Unlock instant, AI-driven research and patent intelligence for your innovation.

A dual-chain repair information security control method and device for intelligent networked vehicles

A technology for repairing information and security control. It is applied to control devices, measuring devices, vehicle components, etc., and can solve problems such as insufficient consideration of information security threats and the vulnerability of vehicle communications to malicious attacks.

Active Publication Date: 2021-10-19
BEIHANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in reality, because the vehicle uses radio communication technology to realize data transmission, its communication process is in an open space, which also makes the communication between vehicles vulnerable to malicious attacks. In the existing technology, the information security faced by networked vehicles Insufficient consideration of threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dual-chain repair information security control method and device for intelligent networked vehicles
  • A dual-chain repair information security control method and device for intelligent networked vehicles
  • A dual-chain repair information security control method and device for intelligent networked vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] see image 3 , a schematic diagram of a dual-chain repair information security control method for intelligent networked vehicles provided by the embodiment of the present application, as shown in figure 1 As shown, the method includes steps S301 to S303:

[0078] S301, the vehicles in the fleet receive the dynamic information of the preceding vehicle;

[0079] S302. Detect whether the kinetic information is abnormal;

[0080] S303. Update communication link data and verification link data according to the dynamic information; if the dynamic information is abnormal, correct the communication link data according to the verification link data;

[0081] Wherein, the communication link data is used to store the dynamic information of the preceding vehicle, and the verification link data is used to predict the dynamic information of the preceding vehicle at the next moment according to the dynamic information of the preceding vehicle at the current moment.

[0082] In the ...

Embodiment 2

[0161] Based on the same inventive concept, the embodiment of the present invention also provides a dual-chain repair information security control device for intelligent networked vehicles, such as Figure 6 As shown, the device includes:

[0162] The receiving module 601 is used for the vehicle in the fleet to receive the dynamic information of the preceding vehicle;

[0163] A detection module 602, configured to detect whether the kinetic information is abnormal;

[0164] The correction module 603 is configured to update the communication link data and the verification link data according to the dynamic information; if the dynamic information is abnormal, correct the communication link data according to the verification link data.

[0165] Wherein, the communication link data is used to store the dynamic information of the preceding vehicle, and the verification link data is used to predict the dynamic information of the preceding vehicle at the next moment according to the...

Embodiment 3

[0205] Based on the same inventive concept, the embodiment of the present invention also provides a dual-chain repair information security control device for intelligent networked vehicles, such as Figure 7 As shown, the device includes:

[0206] Including memory 702, processor 701 and user interface 703;

[0207] The memory 702 is used to store computer programs;

[0208] The user interface 703 is configured to interact with the user;

[0209] The processor 701 is configured to read the computer program in the memory 702, and when the processor 701 executes the computer program, it realizes:

[0210] Vehicles in the convoy receive dynamic information from the preceding vehicle;

[0211] Detecting whether the kinetic information is abnormal;

[0212] updating communication link data and verification link data according to the kinetic information;

[0213] If there is an abnormality in the kinetic information, correcting the communication link data according to the verifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a dual-chain repair information security control method and device for intelligent networked vehicles, which are used to provide protection for communication security of vehicle networked fleets. The vehicle information security control method disclosed in the present application includes: the vehicle in the fleet receives the dynamic information of the preceding vehicle; detects whether the dynamic information is abnormal; updates the communication link data and the verification link data according to the dynamic information; if If the dynamics information is abnormal, the communication link data is corrected according to the verification chain data; wherein, the communication link data is used to store the dynamic information of the preceding vehicle, and the verification chain data is used to According to the dynamic information of the preceding vehicle at the current moment, the dynamic information of the preceding vehicle at the next moment is predicted. The present application also provides a dual-chain restoration information security control device for intelligent networked vehicles.

Description

technical field [0001] The present application relates to the field of automobile security, in particular to a method and device for dual-chain restoration information security control for intelligent networked automobiles. Background technique [0002] With the vigorous development of emerging technologies such as artificial intelligence, big data, and 5G communications, intelligent networked vehicles (also known as the Internet of Vehicles, Vechile to Everything, V2X) can exchange data with other vehicles and road facilities, and use sensors to monitor the surrounding environment. The environment can be fully sensed, and collisions can be avoided under ideal conditions. Traffic management personnel can also conduct remote monitoring and scheduling through edge-cloud collaboration, improve road traffic efficiency, and alleviate traffic congestion. But in reality, since the vehicle uses radio communication technology to realize data transmission, its communication process is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/23G06F17/11G01D21/02G06Q10/04B60W50/00
CPCB60W50/00B60W2556/65G01D21/02G06F17/11G06Q10/04G06F16/2358
Inventor 吴新开王朋成陈恒威赵亚楠张少伟
Owner BEIHANG UNIV