CN115333851A - Automatic driving data transmission method and device and electronic equipment - Google Patents

Automatic driving data transmission method and device and electronic equipment Download PDF

Info

Publication number
CN115333851A
CN115333851A CN202211035793.1A CN202211035793A CN115333851A CN 115333851 A CN115333851 A CN 115333851A CN 202211035793 A CN202211035793 A CN 202211035793A CN 115333851 A CN115333851 A CN 115333851A
Authority
CN
China
Prior art keywords
target
subdata
plug
sub
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211035793.1A
Other languages
Chinese (zh)
Inventor
王亚雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apollo Intelligent Technology Beijing Co Ltd
Original Assignee
Apollo Intelligent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apollo Intelligent Technology Beijing Co Ltd filed Critical Apollo Intelligent Technology Beijing Co Ltd
Priority to CN202211035793.1A priority Critical patent/CN115333851A/en
Publication of CN115333851A publication Critical patent/CN115333851A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Control Of Transmission Device (AREA)

Abstract

The disclosure provides a transmission method and device of automatic driving data and electronic equipment, relates to the technical field of data transmission, and particularly relates to the technical field of data transmission in the automatic driving field. The specific implementation scheme is as follows: the method comprises the steps of obtaining automatic driving data to be transmitted, wherein the automatic driving data comprise first subdata and second subdata, and the safety level of the first subdata is higher than that of the second subdata; processing the first subdata based on a preset means to obtain target subdata, wherein the preset means comprises an encryption processing means; transmitting target data to second electronic equipment, wherein the target data comprises the target sub-data and the second sub-data. The present disclosure can improve the effect of data transmission.

Description

Automatic driving data transmission method and device and electronic equipment
Technical Field
The present disclosure relates to the field of data transmission technology, and more particularly, to the field of data transmission technology in the field of automatic driving. In particular to a method and a device for transmitting automatic driving data and electronic equipment.
Background
In the field of automatic driving, data transmission is an important link in the automatic driving process, and in order to ensure the safety of data transmission, a sending end generally encrypts data to be transmitted before data transmission. After receiving the data, the receiving end decrypts the data to obtain the decrypted data content.
Disclosure of Invention
The disclosure provides a transmission method and device of automatic driving data and electronic equipment.
According to a first aspect of the present disclosure, there is provided a transmission method of automatic driving data, applied to a first electronic device, including:
the method comprises the steps of obtaining automatic driving data to be transmitted, wherein the automatic driving data comprise first subdata and second subdata, and the safety level of the first subdata is higher than that of the second subdata;
processing the first subdata based on a preset means to obtain target subdata, wherein the preset means comprises an encryption processing means;
transmitting target data to second electronic equipment, wherein the target data comprises the target sub-data and the second sub-data.
According to a second aspect of the present disclosure, there is provided a transmission device of automatic driving data, including:
the system comprises an acquisition module, a transmission module and a display module, wherein the acquisition module is used for acquiring the automatic driving data to be transmitted, the automatic driving data comprises first subdata and second subdata, and the safety level of the first subdata is higher than that of the second subdata;
the processing module is used for processing the first subdata based on preset means to obtain target subdata, wherein the preset means comprises encryption processing means;
the transmission module is used for transmitting target data to second electronic equipment, wherein the target data comprises the target subdata and the second subdata.
According to a third aspect of the present disclosure, there is provided an electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of the first aspect.
According to a fourth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of the first aspect.
According to a fifth aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the method of the first aspect.
In the embodiment of the disclosure, before the transmission of the automatic driving data, only part of the first subdata with higher security level in the automatic driving data is encrypted, and the second subdata with lower security level is not encrypted, so that the safety of the automatic driving data transmission can be ensured, and meanwhile, the occupation of CPU (central processing unit) resources of the automatic driving vehicle in the encryption process can be reduced, thereby improving the data transmission effect.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a flowchart of a transmission method of automatic driving data according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a transmission system for automatic driving data according to an embodiment of the present disclosure;
fig. 3 is a second flowchart of a transmission method of automatic driving data according to an embodiment of the disclosure;
fig. 4 is a schematic structural diagram of a transmission device for automatic driving data according to an embodiment of the present disclosure;
fig. 5 is a block diagram of an electronic device for implementing a transmission method of automatic driving data according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Referring to fig. 1, fig. 1 is a schematic flow chart of a transmission method of automatic driving data according to an embodiment of the present disclosure, where the transmission method of automatic driving data includes the following steps:
step S101, obtaining automatic driving data to be transmitted, wherein the automatic driving data comprises first subdata and second subdata, and the safety level of the first subdata is higher than that of the second subdata;
step S102, processing the first subdata based on a preset means to obtain target subdata, wherein the preset means comprises an encryption processing means;
step S103, transmitting target data to second electronic equipment, wherein the target data comprises the target subdata and the second subdata.
The automatic driving data may be various data received or transmitted during the driving process of the automatic driving vehicle, for example, the data may be transmitted to the remote control cabin by the automatic driving vehicle, or the data may be received from the remote control cabin by the automatic driving vehicle. Furthermore, the above-mentioned automatic driving data may also be data transmitted between different devices in the automatic driving vehicle, for example, control data for controlling an in-vehicle component, which is input by a user through an in-vehicle display screen, in which case the first electronic device and the second electronic device are two different devices in the automatic driving vehicle.
In addition, the automatic driving data may be data in the form of an Interface Description Language (IDL) file. The following takes the automatic driving data as an IDL file as an example, and further explains the automatic driving data transmission method provided by the disclosed embodiment.
Specifically, a Service-Oriented Architecture (SOA) framework may be preconfigured in the first electronic device. The transmission method of the automatic driving data may be a message sent by any SOA application program in the first electronic device based on the SOA framework. Specifically, referring to fig. 2, after the SOA application program a generates data to be transmitted, the IDL compiler in the SOA framework compiles the data to be transmitted to obtain an IDL file, and then the SOA framework processes the first sub-data in the IDL file by using the preset means to obtain target data. The SOA frame may transmit the target Data to the SOA frame of the second electronic device through a Data Distribution Service (DDS) centered on the Data, and the SOA frame of the second electronic device decrypts the target Data, so as to obtain the Data to be transmitted, thereby completing the Data transmission process.
Since the IDL file generally has a plurality of different methods and events therein, the first sub-data may be any method or event (event) in the IDL file. Correspondingly, the second sub-data may also be any method or event in the IDL file. And the first subdata and the second subdata are different data.
It can be understood that the automatic driving data may include at least one of the first sub-data and at least one of the second sub-data, and the processing of the first sub-data based on the preset means may refer to: processing all first subdata in the automatic driving data based on a preset means, and obtaining target subdata corresponding to the first subdata one by one. The data content of different first subdata in the automatic driving data can be different, and the data content of different second subdata in the automatic driving data can be different. After the target sub-data is obtained, the SOA framework may combine the target sub-data and the second sub-data to obtain the target data.
In an embodiment of the present disclosure, identification information may be set for the first sub-data in the IDL file, so that the SOA framework may determine the first sub-data in the IDL file by recognizing the identification information, and further process the determined first sub-data by using the preset means.
The Encryption processing means may be various types of Encryption methods in the related art, for example, an Encryption method such as asymmetric cryptography (RSA) or Advanced Encryption Standard (AES) Encryption may be used.
In this embodiment, before the transmission of the autonomous driving data, only a part of the first subdata with a higher security level in the autonomous driving data is encrypted, and the second subdata with a lower security level is not encrypted, so that the security of the autonomous driving data transmission can be ensured, and meanwhile, the occupation of a Central Processing Unit (CPU) resource of the autonomous driving vehicle in the encryption process can be reduced, thereby improving the data transmission effect.
Optionally, the automatic driving data includes at least two pieces of the first subdata, and each piece of the first subdata includes a safety level identifier;
the processing the first subdata based on a preset means to obtain target subdata comprises the following steps:
and for each first subdata, determining a preset means corresponding to the first subdata in a target configuration file based on the safety level identification, and processing the first subdata based on the preset means corresponding to the first subdata to obtain the target subdata corresponding to the first subdata, wherein the target configuration file comprises the corresponding relation between the safety level identification and the preset means, and the preset means corresponding to different safety level identifications are different.
In particular, the amount of cpu resources occupied by the process of encrypting data due to different encryption algorithms is typically different. And the more cpu resources are generally occupied by the encryption algorithm with better encryption effect. The types of data to be transmitted in the autonomous driving vehicle are various, and the safety requirements of different data to be transmitted are usually different.
Based on this, in the embodiment of the present disclosure, a corresponding security level identifier may be configured in each first sub-data (i.e., event or method) in the IDL file in advance, where the security level identifier is used to indicate a security level of the first sub-data to which the security level identifier belongs. It can be understood that related personnel may set the security level identifier in advance for various types of files, and thus, when the SOA framework acquires the IDL file, the SOA framework may first acquire the security level identifier of each event or method in the IDL file, and then process the event or method by using a corresponding preset means according to the security level identifier of each event or method.
It can be understood that, since the second sub-data is data that does not need to be encrypted, the security level identifier may not be configured in the second sub-data, and certainly, the security level identifier may also be configured in the second sub-data, and the security level identifier in the second sub-data is used to indicate that encryption processing is not needed.
In this embodiment, by configuring a corresponding security level identifier in each first subdata, when the SOA framework acquires the IDL file, the SOA framework may first acquire the security level identifier of each first subdata in the IDL file, and then process the event or the method by using a corresponding preset means according to the security level identifier of each first subdata. Because the corresponding preset means can be adopted for processing according to the security level of each first subdata, the processing effect of the IDL file is favorably improved.
Optionally, the encryption modes in the preset means corresponding to different security level identifiers are different.
It can be understood that different encryption methods have different encryption effects. In an embodiment of the present disclosure, the first sub-data with a higher security level may be encrypted with a better encryption effect, so as to improve data security. Correspondingly, the first subdata with lower security level is encrypted by adopting the encryption method with poorer encryption effect and less CPU resource occupied in the encryption process so as to save the CPU resource.
In the embodiment, different encryption is adopted for the first subdata with different security levels, so that the transmitted data can be effectively protected, and meanwhile, the CPU resource occupation in the encryption process can be further reduced.
Optionally, the preset means further comprises at least one of: compression processing and add checks.
Specifically, the compression processing may be processing based on various types of compression processing manners in the related art. The adding check is to add a check flow in the first sub-data, and after the adding check, when the second electronic device parses the first sub-data, the first sub-data can be obtained only after the corresponding check is completed, where the added check mode may be various types of check modes in the related art, for example, cyclic Redundancy Check (CRC) check and the like.
In an embodiment of the present disclosure, the different preset means corresponding to the different security level identifiers may specifically be: different encryption means, whether compression processing is performed, whether verification is added, and the like. For example, the preset means corresponding to the security level 1 is as follows: and the encryption mode A is adopted for encryption and compression processing without adding verification. The preset means corresponding to the security level 2 is as follows: and the encryption mode A is adopted for encryption, compression processing is not carried out, and verification is added.
It is understood that the preset means processing may include other data processing means in the related art besides the three listed data processing means.
In this embodiment, the preset means includes multiple processing manners such as encryption, compression processing, and addition of check, which is beneficial to processing the first sub-data with different security levels by using different preset means.
Optionally, the preset means corresponding to the first sub-data includes: target compression mode processing, target verification mode processing and target encryption mode processing.
In this embodiment, since the preset means corresponding to the first sub-data includes a target compression method process, a target verification method process, and a target encryption method process, when the first sub-data is processed, the first sub-data may be compressed, encrypted, and check-added respectively.
Optionally, the processing the first sub-data based on a preset means corresponding to the first sub-data to obtain the target sub-data includes:
calling a target plug-in a target plug-in library to process the first subdata based on a preset means corresponding to the first subdata to obtain the target subdata, wherein the target plug-in library comprises a plug-in used for processing the first subdata, and the target plug-in is a plug-in matched with the preset means corresponding to the first subdata in the target plug-in library.
In the embodiment, when the first sub-data is processed, the first sub-data is processed in a plug-in calling mode, so that related personnel do not need to pay attention to specific implementation of the algorithm in a specific service scene, only the plug-ins in the plug-in library need to be loaded according to the configuration file when the SOA framework is initialized, a user writing the SOA application program does not need to know the specific implementation of the algorithm, and only the safety level at which a method or an event in service needs to be processed needs to be explicitly pointed out when the IDL file is defined, so that the implementation process of the data transmission mode provided by the embodiment of the disclosure is facilitated to be simplified.
Optionally, the target plug-in includes a first sub plug-in, a second sub plug-in and a third sub plug-in, where the first sub plug-in is a plug-in the target plug-in library corresponding to the target compression mode, the second sub plug-in is a plug-in the target plug-in library corresponding to the target verification mode, and the second sub plug-in is a plug-in the target plug-in library corresponding to the target encryption mode;
the calling a target plug-in a target plug-in library based on the preset means corresponding to the first subdata to process the first subdata to obtain the target subdata, and the method comprises the following steps:
compressing the first subdata based on the first sub-plug-in, adding verification processing to the first subdata based on the second sub-plug-in, and encrypting the first subdata based on the third sub-plug-in to obtain the target subdata.
In one embodiment of the present disclosure, the target plug-in library may include a first sub plug-in library, a second sub plug-in library and a second sub plug-in library.
The first sub-plug-in library comprises at least two first plug-ins, the at least two first plug-ins correspond to at least two compression modes one by one, and the first sub-plug-ins are first plug-ins corresponding to the target compression mode in the at least two first plug-ins;
the second sub plug-in library comprises at least two second plug-ins, the at least two second plug-ins correspond to the at least two verification modes one by one, and the second sub plug-in is a second plug-in corresponding to the target verification mode in the at least two second plug-ins;
the third sub plug-in library comprises at least two third plug-ins, the at least two third plug-ins correspond to the at least two encryption modes one by one, and the third sub plug-in is a third plug-in corresponding to the target encryption mode in the at least two third plug-ins.
Specifically, the first sub-plug-in library, the second sub-plug-in library and the third sub-plug-in library may be constructed in advance. Specifically, the corresponding first plug-in can be constructed according to different compression algorithms, and then the constructed first plug-in is stored in the first sub plug-in library. Accordingly, a corresponding second plug-in may be constructed according to different verification algorithms, and then the constructed second plug-in is stored in the second sub plug-in library. A corresponding third plug-in may be constructed according to a different encryption algorithm and then stored in the third sub-plug-in library. Therefore, when the first subdata needs to be compressed, added with verification and encrypted, the SOA framework can directly call the corresponding target plug-in from the corresponding plug-in library for processing, and the compression, added verification, encryption and other processing processes are completed through the called target plug-in.
In this embodiment, since the plug-ins in the plug-in library can be configured in advance, relevant personnel do not need to pay attention to specific implementation of the algorithm in a specific service scene, and only need to load the plug-ins in the plug-in library according to the configuration file when the SOA framework is initialized, a user writing the SOA application program does not need to know the specific implementation of the algorithm, and only needs to explicitly specify what security level the method or event in service needs to be processed in defining the IDL file, thereby facilitating simplification of the implementation process of the data transmission method provided by the embodiment of the present disclosure.
Referring to fig. 2, fig. 2 is a data transmission system provided in an embodiment of the present disclosure, where the data transmission system includes a first electronic device and a second electronic device, and SOA frameworks are respectively configured in the first electronic device and the second electronic device, and an SOA application a is configured in the first electronic device, and an SOA application B is configured in the second electronic device. The SOA framework comprises an IDL compiler and an SOA information safety management assembly, and the SOA information safety management assembly comprises: an encryption/decryption interface (enc/dec API), a data compression interface (compression API), and a verification interface (authentication API), wherein the encryption/decryption interface may call any one of third plug-ins (libertypso) in a third sub-plug-in library; the data compression interface can call any one of the first plug-ins in the first sub plug-in library (libcpression. So); the verification interface may call any one of second plug-ins in a second sub-plug-in library (library).
Referring to fig. 3, an embodiment of the present disclosure provides a transmission method of automatic driving data based on the data transmission system, where the method includes the following steps:
initializing an SOA framework; initializing an SOA information safety management component; loading the target configuration file in an SOA framework; and loading the plug-ins in the plug-in library, namely loading the plug-ins in the first sub plug-in library, the second sub plug-in library and the third sub plug-in library respectively. When the SOA framework receives the automatic driving data to be transmitted by the SOA application program A, the automatic driving data to be transmitted is compiled by the IDL compiler to obtain an IDL file. Then, the SOA information safety management component respectively identifies the safety level identification of each first subdata in the IDL file; and determining a processing mode corresponding to each first subdata based on the target configuration file and the security level identifier of each first subdata, and then calling corresponding plug-ins through the encryption/decryption interface, the data compression interface and the verification interface to process the first subdata based on the determined processing mode so as to obtain target subdata corresponding to each first subdata. And finally, combining all the target subdata and all the second subdata to form target data, and sending the target data.
The second electronic device can also call the plug-in to analyze the target data based on the encryption/decryption interface, the data compression interface and the verification interface of the SOA framework in the second electronic device when receiving the target data, so as to obtain the automatic driving data.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a transmission device 400 for automatic driving data according to an embodiment of the present disclosure, where the transmission device 400 for automatic driving data includes:
the automatic driving data transmission system comprises an acquisition module 401, a transmission module and a display module, wherein the acquisition module is used for acquiring automatic driving data to be transmitted, the automatic driving data comprises first subdata and second subdata, and the safety level of the first subdata is higher than that of the second subdata;
a processing module 402, configured to process the first sub-data based on a preset means to obtain target sub-data, where the preset means includes an encryption processing means;
a transmission module 403, configured to transmit target data to a second electronic device, where the target data includes the target sub-data and the second sub-data.
Optionally, the automatic driving data includes at least two pieces of the first sub data, and each piece of the first sub data includes a safety level identifier;
the processing module 402 is specifically configured to, for each first subdata, determine a preset means corresponding to the first subdata in a target configuration file based on the security level identifier, and process the first subdata based on the preset means corresponding to the first subdata to obtain the target subdata corresponding to the first subdata, where the target configuration file includes a correspondence between the security level identifier and the preset means, and preset means corresponding to different security level identifiers are different.
Optionally, the encryption modes in the preset means corresponding to different security level identifiers are different.
Optionally, the preset means further comprises at least one of: compression processing and add checks.
Optionally, the preset means corresponding to the first sub-data includes: target compression mode processing, target verification mode processing and target encryption mode processing.
Optionally, the processing module 402 is specifically configured to call a target plug-in a target plug-in library based on a preset means corresponding to the first sub-data to process the first sub-data, so as to obtain the target sub-data, where the target plug-in library includes a plug-in for processing the first sub-data, and the target plug-in is a plug-in the target plug-in library that matches the preset means corresponding to the first sub-data.
Optionally, the target plug-in includes a first sub plug-in, a second sub plug-in and a third sub plug-in, where the first sub plug-in is a plug-in the target plug-in library corresponding to the target compression method, the second sub plug-in is a plug-in the target plug-in library corresponding to the target verification method, and the second sub plug-in is a plug-in the target plug-in library corresponding to the target encryption method;
the processing module 402 is specifically configured to perform compression processing on the first sub-data based on the first sub-plug-in, perform addition verification processing on the first sub-data based on the second sub-plug-in, and perform encryption processing on the first sub-data based on the third sub-plug-in to obtain the target sub-data.
It should be noted that the transmission apparatus 400 of the automatic driving data provided in this embodiment can implement all technical solutions of the first electronic device in the foregoing transmission method of the automatic driving data, so that at least all technical effects can be implemented, and details are not described here.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, and do not violate the customs of public sequences.
According to an embodiment of the present disclosure, the present disclosure also provides another electronic device, a readable storage medium, and a computer program product.
FIG. 5 illustrates a schematic block diagram of an example electronic device 500 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 5, the electronic device 500 includes a computing unit 501, which can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 502 or a computer program loaded from a storage unit 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the device 500 can also be stored. The calculation unit 501, the ROM 502, and the RAM 503 are connected to each other by a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
A number of components in the electronic device 500 are connected to the I/O interface 505, including: an input unit 506 such as a keyboard, a mouse, or the like; an output unit 507 such as various types of displays, speakers, and the like; a storage unit 508, such as a magnetic disk, optical disk, or the like; and a communication unit 509 such as a network card, modem, wireless communication transceiver, etc. The communication unit 509 allows the device 500 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 501 may be a variety of general-purpose and/or special-purpose processing components having processing and computing capabilities. Some examples of the computing unit 501 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 501 executes the respective methods and processes described above, such as the transmission method of the automatic driving data. For example, in some embodiments, the transmission method of the autopilot data may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 508. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 500 via ROM 502 and/or communications unit 509. When the computer program is loaded into the RAM 503 and executed by the computing unit 501, one or more steps of the transmission method of the automatic driving data described above are performed. Alternatively, in other embodiments, the computing unit 501 may be configured to perform the transmission method of the autopilot data in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program code, when executed by the processor or controller, causes the functions/acts specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel or sequentially or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (17)

1. A transmission method of automatic driving data is applied to first electronic equipment and comprises the following steps:
the method comprises the steps of obtaining automatic driving data to be transmitted, wherein the automatic driving data comprise first subdata and second subdata, and the safety level of the first subdata is higher than that of the second subdata;
processing the first subdata based on a preset means to obtain target subdata, wherein the preset means comprises an encryption processing means;
transmitting target data to second electronic equipment, wherein the target data comprises the target subdata and the second subdata.
2. The method of claim 1, wherein the autopilot data includes at least two of the first subdata and each of the first subdata includes a safety rating identification;
the processing the first subdata based on a preset means to obtain target subdata comprises:
and for each first subdata, determining a preset means corresponding to the first subdata in a target configuration file based on the safety level identification, and processing the first subdata based on the preset means corresponding to the first subdata to obtain the target subdata corresponding to the first subdata, wherein the target configuration file comprises the corresponding relation between the safety level identification and the preset means, and the preset means corresponding to different safety level identifications are different.
3. The method according to claim 2, wherein different security level identifiers correspond to different encryption modes in the preset means.
4. The method of claim 2, wherein the preset means further comprises at least one of: compression processing and add checks.
5. The method of claim 4, wherein the preset means corresponding to the first sub-data comprises: target compression mode processing, target verification mode processing and target encryption mode processing.
6. The method of claim 5, wherein the processing the first sub-data based on a preset means corresponding to the first sub-data to obtain the target sub-data comprises:
calling a target plug-in a target plug-in library to process the first subdata based on a preset means corresponding to the first subdata to obtain the target subdata, wherein the target plug-in library comprises plug-ins for processing the first subdata, and the target plug-in is a plug-in which the preset means corresponding to the first subdata is matched in the target plug-in library.
7. The method of claim 6, wherein the target plug-in comprises a first sub-plug-in, a second sub-plug-in and a third sub-plug-in, the first sub-plug-in is a plug-in corresponding to the target compression mode in the target plug-in library, the second sub-plug-in is a plug-in corresponding to the target verification mode in the target plug-in library, and the second sub-plug-in is a plug-in corresponding to the target encryption mode in the target plug-in library;
the calling a target plug-in a target plug-in library based on the preset means corresponding to the first subdata to process the first subdata to obtain the target subdata, and the method comprises the following steps:
compressing the first subdata based on the first sub-plug-in, adding verification processing to the first subdata based on the second sub-plug-in, and encrypting the first subdata based on the third sub-plug-in to obtain the target subdata.
8. An automatic driving data transmission device, comprising:
the system comprises an acquisition module, a transmission module and a display module, wherein the acquisition module is used for acquiring the automatic driving data to be transmitted, the automatic driving data comprises first subdata and second subdata, and the safety level of the first subdata is higher than that of the second subdata;
the processing module is used for processing the first subdata based on preset means to obtain target subdata, wherein the preset means comprises encryption processing means;
the transmission module is used for transmitting target data to second electronic equipment, wherein the target data comprises the target subdata and the second subdata.
9. The apparatus of claim 8, wherein the autopilot data comprises at least two of the first subdata, and each of the first subdata comprises a safety class identifier;
the processing module is specifically configured to determine, for each first subdata, a preset means corresponding to the first subdata in a target configuration file based on the security level identifier, and process the first subdata based on the preset means corresponding to the first subdata to obtain the target subdata corresponding to the first subdata, where the target configuration file includes a correspondence between the security level identifier and the preset means, and the preset means corresponding to different security level identifiers are different.
10. The apparatus according to claim 9, wherein different security level identifiers correspond to different encryption manners in the preset means.
11. The apparatus of claim 9, wherein the preset means further comprises at least one of: compression processing and adding checks.
12. The apparatus of claim 9, wherein the preset means corresponding to the first sub-data comprises: target compression mode processing, target verification mode processing and target encryption mode processing.
13. The apparatus of claim 12, wherein the processing module is specifically configured to invoke a target plug-in a target plug-in library to process the first sub-data based on a preset means corresponding to the first sub-data, so as to obtain the target sub-data, where the target plug-in library includes a plug-in for processing the first sub-data, and the target plug-in is a plug-in the target plug-in library that matches the preset means corresponding to the first sub-data.
14. The apparatus according to claim 13, wherein the target plug-in includes a first sub-plug-in, a second sub-plug-in and a third sub-plug-in, the first sub-plug-in is a plug-in corresponding to the target compression mode in the target plug-in library, the second sub-plug-in is a plug-in corresponding to the target verification mode in the target plug-in library, and the second sub-plug-in is a plug-in corresponding to the target encryption mode in the target plug-in library;
the processing module is specifically configured to perform compression processing on the first sub-data based on the first sub-plug-in, perform addition verification processing on the first sub-data based on the second sub-plug-in, and perform encryption processing on the first sub-data based on the third sub-plug-in to obtain the target sub-data.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of transmitting autopilot data according to any one of claims 1-7.
16. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the transmission method of autonomous driving data according to any one of claims 1 to 7.
17. A computer program product comprising a computer program which, when executed by a processor, implements the method of transmission of autopilot data according to one of claims 1 to 7.
CN202211035793.1A 2022-08-26 2022-08-26 Automatic driving data transmission method and device and electronic equipment Pending CN115333851A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211035793.1A CN115333851A (en) 2022-08-26 2022-08-26 Automatic driving data transmission method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211035793.1A CN115333851A (en) 2022-08-26 2022-08-26 Automatic driving data transmission method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN115333851A true CN115333851A (en) 2022-11-11

Family

ID=83928689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211035793.1A Pending CN115333851A (en) 2022-08-26 2022-08-26 Automatic driving data transmission method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN115333851A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116980890A (en) * 2023-09-20 2023-10-31 北京集度科技有限公司 Information security communication device, method, vehicle and computer program product

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116980890A (en) * 2023-09-20 2023-10-31 北京集度科技有限公司 Information security communication device, method, vehicle and computer program product
CN116980890B (en) * 2023-09-20 2023-12-22 北京集度科技有限公司 Information security communication device, method, vehicle and computer program product

Similar Documents

Publication Publication Date Title
CN111144878B (en) Instruction generation method and instruction generation device
CN115795513A (en) File encryption method, file decryption method, file encryption device, file decryption device and equipment
CN115150063A (en) Model encryption method and device and electronic equipment
CN115333851A (en) Automatic driving data transmission method and device and electronic equipment
CN113794706B (en) Data processing method and device, electronic equipment and readable storage medium
CN113448545B (en) Method, apparatus, storage medium and program product for machine learning model servitization
CN114048506A (en) Application control method, device, equipment and storage medium
CN113886870A (en) Data processing method, device, equipment and storage medium
CN108595973B (en) Instruction determination method, equipment control method, device and system
CN114036364B (en) Method, apparatus, device, medium, and system for identifying crawlers
CN113609156B (en) Data query and write method and device, electronic equipment and readable storage medium
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
CN113741949A (en) Method, device and equipment for generating application program installation package and storage medium
CN114996169B (en) Device diagnosis method, device, electronic device, and storage medium
CN110262756B (en) Method and device for caching data
CN114024780B (en) Node information processing method and device based on Internet of things equipment
CN116318727B (en) ECU access method, device, equipment and storage medium
CN117932616A (en) Firmware upgrading method, device, system, equipment and storage medium
CN117651273A (en) Smart card communication message processing method, device, equipment and medium
CN114398616A (en) Login method and device of embedded system, electronic equipment and readable storage medium
CN114500501A (en) External member delivery method and device, electronic equipment and storage medium
CN115794165A (en) Application upgrading method and device, EPS and medium
CN115396436A (en) Service access method, device, electronic equipment and medium
CN115643002A (en) Service processing method, device and storage medium
CN114422808A (en) Cloud mobile phone interaction method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination