[go: up one dir, main page]

CN120552791A - An intelligent automobile anti-theft alarm device - Google Patents

An intelligent automobile anti-theft alarm device

Info

Publication number
CN120552791A
CN120552791A CN202511079656.1A CN202511079656A CN120552791A CN 120552791 A CN120552791 A CN 120552791A CN 202511079656 A CN202511079656 A CN 202511079656A CN 120552791 A CN120552791 A CN 120552791A
Authority
CN
China
Prior art keywords
unit
theft
vehicle
module
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202511079656.1A
Other languages
Chinese (zh)
Other versions
CN120552791B (en
Inventor
陈振
唐彬
刘智江
谢源
杨棱
邬元林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Chexiao Technology Co ltd
Original Assignee
Chengdu Chexiao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Chexiao Technology Co ltd filed Critical Chengdu Chexiao Technology Co ltd
Priority to CN202511079656.1A priority Critical patent/CN120552791B/en
Publication of CN120552791A publication Critical patent/CN120552791A/en
Application granted granted Critical
Publication of CN120552791B publication Critical patent/CN120552791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/246Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user characterised by the challenge triggering
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/305Detection related to theft or to other events relevant to anti-theft systems using a camera

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention relates to an intelligent automobile anti-theft alarm device applied to the automobile anti-theft field, which comprises an anti-theft system arranged in an automobile and an owner App connected with the anti-theft system through a cloud technology, and comprises a signal acquisition module, a privacy recording module, an anti-theft protection module and an alarm output module, wherein the signal acquisition module is used for collecting data of the environment where the automobile is located and assisting in judging whether the automobile is in a stolen state, the privacy recording module is used for recording safety privacy information of the automobile, the anti-theft protection module is used for alarming prompt and assisting in verifying the anti-theft state, and the inspection and correction module is used for inspecting the anti-theft state.

