Search

CN-122027165-A - Method, device, equipment, storage medium and program product for processing vehicle data

CN122027165ACN 122027165 ACN122027165 ACN 122027165ACN-122027165-A

Abstract

The application discloses a vehicle data processing method, device, equipment, storage medium and program product. The method comprises the steps of enabling a target edge node to receive vehicle data transmitted by a vehicle-mounted terminal, enabling the target edge node to be any one of a plurality of edge nodes, detecting the vehicle data to generate a detection result, generating an abnormal event under the condition that the detection result represents that the vehicle data is abnormal, executing a target execution action, enabling the abnormal event to comprise a target abnormal type, generating a first zero knowledge proof of the vehicle data, sending the first zero knowledge proof to a target main chain node together with an event abstract of the abnormal event and a data abstract of the vehicle data, enabling the target main chain node to be any one of a plurality of main chain nodes, and enabling the target main chain node to synchronize the event abstract and the data abstract to the plurality of main chain nodes of a blockchain system under the condition that the first zero knowledge proof verification is passed. According to the embodiment of the application, the data security and the anti-attack capability in the Internet of vehicles can be improved.

Inventors

  • ZHU PENG
  • FANG RUI
  • Xin Diyu
  • ZHANG XIANGYU

Assignees

  • 国汽(北京)智能网联汽车研究院有限公司

Dates

Publication Date
20260512
Application Date
20260122

Claims (17)

  1. 1.A method of processing vehicle data for application to a target edge node, the method comprising: receiving vehicle data transmitted by a vehicle-mounted terminal, wherein the target edge node is any one of a plurality of edge nodes of a vehicle networking system, the target edge node is in communication connection with a blockchain system, and the blockchain system comprises a plurality of main chain nodes; detecting the vehicle data to generate a detection result, wherein the detection result is used for representing whether the vehicle data are normal or not; Generating an abnormal event and executing a target execution action under the condition that the detection result represents that the vehicle data is abnormal, wherein the abnormal event comprises a target abnormal type, the target abnormal type is an abnormal type corresponding to the vehicle data, and the target execution action is taken as an execution action corresponding to the target abnormal type; Generating a first zero knowledge proof of the vehicle data and sending the first zero knowledge proof to a target main chain node together with an event summary of the abnormal event and a data summary of the vehicle data, so that the target main chain node synchronizes the event summary and the data summary into a plurality of main chain nodes of the blockchain system when the first zero knowledge proof passes verification, wherein the target main chain node is any one of the plurality of main chain nodes.
  2. 2. The method according to claim 1, wherein before the detecting the vehicle data, generating a detection result, the method further comprises: Receiving a first hash value and a first digital signature transmitted by the vehicle-mounted terminal, wherein the first hash value is obtained by calculating the vehicle data by the vehicle-mounted terminal, and the first digital signature is obtained by processing the first hash value by the vehicle-mounted terminal; Verifying the first hash value and the first digital signature to generate a first verification result, wherein the first verification result is used for representing whether the first hash value and the first digital signature meet a preset verification formula or not; the detecting the vehicle data to generate a detection result includes: And detecting the vehicle data under the condition that the first verification result characterizes the first hash value and the first digital signature meets the verification formula, and generating a detection result.
  3. 3. The method according to claim 2, wherein the method further comprises: transmitting the vehicle data to a distributed database for storage under the condition that the first verification result characterizes the first hash value and the first digital signature meet the verification formula; And sending the abnormal event to the distributed database for storage, so that a supervision node can call the abnormal event and the vehicle data from the distributed database according to the event abstract and the data abstract under the condition of monitoring the event abstract, and analyze and audit.
  4. 4. The method according to claim 2, wherein the method further comprises: Discarding the vehicle data if the first verification result characterizes the first hash value and the first digital signature do not satisfy the verification formula.
  5. 5. The method of claim 1, wherein detecting the vehicle data to generate a detection result comprises: And inputting the vehicle data into a preset abnormality detection model, and outputting to obtain a detection result, wherein the abnormality detection model is obtained by training a plurality of training samples and state labels of the training samples.
  6. 6. The method of claim 1, wherein, in the event that the detection result characterizes the vehicle data anomaly, generating an anomaly event and performing a target execution action, comprising: Identifying a target abnormality type of the vehicle data in the case that the detection result characterizes the abnormality of the vehicle data; Generating an abnormal event according to the target abnormal type, the equipment identification code and the time stamp associated with the vehicle data; Executing a target execution action, wherein the target execution action is taken as an execution action corresponding to the target exception type in a preset security policy, and the security policy comprises a plurality of execution actions corresponding to the exception type.
  7. 7. The method of claim 6, wherein the identifying the target anomaly type of the vehicle data comprises: Inputting the vehicle data into a preset abnormal type recognition model, and outputting the target abnormal type of the vehicle data, wherein the abnormal type recognition model is obtained by training a plurality of abnormal samples and the abnormal type of each abnormal sample.
  8. 8. The method of claim 1, wherein the generating the first zero knowledge proof of the vehicle data and transmitting to the target backbone node along with the event summary of the abnormal event, the data summary of the vehicle data, comprises: Generating a first zero knowledge proof of the vehicle data, a second hash value and a second digital signature, wherein the second hash value is obtained by calculating a data abstract of the vehicle data and an event abstract of the abnormal event, the second hash value is used as one of public inputs of the first zero knowledge proof and used for proving that the vehicle data meets a preset normal operation constraint, and the second digital signature is obtained by processing the second hash value; The method comprises the steps of sending the first zero knowledge proof, the second hash value, the second digital signature, the event abstract and the data abstract to a target main chain node together, enabling the target main chain node to verify the first zero knowledge proof, the second hash value and the second digital signature based on a preset intelligent contract, generating a second verification result, wherein the second verification result is used for representing whether the first zero knowledge proof, the second hash value and the second digital signature pass verification of the intelligent contract, and in the case that the second verification result represents that the first zero knowledge proof, the second hash value and the second digital signature pass verification of the intelligent contract, broadcasting transactions comprising the event abstract and the data abstract to other main chain nodes except the target main chain node in a block chain system, enabling the block chain system to verify the event abstract and the data abstract based on a consensus mechanism, generating a third verification result, and enabling the third verification result to be used for representing whether the event abstract and the data abstract pass verification mechanism pass verification of the data abstract and the data abstract to pass verification mechanism, and whether the third verification result of the data abstract and the data abstract pass verification mechanism is kept in the block chain system.
  9. 9. The method according to claim 1, wherein the method further comprises: Generating a second zero knowledge proof of the vehicle data under the condition that the detection result represents that the vehicle data are normal, and a third hash value and a third digital signature, wherein the third hash value is obtained by calculating a data abstract of the vehicle data by the target edge node, the third hash value is used as one of public inputs of the second zero knowledge proof and used for proving that the vehicle data meet preset normal operation constraint, and the third digital signature is obtained by processing the third hash value by the target edge node; The method comprises the steps of sending the second zero knowledge proof, the third hash value, the third digital signature and the data digest to the target main chain node together, enabling the target main chain node to verify the second zero knowledge proof, the third hash value and the third digital signature based on a preset intelligent contract, generating a fourth verification result, wherein the fourth verification result is used for representing whether the second zero knowledge proof, the third hash value and the third digital signature pass verification of the intelligent contract, broadcasting transactions containing the data digest to other main chain nodes except the target main chain node in the block chain system when the fourth verification result represents the second zero knowledge proof, the third hash value and the third digital signature pass verification of the intelligent contract, enabling the block chain system to conduct consensus verification on the data digest based on a consensus mechanism, generating a fifth verification result, wherein the fifth verification result is used for representing whether the data digest passes verification, and enabling the data digest to pass the consensus mechanism under the condition that the data digest passes verification mechanism, and recording the multiple-link-verification-digest-state data-keeping-agreement-verification-nodes pass the data digest-and-verification-and-agreement-state-link-verification-system.
  10. 10. A method of processing vehicle data for application to a target backbone node, the method comprising: Receiving a first zero knowledge proof, an event abstract of an abnormal event and a data abstract of vehicle data, wherein the first zero knowledge proof is sent by a target edge node, the abnormal event is generated by the target edge node under the condition that a detection result represents that the vehicle data is abnormal, and a target execution action corresponding to a target abnormality type is executed, the abnormal event comprises the target abnormality type, the detection result is obtained by the target edge node detecting the vehicle data and is used for representing whether the vehicle data is normal or not, the first zero knowledge proof is generated by the target edge node according to the vehicle data transmitted by a vehicle-mounted terminal, the target edge node is any one of a plurality of edge nodes of a vehicle networking system and is in communication connection with a blockchain system, and the blockchain system comprises a plurality of main chain nodes which are any one of the main chain nodes; in the event that the first zero knowledge proof verification passes, synchronizing the event digest and the data digest into the plurality of backbone nodes of the blockchain system.
  11. 11. The method of claim 10, wherein, in the event that the first zero knowledge proof verification passes, prior to synchronizing the event digest and the data digest into the plurality of backbone nodes of the blockchain system, the method further comprises: Receiving a second hash value and a second digital signature, wherein the second hash value is sent by the target edge node, the second hash value is obtained by calculating a data abstract of the vehicle data and an event abstract of the abnormal event by the target edge node, the second hash value is used as one of public inputs of the first zero knowledge proof and used for proving that the vehicle data meets a preset normal operation constraint, and the second digital signature is obtained by processing the second hash value by the target edge node; the synchronizing the event digest and the data digest into the plurality of backbone nodes of the blockchain system if the first zero-knowledge proof verification passes, comprising: verifying the first zero-knowledge proof, the second hash value and the second digital signature based on a preset intelligent contract, and generating a second verification result, wherein the second verification result is used for representing whether the first zero-knowledge proof, the second hash value and the second digital signature pass the verification of the intelligent contract; broadcasting a transaction comprising the event digest and the data digest to other backbone nodes in the blockchain system except the target backbone node under the condition that the second verification result characterizes the first zero knowledge proof, the second hash value and the second digital signature to pass the intelligent contract verification, and performing consensus verification on the event digest and the data digest by the blockchain system based on a consensus mechanism to generate a third verification result, wherein the third verification result is used for characterizing whether the event digest and the data digest pass the consensus verification or not; and if the third verification result represents that the event digest and the data digest pass the consensus verification, recording the event digest and the data digest in the blockchain system, and keeping the data consistency by the plurality of main chain nodes based on the consensus mechanism.
  12. 12. The method according to claim 10, wherein the method further comprises: Receiving a second zero knowledge proof, a third hash value, a third digital signature and a data abstract, wherein the second zero knowledge proof is generated by the target edge node according to the vehicle data under the condition that the detection result represents that the vehicle data are normal, the third hash value is obtained by calculating the data abstract of the vehicle data by the target edge node, the third hash value is used as one of public inputs of the second zero knowledge proof and used for proving that the vehicle data meet a preset normal operation constraint, and the third digital signature is obtained by processing the third hash value by the target edge node; Verifying the second zero knowledge proof, the third hash value and the third digital signature based on a preset intelligent contract to generate a fourth verification result, wherein the fourth verification result is used for representing whether the second zero knowledge proof, the third hash value and the third digital signature pass the verification of the intelligent contract; Broadcasting a transaction containing the data digest to other main chain nodes except the target main chain node in the blockchain system under the condition that the fourth verification result represents the second zero knowledge proof, the third hash value and the third digital signature pass the intelligent contract verification, and performing consensus verification on the data digest by the blockchain system based on a consensus mechanism to generate a fifth verification result, wherein the fifth verification result is used for representing whether the data digest passes the consensus verification; And if the fifth verification result represents that the data digest consensus verification is passed, recording the data digest in the blockchain system, and keeping the data consistency by the plurality of main chain nodes through the consensus mechanism.
  13. 13. A vehicle data processing apparatus for application to a target edge node, the apparatus comprising: the first receiving module is used for receiving vehicle data transmitted by the vehicle-mounted terminal, the target edge node is any one of a plurality of edge nodes of the Internet of vehicles system, the target edge node is in communication connection with the blockchain system, and the blockchain system comprises a plurality of main chain nodes; The detection module is used for detecting the vehicle data and generating a detection result, and the detection result is used for representing whether the vehicle data are normal or not; The execution module is used for generating an abnormal event and executing a target execution action under the condition that the detection result represents that the vehicle data is abnormal, wherein the abnormal event comprises a target abnormal type, the target abnormal type is an abnormal type corresponding to the vehicle data, and the target execution action is taken as the execution action corresponding to the target abnormal type; And the first sending module is used for generating a first zero knowledge proof of the vehicle data, and sending the first zero knowledge proof to a target main chain node together with an event abstract of the abnormal event and a data abstract of the vehicle data, so that the target main chain node synchronizes the event abstract and the data abstract to the plurality of main chain nodes of the blockchain system under the condition that the first zero knowledge proof passes verification, and the target main chain node is any one of the plurality of main chain nodes.
  14. 14. A vehicle data processing apparatus for application to a target backbone node, the apparatus comprising: The second receiving module is used for receiving a first zero knowledge proof, an event abstract of an abnormal event and a data abstract of vehicle data, wherein the first zero knowledge proof is sent by a target edge node, the abnormal event is generated by the target edge node under the condition that a detection result represents that the vehicle data is abnormal, and a target execution action corresponding to a target abnormal type is executed, the abnormal event comprises the target abnormal type, the detection result is obtained by detecting the vehicle data by the target edge node and is used for representing whether the vehicle data is normal or not, the first zero knowledge proof is generated by the target edge node according to the vehicle data transmitted by a vehicle-mounted terminal, the target edge node is any one of a plurality of edge nodes of a vehicle networking system and is in communication connection with a block chain system, and the block chain system comprises a plurality of main chain nodes which are any one of the main chain nodes; And the synchronization module is used for synchronizing the event digest and the data digest into the plurality of main chain nodes of the blockchain system under the condition that the first zero knowledge proof verification passes.
  15. 15. An electronic device comprising a processor and a memory storing computer program instructions, the processor, when executing the computer program instructions, implementing a method of processing vehicle data according to any one of claims 1-12.
  16. 16. A computer-readable storage medium, on which computer program instructions are stored which, when executed by a processor, implement a method of processing vehicle data according to any one of claims 1-12.
  17. 17. A computer program product, characterized in that instructions in the computer program product, when executed by a processor of an electronic device, cause the electronic device to perform the method of processing vehicle data according to any one of claims 1-12.

Description

Method, device, equipment, storage medium and program product for processing vehicle data Technical Field The present application relates to the field of vehicle technologies, and in particular, to a vehicle data processing method, device, apparatus, storage medium, and program product. Background With the rapid development of internet of vehicles (Internet of Vehicles, ioV) technology, the amount of data generated by vehicles has increased exponentially. These data include not only basic information of vehicle operation status, driving behavior, geographical location, etc., but also high-precision sensor data, automatic driving decision data, and user privacy information. The size and value of vehicle data makes it a core asset for internet of vehicles systems and also a primary target for network attacks. In recent years, network attack events aiming at the Internet of vehicles are frequent in the global scope, such as hijacking of vehicle remote control, disclosure of user privacy data and the like, and serious threatens to driving safety and user rights and interests. Therefore, how to protect the vehicle data in the internet of vehicles safely and reliably becomes a technical problem to be solved urgently by those skilled in the art. Disclosure of Invention The embodiment of the application provides a vehicle data processing method, device, equipment, storage medium and program product, which can greatly improve the anti-attack capability of data in the Internet of vehicles. In a first aspect, an embodiment of the present application provides a method for processing vehicle data, applied to a target edge node, where the method includes: receiving vehicle data transmitted by a vehicle-mounted terminal, wherein the target edge node is any one of a plurality of edge nodes of a vehicle networking system, the target edge node is in communication connection with a blockchain system, and the blockchain system comprises a plurality of main chain nodes; detecting the vehicle data to generate a detection result, wherein the detection result is used for representing whether the vehicle data are normal or not; Generating an abnormal event and executing a target execution action under the condition that the detection result represents that the vehicle data is abnormal, wherein the abnormal event comprises a target abnormal type, the target abnormal type is an abnormal type corresponding to the vehicle data, and the target execution action is taken as an execution action corresponding to the target abnormal type; Generating a first zero knowledge proof of the vehicle data and sending the first zero knowledge proof to a target main chain node together with an event summary of the abnormal event and a data summary of the vehicle data, so that the target main chain node synchronizes the event summary and the data summary into a plurality of main chain nodes of the blockchain system when the first zero knowledge proof passes verification, wherein the target main chain node is any one of the plurality of main chain nodes. In a second aspect, an embodiment of the present application provides a method for processing vehicle data, applied to a target main chain node, where the method includes: Receiving a first zero knowledge proof, an event abstract of an abnormal event and a data abstract of vehicle data, wherein the first zero knowledge proof is sent by a target edge node, the abnormal event is generated by the target edge node under the condition that a detection result represents that the vehicle data is abnormal, and a target execution action corresponding to a target abnormality type is executed, the abnormal event comprises the target abnormality type, the detection result is obtained by the target edge node detecting the vehicle data and is used for representing whether the vehicle data is normal or not, the first zero knowledge proof is generated by the target edge node according to the vehicle data transmitted by a vehicle-mounted terminal, the target edge node is any one of a plurality of edge nodes of a vehicle networking system and is in communication connection with a blockchain system, and the blockchain system comprises a plurality of main chain nodes which are any one of the main chain nodes; in the event that the first zero knowledge proof verification passes, synchronizing the event digest and the data digest into the plurality of backbone nodes of the blockchain system. In a third aspect, an embodiment of the present application provides a device for processing vehicle data, applied to a target edge node, where the device includes: the first receiving module is used for receiving vehicle data transmitted by the vehicle-mounted terminal, the target edge node is any one of a plurality of edge nodes of the Internet of vehicles system, the target edge node is in communication connection with the blockchain system, and the blockchain system comprises a plurality of main chain nodes; The detection module is u