Safety net car-sharing method and system based on big data mining
A safety net and big data technology, applied in safety net car-hailing methods and systems, can solve the problems that drivers cannot know the densely populated areas of peer competitors, drivers do not have the right to choose independently, and the purpose is not simple, so as to optimize the car-hailing experience, Optimize travel mode and safety, save communication cost effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] The present invention provides a safe online car-hailing method based on big data mining, wherein, the online car-hailing driver independently chooses to go to the target area according to the analysis results of the passengers or the driver in the target area, and the passenger independently selects the area where the conditions are met when using the car The vehicle makes an appointment for the order. After the passenger reserves the order, the order is sent to the background. The background plans and designs the recommended route for the location of the departure and destination in the passenger order. The background sends the recommended route to the driver together with the order. The driver confirms the order, and the order takes effect after the two parties reach an agreement. The location and other information are confirmed through the contact information given by the two parties in the background. At the same time, the background monitors the order. After the ord...
Embodiment 2
[0043] Such as Figure 12 As shown, the present invention provides a safe online car-hailing method based on big data mining, wherein the online car-hailing driver chooses to go to the target area independently according to the passenger analysis result map or the driver analysis result map in the target area, and the passenger chooses independently when using the car. Qualified vehicles in the area make reservations for the order. After the passenger reserves the order, the order is sent to the background. The background plans the route between the driver and the passenger and designs a recommended route. The background sends the recommended route together with the order to The driver, the driver confirms the order, and the order will take effect after the two parties reach an agreement. The location and other information will be confirmed through the contact information given by the background, and the background will monitor the order.
[0044] Based on the analysis of the ...
Embodiment 3
[0048] In this embodiment, the method used in selecting an order is the same as in Embodiments 1 and 2. The difference is that after the order is generated, neither the driver nor the passenger can know the contact information of the other party in advance. When the driver arrives within 5 kilometers of the passenger, the driver can Obtain the passenger's contact information given by the background, the contact information is an encrypted mobile phone number, and the contact information is valid for five minutes, and it will be re-encrypted and replaced every five minutes. When the passenger cancels the order, the driver cannot contact the passenger. Way.
[0049] This method protects the privacy of both the driver and the passenger, and avoids the situation that the driver harasses the passenger or the passenger repeatedly harass the driver.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com