CN117479198A - Link monitoring method based on mobile phone remote control car - Google Patents
Link monitoring method based on mobile phone remote control car Download PDFInfo
- Publication number
- CN117479198A CN117479198A CN202311285760.7A CN202311285760A CN117479198A CN 117479198 A CN117479198 A CN 117479198A CN 202311285760 A CN202311285760 A CN 202311285760A CN 117479198 A CN117479198 A CN 117479198A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- remote control
- log
- alarm
- log information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000005540 biological transmission Effects 0.000 claims abstract description 15
- 238000007405 data analysis Methods 0.000 claims abstract description 13
- 230000002159 abnormal effect Effects 0.000 claims abstract description 7
- 238000005457 optimization Methods 0.000 claims abstract description 4
- 230000000007 visual effect Effects 0.000 claims abstract description 4
- 238000004140 cleaning Methods 0.000 claims abstract 2
- 230000004044 response Effects 0.000 claims description 45
- 238000005516 engineering process Methods 0.000 claims description 23
- 239000010978 jasper Substances 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 7
- 230000006855 networking Effects 0.000 claims description 6
- 230000002618 waking effect Effects 0.000 claims 2
- 238000001914 filtration Methods 0.000 abstract description 2
- 230000000977 initiatory effect Effects 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004171 remote diagnosis Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 230000037007 arousal Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013079 data visualisation Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0208—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the configuration of the monitoring system
- G05B23/0213—Modular or universal configuration of the monitoring system, e.g. monitoring system having modules that may be combined to build monitoring program; monitoring system that can be applied to legacy systems; adaptable monitoring system; using different communication protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/24—Pc safety
- G05B2219/24065—Real time diagnostics
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域Technical field
本申请涉及图像处理领域,具体而言,涉及一种基于手机远控车机的链路监控方法。This application relates to the field of image processing, specifically, to a link monitoring method based on mobile phone remote control of vehicle.
背景技术Background technique
远程车辆控制技术是汽车智能化和网络化的重要组成部分,在实现对车辆的智能化控制和监测过程中发挥着重要作用。但是实际应用中,由于手机远控汽车车机与车辆硬件和较旧的车辆系统集成困难,车辆硬件之间的通信协议更新缓慢,导致实际应用中连接的稳定性不可靠,容易出现断线等问题。手机远控汽车车机产生的数据量较大,包括车辆行驶数据、用户习惯数据等,如何进行合理、有效的数据处理和分析成为汽车厂商和管理者所面临的问题。要解决这些问题,需要汽车行业相关公司加强技术研发与安全控制,提高连接和数据处理的稳定性、安全性和便利性,以便更好地服务用户,并推动汽车智能化和网络化的进程。那么如何知道车机具体在哪个环节出现问题就显得至关重要,本远控链路监控方法可以通过监控手机远控车机的各个链路,帮助汽车厂商和管理者优化远控车辆控制技术。Remote vehicle control technology is an important part of automobile intelligence and networking, and plays an important role in realizing intelligent control and monitoring of vehicles. However, in practical applications, due to the difficulty of integrating mobile phone remote control car machines with vehicle hardware and older vehicle systems, the communication protocol between vehicle hardware is slowly updated, resulting in unreliable connection stability in practical applications and prone to disconnections. question. Mobile phone remote control of automobiles generates a large amount of data, including vehicle driving data, user habit data, etc. How to conduct reasonable and effective data processing and analysis has become a problem faced by automobile manufacturers and managers. To solve these problems, relevant companies in the automotive industry need to strengthen technology research and development and security control, improve the stability, security and convenience of connections and data processing, so as to better serve users and promote the process of automobile intelligence and networking. Then it is crucial to know which link of the vehicle and machine has problems. This remote control link monitoring method can help automobile manufacturers and managers optimize remote control vehicle control technology by monitoring each link of the mobile phone's remote control of the car and machine.
因此,本申请提供了一种基于手机远控车机的链路监控方法,以解决上述技术问题之一。Therefore, this application provides a link monitoring method based on mobile phone remote control of vehicle to solve one of the above technical problems.
发明内容Contents of the invention
本申请的目的在于提供一种基于手机远控车机的链路监控方法,能够解决上述提到的至少一个技术问题。具体方案如下:The purpose of this application is to provide a link monitoring method based on mobile phone remote control of the vehicle, which can solve at least one of the technical problems mentioned above. The specific plans are as follows:
根据本申请的具体实施方式,本申请提供一种基于手机远控车机的链路监控方法,包括:According to the specific implementation mode of this application, this application provides a link monitoring method based on mobile phone remote control of vehicle, including:
S1,基于手机远控车机链路,在车机端记录车辆控制系统中的日志信息;S1, based on the mobile phone remote control vehicle-machine link, records the log information in the vehicle control system on the vehicle-machine side;
其中,所述日志信息包括操作日志和错误日志;Wherein, the log information includes operation logs and error logs;
S2,将日志信息格式化清洗,并存储到车机端数字孪生服务的存储空间中;S2, format and clean the log information, and store it in the storage space of the digital twin service on the vehicle and machine side;
S3,分析存储的日志信息,并进行容错处理,找出远程服务器内数据丢失或重复的异常日志信息;S3, analyzes the stored log information and performs fault tolerance processing to find abnormal log information where data is lost or duplicated in the remote server;
S4,通过远程日志传输技术,车机端数字孪生服务将日志信息同步至远程服务器的云端数字孪生服务;S4, through remote log transmission technology, the vehicle-side digital twin service synchronizes log information to the cloud digital twin service of the remote server;
S5,远程服务器根据云端数字孪生服务监控手机远控车机链路;S5, the remote server monitors the mobile phone remote control vehicle-machine link based on the cloud digital twin service;
S6,设置报警阈值,远程服务器在监控过程中,当异常情况的日志信息超过报警阈值时,发出警报信息;S6, set the alarm threshold. During the monitoring process, when the log information of abnormal situations exceeds the alarm threshold, the remote server will issue an alarm message;
S7,根据监控日志进行数据分析和优化,并通过可视化界面进行显示。S7 performs data analysis and optimization based on monitoring logs and displays them through a visual interface.
在步骤S1中,在车机端记录车辆控制系统中的日志信息采用车机端记录技术,所述车机端记录技术具体如下:在车机端记录车辆控制系统的日志信息,并通过日志信息中的记录级别以及日志类型记录不同的日志信息,和/或设置日志信息中的记录日志的数量。In step S1, the log information in the vehicle control system is recorded on the vehicle and computer side using vehicle and computer side recording technology. The vehicle and computer side recording technology is specifically as follows: the log information of the vehicle control system is recorded on the vehicle and computer side, and the log information is Record different log information according to the logging level and log type in the log information, and/or set the number of recorded logs in the log information.
在步骤S1中,所述车辆控制系统包括手机端、TSP端、IOT端、TBOX端、车机端以及jasper,其中,TSP为汽车远程服务提供商,IOT为物联网,TBOX为车联网系统,jasper为物联网平台,物联网平台用于监测车辆状况、提供远程诊断、数据分析和车辆管理,手机端与TSP端连接,TSP端与IOT端连接,IOT端与TBOX端连接,TBOX端与车机端连接,TSP端与jasper连接,jasper与车机端连接。In step S1, the vehicle control system includes a mobile phone terminal, a TSP terminal, an IOT terminal, a TBOX terminal, a car terminal and jasper, where TSP is a car remote service provider, IOT is the Internet of Things, and TBOX is a car networking system. Jasper is an Internet of Things platform. The Internet of Things platform is used to monitor vehicle conditions, provide remote diagnosis, data analysis and vehicle management. The mobile phone terminal is connected to the TSP terminal, the TSP terminal is connected to the IOT terminal, the IOT terminal is connected to the TBOX terminal, and the TBOX terminal is connected to the vehicle The machine side is connected, the TSP side is connected to jasper, and jasper is connected to the car machine side.
所述手机远控车机链路包括远控请求、远控下行、远控执行、远控上行、结果轮询和车辆唤醒;The mobile phone remote control vehicle-machine link includes remote control request, remote control downlink, remote control execution, remote control uplink, result polling and vehicle wake-up;
各个链路具体内容如下:The specific content of each link is as follows:
远控请求:手机发起远控请求到TSP,为发送请求阶段;Remote control request: The mobile phone initiates a remote control request to the TSP, which is the request sending stage;
远控下行:TSP接收到手机发送的远控请求,再发送请求到IOT,为远控下行阶段;Remote control downlink: TSP receives the remote control request sent by the mobile phone, and then sends the request to IOT, which is the remote control downlink stage;
远控执行:IOT接收TSP发送的请求,再发送请求到TBOX。TBOX再发送到车机,车机接收到TBOX的请求,再发送请求到TBOX,TBOX发送成功,再发送请求到IOT,为远控执行阶段;Remote control execution: IOT receives the request sent by TSP and then sends the request to TBOX. TBOX is then sent to the vehicle computer. The vehicle computer receives the TBOX request and then sends the request to TBOX. If TBOX is sent successfully, it then sends the request to IOT, which is the remote control execution stage;
远控上行:IOT接收到TBOX的请求,再发送请求到TSP,为远控上行阶段;Remote control uplink: IOT receives the request from TBOX and then sends the request to TSP, which is the remote control uplink stage;
结果轮询:手机轮询TSP,为结果轮询阶段;Result polling: The mobile phone polls the TSP, which is the result polling stage;
车辆唤醒:通过jasper自动监测车辆联网状态,当车辆不在线时,进行车辆唤醒,为车辆唤醒阶段。Vehicle wake-up: Automatically monitor the vehicle networking status through jasper. When the vehicle is not online, the vehicle wake-up is performed, which is the vehicle wake-up stage.
在步骤S5中,监控内容包括:In step S5, monitoring content includes:
成功次数:返回成功结果,视为成功一次;Number of successes: Returning a successful result is considered a success;
失败次数:返回失败结果、响应超时,均视为失败;Number of failures: Returning failure results and response timeout are all considered failures;
请求总次数:上一个阶段成功次数;Total number of requests: number of successes in the previous stage;
成功率:成功次数/请求总次数;Success rate: number of successes/total number of requests;
响应时长:成功时间-上一个阶段成功时间;Response time: success time - success time of the previous stage;
平均响应时长:响应时长和/请求总次数;Average response time: response time and/total number of requests;
错误码:各个链路的错误码;Error code: error code of each link;
错误类型:各个链路的错误类型;Error type: the error type of each link;
错误占比:各个链路的错误率;Error proportion: the error rate of each link;
报警阈值:各个链路的响应时长告警和成功率告警。Alarm threshold: response time alarm and success rate alarm of each link.
在步骤S6中,所述报警阈值包括响应时长告警和成功率告警,In step S6, the alarm threshold includes response time alarm and success rate alarm,
其中,应用响应时长告警的链路包括车辆唤醒、远控下行和结果轮询,响应时长告警为时间1小时内每个链路平均响应时长;Among them, the links to which the response time alarm is applied include vehicle wake-up, remote control downlink and result polling. The response time alarm is the average response time of each link within 1 hour;
应用成功率告警的链路包括车辆唤醒、远控下行、远控上行和结果轮询,成功率告警为时间1小时内每个链路的成功率。The links to which the success rate alarm is applied include vehicle wake-up, remote control downlink, remote control uplink and result polling. The success rate alarm is the success rate of each link within 1 hour.
响应时长告警的阈值设置如下,响应时长超过阈值报警:The threshold settings for the response time alarm are as follows. If the response time exceeds the threshold, an alarm will be issued:
在车辆唤醒阶段,时间1小时内唤醒平均响应时长的阈值为3秒;During the vehicle wake-up phase, the threshold for the average wake-up response time within 1 hour is 3 seconds;
在远控下行阶段,时间1小时内远控下行平均响应时长的阈值为3秒;In the remote control downlink stage, the threshold for the average remote control downlink response time within 1 hour is 3 seconds;
在结果轮询阶段,时间1小时内结果轮询平均响应时长的阈值为3秒。In the result polling phase, the threshold for the average response time of result polling within one hour is 3 seconds.
成功率告警的阈值设置如下,成功率低于阈值报警:The thresholds for success rate alarms are set as follows. If the success rate is lower than the threshold, an alarm will be issued:
在车辆唤醒阶段,时间1小时内唤醒成功率的阈值为80%;In the vehicle wake-up phase, the threshold for wake-up success rate within 1 hour is 80%;
在远控下行阶段,时间1小时内远控上行成功率的阈值为80%;In the remote control downlink stage, the threshold for remote control uplink success rate within 1 hour is 80%;
在远控上行阶段,时间1小时内远控下行成功率的阈值为80%;In the remote control uplink stage, the threshold for remote control downlink success rate within 1 hour is 80%;
在结果轮询阶段,时间1小时内结果轮询成功率的阈值为80%。In the result polling phase, the threshold for the result polling success rate within 1 hour is 80%.
在步骤S4中,在远程日志传输技术中加入安全防护技术,对日志数据进行加密和/或权限控制。In step S4, security protection technology is added to the remote log transmission technology to encrypt and/or access the log data.
本申请实施例的上述方案与现有技术相比,至少具有以下有益效果:Compared with the prior art, the above solutions of the embodiments of the present application have at least the following beneficial effects:
本申请提供了一种基于手机远控车机的链路监控方法,通过记录车辆控制系统的操作日志和错误信息,可以及时发现系统中的问题和异常情况,通过远程监控,可以快速采取应对措施,避免车辆控制系统出现故障和崩溃的情况;This application provides a link monitoring method based on mobile phone remote control of vehicles. By recording the operation logs and error messages of the vehicle control system, problems and abnormalities in the system can be discovered in a timely manner. Through remote monitoring, countermeasures can be quickly taken. , to avoid vehicle control system failures and crashes;
采用远程车机日志传输技术,可以实现远程观察和操作车辆控制系统,管理员可以通过手机等移动终端,观察车辆控制系统的实时运行状态,进行相应的控制操作,从而避免了必须亲身到车辆现场进行操作的限制;Using remote vehicle log transmission technology, remote observation and operation of the vehicle control system can be achieved. Administrators can observe the real-time operating status of the vehicle control system through mobile terminals such as mobile phones and perform corresponding control operations, thus avoiding the need to physically visit the vehicle site. restrictions on conducting operations;
数据分析和存储技术,可以通过对大量的数据进行分析和挖掘,发现各种问题和异常,帮助优化控制系统的性能,管理员可以通过分析数据来优化控制系统,从而提高车辆的运行效率和安全性。另外,系统升级也可以在数据分析的基础上进行,以提高控制系统的功能和性能;Data analysis and storage technology can analyze and mine large amounts of data to discover various problems and anomalies and help optimize the performance of the control system. Administrators can optimize the control system by analyzing data, thereby improving the operating efficiency and safety of the vehicle. sex. In addition, system upgrades can also be carried out based on data analysis to improve the functions and performance of the control system;
通过安全防护技术,对数据进行加密和传输协议的控制,以保证数据传输的安全和可靠,同时,管理员可以设置权限控制和身份验证等措施,确保只有授权人员才能访问和管理车辆控制系统的数据和信息,从而保护了用户的隐私和权益。Through security protection technology, data is encrypted and transmission protocols are controlled to ensure the safety and reliability of data transmission. At the same time, administrators can set permission control and identity verification and other measures to ensure that only authorized personnel can access and manage the vehicle control system. data and information, thus protecting the privacy and rights of users.
附图说明Description of the drawings
图1示出了根据本申请实施例的基于手机远控车机的链路监控方法的流程图;Figure 1 shows a flow chart of a link monitoring method based on mobile phone remote control of a vehicle according to an embodiment of the present application;
图2示出了根据本申请实施例的基于手机远控车机的链路监控方法的链路框图;Figure 2 shows a link block diagram of a link monitoring method based on mobile phone remote control of a vehicle according to an embodiment of the present application;
图3示出了根据本申请实施例的基于手机远控车机的链路监控方法的数据流取值图。Figure 3 shows a data flow value diagram of a link monitoring method based on mobile phone remote control of a vehicle according to an embodiment of the present application.
具体实施方式Detailed ways
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described in further detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the scope of protection of this application.
在本申请实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。在本申请实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义,“多种”一般包含至少两种。The terminology used in the embodiments of the present application is only for the purpose of describing specific embodiments and is not intended to limit the present application. As used in the embodiments and the appended claims, the singular forms "a," "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. Usually contains at least two kinds.
应当理解,本文中使用的术语“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the term "and/or" used in this article is only an association relationship describing related objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, and A and A exist simultaneously. B, there are three situations of B alone. In addition, the character "/" in this article generally indicates that the related objects are an "or" relationship.
应当理解,尽管在本申请实施例中可能采用术语第一、第二、第三等来描述,但这些描述不应限于这些术语。这些术语仅用来将描述区分开。例如,在不脱离本申请实施例范围的情况下,第一也可以被称为第二,类似地,第二也可以被称为第一。It should be understood that although the terms first, second, third, etc. may be used to describe the embodiments of the present application, these descriptions should not be limited to these terms. These terms are only used to distinguish descriptions. For example, without departing from the scope of the embodiments of the present application, the first may also be called the second, and similarly, the second may also be called the first.
取决于语境,如在此所使用的词语“如果”、“若”可以被解释成为“在……时”或“当……时”或“响应于确定”或“响应于检测”。类似地,取决于语境,短语“如果确定”或“如果检测(陈述的条件或事件)”可以被解释成为“当确定时”或“响应于确定”或“当检测(陈述的条件或事件)时”或“响应于检测(陈述的条件或事件)”。Depending on the context, the words "if" or "if" as used herein may be interpreted as "when" or "when" or "in response to determination" or "in response to detection." Similarly, depending on the context, the phrase "if determined" or "if (stated condition or event) is detected" may be interpreted as "when determined" or "in response to determining" or "when (stated condition or event) is detected )" or "in response to detecting (a stated condition or event)".
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的商品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种商品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的商品或者装置中还存在另外的相同要素。It should also be noted that the terms "comprises", "comprises" or any other variation thereof are intended to cover a non-exclusive inclusion, such that a good or apparatus including a list of elements includes not only those elements but also those not expressly listed other elements, or elements inherent to such goods or devices. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of other identical elements in the goods or devices including the stated element.
特别需要说明的是,在说明书中存在的符号和/或数字,如果在附图说明中未被标记的,均不是附图标记。It should be noted that the symbols and/or numbers present in the description are not reference signs if they are not marked in the description of the drawings.
下面结合附图详细说明本申请的可选实施例。Optional embodiments of the present application are described in detail below with reference to the accompanying drawings.
对本申请提供的实施例,即一种基于手机远控车机的链路监控方法的实施例。The embodiment provided in this application is an embodiment of a link monitoring method based on mobile phone remote control of vehicle.
下面结合图1对本申请实施例进行详细说明。The embodiment of the present application will be described in detail below with reference to FIG. 1 .
本申请实施例提供了一种基于手机远控车机的链路监控方法,包括:The embodiment of this application provides a link monitoring method based on mobile phone remote control of vehicle, including:
S1,基于手机远控车机链路,在车机端记录车辆控制系统中的日志信息。S1, based on the mobile phone remote control vehicle-machine link, records the log information in the vehicle control system on the vehicle-machine side.
其中,所述日志信息包括操作日志和错误日志。The log information includes operation logs and error logs.
在步骤S1中,在车机端记录车辆控制系统中的日志信息采用车机端记录技术,所述车机端记录技术具体如下:在车机端记录车辆控制系统的日志信息,并通过日志信息中的记录级别以及日志类型记录不同的日志信息,和/或设置日志信息中的记录日志的数量,防止存储空间被占满。In step S1, the log information in the vehicle control system is recorded on the vehicle and computer side using vehicle and computer side recording technology. The vehicle and computer side recording technology is specifically as follows: the log information of the vehicle control system is recorded on the vehicle and computer side, and the log information is Record different log information according to the recording level and log type in the log information, and/or set the number of recorded logs in the log information to prevent the storage space from being filled up.
S2,将日志信息格式化清洗,并存储到车机端数字孪生服务的存储空间中。S2 formats and cleans the log information and stores it in the storage space of the vehicle-side digital twin service.
S3,分析存储的日志信息,并进行容错处理,找出远程服务器内数据丢失或重复的异常日志信息。S3 analyzes the stored log information and performs fault tolerance processing to find abnormal log information where data is lost or duplicated in the remote server.
S4,通过远程日志传输技术,车机端数字孪生服务将日志信息同步至远程服务器的云端数字孪生服务。S4, through remote log transmission technology, the vehicle-side digital twin service synchronizes log information to the cloud digital twin service of the remote server.
通过远程车机日志传输技术,将车机端记录的日志信息上传到远程服务器中。在数据传输过程中加入安全防护技术,对日志数据进行加密和/或权限控制,可以选择采用SSL加密传输、HTTP协议等技术来保证传输数据的安全性,确保记录的日志和传输的数据不会被未经授权的第三方获取,保障用户的隐私和权益。Through remote vehicle-machine log transmission technology, the log information recorded on the vehicle-machine side is uploaded to the remote server. Add security protection technology during the data transmission process to encrypt and/or access the log data. You can choose to use SSL encrypted transmission, HTTP protocol and other technologies to ensure the security of the transmitted data and ensure that the recorded logs and transmitted data will not Obtained by unauthorized third parties to protect the privacy and rights of users.
S5,远程服务器根据云端数字孪生服务监控手机远控车机链路。S5, the remote server monitors the mobile phone remote control vehicle-machine link based on the cloud digital twin service.
S6,设置报警阈值,在监控过程中,当异常情况的日志信息超过报警阈值时,发出警报信息。S6: Set the alarm threshold. During the monitoring process, when the abnormal log information exceeds the alarm threshold, an alarm message is issued.
S7,根据监控日志进行数据分析和优化,并通过可视化界面进行显示。S7 performs data analysis and optimization based on monitoring logs and displays them through a visual interface.
在远程服务器上对日志数据进行存储和数据分析,通过数据可视化的方式来分析日志数据,发现系统的异常行为,及时发出警报信息,并进行相应的处理。Store and analyze log data on the remote server, analyze the log data through data visualization, discover abnormal behavior of the system, issue alarm information in a timely manner, and perform corresponding processing.
如图2所示,所述车辆控制系统包括手机端、TSP端、IOT端、TBOX端、车机端以及jasper,其中,TSP为汽车远程服务提供商,IOT为物联网,TBOX为车联网系统,jasper为物联网平台,物联网平台用于监测车辆状况、提供远程诊断、数据分析和车辆管理,手机端与TSP端连接,TSP端与IOT端连接,IOT端与TBOX端连接,TBOX端与车机端连接,TSP端与jasper连接,jasper与车机端连接。As shown in Figure 2, the vehicle control system includes a mobile phone terminal, a TSP terminal, an IOT terminal, a TBOX terminal, a car terminal and jasper. Among them, TSP is the automotive remote service provider, IOT is the Internet of Things, and TBOX is the Internet of Vehicles system. , jasper is an Internet of Things platform. The Internet of Things platform is used to monitor vehicle conditions, provide remote diagnosis, data analysis and vehicle management. The mobile phone terminal is connected to the TSP terminal, the TSP terminal is connected to the IOT terminal, the IOT terminal is connected to the TBOX terminal, and the TBOX terminal is connected to The car and computer end are connected, the TSP end is connected to jasper, and jasper is connected to the car and computer end.
所述手机远控车机链路包括远控请求、远控下行、远控执行、远控上行、结果轮询和车辆唤醒。The mobile phone remote control vehicle-machine link includes remote control request, remote control downlink, remote control execution, remote control uplink, result polling and vehicle wake-up.
其中,in,
远控请求:手机发起远控请求到TSP,为发送请求阶段;Remote control request: The mobile phone initiates a remote control request to the TSP, which is the request sending stage;
远控下行:TSP接收到手机发送的远控请求,再发送请求到IOT,为远控下行阶段;Remote control downlink: TSP receives the remote control request sent by the mobile phone, and then sends the request to IOT, which is the remote control downlink stage;
远控执行:IOT接收TSP发送的请求,再发送请求到TBOX。TBOX再发送到车机,车机接收到TBOX的请求,再发送请求到TBOX。TBOX发送成功,再发送请求到IOT,为远控执行阶段;Remote control execution: IOT receives the request sent by TSP and then sends the request to TBOX. The TBOX is then sent to the vehicle computer. The vehicle computer receives the TBOX request and then sends the request to the TBOX. TBOX is sent successfully, and then the request is sent to IOT, which is the remote control execution stage;
远控上行:IOT接收到TBOX的请求,再发送请求到TSP,为远控上行阶段;Remote control uplink: IOT receives the request from TBOX and then sends the request to TSP, which is the remote control uplink stage;
结果轮询:手机轮询TSP,为结果轮询阶段;Result polling: The mobile phone polls the TSP, which is the result polling stage;
车辆唤醒:通过jasper自动监测车辆联网状态,当车辆不在线时,进行车辆唤醒,为车辆唤醒阶段。Vehicle wake-up: Automatically monitor the vehicle networking status through jasper. When the vehicle is not online, the vehicle wake-up is performed, which is the vehicle wake-up stage.
在步骤S5中,所述远程服务器根据日志信息监控远程车辆控制链路的计算指标包括:In step S5, the remote server monitors the calculation indicators of the remote vehicle control link according to the log information, including:
成功次数:返回成功结果,视为成功一次;Number of successes: Returning a successful result is considered a success;
失败次数:返回失败结果、响应超时,均视为失败;Number of failures: Returning failure results and response timeout are all considered failures;
请求总次数=上一个阶段成功次数,例如下行总次数=远控发起成功数;The total number of requests = the number of successes in the previous stage, for example, the total number of downlinks = the number of successful remote control initiations;
成功率=成功次数/请求总次数;Success rate = number of successes/total number of requests;
响应时长=成功时间-上一个阶段成功时间,例如下行响应时长=下行成功时间-远控发起成功时间;Response time = success time - success time of the previous stage, for example, downlink response time = downlink success time - remote control initiation success time;
平均响应时长=响应时长和/请求总次数;Average response time = response time and/total number of requests;
错误码:各个链路的错误码;Error code: error code of each link;
错误类型:各个链路的错误类型;Error type: the error type of each link;
错误占比:各个链路的错误率;Error proportion: the error rate of each link;
报警阈值:各个链路的响应时长告警和成功率告警。Alarm threshold: response time alarm and success rate alarm of each link.
在步骤S6中,所述报警阈值包括响应时长报警阈值和成功率报警阈值,其中,In step S6, the alarm threshold includes a response time alarm threshold and a success rate alarm threshold, where,
响应时长告警:超过阈值,报警通知管理员;Response time alarm: If the threshold is exceeded, the alarm will notify the administrator;
分析维度/链路:车辆唤醒、远控下行和结果轮询;Analysis dimensions/links: vehicle wake-up, remote control downlink and result polling;
时间区域:1小时;Time zone: 1 hour;
阈值设置见下表1。The threshold settings are shown in Table 1 below.
表1Table 1
成功率告警:超过阈值,报警通知管理员;Success rate alarm: If the threshold is exceeded, the alarm will notify the administrator;
分析维度/链路:车辆唤醒、远控下行、远控上行和结果轮询;Analysis dimensions/links: vehicle wake-up, remote control downlink, remote control uplink and result polling;
时间区域:1小时;Time zone: 1 hour;
阈值设置见下表2。The threshold settings are shown in Table 2 below.
表2Table 2
在步骤S5中,远程服务器根据日志信息监控手机远控车机链路的数据流如图3所示,包括ods层、dwd层和dws层,数据由ods层到dwd层进行过滤,ods层数据包括gray_monitor_log(data string,p_date string)和tsp_app_log(data string,p_datestring),其中,data为json格式的原始数据,p_date为分区字段,数据由ods层至dwd层为解析json数据,数据由dwd层至dws层为数据汇总。In step S5, the remote server monitors the data flow of the mobile phone remote control car-machine link based on the log information, as shown in Figure 3, including the ods layer, dwd layer and dws layer. The data is filtered from the ods layer to the dwd layer. The ods layer data Including gray_monitor_log(data string,p_date string) and tsp_app_log(data string,p_datestring), where data is the original data in json format, p_date is the partition field, the data is from the ods layer to the dwd layer to parse the json data, and the data is from the dwd layer to The dws layer is data summary.
数据由ods层到dwd层的数据过滤规则如表3所示,其中,The data filtering rules from the ods layer to the dwd layer are shown in Table 3, where,
链路阶段:车机发起请求到请求返回结果,为一个完整的链路,称为全链路,中间又包含发起、下行、Tbox执行、上行、全链路(当车机不在线时,又包含车机唤醒阶段,可以参考上面的业务完整链路图)。Link stage: from when the vehicle and the computer initiate a request to when the request returns the result, it is a complete link, called the full link, which includes initiation, downlink, Tbox execution, uplink, and full link (when the vehicle and the computer are not online, the Including the vehicle-machine wake-up phase, please refer to the complete business link diagram above).
微服务类型:不同链路的数据存储在不同微服务中。Microservice type: Data of different links are stored in different microservices.
取数逻辑:定义取数的规则,比如发起次数,微服务日志中满足url=control andresponseParams=null and去重,即为命中规则。针对表3数据,举例说明,链路阶段为‘发起’,‘微服务类型’为tsp-app-log,取数逻辑为url=control and responseParams=nulland去重,即为从tsp-app-log微服务中,取日志中包含control并且responseParams=null的数据去掉重复数据,即为发起阶段,计发起一次。Number retrieval logic: Define the number retrieval rules, such as the number of initiations. If the microservice log satisfies url=control andresponseParams=null and deduplication, it is a hit rule. For the data in Table 3, for example, the link stage is 'initiate', the 'microservice type' is tsp-app-log, and the fetching logic is url=control and responseParams=nulland to remove duplicates, that is, from tsp-app-log In the microservice, the data in the log that contains control and responseParams=null is taken to remove duplicate data, which is the initiation phase, and is counted as one initiation.
而数据由dwd层至dws层采用指标计算,影响原子指标包括成功次数,发起总次数,响应时长,错误类型4类;以计算tbox执行成功阶段的指标为例,dwd层中tbox执行反馈成功的数据汇总则为tbox执行成功次数,tbox执行总次数为tbox执行的上一个阶段的执行成功次数,即为下行反馈成功次数,tbox执行成功率为tbox执行成功次数/tbox执行总次数*100%;以计算tbox执行成功阶段的指标为例,dwd层中tbox执行反馈成功的数据可以获取tbox执行阶段的结束时间,下行反馈成功可以获取tbox执行阶段的开始时间,tbox执行响应时长=tbox执行阶段的结束时间-tbox执行阶段的开始时间;以tbox执行失败阶段的指标为例,根据dwd层中tbox执行失败的数据的err_code和err_message可以分析tbox执行阶段错误类型。The data is calculated from the dwd layer to the dws layer using indicators. The atomic indicators that affect it include the number of successes, the total number of initiations, the response time, and the error type. Taking the indicator for calculating the success stage of tbox execution as an example, the tbox execution feedback in the dwd layer is successful. The data summary is the number of successful executions of tbox. The total number of executions of tbox is the number of successful executions of the previous stage of tbox execution, which is the number of successful downstream feedbacks. The success rate of tbox execution is the number of successful executions of tbox/the total number of executions of tbox*100%; Taking the calculation of indicators in the successful tbox execution phase as an example, the data of successful tbox execution feedback in the dwd layer can obtain the end time of the tbox execution phase. Successful downstream feedback can obtain the start time of the tbox execution phase. The tbox execution response time = the tbox execution phase. End time - the start time of the tbox execution phase; taking the indicators of the tbox execution failure phase as an example, the tbox execution phase error type can be analyzed based on the err_code and err_message of the tbox execution failure data in the dwd layer.
表3table 3
手机远控车机链路日志监控的技术方案有以下几个方面的效果:The technical solution of mobile phone remote control vehicle link log monitoring has the following effects:
1.控制系统的可靠性:通过记录车辆控制系统的操作日志和错误信息,可以及时发现系统中的问题和异常情况。通过远程监控,可以快速采取应对措施,避免车辆控制系统出现故障和崩溃的情况。1. Reliability of the control system: By recording the operation logs and error messages of the vehicle control system, problems and abnormalities in the system can be discovered in a timely manner. Through remote monitoring, countermeasures can be taken quickly to avoid vehicle control system failures and crashes.
2.实现远程观察和操作:采用远程车机日志传输技术,可以实现远程观察和操作车辆控制系统。管理员可以通过手机等移动终端,观察车辆控制系统的实时运行状态,进行相应的控制操作,从而避免了必须亲身到车辆现场进行操作的限制。2. Realize remote observation and operation: Using remote vehicle log transmission technology, remote observation and operation of the vehicle control system can be achieved. Administrators can observe the real-time operating status of the vehicle control system through mobile terminals such as mobile phones and perform corresponding control operations, thus avoiding the restriction of having to go to the vehicle site in person to perform operations.
3.数据分析和系统升级:数据分析和存储技术,可以通过对大量的数据进行分析和挖掘,发现各种问题和异常,帮助优化控制系统的性能。管理员可以通过分析数据来优化控制系统,从而提高车辆的运行效率和安全性。另外,系统升级也可以在数据分析的基础上进行,以提高控制系统的功能和性能。3. Data analysis and system upgrade: Data analysis and storage technology can analyze and mine large amounts of data to discover various problems and anomalies and help optimize the performance of the control system. Administrators can analyze data to optimize control systems to improve vehicle operating efficiency and safety. In addition, system upgrades can also be performed based on data analysis to improve the functionality and performance of the control system.
4.提高数据安全性:安全防护技术方面,对数据进行加密和传输协议的控制,以保证数据传输的安全和可靠。同时,管理员可以设置权限控制和身份验证等措施,确保只有授权人员才能访问和管理车辆控制系统的数据和信息,从而保护了用户的隐私和权益。4. Improve data security: In terms of security protection technology, data is encrypted and transmission protocols are controlled to ensure the safety and reliability of data transmission. At the same time, administrators can set permission control and identity verification measures to ensure that only authorized personnel can access and manage the data and information of the vehicle control system, thus protecting the privacy and rights of users.
综上所述,采用手机远控车机链路日志监控的技术方案,可以实现对车辆控制系统的远程监控和维护。基于数据分析和存储技术,管理员可以通过分析海量数据来优化车辆控制系统,提高效率和性能。同时,安全防护技术的应用,可以保障控制系统的数据和信息安全,避免出现数据泄露等敏感信息问题。In summary, the technical solution of mobile phone remote control vehicle link log monitoring can realize remote monitoring and maintenance of the vehicle control system. Based on data analysis and storage technology, administrators can optimize vehicle control systems and improve efficiency and performance by analyzing massive data. At the same time, the application of security protection technology can ensure the data and information security of the control system and avoid sensitive information issues such as data leakage.
以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。The above embodiments are only used to illustrate the technical solutions of the present application, but are not intended to limit them. Although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that they can still modify the technical solutions described in the foregoing embodiments. Modifications may be made to the recorded technical solutions, or equivalent substitutions may be made to some of the technical features; however, these modifications or substitutions shall not cause the essence of the corresponding technical solutions to deviate from the spirit and scope of the technical solutions of the embodiments of the present application.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311285760.7A CN117479198A (en) | 2023-10-07 | 2023-10-07 | Link monitoring method based on mobile phone remote control car |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311285760.7A CN117479198A (en) | 2023-10-07 | 2023-10-07 | Link monitoring method based on mobile phone remote control car |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN117479198A true CN117479198A (en) | 2024-01-30 |
Family
ID=89622990
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311285760.7A Pending CN117479198A (en) | 2023-10-07 | 2023-10-07 | Link monitoring method based on mobile phone remote control car |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN117479198A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118796612A (en) * | 2024-09-11 | 2024-10-18 | 成都赛力斯科技有限公司 | Vehicle control process monitoring method, device, electronic equipment and storage medium |
-
2023
- 2023-10-07 CN CN202311285760.7A patent/CN117479198A/en active Pending
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118796612A (en) * | 2024-09-11 | 2024-10-18 | 成都赛力斯科技有限公司 | Vehicle control process monitoring method, device, electronic equipment and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6747287B2 (en) | Information processing apparatus and monitoring method | |
| CN111434090A (en) | System and method for providing security to in-vehicle networks | |
| US11074652B2 (en) | System and method for model-based prediction using a distributed computational graph workflow | |
| CN105721198B (en) | A kind of video monitoring system Log security auditing method | |
| CN103117879A (en) | Network monitoring system for computer hardware processing parameters | |
| US12443999B2 (en) | System and method for model-based prediction using a distributed computational graph workflow | |
| CN110017994B (en) | Method, apparatus, system, device and medium for detecting abnormality of autonomous vehicle | |
| CN112787890B (en) | Block chain monitoring system | |
| US12289322B2 (en) | System and method for connected vehicle security incident integration based on aggregate events | |
| EP3794453B1 (en) | Extensible, secure and efficient monitoring & diagnostic pipeline for hybrid cloud architecture | |
| WO2022088160A1 (en) | Anomaly detection method and apparatus | |
| JP7779317B2 (en) | Anomaly detection device, security system, and anomaly notification method | |
| US20210295674A1 (en) | Alarm management system with blockchain technology | |
| CN118764366B (en) | Gateway fault detection method, device, equipment, storage medium and product | |
| CN116305290A (en) | System log security detection method and device, electronic equipment and storage medium | |
| CN105763387A (en) | Network traffic monitoring method and device | |
| CN117479198A (en) | Link monitoring method based on mobile phone remote control car | |
| CN110727563A (en) | Cloud service alarm method and device for preset customer | |
| CN114691633A (en) | Log management method, equipment and storage medium for rail traffic signal system | |
| CN117454373A (en) | Software login identity management and access security control method | |
| CN116662842A (en) | Information processing method, device, equipment and storage medium | |
| CN114037286B (en) | A method and system for detecting sensitive data of power dispatch automation based on big data | |
| CN115664737A (en) | Intrusion detection system and method | |
| CN111565377B (en) | Security monitoring method and device applied to Internet of things | |
| CN118264548B (en) | Computer security operation and maintenance service system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |