Vehicle protection method and device and computer readable storage medium

A technology of a protection device and a computer program, applied in the fields of devices, computer-readable storage media, and vehicle protection methods, can solve the problem that the behavior of vehicle safety cannot be blocked, the terminal vehicle cannot perform safety analysis and safety disposal, and the terminal vehicle is not responsible. Issues such as analysis and safe disposal

Inactive Publication Date: 2021-08-06
杭州安恒信息安全技术有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The 5G era endows network connections with higher communication rates and accuracy, but in the absence of network security, this efficiency improvement will become passive water
[0003] Compared with other single-function IoT devices, smart cars have stronger computing power and richer functions, and more potential safety hazards
Compared with the terminal, the cloud has stronger analysis capabilities and wider data dimensions. The terminal of the existing technology only undertakes the basic function requirements of the Internet of Things for information collection and information reporting. The analysis is completely placed in the cloud, and the terminal vehicle is not responsible for analysis and safe disposal. , in the case of non-network, the terminal vehicle cannot perform security analysis and security disposal, resulting in the inability to block behaviors that affect vehicle safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle protection method and device and computer readable storage medium
  • Vehicle protection method and device and computer readable storage medium
  • Vehicle protection method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of this application.

[0051] In order to enable those skilled in the art to better understand the solution of the present application, the present application will be further described in detail below in conjunction with the drawings and specific implementation methods.

[0052] Next, a vehicle protection method provided by an embodiment of the present application is introduced in detail. figure 1 It is a flow chart of a vehicle protection method provided in an embodiment of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a vehicle protection method and device and a medium. The method comprises the steps of collecting safety index data of a system kernel; judging whether the security index data is matched with the acquired blacklist strategy; if the security index data is not matched with the acquired blacklist strategy, analyzing the security index data based on a set analysis rule to generate a new blacklist strategy, and matching the security index data according to the new blacklist strategy to execute a corresponding processing action; and if the safety index data is matched with the acquired blacklist strategy, executing a corresponding treatment action based on the matched information, thereby ensuring that factors influencing the vehicle safety are blocked or ended in time. According to the technical scheme, the processing device of the vehicle can analyze the safety index data based on the obtained blacklist strategy, and timely discover factors which threaten the vehicle safety, so that the processing action is adopted, and the terminal vehicle can effectively block behaviors which influence the vehicle safety.

Description

technical field [0001] The present application relates to the technical field of networked vehicle security, in particular to a vehicle protection method, device and computer-readable storage medium. Background technique [0002] The 5G era has endowed network connections with higher communication rates and accuracy, but in the absence of network security, this efficiency improvement will become passive water. Imagine a camera, if its content has been tampered with, there will be no artificial intelligence applications behind it. The same is true for networked vehicles. If the car's instructions are tampered with, it will be more dangerous; and if important production equipment is subjected to serious cyber attacks, the consequences will be unimaginable. [0003] Compared with other single-function IoT devices, smart cars have stronger computing power and richer functions, and more potential safety hazards. Compared with the terminal, the cloud has stronger analysis capabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/552
Inventor 潘国华华超
Owner 杭州安恒信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products