CN111696352A - Traffic information processing method and device, electronic equipment and storage medium - Google Patents
Traffic information processing method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN111696352A CN111696352A CN202010526726.4A CN202010526726A CN111696352A CN 111696352 A CN111696352 A CN 111696352A CN 202010526726 A CN202010526726 A CN 202010526726A CN 111696352 A CN111696352 A CN 111696352A
- Authority
- CN
- China
- Prior art keywords
- traffic information
- traffic
- information
- participant
- safety detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/0104—Measuring and analyzing of parameters relative to traffic conditions
- G08G1/0108—Measuring and analyzing of parameters relative to traffic conditions based on the source of data
- G08G1/0116—Measuring and analyzing of parameters relative to traffic conditions based on the source of data from roadside infrastructure, e.g. beacons
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/29—Geographical information databases
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/0104—Measuring and analyzing of parameters relative to traffic conditions
- G08G1/0108—Measuring and analyzing of parameters relative to traffic conditions based on the source of data
- G08G1/012—Measuring and analyzing of parameters relative to traffic conditions based on the source of data from other sources than vehicle or roadside beacons, e.g. mobile networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Tourism & Hospitality (AREA)
- Computer Networks & Wireless Communication (AREA)
- Analytical Chemistry (AREA)
- Chemical & Material Sciences (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Primary Health Care (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Remote Sensing (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Traffic Control Systems (AREA)
Abstract
本申请公开了交通信息的处理方法、装置、电子设备及存储介质,涉及智能交通、云平台领域。具体实现方案为:对接收的信号进行解析,得到信号中承载的交通信息;根据交通信息查找预存的交通信息数据库,得到交通信息的安全性检测结果;在安全性检测结果为不安全的情况下,确定发出信号的交通参与者为异常交通参与者。通过上述方案,通过安全检测设备对交通信息的安全性进行检测。在检测结果为不安全的情况下,可以及时发现并进行处理,有效应对交通信息被攻击的风险。
The present application discloses a traffic information processing method, device, electronic device and storage medium, and relates to the fields of intelligent traffic and cloud platforms. The specific implementation scheme is: analyze the received signal to obtain the traffic information carried in the signal; search the pre-stored traffic information database according to the traffic information to obtain the safety detection result of the traffic information; when the safety detection result is unsafe , determine the traffic participant who sends the signal as an abnormal traffic participant. Through the above solution, the security of the traffic information is detected by the security detection device. When the detection result is unsafe, it can be detected and processed in time to effectively deal with the risk of traffic information being attacked.
Description
技术领域technical field
本申请涉及智能交通领域,尤其涉及交通信息的处理方法、装置、电子设备及存储介质。The present application relates to the field of intelligent transportation, and in particular, to a method, device, electronic device and storage medium for processing traffic information.
背景技术Background technique
车用无线通信(V2X,Vehicle to Everything)技术是基于蜂窝(Cellular)通信技术演进形成的。V2X实施在开放区域,因此极易遭受攻击。常见的攻击方式有以下情况:伪造路侧单元(RSU,Road Side Unit)和/或车载单元(OBU,On board Unit),发布虚假的V2X消息。入侵真实RSU和/或OBU,伪造并发布V2X消息。Vehicle wireless communication (V2X, Vehicle to Everything) technology is formed based on the evolution of cellular (Cellular) communication technology. V2X is implemented in open areas and is therefore highly vulnerable to attacks. Common attack methods include the following: forging roadside units (RSU, Road Side Unit) and/or on-board units (OBU, On board Unit), publishing false V2X messages. Hack real RSUs and/or OBUs, forge and publish V2X messages.
发明内容SUMMARY OF THE INVENTION
本申请提供了一种交通信息的处理方法、装置、设备以及存储介质。The present application provides a traffic information processing method, device, device and storage medium.
根据本申请的一方面,提供了一种交通信息的处理方法,包括:According to an aspect of the present application, a method for processing traffic information is provided, comprising:
对接收的信号进行解析,得到信号中承载的交通信息;Analyze the received signal to obtain the traffic information carried in the signal;
根据交通信息查找预存的交通信息数据库,得到交通信息的安全性检测结果;Search the pre-stored traffic information database according to the traffic information, and obtain the safety detection result of the traffic information;
在安全性检测结果为不安全的情况下,确定发出信号的交通参与者为异常交通参与者。In the case that the safety detection result is unsafe, it is determined that the traffic participant who sends the signal is an abnormal traffic participant.
通过上述方案,通过安全检测设备对交通信息的安全性进行检测。在检测结果为不安全的情况下,可以及时发现并进行处理,有效应对交通信息被攻击的风险。Through the above solution, the security of the traffic information is detected by the security detection device. When the detection result is unsafe, it can be detected and processed in time to effectively deal with the risk of traffic information being attacked.
根据本申请的第二方面,提供了一种交通信息的处理方法,包括:According to a second aspect of the present application, a method for processing traffic information is provided, comprising:
向安全检测设备发送交通信息数据库,交通信息数据库用于为交通信息的安全性检测提供参考数据;Send the traffic information database to the security detection equipment, and the traffic information database is used to provide reference data for the security detection of traffic information;
将接收到的异常交通参与者的信息发送至目标用户。Send the received information about the abnormal traffic participant to the target user.
根据本申请的第三方面,提供了一种交通信息的处理装置,包括:According to a third aspect of the present application, a device for processing traffic information is provided, comprising:
信号解析模块,用于对接收的信号进行解析,得到信号中承载的交通信息;The signal analysis module is used to analyze the received signal to obtain the traffic information carried in the signal;
安全性检测模块,用于根据交通信息查找预存的交通信息数据库,得到交通信息的安全性检测结果;The security detection module is used to search the pre-stored traffic information database according to the traffic information, and obtain the security detection result of the traffic information;
异常交通参与者确定模块,用于在安全性检测结果为不安全的情况下,确定发出信号的交通参与者为异常交通参与者。The abnormal traffic participant determination module is used for determining that the traffic participant who sends the signal is an abnormal traffic participant when the safety detection result is unsafe.
根据本申请的第四方面,提供了一种交通信息的处理装置,包括:According to a fourth aspect of the present application, a device for processing traffic information is provided, comprising:
交通信息数据库发送模块,用于向安全检测设备发送交通信息数据库,交通信息数据库用于为交通信息的安全性检测提供参考数据;The traffic information database sending module is used to send the traffic information database to the safety detection equipment, and the traffic information database is used to provide reference data for the security detection of the traffic information;
信息发送模块,用于将接收到的异常交通参与者的信息发送至目标用户。The information sending module is used for sending the received information of the abnormal traffic participant to the target user.
第五方面,本申请实施例提供一种电子设备,包括:In a fifth aspect, an embodiment of the present application provides an electronic device, including:
至少一个处理器;以及at least one processor; and
与至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein,
存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行本申请任意一项实施例所提供的方法。The memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor can execute the method provided by any one of the embodiments of the present application.
第六方面,本申请实施例提供一种存储有计算机指令的非瞬时计算机可读存储介质,计算机指令用于使计算机执行本申请任意一项实施例所提供的方法。In a sixth aspect, the embodiments of the present application provide a non-transitory computer-readable storage medium storing computer instructions, where the computer instructions are used to cause a computer to execute the method provided by any one of the embodiments of the present application.
应当理解,本部分所描述的内容并非旨在标识本申请的实施例的关键或重要特征,也不用于限制本申请的范围。本申请的其它特征将通过以下的说明书而变得容易理解。It should be understood that the content described in this section is not intended to identify key or critical features of the embodiments of the application, nor is it intended to limit the scope of the application. Other features of the present application will become readily understood from the following description.
附图说明Description of drawings
附图用于更好地理解本方案,不构成对本申请的限定。其中:The accompanying drawings are used for better understanding of the present solution, and do not constitute a limitation to the present application. in:
图1是根据本申请第一实施例的交通信息的处理方法的流程图;1 is a flowchart of a method for processing traffic information according to a first embodiment of the present application;
图2是根据本申请第一实施例的交通信息的处理场景示意图;FIG. 2 is a schematic diagram of a processing scenario of traffic information according to the first embodiment of the present application;
图3是根据本申请第一实施例的安全性检测过程的流程图;3 is a flowchart of a security detection process according to the first embodiment of the present application;
图4是根据本申请第一实施例的安全性检测过程的流程图;4 is a flowchart of a security detection process according to the first embodiment of the present application;
图5是根据本申请第一实施例的交通信息的处理方法的流程图;5 is a flowchart of a method for processing traffic information according to the first embodiment of the present application;
图6是根据本申请第二实施例的交通信息的处理方法的流程图;;6 is a flowchart of a method for processing traffic information according to a second embodiment of the present application;
图7是根据本申请第三实施例的交通信息的处理装置的示意图;FIG. 7 is a schematic diagram of an apparatus for processing traffic information according to a third embodiment of the present application;
图8是根据本申请第三实施例的安全性检测模块的示意图;8 is a schematic diagram of a security detection module according to a third embodiment of the present application;
图9是根据本申请第三实施例的安全性检测模块的示意图;9 is a schematic diagram of a security detection module according to a third embodiment of the present application;
图10是根据本申请第三实施例的交通信息的处理装置的示意图;FIG. 10 is a schematic diagram of an apparatus for processing traffic information according to a third embodiment of the present application;
图11是根据本申请第四实施例的交通信息的处理装置的示意图;FIG. 11 is a schematic diagram of an apparatus for processing traffic information according to a fourth embodiment of the present application;
图12是用来实现本申请实施例的交通信息的处理方法的电子设备的框图。FIG. 12 is a block diagram of an electronic device used to implement the traffic information processing method according to the embodiment of the present application.
具体实施方式Detailed ways
以下结合附图对本申请的示范性实施例做出说明,其中包括本申请实施例的各种细节以助于理解,应当将它们认为仅仅是示范性的。因此,本领域普通技术人员应当认识到,可以对这里描述的实施例做出各种改变和修改,而不会背离本申请的范围和精神。同样,为了清楚和简明,以下的描述中省略了对公知功能和结构的描述。Exemplary embodiments of the present application are described below with reference to the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and should be considered as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted from the following description for clarity and conciseness.
如图1所示,在一种实施方式中,提供一种交通信息的处理方法,包括:As shown in FIG. 1, in one embodiment, a method for processing traffic information is provided, including:
S101:对接收的信号进行解析,得到信号中承载的交通信息。S101: Analyze the received signal to obtain traffic information carried in the signal.
S102:根据交通信息查找预存的交通信息数据库,得到交通信息的安全性检测结果。S102: Search a pre-stored traffic information database according to the traffic information, and obtain a security detection result of the traffic information.
S103:在安全性检测结果为不安全的情况下,确定发出信号的交通参与者为异常交通参与者。S103: In the case that the safety detection result is unsafe, determine that the traffic participant who sends the signal is an abnormal traffic participant.
本实施例中上述方法可以在安全检测设备中执行。安全检测设备可以设置在路侧,也可以设置在巡检车辆中。In this embodiment, the above method may be executed in a security detection device. The safety detection device can be set on the roadside or in the patrol vehicle.
信号可以包括利用专用短程通信技术(DSRC,Dedicated Short RangeCommunication)、蜂窝链路通信技术(LTE-V-Cell)、短程直通链路通信技术(LTE-V-Direct)、5G通信技术等传输的车用无线通信(V2X,Vehicleto Everything)信号。Signals may include vehicles transmitted using dedicated short-range communication technology (DSRC, Dedicated Short Range Communication), cellular link communication technology (LTE-V-Cell), short-range direct link communication technology (LTE-V-Direct), 5G communication technology, etc. Use wireless communication (V2X, Vehicle to Everything) signal.
V2X信号中承载有交通参与者发送的交通信息。交通参与者可以包括车辆和路侧交通设备。Traffic information sent by traffic participants is carried in the V2X signal. Traffic participants may include vehicles and roadside traffic equipment.
其中,车辆发送的交通信息可以包括车辆的行驶信息,例如车速信息、车辆位置信息、车辆尺寸信息等不同类型的信息。The traffic information sent by the vehicle may include driving information of the vehicle, such as vehicle speed information, vehicle location information, vehicle size information and other different types of information.
路侧交通设备可以包括交通信号灯、路侧限速设备、停车计费设备等。路侧交通设备发送的交通信息可以包括红绿灯的状态、当前灯态的剩余时间、当前路段的限速信息等不同类型的信息。上述交通信息的类型可以依据《合作式智能运输系统车用通信系统应用层及应用数据交互标准》进行划分。Roadside traffic devices may include traffic lights, roadside speed limit devices, parking metering devices, and the like. The traffic information sent by the roadside traffic equipment may include different types of information, such as the status of traffic lights, the remaining time of the current light status, and speed limit information on the current road section. The types of the above traffic information can be divided according to the "Application Layer and Application Data Interaction Standard of the Vehicle Communication System of the Cooperative Intelligent Transportation System".
另外,在交通信息中,还可以包括交通参与者的序列号、证书序号等。证书可以是证书管理部分下发的,例如交管部门等权威机构等。每个合法证书都有其对应的证书序号。交通参与者可以利用证书对交通信息进行签名。In addition, the traffic information may also include the serial number of the traffic participant, the serial number of the certificate, and the like. The certificate can be issued by the certificate management department, such as the traffic control department and other authoritative organizations. Each legal certificate has its corresponding certificate serial number. Traffic participants can use certificates to sign traffic information.
在安全检测设备中可以存储有交通信息数据库,该交通信息数据库可以是从云端(服务器)下载的,也可以是预存的。该交通信息数据库存储各不同类型的交通信息的安全取值范围、数值变化量的安全取值范围、以及合法证书的证书序号等。例如,红绿灯的变化周期的安全取值范围为10秒至90秒之间,道路限速的安全取值范围为40km/h至120km/h之间,前后两次红绿灯的时间变化量的安全取值范围为1至5秒之间等。交通信息数据库用于为交通信息的安全性检测提供参考数据。A traffic information database may be stored in the safety detection device, and the traffic information database may be downloaded from the cloud (server) or pre-stored. The traffic information database stores the safe value range of different types of traffic information, the safe value range of the value change, and the certificate serial number of the legal certificate. For example, the safe value range of the change period of the traffic lights is between 10 seconds and 90 seconds, the safe value range of the road speed limit is between 40km/h and 120km/h, and the safe value of the time change of the two traffic lights before and after. Values range from 1 to 5 seconds, etc. The traffic information database is used to provide reference data for the safety detection of traffic information.
安全检测设备对接收的信号进行解析,可以得到信号中承载的交通信息。安全检测设备根据解析出的不同类型的信息,在交通信息数据库中进行查询,从而进行安全性检测。The safety detection equipment analyzes the received signal, and can obtain the traffic information carried in the signal. The security detection device searches the traffic information database according to the different types of information parsed, so as to perform security detection.
结合图2所示的应用场景。路侧交通设备包括限速设备和交通信号灯。安全检测设备可以设置于路侧或设置于巡检车辆中,从而对路侧交通设备和在道路上行驶的车辆发出的信号进行检测。Combined with the application scenario shown in Figure 2. Roadside traffic equipment includes speed limiters and traffic lights. The safety detection device can be installed on the roadside or in the patrol vehicle, so as to detect the signals sent by the roadside traffic device and the vehicle running on the road.
以限速设备为例,限速设备广播限速信号,该信号中包含有该限速设备的序列号、证书序号、交通信息类型(限速)和关键字段对应的数据(限速数据)等信息。例如,在限速设备广播的信息为40km/h至120km/h之间的情况下,则可以确认限速设备通过安全性检测。而当限速数据不在40km/h至120km/h之间的情况下,例如限速设备广播的信息为200km/h,或者5km/h,可以确认该限速设备为异常交通参与者。异常交通参与者可以包括该限速设备可能已经被黑客攻击,或者该限速设备是一个伪造的设备等。Taking a speed-limiting device as an example, the speed-limiting device broadcasts a speed-limiting signal, which contains the serial number, certificate serial number, traffic information type (speed-limiting) and data corresponding to key fields (speed-limiting data) of the speed-limiting device. and other information. For example, when the information broadcast by the speed-limiting device is between 40km/h and 120km/h, it can be confirmed that the speed-limiting device has passed the safety test. When the speed limit data is not between 40km/h and 120km/h, for example, the information broadcast by the speed limit device is 200km/h or 5km/h, it can be confirmed that the speed limit device is an abnormal traffic participant. Abnormal traffic participants may include that the speed limiting device may have been hacked, or that the speed limiting device is a fake device, etc.
另外,还可以通过检测证书序号有效性的方式确认该限速设备是否为异常交通参与者。例如,交通信息数据库中存储合法证书序号。安全检测设备可以从交通信息中获取到证书序号。利用合法证书序号可以对获取到的证书序号进行验证,从而确定该限速设备是否为异常交通参与者。In addition, whether the speed-limiting device is an abnormal traffic participant can also be confirmed by checking the validity of the certificate serial number. For example, the legal certificate serial number is stored in the traffic information database. The security detection equipment can obtain the certificate serial number from the traffic information. The obtained certificate serial number can be verified by using the legal certificate serial number, so as to determine whether the speed-limiting device is an abnormal traffic participant.
通过上述方案,通过安全检测设备对交通信息的安全性进行检测。在检测结果为不安全的情况下,可以及时发现并进行处理,有效应对交通信息被攻击的风险。Through the above solution, the security of the traffic information is detected by the security detection device. When the detection result is unsafe, it can be detected and processed in time to effectively deal with the risk of traffic information being attacked.
如图3所示,在一种实施方式中,步骤S102包括:As shown in FIG. 3, in one embodiment, step S102 includes:
S1021:提取交通信息的关键字段,以及与关键字段对应的第一数值。S1021: Extract key fields of the traffic information and first numerical values corresponding to the key fields.
S1022:在交通信息数据库中获取关键字段所对应的第一数值的安全取值范围。S1022: Acquire the safe value range of the first value corresponding to the key field in the traffic information database.
S1023:在第一数值超过第一数值的安全取值范围的情况下,确定安全性检测结果为不安全。S1023: In the case that the first numerical value exceeds the safe value range of the first numerical value, determine that the safety detection result is unsafe.
可以利用语义识别等技术提取交通信息中的关键字段。例如“限速”、“当前车速”等。Key fields in traffic information can be extracted using techniques such as semantic recognition. For example, "speed limit", "current vehicle speed", etc.
每一个关键字段均可以对应一个数值,即第一数值。例如:关键字段为“当前车速”,对应的第一数值为200km/h。Each key field may correspond to a numerical value, that is, the first numerical value. For example: the key field is "current vehicle speed", and the corresponding first value is 200km/h.
根据关键字段,在交通信息数据库中进行查询,以获取车速所对应的第一数值的安全取值范围。例如,在交通信息数据库中记录了车速的安全取值范围为60km/h~120km/h。需要确认第一数值200km/h是否在安全取值范围内。在上述实施例中,可以确定发出包含当前车速为200km/h的交通参与者为异常交通参与者。According to the key field, the traffic information database is queried to obtain the safe value range of the first value corresponding to the vehicle speed. For example, the safe value range of the vehicle speed recorded in the traffic information database is 60km/h~120km/h. It is necessary to confirm whether the first value of 200km/h is within the safe value range. In the above-mentioned embodiment, it can be determined that the traffic participant whose current vehicle speed is 200 km/h is an abnormal traffic participant.
再例如,关键字段为“红灯时长”,对应的数值为35秒。For another example, the key field is "red light duration", and the corresponding value is 35 seconds.
根据关键字段,在交通信息数据库中进行查询,以获取红灯时长所对应的数值的安全取值范围。例如,在交通信息数据库中记录了红灯时长的安全取值范围为30秒~90秒。需要确认35是否在安全取值范围内。在上述实施例中,可以确定发出包含红灯时长为35秒的交通信号灯为安全。According to the key field, the traffic information database is queried to obtain the safe value range of the value corresponding to the red light duration. For example, the safe value range of the duration of the red light recorded in the traffic information database is 30 seconds to 90 seconds. It is necessary to confirm whether 35 is within the safe value range. In the above embodiment, it may be determined that it is safe to issue a traffic signal including a red light for a duration of 35 seconds.
通过上述方案,利用交通信息中的关键字段所对应的第一数值对安全性进行判断,如果超出安全范围即可确定被攻击。由此,即便攻击者使用了真实的证书,可会因为其交通信息中的数值范围超标而识别出不安全。Through the above solution, the security is judged by using the first value corresponding to the key field in the traffic information, and if it exceeds the security range, it can be determined to be attacked. As a result, even if an attacker uses a real certificate, he or she can be identified as insecure because the range of values in their traffic information exceeds the limit.
如图4所示,在一种实施方式中,在信号为多次接收的信号的情况下,步骤S102还包括:As shown in FIG. 4 , in an embodiment, in the case that the signal is a signal received multiple times, step S102 further includes:
S1024:确定由相邻两次接收的信号解析得到的交通信息中的第一数值的变化量。S1024: Determine the amount of change of the first value in the traffic information obtained by analyzing the two adjacent signals received.
S1025:在交通信息数据库中获取变化量的安全取值范围。S1025: Obtain the safe value range of the variation in the traffic information database.
S1026:在变化量超过变化量的安全取值范围的情况下,确定安全性检测结果为不安全。S1026: In the case that the change amount exceeds the safe value range of the change amount, determine that the safety detection result is unsafe.
车用无线通信信号可以是连续的信号,例如交通信号灯会不间断的连续广播信号,示例性的,可以每间隔1秒广播1次。The wireless communication signal for the vehicle may be a continuous signal, for example, a traffic signal will continuously broadcast the signal continuously, for example, it may broadcast once every 1 second.
因此,安全检测设备可以多次接收到车用无线通信信号。从每次接收到的信号中可以解析出关键字段以及与其对应的第一数值。例如,关键字段是“红灯时长”,相邻两次接收的信号中解析并提取出的第一数值分别是35秒、10秒。由此可以确定出相邻两次第一数值的变化量为25秒。Therefore, the safety detection device can receive the vehicle wireless communication signal many times. The key field and the corresponding first value can be parsed from each received signal. For example, the key field is "red light duration", and the first value parsed and extracted from two adjacent received signals is 35 seconds and 10 seconds, respectively. From this, it can be determined that the amount of change of the first value for two consecutive times is 25 seconds.
根据关键字段,在交通信息数据库中进行查询,以获取红灯时长变化量所对应的安全取值范围。例如,红灯时长变化量所对应的安全取值范围为1秒~5秒。在变化量超过安全取值范围的情况下,确定安全性检测结果为不安全,即确定该交通信号灯为异常交通参与者。According to the key fields, the traffic information database is queried to obtain the safe value range corresponding to the change in the duration of the red light. For example, the safe value range corresponding to the change in the duration of the red light is 1 second to 5 seconds. In the case that the variation exceeds the safe value range, it is determined that the safety detection result is unsafe, that is, the traffic signal is determined to be an abnormal traffic participant.
通过上述方案,即便第一数值在安全取值范围内,当其发生突变的情况下,也可以确定被攻击。Through the above solution, even if the first value is within the safe value range, it can be determined to be attacked when it mutates.
如图5所示,在一种实施方式中,上述方法还包括:As shown in Figure 5, in one embodiment, the above method further includes:
S1011:从交通信息中获取证书信息。S1011: Acquire certificate information from traffic information.
S1012:根据证书信息确定发出信号的交通参与者。S1012: Determine the traffic participant who sends the signal according to the certificate information.
S1013:在交通参与者为异常交通参与者的情况下,上报异常交通参与者的信息。S1013: In the case that the traffic participant is an abnormal traffic participant, report the information of the abnormal traffic participant.
安全检测设备接收到信号后,可以通过解析信号得到交通信息。交通信息可以是通过证书签字的信息,因此对交通信息进行正确验签后,可以得到证书序号。利用交通信息数据库中存储合法证书序号可以对进行正确验签后得到的证书序号进行验证。另外,证书信息还可以是证书明文、证书密码等。After the safety detection device receives the signal, it can obtain the traffic information by analyzing the signal. The traffic information can be the information signed by the certificate, so after the traffic information is correctly signed, the certificate serial number can be obtained. The certificate serial number obtained after correct signature verification can be verified by using the legal certificate serial number stored in the traffic information database. In addition, the certificate information may also be certificate plaintext, certificate password, and the like.
根据证书序号可以确定发出信号的交通参与者。合法证书序号是权威机构下发给交通参与者的,通过证书序号可以确定出发出信号的交通参与者。在安全性检测结果为不安全的情况下,确定为异常交通参与者。The signalling traffic participant can be identified on the basis of the certificate serial number. The legal certificate serial number is issued by the authority to the traffic participants, and the traffic participant who sends the signal can be determined through the certificate serial number. When the safety detection result is unsafe, it is determined to be an abnormal traffic participant.
将发出信号的异常交通参与者的相关信息发送给云端(服务器)。相关信息可以是证书序号、序列号等。后续可以由云端(服务器)异常交通参与者进行处理,例如上报至证书签发机构,以取消其证书,或者向其他交通参与者进行预警广播等。Send the information about the abnormal traffic participants who signaled to the cloud (server). The relevant information can be certificate serial number, serial number, etc. Subsequent processing can be performed by the cloud (server) abnormal traffic participants, such as reporting to the certificate issuing authority to cancel their certificates, or broadcasting warnings to other traffic participants.
通过上述方式,利用证书信息可以锁定出不安全的设备,从而便于后续对该设备的处理。In the above manner, an insecure device can be locked out by using the certificate information, thereby facilitating subsequent processing of the device.
如图6所示,本申请提供一种交通信息的处理方法,包括以下步骤:As shown in Figure 6, the present application provides a method for processing traffic information, comprising the following steps:
S601:向安全检测设备发送交通信息数据库,交通信息数据库用于为交通信息的安全性检测提供参考数据。S601: Send a traffic information database to a security detection device, where the traffic information database is used to provide reference data for security detection of traffic information.
S602:将接收到的异常交通参与者的信息发送至目标用户。S602: Send the received information of the abnormal traffic participant to the target user.
上述步骤可以由云端(服务器)执行。云端(服务器)定期向安全检测设备发送交通信息数据库,例如可以以数据更新的幅度作为触发定期发送的条件。交通信息数据库存储各不同类型的交通信息所对应的第一数据的安全取值范围、相邻两次第一数据变化量的安全取值范围、以及合法证书的证书序号等。用于为交通信息的安全性检测提供参考数据。The above steps can be performed by the cloud (server). The cloud (server) periodically sends the traffic information database to the security detection device, for example, the range of data update can be used as a condition for triggering the regular sending. The traffic information database stores the safe value range of the first data corresponding to different types of traffic information, the safe value range of the first data variation in two consecutive times, and the certificate serial number of the legal certificate. It is used to provide reference data for the security detection of traffic information.
当安全检测设备确定出异常交通参与者后,会将异常交通参与者的信息上报。由此云端(服务器)可以获取到异常交通参与者的信息。例如可以是证书序号、序列号等。When the safety detection device determines the abnormal traffic participant, it will report the information of the abnormal traffic participant. From this, the cloud (server) can obtain the information of the abnormal traffic participants. For example, it can be a certificate serial number, a serial number, and the like.
云端(服务器)可以将接收到的异常交通参与者的信息发送至目标用户。目标用户可以是其他交通参与者,例如异常交通参与者附近的车辆,告知上述车辆存在异常交通参与者。或者,目标用户也可以是证书管理机构,从而使证书签发机构将异常交通参与者的证书进行无效处理。The cloud (server) can send the received information of abnormal traffic participants to the target user. The target user may be other traffic participants, such as vehicles near the abnormal traffic participants, and the above vehicles are informed that there are abnormal traffic participants. Alternatively, the target user may also be a certificate authority, so that the certificate issuing authority invalidates the certificate of the abnormal traffic participant.
通过上述方案,利用交通信息确定出异常交通参与者后,可以对其进行及时处理。有效应对交通信息被攻击的风险。Through the above solution, after the abnormal traffic participants are determined by using the traffic information, they can be dealt with in time. Effectively deal with the risk of traffic information being attacked.
在一种实施方式中,步骤S602包括:In one embodiment, step S602 includes:
将异常交通参与者的信息发送至证书管理机构和/或正常交通参与者。Send information about abnormal traffic participants to the certificate authority and/or normal traffic participants.
如图7所示,本申请提供一种交通信息的处理装置,包括:As shown in FIG. 7 , the present application provides a traffic information processing device, including:
信号解析模块701,用于对接收的信号进行解析,得到信号中承载的交通信息。The
安全性检测模块702,用于根据交通信息查找预存的交通信息数据库,得到交通信息的安全性检测结果。The
异常交通参与者确定模块703,用于在安全性检测结果为不安全的情况下,确定发出信号的交通参与者为异常交通参与者。The abnormal traffic
如图8所示,在一种实施方式中,安全性检测模块702,包括:As shown in FIG. 8, in one embodiment, the
信息提取子模块7021,用于提取交通信息的关键字段,以及与关键字段对应的第一数值。The
第一安全取值范围获取子模块7022,用于在交通信息数据库中获取关键字段所对应的第一数值的安全取值范围。The first safe value range obtaining sub-module 7022 is configured to obtain the safe value range of the first value corresponding to the key field in the traffic information database.
第一安全性检测子模块7023,用于在第一数值超过第一数值的安全取值范围的情况下,确定安全性检测结果为不安全。The first
如图9所示,在一种实施方式中,安全性检测模块702,还包括:As shown in FIG. 9, in one embodiment, the
变化量确定子模块7024,用于确定由相邻两次接收的信号解析得到的交通信息中的第一数值的变化量。The change
第二安全取值范围获取子模块7025,用于在交通信息数据库中获取变化量的安全取值范围。The second safe value range obtaining sub-module 7025 is configured to obtain the safe value range of the variation in the traffic information database.
第二安全性检测子模块7026,用于在变化量超过变化量的安全取值范围的情况下,确定安全性检测结果为不安全。The second
如图10所示,在一种实施方式中,交通信息的处理装置还包括:As shown in FIG. 10, in one embodiment, the apparatus for processing traffic information further includes:
证书信息获取模块704,用于从交通信息中获取证书信息。The certificate
交通参与者确定模块705,用于根据证书信息确定发出信号的交通参与者。The traffic
信息上报模块706,用于在交通参与者为异常交通参与者的情况下,上报异常交通参的信息。The
如图11所示,本申请提供一种交通信息的处理装置,包括:As shown in FIG. 11 , the present application provides a traffic information processing device, including:
交通信息数据库发送模块1101,用于向安全检测设备发送交通信息数据库,交通信息数据库用于为交通信息的安全性检测提供参考数据。The traffic information
信息发送模块1102,用于将接收到的异常交通参与者的信息发送至目标用户。The
在一种实施方式中,信息发送模块1102,包括:In one embodiment, the
信息发送模块执行子模块,用于将异常交通参与者的信息发送至证书管理机构和/或正常交通参与者。The information sending module executes a sub-module for sending the information of the abnormal traffic participant to the certificate authority and/or the normal traffic participant.
根据本申请的实施例,本申请还提供了一种电子设备和一种可读存储介质。According to the embodiments of the present application, the present application further provides an electronic device and a readable storage medium.
如图12所示,是根据本申请实施例的交通信息的处理方法的电子设备的框图。电子设备旨在表示各种形式的数字计算机,诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。电子设备还可以表示各种形式的移动装置,诸如,个人数字处理、蜂窝电话、智能电话、可穿戴设备和其它类似的计算装置。本文所示的部件、它们的连接和关系、以及它们的功能仅仅作为示例,并且不意在限制本文中描述的和/或者要求的本申请的实现。As shown in FIG. 12 , it is a block diagram of an electronic device of the traffic information processing method according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers. Electronic devices may also represent various forms of mobile devices, such as personal digital processors, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions are by way of example only, and are not intended to limit implementations of the application described and/or claimed herein.
如图12所示,该电子设备包括:一个或多个处理器1210、存储器1220,以及用于连接各部件的接口,包括高速接口和低速接口。各个部件利用不同的总线互相连接,并且可以被安装在公共主板上或者根据需要以其它方式安装。处理器可以对在电子设备内执行的指令进行处理,包括存储在存储器中或者存储器上以在外部输入/输出装置(诸如,耦合至接口的显示设备)上显示GUI的图形信息的指令。在其它实施方式中,若需要,可以将多个处理器和/或多条总线与多个存储器和多个存储器一起使用。同样,可以连接多个电子设备,各个设备提供部分必要的操作(例如,作为服务器阵列、一组刀片式服务器、或者多处理器系统)。图12中以一个处理器1210为例。As shown in FIG. 12, the electronic device includes: one or
存储器1220即为本申请所提供的非瞬时计算机可读存储介质。其中,所述存储器存储有可由至少一个处理器执行的指令,以使所述至少一个处理器执行本申请所提供的交通信息的处理方法。本申请的非瞬时计算机可读存储介质存储计算机指令,该计算机指令用于使计算机执行本申请所提供的交通信息的处理方法。The
存储器1220作为一种非瞬时计算机可读存储介质,可用于存储非瞬时软件程序、非瞬时计算机可执行程序以及模块,如本申请实施例中的交通信息的处理方法对应的程序指令/模块(例如,附图7所示的信号解析模块701、安全性检测模块702和异常交通参与者确定模块703,或者附图11所示的交通信息数据库发送模块1101和信息发送模块1102)。处理器1210通过运行存储在存储器1220中的非瞬时软件程序、指令以及模块,从而执行服务器的各种功能应用以及数据处理,即实现上述方法实施例中的交通信息的处理方法。As a non-transitory computer-readable storage medium, the
存储器1220可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据交通信息的处理方法的电子设备的使用所创建的数据等。此外,存储器1220可以包括高速随机存取存储器,还可以包括非瞬时存储器,例如至少一个磁盘存储器件、闪存器件、或其他非瞬时固态存储器件。在一些实施例中,存储器1220可选包括相对于处理器1210远程设置的存储器,这些远程存储器可以通过网络连接至交通信息的处理方法的电子设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The
交通信息的处理方法的电子设备还可以包括:输入装置1230和输出装置1240。处理器1210、存储器1220、输入装置1230和输出装置1240可以通过总线或者其他方式连接,图12中以通过总线连接为例。The electronic device of the traffic information processing method may further include: an
输入装置1230可接收输入的数字或字符信息,以及产生与交通信息的处理方法的电子设备的用户设置以及功能控制有关的键信号输入,例如触摸屏、小键盘、鼠标、轨迹板、触摸板、指示杆、一个或者多个鼠标按钮、轨迹球、操纵杆等输入装置。输出装置1240可以包括显示设备、辅助照明装置(例如,LED)和触觉反馈装置(例如,振动电机)等。该显示设备可以包括但不限于,液晶显示器(LCD)、发光二极管(LED)显示器和等离子体显示器。在一些实施方式中,显示设备可以是触摸屏。The
此处描述的系统和技术的各种实施方式可以在数字电子电路系统、集成电路系统、专用ASIC(专用集成电路)、计算机硬件、固件、软件、和/或它们的组合中实现。这些各种实施方式可以包括:实施在一个或者多个计算机程序中,该一个或者多个计算机程序可在包括至少一个可编程处理器的可编程系统上执行和/或解释,该可编程处理器可以是专用或者通用可编程处理器,可以从存储系统、至少一个输入装置、和至少一个输出装置接收数据和指令,并且将数据和指令传输至该存储系统、该至少一个输入装置、和该至少一个输出装置。Various implementations of the systems and techniques described herein can be implemented in digital electronic circuitry, integrated circuit systems, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include being implemented in one or more computer programs executable and/or interpretable on a programmable system including at least one programmable processor that The processor, which may be a special purpose or general-purpose programmable processor, may receive data and instructions from a storage system, at least one input device, and at least one output device, and transmit data and instructions to the storage system, the at least one input device, and the at least one output device an output device.
这些计算程序(也称作程序、软件、软件应用、或者代码)包括可编程处理器的机器指令,并且可以利用高级过程和/或面向对象的编程语言、和/或汇编/机器语言来实施这些计算程序。如本文使用的,术语“机器可读介质”和“计算机可读介质”指的是用于将机器指令和/或数据提供给可编程处理器的任何计算机程序产品、设备、和/或装置(例如,磁盘、光盘、存储器、可编程逻辑装置(PLD)),包括,接收作为机器可读信号的机器指令的机器可读介质。术语“机器可读信号”指的是用于将机器指令和/或数据提供给可编程处理器的任何信号。These computational programs (also referred to as programs, software, software applications, or codes) include machine instructions for programmable processors, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages calculation program. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or apparatus for providing machine instructions and/or data to a programmable processor ( For example, magnetic disks, optical disks, memories, programmable logic devices (PLDs), including machine-readable media that receive machine instructions as machine-readable signals. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
为了提供与用户的交互,可以在计算机上实施此处描述的系统和技术,该计算机具有:用于向用户显示信息的显示装置(例如,CRT(阴极射线管)或者LCD(液晶显示器)监视器);以及键盘和指向装置(例如,鼠标或者轨迹球),用户可以通过该键盘和该指向装置来将输入提供给计算机。其它种类的装置还可以用于提供与用户的交互;例如,提供给用户的反馈可以是任何形式的传感反馈(例如,视觉反馈、听觉反馈、或者触觉反馈);并且可以用任何形式(包括声输入、语音输入或者、触觉输入)来接收来自用户的输入。To provide interaction with a user, the systems and techniques described herein may be implemented on a computer having a display device (eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user ); and a keyboard and pointing device (eg, a mouse or trackball) through which a user can provide input to the computer. Other kinds of devices can also be used to provide interaction with the user; for example, the feedback provided to the user can be any form of sensory feedback (eg, visual feedback, auditory feedback, or tactile feedback); and can be in any form (including acoustic input, voice input, or tactile input) to receive input from the user.
可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:局域网(LAN)、广域网(WAN)和互联网。The systems and techniques described herein may be implemented on a computing system that includes back-end components (eg, as a data server), or a computing system that includes middleware components (eg, an application server), or a computing system that includes front-end components (eg, a user's computer having a graphical user interface or web browser through which a user may interact with implementations of the systems and techniques described herein), or including such backend components, middleware components, Or any combination of front-end components in a computing system. The components of the system may be interconnected by any form or medium of digital data communication (eg, a communication network). Examples of communication networks include: Local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
计算机系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。A computer system can include clients and servers. Clients and servers are generally remote from each other and usually interact through a communication network. The relationship of client and server arises by computer programs running on the respective computers and having a client-server relationship to each other.
应该理解,可以使用上面所示的各种形式的流程,重新排序、增加或删除步骤。例如,本申请中记载的各步骤可以并行地执行也可以顺序地执行也可以不同的次序执行,只要能够实现本申请公开的技术方案所期望的结果,本文在此不进行限制。It should be understood that steps may be reordered, added or deleted using the various forms of flow shown above. For example, the steps described in the present application can be executed in parallel, sequentially or in different orders, as long as the desired results of the technical solutions disclosed in the present application can be achieved, no limitation is imposed herein.
上述具体实施方式,并不构成对本申请保护范围的限制。本领域技术人员应该明白的是,根据设计要求和其他因素,可以进行各种修改、组合、子组合和替代。任何在本申请的精神和原则之内所作的修改、等同替换和改进等,均应包含在本申请保护范围之内。The above-mentioned specific embodiments do not constitute a limitation on the protection scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may occur depending on design requirements and other factors. Any modifications, equivalent replacements and improvements made within the spirit and principles of this application shall be included within the protection scope of this application.
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010526726.4A CN111696352A (en) | 2020-06-09 | 2020-06-09 | Traffic information processing method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010526726.4A CN111696352A (en) | 2020-06-09 | 2020-06-09 | Traffic information processing method and device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111696352A true CN111696352A (en) | 2020-09-22 |
Family
ID=72480324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010526726.4A Pending CN111696352A (en) | 2020-06-09 | 2020-06-09 | Traffic information processing method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111696352A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112907949A (en) * | 2021-01-20 | 2021-06-04 | 北京百度网讯科技有限公司 | Traffic anomaly detection method, model training method and device |
CN114040406A (en) * | 2021-10-27 | 2022-02-11 | 海信集团控股股份有限公司 | Abnormal information detection method and device for vehicle-mounted equipment |
CN115185802A (en) * | 2022-07-22 | 2022-10-14 | 中国工商银行股份有限公司 | Linkage assessment method, linkage assessment device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102202047A (en) * | 2010-03-24 | 2011-09-28 | 通用汽车环球科技运作有限责任公司 | Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period |
US20110238987A1 (en) * | 2010-03-24 | 2011-09-29 | Gm Global Technology Operations, Inc. | Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes |
CN110139278A (en) * | 2019-05-20 | 2019-08-16 | 西安安盟智能科技股份有限公司 | The system and method for safety-type defence conspiracy attack under car networking |
CN110996300A (en) * | 2019-11-12 | 2020-04-10 | 北京航空航天大学 | Vehicle-mounted terminal information safety risk control method based on traffic scene safety |
CN111200799A (en) * | 2018-11-20 | 2020-05-26 | 华为技术有限公司 | A method, device and system for detecting abnormal behavior of Internet of Vehicles |
-
2020
- 2020-06-09 CN CN202010526726.4A patent/CN111696352A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102202047A (en) * | 2010-03-24 | 2011-09-28 | 通用汽车环球科技运作有限责任公司 | Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period |
US20110238987A1 (en) * | 2010-03-24 | 2011-09-29 | Gm Global Technology Operations, Inc. | Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes |
CN111200799A (en) * | 2018-11-20 | 2020-05-26 | 华为技术有限公司 | A method, device and system for detecting abnormal behavior of Internet of Vehicles |
CN110139278A (en) * | 2019-05-20 | 2019-08-16 | 西安安盟智能科技股份有限公司 | The system and method for safety-type defence conspiracy attack under car networking |
CN110996300A (en) * | 2019-11-12 | 2020-04-10 | 北京航空航天大学 | Vehicle-mounted terminal information safety risk control method based on traffic scene safety |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112907949A (en) * | 2021-01-20 | 2021-06-04 | 北京百度网讯科技有限公司 | Traffic anomaly detection method, model training method and device |
CN114040406A (en) * | 2021-10-27 | 2022-02-11 | 海信集团控股股份有限公司 | Abnormal information detection method and device for vehicle-mounted equipment |
CN114040406B (en) * | 2021-10-27 | 2024-04-26 | 海信集团控股股份有限公司 | Abnormal information detection method and device for vehicle-mounted equipment |
CN115185802A (en) * | 2022-07-22 | 2022-10-14 | 中国工商银行股份有限公司 | Linkage assessment method, linkage assessment device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101752251B1 (en) | Method and device for identificating a file | |
US10114934B2 (en) | Calculating consecutive matches using parallel computing | |
CN112735124B (en) | Traffic data analysis method, device, equipment, vehicle and storage medium | |
US8819807B2 (en) | Apparatus and method for analyzing and monitoring sap application traffic, and information protection system using the same | |
CN111696352A (en) | Traffic information processing method and device, electronic equipment and storage medium | |
CN104539514B (en) | Information filtering method and device | |
EP3174264A1 (en) | Apparatus and method for automatically generating detection rule | |
CN107911232B (en) | Method and device for determining business operation rule | |
CN110572399B (en) | Vulnerability detection processing method, device, equipment and storage medium | |
US11956264B2 (en) | Method and system for verifying validity of detection result | |
US10454967B1 (en) | Clustering computer security attacks by threat actor based on attack features | |
EP3684025B1 (en) | Web page request identification | |
CN110110160B (en) | Method and device for determining data exception | |
CN111711617A (en) | Method and device for detecting web crawler, electronic equipment and storage medium | |
CN108933781B (en) | Method, apparatus and computer-readable storage medium for processing character string | |
EP4086124A2 (en) | Vehicle security check method, system and apparatus, device and storage medium | |
CN112035587A (en) | Method, device, device and medium for checking traffic rules based on trajectory data | |
CN114238361A (en) | Map network data updating method and device, electronic equipment and storage medium | |
CN111681428B (en) | Overflow detection method and device, electronic equipment and storage medium | |
CN108804501A (en) | A kind of method and device of detection effective information | |
CN114661683A (en) | Log information processing method, apparatus, device, medium, and autonomous vehicle | |
CN119155128A (en) | Method and device for detecting encryption tunnel communication of financial cloud data center | |
EP3734568A1 (en) | Data extraction method and device | |
US9379897B1 (en) | Method and apparatus for providing an interactive hierarchical entitlement map | |
CN110782114B (en) | Driving behavior mining method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20211013 Address after: 100176 Room 101, 1st floor, building 1, yard 7, Ruihe West 2nd Road, economic and Technological Development Zone, Daxing District, Beijing Applicant after: Apollo Intelligent Connectivity (Beijing) Technology Co., Ltd. Address before: 2 / F, baidu building, 10 Shangdi 10th Street, Haidian District, Beijing 100085 Applicant before: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200922 |