Description

Intelligent automobile anti-theft alarm device
Technical Field
The invention relates to an automobile anti-theft alarm device, in particular to an intelligent automobile anti-theft alarm device applied to the field of automobile anti-theft.
Background
At present, most vehicles are provided with advanced sensors, controllers, actuators and other devices, and new technologies such as information communication, internet, big data, cloud computing, artificial intelligence and the like are utilized, so that the control and driving level of the vehicles can be improved, and the safety, smoothness and high efficiency of the running of the vehicles are ensured.
The Chinese patent CN112896096B discloses an anti-theft alarm method, device and terminal of an automobile, the characteristic of strong anti-interference capability of radar signals is utilized, false triggering caused by environmental change is avoided, anti-theft effect is accurate and reliable, furthermore, the Chinese patent CN116872885B discloses an intelligent automobile anti-theft method, system and storage medium, analysis and judgment of anti-theft state and theft state can be carried out, after the anti-theft state is entered, active theft alarm and cooperative auxiliary alarm are carried out when theft behavior exists, and safe parking and alarm are carried out when the anti-theft state is entered, so that a tighter and effective intelligent anti-theft technology is provided for the automobile.
The existing anti-theft alarm system mainly judges physical theft behaviors (such as breaking windows and picking locks), but cannot effectively defend theft implemented by remote invasion means (such as breaking vehicle-mounted systems), the anti-theft performance of the anti-theft system can be weakened, and in addition, when the vehicle anti-theft system performs conventional inspection operation, effective inspection cannot be performed on disguised behaviors with concealment.
Disclosure of Invention
Aiming at the prior art, the technical problem to be solved by the invention is how to effectively identify and prevent hidden invasion of an automobile anti-theft system through a dynamic intelligent patrol and multidimensional protection mechanism, and simultaneously reduce the false alarm rate in a complex environment.
In order to solve the problems, the invention provides an intelligent automobile anti-theft alarm device which comprises an anti-theft system arranged in an automobile and an automobile owner App connected with the anti-theft system through a cloud technology, wherein the intelligent automobile anti-theft alarm device comprises a signal acquisition module, a signal acquisition module and a control module, wherein the signal acquisition module is used for collecting data of an environment where an automobile is located and assisting in judging whether the automobile is in a stolen state or not;
The privacy recording module is used for recording the safety privacy information of the vehicle;
The anti-theft protection module comprises a safety verification unit, a dynamic switching unit and an anti-theft processing unit, wherein the safety verification unit is used for performing safety verification operation, the dynamic switching unit is combined with the signal acquisition module to switch the verification difficulty of the safety verification unit of the vehicle, and the anti-theft processing unit is matched with the dynamic switching unit to adjust the encryption degree of the privacy record module on the privacy data and adjust the working frequency of the inspection and correction module;
the alarm output module is used for carrying out alarm prompt and auxiliary verification of the anti-theft state;
The inspection and correction module is executed in a trusted execution environment and comprises an inspection unit for periodically checking whether the operation logic of each module in the vehicle anti-theft system is normal, a behavior analysis unit for monitoring a calling chain of legal instructions in the anti-theft system and finding abnormal instructions, a data verification unit for adding protection noise to data of the privacy record module, a safety protection unit for masking the content of the instructions in the anti-theft system through randomization operation, a correction unit for correcting the tampered operation logic and a mark clearing unit for marking and clearing the identified illegal operation and an attacker.
In the intelligent automobile anti-theft alarm device, the anti-theft system reduces false alarm rate in complex environments such as downtown areas and the like, can cope with various attack means, and intelligent linkage among the modules forms an omnibearing protection system, so that safety is ensured, and convenience in use is also realized.
The signal acquisition module comprises a camera, a vibration sensor and a millimeter wave radar, wherein the camera is arranged in the vehicle, the vibration sensor is used for collecting environmental data inside and outside the vehicle, the vibration sensor is used for recording the vibration condition of the vehicle body during the parking of the vehicle, the millimeter wave radar is used for stably acquiring the condition of objects around the vehicle, the data of the camera, the vibration sensor and the millimeter wave radar are combined for comprehensive analysis, whether the vehicle is in a stolen state is judged, and if yes, the alarm output module is used for alarming.
The alarm output module comprises an alarm prompting unit, a verification unit and an auxiliary unit, wherein the alarm prompting unit is used for performing alarm prompting operation when the safety verification unit does not pass, the verification unit is used for determining whether the alarm prompting unit can normally work, the auxiliary unit sends a signal to the dynamic switching unit to be matched with the dynamic switching when the alarm prompting unit encounters an attack, and the attack type encountered by the alarm prompting unit comprises physical attack and operation logic attack.
As a further supplement of the application, the inspection and correction module also comprises an experiment unit for sending experiment instructions, and the inspection and correction module comprises the following working steps:
S1, checking whether the operation logic of each module is changed according to the set frequency by the inspection unit, if so, entering S5, and if not, entering S2;
S2, checking whether other switchable standby logic exists in a unit where the current logic is located, if no other standby logic exists, checking whether the current operation logic has a modified trace, if no modified trace exists, ending, if yes, entering S5, and if other standby logic exists, entering S3;
S3, testing switching paths of other standby logics by using an experimental unit, entering S6 if other standby logics are found to be maliciously utilized, and ending the inspection if the switching is normal;
S4, the behavior analysis unit monitors whether the matching performance of the vehicle state and the instruction calling frequency are abnormal, the data verification unit checks whether the sensor data are abnormal, if one of the matching performance of the vehicle state and the instruction, the instruction calling frequency and the sensor data are abnormal, it is judged that hidden attack exists in the anti-theft system, S5 is entered, and if the detection results of the behavior analysis unit and the data verification unit are normal, the detection is ended;
S5, the correction unit repairs tampered operation logic, and the security protection unit starts randomization operation on the tampered access object;
S6, the mark clearing unit locates the access object of the hidden attack, carries out clearing processing, checks whether the access channel of the access object is allowed to exist, and if not, seals the access channel.
The inspection and correction module further comprises a stripping unit, wherein the stripping unit removes a disguising layer of an access object in the anti-theft system, so that operation logics in the anti-theft protection module and the alarm output module are in an exposed state, and the stripping unit is further used for exposing characteristic data of an illegal access object, recording the characteristic data to the privacy record module, generating a characteristic database, and preventing subsequent safety verification by matching with the safety verification unit.
As a further supplement of the application, the working steps when the dynamic switching unit is combined with the signal acquisition module are as follows:
A1, constructing a personnel, equipment and vehicle interaction relation diagram through a vehicle-mounted camera and a millimeter wave radar;
a2, analyzing the interaction relation by using a neural network, and starting the dynamic switching unit and the anti-theft processing unit if the detected multi-person behaviors meet the predefined attack cooperation purpose.
As a further supplement to the application, the data recorded by the privacy recording module comprises a driving record of the vehicle, a door opening and closing record, data of the signal acquisition module and an operation log of the vehicle, wherein the sensor data comprises monitoring data of other sensors including vibration sensors mounted on the vehicle, and the other sensors comprise ultrasonic sensors, inclination sensors, door and trunk sensors, tire pressure sensors, glass breaking sensors and acoustic sensors.
The inspection and correction module further comprises a logic history tracing unit for recording the modification history of the operation logic and storing the modification history in the block chain, the inspection unit synchronously compares the consistency of the history versions when checking the logic, the behavior analysis unit monitors the behavior change trend after logic modification through a time sequence model, and the correction unit is triggered if the modified operation logic is detected to have abnormality after delay operation.
In summary, the signal acquisition module synthesizes the data of the camera, the vibration sensor and the millimeter wave radar, the vehicle theft behavior is accurately judged, the anti-theft protection module can dynamically adjust the verification difficulty, the data encryption strength and the inspection frequency, the anti-theft protection module is suitable for different environments, the inspection and correction module operates in the protected environment, tampered operation logic can be effectively identified and repaired, malicious attacks are eliminated, the dynamic switching unit can identify a multi-person cooperative attack mode, and the protection level is automatically improved. The privacy record module completely stores the vehicle operation log and provides basis for safety analysis. In addition, the logic history tracing function records all modification records and stores the modification records in the tamper-resistant blockchain, and even if an attacker carries out compliance modification, the modification records can be discovered through behavior trend analysis. Compared with the traditional scheme, the anti-theft system reduces false alarm rate in complex environments such as downtown areas and the like, and can cope with various attack means, including hidden invasion without modifying operation logic. All modules are linked intelligently to form an omnibearing protection system, so that the safety is ensured, and the use convenience is also considered.
Drawings
FIG. 1 is a schematic diagram of the system components of the present application;
FIG. 2 is a flowchart illustrating the operation of the patrol entanglement module according to the present application.
Detailed Description
Two embodiments of the present application will be described in detail with reference to the accompanying drawings.
First embodiment:
FIG. 1 shows an intelligent automobile anti-theft alarm device, which comprises an anti-theft system arranged in a vehicle and an automobile owner App connected with the anti-theft system through cloud technology, and comprises a signal acquisition module, a signal acquisition module and a control module, wherein the signal acquisition module is used for collecting data of the environment where an automobile is located and assisting in judging whether the vehicle is in a stolen state or not;
The privacy recording module is used for recording the safety privacy information of the vehicle;
The anti-theft protection module comprises a safety verification unit, a dynamic switching unit and an anti-theft processing unit, wherein the safety verification unit is used for performing safety verification operation, the dynamic switching unit is combined with the signal acquisition module to switch the verification difficulty of the safety verification unit of the vehicle, and the anti-theft processing unit is matched with the dynamic switching unit to adjust the encryption degree of the privacy record module on the privacy data and adjust the working frequency of the inspection and correction module;
the alarm output module is used for carrying out alarm prompt and auxiliary verification of the anti-theft state;
The inspection and correction module is executed in a trusted execution environment and comprises an inspection unit for periodically checking whether the operation logic of each module in the vehicle anti-theft system is normal, a behavior analysis unit for monitoring a calling chain of legal instructions in the anti-theft system and finding abnormal instructions, a data verification unit for adding protection noise to data of the privacy record module, a safety protection unit for masking the content of the instructions in the anti-theft system through randomization operation, a correction unit for correcting the tampered operation logic and a mark clearing unit for marking and clearing the identified illegal operation and an attacker.
The signal acquisition module comprises a camera, a vibration sensor and a millimeter wave radar, wherein the camera is arranged in the vehicle, the camera is used for collecting environmental data inside and outside the vehicle, the vibration sensor is used for recording the vibration condition of a vehicle body during parking of the vehicle, the millimeter wave radar is used for stably acquiring the condition of objects around the vehicle, the data of the camera, the vibration sensor and the millimeter wave radar are combined for comprehensive analysis, whether the vehicle is in a stolen state is judged, and if yes, the alarm is carried out through the alarm output module.
The alarm output module comprises an alarm prompting unit, a verification unit and an auxiliary unit, wherein the alarm prompting unit is used for performing alarm prompting operation when the safety verification unit does not pass, the verification unit is used for determining whether the alarm prompting unit can work normally, the auxiliary unit sends a signal to the dynamic switching unit when the alarm prompting unit encounters an attack and performs dynamic switching in cooperation with the dynamic switching, and the attack types encountered by the alarm prompting unit comprise physical attack and running logic attack.
Fig. 2 shows that the inspection and correction module further includes an experiment unit for sending experiment instructions, and the inspection and correction module includes the following working steps:
S1, checking whether the operation logic of each module is changed according to the set frequency by the inspection unit, if so, entering S5, and if not, entering S2;
S2, checking whether other switchable standby logic exists in a unit where the current logic is located, if no other standby logic exists, checking whether the current operation logic has a modified trace, if no modified trace exists, ending, if yes, entering S5, and if other standby logic exists, entering S3;
S3, testing switching paths of other standby logics by using an experimental unit, entering S6 if other standby logics are found to be maliciously utilized, and ending the inspection if the switching is normal;
S4, the behavior analysis unit monitors whether the matching performance of the vehicle state and the instruction calling frequency are abnormal, the data verification unit checks whether the sensor data are abnormal, if one of the matching performance of the vehicle state and the instruction, the instruction calling frequency and the sensor data are abnormal, it is judged that hidden attack exists in the anti-theft system, S5 is entered, and if the detection results of the behavior analysis unit and the data verification unit are normal, the detection is ended;
S5, the correction unit repairs tampered operation logic, and the security protection unit starts randomization operation on the tampered access object;
S6, the mark clearing unit locates the access object of the hidden attack, carries out clearing processing, checks whether the access channel of the access object is allowed to exist, and if not, seals the access channel.
Specifically, during inspection, the inspection and correction module is in a trusted execution environment, its own logic remains high stability, checks whether there is a change of the current operation logic, if so, the correction unit corrects the changed operation logic and marks collapse the access object of the tampered operation logic (when the key parameter of the operation logic is tampered, the access object implementing the tampered operation will carry the marking feature carried by the operation logic itself, so that the subsequent marking and removal unit is convenient to locate collapse), for example, as follows:
if the operation logic of the security verification unit is modified, the access object can conveniently avoid the verification pseudo caused by passing verification after modifying the current operation logic;
if the operation logic of the alarm prompting unit is modified, the alarm prompting unit fails to pass the verification and the sent alarm signal is not triggered;
If the operation logic of the verification unit is modified, the alarm prompting unit is damaged, but the verification unit tests whether the verification unit can work normally, and the answer is yes.
Because the number of the operation logics in each unit is not fixed, if an illegal access object enters the system, the illegal access object is not directly modified (the modification of the key parameter, for example, the threshold is 60, but the modification of the key parameter is 40, the verification can be performed), but the switching of the operation logics finally executed is realized through multi-level jump (in S3, if the standby logic is found to be maliciously utilized, such as through multi-level jump hidden attack), so that the offensive access object is directly found, at the moment, the mark clearing unit cannot realize the search of the offensive access object, therefore, during the inspection, an experiment instruction is required to be sent by an experiment unit to find the operation logics finally executed, the operation logics are processed collapse (because the illegal execution is performed for the current operation logics in a normal state, the jump execution is unnecessary and complicated abnormal behavior), and the external operation logics are prevented from tampering the operation logics of each unit in the anti-theft system, thereby playing a corresponding inspection role.
In addition, after part of aggressive access objects enter the system, the operation logic is not changed, and the corresponding intrusion processing is realized through other hiding means without skip execution, so that the inspection and correction module is invalid, and the inspection and correction module comprises the actions of only storing malicious codes in a memory, not modifying the storage logic, or injecting counterfeit characteristic data into the privacy record module, misleading security verification and the like.
Aiming at the phenomenon, the protection of corresponding hidden attack means can be realized through the cooperation of the behavior analysis unit, the data verification unit and the safety protection unit.
In S4, the behavior analysis unit monitors whether the matching between the vehicle state and the instruction calling frequency are abnormal, so as to find abnormal behavior, for example, the engine is started immediately after the instruction for unlocking the vehicle door, so that abnormal behavior is found, and the engine is directly started without unlocking;
The data verification unit adds protective noise (Laplace noise is added, the noise amount is dynamically adjusted according to scenes, and the noise amount in downtown areas is improved by 20%) to key data recorded by the system, such as sensor data and user operation logs, so that hackers are prevented from forging the data spoofing anti-theft system, and whether the sensor data are real or not, for example, whether vibration data are tampered or not is checked;
The security protection unit masks the internal activities of the system through randomization operation (such as periodically changing the checking frequency) to prevent hackers from stealing information through physical signals such as power consumption and the like, so that information such as security keys and the like is reversely deduced.
In conclusion, through the inspection and correction module, multi-dimensional attacks such as logic tampering, abnormal behaviors, data counterfeiting, physical eavesdropping and the like can be covered for inspection protection, and the anti-theft safety is enhanced.
The inspection and correction module further comprises a stripping unit, wherein the stripping unit removes a disguised layer of the access object in the anti-theft system, so that operation logics in the anti-theft system are in an exposed state, in addition, the stripping unit is further used for exposing characteristic data of the illegal access object, recording the characteristic data to the privacy record module, generating a characteristic database, and matching with the security verification unit, preventing subsequent security verification.
Specifically, through the stripping unit, the access objects in the anti-theft system can be in a non-hiding state (camouflage layer is used for covering hiding), after the stripping unit is used for stripping the access objects, the access objects can be in an exposed state, the inspection unit is ensured to comprehensively detect all the access objects, and omission is avoided (if the illegally entered access objects enter the system and carry new operation logic for replacement in a hiding state, the inspection unit can find that the omission is avoided).
And the disguised layer exposed after stripping is subjected to characteristic marking, so that the subsequent access object carrying the same characteristic mark is prevented from passing the security verification while the characteristic database is generated.
The working steps when the dynamic switching unit is combined with the signal acquisition module are as follows:
A1, constructing a personnel, equipment and vehicle interaction relation diagram through a vehicle-mounted camera and a millimeter wave radar;
a2, analyzing the interaction relation by using a neural network, and starting the dynamic switching unit and the anti-theft processing unit if the detected multi-person behaviors meet the predefined attack cooperation purpose.
Specifically, the neural network adopted by the dynamic switching unit is a three-layer graph roll-up network (GCN), the input layer receives an interaction relation graph generated by a camera and a millimeter wave radar, nodes in the graph comprise personnel coordinates, equipment ID and vehicle positions, and the edge weight is calculated by signal interaction intensity. The training data is derived from 1000 groups of annotation scenes provided by the cooperative vehicle enterprises, and the feature extraction covers the space distance, the action synchronism and the node centrality. And if the model output attack probability is not less than 0.8, starting a protection mechanism.
If an intruder damages the alarm prompting unit by damaging the alarm output end, the alarm behavior cannot be triggered even if verification fails, so that the alarm prompting unit needs to be verified whether to work normally or not, and the auxiliary unit is used for carrying out corresponding prompting operation on the dynamic switching unit.
The dynamic switching unit is mainly used for carrying out targeted anti-theft operation according to different environments of vehicles, and in downtown areas, different interference is possibly caused on the vehicles by a multi-person cooperation mode, so that an intruder matched with remote control intrudes an anti-theft system of the vehicles, for example, a vehicle-mounted camera is shielded in a short time, vibration is caused on the vehicles and signal interference around the vehicles occurs in sequence (a predefined attack cooperation purpose is set to be the same, and the targeted design can be carried out according to actual conditions), at the moment, the possibility of multi-person cooperation exists, at the moment, the verification difficulty of the security verification unit can be improved, the encryption degree of the privacy recording module is improved, the patrol frequency of the patrol and correction module is improved, and preventive work is well.
Compared with the prior art, the system utilizes rules such as remote degree (the possibility of being stolen in downtown areas and the possibility of being stolen in remote areas are large) and time period (the possibility of being stolen at night and the possibility of being stolen in daytime are small) of the vehicle environment, but in actual life, in daytime or downtown areas, places with dense personnel activities are easier to play a shielding role, so that the system comprehensively considers personnel behaviors, dynamically switches and is more fit for actual life.
Aiming at the situation that the false alarm rate of downtown areas is high, for example, a passer-by happens, the situation can be avoided by adjusting the predefined action of attacking the cooperation purpose, so that single accidental shielding or vibration of the construction environment can not trigger corresponding dynamic switching operation, multiple types of operation are required to be completely generated within a specified time, and the false alarm rate can be controlled.
The data recorded by the privacy recording module comprises the driving record of the vehicle, the opening and closing record of the vehicle door, the data of the signal acquisition module and the operation log of the vehicle, wherein the sensor data comprises the monitoring data of other sensors including vibration sensors installed on the vehicle, and the other sensors comprise ultrasonic sensors, inclination sensors, vehicle door and trunk sensors, tire pressure sensors, glass breakage sensors and acoustic sensors.
Second embodiment:
The inspection and correction module further comprises a logic history tracing unit, wherein the logic history tracing unit is used for recording the modification history of the operation logic and storing the modification history in the blockchain, the inspection unit synchronously compares the consistency of the historic versions when checking the logic, the behavior analysis unit monitors the behavior change trend after logic modification through a time sequence model, and the correction unit is triggered if the modified operation logic is detected to have abnormality after delayed operation.
Unlike the first embodiment, in the first embodiment, the inspection and correction module is used to perform inspection and protection against multidimensional attacks such as logic tampering, behavior abnormality, data forgery, physical interception, etc., but if an offensive access object enters the anti-theft system through the alarm terminal, the offensive access object is not subjected to the above behavior, and compliance modification (for example, modification of non-critical parameters) is not marked, so that the inspection unit cannot detect the offensive access object, but when the subsequent execution is delayed or conditional triggering is performed, the originally normal logic is misjudged as abnormal and is processed by collapse.
For example, an aggressive access object modifies the door lock control logic from the original ' automatic locking with the speed exceeding 30km/h ' to automatic locking with the speed exceeding 30km/h and automatic locking with the system time being later than x years, x months and x days ', so that the door lock cannot be normally locked when the speed exceeds 30km/h before x years, x months and x days, but can be locked when the speed exceeds 30km/h after x years, x months and x days, so that abnormality is difficult to find when the maintenance personnel checks before a time node, an attacker can accurately control the time range of a dangerous period, and an inspection unit can carry out collapse on the normal logic of automatic locking with the speed exceeding 30km/h before the time node, so that false killing is caused.
For the above phenomena, the logic history tracing unit continuously records all the modification operations (including modification content, time stamp and operator information) of the running logic, and encrypts and stores the history data in the vehicle-mounted blockchain node to ensure non-falsification. When the inspection unit routinely inspects, not only the validity of the current operation logic is verified, but also the history record in the blockchain is called for comparison, if the current logic and the history version are found to have unauthorized differences (such as parameter change of non-manufacturer signature), the early warning is triggered even if the operation logic is temporarily compliant.
Meanwhile, the behavior analysis unit analyzes the behavior track (such as the reporting frequency of sensor data, the instruction calling interval, etc.) of the system after logic modification based on the time sequence model, and if the modified logic is detected to cause abnormal behavior (such as the careless data encryption frequency improvement) after delaying for a period of time, the behavior analysis unit cooperates with the correction unit to immediately roll back to the last trusted version, and notifies the dynamic switching unit to temporarily improve the security level. The two are linked through real-time data sharing and blockchain (HYPERLEDGER FABRIC type blockchain is selected) verification, namely the history tracing unit provides a tamper evidence chain, the behavior analysis unit captures a potential threat time sequence, and even if an attacker passes through legal modification and other camouflage means, the attacker can be accurately identified and intercepted.
The millimeter wave radar, the blockchain and the Trusted Execution Environment (TEE) adopted by the system increase the cost, but improve the anti-theft safety.
The present application is not limited to the above-described embodiments, which are adopted in connection with the actual demands, and various changes made by the person skilled in the art without departing from the spirit of the present application are still within the scope of the present application.

Claims (8)

1. The intelligent automobile anti-theft alarm device is characterized by comprising an anti-theft system arranged in a vehicle and an owner App connected with the anti-theft system through a cloud technology, and comprising a signal acquisition module, wherein the signal acquisition module is used for collecting data of an environment where an automobile is located and assisting in judging whether the vehicle is in a stolen state or not;
The privacy recording module is used for recording the safety privacy information of the vehicle;
The anti-theft protection module comprises a safety verification unit, a dynamic switching unit and an anti-theft processing unit, wherein the safety verification unit is used for performing safety verification operation, the dynamic switching unit is combined with the signal acquisition module to switch the verification difficulty of the safety verification unit of the vehicle, and the anti-theft processing unit is matched with the dynamic switching unit to adjust the encryption degree of the privacy record module on the privacy data and adjust the working frequency of the inspection and correction module;
the alarm output module is used for carrying out alarm prompt and auxiliary verification of the anti-theft state;
The inspection and correction module is executed in a trusted execution environment and comprises an inspection unit for periodically checking whether the operation logic of each module in the vehicle anti-theft system is normal, a behavior analysis unit for monitoring a calling chain of legal instructions in the anti-theft system and finding abnormal instructions, a data verification unit for adding protection noise to data of the privacy record module, a safety protection unit for masking the content of the instructions in the anti-theft system through randomization operation, a correction unit for correcting the tampered operation logic and a mark clearing unit for marking and clearing the identified illegal operation and an attacker.
2. The intelligent automobile anti-theft alarm device according to claim 1, wherein the signal acquisition module comprises a camera, a vibration sensor and a millimeter wave radar, wherein the camera and the vibration sensor are installed in a vehicle, the camera is used for collecting environment data inside and outside the vehicle, the vibration sensor is used for recording vibration conditions of the vehicle body during parking of the vehicle, the millimeter wave radar is used for stably acquiring the conditions of objects around the vehicle, the data of the camera, the vibration sensor and the millimeter wave radar are combined for comprehensive analysis, whether the vehicle is in a stolen state is judged, and if yes, the alarm is given through the alarm output module.
3. The intelligent automobile anti-theft alarm device according to claim 2, wherein the alarm output module comprises an alarm prompt unit, a verification unit and an auxiliary unit, wherein the alarm prompt unit is used for carrying out alarm prompt operation when the safety verification unit does not pass, the verification unit is used for determining whether the alarm prompt unit can work normally, the auxiliary unit sends a signal to the dynamic switching unit when the alarm prompt unit encounters an attack, and the dynamic switching is matched, wherein the attack types encountered by the alarm prompt unit comprise physical attack and operation logic attack.
4. The intelligent automobile anti-theft alarm device according to claim 3, wherein the inspection and correction module further comprises an experiment unit for sending experiment instructions, and the inspection and correction module comprises the following working steps:
S1, checking whether the operation logic of each module is changed according to the set frequency by the inspection unit, if so, entering S5, and if not, entering S2;
S2, checking whether other switchable standby logic exists in a unit where the current logic is located, if no other standby logic exists, checking whether the current operation logic has a modified trace, if no modified trace exists, ending, if yes, entering S5, and if other standby logic exists, entering S3;
S3, testing switching paths of other standby logics by using an experimental unit, entering S6 if other standby logics are found to be maliciously utilized, and ending the inspection if the switching is normal;
S4, the behavior analysis unit monitors whether the matching performance of the vehicle state and the instruction calling frequency are abnormal, the data verification unit checks whether the sensor data are abnormal, if one of the matching performance of the vehicle state and the instruction, the instruction calling frequency and the sensor data are abnormal, it is judged that hidden attack exists in the anti-theft system, S5 is entered, and if the detection results of the behavior analysis unit and the data verification unit are normal, the detection is ended;
S5, the correction unit repairs tampered operation logic, and the security protection unit starts randomization operation on the tampered access object;
S6, the mark clearing unit locates the access object of the hidden attack, carries out clearing processing, checks whether the access channel of the access object is allowed to exist, and if not, seals the access channel.
5. The intelligent automobile anti-theft alarm device according to claim 4, wherein the inspection and correction module further comprises a stripping unit, wherein the stripping unit removes a disguised layer of an access object in the anti-theft system, so that operation logics in the anti-theft protection module and the alarm output module are in an exposed state, and the stripping unit is further used for exposing characteristic data of an illegal access object, recording the characteristic data to the privacy recording module, generating a characteristic database, and preventing subsequent pass of security verification in cooperation with the security verification unit.
6. The intelligent automobile anti-theft alarm device according to claim 5, wherein the dynamic switching unit is combined with the signal acquisition module by the following working steps:
A1, constructing a personnel, equipment and vehicle interaction relation diagram through a vehicle-mounted camera and a millimeter wave radar;
a2, analyzing the interaction relation by using a neural network, and starting the dynamic switching unit and the anti-theft processing unit if the detected multi-person behaviors meet the predefined attack cooperation purpose.
7. The intelligent automobile burglar alarm arrangement according to claim 6, wherein the data recorded by the privacy recording module comprises a running record of a vehicle, a door opening and closing record, data of the signal acquisition module and an operation log of the vehicle, wherein the sensor data comprises monitoring data of other sensors including vibration sensors mounted on the vehicle, and the other sensors comprise ultrasonic sensors, inclination sensors, door and trunk sensors, tire pressure sensors, glass breakage sensors and acoustic sensors.
8. The intelligent automobile anti-theft alarm device according to claim 7, wherein the inspection and correction module further comprises a logic history tracing unit for recording a modification history of the operation logic and storing the modification history in the blockchain, wherein the inspection unit is used for synchronously comparing the consistency of the history versions when checking the logic, the behavior analysis unit is used for monitoring the behavior change trend after logic modification through a time sequence model, and the correction unit is triggered if the modified operation logic is detected to have abnormality after delayed operation.
CN202511079656.1A 2025-08-04 2025-08-04 An intelligent automobile anti-theft alarm device Active CN120552791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202511079656.1A CN120552791B (en) 2025-08-04 2025-08-04 An intelligent automobile anti-theft alarm device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202511079656.1A CN120552791B (en) 2025-08-04 2025-08-04 An intelligent automobile anti-theft alarm device

Publications (2)

Publication Number Publication Date
CN120552791A true CN120552791A (en) 2025-08-29
CN120552791B CN120552791B (en) 2025-09-30

Family

ID=96827951

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202511079656.1A Active CN120552791B (en) 2025-08-04 2025-08-04 An intelligent automobile anti-theft alarm device

Country Status (1)

Country Link
CN (1) CN120552791B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3918858A1 (en) * 1989-06-09 1990-12-13 Opel Adam Ag Simplified security system for vehicle - has immobilising systems operated when thief tries to enter vehicle
US20020163418A1 (en) * 2001-05-01 2002-11-07 International Business Machines Corporation Tamper-resistant theft deterrent method and system
US6580353B1 (en) * 1999-03-06 2003-06-17 Daimlerchrysler Ag Electronic safety system having an authentication element range determination, particularly a vehicle locking system
JP2007264877A (en) * 2006-03-28 2007-10-11 Clarion Co Ltd Vehicle theft prevention apparatus
JP3200243U (en) * 2015-07-23 2015-10-08 株式会社ミクニ Vehicle anti-theft system
WO2018186512A1 (en) * 2017-04-07 2018-10-11 (주)세노텍 System and method for controlling vehicle using smart phone
US20210170989A1 (en) * 2019-12-09 2021-06-10 James Andrew Cameron Anti Theft Device for Open Air Compartment Vehicles
CN115769620A (en) * 2020-06-04 2023-03-07 雷诺股份公司 Secure the connection between the vehicle and the remote management server used to manage said vehicle
CN117601801A (en) * 2023-11-29 2024-02-27 成都赛力斯科技有限公司 Guard mode-based vehicle anti-theft method and device, electronic equipment and medium
CN118074970A (en) * 2024-02-19 2024-05-24 上海伊世智能科技有限公司 A network security assessment method for intelligent connected vehicles
CN120179735A (en) * 2025-05-22 2025-06-20 成都车晓科技有限公司 Vehicle information authentication and tracing method and system based on blockchain

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3918858A1 (en) * 1989-06-09 1990-12-13 Opel Adam Ag Simplified security system for vehicle - has immobilising systems operated when thief tries to enter vehicle
US6580353B1 (en) * 1999-03-06 2003-06-17 Daimlerchrysler Ag Electronic safety system having an authentication element range determination, particularly a vehicle locking system
US20020163418A1 (en) * 2001-05-01 2002-11-07 International Business Machines Corporation Tamper-resistant theft deterrent method and system
JP2007264877A (en) * 2006-03-28 2007-10-11 Clarion Co Ltd Vehicle theft prevention apparatus
JP3200243U (en) * 2015-07-23 2015-10-08 株式会社ミクニ Vehicle anti-theft system
WO2018186512A1 (en) * 2017-04-07 2018-10-11 (주)세노텍 System and method for controlling vehicle using smart phone
US20210170989A1 (en) * 2019-12-09 2021-06-10 James Andrew Cameron Anti Theft Device for Open Air Compartment Vehicles
CN115769620A (en) * 2020-06-04 2023-03-07 雷诺股份公司 Secure the connection between the vehicle and the remote management server used to manage said vehicle
CN117601801A (en) * 2023-11-29 2024-02-27 成都赛力斯科技有限公司 Guard mode-based vehicle anti-theft method and device, electronic equipment and medium
CN118074970A (en) * 2024-02-19 2024-05-24 上海伊世智能科技有限公司 A network security assessment method for intelligent connected vehicles
CN120179735A (en) * 2025-05-22 2025-06-20 成都车晓科技有限公司 Vehicle information authentication and tracing method and system based on blockchain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
倪龙;和军平;林廖军;: "交互式无线汽车智能钥匙系统设计", 计算机测量与控制, no. 05, 25 May 2010 (2010-05-25), pages 174 - 176 *
卜令奇;: "基于GSM的汽车防盗报警系统研究", 科技信息, no. 22, 5 August 2013 (2013-08-05), pages 237 *

Also Published As

Publication number Publication date
CN120552791B (en) 2025-09-30

Similar Documents

Publication Publication Date Title
Thing et al. Autonomous vehicle security: A taxonomy of attacks and defences
Sundaram An introduction to intrusion detection
Salem et al. A survey of insider attack detection research
CN104144063A (en) Website security monitoring and alarming system based on log analysis and firewall security matrixes
CN103312679A (en) APT (advanced persistent threat) detection method and system
CN106603578B (en) A kind of centralized T BOX Information Security Defending Systems
US20070300300A1 (en) Statistical instrusion detection using log files
CN109344609B (en) TCU module, TCU system and protection method
CN118449781B (en) Cross-border abnormal data flow identification method and device based on atypical behavior analysis
CN114666088A (en) Method, device, equipment and medium for detecting industrial network data behavior information
CN111885020A (en) Network attack behavior real-time capturing and monitoring system with distributed architecture
Zhang et al. Test and evaluation system for automotive cybersecurity
CN120552791B (en) An intelligent automobile anti-theft alarm device
CN117601801A (en) Guard mode-based vehicle anti-theft method and device, electronic equipment and medium
CN117544386A (en) Deep learning-based security event processing method and system
CN107277070A (en) A kind of computer network instrument system of defense and intrusion prevention method
CN115987532A (en) APT lateral movement attack detection system and method based on unsupervised graph embedding
Garg et al. A comparative study on vehicles safety systems
Kizza et al. Intrusion detection and prevention systems
Pryshchepa et al. Modern IT problems and ways to solve them
Ke et al. Parametric observation rule-based intrusion detection strategy for in-vehicle network
CN117473475B (en) Big data security protection method, system and medium based on trusted computing
CN120257276B (en) Protection processing method and system for viruses and sensitive information of mobile storage device
CN119449417B (en) Network security protection method, device and electronic equipment
CN119598448A (en) Real-time detection method and device for modified file timestamp of Linux system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant