CN117978502B - Vehicle data safety management method and system based on Internet of vehicles technology - Google Patents

Vehicle data safety management method and system based on Internet of vehicles technology Download PDF

Info

Publication number
CN117978502B
CN117978502B CN202410150481.8A CN202410150481A CN117978502B CN 117978502 B CN117978502 B CN 117978502B CN 202410150481 A CN202410150481 A CN 202410150481A CN 117978502 B CN117978502 B CN 117978502B
Authority
CN
China
Prior art keywords
vehicle
data
vehicle data
request instruction
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410150481.8A
Other languages
Chinese (zh)
Other versions
CN117978502A (en
Inventor
李炳就
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Baizeng Software Technology Co ltd
Original Assignee
Dongguan Baizeng Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Baizeng Software Technology Co ltd filed Critical Dongguan Baizeng Software Technology Co ltd
Priority to CN202410150481.8A priority Critical patent/CN117978502B/en
Publication of CN117978502A publication Critical patent/CN117978502A/en
Application granted granted Critical
Publication of CN117978502B publication Critical patent/CN117978502B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Traffic Control Systems (AREA)

Abstract

The embodiment of the application relates to the technical field of Internet of vehicles and discloses a vehicle data safety management method and system based on the Internet of vehicles technology.

Description

Vehicle data safety management method and system based on Internet of vehicles technology
Technical Field
The invention relates to the technical field of Internet of vehicles, in particular to a vehicle data security management method and system based on the Internet of vehicles technology.
Background
In recent years, with the continuous improvement of the intelligent and networking degree, automobiles gradually become one of important sources for collecting and generating network data, and are even closely related to the safety guarantee of important problems such as national safety, national folk life, public interests and the like. However, the current networked vehicle has a single management means for data security, for example, the vehicle data is completely opened, i.e. users or lawbreakers can use the data infinitely, so that the privacy of the users or even the national security is greatly affected, and for example, the vehicle data is completely not opened, i.e. the vehicle data is completely mastered by related departments, so that the intelligent control degree of the vehicle is affected.
Disclosure of Invention
The invention mainly aims to provide a vehicle data security management method and system based on the internet of vehicles technology, and aims to solve the technical problems that in the prior art, the user privacy security, the national security or the vehicle intellectualization is greatly affected due to single vehicle data management.
In order to achieve the above object, in a first aspect, an embodiment of the present application provides a vehicle data security management method based on internet of vehicles, which is applied to a vehicle data security management system, where the vehicle data security management system includes a vehicle data storage unit, a vehicle data cloud platform, and an encryption/decryption unit, and the method includes:
Acquiring vehicle data and classifying the vehicle data, wherein the vehicle data comprises first vehicle data and second vehicle data;
The vehicle data are encrypted in real time, and the encrypted vehicle data are uploaded to a first vehicle data encryption packet and a second vehicle data encryption packet of a vehicle management service cloud platform respectively through the Internet of vehicles according to categories for confidential storage;
Responding to a request instruction sent by a data demand end to a vehicle data demand, and judging whether the request instruction meets a preset target instruction, wherein the preset target instruction is a target instruction for ensuring the safety of a user or enhancing the driving safety;
determining that the request instruction meets a preset target instruction, and acquiring a target vehicle data encryption packet according to the request instruction;
decrypting the target vehicle data encryption packet and extracting target vehicle data according to the request instruction;
packaging and transmitting the target vehicle data and a preset hidden automatic clearing program to a data receiving end;
and acquiring a vehicle data cleaning instruction, and triggering the automatic cleaning program to clean the target vehicle data.
Further, the first vehicle data includes vehicle user data, the data demand end includes a vehicle internal demand end, and the determining, in response to a request instruction sent by the data demand end to a vehicle data demand, whether the request instruction meets a preset target instruction includes:
and responding to the demand of the vehicle interior demand end for the vehicle user data, and judging whether the request instruction meets a preset target instruction.
Further, the determining whether the request instruction meets a preset target instruction includes:
Acquiring a behavior state of a vehicle driving user;
Judging whether the obtained behavior state of the vehicle driving user has potential safety hazards or not;
When potential safety hazards exist in the behavior state of the vehicle driving user, determining that the request instruction meets a preset target instruction;
and when the behavior state of the vehicle driving user has no potential safety hazard, determining that the request instruction does not meet the preset target instruction.
Further, the behavior state of the vehicle driving user includes a braking response speed in an emergency state, and the determining whether the obtained behavior state of the vehicle driving user has a potential safety hazard includes:
Acquiring the braking reaction speed of a vehicle driving user stepping on the braking equipment in a state that a fault object exists in a preset distance range in front of the vehicle;
and when the braking reaction speed is smaller than or equal to a preset threshold value, determining that the behavior state of the vehicle driving user has potential safety hazards.
Further, the vehicle user data includes face data, heart rate data, and pulse data, the request instruction includes a fatigue verification data request instruction, and the acquiring the target vehicle data according to the request instruction includes:
And acquiring one or more of face data, heart rate data and pulse data according to the fatigue verification data request instruction so as to perform fatigue verification of the user according to the one or more of the face data, heart rate data and pulse data.
Further, the second vehicle data includes vehicle driving data, the data demand end includes a vehicle external demand end, and the determining, in response to a request instruction sent by the data demand end to the vehicle data demand, whether the request instruction meets a preset target instruction includes:
And responding to the requirement of the vehicle external requirement end on the vehicle running data, and judging whether the request instruction meets a preset target instruction or not.
Further, the determining whether the request instruction meets a preset target instruction includes:
Acquiring a running state of a vehicle;
Judging whether potential safety hazards exist in the running state of the vehicle or not;
When potential safety hazards exist in the running state of the vehicle, determining that the request instruction meets a preset target instruction;
When the potential safety hazard does not exist in the running state of the vehicle, determining that the request instruction does not meet the preset target instruction; and/or the number of the groups of groups,
The vehicle driving data comprises vehicle position data, the request instruction comprises a vehicle rescue data request instruction, and the acquiring of target vehicle data according to the request instruction comprises the following steps:
And acquiring vehicle position data according to the vehicle rescue data request instruction.
Further, the vehicle running state includes that the vehicle cannot brake effectively, and the judging whether the vehicle running state has potential safety hazards includes:
acquiring an emergency braking distance of the vehicle when the vehicle is in a braking action state within a preset running speed range;
and when the emergency braking distance of the vehicle is higher than a preset distance threshold value, determining that the running state of the vehicle has potential safety hazards.
Further, before the acquiring the vehicle data cleaning instruction and triggering the automatic cleaning program to clean the target vehicle data, the method further includes:
acquiring the application time length of the data demand end to the target vehicle data according to the request instruction;
and triggering a data cleaning instruction after the application duration is over.
In a second aspect, the embodiment of the application also provides a vehicle data security management system, which comprises a vehicle data storage unit, a vehicle data cloud platform, an encryption and decryption unit, a processor and a memory; the vehicle data storage unit is used for temporarily storing vehicle data, the vehicle data cloud platform is used for storing encrypted vehicle data, the encryption and decryption unit is used for encrypting and decrypting the vehicle data, the memory is used for storing program codes, and the processor is used for calling the program codes to execute the method according to the first aspect.
Compared with the prior art, the vehicle data safety management method based on the internet of vehicles technology provided by the embodiment of the application is characterized in that firstly, the vehicle data collected by the data collection end is classified, encrypted and stored in the cloud platform to ensure the safety of the vehicle data, and after the data request instruction is detected, whether the request instruction meets the preset target instruction is required to be judged, when the request instruction meets the preset target instruction, the corresponding vehicle data is extracted from the cloud platform according to the request instruction, the method is used for preventing lawless persons from capturing the vehicle data, and after the application of the vehicle data is finished, the corresponding vehicle data is subjected to intelligent self-destruction operation to prevent the random circulation of the vehicle data from influencing the safety of the data, so that the vehicle data can be stored to ensure the safety of the vehicle data, and the related vehicle data can be extracted according to the safety requirement for reasonable use to improve the intelligent degree of the vehicle.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to the structures shown in these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a vehicle data security management method based on Internet of vehicles according to some embodiments of the present application;
FIG. 2 is a flow chart of a method for vehicle data security management based on Internet of vehicles according to other embodiments of the present application;
FIG. 3 is a flow chart of a method for vehicle data security management based on Internet of vehicles according to other embodiments of the present application;
FIG. 4 is a schematic diagram of a vehicle data security management process in some embodiments of the application;
FIG. 5 is a block diagram of a vehicle data security management system in some embodiments of the application.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that all directional indicators (such as up, down, left, right, front, and rear … …) in the embodiments of the present invention are merely used to explain the relative positional relationship, movement, etc. between the components in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly.
Furthermore, the description of "first," "second," etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, "and/or" throughout this document includes three schemes, taking a and/or B as an example, including a technical scheme, a technical scheme B, and a technical scheme that both a and B satisfy; in addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
In recent years, with the continuous improvement of the intelligent and networking degree, automobiles gradually become one of important sources for collecting and generating network data, and are even closely related to the safety guarantee of important problems such as national safety, national folk life, public interests and the like. However, the current networked vehicle has a single management means for data security, for example, the vehicle data is completely opened, i.e. users or lawbreakers can use the data infinitely, so that the privacy of the users and even the national data security are greatly affected, and for example, the vehicle data is completely not opened, i.e. the vehicle data is completely mastered by related departments, so that the intelligent control degree of the vehicle is affected.
In view of the above problems, the present application provides a vehicle data security management method based on the internet of vehicles technology, which is applied to a vehicle data security management system 100, wherein the vehicle data security management system 100 includes a vehicle data storage unit 110, a vehicle data cloud platform 120 and an encryption/decryption unit 130, the vehicle data storage unit 110 is configured to temporarily store vehicle data acquired by a data acquisition end, the vehicle data cloud platform 120 is configured to store encrypted vehicle data, and the encryption/decryption unit 130 is configured to encrypt and decrypt the vehicle data.
The specific steps of the vehicle data security management method based on the internet of vehicles technology will be mainly described below, and it should be noted that although a logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order from that herein. Referring to fig. 1-4, the method includes:
S100, acquiring vehicle data and classifying the vehicle data, wherein the vehicle data comprises first vehicle data and second vehicle data;
Specifically, the data of the vehicle includes user data (first vehicle data) and vehicle driving data (second vehicle data), and the user data may include face information of a driver of the vehicle, for example, face information (including facial features in a normal state and facial features in a fatigue state, etc.) of a user collected by the vehicle system and an APP applied thereto; the user data may also include heart rate and pulse data of the driver user (which may also include heart rate and pulse data in normal state and fatigue state), for example, the heart rate and pulse data of the user collected by the intelligent steering wheel through the photoelectric collector; the user data may also include user data of age, sex, driving habit, etc. of the driver of the vehicle, etc.; the vehicle travel data may include data of a travel position, a total travel mileage, a travel speed, and the like of the vehicle. Of course, the types of vehicle data described above are merely examples, and user data and vehicle travel data may be collected by different sensors or collection devices according to different needs.
It can be understood that if the collected vehicle data is directly stored in the vehicle-mounted memory, different vehicle manufacturers can independently control the vehicle-mounted memory, so that the vehicle data stored in the vehicle-mounted memory is necessarily utilized by the vehicle manufacturers or lawbreakers, and the data security is greatly affected. Therefore, the present application temporarily stores the vehicle data in the vehicle-mounted memory (vehicle data storage unit 110) after the vehicle data is collected, and then transmits the vehicle data to the vehicle management service cloud platform for unified confidentiality management, where the vehicle management service cloud platform can be set and managed by the relevant departments, for example, by the national data security management department, specifically see step S200.
S200, carrying out real-time encryption processing on the vehicle data, and uploading the encrypted vehicle data to a first vehicle data encryption packet and a second vehicle data encryption packet of a vehicle management service cloud platform respectively according to categories through a vehicle network for confidential storage;
Specifically, the vehicle data is temporarily stored in the vehicle data storage unit 110 after being collected, encrypted, and then respectively uploaded to the first vehicle data encryption packet and the second vehicle data encryption packet of the vehicle management service cloud platform according to the category for confidential storage. Therefore, the vehicle data collected by the vehicle are uniformly subjected to confidential management by the cloud platform, so that the probability of capturing and circulating the data is greatly reduced, and the safety of the vehicle data is effectively ensured.
However, if the vehicle data is completely stored in a confidential way and limited to be used, intelligent control of the vehicle is not facilitated, for example, the vehicle cannot carry out intelligent reminding and driving suggestion according to historical user data; it is also impossible to perform route selection, emergency rescue, etc. based on the vehicle travel data.
Therefore, the technical scheme of the application extracts corresponding vehicle data from the cloud platform according to the safety requirement for use while confidential storage of the vehicle data is carried out, so as to provide intelligent safety assistance for users or vehicles, for example, extracting user data for fatigue verification, fatigue reminding and the like of the users, extracting vehicle driving data for emergency rescue service and the like for the vehicles; and the request for vehicle data may be by sending a data request instruction to the vehicle or cloud platform.
S300, responding to a request instruction sent by a data demand end to a vehicle data demand, and judging whether the request instruction meets a preset target instruction, wherein the preset target instruction is a target instruction for ensuring the safety of a user or enhancing the driving safety;
in an embodiment, the data request command may be a command that the vehicle automatically triggers, for example, when the vehicle system detects that the vehicle is traveling abnormal, specifically, when the vehicle traveling speed or the vehicle traveling track is abnormal.
Further, the first vehicle data includes vehicle user data, the data demand end includes a vehicle interior demand end, and the determining, in response to a request instruction sent by the data demand end for the vehicle data demand, whether the request instruction meets a preset target instruction includes:
In response to the demand of the vehicle interior demand end for the vehicle user data, whether the request instruction meets a preset target instruction is judged, and it can be understood that the demand of the vehicle interior demand end for the vehicle user data can be an automatically triggered demand, for example, when a vehicle machine system detects that the vehicle running track is abnormal, the data request instruction is automatically triggered to request the user data to judge whether the safety problem exists in the behavior state of the user, but the user or lawless persons cannot obtain the vehicle data in a false abnormal mode.
In an embodiment, the determining whether the request instruction meets a preset target instruction includes:
S311, acquiring a behavior state of a vehicle driving user;
s312, judging whether the obtained behavior state of the vehicle driving user has potential safety hazards or not;
s313, when potential safety hazards exist in the behavior state of the vehicle driving user, determining that the request instruction meets a preset target instruction;
s314, when the behavior state of the vehicle driving user has no potential safety hazard, determining that the request instruction does not meet the preset target instruction.
Specifically, when the data request instruction is automatically triggered by the vehicle interior demand end, it is indicated that the vehicle is abnormal in running, at this time, the behavior state of the user needs to be judged to judge whether the vehicle is actually required, when the behavior state of the user is unsafe or potential safety hazard exists, the request instruction is indicated to meet the preset target instruction, further, the request of the vehicle user data is indicated to be actually required, and related user data needs to be sent in time to determine whether unhealthy or fatigue driving exists.
In an embodiment, the behavior state of the vehicle driving user includes a braking reaction speed in an emergency state, and the determining whether the acquired behavior state of the vehicle driving user has a safety hazard includes:
Acquiring the braking reaction speed of a vehicle driving user stepping on the braking equipment in a state that a fault object exists in a preset distance range in front of the vehicle;
and when the braking reaction speed is smaller than or equal to a preset threshold value, determining that the behavior state of the vehicle driving user has potential safety hazards.
Specifically, when a state of a fault object exists in a preset distance range in front of the vehicle, the braking response of the user is slower, the unhealthy or fatigue driving behavior of the user can be primarily judged, and at the moment, relevant user data are required to be timely acquired to further determine whether the unhealthy or fatigue driving behavior exists.
For example, the vehicle user data includes face data, heart rate data, pulse data, the request instruction includes a fatigue verification data request instruction, and the acquiring the target vehicle data according to the request instruction includes:
acquiring one or more of face data, heart rate data and pulse data according to a fatigue verification data request instruction so as to perform fatigue verification of a user according to the one or more of the face data, heart rate data and pulse data;
Specifically, the vehicle interior demand end further determines whether the user has health problems or fatigue driving behaviors by acquiring user data such as face data, heart rate data, pulse data and the like.
In another embodiment, the data request instruction may be an instruction manually triggered by a user, for example, the driver user makes a data request through an on-vehicle screen, and in particular, when the vehicle is out of control and needs emergency rescue, the driver user may manually trigger the transmission of the vehicle position data to the external rescue party.
Specifically, the second vehicle data includes vehicle driving data, the data demand end includes a vehicle external demand end, and the determining, in response to a request instruction sent by the data demand end to a vehicle data demand, whether the request instruction meets a preset target instruction includes:
Responding to the requirement of a vehicle external requirement end on vehicle running data, and judging whether the request instruction meets a preset target instruction or not; it can be appreciated that when the user manually triggers the data request to send the data to the external rescue party, the data request corresponds to the related data required by the external demand end of the vehicle; however, in order to prevent a user or an lawbreaker from forging a random triggering request instruction to acquire vehicle data, the technical scheme of the application sets a judging program to control data transmission, namely, judges whether the request instruction meets a preset target instruction, if the request instruction meets the preset target instruction, allows a vehicle external demand end to acquire corresponding user data, and if the request instruction does not meet the preset target instruction, does not allow the vehicle external demand end to acquire corresponding user data.
In an embodiment, the determining whether the request instruction meets a preset target instruction includes:
S321, acquiring a running state of a vehicle;
s322, judging whether potential safety hazards exist in the running state of the vehicle;
S323, when potential safety hazards exist in the vehicle running state, determining that the request instruction meets a preset target instruction;
S324, when the potential safety hazard does not exist in the running state of the vehicle, determining that the request instruction does not meet the preset target instruction.
Specifically, when the user triggers the data request instruction, it is indicated that the vehicle is dangerous in running, at this time, whether the user or lawbreaker deliberately triggers or the vehicle running state really presents danger needs to be judged, and when dangerous behaviors such as potential safety hazards exist in the vehicle running state, it is indicated that relevant vehicle data need to be sent to an external demand end in time, so that the outside can carry out emergency rescue on the vehicle.
In an embodiment, the vehicle running state includes that the vehicle cannot brake effectively, and the determining whether the vehicle running state has a potential safety hazard includes:
acquiring an emergency braking distance of the vehicle when the vehicle is in a braking action state within a preset running speed range;
and when the emergency braking distance of the vehicle is higher than a preset distance threshold value, determining that the running state of the vehicle has potential safety hazards.
Specifically, when the vehicle cannot be braked effectively in a high-speed running state, namely, the emergency braking distance does not meet the preset requirement, the vehicle braking system is indicated to have a fault, and further, the vehicle is indicated to have potential safety hazards (namely, the data request is a real requirement), and related vehicle data are required to be acquired in time for emergency rescue.
For example, the vehicle travel data includes vehicle position data, the request instruction includes a vehicle rescue data request instruction, and the acquiring the target vehicle data according to the request instruction includes:
Acquiring vehicle position data according to the vehicle rescue data request instruction,
Specifically, the external demand end of the vehicle can perform emergency rescue by acquiring vehicle running data such as vehicle position data after the data request and the judgment of the real demand.
S400, determining that the request instruction meets a preset target instruction, and acquiring a target vehicle data encryption packet according to the request instruction;
when the request instruction is determined to meet a preset target instruction, namely, the real requirement inside or outside the vehicle is met, a target vehicle data encryption packet is acquired according to the request instruction, when the request instruction is a vehicle user data request instruction, a first vehicle data encryption packet in the vehicle data cloud platform 120 is acquired, and when the request instruction is a vehicle driving data request instruction, a second vehicle data encryption packet in the vehicle data cloud platform 120 is acquired.
S500, decrypting the target vehicle data encryption packet and extracting target vehicle data according to the request instruction;
Extracting corresponding vehicle data after acquiring and decrypting the corresponding encrypted data packet, for example, extracting vehicle position data when the request instruction is a vehicle running data request instruction; and when the request instruction is a vehicle user data request instruction, extracting user heart rate data and pulse data.
S600, packaging and transmitting the target vehicle data and a preset hidden automatic clearing program to a data receiving end;
After the corresponding vehicle data are extracted, the corresponding target vehicle data and a preset hidden automatic clearing program are packaged and sent to a data receiving end, and because the hidden automatic clear program is automatically hidden and is not displayed, a user or lawless persons unconsciously deletes the clearing program, so that the related vehicle data can be cleared by the automatic clearing program at a proper time, and the safety of the vehicle data is further improved.
And S700, acquiring a vehicle data cleaning instruction, and triggering the automatic cleaning program to clean the target vehicle data.
In an embodiment, before the acquiring the vehicle data cleaning instruction and triggering the automatic cleaning program to clean the target vehicle data, the method further includes:
acquiring the application time length of the data demand end to the target vehicle data according to the request instruction;
and triggering a data cleaning instruction after the application duration is over.
Specifically, after the vehicle data is sent to the corresponding receiving end, the system starts an automatic clearing program according to the application duration of the related data so as to clear the data sent to the receiving end, so that the vehicle data received by the receiving end is prevented from being stored by a user for reuse, and the safety of the vehicle data is ensured, wherein the application duration can be preset according to requirements or experience.
Therefore, after the data request instruction is detected, whether the request instruction meets the preset target instruction is required to be judged, when the request instruction meets the preset target instruction, corresponding vehicle data is extracted from the cloud platform according to the request instruction, the method is used for preventing lawless persons from capturing the vehicle data in a random manner, and after the vehicle data application is finished, intelligent self-destruction operation is carried out on the corresponding vehicle data to prevent the vehicle data from freely circulating so as to influence the data safety, so that the vehicle data can be stored in a confidential manner to ensure the safety of the vehicle data, and related vehicle data can be extracted according to the safety requirement for reasonable use so as to improve the intelligent degree of the vehicle.
Referring to fig. 5, fig. 5 is a schematic hardware structure diagram of the vehicle data security management system according to the embodiment of the present application.
The vehicle data security management system 100 comprises a vehicle data storage unit 110, a vehicle data cloud platform 120 and an encryption and decryption unit 130, wherein the vehicle data storage unit 110 is used for temporarily storing vehicle data, the vehicle data cloud platform 120 is used for storing encrypted vehicle data, and the encryption and decryption unit 130 is used for encrypting and decrypting the vehicle data; the vehicle data security management system further includes a processor 101 and a memory 102.
Wherein the processor 101 is configured to provide computing and control capabilities to control the vehicle data security management system to perform corresponding tasks, for example, to control the vehicle data security management system to perform the vehicle data security management method of any of the method embodiments described above, the method comprising: acquiring vehicle data and classifying the vehicle data, wherein the vehicle data comprises first vehicle data and second vehicle data; the vehicle data are encrypted in real time, and the encrypted vehicle data are uploaded to a first vehicle data encryption packet and a second vehicle data encryption packet of a vehicle management service cloud platform respectively through the Internet of vehicles according to categories for confidential storage; responding to a request instruction sent by a data demand end to a vehicle data demand, and judging whether the request instruction meets a preset target instruction, wherein the preset target instruction is a target instruction for ensuring the safety of a user or enhancing the driving safety; determining that the request instruction meets a preset target instruction, and acquiring a target vehicle data encryption packet according to the request instruction; decrypting the target vehicle data encryption packet and extracting target vehicle data according to the request instruction; packaging and transmitting the target vehicle data and a preset hidden automatic clearing program to a data receiving end; and acquiring a vehicle data cleaning instruction, and triggering the automatic cleaning program to clean the target vehicle data.
The processor 101 may be a general-purpose processor including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), a hardware chip, or any combination thereof; it may also be a digital signal processor (DIGITAL SIGNAL Processing, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), programmable logic device (programmable logic device, PLD), or a combination thereof. The PLD may be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (FPGA) GATE ARRAY, generic array logic (GENERIC ARRAY logic, GAL), or any combination thereof.
The memory 102, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules corresponding to the vehicle data security management method in the embodiments of the present application. The processor 101 may implement the vehicle data security management method of any of the method embodiments described above by running non-transitory software programs, instructions, and modules stored in the memory 102.
Specifically, the memory 102 may include Volatile Memory (VM), such as random access memory (random access memory, RAM); the memory 102 may also include non-volatile memory (NVM), such as read-only memory (ROM), flash memory (flash memory), hard disk (HARD DISK DRIVE, HDD) or solid state disk (solid-state drive-STATE DRIVE, SSD) or other non-transitory solid state storage device; the memory 102 may also include a combination of the types of memory described above.
In summary, the vehicle data security management system of the present application adopts the technical solution of any one of the embodiments of the vehicle data security management method, so at least the technical solution of the foregoing embodiments has the beneficial effects, and will not be described in detail herein.
Embodiments of the present application also provide a computer-readable storage medium, such as a memory including program code executable by a processor to perform the vehicle data security management method of the above embodiments. For example, the computer readable storage medium may be Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), compact disc Read-Only Memory (CDROM), magnetic tape, floppy disk, optical data storage device, and the like.
Embodiments of the present application also provide a computer program product comprising one or more program codes stored in a computer-readable storage medium. The processor of the electronic device reads the program code from the computer-readable storage medium, and the processor executes the program code to complete the steps of the vehicle data security management method provided in the above-described embodiments.
It will be appreciated by those of ordinary skill in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by program code related hardware, where the program may be stored in a computer readable storage medium, where the storage medium may be a read only memory, a magnetic disk or optical disk, etc.
It should be noted that the above-described apparatus embodiments are merely illustrative, and the units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
From the above description of embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus a general purpose hardware platform, or may be implemented by hardware. Those skilled in the art will appreciate that all or part of the processes implementing the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and where the program may include processes implementing the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random-access Memory (Random Access Memory, RAM), or the like.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structural changes made by the description of the present invention and the accompanying drawings or direct/indirect application in other related technical fields are included in the scope of the invention.

Claims (10)

1. The vehicle data safety management method based on the internet of vehicles is applied to a vehicle data safety management system, and is characterized in that the vehicle data safety management system comprises a vehicle data storage unit, a vehicle data cloud platform and an encryption and decryption unit, and the method comprises the following steps:
Acquiring vehicle data and classifying the vehicle data, wherein the vehicle data comprises first vehicle data and second vehicle data;
The vehicle data are encrypted in real time, and the encrypted vehicle data are uploaded to a first vehicle data encryption packet and a second vehicle data encryption packet of a vehicle management service cloud platform respectively through the Internet of vehicles according to categories for confidential storage;
Responding to a request instruction sent by a data demand end to a vehicle data demand, and judging whether the request instruction meets a preset target instruction, wherein the preset target instruction is a target instruction for ensuring the safety of a user or enhancing the driving safety;
determining that the request instruction meets a preset target instruction, and acquiring a target vehicle data encryption packet according to the request instruction;
decrypting the target vehicle data encryption packet and extracting target vehicle data according to the request instruction;
packaging and transmitting the target vehicle data and a preset hidden automatic clearing program to a data receiving end;
and acquiring a vehicle data cleaning instruction, and triggering the automatic cleaning program to clean the target vehicle data.
2. The vehicle data security management method based on the internet of vehicles technology according to claim 1, wherein the first vehicle data includes vehicle user data, the data demand end includes a vehicle interior demand end, and the determining whether the request instruction meets a preset target instruction in response to a request instruction sent by the data demand end for vehicle data demand includes:
and responding to the demand of the vehicle interior demand end for the vehicle user data, and judging whether the request instruction meets a preset target instruction.
3. The vehicle data security management method based on the internet of vehicles technology according to claim 2, wherein the determining whether the request instruction satisfies a preset target instruction includes:
Acquiring a behavior state of a vehicle driving user;
Judging whether the obtained behavior state of the vehicle driving user has potential safety hazards or not;
When potential safety hazards exist in the behavior state of the vehicle driving user, determining that the request instruction meets a preset target instruction;
and when the behavior state of the vehicle driving user has no potential safety hazard, determining that the request instruction does not meet the preset target instruction.
4. The vehicle data security management method based on internet of vehicles technology according to claim 3, wherein the behavior state of the vehicle driving user includes a braking reaction speed in an emergency state, and the determining whether the acquired behavior state of the vehicle driving user has a potential safety hazard includes:
Acquiring the braking reaction speed of a vehicle driving user stepping on the braking equipment in a state that a fault object exists in a preset distance range in front of the vehicle;
and when the braking reaction speed is smaller than or equal to a preset threshold value, determining that the behavior state of the vehicle driving user has potential safety hazards.
5. The vehicle data security management method based on the internet of vehicles technology according to claim 2, wherein the vehicle user data includes face data, heart rate data, pulse data, the request instruction includes a fatigue verification data request instruction, and the acquiring the target vehicle data according to the request instruction includes:
And acquiring one or more of face data, heart rate data and pulse data according to the fatigue verification data request instruction so as to perform fatigue verification of the user according to the one or more of the face data, heart rate data and pulse data.
6. The vehicle data security management method based on the internet of vehicles technology according to claim 1, wherein the second vehicle data includes vehicle driving data, the data demand end includes a vehicle external demand end, and the determining whether the request instruction meets a preset target instruction in response to a request instruction sent by the data demand end for vehicle data demand includes:
And responding to the requirement of the vehicle external requirement end on the vehicle running data, and judging whether the request instruction meets a preset target instruction or not.
7. The vehicle data security management method based on the internet of vehicles technology according to claim 6, wherein the determining whether the request instruction satisfies a preset target instruction comprises:
Acquiring a running state of a vehicle;
Judging whether potential safety hazards exist in the running state of the vehicle or not;
When potential safety hazards exist in the running state of the vehicle, determining that the request instruction meets a preset target instruction;
When the potential safety hazard does not exist in the running state of the vehicle, determining that the request instruction does not meet the preset target instruction; and/or the number of the groups of groups,
The vehicle driving data comprises vehicle position data, the request instruction comprises a vehicle rescue data request instruction, and the acquiring of target vehicle data according to the request instruction comprises the following steps:
And acquiring vehicle position data according to the vehicle rescue data request instruction.
8. The vehicle data security management method based on the internet of vehicles technology according to claim 7, wherein the vehicle driving state includes that the vehicle cannot be braked effectively, and the judging whether the vehicle driving state has a potential safety hazard comprises:
acquiring an emergency braking distance of the vehicle when the vehicle is in a braking action state within a preset running speed range;
and when the emergency braking distance of the vehicle is higher than a preset distance threshold value, determining that the running state of the vehicle has potential safety hazards.
9. The vehicle data security management method based on internet of vehicles technology according to claim 1, wherein the acquiring the vehicle data cleaning instruction, before triggering the automatic cleaning program to clean the target vehicle data, further comprises:
acquiring the application time length of the data demand end to the target vehicle data according to the request instruction;
and triggering a data cleaning instruction after the application duration is over.
10. A vehicle data security management system, comprising: the system comprises a vehicle data storage unit, a vehicle data cloud platform, an encryption and decryption unit, a processor and a memory; wherein the vehicle data storage unit is configured to temporarily store vehicle data, the vehicle data cloud platform is configured to store encrypted vehicle data, the encryption and decryption unit is configured to encrypt and decrypt vehicle data, the memory is configured to store program code, and the processor is configured to invoke the program code to perform the method of any of claims 1 to 9.
CN202410150481.8A 2024-02-02 2024-02-02 Vehicle data safety management method and system based on Internet of vehicles technology Active CN117978502B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410150481.8A CN117978502B (en) 2024-02-02 2024-02-02 Vehicle data safety management method and system based on Internet of vehicles technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410150481.8A CN117978502B (en) 2024-02-02 2024-02-02 Vehicle data safety management method and system based on Internet of vehicles technology

Publications (2)

Publication Number Publication Date
CN117978502A CN117978502A (en) 2024-05-03
CN117978502B true CN117978502B (en) 2024-06-14

Family

ID=90849277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410150481.8A Active CN117978502B (en) 2024-02-02 2024-02-02 Vehicle data safety management method and system based on Internet of vehicles technology

Country Status (1)

Country Link
CN (1) CN117978502B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714344A (en) * 2018-12-28 2019-05-03 国汽(北京)智能网联汽车研究院有限公司 Intelligent network based on " end-pipe-cloud " joins automobile information security platform

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3096852B1 (en) * 2019-05-28 2021-06-18 Commissariat Energie Atomique CONFIDENTIAL VEHICLE DATA PROCESSING METHOD
CN111008394A (en) * 2019-10-15 2020-04-14 深圳市元征科技股份有限公司 Vehicle data management method, device, terminal equipment, server and storage medium
CN113076771A (en) * 2019-12-17 2021-07-06 深圳市优必选科技股份有限公司 Vehicle and vehicle management system and monitoring method thereof
CN112910883B (en) * 2021-01-28 2023-04-07 北京盛华聚龙科技有限公司 Data transmission method and device and electronic equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714344A (en) * 2018-12-28 2019-05-03 国汽(北京)智能网联汽车研究院有限公司 Intelligent network based on " end-pipe-cloud " joins automobile information security platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于车联网的隐私数据安全保护技术研究";万李等;《大众科技》;20231130;第25卷(第291期);全文 *

Also Published As

Publication number Publication date
CN117978502A (en) 2024-05-03

Similar Documents

Publication Publication Date Title
CN110494330B (en) Vehicle monitoring device, fraud detection server, and control method
JP7194184B2 (en) Systems and methods for connected vehicle cyber security
JP7236454B2 (en) Method and apparatus for controlling driverless vehicles
CN104916138B (en) The processing method of information of vehicles, system, mobile unit and server
JP7444777B2 (en) Information processing device, terminal device, information processing method, and information processing program
WO2018232866A1 (en) Method and device for rapid rescue of vehicle accident
CN108944799B (en) Vehicle driving behavior abnormity processing method and device
JP2008296682A (en) On-vehicle dangerous driving monitor, dangerous driving centralized supervisory system, and dangerous driving prevention system
CN103425731A (en) Traffic event data source identification, data collection and data storage
WO2023274071A1 (en) Driving behavior monitoring method and apparatus, electronic device, and storage medium
CN111301317A (en) Event generation method, event generation device and vehicle-mounted equipment
US20180086350A1 (en) Method for evaluating a driver assistance function of a motor vehicle
CN117978502B (en) Vehicle data safety management method and system based on Internet of vehicles technology
US11263837B2 (en) Automatic real-time detection of vehicular incidents
CN111985304A (en) Patrol alarm method, system, terminal equipment and storage medium
CN109308802A (en) Abnormal vehicles management method and device
CN110316201A (en) A kind of zig zag recognition methods, device, system
WO2022052754A1 (en) Driving behavior monitoring method and apparatus
CN116432911A (en) Data processing method, device and storage medium
CN108919679A (en) A kind of condition monitoring and processing method
CN112208475B (en) Safety protection system for vehicle occupants, vehicle and corresponding method and medium
CN114694368A (en) Vehicle management and control system
WO2022157538A1 (en) A method and system for determining a possible road safety violation
JP2005293032A (en) Vehicle operation state monitoring system and vehicle operation state monitoring program for this system
CN112839064A (en) Intelligent control method and device for vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant