CN115866602A - Information security protection method, system, control device, medium and vehicle - Google Patents

Information security protection method, system, control device, medium and vehicle Download PDF

Info

Publication number
CN115866602A
CN115866602A CN202211414484.5A CN202211414484A CN115866602A CN 115866602 A CN115866602 A CN 115866602A CN 202211414484 A CN202211414484 A CN 202211414484A CN 115866602 A CN115866602 A CN 115866602A
Authority
CN
China
Prior art keywords
priority level
task
mode
scene mode
security protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211414484.5A
Other languages
Chinese (zh)
Inventor
赵豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weilai Software Technology Shanghai Co ltd
Original Assignee
Weilai Software Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weilai Software Technology Shanghai Co ltd filed Critical Weilai Software Technology Shanghai Co ltd
Priority to CN202211414484.5A priority Critical patent/CN115866602A/en
Publication of CN115866602A publication Critical patent/CN115866602A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of information security, in particular to an information security protection method, a system, a control device, a medium and a vehicle, and aims to solve the problem that the computing power requirement of information security protection conflicts with the computing power requirement of other functions of the vehicle. For the purpose, the method and the device can respectively determine the calculation resource allocation condition of the intelligent cabin and the priority level of the current safety protection task according to the current running functional scene mode of the intelligent cabin, and start the safety protection task of the intelligent cabin based on the priority level of the safety protection task and the calculation resource allocation condition. The safety protection task can be started in a targeted manner according to the functional scene mode, the effectiveness of information safety protection of the intelligent cabin is ensured, and meanwhile, the balance of computing resources between other functions of the intelligent cabin and the safety protection task can be effectively ensured.

Description

Information safety protection method, system, control device, medium and vehicle
Technical Field
The invention relates to the technical field of information security, and particularly provides an information security protection method, an information security protection system, a control device, a medium and a vehicle.
Background
Along with the development of intelligent networking automobiles, the intelligent level of the automobiles is also more and more powerful. Under the background of continuous development of intellectualization, the configured information safety protection level also needs to be synchronously followed.
For most information security measures, if a good enough information security effect needs to be achieved, a large amount of calculation power is needed. A typical example is deep analysis of suspected malicious codes, which often requires a lot of time and effort, but the overall vehicle effort is limited and needs to be allocated to functions such as driving assistance, intelligent cabin entertainment systems, 3D navigation rendering, and the like. Thus, there may be situations where the computing power requirements of some information security efforts conflict with the computing power requirements of other functions of the vehicle. For this situation, there is no relevant solution in the industry at present.
Accordingly, there is a need in the art for a new information security solution that addresses the above-mentioned problems.
Disclosure of Invention
In order to overcome the above-mentioned drawbacks, the present invention has been developed to provide a solution or at least a partial solution to the problem of the computing power requirements of information security and other functions of the vehicle being in conflict.
In a first aspect, the present invention provides an information security protection method, including:
acquiring a current running functional scene mode of the intelligent cabin;
acquiring the calculation resource allocation condition of the intelligent cabin according to the functional scene mode;
determining the priority level of the current safety protection task of the intelligent cabin according to the functional scene mode;
and starting a safety protection task based on the priority level and the calculation resource allocation condition so as to realize information safety protection aiming at the functional scene mode.
In one technical solution of the above information security protection method, the functional scene mode includes an auxiliary driving mode, a cabin entertainment mode, and an ecological coordination mode, and the step of determining the priority level of the current security protection task of the smart cabin according to the functional scene mode includes:
when the functional scene mode is the auxiliary driving mode, determining that an auxiliary driving attack analysis task aiming at the attack analysis of the auxiliary driving algorithm is a safety protection task with the highest priority;
when the functional scene mode is a cockpit entertainment mode, determining that a multimedia deep security scanning task aiming at malicious code attack of a multimedia file is a security protection task with the highest priority;
and when the function scene mode is the ecological coordination mode, determining the ecological equipment protection task aiming at the ecological equipment attack as the safety protection task with the highest priority level.
In one technical solution of the above information security protection method, the ecological device protection task includes radio security protection and/or device data privacy security protection.
In one technical solution of the above information security protection method, "obtaining the computational power resource allocation condition of the intelligent cockpit according to the functional scene mode" includes:
determining the functional calculation resources of the intelligent cabin occupied by the functional scene mode according to the functional scene mode;
and acquiring a safety computing power resource applied to realizing the information safety protection according to the total computing power resource and the function computing power resource of the intelligent cabin.
In one embodiment of the above information security protection method, "starting a security protection task based on the priority level and the power resource allocation condition" includes:
and preferentially distributing the computing resources to the security protection task with the highest priority level according to the priority level and the security computing resources so as to ensure the effective starting of the security protection task with the highest priority level.
In one embodiment of the above information security protection method, "starting a security protection task based on the priority level and the power resource allocation condition" further includes:
and selectively starting the safety protection task with the priority level lower than the highest priority level based on the residual computing resources in the safety computing resources and the priority level after computing resources are allocated for the safety protection task with the highest priority level.
In one technical solution of the above information security protection method, the method further includes:
and when the functional scene mode is switched, suspending the currently started safety protection task, and recovering the computing resources of the intelligent cabin to ensure the starting of the function of the switched functional scene mode and the corresponding safety protection task.
In a second aspect, the present invention provides an information security system, the system comprising:
the intelligent cabin control system comprises a function scene mode acquisition module, a function scene mode acquisition module and a control module, wherein the function scene mode acquisition module is configured to acquire a function scene mode currently operated by the intelligent cabin;
an computing power resource allocation condition acquisition module configured to acquire a computing power resource allocation condition of the intelligent cockpit according to the functional scene mode
A protection task priority level determination module configured to determine a priority level of a current safety protection task of the intelligent cabin according to the functional scene mode;
an information security protection module configured to initiate a security protection task based on the priority level and the computing resource allocation condition to implement information security protection for the functional scenario mode.
In a third aspect, a control device is provided, which includes a processor and a storage device, wherein the storage device is adapted to store a plurality of program codes, and the program codes are adapted to be loaded and run by the processor to execute the information security method according to any one of the above-mentioned technical solutions of the information security method.
In a fourth aspect, a computer-readable storage medium is provided, in which a plurality of program codes are stored, and the program codes are adapted to be loaded and executed by a processor to execute the information security protection method according to any one of the above-mentioned technical solutions of the information security protection method.
In a fifth aspect, a vehicle is provided, where the vehicle includes an intelligent cabin and the information safety protection system described in the above technical solution of information safety protection system or the control device described in the above technical solution of control device.
One or more of the above technical solutions of the present invention include at least one or more of the following
Has the advantages that:
in the technical scheme of implementing the invention, the invention can respectively determine the calculation resource allocation condition of the intelligent cabin and the priority level of the current safety protection task according to the current running functional scene mode of the intelligent cabin, and start the safety protection task of the intelligent cabin based on the priority level of the safety protection task and the calculation resource allocation condition. Through the configuration mode, the priority level of the safety protection task can be determined based on the functional scene mode, the safety protection task is started according to the calculation resource allocation condition, the safety protection task can be started in a targeted mode according to the functional scene mode, the effectiveness of information safety protection of the intelligent cabin is ensured, and meanwhile, the balance of calculation resources between other functions of the intelligent cabin and the safety protection task can be effectively ensured.
The scheme 1 is an information security protection method, which is characterized by comprising the following steps:
acquiring a current running functional scene mode of the intelligent cabin;
acquiring the calculation resource allocation condition of the intelligent cabin according to the functional scene mode;
determining the priority level of the current safety protection task of the intelligent cabin according to the functional scene mode;
and starting a safety protection task based on the priority level and the calculation resource allocation condition so as to realize information safety protection aiming at the functional scene mode.
The information safety protection method according to the scheme 1, wherein the functional scene modes include an auxiliary driving mode, a cabin entertainment mode and an ecological coordination mode, and the step of determining the priority level of the current safety protection task of the intelligent cabin according to the functional scene modes comprises the following steps:
when the functional scene mode is the auxiliary driving mode, determining that an auxiliary driving attack analysis task aiming at the attack analysis of the auxiliary driving algorithm is a safety protection task with the highest priority;
when the functional scene mode is a cockpit entertainment mode, determining that a multimedia deep security scanning task aiming at malicious code attack of a multimedia file is a security protection task with the highest priority;
and when the function scene mode is the ecological coordination mode, determining the ecological equipment protection task aiming at the ecological equipment attack as the safety protection task with the highest priority level.
Scheme 3. The information security protection method according to scheme 2, wherein the ecological device protection task includes radio security protection and/or device data privacy security protection.
Scheme 4. The information security protection method according to scheme 1, wherein the step of obtaining the computational power resource allocation condition of the intelligent cockpit according to the functional scene mode includes:
determining the functional calculation resources of the intelligent cabin occupied by the functional scene mode according to the functional scene mode;
and acquiring a safety computing power resource applied to realizing the information safety protection according to the total computing power resource and the function computing power resource of the intelligent cabin.
Scheme 5. The information security protection method according to scheme 4, wherein the step of "starting a security protection task based on the priority level and the computing power resource allocation condition" comprises:
and preferentially distributing the computing resources to the security protection task with the highest priority level according to the priority level and the security computing resources so as to ensure the effective starting of the security protection task with the highest priority level.
Scheme 6. The information security protection method according to scheme 5, wherein the step of "starting a security protection task based on the priority level and the computing power resource allocation condition" further comprises:
and after computing power resources are distributed for the safety protection task with the highest priority level, selectively starting the safety protection task with the priority level lower than the highest priority level based on the computing power resources left in the safety computing power resources and the priority level.
Scheme 7. The information security protection method according to any one of schemes 1 to 6, characterized in that the method further comprises:
when the functional scene mode is switched, the currently started safety protection task is suspended, and the computing resources of the intelligent cabin are recovered to ensure the starting of the function of the switched functional scene mode and the corresponding safety protection task.
The information security protection system of scheme 8, characterized in that, the system includes:
the intelligent cockpit display control device comprises a functional scene mode acquisition module, a display module and a control module, wherein the functional scene mode acquisition module is configured to acquire a functional scene mode currently operated by the intelligent cockpit;
the calculation resource allocation condition acquisition module is configured to acquire the calculation resource allocation condition of the intelligent cabin according to the functional scene mode;
a protection task priority level determination module configured to determine a priority level of a current safety protection task of the intelligent cabin according to the functional scene mode;
an information security protection module configured to initiate a security protection task based on the priority level and the computing resource allocation condition to implement information security protection for the functional scenario mode.
Scheme 9. A control device comprising a processor and a storage device, said storage device being adapted to store a plurality of program codes, characterized in that said program codes are adapted to be loaded and run by said processor to perform the information security method of any of the schemes 1 to 7.
Scheme 10. A computer readable storage medium having a plurality of program codes stored therein, wherein the program codes are adapted to be loaded and executed by a processor to perform the information security method of any of the schemes 1 to 7.
The vehicle of claim 11, wherein the vehicle comprises a smart cabin and the information safety system of claim 8 or the control device of claim 9.
Drawings
The disclosure of the present invention will become more readily understood with reference to the accompanying drawings. As is readily understood by those skilled in the art: these drawings are for illustrative purposes only and are not intended to constitute a limitation on the scope of the present invention. Wherein:
FIG. 1 is a flow chart illustrating the main steps of an information security protection method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a main implementation architecture of an information security protection method according to an embodiment of the present invention;
fig. 3 is a main block diagram of an information security system according to an embodiment of the present invention.
Detailed Description
Some embodiments of the invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are only for explaining the technical principle of the present invention, and are not intended to limit the scope of the present invention.
In the description of the present invention, a "module" or "processor" may include hardware, software, or a combination of both. A module may comprise hardware circuitry, various suitable sensors, communication ports, memory, may comprise software components such as program code, or may be a combination of software and hardware. The processor may be a central processing unit, a microprocessor, a digital signal processor, or any other suitable processor. The processor has data and/or signal processing functionality. The processor may be implemented in software, hardware, or a combination thereof. Non-transitory computer readable storage media include any suitable medium that can store program code, such as magnetic disks, hard disks, optical disks, flash memory, read-only memory, random-access memory, and the like. The term "a and/or B" denotes all possible combinations of a and B, such as a alone, B alone or a and B. The term "at least one A or B" or "at least one of A and B" means similar to "A and/or B" and may include only A, only B, or both A and B. The singular forms "a", "an" and "the" may include plural forms as well.
Referring to fig. 1, fig. 1 is a flow chart illustrating main steps of an information security protection method according to an embodiment of the present invention. As shown in fig. 1, the information security protection method in the embodiment of the present invention mainly includes the following steps S101 to S104.
Step S101: and acquiring a current running functional scene mode of the intelligent cabin.
In this embodiment, a current operating functional scene mode of the intelligent cabin may be obtained. The functional scene mode is a scene mode representing different working states of the vehicle.
The intelligent cabin is a complex which integrates intelligent and networking technologies, software and hardware, can perform intelligent perception and intelligent decision on cabin space through continuous learning and iteration, and can comprise a cabin operating system, a cabin entertainment function module and the like. One or more mobile terminal devices in communication connection with the intelligent cabin can be arranged in the intelligent cabin, such as intelligent AR glasses, intelligent rings, intelligent robots, intelligent wearable devices and the like. The mobile terminal devices form an ecological device domain of the intelligent cabin, each mobile terminal device can independently realize certain functions, the size is small, and the mobile terminal device is not fixed in the intelligent cabin and can move. The mobile terminal devices can establish communication connection with the intelligent cabin in an authentication mode.
In one embodiment, the functional scene modes may include an assisted driving mode, a manual driving mode, a cabin entertainment mode, an ecological coordination mode, and the like. The driving assistance mode is a mode in which the vehicle needs to realize a function of assisting driving of the vehicle depending on the calculation power provided by the driving assistance information. In the assistant driving mode, the main safety risk faced by the intelligent cabin is the potential risk of safety attack against the assistant driving algorithm. The manual driving mode refers to a mode in which the vehicle is manually driven by the driver. The cabin entertainment mode refers to a mode in which an intelligent cabin supports entertainment activities (such as multimedia decoding, game rendering, and the like) using the power of a cabin chip. In the cabin entertainment mode, the main security risks faced by the intelligent cabin are malicious code attacks against decoding and rendering programs, and the like. The ecological collaborative mode refers to a mode in which multiple mobile terminal devices (such as AR glasses, smart bracelets and the like) in the smart cabin work collaboratively. In the ecological cooperation mode, the main security risks faced by the intelligent cockpit are risks of equipment data privacy abuse or stealing and risks of attack on a wireless communication protocol of the mobile terminal equipment.
Step S102: and acquiring the calculation resource distribution condition of the intelligent cabin according to the functional scene mode.
In this embodiment, the calculation power resource allocation condition of the intelligent cabin can be obtained according to the functional scene mode.
In one embodiment, the computing resources may include driving assistance computing power and vehicle-mounted computing power, and these two computing powers may be allocated collectively.
In one embodiment, the computing power resource allocation situation may include a functional computing power resource required for implementing the functional scene mode and a security computing power resource required for implementing the information security protection.
Step S103: and determining the priority level of the current safety protection task of the intelligent cabin according to the functional scene mode.
In this embodiment, it may be determined which one or more security protection tasks need to be preferentially started at present according to the functional scenario mode.
In one embodiment, the priority level of the current safety protection task of the intelligent cabin can be determined according to the main safety risk faced by the current functional scene mode. For example, the security protection task corresponding to the main security risk is set as the security protection task with the highest priority level.
Step S104: and starting a safety protection task based on the priority level and the calculation resource allocation condition so as to realize information safety protection aiming at the functional scene mode.
In the embodiment, the safety protection task of the intelligent cabin can be started according to the force distribution condition and the priority level.
In one embodiment, the security task with the highest priority level may be started first, and then it is determined whether the security task with the lower priority level may be started based on the size of the security computing resource.
In one embodiment, the security tasks may include real-time analysis and identification of attacks, fast scanning of malicious code in programs, deep scanning of malicious code in programs, security analysis of intelligent hardware programs in ecodevices, and the like.
Based on the above steps S101 to S104, the embodiment of the present invention can respectively determine the calculation resource allocation condition of the intelligent cabin and the priority level of the current security protection task according to the current operating functional scene mode of the intelligent cabin, and start the security protection task of the intelligent cabin based on the priority level of the security protection task and the calculation resource allocation condition. Through the configuration mode, the embodiment of the invention can determine the priority level of the safety protection task based on the functional scene mode, start the safety protection task according to the calculation resource allocation condition, pertinently start the safety protection task according to the functional scene mode, ensure the effectiveness of information safety protection of the intelligent cabin, and simultaneously effectively ensure the balance of calculation resources between other functions of the intelligent cabin and the safety protection task.
Step S102 to step S104 will be further described below.
In one implementation of the embodiment of the present invention, step S102 may further include the following steps S1021 and S1022:
step S1021: and determining the functional calculation power resource of the intelligent cabin occupied by the functional scene mode according to the functional scene mode.
Step S1022: and according to the total computing power resource and the functional computing power resource of the intelligent cabin, obtaining a safety computing power resource applied to realizing information safety protection.
In this embodiment, the functional computing power resource occupied by the current functional scene mode may be determined according to the functional scene mode, and if the total computing power resource of the intelligent cabin is M and the functional computing power resource occupied by the current functional scene mode is N, the safety computing power resource S = M-N applied to implementing information safety protection may be determined.
In one implementation of the embodiment of the present invention, step S103 may further include the following steps S1031 to S1033:
step S1031: and when the functional scene mode is the auxiliary driving mode, determining that the auxiliary driving attack analysis task aiming at the attack analysis of the auxiliary driving algorithm is the safety protection task with the highest priority.
Step S1032: and when the functional scene mode is a cockpit entertainment mode, determining that the multimedia deep security scanning task aiming at the malicious code attack of the multimedia file is a security protection task with the highest priority.
Step S1033: and when the function scene mode is the ecological coordination mode, determining the ecological equipment protection task aiming at the ecological equipment attack as the safety protection task with the highest priority level.
In this embodiment, the security protection task with the highest priority level may be set for different function scenario modes, respectively.
In one embodiment, the priority levels of different security protection tasks may be set in sequence according to each functional scene mode.
In one embodiment, the ecological device protection tasks may include radio security protection and device data privacy security protection. In the ecological cooperation mode, the demand of other functions of the intelligent cabin on computing power is not high, so that the security computing power resource which can be applied to security protection is rich. The radio security protection refers to a protection task for sniffing and stealing attacks on radio signals, interruption attacks on radio signals, denial of service attacks on radio signals, and the like.
In one implementation manner of the embodiment of the present invention, the step S104 may further include the following step S1041:
step S1041: and preferentially distributing the computing power resource for the safety protection task with the highest priority level according to the priority level and the safety computing power resource so as to ensure the effective starting of the safety protection task with the highest priority level.
In this embodiment, the security protection task with the highest priority level in the current functional scene mode may be started first to cope with the current main security risk. If in the auxiliary driving mode, preferentially starting an auxiliary driving attack analysis task aiming at the attack analysis of the auxiliary driving algorithm; preferentially starting a multimedia deep security scanning task aiming at malicious code attack of a multimedia file in a cockpit entertainment mode; and preferentially starting the ecological equipment protection task aiming at the attack of the ecological equipment in the ecological cooperation mode.
In one embodiment, only the security protection task with the highest priority level may be started in the corresponding function scenario mode, so as to ensure effective implementation of the security protection task with the highest priority level. For example, in the assistant driving mode, since the safety calculation resources are limited, only the assistant driving attack analysis task aiming at the attack analysis of the assistant driving algorithm can be started.
In one embodiment, the step S104 may further include the following step S1042 in addition to the step S1041:
step S1042: and after the computing power resource is distributed for the safety protection task with the highest priority level, starting the safety protection task with the priority level lower than the highest priority level based on the computing power resource and the priority level remained in the safety computing power resource.
In this embodiment, after allocating the computational power resource to the security protection task with the highest priority level, the security protection task with a lower priority level may be started based on the remaining computational power resource. For example, in the ecological cooperation mode, because the security computing resources are rich, after the protection task of the ecological device for the attack of the ecological device is started, other security protection tasks with lower priority levels can be started, such as the program deep security scanning work which is backlogged before and needs a large amount of computing power, and the like.
In one implementation of the embodiment of the present invention, in addition to the above steps S101 to S104, the present invention may further include the following step S105:
step S105: when the function scene mode is switched, the currently started safety protection task is suspended, and the calculation resources of the intelligent cabin are recovered to ensure the starting of the function of the switched function scene mode and the corresponding safety protection task.
In this embodiment, if the intelligent cabin has a function scene mode switched, the current security protection task may be suspended, the computing resources are recycled, and the function implementation of the switched function scene mode and the starting of the corresponding security protection task are preferentially ensured. If the intelligent cabin is switched to the assistant driving mode, the computing power resource can be recovered, so that the operation computing power requirement of the assistant driving mode is guaranteed preferentially, and the start of the assistant driving attack analysis task is guaranteed.
In an implementation manner, referring to fig. 2, fig. 2 is a schematic diagram of a main implementation architecture of an information security protection method according to an implementation manner of the embodiment of the present invention. As shown in fig. 2, the functional scene modes of the intelligent cabin can be distinguished by the cabin functional scene module, specifically including an auxiliary driving mode, a cabin entertainment mode, a manual driving mode, and an ecological coordination mode. The comprehensive planning of the calculation power of the auxiliary driving chip and the calculation power of the vehicle chip of the intelligent cabin can be realized through the intelligent cabin resource module. The intelligent scheduling platform comprises a mode identification unit, a resource pool management unit, a rule center unit and a task scheduling unit. The mode identification unit identifies a current functional scene mode; the resource pool management unit manages computing resources consisting of computing power of an auxiliary driving chip and computing power of an intelligent cabin vehicle-mounted machine chip; the rule central unit stores the rule of task scheduling; and the task scheduling unit formulates a task scheduling scheme according to the functional scene mode and the calculation resource condition and sends the task scheduling scheme to the intelligent cabin safety center. The intelligent cockpit safety center comprises an intelligent safety task scheduling unit and a safety work item unit; the intelligent safety task scheduling unit comprises a scene identification subunit, a resource gear identification subunit and a work item scheduling subunit; the intelligent safety task scheduling unit formulates task scheduling and specific work items (safety protection tasks) based on the scene recognition result and the resource gear recognition result; the safety work item unit comprises an attack identification analysis subunit, a program fast scanning subunit, a program deep scanning subunit and an ecological hardware (equipment) analysis subunit; the safety work item unit mainly manages specific safety protection tasks of safety protection.
It should be noted that, although the foregoing embodiments describe each step in a specific sequence, those skilled in the art will understand that, in order to achieve the effect of the present invention, different steps do not necessarily need to be executed in such a sequence, and they may be executed simultaneously (in parallel) or in other sequences, and these changes are all within the protection scope of the present invention.
Furthermore, the invention also provides an information safety protection system.
Referring to fig. 3, fig. 3 is a main structural block diagram of an information security system according to an embodiment of the present invention. As shown in fig. 3, the information security protection system in the embodiment of the present invention mainly includes a function scene mode obtaining module, a calculation resource allocation condition obtaining module, a protection task priority level determining module, and an information security protection module. In this embodiment, the function scene mode acquiring module may be configured to acquire a function scene mode currently operated by the intelligent cabin. The calculation resource allocation condition acquisition module can be configured to acquire the calculation resource allocation condition of the intelligent cockpit according to the functional scene mode. The protection task priority level determination module can be configured to determine the priority level of the current safety protection task of the intelligent cabin according to the function scene mode. The information security protection module can be configured to start a security protection task based on the priority level and the computing resource allocation condition so as to realize information security protection aiming at the functional scene mode.
The technical principles, the solved technical problems, and the generated technical effects of the information security protection system described above are similar for executing the embodiment of the information security protection method shown in fig. 1, and it can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working process and related descriptions of the information security protection system may refer to the contents described in the embodiment of the information security protection method, and are not described herein again.
It will be understood by those skilled in the art that all or part of the flow of the method according to the above-described embodiment may be implemented by a computer program, which may be stored in a computer-readable storage medium and used to implement the steps of the above-described embodiments of the method when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable storage medium may include: any entity or device capable of carrying said computer program code, media, usb disk, removable hard disk, magnetic diskette, optical disk, computer memory, read-only memory, random access memory, electrical carrier wave signals, telecommunication signals, software distribution media, etc. It should be noted that the computer readable storage medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable storage media that does not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
Furthermore, the invention also provides a control device. In an embodiment of the control device according to the present invention, the control device comprises a processor and a storage device, the storage device may be configured to store a program for executing the information security protection method of the above-mentioned method embodiment, and the processor may be configured to execute the program in the storage device, the program including but not limited to the program for executing the information security protection method of the above-mentioned method embodiment. For convenience of explanation, only the parts related to the embodiments of the present invention are shown, and details of the specific techniques are not disclosed. The control device may be a control device apparatus formed including various electronic apparatuses.
Further, the invention also provides a computer readable storage medium. In one computer-readable storage medium embodiment according to the present invention, a computer-readable storage medium may be configured to store a program for executing the information security protection method of the above-described method embodiment, and the program may be loaded and executed by a processor to implement the above-described information security protection method. For convenience of explanation, only the parts related to the embodiments of the present invention are shown, and details of the specific techniques are not disclosed. The computer readable storage medium may be a storage device formed by including various electronic devices, and optionally, the computer readable storage medium is a non-transitory computer readable storage medium in the embodiment of the present invention.
Further, the invention also provides a vehicle. In one embodiment of a vehicle according to the present invention, the vehicle may include a smart cabin and an information security system of the above-described embodiment of an information security system. In another vehicle embodiment according to the invention, the vehicle may comprise a smart cabin and the control device of the control device embodiment described above.
Further, it should be understood that, since the configuration of each module is only for explaining the functional units of the apparatus of the present invention, the corresponding physical devices of the modules may be the processor itself, or a part of software, a part of hardware, or a part of a combination of software and hardware in the processor. Thus, the number of individual modules in the figures is merely illustrative.
Those skilled in the art will appreciate that the various modules in the apparatus may be adaptively split or combined. Such splitting or combining of specific modules does not cause the technical solutions to deviate from the principle of the present invention, and therefore, the technical solutions after splitting or combining will fall within the protection scope of the present invention.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.

Claims (10)

1. An information security protection method, characterized in that the method comprises:
acquiring a current running functional scene mode of the intelligent cabin;
acquiring the calculation resource allocation condition of the intelligent cabin according to the functional scene mode;
determining the priority level of the current safety protection task of the intelligent cabin according to the functional scene mode;
and starting a safety protection task based on the priority level and the calculation resource allocation condition so as to realize information safety protection aiming at the functional scene mode.
2. The information safety protection method according to claim 1, wherein the functional scene modes comprise an auxiliary driving mode, a cabin entertainment mode and an ecological coordination mode, and the step of determining the priority level of the current safety protection task of the intelligent cabin according to the functional scene modes comprises the following steps:
when the functional scene mode is the auxiliary driving mode, determining that an auxiliary driving attack analysis task aiming at the attack analysis of the auxiliary driving algorithm is a safety protection task with the highest priority;
when the functional scene mode is a cockpit entertainment mode, determining that a multimedia deep security scanning task aiming at malicious code attack of a multimedia file is a security protection task with the highest priority;
and when the function scene mode is the ecological coordination mode, determining the ecological equipment protection task aiming at the ecological equipment attack as the safety protection task with the highest priority level.
3. The information security protection method according to claim 2, wherein the ecological device protection task comprises radio security protection and/or device data privacy security protection.
4. The information security protection method according to claim 1, wherein the step of obtaining the power resource allocation condition of the intelligent cabin according to the functional scenario mode comprises:
determining the functional calculation resources of the intelligent cabin occupied by the functional scene mode according to the functional scene mode;
and acquiring a safety computing power resource applied to realizing the information safety protection according to the total computing power resource and the function computing power resource of the intelligent cabin.
5. The information security protection method according to claim 4, wherein the step of initiating a security protection task based on the priority level and the power resource allocation condition comprises:
and preferentially distributing the computing resources to the security protection task with the highest priority level according to the priority level and the security computing resources so as to ensure the effective starting of the security protection task with the highest priority level.
6. The information security protection method according to claim 5, wherein the step of initiating a security protection task based on the priority level and the computing resource allocation further comprises:
and selectively starting the safety protection task with the priority level lower than the highest priority level based on the residual computing resources in the safety computing resources and the priority level after computing resources are allocated for the safety protection task with the highest priority level.
7. The information security method according to any one of claims 1 to 6, wherein the method further comprises:
and when the functional scene mode is switched, suspending the currently started safety protection task, and recovering the computing resources of the intelligent cabin to ensure the starting of the function of the switched functional scene mode and the corresponding safety protection task.
8. An information security system, the system comprising:
the intelligent cabin control system comprises a function scene mode acquisition module, a function scene mode acquisition module and a control module, wherein the function scene mode acquisition module is configured to acquire a function scene mode currently operated by the intelligent cabin;
the calculation resource allocation condition acquisition module is configured to acquire the calculation resource allocation condition of the intelligent cabin according to the functional scene mode;
a protection task priority level determination module configured to determine a priority level of a current safety protection task of the intelligent cabin according to the functional scene mode;
an information security protection module configured to initiate a security protection task based on the priority level and the computing resource allocation condition to implement information security protection for the functional scenario mode.
9. A control device comprising a processor and a storage device adapted to store a plurality of program codes, wherein said program codes are adapted to be loaded and run by said processor to perform the information security method of any one of claims 1 to 7.
10. A computer readable storage medium having stored therein a plurality of program codes, wherein said program codes are adapted to be loaded and executed by a processor to perform the method of information security protection according to any one of claims 1 to 7.
CN202211414484.5A 2022-11-11 2022-11-11 Information security protection method, system, control device, medium and vehicle Pending CN115866602A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211414484.5A CN115866602A (en) 2022-11-11 2022-11-11 Information security protection method, system, control device, medium and vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211414484.5A CN115866602A (en) 2022-11-11 2022-11-11 Information security protection method, system, control device, medium and vehicle

Publications (1)

Publication Number Publication Date
CN115866602A true CN115866602A (en) 2023-03-28

Family

ID=85663249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211414484.5A Pending CN115866602A (en) 2022-11-11 2022-11-11 Information security protection method, system, control device, medium and vehicle

Country Status (1)

Country Link
CN (1) CN115866602A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117055818A (en) * 2023-08-25 2023-11-14 南京合宜信息技术有限公司 Client information storage management method and system based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117055818A (en) * 2023-08-25 2023-11-14 南京合宜信息技术有限公司 Client information storage management method and system based on block chain
CN117055818B (en) * 2023-08-25 2024-05-10 南京合宜信息技术有限公司 Client information storage management method and system based on block chain

Similar Documents

Publication Publication Date Title
CN108255589A (en) Method for scheduling task and server
CN115866602A (en) Information security protection method, system, control device, medium and vehicle
CN106341269A (en) Control method and device of vehicle-mounted system
WO2024099326A1 (en) Security privacy management and control method and apparatus, and device, medium and vehicle
CN103701653A (en) Processing method for interface hot plugging and unplugging configuration data and network configuration server
CN109361693B (en) Virtual device communication method and device
CN117149665B (en) Continuous integration method, control device, continuous integration system, and storage medium
CN112463266A (en) Execution policy generation method and device, electronic equipment and storage medium
CN104715188B (en) A kind of application implementation method and device based on binding terminal
CN110417799A (en) The management method of public key certificate, device, equipment and storage medium in vehicle device
CN114675822A (en) AUTOSAR software component development method, device, equipment and storage medium
CN112671845B (en) Data processing method and device, electronic equipment, storage medium and cloud system
CN113114754A (en) Transplanting and docking method and device, electronic equipment and storage medium
CN104572036B (en) Event processing method and device
CN110475227B (en) Method, device and system for protecting information security of Internet of vehicles and electronic equipment
CN107864127B (en) Application program identification method and device
Huq et al. Identifying Cybersecurity Focus Areas in Connected Cars Based on WP. 29 UN-R155 Attack Vectors and Beyond
CN115848289A (en) Safety protection enhancement method, system, device, medium and vehicle for intelligent cabin
CN117208018B (en) Vehicle control method, control device, readable storage medium, and vehicle
CN115758448A (en) Privacy protection enhancement method, system, device, medium and vehicle for intelligent cabin
CN109117324A (en) Endpoint detection methods, device, terminal and storage medium
CN103051528A (en) Method and device for rapidly distributing messages for bus
CN117580133B (en) Ad hoc network method, device, electronic equipment, storage medium and fire truck
CN107204934A (en) Automatic switchover method of flow, device, storage medium and electronic equipment
CN118612195A (en) Method for improving intelligent cabin system, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination