WO2022252078A1 - 数据访问控制方法及装置 - Google Patents

数据访问控制方法及装置 Download PDF

Info

Publication number
WO2022252078A1
WO2022252078A1 PCT/CN2021/097479 CN2021097479W WO2022252078A1 WO 2022252078 A1 WO2022252078 A1 WO 2022252078A1 CN 2021097479 W CN2021097479 W CN 2021097479W WO 2022252078 A1 WO2022252078 A1 WO 2022252078A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
data
sub
attribute information
interface
Prior art date
Application number
PCT/CN2021/097479
Other languages
English (en)
French (fr)
Inventor
耿峰
李江琪
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2021/097479 priority Critical patent/WO2022252078A1/zh
Priority to CN202180098785.9A priority patent/CN117441320A/zh
Publication of WO2022252078A1 publication Critical patent/WO2022252078A1/zh

Links

Images

Definitions

  • the present application relates to the field of vehicle networking and communication technologies, and in particular to a data access control method and device.
  • the embodiments of the present application provide a data access control method and device, which can reasonably and effectively control data access and increase data security.
  • the embodiment of the present application provides a data access control method, the method comprising:
  • the setting instruction is a setting instruction for a first interface, the first interface is used to indicate the first service, and the first interface corresponds to attribute information; configure according to the attribute information corresponding to the first interface
  • the attribute information of the first data, the attribute information of the first data is used to determine the access right of the first data, and the first data is included in the data corresponding to the first service.
  • the configuration of the attribute information of the first data can be completed through the correspondence between the first service and the first data combined with the attribute information corresponding to the first interface, which effectively improves the efficiency of data access control.
  • the data access control device can determine the access authority of the first data according to the attribute information of the first data, thereby realizing the purpose of effectively protecting the data.
  • the setting instruction is used to indicate whether access to the first service is allowed.
  • configuring the attribute information of the first data according to the attribute information corresponding to the first interface includes: configuring the attribute information of the first data according to the attribute information corresponding to the first interface and the setting instruction.
  • the data shown in the embodiment of the present application may also be called a data source, etc., and the specific name of the data is not limited in the embodiment of the present application.
  • the method further includes: acquiring configuration information, where the configuration information includes a correspondence between the first service and the first data;
  • the configuring the attribute information of the first data according to the attribute information corresponding to the first interface includes:
  • the configuration information may be used to represent the correspondence between services and data.
  • the configuration information is used to indicate the correspondence between services and sub-services, and the correspondence between sub-services and data.
  • the first service includes a first sub-service and/or a second sub-service
  • data corresponding to the first sub-service and/or the second sub-service includes the first data
  • the sub-service corresponding to the first service is different from the sub-service corresponding to the second service, or the sub-service corresponding to the first service partially overlaps with the sub-service corresponding to the second service.
  • the sub-service corresponding to the first service is different from the sub-service corresponding to the second service in at least one of the following:
  • Image collection sub-service voice collection sub-service or radar analysis sub-service.
  • the configuring the attribute information of the first data according to the attribute information corresponding to the first interface includes: configuring according to the setting instruction and the first attribute information corresponding to the first interface The first attribute information of the first data; or, configuring the second attribute information of the first data according to the setting instruction and the second attribute information corresponding to the first interface.
  • the setting instruction may be used to set whether to allow access to the first service.
  • the vehicle can configure the attribute information of the first data according to whether access to the first service is allowed, and the attribute information of the first service (eg, the first interface is the interface of the first service).
  • the first attribute information of the first data is different from the second attribute information of the first data in at least one of the following:
  • the setting instruction is a setting instruction for the first interface, including: the setting instruction is a setting instruction for the first service.
  • the first service includes any one or more of the following:
  • 360 surround view service, sentry service, automatic driving service, assisted driving service, automatic parking service, remote control service, navigation service or visitor mode service.
  • the 360 surround view service includes any one or more of the first 360 surround view service, the second 360 surround view service or the third 360 surround view service.
  • the sentinel service includes any one or more of the first sentry service, the second sentry service, or the third sentry service.
  • the automatic driving service includes any one or more of the first automatic driving service, the second automatic driving service or the third automatic driving service.
  • the first 360 surround view service, the second 360 surround view service or the third 360 surround view service have at least one of the following attributes different: identity attribute, time attribute, location attribute, running state attribute or surrounding environment properties.
  • the first service includes any one or more of the following: image service, sound service, or text service.
  • the first interface is an interface for a vehicle usage scenario
  • the vehicle usage scenario is bound with the first service
  • the attribute information corresponding to the first interface includes: the vehicle
  • the usage scenario carries the attribute information.
  • the vehicle usage scenario includes any one or more of the following: a first scenario, a second scenario, or a third scenario.
  • the first scene, the second scene or the third scene have at least one of the following attributes different: identity attribute, time attribute, location attribute, running state attribute or surrounding environment Attributes.
  • the method further includes: receiving an access control request, where the access control request carries attribute information; and outputting data corresponding to the attribute information.
  • the attribute information carried in the access control request may include any one or more of the following: identity, such as the identity of the user who needs to access data; time attribute, such as the time attribute of the data to be accessed; location attribute, For example, the location attribute of the data that needs to be accessed; the operating status attribute; the surrounding environment attribute, etc.
  • the access control request may also carry an access object, so that the vehicle may output corresponding data according to the access object and the attribute information carried in the access control request.
  • the access objects carried in the access control request are data 1 and data 2, the attribute information of data 1 matches the attribute information carried in the access control request, but the attribute information of data 2 does not match the attribute information carried in the access control request, the vehicle Only data 1 is output, data 2 is denied access.
  • the embodiment of the present application provides a data access control method, the method comprising:
  • the configuration information includes a correspondence between the first service and the first data, and attribute information of the first data, where the attribute information of the first data is used to determine the access rights of the first data,
  • the first data is included in the data corresponding to the first service; sending the configuration information to the vehicle.
  • the attribute information of the first data shown in the embodiment of the present application can be understood as that when the server delivers the configuration information, the configuration information includes the attributes of the data corresponding to the service, or it can also be understood that the configuration information includes the service
  • the attribute information of the corresponding data is an initial value.
  • the server may set initial values for the attribute information of the data, or may also set them as reserved (reserved), etc., which is not limited in this embodiment of the present application.
  • the vehicle can be configured with a specific value or a specific assignment of the attribute information of the first data according to the setting instruction.
  • the method provided in the embodiment of the present application can be applied to a data access control device, and the data access control device can include an original equipment manufacturer (original equipment manufacturer, OEM) server, or a local server, or a cloud server, etc., and the implementation of the present application Examples are not limited to this.
  • OEM original equipment manufacturer
  • the vehicle by sending the configuration information to the vehicle, the vehicle can perform data access control according to the configuration information, which can not only realize efficient data access control, but also effectively protect data.
  • the first service includes a first sub-service and/or a second sub-service
  • data corresponding to the first sub-service and/or the second sub-service includes the first data
  • the sub-service corresponding to the first service is different from the sub-service corresponding to the second service, or the sub-service corresponding to the first service partially overlaps with the sub-service corresponding to the second service.
  • the sub-service corresponding to the first service is different from the sub-service corresponding to the second service in at least one of the following: image collection sub-service, voice collection sub-service, or radar analysis sub-service .
  • the embodiment of the present application provides a data access control device, including a receiving unit and a processing unit.
  • the data access control device is configured to implement the first aspect or the method described in any possible implementation manner of the first aspect.
  • the data access control device further includes an output unit.
  • the embodiment of the present application provides a data access control device, including a processing unit and a sending unit.
  • the data access control device is used to implement the second aspect or the method described in any possible implementation manner of the second aspect.
  • an embodiment of the present application provides a data access control device, including a processor and a memory, the processor and the memory are connected to each other, wherein the memory is used to store a computer program, and the computer program includes program instructions,
  • the processor is configured to invoke the program instructions to execute the method in the first aspect above.
  • the data access control device further includes a transceiver, and the transceiver is used to receive and/or send signals (such as including data or instructions, etc.).
  • signals such as including data or instructions, etc.
  • an embodiment of the present application provides a data access control device, including a processor and a memory, the processor and the memory are connected to each other, wherein the memory is used to store a computer program, and the computer program includes program instructions,
  • the processor is configured to invoke the program instructions to execute the method of the second aspect above.
  • the data access control device further includes a transceiver, and the transceiver is configured to receive and/or send signals (such as including data or instructions, etc.).
  • signals such as including data or instructions, etc.
  • an embodiment of the present application provides a chip system, where the chip system includes at least one processor, configured to implement the functions involved in the foregoing first aspect.
  • the chip system further includes a communication interface.
  • the processor may be used to control the communication interface to input setting instructions or configuration information and the like.
  • the processor may be used to configure attribute information of data.
  • an embodiment of the present application provides a chip system, where the chip system includes at least one processor, configured to implement the functions involved in the second aspect above.
  • the chip system further includes a communication interface.
  • a processor may be used to determine configuration information.
  • the processor may be used to control the communication interface to output configuration information.
  • the embodiment of the present application provides a computer-readable storage medium, the computer storage medium stores a computer program, and when it is run on a computer, the above-mentioned first aspect or any possible realization of the first aspect The method indicated by the method is executed.
  • the embodiment of the present application provides a computer-readable storage medium, the computer storage medium stores a computer program, and when it is run on a computer, the above-mentioned second aspect or any possible realization of the second aspect The method indicated by the method is executed.
  • the embodiment of the present application provides a computer program product, the computer program product includes a computer program, and when it is run on a computer, the above-mentioned first aspect or any possible implementation of the first aspect shows method is executed.
  • the embodiment of the present application provides a computer program product, the computer program product includes a computer program, and when it is run on a computer, the above-mentioned second aspect or any possible implementation of the second aspect shows method is executed.
  • an embodiment of the present application provides a computer program.
  • the computer program When the computer program is run on a computer, the method shown in the above-mentioned first aspect or any possible implementation manner of the first aspect is executed.
  • an embodiment of the present application provides a computer program.
  • the computer program When the computer program is run on a computer, the method shown in the second aspect or any possible implementation manner of the second aspect is executed.
  • the embodiment of the present application provides a communication system, the communication system includes a vehicle and a server, the vehicle is used to execute the first aspect or any possible implementation of the first aspect, and the server is used to execute The second aspect or any possible implementation of the second aspect.
  • FIG. 1a and FIG. 1b are schematic diagrams of the architecture of a communication system provided by an embodiment of the present application.
  • Fig. 2 is a schematic structural diagram of a vehicle system provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a data access control method provided by an embodiment of the present application.
  • Figures 4a to 4c are schematic diagrams of the mapping relationship between a service, sub-services and data provided by the embodiment of the present application;
  • 5a to 5c are schematic diagrams of a configuration process provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a configuration process provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a configuration process provided by an embodiment of the present application.
  • FIGS. 8 to 10 are schematic structural diagrams of a data access control device provided by an embodiment of the present application.
  • an embodiment means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application.
  • the occurrences of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described herein can be combined with other embodiments.
  • At least one (item) means one or more
  • “multiple” means two or more
  • “at least two (items)” means two or three and three
  • “and/or” is used to describe the association relationship of associated objects, which means that there can be three kinds of relationships, for example, "A and/or B” can mean: only A exists, only B exists, and A and B exist at the same time A case where A and B can be singular or plural.
  • the character “/” generally indicates that the contextual objects are an "or” relationship.
  • “At least one of the following” or similar expressions refer to any combination of these items. For example, at least one item (piece) of a, b or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c ".
  • the present application provides a data access control method and device.
  • the data access control method provided in the present application can not only be applied to the field of Internet of Vehicles, but also provide a data access control method that is not bound to a specific business scenario, and improve user performance.
  • the problem of complex configuration makes it possible for users to implement efficient data access control without having to perform complex configurations, and without having to perceive the complex conversion relationship from configuration policies to policy effectiveness.
  • the method provided by this application can also effectively protect the data by configuring the data.
  • the method provided by this application can convert the user's consent or user's preference setting into a domain controller or an electronic control unit (electronic control unit, ECU) and other understandable and executable functions or service access control policies , A common method for data collection and execution strategies.
  • the method provided by this application can cover the data life cycle management from data function design and development in the original equipment manufacturer (OEM) design and development stage to data access in the user's vehicle.
  • OEM original equipment manufacturer
  • Fig. 1a is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • the communication system includes: a vehicle and a server.
  • the communication system includes a vehicle and an application (application, APP).
  • the communication system includes a vehicle, a server and an APP.
  • the server may include a cloud, and the cloud may include a cloud server and/or a cloud virtual machine.
  • the server may include an OEM server, a local server, and the like.
  • the server can communicate with the vehicle to provide various services for the vehicle, such as over the air (OTA) service, high-precision map service, automatic driving or assisted driving service, etc.
  • OTA over the air
  • the cloud can connect with third parties or undertake audits by regulatory agencies.
  • Fig. 1a is an example of a cloud, however, the server shown in the embodiment of the present application may also include an OEM server or a local server, which is not limited in the embodiment of the present application.
  • the OEM server may send configuration information to the vehicle.
  • the OTA update server can also send configuration information to the vehicle.
  • the configuration information and the updated configuration information may be determined by one type of server, or may also be determined by different servers, etc., which is not limited in this embodiment of the present application.
  • the OEM server may provide configuration information to the vehicle.
  • the OTA upgrade server provides updated configuration information to the vehicle.
  • the OTA upgrade server may also provide the vehicle with OTA upgrades, etc., which are not limited in this embodiment of the present application.
  • the method embodiments shown below will take the OEM server (for example, an upgrade server or cloud, etc.) to send configuration information to the vehicle as an example to illustrate the method provided by the embodiment of the present application.
  • the vehicle as the main data collector, is the main participant in data interaction with the cloud and the like.
  • the data may include personal data in the vehicle, data entered by the user, audio and video data, data of the vehicle itself, and the like.
  • the vehicle can not only communicate with the cloud, but also interact with other devices.
  • Such other equipment includes transportation infrastructure, other vehicles, diagnostic instruments, smart car keys or charging piles, etc. Therefore, the data in the vehicle is diverse.
  • the vehicle can exchange information with the cloud through wireless communication, and the wireless communication can follow the wireless protocol of the network connected to the vehicle, such as vehicle-to-everything (V2X, X can represent anything) Communication, for example, V2X of cellular network, etc.
  • V2X may include: vehicle to vehicle (vehicle to vehicle, V2V) communication, vehicle to infrastructure (vehicle to infrastructure, V2I) communication, vehicle to pedestrian (vehicle to pedestrian, V2P) or vehicle to network (vehicle to network, V2N) communication, etc.
  • the cellular network example includes a long term evolution (long term evolution, LTE) wireless network or a fifth generation (5th generation, 5G) wireless network, and the like.
  • the above-mentioned application may include a mobile phone APP.
  • the user can interact with the cloud through the mobile APP, such as transferring data.
  • the mobile phone APP can also be understood as a medium for the user to interact with the vehicle and the cloud.
  • FIG. 1a is only an example, and may include more or fewer devices than the system shown in FIG. 1a in a specific implementation, which is not limited in this embodiment of the present application.
  • the data in the vehicle is diverse, so the user's consent or preference settings are too complicated.
  • the method provided in this application can effectively improve the overly complex configuration and simplify the data configuration process.
  • the vehicle may also output the access object according to the method provided in this application.
  • Fig. 2 is a schematic structural diagram of a vehicle system provided by an embodiment of the present application.
  • the vehicle system includes: a system design model analysis module, a policy mapping module, and a user configuration analysis module.
  • the above three modules may be respectively deployed in different physical entities, or may be deployed in the same physical entity, etc., which is not limited in this embodiment of the present application. It can be understood that the embodiment of the present application does not limit the physical entities corresponding to the above modules.
  • the above-mentioned modules can be deployed in a computing unit with responsiveness in the vehicle. For example, the above three modules can be respectively deployed on different in-vehicle computing nodes.
  • the above three modules may be respectively deployed in different domain controllers (domain controller, DC).
  • the above three modules may be respectively deployed in different ECUs.
  • one of the above three modules is deployed in the domain controller, and the other two modules are deployed in the ECU.
  • one of the above three modules is deployed in the ECU, and the other two modules are deployed in the domain controller.
  • the above three modules may also be integrated into one module, etc., which is not limited in this embodiment of the present application.
  • the above three modules may all be included in the data analysis logic module in the vehicle.
  • the ECU shown in the present application may include a car box (telematics BOX, Tbox), a telematics control unit (telematics control unit, TCU), a gateway (gateway), a battery management system (battery management system) responsible for communicating with the remote end. system, BMS) or one or more of the vehicle control unit (VCU), etc.
  • the remote shown here may represent equipment or devices outside the vehicle, and the like.
  • the remote end includes one or more items of a road side unit (road side unit, RSU), a cloud, or a Bluetooth key.
  • System design model analysis module It can be connected with OEM in the vehicle function design stage.
  • the input of the system design model analysis module can be a structured data flow modeling file (also called a modeling file), which can also be understood as the following The configuration information shown.
  • the data flow modeling file can be understood as an association relationship file between services and data shown in this application, or an association relationship file between services, sub-services, and data.
  • the relationship among the service, sub-services and data may be a directed graph structure, or a tree structure, etc. It can be understood that for the relationship among services, sub-services, and data, reference may also be made to other embodiments of the present application, which will not be described in detail here.
  • a service can be understood as a user-oriented top-level service, such as a 360-degree view service, which can provide a car owner with a service of collecting 360-degree image data around the vehicle.
  • a 360-degree view service can provide a car owner with a service of collecting 360-degree image data around the vehicle.
  • vehicles such as smart cars usually provide multiple services, ranging from a few to dozens of services. These services range from basic experience enhancement to after-sales maintenance, and can cover various scenarios in the vehicle life cycle. Relatively wide.
  • the services shown in this application can also be understood as characteristics, etc., and this application does not limit the specific names of services.
  • the 360-degree surround view service shown here is only an example, and the services shown in this application may also include sentry services, automatic driving services, assisted driving services, automatic parking services, remote control services, navigation services, visitor mode services, etc. .
  • sub-services are usually required to support it.
  • the sub-services shown in this application can also be understood as functions, etc., and this application does not limit the specific name of the sub-services.
  • a series of functions need to be realized.
  • both the 360 surround view service and the sentinel service use the camera sensing sub-service, so the camera sensing can be used as a common sub-service function and used by both services at the same time.
  • the navigation service can use the microphone sound collection sub-service, the vehicle body sensor data acquisition sub-service, and so on. In order to achieve different business goals and bring different service experiences to users.
  • the operations corresponding to the data include data reading and data writing.
  • the function that needs to be read will read the data from the data stream, and the function that needs to be written will write to the data stream. Write the value in.
  • both services and sub-services will eventually be associated with data.
  • a camera can associate video data and audio data, and video data can include person-related data and person-independent data. Therefore, the data classification standard in the method provided by this application can be based on satisfying the data access control policy, and the specific classification standard is not limited in this embodiment of the application.
  • a top-down step-by-step A complex structure of layers unfolded.
  • the above-mentioned complex structure can be represented by a modeling file and then preset to the car end.
  • the mapping relationship among the services, sub-services and data shown in this application can also be updated.
  • the system design model analysis module generates an underlying machine representation that can be understood by the vehicle system by reading and analyzing the modeling file.
  • the input of the system design model analysis module can be the modeling file shown above (that is, the directed graph structure file corresponding to the service, sub-service and data shown above), and then the module will use the modeling file Load it into the vehicle system (for example, load it into a memory database), and output executable control instructions (also called instructions or strategies, etc.) that the vehicle system can understand.
  • the modeling file shown here can also be understood as the data flow modeling file shown above.
  • the system design model analysis module can provide services, sub-services, and data from top to bottom mapping relationship (such as the directed graph structure shown in Figure 4a below).
  • top-to-bottom mapping relationship of features, functions, and data shown in this application may also be called feature decomposition.
  • By modeling the overall architecture of the system also known as services, sub-services, and data decomposition association architecture, output a representation file from top-level services to bottom-level data (also known as the mapping relationship from top-level services to bottom-level data corresponding presentation file).
  • the data level can be information categories with sufficiently small granularity, such as road condition images required for assisted driving services, and account, password or face recognition metadata required for account login services. It can be understood that the present application does not limit the granularity of data (which can also be understood as a classification standard). For example, the granularity of data can be set according to the requirements of business scenarios, or the granularity of data can be set according to the requirements of laws and regulations, or the granularity of data can be set by developers themselves.
  • the hierarchical decomposition structure of data can also be provided to the system design model analysis module.
  • the top layer (the user-oriented layer can be called the top layer) represents the coarse-grained data directly collected by the sensor, such as the camera Corresponding video data (may also include images and sounds shown in FIG. 6 below).
  • a directed graph structure similar to services, sub-services, and data can be obtained. As shown in Figure 6, the lower the level, the finer the classification of data categories.
  • the bottom-level data granularity corresponds to the bottom-level granularity of services, sub-services, and data, indicating the minimum data range required to complete a service or sub-service, that is, Atomic data type.
  • the data 1 and data 2 corresponding to the image shown in FIG. 6 can also be understood as the data corresponding to the sub-service 1 and sub-service 2 included in the service 1, and the data 3 and data 4 corresponding to the sound can also be It is understood as data corresponding to sub-service 2 and sub-service 3 included in service 2.
  • User configuration analysis module docking with the car owner or authorized user to configure the data in the car through the mobile APP or the car cloud service management interface (portal) or the car machine central control during the car use stage.
  • the input of the user configuration analysis module is usually a setting instruction on the user interface (user interface, UI), and the user configuration analysis module can output a control instruction that the vehicle system can understand by processing the setting instruction (also called a structured system configuration).
  • Strategy mapping module take the output of the system design model analysis module and the user configuration analysis module as input, so as to realize the data processing according to the method provided by this application.
  • the policy mapping module can generate a data access control policy according to the representation files and setting instructions among services, sub-services, and data, so as to implement the association of the data access control policy with the vehicle design logic, and ensure that the internal vehicle system take effect.
  • the data access control strategy shown in this application can be understood as processing related data according to the mapping relationship between services and sub-services, the mapping relationship between sub-services and data, and the setting instructions input by users (such as processing the first data, etc. ).
  • attribute information of data is configured according to setting instructions.
  • Fig. 3 is a schematic flowchart of a data access control method provided by an embodiment of the present application.
  • the method may be applied to a system as shown in Fig. 1a or Fig. 1b or Fig. 2, for example, the method may be applied to a vehicle.
  • the vehicle can be a car or other forms of motor vehicles.
  • the vehicle may be a vehicle in the form of a car, a bus, a truck, an agricultural locomotive, a float in a parade, or a game car in an amusement park.
  • the method provided in this application may also be applied to a domain controller or ECU in a vehicle, and this application does not limit the specific form of the vehicle.
  • Fig. 4a is a schematic diagram of a relationship among a service, a sub-service and data provided by an embodiment of the present application.
  • the terminal device includes service A, service B and service C
  • service A includes sub-service a and sub-service b
  • service B includes sub-service b and sub-service c
  • service C includes sub-service d and sub-service e.
  • the overlapping sub-service among the sub-service corresponding to service A and the sub-service corresponding to service B is sub-service b.
  • the subservice corresponding to service A is completely different from the subservice corresponding to service C. It can be understood that the relationship between services or sub-services shown in FIG.
  • service A is a video surveillance service, and multiple sub-services are needed to realize the 360-degree view service.
  • sub-service a may be an image collection sub-service
  • sub-service b may be a voice collection sub-service.
  • Service B is the navigation service
  • sub-service c is the radar analysis sub-service.
  • the image acquisition sub-service may be implemented by an image acquisition sensor
  • the voice acquisition sub-service may be implemented by a voice acquisition sensor
  • the radar analysis sub-service may be implemented by a radar sensor. It can be understood that the relationship between the sensor and the sub-service shown here is only an example, and should not be construed as a limitation to the present application. That is, the realization of service B may depend on the radar analysis sub-service and the voice collection sub-service.
  • service C may serve emergency calls.
  • the data corresponding to sub-service a may include data 1 and data 2 .
  • the data corresponding to the image collection sub-service may include license plate data, user data, or road condition data.
  • the data corresponding to sub-service b may include data 2 and data 3 .
  • the data corresponding to the voice collection sub-service may include user data or noise data.
  • the data corresponding to sub-service c may include data 3 and data 4 .
  • the data corresponding to the radar analysis sub-service may include user data, historical navigation data, map data, and the like.
  • the data corresponding to sub-service d includes data 5
  • the data corresponding to sub-service e includes data 6 .
  • the embodiment of the present application does not limit the specific type or classification standard of data.
  • the specific type (also referred to as a category) or classification standard of the data may be set according to the requirements of the business scenario, or according to the requirements of the OEM, or according to laws and regulations, etc., which are not limited in this embodiment of the present application.
  • the arrow shown in FIG. 4a may indicate that the service includes one or more sub-services, and each sub-service corresponds to multiple data of different types.
  • Fig. 4b is a schematic diagram of the relationship among a service, sub-services and data provided by the embodiment of the present application.
  • the reason why the arrow shown in Figure 4b is from bottom to top can indicate that data 1 is included in the data corresponding to sub-service a, and data 2 is included in both the data corresponding to sub-service a and the data corresponding to sub-service b.
  • Data 3 is included in both the data corresponding to sub-service b and the data corresponding to sub-service c.
  • Sub-service a and sub-service b are included in the sub-service corresponding to service A, and sub-service b also corresponds to service B.
  • Sub-service c is included in the sub-service corresponding to service B, or it can also be understood that sub-service c corresponds to service B. It can be understood that, for FIG. 4a and FIG. 4b, the mapping relationship between services, sub-services and data shown in this application can be a mapping relationship from top to bottom, or an inclusion relationship from bottom to top. Therefore, The drawings shown below will represent the relationship among services, sub-services, and data with connecting lines without arrows. It can be understood that this description is also applicable to the schematic diagram shown in FIG. 7 .
  • the input setting layer shown in FIG. 4b can be understood as carrying user input in the user configuration analysis module in the vehicle system.
  • a user may input a setting instruction through the input setting layer.
  • the user can set up service A and/or service B.
  • the vehicle system such as a domain controller or ECU, invokes the sub-service corresponding to the service based on the relationship between the service and the sub-service (such as the sub-service access control policy shown in FIG. 4b). That is, based on the setting instruction input by the user, the vehicle system can call the sub-service corresponding to the service (ie, the service indicated by the setting instruction).
  • the vehicle system can also configure the attribute information of the data. That is to say, configuration of data can be realized by receiving setting instructions and calling sub-services. At the same time, by configuring the attribute information of the data, the configuration of the usage authority of the data can be realized.
  • the complex and diverse data in the vehicle are aggregated into application programming interface (application programming interface, API) or sub-services according to the functional design for service calls.
  • application programming interface application programming interface
  • the policy mapping module can determine whether the data is allowed to be accessed or not.
  • the check mark indicates that service A allows access
  • the cross sign indicates that service B prohibits access
  • the dotted line indicates that data 2 is not allowed to flow in the direction of data 2, sub-service b, and service B
  • the solid line indicates that data 2 is allowed to flow in the direction of data 2, sub-service b, and service B.
  • Subservice a flows in the direction of service A.
  • when calling service A its corresponding sub-service a also allows access, and the data 2 corresponding to sub-service a allows access.
  • data 2 cannot be accessed through sub-service b corresponding to service B.
  • service A is invoked
  • its corresponding sub-service b may allow access
  • the data 2 corresponding to sub-service b may allow access.
  • the data access control method provided by this application includes:
  • the method shown in FIG. 3 includes step 301 and step 302 .
  • the OEM server determines configuration information, where the configuration information includes a correspondence between a first service and first data.
  • the configuration information further includes attribute information of the first data, and the attribute information of the first data is used to determine the access right of the first data.
  • the attribute information of the first data shown in the embodiment of the present application can be understood as that when the server delivers the configuration information, the configuration information includes the attributes of the data corresponding to the service, or it can also be understood that the configuration information includes the service
  • the attribute information of the corresponding data is an initial value.
  • the server may set initial values for the attribute information of the data, or may also set them as reserved (reserved), etc., which is not limited in this embodiment of the present application.
  • the vehicle can be configured with a specific value or a specific assignment of the attribute information of the first data according to the setting instruction.
  • the configuration information shown in the embodiment of the present application can be understood as the mapping relationship between services and sub-services (also called correspondence or configuration relationship) as shown in Figure 4a and/or Figure 4c, and the sub-services and data mapping relationship between them.
  • the OEM server may receive configuration information input by a user (such as an OEM developer) (or interpreted as configured by the user). For another example, the OEM server may automatically generate configuration information. For example, the OEM server can classify according to the sub-services corresponding to a certain service and the data used by the sub-services, so as to form configuration information. It can be understood that the embodiment of the present application does not limit the method for the OEM server to determine the configuration information.
  • the OEM server sends configuration information to the vehicle.
  • the vehicle receives the configuration information sent by the OEM server.
  • the embodiment of the present application does not limit the specific form of the configuration information sent by the OEM.
  • the OEM may send the configuration information to the vehicle in the form of a table.
  • the OEM may send the configuration information to the vehicle in the form of a structured modeling file (such as in the form of XLM or JSON).
  • the vehicle receives a setting instruction, where the setting instruction is a setting instruction for a first interface, the first interface is used to indicate a first service, and the first interface corresponds to attribute information.
  • the vehicle may receive a setting instruction input by a user (such as a driver or a passenger, etc.), for example, the setting instruction is a setting instruction input by the user for the first interface.
  • the first interface is used to indicate the first service, for example, the vehicle can configure the attribute information of the first data according to the attribute information corresponding to the first interface.
  • the setting instruction may be used to set whether to allow access to the first interface.
  • the setting instruction may be used to set permission to access the first service indicated by the first interface.
  • the setting instruction may be used to set not allowing (also referred to as denying) access to the first service indicated by the first interface.
  • the vehicle may configure the attribute information of the first data according to the attribute information corresponding to the first interface and the setting instruction.
  • the first interface shown in the embodiment of the present application and the attribute information corresponding to the first interface are described in detail below.
  • the first interface is an interface of the first service.
  • the first service may include 360 surround view service, sentinel service, automatic driving service, assisted driving service, automatic parking service, remote control service (such as remote car viewing service or remote monitoring service), navigation service, visitor mode One or more of the services, etc.
  • the attribute information corresponding to the first service includes one or more of identity attribute, time attribute, location attribute, vehicle running state attribute, or surrounding environment attribute.
  • the attribute information corresponding to the first service may be set when the vehicle leaves the factory, or may also be set according to business requirements, or may be set by the developer during the OEM development stage, which is not limited in this embodiment of the present application.
  • the identity attribute can be understood as the identity corresponding to the first service when accessing the first service.
  • the identification may include one or more of account information, biometric information or unlocking patterns.
  • the account information can be understood as an account that the user can log in to when accessing the first service.
  • biometric information can be understood as fingerprint features, iris features, face features, etc. that can be used to unlock a vehicle.
  • the unlock pattern can be understood as a pattern that can be used when unlocking the vehicle.
  • the vehicle may configure the identity attribute of the first data according to the identity corresponding to the first service.
  • the identity corresponding to the first service shown here may be the same as or different from the identity of the first data, which is not limited in this embodiment of the present application.
  • By configuring the identity attribute of the first data it can be ensured that the user with the corresponding identity can access the first data.
  • the identity mark shown in the embodiment of the present application includes the above-mentioned account information, biometric information and unlocking pattern is only an example, and the embodiment of the present application does not limit the specific type of the identity mark.
  • the time attribute may be interpreted as a time when access to the first service is allowed, or a time when access to the first service is denied (also referred to as prohibiting access).
  • the time attribute can be distinguished by taking working hours and non-working hours as an example; or, the time corresponding to the time attribute can be set by the user; or, the time corresponding to the time attribute can be set by the system, etc., the present application The embodiment does not limit this.
  • the time set by the user may include denying access to the first service from 00:00 to 08:00 and 19:00 to 24:00, and allowing access to the first service from 08:00 to 19:00.
  • the time set by the user may include denying access to the first service from 09:00 to 21:00, and allowing access to the first service during other times.
  • the vehicle may configure the time attribute of the first data according to the time attribute corresponding to the first service.
  • the time allowed to access the first data is configured according to the time allowed to access the first service.
  • the time for denying access to the first data is configured according to the time for denying access to the first service.
  • the location attribute may be understood as a location that allows access to the first service, or a location that denies access to the first service.
  • the vehicle may configure a location attribute that allows the use of the first data (also referred to as a location attribute that allows access to the first data) according to the location attribute corresponding to the first service.
  • the running status attribute represents the running status of the vehicle.
  • the running state may include one or more of a gear-engaging state (also referred to as a shifting state), a parking state, a driving state, or a P gear state.
  • the first service is allowed to be accessed (or accessed is prohibited), and the data corresponding to the first service is also allowed to be accessed (or accessed is prohibited).
  • the running state is a driving state
  • the first service is a video and audio service
  • access to the first service is prohibited.
  • the surrounding environment attribute represents the environment where the vehicle is located.
  • the surrounding environment may include an urban area or a suburban area, and this is only an example. For example, compared with urban areas, the risk of personal data collection density in the suburbs is small, so some services can allow access.
  • the attributes shown above are only examples, and this embodiment of the present application does not limit the method for setting the attributes corresponding to the first service and the types of attributes.
  • the attribute information corresponding to the first service may also include access permission or access prohibition.
  • the first service allows access, set the attribute information of the data to allow access or prohibit access according to the mapping relationship between the service and the data.
  • set the attribute information of the sub-service to allow access and set the attribute information of the data to allow or prohibit access according to the mapping relationship between the service, the sub-service, and the data. It can be understood that, for the description of attributes, the following is also applicable.
  • the vehicle can obtain the attribute information corresponding to the first service, thereby setting the attribute information corresponding to the first service.
  • the attribute information of the data corresponding to the service is not need to set different attributes of the data one by one, but through the user's settings for the first service, the vehicle can obtain the attribute information corresponding to the first service, thereby setting the attribute information corresponding to the first service.
  • the attribute information of the data corresponding to the service is not need to set different attributes of the data one by one, but through the user's settings for the first service, the vehicle can obtain the attribute information corresponding to the first service, thereby setting the attribute information corresponding to the first service.
  • the 360 surround view service may include a first 360 surround view service, a second 360 surround view service, and a third 360 surround view service.
  • at least one attribute of the first 360 surround view service, the second 360 surround view service and the third 360 surround view service is different.
  • the 360 surround view service can include different vehicle usage scenarios.
  • the first 360 surround view service can be used by car owners during non-working hours
  • the second 360 surround view service can be used by car owners during working hours
  • the third 360 surround view service can be used by car owners during working hours. Services used by other users. It can be understood that the different classification methods for a certain service here are only examples.
  • the 360 surround view service may also include the fourth 360 surround view service, the fifth 360 surround view service, etc., which are not limited in this embodiment of the present application. It can be understood that for different classifications of other services, reference may be made to the description of the 360 surround view service, which is not limited in this embodiment of the present application.
  • the navigation service includes a first navigation service, a second navigation service, a third navigation service, and the like. At least one attribute of the first navigation service, the second navigation service, and the third navigation service is different.
  • the same service is further subdivided into services including different attributes.
  • the configuration of the attribute information of the data corresponding to the first service can be realized, which effectively improves the configuration efficiency.
  • the vehicle can set the attribute information of the data corresponding to the first service according to the mapping relationship between the service, the sub-service and the data, so as to determine the first service. Access rights to the data corresponding to the service.
  • the above is an example of a mapping relationship from a service to a sub-service and a mapping relationship from a sub-service to data, and this embodiment of the present application is applicable to a relationship between a sub-service and data. That is to say, when the services shown above are not included, the sub-services shown in the embodiment of the present application can also be understood as services.
  • the first service may also be distinguished according to different types of data.
  • the first service includes an image service, a voice service, and the like.
  • the first service further includes a text service.
  • the vehicle may set the attribute information of the data corresponding to the first service according to the mapping relationship between the service and the data, so as to determine the access authority of the data corresponding to the first service.
  • the vehicle may also set the attribute information of the sub-services and services corresponding to the data according to the data, sub-services, and the mapping relationship between services.
  • the first service may also include first image service, second image service, third image service, first voice service, second voice service, third voice service, first video service, second video service One or more of etc.
  • the above-mentioned first image service, second image service and third image service have at least one attribute different. At least one attribute of the first voice service, the second voice service and the third voice service is different.
  • the first image service is a face image
  • the second image service is a landscape image.
  • image service may also include fourth image service, fifth image service, etc., which are not limited in this embodiment of the present application.
  • the first service may also include other types of services, such as text services, which are not limited in this embodiment of the present application.
  • the first service shown in the embodiment of the present application is only an example, and the specific type or classification standard of the first service is not limited in the embodiment of the present application.
  • the first service can be understood as a user-oriented service.
  • the first service may also be understood as a service displayed on a display screen of the vehicle.
  • the second and the first interface are interfaces of vehicle usage scenarios.
  • the vehicle usage scenarios include private family scenarios, commercial vehicle scenarios, shared scenarios, driver-in-charge scenarios, and the like.
  • the private family scenario means that the data in the vehicle can only be obtained by family members.
  • different family members in this scenario can share data, share configuration, or maintain the same operation authority on the data).
  • the sub-services and data types involved in the commercial vehicle scenario are specific, and the customized scheme should be considered in the data access control scheme.
  • the mapping relationship between services, sub-services, and data can be different from other scenarios.
  • different permissions can be configured for different data.
  • the users of vehicles in shared scenarios may change frequently, for example, the data in the vehicle needs to be bound with the user's identity. It can be understood that for the description of the substitute driving scene, you can refer to the shared scene, which will not be described in detail here. It can be understood that other types or classifications of vehicle usage scenarios are not limited in this embodiment of the present application.
  • the vehicle use scene includes a first scene, a second scene, a third scene and so on.
  • the first scenario, the second scenario, and the third scenario are different in at least one of the following: one or more items of identification, usage time, usage location, running status, or surrounding environment.
  • the first interface is an interface of a vehicle usage scenario
  • the first interface is used to indicate the first service.
  • a vehicle usage scenario can be bound to a service.
  • the above-mentioned private family scene can be bound with 360 surround view service, automatic driving service, navigation service, etc.
  • the above-mentioned first scenario may be bound with a navigation service, a remote control service, and the like.
  • the vehicle configures the attribute information of the first data according to the attribute information corresponding to the first interface, the attribute information of the first data is used to determine the access right of the first data, and the first data is included in the data corresponding to the first service.
  • the vehicle may store associations among services, sub-services, and data.
  • the relationship among services, sub-services, and data reference may be made to the methods shown in FIG. 2 , FIG. 4a , FIG. 4b or FIG. 4c , and details will not be repeated here.
  • the method for the vehicle to configure the attribute information of the first data according to the setting instruction and the attribute information corresponding to the first interface reference may be made to the above, which will not be described in detail here.
  • the first data may be data 1
  • the first data may also be data 1 and data 2. That is to say, the first data may represent data corresponding to the first service, or the first data may also represent part of data in the data corresponding to the first service.
  • the vehicle can determine the access right of the first data according to the attribute information of the first data.
  • the attribute information of the first data includes one or more of identity attribute, time attribute, location attribute, vehicle running state attribute or surrounding environment attribute.
  • the vehicle can determine whether to allow the owner to access the first data, or whether to allow non-owners to access the first data, or whether to allow home users to access the first data according to the identity. first data etc.
  • the attribute information of the first data includes a time attribute. If the time attribute of the first data is working hours, it means that access to the first data is allowed during working hours.
  • the data corresponding to the first service further includes second data
  • the time attribute of the second data is non-working hours, which means that the first data can be accessed during non-working hours.
  • the attribute information of the first data may include an identity attribute and a time attribute.
  • the identity attribute is the car owner and the time attribute is the working time, it means that the car owner can access the first data during the working time. Understandably, reference may be made to the above description for attribute information, and details will not be described here.
  • configuring the attribute information of the first data according to the setting instruction and the attribute information corresponding to the first interface includes: configuring the first attribute information of the first data according to the setting instruction and the first attribute information corresponding to the first interface; or , configuring the second attribute information of the first data according to the setting instruction and the second attribute information corresponding to the first interface.
  • the first attribute information corresponding to the first interface is different from the second attribute information corresponding to the first interface in at least one of the following items:
  • the first attribute information of the first data is different from the second attribute information of the first data in at least one of the following items:
  • the first attribute information and the second attribute information may be of different types of attribute information.
  • the first attribute information may include an identity attribute, a time attribute, and a location attribute
  • the second attribute information may include an identity attribute and a time attribute.
  • the first attribute information includes an identity attribute
  • the second attribute information includes a time attribute.
  • the first attribute information includes an identity attribute
  • the second attribute information includes an identity attribute, a time attribute, and a location attribute.
  • the first attribute information and the second attribute information may also be understood as having different specific content of the attribute information.
  • the first attribute information includes identity attribute and time attribute, and the time attribute is working time
  • the second attribute information includes identity attribute and time attribute
  • the time attribute is non-working time
  • the first attribute information includes identity attribute, time attribute and location attribute, the time attribute is the working time
  • the identity attribute is the identity of the owner
  • the second attribute information includes the identity attribute and time attribute
  • the identity attribute It is the identity of a non-vehicle owner
  • the time attribute is non-working time.
  • first attribute information and the second attribute information are not only applicable to the description of the first attribute information corresponding to the first interface and the second attribute information corresponding to the first interface, but also applicable to the first attribute information of the first data.
  • the method shown in Figure 3 further includes:
  • the vehicle receives an access control request, which carries attribute information. And the vehicle outputs data corresponding to the attribute information.
  • the vehicle by carrying attribute information in the access control request, the vehicle can output data corresponding to the attribute information.
  • the attribute information carried in the access control request may include any one or more of the following: identity, such as the identity of the user who needs to access data; time attribute, such as the time attribute of the data to be accessed; location attribute, For example, the location attribute of the data that needs to be accessed; the operating status attribute; the surrounding environment attribute, etc.
  • the access control request may also carry an access object, so that the vehicle may output corresponding data according to the access object and the attribute information carried in the access control request.
  • the access objects carried in the access control request are data 1 and data 2
  • the attribute information of data 1 matches the attribute information carried in the access control request, but the attribute information of data 2 does not match the attribute information carried in the access control request, the vehicle Only data 1 is output, data 2 is denied access.
  • the method provided in the embodiment of the present application through the configuration of the first service, can realize the configuration of different attribute information of the data corresponding to the first service, thereby effectively improving the configuration efficiency of the data, and by configuring the data with different attribute information
  • the configuration can ensure that some data can be accessed and some data cannot be accessed, which improves data security.
  • the present application also supports users to configure data access control policies from the perspective of data categories (such as image categories or voice categories).
  • data categories such as image categories or voice categories
  • the data captured by the camera includes two types of video data and audio data
  • the video data is a combination of many image data.
  • the image may include license plate information, pedestrian information, road condition information, and the like. From the perspective of feature implementation, all the information that a very coarse-grained data can provide is often not needed in order to achieve the effect. For example, in order to judge the road conditions, the license plate information captured by the car camera and the face information of passers-by are not necessary.
  • the car owner configures from the perspective of data categories, the minimum use of data can be restricted to a certain extent, and the problem of data leakage can be improved.
  • the user can minimize the access rights of restricted data by configuring the service, so that not only the configuration of the data can be completed efficiently, but also the problem of data leakage can be improved, ensuring data security.
  • the present application supports users to configure data access control policies from the perspective of services or sub-services.
  • Figure 5a the entire architecture from root A to leaves can be expressed as the architecture from service A to sub-service a and sub-service b, and then to data 1, data 2 and data 3. Since the architecture is a directed acyclic graph from the perspective of data structure, the entire structure can be traversed using a graph traversal algorithm.
  • each node traversed will use “allow” to overwrite the previous configuration; when the user sets "deny” for the service A, the node maintains the previous configuration.
  • the node may be set to "deny" by default. After the structure rooted at service A is traversed, the structure rooted at service B is traversed in the same way.
  • the OEM development stage defines a complex data structure output as the final configuration result
  • the user configuration stage is to transfer a user perspective to the data source control point for the complex data structure configuration.
  • the permissions can be stored in the form of a long string of codes.
  • the encoding shown here can be understood as the encoding corresponding to the attribute information of the data configured on the vehicle.
  • the vehicle may store the configured attribute information of the first data in a coded form, so that when an access control request is received, the access right is determined through the code.
  • Fig. 5a is a schematic diagram of a configuration process provided by an embodiment of the present application.
  • 1 is used to indicate permission, and 0 is used to indicate agreement.
  • user A sets service 1 to allow access, as shown in Figure 5a, service 1 can be set to 1.
  • service 2 can be set to 0.
  • the vehicle can set access to sub-service 1 and sub-service 2 corresponding to service 1, set access to data 1 and data 2 corresponding to sub-service 1, and allow access to Data 2 and Data 3 corresponding to sub-service 2.
  • the methods shown in FIG. 5a and FIG. 5b take the attribute information corresponding to the service as one type, and at the same time, the attribute information of the data corresponding to the service is also one type as an example.
  • correlation operations may be used to obtain values.
  • an AND operation may be used to obtain a value, or a principle of 1 covering 0 may be used to obtain a value, or an OR operation may be used to obtain a value, which is not limited in this embodiment of the present application.
  • FIG. 5a and FIG. 5b as an example, in actual application, the vehicle can directly configure whether to allow data access according to FIG. 5b. According to the transfer direction of service decomposition and the principle that 1 covers 0 (just an example), the configuration result can be as shown in FIG. 5b.
  • the result of sub-service 1 is 1 (data 1 is set to 1) and 1 (data 2 is set to 1) ) If the operation result is 1, it means that sub-service 1 is available.
  • the result of service 2 is the operation result of 1 (for example, sub-service 2 is set to 1) and 0 (for example, sub-service 3 is set to 0). If 0, it means that service 2 is unavailable.
  • the result of service 1 is the AND operation result of sub-service 1 and sub-service 2, 1 and 1, and 1 is obtained, then service 1 is available.
  • service 3 can be initially set to 0 (indicating that access is prohibited).
  • FIG. 6 shows an example in which services such as images and sounds are set by the number of users. It can be understood that, regarding the configuration method, reference may be made to the above-mentioned embodiments, which will not be described in detail here.
  • the configuration result in Figure 6 can be transferred to the underlying data category.
  • the data 1 and data 2 corresponding to the configuration image are 1, and the data 3 and data 4 corresponding to the sound are 0.
  • the vehicle can configure sub-services and services according to the mapping relationship between data and sub-services, and the mapping relationship between sub-services and data. For example, since data 1 and data 2 correspond to sub-service 1, sub-service 1 can be set to 1. Since data 3 and data 4 correspond to sub-service 3, sub-service 3 can be set to 0.
  • sub-service 2 can be set to 0 (indicating that access is restricted limit, or indicates that sub-service 2 is unavailable in certain scenarios). That is to say, from the underlying data layer upwards (such as sub-services or services), the result of sub-service 1 is the operation result of 1 and 1, that is, 1 (indicating that sub-service 1 allows access, or that sub-service 1 is available, or Indicates that the use of subservice 1 is unlimited).
  • the result of service 2 is 0, indicating that service 2 is unavailable.
  • the result of service 1 is the AND operation result of sub-service 1 and sub-service 2, that is, if the operation result of 1 and 0 is 0, it means that the use of service 1 is limited, or that service 1 is unavailable in some scenarios.
  • the configurations in the embodiment of the present application are simplified to 0 and 1 for the convenience of presentation, but in the specific embodiment, it can also be represented by encoding with more lengths.
  • the encoding result may also include identity (also called account information), time attributes, location attributes, or vehicle usage scenarios, etc.
  • identity also called account information
  • time attributes also called time attributes
  • location attributes also called vehicle usage scenarios, etc.
  • the final service availability data should also be jointly judged in conjunction with these contextual contents.
  • FIG. 7 is a schematic diagram of a configuration process provided by an embodiment of the present application. It can be understood that the schematic diagram shown in FIG. 7 can be understood as a mapping relationship between services and data. Alternatively, the schematic diagram shown in FIG. 7 can also be understood as omitting sub-services.
  • the schematic diagram shown in Figure 7 can also be understood as an example based on the schematic diagram shown in Figure 6, such as remote monitoring and sentinel services can be equivalent to service 1 and service 2 shown in
  • the inner video can be understood as different image types (or different video types, etc.) as shown in FIG. 6 .
  • sub-services and data are omitted in the schematic diagram shown in FIG. 7 .
  • the first layer in FIG. 7 may respectively represent the owner account and the guest account, that is, the identity marks are different.
  • the second layer can represent the settings of different users for different services. For example, the user corresponding to the owner account (such as user 1) sets the remote monitoring and sentinel services to allow access (such as 1) and access access (such as 1) respectively.
  • the user corresponding to the guest account sets the remote monitoring and sentry services to prohibit access (such as 0) and prohibit access (such as 0) respectively.
  • the configuration result of remote monitoring can be 10, the first digit in 10 indicates the configuration result of user 1 on remote monitoring, and the second digit indicates the configuration result of user 2 on remote monitoring.
  • the configuration result of the sentinel service may be 10, the first digit in 10 indicates the configuration result of user 1 on the sentinel service, and the second digit indicates the configuration result of user 2 on the sentinel service.
  • the remote monitoring and sentinel services both correspond to the data corresponding to the video outside the car, and the remote monitoring corresponds to the data corresponding to the video inside the car.
  • the configuration result of the video outside the car is 1010.
  • the first digit of this 1010 represents the configuration result of user 1 for remote monitoring
  • the third digit represents the configuration result of user 1 for sentry monitoring
  • the second digit represents User 2's configuration result of remote monitoring
  • the fourth digit indicates user 2's configuration result of Sentinel service.
  • the configuration result of time frequency in the car is 1000
  • the first digit of the 1000 indicates the configuration result of user 1 for remote monitoring (that is, access is allowed)
  • the second digit indicates the configuration result of user 2 for remote monitoring (i.e. allow access).
  • both the third and fourth digits can be configured as initialized values, such as 0. It can be understood that the encoding manners corresponding to the services and data shown in FIG. 7 are only examples, and are not limited in this embodiment of the present application.
  • the present application provides a vehicle system to realize fine-grained personal data access policies and data control in the vehicle system, and supports the semantic level configuration of the input setting layer (such as input setting Layer-by-layer input setting instructions, etc.) are decomposed into executable policies layer by layer, providing a general framework and implementation methods that are independent of the context of business processing.
  • the above method provided by the present application also has the following effects:
  • the method provided by this application can satisfy the access control scenario of data in the vehicle by layering and decoupling the relationship between services, sub-services and data, or decoupling the preference configuration of data categories and business service logic , the data may include not only data generated by the vehicle, but also important data that needs extra protection.
  • the method provided in this application can support various vehicle platform architectures, such as componentized development platforms (such as vehicle digital platforms).
  • vehicle platform architectures such as componentized development platforms (such as vehicle digital platforms).
  • the method provided by the embodiment of the present application can be implemented if the OEM configures (or defines) the hierarchical structure between the service and the data in advance.
  • the vehicle can also be rapidly developed to realize the control of the vehicle protection data according to the predefined global characteristics of the vehicle and the general configuration of the global data source of the vehicle.
  • the method provided by this application can also update configuration files (such as the mapping relationship between services and sub-services, and the mapping relationship between sub-services and data) through OTA upgrades or diagnostic methods, or be understood as updating services, sub-services, and sub-services.
  • configuration files such as the mapping relationship between services and sub-services, and the mapping relationship between sub-services and data
  • the classification of services and data or update the hierarchical structure of data classification, so as to realize the update of services or the issuance of compliance dynamic policies, and achieve the effect of personalized data protection experience or fast compliance.
  • the method provided by this application can execute the data access control strategy according to the setting instructions, configure the data, and the internal policy conversion and control flow flow can not be overly perceived by the user, or the user can realize data access without too much intervention. configuration.
  • the present application divides the functional modules of the data access control device according to the above method embodiments.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of modules in this application is schematic, and is only a logical function division, and there may be other division methods in actual implementation.
  • the data access control apparatus according to the embodiment of the present application will be described in detail below with reference to FIG. 8 to FIG. 10 .
  • Fig. 8 is a schematic structural diagram of a data access control device provided by an embodiment of the present application.
  • the device may be used to perform the functions or steps performed by the vehicle shown above, etc.
  • the device includes a receiving unit 801 and a processing unit 802 .
  • the device further includes an output unit 803 .
  • the receiving unit 801 is configured to receive a setting instruction, the setting instruction is a setting instruction for a first interface, the first interface is used to indicate a first service, and the first interface corresponds to attribute information;
  • the processing unit 802 is configured to configure the attribute information of the first data according to the attribute information corresponding to the first interface, the attribute information of the first data is used to determine the access authority of the first data, and the first data is included in the data corresponding to the first service middle.
  • the receiving unit 801 may receive a setting instruction through a display screen.
  • a user may input a setting instruction through a display screen, so that the receiving unit 801 receives the setting instruction.
  • the receiving unit 801 is further configured to receive an access control request, where the access control request carries attribute information;
  • An output unit 803 configured to output data corresponding to attribute information.
  • the processing unit 802 may determine the data corresponding to the attribute information carried in the access control request according to the access control request and the attribute information of the data. It can be understood that the above-mentioned output unit may output the above-mentioned data corresponding to the attribute information to other devices, or may output the above-mentioned data corresponding to the attribute information from the processing unit to other processing units in the vehicle system. This is not limited.
  • the descriptions of the receiving unit 801, the processing unit 802, and the output unit 803 shown in the embodiment of the present application are only examples. The method embodiment will not be described in detail here.
  • the receiving unit 801, the processing unit 802, and the output unit 803 may be respectively deployed in different physical entities, or deployed in the same physical entity (such as in a chip or an integrated circuit).
  • the processing unit 802 may be deployed in a domain controller or an ECU.
  • the receiving unit 801 may be deployed in other ECUs, or in a transceiver.
  • the output unit 803 and the processing unit 802 may be deployed in the same physical entity, for example, both are deployed in a domain controller or an ECU.
  • the output unit 803 and the processing unit 802 may be deployed in different physical entities.
  • the output unit 803 may be deployed in a transceiver. It can be understood that the product form corresponding to each unit shown above is only an example, and the embodiment of the present application does not limit the product form of each unit. It can be understood that the data access control apparatus shown in FIG. 10 below is only an example, and should not be construed as a limitation to this embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a data access control device provided by an embodiment of the present application.
  • the device may be used to perform the functions or steps performed by the server (including the OEM server and/or upgrade server, etc.) shown above.
  • the device includes a processing unit 901 and a sending unit 902 .
  • the processing unit 901 is configured to determine configuration information; the sending unit 902 is configured to output the configuration information.
  • the sending unit 902 may send configuration information to the vehicle through a transceiver.
  • the sending unit 902 may output the configuration information from the processing unit 901 through a communication interface (also referred to as an interface or a pin, etc.).
  • the description of the configuration information can refer to the description of the mapping relationship between services and sub-services and the mapping relationship between sub-services and data shown above, which will not be detailed here. stated. It can be understood that, for the description of the relationship between the interface and the service, the relationship between the service and the data, the relationship between the service and the sub-service, the relationship between the sub-service and the data, the attribute information of the first data, etc., you can refer to the method embodiment shown above , which will not be described in detail here. For example, refer to the method shown in FIG. 3 . For another example, refer to FIG. 4a to FIG. 4c. For another example, reference may be made to FIG. 5a to FIG. 5c. For another example, reference may be made to FIG. 6 or FIG. 7 .
  • processing unit 901 and the sending unit 902 shown in the embodiment of the present application is only an example.
  • the processing unit 901 and the sending unit 902 may be respectively deployed in different physical entities, or deployed in the same physical entity (such as in a chip or an integrated circuit).
  • FIG. 8 the description shown in FIG. 8 , which will not be described in detail here.
  • FIG. 10 is a schematic structural diagram of a data access control device 100 provided by an embodiment of the present application.
  • the data access control device shown in FIG. 10 can be used to execute the functions or steps shown in the vehicle above.
  • the data access control device shown in FIG. 10 can be used to execute the functions or steps shown by the server above.
  • the apparatus 100 may include at least one processor 1001 and a communication interface 1002 .
  • a bus 1003 may also be included.
  • at least one memory 1004 may also be included, where the processor 1001 , the communication interface 1002 and the memory 1004 are connected through a bus 1003 .
  • Processor 1001 is a module for performing arithmetic operations and/or logical operations, specifically, it may be a central processing unit (central processing unit, CPU), a picture processor (graphics processing unit, GPU), a microprocessor (microprocessor unit, MPU), Domain controller, ECU, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable logic gate array (Field Programmable Gate Array, FPGA), complex programmable logic device (Complex programmable logic device, CPLD) and other processing modules one or a combination of more.
  • the communication interface 1002 is used to receive data sent from the outside (including the setting instructions shown in this application) and/or send data to the outside, and can be a wired link interface such as an Ethernet cable, or a wireless link (Wi -Fi, Bluetooth, general wireless transmission, etc.) interface.
  • the communication interface 1002 may further include a transmitter (such as a radio frequency transmitter, an antenna, etc.) or a receiver coupled with the interface.
  • Memory 1004 is used to provide a storage space, in which data such as operating systems and computer programs can be stored.
  • Memory 1601 can be random access memory (random access memory, RAM), read-only memory (read-only memory, ROM), erasable programmable read-only memory (erasable programmable read only memory, EPROM), or portable read-only memory One or more combinations of memory (compact disc read-only memory, CD-ROM), etc.
  • the processor 1001 in the device 100 is configured to read the computer program stored in the memory 1004 to execute the aforementioned data access control method, such as the method described in FIG. 3 .
  • the embodiment of the present application also provides a chip system, the chip system includes at least one processor and a communication interface, the communication interface is used to input and/or output data, and the at least one processor is used to call at least one memory
  • the stored computer program enables the device where the chip system is located to implement the OEM server or vehicle method in the embodiment shown in FIG. 3 .
  • the communication interface is used to input setting instructions; the processor is used to configure the attribute information of the first data according to the setting instructions.
  • the processor is used to determine configuration information
  • the communication interface is used to output configuration information
  • the at least one processor can be one or more combinations of processing modules such as CPU, GPU, MPU, ASIC, FPGA, CPLD, coprocessor (to assist the central processing unit to complete corresponding processing and applications), MCU, etc. .
  • An embodiment of the present application also provides a wireless communication system, the wireless communication system includes a vehicle and a server, and the vehicle and the server can be used to execute the method in any of the foregoing embodiments (as shown in FIG. 3 ).
  • the present application also provides a computer program, which is used to implement the operations and/or processing performed by the vehicle in the method provided in the present application.
  • the present application also provides a computer program, which is used to implement the operations and/or processing performed by the server in the method provided in the present application.
  • the present application also provides a computer-readable storage medium, where computer code is stored in the computer-readable storage medium, and when the computer code is run on the computer, the computer is made to perform the operations performed by the vehicle in the method provided by the present application and/or deal with.
  • the present application also provides a computer-readable storage medium, where computer code is stored in the computer-readable storage medium, and when the computer code is run on the computer, the computer is made to perform the operations performed by the server in the method provided by the present application and/or deal with.
  • the present application also provides a computer program product, the computer program product includes computer code or computer program, when the computer code or computer program runs on the computer, the operation and/or processing performed by the vehicle in the method provided by the present application be executed.
  • the present application also provides a computer program product, the computer program product includes computer code or computer program, when the computer code or computer program runs on the computer, the operation and/or processing performed by the server in the method provided by the present application be executed.
  • the computer can be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted via a computer-readable storage medium.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (solid state disk, SSD)) and the like.
  • the modules in the device embodiment of the present application can be combined, divided and deleted according to actual needs.

Landscapes

  • Traffic Control Systems (AREA)

Abstract

本申请实施例提供一种数据访问控制方法及装置,应用于通信技术、车联网领域,该方法包括:车辆接收设置指令,该设置指令为针对第一接口的设置指令,该第一接口用于指示第一服务,该第一接口对应有属性信息;车辆根据该第一接口对应的属性信息配置第一数据的属性信息,该第一数据的属性信息用于确定第一数据的访问权限,第一数据包含于第一服务对应的数据中。本申请实施例合理有效地对数据进行访问控制,提高了数据访问控制的效率。

Description

数据访问控制方法及装置 技术领域
本申请涉及车联网、通信技术领域,尤其涉及一种数据访问控制方法及装置。
背景技术
随着信息通信技术(information and communications technology,ICT)的高速发展,个人数据流动规模也越来越大。同时,伴随着智能运输设备(如车辆)智能化的快速发展趋势,个人(如驾驶车辆的驾驶员)数据就很容易受到泄露。
为了尽可能降低由于个人数据泄露给驾驶员带来的不良影响,因此如何对车辆的数据进行访问控制亟待解决。
发明内容
本申请实施例提供了一种数据访问控制方法及装置,能够合理有效地对数据进行访问控制,增加数据的安全性。
第一方面,本申请实施例提供一种数据访问控制方法,所述方法包括:
接收设置指令,所述设置指令为针对第一接口的设置指令,所述第一接口用于指示第一服务,所述第一接口对应有属性信息;根据所述第一接口对应的属性信息配置第一数据的属性信息,所述第一数据的属性信息用于确定所述第一数据的访问权限,所述第一数据包含于所述第一服务对应的数据中。
本申请实施例中,通过第一服务与第一数据的对应关系,结合第一接口对应的属性信息就可以完成对第一数据的属性信息的配置,有效提高了对数据进行访问控制的效率。另外,该第一数据需要被访问时,数据访问控制装置可以根据该第一数据的属性信息确定该第一数据的访问权限,从而实现了对数据进行有效保护的目的。
可选的,设置指令用于指示是否允许访问第一服务。可选的,根据所述第一接口对应的属性信息配置第一数据的属性信息,包括:根据所述第一接口对应的属性信息以及所述设置指令配置所述第一数据的属性信息。可理解,本申请实施例所示的数据还可以称为数据源等,本申请实施例对于数据的具体名称不作限定。
在一种可能的实现方式中,所述方法还包括:获取配置信息,所述配置信息包括所述第一服务与所述第一数据的对应关系;
所述根据所述第一接口对应的属性信息配置第一数据的属性信息,包括:
根据所述第一接口对应的属性信息以及所述配置信息配置所述第一数据的属性信息。
本申请实施例中,配置信息可以用于表示服务与数据的对应关系。可选的,配置信息用于指示服务与子服务之间的对应关系,以及子服务与数据之间的对应关系。通过对服务、子服务以及数据之间的对应关系进行分层解耦,可实现车辆内部细粒度的个人数据访问策略,提高数据访问控制的效率。
在一种可能的实现方式中,所述第一服务包括第一子服务和/或第二子服务,所述第一 子服务和/或所述第二子服务对应的数据包括所述第一数据。
在一种可能的实现方式中,所述第一服务对应的子服务与第二服务对应的子服务不同,或者,所述第一服务对应的子服务与第二服务对应的子服务部分重叠。
在一种可能的实现方式中,所述第一服务对应的子服务与所述第二服务对应的子服务至少有以下任一项不同:
图像采集子服务、语音采集子服务或雷达分析子服务。
在一种可能的实现方式中,所述根据所述第一接口对应的属性信息配置第一数据的属性信息,包括:根据所述设置指令,以及所述第一接口对应的第一属性信息配置所述第一数据的第一属性信息;或者,根据所述设置指令,以及所述第一接口对应的第二属性信息配置所述第一数据的第二属性信息。
示例性的,设置指令可以用于设置是否允许访问第一服务。由此,车辆可以根据是否允许访问第一服务,以及第一服务的属性信息(如第一接口为第一服务的接口)配置第一数据的属性信息。
在一种可能的实现方式中,所述第一数据的第一属性信息和所述第一数据的第二属性信息至少有以下任一项不同:
身份标识属性、时间属性、位置属性、运行状态属性或周边环境属性。
在一种可能的实现方式中,所述设置指令为针对第一接口的设置指令,包括:所述设置指令为针对所述第一服务的设置指令。
在一种可能的实现方式中,所述第一服务包括以下任一项或多项:
360环视服务、哨兵服务、自动驾驶服务、辅助驾驶服务、自动泊车服务、远程控制服务、导航服务或访客模式服务。
示例性的,所述360环视服务包括第一360环视服务、第二360环视服务或第三360环视服务中的任一项或多项。哨兵服务包括第一哨兵服务、第二哨兵服务或第三哨兵服务中的任一项或多项。自动驾驶服务包括第一自动驾驶服务、第二自动驾驶服务或第三自动驾驶服务中的任一项或多项。示例性的,所述第一360环视服务、所述第二360环视服务或所述第三360环视服务至少有以下一项属性不同:身份标识属性、时间属性、位置属性、运行状态属性或周边环境属性。
在一种可能的实现方式中,所述第一服务包括以下任一项或多项:图像服务、声音服务或文本服务。
在一种可能的实现方式中,所述第一接口为针对车辆使用场景的接口,所述车辆使用场景绑定有所述第一服务,所述第一接口对应有属性信息包括:所述车辆使用场景携带有所述属性信息。
在一种可能的实现方式中,所述车辆使用场景包括以下任一项或多项:第一场景、第二场景或第三场景。
在一种可能的实现方式中,所述第一场景、所述第二场景或所述第三场景至少有以下一项属性不同:身份标识属性、时间属性、位置属性、运行状态属性或周边环境属性。
在一种可能的实现方式中,所述方法还包括:接收访问控制请求,所述访问控制请求携带属性信息;输出与所述属性信息对应的数据。
示例性的,访问控制请求所携带的属性信息可以包括以下任一项或多项:身份标识,如需要访问数据的用户的身份标识;时间属性,如需要访问的数据的时间属性;位置属性,如需要访问的数据的位置属性;运行状态属性;周边环境属性等。可选的,访问控制请求还可以携带访问对象,由此,车辆可以根据该访问对象以及访问控制请求中携带的属性信息输出对应的数据。例如,访问控制请求携带的访问对象为数据1和数据2,数据1的属性信息与访问控制请求携带的属性信息匹配,而数据2的属性信息与访问控制请求携带的属性信息不匹配,则车辆仅输出数据1,数据2被拒绝访问。
第二方面,本申请实施例提供一种数据访问控制方法,所述方法包括:
确定配置信息,所述配置信息包括第一服务与第一数据的对应关系,以及所述第一数据的属性信息,所述第一数据的属性信息用于确定所述第一数据的访问权限,所述第一数据包含于所述第一服务对应的数据中;向车辆发送所述配置信息。
可理解,本申请实施例所示的第一数据的属性信息可以理解为服务器下发配置信息时,该配置信息中包括服务所对应的数据的属性,或者,也可以理解为配置信息中包括服务所对应的数据的属性信息为初始值。可理解,服务器可以为数据的属性信息设置初始值,或者,也可以都设置为保留(reserved)等,本申请实施例对此不作限定。示例性的,车辆根据设置指令可以配置第一数据的属性信息的具体取值或具体赋值。
可理解,本申请实施例提供的方法可以应用于数据访问控制装置,该数据访问控制装置可以包括原始设备制造商(original equipment manufacturer,OEM)服务器,或者本地服务器,或者云端服务器等,本申请实施例对此不作限定。
本申请实施例中,通过向车辆发送配置信息,可使得车辆根据该配置信息进行数据访问控制,不仅可以实现高效的数据访问控制,而且还可以对数据进行有效的保护。
在一种可能的实现方式中,所述第一服务包括第一子服务和/或第二子服务,所述第一子服务和/或所述第二子服务对应的数据包括所述第一数据。
在一种可能的实现方式中,所述第一服务对应的子服务与第二服务对应的子服务不同,或者,所述第一服务对应的子服务与第二服务对应的子服务部分重叠。
在一种可能的实现方式中,所述第一服务对应的子服务与所述第二服务对应的子服务至少有以下任一项不同:图像采集子服务、语音采集子服务或雷达分析子服务。
第三方面,本申请实施例提供一种数据访问控制装置,包括接收单元和处理单元。所述数据访问控制装置用于实现第一方面或第一方面的任意一种可能的实现方式所描述的方法。
可选的,所述数据访问控制装置还包括输出单元。
第四方面,本申请实施例提供一种数据访问控制装置,包括处理单元和发送单元。所述数据访问控制装置用于实现第二方面或第二方面的任意一种可能的实现方式所描述的方法。
第五方面,本申请实施例提供一种数据访问控制装置,包括处理器和存储器,所述处理器和存储器相互连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行上述第一方面的方法。
可选的,所述数据访问控制装置还包括收发器,所述收发器用于接收和/或发送信号(如 包括数据或指令等)。
第六方面,本申请实施例提供一种数据访问控制装置,包括处理器和存储器,所述处理器和存储器相互连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行上述第二方面的方法。
可选的,所述数据访问控制装置还包括收发器,所述收发器用于接收和/或发送信号(如包括数据或指令等)。
第七方面,本申请实施例提供了一种芯片系统,所述芯片系统包括至少一个处理器,用于支持实现上述第一方面所涉及的功能。可选的,所述芯片系统还包括通信接口。
例如,处理器可以用于控制通信接口输入设置指令或配置信息等。又例如,处理器可以用于配置数据的属性信息。
第八方面,本申请实施例提供了一种芯片系统,所述芯片系统包括至少一个处理器,用于支持实现上述第二方面所涉及的功能。可选的,所述芯片系统还包括通信接口。
例如,处理器可以用于确定配置信息。又例如,处理器可以用于控制通信接口输出配置信息。
第九方面,本申请实施例提供了一种计算机可读存储介质,所述计算机存储介质存储有计算机程序,当其在计算机上运行时,使得上述第一方面或第一方面的任意可能的实现方式所示的方法被执行。
第十方面,本申请实施例提供了一种计算机可读存储介质,所述计算机存储介质存储有计算机程序,当其在计算机上运行时,使得上述第二方面或第二方面的任意可能的实现方式所示的方法被执行。
第十一方面,本申请实施例提供一种计算机程序产品,该计算机程序产品包括计算机程序,当其在计算机上运行时,使得上述第一方面或第一方面的任意可能的实现方式所示的方法被执行。
第十二方面,本申请实施例提供一种计算机程序产品,该计算机程序产品包括计算机程序,当其在计算机上运行时,使得上述第二方面或第二方面的任意可能的实现方式所示的方法被执行。
第十三方面,本申请实施例提供一种计算机程序,该计算机程序在计算机上运行时,上述第一方面或第一方面的任意可能的实现方式所示的方法被执行。
第十四方面,本申请实施例提供一种计算机程序,该计算机程序在计算机上运行时,上述第二方面或第二方面的任意可能的实现方式所示的方法被执行。
第十五方面,本申请实施例提供一种通信系统,所述通信系统包括车辆和服务器,所述车辆用于执行第一方面或第一方面的任意可能的实现方式,所述服务器用于执行第二方面或第二方面的任意可能的实现方式。
附图说明
图1a和图1b是本申请实施例提供的一种通信系统的架构示意图;
图2是本申请实施例提供的一种车辆系统的结构示意图;
图3是本申请实施例提供的一种数据访问控制方法的流程示意图;
图4a至图4c是本申请实施例提供的一种服务、子服务与数据之间的映射关系示意图;
图5a至图5c是本申请实施例提供的一种配置过程的示意图;
图6是本申请实施例提供的一种配置过程的示意图;
图7是本申请实施例提供的一种配置过程的示意图;
图8至图10是本申请实施例提供的一种数据访问控制装置的结构示意图。
具体实施方式
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地描述。
本申请的说明书、权利要求书及附图中的术语“第一”和“第二”等仅用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备等,没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元等,或可选地还包括对于这些过程、方法、产品或设备等固有的其它步骤或单元。
在本文中提及的“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员可以显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
在本申请中,“至少一个(项)”是指一个或者多个,“多个”是指两个或两个以上,“至少两个(项)”是指两个或三个及三个以上,“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系,例如,“A和/或B”可以表示:只存在A,只存在B以及同时存在A和B三种情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指这些项中的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,“a和b”,“a和c”,“b和c”,或“a和b和c”。
本申请提供一种数据访问控制方法及装置,本申请提供的数据访问控制方法不仅可以应用到车联网领域中,提供了一种不绑定特定业务场景的数据访问控制方法,而且改善了用户进行复杂配置的问题,使得用户不必进行复杂的配置,不必感知配置策略到策略生效的复杂转换关系,就可以实现高效的数据访问控制。另外,本申请提供的方法通过对数据进行配置,还可以对数据进行有效的保护。
可选的,本申请提供的方法可以将用户的同意或用户的偏好设置等,转换成域控制器或电子控制单元(electronic control unit,ECU)等可理解、可执行的功能或服务访问控制策略、数据采集执行策略的通用方法。可选的,本申请提供的方法可以覆盖从原始设备制造商(original equipment manufacturer,OEM)设计开发阶段的数据功能设计开发,到用户用车实施数据访问的全流程数据生命周期管理。
下面对本申请实施例的系统架构进行描述。需要说明的是,本申请描述的系统架构是为了更加清楚的说明本申请的技术方案,并不构成对于本申请提供的技术方案的限定,随 着系统架构的演变和新业务场景的出现,本申请提供的技术方案对于类似的技术问题,同样适用。
图1a是本申请实施例提供的一种通信系统的架构示意图。如图1a所示,可选的,该通信系统包括:车辆和服务端。可选的,该通信系统包括车辆和应用(application,APP)。可选的,该通信系统包括车辆、服务端和APP。
示例性的,服务端可以包括云端,云端可以包括云端服务器和/或云端虚拟机。或者,服务端可以包括OEM服务器、本地服务器等。例如,服务端可以与车辆进行通信,从而为车辆提供多种服务,例如空中升级(over the air,OTA)服务、高精地图服务、自动驾驶或辅助驾驶服务等。如图1a所示,云端作为数据处理的核心区域,可以对接第三方,或承担监管机构的审计等。可理解,图1a是以云端为例示出的,但是,本申请实施例所示的服务端还可以包括OEM服务器或本地服务器等,本申请实施例对此不作限定。示例性的,OEM服务器可以向车辆发送配置信息。示例性的,OTA升级服务器也可以向车辆发送配置信息。示例性的,配置信息和更新的配置信息可以由一种服务器确定,或者,也可以由不同的服务器确定等,本申请实施例对此不作限定。示例性的,可以由OEM服务器向车辆提供配置信息,如图1b所示,由OTA升级服务器向车辆提供更新的配置信息。可选的,OTA升级服务器还可以为车辆提供OTA升级等,本申请实施例不作限定。为便于描述,下文所示的方法实施例将以OEM服务器(如还可以是升级服务器或云端等)向车辆发送配置信息为例说明本申请实施例提供的方法。
示例性的,车辆作为主要的数据采集方,是与云端等进行数据交互的主要参与方。例如,该数据可以包括车内个人数据、用户录入的数据、音视频数据、车辆自身的数据等。如图1a所示,车辆不仅可以与云端进行通信,还可以与其他设备交互。如该其他设备包括交通基础设施、其他车辆、诊断仪、智能车钥匙或充电桩等。因此,车辆内的数据是多种多样的。
示例性的,车辆可以通过无线通信的方式与云端交互信息,该无线通信可以遵循车辆所接入网络的无线协议,例如车与任何事物(vehicle-to-everything,V2X,X可以代表任何事物)通信,又例如,蜂窝网的V2X等。例如,该V2X可以包括:车辆到车辆(vehicle to vehicle,V2V)通信,车辆与基础设施(vehicle to infrastructure,V2I)通信、车辆与行人之间的通信(vehicle to pedestrian,V2P)或车辆与网络(vehicle to network,V2N)通信等。例如,该蜂窝网例包括长期演进(long term evolution,LTE)无线网络或第五代(5th generation,5G)无线网络等。
示例性的,上述应用可以包括手机APP。例如,用户通过该手机APP可以与云端交互,如传输数据等。例如,该手机APP还可以理解为是用户与车辆、云端交互的媒介。
可理解,图1a所示的通信系统仅为示例,在具体实现中,可能会包括比图1a所示的系统更多或更少的设备等,本申请实施例对此不作限定。
从上述通信系统可以看出,车辆内的数据是多种多样的,因此,用户的同意或偏好设置等过于复杂。然而,通过本申请提供的方法,可以有效改善过于复杂的配置,简化数据的配置过程。可选的,如图1a所示,当不同设备访问车辆内的数据时,车辆还可以依据本申请提供的方法输出访问对象。
图2是本申请实施例提供的一种车辆系统的结构示意图。如图2所示,该车辆系统包括:系统设计模型分析模块、策略映射模块、用户配置解析模块。示例性的,上述三个模块可以分别部署于不同的物理实体内,也可以部署于同一个物理实体内等,本申请实施例对此不作限定。可理解,对于上述模块所对应的物理实体,本申请实施例不作限定。示例性的,上述模块可以部署于车辆内具有响应能力的计算单元。例如,上述三个模块可以分别部署于不同的车内计算节点。又例如,上述三个模块可以分别部署于不同的域控制器(domain controller,DC)中。又例如,上述三个模块可以分别部署于不同的ECU中。又例如,上述三个模块中的一个模块部署于域控制器中,其他两个模块部署于ECU中。又例如,上述三个模块中的一个模块部署于ECU中,其他两个模块部署于域控制器中。示例性的,上述三个模块也可以集成于一个模块中等,本申请实施例对此不作限定。例如,上述三个模块可以都包含于车辆内的数据解析逻辑模块。可理解,本申请示出的ECU可以包括负责与远端进行通信的汽车盒子(telematics BOX,Tbox)、远程信息控制单元(telematics control unit,TCU)、网关(gateway)、电池管理系统(battery management system,BMS)或车控制单元(vehicle control unit,VCU)中的一项或多项等。这里所示的远端可以表示车外的设备或装置等。例如,远端包括路侧单元(road side unit,RSU)、云端或蓝牙钥匙中的一项或多项等。
以下对上述三个模块进行详细描述。
系统设计模型分析模块:可以对接OEM在整车功能设计阶段,该系统设计模型分析模块的输入可以为一个结构化的数据流建模文件(也可以称为建模文件),也可以理解为下文所示的配置信息。该数据流建模文件可以理解为本申请示出的服务与数据之间的关联关系文件,或者,服务、子服务以及数据之间的关联关系文件。例如,该服务、子服务与数据之间的关系可以是有向图结构,或者是树状结构等。可理解,关于服务、子服务以及数据之间的关系还可以参考本申请其他实施例,这里先不一一详述。
示例性的,服务可以理解为是面向用户的顶层服务,如360环视服务,可以向车主提供360度采集车辆周围的图像数据的服务。一般的,车辆如智能汽车通常会提供多个服务,如提供几个到几十个不等的服务,这些服务从基础体验增强到售后维保,可以覆盖车辆生命周期的各类场景,涵盖范围比较广。可理解,本申请示出的服务还可以理解为特性等,本申请对于服务的具体名称不作限定。可理解,这里所示的360环视服务仅为示例,本申请示出的服务还可以包括哨兵服务、自动驾驶服务、辅助驾驶服务、自动泊车服务、远程控制服务、导航服务、访客模式服务等。
为了实现一个服务,通常需要多个子服务来支撑。可理解,本申请示出的子服务还可以理解为功能等,本申请对于该子服务的具体名称不作限定。如为了实现一个特性,通过需要实现一系列的功能。如360环视服务和哨兵服务都会使用到摄像头感应子服务,因此摄像头感应可以作为一个公用的子服务功能,同时被两个服务使用。又如导航服务可以用到麦克风声音采集子服务、车体传感器数据获取子服务等。从而实现不同的业务目标,为用户带来不同的服务体验。
为了实现一个服务或子服务,通常就涉及到对数据流或者数据的操作。与数据对应的 操作包括数据读和数据写,当数据在系统(如车辆对应的系统)内流转时,需要读取的功能会从数据流中读取数据,需要写入的功能会向数据流中写入数值。由此,不论是服务还是子服务最终都会关联到数据。例如,摄像头可以关联视频数据和音频数据,而视频数据可以包括与人相关的数据和与人无关的数据。因此,本申请提供的方法中数据的分类标准可以以满足数据访问控制策略为基准,至于具体的分类标准本申请实施例不作限定。
本申请中,从服务(也可以称为特性)到子服务(也可以称为用于支持特性的功能)再到数据,在OEM对汽车系统的定义阶段,就可以形成一个自顶向下逐层展开的复杂结构。可选的,在汽车设计开发完成时,上述复杂结构可以通过一个建模文件进行表示然后预置到车端。可选的,当通过空中下载技术(over the Air,OΤΑ)对车辆系统进行服务更新时,本申请示出的服务、子服务以及数据之间的映射关系也可以被更新。系统设计模型分析模块通过对该建模文件进行读入与解析,生成能够由车辆系统理解的底层机器表示。即该系统设计模型分析模块的输入可以是上文所示的建模文件(即上文所示的服务、子服务与数据所对应的有向图结构文件),然后该模块将该建模文件加载到车辆系统内(如加载到内存数据库中),输出车辆系统能够理解的可执行的控制指令(也可以称为指令或策略等)。可理解,这里所示的建模文件也可以理解为上述示出的数据流建模文件。
换句话说,本申请中,在OEM开发阶段,可以向系统设计模型分析模块提供服务、子服务、数据的从上向下映射关系(如下文图4a所示的有向图结构)。可理解,当服务称为特性,子服务称为服务时,本申请示出的特性、功、数据的从上向下映射关系也可以称为特性分解。通过对系统整体架构(也可以称为服务、子服务以及数据的分解关联架构)进行建模,输出一个从顶层服务到底层数据的表示文件(也可以称为与顶层服务到底层数据的映射关系对应的表示文件)。其中的数据层级可以是粒度足够小的信息类别,如辅助驾驶服务所需的就会有路况图像,而对于账户登录服务所需的账户、密码或人脸识别元数据。可理解,本申请对于数据的粒度大小(也可以理解为分类标准)不作限定。例如,数据的粒度可以依据业务场景的需求设置,或者,数据的粒度可以依据法律法规需求设置,或者,数据的粒度可以由开发商自主设置等。
可选的,还可以向系统设计模型分析模块提供数据的层级分解结构(也可以称为数据分解),顶层(面向用户的层次可以称为顶层)表示传感器直接采集到的粗粒度数据,如摄像头对应的视频数据(还可以包括下文图6所示的图像和声音)。通过将传感器采集到的粗粒度数据进行逐层拆解,可以得到与服务、子服务以及数据类似的有向图结构。如图6所示,越向下表示越细的数据类别划分,最底层的数据粒度与服务、子服务、数据的最底层粒度对应,表示完成一个服务或子服务所需的最小数据范围,即原子数据类型。示例性的,图6所示的图像对应的数据1和数据2,也可以理解为是与服务1包括的子服务1和子服务2所对应的数据,声音对应的数据3和数据4,也可以理解为是与服务2包括的子服务2和子服务3对应的数据。
用户配置解析模块:对接车主或者授权用户在用车阶段,通过手机APP或者车云服务管理界面(portal)或者车机中控对车内的数据进行配置的阶段。此时车辆已交付到用户手中,用户应当允许了解车内的数据处理情况并通过一些机制对车内的数据访问控制策略进行配置。该用户配置解析模块的输入通常为用户界面(user interface,UI)上的设置指令, 该用户配置解析模块通过对设置指令进行处理能够输出车辆系统能够理解的控制指令(也可以称为结构化系统配置)。
策略映射模块:以系统设计模型分析模块和用户配置解析模块的输出为输入,从而根据本申请提供的方法实现对数据的处理。例如,该策略映射模块可以根据服务、子服务以及数据之间的表示文件和设置指令生成数据访问控制策略,从而实施将该数据访问控制策略关联到整车设计逻辑,并确保在车辆系统内部的生效。本申请所示的数据访问控制策略可以理解为是根据服务与子服务之间的映射关系,以及子服务与数据之间的映射关系以及用户输入的设置指令处理相关数据(如处理第一数据等)。如根据设置指令配置数据的属性信息。又如,根据设置指令调用与服务相关的子服务,或者,调用与子服务相关的数据。
可理解,以上各个模块的名称仅为示例,本申请实施例对于上述各个模块的具体名称不作限定。
图3是本申请实施例提供的一种数据访问控制方法的流程示意图。该方法可以应用于如图1a或图1b或图2所示的系统,例如,该方法可以应用于车辆。该车辆可以为汽车,也可以为其他形式机动车辆。示例性的,车辆可以为轿车、公交车、卡车、农用机车、游行花车、游乐园中的游戏车等形式的车辆。可选的,本申请提供的方法还可以应用于车辆中的域控制器或ECU等,本申请对于车辆的具体形态不作限定。
在介绍图3所示的方法之前,以下先详细介绍本申请涉及的服务、子服务以及数据之间的关系。
图4a是本申请实施例提供的一种服务、子服务与数据之间的关系示意图。如图4a所示,例如,终端设备包括服务A、服务B和服务C,服务A包括子服务a和子服务b,服务B包括子服务b和子服务c,服务C包括子服务d和子服务e。其中,服务A对应的子服务与服务B对应的子服务中重叠的子服务是子服务b。服务A对应的子服务与服务C对应的子服务完全不同。可理解,图4a示出的各个服务或子服务的关系仅为示例,不应将其理解为对本申请实施例的限定。可理解,本申请实施例对于图4a所示的服务的数量和与服务对应的子服务的数量也不作限定。
示例性的,服务A为视频监控服务,则为实现该360环视服务,需要多个子服务来支持,如子服务a可以为图像采集子服务,子服务b可以为语音采集子服务。服务B为导航服务,子服务c为雷达分析子服务。示例性的,如图像采集子服务可以通过图像采集传感器实现,语音采集子服务可以通过语音采集传感器实现,雷达分析子服务可以通过雷达传感器实现。可理解,这里所示的传感器与子服务之间的关系仅为示例,不应将其理解为对本申请的限定。即服务B的实现可以依赖于雷达分析子服务和语音采集子服务。示例性的,服务C可以为紧急呼叫服务。
示例性的,子服务a对应的数据可以包括数据1和数据2。如图像采集子服务对应的数据可以包括车牌数据、用户数据或路况数据等。子服务b对应的数据可以包括数据2和数据3。如语音采集子服务对应的数据可以包括用户数据或噪声数据等。子服务c对应的数据可以包括数据3和数据4。如雷达分析子服务对应的数据可以包括用户数据、历史导航数据、地图数据等。子服务d对应的数据包括数据5,子服务e对应的数据包括数据6。可理 解,子服务之所以会对应不同数据,是由于该不同数据的类型不同。因此,本申请实施例对于数据的具体类型或分类标准不作限定。该数据的具体类型(也可以称为类别)或分类标准可以依据业务场景的需求设置,或者,根据OEM的需求设置,或者,根据法律法规设置等,本申请实施例对此不作限定。
可理解,图4a所示的箭头可以表示服务包括一个或多个子服务,每个子服务对应有多个不同类型的数据。
图4b是本申请实施例提供的一种服务、子服务与数据之间的关系示意图。图4b所示的箭头之所以是从下向上可以表示数据1包含于子服务a对应的数据中,数据2既包含于子服务a对应的数据中,也包含于子服务b对应的数据中,数据3既包含于子服务b对应的数据中,也包含于子服务c对应的数据中。子服务a和子服务b包含于服务A对应的子服务中,同时,子服务b也对应服务B。子服务c包含于服务B对应的子服务中,或者,也可以理解为子服务c对应服务B。可理解,对于图4a和图4b来说,本申请所示的服务、子服务以及数据之间的映射关系可以是从上向下的映射关系,也可以是从下向上的包含关系,因此,下文所示的附图将以不带箭头的连接线表示服务、子服务以及数据之间的关系。可理解,关于该说明同样适用于图7所示的示意图。
示例性的,图4b所示的输入设置层可以理解为车辆系统内承载用户配置解析模块中的用户输入。例如,用户可以通过输入设置层输入设置指令。又如用户可以对服务A和/或服务B进行设置。车辆系统,如域控制器或ECU等基于服务与子服务之间的关系(如也可以称为图4b所示的子服务访问控制策略)调用与服务对应的子服务。即基于用户输入的设置指令,车辆系统可以调用与服务(即设置指令所指示的服务)对应的子服务。以及车辆系统还可以配置数据的属性信息。也就是说,通过接收设置指令,以及调用子服务,可以实现对数据的配置。同时,通过配置数据的属性信息可以实现对数据的使用权限的配置。
基于平台化整车架构设计,车辆内复杂多样的数据按照功能设计汇聚成应用程序接口(application programming interface,API)或子服务,供服务调用。根据用户配置解析模块接收到的设置指令结合系统设计模型分析模块输出的服务、子服务以及数据之间的映射关系,策略映射模块可以确定数据是否被允许访问或禁止访问。
示例性的,以图4b所示的数据2为例,如图4c所示。如对号表示服务A允许访问,叉号表示服务B禁止访问,则虚线部分表示数据2不允许在数据2、子服务b以及服务B的方向流动,实线部分表示数据2允许在数据2、子服务a服务A的方向流动。以及调用服务A时,其所对应的子服务a也允许访问,以及子服务a对应的数据2允许访问。调用服务B时,无法通过服务B对应的子服务b访问数据2。可选的,调用服务A时,其所对应的子服务b可以允许访问,以及子服务b对应的数据2允许访问。
可理解,以上所示的服务、子服务以及数据之间的关系仅为示例。本申请提供的方法同样适用于服务与数据之间的关系。例如,图4a至图4c中可以不包括子服务。或者,图4a至图4c中的一个或多个服务不包括子服务。
如图3所示,本申请提供的数据访问控制方法包括:
在一种可能的实现方式中,图3所示的方法包括步骤301和步骤302。
301、OEM服务器确定配置信息,该配置信息包括第一服务和第一数据的对应关系。
可选的,配置信息还包括第一数据的属性信息,该第一数据的属性信息用于确定第一数据的访问权限。可理解,本申请实施例所示的第一数据的属性信息可以理解为服务器下发配置信息时,该配置信息中包括服务所对应的数据的属性,或者,也可以理解为配置信息中包括服务所对应的数据的属性信息为初始值。可理解,服务器可以为数据的属性信息设置初始值,或者,也可以都设置为保留(reserved)等,本申请实施例对此不作限定。示例性的,车辆根据设置指令可以配置第一数据的属性信息的具体取值或具体赋值。
本申请实施例所示的配置信息可以理解为如图4a和/或图4c所示的服务与子服务之间的映射关系(也可以称为对应关系或配置关系等),以及子服务与数据之间的映射关系。
示例性的,OEM服务器可以接收用户(如OEM开发者)输入的(或者理解为用户配置的)配置信息。又例如,OEM服务器可以自动生成配置信息。例如,OEM服务器可以根据实现某个服务所对应的子服务,以及子服务所使用的数据进行分类,从而形成配置信息。可理解,本申请实施例对于OEM服务器确定配置信息的方法不作限定。
302、OEM服务器向车辆发送配置信息。相应的,车辆接收OEM服务器发送的配置信息。
本申请实施例对于OEM发送配置信息的具体形式不作限定。示例性的,例如,OEM可以将配置信息以表的形式发送给车辆。又例如,OEM可以将配置信息以结构化的建模文件的形式(如以XLM的形式或JSON的形式等)发送给车辆。
303、车辆接收设置指令,该设置指令为针对第一接口的设置指令,该第一接口用于指示第一服务,该第一接口对应有属性信息。
示例性的,车辆可以接收用户(如驾驶员或乘客等)输入的设置指令,如设置指令为用户输入的针对第一接口的设置指令。该第一接口用于指示第一服务,如车辆可以根据第一接口对应的属性信息配置第一数据的属性信息。可选的,设置指令可以用于设置是否允许访问第一接口。例如,设置指令可以用于设置允许访问第一接口所指示的第一服务。又例如,设置指令可以用于设置不允许(也可以称为拒绝)访问第一接口所指示的第一服务。如车辆可以根据第一接口对应的属性信息以及设置指令配置第一数据的属性信息。
以下详细说明本申请实施例示出的第一接口以及该第一接口对应的属性信息。
第一、第一接口为第一服务的接口。
示例性的,该第一服务可以包括360环视服务、哨兵服务、自动驾驶服务、辅助驾驶服务、自动泊车服务、远程控制服务(如远程看车服务或远程监控服务)、导航服务、访客模式服务中的一项或多项等。示例性的,第一服务对应的属性信息包括身份标识属性、时间属性、位置属性、车辆的运行状态属性或周边环境属性中的一项或多项。示例性的,该第一服务对应的属性信息可以由车辆出厂时设置,或者,也可以根据业务需求设置,或者,可以在OEM开发阶段被开发商设置等,本申请实施例对此不作限定。
示例性的,身份标识属性可以理解为访问第一服务时,该第一服务所对应的身份标识。该身份标识可以包括账户信息、生物特征信息或解锁图案中的一项或多项。例如,账户信息可以理解为访问第一服务时,用户所能登录的账号。又例如,生物特征信息可以理解为 解锁车辆时所能使用的指纹特征、虹膜特征、人脸特征等。又例如,解锁图案可以理解为解锁车辆时所能使用的图案。可选的,当第一服务对应的属性信息包括身份标识属性时,车辆可以根据该第一服务对应的身份标识配置第一数据的身份标识属性。这里所示的第一服务对应的身份标识与第一数据的身份标识可以相同,也可以不同,本申请实施例对此不作限定。通过配置该第一数据的身份标识属性,可保证具有相应身份标识的用户访问该第一数据。可理解,本申请实施例示出的身份标识包括上述账户信息、生物特征信息和解锁图案仅为示例,本申请实施例对于该身份标识的具体类型不作限定。
示例性的,时间属性可以理解为允许访问第一服务的时间,或者,拒绝访问(也可以称为禁止访问)第一服务的时间。示例性的,该时间属性可以以工作时间和非工作时间为例区分;或者,该时间属性所对应的时间可以由用户设置;或者,该时间属性所对应的时间可以由系统设置等,本申请实施例对此不作限定。例如,用户设置的时间可以包括00:00至08:00以及19:00至24:00拒绝访问第一服务,08:00至19:00允许访问第一服务。又例如,用户设置的时间可以包括09:00至21:00拒绝访问第一服务,其余时间可以访问第一服务。可选的,当第一服务对应的属性信息包括时间属性时,车辆可以根据该第一服务对应的时间属性配置第一数据的时间属性。例如,根据允许访问第一服务的时间配置允许访问第一数据的时间。又例如,根据拒绝访问第一服务的时间配置拒绝访问第一数据的时间。
示例性的,位置属性可以理解为允许访问第一服务的位置,或者,拒绝访问第一服务的位置。可选的,当第一服务对应的属性信息包括位置属性时,车辆可以根据该第一服务对应的位置属性配置允许使用第一数据的位置属性(也可以称为允许访问第一数据的位置属性)。示例性的,运行状态属性表示车辆的运行状态。如该运行状态可以包括挂挡状态(也可以称为换挡状态)、驻车状态、行驶状态或P挡状态中的一项或多项等。例如,运行状态为挂挡状态,则第一服务允许访问(或者禁止访问),该第一服务所对应的数据也允许被访问(或者禁止访问)。例如,运行状态为行驶状态,第一服务为视频影音服务,该第一服务禁止访问。示例性的,周边环境属性表示车辆所处的环境。如周边环境可以包括市区或郊区等,这里仅为示例。例如,郊区相对于市区来说,个人数据采集密度的风险小,因此某些服务可以允许访问。
可理解,以上所示的各个属性仅为示例,本申请实施例对于第一服务所对应的属性的设置方法以及属性的种类不作限定。示例性的,第一服务对应的属性信息也可以包括允许访问或禁止访问。当第一服务允许访问时,则根据服务与数据之间的映射关系设置数据的属性信息为允许访问或禁止访问。或者,根据服务与子服务、数据之间的映射关系设置子服务的属性信息为允许访问,以及数据的属性信息为允许访问或禁止访问。可理解,对于属性的说明,下文同样适用。
通过本申请实施例提供的方法,用户无需一一设置数据的不同属性,而是通过用户针对第一服务的设置,车辆就可以获得该第一服务所对应的属性信息,从而设置与该第一服务对应的数据的属性信息。
可选的,360环视服务可以包括第一360环视服务、第二360环视服务、第三360环视服务。示例性的,第一360环视服务、第二360环视服务与第三360环视服务至少有一项属性不同。关于属性的说明可以参考上述描述,这里不再详述。例如,360环视服务可 以包括不同车辆使用场景,如第一360环视服务可以为车主在非工作时间使用的服务,第二360环视服务可以为车主在工作时间使用的服务,第三360环视服务可以为其他用户使用的服务。可理解,这里对于某一个服务的不同分类方法仅为示例,如360环视服务还可以包括第四360环视服务、第五360环视服务等,本申请实施例不作限定。可理解,对于其他服务的不同分类可以参考360环视服务的说明,本申请实施例不作限定。例如,导航服务包括第一导航服务、第二导航服务、第三导航服务等。该第一导航服务、第二导航服务、第三导航服务至少有一项属性不同。
本申请实施例中,对同一个服务进一步细分为包括不同属性的服务,可实现通过对第一服务的配置,就能够实现对第一服务所对应的数据的属性信息的配置,有效提高了配置的效率。
可理解,通过本申请实施例上文所示的第一服务,车辆可以根据服务、子服务以及数据之间的映射关系,设置与第一服务所对应的数据的属性信息,从而确定该第一服务所对应的数据的访问权限。可理解,以上是以服务到子服务的映射关系,以及子服务到数据的映射关系为例示出的,本申请实施例适用于子服务与数据之间的关系。也就是说,当不包括以上所示的服务时,本申请实施例所示的子服务还可以理解为服务。
示例性的,第一服务还可以根据数据的不同种类进行区分。例如,第一服务包括图像服务、语音服务等。或者,第一服务还包括文本服务。该情况下,车辆可以根据服务与数据之间的映射关系,设置与第一服务所对应的数据的属性信息,从而确定第一服务所对应的数据的访问权限。可选的,该情况下,车辆还可以根据数据、子服务以及服务之间的映射关系,设置与数据所对应的子服务、服务的属性信息。
示例性的,该第一服务还可以包括第一图像服务、第二图像服务、第三图像服务、第一语音服务、第二语音服务、第三语音服务、第一视频服务、第二视频服务等中的一项或多项等。上述第一图像服务、第二图像服务与第三图像服务至少有一项属性不同。第一语音服务、第二语音服务以及第三语音服务至少有一项属性不同。例如,第一图像服务为人脸图像,第二图像服务为风景图像。可理解,对于图像服务、语音服务或视频服务的不同分类方法仅为示例,如图像服务还可以包括第四图像服务、第五图像服务等,本申请实施例不作限定。可理解,第一服务还可以包括其他类型的服务,如包括文本服务等,本申请实施例不作限定。
本申请实施例中,通过以图像、语音、视频等为粒度进一步细分为包括不同属性的服务,可实现通过对第一服务的配置,就能够实现对第一服务所对应的数据的属性信息的配置,有效提高了配置的效率。
可理解,本申请实施例所示的第一服务仅为示例,本申请实施例对于第一服务的具体类型或分类标准不作限定。如该第一服务可以理解为面向用户的服务。又如,该第一服务还可以理解为通过车辆的显示屏显示的服务。
第二、第一接口为车辆使用场景的接口。
示例性的,车辆使用场景包括私人家庭场景、商用车场景、共享场景、代驾场景等。私人家庭场景表示车辆中的数据仅供家庭内部成员获取,可选的,该场景不同家庭成员之间可以共享数据、共享配置,或对数据的操作权限也可以保持一致)。商用车场景涉及的子 服务与数据类型均具备特殊性,在数据访问控制方案中应当考虑定制方案。例如,服务、子服务以及数据之间的映射关系可以与其他场景不同。又例如,对于不同的数据可以配置不同的权限。共享场景(如包括车辆租赁共享场景)中车辆的使用者可以经常发生变化,如车内数据需要绑定使用者的身份标识。可理解,关于代驾场景的说明可以参考共享场景,这里不再详述。可理解,关于车辆使用场景的其他类型或分类本申请实施例不作限定。
示例性的,车辆使用场景包括第一场景、第二场景、第三场景等。该第一场景、第二场景和第三场景至少有以下任一项不同:身份标识、使用时间、使用位置、运行状态或周边环境中的一项或多项。
在第一接口为车辆使用场景的接口的情况下,该第一接口用于指示第一服务。示例性的,车辆使用场景可以绑定服务。例如,上述私人家庭场景可以绑定360环视服务、自动驾驶服务、导航服务等。又例如,上述第一场景可以绑定导航服务、远程控制服务等。
可理解,以上关于接口、属性、服务等的描述仅为示例,对于其他更多的类型或举例,本申请实施例不作限定。
304、车辆根据第一接口对应的属性信息配置第一数据的属性信息,该第一数据的属性信息用于确定第一数据的访问权限,该第一数据包含于第一服务对应的数据中。
本申请实施例中,车辆中可以保存有服务、子服务以及数据之间的关联关系。对于服务、子服务以及数据之间的关系可以参考图2、图4a、图4b或图4c所示的方法,这里不再赘述。对于车辆根据设置指令以及第一接口对应的属性信息配置第一数据的属性信息的方法可以参考上文,这里不再一一详述。如以图4a为例,如第一服务为服务A,则第一数据可以为数据1,或者,第一数据也可以为数据1和数据2。也就是说,第一数据可以表示第一服务对应的数据,或者,第一数据也可以表示第一服务对应的数据中的部分数据。
本申请实施例中,车辆根据第一数据的属性信息可以确定该第一数据的访问权限。示例性的,第一数据的属性信息包括身份标识属性、时间属性、位置属性、车辆的运行状态属性或周边环境属性中的一项或多项。例如,第一数据的属性信息包括身份标识属性,则车辆可以根据该身份标识确定是否允许车主访问该第一数据,或者,是否允许非车主访问该第一数据,或者,是否允许家庭用户访问该第一数据等。又例如,第一数据的属性信息包括时间属性,如该第一数据的时间属性为工作时间,则表示在工作时间,允许访问该第一数据。例如,第一服务对应的数据还包括第二数据,该第二数据的时间属性为非工作时间,则表示在非工作时间,可以允许访问该第一数据。可理解,在本申请实施例中,第一数据的属性信息可以包括身份标识属性和时间属性。该情况下,如身份标识属性为车主,时间属性为工作时间,则表示该车主能够在工作时间访问第一数据。可理解,关于属性信息的说明可以参考上文,这里不再详述。
可选的,根据设置指令以及第一接口对应的属性信息配置第一数据的属性信息,包括:根据设置指令,以及第一接口对应的第一属性信息配置第一数据的第一属性信息;或者,根据设置指令,以及所述第一接口对应的第二属性信息配置所述第一数据的第二属性信息。
第一接口对应的第一属性信息和第一接口对应的第二属性信息至少有以下任一项不同:
身份标识属性、时间属性、位置属性、运行状态属性、周边环境属性。
相应的,第一数据的第一属性信息和第一数据的第二属性信息至少有以下任一项不同:
身份标识属性、时间属性、位置属性、运行状态属性、周边环境属性。
示例性的,第一属性信息和第二属性信息可以是属性信息的种类不同。例如,第一属性信息可以包括身份标识属性、时间属性和位置属性,第二属性信息可以包括身份标识属性和时间属性。又例如,第一属性信息包括身份标识属性,第二属性信息包括时间属性。又例如,第一属性信息包括身份标识属性,第二属性信息包括身份标识属性、时间属性和位置属性。
示例性的,第一属性信息和第二属性信息还可以理解为属性信息的具体内容不同。例如,第一属性信息包括身份标识属性和时间属性,该时间属性为工作时间,第二属性信息包括身份标识属性和时间属性,该时间属性为非工作时间。又例如,第一属性信息包括身份标识属性、时间属性和位置属性,该时间属性为工作时间,身份标识属性为车主的身份标识,第二属性信息包括身份标识属性和时间属性,该身份标识属性为非车主的身份标识,该时间属性为非工作时间。
可理解,以上关于第一属性信息和第二属性信息的说明既适用于第一接口对应的第一属性信息和第一接口对应的第二属性信息的说明,也适用于第一数据的第一属性信息和第一数据的第二属性信息的说明。
在一种可能的实现方式中,图3所示的方法还包括:
车辆接收访问控制请求,该访问控制请求携带属性信息。以及车辆输出与属性信息对应的数据。
本申请实施例中,访问控制请求中通过携带属性信息,可使得车辆能够输出与该属性信息对应的数据。示例性的,访问控制请求所携带的属性信息可以包括以下任一项或多项:身份标识,如需要访问数据的用户的身份标识;时间属性,如需要访问的数据的时间属性;位置属性,如需要访问的数据的位置属性;运行状态属性;周边环境属性等。
可选的,访问控制请求还可以携带访问对象,由此,车辆可以根据该访问对象以及访问控制请求中携带的属性信息输出对应的数据。例如,访问控制请求携带的访问对象为数据1和数据2,数据1的属性信息与访问控制请求携带的属性信息匹配,而数据2的属性信息与访问控制请求携带的属性信息不匹配,则车辆仅输出数据1,数据2被拒绝访问。
本申请实施例提供的方法,通过对第一服务的配置,可实现对该第一服务对应的数据的不同属性信息的配置,从而有效提高了数据的配置效率,而且通过对数据进行不同属性信息的配置,可保证有些数据能够被访问,有些数据不被访问,提高了数据的安全性。
本申请还支持用户从数据类别(如图像类别或语音类别)的角度对数据访问控制的策略进行配置。由于信息结构复杂,因此对于一个数据,可能会包括多个不同的内容。如摄像头所拍摄得到的数据,包括视频数据和音频数据两大类,而视频数据又是有很多图像数据的组合。示例性的,以车辆拍摄到的路边的图像数据为例,图像中可能包括车牌信息、行人信息、路况信息等。而从特性实现的角度来看,为了实现效果往往并不需要一个很粗粒度的数据所能提供的全部信息。如为了判断路况,则车载摄像头中所拍摄到的车牌信息以及路人的人脸信息都不是必要的。因此当车主从数据类别的角度进行配置时,能够一定程度约束数据的最小化使用,改善数据泄露的问题。示例性的,通过图3所示的方法,用户通过对服务进行配置,可以最小化约束数据的访问权限,从而不仅可以高效率的完成对 数据的配置,而且还改善了数据泄露的问题,保证了数据的安全性。
结合图3所示的方法,在用户配置阶段,本申请支持用户从服务或子服务的角度对数据的数据访问控制策略进行配置。以对服务的配置为例:从顶层服务中找到用户进行配置过的服务,假设配置了两个服务A和B。先从OEM的设计结构化架构中,以服务A为根,完整的取出从根A到叶子的整个架构。如以图5a为例,则从根A到叶子的整个架构可以表示为从服务A到子服务a和子服务b,再到数据1、数据2和数据3之间的架构。由于该架构从数据结构角度上是一个有向无环图,因此可以使用图遍历算法对整个结构进行遍历。例如,当用户针对该服务A设置“允许”时,遍历到的每个节点都用“允许”覆盖之前的配置;当用户针对该服务A设置“拒绝”时,则节点保持之前的配置。示例性的,在还未对节点进行配置时,则该节点可以默认设置为“拒绝”。当以服务A为根的结构遍历完毕后,再以同样的方式遍历以服务B为根的结构。
从本申请上文介绍的实施例可以看出,OEM开发阶段定义出了作为最终配置结果输出的复杂数据结构,用户配置阶段则是针对该复杂数据结构进行一个用户视角到数据源控制点的传递配置。最终从底层数据视角来看,将获得不同用户所配置所允许的访问权限,权限可以通过一长串编码的形式进行存储,在系统运行时每当数据源收到新的访问控制请求时,通过查询这串编码来查询访问权限。可理解,这里所示的编码可以理解为车辆所配置的数据的属性信息对应的编码。例如,车辆可以将配置的第一数据的属性信息以编码的形式进行存储,从而在接收到访问控制请求时,通过编码来确定访问权限。
图5a是本申请实施例提供的一种配置过程的示意图。如图5a所示,用1表示允许,0表示同意。例如,用户A设置服务1为允许访问,如图5a所示,服务1可以置为1。又例如,用户A设置服务2为不允许访问,如图5a所示,服务2可以置0。可理解,当用户A对服务1和服务2进行设置后,车辆可以设置允许访问服务1对应的子服务1和子服务2,以及设置允许访问子服务1对应的数据1和数据2,以及允许访问子服务2对应的数据2和数据3。可理解,图5a和图5b所示的方法是以服务对应的属性信息为一种类型,同时,服务对应的数据的属性信息也为一种类型为例示出的。
如图5b所示,当子服务之间有交集,或者,数据之间有交集时,则可以采用相关运算进行取值。示例性的,可以采用与运算进行取值,或者采用1覆盖0的原则进行取值,或者采用或运算进行取值等,本申请实施例对此不作限定。可理解,尽管本申请是以图5a和图5b为例示出的,但是在实际应用时,车辆可以直接按照图5b配置是否允许访问数据。依据服务分解的传递方向,以及1覆盖0的原则(仅为示例),则配置结果可以如图5b所示。可选的,当系统运行阶段,车辆系统需要判断服务是否可以正常运作时,则从底层数据层向上收束,如子服务1的结果为1(数据1置1)与1(数据2置1)的运算结果如1,则表示子服务1可用。又如服务2的结果为1(如子服务2置1)与0(如子服务3置0)的运算结果,如0,则表示服务2不可用。又如服务1的结果为子服务1与子服务2的与运算结果,1与1,得1,则服务1可用。可理解,本申请实施例是以服务1和服务2为例示出的,在具体实现中,还可以包括服务3、服务4、服务5等,这里不再赘述。示例性的,当用户未配置是否允许访问服务3(或服务4或服务5)时,则该服务3可以初始化设置为 0(表示禁止访问)。
如图6所示,图6示出的是以用户数设置图像、声音等服务为例示出的。可理解,关于配置方法可以参考上述实施例,这里不再详述。
示例性的,如用户A对图像数据置1,声音数据置0,因此从数据分解的传递方向,图6的配置结果可以传递到底层的数据类别上。如配置图像对应的数据1和数据2为1,声音对应的数据3和数据4为0。可选的,车辆可以根据数据与子服务的映射关系,以及子服务与数据的映射关系,对子服务和服务进行配置。例如,由于数据1和数据2对应子服务1,因此子服务1可以置为1。由于数据3和数据4对应子服务3,因此子服务3可以置为0。由于数据2为1,数据3为0,由于数据2是允许访问的,数据3是禁止访问的,则表示子服务2在某些场景不可用,因此子服务2可以置为0(表示访问受限,或者,表示子服务2在某些场景不可用)。也就是说,从底层数据层向上(如子服务或服务)收束,子服务1的结果为1与1的运算结果,即1(表示子服务1允许访问,或者表示子服务1可用,或者表示子服务1的使用不受限)。服务2的结果为0,表示服务2是不可用的。服务1的结果为子服务1与子服务2的与运算结果,即1与0的运算结果如为0,表示服务1的使用受限,或者表示服务1在某些场景是不可用的。
可理解,本申请实施例中的配置为方便呈现简化为0和1,然而具体实施例中的还可以用更多长度的编码方式来表示。示例性的,编码结果还可以包括身份标识(也可以称为账号信息)、时间属性、位置属性或车辆使用场景等,最终服务能否使用数据也应该结合这些上下文内容进行联合判断。
可理解,本申请所示图5a至图5c以及图6中的0和1的配置方法仅为示例,如属性信息还可以为多个。如图7所示,图7是本申请实施例提供的一种配置过程的示意图。可理解,图7所示的示意图可以理解为是服务与数据之间的映射关系。或者,图7所示的示意图还可以理解为省略了子服务。或者,图7所示的示意图还可以理解为是根据图6所示的示意图为例示出的,如远程监控和哨兵服务可以相当于图6所示的服务1和服务2,车外视频、车内视频可以理解为图6所示的不同的图像类型(或者不同的视频类型等)。但是,图7所示的示意图中省略了子服务以及数据。示例性的,图7的第一层可以分别表示车主账号和访客账号,即身份标识不同。第二层可以表示不同用户对不同服务的设置,如车主账号对应的用户(如用户1)设置远程监控和哨兵服务分别为允许访问(如1)、访问访问(如1)。又如访客账号对应的用户(如用户2)设置远程监控和哨兵服务分别为禁止访问(如0)、禁止访问(如0)。如远程监控的配置结果可以为10,10中的第一位表示用户1对远程监控的配置结果,第二位表示用户2对远程监控的配置结果。又如哨兵服务的配置结果可以为10,10中的第一位表示用户1对哨兵服务的配置结果,第二位表示用户2对哨兵服务的配置结果。对于第三层来说,远程监控和哨兵服务均对应有车外视频对应的数据,远程监控对应有车内视频对应的数据。因此,根据用户1的配置,车外视频的配置结果为1010,该1010的第一位表示用户1对远程监控的配置结果,第三位表示用户1对哨兵监控的配置结果,第二位表示用户2对远程监控的配置结果,第四位表示用户2对哨兵服务的配置结果。根据用户2的配置,车内时频的配置结果为1000,该1000中的第一位表示用户1对远程监控的配置结果(即允许访问),第二位表示用户2对远程监控的配置结果(即 允许访问)。由于哨兵服务未对应车内视频,因此第三位和第四位都可以配置为初始化的数值,如0。可理解,图7所示的服务、数据所对应的编码方式仅为示例,本申请实施例对此不作限定。
针对以上所示的各个实施例,本申请提供了一种在车辆系统内实现各种定制整车内细粒度的个人数据访问策略和数据控制,支持将输入设置层的语义级配置(如输入设置层所输入的设置指令等)向下逐层分解细化为可执行策略,提供了与业务处理上下文无关的通用框架和实现方法。本申请提供的上述方法还具有以下效果:
1、本申请提供的方法,通过将服务、子服务以及数据之间的关系进行分层解耦,或者,将数据类别的偏好配置与业务服务逻辑解耦,可以满足车辆内数据的访问控制场景,该数据不仅可以包括车辆产生的数据,或者,包括重要的需要格外保护的数据等。
2、本申请提供的方法,可以支持各种车辆平台架构,如组件化开发平台(例如车载数字化平台)等。示例性的,OEM提前配置(或定义)好服务与数据之间的层次结构就可以实现本申请实施例提供的方法。示例性的,车辆还可以根据预定义的整车全局特性和整车全局数据源通用配置,就可以快速开发实现整车保护数据控制。
3、本申请提供的方法,还可以通过OTA升级或诊断等方法更新配置文件(如服务与子服务之间的映射关系,子服务与数据之间的映射关系),或者理解为更新服务、子服务及数据的划分层次或者更新数据分类分级层次结构,从而实现服务的更新或合规动态策略下发,达成数据保护个性化体验或快速合规的效果。
4、本申请提供的方法,根据设置指令就可以执行数据访问控制策略,对数据进行配置,内部策略转换与控制流的流转均可不被用户过度感知,或者用户无需过多干预就可以实现数据的配置。
以下将介绍本申请实施例提供的通信装置。
本申请根据上述方法实施例对数据访问控制装置进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。下面将结合图8至图10详细描述本申请实施例的数据访问控制装置。
图8是本申请实施例提供的一种数据访问控制装置的结构示意图。该装置可以用于执行上文所示的车辆执行的功能或步骤等。如图8所示,该装置包括接收单元801、处理单元802。可选的,该装置还包括输出单元803。
示例性的,接收单元801,用于接收设置指令,该设置指令为针对第一接口的设置指令,该第一接口用于指示第一服务,该第一接口对应有属性信息;
处理单元802,用于根据第一接口对应的属性信息配置第一数据的属性信息,该第一数据的属性信息用于确定第一数据的访问权限,第一数据包含于第一服务对应的数据中。
可选的,接收单元801,可以通过显示屏接收设置指令。例如,用户可以通过显示屏输入设置指令,从而接收单元801接收该设置指令。
可理解,本申请实施例中,关于接口与服务的关系、服务与数据的关系、服务与子服务的关系、子服务与数据的关系、第一数据的属性信息等的说明,可以参考上文所示的方法实施例,这里不再详述。例如,可以参考图3所示的方法。又例如,可以参考图4a至图4c。又例如,可以参考图5a至图5c。又例如,可以参考图6或图7等。
示例性的,接收单元801,还用于接收访问控制请求,该访问控制请求携带属性信息;
输出单元803,用于输出与属性信息对应的数据。
可理解,处理单元802,可以根据访问控制请求以及数据的属性信息确定与访问控制请求所携带的属性信息对应的数据。可理解,上述输出单元可以将上述与属性信息对应的数据输出给其他装置,或者,可以将上述与属性信息对应的数据从处理单元输出至车辆系统中的其他处理单元等,本申请实施例对此不作限定。
可理解,本申请实施例示出的接收单元801、处理单元802和输出单元803的说明仅为示例,对于接收单元801、处理单元802和输出单元803的具体功能或执行的步骤等,可以参考上述方法实施例,这里不再详述。示例性的,接收单元801、处理单元802和输出单元803可以分别部署于不同的物理实体内,或者,部署于同一个物理实体内(如一个芯片或集成电路中)。例如,处理单元802可以部署于域控制器或ECU。又例如,接收单元801可以部署于其他ECU,或者部署于收发器。又例如,输出单元803可以与处理单元802部署于同一个物理实体,如都部署于域控制器或ECU中。又例如,输出单元803可以与处理单元802部署于不同的物理实体。又例如,输出单元803可以部署于收发器。可理解,以上所示的各个单元所对应的产品形态仅为示例,本申请实施例对于各个单元的产品形态不作限定。可理解,下文图10所示的数据访问控制装置仅为示例,不应将其理解为对本申请实施例的限定。
图9是本申请实施例提供的一种数据访问控制装置的结构示意图。该装置可以用于执行上文所示的服务器(包括OEM服务器和/或升级服务器等)执行的功能或步骤等。如图9所示,该装置包括处理单元901和发送单元902。
示例性的,处理单元901,用于确定配置信息;发送单元902,用于输出该配置信息。
例如,发送单元902,可以通过收发器向车辆发送配置信息。又例如,发送单元902,可以通过通信接口(也可以称为接口或管脚等)从处理单元901中输出该配置信息。
可理解,本申请实施例中,关于配置信息的说明可以参考上文所示的服务与子服务之间的映射关系,以及子服务与数据之间的映射关系的描述,这里不再一一详述。可理解,关于接口与服务的关系、服务与数据的关系、服务与子服务的关系、子服务与数据的关系、第一数据的属性信息等的说明,可以参考上文所示的方法实施例,这里不再详述。例如,可以参考图3所示的方法。又例如,可以参考图4a至图4c。又例如,可以参考图5a至图5c。又例如,可以参考图6或图7等。
可理解,本申请实施例示出的处理单元901和发送单元902的说明仅为示例,对于处理单元901和发送单元902的具体功能或执行的步骤等,可以参考上述方法实施例,这里不再详述。示例性的,处理单元901和发送单元902可以分别部署于不同的物理实体内,或者,部署于同一个物理实体内(如一个芯片或集成电路中)。可理解,关于处理单元901和发送单元902的具体说明,可以参考图8所示的描述,这里不再一一详述。可理解,以 上所示的各个单元所对应的产品形态仅为示例,本申请实施例对于各个单元的产品形态不作限定。可理解,下文图10所示的数据访问控制装置仅为示例,不应将其理解为对本申请实施例的限定。
图10是本申请实施例提供的一种数据访问控制装置100的结构示意图。示例性的,图10所示的数据访问控制装置可以用于执行上文车辆所示的功能或步骤。复用图10,示例性的,图10所示的数据访问控制装置可以用于执行上文服务器所示的功能或步骤。
例如,该装置100可以包括至少一个处理器1001和通信接口1002。可选的,还可以包含总线1003。可选的,还可以包括至少一个存储器1004,其中,处理器1001、通信接口1002和存储器1004通过总线1003相连。
处理器1001是进行算术运算和/或逻辑运算的模块,具体可以是中央处理器(central processing unit,CPU)、图片处理器(graphics processing unit,GPU)、微处理器(microprocessor unit,MPU)、域控制器、ECU、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程逻辑门阵列(Field Programmable Gate Array,FPGA)、复杂可编程逻辑器件(Complex programmable logic device,CPLD)等处理模块中的一种或多种的组合。
通信接口1002用于接收外部发送的数据(包括本申请所示的设置指令)和/或向外部发送数据,可以为包括诸如以太网电缆等的有线链路接口,也可以是无线链路(Wi-Fi、蓝牙、通用无线传输等)接口。可选的,通信接口1002还可以包括与接口耦合的发射器(如射频发射器、天线等),或接收器等。
其中,存储器1004用于提供存储空间,存储空间中可以存储操作系统和计算机程序等数据。存储器1601可以是随机存储记忆体(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程只读存储器(erasable programmable read only memory,EPROM)、或便携式只读存储器(compact disc read-only memory,CD-ROM)等等中的一种或多种的组合。
该装置100中的处理器1001用于读取所述存储器1004中存储的计算机程序,用于执行前述的数据访问控制方法,例如图3所描述的方法。
本申请实施例还提供了一种芯片系统,所述芯片系统包括至少一个处理器和通信接口,所述通信接口用于输入和/或输出数据,所述至少一个处理器用于调用至少一个存储器中存储的计算机程序,以使得所述芯片系统所在的装置实现图3所示的实施例中OEM服务器或车辆的方法。
示例性的,当所述芯片系统用于实现车辆执行的功能或步骤时,通信接口,用于输入设置指令;处理器,用于根据该设置指令配置第一数据的属性信息。
示例性的,当所述芯片系统用于实现服务器执行的功能或步骤时,处理器,用于确定配置信息,所述通信接口用于输出配置信息。
进一步,所述至少一个处理器可以为CPU、GPU、MPU、ASIC、FPGA、CPLD、协处理器(协助中央处理器完成相应处理和应用)、MCU等处理模块中的一种或多种的组合。
本申请实施例还提供了一种无线通信系统,该无线通信系统包括车辆和服务器,该车辆和该服务器可以用于执行前述任一实施例(如图3)中的方法。
此外,本申请还提供一种计算机程序,该计算机程序用于实现本申请提供的方法中由车辆执行的操作和/或处理。
本申请还提供一种计算机程序,该计算机程序用于实现本申请提供的方法中由服务器执行的操作和/或处理。
本申请还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机代码,当计算机代码在计算机上运行时,使得计算机执行本申请提供的方法中由车辆执行的操作和/或处理。
本申请还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机代码,当计算机代码在计算机上运行时,使得计算机执行本申请提供的方法中由服务器执行的操作和/或处理。
本申请还提供一种计算机程序产品,该计算机程序产品包括计算机代码或计算机程序,当该计算机代码或计算机程序在计算机上运行时,使得本申请提供的方法中由车辆执行的操作和/或处理被执行。
本申请还提供一种计算机程序产品,该计算机程序产品包括计算机代码或计算机程序,当该计算机代码或计算机程序在计算机上运行时,使得本申请提供的方法中由服务器执行的操作和/或处理被执行。
在计算机上加载和执行该计算机指令时,可以全部或部分地实现本申请实施例所描述的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络、或其它可编程装置。该计算机指令可以存储在计算机可读存储介质中,或通过计算机可读存储介质进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本申请方法实施例中的步骤可以根据实际需要进行顺序调整、合并和删减。
本申请装置实施例中的模块可以根据实际需要进行合并、划分和删减。

Claims (38)

  1. 一种数据访问控制方法,其特征在于,所述方法包括:
    接收设置指令,所述设置指令为针对第一接口的设置指令,所述第一接口用于指示第一服务,所述第一接口对应有属性信息;
    根据所述第一接口对应的属性信息配置第一数据的属性信息,所述第一数据的属性信息用于确定所述第一数据的访问权限,所述第一数据包含于所述第一服务对应的数据中。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    获取配置信息,所述配置信息包括所述第一服务与所述第一数据的对应关系;
    所述根据所述第一接口对应的属性信息配置第一数据的属性信息,包括:
    根据所述第一接口对应的属性信息以及所述配置信息配置所述第一数据的属性信息。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一服务包括第一子服务和/或第二子服务,所述第一子服务和/或所述第二子服务对应的数据包括所述第一数据。
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述第一服务对应的子服务与第二服务对应的子服务不同,或者,所述第一服务对应的子服务与第二服务对应的子服务部分重叠。
  5. 根据权利要求4所述的方法,其特征在于,所述第一服务对应的子服务与所述第二服务对应的子服务至少有以下任一项不同:
    图像采集子服务、语音采集子服务或雷达分析子服务。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,所述根据所述第一接口对应的属性信息配置第一数据的属性信息,包括:
    根据所述设置指令,以及所述第一接口对应的第一属性信息配置所述第一数据的第一属性信息;或者,
    根据所述设置指令,以及所述第一接口对应的第二属性信息配置所述第一数据的第二属性信息。
  7. 根据权利要求6所述的方法,其特征在于,所述第一数据的第一属性信息和所述第一数据的第二属性信息至少有以下任一项不同:
    身份标识属性、时间属性、位置属性、运行状态属性或周边环境属性。
  8. 根据权利要求1-7任一项所述的方法,其特征在于,所述设置指令为针对第一接口的设置指令,包括:所述设置指令为针对所述第一服务的设置指令。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,所述第一服务包括以下任一项或多项:
    360环视服务、哨兵服务、自动驾驶服务、辅助驾驶服务、自动泊车服务、远程控制服务、导航服务或访客模式服务。
  10. 根据权利要求1-8任一项所述的方法,其特征在于,所述第一服务包括以下任一项或多项:
    图像服务、声音服务、文本服务。
  11. 根据权利要求1-7任一项所述的方法,其特征在于,所述第一接口为针对车辆使用 场景的接口,所述车辆使用场景绑定有所述第一服务,所述第一接口对应有属性信息包括:所述车辆使用场景携带有所述属性信息。
  12. 根据权利要求11所述的方法,其特征在于,所述车辆使用场景包括以下任一项或多项:
    第一场景、第二场景、第三场景。
  13. 根据权利要求12所述的方法,其特征在于,所述第一场景、所述第二场景或所述第三场景至少有以下一项属性不同:
    身份标识属性、时间属性、位置属性、运行状态属性、周边环境属性。
  14. 一种数据访问控制方法,其特征在于,所述方法包括:
    确定配置信息,所述配置信息包括第一服务与第一数据的对应关系,以及所述第一数据的属性信息,所述第一数据的属性信息用于确定所述第一数据的访问权限,所述第一数据包含于所述第一服务对应的数据中;
    向车辆发送所述配置信息。
  15. 根据权利要求14所述的方法,其特征在于,所述第一服务包括第一子服务和/或第二子服务,所述第一子服务和/或所述第二子服务对应的数据包括所述第一数据。
  16. 根据权利要求14或15所述的方法,其特征在于,所述第一服务对应的子服务与第二服务对应的子服务不同,或者,所述第一服务对应的子服务与第二服务对应的子服务部分重叠。
  17. 根据权利要求16所述的方法,其特征在于,所述第一服务对应的子服务与所述第二服务对应的子服务至少有以下任一项不同:
    图像采集子服务、语音采集子服务或雷达分析子服务。
  18. 一种数据访问控制装置,其特征在于,所述装置包括:
    接收单元,用于接收设置指令,所述设置指令为针对第一接口的设置指令,所述第一接口用于指示第一服务,所述第一接口对应有属性信息;
    处理单元,用于根据所述第一接口对应的属性信息配置第一数据的属性信息,所述第一数据的属性信息用于确定所述第一数据的访问权限,所述第一数据包含于所述第一服务对应的数据中。
  19. 根据权利要求18所述的装置,其特征在于,
    所述处理单元,还用于获取配置信息,所述配置信息包括所述第一服务与所述第一数据的对应关系;以及根据所述第一接口对应的属性信息以及所述配置信息配置所述第一数据的属性信息。
  20. 根据权利要求18或19所述的装置,其特征在于,所述第一服务包括第一子服务和/或第二子服务,所述第一子服务和/或所述第二子服务对应的数据包括所述第一数据。
  21. 根据权利要求18-20任一项所述的装置,其特征在于,所述第一服务对应的子服务与第二服务对应的子服务不同,或者,所述第一服务对应的子服务与第二服务对应的子服务部分重叠。
  22. 根据权利要求21所述的装置,其特征在于,所述第一服务对应的子服务与所述第二服务对应的子服务至少有以下任一项不同:
    图像采集子服务、语音采集子服务或雷达分析子服务。
  23. 根据权利要求18-22任一项所述的装置,其特征在于,
    所述处理单元,具体用于根据所述设置指令,以及所述第一接口对应的第一属性信息配置所述第一数据的第一属性信息;或者,
    所述处理单元,具体用于根据所述设置指令,以及所述第一接口对应的第二属性信息配置所述第一数据的第二属性信息。
  24. 根据权利要求23所述的装置,其特征在于,所述第一数据的第一属性信息和所述第一数据的第二属性信息至少有以下任一项不同:
    身份标识属性、时间属性、位置属性、运行状态属性或周边环境属性。
  25. 根据权利要求18-24任一项所述的装置,其特征在于,所述设置指令为针对第一接口的设置指令,包括:所述设置指令为针对所述第一服务的设置指令。
  26. 根据权利要求18-25任一项所述的装置,其特征在于,所述第一服务包括以下任一项或多项:
    360环视服务、哨兵服务、自动驾驶服务、辅助驾驶服务、自动泊车服务、远程控制服务、导航服务或访客模式服务。
  27. 根据权利要求18-25任一项所述的装置,其特征在于,所述第一服务包括以下任一项或多项:
    图像服务、声音服务、文本服务。
  28. 根据权利要求18-24任一项所述的装置,其特征在于,所述第一接口为针对车辆使用场景的接口,所述车辆使用场景绑定有所述第一服务,所述第一接口对应有属性信息包括:所述车辆使用场景携带有所述属性信息。
  29. 根据权利要求28所述的装置,其特征在于,所述车辆使用场景包括以下任一项或多项:
    第一场景、第二场景、第三场景。
  30. 根据权利要求29所述的装置,其特征在于,所述第一场景、所述第二场景或所述第三场景至少有以下一项属性不同:
    身份标识属性、时间属性、位置属性、运行状态属性、周边环境属性。
  31. 一种数据访问控制装置,其特征在于,所述装置包括:
    处理单元,用于确定配置信息,所述配置信息包括第一服务与第一数据的对应关系,以及所述第一数据的属性信息,所述第一数据的属性信息用于确定所述第一数据的访问权限,所述第一数据包含于所述第一服务对应的数据中;
    发送单元,用于向车辆发送所述配置信息。
  32. 根据权利要求31所述的装置,其特征在于,所述第一服务包括第一子服务和/或第二子服务,所述第一子服务和/或所述第二子服务对应的数据包括所述第一数据。
  33. 根据权利要求31或32所述的装置,其特征在于,所述第一服务对应的子服务与第二服务对应的子服务不同,或者,所述第一服务对应的子服务与第二服务对应的子服务部分重叠。
  34. 根据权利要求33所述的装置,其特征在于,所述第一服务对应的子服务与所述第 二服务对应的子服务至少有以下任一项不同:
    图像采集子服务、语音采集子服务或雷达分析子服务。
  35. 一种数据访问控制装置,其特征在于,所述数据访问控制装置包括至少一个处理器和通信接口,所述通信接口用于输入和/或输出数据,所述至少一个处理器用于调用至少一个存储器中存储的计算机程序,以使得所述数据访问控制装置实现如权利要求1-13中任一项所述的方法;或者,以使得所述数据访问控制装置实现如权利要求14-17中任一项所述的方法。
  36. 一种数据访问控制系统,其特征在于,包括服务器和车辆,其中:
    所述车辆用于执行如权利要求1-13中任一项所述的方法;
    所述服务器用于执行如权利要求14-17中任一项所述的方法。
  37. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序,当所述计算机程序在一个或多个处理器上运行时,实现如权利要求1-13中任一项所述的方法;或者,实现如权利要求14-17中任一项所述的方法。
  38. 一种计算机程序产品,其特征在于,当所述计算机程序产品在一个或多个处理器上运行时,实现如权利要求1-13中任一项所述的方法;或者,实现如权利要求14-17中任一项所述的方法。
PCT/CN2021/097479 2021-05-31 2021-05-31 数据访问控制方法及装置 WO2022252078A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2021/097479 WO2022252078A1 (zh) 2021-05-31 2021-05-31 数据访问控制方法及装置
CN202180098785.9A CN117441320A (zh) 2021-05-31 2021-05-31 数据访问控制方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/097479 WO2022252078A1 (zh) 2021-05-31 2021-05-31 数据访问控制方法及装置

Publications (1)

Publication Number Publication Date
WO2022252078A1 true WO2022252078A1 (zh) 2022-12-08

Family

ID=84322668

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/097479 WO2022252078A1 (zh) 2021-05-31 2021-05-31 数据访问控制方法及装置

Country Status (2)

Country Link
CN (1) CN117441320A (zh)
WO (1) WO2022252078A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829287A (zh) * 2018-11-20 2019-05-31 新疆福禄网络科技有限公司 Api接口权限访问方法、设备、存储介质及装置
US20200053091A1 (en) * 2018-08-13 2020-02-13 Capital One Services, Llc Systems and methods for dynamic granular access permissions
CN112104603A (zh) * 2020-08-06 2020-12-18 华人运通(江苏)技术有限公司 车辆接口的访问权限控制方法、装置及系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200053091A1 (en) * 2018-08-13 2020-02-13 Capital One Services, Llc Systems and methods for dynamic granular access permissions
CN109829287A (zh) * 2018-11-20 2019-05-31 新疆福禄网络科技有限公司 Api接口权限访问方法、设备、存储介质及装置
CN112104603A (zh) * 2020-08-06 2020-12-18 华人运通(江苏)技术有限公司 车辆接口的访问权限控制方法、装置及系统

Also Published As

Publication number Publication date
CN117441320A (zh) 2024-01-23

Similar Documents

Publication Publication Date Title
Gupta et al. Authorization framework for secure cloud assisted connected cars and vehicular internet of things
US11721137B2 (en) System, method, and apparatus for managing vehicle data collection
den Hartog et al. Security and privacy for innovative automotive applications: A survey
Chen et al. Android/OSGi-based vehicular network management system
CN104955680B (zh) 访问限制装置、车载通信系统及通信限制方法
JP2023516760A (ja) 車両データ収集を管理するためのシステム、方法、及び装置
CN108288211A (zh) 用于车辆共享系统的维护管理
WO2013123057A1 (en) Trusted connected vehicle systems and methods
CN106878292A (zh) 控制方法,控制装置、车载设备和交通运输工具
CN105634987A (zh) 用于带入装置通信请求处理的方法和设备
WO2021202118A1 (en) In-vehicle synthetic sensor orchestration and remote synthetic sensor service
US20160328197A1 (en) Vehicle data enforcement and contextual interference module for in-vehicle app development
McCarthy et al. Access to in-vehicle data and resources
US20220050925A1 (en) Automotive data sharing and consent management platform
WO2022252078A1 (zh) 数据访问控制方法及装置
JP7215378B2 (ja) 車載制御装置、情報処理装置、車両用ネットワークシステム、アプリケーションプログラムの提供方法、及びプログラム
Gupta Secure cloud assisted smart cars and big data: access control models and implementation
Thapa et al. A survey of reference architectures for autonomous cars
Abeck et al. A Context Map as the Basis for a Microservice Architecture for the Connected Car Domain.
Singh et al. V-CARE: A blockchain based framework for secure vehicle health record system
Sivakumar et al. Automotive grade linux: An open-source architecture for connected cars
Manimuthu et al. Internet of Vehicles: Security and Research Roadmap
Tran et al. Service-based development of context-aware automotive telematics systems
WO2024065093A1 (zh) 一种入侵检测方法、装置和系统
US20230169497A1 (en) Automotive payment platform

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202180098785.9

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21943454

Country of ref document: EP

Kind code of ref document: A1