Movatterモバイル変換


[0]ホーム

URL:


CN111274268B - Internet of things data transmission method and device, medium and electronic equipment - Google Patents

Internet of things data transmission method and device, medium and electronic equipment
Download PDF

Info

Publication number
CN111274268B
CN111274268BCN202010044996.1ACN202010044996ACN111274268BCN 111274268 BCN111274268 BCN 111274268BCN 202010044996 ACN202010044996 ACN 202010044996ACN 111274268 BCN111274268 BCN 111274268B
Authority
CN
China
Prior art keywords
internet
things
data
product identifier
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010044996.1A
Other languages
Chinese (zh)
Other versions
CN111274268A (en
Inventor
江洪洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co LtdfiledCriticalPing An Technology Shenzhen Co Ltd
Priority to CN202010044996.1ApriorityCriticalpatent/CN111274268B/en
Priority to PCT/CN2020/093594prioritypatent/WO2021143025A1/en
Publication of CN111274268ApublicationCriticalpatent/CN111274268A/en
Application grantedgrantedCritical
Publication of CN111274268BpublicationCriticalpatent/CN111274268B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The disclosure relates to the field of cloud transmission, and discloses an internet of things data transmission method, device, medium and electronic equipment. The method is executed by a first internet of things server of a plurality of internet of things servers, and comprises the following steps: receiving target data uploaded by target Internet of things equipment; determining whether uploading of the target data is legal or not based on at least one second right check data and the first right check data which are stored in the first internet of things server; and if the uploading method of the target data is determined, the internet of things data in the target data is sent to a data processing center of the internet of things platform. According to the method, the permission checking efficiency and the data transmission efficiency in the data transmission of the Internet of things are improved, and the memory consumption is reduced.

Description

Internet of things data transmission method and device, medium and electronic equipment
Technical Field
The disclosure relates to the technical field of cloud transmission, and in particular relates to an internet of things data transmission method, device, medium and electronic equipment.
Background
When the internet of things platform and the internet of things device interact, the internet of things platform and the internet of things device are based on a specific internet of things protocol, such as CoAP (Constrained Application Protocol, limited application protocol). Such a transmission protocol specifies that a specific message belongs to a specific topic, which we can call topic (topic), and the service corresponding to the internet of things protocol processes the information corresponding to topic. In order to distinguish between messages of different topics, a corresponding materialized object is generally constructed. Currently, the general way to process the information corresponding to topic is based on a tree-like structure, which has at least the following drawbacks: because the service corresponding to the internet of things protocol needs to interface with the internet of things platform, the number of topics to be processed by the service may be rapidly increased, and the topics are processed to be subjected to corresponding object instantiation, so that if all the topics are subjected to corresponding object instantiation, a huge burden is caused on a memory, and the efficiency of querying the topics is reduced along with the increase of the number of the topics.
Disclosure of Invention
In the technical field of cloud transmission, in order to solve the technical problems, the purpose of the disclosure is to provide a method, a device, a medium and electronic equipment for data transmission of the internet of things.
According to an aspect of the present disclosure, there is provided a method for transmitting data of the internet of things, the method being performed by a first internet of things server of a plurality of internet of things servers, the method including:
receiving target data uploaded by target internet of things equipment, wherein the target data comprises internet of things data and first permission verification data, and the target data is sent by the target internet of things equipment according to a preset internet of things protocol;
determining whether uploading of the target data is legal or not based on at least one second permission check data stored in a memory of the first internet of things server and the first permission check data, wherein the second permission check data is synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers;
and if the uploading method of the target data is determined, the internet of things data in the target data is sent to a data processing center of the internet of things platform.
According to another aspect of the present disclosure, there is provided an internet of things data transmission apparatus, the apparatus being located at a first internet of things server of a plurality of internet of things servers, the apparatus including:
The receiving module is configured to receive target data uploaded by target internet of things equipment, wherein the target data comprises internet of things data and first permission verification data, and the target data is sent by the target internet of things equipment according to a preset internet of things protocol;
the determining module is configured to determine whether uploading of the target data is legal or not based on at least one second permission check data stored in the first internet of things server and the first permission check data, and the second permission check data is synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers;
and the sending module is configured to send the internet of things data in the target data to a data processing center of the internet of things platform if the uploading method of the target data is determined.
According to another aspect of the present disclosure, there is provided a computer readable program medium storing computer program instructions which, when executed by a computer, cause the computer to perform the method as described above.
According to another aspect of the present disclosure, there is provided an electronic device including:
A processor;
a memory having stored thereon computer readable instructions which, when executed by the processor, implement a method as described above.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects:
the data transmission method of the internet of things provided by the disclosure is executed by a first internet of things server of a plurality of internet of things servers, and comprises the following steps: receiving target data uploaded by target internet of things equipment, wherein the target data comprises internet of things data and first permission verification data, and the target data is sent by the target internet of things equipment according to a preset internet of things protocol; determining whether uploading of the target data is legal or not based on at least one second permission check data stored in a memory of the first internet of things server and the first permission check data, wherein the second permission check data is synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers; and if the uploading method of the target data is determined, the internet of things data in the target data is sent to a data processing center of the internet of things platform.
According to the method, whether uploading of target data is legal or not is checked by utilizing second permission check data which is synchronized in advance by the second internet of things server and is stored in the memory of the first internet of things server after the target data is received, so that time consumption for inquiring a database or a server is reduced, verification efficiency is improved, on the basis, if the uploading of the target data is legal, namely, the verification is passed, the internet of things data can be sent to the internet of things platform, further, the transmission efficiency of the internet of things data is improved, in addition, because the second permission check data is stored in the memory, a virtual machine is not needed to create too many objects when the second permission check data is used for verification, and the consumption of the memory is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a schematic diagram of a system architecture for an application of a data transmission method of the Internet of things, according to an exemplary embodiment;
FIG. 2 is a flow chart illustrating a method of data transmission for the Internet of things according to an exemplary embodiment;
FIG. 3 is a detailed flow diagram of step 230 according to an embodiment illustrated in the corresponding embodiment of FIG. 2;
FIG. 4 is a flow chart of steps preceding step 230 of an embodiment shown in accordance with the corresponding embodiment of FIG. 2;
FIG. 5 is a flowchart illustrating a second networked server obtaining second rights verification data according to an exemplary embodiment;
FIG. 6 is a block diagram of an Internet of things data transmission device, according to an example embodiment;
fig. 7 is an exemplary block diagram of an electronic device implementing the above-mentioned data transmission method of the internet of things according to an exemplary embodiment;
fig. 8 is a computer readable storage medium implementing the above-described data transmission method of the internet of things, according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of the invention as detailed in the accompanying claims.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
The disclosure first provides a data transmission method of the internet of things. The internet of things (IoT, internet of things), i.e. "internet of everything connected", is an information carrier based on the internet, a traditional telecommunication network, etc., which enables all common physical objects that can be addressed independently to form an interconnection network, which is an extended and expanded network based on the internet, and which combines various information sensing devices with the internet to form a huge network, thus realizing interconnection of people, machines, and things at any time and any place. The data of the Internet of things is data generated by sensing, identifying and the like of common physical objects which can be independently addressed in the Internet of things. The common physical object is generally an internet of things device, for example, an intelligent thermometer, an intelligent washing machine, an intelligent desk lamp and other internet of things devices with a data transmission function. The internet of things data transmission is a process that the internet of things equipment transmits perceived or collected data to other terminals or equipment, and the internet of things data transmission method provided by the disclosure is a process that the internet of things equipment perceived or collected data is transmitted to an internet of things platform, and the internet of things platform can provide support for a series of internet of things services such as inter-equipment connection communication, equipment data collection cloud, data analysis and statistics, identity security authentication, equipment management and the like.
The implementation terminal of the present disclosure may be any device having an operation processing and communication function, which may be connected to an external device, for receiving or transmitting data, and specifically may be a portable mobile device, for example, a smart phone, a tablet computer, a notebook computer, PDA (Personal Digital Assistant), or the like, or a fixed device, for example, a computer device, a field terminal, a desktop computer, a server, a workstation, or the like, or may be a collection of multiple devices, such as a physical infrastructure of cloud computing or a server cluster.
Preferably, the implementation terminal of the present disclosure may be a server or a physical infrastructure of cloud computing.
Fig. 1 is a schematic diagram of a system architecture to which an internet of things data transmission method is applied, according to an exemplary embodiment. As shown in fig. 1, the system architecture includes an internet of things platform 120, a user terminal 150 and an internet of things device 140, where the internet of things platform 120 further includes a plurality of internet of things servers 130 and an internet of things control center 110, the internet of things control center 110 includes a control center 111 and a database 112, the database 112 may be a data processing center of the internet of things platform 110, and the implementation terminal of the present disclosure is one server of the plurality of internet of things servers 130. It can be seen that in this embodiment, the internet of things device 140 is an intelligent thermometer. When the data transmission method of the internet of things provided by the present disclosure is applied to the system architecture shown in fig. 1, a specific process may be as follows: the user accesses the control center 111 of the internet of things platform by using the user terminal 150 to register data, obtain a product identifier (product key), a device name (DeviceName) and a secret key (secret), create a plurality of topics (topic) corresponding to the product identifier, write the data into the database 112 for storage by the control center 111 of the internet of things platform, and write the data into the internet of things device 140 after obtaining the data by the user; one of the plurality of internet of things servers 130 of the internet of things platform can randomly initiate requests for authority authentication of the internet of things devices to each internet of things device, after the internet of things device 140 receives the requests, the internet of things device responds to the internet of things server, three data including a product identifier, a device name and a time stamp and a first signature generated by using a secret key and a specific encryption mode of the three data are sent to the internet of things server, the internet of things server analyzes all obtained data to obtain the product identifier, the device name, the time stamp and the first signature, then the internet of things server can pull the secret key which is stored before and corresponds to the product identifier to the database 112, encrypt the three data from the internet of things device 140 by using the same encryption mode to obtain a second signature, and when the first signature is consistent with the second signature, the secret key which indicates that the internet of things device 140 is an owner of the product identifier sent by the internet of things and which is in possession of the secret key, so that the internet of things device can send the password to the internet of things device 112 through the token, the password is generated by the internet of things device, and the password is sent to the internet of things device 112; then, the internet of things server synchronizes the token, the product identifier and the corresponding theme of the internet of things device 140 passing through the authority authentication to the memories of other internet of things servers in the internet of things servers 130 through the message queue, so that the other internet of things servers have the capability of performing authority verification on the internet of things device 140, after the internet of things device 140 receives a request for acquiring acquired data sent by one of the other internet of things servers, the internet of things device 140 responds, the token, the theme and the acquired data are returned to the internet of things server sending the request, the internet of things server sending the request firstly confirms whether the token is out of date, then determines the product identifier corresponding to the token, further determines the theme corresponding to the product identifier, compares the theme with the theme sent by the internet of things device 140, determines whether the theme is consistent with the theme sent by the internet of things device 140, and finishes the task of the internet of things device 140 when the token is not out of date and the theme consistent with the theme returned by the internet of things device 140 is present, and the internet of things device 140 can be allowed to process the data through the database of internet of things device 112 by checking the internet of things platform 112. Thus, the whole process of sending the data collected by the internet of things device 140 to the internet of things platform 120 is realized.
In the related art, tokens, topics, product identifiers and the like are generally all stored on an internet of things platform, for example, the tokens, the topics, the product identifiers and the like can be stored in a database of the internet of things platform, so that data (such as topic) used for checking are acquired from the internet of things platform when the permission checking is performed each time, topic (topic) objects are created and instantiated, a large amount of memory resources are occupied, the topic query efficiency is reduced, and the permission checking efficiency is further reduced due to the increased time consumption of querying the data from the internet of things platform; in the process, since the data used for verification is synchronized into the memory of the corresponding Internet of things server, on one hand, a large number of theme objects are not required to be created and instantiated, the occupation of memory resources is reduced, and on the other hand, the permission verification can be directly carried out in the memory, the inquiry to the Internet of things platform is not required, the inquiry time is reduced, and the permission verification efficiency is improved.
It should be noted that, fig. 1 is only one embodiment of the present disclosure, although in the embodiment shown in fig. 1, the plurality of internet of things service ends belong to the internet of things platform, the data finally collected by the internet of things device is sent to the database of the internet of things platform, the internet of things service end sends data to the internet of things platform through the message queue, and one internet of things service end synchronizes the token, the product identifier and the corresponding subject three data to other internet of things service ends, in other embodiments or specific applications, the plurality of internet of things service ends may be located outside the internet of things platform, the data finally collected by the internet of things device may be sent to any unit or module in the internet of things platform, the internet of things service end may not send data to the internet of things platform through the message queue, and one internet of things service end may only synchronize the product identifier and the corresponding subject three data to other internet of things service ends, so that the protection scope of the present disclosure should not be limited in any way.
Fig. 2 is a flowchart illustrating a method of data transmission of the internet of things according to an exemplary embodiment. The data transmission method of the internet of things in this embodiment is executed by a first internet of things server of a plurality of internet of things servers, where the first internet of things server may be the same type of device as other internet of things servers, or may be different types of devices, and the first internet of things server may be a server, as shown in fig. 2, and includes the following steps:
step 220, receiving the target data uploaded by the target internet of things device.
The target data comprise internet of things data and first permission verification data, and the target data are sent by the target internet of things device according to a preset internet of things protocol.
The target internet of things device is an internet of things device which is used for sending data to the internet of things platform, and can be any device capable of sensing information and transmitting information, such as an intelligent desk lamp, an intelligent thermometer and the like. The target internet of things device can upload the target data by actively sending the target data, or by making a corresponding response according to an external request.
The preset internet of things protocol may be any internet of things protocol, for example, coAP (Constrained Application Protocol, limited application protocol), MQTT (Message Queuing Telemetry Transport, message queue telemetry transport protocol), and the like.
The internet of things data is data generated when the target internet of things device runs, and for example, the data can be temperature data sensed by an intelligent thermometer. The first permission verification data is data for performing permission verification on data uploaded by the target internet of things device, and may include data such as a token (token), a theme (topic), and the like.
Step 230, determining whether the uploading of the target data is legal or not based on the at least one second permission check data stored in the first internet of things server side memory and the first permission check data.
And the second permission verification data is synchronized to the first Internet of things server in advance by a second Internet of things server in the plurality of Internet of things servers.
It can be clear that the at least one second permission check data is pre-stored in the memory of the first internet of things server.
In one embodiment, the at least one second permission check data is stored in a queue of the first internet of things server memory.
In one embodiment, the queues follow the principle of FIFO (First Input First Output, first in first out).
In an embodiment, the at least one second permission verification data is stored in a convergenthashmap in the memory of the server of the first internet of things.
ConcurrentHashMap is a concurrent container which adopts modes such as array, segment lock and the like to realize efficient data retrieval.
The benefit of this embodiment is that, by storing the second permission verification data in the convergenthashmap, since the complexity of the query time of the hash is usually O (1), the time of query matching is reduced, and the verification efficiency of the permission is improved, so that the performance of the system can be greatly improved.
Determining whether the uploading of the target data is legal is a process of determining whether to allow uploading of the target data.
In one embodiment, the second rights verification data includes a second token, a second product identifier corresponding to the second token, and at least one second topic class corresponding to the second product identifier, and the first rights verification data includes a first token, a first product identifier, and a first topic, and the specific steps of step 230 may be as shown in fig. 3.
Fig. 3 is a detailed flow chart of step 230 according to an embodiment illustrated in the corresponding embodiment of fig. 2, see fig. 3, comprising the steps of:
and 230', if one second right check data exists in the at least one second right check data and meets a first matching condition with the first right check data, determining that the uploading of the target data is legal, otherwise, determining that the uploading of the target data is illegal.
The first matching condition with the first authority verification data is as follows: the second token is consistent with the first token, the second product identifier corresponding to the second token is consistent with the first product identifier, and one second theme class exists in at least one second theme class corresponding to the second product identifier and corresponds to the first theme.
The at least one second right verification data may include one second right verification data, or may include a plurality of second right verification data, and for each of the at least one second right verification data, it may be determined whether a first matching condition with the first right verification data is satisfied.
In one embodiment, the token (token) is a randomly generated string, the product identifier (product key) is a globally unique identifier issued by the platform of the internet of things for the product, the topic (topic) class is a set of topics (topic) corresponding to the product identifier, and the topic (topic) is a UTF-8 string, which represents a message transmission intermediary.
In one embodiment, a theme class includes a product identification parameter value, a device name parameter, and a rights component, and a theme corresponding to the theme class includes a product identification parameter value, a device name parameter value, and a rights component.
For example,/0 WFDSF9324JQ/$ { YouDeviceName }/user/update may be a theme class, where 0WFDSF9324JQ is the product identification parameter value corresponding to the product identification (ProducKey), $ { YouDeviceName } is the device name parameter corresponding to a device name,/user/update is the rights part; the/0 WFDSF9324JQ/device1/user/update may be a topic corresponding to the topic class, where device1 is a device name parameter value corresponding to a device name (device name), a topic corresponds to whether the Internet of things device has permission to operate on the message of the topic, and the "ADFKK45WERJ9SOD92" may be a token.
In one embodiment, the topic class corresponds to a topic, meaning that the rights component in the topic class is the same as the rights component in the topic if the product identity is consistent.
For example,/0 WFDSF9324JQ/$ { YouDeviceName }/user/update is a topic class,/0 WFDSF9324JQ/device1/user/update is a topic, and since the device names of the two are identical to "0WFDSF9324JQ", and the rights in the topic class are both/user/update, i.e., the rights in the topic class are the same as the rights in the topic, the topic class corresponds to the topic.
In one embodiment, the second theme class includes a product identification parameter, a device name parameter, and a rights component.
For example,/$ { YourProductKey }/device1/user/update may be a second theme class.
Since the second product identifier (ProductKey) is a separate part in the second rights verification data, the part of the second theme class corresponding to the ProductKey may be replaced by $ { YourProductKey } without losing information in the second rights verification data.
In one embodiment, the second token is a string randomly generated by the second internet service.
In the embodiment shown in fig. 3, whether the uploading of the target data is legal is determined by matching the token, the product identifier and the theme class stored in the first internet of things server with the token, the product identifier and the theme in the first permission check data, and since the information required for determining whether the uploading of the target data is legal is stored in the memory of the first internet of things server in advance, the information is not required to be queried or requested to be acquired from an external terminal, the check efficiency is improved, and in addition, since the second permission check data is stored in the memory, too many objects are not required to be created by a virtual machine when the second permission check data is used for check, and the consumption of the memory is reduced.
In one embodiment, the second permission verification data includes a second product identifier and at least one second theme class corresponding to the second product identifier, the first permission verification data includes a first token, a first product identifier and a first theme, and the determining whether the uploading of the target data is legal based on the at least one second permission verification data and the first permission verification data stored in the first internet of things server side memory includes:
pulling a product identifier which is stored in advance corresponding to the first token from an internet of things platform;
if the second permission verification data which is consistent with the second product identifier and is included in the product identifier meets a second matching condition with the first permission verification data, determining that the uploading of the target data is legal, otherwise, determining that the uploading of the target data is illegal, wherein the second matching condition with the first permission verification data is as follows: one second theme class exists in at least one second theme class corresponding to the second product identifier, and the second theme class corresponds to the first theme.
In this embodiment, the second permission verification data pre-synchronized by the second internet of things server only includes the second product identifier and at least one corresponding theme class, when verification is performed, the corresponding product identifier needs to be pulled from the internet of things platform, and a trade-off is implemented between the data amount synchronized by the second internet of things server and the verification efficiency.
Step 240, if it is determined that the uploading method of the target data is performed, the internet of things data in the target data is sent to a data processing center of the internet of things platform.
The data processing center of the internet of things platform can be any one or more modules or units capable of storing data in the internet of things platform.
After the uploading method of the target data is determined, the internet of things data can be sent to the internet of things platform, and the internet of things platform performs further operations such as statistics, processing and processing.
In one embodiment, if the uploading method of the target data is determined, sending the internet of things data in the target data to a data processing center of the internet of things platform, including:
if the uploading method of the target data is determined, the internet of things data in the target data is sent to a second message queue, and the internet of things data is sent to a data processing center of an internet of things platform through the second message queue.
The method and the system have the advantages that the message queue is used for sending data, so that the processing pressure of the data processing center of the Internet of things platform is relieved, and the reliability and the stability of the Internet of things platform are guaranteed.
In one embodiment, the data processing center of the internet of things platform is a Redis server of the internet of things platform.
In one embodiment, the method further comprises:
receiving a theme class update request sent by an internet of things platform through a third message queue, wherein the theme class update request comprises a second product identifier and at least one second update theme class corresponding to the second product identifier, the theme class update request is sent to the plurality of internet of things servers through the third message queue by the internet of things platform, and the second update theme class is submitted to the internet of things platform through a user terminal by a user of target internet of things equipment identified by the second product identifier;
determining at least one second theme class corresponding to the at least one second updating theme class from at least one second theme class corresponding to the second product identifier in the theme class updating request stored locally, and taking the at least one second theme class as a second target theme class;
and replacing the second target theme class with a corresponding second updated theme class.
At present, because the structural tree of the theme is generally loaded through Resource when the service is initialized, in the service running process, the topic type which can be processed by the service cannot be changed, if the service needs to be restarted by the change, the service processing efficiency is reduced.
In summary, according to the data transmission method of the internet of things provided in the embodiment of fig. 2, the time consumption for querying the database or the server is reduced, so that the verification efficiency and the data transmission efficiency of the internet of things are improved, and the consumption of the memory is reduced.
Fig. 4 is a flow chart of steps preceding step 230 according to an embodiment shown in the corresponding embodiment of fig. 2. As shown in fig. 4, the method comprises the following steps:
step 210, receiving the second permission verification data synchronized by a second internet of things server of the plurality of internet of things servers.
And after the second permission verification data is obtained for the second internet of things server, synchronizing the second internet of things server to at least one internet of things server except the second internet of things server in the plurality of internet of things servers, and receiving the second permission verification data by the first internet of things server as one internet of things server in the at least one internet of things server.
It should be noted that, although step 210 is located before step 220 in the present embodiment, as described in the description of fig. 4, step 210 may be performed at any step or time before step 230, for example, may be performed after step 220, or even may be performed simultaneously with step 220, which is not limited in this disclosure.
In one embodiment, the receiving the second permission verification data synchronized by a second internet of things server of the plurality of internet of things servers includes:
and receiving the second permission verification data synchronized by a second internet of things server of the plurality of internet of things servers through a first message queue.
In one embodiment, the process of the second internet service end obtaining the second permission verification data may be as shown in fig. 5. FIG. 5 is a flowchart illustrating the second networked server obtaining the second rights verification data according to an exemplary embodiment, as shown in FIG. 5, including the steps of:
step 510, receiving permission authentication data sent by a target internet of things device, so as to perform permission authentication on the target internet of things device.
The permission authentication data comprise a product identifier, a device name, a timestamp and a password, the password is obtained by encrypting a hash parameter by the target internet of things device through a preset hash algorithm and a device key which is obtained in advance, the hash parameter is generated based on the product identifier, the device name and the timestamp, the product identifier, the device name and the device key which are obtained in advance are generated by the internet of things platform after a user sends a registration request to the internet of things platform through a user terminal, and the product identifier, the device name and the device key which are obtained in advance are obtained by the user, and then the password is written into the target internet of things device.
Since the steps shown in fig. 5 are a process in which the second internet service obtains the second rights verification data, the embodiment of fig. 5 is performed by the second internet service.
The sending of the permission authentication data by the target internet of things device to the second internet of things server may be actively sent by the target internet of things device, or may be sent by the target internet of things device in response to a request of the second internet of things server.
The predetermined hash algorithm may include, but is not limited to, MD5, SHA-1, SHA-2, SHA-256, and the like. The hash parameter may be generated based on the product identification, the device name, and the timestamp in a variety of ways, such as the product identification, the device name, and the timestamp may be combined in a predetermined manner as the hash parameter.
And step 520, analyzing the authority authentication data to obtain the product identification in the authority authentication data.
The product identification is organized in a certain format in the right authentication data, and can be obtained from the right authentication data by analyzing in a specific mode.
And step 530, sending a device key acquisition request to the internet of things platform by using the product identifier to acquire a device key corresponding to the product identifier.
And step 540, encrypting the hash parameters by using the acquired device key and a preset hash algorithm to obtain an encryption result.
And step 550, if the encryption result is consistent with the password, after taking the product identifier as a second product identifier, randomly generating a second token corresponding to the second product identifier.
When the encryption result is consistent with the password, the product identification sent by the target Internet of things device is indicated to correspond to the device key legally obtained when the target Internet of things device is initially registered, and then the target Internet of things device is indicated to be legal.
And step 560, pulling the theme class stored in advance corresponding to the second product identifier from the internet of things platform as at least one second theme class corresponding to the second product identifier.
The second product identifier, the theme class stored corresponding to the second product identifier and the equipment key corresponding to the second product identifier are generated and stored by the internet of things platform after the user sends a registration request to the internet of things platform through the user terminal.
Step 570, using the second product identifier, at least one second theme class corresponding to the second product identifier, and a second token corresponding to the second product identifier as second permission verification data.
In the embodiment of fig. 5, the security is ensured by allowing the second internet service terminal to acquire the second permission verification data after the permission authentication is passed.
In one embodiment, prior to step 560, the method may further comprise:
and determining whether the second internet of things server pre-stores the theme class corresponding to the second product identifier, wherein the theme class pre-stored corresponding to the second product identifier is pulled from the internet of things platform under the condition that the second internet of things server does not pre-store the theme class corresponding to the second product identifier.
In this embodiment, by first determining whether a corresponding theme class has been stored, the internet of things platform is pulled to the theme class without storing the corresponding theme class, and if the corresponding theme class has been stored, the theme class is not pulled from the internet of things platform, which reduces resource overhead to a certain extent.
The disclosure further provides an internet of things data transmission device, and the following is an embodiment of the device of the disclosure.
Fig. 6 is a block diagram illustrating an internet of things data transmission apparatus according to an exemplary embodiment. As shown in fig. 6, the apparatus 600 includes:
The receiving module 610 is configured to receive target data uploaded by a target internet of things device, where the target data includes internet of things data and first permission verification data, and the target data is sent by the target internet of things device according to a preset internet of things protocol;
a determining module 620, configured to determine whether the uploading of the target data is legal based on at least one second permission check data stored in the first internet of things server and the first permission check data, where the second permission check data is pre-synchronized to the first internet of things server by a second internet of things server of the plurality of internet of things servers;
and the sending module 630 is configured to send the internet of things data in the target data to a data processing center of the internet of things platform if the uploading method of the target data is determined.
According to a third aspect of the present disclosure, there is also provided an electronic device capable of implementing the above method.
Those skilled in the art will appreciate that the various aspects of the invention may be implemented as a system, method, or program product. Accordingly, aspects of the invention may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
An electronic device 700 according to this embodiment of the invention is described below with reference to fig. 7. The electronic device 700 shown in fig. 7 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 7, the electronic device 700 is embodied in the form of a general purpose computing device. Components of electronic device 700 may include, but are not limited to: the at least one processing unit 710, the at least one memory unit 720, and a bus 730 connecting the different system components, including the memory unit 720 and the processing unit 710.
Wherein the storage unit stores program code that is executable by the processing unit 710 such that the processing unit 710 performs steps according to various exemplary embodiments of the present invention described in the above-described "example methods" section of the present specification.
The memory unit 720 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 721 and/or cache memory 722, and may further include Read Only Memory (ROM) 723.
The storage unit 720 may also include a program/utility 724 having a set (at least one) of program modules 725, such program modules 725 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 730 may be a bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 700 may also communicate with one or more external devices 900 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 700, and/or any device (e.g., router, modem, etc.) that enables the electronic device 700 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 750. Also, electronic device 700 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet, through network adapter 760. As shown, network adapter 760 communicates with other modules of electronic device 700 over bus 730. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 700, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
According to a fourth aspect of the present disclosure, there is also provided a computer readable storage medium having stored thereon a program product capable of implementing the method described herein above. In some possible embodiments, the various aspects of the invention may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the invention as described in the "exemplary methods" section of this specification, when said program product is run on the terminal device.
Referring to fig. 8, a program product 800 for implementing the above-described method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
Furthermore, the above-described drawings are only schematic illustrations of processes included in the method according to the exemplary embodiment of the present invention, and are not intended to be limiting. It will be readily appreciated that the processes shown in the above figures do not indicate or limit the temporal order of these processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, for example, among a plurality of modules.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (9)

determining whether uploading of the target data is legal or not based on at least one second permission check data stored in a memory of the first internet of things server and the first permission check data, wherein the second permission check data is synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers, and the second permission check data is obtained by the second internet of things server in the following manner: receiving authority authentication data sent by target internet of things equipment to perform authority authentication on the target internet of things equipment, wherein the authority authentication data comprises a product identifier, an equipment name, a timestamp and a password, the password is obtained by encrypting hash parameters by the target internet of things equipment by using a preset hash algorithm and a device key obtained in advance, the hash parameters are generated based on the product identifier, the equipment name and the timestamp, the product identifier, the equipment name and the device key obtained in advance are generated by the internet of things platform after a user sends a registration request to the internet of things platform through a user terminal, and the product identifier, the equipment name and the device key obtained in advance are obtained by the user and then written into the target internet of things equipment; analyzing the authority authentication data to obtain a product identifier in the authority authentication data; transmitting a device key acquisition request to an internet of things platform by utilizing the product identifier to acquire a device key corresponding to the product identifier; encrypting the hash parameters by using the acquired equipment key and a preset hash algorithm to obtain an encryption result; if the encryption result is consistent with the password, randomly generating a second token corresponding to a second product identifier after taking the product identifier as the second product identifier; the theme class which is stored in advance and corresponds to the second product identifier is pulled from the internet of things platform to be used as at least one second theme class which corresponds to the second product identifier, wherein the second product identifier, the theme class which corresponds to the second product identifier and the equipment key which corresponds to the second product identifier are generated and stored by the internet of things platform after a user sends a registration request to the internet of things platform through a user terminal; taking the second product identifier, at least one second theme class corresponding to the second product identifier and a second token corresponding to the second product identifier as second permission verification data;
the determining module is configured to determine whether uploading of the target data is legal or not based on at least one second permission check data stored in a memory of the first internet of things server and the first permission check data, wherein the second permission check data is synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers, and the second permission check data is obtained by the second internet of things server in the following manner: receiving authority authentication data sent by target internet of things equipment to perform authority authentication on the target internet of things equipment, wherein the authority authentication data comprises a product identifier, an equipment name, a timestamp and a password, the password is obtained by encrypting hash parameters by the target internet of things equipment by using a preset hash algorithm and a device key obtained in advance, the hash parameters are generated based on the product identifier, the equipment name and the timestamp, the product identifier, the equipment name and the device key obtained in advance are generated by the internet of things platform after a user sends a registration request to the internet of things platform through a user terminal, and the product identifier, the equipment name and the device key obtained in advance are obtained by the user and then written into the target internet of things equipment; analyzing the authority authentication data to obtain a product identifier in the authority authentication data; transmitting a device key acquisition request to an internet of things platform by utilizing the product identifier to acquire a device key corresponding to the product identifier; encrypting the hash parameters by using the acquired equipment key and a preset hash algorithm to obtain an encryption result; if the encryption result is consistent with the password, randomly generating a second token corresponding to a second product identifier after taking the product identifier as the second product identifier; the theme class which is stored in advance and corresponds to the second product identifier is pulled from the internet of things platform to be used as at least one second theme class which corresponds to the second product identifier, wherein the second product identifier, the theme class which corresponds to the second product identifier and the equipment key which corresponds to the second product identifier are generated and stored by the internet of things platform after a user sends a registration request to the internet of things platform through a user terminal; taking the second product identifier, at least one second theme class corresponding to the second product identifier and a second token corresponding to the second product identifier as second permission verification data;
CN202010044996.1A2020-01-152020-01-15Internet of things data transmission method and device, medium and electronic equipmentActiveCN111274268B (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
CN202010044996.1ACN111274268B (en)2020-01-152020-01-15Internet of things data transmission method and device, medium and electronic equipment
PCT/CN2020/093594WO2021143025A1 (en)2020-01-152020-05-30Internet-of-things data transmission method and apparatus, and medium and electronic device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010044996.1ACN111274268B (en)2020-01-152020-01-15Internet of things data transmission method and device, medium and electronic equipment

Publications (2)

Publication NumberPublication Date
CN111274268A CN111274268A (en)2020-06-12
CN111274268Btrue CN111274268B (en)2023-09-05

Family

ID=70997246

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010044996.1AActiveCN111274268B (en)2020-01-152020-01-15Internet of things data transmission method and device, medium and electronic equipment

Country Status (2)

CountryLink
CN (1)CN111274268B (en)
WO (1)WO2021143025A1 (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2022041279A1 (en)*2020-08-312022-03-03Oppo广东移动通信有限公司Device management method and apparatus in internet of things, computer device and storage medium
CN114629821B (en)*2020-12-102023-11-10新智云数据服务有限公司Internet of things consumption data generation method, device, equipment and medium
CN112820366B (en)*2020-12-232024-08-30京东方科技集团股份有限公司 Data processing method, device, system, equipment and storage medium
CN114721586B (en)*2021-01-062025-07-18伊姆西Ip控股有限责任公司Method, electronic device and computer program product for storage management
CN115396123A (en)*2021-05-062022-11-25腾讯科技(深圳)有限公司Data processing method and device, electronic equipment and storage medium
CN115883648B (en)*2021-08-092024-07-16中移物联网有限公司 A data integration method, device, equipment and storage medium
CN113852639B (en)*2021-09-292023-05-26中国电信股份有限公司Data processing method, device, electronic equipment and computer readable storage medium
CN113918361B (en)*2021-10-092025-01-28天翼物联科技有限公司 Terminal control method, device, equipment and medium based on Internet of Things rule engine
CN116232616A (en)*2021-12-022023-06-06中兴通讯股份有限公司Equipment communication method and device based on MQTT protocol
CN116361282A (en)*2021-12-282023-06-30中移(杭州)信息技术有限公司Data processing method, device, related equipment and storage medium
CN114401289B (en)*2021-12-312024-08-16深圳市麦谷科技有限公司Task batch uploading method and system
CN114443748B (en)*2022-01-292025-04-29中国农业银行股份有限公司 Data processing method, device, electronic device and storage medium
CN114726918B (en)*2022-02-152024-04-02深圳Tcl新技术有限公司Internet of things cross-network communication method, device, equipment and storage medium
CN114610705A (en)*2022-03-212022-06-10京东科技信息技术有限公司Processing method and device of Internet of things data, storage medium and electronic equipment
CN115002228B (en)*2022-05-312023-12-26杭州数梦工场科技有限公司Service cascade calling method and device, electronic equipment and storage medium
CN115034347B (en)*2022-06-212024-05-28成都秦川物联网科技股份有限公司Industrial Internet of things for tracing two-dimensional code data and control method thereof
CN115145979A (en)*2022-06-292022-10-04宁波优讯智传科技有限公司 Internet of things data statistics method and related equipment
CN115242499B (en)*2022-07-212024-03-01中国平安人寿保险股份有限公司Network request method, network request device, electronic device, and storage medium
CN115357000B (en)*2022-10-192023-01-17东方合智数据科技(广东)有限责任公司Production parameter issuing method, device, equipment and storage medium
CN115643316B (en)*2022-10-262025-05-30杭州昊美科技有限公司 Data processing method, device, gateway equipment and storage medium for Internet of Things gateway
CN116055137A (en)*2022-12-282023-05-02天翼物联科技有限公司 Internet of things system authentication and authorization adaptation system, method, device and storage medium
CN117668934B (en)*2023-11-152024-07-26江苏星期七数字科技有限公司Big data-based blockchain data storage method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2017204961A1 (en)*2016-05-272017-11-30Mastercard International IncorporatedSystems and methods for location data verification
CN108509156A (en)*2018-04-042018-09-07腾讯科技(深圳)有限公司Method for reading data, device, equipment and system
CN108632231A (en)*2017-03-242018-10-09中移(杭州)信息技术有限公司A kind of internet of things equipment, Internet of Things authentication platform, authentication method and system
CN109474606A (en)*2018-12-042019-03-15平安科技(深圳)有限公司Document transmission method, device, computer equipment and storage medium
CN110598431A (en)*2019-09-052019-12-20彩讯科技股份有限公司Internet of things data processing method and device, server and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9860241B2 (en)*2014-04-152018-01-02Level 3 Communications, LlcDevice registration, authentication, and authorization system and method
CN106209522B (en)*2015-04-302019-08-02东莞市星东升实业有限公司Token networking construction method based on token protocol
US20190266278A1 (en)*2018-02-262019-08-29Altibase Corp.IoT Data Management System and Method
CN110113207A (en)*2019-05-082019-08-09广州创想云科技有限公司A kind of method for updating protocol based on Internet of Things, device, equipment and storage medium
CN110300114A (en)*2019-07-042019-10-01苏州大学A kind of synthesis Design of meteorological data collection based on NB-IoT communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2017204961A1 (en)*2016-05-272017-11-30Mastercard International IncorporatedSystems and methods for location data verification
CN108632231A (en)*2017-03-242018-10-09中移(杭州)信息技术有限公司A kind of internet of things equipment, Internet of Things authentication platform, authentication method and system
CN108509156A (en)*2018-04-042018-09-07腾讯科技(深圳)有限公司Method for reading data, device, equipment and system
CN109474606A (en)*2018-12-042019-03-15平安科技(深圳)有限公司Document transmission method, device, computer equipment and storage medium
CN110598431A (en)*2019-09-052019-12-20彩讯科技股份有限公司Internet of things data processing method and device, server and storage medium

Also Published As

Publication numberPublication date
CN111274268A (en)2020-06-12
WO2021143025A1 (en)2021-07-22

Similar Documents

PublicationPublication DateTitle
CN111274268B (en)Internet of things data transmission method and device, medium and electronic equipment
CN102823195B (en) System and method for remotely maintaining a client system in an electronic network using software testing performed by a virtual machine
CN108377272B (en) A method and system for managing IoT terminals
CN111783075A (en)Authority management method, device and medium based on secret key and electronic equipment
CN108289098B (en)Authority management method and device of distributed file system, server and medium
US20190068576A1 (en)Method, apparatus and system for remote controlling intelligent devices
CN109639819B (en)File transmission method, client, server and system
CN109347839B (en)Centralized password management method and device, electronic equipment and computer storage medium
US20230208831A1 (en)Service processing method and apparatus, server, and storage medium
WO2022245291A2 (en)Method and apparatus for managing resources, computer device and storage medium
CN111475582B (en)Terminal equipment and cultural relic information processing method for accessing blockchain
CN115834584B (en)Cross-network data transmission method, device, equipment and medium
CN110851853B (en)Data isolation method, device, computer equipment and storage medium
CN110457307B (en)Metadata management system, user cluster creation method, device, equipment and medium
CN113328979B (en)Method and device for recording access behaviors
CN115208579B (en) Authentication method, device, service system access method, device and storage medium
CN111414647A (en)Tamper-proof data sharing system and method based on block chain technology
WO2023098824A1 (en)Vehicle data management method and apparatus, and server and storage medium
US20200257813A1 (en)Digital Data Processing System For Efficiently Storing, Moving, And/Or Processing Data Across A Plurality of Computing Clusters
CN113434824B (en)Software service authorization management method, device, equipment and storage medium
CN117376344B (en)Data transmission method, electronic device, and computer-readable storage medium
CN111147235B (en)Object access method and device, electronic equipment and machine-readable storage medium
CN112732789A (en)Searchable encryption method based on block chain and electronic equipment
WO2024131083A1 (en)Data processing method and apparatus, electronic device, computer storage medium and computer program product
CN113595962B (en) A safety control method, device and safety control equipment

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp