Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Vehicles terminal intrusion processing method, device and equipment and storage medium

A processing method, a technology of the Internet of Vehicles, which is applied in the field of the Internet of Vehicles, and can solve problems such as inability to deal with terminal intrusions of the Internet of Vehicles

Pending Publication Date: 2020-05-05
杭州安恒信息安全技术有限公司
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a method for processing intrusion of an Internet of Vehicles terminal, an intrusion processing device for an Internet of Vehicles terminal, an intrusion processing device for an Internet of Vehicles terminal, and a computer-readable storage medium, which solves the problem that the existing Internet of Vehicles security detection method cannot handle Internet of Vehicles terminal intrusion problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Vehicles terminal intrusion processing method, device and equipment and storage medium
  • Internet of Vehicles terminal intrusion processing method, device and equipment and storage medium
  • Internet of Vehicles terminal intrusion processing method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] Please refer to figure 1 , figure 1 It is a flow chart of a method for processing an Internet of Vehicles terminal intrusion provided by an embodiment of the present invention. The method includes:

[0050] S101: Obtain the application running information sent by the Internet of Vehicles terminal.

[0051] It should be noted that t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Vehicles terminal intrusion processing method, which comprises the following steps: obtaining application running information sent by an Internet of Vehicles terminal, and judging whether the Internet of Vehicles terminal is intruded or not by utilizing the application running information; if the Internet of Vehicles terminal is invaded, determining a targetsafety policy corresponding to the application running information from preset safety policy information; sending the target safety policy to the Internet of Vehicles terminal, so that the Internet ofVehicles terminal executes the target safety policy; the method comprises the following steps: judging whether an Internet of Vehicles terminal is invaded or not by obtaining application running information sent by the Internet of Vehicles terminal; when it is determined that the Internet of Vehicles terminal is invaded, target safety policy crossing information is determined in the less safety policy information, and the target safety policy is sent to the Internet of Vehicles terminal so that the Internet of Vehicles terminal can execute the target safety policy to solve the problem that the Internet of Vehicles terminal is invaded; in addition, the invention also provides an Internet of Vehicles terminal intrusion processing device and equipment, and a computer readable storage medium,which also have the above beneficial effects.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Vehicles, in particular to a method for processing an Internet of Vehicles terminal intrusion, a device for processing an Internet of Vehicles terminal intrusion, a device for processing an Internet of Vehicles terminal intrusion, and a computer-readable storage medium. Background technique [0002] In the current era of Internet of Everything, intelligent manufacturing is also developing rapidly. Smart cars are becoming more and more popular, and the Internet of Vehicles (IOV) is a huge interactive network composed of information such as vehicle location, speed, and route. Through GPS, RFID, sensors, camera image processing and other devices, vehicles can complete the collection of their own environment and state information; through Internet technology, all vehicles can transmit and gather their own various information to the central processing unit; through computer technology, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/12H04L63/20H04L63/1441
Inventor 邢东洋潘国华
Owner 杭州安恒信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products