CN115361112B - Driving monitoring data processing method, device, equipment and storage medium - Google Patents

Driving monitoring data processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN115361112B
CN115361112B CN202211287061.1A CN202211287061A CN115361112B CN 115361112 B CN115361112 B CN 115361112B CN 202211287061 A CN202211287061 A CN 202211287061A CN 115361112 B CN115361112 B CN 115361112B
Authority
CN
China
Prior art keywords
byte
target
data
matrix
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211287061.1A
Other languages
Chinese (zh)
Other versions
CN115361112A (en
Inventor
刘曼
张奇惠
刘家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202211287061.1A priority Critical patent/CN115361112B/en
Publication of CN115361112A publication Critical patent/CN115361112A/en
Application granted granted Critical
Publication of CN115361112B publication Critical patent/CN115361112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/008Registering or indicating the working of vehicles communicating information to a remotely located station
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • G07C5/0841Registering performance data
    • G07C5/085Registering performance data using electronic data carriers
    • G07C5/0866Registering performance data using electronic data carriers the electronic data carrier being a digital video recorder in combination with video camera
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The embodiment of the application discloses a driving monitoring data processing method, a driving monitoring data processing device, driving monitoring equipment and a storage medium. According to the technical scheme provided by the embodiment of the application, target byte paragraphs are extracted from target positions in each frame of monitoring audio and each frame of monitoring video in target data in sequence, each target byte paragraph is encrypted by using key information of a vehicle event data recorder to obtain first encrypted byte paragraphs, and a first byte matrix is constructed on the basis of each first encrypted byte paragraph and a set matrix construction rule; the first byte matrix is converted into a second byte matrix according to a set matrix conversion rule, the second byte matrix is split based on a set matrix construction rule to obtain second encryption byte paragraphs, each second encryption byte paragraph is sequentially filled to a target position according to the time stamps to obtain encryption target data, and the encryption target data is uploaded to a cloud background. By adopting the technical means, the cracking difficulty of the driving monitoring data can be improved, and the storage safety of the driving monitoring data is guaranteed.

Description

Driving monitoring data processing method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of data processing, in particular to a driving monitoring data processing method, a driving monitoring data processing device, driving monitoring equipment and a storage medium.
Background
The automobile data recorder is used for recording monitoring audios and videos of the driving environment in the driving process of the automobile. By recording the monitoring audio and video of the driving environment, important evidence can be provided for the judgment of the responsibility of the traffic accident. Therefore, the automobile data recorder needs to store a large amount of monitoring audio and video data. In order to relieve the storage pressure of the automobile data recorder, the internal memory is usually cleaned at regular time, and the monitoring audio and video are transferred and uploaded to the cloud background for storage.
However, the monitoring audio/video may contain privacy information such as driving travel information and dialogue information of the user, and if the monitoring audio/video is directly uploaded to the cloud background for storage, the content of the monitoring audio/video can be easily inquired at one end of the cloud background. Once the cloud background is attacked by the network, the content of the monitored audio and video is easily leaked. The monitoring audio and video storage mode is very not beneficial to the protection of privacy information of users, and the safety of monitoring audio and video content storage is easily influenced.
Disclosure of Invention
The embodiment of the application provides a driving monitoring data processing method, a driving monitoring data processing device, driving monitoring data processing equipment and a storage medium, the driving monitoring data can be adaptively selected to be encrypted and uploaded, the cracking difficulty of the driving monitoring data is improved, the storage safety of the driving monitoring data is guaranteed, and the storage safety problem of the driving monitoring data is solved.
In a first aspect, an embodiment of the present application provides a driving monitoring data processing method, including:
detecting a storage space of a driving recorder, and determining the storage amount of driving monitoring data, wherein the driving monitoring data comprises monitoring audio and monitoring video; under the condition that the storage amount reaches a set threshold value, selecting the driving monitoring data of a specified period from the storage space as target data;
sequentially extracting target byte paragraphs from each frame of monitoring audio and each frame of monitoring video in the target data, encrypting each target byte paragraph by using key information of the automobile data recorder to obtain first encrypted byte paragraphs, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule;
converting the first byte matrix into a second byte matrix according to a set matrix conversion rule, splitting the second byte matrix based on the set matrix construction rule to obtain second encrypted byte paragraphs, sequentially filling the second encrypted byte paragraphs to the target position according to timestamps to obtain encrypted target data, and uploading the encrypted target data to a cloud background.
Further, before converting the first byte matrix into the second byte matrix according to a set matrix conversion rule, the method further includes:
and selecting one candidate matrix conversion rule from a plurality of candidate matrix conversion rules according to the data amount of the target data as the set matrix conversion rule.
Further, constructing a first byte matrix based on each of the first encrypted byte paragraphs and a set matrix construction rule, comprising:
determining a set row number or a set column number of the first byte matrix according to a set matrix construction rule;
and constructing the first byte matrix by combining each first encryption byte paragraph based on the set line number or the set column number, and filling the vacant part of the first byte matrix by using the set byte paragraph.
Further, the step of selecting the driving monitoring data of the appointed time period from the storage space as target data comprises the following steps:
and selecting the driving monitoring data of the appointed time period from the storage space as target data according to the storage time sequence of the driving monitoring data and the set reporting time length.
Further, the target position of each frame of monitoring audio and each frame of monitoring video in the target data is one or more, and under the condition that one frame of monitoring audio and one frame of monitoring video comprise a plurality of target positions, the plurality of target positions are distributed at set interval positions.
Further, in a case that one frame of surveillance audio and one frame of surveillance video include a plurality of the target positions, the sequentially extracting target byte paragraphs from the target positions in each frame of surveillance audio and each frame of surveillance video in the target data includes:
and extracting byte data according to the arrangement position sequence of the target position in a frame of monitoring audio and a frame of monitoring video or a set byte extraction sequence to obtain byte sub-paragraphs, and sequentially connecting the byte sub-paragraphs in series to generate a target byte paragraph.
Further, after uploading the encrypted target data to a cloud background, the method further includes:
and generating a storage record of the encrypted target data, and writing the set matrix conversion rule and the set matrix construction rule into the storage record.
In a second aspect, an embodiment of the present application provides a driving monitoring data processing apparatus, including:
the system comprises a selection module, a storage module and a monitoring module, wherein the selection module is used for detecting a storage space of the automobile data recorder and determining the storage amount of automobile monitoring data, and the automobile monitoring data comprises monitoring audio and monitoring video; under the condition that the storage amount reaches a set threshold value, selecting the driving monitoring data of a specified period from the storage space as target data;
the encryption module is used for sequentially extracting target byte paragraphs from each frame of monitoring audio and each frame of monitoring video in the target data, encrypting each target byte paragraph by using key information of the automobile data recorder to obtain a first encrypted byte paragraph, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule;
the uploading module is used for converting the first byte matrix into a second byte matrix according to a set matrix conversion rule, splitting the second byte matrix based on the set matrix construction rule to obtain second encrypted byte paragraphs, sequentially filling each second encrypted byte paragraph to the target position according to a timestamp to obtain encrypted target data, and uploading the encrypted target data to a cloud background.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a memory and one or more processors;
the memory for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the driving monitoring data processing method according to the first aspect.
In a fourth aspect, the present application provides a storage medium containing computer executable instructions, which when executed by a computer processor, are used to perform the driving monitoring data processing method according to the first aspect.
The method comprises the steps of determining the storage capacity of driving monitoring data by detecting the storage space of a driving recorder, wherein the driving monitoring data comprises monitoring audio and monitoring video; under the condition that the storage amount reaches a set threshold value, selecting the driving monitoring data of a specified time period from the storage space as target data; sequentially extracting target byte paragraphs from each frame of monitoring audio and each frame of monitoring video in the target data, encrypting each target byte paragraph by using key information of a vehicle event data recorder to obtain a first encrypted byte paragraph, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule; the first byte matrix is converted into a second byte matrix according to a set matrix conversion rule, the second byte matrix is split based on the set matrix construction rule to obtain second encrypted byte paragraphs, each second encrypted byte paragraph is sequentially filled to a target position according to the time stamps to obtain encrypted target data, and the encrypted target data are uploaded to a cloud background. By adopting the technical means, the driving monitoring data can be adaptively selected to be encrypted and uploaded, the cracking difficulty of the driving monitoring data is improved, the storage safety of the driving monitoring data is guaranteed, and the privacy information of a user is protected. Meanwhile, the driving monitoring data is prevented from occupying the storage space of the driving recorder, and the storage pressure of the driving recorder is relieved.
Drawings
Fig. 1 is a flowchart of a driving monitoring data processing method according to an embodiment of the present application;
fig. 2 is a flowchart illustrating an encrypted uploading process of target data according to an embodiment of the present application;
FIG. 3 is a flow chart of a first byte matrix according to an embodiment of the present disclosure;
FIG. 4 is a schematic diagram of matrix transformation in the first embodiment of the present application;
fig. 5 is a schematic structural diagram of a driving monitoring data processing apparatus according to a second embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to a third embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in greater detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently, or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The first embodiment is as follows:
fig. 1 is a flowchart of a driving monitoring data processing method according to an embodiment of the present disclosure, where the driving monitoring data processing method provided in this embodiment may be executed by a driving monitoring data processing device, the driving monitoring data processing device may be implemented in a software and/or hardware manner, and the driving monitoring data processing device may be formed by two or more physical entities or may be formed by one physical entity. Generally speaking, the driving monitoring data processing device may be a processing device such as a driving recorder processor, a controller, and the like.
The following description will be given by taking the driving monitoring data processing device as an example of a main body for executing the driving monitoring data processing method. Referring to fig. 1, the driving monitoring data processing method specifically includes:
s110, detecting a storage space of the automobile data recorder, and determining the storage amount of automobile monitoring data, wherein the automobile monitoring data comprises monitoring audio and monitoring video; and when the storage amount reaches a set threshold value, selecting the driving monitoring data of a specified period from the storage space as target data.
The driving monitoring data processing method aims at selecting part of driving monitoring data as target data under the condition that the storage capacity of the storage space of the driving recorder reaches a set threshold value, and adopts byte extraction paragraphs to perform encryption and matrix conversion, so that the safe encryption of the driving monitoring data is realized, and the cracking difficulty of the driving monitoring data is increased. In a driving monitoring data storage scene, the data storage pressure of the driving recorder is relieved, the storage and transmission safety of the cloud background driving monitoring data is guaranteed, and the privacy information of a user is prevented from being easily stolen.
Specifically, in an application scene of the driving recorder, monitoring audio and monitoring video in the driving monitoring process can be continuously generated, and the driving monitoring data can be uniformly stored in a storage space of the driving recorder. Along with the continuous accumulation of driving monitoring data, can occupy the too big memory space of vehicle event data recorder, influence vehicle event data recorder's normal operating. Therefore, the storage space of the automobile data recorder needs to be periodically detected, and the selection and uploading of the target data are triggered under the condition that the storage amount of the driving monitoring data reaches the set threshold value.
According to actual data uploading requirements, the automobile data recorder can detect the storage space according to a set period (such as every day, every week and the like). In each detection period, if the storage capacity of the driving monitoring data reaches a set threshold (such as 95% of the storage space), which indicates that the current storage space is insufficient, the driving monitoring data is accumulated too much, and the memory needs to be cleaned in time, at this time, the screening and uploading of the driving monitoring data is triggered. Otherwise, the vehicle driving monitoring data does not need to be screened and uploaded.
Further, under the condition that the storage amount of the driving monitoring data reaches a set threshold value, the selection of the driving monitoring data in the storage space of the driving recorder is triggered, and the selected driving monitoring data is defined as target data. Optionally, when the target data is selected, the driving monitoring data of the designated period is selected from the storage space as the target data according to the storage time sequence of the driving monitoring data and the set reporting time length.
It can be understood that, for a part of the driving monitoring data with a longer storage time than the current time, the driving recorder will preferentially report the part of the driving monitoring data, so as to ensure that the driving monitoring data can be uploaded according to a time sequence. In addition, according to actual use habits, when looking up the locally stored driving monitoring data, the probability that the part of the driving monitoring data with the storage time closer to the current time is checked is higher, so that the part of the driving monitoring data with the storage time longer than the current time needs to be uploaded to the cloud background. Based on the above, according to the upper limit of the data amount which needs to be uploaded to the cloud background every time, the embodiment of the application adaptively sets a reporting time length, and based on the set reporting time length, the driving monitoring data is selected as the target monitoring data from the driving monitoring data with the earliest time. For example, if the reporting time is set to be 7 days, the time period of 7 days is determined from the driving monitoring data with the storage time being the longest from the current time, and the driving monitoring data in the specified time period is extracted as the target data.
Optionally, in practical application, in order to conveniently query the driving monitoring data with importance in the local query part, the target data may be further screened. For example, the vehicle starting and running time period is obtained through the vehicle central control, the running monitoring data in the target data in the time period is screened out, and uploading is not carried out. It can be understood that, because the probability of the traffic accident occurring during the starting and driving process of the automobile is higher than the time period of the parking of the automobile, the data can be further screened to improve the query efficiency of the data in order to conveniently and timely query the data in local. When the data needs to be queried, the data is directly extracted and viewed from the local, and the query does not need to be carried out through the cloud background.
S120, sequentially extracting target byte paragraphs from the target positions in each frame of monitoring audio and each frame of monitoring video in the target data, encrypting each target byte paragraph by using key information of the automobile data recorder to obtain a first encrypted byte paragraph, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule.
Further, based on the screened target data, referring to fig. 2, in the embodiment of the present application, a target byte paragraph is extracted from each of the surveillance video frame and the surveillance audio frame in the target data, and the target byte paragraph is encrypted to obtain a first encrypted byte paragraph. And constructing a first byte matrix based on the first encrypted byte paragraph, further obtaining a second byte matrix through matrix transformation, splitting the second byte matrix into a plurality of second encrypted byte paragraphs, filling the second encrypted byte paragraphs into the target positions, completing encryption of the target data, obtaining encrypted target data and uploading the encrypted target data.
When the target byte paragraph is extracted, the specified byte position is defined as the target position by positioning the specified byte position in each frame of monitoring audio and each frame of monitoring video in the target data. It can be understood that the audio-video frame is stored in the form of a binary character string after being encoded, and byte data at a specified byte position on the binary character string, namely a target byte paragraph, can be extracted by selecting the specified byte position on the binary character string. For example, when extracting byte data, the nth-M byte positions are found in byte order from the binary string of a frame of data, and byte data are extracted sequentially one by one, and the target byte paragraph is obtained by concatenation.
Optionally, the target positions of each frame of the surveillance audio and each frame of the surveillance video in the target data are one or more, and in a case that one frame of the surveillance audio and one frame of the surveillance video include a plurality of the target positions, the plurality of the target positions are distributed at set interval positions.
Specifically, if the target position included in each frame of the monitoring audio or the monitoring video is one, the byte data is acquired by referring to the byte data acquisition mode. If each frame of monitoring audio or monitoring video comprises a plurality of target positions, extracting byte data from each target position one by one according to the byte position sequence of the character strings in the data of one frame in the process of collecting the byte data. It should be noted that, by setting the target positions at intervals, the extracted byte data can be more dispersed and diversified, so that the target byte paragraphs are encrypted, the complexity of data encryption can be improved, and the difficulty of encrypted data decryption can be improved.
Further, in a case that one frame of the surveillance audio and one frame of the surveillance video include a plurality of the target positions, the sequentially extracting the target byte paragraphs from the target positions in each frame of the surveillance audio and each frame of the surveillance video in the target data includes:
and extracting byte data according to the arrangement position sequence of the target position in a frame of monitoring audio and a frame of monitoring video or a set byte extraction sequence to obtain byte sub-paragraphs, and sequentially connecting the byte sub-paragraphs in series to generate a target byte paragraph.
For the case that each frame of monitoring audio or monitoring video contains a plurality of target positions, byte data can be extracted according to the arrangement position sequence of each target position in the character string of one frame of data, and the byte data extracted from one target position is defined as a byte sub-paragraph. And connecting the extracted byte subsection paragraphs in series according to the extraction sequence to form the target byte paragraph.
In addition, the byte data extraction order such as extracting odd positions first and then extracting even positions can be set according to a set byte extraction order, and the byte sub-paragraphs can be extracted sequentially and connected in series to form the target byte paragraph.
The target byte paragraph is generated by setting different byte extraction sequences to extract the byte data, so that the extracted byte data are more dispersed and diversified, the byte encryption is performed, the complexity of data encryption can be improved, and the difficulty of cracking the encrypted data is improved.
Further, based on the target byte paragraphs acquired by the monitoring audios and the monitoring videos, a first encrypted byte paragraph is obtained by encrypting the target byte paragraphs with the key information of the automobile data recorder, and based on the first encrypted byte paragraph, matrix construction can be performed.
Referring to fig. 3, the first byte matrix construction process includes:
s1201, determining a set row number or a set column number of the first byte matrix according to a set matrix construction rule;
s1202, building the first byte matrix by combining each first encrypted byte paragraph based on the set row number or the set column number, and filling a blank portion of the first byte matrix with the set byte paragraphs.
When the first byte matrix is constructed, the number of rows or the number of columns is set according to the matrix set by the set matrix construction rule, and the target byte paragraphs are arranged line by line according to the timestamp sequence of the monitoring audio and the monitoring video to construct the first byte matrix. And, because there may be a case that the number of target byte paragraphs is limited and is not enough to construct a complete matrix, the matrix construction is completed by using the set byte paragraphs to fill up the elements of the first byte matrix.
For example, referring to fig. 4, assume that the target byte segments extracted in order are a1, a2, a3, b1, b2, b3, c1, and c2. If the set number of rows of the matrix configuration rule configuration matrix is set to be 3 rows, a complete matrix cannot be constructed according to the existing target byte paragraphs. At this time, the byte section c1 is set by padding, thereby completing the construction of the first byte matrix.
S130, converting the first byte matrix into a second byte matrix according to a set matrix conversion rule, splitting the second byte matrix based on the set matrix construction rule to obtain second encrypted byte paragraphs, sequentially filling the second encrypted byte paragraphs to the target position according to timestamps to obtain encrypted target data, and uploading the encrypted target data to a cloud background.
Then, for the constructed first byte matrix, the embodiment of the present application performs a transformation process of the first byte matrix using a set matrix transformation rule. The matrix conversion rule is set according to actual needs, and specifically, the matrix conversion rule may be set in such a manner that each row element in the matrix is exchanged for a position, the matrix is multiplied by another matrix, or the matrix is multiplied by a certain constant. The embodiment of the present application does not make fixed restrictions on specific matrix conversion rules, and is not described herein again.
Exemplarily, as shown in fig. 4, a matrix transformation of the first byte matrix is exemplarily described. Assuming that a target byte paragraph is "a1, a2, a3, b1, b2, b3, c1, c2, c3", splitting the target byte paragraph into three sections "a1, a2, a3", "b1, b2, b3" and "c1, c2, c3" according to a time stamp sequence, sequencing the sections according to the time stamp sequence to construct a first byte matrix, and then transforming a matrix transformation rule that elements in the first byte matrix are exchanged along a diagonal line to obtain a second byte matrix, thereby completing the transformation from the first byte matrix to the second byte matrix.
And correspondingly splitting byte paragraphs based on the second byte matrix according to the matrix construction rule to obtain second encrypted byte paragraphs of 'c, c2, c1, b3, b2, b1, a3, a2 and a 1'.
And based on the second encrypted byte paragraph, respectively filling the second encrypted byte paragraph into the target position of each frame of the surveillance video and the surveillance audio in the target data to complete the encryption of the target data, thereby obtaining the encrypted target data. Assuming that the target byte section is extracted at the target position of each frame of the monitoring audio and the monitoring video of the target data and lags behind the target byte section, the first encrypted byte section obtained after encryption is "a1, a2, a3, b1, b2, b3, c1, c2, c3", the second encrypted byte section "c3, c2, c1, b3, b2, b1, a3, a2, a1" can be obtained according to the matrix transformation method. And when the target data is encrypted, sequentially extracting a second encryption byte section 'c 3, c2, c1, b3, b2, b1, a3, a2, a 1' to fill in each target position, and so on, completing the encryption of the target data to obtain the encrypted target data. And uploading the encrypted target data to a cloud background for storage so as to finish the encrypted uploading of the driving monitoring data.
Therefore, byte paragraphs of each frame of monitoring audio and monitoring video in the target data are encrypted and modified through byte paragraph extraction encryption and matrix transformation filling, so that the cracking difficulty of the target data is improved, and the safety of transmission and storage of the driving monitoring data is improved.
It should be noted that, when processing the monitoring audio and the monitoring video of the target data, the monitoring audio and the monitoring video may separately perform byte extraction encryption and matrix transformation padding, or may perform byte extraction encryption and matrix transformation padding on all the data in the target data together. The specific processing manner in the embodiment of the present application is not limited to be fixed, and is not described herein again.
In one embodiment, one candidate matrix conversion rule may be further selected from a plurality of candidate matrix conversion rules as the set matrix conversion rule according to the data amount of the target data.
In order to further improve the difficulty of data cracking, the embodiment of the application also adaptively selects and sets the matrix conversion rule according to the data volume of the target data so as to perform byte matrix conversion. It is understood that, for target data with a small amount of data, the use of a more complicated matrix conversion rule may reduce data processing efficiency. For target data with large data volume, the safety of data processing is affected by using a simple matrix conversion rule. Based on this, in the embodiment of the present application, corresponding candidate matrix conversion rules are set according to different data volume intervals, and when the data volume of the target data reaches the corresponding data volume interval, the byte matrix conversion is performed by adapting to the candidate matrix conversion rule corresponding to the data volume interval, so that the data processing efficiency is ensured, and the security of data encryption is improved.
Then, based on the encrypted target data obtained by the above encryption, in the embodiment of the present application, a storage record of the encrypted target data is generated, and the set matrix conversion rule and the set matrix construction rule are written in the storage record. Based on the storage record, when the encrypted target data stored in the cloud background is inquired through the automobile data recorder, the encrypted target data is downloaded, and second encrypted byte paragraphs of target positions on each frame of data are extracted sequentially. And then constructing a second byte matrix based on a set matrix construction rule on the storage record, carrying out matrix reduction based on a set matrix conversion rule on the storage record to obtain a first byte matrix, and further splitting the first byte matrix based on the set matrix construction rule on the storage record to obtain a first encrypted byte paragraph. And decrypting the first encrypted byte paragraph by using the key information of the automobile data recorder to obtain a target byte paragraph, sequentially filling the target byte paragraph into the target position, so as to finish decryption of the encrypted target data, and restoring to obtain the target data.
The storage amount of the driving monitoring data is determined by detecting the storage space of the driving recorder, and the driving monitoring data comprises monitoring audio and monitoring video; under the condition that the storage capacity reaches a set threshold value, selecting driving monitoring data of a specified period from a storage space as target data; extracting target byte paragraphs from each frame of monitoring audio and each frame of monitoring video in the target data in sequence, encrypting each target byte paragraph by using key information of the automobile data recorder to obtain first encrypted byte paragraphs, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule; the first byte matrix is converted into a second byte matrix according to a set matrix conversion rule, the second byte matrix is split based on the set matrix construction rule to obtain second encrypted byte paragraphs, each second encrypted byte paragraph is sequentially filled to a target position according to the time stamps to obtain encrypted target data, and the encrypted target data are uploaded to a cloud background. By adopting the technical means, the driving monitoring data can be adaptively selected to be encrypted and uploaded, the cracking difficulty of the driving monitoring data is improved, the storage safety of the driving monitoring data is guaranteed, and the privacy information of a user is protected. Meanwhile, the driving monitoring data is prevented from occupying the storage space of the driving recorder, and the storage pressure of the driving recorder is relieved.
Example two:
on the basis of the foregoing embodiment, fig. 5 is a schematic structural diagram of a driving monitoring data processing device according to a second embodiment of the present application. Referring to fig. 5, the driving monitoring data processing apparatus provided in this embodiment specifically includes: a selecting module 21, an encrypting module 22 and an uploading module 23.
The selection module 21 is configured to detect a storage space of the automobile data recorder and determine a storage amount of driving monitoring data, where the driving monitoring data includes a monitoring audio and a monitoring video; under the condition that the storage amount reaches a set threshold value, selecting the driving monitoring data of a specified period from the storage space as target data;
the encryption module 22 is configured to extract target byte paragraphs from target positions in each frame of monitoring audio and each frame of monitoring video in the target data in sequence, encrypt each target byte paragraph using key information of the automobile data recorder to obtain a first encrypted byte paragraph, and construct a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule;
the uploading module 23 is configured to convert the first byte matrix into a second byte matrix according to a set matrix conversion rule, split the second byte matrix based on the set matrix construction rule to obtain second encrypted byte paragraphs, sequentially fill each of the second encrypted byte paragraphs to the target position according to timestamps to obtain encrypted target data, and upload the encrypted target data to the cloud background.
Further, before converting the first byte matrix into the second byte matrix according to a set matrix conversion rule, the method further includes:
and selecting one candidate matrix conversion rule from a plurality of candidate matrix conversion rules according to the data amount of the target data as the set matrix conversion rule.
Further, constructing a first byte matrix based on each of the first encrypted byte paragraphs and a set matrix construction rule, comprising:
determining a set row number or a set column number of the first byte matrix according to a set matrix construction rule;
and constructing the first byte matrix by combining each first encrypted byte paragraph based on the set row number or the set column number, and filling the vacant part of the first byte matrix by using the set byte paragraph.
Further, selecting the driving monitoring data of a specified period from the storage space as target data, including:
and selecting the driving monitoring data of the appointed time period from the storage space as target data according to the storage time sequence of the driving monitoring data and the set reporting time length.
Further, the target position of each frame of monitoring audio and each frame of monitoring video in the target data is one or more, and under the condition that one frame of monitoring audio and one frame of monitoring video comprises a plurality of target positions, the plurality of target positions are distributed at set interval positions.
Further, in a case that one frame of surveillance audio and one frame of surveillance video include a plurality of the target positions, the sequentially extracting target byte paragraphs from the target positions in each frame of surveillance audio and each frame of surveillance video in the target data includes:
and extracting byte data according to the arrangement position sequence of the target position in a frame of monitoring audio and a frame of monitoring video or a set byte extraction sequence to obtain byte sub-paragraphs, and sequentially connecting the byte sub-paragraphs in series to generate a target byte paragraph.
Further, after uploading the encrypted target data to a cloud background, the method further includes:
and generating a storage record of the encrypted target data, and writing the set matrix conversion rule and the set matrix construction rule into the storage record.
The storage amount of the driving monitoring data is determined by detecting the storage space of the driving recorder, and the driving monitoring data comprises monitoring audio and monitoring video; under the condition that the storage capacity reaches a set threshold value, selecting driving monitoring data of a specified period from a storage space as target data; sequentially extracting target byte paragraphs from each frame of monitoring audio and each frame of monitoring video in the target data, encrypting each target byte paragraph by using key information of a vehicle event data recorder to obtain a first encrypted byte paragraph, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule; the first byte matrix is converted into a second byte matrix according to a set matrix conversion rule, the second byte matrix is split based on the set matrix construction rule to obtain second encrypted byte paragraphs, each second encrypted byte paragraph is sequentially filled to a target position according to the time stamps to obtain encrypted target data, and the encrypted target data are uploaded to a cloud background. By adopting the technical means, the driving monitoring data can be adaptively selected to be encrypted and uploaded, the cracking difficulty of the driving monitoring data is improved, the storage safety of the driving monitoring data is guaranteed, and the privacy information of a user is protected. Meanwhile, the driving monitoring data is prevented from occupying the storage space of the driving recorder, and the storage pressure of the driving recorder is relieved.
The driving monitoring data processing device provided by the second embodiment of the present application can be used for executing the driving monitoring data processing method provided by the first embodiment, and has corresponding functions and beneficial effects.
Example three:
an embodiment of the present application provides an electronic device, and with reference to fig. 6, the electronic device includes: a processor 31, a memory 32, a communication module 33, an input device 34, and an output device 35. The number of processors in the electronic device may be one or more, and the number of memories in the electronic device may be one or more. The processor, memory, communication module, input device, and output device of the electronic device may be connected by a bus or other means.
The memory 32 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules (for example, a selection module, an encryption module, and an upload module in the driving monitoring data processing apparatus) corresponding to the driving monitoring data processing method according to any embodiment of the present application. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The communication module 33 is used for data transmission.
The processor 31 executes various functional applications and data processing of the device by running software programs, instructions and modules stored in the memory, so as to implement the driving monitoring data processing method.
The input device 34 may be used to receive entered numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 35 may include a display device such as a display screen.
The electronic device provided by the embodiment can be used for executing the driving monitoring data processing method provided by the embodiment, and has corresponding functions and beneficial effects.
Example four:
the embodiment of the application also provides a storage medium containing computer executable instructions, and the computer executable instructions are used for executing a driving monitoring data processing method when executed by a computer processor, and the driving monitoring data processing method comprises the following steps: detecting a storage space of a driving recorder, and determining the storage amount of driving monitoring data, wherein the driving monitoring data comprises monitoring audio and monitoring video; under the condition that the storage amount reaches a set threshold value, selecting running monitoring data of a specified period from the storage space as target data; sequentially extracting target byte paragraphs from each frame of monitoring audio and each frame of monitoring video in the target data, encrypting each target byte paragraph by using key information of the automobile data recorder to obtain first encrypted byte paragraphs, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule; converting the first byte matrix into a second byte matrix according to a set matrix conversion rule, splitting the second byte matrix based on the set matrix construction rule to obtain second encrypted byte paragraphs, sequentially filling the second encrypted byte paragraphs to the target position according to timestamps to obtain encrypted target data, and uploading the encrypted target data to a cloud background.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application and containing the computer-executable instructions is not limited to the driving monitoring data processing method described above, and may also perform related operations in the driving monitoring data processing method provided in any embodiment of the present application.
The driving monitoring data processing device, the storage medium, and the electronic device provided in the foregoing embodiments may execute the driving monitoring data processing method provided in any embodiment of the present application, and reference may be made to the driving monitoring data processing method provided in any embodiment of the present application without detailed technical details described in the foregoing embodiments.
The foregoing is considered as illustrative only of the preferred embodiments of the invention and the principles of the technology employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

Claims (10)

1. A driving monitoring data processing method is characterized by comprising the following steps:
detecting a storage space of a driving recorder, and determining the storage amount of driving monitoring data, wherein the driving monitoring data comprises monitoring audio and monitoring video;
under the condition that the storage amount reaches a set threshold value, selecting running monitoring data of a specified period from the storage space as target data;
sequentially extracting target byte paragraphs from each frame of monitoring audio and each frame of monitoring video in the target data, encrypting each target byte paragraph by using key information of the automobile data recorder to obtain first encrypted byte paragraphs, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule;
converting the first byte matrix into a second byte matrix according to a set matrix conversion rule, splitting the second byte matrix based on the set matrix construction rule to obtain second encrypted byte paragraphs, sequentially filling the second encrypted byte paragraphs to the target position according to timestamps to obtain encrypted target data, and uploading the encrypted target data to a cloud background.
2. The driving monitoring data processing method according to claim 1, further comprising, before converting the first byte matrix into the second byte matrix according to a set matrix conversion rule:
and selecting one candidate matrix conversion rule from a plurality of candidate matrix conversion rules according to the data amount of the target data as the set matrix conversion rule.
3. The driving monitoring data processing method according to claim 1, wherein the constructing of the first byte matrix based on each of the first encrypted byte paragraphs and the set matrix construction rules comprises:
determining a set row number or a set column number of the first byte matrix according to a set matrix construction rule;
and constructing the first byte matrix by combining each first encryption byte paragraph based on the set line number or the set column number, and filling the vacant part of the first byte matrix by using the set byte paragraph.
4. The driving monitoring data processing method according to claim 1, wherein selecting the driving monitoring data of a specified period from the storage space as target data comprises:
and selecting the driving monitoring data of the appointed time period from the storage space as target data according to the storage time sequence of the driving monitoring data and the set reporting time length.
5. The driving monitoring data processing method according to claim 1, wherein the target position of each frame of monitoring audio and each frame of monitoring video in the target data is one or more, and in a case that one frame of monitoring audio and one frame of monitoring video includes a plurality of target positions, the plurality of target positions are distributed at set intervals.
6. The driving monitoring data processing method according to claim 5, wherein in a case that one frame of monitoring audio and one frame of monitoring video includes a plurality of the target positions, the sequentially extracting target byte sections from the target positions in each frame of monitoring audio and each frame of monitoring video in the target data includes:
and extracting byte data according to the arrangement position sequence of the target position in a frame of monitoring audio and a frame of monitoring video or a set byte extraction sequence to obtain byte sub-paragraphs, and sequentially connecting the byte sub-paragraphs in series to generate a target byte paragraph.
7. The driving monitoring data processing method according to claim 1, further comprising, after uploading the encrypted target data to a cloud background:
and generating a storage record of the encrypted target data, and writing the set matrix conversion rule and the set matrix construction rule into the storage record.
8. A driving monitoring data processing device is characterized by comprising:
the system comprises a selection module, a storage module and a monitoring module, wherein the selection module is used for detecting a storage space of the automobile data recorder and determining the storage amount of automobile monitoring data, and the automobile monitoring data comprises monitoring audio and monitoring video; under the condition that the storage amount reaches a set threshold value, selecting the driving monitoring data of a specified period from the storage space as target data;
the encryption module is used for sequentially extracting target byte paragraphs from each frame of monitoring audio and each frame of monitoring video in the target data, encrypting each target byte paragraph by using key information of the automobile data recorder to obtain a first encrypted byte paragraph, and constructing a first byte matrix based on each first encrypted byte paragraph and a set matrix construction rule;
the uploading module is used for converting the first byte matrix into a second byte matrix according to a set matrix conversion rule, splitting the second byte matrix based on the set matrix construction rule to obtain second encrypted byte paragraphs, sequentially filling each second encrypted byte paragraph to the target position according to a timestamp to obtain encrypted target data, and uploading the encrypted target data to the cloud background.
9. An electronic device, comprising:
a memory and one or more processors;
the memory to store one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the driving monitoring data processing method according to any one of claims 1-7.
10. A storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a driving monitoring data processing method according to any of claims 1-7.
CN202211287061.1A 2022-10-20 2022-10-20 Driving monitoring data processing method, device, equipment and storage medium Active CN115361112B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211287061.1A CN115361112B (en) 2022-10-20 2022-10-20 Driving monitoring data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211287061.1A CN115361112B (en) 2022-10-20 2022-10-20 Driving monitoring data processing method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115361112A CN115361112A (en) 2022-11-18
CN115361112B true CN115361112B (en) 2023-01-10

Family

ID=84008495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211287061.1A Active CN115361112B (en) 2022-10-20 2022-10-20 Driving monitoring data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115361112B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115879104B (en) * 2023-02-14 2023-05-30 北京圣芯诺科技有限公司 Data processing system for monitoring data security and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357391A (en) * 2016-10-28 2017-01-25 上海大学 Safety information scattering and encrypting algorithm
CN112153045A (en) * 2020-09-24 2020-12-29 中国人民解放军战略支援部队信息工程大学 Method and system for identifying encrypted field of private protocol
CN113282949A (en) * 2021-07-26 2021-08-20 中国电力科学研究院有限公司 Data encryption method, data decryption device and power data interaction system
CN114374845A (en) * 2021-12-21 2022-04-19 北京中科智易科技有限公司 Storage system and device for automatic compression encryption
CN114727106A (en) * 2022-06-08 2022-07-08 深圳市温暖生活科技有限公司 Signal processing and transmission method and system of electronic equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7343013B2 (en) * 2003-12-16 2008-03-11 Sony Corporation Composite session-based encryption of video on demand content
US20150163060A1 (en) * 2010-04-22 2015-06-11 Martin Tomlinson Methods, systems and apparatus for public key encryption using error correcting codes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357391A (en) * 2016-10-28 2017-01-25 上海大学 Safety information scattering and encrypting algorithm
CN112153045A (en) * 2020-09-24 2020-12-29 中国人民解放军战略支援部队信息工程大学 Method and system for identifying encrypted field of private protocol
CN113282949A (en) * 2021-07-26 2021-08-20 中国电力科学研究院有限公司 Data encryption method, data decryption device and power data interaction system
CN114374845A (en) * 2021-12-21 2022-04-19 北京中科智易科技有限公司 Storage system and device for automatic compression encryption
CN114727106A (en) * 2022-06-08 2022-07-08 深圳市温暖生活科技有限公司 Signal processing and transmission method and system of electronic equipment

Also Published As

Publication number Publication date
CN115361112A (en) 2022-11-18

Similar Documents

Publication Publication Date Title
AU2019202398B2 (en) Systems And Methods For Bulk Redaction Of Recorded Data
CN115361112B (en) Driving monitoring data processing method, device, equipment and storage medium
US10409491B2 (en) Method of data analysis and extraction for embedded security devices
CN102291256B (en) A kind of querying method of monitor data and equipment
CN105323656A (en) Imaging apparatus and method of providing imaging information
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN108370449A (en) Segmenting video content stores
CN115459965A (en) Multistep attack detection method for network security of power system
CN103780877A (en) Massive video data storage and retrieval method based on h264 coding
CN103763496A (en) Method and device for prerecording video
CN104301671A (en) Traffic monitoring video storing method in HDFS based on event intensity
CN1940889B (en) Method and apparatus for management of access history, and information processing apparatus
CN106412513A (en) Video processing system and processing method
CN103761194B (en) A kind of EMS memory management process and device
US11012696B2 (en) Reducing an amount of storage used to store surveillance videos
CN115378980B (en) Directional storage method and device for driving monitoring data
CN115361239B (en) Driving storage data uploading method, device, equipment and storage medium
CN103402079A (en) VW (Video Wall)-based intelligent tracking, storing and displaying method for abnormal events
CN115114667A (en) Privacy information processing and classifying method and device for security chip
WO2021218626A1 (en) Data storage method and apparatus, device, and storage medium
Shahriar et al. CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level
CN111158606B (en) Storage method, storage device, computer equipment and storage medium
CN114268468A (en) Network traffic processing system, method, apparatus, computer device, and storage medium
CN115225869B (en) Directional processing method and device for monitoring data
CN115242548B (en) Private data directional encryption method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant