CN113961432A - Method and device for generating data report, electronic equipment and storage medium - Google Patents

Method and device for generating data report, electronic equipment and storage medium Download PDF

Info

Publication number
CN113961432A
CN113961432A CN202111142644.0A CN202111142644A CN113961432A CN 113961432 A CN113961432 A CN 113961432A CN 202111142644 A CN202111142644 A CN 202111142644A CN 113961432 A CN113961432 A CN 113961432A
Authority
CN
China
Prior art keywords
data
transmission mode
vehicle
transmission
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111142644.0A
Other languages
Chinese (zh)
Inventor
曹亮
崔志阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apollo Zhilian Beijing Technology Co Ltd
Original Assignee
Apollo Zhilian Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apollo Zhilian Beijing Technology Co Ltd filed Critical Apollo Zhilian Beijing Technology Co Ltd
Priority to CN202111142644.0A priority Critical patent/CN113961432A/en
Publication of CN113961432A publication Critical patent/CN113961432A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The utility model provides a method, a device, an electronic device and a storage medium for generating a data report, which relate to the technical field of vehicle networking and at least solve the technical problem of high difficulty in obtaining evidence of the behavior of collecting private data by a vehicle-mounted application program. The specific implementation scheme is as follows: acquiring a transmission mode of uploading first data to a target server by a target vehicle, wherein the transmission mode is used for determining whether the first data is encrypted for transmission; capturing first data based on a transmission mode; acquiring second data from the first data, wherein the second data is privacy data contained in the first data; and generating a target data report using the second data.

Description

Method and device for generating data report, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of car networking technologies, and in particular, to a method and an apparatus for generating a data report, an electronic device, and a storage medium.
Background
With the rapid development of mobile communication technology, the internet of vehicles becomes the mainstream of smart traffic development, and after the vehicle terminal accesses the internet, a large amount of data interaction can be performed with the cloud application, wherein the interactive data content can relate to personal privacy information. Therefore, the supervision department needs to strictly monitor the condition of collecting the private data by the vehicle-mounted application program to ensure the data security.
However, in the internet of vehicles process, the data uploaded by the vehicle-mounted application program has the characteristics of strong real-time performance, timeliness and mobility, and the existing scheme has no mature solution for effectively obtaining evidence of the behavior of the vehicle-mounted application program for collecting the private data.
Disclosure of Invention
The disclosure provides a method, a device, electronic equipment and a storage medium for generating a data report, which are used for at least solving the technical problem of high difficulty in obtaining evidence of behavior of collecting private data of a vehicle-mounted application program.
According to an aspect of the present disclosure, there is provided a method of generating a data report, including: acquiring a transmission mode of uploading first data to a target server by a target vehicle, wherein the transmission mode is used for determining whether the first data is encrypted for transmission; capturing first data based on a transmission mode; acquiring second data from the first data, wherein the second data is privacy data contained in the first data; and generating a target data report using the second data.
According to yet another aspect of the present disclosure, there is provided an apparatus for generating a data report, including: the system comprises a first acquisition module, a first storage module and a first transmission module, wherein the first acquisition module is used for acquiring a transmission mode of uploading first data to a target server by a target vehicle, and the transmission mode is used for determining whether to encrypt and transmit the first data; the grabbing module is used for grabbing first data based on a transmission mode; the second obtaining module is used for obtaining second data from the first data, wherein the second data is privacy data contained in the first data; and the generating module is used for generating a target data report by adopting the second data.
According to still another aspect of the present disclosure, there is provided an electronic device including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of generating a data report as set forth in the present disclosure.
According to yet another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform a method of generating a data report as set forth in the present disclosure.
According to yet another aspect of the present disclosure, a computer program product is provided, comprising a computer program which, when executed by a processor, performs a method of generating a data report as set forth in the present disclosure.
In the disclosure, a transmission mode of uploading first data to a target server by a target vehicle is obtained, wherein the transmission mode is used for determining whether to carry out encrypted transmission on the first data; capturing first data based on a transmission mode; acquiring second data from the first data, wherein the second data is privacy data contained in the first data; the second data is adopted to generate the target data report, so that the purpose of effectively obtaining evidence of the behavior of the vehicle-mounted application program for collecting the private data is achieved, the effect of protecting the data transmission safety is achieved, and the technical problem that the difficulty of obtaining evidence of the behavior of the vehicle-mounted application program for collecting the private data is high is solved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a block diagram of a hardware structure of a computer terminal (or mobile device) for implementing a method of generating a data report according to an embodiment of the present disclosure;
FIG. 2 is a flow diagram of a method of generating a data report in accordance with an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a process for uploading first data according to an embodiment of the present disclosure;
FIG. 4 is a process diagram of a method of generating a data report in accordance with an embodiment of the present disclosure;
FIG. 5 is a process diagram of yet another method of generating a data report in accordance with an embodiment of the present disclosure;
fig. 6 is a block diagram of an apparatus for generating a data report according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present disclosure, there is provided a method of generating a data report, it being noted that the steps illustrated in the flowchart of the figure may be performed in a computer system, such as a set of computer-executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
The method embodiments provided by the embodiments of the present disclosure may be executed in a mobile terminal, a computer terminal or similar electronic devices. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as vehicle terminals, personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein. Fig. 1 shows a hardware configuration block diagram of a computer terminal (or mobile device) for implementing a method of generating a data report.
As shown in fig. 1, the computer terminal 100 includes a computing unit 101 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM)102 or a computer program loaded from a storage unit 108 into a Random Access Memory (RAM) 103. In the RAM 103, various programs and data necessary for the operation of the computer terminal 100 can also be stored. The computing unit 101, the ROM 102, and the RAM 103 are connected to each other via a bus 104. An input/output (I/O) interface 105 is also connected to bus 104.
A number of components in the computer terminal 100 are connected to the I/O interface 105, including: an input unit 106 such as a keyboard, a mouse, and the like; an output unit 107 such as various types of displays, speakers, and the like; a storage unit 108, such as a magnetic disk, optical disk, or the like; and a communication unit 109 such as a network card, modem, wireless communication transceiver, etc. The communication unit 109 allows the computer terminal 100 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
Computing unit 101 may be a variety of general purpose and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 101 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 101 performs the methods of generating data reports described herein. For example, in some embodiments, the method of generating a data report may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 108. In some embodiments, part or all of the computer program may be loaded and/or installed onto the computer terminal 100 via the ROM 102 and/or the communication unit 109. When loaded into RAM 103 and executed by computing unit 101, a computer program may perform one or more steps of the method of generating a data report described herein. Alternatively, in other embodiments, the computing unit 101 may be configured by any other suitable means (e.g., by means of firmware) to perform the method of generating a data report.
Various implementations of the systems and techniques described here can be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
It should be noted here that in some alternative embodiments, the electronic device shown in fig. 1 may include hardware elements (including circuitry), software elements (including computer code stored on a computer-readable medium), or a combination of both hardware and software elements. It should be noted that fig. 1 is only one example of a particular specific example and is intended to illustrate the types of components that may be present in the electronic device described above.
In the above operating environment, the present disclosure provides a method of generating a data report as shown in fig. 2, which may be performed by a computer terminal or similar electronic device as shown in fig. 1. Fig. 2 is a flowchart of a method for generating a data report according to an embodiment of the present disclosure. As shown in fig. 2, the method may include the steps of:
step S21, acquiring a transmission mode of the target vehicle for uploading the first data to the target server, wherein the transmission mode is used for determining whether to encrypt and transmit the first data;
the target vehicle can be an intelligent vehicle terminal with a mobile communication function, one or more vehicle-mounted applications can be configured on the vehicle terminal, and the first data is data collected by the vehicle-mounted applications on the target vehicle. For example, a monitoring application may be installed on the vehicle terminal, and the management department may obtain evidence of the behavior of other vehicle-mounted applications for obtaining the private data through the monitoring application.
Optionally, the monitoring application program responds to the confirmation operation of the user, and acquires a transmission mode of the first data uploaded by the target vehicle. For example, a message popup window of 'whether to allow evidence collection' is displayed on a graphical display interface of the vehicle terminal, and after the user clicks a 'yes' option to confirm that evidence collection is allowed, a transmission mode of uploading first data of the target vehicle is acquired from a background of the vehicle terminal by using the monitoring application program.
Optionally, the monitoring application obtains the transmission mode according to a transmission protocol type adopted when the other vehicle-mounted application uploads the first data to the target server.
The target server is a cloud server and can be used for processing first data uploaded by the target vehicle and providing corresponding data services for the target vehicle based on the first data.
Specifically, the implementation process of obtaining the transmission mode in which the target vehicle uploads the first data to the target server may refer to further description of the embodiment of the present disclosure, and is not repeated.
Step S22, capturing first data based on the transmission mode;
optionally, the capturing mode for the first data is determined based on a transmission mode in which the target vehicle uploads the first data to the target server, and the first data is captured according to the determined capturing mode.
Specifically, the implementation process of capturing the first data based on the transmission mode may refer to further description of the embodiment of the present disclosure, and is not repeated.
Step S23, acquiring second data from the first data, where the second data is private data included in the first data;
the second data may include personal privacy data such as a mobile phone number, an address book, a photo, and the like of the user.
And step S24, generating a target data report by using the second data.
The target data report can be used for the management department to obtain evidence of the condition that the vehicle-mounted application program collects the second data, wherein the target data report can comprise information such as acquisition time, transmission time and transmission channel of the second data.
Optionally, the forensics results are determined from the target data reports. For example, when the target data report shows that the in-vehicle application 1 acquires the second data at the first time and uploads the second data to the target server at the second time, it can be proved that the in-vehicle application 1 acquires and transmits the user privacy data.
According to the present disclosure, in the steps S20 to S24, a transmission mode for uploading the first data to the target server by the target vehicle is obtained, wherein the transmission mode is used for determining whether to perform encrypted transmission on the first data; capturing first data based on a transmission mode; acquiring second data from the first data, wherein the second data is privacy data contained in the first data; the second data is adopted to generate the target data report, so that the purpose of effectively obtaining evidence of the behavior of the vehicle-mounted application program for collecting the private data is achieved, the effect of protecting the data transmission safety is achieved, and the technical problem that the difficulty of obtaining evidence of the behavior of the vehicle-mounted application program for collecting the private data is high is solved.
The method of generating a data report of the above embodiments is further described below.
As an optional implementation manner, in step S21, the target vehicle is configured with an in-vehicle application, the first data is data collected by the in-vehicle application, and the transmission manner for acquiring the first data uploaded by the target vehicle includes:
step S211, acquiring a transmission protocol type adopted by the vehicle-mounted application program for uploading the first data;
step S212, the transmission mode is determined based on the transmission protocol type.
The vehicle-mounted application program can have one or more functions of communication, attendance checking, navigation, entertainment and the like, and can provide corresponding services for users when driving target vehicles.
As an alternative implementation manner, in step S212, determining the transmission manner based on the transmission protocol type includes:
step S2121, when the transmission protocol type is a plaintext transmission protocol type, determining to adopt a plaintext transmission mode for the first data;
for example, when the Protocol type used when the in-vehicle application uploads the first data to the target server is hypertext Transfer Protocol (HTTP), it may be determined that a plaintext transmission manner is used for the first data.
Step S2122, when the transmission protocol type is the cipher text transmission protocol type, determining to adopt an encryption transmission mode for the first data.
For example, when the Protocol type used when the in-vehicle application uploads the first data to the target server is a hypertext Transfer Protocol over secure session Layer (HTTPS), it may be determined that the first data employs an encrypted transmission mode.
As an alternative implementation, in step S22, the grabbing the first data based on the transmission mode includes: and when the first data are uploaded in a plaintext transmission mode, capturing the first data from the target vehicle locally, and recording the corresponding relation between the first data and the identification information of the vehicle-mounted application program.
The corresponding relation between the first data and the identification information of the vehicle-mounted application programs is used for determining the first data uploaded by each vehicle-mounted application program.
As an alternative implementation, in step S22, the grabbing the first data based on the transmission mode includes:
step S221, when the first data are uploaded in an encryption transmission mode, traversing a plurality of encryption functions corresponding to the encryption transmission mode, wherein each encryption function in the plurality of encryption functions respectively adopts different encryption strategies to encrypt the first data;
step S222, capturing first data corresponding to at least one encryption function of the plurality of encryption functions, and recording a corresponding relationship between the first data and identification information of the vehicle-mounted application program, where the at least one encryption function is a to-be-used function for encrypting the first data.
For example, the plurality of cryptographic functions may include a plurality of protocols in a Secure Sockets Layer (SSL) library that is open: open Secure Sockets Layer (OpenSSL), borning Secure Sockets Layer (BoringSSL), Polar Secure Sockets Layer (Polar ssl), and so on.
Fig. 3 is a schematic diagram of a process of uploading first data by using an encrypted transmission method according to an embodiment of the present disclosure. As shown in fig. 3, a plurality of in-vehicle applications, such as an in-vehicle application 1, an in-vehicle application 2, an in-vehicle application 3, etc., may be installed on the target vehicle. And when the fact that the vehicle-mounted application program on the target vehicle uploads the first data to the target server by adopting the HTTPS is determined, calling an encryption strategy corresponding to an encryption function in the SSL library to encrypt the first data. And capturing first data corresponding to at least one encryption function in the SSL library, and recording the corresponding relation between the first data and the vehicle-mounted application identification information. For example, when the vehicle-mounted application program 1 uploads first data to the target server by using HTTPS, the vehicle-mounted application program 1 traverses a plurality of encryption functions in the SSL library, further captures first data before encryption corresponding to OpenSSL, and records a corresponding relationship between the first data and the vehicle-mounted application program 1.
As an alternative embodiment, the first data is grabbed with a hook function before being encrypted with the at least one encryption function.
The following describes in detail the implementation process of generating the target data report when the plaintext transmission manner is adopted for the first data with reference to fig. 4.
Fig. 4 is a process schematic diagram of a method for generating a data report according to an embodiment of the present disclosure, as shown in fig. 4, a monitoring application is installed in a target vehicle, and when other vehicle-mounted applications in the target vehicle upload first data to a target server by using HTTP, the monitoring application captures the first data uploaded by the other vehicle-mounted applications from the target vehicle locally by using a hook function, records a corresponding relationship between the first data and identification information of the vehicle-mounted applications, transmits the captured first data to a storage device, scans the captured first data by using a second data scanning engine, further obtains second data, and generates the target data report by using the second data.
The following describes in detail an implementation process of generating a target data report when the first data is encrypted and transmitted with reference to fig. 5.
Fig. 5 is a process schematic diagram of another method for generating a data report according to an embodiment of the present disclosure, as shown in fig. 5, a monitoring application is installed in a target vehicle, and when other vehicle-mounted applications in the target vehicle upload first data to a target server by using HTTPS, the monitoring application traverses a plurality of encryption functions in an SSL library, captures first data before encryption corresponding to at least one encryption function in the plurality of encryption functions by using a hook function, records a corresponding relationship between the first data and identification information of the vehicle-mounted application, transmits the captured first data to a storage device, scans the captured first data by using a second data scanning engine, further obtains second data, and generates the target data report by using the second data.
The method comprises the steps of acquiring a transmission mode of uploading first data to a target server by a target vehicle, wherein the transmission mode is used for determining whether to encrypt and transmit the first data; capturing first data based on a transmission mode; acquiring second data from the first data, wherein the second data is privacy data contained in the first data; the second data is adopted to generate the target data report, so that the purpose of effectively obtaining evidence of the behavior of the vehicle-mounted application program for collecting the private data is achieved, the effect of protecting the data transmission safety is achieved, and the technical problem that the difficulty of obtaining evidence of the behavior of the vehicle-mounted application program for collecting the private data is high is solved.
In the technical scheme of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the personal information of the related user are all in accordance with the regulations of related laws and regulations and do not violate the good customs of the public order.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions to enable a terminal device (which may be a mobile phone, a computer, a server, or a network device) to execute the methods according to the embodiments of the present disclosure.
The present disclosure also provides a device for generating a data report, where the device is used to implement the foregoing embodiments and preferred embodiments, and the description of the device that has been already made is omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 6 is a block diagram of an apparatus for generating a data report according to an embodiment of the present disclosure, and as shown in fig. 6, an apparatus 600 for generating a data report includes: the system comprises a first obtaining module 601, a capturing module 602, a second obtaining module 603 and a generating module 604.
The first obtaining module 601 is configured to obtain a transmission mode in which a target vehicle uploads first data to a target server, where the transmission mode is used to determine whether to perform encrypted transmission on the first data;
a grabbing module 602, configured to grab first data based on a transmission manner;
a second obtaining module 603, configured to obtain second data from the first data, where the second data is private data included in the first data;
a generating module 604 for generating a target data report using the second data.
Optionally, a vehicle-mounted application program is configured on the target vehicle, the first data is data acquired by the vehicle-mounted application program, and the transmission mode for acquiring the first data uploaded by the target vehicle by the first acquisition module 601 includes: acquiring a transmission protocol type adopted by a vehicle-mounted application program for uploading first data; the transmission mode is determined based on the transmission protocol type.
Optionally, the first obtaining module 601 is further configured to determine a transmission manner based on the transmission protocol type, including: when the transmission protocol type is a plaintext transmission protocol type, determining to adopt a plaintext transmission mode for the first data; and when the transmission protocol type is the cipher text transmission protocol type, determining to adopt an encryption transmission mode for the first data.
Optionally, the grabbing module 602 is configured to grab the first data based on the transmission manner, and includes: and when the first data are uploaded in a plaintext transmission mode, capturing the first data from the target vehicle locally, and recording the corresponding relation between the first data and the identification information of the vehicle-mounted application program.
Optionally, the grabbing module 602 is configured to grab the first data based on the transmission manner, and includes: when the first data are uploaded in an encryption transmission mode, traversing a plurality of encryption functions corresponding to the encryption transmission mode, wherein each encryption function in the plurality of encryption functions respectively adopts different encryption strategies to encrypt the first data; the method comprises the steps of capturing first data corresponding to at least one encryption function in a plurality of encryption functions, and recording the corresponding relation between the first data and identification information of the vehicle-mounted application program, wherein the at least one encryption function is a function to be used for encrypting the first data.
Optionally, the grabbing module 602 is further configured to grab the first data by using a hook function before encrypting the first data by using at least one encryption function.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
According to an embodiment of the present disclosure, there is also provided an electronic device including a memory having stored therein computer instructions and at least one processor configured to execute the computer instructions to perform the steps in any of the above method embodiments.
Optionally, the electronic device may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Alternatively, in the present disclosure, the processor may be configured to execute the following steps by a computer program:
s1, acquiring a transmission mode of uploading first data to a target server by a target vehicle, wherein the transmission mode is used for determining whether the first data are encrypted for transmission;
s2, capturing first data based on the transmission mode;
s3, acquiring second data from the first data, wherein the second data is private data contained in the first data;
and S4, generating a target data report by using the second data.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
According to an embodiment of the present disclosure, there is also provided a non-transitory computer readable storage medium having stored therein computer instructions, wherein the computer instructions are arranged to perform the steps in any of the above method embodiments when executed.
Alternatively, in the present embodiment, the above-mentioned non-transitory computer-readable storage medium may be configured to store a computer program for executing the steps of:
s1, acquiring a transmission mode of uploading first data to a target server by a target vehicle, wherein the transmission mode is used for determining whether the first data are encrypted for transmission;
s2, capturing first data based on the transmission mode;
s3, acquiring second data from the first data, wherein the second data is private data contained in the first data;
and S4, generating a target data report by using the second data.
Alternatively, in the present embodiment, the non-transitory computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The present disclosure also provides a computer program product according to an embodiment of the present disclosure. Program code for implementing the audio processing methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the above embodiments of the present disclosure, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present disclosure, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
The foregoing is merely a preferred embodiment of the present disclosure, and it should be noted that modifications and embellishments could be made by those skilled in the art without departing from the principle of the present disclosure, and these should also be considered as the protection scope of the present disclosure.

Claims (10)

1. A method of generating a data report, comprising:
acquiring a transmission mode of uploading first data to a target server by a target vehicle, wherein the transmission mode is used for determining whether to carry out encryption transmission on the first data;
grabbing the first data based on the transmission mode;
acquiring second data from the first data, wherein the second data is private data contained in the first data;
and generating a target data report by using the second data.
2. The method of claim 1, wherein a vehicle-mounted application is configured on the target vehicle, the first data is data collected by the vehicle-mounted application, and the transmission mode for acquiring the first data uploaded by the target vehicle comprises:
acquiring a transmission protocol type adopted by the vehicle-mounted application program for uploading the first data;
determining the transmission mode based on the transmission protocol type.
3. The method of claim 2, wherein determining the transmission mode based on the transmission protocol type comprises:
when the transmission protocol type is a plaintext transmission protocol type, determining to adopt a plaintext transmission mode for the first data;
and when the transmission protocol type is the cipher text transmission protocol type, determining to adopt an encryption transmission mode for the first data.
4. The method of claim 3, wherein grabbing the first data based on the transmission mode comprises:
and when the first data are uploaded in the plaintext transmission mode, capturing the first data from the target vehicle locally, and recording the corresponding relation between the first data and the identification information of the vehicle-mounted application program.
5. The method of claim 3, wherein grabbing the first data based on the transmission mode comprises:
when the first data are uploaded in the encryption transmission mode, traversing a plurality of encryption functions corresponding to the encryption transmission mode, wherein each encryption function in the plurality of encryption functions respectively adopts different encryption strategies to encrypt the first data;
and capturing the first data corresponding to at least one encryption function in the plurality of encryption functions, and recording the corresponding relation between the first data and the identification information of the vehicle-mounted application program, wherein the at least one encryption function is a to-be-used function for encrypting the first data.
6. The method of claim 5, wherein the first data is grabbed with a hook function prior to encrypting the first data with the at least one encryption function.
7. An apparatus to generate a data report, comprising:
the system comprises a first acquisition module, a first storage module and a first transmission module, wherein the first acquisition module is used for acquiring a transmission mode of uploading first data to a target server by a target vehicle, and the transmission mode is used for determining whether to carry out encrypted transmission on the first data;
the grabbing module is used for grabbing the first data based on the transmission mode;
a second obtaining module, configured to obtain second data from the first data, where the second data is private data included in the first data;
and the generating module is used for generating a target data report by adopting the second data.
8. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
9. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-6.
10. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-6.
CN202111142644.0A 2021-09-28 2021-09-28 Method and device for generating data report, electronic equipment and storage medium Pending CN113961432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111142644.0A CN113961432A (en) 2021-09-28 2021-09-28 Method and device for generating data report, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111142644.0A CN113961432A (en) 2021-09-28 2021-09-28 Method and device for generating data report, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113961432A true CN113961432A (en) 2022-01-21

Family

ID=79462962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111142644.0A Pending CN113961432A (en) 2021-09-28 2021-09-28 Method and device for generating data report, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113961432A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114822751A (en) * 2022-04-27 2022-07-29 北京百度网讯科技有限公司 Method, device, equipment and storage medium for acquiring data report

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114822751A (en) * 2022-04-27 2022-07-29 北京百度网讯科技有限公司 Method, device, equipment and storage medium for acquiring data report

Similar Documents

Publication Publication Date Title
US9043076B2 (en) Automating predictive maintenance for automobiles
CN105577602B (en) Data push method and device based on open application programming interface
US20160021111A1 (en) Method, Terminal Device, and Network Device for Improving Information Security
CN104144081A (en) General application log management method, device and system
CN111382985B (en) Integrated pushing system and working method for message to be handled
CN102624726A (en) Multi-core intelligent network card platform-based ultrahigh-bandwidth network security audit method
CN115147956B (en) Data processing method, device, electronic equipment and storage medium
CN111953668B (en) Network security information processing method and device
WO2019018829A1 (en) Advanced cybersecurity threat mitigation using behavioral and deep analytics
CN114584366B (en) Power monitoring network safety detection system and method
CN113961432A (en) Method and device for generating data report, electronic equipment and storage medium
CN112437034B (en) False terminal detection method and device, storage medium and electronic device
CN108833500B (en) Service calling method, service providing method, data transmission method and server
CN113886870A (en) Data processing method, device, equipment and storage medium
CN108121288B (en) Internet of vehicles big data system, docking system and method
CN114139192B (en) Encrypted traffic processing method, encrypted traffic processing apparatus, electronic device, medium, and program
CN114372092A (en) Case collaborative search processing method, system, device and electronic equipment
CN114866310A (en) Malicious encrypted flow detection method, terminal equipment and storage medium
CN114285890A (en) Cloud platform connection method, device, equipment and storage medium
CN112929357A (en) Virtual machine data analysis method, device, equipment and storage medium
CN106162059A (en) A kind of video monitoring alarm method and system
CN112989327A (en) Detection method, device, equipment and storage medium for stealing website data
CN110581888A (en) management method, gateway and system for terminal security session of Internet of things
Alshenaifi et al. IoT forensics: machine to machine embedded with SIM card
CN116155516B (en) Video transmission system, method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination