WO2021027955A1 - 一种信息处理方法、装置及存储介质 - Google Patents

一种信息处理方法、装置及存储介质 Download PDF

Info

Publication number
WO2021027955A1
WO2021027955A1 PCT/CN2020/109532 CN2020109532W WO2021027955A1 WO 2021027955 A1 WO2021027955 A1 WO 2021027955A1 CN 2020109532 W CN2020109532 W CN 2020109532W WO 2021027955 A1 WO2021027955 A1 WO 2021027955A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
vehicle
key information
information processing
cloud
Prior art date
Application number
PCT/CN2020/109532
Other languages
English (en)
French (fr)
Inventor
王游
陈子冲
Original Assignee
纳恩博(常州)科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 纳恩博(常州)科技有限公司 filed Critical 纳恩博(常州)科技有限公司
Publication of WO2021027955A1 publication Critical patent/WO2021027955A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformations in the plane of the image
    • G06T3/04Context-preserving transformations, e.g. by using an importance map
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/56Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle

Definitions

  • This application relates to the field of information processing technology, and in particular to an information processing method, device and storage medium.
  • the image acquisition module of the vehicle can transmit the collected images, video information, etc. in real time for remote operators to watch, so that the remote operators can remotely control the vehicle; or, save the collected images and video information, For the remote operator to check afterwards.
  • the embodiments of the present application provide an information processing method, device and storage medium in order to solve at least one problem existing in the prior art.
  • an embodiment of the present application provides an information processing method, the method including:
  • the image is encrypted, and the encrypted image is stored in the vehicle.
  • the image acquisition includes:
  • the image acquisition includes:
  • the determining the sensitive area of the image includes:
  • the sensitive object in the image is detected, and the area where the sensitive object is located is regarded as the sensitive area.
  • the performing encryption processing on the image includes:
  • the image is encrypted using the third key information.
  • the method further includes:
  • the storing the encrypted image in the vehicle includes:
  • the encrypted image is stored in the vehicle.
  • an information processing device including:
  • the image acquisition unit is configured to acquire images
  • the data processing unit is configured to determine the sensitive area of the image, perform blur processing on the sensitive area of the image, and send the blurred image to the cloud, so that the blurred image can be forwarded via the cloud To the control terminal;
  • the encryption unit is configured to perform encryption processing on the image, and store the encrypted image in the vehicle.
  • the image acquisition unit is configured to acquire an image of the environment in which the vehicle is located when the vehicle is in a driving state.
  • the image acquisition unit is configured to collect the vehicle if it detects that the posture of the vehicle changes or the vehicle is subjected to external forces when the vehicle is in a parking state. An image of your environment.
  • the data processing unit is configured to detect a sensitive object in the image, and use an area where the sensitive object is located as a sensitive area.
  • the encryption unit is configured to obtain first key information corresponding to the vehicle and second key information corresponding to the cloud;
  • the image is encrypted using the third key information.
  • the device further includes:
  • a decryption unit configured to obtain the encrypted image and the third key information from the vehicle
  • the encryption unit is further configured to store the encrypted image in the vehicle when an abnormality occurs in the communication network with the cloud terminal.
  • an embodiment of the present application provides a mobile device, and the mobile device includes:
  • Network interface used to realize connection and communication between components
  • Memory used to store executable instructions
  • the processor is configured to implement the information processing method described in the first aspect when executing the executable instructions stored in the memory.
  • embodiments of the present application provide a storage medium that stores a computer program, and when the computer program is executed by at least one processor, the information processing method described in the first aspect is implemented.
  • the embodiments of the present application provide an information processing method, device, and storage medium.
  • the method includes: acquiring an image; determining a sensitive area of the image, blurring the sensitive area of the image, and converting the blurred image Send to the cloud, so that the blurred image can be forwarded to the control terminal via the cloud; perform encryption processing on the image, and store the encrypted image in the vehicle.
  • This application is able to protect the privacy of the image from being leaked through the blurring and encryption processing of the image without affecting the normal operation of the remote control or monitoring vehicle, and the unprivileged operator can view the non-private content of the image.
  • Authorized operators can view the original image.
  • FIG. 1 is a schematic diagram of a network architecture of an information processing system provided by an embodiment of this application;
  • FIG. 2 is a first schematic flowchart of an information processing method provided by an embodiment of this application.
  • FIG. 3 is a second schematic flowchart of an information processing method provided by an embodiment of this application.
  • FIG. 4 is a schematic structural diagram of an information processing device provided by an embodiment of the application.
  • FIG. 5 is a schematic diagram of a specific hardware structure of a mobile device provided by an embodiment of the application.
  • the vehicle can realize semi-automatic driving, that is, the vehicle requires remote control of the operator to realize semi-automatic driving.
  • the communication between the vehicle and the control terminal can be communication through the base station, device to device (D2D) communication or vehicle network (Vehicle to Device) communication. everything, V2X) communication.
  • a camera is provided on the vehicle, taking the vehicle as an example, a camera is provided around the body of the car; taking the vehicle as an example, an electric scooter is provided with a camera on the front of the vehicle.
  • the number of cameras on the vehicle may be one or more.
  • the camera on the vehicle collects images in its field of view in real time, and sends the images to the control terminal (that is, the terminal where the operator is located, such as mobile phones, laptops, desktops, etc.).
  • the control terminal displays an operation interface, and the operator's operation page can present video portraits of multiple vehicles. Preferably, the operator can only remotely control one of the vehicles.
  • the vehicle has at least an autonomous mode.
  • the vehicle has the following three states: navigation state, remote control state, and waiting command state.
  • the operator can control the movement of the vehicle.
  • the operator can use the front, back, left, and right direction keys of the control terminal to control the movement of the vehicle.
  • the operator can also control the speed of the vehicle, such as The operator uses the function keys to slow down or increase the speed of the vehicle.
  • the operator can also click the "automatically advance 50 meters" button on the long straight road section to let the vehicle advance 50 meters autonomously.
  • the operator can also click on a point on the vehicle's video (such as a certain point in front of the vehicle) to send the navigation target point (that is, the position data of the point) to the vehicle, and the vehicle moves to the corresponding position according to the navigation target point, and further , The vehicle can determine whether there is an obstacle between the current position and the navigation target point by analyzing the collected video image, and control itself to move to the navigation target point according to the analysis result. The operator can repeatedly perform one or more of the above operations to achieve remote control of the vehicle.
  • Fig. 2 is a schematic flow chart 1 of an information processing method provided by an embodiment of the application.
  • the information processing method of the embodiment of the application includes:
  • Step 201 Collect images.
  • the image of the environment in which the vehicle is located may be collected through a camera provided on the vehicle.
  • cameras are provided around the body of the vehicle, and the number of cameras on the vehicle may be one or more.
  • Step 202 Determine the sensitive area of the image, perform blur processing on the sensitive area of the image, and send the blurred image to the cloud, so that the blurred image can be forwarded to the control terminal via the cloud .
  • the vehicle performs image recognition on the collected image to detect whether the image includes a sensitive object, and if the image includes the sensitive object, the area where the sensitive object is located is regarded as the sensitive area; if If the sensitive object is not included in the image, the original image is directly sent to the cloud, and the original image can be forwarded to the control terminal via the cloud.
  • the vehicle blurs the sensitive area of the image, and sends the blurred image to the cloud, so that the blurred image can be forwarded to the control terminal via the cloud .
  • the blur processing of the sensitive area can be achieved by mosaicing the sensitive area, or by matting the sensitive area.
  • the technical solutions of the embodiments of the present application do not limit the manner of blur processing.
  • Step 203 Perform encryption processing on the image, and store the encrypted image in the vehicle.
  • the vehicle may also perform encryption processing on the image including the sensitive area, and store the encrypted image in the local storage area. It should be noted that there is no need to perform encryption processing for images that do not include sensitive areas.
  • the images collected in the embodiments of this application can be divided into public images and private images (including images in sensitive areas). Only the private images are blurred and encrypted, and only the sensitive areas of the private images are blurred. Processing, compared to the case of blurring the entire image, saves storage space and network traffic, and the operator can also view the non-private content of the image.
  • An information processing method provided by an embodiment of the application collects an image; determines the sensitive area of the image, blurs the sensitive area of the image, and sends the blurred image to the cloud to make the blur
  • the processed image can be forwarded to the control terminal via the cloud; the image is encrypted, and the encrypted image is stored in the vehicle.
  • Fig. 3 is a schematic diagram of the second flow of an information processing method provided by an embodiment of the application.
  • the information processing method of an embodiment of the application includes:
  • Step 301 Collect images.
  • the vehicle when the vehicle is in a driving state, an image of the environment in which the vehicle is located is collected through a camera provided on the vehicle.
  • the vehicle can determine whether it is in a driving state according to the engine state or gear state of the vehicle, and the vehicle can also determine whether it is in a driving state according to whether it receives information from the control terminal to control the movement of the vehicle, thereby controlling the camera to perform Image Acquisition.
  • the camera installed on the vehicle is used to collect information about the environment of the vehicle. image.
  • the vehicle is provided with position and attitude sensors such as GPS and gyroscope, and the periphery of the vehicle body is provided with position and attitude sensors.
  • the number of the position and attitude sensors may be one or more.
  • the position and attitude sensors can detect vibrations.
  • the attitude sensor detects the posture change of the vehicle such as vibration, tipping, pressure, impact, etc.
  • the vehicle control camera collects an image of the environment in which the vehicle is located.
  • the pose sensor on the vehicle detects the posture change of the impacted vehicle
  • the vehicle control camera collects the image of the environment in which the vehicle is located, thereby collecting the image of the object that hit the vehicle.
  • the vehicle may also be provided with a platform for carrying people or objects, and a pressure sensor is provided on the platform of the vehicle. When people or objects are carried on the platform, the pressure sensor can also detect everything.
  • the vehicle is subjected to external forces. For example, when the vehicle is in a parking state, there is a person standing on the platform of the vehicle, and the pressure sensor on the platform detects that the vehicle is subjected to external forces, and the vehicle control camera collects an image of the environment of the vehicle.
  • Step 302 Determine the sensitive area of the image, perform blur processing on the sensitive area of the image, and send the blurred image to the cloud, so that the blurred image can be forwarded to the control terminal via the cloud .
  • the vehicle performs image recognition on the collected image to detect whether the image includes a sensitive object, and if the image includes the sensitive object, the area where the sensitive object is located is regarded as the sensitive area; if If the sensitive object is not included in the image, the original image is directly sent to the cloud, and the original image can be forwarded to the control terminal via the cloud.
  • the sensitive object may be an object related to personal privacy, such as a human face, a license plate and the like.
  • the vehicle blurs the sensitive area of the image, and sends the blurred image to the cloud, so that the blurred image can be forwarded to the control terminal via the cloud .
  • the vehicle detects that the image includes the face and the license plate number
  • the face and the license plate number in the image are determined as sensitive objects, and the area where the face and the license plate number are located is regarded as the sensitive area.
  • the license plate number is blurred, and the blurred image is sent to the cloud, so that the blurred image can be forwarded to the control terminal via the cloud.
  • the vehicle after the vehicle performs blur processing on the sensitive area of the image, it may also directly send the blurry processed image to the control terminal.
  • the original image can be sent to the cloud, and the cloud detects the original image to determine the sensitive area of the original image.
  • the cloud is sensitive to the original image.
  • the area is blurred, and the blurred image is sent to the control terminal.
  • the blur processing of the sensitive area can be achieved by mosaicing the sensitive area, or by matting the sensitive area.
  • the technical solutions of the embodiments of the present application do not limit the manner of blur processing.
  • Step 303 Perform encryption processing on the image, and store the encrypted image in the vehicle.
  • the vehicle may also perform encryption processing on the image including the sensitive area, and store the encrypted image in the local storage area. It should be noted that the capacity of the local storage area of the vehicle is limited. When the storage space of the local storage area is full, the images stored in the local storage area will be overwritten by new images.
  • the vehicle when the vehicle encrypts the image, it generates third key information based on the locally generated first key information and the second key information requested from the cloud, and uses the third key information.
  • the key information encrypts the image, and stores the encrypted image in the vehicle.
  • the vehicle sends key request information to the cloud
  • the cloud generates a second key information according to the key request information
  • the cloud sends the second key information to the vehicle.
  • the first key information is key information corresponding to the vehicle
  • the second key information is key information corresponding to the cloud.
  • the vehicle after the vehicle encrypts the image, it can also send the encrypted image to the cloud, and the cloud stores the encrypted image.
  • the vehicle after the vehicle encrypts the image, if an abnormality is detected in the communication network with the cloud, the encrypted image is stored in the vehicle.
  • the vehicle may also send the encrypted image to the cloud, and the cloud stores the encrypted image.
  • Step 304 Obtain the encrypted image and the third key information from the vehicle; use the third key information to decrypt the encrypted image to obtain the image.
  • the key used when encrypting the image in the embodiment of the present application and the key used when decrypting the encrypted image are the same key.
  • the operator with the right to decrypt the image can also control the vehicle to decrypt the encrypted image through the control terminal, and obtain the encrypted image and the third key from the vehicle Information, using the third key information to decrypt the encrypted image to obtain the image.
  • control terminal may also obtain the encrypted image from the cloud, obtain the first key information corresponding to the vehicle and the second key information corresponding to the cloud, based on the The first key information and the second key information are used to generate third key information, and the third key information is used to decrypt the encrypted image to obtain the image.
  • the images collected in the embodiments of this application can be divided into public images and private images (including images in sensitive areas). Only the private images are blurred and encrypted, and only the sensitive areas of the private images are blurred.
  • the processing saves storage space and network traffic compared to the case of blurring the entire image.
  • operators without permission can see the non-private content of the image, with greater flexibility.
  • An information processing method provided by an embodiment of the application collects an image; determines the sensitive area of the image, blurs the sensitive area of the image, and sends the blurred image to the cloud to make the blur
  • the processed image can be forwarded to the control terminal via the cloud; the image is encrypted, and the encrypted image is stored in the vehicle.
  • This application is able to protect the privacy of the image from being leaked through the blurring and encryption processing of the image without affecting the normal operation of the remote control or monitoring vehicle, and the unprivileged operator can view the non-private content of the image. Authorized operators can view the original image.
  • FIG. 4 is a schematic structural diagram of an information processing device provided in an embodiment of the application. As shown in FIG. 4, the information processing The device 400 includes:
  • the image acquisition unit 401 is configured to acquire images
  • the data processing unit 402 is configured to determine the sensitive area of the image, perform blur processing on the sensitive area of the image, and send the blurred image to the cloud, so that the blurred image can pass through the cloud Forward to the control terminal;
  • the encryption unit 403 is configured to perform encryption processing on the image, and store the encrypted image in the vehicle.
  • the image acquisition unit 401 is configured to acquire an image of the environment in which the vehicle is located when the vehicle is in a driving state.
  • the image collection unit 401 is configured to collect the environment in which the vehicle is located if it detects that the posture of the vehicle changes or the vehicle is subjected to external forces when the vehicle is in a parking state. Image.
  • the data processing unit 402 is configured to detect a sensitive object in the image, and use an area where the sensitive object is located as a sensitive area.
  • the encryption unit 403 is configured to obtain first key information corresponding to the vehicle and second key information corresponding to the cloud;
  • the image is encrypted using the third key information.
  • the device further includes:
  • the decryption unit 404 is configured to obtain the encrypted image and the third key information from the vehicle; use the third key information to decrypt the encrypted image to obtain the image.
  • the encryption unit 403 is further configured to store the encrypted image in the vehicle when an abnormality occurs in the communication network with the cloud.
  • each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be realized in the form of hardware or software function module.
  • the integrated unit is implemented in the form of a software function module and is not sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solutions of the embodiments of the present application are essentially In other words, the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes several instructions to enable a computer device ( It may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, Read Only Memory (ROM, Random Access Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes.
  • an embodiment of the present application provides a storage medium that stores a computer program, and when the computer program is executed by at least one processor, the steps described in the foregoing embodiments are implemented.
  • a specific hardware structure of a mobile device 500 provided by an embodiment of the present application is shown, including: a network interface 501, a memory 502, and a processor 503; each component is coupled together through a bus system 504.
  • the bus system 504 is used to implement connection and communication between these components.
  • the bus system 504 also includes a power bus, a control bus, and a status signal bus.
  • various buses are marked as the bus system 504 in FIG. 5.
  • the network interface 501 is used for receiving and sending signals in the process of sending and receiving information with other external network elements;
  • the memory 502 is configured to store a computer program that can run on the processor 503;
  • the processor 503 is configured to execute: when the computer program is running:
  • the image is encrypted, and the encrypted image is stored in the vehicle.
  • the processor 503 is further configured to execute the following when running the computer program:
  • the processor 503 is further configured to execute the following when running the computer program:
  • the processor 503 is further configured to execute the following when running the computer program:
  • the sensitive object in the image is detected, and the area where the sensitive object is located is regarded as the sensitive area.
  • the processor 503 is further configured to execute the following when running the computer program:
  • the image is encrypted using the third key information.
  • the processor 503 is further configured to execute the following when running the computer program:
  • the processor 503 is further configured to execute the following when running the computer program:
  • the encrypted image is stored in the vehicle.
  • the memory 502 in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM, ESDRAM Synchronous Dynamic Random Access Memory
  • Sync Link DRAM Synchronous Link Dynamic Random Access Memory
  • DRRAM Direct Rambus RAM
  • the memory 502 of the method described herein is intended to include, but is not limited to, these and any other suitable types of memory.
  • the processor 503 may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the above method can be completed by hardware integrated logic circuits in the processor 503 or instructions in the form of software.
  • the aforementioned processor 503 may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA ready-made programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor 502 may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the embodiments described herein can be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof.
  • the processing unit can be implemented in one or more Application Specific Integrated Circuits (ASIC), Digital Signal Processing (DSP), Digital Signal Processing Equipment (DSP Device, DSPD), programmable Logic device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, and others for performing the functions described in this application Electronic unit or its combination.
  • ASIC Application Specific Integrated Circuits
  • DSP Digital Signal Processing
  • DSP Device Digital Signal Processing Equipment
  • PLD programmable Logic Device
  • PLD Field-Programmable Gate Array
  • FPGA Field-Programmable Gate Array
  • the technology described herein can be implemented through modules (such as procedures, functions, etc.) that perform the functions described herein.
  • the software codes can be stored in the memory and executed by the processor.
  • the memory can be implemented in the processor or external to the processor.
  • the disclosed method and device can be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, such as: multiple units or components can be combined, or It can be integrated into another system, or some features can be ignored or not implemented.
  • the coupling, or direct coupling, or communication connection between the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms of.
  • the units described above as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units; Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • the functional units in the embodiments of the present application can all be integrated into one processing module, or each unit can be individually used as a unit, or two or more units can be integrated into one unit;
  • the unit can be implemented in the form of hardware, or in the form of hardware plus software functional units.
  • a person of ordinary skill in the art can understand that all or part of the steps in the above method embodiments can be implemented by a program instructing relevant hardware.
  • the foregoing program can be stored in a computer readable storage medium. When the program is executed, it is executed. Including the steps of the foregoing method embodiment; and the foregoing storage medium includes: removable storage devices, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Traffic Control Systems (AREA)

Abstract

一种信息处理方法、装置及存储介质,所述方法包括:采集图像(201);确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端(202);对所述图像进行加密处理,将加密处理后的图像存储在车辆(203)。该方法通过对图像进行模糊处理和加密处理,能够在不影响远程控制或监控车辆正常运行的前提下,保护图像的隐私不被泄露。

Description

一种信息处理方法、装置及存储介质
相关申请的交叉引用
本申请基于申请号为201910753638.5、申请日为2019年08月15日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及信息处理技术领域,尤其涉及一种信息处理方法、装置及存储介质。
背景技术
随着科技的发展,半自动驾驶车和自动驾驶开始普及到普通大众的生活中。车辆的图像采集模块可以实时的传输所采集到的图像、视频信息等,供远端操作人员观看,以供远端操作人员对车辆进行远程控制;或者,将采集到的图像、视频信息保存,以供远端操作人员事后查阅。
但在图像采集的过程中,可能会采集到一些涉及公开安全和公民隐私的图像,例如,包括人、车牌等敏感区域的图像。这样容易造成隐私泄露等安全隐患。
发明内容
有鉴于此,本申请实施例为解决现有技术中存在的至少一个问题而提供一种信息处理方法、装置及存储介质。
为达到上述目的,本申请实施例的技术方案是这样实现的:
第一方面,本申请实施例提供一种信息处理方法,所述方法包括:
采集图像;
确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;
对所述图像进行加密处理,将加密处理后的图像存储在车辆。
在一种可选的实施方式中,所述采集图像,包括:
在车辆处于行驶状态下,采集所述车辆所处环境的图像。
在一种可选的实施方式中,所述采集图像,包括:
在车辆处于停车状态下,若检测到所述车辆的姿态发生变化或者所述车辆受到外界的作用力,则采集所述车辆所处环境的图像。
在一种可选的实施方式中,所述确定所述图像的敏感区域,包括:
检测所述图像中的敏感对象,将所述敏感对象所在的区域作为敏感区域。
在一种可选的实施方式中,所述对所述图像进行加密处理,包括:
获取所述车辆对应的第一密钥信息以及所述云端对应的第二密钥信息;
基于所述第一密钥信息和所述第二密钥信息,生成第三密钥信息;
利用所述第三密钥信息对所述图像进行加密处理。
在一种可选的实施方式中,所述方法还包括:
从所述车辆获取所述加密处理后的图像和所述第三密钥信息;
利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
在一种可选的实施方式中,所述将加密处理后的图像存储在车辆,包括:
检测到与所述云端之间的通信网络发生异常的情况下,将加密处理后 的图像存储在车辆。
第二方面,本申请实施例提供一种信息处理装置,所述装置包括:
图像采集单元,配置为采集图像;
数据处理单元,配置为确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;
加密单元,配置为对所述图像进行加密处理,将加密处理后的图像存储在车辆。
在一种可选的实施方式中,所述图像采集单元,配置为在车辆处于行驶状态下,采集所述车辆所处环境的图像。
在一种可选的实施方式中,所述图像采集单元,配置为在车辆处于停车状态下,若检测到所述车辆的姿态发生变化或者所述车辆受到外界的作用力,则采集所述车辆所处环境的图像。
在一种可选的实施方式中,所述数据处理单元,配置为检测所述图像中的敏感对象,将所述敏感对象所在的区域作为敏感区域。
在一种可选的实施方式中,所述加密单元,配置为获取所述车辆对应的第一密钥信息以及所述云端对应的第二密钥信息;
基于所述第一密钥信息和所述第二密钥信息,生成第三密钥信息;
利用所述第三密钥信息对所述图像进行加密处理。
在一种可选的实施方式中,所述装置还包括:
解密单元,配置为从所述车辆获取所述加密处理后的图像和所述第三密钥信息;
利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
在一种可选的实施方式中,所述加密单元,还配置为检测到与所述云 端之间的通信网络发生异常的情况下,将加密处理后的图像存储在车辆。
第三方面,本申请实施例提供一种移动设备,所述移动设备包括:
网络接口,用于实现组件之间的连接通信;
存储器,用于存储可执行指令;
处理器,用于执行所述存储器中存储的可执行指令时,实现第一方面所述信息处理方法。
第四方面,本申请实施例提供一种存储介质,所述存储介质存储有计算机程序,当所述计算机程序被至少一个处理器执行时实现第一方面所述信息处理方法。
本申请实施例提供了一种信息处理方法、装置及存储介质,所述方法包括:采集图像;确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;对所述图像进行加密处理,将加密处理后的图像存储在车辆。本申请通过对图像进行模糊处理和加密处理,能够在不影响远程控制或监控车辆正常运行的前提下,保护图像的隐私不被泄露,且没有权限的操作员可以查看到图像的非隐私内容,有权限的操作员则可查看原始图像。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1为本申请实施例提供的一种信息处理系统的网络架构示意图;
图2为本申请实施例提供的一种信息处理方法的流程示意图一;
图3为本申请实施例提供的一种信息处理方法的流程示意图二;
图4为本申请实施例提供的一种信息处理装置的结构示意图;
图5为本申请实施例提供的一种移动设备的具体硬件结构示意图。
具体实施方式
为了能够更加详尽地了解本申请实施例的特点与技术内容,下面结合附图对本申请实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本申请实施例。
本申请实施例的技术方案可以但不局限于应用在半自动驾驶场景,在半自动驾驶场景中,车辆可以实现半自动驾驶,即车辆需要操作员的远程控制实现半自动驾驶。如图1所示,车辆与控制终端(即操作员所在的终端)之间的通信,可以是通过基站进行通信,也可以是设备到设备(Device to Device,D2D)通信或者车辆网(Vehicle to everything,V2X)通信。半自动驾驶的实现原理如下:车辆上设置有摄像头,以车辆为汽车为例,汽车的车身的周边设置有摄像头;以车辆为电动滑板车为例,电动滑板车的车头上设置有摄像头。其中,车辆上的摄像头的数目可以是一个或多个。车辆上的摄像头实时采集其视野范围内的图像,将图像发送给控制终端(即操作员所在的终端,比如手机、笔记本、台式机等)。控制终端显示操作界面,操作员的操作页面上可以呈现多个车辆的视频画像,优选地,操作员只能对其中一个车辆进行远程控制。
本申请实施例的技术方案中,车辆至少具有自主模式。在自主模式下,车辆有如下三种状态:导航状态、遥控状态、等待指令状态。其中,车辆在遥控状态时,操作员可以控制车辆的移动,例如操作员使用控制终端的前、后、左、右方向键来控制车辆的移动,此外,操作员还可以控制车辆的速度,例如操作员使用功能键来减慢车辆的速度或增加车辆的速度。另外,操作员还可以在长直路段点击“自主前进50米”按钮,让车辆自主前进50米,需要说明的是,这里的“50米”仅作为示例性说明,还可以是其他长度,如60米、100米等。再者,操作员还可以点击车辆的视频上的点(如车辆前方的某个点),向车辆发送导航目标点(即点的位置数据),车辆根 据导航目标点向对应的位置移动,进一步,车辆可以通过对采集的视频画像进行分析,确定当前位置到导航目标点之间是否有障碍物,根据分析结果控制自身移动到导航目标点。操作员可以反复执行上述一种或多种操作,从而实现对车辆的远程控制。
图2为本申请实施例提供的一种信息处理方法的流程示意图一,参见图2,本申请实施例的信息处理方法包括:
步骤201:采集图像。
在本申请实施例中,可以通过设置在车辆上的摄像头采集所述车辆所处环境的图像。其中,车辆的车身周边设置有摄像头,车辆上的摄像头的数目可以是一个或多个。
步骤202:确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端。
在本申请实施例中,车辆对采集到的图像进行图像识别,检测所述图像中是否包括敏感对象,若图像中包括所述敏感对象,则将所述敏感对象所在的区域作为敏感区域;若图像中不包括所述敏感对象,则直接将原始图像发送给云端,原始图像能够经所述云端转发给控制终端。确定所述图像包括的敏感区域后,车辆对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端。
在本申请一种可选实施方式中,对敏感区域进行模糊处理可以通过在敏感区域上打上马赛克来实现,或者,对敏感区域进行抠图来实现。本申请实施例的技术方案对模糊处理的方式不做限制。
步骤203:对所述图像进行加密处理,将加密处理后的图像存储在车辆。
在本申请实施例中,车辆还可以对包括敏感区域的图像进行加密处理, 并将加密处理后的图像存储在本地存储区。需要说明的是,对于不包括敏感区域的图像无需进行加密处理。
需要说明的是,本申请实施例中采集的图像可以分为公开图像和隐私图像(包括敏感区域的图像),只对隐私图像进行模糊处理和加密处理,且只对隐私图像的敏感区域进行模糊处理,相对于对整幅图像进行模糊处理的情况,节省了存储空间和网络流量,操作员还可以查看到图像的非隐私内容。
本申请实施例所提供的一种信息处理方法,采集图像;确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;对所述图像进行加密处理,将加密处理后的图像存储在车辆。本申请通过对图像进行模糊处理和加密处理,能够在不影响远程控制或监控车辆正常运行的前提下,保护图像的隐私不被泄露,且操作员可以查看到图像的非隐私内容。
图3为本申请实施例提供的一种信息处理方法的流程示意图二,参见图3,本申请实施例的信息处理方法包括:
步骤301:采集图像。
在本申请实施例中,在车辆处于行驶状态下,通过设置在车辆上的摄像头采集所述车辆所处环境的图像。其中,所述车辆可以根据车辆的发动机状态、或者档位状态判定其是否处于行驶状态,车辆还可以根据是否接收到控制终端发送的控制车辆移动的信息判定其是否处于行驶状态,从而控制摄像头进行图像采集。
在本申请实施例中,在车辆处于停车状态下,若检测到所述车辆的姿态发生变化或者所述车辆受到外界的作用力,则通过设置在车辆上的摄像头采集所述车辆所处环境的图像。其中,所述车辆上设置有如GPS、陀螺 仪等位姿传感器,车辆的车身的周边设置有位姿传感器,所述位姿传感器的数目可以是一个或多个,所述位姿传感器可以检测振动、倾倒、压力、撞击等车辆的姿态变化,在所述位姿传感器检测到振动、倾倒、压力、撞击等车辆的姿态变化时,则车辆控制摄像头采集所述车辆所处环境的图像。例如,车辆在停车状态时,车辆上的位姿传感器检测到车辆受到撞击的姿态变化,则车辆控制摄像头采集所述车辆所处环境的图像,从而采集到撞击车辆的物体的图像。所述车辆上还可以设置有承载人或物品的载物台,所述车辆的载物台上设置有压力传感器,在所述载物台上承载有人或物品时,压力传感器也能检测到所述车辆受到外界的作用力。例如,车辆在停车状态时,车辆的载物台上站立有人,载物台上的压力传感器检测到车辆受到外界的作用力,则车辆控制摄像头采集所述车辆所处环境的图像。
步骤302:确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端。
在本申请实施例中,车辆对采集到的图像进行图像识别,检测所述图像中是否包括敏感对象,若图像中包括所述敏感对象,则将所述敏感对象所在的区域作为敏感区域;若图像中不包括所述敏感对象,则直接将原始图像发送给云端,原始图像能够经所述云端转发给控制终端。其中,所述敏感对象可以是人脸,车牌等涉及到个人隐私的对象。确定所述图像包括的敏感区域后,车辆对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端。例如车辆检测到图像中包括人脸和车牌号码,则将图像中的人脸和车牌号码确定为敏感对象,并将人脸和车牌号码所在的区域作为敏感区域,车辆对图像中的人脸和车牌号码进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端。
在本申请的另一实施例中,车辆对所述图像的敏感区域进行模糊处理后,还可以直接将模糊处理后的图像发送给控制终端。
在本申请的另一实施例中,车辆采集到图像后,还可以将原始图像发送给云端,由云端对原始图像进行检测,确定所述原始图像的敏感区域,云端对所述原始图像的敏感区域进行模糊处理,并将模糊处理后的图像发送给控制终端。
在本申请一种可选实施方式中,对敏感区域进行模糊处理可以通过在敏感区域上打上马赛克来实现,或者,对敏感区域进行抠图来实现。本申请实施例的技术方案对模糊处理的方式不做限制。
步骤303:对所述图像进行加密处理,将加密处理后的图像存储在车辆。
在本申请实施例中,车辆还可以对包括敏感区域的图像进行加密处理,并将加密处理后的图像存储在本地存储区。需要说明的是,车辆的本地存储区的容量是有限的,当本地存储区的存储空间储满后,本地存储区中存储的图像会被新的图像覆盖。
在本申请实施例中,车辆对所述图像进行加密处理时,基于本地生成的第一密钥信息和向云端请求的第二密钥信息,生成第三密钥信息,利用所述第三密钥信息对所述图像进行加密处理,将加密处理后的图像存储在车辆。在实际应用中,车辆向云端发送密钥请求信息,云端根据密钥请求信息生成一个第二密钥信息,云端将所述第二密钥信息发送给车辆。其中,所述第一密钥信息是与车辆对应的密钥信息,所述第二密钥信息是与云端对应的密钥信息。
在一个例子中,第三密钥信息可以由第一密钥信息和第二密钥信息按照预设规则进行组合得到,例如:将密钥1和密钥2顺序组合得到密钥3={密钥1,密钥2}。
在本申请的另一实施例中,车辆对所述图像进行加密处理后,还可以 将加密处理后的图像发送给云端,由云端对所述加密处理后的图像进行存储。
在本申请实施例中,车辆对所述图像进行加密处理后,若检测到与所述云端之间的通信网络发生异常,则将加密处理后的图像存储在车辆。在实际应用中,车辆与所述云端之间的通信网络恢复时,车辆还可以将加密处理后的图像发送给云端,由云端对所述加密处理后的图像进行存储。
步骤304:从所述车辆获取所述加密处理后的图像和所述第三密钥信息;利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
需要说明的是,本申请实施例中对图像进行加密处理时使用的密钥和对所述加密处理后的图像进行解密处理时使用的密钥是相同的密钥。
在本申请实施例中,具备解密图像权限的操作员还可以通过控制终端控制车辆对加密处理后的图像进行解密处理,从所述车辆获取所述加密处理后的图像和所述第三密钥信息,利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
在本申请的另一实施例中,控制终端还可以从所述云端获取所述加密处理后的图像,获取车辆对应的第一密钥信息以及所述云端对应的第二密钥信息,基于所述第一密钥信息和所述第二密钥信息,生成第三密钥信息,利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
需要说明的是,本申请实施例中采集的图像可以分为公开图像和隐私图像(包括敏感区域的图像),只对隐私图像进行模糊处理和加密处理,且只对隐私图像的敏感区域进行模糊处理,相对于对整幅图像进行模糊处理的情况,节省了存储空间和网络流量。另外,没有权限的操作员可以看到图像的非隐私内容,具有更大的灵活性。
本申请实施例所提供的一种信息处理方法,采集图像;确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;对所述图像进行加密处理,将加密处理后的图像存储在车辆。本申请通过对图像进行模糊处理和加密处理,能够在不影响远程控制或监控车辆正常运行的前提下,保护图像的隐私不被泄露,且没有权限的操作员可以查看到图像的非隐私内容,有权限的操作员则可查看原始图像。
基于前述控制方法相同的技术构思,本申请实施例提供一种信息处理装置,图4为本申请实施例提供的一种信息处理装置的结构示意图,如图4所示,所述一种信息处理装置400包括:
图像采集单元401,配置为采集图像;
数据处理单元402,配置为确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;
加密单元403,配置为对所述图像进行加密处理,将加密处理后的图像存储在车辆。
在其他实施例中,所述图像采集单元401,配置为在车辆处于行驶状态下,采集所述车辆所处环境的图像。
在其他实施例中,所述图像采集单元401,配置为在车辆处于停车状态下,若检测到所述车辆的姿态发生变化或者所述车辆受到外界的作用力,则采集所述车辆所处环境的图像。
在其他实施例中,所述数据处理单元402,配置为检测所述图像中的敏感对象,将所述敏感对象所在的区域作为敏感区域。
在其他实施例中,所述加密单元403,配置为获取车辆对应的第一密钥信息以及所述云端对应的第二密钥信息;
基于所述第一密钥信息和所述第二密钥信息,生成第三密钥信息;
利用所述第三密钥信息对所述图像进行加密处理。
在其他实施例中,所述装置还包括:
解密单元404,配置为从所述车辆获取所述加密处理后的图像和所述第三密钥信息;利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
在其他实施例中,所述加密单元403,还配置为检测到与所述云端之间的通信网络发生异常的情况下,将加密处理后的图像存储在车辆。
在本申请实施例中的各组成部分可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
所述集成的单元如果以软件功能模块的形式实现并非作为独立的产品进行销售或使用时,可以存储在一个计算机可读取存储介质中,基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或processor(处理器)执行本申请实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
因此,本申请实施例提供了一种存储介质,该存储介质存储有计算机程序,所述计算机程序被至少一个处理器执行时实现上述实施例所述的步骤。
参见图5,示出了本申请实施例提供的一种移动设备500的具体硬件结构,包括:网络接口501、存储器502和处理器503;各个组件通过总线系统504耦合在一起。可理解,总线系统504用于实现这些组件之间的连接通信。总线系统504除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图5中将各种总线都标为总线系统504。
其中,所述网络接口501,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;
存储器502,用于存储能够在处理器503上运行的计算机程序;
处理器503,用于在运行所述计算机程序时,执行:
采集图像;
确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;
对所述图像进行加密处理,将加密处理后的图像存储在车辆。
所述处理器503还用于运行所述计算机程序时,执行:
在车辆处于行驶状态下,采集所述车辆所处环境的图像。
所述处理器503还用于运行所述计算机程序时,执行:
在车辆处于停车状态下,若检测到所述车辆的姿态发生变化或者所述车辆受到外界的作用力,则采集所述车辆所处环境的图像。
所述处理器503还用于运行所述计算机程序时,执行:
检测所述图像中的敏感对象,将所述敏感对象所在的区域作为敏感区域。
所述处理器503还用于运行所述计算机程序时,执行:
获取车辆对应的第一密钥信息以及所述云端对应的第二密钥信息;
基于所述第一密钥信息和所述第二密钥信息,生成第三密钥信息;
利用所述第三密钥信息对所述图像进行加密处理。
所述处理器503还用于运行所述计算机程序时,执行:
从所述车辆获取所述加密处理后的图像和所述第三密钥信息;
利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
所述处理器503还用于运行所述计算机程序时,执行:
检测到与所述云端之间的通信网络发生异常的情况下,将加密处理后的图像存储在车辆。
可以理解,本申请实施例中的存储器502可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Sync Link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本文描述的方法的存储器502旨在包括但不限于这些和任意其它适合类型的存储器。
而处理器503可能是一种集成电路芯片,具有信号的处理能力。在实 现过程中,上述方法的各步骤可以通过处理器503中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器503可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器502可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSP Device,DSPD)、可编程逻辑设备(Programmable Logic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本申请所述功能的其它电子单元或其组合中。
对于软件实现,可通过执行本文所述功能的模块(例如过程、函数等)来实现本文所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局 限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在一实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
在本申请所提供的几个实施例中,应该理解到,所揭露的方法和装置,可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的, 作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本申请各实施例中的各功能单元可以全部集成在一个处理模块中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
本申请所提供的几个方法实施例中所揭露的方法,在不冲突的情况下可以任意组合,得到新的方法实施例。
本申请所提供的几个产品实施例中所揭露的特征,在不冲突的情况下可以任意组合,得到新的产品实施例。
本申请所提供的几个方法或设备实施例中所揭露的特征,在不冲突的情况下可以任意组合,得到新的方法实施例或设备实施例。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (16)

  1. 一种信息处理方法,所述方法包括:
    采集图像;
    确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;
    对所述图像进行加密处理,将加密处理后的图像存储在车辆。
  2. 根据权利要求1所述的信息处理方法,其中,所述采集图像,包括:
    在车辆处于行驶状态下,采集所述车辆所处环境的图像。
  3. 根据权利要求1所述的信息处理方法,其中,所述采集图像,包括:
    在车辆处于停车状态下,若检测到所述车辆的姿态发生变化或者所述车辆受到外界的作用力,则采集所述车辆所处环境的图像。
  4. 根据权利要求1所述的信息处理方法,其中,所述确定所述图像的敏感区域,包括:
    检测所述图像中的敏感对象,将所述敏感对象所在的区域作为敏感区域。
  5. 根据权利要求1所述的信息处理方法,其中,所述对所述图像进行加密处理,包括:
    获取所述车辆对应的第一密钥信息以及所述云端对应的第二密钥信息;
    基于所述第一密钥信息和所述第二密钥信息,生成第三密钥信息;
    利用所述第三密钥信息对所述图像进行加密处理。
  6. 根据权利要求5所述的信息处理方法,其中,所述方法还包括:
    从所述车辆获取所述加密处理后的图像和所述第三密钥信息;
    利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
  7. 根据权利要求1至5中任一项至所述的信息处理方法,其中,所述将加密处理后的图像存储在车辆,包括:
    检测到与所述云端之间的通信网络发生异常的情况下,将加密处理后的图像存储在车辆。
  8. 一种信息处理装置,所述装置包括:
    图像采集单元,配置为采集图像;
    数据处理单元,配置为确定所述图像的敏感区域,对所述图像的敏感区域进行模糊处理,将模糊处理后的图像发送给云端,以使所述模糊处理后的图像能够经所述云端转发给控制终端;
    加密单元,配置为对所述图像进行加密处理,将加密处理后的图像存储在车辆。
  9. 根据权利要求8所述的信息处理装置,其中,
    所述图像采集单元,配置为在车辆处于行驶状态下,采集所述车辆所处环境的图像。
  10. 根据权利要求8所述的信息处理装置,其中,
    所述图像采集单元,配置为在车辆处于停车状态下,若检测到所述车辆的姿态发生变化或者所述车辆受到外界的作用力,则采集所述车辆所处环境的图像。
  11. 根据权利要求8所述的信息处理装置,其中,
    所述数据处理单元,配置为检测所述图像中的敏感对象,将所述敏感对象所在的区域作为敏感区域。
  12. 根据权利要求8所述的信息处理装置,其中,
    所述加密单元,配置为获取所述车辆对应的第一密钥信息以及所述云 端对应的第二密钥信息;
    基于所述第一密钥信息和所述第二密钥信息,生成第三密钥信息;
    利用所述第三密钥信息对所述图像进行加密处理。
  13. 根据权利要求12所述的信息处理装置,其中,所述装置还包括:
    解密单元,配置为从所述车辆获取所述加密处理后的图像和所述第三密钥信息;
    利用所述第三密钥信息对所述加密处理后的图像进行解密处理,得到所述图像。
  14. 根据权利要求8-12任一项所述的信息处理装置,其中,
    所述加密单元,还配置为检测到与所述云端之间的通信网络发生异常的情况下,将加密处理后的图像存储在车辆。
  15. 一种移动设备,所述移动设备包括:
    网络接口,用于实现组件之间的连接通信;
    存储器,用于存储可执行指令;
    处理器,用于执行所述存储器中存储的可执行指令时,实现权利要求1至7中任一项所述的信息处理方法。
  16. 一种存储介质,所述存储介质存储有计算机程序,当所述计算机程序被至少一个处理器执行时,实现权利要求1至7中任一项所述的信息处理方法。
PCT/CN2020/109532 2019-08-15 2020-08-17 一种信息处理方法、装置及存储介质 WO2021027955A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910753638.5 2019-08-15
CN201910753638.5A CN110610452A (zh) 2019-08-15 2019-08-15 一种信息处理方法、装置及存储介质

Publications (1)

Publication Number Publication Date
WO2021027955A1 true WO2021027955A1 (zh) 2021-02-18

Family

ID=68890133

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/109532 WO2021027955A1 (zh) 2019-08-15 2020-08-17 一种信息处理方法、装置及存储介质

Country Status (2)

Country Link
CN (1) CN110610452A (zh)
WO (1) WO2021027955A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113010792A (zh) * 2021-04-09 2021-06-22 北京明略软件系统有限公司 鉴别数据信息的构建方法、系统、存储介质及电子设备
CN116798099A (zh) * 2023-07-07 2023-09-22 广州广旭科技有限公司 一种劳务人员身份智能识别、管理方法以及系统

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110610452A (zh) * 2019-08-15 2019-12-24 北京致行慕远科技有限公司 一种信息处理方法、装置及存储介质
CN111757063A (zh) * 2020-06-29 2020-10-09 郑州信大捷安信息技术股份有限公司 基于5g环境下的视频流传输方法和系统
CN114244613B (zh) * 2021-12-17 2023-01-31 国汽智控(北京)科技有限公司 数据传输方法、装置、系统、自动驾驶车辆、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090296166A1 (en) * 2008-05-16 2009-12-03 Schrichte Christopher K Point of scan/copy redaction
US20140044303A1 (en) * 2012-08-10 2014-02-13 Lexmark International, Inc. Method of Securely Scanning a Payment Card
CN105631354A (zh) * 2014-11-26 2016-06-01 Ncr公司 安全图像处理
CN110610452A (zh) * 2019-08-15 2019-12-24 北京致行慕远科技有限公司 一种信息处理方法、装置及存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1767638B (zh) * 2005-11-30 2011-06-08 北京中星微电子有限公司 一种保护隐私权的可视图像监控方法及其系统
CN103072451A (zh) * 2013-01-25 2013-05-01 彭艳兵 一种安全驾驶辅助装置及方法
CN103457995A (zh) * 2013-06-07 2013-12-18 北京百纳威尔科技有限公司 终端设备数据信息的存储方法、终端设备和云端服务器
CN105871918A (zh) * 2016-06-08 2016-08-17 美的集团股份有限公司 家电设备及其与云服务器的通讯系统及方法、云服务器
CN107194268A (zh) * 2017-06-30 2017-09-22 珠海市魅族科技有限公司 一种信息处理方法、装置、计算机装置及可读存储介质
CN107945103A (zh) * 2017-11-14 2018-04-20 上海歌尔泰克机器人有限公司 无人机图像的隐私遮挡方法、装置及无人机
US10922431B2 (en) * 2017-12-27 2021-02-16 Honeywell International Inc. Systems and methods for dynamically masking video and images captured by a drone device camera

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090296166A1 (en) * 2008-05-16 2009-12-03 Schrichte Christopher K Point of scan/copy redaction
US20140044303A1 (en) * 2012-08-10 2014-02-13 Lexmark International, Inc. Method of Securely Scanning a Payment Card
CN105631354A (zh) * 2014-11-26 2016-06-01 Ncr公司 安全图像处理
CN110610452A (zh) * 2019-08-15 2019-12-24 北京致行慕远科技有限公司 一种信息处理方法、装置及存储介质

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113010792A (zh) * 2021-04-09 2021-06-22 北京明略软件系统有限公司 鉴别数据信息的构建方法、系统、存储介质及电子设备
CN116798099A (zh) * 2023-07-07 2023-09-22 广州广旭科技有限公司 一种劳务人员身份智能识别、管理方法以及系统
CN116798099B (zh) * 2023-07-07 2024-01-12 广州广旭科技有限公司 一种劳务人员身份智能识别、管理方法以及系统

Also Published As

Publication number Publication date
CN110610452A (zh) 2019-12-24

Similar Documents

Publication Publication Date Title
WO2021027955A1 (zh) 一种信息处理方法、装置及存储介质
CN110689460B (zh) 基于区块链的交通事故数据处理方法、装置、设备及介质
US8896432B2 (en) Cooperative event data record system and method
US11074770B2 (en) Vehicle monitoring system and method using a connected camera architecture
US11418346B2 (en) System and method for recognition of biometric information in shared vehicle
KR20160146343A (ko) 위치 정보를 기반으로 하는 블랙박스 영상 공유 방법 및 이를 이용한 단말기
US20140244312A1 (en) Systems and methods for providing insurance information exchange
KR20130088480A (ko) 차량용 감시 카메라를 이용한 통합 관제 시스템 및 그 방법
US11914745B2 (en) Personally identifiable information in encrypted data streams
US20110078802A1 (en) Display device, drive recorder, display method and computer-readable medium
US20140325236A1 (en) Vehicular image processing apparatus and data processing method using the same
CN110706371A (zh) 基于区块链的行车安全管理方法、系统及存储介质
KR102029128B1 (ko) 운전자간 블랙박스 사고영상을 상호교환하기 위한 iot 플랫폼 및 그 구현 방법
Winkler et al. User-centric privacy awareness in video surveillance
US11652804B2 (en) Data privacy system
WO2015149107A1 (en) Method and system for tracking assets
JP2021039619A (ja) 画像記録システム
CN105847729A (zh) 具有证据保全功能的北斗网络摄像机
KR101237991B1 (ko) 스마트 폰에서 차량 운행 정보의 공유를 지원하기 위한 방법
Mishra A novel integration of smart vehicles and secure clouds for supervising vehicle accidents on roads/highways
US20240144735A1 (en) Method and system for providing evidence following a vehicle incident
US20240144815A1 (en) Method and system for collecting evidence following a vehicle incident
EP3718300B1 (en) Digital ledger camera and image functions
KR101468407B1 (ko) 디지털 포렌식 촬영장치 및 그를 이용한 개인영상정보 오남용 방지를 위한 차량장착용 디지털 포렌식 촬영 시스템
KR20230017662A (ko) 재택근무를 위한 데이터 보안 방법 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20851426

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20851426

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20851426

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/11/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20851426

Country of ref document: EP

Kind code of ref document: A1