Disclosure of Invention
In view of this, the present application aims to provide an industrial internet identification analysis system, a method, an electronic device and a storage medium, which can realize certificate-free signature by using public identity information instead of public key certificates, reduce corresponding management cost and improve the security of an industrial internet identification analysis system.
The embodiment of the application provides an industrial Internet identification analysis system, which comprises a plurality of nodes and a verification module, wherein the nodes comprise recursion analysis nodes, enterprise nodes, secondary nodes and national top-level nodes; the recursion analysis node is in communication connection with the enterprise node, the secondary node and the national top node, the verification module is in communication connection with a plurality of nodes, the enterprise node is in communication connection with the secondary node, and the secondary node is in communication connection with the national top node; wherein,,
the recursion analysis node is used for sending a bidirectional identity authentication request to the enterprise node, the secondary node and the national top node when providing analysis service for the target identification analysis request message after receiving the target identification analysis request message sent by the user terminal;
any node is used for splicing the target identification analysis request message with the identification information corresponding to the node and the corresponding identification certification certificate after receiving the bidirectional identification certification request, and determining the target identification analysis request message carrying the signature information corresponding to the node;
The verification module is used for verifying the target identification analysis request message carrying the signature information of the node based on public identity information in the identity information of any node, if the verification is passed, the node analyzes the identification field managed by the node in the target identification analysis request, and an identification analysis result is determined.
In one possible implementation manner, the industrial internet identification analysis system further comprises an identification analysis access authentication module, wherein the identification analysis access authentication module is in communication connection with a plurality of nodes; wherein,,
the identification analysis access authentication module is used for determining the identity authentication credentials corresponding to the nodes based on the identity identification information provided by the key generation center and the nodes after the recursion analysis node, the enterprise node, the secondary node and the national top node send requests for applying the identity authentication credentials; wherein the identity information comprises public identity information and limited identity information.
In a possible implementation manner, the identification resolution access authentication module is specifically configured to, when determining, based on the key generation center and the identity information provided by each node, an identity authentication credential corresponding to each node:
The key generation center issues corresponding private keys to the nodes corresponding to the public identity information;
each private key signs the corresponding identity information, and the identity authentication credentials corresponding to each node are determined.
In one possible implementation manner, for the recursive resolution node, after receiving a bidirectional identity authentication request, any one of the nodes is configured to splice a target identifier resolution request message with identity information corresponding to the node and corresponding identity authentication credentials, and determine a target identifier resolution request message corresponding to the node and carrying signature information, where the target identifier resolution request message includes:
the recursion analysis node splices the target identification analysis request message, the identity information of the recursion analysis node and the identity authentication credential of the recursion analysis node, and determines the spliced target identification analysis request message of the recursion analysis node;
processing the spliced target identifier analysis request message of the recursion analysis node based on a summary algorithm, and determining a summary result message of the recursion analysis node;
And signing the corresponding abstract result message based on the private key of the recursion analysis node, and determining a target identification analysis request message carrying signature information corresponding to the recursion analysis node.
In one possible implementation manner, the verification module is configured to, for any one of the nodes, verify the target identifier resolution request message carrying signature information of the node based on public identifier information among the identifier information of the node, and if the verification is passed, make the node resolve an identifier field managed by its own node in the target identifier resolution request, and determine an identifier resolution result, where the verification module is specifically configured to:
detecting whether signature verification of the public identity information on the target identity analysis request message carrying signature information is effective or not;
if the signature verification is effective, verifying the identity authentication credential in the spliced target identifier analysis request message based on a public key provided by a key generation center;
if the verification is passed, the identity information of the node is valid, so that the node analyzes the identity field managed by the node in the target identity analysis request, and an identity analysis result is determined.
In one possible implementation, the verification module is further configured to:
determining limited identity information based on the identity information;
detecting whether the corresponding identity authentication credentials are overdue based on identity validity periods among the limited identity information;
if yes, a request for regenerating the identity authentication credentials is sent to the node.
In one possible implementation manner, the identifier resolution access authentication module obtains the identity information provided by each node through the following steps:
and the nodes of each level respectively transmit corresponding identity information to the upper level nodes, and finally the national top level nodes transmit the identity information of each level of nodes to the identity analysis node access authentication module in a summarized manner.
