CN115600227A - Method, device and equipment for processing automobile sensitive information and storage medium - Google Patents

Method, device and equipment for processing automobile sensitive information and storage medium Download PDF

Info

Publication number
CN115600227A
CN115600227A CN202211282767.9A CN202211282767A CN115600227A CN 115600227 A CN115600227 A CN 115600227A CN 202211282767 A CN202211282767 A CN 202211282767A CN 115600227 A CN115600227 A CN 115600227A
Authority
CN
China
Prior art keywords
target information
information
target
sensitive
sensitivity level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211282767.9A
Other languages
Chinese (zh)
Inventor
胡红星
鞠世超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Automotive Innovation Co Ltd
Original Assignee
China Automotive Innovation Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Automotive Innovation Co Ltd filed Critical China Automotive Innovation Co Ltd
Priority to CN202211282767.9A priority Critical patent/CN115600227A/en
Publication of CN115600227A publication Critical patent/CN115600227A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method, a device, equipment and a storage medium for processing automobile sensitive information, wherein the method comprises the following steps: receiving a reading request of first target information sent by a target application; reading the access authority level of the target application carried in the request; under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level corresponding to the first target information, responding to the reading request, and acquiring the first target information from the local storage device; and decrypting the first target information to obtain third target information, and sending the third target information to the target application. According to the method and the device, the access of the target information is processed according to the access authority level of the application and the sensitivity level of the target information, so that the leakage of sensitive data is effectively avoided.

Description

Method, device and equipment for processing automobile sensitive information and storage medium
Technical Field
The present application relates to the field of automobile information processing, and in particular, to a method, an apparatus, a device, and a storage medium for processing automobile sensitive information.
Background
With the rapid development of intelligent automobiles, the importance of automobile data security is increasing day by day.
During normal driving of the intelligent automobile, the automobile generates a large amount of data. These data may include personal information of the vehicle user and ECU (Electronic Control Unit) information. There are different ways of handling this information depending on the security level. For example, voiceprint information is not allowed to be uploaded, while address book information can be uploaded, but desensitization processing is required. In addition to the personal information of the user, the information generated by the ECU also belongs to the category of data security. For sensitive data stored in the car, the application rights to access it should be restricted. However, in the prior art, there are few systems for detecting sensitive information that are applied in the automotive field, and there is a lack of management of storage and access to data.
Disclosure of Invention
In order to solve at least one technical problem, the present application provides a method, an apparatus, a device and a storage medium for processing sensitive information of an automobile.
According to one aspect of the application, an automobile sensitive information processing method is disclosed, and the method comprises the following steps:
receiving a reading request of first target information sent by a target application; the read request carries the access authority level of the target application; the first target information is stored in a local storage device, the first target information is obtained by encrypting third target information, the third target information is obtained by identifying sensitive information of second target information, and the second target information is marked with a sensitive grade under the condition that a sensitive information identification result represents that sensitive data exists in the second target information; the second target information comprises information generated by an in-vehicle electronic control unit assembly; the in-vehicle electronic control unit comprises the target application;
under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level corresponding to the first target information, responding to the reading request, and acquiring the first target information from the local storage device; the sensitivity level corresponding to the first target information is the sensitivity level marked by the second target information;
and decrypting the first target information to obtain third target information, and sending the third target information to the target application.
In some possible embodiments, the obtaining the first target information from the local storage device in response to the read request when it is determined that the access permission level of the target application is greater than or equal to the sensitivity level corresponding to the first target information includes:
sorting the first sub information in a descending order according to the sensitivity level of each piece of the first sub information to obtain a first sub information sequence;
and under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level of first sub information in the first sub information sequence, acquiring the first target information from the local storage device in response to the reading request.
In some possible embodiments, the obtaining, in response to the read request, the first target information from the local storage device includes obtaining, by the local storage device, a sensitivity level corresponding to the first target information, where the sensitivity level data range includes a first sensitivity level data endpoint and a second sensitivity level data endpoint, and the sensitivity level of the first sensitivity level data endpoint is smaller than that of the second sensitivity level data endpoint, and the obtaining, in response to the read request, the first target information includes:
and in the case that the access permission level of the target application is determined to be greater than or equal to the sensitivity level of the second sensitivity level data endpoint, acquiring the first target information from the local storage device in response to the reading request.
In some possible embodiments, the method further comprises:
and sending a reading refusing request to the target application based on the local storage equipment under the condition that the access permission level of the target application is determined to be smaller than the sensitivity level corresponding to the first target information.
In some possible embodiments, the method further comprises:
in response to the uploading request of the first target information, under the condition that the sensitivity level corresponding to the first target information is determined to be smaller than or equal to a preset sensitivity level threshold, decrypting the first target information to obtain third target information; desensitizing the third target information, and uploading the desensitized third target information to a vehicle external device;
and refusing to upload the first target information to the vehicle external equipment under the condition that the sensitivity level corresponding to the first target information is determined to be greater than the preset sensitivity level threshold.
In some possible embodiments, the method further comprises:
performing sensitive information identification processing on the second target information to obtain a sensitive information identification result corresponding to the second target information;
under the condition that the sensitive data exist in the second target information represented by the sensitive information identification result, marking the sensitivity level of the second target information to obtain third target information marked by the sensitivity level;
encrypting the third target information marked by the sensitivity level to obtain the first target information;
and storing the first target information into the local storage device.
In some possible embodiments, the performing sensitive information identification processing on the second target information to obtain a sensitive information identification result corresponding to the second target information includes:
classifying the second target information to obtain a data classification result;
acquiring an identification strategy corresponding to the data classification result;
and performing sensitive information identification processing on the second target information based on the identification strategy to obtain a sensitive information identification result corresponding to the second target information.
In some possible embodiments, the data classification result includes an image classification result and/or a text classification result, the identification policy is a classification network, and the obtaining of the identification policy corresponding to the data classification result includes:
acquiring sample data marked with a sensitive data label; the sample data comprises sample image data and/or sample text data; the sample data comprises data generated by an in-vehicle electronic control unit assembly;
performing feature extraction on the sample data to obtain a feature extraction result of the sample data;
inputting the feature extraction result into a preset network to predict sensitive data to obtain a sensitive data prediction result;
calculating loss data between the sensitive data prediction result and the sensitive data label through a preset loss function;
and adjusting the network parameters of the preset network based on the loss data until the preset training is met and the adjustment is finished, so as to obtain the classification network.
In some possible embodiments, the performing feature extraction on the sample data to obtain a feature extraction result of the sample data includes:
under the condition that the capacity of the sample data is smaller than or equal to a preset capacity threshold value, acquiring a two-dimensional matrix of the sample data, connecting rows of the two-dimensional matrix with the rows end to obtain a formed multidimensional matrix, and determining the multidimensional matrix to obtain a feature extraction result of the sample data;
under the condition that the capacity of the sample data is larger than the preset capacity threshold value, performing feature extraction on the sample data by adopting a preset feature extraction algorithm to obtain a feature extraction result of the sample data; the preset feature extraction algorithm comprises at least one feature extraction algorithm of scale-invariant feature conversion, accelerated robust features and directional gradient histograms.
In some possible embodiments, the performing, based on the identification policy, sensitive information identification processing on the second target information to obtain the sensitive information identification result corresponding to the second target information includes:
and inputting the second target information into the classification network for sensitive information identification processing to obtain a sensitive information identification result corresponding to the second target information.
According to another aspect of the application, a vehicle sensitive information processing device is also disclosed, the device comprising:
the reading request receiving module is used for receiving a reading request of first target information sent by a target application; the read request carries the access authority level of the target application; the first target information is stored in a local storage device, the first target information is obtained by encrypting third target information, the third target information is obtained by identifying sensitive information of second target information, and the second target information is marked with a sensitive grade under the condition that a sensitive information identification result represents that sensitive data exists in the second target information; the second target information comprises information generated by an in-vehicle electronic control unit component; the in-vehicle electronic control unit comprises the target application;
a read request response module, configured to, in response to the read request, obtain the first target information from the local storage device when it is determined that the access permission level of the target application is greater than or equal to a sensitivity level corresponding to the first target information; the sensitivity level corresponding to the first target information is the sensitivity level marked by the second target information;
and the target information sending module is used for decrypting the first target information to obtain the third target information and sending the third target information to the target application.
According to another aspect of the present application, there is also disclosed an electronic device comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the automobile sensitive information processing method.
According to another aspect of the present application, a computer-readable storage medium is also disclosed, wherein at least one instruction, at least one program, a code set, or a set of instructions is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by a processor to implement the automobile sensitive information processing method.
Due to the technical scheme, the method has the following beneficial effects:
the application cannot be directly accessed when accessing the sensitive information, the permission level of the application needs to be compared with the sensitivity level of the sensitive information, and the application can only access the sensitive information when the permission level of the application is greater than or equal to the sensitivity level of the sensitive information, so that the leakage of the sensitive information in the field of automobiles is effectively avoided, and the sensitive information is prevented from being obtained by illegal application.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a schematic flow chart of a method for processing sensitive information of an automobile according to an embodiment of the present application;
FIG. 2 is a first schematic flow chart of another method for processing sensitive information of a vehicle according to an embodiment of the present application;
FIG. 3 is a second schematic flowchart of another method for processing sensitive information of an automobile according to an embodiment of the present application;
FIG. 4 is a schematic flow chart illustrating storage of sensitive information according to an embodiment of the present disclosure;
FIG. 5 is a schematic flow chart illustrating sensitive information identification provided by an embodiment of the present application;
FIG. 6 is a block diagram of a sensitive information processing apparatus of an automobile according to an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of a sensitive information processing apparatus of an automobile according to an embodiment of the present application;
FIG. 8 is a first schematic diagram of another vehicle sensitive information processing apparatus provided in the embodiments of the present application;
fig. 9 is a schematic diagram for storing sensitive information according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be implemented in sequences other than those illustrated or described herein. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" herein is merely an association relationship describing an associated object, and means that there may be three relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of a, B, C, and may mean including any one or more elements selected from the group consisting of a, B, and C.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present application. It will be understood by those skilled in the art that the present application may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present application.
FIG. 1 is a schematic flow chart of a method for processing sensitive information of an automobile according to an embodiment of the present application; as shown in fig. 1, the method includes:
step S101: receiving a reading request of first target information sent by a target application; reading the access authority level of the target application carried in the request; the first target information is stored in a local storage device, the first target information is obtained by encrypting third target information, the third target information is obtained by performing sensitive information identification processing on the second target information, and the second target information is marked with a sensitive grade under the condition that a sensitive information identification result represents that sensitive data exists in the second target information; the second target information comprises information generated by the in-vehicle electronic control unit assembly; the in-vehicle electronic control unit includes a target application.
In the embodiment of the application, the second target information may be information generated by an in-vehicle electronic control unit component in the normal running process of the automobile, the information includes user information and other sensitive information, and an access permission level is set for the target application in order to prevent dangerous behaviors that the user information or other sensitive information is leaked; and carrying out sensitive identification on the second target information and marking the sensitive grade to obtain third target information, carrying out encryption processing on the third target information due to the existence of sensitive data to obtain first target information, and storing the first target information to local storage equipment. Therefore, when the target application sends a read request for the target information, the read request carries the access permission level of the target application.
Step S102: under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level corresponding to the first target information, responding to the reading request, and acquiring the first target information from the local storage device; the sensitivity level corresponding to the first target information is the sensitivity level marked by the second target information.
In the embodiment of the application, when the access authority level of the target information is greater than or equal to the sensitivity level of the first target information, the first target information is acquired from the local storage device in response to the reading request.
Step S103: and decrypting the first target information to obtain third target information, and sending the third target information to the target application.
In the embodiment of the application, the first target information which is encrypted and marked with the sensitivity level needs to be decrypted to obtain third target information which is marked with the sensitivity level, and the third target information is sent to the target application.
In an optional embodiment, the first target information includes a plurality of first sub information, the second target information includes a plurality of second sub information, each of the first sub information corresponds to each of the second sub information one to one, each of the second sub information is marked with a corresponding sensitivity level, the sensitivity level of each of the first sub information is the sensitivity level marked by the second sub information, and in a case that it is determined that the access permission level of the target application is greater than or equal to the sensitivity level corresponding to the first target information, the first target information is obtained from the local storage device in response to the read request, including:
sorting the first sub-information in a descending order according to the sensitivity level of each first sub-information to obtain a first sub-information sequence;
and under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level of the first ordered sub information in the first sub information sequence, responding to the reading request, and acquiring the first target information from the local storage device.
In this embodiment of the application, the second target information includes a plurality of second sub information, and the sensitivity levels of each second sub information mark are different through the sensitive information identification, so that the sensitivity levels of the first sub information are different, and the first sub information is sorted in a descending order according to the sensitivity level of each first sub information to obtain a first sub information sequence, at this time, the first sub information at the top of the sorting order is the first sub information with the largest sensitivity level in the first information sequence, and when it is determined that the access permission level of the target application is greater than or equal to the first sub information at the top of the sorting order, the first target information is acquired from the local storage device in response to the read request.
Specifically, the first sub-information may be further sorted in an ascending order according to the sensitivity level of each first sub-information to obtain a first sub-information sequence, where the last-ranked first sub-information is the sub-information with the largest sensitivity level in the first information sequence, and when it is determined that the access permission level of the target application is greater than or equal to the last-ranked first sub-information, the first target information is obtained from the local storage device in response to the read request.
In an optional embodiment, the sensitivity level corresponding to the first target information includes a sensitivity level data range, the sensitivity level data range includes a first sensitivity level data endpoint and a second sensitivity level data endpoint, the sensitivity level of the first sensitivity level data endpoint is less than that of the second sensitivity level data endpoint, and in a case that it is determined that the access permission level of the target application is greater than or equal to the sensitivity level corresponding to the first target information, the first target information is obtained from the local storage device in response to the read request, including:
and under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level of the second sensitivity level data endpoint, responding to the reading request, and acquiring the first target information from the local storage device.
Fig. 2 is a schematic flowchart of another method for processing sensitive information of an automobile according to an embodiment of the present application, where as shown in fig. 2, the method includes:
step S201: receiving a reading request of first target information sent by a target application; reading the access authority level of the target application carried in the request; the first target information is stored in the local storage device, the first target information is obtained by encrypting third target information, the third target information is obtained by identifying sensitive information of the second target information, and the second target information is marked with a sensitive grade under the condition that a sensitive information identification result represents that sensitive data exists in the second target information; the second target information includes information generated by the in-vehicle electronic control unit assembly; the in-vehicle electronic control unit includes a target application.
Step S202: and under the condition that the access permission level of the target application is smaller than the sensitivity level corresponding to the first target information, sending a reading refusing request to the target application based on the local storage equipment.
In the embodiment of the application, the access permission level of the target application is smaller than the sensitivity level corresponding to the first target information, the target application does not have permission to access the target information, and the read refusal request is sent to the target application based on the local storage device.
Fig. 3 is a schematic flowchart of a second method for processing sensitive information of an automobile according to an embodiment of the present application, where as shown in fig. 3, the method includes:
step S301: receiving a reading request of first target information sent by a target application; reading the access authority level of the target application carried in the request; the first target information is stored in a local storage device, the first target information is obtained by encrypting third target information, the third target information is obtained by performing sensitive information identification processing on the second target information, and the second target information is marked with a sensitive grade under the condition that a sensitive information identification result represents that sensitive data exists in the second target information; the second target information includes information generated by the in-vehicle electronic control unit assembly; the in-vehicle electronic control unit includes a target application.
Step S302: under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level corresponding to the first target information, responding to the reading request, and acquiring the first target information from the local storage device; the sensitivity level corresponding to the first target information is the sensitivity level marked on the second target information.
Step S303: and decrypting the first target information to obtain third target information, and sending the third target information to the target application.
Step S304: in response to the uploading request of the first target information, under the condition that the sensitivity level corresponding to the first target information is determined to be smaller than or equal to a preset sensitivity level threshold value, decrypting the first target information to obtain third target information; desensitizing the third target information, and uploading the desensitized third target information to the vehicle external device.
In this embodiment of the present application, when the target information needs to be uploaded to the external device, in response to an upload request of the first target information, and when the sensitivity level of the first target information is less than or equal to a preset sensitivity level threshold, the first target information is allowed to be uploaded, so that decryption processing is performed on the first target information to obtain third target information, desensitization processing is performed on the third target information, and the third target information after desensitization processing is uploaded to the vehicle external device, thereby preventing leakage of sensitive data. Sensitive data contained in target information with the sensitivity level smaller than or equal to a preset sensitivity level threshold value are common, and the sensitive data can be uploaded to vehicle external equipment after desensitization processing.
In an optional embodiment, when it is determined that the sensitivity level corresponding to the first target information is greater than a preset sensitivity level threshold, the uploading of the first target information to the vehicle external device is refused.
In the embodiment of the application, the sensitive data contained in the target information with the sensitivity level greater than the preset sensitivity level threshold is important, the target information is not allowed to be uploaded to the external equipment of the vehicle, and desensitization processing is not required.
In the embodiment of the present application, the table 1 may be referred to for correspondence between the target information, the sensitivity level corresponding to the target information, and the target information processing method.
TABLE 1 correspondence between target information, sensitivity levels corresponding to the target information, and target information processing modes
Figure BDA0003898694760000101
In the embodiment of the application, the preset sensitivity level threshold is 6 levels, the sensitivity levels of the auxiliary travel data and the personal identity information are both smaller than the preset sensitivity level threshold, desensitization processing is performed on the auxiliary travel data and the personal identity information, and the desensitized auxiliary travel data and the desensitized personal identity information are uploaded to the external equipment of the vehicle. The personal biometric information sensitivity level is greater than a preset sensitivity level threshold, and the personal biometric information is not allowed to be uploaded to the vehicle external device. It should be understood that table 1 composed of the target information, the sensitivity level corresponding to the target information, and the correspondence relationship between the target information and the target information processing manner is only an exemplary illustration, and in other possible implementation schemes, other target information may also exist, and examples are not enumerated here.
Fig. 4 is a schematic flowchart of a process for storing sensitive information according to an embodiment of the present application, and as shown in fig. 4, the method includes:
step S401: and performing sensitive information identification processing on the second target information to obtain a sensitive information identification result corresponding to the second target information.
Step S402: and under the condition that the sensitive information identification result represents that the second target information has sensitive data, marking the second target information with the sensitivity level to obtain third target information marked with the sensitivity level.
In the embodiment of the present application, according to the sensitivity level of the sensitive data in the target information, the corresponding sensitivity level is marked on the target information, and the following table 2 may be referred to for the corresponding relationship between the target information and the sensitivity level.
Table 2 marks the corresponding sensitivity level of the target information according to the sensitivity level of the sensitive data in the target information, and the corresponding relation between the target information and the sensitivity level
Figure BDA0003898694760000102
Figure BDA0003898694760000111
In the embodiment of the invention, the trip auxiliary data is subjected to sensitive information identification processing, the obtained sensitive information identification result is trip management information with sensitive data, and the sensitive grade corresponding to the sensitive data is 3, so that the trip auxiliary data is marked, and the sensitive grade is 3. It is understood that the above table 2 of the corresponding relationship between the target information and the sensitivity level is only an exemplary illustration, and in other possible implementation schemes, other target information may be available, and examples are not enumerated here.
Step S403: and encrypting the third target information after the sensitivity level mark to obtain the first target information.
Step S404: and storing the first target information into the local storage device.
In the embodiment of the application, the automobile electronic control unit assembly generates a large amount of data, namely second target information, in the storage process, sensitive information identification processing needs to be carried out on the second target information, and if the second target information is ordinary information and sensitive data does not exist, the second target information is directly stored in local equipment. And under the condition that the sensitive information identification result represents that the second target information has sensitive data, marking the sensitivity level of the second target information to obtain third target information with the marked sensitivity level. And encrypting the third target information marked by the sensitivity level to obtain the first target information. And storing the first target information into the local storage device. It is understood that the first target information, the second target information, and the third target information are actually the same target information, and the second target information is data generated by the automotive electronic control assembly unit and is raw data without any processing; the third target information is the target information after the sensitive information identification processing is carried out on the second target information, and the sensitive information identification result represents that the second target information has sensitive data, and the second target information is marked with a sensitive grade; the first target information is the target information obtained by encrypting the third target information. The target information stored in the local storage device is marked with a sensitivity level and subjected to encryption processing.
Fig. 5 is a schematic flowchart of sensitive information identification provided in an embodiment of the present application, and as shown in fig. 5, the method includes:
step S501: and classifying the second target information to obtain a data classification result.
In the embodiment of the application, the second target information is classified according to the categories of the figure, the sound, the text and the number to obtain the corresponding data classification result. The graph information includes: face, license plate, geographic picture, etc.; the sound class information includes: call sounds, voice commands, ambient sounds, etc.; the text information includes: text content manually entered by a vehicle user, etc.; the number of types of information includes: car status information, navigation information, etc.
Step S502: and acquiring an identification strategy corresponding to the data classification result.
In the embodiment of the application, different categories correspond to different identification strategies. The second target information of the graph or the text can adopt a Support Vector Machine (SVM) algorithm or other Machine learning algorithms to judge whether the second target information is sensitive information; the sound-class second target information can adopt an HMM (Hidden Markov Model) algorithm or other machine learning algorithms to judge whether the sound-class second target information is sensitive data; the category of second target information can be judged whether the second target information is sensitive information by adopting a regular expression and other machine learning algorithms.
In an optional embodiment, the data classification result includes an image classification result and/or a text classification result, the identification policy is a classification network, and the obtaining of the identification policy corresponding to the data classification result includes:
acquiring sample data marked with a sensitive data label; the sample data comprises sample image data and/or sample text data; the sample data comprises data generated by the in-vehicle electronic control unit assembly;
in the embodiment of the application, the sample data has sensitive data, and the labeled sensitive data label is the real sensitive data of the sample data.
Performing feature extraction on the sample data to obtain a feature extraction result of the sample data;
in the embodiment of the application, the feature extraction is performed to convert the sample data into the digital features which can be used for machine learning, so that the sample data can be better understood by a computer, and the extracted and sorted effective features facilitate the prediction of sensitive data.
Inputting the feature extraction result into a preset network to predict sensitive data to obtain a sensitive data prediction result;
in the embodiment of the application, the preset network is a model to be trained for sensitive data prediction, and the sensitive data prediction result is obtained by inputting the feature extraction result into the preset network for sensitive data prediction.
Calculating loss data between the sensitive data prediction result and the sensitive data label through a preset loss function;
in the embodiment of the application, the preset loss function is an operation function for measuring the difference degree between the sensitive data prediction result of the model and the real sensitive data, the loss data specifically reflects the difference degree between the sensitive data prediction result of the model and the real sensitive data, and the smaller the loss data is, the closer the sensitive data prediction result of the model and the real sensitive data is, the more successful the model training is.
And adjusting the network parameters of the preset network based on the loss data until the preset training is met and the adjustment is finished, so as to obtain the classification network.
In the embodiment of the application, the network parameters of the preset network are adjusted based on the loss data, so that the accuracy of the prediction result of the model can hardly be influenced by the loss data, the prediction result of the model is more accurate until the preset training is met, and the adjustment is finished, thereby obtaining the classification network.
In the embodiment of the application, the training of the target information identification model is realized based on the algorithm to obtain the classification network, so that the application can identify the sensitive information of the target information through the classification network and judge whether the target information is the sensitive information.
In an optional embodiment, the performing feature extraction on the sample data to obtain a feature extraction result of the sample data includes:
under the condition that the capacity of the sample data is less than or equal to a preset capacity threshold value, acquiring a two-dimensional vector matrix of the sample data, connecting rows of the two-dimensional matrix with rows end to obtain a formed multi-dimensional vector matrix, and determining the multi-dimensional vector matrix to obtain a feature extraction result of the sample data;
under the condition that the capacity of the sample data is larger than a preset capacity threshold value, performing feature extraction on the sample data by adopting a preset feature extraction algorithm to obtain a feature extraction result of the sample data; the preset feature extraction algorithm comprises at least one feature extraction algorithm of scale-invariant feature conversion, accelerated robust features and directional gradient histograms.
Step S503: and performing sensitive information identification processing on the second target information based on the identification strategy to obtain a sensitive information identification result corresponding to the second target information.
In an optional embodiment, performing sensitive information identification processing on the second target information based on the identification policy to obtain a sensitive information identification result corresponding to the second target information includes:
and inputting the second target information into the classification network for sensitive information identification processing to obtain a sensitive information identification result corresponding to the second target information.
In the embodiment of the application, sensitive information identification processing is performed on the input second target information through the classification network, so that a sensitive information identification result corresponding to the second target information is obtained.
Fig. 6 is a block diagram of a structure of an automobile sensitive information processing apparatus provided in an embodiment of the present application, and as shown in fig. 6, the apparatus includes:
the reading request receiving module is used for receiving a reading request of first target information sent by a target application; reading the access authority level of the target application carried in the request; the first target information is stored in a local storage device, the first target information is obtained by encrypting third target information, the third target information is obtained by performing sensitive information identification processing on the second target information, and the second target information is marked with a sensitive grade under the condition that a sensitive information identification result represents that sensitive data exists in the second target information; the second target information comprises information generated by the in-vehicle electronic control unit assembly; the in-vehicle electronic control unit comprises a target application;
the reading request response module is used for responding to the reading request and acquiring the first target information from the local storage device under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level corresponding to the first target information; the sensitivity level corresponding to the first target information is the sensitivity level marked by the second target information;
the target information decryption module is used for decrypting the first target information to obtain third target information;
and the target information sending module is used for sending the third target information to the target application.
In an embodiment of the present invention, fig. 7 is a schematic diagram of an automobile sensitive information processing apparatus provided in an embodiment of the present application, and as shown in fig. 7, a read request receiving module receives a read request of first target information sent by a target application; the read request response module responds to the read request and acquires the first target information from the local storage device under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level corresponding to the first target information; the target information decryption module decrypts the first target information to obtain third target information; and the target information sending module sends the third target information to the target application.
In an optional embodiment, the apparatus further comprises:
the reading request response module is used for enabling the first target information to comprise a plurality of first sub information, enabling the second target information to comprise a plurality of second sub information, enabling each first sub information to correspond to each second sub information one by one, enabling each second sub information to be marked with a corresponding sensitivity level, enabling the sensitivity level of each first sub information to be the sensitivity level marked by each second sub information, and sequencing the first sub information in a descending order according to the sensitivity level of each first sub information to obtain a first sub information sequence; and under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level of the first sub information in the first sub information sequence, acquiring the first target information from the local storage device in response to the reading request.
In an optional embodiment, the apparatus further comprises:
the read request response module is used for acquiring the first target information from the local storage device in response to a read request under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level of the second sensitivity level data endpoint.
In an optional embodiment, the apparatus further comprises:
the read request response module is used for sending a read rejection request to the target application based on the local storage device under the condition that the access permission level of the target application is determined to be smaller than the sensitivity level corresponding to the first target information.
In an embodiment of the present application, fig. 8 is a schematic diagram of a first vehicle sensitive information processing apparatus provided in an embodiment of the present application, and as shown in fig. 8, a read request receiving module receives a read request of first target information sent by a target application; and the reading request response module sends a reading refusing request to the target application based on the local storage device under the condition that the access permission level of the target application is determined to be smaller than the sensitivity level corresponding to the first target information.
In an optional embodiment, the apparatus further comprises:
the target information uploading module is used for responding to an uploading request of the first target information, and decrypting the first target information to obtain third target information under the condition that the sensitivity level corresponding to the first target information is smaller than or equal to a preset sensitivity level threshold value; desensitizing the third target information, and uploading the desensitized third target information to the vehicle external equipment;
the target information uploading module is used for refusing to upload the first target information to the vehicle external equipment under the condition that the sensitivity level corresponding to the first target information is determined to be larger than a preset sensitivity level threshold value.
In an optional embodiment, the apparatus further comprises:
the target information identification module is used for carrying out sensitive information identification processing on the second target information to obtain a sensitive information identification result corresponding to the second target information;
the sensitive grade marking module is used for marking the sensitive grade of the second target information under the condition that the sensitive information identification result represents that sensitive data exists in the second target information to obtain third target information marked by the sensitive grade;
the target information encryption module is used for encrypting the third target information marked by the sensitivity level to obtain first target information;
and the target information storage module is used for storing the first target information into the local storage equipment.
In this embodiment of the present application, fig. 9 is a schematic diagram of storing sensitive information provided in this embodiment of the present application, and as shown in fig. 9, when the target information is stored, the target information identification module performs sensitive information identification processing on the second target information to obtain a sensitive information identification result corresponding to the second target information; the sensitive grade marking module marks the sensitive grade of the second target information to obtain third target information under the condition that the sensitive information identification result represents that sensitive data exists in the second target information; the target information encryption module encrypts the third target information to obtain first target information; the target information storage module stores the first target information into the local storage device.
In an optional embodiment, the object information identification module includes:
the target information classification unit is used for classifying the second target information to obtain a data classification result;
the identification strategy acquisition unit is used for acquiring an identification strategy corresponding to the data classification result;
and the target information identification unit is used for carrying out sensitive information identification processing on the second target information based on the identification strategy to obtain a sensitive information identification result corresponding to the second target information.
In an optional embodiment, the identification policy obtaining module includes:
the data acquisition unit is used for acquiring sample data marked with the sensitive data label; the sample data comprises sample image data and/or sample text data; the sample data comprises data generated by the in-vehicle electronic control unit assembly;
the characteristic extraction unit is used for extracting the characteristics of the sample data to obtain the characteristic extraction result of the sample data;
the loss data calculation unit is used for calculating loss data between the sensitive data prediction result and the sensitive data label through a preset loss function;
and the classification network training unit adjusts the network parameters of the preset network based on the loss data until the preset training is met and the adjustment is finished, so that the classification network is obtained.
In an optional embodiment, the object information identification module further includes:
the target information identification unit is used for inputting the second target information into the classification network to carry out sensitive information identification processing, and obtaining a sensitive information identification result corresponding to the second target information.
The embodiment of the application also provides electronic equipment, which comprises a processor and a memory, wherein at least one instruction, at least one program, a code set or an instruction set is stored in the memory, and the at least one instruction, the at least one program, the code set or the instruction set is loaded and executed by the processor to realize the automobile sensitive information processing method.
The embodiment of the application also provides a computer-readable storage medium, wherein at least one instruction, at least one program, code set or instruction set is stored in the storage medium, and the at least one instruction, the at least one program, the code set or the instruction set is loaded and executed by a processor to realize the automobile sensitive information processing method.
According to the embodiment provided by the application, the target information is subjected to sensitive information identification, the target information is subjected to sensitive grade marking, the target information is encrypted when being stored, and the target information and the corresponding sensitive grade are stored in the local storage device; when the target application accesses the target information, the access authority level of the target application is required to be greater than or equal to the sensitivity level of the target information; when the target information is uploaded, desensitization processing is carried out on the target information, so that illegal application acquisition is prevented, leakage of sensitive information is avoided, and the safety of user information is improved.
It should be noted that: the sequence of the embodiments of the present application is only for description, and does not represent the advantages or disadvantages of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the device and server embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to the partial description of the method embodiments for relevant points.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The present invention is not intended to be limited to the particular embodiments shown and described, but is to be accorded the widest scope consistent with the principles and novel features herein disclosed.

Claims (13)

1. An automobile sensitive information processing method is characterized by comprising the following steps:
receiving a reading request of first target information sent by a target application; the read request carries the access authority level of the target application; the first target information is stored in a local storage device, the first target information is obtained by encrypting third target information, the third target information is obtained by identifying sensitive information of second target information, and the second target information is marked with a sensitive grade under the condition that a sensitive information identification result represents that sensitive data exists in the second target information; the second target information comprises information generated by an in-vehicle electronic control unit assembly; the in-vehicle electronic control unit comprises the target application;
under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level corresponding to the first target information, responding to the reading request, and acquiring the first target information from the local storage device; the sensitivity level corresponding to the first target information is the sensitivity level marked by the second target information;
and decrypting the first target information to obtain third target information, and sending the third target information to the target application.
2. The automobile sensitive information processing method according to claim 1, wherein the first target information includes a plurality of first sub information, the second target information includes a plurality of second sub information, each of the first sub information corresponds to each of the second sub information in a one-to-one manner, each of the second sub information is marked with a corresponding sensitivity level, the sensitivity level of each of the first sub information is the sensitivity level marked by the second sub information, and in the case that it is determined that the access permission level of the target application is greater than or equal to the sensitivity level corresponding to the first target information, the obtaining of the first target information from the local storage device in response to the read request includes:
sorting the first sub information in a descending order according to the sensitivity level of each piece of the first sub information to obtain a first sub information sequence;
and under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level of first sub information in the first sub information sequence, acquiring the first target information from the local storage device in response to the reading request.
3. The automobile sensitive information processing method according to claim 1, wherein the sensitivity level corresponding to the first target information includes a sensitivity level data range, the sensitivity level data range includes a first sensitivity level data endpoint and a second sensitivity level data endpoint, the sensitivity level of the first sensitivity level data endpoint is smaller than the sensitivity level of the second sensitivity level data endpoint, and in the case that it is determined that the access permission level of the target application is greater than or equal to the sensitivity level corresponding to the first target information, in response to the read request, the obtaining of the first target information from the local storage device includes:
and under the condition that the access permission level of the target application is determined to be greater than or equal to the sensitivity level of the second sensitivity level data endpoint, responding to the reading request, and acquiring the first target information from the local storage device.
4. The method for processing the sensitive information of the automobile according to any one of claims 1 to 3, further comprising:
and sending a reading refusing request to the target application based on the local storage equipment under the condition that the access permission level of the target application is determined to be smaller than the sensitivity level corresponding to the first target information.
5. The method for processing the sensitive information of the automobile according to claim 1, further comprising:
in response to the uploading request of the first target information, under the condition that the sensitivity level corresponding to the first target information is determined to be smaller than or equal to a preset sensitivity level threshold, decrypting the first target information to obtain third target information; desensitizing the third target information, and uploading the desensitized third target information to a vehicle external device;
and refusing to upload the first target information to the vehicle external equipment under the condition that the sensitivity level corresponding to the first target information is determined to be larger than the preset sensitivity level threshold.
6. The method for processing the sensitive information of the automobile as claimed in claim 1, wherein the method further comprises:
performing sensitive information identification processing on the second target information to obtain a sensitive information identification result corresponding to the second target information;
under the condition that the sensitive information identification result represents that the sensitive data exists in the second target information, marking the sensitivity level of the second target information to obtain third target information marked by the sensitivity level;
encrypting the third target information marked by the sensitivity level to obtain the first target information;
and storing the first target information into the local storage device.
7. The method for processing the sensitive information of the automobile according to claim 6, wherein the performing the sensitive information identification processing on the second target information to obtain a sensitive information identification result corresponding to the second target information includes:
classifying the second target information to obtain a data classification result;
acquiring an identification strategy corresponding to the data classification result;
and performing sensitive information identification processing on the second target information based on the identification strategy to obtain a sensitive information identification result corresponding to the second target information.
8. The method for processing the sensitive information of the automobile according to claim 7, wherein the data classification result includes an image classification result and/or a text classification result, the identification policy is a classification network, and the obtaining the identification policy corresponding to the data classification result includes:
acquiring sample data marked with a sensitive data label; the sample data comprises sample image data and/or sample text data; the sample data comprises data generated by an in-vehicle electronic control unit assembly;
performing feature extraction on the sample data to obtain a feature extraction result of the sample data;
inputting the feature extraction result into a preset network to predict sensitive data to obtain a sensitive data prediction result;
calculating loss data between the sensitive data prediction result and the sensitive data label through a preset loss function;
and adjusting the network parameters of the preset network based on the loss data until the preset training is met and the adjustment is finished, so as to obtain the classification network.
9. The method for processing the sensitive information of the automobile according to claim 8, wherein the performing the feature extraction on the sample data to obtain a result of the feature extraction on the sample data comprises:
under the condition that the capacity of the sample data is smaller than or equal to a preset capacity threshold value, acquiring a two-dimensional matrix of the sample data, connecting rows of the two-dimensional matrix with rows from head to tail to form a multi-dimensional matrix, and determining the multi-dimensional matrix to obtain a feature extraction result of the sample data;
under the condition that the capacity of the sample data is larger than the preset capacity threshold value, performing feature extraction on the sample data by adopting a preset feature extraction algorithm to obtain a feature extraction result of the sample data; the preset feature extraction algorithm comprises at least one feature extraction algorithm of scale-invariant feature conversion, accelerated robust features and directional gradient histograms.
10. The method for processing the sensitive information of the automobile according to claim 7, wherein the performing the sensitive information identification processing on the second target information based on the identification policy to obtain a sensitive information identification result corresponding to the second target information includes:
and inputting the second target information into the classification network for sensitive information identification processing to obtain a sensitive information identification result corresponding to the second target information.
11. An automotive sensitive information processing apparatus, the apparatus comprising:
the reading request receiving module is used for receiving a reading request of first target information sent by a target application; the read request carries the access authority level of the target application; the first target information is stored in a local storage device, the first target information is obtained by encrypting third target information, the third target information is obtained by identifying sensitive information of second target information, and the second target information is marked with a sensitive grade under the condition that a sensitive information identification result represents that sensitive data exists in the second target information; the second target information comprises information generated by an in-vehicle electronic control unit assembly; the in-vehicle electronic control unit comprises the target application;
a read request response module, configured to, in response to the read request, obtain the first target information from the local storage device when it is determined that the access permission level of the target application is greater than or equal to the sensitivity level corresponding to the first target information; the sensitivity level corresponding to the first target information is the sensitivity level marked by the second target information;
the target information decryption module is used for decrypting the first target information to obtain the third target information;
and the target information sending module is used for sending the third target information to the target application.
12. An electronic device, comprising a processor and a memory, wherein at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the memory, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the method for processing sensitive information of an automobile according to any one of claims 1 to 10.
13. A computer readable storage medium, having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the method of processing sensitive information of a vehicle according to any one of claims 1 to 10.
CN202211282767.9A 2022-10-19 2022-10-19 Method, device and equipment for processing automobile sensitive information and storage medium Pending CN115600227A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211282767.9A CN115600227A (en) 2022-10-19 2022-10-19 Method, device and equipment for processing automobile sensitive information and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211282767.9A CN115600227A (en) 2022-10-19 2022-10-19 Method, device and equipment for processing automobile sensitive information and storage medium

Publications (1)

Publication Number Publication Date
CN115600227A true CN115600227A (en) 2023-01-13

Family

ID=84848811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211282767.9A Pending CN115600227A (en) 2022-10-19 2022-10-19 Method, device and equipment for processing automobile sensitive information and storage medium

Country Status (1)

Country Link
CN (1) CN115600227A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116467731A (en) * 2023-06-19 2023-07-21 北京好心情互联网医院有限公司 Sensitive information processing method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116467731A (en) * 2023-06-19 2023-07-21 北京好心情互联网医院有限公司 Sensitive information processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
JP5157318B2 (en) Document monitoring apparatus, document monitoring program, and document monitoring system
US7769696B2 (en) Information storing apparatus
US8055032B2 (en) Digital camera with fingerprint identification function
CN111400705A (en) Application program detection method, device and equipment
CN115600227A (en) Method, device and equipment for processing automobile sensitive information and storage medium
CN112487495B (en) Data processing method based on big data and cloud computing and big data server
US7668336B2 (en) Extracting embedded information from a document
CN106470192B (en) Identity verification method, device and system
CN114817933A (en) Method and device for evaluating robustness of business prediction model and computing equipment
EP4127984B1 (en) Neural network watermarking
CN115442153B (en) Data management method and system for supply chain
US20230133033A1 (en) System and method for processing a data subject rights request using biometric data matching
CN115455386A (en) Operation behavior identification method and device
CN114067401A (en) Target detection model training and identity verification method and device
CN112000676B (en) Vehicle information updating method, device, equipment and storage medium
CN107046522B (en) Security access control method and device
KR20090001442A (en) System and method for filtering media file
CN114707617B (en) Data processing system for acquiring pkg cluster
CN116756716B (en) Security verification method, system, equipment and storage medium based on big data
CN111428251B (en) Data processing method and device
CN111695159B (en) Data processing method, device and equipment
CN115935437A (en) Method and device for mandatory access of database
CN114005435A (en) Method, device, equipment, medium and program product for responding voice information
CN113961965A (en) Method and device for preventing model from being stolen based on privacy protection
CN117390641A (en) Processing method of database sensitive data, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination