Rule and regulation pre-violation warning system in vehicle sharing process and vehicle sharing method based on rule and regulation pre-violation warning system in vehicle sharing process
An alarm system and vehicle technology, applied in the field of vehicle sharing, can solve the problems of poor real-time performance and low efficiency, and achieve the effects of convenient sharing, solving hysteresis and saving resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0019] Embodiment 1: A pre-violation alarm system in the process of vehicle sharing, including a vehicle-mounted controller and a client, wherein the vehicle-mounted controller includes a central processing unit, an OBD interface module, an indicator light module, a communication module, a GPS module, and a power management module, the communication module is connected to the central processing unit for two-way communication, the central processing unit is connected to the OBD interface module for two-way communication, the output end of the central processing unit is connected to the input end of the indicator light module, and the power management module Electrically connect the central processing unit, the OBD interface module, the indicator light module, the communication module and the GPS module respectively. The vehicle-mounted controller has a built-in Internet GPS navigation map, and the central processing unit recognizes the speed limit sign and / or the overspeed warni...
Embodiment 2
[0024] Embodiment 2: A vehicle sharing method based on a pre-violation alarm system in the vehicle sharing process, including
[0025] S1. The car sharer sets the rental parameters;
[0026] S2. Authenticate the identity of the vehicle user, and the authenticated vehicle user screens the vehicle based on vehicle information and rental parameters;
[0027] S3. The vehicle user searches for the vehicle based on the vehicle location;
[0028] S4. Before the vehicle is used, the vehicle sharer authorizes the vehicle user to have a vehicle inspection time, and the vehicle user will inspect the vehicle. During the vehicle inspection, the vehicle sharer will push the vehicle appearance and / or interior damage data to the vehicle user through the platform If the vehicle user finds damage to other vehicles, the vehicle user will use the client to take pictures of the damage and upload it to the cloud platform. The vehicle sharer will review the condition of the vehicle based on the upl...
Embodiment 3
[0032] Embodiment 3: the method for identity authentication shown in Embodiment 2, including
[0033] The first step is that the applicant downloads and installs the App client, and uses the App client to upload ID card, driver’s license and other ID photos to ensure that the uploaded ID photos can be clearly identified, and the platform receives the photos uploaded by the applicant;
[0034] In the second step, the applicant uses the App client to connect to the platform's remote authentication video to ensure that the platform staff can smoothly obtain the applicant's authentication video image;
[0035] Step 3: After communicating with the applicant, the management staff of the platform will preliminarily judge whether the applicant meets the certification requirements. If the video image or voice transmission is not smooth, or the video image is difficult to recognize, the certification will be terminated; the voice transmission is not smooth. The standard is: the voice of t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More