The embodiment of the application also provides an industrial Internet identification analysis method, which comprises the following steps:
after receiving a target identification analysis request message sent by a user side, a recursion analysis node sends a bidirectional identity authentication request to an enterprise node, a secondary node and a national top node when providing analysis service for the target identification analysis request message;
After receiving a bidirectional identity authentication request, the recursion analysis node, the enterprise node, the secondary node and the national top node splice the target identification analysis request message with the identity information corresponding to each node and the corresponding identity authentication credentials to determine the target identification analysis request message carrying signature information corresponding to each node;
and verifying the target identification analysis request message carrying the signature information of the node based on the public identity information in the identity information of the node aiming at any node, and if the verification is passed, analyzing the identification field managed by the node of the target identification analysis request, and determining an identification analysis result.
The embodiment of the application also provides electronic equipment, which comprises: the system comprises a processor, a memory and a bus, wherein the memory stores machine-readable instructions executable by the processor, the processor and the memory are communicated through the bus when the electronic device runs, and the machine-readable instructions are executed by the processor to execute the steps of the industrial Internet identification analysis method.
Embodiments of the present application also provide a computer readable storage medium having a computer program stored thereon, which when executed by a processor performs the steps of an industrial internet identification resolution method as described above.
The industrial Internet identification analysis system comprises a plurality of nodes and a verification module, wherein the nodes comprise recursion analysis nodes, enterprise nodes, secondary nodes and national top-level nodes; the recursion analysis node is in communication connection with the enterprise node, the secondary node and the national top node, the verification module is in communication connection with a plurality of nodes, the enterprise node is in communication connection with the secondary node, and the secondary node is in communication connection with the national top node; the recursion analysis node is used for sending a bidirectional identity authentication request to the enterprise node, the secondary node and the national top node when providing analysis service for the target identification analysis request message after receiving the target identification analysis request message sent by the user terminal; any node is used for splicing the target identification analysis request message with the identification information corresponding to the node and the corresponding identification certification certificate after receiving the bidirectional identification certification request, and determining the target identification analysis request message carrying the signature information corresponding to the node; the verification module is used for verifying the target identification analysis request message carrying the signature information of the node based on public identity information in the identity information of any node, if the verification is passed, the node analyzes the identification field managed by the node in the target identification analysis request, and an identification analysis result is determined. By using public identity information to replace public key certificates, certificate-free signature can be realized, corresponding management cost is reduced, and the safety of an industrial Internet identity analysis system is improved.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it should be understood that the accompanying drawings in the present application are only for the purpose of illustration and description, and are not intended to limit the protection scope of the present application. In addition, it should be understood that the schematic drawings are not drawn to scale. A flowchart, as used in this application, illustrates operations implemented according to some embodiments of the present application. It should be appreciated that the operations of the flow diagrams may be implemented out of order and that steps without logical context may be performed in reverse order or concurrently. Moreover, one or more other operations may be added to the flow diagrams and one or more operations may be removed from the flow diagrams as directed by those skilled in the art.
In addition, the described embodiments are only some, but not all, of the embodiments of the present application. The components of the embodiments of the present application, which are generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, are intended to be within the scope of the present application.
In order to enable those skilled in the art to make use of the present application, the following embodiments are provided in connection with a specific application scenario "parsing industrial internet identification", and it will be apparent to those skilled in the art that the general principles defined herein may be applied to other embodiments and application scenarios without departing from the spirit and scope of the present application.
First, application scenarios applicable to the present application will be described. The method and the device can be applied to the technical field of industrial Internet identification analysis.
According to research, the existing industrial Internet identification analysis system relies on digital certificate technology to conduct safety protection such as identity verification, so that the safety of the industrial Internet identification analysis system is protected. However, the digital certificates are uniformly managed by the CA, and the huge resource load is brought to the CA by the ultra-large-scale entity number of the industrial Internet, so that the problem of huge entity number is avoided to a certain extent. Even so, with the continuous development of the industrial internet, the number of nodes is continuously increased, and the problem of resource occupation of the CA by certificate management is increasingly obvious. Meanwhile, the CA also faces the security threat of an attacker, and once the CA is attacked, the normal operation of the whole industrial Internet is directly affected. Therefore, how to improve the security of the industrial internet identification analysis system becomes a technical problem.
Based on this, the embodiment of the application provides an industrial internet identification analysis system, which can realize certificate-free signature by using public identity information to replace public key certificates, reduces corresponding management cost and improves the safety of the industrial internet identification analysis system.
Referring to fig. 1, fig. 1 is a schematic structural diagram of an industrial internet identifier analysis system according to an embodiment of the present application. As shown in fig. 1, the industrial internetidentification resolution system 100 provided in the embodiment of the present application includes a plurality of nodes and a verification module 150, where the nodes include a recursive resolution node 110, an enterprise node 120, a secondary node 130, and a national top level node 140; the recursive analysis node 110 is in communication connection with the enterprise node 120, the secondary node 130 and the national top node 140, the verification module 150 is in communication connection with a plurality of the nodes, the enterprise node 120 is in communication connection with the secondary node 130, and the secondary node 130 is in communication connection with the national top node 140.
Specifically, the recursive resolving node 110 is configured to send a bidirectional identity authentication request to the enterprise node 120, the secondary node 130 and the national top node 140 when providing a resolving service for the target identifier resolving request message after receiving the target identifier resolving request message sent by the user terminal; any node is used for splicing the target identification analysis request message with the identification information corresponding to the node and the corresponding identification certification certificate after receiving the bidirectional identification certification request, and determining the target identification analysis request message carrying the signature information corresponding to the node; the verification module 150 is configured to verify, for any one of the nodes, the target identifier analysis request message carrying signature information of the node based on public identifier information in the identifier information of the node, and if the verification is passed, enable the node to analyze an identifier field managed by its own node in the target identifier analysis request, so as to determine an identifier analysis result.
Here, after receiving the target identifier resolution request message sent by the user side, the recursive resolution node 110 sends a bidirectional identity authentication request to the enterprise node 120, the secondary node 130 and the national top node 140, where each node needs to send a target identifier resolution request message carrying signature information to the verification module 150 for bidirectional identity authentication.
Wherein, the identity information of each nodeIDIncluding public identity informationidLimited identity informationpidWherein, the method comprises the steps of, wherein,idrepresenting the unique identity code of the node,pidother identity information representing the node, including name, identity credential expiration date, and other information.
The identifier resolution result is a result obtained by resolving an identifier field managed by a node of the node in the target identifier resolution request, for example, the identifier resolution result may be an internet domain name resolution result, and the server address storing the product information may be queried through the product identifier, or the product information and related services may be queried directly.
After the verification is passed, the verification module 150 sends a request capable of being parsed to the node after the verification is passed, and the node parses the identifier field managed by its own node in the target identifier parsing request to determine the identifier parsing result.
Here, the total identifier resolution result corresponding to the target identifier resolution request may be determined according to the identifier resolution results of the plurality of nodes.
In the scheme, the public identity is used for replacing the public key certificate, so that no certificate signature can be realized, a trusted third party is not required to provide public key certificate management service, and the corresponding management cost is reduced.
In a possible implementation manner, for the recursive resolution node 110, after receiving a bidirectional identity authentication request, the node is configured to splice a target identifier resolution request message with identity information corresponding to the node and corresponding identity authentication credentials, to determine a target identifier resolution request message corresponding to the node and carrying signature information, where the determining includes:
a: the recursion resolution node 110 concatenates the target identifier resolution request message, the identity information of the recursion resolution node 110, and the identity authentication credential of the recursion resolution node 110, and determines the concatenated target identifier resolution request message of the recursion resolution node 110.
Here, the recursion resolution node 110 splices the target identifier resolution request message with the corresponding identity information and the corresponding identity authentication credential, and determines the spliced target identifier resolution request message of the recursion resolution node 110.
Wherein, when generating signature, the recursion analysis node 110 analyzes the target identifier to request message #
M) Identity information of the recursion analysis node 110 itself
ID) Identity authentication credentials of recursion resolution node 110
AT) Splicing to obtain
Wherein->
And analyzing the request message for the spliced target mark of the analysis node.
B: and processing the spliced target identifier analysis request message of the recursion analysis node 110 based on a summary algorithm, and determining a summary result message of the recursion analysis node 110.
Here, the spliced target identifier resolution request message of the recursion resolution node 110 is processed according to the summarization algorithm, and a summary result message of the recursion resolution node 110 is determined.
C: and signing the corresponding abstract result message based on the private key of the recursion analysis node 110, and determining a target identification analysis request message carrying signature information corresponding to the recursion analysis node 110.
Here, the digest result message of the recursion resolution node 110 is signed according to the private key of the recursion resolution node 110, so as to determine the target identifier resolution request message carrying the signature information corresponding to the recursion resolution node 110.
Wherein, the abstracting algorithm is used for the spliced target identification analysis request message to obtain an abstracted result message
Then using private key [ ]
PK) For summary result message->
Signing to obtain target identification analysis request message carrying signature information>
. Here, other nodes solve the corresponding target identifier carrying signature informationThe processing procedure of the analysis request message is identical to the processing procedure of the recursion resolution node 110, and this part will not be described in detail.
In one possible implementation manner, the verification module 150 is configured to, for any one of the nodes, verify the target identifier resolution request message carrying signature information of the node based on public identifier information among the identifier information of the node, and if the verification is passed, make the node resolve an identifier field managed by its own node in the target identifier resolution request, and determine an identifier resolution result, where the verification module 150 is specifically configured to:
(1): and detecting whether signature verification of the public identity information on the target identity analysis request message carrying signature information is effective or not.
The verification module 150 detects whether signature verification of the target identifier resolution request message carrying signature information by using the public identity information of the node is valid.
(2): if the signature verification is effective, verifying the identity authentication credential in the spliced target identifier analysis request message based on a public key provided by a key generation center; if the verification is passed, the identity information of the node is valid, so that the node analyzes the identity field managed by the node in the target identity analysis request, and an identity analysis result is determined.
If the signature verification is valid, verifying the identity authentication credential in the spliced target identity analysis request message according to the public key provided by the key generation center, and if the signature verification is passed, considering the identity information of the node to be valid, so that the node analyzes the identity field managed by the node in the target identity analysis request, and determining the identity analysis result.
Wherein, after receiving the target identifier resolution request message carrying the signature information, the verification module 150 verifies the integrity of the target identifier resolution request message carrying the signature information first, and uses the unique identity code id of the node to resolve the target identifier carrying the signature informationParsing request messages
And (5) performing verification. If the target identification resolution request message carrying the signature information is valid, the public key pair provided by the key generation center is further used for +. >
Is->
Performing verification and determining->
Is effective in the following.
In one possible implementation, the verification module 150 is further configured to:
determining limited identity information based on the identity information; detecting whether the corresponding identity authentication credentials are overdue based on identity validity periods among the limited identity information; if yes, a request for regenerating the identity authentication credentials is sent to the node.
Here, the identity information is determinedID) Determining limited identity informationpid) And detecting whether the corresponding identity authentication credential is overdue according to the identity validity period in the limited identity information, and if so, sending a request for regenerating the identity authentication credential corresponding to the node.
Further, referring to fig. 2, fig. 2 is a second schematic structural diagram of an industrial internetidentification analysis system 100 according to an embodiment of the present application. As shown in fig. 2, the industrial internetidentification resolution system 100 further includes an identification resolutionaccess authentication module 160, where the identification resolutionaccess authentication module 160 is communicatively connected to a plurality of the nodes.
Specifically, the identifier resolutionaccess authentication module 160 is configured to determine, after the recursive resolution node 110, the enterprise node 120, the secondary node 130, and the national top node 140 send a request for applying for an identity authentication credential, an identity authentication credential corresponding to each node based on the key generation center and identity information provided by each node; wherein the identity information comprises public identity information and limited identity information.
Here, the id resolutionaccess authentication module 160 determines the id authentication credentials corresponding to each node according to the id information provided by the key generation center and each node after receiving the request for applying the id authentication credentials sent by the recursive resolution node 110, the enterprise node 120, the secondary node 130, and the national top node 140.
In one possible implementation manner, the identity resolutionaccess authentication module 160 is specifically configured to, when determining, based on the key generation center and the identity information provided by each of the nodes, an identity authentication credential corresponding to each of the nodes, where the identity resolutionaccess authentication module 160 is configured to:
i: and the key generation center issues corresponding private keys to the nodes corresponding to the public identity information.
Here, the key generation center issues a corresponding private key to each node to which the public identity information corresponds.
Wherein the private keys corresponding to different public identity information are different.
II: each private key signs the corresponding identity information, and the identity authentication credentials corresponding to each node are determined.
Here, each private key signs the corresponding identity information, and determines the identity certification credential corresponding to each node.
In the scheme, the certificate-free signature method based on the identification password can reduce the resource occupation and construction cost brought by digital certificate management, break through the original resource limitation and design bottleneck, and better ensure the safety of an industrial Internet identification analysis system.
In particular embodiments, the identity resolution
access authentication module 160 uses an identity password to provide identity information from an access nodeThe private key is issued to the access node. The key generating center (private key generator, PKG) corresponds to the public identity information
id) Generating private key of corresponding node
PK) To ensure identification information in an issuing key
IDThe PKG uses its own private key to identify node identity information
IDSigning to generate identity authentication credentials
AT. Wherein,,
PKGthe keys issued to each node are
. Wherein the method comprises the steps of
CKRepresentation of
PKGA full key issued for each node.
PKRepresenting the private key used by the node to actually sign.
ATAnd the identity certificate obtained after the PKG signs the node identity information is represented.
In one possible implementation manner, the identifier resolutionaccess authentication module 160 obtains the identity information provided by each node through the following steps:
and the nodes of each level respectively transmit corresponding identity information to the upper level nodes, and finally the national top level node 140 collects and submits the identity information of each level of nodes to the identity analysis node access authentication module.
Here, each level of nodes respectively transmit corresponding identity information to the upper level node, and finally, the country top level node 140 submits the identity information of each level of nodes to the identity analysis node access authentication module in a summarized manner.
The industrial Internet identification analysis system comprises a plurality of nodes and a verification module, wherein the nodes comprise recursion analysis nodes, enterprise nodes, secondary nodes and national top nodes; the recursion analysis node is in communication connection with the enterprise node, the secondary node and the national top node, the verification module is in communication connection with a plurality of nodes, the enterprise node is in communication connection with the secondary node, and the secondary node is in communication connection with the national top node; the recursion analysis node is used for sending a bidirectional identity authentication request to the enterprise node, the secondary node and the national top node when providing analysis service for the target identification analysis request message after receiving the target identification analysis request message sent by the user terminal; any node is used for splicing the target identification analysis request message with the identification information corresponding to the node and the corresponding identification certification certificate after receiving the bidirectional identification certification request, and determining the target identification analysis request message carrying the signature information corresponding to the node; the verification module is used for verifying the target identification analysis request message carrying the signature information of the node based on public identity information in the identity information of any node, if the verification is passed, the node analyzes the identification field managed by the node in the target identification analysis request, and an identification analysis result is determined. By using public identity information to replace public key certificates, certificate-free signature can be realized, corresponding management cost is reduced, and the safety of an industrial Internet identity analysis system is improved.
Referring to fig. 3, fig. 3 is a flowchart of an industrial internet identifier parsing method according to an embodiment of the present application. As shown in fig. 3, the industrial internet identification analysis method includes:
s301: after receiving a target identification analysis request message sent by a user terminal, the recursion analysis node sends a bidirectional identity authentication request to enterprise nodes, secondary nodes and national top nodes when providing analysis service for the target identification analysis request message.
In the step, after receiving a target identification analysis request message sent by a user terminal, a recursion analysis node sends a bidirectional identity authentication request to an enterprise node, a secondary node and a national top node when providing analysis service for the target identification analysis request message.
S302: after receiving the bidirectional identity authentication request, the recursion analysis node, the enterprise node, the secondary node and the national top node splice the target identification analysis request message with the identity information corresponding to each node and the corresponding identity authentication credentials, and determine the target identification analysis request message carrying signature information corresponding to each node.
In the step, after receiving a bidirectional identity authentication request, a recursion analysis node, an enterprise node, a secondary node and a national top node splice the target identification analysis request message with the identity information corresponding to each node and the corresponding identity authentication credentials to determine the target identification analysis request message carrying signature information corresponding to each node.
S303: and verifying the target identification analysis request message carrying the signature information of the node based on the public identity information in the identity information of the node aiming at any node, and if the verification is passed, analyzing the identification field managed by the node of the target identification analysis request, and determining an identification analysis result.
In the step, for any node, a verification module verifies the target identification analysis request message carrying signature information of the node according to public identity information in the identity information of the node, if the verification is passed, the node analyzes an identification field managed by the node in the target identification analysis request, and an identification analysis result is determined.
The identification analysis result can be an internet domain name analysis result, and can be used for inquiring a server address for storing product information through the product identification or directly inquiring the product information and related services.
In one possible implementation manner, the industrial internet identification resolution method further comprises:
after the recursion analysis node, the enterprise node, the secondary node and the national top node send a request for applying for identity authentication credentials, determining the identity authentication credentials corresponding to the nodes based on the key generation center and the identity identification information provided by the nodes; wherein the identity information comprises public identity information and limited identity information.
In one possible implementation manner, the determining, based on the key generating center and the identity information provided by each node, the identity authentication credential corresponding to each node includes:
the key generation center issues corresponding private keys to the nodes corresponding to the public identity information;
each private key signs the corresponding identity information, and the identity authentication credentials corresponding to each node are determined.
In one possible implementation manner, after receiving the bidirectional identity authentication request, the any one of the nodes is configured to splice the target identifier resolution request message with the identity information corresponding to the node and the corresponding identity authentication credential, and determine a target identifier resolution request message corresponding to the node and carrying signature information, where the method includes:
the recursion analysis node splices the target identification analysis request message, the identity information of the recursion analysis node and the identity authentication credential of the recursion analysis node, and determines the spliced target identification analysis request message of the recursion analysis node;
processing the spliced target identifier analysis request message of the recursion analysis node based on a summary algorithm, and determining a summary result message of the recursion analysis node;
and signing the corresponding abstract result message based on the private key of the recursion analysis node, and determining a target identification analysis request message carrying signature information corresponding to the recursion analysis node.
In one possible implementation manner, the verifying the target identifier analysis request message carrying signature information of the node based on public identifier information in the identifier information of the node, if the verification is passed, so that the node analyzes an identifier field managed by its own node in the target identifier analysis request, and determines an identifier analysis result, including:
Detecting whether signature verification of the public identity information on the target identity analysis request message carrying signature information is effective or not;
if the signature verification is effective, verifying the identity authentication credential in the spliced target identifier analysis request message based on a public key provided by a key generation center;
if the verification is passed, the identity information of the node is valid, so that the node analyzes the identity field managed by the node in the target identity analysis request, and an identity analysis result is determined.
In one possible implementation manner, the industrial internet identification resolution method further comprises:
determining limited identity information based on the identity information;
detecting whether the corresponding identity authentication credentials are overdue based on identity validity periods among the limited identity information;
if yes, a request for regenerating the identity authentication credentials is sent to the node.
In one possible implementation manner, the module obtains the identification information provided by each node by the following steps:
and the nodes of each level respectively transmit corresponding identity information to the upper level nodes, and finally the national top level nodes transmit the identity information of each level of nodes to the identity analysis node access authentication module in a summarized manner.
The embodiment of the application provides an industrial Internet identification analysis method, which comprises the following steps: after receiving a target identification analysis request message sent by a user side, a recursion analysis node sends a bidirectional identity authentication request to an enterprise node, a secondary node and a national top node when providing analysis service for the target identification analysis request message; after receiving a bidirectional identity authentication request, the recursion analysis node, the enterprise node, the secondary node and the national top node splice the target identification analysis request message with the identity information corresponding to each node and the corresponding identity authentication credentials to determine the target identification analysis request message carrying signature information corresponding to each node; and verifying the target identification analysis request message carrying the signature information of the node based on the public identity information in the identity information of the node aiming at any node, and if the verification is passed, analyzing the identification field managed by the node of the target identification analysis request, and determining an identification analysis result. By using public identity information to replace public key certificates, certificate-free signature can be realized, corresponding management cost is reduced, and the safety of an industrial Internet identity analysis system is improved.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 4, theelectronic device 400 includes aprocessor 410, amemory 420, and abus 430.
Thememory 420 stores machine-readable instructions executable by theprocessor 410, when theelectronic device 400 is running, theprocessor 410 communicates with thememory 420 through thebus 430, and when the machine-readable instructions are executed by theprocessor 410, the steps of the industrial internet identification resolution method in the method embodiment shown in fig. 3 can be executed, and the specific implementation is referred to the method embodiment and will not be described herein.
The embodiment of the present application further provides a computer readable storage medium, where a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the industrial internet identification analysis method in the method embodiment shown in fig. 3 may be executed, and a specific implementation manner may refer to the method embodiment and will not be described herein.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that: the foregoing examples are merely specific embodiments of the present application, and are not intended to limit the scope of the present application, but the present application is not limited thereto, and those skilled in the art will appreciate that while the foregoing examples are described in detail, the present application is not limited thereto. Any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or make equivalent substitutions for some of the technical features within the technical scope of the disclosure of the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.