Electric automobile electric quantity management method and related device

文档序号:743139 发布日期:2021-04-23 浏览:12次 中文

阅读说明:本技术 电动汽车电量管理方法及相关装置 (Electric automobile electric quantity management method and related device ) 是由 党晓圆 于 2020-12-10 设计创作,主要内容包括:本申请实施例提供一种电动汽车电量管理方法及相关装置,其中,所述方法包括:获取目标电动车辆的目标电池的第一电压和所述目标电池的第二电压;根据所述第一电压和所述第二电压,确定所述目标电池的电池荷电状态;根据所述电池荷电状态,对所述目标电池进行电量管理,能够提升电量管理时的智能性。(The embodiment of the application provides an electric automobile electric quantity management method and a related device, wherein the method comprises the following steps: acquiring a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery; determining the battery state of charge of the target battery according to the first voltage and the second voltage; according to the battery charge state, the electric quantity of the target battery is managed, and the intelligence of electric quantity management can be improved.)

1. An electric vehicle power management method is characterized by comprising the following steps:

acquiring a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery;

determining the battery state of charge of the target battery according to the first voltage and the second voltage;

and managing the electric quantity of the target battery according to the charge state of the battery.

2. The method of claim 1, wherein the first voltage comprises a terminal voltage of the target battery, and the second voltage comprises a voltage of a battery polarization internal resistance of the target battery.

3. The method of claim 1 or 2, wherein said managing the charge of the target battery according to the battery state of charge comprises:

determining the electric quantity adjustment quantity of the target battery according to the battery charge state;

and adjusting the electric quantity of the target battery according to the electric quantity adjustment quantity.

4. The method of claim 3, further comprising:

displaying a plurality of information importance levels when a battery information storage request from a first user is detected;

when touch operation aiming at the importance degree of target information is detected, displaying first prompt information, wherein the first prompt information is used for prompting to enter information to be stored and an identity information set corresponding to the importance degree of the target information;

acquiring first information to be stored and a first identity information set which are input by the first user;

and binding and storing the first information to be stored, the first identity information set and the first user.

5. The method of claim 4, wherein the obtaining the first set of information to be stored and the first set of identity information entered by the first user comprises:

if the importance degree of the target information is smaller than the preset information importance degree, acquiring a first information to be stored and a first identity information set which are input by the first user within a first preset time length; alternatively, the first and second electrodes may be,

and if the target information importance degree is greater than or equal to the preset information importance degree, acquiring a first information to be stored and a first identity information set which are input by the first user within a second preset time length, wherein the second preset time length is less than the first preset time length.

6. The method of claim 5, wherein the binding the first information to be stored, the first set of identity information, and the first user comprises:

encrypting the first information to be stored by using the first identity information set to obtain the encrypted first information to be stored;

determining a first information storage space corresponding to the first user according to a pre-stored mapping relation between the user and the information storage space;

and storing the encrypted first information to be stored into the first information storage space.

7. The method according to any one of claims 4-6, further comprising:

when an information query request from a second user for encrypted second information to be stored is detected, displaying second prompt information, wherein the second prompt information is used for prompting to enter a second identity information set, and the second identity information set is an identity information set corresponding to the encrypted second information to be stored;

acquiring a set of identity information to be matched, which is input by the second user;

and if the identity information set to be matched is successfully matched with the second identity information set, displaying the encrypted second information to be stored.

8. The method according to any one of claims 4-6, further comprising:

when an information query request aiming at the encrypted third information to be stored from a third user is detected, displaying third prompt information, wherein the third prompt information is used for prompting to enter a third identity information set, and the third identity information set is an identity information set corresponding to the encrypted third information to be stored;

circularly executing the operation of acquiring the identity information set to be matched input by the third user and matching the identity information set to be matched with the third identity information set until the matching failure times of the identity information set to be matched and the third identity information set are greater than or equal to the preset times;

collecting the face image of the third user without sensing;

and sending the matching failure times and the face image to a target terminal device, wherein the target terminal device is a terminal device preset by a user and corresponding to the encrypted third information to be stored.

9. An electric vehicle power management device, characterized in that the device comprises:

an acquisition unit configured to acquire a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery;

a determination unit, configured to determine a battery state of charge of the target battery according to the first voltage and the second voltage;

and the management unit is used for managing the electric quantity of the target battery according to the charge state of the battery.

10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to carry out the method according to any one of claims 1-8.

Technical Field

The application relates to the technical field of data processing, in particular to an electric automobile electric quantity management method and a related device.

Background

Along with the continuous development of society, the attention on energy sources is higher and higher. The clean energy is more and more used, for example, electric automobile's development and use etc. in the aspect of the current electric quantity management to electric automobile, mainly through detecting the electric quantity to the mode of show residual capacity is managed, and the intelligence when leading to the electric quantity management is lower.

Disclosure of Invention

The embodiment of the application provides an electric automobile electric quantity management method and a related device, which can improve the intelligence during electric quantity management.

The first aspect of the embodiment of the application provides an electric automobile electric quantity management method, which comprises the following steps:

acquiring a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery;

determining the battery state of charge of the target battery according to the first voltage and the second voltage;

and managing the electric quantity of the target battery according to the charge state of the battery.

With reference to the first aspect, in one possible implementation manner, the first voltage includes a terminal voltage of the target battery, and the second voltage includes a voltage of a battery polarization internal resistance of the target battery.

With reference to the first aspect, in a possible implementation manner, the performing, according to the battery state of charge, electric quantity management on the target battery includes:

determining the electric quantity adjustment quantity of the target battery according to the battery charge state;

and adjusting the electric quantity of the target battery according to the electric quantity adjustment quantity.

With reference to the first aspect, in one possible implementation manner, the method further includes:

displaying a plurality of information importance levels when a battery cell information storage request from a first user is detected;

when touch operation aiming at the importance degree of target information is detected, displaying first prompt information, wherein the first prompt information is used for prompting to enter information to be stored and an identity information set corresponding to the importance degree of the target information;

acquiring first information to be stored and a first identity information set which are input by the first user;

and binding and storing the first information to be stored, the first identity information set and the first user.

With reference to the first aspect, in a possible implementation manner, the acquiring the first information to be stored and the first identity information set entered by the first user includes:

if the importance degree of the target information is smaller than the preset information importance degree, acquiring a first information to be stored and a first identity information set which are input by the first user within a first preset time length; alternatively, the first and second electrodes may be,

and if the target information importance degree is greater than or equal to the preset information importance degree, acquiring a first information to be stored and a first identity information set which are input by the first user within a second preset time length, wherein the second preset time length is less than the first preset time length.

With reference to the first aspect, in a possible implementation manner, the performing binding storage on the first information to be stored, the first identity information set, and the first user includes:

encrypting the first information to be stored by using the first identity information set to obtain the encrypted first information to be stored;

determining a first information storage space corresponding to the first user according to a pre-stored mapping relation between the user and the information storage space;

and storing the encrypted first information to be stored into the first information storage space.

With reference to the first aspect, in one possible implementation manner, the method further includes:

when an information query request from a second user for encrypted second information to be stored is detected, displaying second prompt information, wherein the second prompt information is used for prompting to enter a second identity information set, and the second identity information set is an identity information set corresponding to the encrypted second information to be stored;

acquiring a set of identity information to be matched, which is input by the second user;

and if the identity information set to be matched is successfully matched with the second identity information set, displaying the encrypted second information to be stored.

With reference to the first aspect, in one possible implementation manner, the method further includes:

when an information query request aiming at the encrypted third information to be stored from a third user is detected, displaying third prompt information, wherein the third prompt information is used for prompting to enter a third identity information set, and the third identity information set is an identity information set corresponding to the encrypted third information to be stored;

circularly executing the operation of acquiring the identity information set to be matched input by the third user and matching the identity information set to be matched with the third identity information set until the matching failure times of the identity information set to be matched and the third identity information set are greater than or equal to the preset times;

collecting the face image of the third user without sensing;

and sending the matching failure times and the face image to a target terminal device, wherein the target terminal device is a terminal device preset by a user and corresponding to the encrypted third information to be stored.

A second aspect of the embodiments of the present application provides an electric vehicle power management device, where the device includes:

an acquisition unit configured to acquire a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery;

a determination unit, configured to determine a battery state of charge of the target battery according to the first voltage and the second voltage;

and the management unit is used for managing the electric quantity of the target battery according to the charge state of the battery.

A third aspect of the embodiments of the present application provides a terminal, including a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program, and the computer program includes program instructions, and the processor is configured to call the program instructions to execute the step instructions in the first aspect of the embodiments of the present application.

A fourth aspect of embodiments of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform part or all of the steps as described in the first aspect of embodiments of the present application.

A fifth aspect of embodiments of the present application provides a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps as described in the first aspect of embodiments of the present application. The computer program product may be a software installation package.

The embodiment of the application has at least the following beneficial effects:

the method comprises the steps of obtaining a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery, determining a battery charge state of the target battery according to the first voltage and the second voltage, and managing electric quantity of the target battery according to the battery charge state, so that compared with the prior art that electric quantity is displayed, the electric quantity is managed in an artificial mode, the electric quantity can be managed according to the battery charge state, and intelligence of battery electric quantity management is improved.

Drawings

In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.

Fig. 1 is a schematic flow chart illustrating a method for managing electric quantity of an electric vehicle according to an embodiment of the present application;

fig. 2 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure;

fig. 3 is a schematic structural diagram of an electric vehicle power management device according to an embodiment of the present application.

Detailed Description

The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.

Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.

Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a method for managing electric quantity of an electric vehicle according to an embodiment of the present disclosure. As shown in fig. 1, the method includes:

101. a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery are obtained.

The first voltage and the second voltage may be voltages of the target battery at different times, for example, a voltage of the target battery at the time of starting the target electric vehicle at the first voltage, and the second voltage may be a voltage of the target electric vehicle after a certain time after starting.

The first voltage and the second voltage may be measured by a sensor, for example, a voltage detection sensor or the like, which is connected to the target battery, so that the first voltage and the second voltage can be directly acquired.

102. And determining the battery charge state of the target battery according to the first voltage and the second voltage.

And determining the current residual capacity of the target battery according to the first voltage and the second voltage, and determining the state of charge of the battery according to the current residual capacity.

The service efficiency of the battery can be determined according to the first voltage, the second voltage and the collected interval time. And finally, managing the electric quantity of the target battery according to the service efficiency and the charge state of the battery.

103. And managing the electric quantity of the target battery according to the charge state of the battery.

According to the battery state of charge, the method for managing the electric quantity of the target battery may be: and managing the electric quantity of the target battery according to the electric quantity adjustment quantity determined by the charge state of the battery.

Or determining the subsequent use efficiency of the target battery according to the use efficiency of the battery and the charge state of the battery, determining the subsequent use efficiency as the reference use efficiency of the target battery, and using the battery according to the reference use efficiency.

In this example, a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery are obtained, the battery state of charge of the target battery is determined according to the first voltage and the second voltage, and electric quantity management is performed on the target battery according to the battery state of charge.

In one possible implementation, the first voltage includes a terminal voltage of the target battery, and the second voltage includes a voltage of a battery polarization internal resistance of the target battery. The battery state of charge may be determined by the terminal voltage of the target battery and the voltage of the battery polarization internal resistance of the target battery.

In one possible implementation manner, a possible method for managing the electric quantity of the target battery according to the state of charge of the battery includes:

a1, determining the electric quantity adjustment quantity of the target battery according to the battery charge state;

and A2, adjusting the electric quantity of the target battery according to the electric quantity adjustment quantity.

The higher the value of the battery state of charge, the smaller the amount of electric quantity adjustment, and the lower the value of the battery state of charge, the larger the amount of electric quantity adjustment. The charge amount adjustment amount may be understood as an adjustment amount of the usage amount of the battery, for example, an adjustment amount of the remaining amount of the battery to the charge amount. The adjustment of the electric quantity of the target battery can be understood as the adjustment of the electric quantity used by the target battery.

In this example, the electric quantity of the target battery is adjusted according to the electric quantity adjustment amount, so that convenience in electric quantity adjustment can be improved.

In one possible implementation, the following method is further included:

b1, when the battery information storage request from the first user is detected, the terminal device displays a plurality of information importance levels.

The terminal device may be a smart phone, which is not limited herein.

The information importance degree refers to the importance of information to be stored to be input by a first user to the first user, and the information importance degrees may include important information, more important information and general important information.

The battery information storage request may include a battery power information storage, a battery usage information storage, and the like.

In some possible embodiments, before the terminal device displays the plurality of information importance levels, the method further includes:

the terminal equipment matches the first user with a preset white list;

and if the first user is successfully matched with the white list, the terminal equipment triggers the terminal equipment to display the operation of a plurality of information importance degrees.

The white list comprises a plurality of designated users having the right to enter information to be stored in the terminal device.

It can be seen that, in this example, first, a first user is matched with a preset white list, and then, if the first user is successfully matched with the white list, the terminal device triggers the terminal device to display an operation of displaying importance levels of a plurality of pieces of information, which is beneficial to realizing that the terminal device has a function of inputting a plurality of pieces of information to be stored corresponding to a plurality of specified users one to one, for example, the information to be stored of each family member in a family is stored in one smart phone, so that the security of information storage is improved to a certain extent.

And B2, when touch operation aiming at the importance degree of the target information is detected, the terminal equipment displays first prompt information, and the first prompt information is used for prompting to enter information to be stored and an identity information set corresponding to the importance degree of the target information.

Wherein the target information importance level is one of a plurality of information importance levels.

Wherein, the information importance degree corresponds to the identity information set one by one; if the information importance degree is important information, the identity information set can be fingerprint information, voiceprint information, iris information and vein information; if the information importance degree is important information, the identity information set can be fingerprint information, voiceprint information and iris information; if the information importance degree is the important information, the identity information set can be fingerprint information + voiceprint information; if the information importance level is generally important information, the identity information set may be fingerprint information.

Wherein, the information importance degree corresponds to the identity information set one by one; if the information importance degree is important information, the identity information set can be vein information; if the information importance degree is important information, the identity information set can be iris information; if the information importance degree is more important information, the identity information set can be voiceprint information; if the information importance level is generally important information, the identity information set may be fingerprint information.

And B3, the terminal equipment acquires the first information to be stored and the first identity information set which are input by the first user.

In some possible embodiments, the obtaining, by the terminal device, the first information to be stored and the first identity information set entered by the first user includes:

if the importance degree of the target information is smaller than the preset information importance degree, the terminal equipment acquires first information to be stored and a first identity information set which are input by a first user within a first preset time length; alternatively, the first and second electrodes may be,

if the importance degree of the target information is greater than or equal to the preset information importance degree, the terminal equipment acquires a first information to be stored and a first identity information set which are input by a first user within a second preset time length, and the second preset time length is less than the first preset time length.

The preset information importance degree may be important information or more important information.

It can be seen that, in this example, the information importance degree is inversely related to the time length for the first user to enter the first information to be stored and the first identity information set in the terminal device, in other words, if the information importance degree is higher, the time length for the first user to enter the first information to be stored and the first identity information set in the terminal device is shorter, which improves the security of information storage to some extent.

And B4, the terminal equipment performs binding storage on the first information to be stored, the first identity information set and the first user.

Compared with the situation that other people can still browse the memorandum in the smart phone, the safety of information storage is low, in the embodiment of the application, first to-be-stored information input by a first user based on first prompt information and a first identity information set corresponding to the importance degree of target information are obtained first, and then the first to-be-stored information, the first identity information set and the first user are bound and stored, so that the first to-be-stored information cannot be browsed unless other people can input the first identity information set corresponding to the importance degree of the target information, and the safety of information storage is improved.

In some possible embodiments, the binding and storing, by the terminal device, the first information to be stored, the first identity information set, and the first user includes:

the terminal equipment encrypts the first information to be stored by using the first identity information set to obtain the encrypted first information to be stored;

the terminal equipment determines a first information storage space corresponding to a first user according to a pre-stored mapping relation between the user and the information storage space;

and the terminal equipment stores the encrypted first information to be stored into the first information storage space.

Wherein, the users correspond to the information storage space one by one; if the user is the user A, the information storage space is the information storage space A; if the user is a user B, the information storage space is an information storage space B; if the user is user C, then the information storage space is information storage space C.

In this example, first to-be-stored information input by a first user based on first prompt information and a first identity information set corresponding to the importance degree of target information are obtained, then the first to-be-stored information is encrypted by using the first identity information set to obtain encrypted first to-be-stored information, and finally the encrypted first to-be-stored information is stored in a first information storage space corresponding to the first user; therefore, unless someone can input the first identity information set corresponding to the importance degree of the target information, the first information to be stored in the first information storage space cannot be browsed, and therefore safety of information storage is improved.

In some possible embodiments, the method further comprises:

when detecting an information query request from a second user for encrypted second information to be stored, displaying second prompt information by the terminal device, wherein the second prompt information is used for prompting to enter a second identity information set, and the second identity information set is an identity information set corresponding to the encrypted second information to be stored;

the terminal equipment acquires a set of identity information to be matched, which is input by a second user;

and if the identity information set to be matched is successfully matched with the second identity information set, the terminal equipment displays the encrypted second information to be stored.

As can be seen, in this example, if the set of to-be-matched identity information entered by the second user is successfully matched with the second set of identity information (the set of identity information corresponding to the encrypted second information to be stored), the terminal device displays the encrypted second information to be stored, so that the second user browses the encrypted second information to be stored; in other words, only the user himself can browse the information stored in the terminal device before, which contributes to improving the security of information inquiry.

In some possible embodiments, before the terminal device obtains the set of identity information to be matched entered by the second user, the method further includes:

judging whether the second user is in a non-sleep state;

and if so, triggering the terminal equipment to acquire the operation of the identity information set to be matched, which is input by the second user.

It is prior art to determine whether the user is in the non-sleep state, and the description is omitted here.

As can be seen, in this example, if the second user is in a non-sleep state and the set of to-be-matched identity information entered by the second user is successfully matched with the second set of identity information (the set of identity information corresponding to the encrypted second information to be stored), the terminal device displays the encrypted second information to be stored, so that the second user browses the encrypted second information to be stored; in other words, the information previously stored in the terminal device can be viewed only by the user himself in the non-sleep state, which can prevent someone else from viewing the information previously stored in the terminal device while he is in the sleep state.

In some possible embodiments, the method further comprises:

when detecting an information query request from a third user for the encrypted third information to be stored, the terminal device displays third prompt information, wherein the third prompt information is used for prompting to enter a third identity information set, and the third identity information set is an identity information set corresponding to the encrypted third information to be stored;

the terminal equipment circularly executes the operation of acquiring the identity information set to be matched input by a third user and matching the identity information set to be matched with the third identity information set until the matching failure times of the identity information set to be matched and the third identity information set are greater than or equal to the preset times;

the terminal equipment acquires a face image of a third user in a non-sensing manner;

and the terminal equipment sends the matching failure times and the face image to target terminal equipment, wherein the target terminal equipment is the terminal equipment preset by the user and corresponds to the encrypted third information to be stored.

Wherein, the preset times can be 3 times, 4 times or 5 times.

The non-sensing acquisition of the face image of the user by the terminal device is the prior art, and is not described herein.

As can be seen, in this example, the terminal device sends the number of matching failures and the face image to the target terminal (the terminal device preset by the user corresponding to the encrypted third information to be stored), so that the person can know in time which person wants to browse the information stored in the terminal device before the person and the number of browsing failures.

In some possible embodiments, the method further comprises:

the terminal equipment receives the authority information fed back by the target terminal equipment;

and the terminal equipment adds the third user to a preset blacklist according to the permission information, and all users in the blacklist do not have the permission to inquire the encrypted third information to be stored.

Therefore, in this example, the terminal device adds the third user to the preset blacklist according to the permission information, so that the third user cannot browse the information stored in the terminal device before the third user browses the third user, and the security of information query is improved to a certain extent.

In accordance with the foregoing embodiments, please refer to fig. 2, fig. 2 is a schematic structural diagram of a terminal according to an embodiment of the present application, and as shown in the drawing, the terminal includes a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program, the computer program includes program instructions, the processor is configured to call the program instructions, and the program includes instructions for performing the following steps;

acquiring a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery;

determining the battery state of charge of the target battery according to the first voltage and the second voltage;

and managing the electric quantity of the target battery according to the charge state of the battery.

The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the terminal includes corresponding hardware structures and/or software modules for performing the respective functions in order to implement the above-described functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.

In the embodiment of the present application, the terminal may be divided into the functional units according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.

In accordance with the above, please refer to fig. 3, and fig. 3 is a schematic structural diagram of an electric vehicle power management device according to an embodiment of the present application. As shown in fig. 3, the apparatus includes:

an acquisition unit 301 for acquiring a first voltage of a target battery of a target electric vehicle and a second voltage of the target battery;

a determining unit 302, configured to determine a battery state of charge of the target battery according to the first voltage and the second voltage;

and the management unit 303 is configured to manage the electric quantity of the target battery according to the battery state of charge.

In one possible implementation, the first voltage includes a terminal voltage of the target battery, and the second voltage includes a voltage of a battery polarization internal resistance of the target battery.

In one possible implementation, the management unit 303 is configured to:

determining the electric quantity adjustment quantity of the target battery according to the battery charge state;

and adjusting the electric quantity of the target battery according to the electric quantity adjustment quantity.

In one possible implementation, the apparatus is further configured to:

displaying a plurality of information importance levels when a battery information storage request from a first user is detected;

when touch operation aiming at the importance degree of target information is detected, displaying first prompt information, wherein the first prompt information is used for prompting to enter information to be stored and an identity information set corresponding to the importance degree of the target information;

acquiring first information to be stored and a first identity information set which are input by the first user;

and binding and storing the first information to be stored, the first identity information set and the first user.

In one possible implementation, the apparatus is further configured to:

if the importance degree of the target information is smaller than the preset information importance degree, acquiring a first information to be stored and a first identity information set which are input by the first user within a first preset time length; alternatively, the first and second electrodes may be,

and if the target information importance degree is greater than or equal to the preset information importance degree, acquiring a first information to be stored and a first identity information set which are input by the first user within a second preset time length, wherein the second preset time length is less than the first preset time length.

In one possible implementation, the apparatus is further configured to: encrypting the first information to be stored by using the first identity information set to obtain the encrypted first information to be stored;

determining a first information storage space corresponding to the first user according to a pre-stored mapping relation between the user and the information storage space;

and storing the encrypted first information to be stored into the first information storage space.

In one possible implementation, the apparatus is further configured to:

when an information query request from a second user for encrypted second information to be stored is detected, displaying second prompt information, wherein the second prompt information is used for prompting to enter a second identity information set, and the second identity information set is an identity information set corresponding to the encrypted second information to be stored;

acquiring a set of identity information to be matched, which is input by the second user;

and if the identity information set to be matched is successfully matched with the second identity information set, displaying the encrypted second information to be stored.

In one possible implementation, the apparatus is further configured to:

when an information query request aiming at the encrypted third information to be stored from a third user is detected, displaying third prompt information, wherein the third prompt information is used for prompting to enter a third identity information set, and the third identity information set is an identity information set corresponding to the encrypted third information to be stored;

circularly executing the operation of acquiring the identity information set to be matched input by the third user and matching the identity information set to be matched with the third identity information set until the matching failure times of the identity information set to be matched and the third identity information set are greater than or equal to the preset times;

collecting the face image of the third user without sensing;

and sending the matching failure times and the face image to a target terminal device, wherein the target terminal device is a terminal device preset by a user and corresponding to the encrypted third information to be stored.

The embodiment of the present application further provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the electric vehicle power management methods as described in the above method embodiments.

The embodiment of the present application further provides a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program enables a computer to execute part or all of the steps of any one of the electric vehicle power management methods as described in the above method embodiments.

It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.

In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.

In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.

The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.

In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may be implemented in the form of a software program module.

The integrated units, if implemented in the form of software program modules and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a read-only memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and the like.

Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash memory disks, read-only memory, random access memory, magnetic or optical disks, and the like.

The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

14页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种电池保护系统及方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!