CN110969723B - Data management method, detection device, server, and computer-readable storage medium - Google Patents

Data management method, detection device, server, and computer-readable storage medium Download PDF

Info

Publication number
CN110969723B
CN110969723B CN201911095910.1A CN201911095910A CN110969723B CN 110969723 B CN110969723 B CN 110969723B CN 201911095910 A CN201911095910 A CN 201911095910A CN 110969723 B CN110969723 B CN 110969723B
Authority
CN
China
Prior art keywords
data
detection
vehicle
detected
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911095910.1A
Other languages
Chinese (zh)
Other versions
CN110969723A (en
Inventor
刘新
周军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201911095910.1A priority Critical patent/CN110969723B/en
Publication of CN110969723A publication Critical patent/CN110969723A/en
Application granted granted Critical
Publication of CN110969723B publication Critical patent/CN110969723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/008Registering or indicating the working of vehicles communicating information to a remotely located station
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Traffic Control Systems (AREA)

Abstract

The application is applicable to the technical field of electronics, and provides a data management method, detection equipment, a server and a computer readable storage medium, wherein the data management method comprises the following steps: when a vehicle detection instruction is acquired, acquiring detection data of a vehicle to be detected; acquiring data continuity identification information corresponding to the detection data; when a data uploading instruction is obtained, target data corresponding to the vehicle to be detected are uploaded to a preset server based on the data uploading instruction, wherein the target data comprise the detection data and the data continuity identification information. According to the scheme, the target data and the data continuity identification information are in one-to-one correspondence, and the data continuity identification information corresponding to different target data is different, so that whether the data uploaded by the detection equipment is continuous or not can be detected through the data continuity identification in the target data, whether part of the data uploaded by the detection equipment is deleted or not is judged, and authenticity and integrity of the data are guaranteed.

Description

Data management method, detection device, server, and computer-readable storage medium
Technical Field
The present application belongs to the field of electronic technologies, and in particular, relates to a data management method, a detection device, a server, and a computer-readable storage medium.
Background
Because the tail gas that the car discharged can cause environmental pollution, in order to reduce the environmental pollution that automobile exhaust caused, the motor vehicle need accord with the environmental protection and detect just to allow to go on the road and go, prevents that the tail gas from surpassing the standard vehicle and influencing ecological environment.
In the environmental protection detection process, abnormal data which do not meet the environmental protection standard may be collected, some personnel may delete the abnormal data due to various reasons, and related management departments cannot monitor the abnormal data.
Disclosure of Invention
The embodiment of the application provides a data management method, detection equipment, a server and a computer readable storage medium, which can solve the problem that abnormal data which do not meet the environmental protection standard in automobile environmental protection detection data are deleted, so that related management departments cannot monitor the abnormal data.
In a first aspect, an embodiment of the present application provides a data management method, including:
acquiring a vehicle detection instruction;
collecting detection data of a vehicle to be detected;
acquiring data continuity identification information corresponding to the detection data;
when a data uploading instruction is obtained, target data corresponding to the vehicle to be detected are uploaded to a preset server based on the data uploading instruction, so that the server judges whether the detection data are complete based on the data continuity identification, and the detection data are analyzed and processed after the detection data are complete, wherein the target data comprise the detection data and the data continuity identification information.
Illustratively, the detection data includes vehicle data and environmental data. The vehicle data comprises vehicle real-time data and can also comprise vehicle historical data of a preset time period. The vehicle real-time data includes real-time vehicle speed data and real-time engine displacement data. The vehicle historical data may include one or any combination of at least two of historical fault code data, historical exhaust data, and historical mileage data.
Environmental data includes, but is not limited to, any one or any combination of at least two of the following: biological data of a detection person, position data of a vehicle to be detected and environment image data of the vehicle to be detected. In an actual application scenario, the current environment data may specifically be: the method comprises the steps of detecting biological information such as head portraits and/or fingerprints of people, current detection time and/or location information, dynamic pictures or static pictures of a vehicle to be detected, oil meter mileage information of the vehicle to be detected, working environments of a detection station and the like. The location information may be obtained using positioning techniques.
In the embodiment of the application, when a data uploading instruction is obtained, detection data and data continuity identification information corresponding to a vehicle to be detected are uploaded to a preset server in a correlated mode, so that when the server receives the detection data and the data continuity identification information of the vehicle to be detected, whether the detection data uploaded by the detection equipment is complete can be detected based on the data continuity identification information, whether partial data uploaded by the detection equipment is deleted is judged, the detection data is analyzed and processed after the detection data is judged to be complete, detection personnel are prevented from deleting unqualified data, and authenticity and integrity of the data are guaranteed.
In a possible implementation manner of the first aspect, the obtaining data continuity identification information corresponding to the detection data includes:
acquiring a target count value currently output by a preset incremental counter and/or acquiring real-time clock information currently output by a built-in clock chip, wherein the count value of the incremental counter is incremented by 1 each time a vehicle detection instruction is detected;
and identifying the target counting value and/or the real-time clock information as data continuity identification information corresponding to the detection data.
In a possible implementation manner of the first aspect, the target data further includes a chained data feature value;
when the vehicle detection instruction is the first vehicle detection instruction received by the detection device, the chained data characteristic value is 0;
when the vehicle detection instruction is not the first vehicle detection instruction received by the detection device, the chained data characteristic value is obtained by processing target data corresponding to a first vehicle by the detection device through a hash function, and the first vehicle is the last vehicle detected by the detection device before the detection device detects the vehicle to be detected.
In a possible implementation manner of the first aspect, when a data uploading instruction is obtained, uploading target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction includes:
when a data uploading instruction is acquired, judging whether file modification identification information is detected;
and if not, uploading the target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction, wherein the file modification identification information is used for identifying whether the configuration file and/or the system file of the detection equipment are/is changed.
In a possible implementation manner of the first aspect, the uploading, based on the data uploading instruction, target data corresponding to the vehicle to be detected to a preset server includes:
signing the target data through a built-in security chip to obtain processed target data;
and uploading the processed target data to a preset server based on the data uploading instruction.
In this embodiment, the detection device determines whether data falsification exists in the detection data of the vehicle by detecting the file modification identification information, when a data uploading instruction is detected and the detection file modification identification information is not detected, the detection data corresponding to the vehicle to be detected and the data continuity identification information are uploaded to a preset server in an associated manner, and whether the data uploaded by the detection device is continuous is detected by the data continuity identification in the target data, so that whether part of the data uploaded by the detection device is deleted is determined, the detection personnel are prevented from deleting unqualified data, and authenticity and integrity of the data are ensured.
In a possible implementation manner of the first aspect, after determining whether the file modification identification information is detected when the data upload instruction is obtained, the method further includes:
and if the file modification identification information is detected, refusing to respond to the data uploading instruction and outputting reminding information, wherein the reminding information is used for reminding that the detected data has the hidden danger of authenticity.
In a possible implementation manner of the first aspect, the detecting data includes vehicle data and environment data, and when the target data further includes the chained data feature value, the signing is performed on the target data through a built-in security chip to obtain processed target data, including:
processing the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value by adopting a hash function to obtain a target data characteristic value;
signing the target data characteristic value through a certificate preset in the security chip to obtain signature information, and taking the signature information, the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value as the processed target data.
Further, when signature information is obtained, the signature information, the vehicle data, the environment data, the data continuity identification information, and the chained data feature value may be encrypted by a certificate preset in the security chip, and the encrypted data may be used as the processed target data.
In a second aspect, an embodiment of the present application provides a data management method, including:
acquiring target data uploaded by detection equipment, wherein the target data comprises detection data and data continuity identification information corresponding to the detection data;
judging whether the detection data are continuous or not based on the data continuity identification information;
if so, analyzing and processing the detection data;
and if not, outputting alarm information, wherein the alarm information is used for prompting that part of the detection data acquired by the detection equipment is lost.
In the embodiment of the application, when the server receives the target data uploaded by the detection equipment, whether the detection data uploaded by the detection equipment is continuous is detected through the data continuity identification in the target data, so that whether the data uploaded by the detection equipment is complete is judged, the detection data is analyzed and processed after the data is complete, detection personnel are prevented from deleting unqualified data, and authenticity and integrity of the data are guaranteed.
In a third aspect, an embodiment of the present application provides a data management apparatus, including:
a first acquisition unit for acquiring a vehicle detection instruction;
the acquisition unit is used for acquiring detection data of the vehicle to be detected;
a second obtaining unit, configured to obtain data continuity identification information corresponding to the detection data;
and the data uploading unit is used for uploading target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction when the data uploading instruction is obtained, so that the server judges whether the detection data are complete based on the data continuity identification, and analyzes and processes the detection data after the detection data are complete, wherein the target data comprise the detection data and the data continuity identification information.
Optionally, the second obtaining unit is specifically configured to:
acquiring a target count value currently output by a preset incremental counter and/or acquiring real-time clock information currently output by a built-in clock chip, wherein the count value of the incremental counter is incremented by 1 each time a vehicle detection instruction is detected;
and identifying the target counting value and/or the real-time clock information as data continuity identification information corresponding to the detection data.
Optionally, the target data further comprises a chained data feature value;
when the vehicle detection instruction is the first vehicle detection instruction received by the detection device, the chained data characteristic value is 0;
when the vehicle detection instruction is not the first vehicle detection instruction received by the detection device, the chained data characteristic value is obtained by processing target data corresponding to a first vehicle by the detection device by using a hash function, and the first vehicle is the last vehicle detected by the detection device before the detection device detects the vehicle to be detected.
Optionally, the data uploading unit includes:
the judging unit is used for judging whether the file modification identification information is detected or not when the data uploading instruction is acquired;
and the uploading unit is used for uploading the target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction if no file modification identification is detected, wherein the file modification identification information is used for identifying whether the configuration file and/or the system file of the detection equipment are/is changed.
Optionally, the data uploading unit further includes:
and the reminding unit is used for refusing to respond to the data uploading instruction and outputting reminding information if the file modification identification information is detected, wherein the reminding information is used for reminding that the detection data has potential authenticity hazards.
Optionally, the data uploading unit includes:
the data processing unit is used for signing the target data through a built-in security chip to obtain processed target data;
and the uploading unit is used for uploading the processed target data to a preset server based on the data uploading instruction.
Optionally, the data processing unit is specifically configured to:
calculating a target data characteristic value corresponding to the target data by adopting a hash function;
signing the characteristic value of the target data through a certificate preset in the security chip, and encrypting the signed target data to obtain the processed target data.
Optionally, the detection data includes vehicle data and environment data, and when the target data further includes the chained data feature value, the data processing unit is specifically configured to:
processing the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value by adopting a hash function to obtain a target data characteristic value;
signing the target data characteristic value through a certificate preset in the security chip to obtain signature information, and taking the signature information, the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value as the processed target data.
In a fourth aspect, an embodiment of the present application provides a data management apparatus, including:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring target data uploaded by detection equipment, and the target data comprises detection data and data continuity identification information corresponding to the detection data;
a judging unit configured to judge whether the detection data is continuous based on the data continuity identification information;
the processing unit is used for analyzing and processing the detection data if the detection data are continuous;
and the alarm unit is used for outputting alarm information if the detection data is discontinuous, wherein the alarm information is used for prompting that part of the detection data acquired by the detection equipment is lost.
In a fifth aspect, the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the data management method of any one of the above first aspects, or implements the data management method of any one of the above second aspects.
In a sixth aspect, an embodiment of the present application provides a computer program product, which, when run on a data management apparatus, causes the data management apparatus to execute the data management method of any one of the above first aspects, or execute the data management method of any one of the above second aspects.
It can be understood that, for the beneficial effects of the third to sixth aspects, reference may be made to the relevant description in the first aspect, and details are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the embodiments or the description of the prior art will be briefly described below.
FIG. 1 is a schematic diagram of a data management system according to an embodiment of the present application;
FIG. 2 is a flow chart illustrating a data management method according to an embodiment of the present application;
FIG. 3 is a schematic flow chart diagram illustrating a data management method according to another embodiment of the present application;
fig. 4 is a block diagram illustrating a structure of a data management apparatus according to an embodiment of the present application;
FIG. 5 is a block diagram schematically illustrating a structure of a data management apparatus according to another embodiment of the present application;
fig. 6 is a schematic structural diagram of a data management device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing a relative importance or importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather mean "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
Referring to fig. 1, fig. 1 is a schematic diagram of a data management system according to an embodiment of the present application. The system comprises: the detection device 100 and the server 200, and the detection device 100 and the server 200 can communicate with each other.
The detection device 100 is configured to obtain a vehicle detection instruction, acquire detection data of a vehicle to be detected, and obtain data continuity identification information corresponding to the detection data; when a data uploading instruction is obtained, target data corresponding to the vehicle to be detected are uploaded to a preset server based on the data uploading instruction, so that the server judges whether the detection data are complete based on the data continuity identification, and the detection data are analyzed and processed after the detection data are complete, wherein the target data comprise the detection data and the continuity identification information.
The server 200 is configured to obtain target data uploaded by the detection device 100, detect whether detection data acquired by the detection device 100 is continuous based on data continuity identification information in the target data, and output warning information when it is determined that any detection data is discontinuous, where the warning information is used to prompt that part of detection data acquired by the detection device is lost; and when the detection data are confirmed to be continuous, analyzing and processing the detection data.
After the overall operation principle of the data management system is introduced, the following describes in detail the specific implementation process of the detection device 100 and the server 200 with reference to the implementation flow diagram of the data management method.
Referring to fig. 2, fig. 2 is a schematic view illustrating an implementation flow of a data management method according to an embodiment of the present application, where an execution subject of the data management method according to the embodiment is a detection device, and the detection device may be a device for collecting detection data when an automobile is subjected to various types of annual inspections (e.g., environmental protection inspection of the automobile, safety inspection of the automobile, etc.). The data management method as shown in fig. 2 may include:
s101, a vehicle detection command is obtained. When detection personnel of the detection station need to perform environmental protection detection and safety detection on the vehicle, a vehicle detection instruction can be triggered through an interactive interface or a key of the detection equipment.
The detection device acquires a vehicle detection instruction triggered by a user.
S102, collecting detection data of the vehicle to be detected. When the detection device detects a vehicle detection instruction, the detection device collects detection data of a vehicle to be detected according to a preset data collection flow. The preset data acquisition process is a preset data acquisition process which accords with the vehicle detection standard, and the data acquisition process can be set according to the vehicle detection type, and is not limited here. For example, when vehicle environmental protection detection is currently performed, the preset data acquisition process is a data acquisition process corresponding to the vehicle environmental protection detection; when the vehicle safety detection is carried out at present, the preset data acquisition process is the data acquisition process corresponding to the vehicle safety detection.
The device identification information of the detection device and the identification information of the detection station may be pre-associated, so that the server can distinguish the detection station to which the detection device belongs when introducing the detection data uploaded by the detection device.
Optionally, in order to facilitate tracing and managing data collected by the detection device, the following information may be stored in the detection device in a pre-associated manner: the device identification information of the detection device, the identification information of the manufacturer of the detection device, and the identification information of the vehicle detection station to which the detection device belongs.
It can be understood that, in order to improve the security of the data in the detection device, a security chip may be disposed in the detection device, and the hardware and software of the security chip need to meet the national detection standard, and have a strong anti-cracking capability. The detection device may employ a closed embedded (e.g., linux) system. The embedded system is connected with the safety chip through a bus interface. When the detection equipment is internally provided with the security chip, the detection equipment can also store security chip data and key data in the detection equipment in an associated manner.
The detection data includes vehicle data and environmental data. The vehicle data comprises vehicle real-time data and can also comprise vehicle historical data of a preset time period. The vehicle real-time data includes real-time vehicle speed data and real-time engine displacement data. The preset time period may be 1 year, or 1 quarter, and may also be set according to actual situations, which is not limited herein. The preset time period may be determined according to a detection cycle of the vehicle detection type that the vehicle to be detected needs to perform. For example, when the vehicle detection type is a vehicle environment-friendly detection, since the vehicle environment-friendly detection is usually an annual detection, that is, the detection period is 1 year, the detection device may acquire the vehicle history data of the last year. The vehicle historical data may include one or any combination of at least two of historical fault code data, historical exhaust gas data, and historical mileage data.
Environmental data includes, but is not limited to, any one or any combination of at least two of the following: the method comprises the steps of detecting biological data of a person, position data of a vehicle to be detected and environment image data of the vehicle to be detected. In an actual application scenario, the current environment data may specifically be: the method comprises the steps of detecting biological information such as head portraits and/or fingerprints of people, current detection time and/or location information, dynamic pictures or static pictures of a vehicle to be detected, oil meter mileage information of the vehicle to be detected, working environments of a detection station and the like. The location information may be obtained using positioning techniques.
The biometric data of the detection person may be fingerprint information, voiceprint information, iris information, or the like of a worker currently performing the vehicle detection operation, which is not limited herein. Through the biological data of the record staff, the data can be traced back, and the detection platform is helped to quickly determine the responsible person when a problem occurs in the vehicle detection operation. In addition, in order to prevent data falsification, in addition to acquiring the position data of the vehicle to be detected, the detection device is triggered to automatically capture an environment image near the vehicle to be detected, so that the environment image data of the vehicle to be detected is obtained, and the vehicle to be detected is confirmed to be actually detected at the specified place.
S103, acquiring data continuity identification information corresponding to the detection data.
The detection data corresponds to data continuity identification information one to one, and the data continuity identification is used for judging whether the detection data acquired by the same detection device is continuous or not.
In order to ensure continuity and monotonic increase of data, in a possible implementation, S102 may specifically include step a and step B:
and step A, acquiring a preset target count value currently output by an incremental counter and/or acquiring real-time clock information currently output by a built-in clock chip, wherein the count value of the incremental counter is incremented by 1 every time a vehicle detection instruction is detected.
The preset incrementing counter may be generated by a chip built into the detection device, including but not limited to a security chip. The detection device triggers the incremental counter to increment by 1 each time it detects a vehicle detection command. It can be understood that, when the target data needs to be signed and encrypted by the security chip, the preset increment counter may be set as: the increment counter is triggered to increment by 1 upon detection of the target data being signed by the security chip.
When the detection device includes a security chip, the detection device may acquire Real Time Clock (RTC) information currently output by a Clock chip integrated in the security chip when detecting a vehicle detection instruction. The clock chip is used for providing accurate real-time or providing an accurate time reference for the electronic system.
The RTC information can be regarded as the time when the detection data of the vehicle to be detected is acquired. The accuracy of the RTC information can be accurate to minutes and seconds, and the RTC information can be set according to the time required for detecting one vehicle to be detected, so that the RTC information acquired when different vehicles to be detected are detected can be ensured to be different.
And B, identifying the target counting value and/or the real-time clock information as data continuity identification information corresponding to the detection data.
The detection device may use a target count value currently output by the up-counter as data continuity identification information corresponding to the detection data; the acquired real-time clock information can also be used as data continuity identification information corresponding to the detection data; the target count value and the real-time clock information can also be used as data continuity identification information corresponding to the detection data at the same time.
S103, when a data uploading instruction is obtained, target data corresponding to the vehicle to be detected are uploaded to a preset server based on the data uploading instruction, so that the server judges whether the detection data are complete based on the data continuity identification, and the detection data are analyzed and processed after the detection data are complete, wherein the target data comprise the detection data and the data continuity identification information.
After the detection data of one vehicle or a batch of vehicles are collected, a detection person can trigger a data uploading instruction through detection equipment; alternatively, the detection person may set a detection number threshold in the detection device in advance, and when the number of detected vehicles reaches the detection number threshold, the data upload instruction may be automatically generated. The detection number threshold may be set according to actual conditions, and is not limited herein.
When detecting a data uploading instruction, the detection equipment uploads target data corresponding to the vehicle to be detected to a preset server, so that when the server acquires the target data, whether the detection data acquired by the detection equipment is continuous or not is detected based on data continuity identification information in the target data.
Target data and data continuity identification information are in one-to-one correspondence and are mutually associated; the data continuity identification information corresponding to different target data is different, and the fake data does not contain the data continuity identification information, so that the detection equipment can detect whether the uploaded data is the fake data or not through the data continuity identification information, and the authenticity of the data is ensured. When any detection data uploaded by the detection equipment is deleted, the data continuity identification information related to the detection data is also deleted, so that whether the detection data is deleted or not can be judged through the data continuity identification information in two adjacent target data, and the integrity of the data is ensured.
Optionally, in order to avoid data counterfeiting and guarantee authenticity of the data, whether the data is counterfeit or not can be detected by modifying the identification information through the file. S103 may specifically be: when a data uploading instruction is acquired, judging whether file modification identification information is detected; if not, uploading the target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction, wherein the file modification identification information is used for identifying whether the configuration file and/or the system file of the detection equipment are/is changed; the target data comprises the detection data and the data continuity identification information, and the data continuity identification information is used for the server to detect whether the detection data collected by the detection equipment is continuous or not.
In consideration of the situation that data may be counterfeited, in the embodiment of the present application, when detecting a data uploading instruction, a detecting device needs to first detect whether file modification identification information exists currently, where the file modification identification information is used to identify whether a configuration file and/or a system file of the detecting device is changed. Since an important operation of data falsification is to change the configuration file and/or the system file of the environmental protection detection apparatus, whether data falsification exists currently can be determined by modifying the identification information of the file.
The file modification identification information may be generated when the detection device detects whether the configuration file and/or the system file of the device is changed, or may be generated when the detection device detects that the hash value corresponding to the configuration file and/or the system file is changed. And the hash value corresponding to the configuration file and/or the system file is obtained by performing hash operation on the content corresponding to the configuration file and/or the system file by using a hash algorithm through the detection equipment.
When the file modification identification information is not detected, the configuration file and/or the system file of the detection device are judged to be not changed, the detection data are not modified, data counterfeiting does not exist, and at the moment, the target data corresponding to the vehicle to be detected are uploaded to a preset server. The preset server refers to a server for managing vehicle detection data, for example, a server corresponding to the environmental protection detection platform. The target data comprise detection data corresponding to the vehicle to be detected and data continuity identification information corresponding to the detection data.
It is to be understood that, in a possible implementation manner, after the step of determining whether the file modification identification information is detected when the data upload instruction is acquired, the method may further include: and if the file modification identification information is detected, refusing to respond to the data uploading instruction and outputting reminding information, wherein the reminding information is used for reminding that the detected data has the hidden danger of authenticity.
When detecting that the file modification identification information exists, the detection equipment judges that the configuration file and/or the system file of the detection equipment are/is changed and data is possibly counterfeited, at the moment, the detection equipment refuses to respond to the data uploading instruction, and generates and outputs reminding information to prompt related personnel that the currently uploaded target data of the detection equipment has authenticity hidden danger.
In a possible implementation manner, the detection device may use chain data to ensure continuity of the acquired detection data, and the target data may further include a characteristic value of the chain data;
when the vehicle detection instruction is the first vehicle detection instruction received by the detection device, the chained data characteristic value is 0, and the chained data characteristic value is used as an initial value of the century creation.
When the vehicle detection instruction is not the first vehicle detection instruction received by the detection device, the chained data characteristic value is obtained by processing target data corresponding to a first vehicle by the detection device by using a hash function, and the first vehicle is the last vehicle detected by the detection device before the detection device detects the vehicle to be detected. The chain data characteristic value is obtained by calculating detection data corresponding to the first vehicle by adopting a hash function. Hash functions include, but are not limited to, hash algorithms, message digest algorithms.
When the currently detected vehicle detection instruction is not the first vehicle detection instruction received by the detection device, and the hash function is a hash algorithm, the detection device performs hash operation on target data or detection data of the first vehicle by using the hash algorithm to obtain a hash value, and the hash value is used as a chained data characteristic value corresponding to the current vehicle to be detected.
When the currently detected vehicle detection instruction is not the first vehicle detection instruction received by the detection device and the hash function is a message digest algorithm, the detection device calculates target data of the first vehicle or a message digest corresponding to the detection data by using the message digest algorithm, and takes the message digest as a chained data characteristic value corresponding to the current vehicle to be detected.
Since the target data of the current vehicle includes the chained data characteristic value of the target data of the previous vehicle, whether the target data of the previous vehicle is deleted can be detected through the chained data characteristic value of the target data of the previous vehicle included in the target data of the current vehicle, that is, when part of data in any one target data is deleted, the chained data characteristic value can be detected. In this embodiment, the detection record of the previous vehicle is used as a part of data input by the record, a chain structure is formed, any detection record of the detection device is deleted maliciously, and the chain structure is broken, so that the data continuity of the detection device is ensured, abnormal data is prevented from being deleted by workers, and the accuracy of environment-friendly data is ensured.
For example, it is assumed that two adjacent detected vehicles are a vehicle 1 and a vehicle 2, the vehicle 1 corresponds to first target data, and the vehicle 2 corresponds to second target data, and the second target data includes a chained data feature value calculated based on the first target data. If part of the data in the first target data is deleted, the characteristic value of the chained data calculated based on the first target data is different from the characteristic value of the chained data in the second target data. Since the chain data feature value has uniqueness, whether the target data corresponding to the vehicle 1 is deleted can be detected by the chain data feature value in the target data of the vehicle 2.
Further, in order to ensure authenticity of data, the step of uploading the target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction in S103 may specifically include the following steps:
and step C, signing the target data through a built-in security chip to obtain the processed target data.
The secure chip is preset with a certificate, which may be an RSA certificate or an SM2 certificate, and is not limited herein. The certificate can be issued by a preset certificate issuing platform, and the certificate can be applied to and set for the safety chip of the detection device when the safety chip is initialized. The certificate has a pair of asymmetric keys that includes a public key of the detection device and a private key of the detection device.
When detecting a data uploading instruction and not detecting file modification identification information, the detection equipment calculates a target data characteristic value corresponding to the target data by adopting a hash function in the security chip, and signs the target data characteristic value corresponding to the target data by adopting a private key of the detection equipment to obtain the processed target data. The processed target data includes the signature information and the target data. The hash function includes, but is not limited to, a message digest algorithm and a hash algorithm.
Specifically, the detection device may calculate a message digest corresponding to the target data by using a message digest algorithm; or performing hash operation on the target data by adopting a hash algorithm, and calculating a hash value corresponding to the target data.
Further, when the detection data in the target data includes vehicle data and environment data, and the target data further includes the characteristic value of the chained data, step C may specifically include the following steps:
processing the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value by adopting a hash function to obtain a target data characteristic value;
signing the target data characteristic value through a certificate preset in the security chip to obtain signature information, and taking the signature information, the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value as the processed target data.
For example, when the data continuity identification information is a target count value output by an incremental counter, the target data includes vehicle data, environment data, a target count value output by the incremental counter, and a chained data characteristic value (the chained data characteristic value may be a hash value), the detection device may calculate the vehicle data, the environment data, the target count value output by the incremental counter, and the chained data characteristic value by using a hash algorithm, and perform a hash operation to obtain a hash value corresponding to the target data; the detection device can also process the vehicle data, the environment data, the target counting value output by the incremental counter and the chained data characteristic value by adopting a message digest algorithm to obtain a message digest corresponding to the target data. Message digest algorithms include, but are not limited to, MD5.
After the hash value or the message digest corresponding to the target data is obtained through calculation, the hash value or the message digest corresponding to the target data is signed through a private key of detection equipment contained in a certificate preset in a security chip to obtain signature information, and the signature information, the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value are used as processed target data.
Further, in order to prevent data leakage or tampering and improve data security, after signing, the signed target data may be encrypted through a certificate preset in the secure chip to obtain the processed target data. The signed target data comprises signature information, vehicle data, environment data, data continuity identification information and a chained data characteristic value.
The detection device may encrypt the signature information, the vehicle data, the environmental data, the data continuity identification information, and the chained data characteristic value with a public key of the server in the security chip based on a certificate preset in the security chip to obtain processed target data.
And D, uploading the processed target data to a preset server based on the data uploading instruction.
In the embodiment of the application, the detection device uploads the processed target data to a preset server, so that when the server acquires the target data, the public key of the detection device is used for verifying the signature of the signed target data, and whether the signed target data is tampered or not is determined according to a signature verification result, so that the safety of the detected data is ensured, and the data is prevented from being tampered or leaked.
It can be understood that, when the processed target data is data obtained by signature and encryption processing of the target data, when the server receives the processed target data, the server decrypts the processed target data by using its own private key, and verifies the decrypted data by using the public key of the detection device.
In this embodiment, the detection device uses the data characteristic value corresponding to the detection data of the previous vehicle as a part of the target data to be uploaded corresponding to the current vehicle, so that the data uploaded to the server forms a chain structure, the detection data of any vehicle is maliciously deleted, the data characteristic value calculated from the target data corresponding to the vehicle is different from the data characteristic value contained in the target data corresponding to the next vehicle, the chain structure of the data is broken, the continuity of the target data uploaded by the detection device is ensured, the data which do not meet the standard is prevented from being deleted by any work, and the accuracy of the data is ensured.
Optionally, a local background of the detection station may obtain detection data acquired by the detection device through a preset data access interface, and determine whether the detection data meets a qualified standard specified by the country; for the detection data of the vehicle which does not meet the qualified standard specified by the state, the contact way of the vehicle owner of the vehicle corresponding to the unqualified detection data can be found, and the notification message that the detection data is unqualified is sent through the contact way. The contact way can be a telephone number, a mailbox address, an account number of the instant messaging application and the like.
When the worker deletes all data of the detection data of any vehicle through the local background of the detection station, the server can detect the data through the data continuity identification, and when part of the data of the detection data of any vehicle is deleted, the server can detect the data characteristic value in the target data of the next vehicle detected adjacent to the vehicle.
In the embodiment of the application, when the detection device detects a data uploading instruction, the detection data corresponding to the vehicle to be detected and the data continuity identification information are uploaded to the preset server in a correlated manner, so that when the server receives the detection data of the vehicle to be detected and the data continuity identification information, whether the detection data uploaded by the detection device is complete can be detected based on the data continuity identification information, and the detection data is analyzed and processed after the detection data is complete, so that whether part of the data uploaded by the detection device is deleted is judged, unqualified data is prevented from being deleted by a detector, and authenticity and integrity of the data are further ensured.
The detection equipment can also judge whether data counterfeiting exists in the detection data of the vehicle or not by detecting the file modification identification information, and when a data uploading instruction is detected and the detection file modification identification information is not detected, the detection data corresponding to the vehicle to be detected and the data continuity identification information are uploaded to a preset server in a correlated mode to further improve the authenticity of the data.
Referring to fig. 3, fig. 3 is a schematic diagram illustrating an implementation flow of a data management method according to another embodiment of the present application, where an execution subject of the data management method of the present embodiment is a server. The data management method as shown in fig. 3 may include:
s201, target data uploaded by the detection device is obtained, wherein the target data comprises the detection data and data continuity identification information corresponding to the detection data.
And the server acquires the target data uploaded by the detection equipment. When the target data is data obtained after signature processing, the server adopts a public key of the detection device to verify the signature of the signed target data, and determines whether the target data is falsified according to a signature verification result so as to ensure the authenticity and the safety of the detected data. When the server successfully verifies the signature, it is determined that the target data is from the detection device and the target data is not tampered, and S202 is executed. When the server fails in signature verification, the target data is judged not to come from the detection equipment and is tampered, the process is finished, and prompt information of data tampering can be output.
When the target data is data obtained after signature and encryption processing, when the server receives the target data and the server receives the processed target data, the server decrypts the processed target data by using the own private key of the server to obtain decrypted data, the decrypted data comprises initial target data before encryption and signature information, and the public key of the detection device is used for verifying and signing the signature information. The initial target data before encryption may include: the vehicle data, the environment data, the data continuity identification information and the chain data characteristic value.
And when the signature verification is successful, obtaining a target data characteristic value corresponding to the initial target data, wherein the target data characteristic value is obtained by processing and calculating the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value by the detection equipment by adopting a hash function. Then, a hash function is used to calculate a real-time data characteristic value corresponding to the initial target data, and when the real-time data characteristic value is the same as the target data characteristic value, it is determined that the received data is not tampered, and S202 is executed. When the real-time data characteristic value is different from the target data characteristic value, the received data is judged to be tampered, the process is ended, and prompt information that the data is tampered can be output.
S202, judging whether the detection data are continuous or not based on the data continuity identification information.
When receiving at least two target data uploaded by the detection device, the server acquires data continuous identification information in each target data, and judges whether the detection data in the target data uploaded by the detection device is continuous or not based on the data continuous identification information in two adjacent target data. When the data continuity identification information is a count value output by the counter, the server may compare whether a difference between the count values in two adjacent target data is 1, and when the comparison result is 1, determine that the two target data are continuous. When the comparison result is greater than 1, it is determined that the two target data are not continuous, and the data between the two target data are deleted. When the comparison result is 0, it is determined that some or all of the two target data are duplicated, and an abnormality exists. In this way, the server can determine whether the detection data in all the target data uploaded by the detection device are continuous.
It can be understood that when the uploaded target data includes the chained data feature value, whether the acquired detection data is complete or not can be judged through the chained data feature value, and then whether the detection data is continuous or not can be judged. Because the chained data characteristic value has uniqueness, when the chained data characteristic value is 0, the server determines that the vehicle corresponding to the target data is the second vehicle detected by the detection device. When the chained data characteristic value is not 0, the server may detect whether the target data corresponding to the first vehicle is completely deleted or partially deleted based on the chained data characteristic value, and further determine whether the detected data is continuous. Wherein the first vehicle is the last vehicle detected by the detection device before the detection of the vehicle to be detected. The chained data characteristic value may be calculated by using a hash function, and the chained data characteristic value may be a hash value.
For example, when receiving first target data and second target data uploaded by the same detection device, the server determines that the first target data is target data corresponding to the vehicle 1, the second target data is target data corresponding to the vehicle 2, and the second target data includes a chained data characteristic value calculated based on the first target data.
The server may calculate a chained data feature value of the first target data and compare the calculated chained data feature value with a chained data feature value in the second target data. When the first target data and the second target data are the same, judging that the first target data are not modified or deleted, and obtaining continuous data; when the two data are different, the partial data in the first target data are judged to be modified or deleted, and the acquired detection data are discontinuous. As is apparent from the above description, when the detected data of any one vehicle is partially deleted, the chain data feature value calculated based on the last detected data adjacent to the detected data of that vehicle is different from the chain data feature value acquired from the next detected data adjacent to the detected data of that vehicle. When the detected data of the last vehicle is completely deleted, the chained data feature value is missing. Therefore, whether the acquired detection data is missing or not can be judged based on the chain data characteristic value.
When the server judges that the detection data are continuous, S203 is executed; when the server determines that the detected data is discontinuous, the server executes S204.
And S203, if the detection data are continuous, analyzing and processing the detection data.
The server may store in advance data processing methods corresponding to the respective vehicle detection standards, and data qualification determination methods corresponding to the respective detection parameters (or detection items) to be evaluated in the respective vehicle detection standards. Vehicle inspection standards include, but are not limited to, environmental inspection standards. The data qualification judging method is used for judging whether the vehicle data corresponding to the detection parameters meet the qualified standards specified by the state. For example, when the vehicle data of a certain detection parameter is less than or equal to a preset threshold value of the detection parameter, the detection parameter is determined to meet the qualified standard specified by the country.
When the server judges that the obtained detection data are continuous, a target data processing method corresponding to the detection type is obtained based on the detection type carried by the detection data and the data processing method corresponding to each vehicle detection standard. And then, analyzing and processing the detection data corresponding to each vehicle by adopting a target data processing method to obtain each detection parameter required to be evaluated by the detection type and vehicle data corresponding to each detection parameter. And then, based on the data qualification judgment method corresponding to each detection parameter, judging whether the vehicle data corresponding to each detection parameter meets the qualification standard corresponding to the data qualification judgment method, thereby judging whether the vehicle data meets the qualification standard specified by the state.
And determining the detection type carried by the detection data by the detection equipment according to the acquired vehicle detection instruction. In other embodiments, when only one vehicle is detected by one detection device, the detection data may be determined based on the detection type supported by the detection device that collects the detection data. For example, type a detection devices support security detection, and type B detection devices support environmental protection detection.
For example, when the vehicle is subjected to environmental protection detection, the detection parameters to be evaluated by the environmental protection detection include, but are not limited to, engine displacement, real-time vehicle speed, exhaust emission information, and the like.
The server judges that the vehicle data of any detection parameter of any vehicle does not meet the qualified standard specified by the country, and the server judges that the vehicle data of the vehicle is unqualified. At this time, the contact way of the vehicle owner of the vehicle corresponding to the unqualified detection data can be found, and the notification message that the detection data is unqualified is sent through the contact way. The contact information can be a telephone number, a mailbox address, an account number of the instant messaging application and the like.
When the server judges that all the detection data of any vehicle meet the qualified standard specified by the country, the server can generate a corresponding verification certificate of the vehicle and inform the owner of the vehicle of getting to a specified place.
And S204, if the detection data is discontinuous, outputting alarm information, wherein the alarm information is used for prompting that part of the detection data acquired by the detection equipment is lost.
When the server confirms that the detection data collected by the same detection equipment are discontinuous, alarm information is generated and output to prompt related personnel that part of the detection data collected by the detection equipment is lost.
It is understood that the server can send the alarm information to the terminal used by the data management personnel and inform the relevant personnel of the abnormal data.
The target data is associated with the detection equipment, the equipment identification information of the detection equipment is associated with the identification information of the detection station, when the problem that the data uploaded by any detection equipment is discontinuous or the target data uploaded by any detection equipment is missing is detected, the identification information of the detection station associated with the detection equipment is searched, and the searched identification information of the detection station is sent to a terminal used by a data management personnel, so that the relevant personnel can trace the detection station or require the detection station to be rectified and modified.
In the embodiment of the application, when the server receives the target data uploaded by the detection equipment, whether the detection data uploaded by the detection equipment is complete is detected through the data continuity identification in the target data, so that whether part of the data uploaded by the detection equipment is deleted is judged, the detection data is analyzed and processed after the completeness of the detection data is judged, detection personnel are prevented from deleting unqualified data, and authenticity and integrity of the data are guaranteed.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by functions and internal logic of the process, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Fig. 4 is a schematic block diagram of a data management apparatus according to an embodiment of the present application, which corresponds to the data management method described in the foregoing embodiment, and only shows portions related to the embodiment of the present application for convenience of description. The data management apparatus in this embodiment includes units for executing steps in the embodiment corresponding to fig. 1, and please refer to the related description of the embodiment corresponding to fig. 1 for details, which are not described herein. Referring to fig. 4, the data management apparatus 4 includes:
a first acquisition unit 410 for acquiring a vehicle detection instruction;
the acquisition unit 420 is used for acquiring detection data of the vehicle to be detected;
a second obtaining unit 430, configured to obtain data continuity identification information corresponding to the detection data;
the data uploading unit 440 is configured to, when a data uploading instruction is obtained, upload target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction, so that the server determines whether the detection data is complete based on the data continuity identifier, and analyze and process the detection data after determining that the detection data is complete, where the target data includes the detection data and the data continuity identifier information.
Optionally, the second obtaining unit 430 is specifically configured to:
acquiring a target count value currently output by a preset incremental counter and/or acquiring real-time clock information currently output by a built-in clock chip, wherein the count value of the incremental counter is incremented by 1 when a vehicle detection instruction is detected;
and identifying the target counting value and/or the real-time clock information as data continuity identification information corresponding to the detection data.
Optionally, the target data further comprises a chained data characteristic value;
when the vehicle detection instruction is the first vehicle detection instruction received by the detection device, the chained data characteristic value is 0;
when the vehicle detection instruction is not the first vehicle detection instruction received by the detection device, the chained data characteristic value is obtained by processing target data corresponding to a first vehicle by the detection device through a hash function, and the first vehicle is the last vehicle detected by the detection device before the detection device detects the vehicle to be detected.
Optionally, the data uploading unit 440 includes:
the judging unit is used for judging whether the file modification identification information is detected or not when the data uploading instruction is acquired;
and the uploading unit is used for uploading the target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction if no file modification identification is detected, wherein the file modification identification information is used for identifying whether the configuration file and/or the system file of the detection equipment are/is changed.
Optionally, the data uploading unit further includes:
and the reminding unit is used for refusing to respond to the data uploading instruction and outputting reminding information if the file modification identification information is detected, wherein the reminding information is used for reminding that the detection data has potential authenticity hazards.
Optionally, the data uploading unit 440 includes:
the data processing unit is used for signing the target data through a built-in security chip to obtain processed target data;
and the uploading unit is used for uploading the processed target data to a preset server based on the data uploading instruction.
Optionally, the data processing unit is specifically configured to: when a data uploading instruction is detected and file modification identification information is not detected, uploading target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction, wherein the file modification identification information is used for identifying whether a configuration file and/or a system file of the detection equipment are/is changed or not.
Optionally, the data processing unit is specifically configured to:
calculating a target data characteristic value corresponding to the target data by adopting a hash function;
signing the characteristic value of the target data through a certificate preset in the security chip, and encrypting the signed target data to obtain the processed target data.
Optionally, the detection data includes vehicle data and environment data, and when the target data further includes the chained data feature value, the data processing unit is specifically configured to:
processing the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value by adopting a hash function to obtain a target data characteristic value;
signing the target data characteristic value through a certificate preset in the security chip to obtain signature information, and taking the signature information, the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value as the processed target data.
In this embodiment, the data management apparatus may be a detection device, or a chip in the detection device, or a functional module integrated in the detection device. The chip or the functional module may be located in a control center (e.g., a console) of the detection device, and control the detection device to implement the data management method provided by the present application.
Fig. 5 is a schematic block diagram of a structure of a data management apparatus according to another embodiment of the present application, and only shows relevant parts of the embodiment of the present application for convenience of description. The units included in the data management apparatus in this embodiment are used to execute the steps in the embodiment corresponding to fig. 2, and please refer to the related description of the embodiment corresponding to fig. 2 for details, which are not described herein again. Referring to fig. 5, the data management apparatus 5 includes:
an obtaining unit 510, configured to obtain target data uploaded by a detection device, where the target data includes detection data and data continuity identification information corresponding to the detection data;
a judging unit 520, configured to judge whether the detection data is continuous based on the data continuity identification information;
a processing unit 530, configured to, if the detection data is continuous, perform analysis processing on the detection data;
and an alarm unit 540, configured to output alarm information if the detection data is discontinuous, where the alarm information is used to prompt that part of the detection data acquired by the detection device is lost.
In this embodiment, the data management device may be a server, or a chip in the server, or a functional module integrated in the server. The chip or the functional module may be located in a control center (e.g., a console) of a server, and the control server implements the data management method provided by the present application.
It should be noted that, for the information interaction, execution process, and other contents between the above devices/units, the specific functions and technical effects thereof based on the same concept as those of the method embodiment of the present application can be specifically referred to the method embodiment portion, and are not described herein again.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a data management device according to an embodiment of the present application. As shown in fig. 6, the data management apparatus 6 of this embodiment includes: at least one processor 60 (only one shown in fig. 6), a memory 61, and a computer program 62 stored in the memory 61 and operable on the at least one processor 60, the processor 60 implementing the steps in any of the various data management method embodiments described above when executing the computer program 62. Wherein, when the data management device is a detection device, the processor 60 implements the steps in the embodiment of the data management method corresponding to fig. 2 when executing the computer program 62. When the data management apparatus is a server, the processor 60 implements the steps in the embodiment of the data management method corresponding to fig. 3 when executing the computer program 62.
The data management device 6 may be a vehicle detection device, a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The data management device may include, but is not limited to, a processor 60, a memory 61. Those skilled in the art will appreciate that fig. 6 is only an example of the data management device 6, and does not constitute a limitation to the data management device 6, and may include more or less components than those shown, or combine some components, or different components, for example, and may further include an input/output device, a network access device, and the like.
The Processor 60 may be a Central Processing Unit (CPU), and the Processor 60 may be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 61 may in some embodiments be an internal storage unit of the data management device 6, such as a hard disk or a memory of the data management device 6. The memory 61 may also be an external storage device of the data management device 6 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the data management device 6. Further, the memory 61 may also include both an internal storage unit of the data management device 6 and an external storage device. The memory 61 is used for storing an operating system, an application program, a Boot Loader (Boot Loader), data, and other programs, such as program codes of the computer programs. The memory 61 may also be used to temporarily store data that has been output or is to be output.
It should be noted that, for the information interaction, execution process, and other contents between the above devices/units, the specific functions and technical effects thereof based on the same concept as those of the method embodiment of the present application can be specifically referred to the method embodiment portion, and are not described herein again.
It should be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional units and modules is only used for illustration, and in practical applications, the above function distribution may be performed by different functional units and modules as needed, that is, the internal structure of the apparatus may be divided into different functional units or modules to perform all or part of the above described functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above may be implemented by instructing relevant hardware by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the embodiments of the methods described above may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing apparatus/terminal device, recording medium, computer Memory, read-Only Memory (ROM), random Access Memory (RAM), electrical carrier wave signals, telecommunication signals, and software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other ways. For example, the above-described apparatus/network device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (9)

1. A data management method is applied to detection equipment and comprises the following steps:
acquiring a vehicle detection instruction;
collecting detection data of a vehicle to be detected;
acquiring data continuity identification information corresponding to the detection data;
when a data uploading instruction is obtained, uploading target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction so that the server judges whether the detection data are complete based on the data continuity identification, and analyzing and processing the detection data after the detection data are complete, wherein the target data comprise the detection data and the data continuity identification information;
the target data also comprises a chained data characteristic value, and whether the acquired detection data is complete can be judged through the chained data characteristic value;
when the vehicle detection instruction is the first vehicle detection instruction received by the detection device, the chained data characteristic value is 0;
when the vehicle detection instruction is not the first vehicle detection instruction received by the detection device, the chained data characteristic value is obtained by processing target data corresponding to a first vehicle by the detection device by using a hash function, and the first vehicle is the last vehicle detected by the detection device before the detection device detects the vehicle to be detected.
2. The data management method according to claim 1, wherein the obtaining of the data continuity identification information corresponding to the detection data includes:
acquiring a target count value currently output by a preset incremental counter and/or acquiring real-time clock information currently output by a built-in clock chip, wherein the count value of the incremental counter is incremented by 1 when a vehicle detection instruction is detected;
and identifying the target counting value and/or the real-time clock information as data continuity identification information corresponding to the detection data.
3. The data management method according to claim 1, wherein when the data uploading instruction is obtained, uploading target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction comprises:
when a data uploading instruction is acquired, judging whether file modification identification information is detected;
and if not, uploading the target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction, wherein the file modification identification information is used for identifying whether the configuration file and/or the system file of the detection equipment are/is changed.
4. The data management method according to any one of claims 1 to 3, wherein the uploading target data corresponding to the vehicle to be detected to a preset server based on the data uploading instruction comprises:
signing the target data through a built-in security chip to obtain processed target data;
and uploading the processed target data to a preset server based on the data uploading instruction.
5. The data management method of claim 4, wherein the detection data comprises vehicle data and environment data, and the signing of the target data by the built-in security chip to obtain the processed target data comprises:
processing the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value by adopting a hash function to obtain a target data characteristic value;
signing the target data characteristic value through a certificate preset in the security chip to obtain signature information, and taking the signature information, the vehicle data, the environment data, the data continuity identification information and the chained data characteristic value as the processed target data.
6. A data management method is applied to a server and comprises the following steps:
acquiring target data uploaded by detection equipment, wherein the target data comprises detection data and data continuity identification information corresponding to the detection data;
judging whether the detection data are continuous or not based on the data continuity identification information;
if so, analyzing and processing the detection data;
if not, outputting alarm information, wherein the alarm information is used for prompting that part of the detection data acquired by the detection equipment is lost;
the target data also comprises a chain data characteristic value, and whether the acquired detection data is complete can be judged through the chain data characteristic value;
when the vehicle detection instruction is the first vehicle detection instruction received by the detection device, the chained data characteristic value is 0;
when the vehicle detection instruction is not the first vehicle detection instruction received by the detection device, the chained data characteristic value is obtained by processing target data corresponding to a first vehicle by the detection device by using a hash function, wherein the first vehicle is the last vehicle detected by the detection device before the detection device detects the vehicle to be detected.
7. A detection device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the data management method according to any one of claims 1 to 5 when executing the computer program.
8. A server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the data management method of claim 6 when executing the computer program.
9. A computer-readable storage medium, in which a computer program is stored, which computer program, when being executed by a processor, carries out the data management method of any one of claims 1 to 5, or carries out the data management method of claim 6.
CN201911095910.1A 2019-11-11 2019-11-11 Data management method, detection device, server, and computer-readable storage medium Active CN110969723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911095910.1A CN110969723B (en) 2019-11-11 2019-11-11 Data management method, detection device, server, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911095910.1A CN110969723B (en) 2019-11-11 2019-11-11 Data management method, detection device, server, and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN110969723A CN110969723A (en) 2020-04-07
CN110969723B true CN110969723B (en) 2022-10-11

Family

ID=70030586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911095910.1A Active CN110969723B (en) 2019-11-11 2019-11-11 Data management method, detection device, server, and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN110969723B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113419885B (en) * 2021-06-18 2023-05-26 杭州海康威视数字技术股份有限公司 Data integrity processing method and device and electronic equipment
CN115622722A (en) * 2021-07-15 2023-01-17 华为技术有限公司 Driving data processing method, device and system
CN115292257B (en) * 2022-10-09 2023-01-24 广州鲁邦通物联网科技股份有限公司 Method and system for detecting illegal deletion of file

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866388B (en) * 2014-02-24 2021-04-09 腾讯科技(北京)有限公司 Data processing method and device
CN110008135B (en) * 2018-01-05 2024-01-30 北京搜狗科技发展有限公司 Information processing method and device and electronic equipment
CN108763966B (en) * 2018-06-04 2021-08-10 武汉邦拓信息科技有限公司 Tail gas detection cheating supervision system and method
CN109062791A (en) * 2018-07-20 2018-12-21 郑州云海信息技术有限公司 A kind of signal message recording method, system, equipment and computer storage medium
CN110191415B (en) * 2019-05-29 2022-01-25 深圳市元征科技股份有限公司 Vehicle information encryption method, vehicle-mounted equipment and server
CN110365656B (en) * 2019-06-21 2021-12-14 深圳市元征科技股份有限公司 Data management method, data management device and environment-friendly detection equipment

Also Published As

Publication number Publication date
CN110969723A (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN110113167B (en) Information protection method and system of intelligent terminal and readable storage medium
CN110969723B (en) Data management method, detection device, server, and computer-readable storage medium
CN109299135B (en) Abnormal query recognition method, recognition equipment and medium based on recognition model
CN111625870B (en) Block chain-based security audit method, system and storage medium
CN109190362B (en) Secure communication method and related equipment
CN111914029A (en) Block chain-based medical data calling method and device, electronic equipment and medium
US20210084015A1 (en) System and method to leverage edr, ecu, can and obd data from vehicles by means of blockchain technology
CN113114659B (en) Diagnostic equipment detection method and device, terminal equipment and storage medium
KR102304237B1 (en) compliance management system through automatic diagnosis of infrastructure asset threat and method therefor
CN108763062B (en) Method for filtering buried point names and terminal equipment
CN114201781A (en) Block chain-based storage verification method and device, computer equipment and medium
CN112464030B (en) Suspicious person determination method and suspicious person determination device
CN109117643B (en) System processing method and related equipment
CN110830257B (en) File signature method and device, electronic equipment and readable storage medium
CN112016520A (en) AI-based traffic violation voucher generation method, device, terminal and storage medium
US11720462B2 (en) Physical execution monitor
CN111767537A (en) Tamper verification method of application program based on IOS (operating system) and related equipment
CN110365656B (en) Data management method, data management device and environment-friendly detection equipment
CN111654591B (en) Picture tamper-proof method, computer device and storage medium
CN115225350B (en) Government cloud encryption login verification method based on national secret certificate and storage medium
CN114387137A (en) Block chain-based electronic contract signing method, device, equipment and storage medium
CN114428955A (en) Method and system for judging abnormal risk based on operation information and electronic equipment
CN114401096B (en) Block chain data uplink control method, device, equipment and storage medium
CN113992334B (en) Storage method and verification method and device of equipment side data and electronic equipment
CN114584314B (en) Registration method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant