Remote personal identity verification method in vehicle sharing process and vehicle sharing method based on remote personal identity verification method
A vehicle and remote technology, applied in the field of vehicle sharing, to achieve the effect of short authorization time, convenient sharing and resource saving
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0020] Embodiment 1: A remote personal identity verification method in the process of vehicle sharing, including
[0021] Step 1: The applicant downloads and installs the APP client, and uses the APP client to upload ID card, driver’s license and other ID photos to ensure that the uploaded ID photos can be clearly identified, and the platform receives the photos uploaded by the applicant;
[0022] In the second step, the applicant uses the APP client to connect to the remote authentication video of the platform to ensure that the platform staff can smoothly obtain the applicant's authentication video image;
[0023] Step 3: After communicating with the applicant, the management staff of the platform will preliminarily judge whether the applicant meets the certification requirements. If the video image or voice transmission is not smooth, or the video image is difficult to recognize, the certification will be terminated; the voice transmission is not smooth. The standard is: th...
Embodiment 2
[0027] Embodiment 2: As a supplement to the preferred steps, in order to further increase the accuracy of the audit, the method also includes:
[0028] Step 6: After completing the video review, the platform staff will review the ID card, driver's license and other documents uploaded by the applicant in combination with the national citizen identity information database and the national traffic management database of the public security department. If the certificate is consistent with the query results of the National Citizenship Information Database and the National Traffic Management Database, the certificate uploaded by the applicant is deemed authentic and the authentication has passed; If the result of the query is inconsistent with the national traffic management database, it is determined that the certificate uploaded by the applicant is a forgery, and the certification fails. If it fails, go back to the first step.
Embodiment 3
[0029] Embodiment 3: The sharer and vehicle user in this embodiment are specifically defined as the sharer is the owner who provides the vehicle, or the rental company that provides the vehicle, and the vehicle supplier in the process of vehicle sharing. Vehicle users, that is, borrowers, and vehicle users in the process of vehicle sharing, are referred to as users.
[0030] A vehicle sharing method based on a remote personal identity verification method, comprising
[0031] S1. The car sharer sets the rental parameters;
[0032] S2. Authenticate the identity of the vehicle user, and the authenticated vehicle user screens the vehicle based on vehicle information and rental parameters;
[0033] S3. The vehicle user searches for the vehicle based on the vehicle location;
[0034] S4. Before the vehicle is used, the vehicle sharer authorizes the vehicle user to have a vehicle inspection time, and the vehicle user will inspect the vehicle. During the vehicle inspection, the vehi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com