Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack defense method, device and equipment and storage medium

An instruction, dubious technology, applied in the field of information security, which can solve the problems of stealing in-vehicle data, threats to life safety and property safety, etc.

Pending Publication Date: 2020-09-29
APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet of Vehicles technology, there are more and more smart vehicles. For example, after connected to the network, smart vehicles can perform real-time road navigation, download video and audio, and voice interaction. However, the Internet of Vehicles brings convenience to users in life and travel At the same time, many potential safety hazards may also be added. For example, lawbreakers can attack any networked vehicle through the network, steal data in the vehicle, and even seize driving control rights, thereby threatening human life and property safety.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defense method, device and equipment and storage medium
  • Attack defense method, device and equipment and storage medium
  • Attack defense method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Exemplary embodiments of the present application are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0051] At this stage, with the rapid development of Internet of Vehicles technology, after the vehicle is connected to the network, it can perform real-time road navigation, download video and audio, and perform voice interaction and other operations. At the same time, air conditioners, sunroofs, even brakes, gearboxes and other equipment inside the vehicle can be co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack defense method, device and equipment and a storage medium, relates to the technical field of information safety, and the method and the device can be used for intelligent transportation or automatic driving scenes. According to the specific implementation scheme, the method comprises the steps of obtaining an instruction set comprising at least one instruction forcontrolling the state of the vehicle, and respectively comparing each instruction in the instruction set with at least one attack instruction in an attack behavior knowledge base, determining a maximum similarity value corresponding to each instruction, and determining the type and processing strategy of each instruction according to the maximum similarity value corresponding to each instructionand a preset similarity range. According to the technical scheme, each attack instruction in the attack behavior knowledge base is obtained by performing attack analysis on the chain type data set ofat least one vehicle-mounted component, and the context data of the source data is associated when the attack instruction is generated, so that the accuracy of the determined instruction type and theattack defense precision are improved.

Description

technical field [0001] The embodiments of the present application relate to the field of information security technology in the field of data processing technology, and in particular to a method, device, device, and storage medium for defending against attacks. Background technique [0002] With the development of Internet of Vehicles technology, there are more and more smart vehicles. For example, after connected to the network, smart vehicles can perform real-time road navigation, download video and audio, and voice interaction. However, the Internet of Vehicles brings convenience to users in life and travel At the same time, many potential safety hazards may also be added. For example, criminals can attack any connected vehicle through the network, steal data in the vehicle, and even seize driving control rights, thereby threatening human life and property safety. [0003] In the prior art, in order to improve the information security of the Internet of Vehicles, the gene...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/40H04W12/12
CPCH04W4/40H04L63/1441H04L63/1416H04W12/12G06F21/554G06F21/556G06F21/54G06F21/566H04L12/40013H04L2012/40215H04L2012/40273
Inventor 崔志阳
Owner APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products