CN117494168A - Sensitive data management method, device, vehicle and storage medium - Google Patents

Sensitive data management method, device, vehicle and storage medium Download PDF

Info

Publication number
CN117494168A
CN117494168A CN202311555091.0A CN202311555091A CN117494168A CN 117494168 A CN117494168 A CN 117494168A CN 202311555091 A CN202311555091 A CN 202311555091A CN 117494168 A CN117494168 A CN 117494168A
Authority
CN
China
Prior art keywords
data
encryption
login data
vehicle
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311555091.0A
Other languages
Chinese (zh)
Inventor
吕以捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chery Automobile Co Ltd
Wuhu Lion Automotive Technologies Co Ltd
Original Assignee
Chery Automobile Co Ltd
Wuhu Lion Automotive Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chery Automobile Co Ltd, Wuhu Lion Automotive Technologies Co Ltd filed Critical Chery Automobile Co Ltd
Priority to CN202311555091.0A priority Critical patent/CN117494168A/en
Publication of CN117494168A publication Critical patent/CN117494168A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The present application relates to the field of data security technologies, and in particular, to a method, an apparatus, a vehicle, and a storage medium for managing sensitive data, where the method includes: and receiving login data of a user, generating a corresponding encryption instruction according to a vehicle type corresponding to the login data to encrypt the login data when the login data meets a preset encryption condition, acquiring a current platform to be interacted, and interacting with the current platform to be interacted based on the encrypted login data. Therefore, the problems that encryption strategies of different vehicle types need to be independently operated and managed respectively in the interaction process of the Internet of vehicles, unified management of data is not facilitated, meanwhile, the safety of the data is reduced, data leakage, tampering and the like are easy to occur are solved, and the safety of the data is ensured by regularly deploying sensitive information of vehicles and/or users and calling a sensitive data unified management platform for management.

Description

Sensitive data management method, device, vehicle and storage medium
Technical Field
The present disclosure relates to the field of data security technologies, and in particular, to a method and apparatus for managing sensitive data, a vehicle, and a storage medium.
Background
Along with the rapid development of the internet of vehicles technology, confidentiality of sensitive data such as personal information is increasingly valued by users, so that the encryption technology becomes a key factor in the aspects of protecting data privacy of users, preventing data leakage, preventing network attack, ensuring data integrity and the like.
In the related art, when a large number of application programs are embedded into a vehicle-mounted information entertainment system, related personal sensitive data such as a frame number, a mobile phone number and the like are involved, and encryption strategies of different vehicle types are independently operated and managed in the interaction process.
However, when encryption strategies of different vehicle types are independently managed, the security of data is reduced, so that the problems of data leakage, tampering and the like are easily caused, and the problems need to be solved.
Disclosure of Invention
The application provides a method, a device, a vehicle and a storage medium for managing sensitive data, which are used for solving the problems that encryption strategies of different vehicle types need to be independently operated and managed respectively in the interaction process of the Internet of vehicles, so that unified management of the data is not facilitated, the safety of the data is reduced, and data leakage, tampering and the like are easy to cause.
An embodiment of a first aspect of the present application provides a method for managing sensitive data, including the following steps:
receiving login data of a user;
when the login data meets a preset encryption condition, generating a corresponding encryption instruction according to a vehicle type corresponding to the login data, and encrypting the login data through the encryption instruction; and
and acquiring a current platform to be interacted, and interacting with the current platform to be interacted based on the encrypted login data.
According to one embodiment of the present application, after receiving login data of the user, the method further includes:
judging whether the login data meets a preset encryption condition or not;
and when the sensitive data of the vehicle and/or the sensitive data of the user exist in the login data, judging that the login data meets the preset encryption condition.
According to one embodiment of the present application, the generating a corresponding encryption instruction according to a vehicle model corresponding to the login data, and encrypting the login data through the encryption instruction includes:
when sensitive data of a vehicle exist in the login data, generating a corresponding first encryption instruction according to a vehicle type corresponding to the login data, and encrypting the sensitive data of the vehicle through the first encryption instruction;
when the sensitive data of the user exist in the login data, a corresponding second encryption instruction is generated according to the vehicle type corresponding to the login data, and the sensitive data of the user are encrypted through the second encryption instruction.
According to an embodiment of the present application, the method for managing sensitive data further includes:
judging whether an encryption modification instruction of the user is received or not;
when the encryption modification instruction of the user is received, the first encryption instruction and the second encryption instruction are modified so as to encrypt the sensitive data of the vehicle according to the modified first encryption instruction, and the sensitive data of the user is encrypted according to the modified second encryption instruction.
According to one embodiment of the application, the sensitive data includes at least one of an identification number of the user, a mobile phone number, and a frame number of the vehicle.
According to the sensitive data management method, login data of a user are received, when the login data meet preset encryption conditions, corresponding encryption instructions are generated according to vehicle types corresponding to the login data to encrypt the login data, then a current platform to be interacted is obtained, and interaction is conducted with the current platform to be interacted based on the encrypted login data. Therefore, the problems that encryption strategies of different vehicle types need to be independently operated and managed respectively in the interaction process of the Internet of vehicles, unified management of data is not facilitated, meanwhile, the safety of the data is reduced, data leakage, tampering and the like are easy to occur are solved, and the safety of the data is ensured by regularly deploying sensitive information of vehicles and/or users and calling a sensitive data unified management platform for management.
An embodiment of a second aspect of the present application provides a device for managing sensitive data, including:
the receiving module is used for receiving login data of a user;
the generation module is used for generating a corresponding encryption instruction according to a vehicle type corresponding to the login data when the login data meets a preset encryption condition, and encrypting the login data through the encryption instruction; and
and the interaction module is used for acquiring the current platform to be interacted and interacting with the current platform to be interacted based on the encrypted login data.
According to an embodiment of the present application, after receiving the login data of the user, the receiving module is further configured to:
judging whether the login data meets a preset encryption condition or not;
and when the sensitive data of the vehicle and/or the sensitive data of the user exist in the login data, judging that the login data meets the preset encryption condition.
According to one embodiment of the present application, the generating module is specifically configured to:
when sensitive data of a vehicle exist in the login data, generating a corresponding first encryption instruction according to a vehicle type corresponding to the login data, and encrypting the sensitive data of the vehicle through the first encryption instruction;
when the sensitive data of the user exist in the login data, a corresponding second encryption instruction is generated according to the vehicle type corresponding to the login data, and the sensitive data of the user are encrypted through the second encryption instruction.
According to an embodiment of the present application, the above-mentioned sensitive data management device is further configured to:
judging whether an encryption modification instruction of the user is received or not;
when the encryption modification instruction of the user is received, the first encryption instruction and the second encryption instruction are modified so as to encrypt the sensitive data of the vehicle according to the modified first encryption instruction, and the sensitive data of the user is encrypted according to the modified second encryption instruction.
According to one embodiment of the application, the sensitive data includes at least one of an identification number of the user, a mobile phone number, and a frame number of the vehicle.
According to the sensitive data management device, by receiving login data of a user, when the login data meets preset encryption conditions, a corresponding encryption instruction is generated according to a vehicle type corresponding to the login data to encrypt the login data, then a current platform to be interacted is obtained, and interaction is carried out with the current platform to be interacted based on the encrypted login data. Therefore, the problems that encryption strategies of different vehicle types need to be independently operated and managed respectively in the interaction process of the Internet of vehicles, unified management of data is not facilitated, meanwhile, the safety of the data is reduced, data leakage, tampering and the like are easy to occur are solved, and the safety of the data is ensured by regularly deploying sensitive information of vehicles and/or users and calling a sensitive data unified management platform for management.
An embodiment of a third aspect of the present application provides a vehicle, including: the system comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the program to realize the sensitive data management method according to the embodiment.
An embodiment of a fourth aspect of the present application provides a computer-readable storage medium storing computer instructions for causing the computer to perform the method for managing sensitive data according to the above embodiment.
Additional aspects and advantages of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flow chart of a method for managing sensitive data according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a vehicle call external API (Application Programming Interface ) gateway according to one embodiment of the present application;
FIG. 3 is a schematic diagram of a sensitive data platform configuration according to one embodiment of the present application;
FIG. 4 is a schematic diagram of sensitive data interactions according to one embodiment of the present application;
FIG. 5 is an example diagram of a management device for sensitive data according to an embodiment of the present application;
fig. 6 is a schematic structural view of a vehicle according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary and intended for the purpose of explaining the present application and are not to be construed as limiting the present application.
The following describes a method, an apparatus, a vehicle, and a storage medium for managing sensitive data according to embodiments of the present application with reference to the accompanying drawings. Aiming at the problems that in the internet of vehicles interaction process mentioned in the background art, encryption strategies of different vehicle types need to be independently operated and managed, so that unified management of data is not facilitated, meanwhile, the safety of the data is reduced, and data leakage and tampering are easy to cause, the application provides a sensitive data management method. Therefore, the problems that encryption strategies of different vehicle types need to be independently operated and managed respectively in the interaction process of the Internet of vehicles, unified management of data is not facilitated, meanwhile, the safety of the data is reduced, data leakage, tampering and the like are easy to occur are solved, and the safety of the data is ensured by regularly deploying sensitive information of vehicles and/or users and calling a sensitive data unified management platform for management.
Specifically, fig. 1 is a flow chart of a method for managing sensitive data according to an embodiment of the present application.
As shown in fig. 1, the method for managing sensitive data includes the following steps:
in step S101, login data of a user is received.
According to one embodiment of the present application, after receiving login data of the user, the method further includes: judging whether the login data meets preset encryption conditions or not; when the sensitive data of the vehicle and/or the sensitive data of the user exist in the login data, judging that the login data meets the preset encryption condition.
The preset encryption conditions may be encryption conditions set by a person skilled in the art according to security requirements, or may be related encryption conditions obtained through computer simulation, which are not limited herein.
In particular, along with the travelling popularity of users, the safety performance of the vehicle is more and more important to users, so that the protection of the sensitive data of the vehicle and the users is particularly important in the development process of the vehicle, and meanwhile, a unified management platform is also required to uniformly manage the sensitive data in the protection process of the sensitive data of the vehicle and the users, thereby improving the confidentiality and management efficiency of the sensitive data.
Specifically, as shown in fig. 2, in the embodiment of the present application, a vehicle receives login data of a user under the condition that the user logs in, after receiving the login data of the user, needs to determine whether the login data meets a preset encryption condition, firstly, the vehicle calls an API interface to enter a first layer gateway, that is, a sensitive data gateway, and the sensitive data gateway identifies whether the sensitive data of the vehicle and/or the sensitive data of the user exist in the login data of the user through a rule engine configured with an identification policy; and then, when the rule engine detects that the sensitive data of the vehicle and/or the sensitive data of the user exist in the login data, judging that the login data of the user meets the preset encryption condition.
The sensitive data of the embodiment of the application may include at least one of an identification number of a user, a mobile phone number and a frame number of a vehicle.
In step S102, when the login data meets a preset encryption condition, a corresponding encryption instruction is generated according to the vehicle model corresponding to the login data, and the login data is encrypted by the encryption instruction.
According to one embodiment of the present application, generating a corresponding encryption instruction according to a vehicle model corresponding to login data, and encrypting the login data through the encryption instruction includes: when the sensitive data of the vehicle exist in the login data, generating a corresponding first encryption instruction according to the vehicle type corresponding to the login data, and encrypting the sensitive data of the vehicle through the first encryption instruction; when the sensitive data of the user exist in the login data, a corresponding second encryption instruction is generated according to the vehicle type corresponding to the login data, and the sensitive data of the user are encrypted through the second encryption instruction.
Specifically, as shown in fig. 3, when it is identified that login data of a user meets a preset encryption condition, different encryption policies may be generated according to vehicle types corresponding to the login data, so that a corresponding first encryption instruction may be generated by the vehicle types corresponding to the login data, and sensitive data of the vehicle may be encrypted by the first encryption instruction; when the sensitive data of the user exist in the login data, a corresponding second encryption instruction is generated according to the vehicle type corresponding to the login data, and the sensitive data of the user are encrypted through the second encryption instruction.
For example, if the embodiment of the application identifies the sensitive data of the vehicle in the login data of the vehicle type a, an encryption algorithm is configured according to the login data of the vehicle type a, a corresponding first encryption instruction is generated, and then the sensitive data of the vehicle is encrypted through the first encryption instruction; and if the sensitive data of the user is identified in the login data, generating a corresponding second encryption instruction according to the vehicle type A, and encrypting the sensitive data of the user through the second encryption instruction.
It should be noted that, the user may have multiple vehicle types at the same time, so the vehicle types of the embodiment of the application may include a vehicle type a, a vehicle type B, a vehicle type C, and the like, so as to generate a corresponding encryption instruction according to the vehicle type corresponding to the login data when the login data meets a preset encryption condition, and encrypt the login data through the encryption instruction, thereby improving confidentiality of sensitive data of the vehicle and sensitive data of the user, and avoiding data leakage.
In step S103, the current platform to be interacted is obtained, and interaction is performed with the current platform to be interacted based on the encrypted login data.
Specifically, as shown in fig. 4, after encrypting login data, the embodiment of the application obtains a current platform to be interacted, for example, a unified sensitive data management platform, and calls an API interface of the unified sensitive data management platform, and the encrypted login data interacts with the unified sensitive data management platform through the API interface, so that sensitive data of a vehicle and/or sensitive data of a user are ensured not to be leaked to a third party, and login data security of the user is improved.
According to an embodiment of the present application, the method for managing sensitive data further includes: judging whether an encryption modification instruction of a user is received or not; when an encryption modification instruction of a user is received, the first encryption instruction and the second encryption instruction are modified so as to encrypt the sensitive data of the vehicle according to the modified first encryption instruction, and the sensitive data of the user is encrypted according to the modified second encryption instruction.
Specifically, if the user needs to modify the encryption instruction in the process of using the vehicle, the encryption modification instruction may be sent to the vehicle, and when the vehicle receives the encryption modification instruction of the user, the first encryption instruction and the second encryption instruction are modified to encrypt the sensitive data of the vehicle according to the modified first encryption instruction, encrypt the sensitive data of the user according to the modified second encryption instruction, and embed the modified first encryption instruction and the modified second encryption instruction into the vehicle in the form of an SDK (Software Development Kit ), and at the same time, based on the developed web-side background page, the modified encryption instruction result is visually displayed, so that the user periodically maintains the sensitive data of the vehicle and/or the sensitive data of the user, thereby meeting the use requirement of the user.
According to the sensitive data management method, login data of a user are received, when the login data meet preset encryption conditions, corresponding encryption instructions are generated according to vehicle types corresponding to the login data to encrypt the login data, then a current platform to be interacted is obtained, and interaction is conducted with the current platform to be interacted based on the encrypted login data. Therefore, the problems that encryption strategies of different vehicle types need to be independently operated and managed respectively in the interaction process of the Internet of vehicles, unified management of data is not facilitated, meanwhile, the safety of the data is reduced, data leakage, tampering and the like are easy to occur are solved, and the safety of the data is ensured by regularly deploying sensitive information of vehicles and/or users and calling a sensitive data unified management platform for management.
Next, a management apparatus for sensitive data according to an embodiment of the present application will be described with reference to the accompanying drawings.
Fig. 5 is a block schematic diagram of a sensitive data management apparatus according to an embodiment of the present application.
As shown in fig. 5, the sensitive data management apparatus 10 includes: a receiving module 100, a generating module 200 and an interacting module 300.
The receiving module 100 is configured to receive login data of a user;
the generating module 200 is configured to generate a corresponding encryption instruction according to a vehicle model corresponding to the login data when the login data meets a preset encryption condition, and encrypt the login data through the encryption instruction; and
the interaction module 300 is configured to obtain a current platform to be interacted with, and interact with the current platform to be interacted with based on the encrypted login data.
According to one embodiment of the present application, after receiving login data of the user, the receiving module 100 is further configured to:
judging whether the login data meets preset encryption conditions or not;
when the sensitive data of the vehicle and/or the sensitive data of the user exist in the login data, judging that the login data meets the preset encryption condition.
According to one embodiment of the present application, the generating module 200 is specifically configured to:
when the sensitive data of the vehicle exist in the login data, generating a corresponding first encryption instruction according to the vehicle type corresponding to the login data, and encrypting the sensitive data of the vehicle through the first encryption instruction;
when the sensitive data of the user exist in the login data, a corresponding second encryption instruction is generated according to the vehicle type corresponding to the login data, and the sensitive data of the user are encrypted through the second encryption instruction.
According to an embodiment of the present application, the above-mentioned sensitive data management device 10 is further configured to:
judging whether an encryption modification instruction of a user is received or not;
when an encryption modification instruction of a user is received, the first encryption instruction and the second encryption instruction are modified so as to encrypt the sensitive data of the vehicle according to the modified first encryption instruction, and the sensitive data of the user is encrypted according to the modified second encryption instruction.
According to one embodiment of the application, the sensitive data includes at least one of an identification number of the user, a cell phone number, a frame number of the vehicle.
According to the sensitive data management device, by receiving login data of a user, when the login data meets preset encryption conditions, a corresponding encryption instruction is generated according to a vehicle type corresponding to the login data to encrypt the login data, then a current platform to be interacted is obtained, and interaction is carried out with the current platform to be interacted based on the encrypted login data. Therefore, the problems that encryption strategies of different vehicle types need to be independently operated and managed respectively in the interaction process of the Internet of vehicles, unified management of data is not facilitated, meanwhile, the safety of the data is reduced, data leakage, tampering and the like are easy to occur are solved, and the safety of the data is ensured by regularly deploying sensitive information of vehicles and/or users and calling a sensitive data unified management platform for management.
Fig. 6 is a schematic structural diagram of a vehicle according to an embodiment of the present application. The vehicle may include:
a memory 601, a processor 602, and a computer program stored on the memory 601 and executable on the processor 602.
The processor 602 implements the method of managing sensitive data provided in the above-described embodiment when executing a program.
Further, the vehicle further includes:
a communication interface 603 for communication between the memory 601 and the processor 602.
A memory 601 for storing a computer program executable on the processor 602.
The memory 601 may comprise a high-speed RAM memory or may further comprise a non-volatile memory (non-volatile memory), such as at least one disk memory.
If the memory 601, the processor 602, and the communication interface 603 are implemented independently, the communication interface 603, the memory 601, and the processor 602 may be connected to each other through a bus and perform communication with each other. The bus may be an industry standard architecture (Industry Standard Architecture, abbreviated ISA) bus, an external device interconnect (Peripheral Component Interconnect, abbreviated PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated EISA) bus, among others. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, only one thick line is shown in fig. 6, but not only one bus or one type of bus.
Alternatively, in a specific implementation, if the memory 601, the processor 602, and the communication interface 603 are integrated on a chip, the memory 601, the processor 602, and the communication interface 603 may perform communication with each other through internal interfaces.
The processor 602 may be a central processing unit (Central Processing Unit, abbreviated as CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, abbreviated as ASIC), or one or more integrated circuits configured to implement embodiments of the present application.
The present embodiment also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of managing sensitive data as described above.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, the meaning of "N" is at least two, such as two, three, etc., unless explicitly defined otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more N executable instructions for implementing specific logical functions or steps of the process, and further implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or N wires, a portable computer cartridge (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium may even be paper or other suitable medium upon which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the N steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. As with the other embodiments, if implemented in hardware, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
Those of ordinary skill in the art will appreciate that all or part of the steps carried out in the method of the above-described embodiments may be implemented by a program to instruct related hardware, and the program may be stored in a computer readable storage medium, where the program when executed includes one or a combination of the steps of the method embodiments.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented as software functional modules and sold or used as a stand-alone product.
The above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, or the like. Although embodiments of the present application have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the application, and that variations, modifications, alternatives, and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the application.

Claims (10)

1. A method of managing sensitive data, comprising the steps of:
receiving login data of a user;
when the login data meets a preset encryption condition, generating a corresponding encryption instruction according to a vehicle type corresponding to the login data, and encrypting the login data through the encryption instruction; and
and acquiring a current platform to be interacted, and interacting with the current platform to be interacted based on the encrypted login data.
2. The method of claim 1, further comprising, after receiving the login data of the user:
judging whether the login data meets a preset encryption condition or not;
and when the sensitive data of the vehicle and/or the sensitive data of the user exist in the login data, judging that the login data meets the preset encryption condition.
3. The method according to claim 1, wherein the generating the corresponding encryption instruction according to the vehicle model corresponding to the login data, and encrypting the login data by the encryption instruction, includes:
when sensitive data of a vehicle exist in the login data, generating a corresponding first encryption instruction according to a vehicle type corresponding to the login data, and encrypting the sensitive data of the vehicle through the first encryption instruction;
when the sensitive data of the user exist in the login data, a corresponding second encryption instruction is generated according to the vehicle type corresponding to the login data, and the sensitive data of the user are encrypted through the second encryption instruction.
4. The method as recited in claim 1, further comprising:
judging whether an encryption modification instruction of the user is received or not;
when the encryption modification instruction of the user is received, the first encryption instruction and the second encryption instruction are modified so as to encrypt the sensitive data of the vehicle according to the modified first encryption instruction, and the sensitive data of the user is encrypted according to the modified second encryption instruction.
5. The method of claim 2, wherein the sensitive data comprises at least one of an identification number of the user, a cell phone number, a frame number of the vehicle.
6. A device for managing sensitive data, comprising:
the receiving module is used for receiving login data of a user;
the generation module is used for generating a corresponding encryption instruction according to a vehicle type corresponding to the login data when the login data meets a preset encryption condition, and encrypting the login data through the encryption instruction; and
and the interaction module is used for acquiring the current platform to be interacted and interacting with the current platform to be interacted based on the encrypted login data.
7. The apparatus of claim 6, wherein the receiving module, after receiving the login data of the user, is further configured to:
judging whether the login data meets a preset encryption condition or not;
and when the sensitive data of the vehicle and/or the sensitive data of the user exist in the login data, judging that the login data meets the preset encryption condition.
8. The apparatus of claim 6, wherein the generating module is specifically configured to:
when sensitive data of a vehicle exist in the login data, generating a corresponding first encryption instruction according to a vehicle type corresponding to the login data, and encrypting the sensitive data of the vehicle through the first encryption instruction;
when the sensitive data of the user exist in the login data, a corresponding second encryption instruction is generated according to the vehicle type corresponding to the login data, and the sensitive data of the user are encrypted through the second encryption instruction.
9. A vehicle, characterized by comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the program to implement the method of managing sensitive data according to any one of claims 1-5.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the program is executed by a processor for implementing a method of managing sensitive data according to any one of claims 1-5.
CN202311555091.0A 2023-11-17 2023-11-17 Sensitive data management method, device, vehicle and storage medium Pending CN117494168A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311555091.0A CN117494168A (en) 2023-11-17 2023-11-17 Sensitive data management method, device, vehicle and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311555091.0A CN117494168A (en) 2023-11-17 2023-11-17 Sensitive data management method, device, vehicle and storage medium

Publications (1)

Publication Number Publication Date
CN117494168A true CN117494168A (en) 2024-02-02

Family

ID=89682747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311555091.0A Pending CN117494168A (en) 2023-11-17 2023-11-17 Sensitive data management method, device, vehicle and storage medium

Country Status (1)

Country Link
CN (1) CN117494168A (en)

Similar Documents

Publication Publication Date Title
US8769305B2 (en) Secure execution of unsecured apps on a device
US9665708B2 (en) Secure system for allowing the execution of authorized computer program code
US8812868B2 (en) Secure execution of unsecured apps on a device
CN103679007B (en) A kind of manage the method for application program authority, device and mobile device
US10255433B2 (en) Executing process code integrity verificaton
KR101907486B1 (en) Mobile computing system for providing execution environment having high secure ability
US20120210443A1 (en) Securing and managing apps on a device
KR100997802B1 (en) Apparatus and method for security managing of information terminal
WO2013075412A1 (en) Security control method and device for mobile terminal
WO2012128860A1 (en) Secure execution of unsecured apps on a device
GB2389747A (en) Defining the access privileges of executable code in a mobile wireless device
CN110263545A (en) A kind of start-up course integrity measurement detection method based on android system
JP2010205270A (en) Device for providing tamper evident property to executable code stored in removable medium
WO2020019971A1 (en) Active security protection method for operating system, system and terminal device
US9672353B2 (en) Securing and managing apps on a device using policy gates
CN113704818A (en) Key management method and device for encrypted data storage system and terminal equipment
Rahimi et al. Android security and its rooting—a possible improvement of its security architecture
EP1998575A2 (en) Wireless Terminal Apparatus and Method of Protecting System Resources
Zhang et al. Design and implementation of efficient integrity protection for open mobile platforms
CN117494168A (en) Sensitive data management method, device, vehicle and storage medium
WO2012079612A1 (en) Method for changing an operating mode of a mobile device
CN110362983B (en) Method and device for ensuring consistency of dual-domain system and electronic equipment
CN111291379A (en) Android-based vehicle-mounted system application detection method and device and electronic equipment
US11526339B1 (en) Systems and methods for improving application installation
CN118227163A (en) Upgrade method and device for electronic control unit, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination