Traffic information processing method and device, electronic equipment and storage medium

A technology of traffic information and processing methods, applied in traffic control systems, traffic flow detection, data processing applications, etc., can solve problems such as being extremely vulnerable to attacks

Inactive Publication Date: 2020-09-22
APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
6 Cites 2 Cited by

AI-Extracted Technical Summary

Problems solved by technology

V2X is implemented in an open area, ...
View more

Method used

[0054] Through the scheme, the safety of the traffic information is detected by the safety detection equipment. When the detection r...
View more

Abstract

The invention discloses a traffic information processing method and device, electronic equipment and a storage medium, and relates to the field of intelligent transportation and cloud platforms. According to the specific implementation scheme, the method comprises the steps of analyzing a received signal to obtain traffic information carried in the signal; searching a pre-stored traffic information database according to the traffic information to obtain a safety detection result of the traffic information; and under the condition that the safety detection result is unsafe, determining that thetraffic participant sending the signal is an abnormal traffic participant. According to the scheme, the safety of the traffic information is detected through the safety detection equipment. Under thecondition that the traffic information is unsafe in the detection result, the traffic information can be found and processed in time, and the risk that the traffic information is attacked is effectively coped with.

Application Domain

Data processing applicationsParticular environment based services +5

Technology Topic

Real-time computingTransport engineering +5

Image

  • Traffic information processing method and device, electronic equipment and storage medium
  • Traffic information processing method and device, electronic equipment and storage medium
  • Traffic information processing method and device, electronic equipment and storage medium

Examples

  • Experimental program(1)

Example Embodiment

[0038] The exemplary embodiments of the present application are described below with reference to the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and should be considered as merely exemplary. Therefore, those of ordinary skill in the art should realize that various changes and modifications can be made to the embodiments described herein without departing from the scope and spirit of the present application. Likewise, for clarity and conciseness, descriptions of well-known functions and structures are omitted in the following description.
[0039] Such as figure 1 As shown, in an implementation manner, a method for processing traffic information is provided, including:
[0040] S101: Analyze the received signal to obtain traffic information carried in the signal.
[0041] S102: Search a pre-stored traffic information database according to the traffic information, and obtain a safety detection result of the traffic information.
[0042] S103: In a case where the safety detection result is unsafe, determine that the traffic participant who sends the signal is an abnormal traffic participant.
[0043] The above method in this embodiment can be executed in a safety detection device. The safety inspection equipment can be set on the roadside or in the inspection vehicle.
[0044] Signals can include vehicles that use dedicated short-range communication technology (DSRC, Dedicated Short Range Communication), cellular link communication technology (LTE-V-Cell), short-range direct link communication technology (LTE-V-Direct), 5G communication technology, etc. Use wireless communication (V2X, Vehicleto Everything) signal.
[0045] The V2X signal carries traffic information sent by traffic participants. Traffic participants can include vehicles and roadside traffic equipment.
[0046] Wherein, the traffic information sent by the vehicle may include the driving information of the vehicle, such as different types of information such as vehicle speed information, vehicle location information, and vehicle size information.
[0047] Roadside traffic equipment may include traffic signal lights, roadside speed limit equipment, parking billing equipment, and so on. The traffic information sent by the roadside traffic equipment may include different types of information such as the status of the traffic light, the remaining time of the current light state, and the speed limit information of the current road section. The above-mentioned types of traffic information can be classified according to the "Cooperative Intelligent Transportation System Vehicle Communication System Application Layer and Application Data Interaction Standard".
[0048] In addition, the traffic information can also include the serial numbers of traffic participants, certificate serial numbers, etc. The certificate can be issued by the certificate management part, such as an authority such as a traffic control department. Each legal certificate has its corresponding certificate serial number. Traffic participants can use certificates to sign traffic information.
[0049] A traffic information database can be stored in the safety detection device, and the traffic information database can be downloaded from the cloud (server) or pre-stored. The traffic information database stores the safe value range of different types of traffic information, the safe value range of the value change, and the certificate serial number of the legal certificate. For example, the safe value range of the change period of the traffic light is between 10 seconds and 90 seconds, the safe value range of the road speed limit is between 40km/h and 120km/h, and the safe value of the time change of the two traffic lights before and after The value range is between 1 to 5 seconds, etc. The traffic information database is used to provide reference data for the safety detection of traffic information.
[0050] The safety detection equipment analyzes the received signal to obtain the traffic information carried in the signal. According to the different types of information that are parsed, the safety detection equipment queries the traffic information database to perform safety detection.
[0051] Combine figure 2 The application scenario shown. Roadside traffic equipment includes speed limit equipment and traffic lights. The safety detection equipment can be installed on the roadside or in the inspection vehicle, so as to detect the signals sent by the roadside traffic equipment and the vehicles driving on the road.
[0052] Take the speed-limiting device as an example. The speed-limiting device broadcasts a speed-limiting signal, which contains the serial number of the speed-limiting device, the serial number of the certificate, the type of traffic information (speed limit) and the data corresponding to the key fields (speed-limit data) And other information. For example, if the information broadcast by the speed-limiting device is between 40km/h and 120km/h, it can be confirmed that the speed-limiting device has passed the safety test. When the speed limit data is not between 40km/h and 120km/h, for example, the information broadcast by the speed limit device is 200km/h, or 5km/h, it can be confirmed that the speed limit device is an abnormal traffic participant. An abnormal traffic participant may include that the speed-limiting device may have been hacked, or that the speed-limiting device is a fake device, etc.
[0053] In addition, you can also check whether the speed-limiting device is an abnormal traffic participant by checking the validity of the certificate serial number. For example, a legal certificate serial number is stored in a traffic information database. The safety inspection equipment can obtain the certificate serial number from the traffic information. The legal certificate serial number can be used to verify the obtained certificate serial number to determine whether the speed-limiting device is an abnormal traffic participant.
[0054] Through the above solution, the safety of the traffic information is detected by the safety detection equipment. When the detection result is unsafe, it can be discovered and processed in time, effectively responding to the risk of traffic information being attacked.
[0055] Such as image 3 As shown, in one embodiment, step S102 includes:
[0056] S1021: Extract the key field of the traffic information and the first value corresponding to the key field.
[0057] S1022: Obtain the safe value range of the first value corresponding to the key field in the traffic information database.
[0058] S1023: In a case where the first value exceeds the safe value range of the first value, it is determined that the safety detection result is unsafe.
[0059] Techniques such as semantic recognition can be used to extract key fields in traffic information. For example, "speed limit", "current speed" and so on.
[0060] Each key field can correspond to a value, that is, the first value. For example: the key field is "current vehicle speed", and the corresponding first value is 200km/h.
[0061] According to the key fields, a query is made in the traffic information database to obtain the safe value range of the first value corresponding to the vehicle speed. For example, the safe value range of vehicle speed recorded in the traffic information database is 60km/h~120km/h. It is necessary to confirm whether the first value 200km/h is within the safe value range. In the above embodiment, it can be determined that the traffic participant whose current vehicle speed is 200km/h is an abnormal traffic participant.
[0062] For another example, the key field is "Red Light Duration", and the corresponding value is 35 seconds.
[0063] According to the key fields, query in the traffic information database to obtain the safe value range of the value corresponding to the red light duration. For example, the safe value range of the red light duration recorded in the traffic information database is 30 seconds to 90 seconds. Need to confirm whether 35 is within the safe value range. In the above embodiment, it can be determined that it is safe to emit a traffic signal light containing a red light for 35 seconds.
[0064] Through the above solution, the first value corresponding to the key field in the traffic information is used to judge the security, and if it exceeds the security range, the attack can be determined. Therefore, even if an attacker uses a real certificate, he may be identified as unsafe because the value range in his traffic information exceeds the standard.
[0065] Such as Figure 4 As shown, in an embodiment, when the signal is a signal received multiple times, step S102 further includes:
[0066] S1024: Determine the amount of change in the first numerical value in the traffic information obtained by analyzing the signals received twice adjacently.
[0067] S1025: Obtain the safe value range of the variation in the traffic information database.
[0068] S1026: When the amount of change exceeds the safe value range of the amount of change, determine that the safety test result is unsafe.
[0069] The wireless communication signal for the vehicle may be a continuous signal, for example, a continuous broadcast signal of a traffic signal light will be uninterrupted, for example, it may be broadcast once every 1 second.
[0070] Therefore, the safety detection device can receive the vehicle wireless communication signal multiple times. The key field and the corresponding first value can be parsed from each received signal. For example, the key field is "Red Light Duration", and the first values ​​parsed and extracted from the signals received two adjacent times are 35 seconds and 10 seconds respectively. From this, it can be determined that the amount of change in the first value for two consecutive times is 25 seconds.
[0071] According to the key fields, query in the traffic information database to obtain the safe value range corresponding to the red light duration change. For example, the safe value range corresponding to the red light duration change is 1 second to 5 seconds. In the case where the amount of change exceeds the safe value range, the safety detection result is determined to be unsafe, that is, the traffic signal light is determined to be an abnormal traffic participant.
[0072] Through the above solution, even if the first value is within the safe value range, when a sudden change occurs, it can be determined to be attacked.
[0073] Such as Figure 5 As shown, in one embodiment, the above method further includes:
[0074] S1011: Obtain certificate information from traffic information.
[0075] S1012: Determine the traffic participant who sent the signal according to the certificate information.
[0076] S1013: If the traffic participant is an abnormal traffic participant, report the information of the abnormal traffic participant.
[0077] After the safety detection device receives the signal, it can obtain traffic information by analyzing the signal. Traffic information can be information signed by a certificate. Therefore, after correct verification of the traffic information, the certificate serial number can be obtained. The legal certificate serial number stored in the traffic information database can be used to verify the certificate serial number obtained after correct verification. In addition, the certificate information may also be the plain text of the certificate, the certificate password, and so on.
[0078] According to the certificate serial number, the traffic participant who sent the signal can be determined. The legal certificate serial number is issued to traffic participants by the authority, and the traffic participant who sent the signal can be determined by the certificate serial number. If the safety test result is unsafe, it is determined as an abnormal traffic participant.
[0079] Send the relevant information of the abnormal traffic participant who sent the signal to the cloud (server). Related information can be certificate serial number, serial number, etc. Subsequent processing by the cloud (server) of abnormal traffic participants, such as reporting to a certificate issuing authority to cancel their certificates, or performing early warning broadcasts to other traffic participants, etc.
[0080] In the above manner, the certificate information can be used to lock out an insecure device, thereby facilitating subsequent processing of the device.
[0081] Such as Image 6 As shown, this application provides a method for processing traffic information, including the following steps:
[0082] S601: Send a traffic information database to a safety detection device, where the traffic information database is used to provide reference data for safety detection of traffic information.
[0083] S602: Send the received information of the abnormal traffic participant to the target user.
[0084] The above steps can be performed by the cloud (server). The cloud (server) periodically sends the traffic information database to the safety detection device. For example, the magnitude of the data update can be used as a condition for triggering the periodic sending. The traffic information database stores the safe value range of the first data corresponding to each different type of traffic information, the safe value range of the first data change twice adjacently, and the certificate serial number of the legal certificate. Used to provide reference data for the safety detection of traffic information.
[0085] When the safety detection equipment determines the abnormal traffic participant, it will report the information of the abnormal traffic participant. From this, the cloud (server) can obtain information about abnormal traffic participants. For example, it can be a certificate serial number, serial number, etc.
[0086] The cloud (server) can send the received information of the abnormal traffic participant to the target user. The target user may be another traffic participant, such as a vehicle near the abnormal traffic participant, and inform the above-mentioned vehicle that there is an abnormal traffic participant. Alternatively, the target user may also be a certificate management organization, so that the certificate issuing organization invalidates the certificates of abnormal traffic participants.
[0087] Through the above scheme, after an abnormal traffic participant is identified using traffic information, it can be dealt with in time. Effectively deal with the risk of traffic information being attacked.
[0088] In an embodiment, step S602 includes:
[0089] Send the information of abnormal traffic participants to the certificate management agency and/or normal traffic participants.
[0090] Such as Figure 7 As shown, this application provides a traffic information processing device, including:
[0091] The signal analysis module 701 is used to analyze the received signal to obtain the traffic information carried in the signal.
[0092] The safety detection module 702 is used for searching a pre-stored traffic information database according to the traffic information to obtain the safety detection result of the traffic information.
[0093] The abnormal traffic participant determination module 703 is used for determining that the traffic participant that sends the signal is an abnormal traffic participant when the safety detection result is unsafe.
[0094] Such as Figure 8 As shown, in an implementation manner, the security detection module 702 includes:
[0095] The information extraction sub-module 7021 is used to extract the key fields of the traffic information and the first value corresponding to the key fields.
[0096] The first safe value range obtaining sub-module 7022 is configured to obtain the safe value range of the first value corresponding to the key field in the traffic information database.
[0097] The first safety detection sub-module 7023 is configured to determine that the safety detection result is unsafe when the first value exceeds the safe value range of the first value.
[0098] Such as Picture 9 As shown, in an implementation manner, the security detection module 702 further includes:
[0099] The change amount determining sub-module 7024 is used to determine the amount of change in the first value in the traffic information obtained by analyzing the signals received twice.
[0100] The second safe value range obtaining submodule 7025 is used to obtain the safe value range of the variation in the traffic information database.
[0101] The second safety detection sub-module 7026 is used to determine that the safety detection result is unsafe when the variation exceeds the safe value range of the variation.
[0102] Such as Picture 10 As shown, in an embodiment, the device for processing traffic information further includes:
[0103] The certificate information obtaining module 704 is used to obtain certificate information from traffic information.
[0104] The traffic participant determination module 705 is configured to determine the traffic participant who issued the signal according to the certificate information.
[0105] The information reporting module 706 is used for reporting abnormal traffic parameter information when the traffic participant is an abnormal traffic participant.
[0106] Such as Picture 11 As shown, this application provides a traffic information processing device, including:
[0107] The traffic information database sending module 1101 is used to send the traffic information database to the safety inspection equipment, and the traffic information database is used to provide reference data for the safety inspection of the traffic information.
[0108] The information sending module 1102 is used to send the received information of the abnormal traffic participant to the target user.
[0109] In an embodiment, the information sending module 1102 includes:
[0110] The information sending module execution sub-module is used to send the information of abnormal traffic participants to the certificate management agency and/or normal traffic participants.
[0111] According to the embodiments of the present application, the present application also provides an electronic device and a readable storage medium.
[0112] Such as Picture 12 What is shown is a block diagram of an electronic device of a method for processing traffic information according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptop computers, desktop computers, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers. Electronic devices can also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions are merely examples, and are not intended to limit the implementation of the application described and/or required herein.
[0113] Such as Picture 12 As shown, the electronic device includes one or more processors 1210, memory 1220, and interfaces for connecting various components, including a high-speed interface and a low-speed interface. The various components are connected to each other by using different buses, and can be installed on a common motherboard or installed in other ways as required. The processor may process instructions executed in the electronic device, including instructions stored in or on the memory to display graphical information of the GUI on an external input/output device (such as a display device coupled to an interface). In other embodiments, multiple processors and/or multiple buses may be used with multiple memories and multiple memories if necessary. Similarly, multiple electronic devices can be connected, and each device provides part of the necessary operations (for example, as a server array, a group of blade servers, or a multi-processor system). Picture 12 Take a processor 1210 as an example.
[0114] The memory 1220 is the non-transitory computer-readable storage medium provided by this application. Wherein, the memory stores instructions that can be executed by at least one processor, so that the at least one processor executes the traffic information processing method provided by the present application. The non-transitory computer-readable storage medium of the present application stores computer instructions, and the computer instructions are used to make a computer execute the traffic information processing method provided by the present application.
[0115] As a non-transitory computer-readable storage medium, the memory 1220 can be used to store non-transitory software programs, non-transitory computer-executable programs and modules, such as program instructions/modules corresponding to the traffic information processing method in the embodiment of the present application (for example, , Attached Figure 7 The signal analysis module 701, the safety detection module 702, and the abnormal traffic participant determination module 703 shown, or attached Picture 11 The traffic information database sending module 1101 and the information sending module 1102 are shown). The processor 1210 executes various functional applications and data processing of the server by running non-transitory software programs, instructions, and modules stored in the memory 1220, that is, implements the traffic information processing method in the foregoing method embodiment.
[0116] The memory 1220 may include a storage program area and a storage data area. The storage program area may store an operating system and an application program required by at least one function; the storage data area may store information created by the use of an electronic device based on the traffic information processing method. Data etc. In addition, the memory 1220 may include a high-speed random access memory, and may also include a non-transitory memory, such as at least one magnetic disk storage device, a flash memory device, or other non-transitory solid-state storage devices. In some embodiments, the memory 1220 may optionally include memories remotely provided with respect to the processor 1210, and these remote memories may be connected to the electronic device of the traffic information processing method via a network. Examples of the aforementioned networks include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
[0117] The electronic device of the method for processing traffic information may further include: an input device 1230 and an output device 1240. The processor 1210, the memory 1220, the input device 1230, and the output device 1240 may be connected by a bus or other methods, Picture 12 Take the bus connection as an example.
[0118] The input device 1230 can receive input digital or character information, and generate key signal input related to the user settings and function control of the electronic equipment of the traffic information processing method, such as touch screen, keypad, mouse, trackpad, touchpad, and instructions Stick, one or more mouse buttons, trackball, joystick and other input devices. The output device 1240 may include a display device, an auxiliary lighting device (for example, LED), a tactile feedback device (for example, a vibration motor), and the like. The display device may include, but is not limited to, a liquid crystal display (LCD), a light emitting diode (LED) display, and a plasma display. In some embodiments, the display device may be a touch screen.
[0119] Various implementations of the systems and technologies described herein can be implemented in digital electronic circuit systems, integrated circuit systems, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: being implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, the programmable processor It can be a dedicated or general-purpose programmable processor that can receive data and instructions from the storage system, at least one input device, and at least one output device, and transmit the data and instructions to the storage system, the at least one input device, and the at least one output device. An output device.
[0120] These calculation programs (also called programs, software, software applications, or codes) include machine instructions of a programmable processor, and can be implemented using high-level procedures and/or object-oriented programming languages, and/or assembly/machine language Calculation program. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, device, and/or device used to provide machine instructions and/or data to a programmable processor ( For example, magnetic disks, optical disks, memory, programmable logic devices (PLD)), including machine-readable media that receive machine instructions as machine-readable signals. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
[0121] In order to provide interaction with the user, the systems and techniques described here can be implemented on a computer that has: a display device for displaying information to the user (for example, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) ); and a keyboard and a pointing device (for example, a mouse or a trackball) through which the user can provide input to the computer. Other types of devices can also be used to provide interaction with the user; for example, the feedback provided to the user can be any form of sensory feedback (for example, visual feedback, auditory feedback, or tactile feedback); and can be in any form (including Acoustic input, voice input or tactile input) to receive input from the user.
[0122] The systems and technologies described herein can be implemented in a computing system that includes back-end components (for example, as a data server), or a computing system that includes middleware components (for example, an application server), or a computing system that includes front-end components (for example, A user computer with a graphical user interface or a web browser, through which the user can interact with the implementation of the system and technology described herein), or includes such background components, middleware components, Or any combination of front-end components in a computing system. The components of the system can be connected to each other through any form or medium of digital data communication (for example, a communication network). Examples of communication networks include: local area network (LAN), wide area network (WAN), and the Internet.
[0123] The computer system can include clients and servers. The client and server are generally far away from each other and usually interact through a communication network. The relationship between the client and the server is generated through computer programs running on the corresponding computers and having a client-server relationship with each other.
[0124] It should be understood that the various forms of processes shown above can be used to reorder, add or delete steps. For example, the steps described in the present application can be executed in parallel, sequentially, or in a different order, as long as the desired result of the technical solution disclosed in the present application can be achieved, this is not limited herein.
[0125] The foregoing specific implementations do not constitute a limitation on the protection scope of the present application. Those skilled in the art should understand that various modifications, combinations, sub-combinations, and substitutions can be made according to design requirements and other factors. Any modifications, equivalent replacements and improvements made within the spirit and principles of this application shall be included in the scope of protection of this application.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products