322,将本地存储的历史认证数据更新为所述第一更新认证数据集。
在一可选的实现方式中,可以再次参阅图4,步骤330可以包括步骤331,从该第一更新认证数据集中,获取该目标车牌信息关联的第一组认证数据。
示例性地,可以以目标车牌信息为筛选条件,从该第一更新认证数据集中筛选出第一组认证数据。
通过上述实现方式,可以在控制设备无网络的情况也能够实现对车辆的认证,能够提高车辆认证的适用性,降低用户等待认证车辆的时长,提高用户体验。
控制设备中的本地数据可能存在更新不及时的情况,如果仅在本地数据中没有查询到第一组认证数据就给予认证失败的结果可能会存在结果错误,因此,如图5所示,在步骤330之前,车辆认证方法还包括:步骤323和步骤324。
步骤323,从服务器中获取该服务器中当前存储的第一更新认证数据集。
步骤324,将本地存储的历史认证数据更新为所述第一更新认证数据集。
步骤323和步骤324与步骤321和步骤322的实现方式类似,关于步骤323和步骤324的其它细节可以参与步骤321和步骤322中的描述,在此不再赘述。
在一可选的实现方式中,可再次参阅图5所示,步骤330可以包括:步骤332和步骤333。
步骤332,在该第一更新认证数据集中查询该目标车牌信息关联的认证数据。
若在该第一更新认证数据集中未查询到与该目标车牌信息关联的认证数据,执行步骤333。
步骤333,从该服务器中获取与该目标车辆关联的第一组认证数据。
通过上述步骤可以实现,优先从本地中获取第一组认证数据,降低与服务器中交互的次数,只有在本地数据中不能够找到目标车牌信息的认证数据的情况下,再与服务器进行通信,获取第一组认证数据,从而可以降低给出错误认证结果的情况,进一步保证认证结果的准确度。
考虑并非所有车辆上的设备都具有网络,为了提高与目标车辆的通信成功率,可以通过通信实现数据的传输。因此,如图6所示,步骤350可以包括:步骤351至步骤353。
步骤351,向该目标车辆发起通信连接请求。
可选地,该通信连接请求可以是近距离通信连接请求。该通信连接请求也可以是其他通信连接的请求,具体可以根据实际场景的需求向目标车辆发送该目标车辆能够实现的通信连接请求。例如,该通信连接请求也可以是网络通信连接请求等。
可选地,控制设备向目标车辆发起通信连接请求的时机可以在车辆进入采集目标车辆的图像数据的采集设备的采集范围内时。
可选地,控制设备向目标车辆发起通信连接请求的时机也可以在确认目标车牌信息认证通过之后。
步骤352,在接收到该目标车辆的连接响应后,与该目标车辆建立通信连接。
可选地,目标车辆可以通过其拥有的车载设备与控制设备建立近距离通信。
步骤353,通过该通信获取该目标车辆的第二组认证数据。
通过上述通信获取目标车辆的第二组认证数据,例如,通过近距离通信的方式获得目标车的第二组认证数据,可以降低对目标车辆的要求,更方便地实现对车辆的认证。
在一个可选的实施方式中,第一组认证数据中包括第一车辆标识和第一电池标识,第二组认证数据中可以包括第二车辆表情和第二电池标识。如图7所示,步骤370可以包括:步骤371和步骤372。
步骤371,将该第一组认证数据中的第一车辆标识与该第二组认证数据中的第二车辆标识进行对比,以确定该第一车辆标识与该第二车辆标识是否匹配。
步骤372,将该第一组认证数据中的第一电池标识与该第二组认证数据中的第二电池标识进行对比,以确定该第一电池标识与该第二电池标识是否匹配。
当该第一车辆标识与该第二车辆标识匹配,且该第一电池标识与该第二电池标识匹配,则确定该目标车辆的认证结果为认证通过。
示例性地,当该第一车辆标识与该第二车辆标识相同时,在可以表示该第一车辆标识与该第二车辆标识匹配。
示例性地,当第一组认证数据中包括一项电池标识,第二组认证数据也包括一项电池标识时,当第一组认证数据的第一电池标识与第二组认证数据的第二电池标识匹配,则第一电池标识与第二电池标识匹配。
示例性地,当第一组认证数据中包括多项电池标识,第二组认证数据也包括多项电池标识时,第一组认证数据中的每一项电池标识与第二组认证数据中的其中一项电池标识都相同。
通过对车辆标识的认证和电池标识的认证多种数据的认证,可以更好地对车辆的认证,也可以使车辆的认证结果更加准确。
如果目标车辆上包括多块电池时,电池的安装位置也是被唯一确定的,为了更好地确定目标车辆的状态与前一次安装电池时的状态相同,则还可以对安装的电池的位置进行认证。基于此需求,该第一组认证数据中包括多项第一电池标识,该第二组认证数据中包括多项第二电池标识,步骤372可以包括:将该第一组认证数据中的各项第一电池标识和该第一电池标识的位置标识,与该第二组认证数据中的各项第二电池标识和该第二电池标识的位置标识进行对比,以确定该第一电池标识与该第二电池标识是否匹配。
其中,各项该第一电池标识与各项该第二电池标识匹配,且该第一电池标识的位置标识和该第二电池标识的位置标识也匹配时,表征该第一电池标识与该第二电池标识匹配。
示例性地,各项该第一电池标识与各项该第二电池标识匹配,表示每一个第一电池标识都与其中一个第二电池标识相同。
示例性地,该第一电池标识的位置标识和该第二电池标识的位置标识也匹配,表示目标第一电池标识的位置标识与目标第二电池标识的位置标识相同,其中,该目标第一电池标识与目标第二电池标识相同,该目标第一电池标识为任意一个第一电池标识。
对车辆的电池标识以及电池的安装位置均进行认证,可以使认证结果更加的准确。
考虑车辆上的数据可能在随着车辆的使用会发生变化,例如,车辆认证方法应用于换电站中的控制设备,因此,车辆上的电池可能被替换。为了提高车辆认证的准确率,车辆认证方法还可以包括:步骤370,在该目标车辆换电池后,向服务器发送所述目标车辆的目标车牌信息和更新后的电池标识。
可选地,在目标车辆更换电池后,向服务器发送的数据还可以包括目标车辆标识。
更新后的电池标识可以是目标车辆在换电站换电池后安装的电池的电池标识。
通过及时对服务器中的数据进行更新,以降低因为错误的数据导致车辆认证错误的情况,从而可以提高车辆认证的成功率。
基于同一申请构思,本申请实施例中还提供了与车辆认证方法对应的车辆认证装置,由于本申请实施例中的装置解决问题的原理与前述的车辆认证方法实施例相似,因此本实施例中的装置的实施可以参见上述方法的实施例中的描述,重复之处不再赘述。
请参阅图8,是本申请实施例提供的车辆认证装置的功能模块示意图。本实施例中的车辆认证装置中的各个模块用于执行上述方法实施例中的各个步骤。车辆认证装置包括:第一获取模块410、确定模块420、第二获取模块430以及认证模块440;其中各个模块的内容可以如下所示。
第一获取模块410,用于获取目标车辆的图像数据,该图像数据中包括该目标车辆的目标车牌信息;
确定模块420,用于根据该目标车牌信息,确定出第一组认证数据;
第二获取模块430,用于获取该目标车辆传输的第二组认证数据;
认证模块440,用于将该第一组认证数据与该第二组认证数据进行对比,以确定出对该目标车辆的认证结果。
一种可能的实施方式中,确定模块420,用于获取服务器传输的该目标车辆信息关联的第一组认证数据。
一种可能的实施方式中,车辆认证装置还可以包括:第三获取模块和第一存储模块。
第三获取模块,用于从服务器中获取该服务器中当前存储的第一更新认证数据集;
第一存储模块,用于将本地存储的历史认证数据更新为所述第一更新认证数据集;
确定模块420,用于从该第一更新认证数据集中,获取该目标车牌信息关联的第一组认证数据。
一种可能的实施方式中,车辆认证装置还可以包括:第四获取模块和第二存储模块。
第四获取模块,用于从服务器中获取该服务器中当前存储的第一更新认证数据集;
第二存储模块,用于将本地存储的历史认证数据更新为该第一更新认证数据集;
确定模块420,用于在该第一更新认证数据集中查询该目标车牌信息关联的认证数据;若在该第一更新认证数据集中未查询到与该目标车牌信息关联的认证数据,从该服务器中获取与该目标车辆关联的第一组认证数据。
一种可能的实施方式中,第二获取模块430,用于:
向该目标车辆发起通信连接请求;
在接收到该目标车辆的连接响应后,与该目标车辆建立通信连接;
通过该通信获取该目标车辆的第二组认证数据。
一种可能的实施方式中,认证模块440,包括:第一认证单元和第二认证单元。
第一认证单元,用于将该第一组认证数据中的第一车辆标识与该第二组认证数据中的第二车辆标识进行对比,以确定该第一车辆标识与该第二车辆标识是否匹配;
第二认证单元,用于将该第一组认证数据中的第一电池标识与该第二组认证数据中的第二电池标识进行对比,以确定该第一电池标识与该第二电池标识是否匹配;
当该第一车辆标识与该第二车辆标识匹配,且该第一电池标识与该第二电池标识匹配,则确定该目标车辆的认证结果为认证通过。
一种可能的实施方式中,该第一组认证数据中包括多项第一电池标识,该第二组认证数据中包括多项第二电池标识;第二认证单元,用于:
将该第一组认证数据中的各项第一电池标识和该第一电池标识的位置标识,与该第二组认证数据中的各项第二电池标识和该第二电池标识的位置标识进行对比,以确定该第一电池标识与该第二电池标识是否匹配;
其中,各项该第一电池标识与各项该第二电池标识相同,且该第一电池标识的位置标 识和该第二电池标识的位置标识也相同时,表征该第一电池标识与该第二电池标识匹配。
一种可能的实施方式中,应用于换电站中的控制设备,车辆认证装置还包括:
发送模块,用于在该目标车辆换电池后,向服务器发送所述目标车辆的目标车牌信息和更新后的电池标识。
此外,本申请实施例还提供一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,该计算机程序被处理器运行时执行上述方法实施例中所述的车辆认证方法的步骤。
本申请实施例所提供的车辆认证方法的计算机程序产品,包括存储了程序代码的计算机可读存储介质,所述程序代码包括的指令可用于执行上述方法实施例中所述的车辆认证方法的步骤,具体可参见上述方法实施例,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,也可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,附图中的流程图和框图显示了根据本申请的多个实施例的装置、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现方式中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
另外,在本申请各个实施例中的各功能模块可以集成在一起形成一个独立的部分,也可以是各个模块单独存在,也可以两个或两个以上模块集成形成一个独立的部分。
所述功能如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括……”限定的要素,并 不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上所述仅为本申请的优选实施例而已,并不用于限制本申请,对于本领域的技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (12)

  1. 一种车辆认证方法,其特征在于,包括:
    获取目标车辆的图像数据,所述图像数据中包括所述目标车辆的目标车牌信息;
    根据所述目标车牌信息,确定出第一组认证数据;
    获取所述目标车辆的第二组认证数据;
    将所述第一组认证数据与所述第二组认证数据进行对比,以确定出对所述目标车辆的认证结果。
  2. 根据权利要求1所述的方法,其特征在于,所述根据所述目标车牌信息,确定出第一组认证数据,包括:
    获取所述服务器传输的所述目标车辆信息关联的第一组认证数据。
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    从服务器中获取所述服务器中当前存储的第一更新认证数据集;
    将本地存储的历史认证数据更新为所述第一更新认证数据集;
    所述根据所述目标车牌信息,确定出第一组认证数据,包括:
    从所述第一更新认证数据集中,获取所述目标车牌信息关联的第一组认证数据。
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    从服务器中获取所述服务器中当前存储的第一更新认证数据集;
    将本地存储的历史认证数据更新为所述第一更新认证数据;
    所述根据所述目标车牌信息,确定出第一组认证数据,包括:
    在所述第一更新认证数据集中查询所述目标车牌信息关联的认证数据;
    若在所述第一更新认证数据集中未查询到与所述目标车牌信息关联的认证数据,与服务器建立通信,从所述服务器中获取与所述目标车辆关联的第一组认证数据。
  5. 根据权利要求1所述的方法,其特征在于,所述获取所述目标车辆的第二组认证数据,包括:
    向所述目标车辆发起通信连接请求;
    与所述目标车辆建立通信连接;
    通过所述通信获取所述目标车辆的第二组认证数据。
  6. 根据权利要求1所述的方法,其特征在于,所述将所述第一组认证数据与所述第二组认证数据进行对比,以确定出对所述目标车辆的认证结果,包括:
    将所述第一组认证数据中的第一车辆标识与所述第二组认证数据中的第二车辆标识进行对比,以确定所述第一车辆标识与所述第二车辆标识是否匹配;
    将所述第一组认证数据中的第一电池标识与所述第二组认证数据中的第二电池标识进行对比,以确定所述第一电池标识与所述第二电池标识是否匹配;
    当所述第一车辆标识与所述第二车辆标识匹配,且所述第一电池标识与所述第二电池标识匹配,则确定所述目标车辆的认证结果为认证通过。
  7. 根据权利要求6所述的方法,其特征在于,所述第一组认证数据中包括多项第一电池标识,所述第二组认证数据中包括多项第二电池标识;所述将所述第一组认证数据中的第一电池标识与所述第二组认证数据中的第二电池标识进行对比,以确定所述第一电池标识与所述第二电池标识是否匹配,包括:
    将所述第一组认证数据中的各项第一电池标识和所述第一电池标识的位置标识,与所述第二组认证数据中的各项第二电池标识和所述第二电池标识的位置标识进行对比,以确定所述第一电池标识与所述第二电池标识是否匹配;
    其中,各项所述第一电池标识与各项所述第二电池标识匹配,且所述第一电池标识的位置标识和所述第二电池标识的位置标识也匹配时,表征所述第一电池标识与所述第二电池标识匹配。
  8. 根据权利要求1-7任意一项所述的方法,其特征在于,应用于换电站中的控制设备,所述方法还包括:
    在所述目标车辆在所述换电站更换电池后,向服务器发送所述目标车辆的目标车牌信息、目标车辆标识和更换电池后的电池标识。
  9. 一种车辆认证装置,其特征在于,包括:
    第一获取模块,用于获取目标车辆的图像数据,所述图像数据中包括所述目标车辆的目标车牌信息;
    确定模块,用于根据所述目标车牌信息,确定出第一组认证数据;
    第二获取模块,用于获取所述目标车辆的第二组认证数据;
    认证模块,用于将所述第一组认证数据与所述第二组认证数据进行对比,以确定出对所述目标车辆的认证结果。
  10. 一种控制设备,其特征在于,包括:处理器、存储器,所述存储器存储有所述处理器可执行的机器可读指令,当电子设备运行时,所述机器可读指令被所述处理器执行时执行如权利要求1至8任一所述的方法的步骤。
  11. 一种计算机可读存储介质,其特征在于,该计算机可读存储介质上存储有计算机程序,该计算机程序被处理器运行时执行如权利要求1至8任一所述的方法的步骤。
  12. 一种换电站,其特征在于,包括:输送系统、电池仓和权利要求10所述的控制设备。
PCT/CN2022/078691 2022-03-01 2022-03-01 车辆认证方法、装置、控制设备和换电站 WO2023164818A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280037015.8A CN117413303A (zh) 2022-03-01 2022-03-01 车辆认证方法、装置、控制设备和换电站
PCT/CN2022/078691 WO2023164818A1 (zh) 2022-03-01 2022-03-01 车辆认证方法、装置、控制设备和换电站

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/078691 WO2023164818A1 (zh) 2022-03-01 2022-03-01 车辆认证方法、装置、控制设备和换电站

Publications (1)

Publication Number Publication Date
WO2023164818A1 true WO2023164818A1 (zh) 2023-09-07

Family

ID=87882730

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/078691 WO2023164818A1 (zh) 2022-03-01 2022-03-01 车辆认证方法、装置、控制设备和换电站

Country Status (2)

Country Link
CN (1) CN117413303A (zh)
WO (1) WO2023164818A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013125522A (ja) * 2011-12-16 2013-06-24 Nec Corp 認証システムおよび認証方法
US20140317729A1 (en) * 2012-02-20 2014-10-23 Denso Corporation Data communication authentication system for vehicle gateway apparatus for vehicle data communication system for vehicle and data communication apparatus for vehicle
CN105448101A (zh) * 2015-12-17 2016-03-30 艾伯资讯(深圳)有限公司 一种对车辆和驾驶人员进行认证的方法和系统
CN108718309A (zh) * 2018-05-11 2018-10-30 中国联合网络通信集团有限公司 车辆身份的认证方法及装置
JP2021012537A (ja) * 2019-07-05 2021-02-04 三菱自動車工業株式会社 車両管理システム
CN114090633A (zh) * 2021-11-18 2022-02-25 深圳市科漫达智能管理科技有限公司 车辆鉴权管理方法、装置、停车场设备及可读存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013125522A (ja) * 2011-12-16 2013-06-24 Nec Corp 認証システムおよび認証方法
US20140317729A1 (en) * 2012-02-20 2014-10-23 Denso Corporation Data communication authentication system for vehicle gateway apparatus for vehicle data communication system for vehicle and data communication apparatus for vehicle
CN105448101A (zh) * 2015-12-17 2016-03-30 艾伯资讯(深圳)有限公司 一种对车辆和驾驶人员进行认证的方法和系统
CN108718309A (zh) * 2018-05-11 2018-10-30 中国联合网络通信集团有限公司 车辆身份的认证方法及装置
JP2021012537A (ja) * 2019-07-05 2021-02-04 三菱自動車工業株式会社 車両管理システム
CN114090633A (zh) * 2021-11-18 2022-02-25 深圳市科漫达智能管理科技有限公司 车辆鉴权管理方法、装置、停车场设备及可读存储介质

Also Published As

Publication number Publication date
CN117413303A (zh) 2024-01-16

Similar Documents

Publication Publication Date Title
CN107481548B (zh) 停车管理方法及系统
JP7128813B2 (ja) 車両の安全を保証するシステム及び方法
US20170132935A1 (en) Vehicle managing method based on v2x and system thereof
US11180154B2 (en) Fingerprinting drivers based on vehicle turns
CN109785611B (zh) 无人驾驶车辆控制方法、装置、服务器及存储介质
CN111707477B (zh) 一种车辆检测方法、设备及系统
CN110667431B (zh) 电动车辆的支援系统
CN106683209B (zh) 一种电子不停车收费方法、装置及系统
CN111091210A (zh) 一种乘车确认方法、发单设备、接单设备及服务器
CN106911753A (zh) 一种云端车载诊断obd系统
JP5418677B2 (ja) 制御装置
CN102054357A (zh) 一种基于无线射频识别的车辆监控系统及方法
US11695766B2 (en) Apparatus and server for sharing position information of vehicle
US10996255B2 (en) Voltage-characteristic-based vehicle identification number
CN111798622A (zh) 在车队系统中提供移动物体共享服务的方法及设备
US10710554B2 (en) Telematics device and method for taking out vehicle insurance and estimating insurance fees
WO2023164818A1 (zh) 车辆认证方法、装置、控制设备和换电站
CN117235704A (zh) 一种车辆身份认证方法、装置、设备和存储介质
CN111770127A (zh) 车辆控制系统
CN111612184A (zh) 行驶支援装置、车辆、行驶管理装置、终端装置和行驶支援方法
US20190221051A1 (en) Electronic apparatus, method and server and method
WO2018195697A1 (zh) 一种停取车管理方法及装置
WO2023168599A1 (zh) 电池更换方法、装置、控制设备和换电站
EP3715787A1 (en) Vehicle optimization system and vehicle optimization device
Babiyola et al. Development of an Internet of Things-based Integrated System for Fleet Management in RealTime

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22929269

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 202280037015.8

Country of ref document: CN