CN114363072A - Method, device and system for intrusion detection - Google Patents

Method, device and system for intrusion detection Download PDF

Info

Publication number
CN114363072A
CN114363072A CN202210014607.XA CN202210014607A CN114363072A CN 114363072 A CN114363072 A CN 114363072A CN 202210014607 A CN202210014607 A CN 202210014607A CN 114363072 A CN114363072 A CN 114363072A
Authority
CN
China
Prior art keywords
vehicle
module
verification
information
execution module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210014607.XA
Other languages
Chinese (zh)
Inventor
陈从根
韩志华
王隆钢
荣根熙
龙沫涵
李志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Zhitu Technology Co Ltd
Original Assignee
Suzhou Zhitu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Zhitu Technology Co Ltd filed Critical Suzhou Zhitu Technology Co Ltd
Priority to CN202210014607.XA priority Critical patent/CN114363072A/en
Publication of CN114363072A publication Critical patent/CN114363072A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The embodiment of the application provides an anti-intrusion detection method, device and system, wherein a vehicle control module sends a verification instruction to a vehicle execution module and each block chain link point of a block chain network at regular time; triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result, and sending the verification result to the vehicle control module; detecting whether the vehicle is invaded based on the verification result; according to the method and the device, whether the vehicle is invaded or not can be accurately detected through the block chain network, so that safe driving of a driver is guaranteed.

Description

Method, device and system for intrusion detection
Technical Field
The invention relates to the technical field of vehicle detection, in particular to an anti-intrusion detection method, device and system.
Background
With the development of network technology, intelligent networked automobiles become the inevitable direction of automobile development at present. The internet of vehicles uses vehicles in driving as information perception objects, network connection between the vehicles, people, roads and service platforms is achieved by means of a new generation of information communication technology, the overall intelligent driving level of the vehicles is improved, safe, comfortable, intelligent and efficient driving feeling and traffic service are provided for users, meanwhile, traffic operation efficiency is improved, and the intelligent level of social traffic service is improved. However, once the automobile is networked, the possibility of intrusion exists, and the safety of drivers and passengers is threatened, and the anti-intrusion mechanism of the automobile control system is particularly important. At present, an anti-intrusion scheme for a vehicle is realized by mostly adopting a mode of sending a fixed password or fixed data for detection, but if the password or the fixed data is acquired, whether intrusion occurs or not cannot be effectively identified.
Disclosure of Invention
In view of this, the present invention provides an intrusion detection method, device and system, which can effectively detect whether a vehicle is intruded, and is beneficial to safety protection of a driver.
In a first aspect, an embodiment of the present invention provides an intrusion detection prevention method, where the method is applied to a vehicle control module, the vehicle control module is further connected in communication with a vehicle execution module and each block chain node of a block chain network deployed on a vehicle, and the vehicle execution module is further connected in communication with each block chain node; the method comprises the following steps: regularly sending verification instructions to the vehicle execution module and each block link point; the verification instruction carries control information and verification information; triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result, and sending the verification result to the vehicle control module; and detecting whether the vehicle is invaded or not based on the verification result.
The step of detecting whether the vehicle is intruded based on the verification result includes: if the verification result is the same as the verification result, detecting that the vehicle is not invaded; and if the verification result is that at least one verification is different, detecting that the vehicle is invaded.
After detecting that the vehicle is not invaded, the method further comprises: and controlling the vehicle execution module to execute the control operation corresponding to the control information.
The vehicle control module comprises a track tracking module, a track planning module and a sensing module; after detecting the vehicle intrusion, the method further comprises: if the track tracking module is detected to be invaded, a car following enabling instruction is sent to the vehicle execution module so as to control the vehicle execution module to execute car following operation corresponding to the car following enabling instruction; and if the intrusion of the trajectory planning module and/or the perception module is detected, sending a parking enabling instruction to the vehicle execution module so as to control the vehicle execution module to execute a parking operation corresponding to the parking enabling instruction.
Before the verification instruction is sent to the vehicle execution module and each block link point at regular time, the method further comprises the following steps: acquiring control information and time information; binary coding the control information and the time information; and carrying out preset specific Boolean operation on the binary coded control information and the time information to generate verification information.
In a second aspect, an embodiment of the present invention further provides an apparatus for intrusion detection, where the apparatus is applied to a vehicle control module, the vehicle control module is further connected to a vehicle execution module, and each block chain node of a block chain network deployed on a vehicle in a communication manner, and the vehicle execution module is further connected to each block chain node in a communication manner; the device includes: the sending module is used for sending verification instructions to the vehicle execution module and each block link point at regular time; the verification instruction carries control information and verification information; the triggering module is used for triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result and sending the verification result to the vehicle control module; and the detection module is used for detecting whether the vehicle is invaded or not based on the verification result.
The above-mentioned device still includes: the acquisition module is used for acquiring control information and time information; the encoding module is used for carrying out binary encoding on the control information and the time information; and the generating module is used for carrying out preset specific Boolean operation on the binary coded control information and the time information to generate verification information.
In a third aspect, an embodiment of the present invention further provides an intrusion detection prevention system, where the system includes a vehicle control module, a vehicle execution module connected to the vehicle control module in a communication manner, and each blockchain node of a blockchain network deployed on a vehicle, where the vehicle execution module is further connected to each blockchain node in a communication manner; the vehicle control module is used for the anti-intrusion detection method.
In a fourth aspect, the embodiment of the present invention further provides an electronic device, which includes a processor and a memory, where the memory stores computer-executable instructions that can be executed by the processor, and the processor executes the computer-executable instructions to implement the method described above.
In a fifth aspect, the embodiments of the present invention also provide a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are called and executed by a processor, the computer-executable instructions cause the processor to implement the above-mentioned method.
The embodiment of the invention has the following beneficial effects:
the embodiment of the application provides an anti-intrusion detection method, device and system, wherein a vehicle control module sends a verification instruction to a vehicle execution module and each block chain link point of a block chain network at regular time; triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result, and sending the verification result to the vehicle control module; detecting whether the vehicle is invaded based on the verification result; according to the method and the device, whether the vehicle is invaded or not can be accurately detected through the block chain network, so that safe driving of a driver is guaranteed.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic structural diagram of an intrusion detection prevention system according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for intrusion detection according to an embodiment of the present invention;
FIG. 3 is a flow chart of another method for intrusion detection prevention according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for intrusion detection prevention according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the process of detecting whether a vehicle is invaded by sending a fixed password or fixed data, if the password or the fixed data is obtained, whether the invasion occurs cannot be effectively identified; based on this, the method, the device and the system for intrusion detection provided by the embodiment of the invention can effectively detect whether the vehicle is intruded, and are beneficial to safety protection of a driver.
To facilitate understanding of the embodiment, the method for intrusion detection according to the embodiment of the present invention will be described in detail below. As shown in fig. 1, the system includes a vehicle control module 100, a vehicle execution module 101 connected to the vehicle control module 100 in a communication manner, and each blockchain node 102 of a blockchain network deployed on a vehicle, where the vehicle execution module 101 is further connected to each blockchain node 102 in a communication manner; the vehicle control module is used in the method for intrusion detection in the embodiment.
The vehicle control module is an instruction module capable of sending instructions to the above modules, and may be understood as a controller of a vehicle, and the vehicle execution module may be understood as each actuator of the vehicle, and in actual use, in order to increase the access speed, the blockchain network is deployed on the vehicle so as to receive the verification instructions sent by the vehicle control module, and in order to ensure that the greater the number of the blockchain nodes 102 is, the better the verification is, only three blockchain nodes 102 are shown in fig. 1, specifically, the number of the blockchain nodes 102 may be set according to actual needs, and is not limited herein.
Based on the vehicle control module, an embodiment of the present invention provides an intrusion detection prevention method, referring to a flowchart of the intrusion detection prevention method shown in fig. 2, where the method specifically includes the following steps:
step S202, regularly sending a verification instruction to the vehicle execution module and each block link point; the verification instruction carries control information and verification information;
generally, the vehicle control module can periodically send a verification instruction to the vehicle execution model and each block link point according to a preset time so as to detect whether the vehicle is invaded or not in real time; the control information may be command information capable of controlling the operation of the vehicle, for example, the control information may be information such as a deceleration command value, a steering wheel angle command value, and an acceleration command value, and is not limited herein.
In the present embodiment, the verification information is obtained by hybrid coding of the control information and the time information corresponding to the control information, and specifically, the generation process of the verification information can be realized through steps a1 to A3:
step A1, acquiring control information and time information;
the time information is the current time corresponding to the control information.
Step A2, binary coding the control information and the time information;
and step A3, performing preset specific Boolean operation on the binary coded control information and the time information to generate verification information.
Binary coding is performed on the information to obtain information of 0 or 1, and a preset specific boolean operation is performed on the coded control information and time information to obtain verification information, where the verification information is usually a specific verification value, and the boolean operation is the same as the existing boolean operation process and is not described herein again.
Step S204, triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result, and sending the verification result to the vehicle control module;
and after the vehicle execution module receives the verification instruction, triggering the vehicle execution module to verify whether the received control information and verification information are the same as the control information and verification information received by each block link point.
And step S206, detecting whether the vehicle is invaded or not based on the verification result.
The embodiment of the application provides an anti-intrusion detection method, wherein a vehicle control module sends a verification instruction to a vehicle execution module and each block chain node of a block chain network at regular time; triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result, and sending the verification result to the vehicle control module; detecting whether the vehicle is invaded based on the verification result; according to the method and the device, whether the vehicle is invaded or not can be accurately detected through the block chain network, so that safe driving of a driver is guaranteed.
The embodiment provides another anti-intrusion detection method, which is implemented on the basis of the above embodiments; the present embodiment focuses on a specific implementation of detecting whether a vehicle is intruded based on a verification result. As shown in fig. 3, another method for intrusion detection includes the following steps:
step S302, regularly sending a verification instruction to the vehicle execution module and each block link point; the verification instruction carries control information and verification information;
step S304, triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result, and sending the verification result to the vehicle control module;
step S306, if the verification result is the same result, detecting that the vehicle is not invaded;
namely, the vehicle execution module verifies that the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, and then the vehicle is detected not to be invaded.
Step S308, controlling a vehicle execution module to execute control operation corresponding to the control information;
when the vehicle is detected not to be invaded, the control information is not tampered, and the vehicle can be controlled according to the control information, so that the vehicle can be driven according to the control information.
Step S310, if the verification result is that at least one verification result is different, the vehicle is detected to be invaded;
namely, the vehicle execution module verifies that the control information and the verification information in the received verification instruction are different from the control information and the verification information in the verification instruction received by at least one block chain node, and then the vehicle is detected to be invaded.
Step S312, if the track tracking module is detected to be invaded, a car following enabling instruction is sent to the vehicle execution module so as to control the vehicle execution module to execute a car following operation corresponding to the car following enabling instruction;
step S314, if the intrusion of the trajectory planning module and/or the perception module is detected, a parking enabling instruction is sent to the vehicle execution module to control the vehicle execution module to execute a parking operation corresponding to the parking enabling instruction.
If it is detected that the vehicle is intruded through the step S310, it indicates that the control information has been tampered, and the execution of the control information may cause a driving accident.
Corresponding to the embodiment of the method shown in fig. 2, an embodiment of the present invention further provides an apparatus for intrusion detection, where the apparatus is applied to a vehicle control module, the vehicle control module is further communicatively connected to a vehicle execution module and each block chain node of a block chain network deployed on a vehicle, and the vehicle execution module is further communicatively connected to each block chain node; fig. 4 shows a schematic structural diagram of an apparatus for intrusion detection prevention, the apparatus comprising:
a sending module 402, configured to send a verification instruction to the vehicle execution module and each block link point at regular time; the verification instruction carries control information and verification information;
the triggering module 404 is configured to trigger the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generate a verification result, and send the verification result to the vehicle control module;
and a detection module 406, configured to detect whether the vehicle is intruded based on the verification result.
The embodiment of the application provides an anti-intrusion detection device, wherein a vehicle control module sends a verification instruction to a vehicle execution module and each block chain link point of a block chain network at regular time; triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result, and sending the verification result to the vehicle control module; detecting whether the vehicle is invaded based on the verification result; according to the method and the device, whether the vehicle is invaded or not can be accurately detected through the block chain network, so that safe driving of a driver is guaranteed.
The device for preventing intrusion detection provided by the embodiment of the invention has the same technical characteristics as the method for preventing intrusion detection provided by the embodiment, so the same technical problems can be solved, and the same technical effects can be achieved.
An electronic device is further provided in the embodiment of the present application, as shown in fig. 5, which is a schematic structural diagram of the electronic device, where the electronic device includes a processor 121 and a memory 120, the memory 120 stores computer-executable instructions that can be executed by the processor 121, and the processor 121 executes the computer-executable instructions to implement the method for detecting intrusion.
In the embodiment shown in fig. 5, the electronic device further comprises a bus 122 and a communication interface 123, wherein the processor 121, the communication interface 123 and the memory 120 are connected by the bus 122.
The Memory 120 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 123 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like may be used. The bus 122 may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 122 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one double-headed arrow is shown in FIG. 5, but this does not indicate only one bus or one type of bus.
The processor 121 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 121. The Processor 121 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and the processor 121 reads information in the memory and completes the steps of the method for detecting intrusion in combination with hardware thereof.
The embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are called and executed by a processor, the computer-executable instructions cause the processor to implement the method for detecting intrusion, and specific implementation may refer to the foregoing method embodiment, and is not described herein again.
The method, the apparatus, and the computer program product of the system for intrusion detection provided in the embodiments of the present application include a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiments, and specific implementations may refer to the method embodiments and are not described herein again.
Unless specifically stated otherwise, the relative steps, numerical expressions, and values of the components and steps set forth in these embodiments do not limit the scope of the present application.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the description of the present application, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present application. Furthermore, the terms "first," "second," and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. The method is characterized in that the method is applied to a vehicle control module, the vehicle control module is also in communication connection with a vehicle execution module and each block chain node of a block chain network deployed on a vehicle, and the vehicle execution module is also in communication connection with each block chain node; the method comprises the following steps:
regularly sending a verification instruction to the vehicle execution module and each block chain node; the verification instruction carries control information and verification information;
triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result, and sending the verification result to the vehicle control module;
detecting whether the vehicle is invaded based on the verification result.
2. The method of claim 1, wherein the step of detecting whether the vehicle is intruded based on the verification result comprises:
if the verification result is the same as the verification result, detecting that the vehicle is not invaded;
and if the verification result is at least one verification result which is different, detecting that the vehicle is invaded.
3. The method of claim 2, wherein after detecting that the vehicle is not being intruded, the method further comprises:
and controlling the vehicle execution module to execute the control operation corresponding to the control information.
4. The method of claim 2, wherein the vehicle control module comprises a trajectory tracking module, a trajectory planning module, and a perception module;
after detecting the vehicle intrusion, the method further comprises:
if the track tracking module is detected to be invaded, a car following enabling instruction is sent to the vehicle execution module so as to control the vehicle execution module to execute the car following operation corresponding to the car following enabling instruction;
and if the intrusion of the trajectory planning module and/or the perception module is detected, sending a parking enabling instruction to the vehicle execution module so as to control the vehicle execution module to execute a parking operation corresponding to the parking enabling instruction.
5. The method of claim 1, wherein prior to timing the sending of validation instructions to the vehicle execution module and each of the blockchain nodes, the method further comprises:
acquiring control information and time information;
binary coding the control information and the time information;
and carrying out preset specific Boolean operation on the binary coded control information and the time information to generate the verification information.
6. The device for preventing intrusion detection is applied to a vehicle control module, the vehicle control module is also in communication connection with a vehicle execution module and each block chain node of a block chain network deployed on a vehicle, and the vehicle execution module is also in communication connection with each block chain node; the device comprises:
the sending module is used for sending a verification instruction to the vehicle execution module and each block chain node at regular time; the verification instruction carries control information and verification information;
the triggering module is used for triggering the vehicle execution module to verify whether the control information and the verification information in the received verification instruction are the same as the control information and the verification information in the verification instruction received by each block chain node, generating a verification result and sending the verification result to the vehicle control module;
and the detection module is used for detecting whether the vehicle is invaded or not based on the verification result.
7. The apparatus of claim 6, further comprising:
the acquisition module is used for acquiring control information and time information;
the coding module is used for carrying out binary coding on the control information and the time information;
and the generating module is used for performing preset specific Boolean operation on the binary coded control information and the time information to generate the verification information.
8. An intrusion detection prevention system, comprising a vehicle control module, a vehicle execution module in communication with the vehicle control module, and respective blockchain nodes of a blockchain network deployed on a vehicle, the vehicle execution module also in communication with the respective blockchain nodes;
wherein the vehicle control module is configured to perform the method of intrusion detection according to any one of claims 1 to 5.
9. An electronic device comprising a processor and a memory, the memory storing computer-executable instructions executable by the processor, the processor executing the computer-executable instructions to implement the method of any one of claims 1 to 5.
10. A computer-readable storage medium having computer-executable instructions stored thereon which, when invoked and executed by a processor, cause the processor to implement the method of any of claims 1 to 5.
CN202210014607.XA 2022-01-07 2022-01-07 Method, device and system for intrusion detection Pending CN114363072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210014607.XA CN114363072A (en) 2022-01-07 2022-01-07 Method, device and system for intrusion detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210014607.XA CN114363072A (en) 2022-01-07 2022-01-07 Method, device and system for intrusion detection

Publications (1)

Publication Number Publication Date
CN114363072A true CN114363072A (en) 2022-04-15

Family

ID=81107359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210014607.XA Pending CN114363072A (en) 2022-01-07 2022-01-07 Method, device and system for intrusion detection

Country Status (1)

Country Link
CN (1) CN114363072A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465673A (en) * 2017-07-27 2017-12-12 深圳市易成自动驾驶技术有限公司 Identity identifying method, device and the computer-readable recording medium of vehicle
CN109460643A (en) * 2018-10-22 2019-03-12 阿里巴巴集团控股有限公司 A kind of smart machine control method, device and equipment
US20200133261A1 (en) * 2018-10-26 2020-04-30 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for controlling autonomous driving of vehicle, electronic device and storage medium
CN111368326A (en) * 2020-02-25 2020-07-03 百度在线网络技术(北京)有限公司 Vehicle data processing method and device, electronic equipment and storage medium
CN111703421A (en) * 2020-05-13 2020-09-25 重庆长安汽车股份有限公司 Trajectory planning system, method and storage medium for automatic driving and getting rid of difficulty of vehicle
CN112298185A (en) * 2020-11-06 2021-02-02 苏州挚途科技有限公司 Vehicle driving control method and device and electronic equipment
CN112437054A (en) * 2020-11-11 2021-03-02 广州天行健汽车科技有限公司 Vehicle ad hoc network safety control method based on optical transmission
KR102226951B1 (en) * 2019-09-06 2021-03-11 주식회사 퀀텀게이트 System and method for providing reward for safe driving based on blockchain
CN113556327A (en) * 2021-06-29 2021-10-26 中国人民解放军战略支援部队信息工程大学 Block chain-based false flow rule injection attack detection and prevention system and method
CN113561991A (en) * 2021-07-28 2021-10-29 浪潮卓数大数据产业发展有限公司 Dangerous driving behavior avoidance method, device and medium based on block chain
CN113794675A (en) * 2021-07-14 2021-12-14 中国人民解放军战略支援部队信息工程大学 Distributed Internet of things intrusion detection method and system based on block chain and federal learning

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465673A (en) * 2017-07-27 2017-12-12 深圳市易成自动驾驶技术有限公司 Identity identifying method, device and the computer-readable recording medium of vehicle
CN109460643A (en) * 2018-10-22 2019-03-12 阿里巴巴集团控股有限公司 A kind of smart machine control method, device and equipment
US20200133261A1 (en) * 2018-10-26 2020-04-30 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for controlling autonomous driving of vehicle, electronic device and storage medium
KR102226951B1 (en) * 2019-09-06 2021-03-11 주식회사 퀀텀게이트 System and method for providing reward for safe driving based on blockchain
CN111368326A (en) * 2020-02-25 2020-07-03 百度在线网络技术(北京)有限公司 Vehicle data processing method and device, electronic equipment and storage medium
CN111703421A (en) * 2020-05-13 2020-09-25 重庆长安汽车股份有限公司 Trajectory planning system, method and storage medium for automatic driving and getting rid of difficulty of vehicle
CN112298185A (en) * 2020-11-06 2021-02-02 苏州挚途科技有限公司 Vehicle driving control method and device and electronic equipment
CN112437054A (en) * 2020-11-11 2021-03-02 广州天行健汽车科技有限公司 Vehicle ad hoc network safety control method based on optical transmission
CN113556327A (en) * 2021-06-29 2021-10-26 中国人民解放军战略支援部队信息工程大学 Block chain-based false flow rule injection attack detection and prevention system and method
CN113794675A (en) * 2021-07-14 2021-12-14 中国人民解放军战略支援部队信息工程大学 Distributed Internet of things intrusion detection method and system based on block chain and federal learning
CN113561991A (en) * 2021-07-28 2021-10-29 浪潮卓数大数据产业发展有限公司 Dangerous driving behavior avoidance method, device and medium based on block chain

Similar Documents

Publication Publication Date Title
CN108022450B (en) Auxiliary driving method based on cellular network and traffic control unit
KR101936891B1 (en) Method and device for generating driving behavior guidance information
CN112298185B (en) Vehicle driving control method and device and electronic equipment
CN110663073B (en) Policy generation device and vehicle
CN113538901B (en) Traffic accident detection and alarm method based on intelligent vehicle-mounted terminal
JP6024696B2 (en) Communication device
JP2019500694A (en) Method for evaluating a danger situation detected by at least one sensor of a vehicle, method for controlling the reproduction of a danger warning, and method for reproducing a danger warning
CN116279379A (en) Parking reminding control method and system and electric automobile
CN115257725A (en) Vehicle collision early warning method, device, equipment and storage medium
JP2020097389A (en) Vehicle collision processing method, device, automobile, apparatus, and storage medium
CN111497870A (en) Device and method for reminding vehicle of driving beyond lane line
CN114363072A (en) Method, device and system for intrusion detection
CN105946578A (en) Accelerator pedal control method and device and vehicle
JP2019209961A (en) Information processor, monitoring method, program, and gateway device
CN113968241A (en) Control method and device for dangerous driving behaviors, vehicle and storage medium
CN115384536A (en) Evaluation method, device, equipment and medium for driving assistance system controller
CN117413257A (en) Method and system for testing driver assistance system for vehicle
JP3401566B2 (en) Right turn driving support device
CN113012470A (en) Alarming method and parameter real-time adjusting method of front collision early warning system
CN112455432A (en) Automatic parking safety control method, device, equipment and storage medium
CN112671853A (en) Road condition information prompting method, device and equipment
CN115050116B (en) Vehicle accident reporting method, device, equipment, vehicle and storage medium
CN114954384B (en) Brake control method, device and system and vehicle
CN114120660B (en) Expressway ramp exit early warning method, system, equipment and storage medium
CN115027500B (en) Decision planning method and device for unmanned vehicle, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination