CN110708322A - Method for realizing proxy service of industrial internet identification analysis system - Google Patents
Method for realizing proxy service of industrial internet identification analysis system Download PDFInfo
- Publication number
- CN110708322A CN110708322A CN201910968241.8A CN201910968241A CN110708322A CN 110708322 A CN110708322 A CN 110708322A CN 201910968241 A CN201910968241 A CN 201910968241A CN 110708322 A CN110708322 A CN 110708322A
- Authority
- CN
- China
- Prior art keywords
- identification
- identifier
- function
- proxy
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a method for realizing an industrial Internet identification analysis system proxy service, which comprises the steps of firstly building a proxy server of a Handle system at 8000 port of a server, then calling an interface provided by the proxy server at the front end of the Handle system and using an HTTP protocol to register and manage an identification in a programming mode, sending a corresponding RESTAPI request by a user, and giving a corresponding HTTP response by the proxy server after identity verification. The proxy service can provide proxy service for the industrial internet identification resolution secondary node. The proxy service also develops an identification fuzzy query function, an identification analysis quantity counting function, a batch registration identification function and a server state monitoring function.
Description
Technical Field
The invention relates to a method for proxy service of an industrial internet identification analysis system, belonging to the technical field of industrial internet identification.
Background
The Handle system was originally proposed and implemented by CNRI (The Corporation for National research initiatives, National research projects) in The united states, a distributed information system built on top of The Internet architecture to provide efficient, scalable, reliable name services and more complex resource addressing and location requirements. In a Handle system, the unique identifier is called a Handle. The Handle system defines a set of layered service models. The top-level service consists of a Global service called GHR (Global Handle Registry). It is composed of other Handle services, commonly referred to as lhs (local Handle services). The GHR can manage all handle namespaces. The LHS is set up and maintained by an organization that has administrative rights to a particular naming authority and may be responsible for all handle services under any number of local handle namespaces (each identified by a unique NA), rather than just handle services that are active inside an organization. The LHS and the set of handle namespaces for which it is responsible must be registered under the GHR. As shown in fig. 1, the current national industrial internet identification analysis system is composed of elements such as international root nodes, national top nodes, secondary nodes, enterprise nodes, recursive nodes, and the like, wherein the proxy service is a method for implementing the secondary nodes.
The Handle system defines a mature and compatible coding rule, has a stable background analysis system and an autonomous and controllable global distributed management architecture. Each Handle identity consists of two parts: a globally uniformly managed Handle prefix followed by a unique custom code under that prefix. The prefix and custom code are separated by the ASCII character "/" (0x 2F). For example, "hdl: 86.1000.300/60574397", "/" is preceded by a Handle prefix (a unique code for an enterprise) and "/" is followed by a custom code (autonomously defined by the enterprise according to the code of the respective system).
The services of the Handle system can be divided into two major categories, Handle parsing services and Handle management services. For both services, the current implementation is to directly use the client provided by the Handle system. The client has a simple graphical interface and integrates the following basic functions:
handle resolution
The parsing process of the client is as follows: (1) after the agent client creates a Handle, if the prefix/suffix is found, the user sends an analysis request, the agent client sends the analysis request to the GHR, and the agent client requests to obtain the Handle related information corresponding to the prefix; (2) after receiving the request, the GHR returns service information of the LHS responsible for the Handle under the prefix; (3) through the information, the agent client can communicate with the corresponding LHS, analyze the identification and obtain an analysis result.
2. Identity authentication
Security authentication in the Handle System includes two aspects: (1) the server side authenticates the client side, and prevents an unauthenticated client side from acquiring data from the server side or performing unauthorized operation on the data of the server side; (2) the client authenticates the response of the server by adopting a public key and a private key, thereby preventing the response data from being falsified and ensuring the integrity of the data.
Handle management
The Handle system supports distributed management, each Handle has an owner or manager, and after the owner of the Handle is authenticated by the client, the Handle can be deleted, added, modified and the like.
At present, in China, the industrial internet identification analysis system attracts national attention, and various industries want to build a huge industrial ecosystem around the identification analysis system and utilize registration information and analysis logs generated by the identification analysis system to conduct data mining to derive new applications and modes. Although the client of the Handle system has three basic functions of Handle registration, management and analysis, the basic functions are far from meeting the requirements, and the open source code of the Handle client has high coupling and almost no possibility of developing the client. After release 8 of the Handle system, an intermediate component of the Handle system, the Handle system proxy server, starts to support requests issued using RESTAPI, allows registration and management of identities using the HTTP protocol in a programmed manner, and provides a way for users to develop secondary node proxy services.
Disclosure of Invention
In view of the above situation, the proxy service provided by the invention not only realizes three basic functions of Handle registration, management and analysis, but also develops an identifier fuzzy query function, an identifier analysis quantity statistic function, a batch registration identifier function and a server state monitoring function by calling the interface provided by the Handle system proxy server and combining the interface with the front end.
The key technical points of the invention are as follows: 1. the proxy service can provide proxy service for the industrial internet identification analysis secondary node.
2. The proxy service calls a RESTAPI interface provided by a proxy server, and realizes the basic functions of industrial internet identification analysis based on a Handle protocol by using a corresponding HTTP method, including identification registration, identification analysis, identification modification and identification deletion.
3. The proxy service also develops an identification fuzzy query function, an identification analysis quantity counting function, a batch registration identification function and a server state monitoring function.
4. The proxy service allows users to derive new applications and schemas by data mining using the registration information, resolution logs generated by the identity resolution system.
In order to solve the technical problems in the technology, the technical scheme adopted by the invention is a method for realizing the proxy service of the industrial internet identification analysis system, and the method comprises the following processes:
the method for realizing the proxy service comprises the steps of firstly building a proxy server of a Handle system at a 8000 port of a server, then calling an interface provided by the proxy server at the front end of the Handle system and using an HTTP protocol to register and manage an identifier in a programming mode, sending a corresponding RESTAPI request by a user, and giving a corresponding HTTP response by the proxy server after identity verification, wherein the response is a JSON object and comprises a 'responseCode', if the value is 1, the response is successful, and the others are failed.
For the four basic functions of the Handle system, namely, identifier analysis, identifier registration, identifier modification and identifier deletion, the four basic functions can be realized one by calling corresponding interfaces based on the above process, and the specific implementation method of each basic function is as follows.
Identity resolution
The flow of the identification analysis comprises the following steps: (1) inputting an identifier in the proxy service system; (2) judging whether the identification is in a local database; (3) if so, sending a RESTAPI request to the proxy server: GET/api/handles/{ handle }; (4) the returned results are displayed at the front end. Identity authentication is not required for identity resolution.
Identity registration
The flow of the identification registration comprises the following steps: (1) inputting identification and an identification result in a Handle system; (2) judging whether the input identification and the identification result meet the format requirement; (3) and if the request is satisfied, sending a RESTAPI request to the proxy server: PUT/api/handles/{ handle }; (4) the proxy server carries out identity authentication on the user; (5) after the authentication is passed, the identification is registered in the Handle system and is stored in a local database.
Identity modification
The process of identity modification is basically the same as the principle of identity creation, and a user sends a request to directly replace an identity record by using RESTAPI.
Identity deletion
The flow of deleting the mark comprises the following steps: (1) the user selects the mark to be deleted; (2) the user sends a RESTAPI request to the proxy server: DELETE/api/handles/{ handle }; (3) the proxy server carries out identity authentication on the user; (4) and deleting the identifier and the corresponding content by the Handle system and the local database after the verification is passed.
While the above functions are realized, the method of HTTP put, get and delete is involved, specifically: (1) put, formulate url send a replacement document or upload a new document. (2) Delete, delete a document uniquely identified by the request url. (3) Get, request a resource from the web.
Besides the above basic functions, the Handle system also develops an identifier fuzzy query function, an identifier resolution statistics function, a batch registration identifier function and a server state monitoring function, and details are as follows:
fuzzy query function
In a database of the proxy service, information of each identifier is counted in a data table, the information comprises an identifier prefix, identifier registration time, a user name of an identifier owner and identifier resolution, the proxy service adopts a Django fuzzy query method to realize a fuzzy query function of the identifier in the database, and query conditions comprise the identifier prefix, the identifier registration time and the user name of the identifier owner.
Tag resolution amount statistic function
After the identification in the proxy service database is analyzed every time, the analysis amount corresponding to the data table where the identification in the proxy service database is located is added to obtain data, the data is also placed at the front end to be checked by a user, and the user judges the practicability of the identification by using the data.
Batch registration function
The proxy service realizes the function of batch creation based on the basic function of identification registration, the function of batch creation requires a user to input identification information in Excel according to a required format and submit the identification information to a Handle system, and the Handle system can traverse data in an Excel table and call an interface of identification registration for many times to realize the function of batch creation.
Server state monitoring function
The proxy service is connected with a server where the proxy service is located in a programming mode through an SSH command, the hard disk occupancy rate and the memory occupancy rate of the server are obtained, and a user knows the actual requirement of the proxy service on the server hardware through the data.
Compared with the prior art, the invention has the following technical effects:
1. the invention is used as industrial internet second-level node proxy service software, upwards connects with the national top-level node of the identification analysis, downwards connects with the enterprise identification node and the application system, can directly provide service for the enterprise, and comprises the functions of identification registration, identification analysis, identification management service, identification data service, operation monitoring and the like. On the premise of ensuring data safety, the method promotes the industry information intercommunication and the credible data sharing.
2. The invention allocates corresponding identification prefixes to different enterprise users, and prefixes given to different industries have different coding modes, so that different users can be positioned through the identification prefixes, and simultaneously, different industries are more favorably distinguished and managed.
3. The invention integrates the authentication process of the proxy server to the user into a background interface, and the user can directly carry out identification registration and management after passing the registration audit of the invention.
4. The invention manages the self-generated important information such as coding attribute information, identification registration information, identification distribution information, identification analysis logs and the like, and utilizes the data to carry out data mining and statistical analysis.
Drawings
FIG. 1 illustrates an industrial Internet identity parsing architecture diagram.
Fig. 2 interface calls the basic flow diagram.
Fig. 3 identifies a parsing basic flow diagram.
Fig. 4 identifies a registration basic flow diagram.
Fig. 5 identifies a modified basic flow diagram.
Fig. 6 identifies a delete basic flow diagram.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and examples.
The technical scheme adopted by the invention is a method for realizing the proxy service of an industrial Internet identification analysis system, the proxy service firstly builds a proxy server of a Handle system at 8000 ports of a server, then calls an interface provided by the proxy server at the front end of the system and uses an HTTP protocol to register and manage the identification in a programming mode, a user sends a corresponding RESTAPI request, after identity verification, the proxy server gives a corresponding HTTP response, the response is a JSON object and comprises a 'responseCode', if the value is 1, the response represents success, and the other represents failure. For the four basic functions of identifier parsing, identifier registration, identifier modification and identifier deletion, the method can be implemented one by calling corresponding interfaces based on the above-mentioned process.
1. Identity resolution
As shown in fig. 3, the main flow of the identifier resolution is divided into the following steps: (1) inputting an identifier in the proxy service system; (2) judging whether the identification is in a local database; (3) if so, sending a RESTAPI request to the proxy server: GET/api/handles/{ handle }; (4) the returned results are displayed at the front end. It should be noted that identity resolution does not require authentication.
2. Identity registration
As shown in fig. 4, the flow of identity registration mainly includes the following steps: (1) inputting identification and identification results in the system; (2) judging whether the input identification and the identification result meet the format requirement; (3) and if the request is satisfied, sending a RESTAPI request to the proxy server: PUT/api/handles/{ handle }; (4) the proxy server carries out identity authentication on the user; (5) after the authentication is passed, the identifier is registered in the handle system and stored in a local database.
3. Identity modification
As shown in fig. 5, the procedure of identity modification is basically the same as the principle of identity creation, and the user uses RESTAPI to issue a request to directly replace the identity record.
4. Identity deletion
As shown in fig. 6, the flow of deleting the identifier is mainly divided into the following steps: (1) the user selects the mark to be deleted; (2) the user sends a RESTAPI request to the proxy server: DELETE/api/handles/{ handle }; (3) the proxy server performs identity authentication on the user; (4) and the identification and the corresponding content are deleted through the post-handle system and the local database.
While the above functions are realized, the method mainly involves put, get and delete methods of HTTP, specifically: (1) put, formulate url send a replacement document or upload a new document. (2) Delete, delete a document uniquely identified by the request url. (3) Get, request a resource from the web.
In addition to the above basic functions, the system also develops an identifier fuzzy query function, an identifier resolution statistics function, a batch registration identifier function and a server state monitoring function, and details are as follows:
1. fuzzy query function
In a database of the proxy service, information of each identifier is counted in a data table, the information comprises an identifier prefix, identifier registration time, a user name of an identifier owner and identifier resolution, the proxy service adopts a Django fuzzy query method, the fuzzy query function of the identifier in the database is realized, and query conditions comprise the identifier prefix, the identifier registration time and the user name of the identifier owner.
2. Tag resolution amount statistic function
After the identification in the agent service database is analyzed every time, the analysis amount corresponding to the data table where the identification is located is increased, the data is also placed at the front end to be checked by a user, and the user can judge the practicability of the identification by utilizing the data.
3. Batch registration function
The proxy service realizes the function of batch creation based on the basic function of identification registration, the function requires a user to input identification information in Excel according to a required format and submit the identification information to a system, and the system can traverse data in an Excel table and call an interface of identification registration for many times to realize the function of batch creation.
4. Server state monitoring function
The proxy service is connected with a server where the proxy service is located in a programming mode through an SSH command, and the hard disk occupancy rate and the memory occupancy rate of the server are obtained, so that a user can know the actual requirement of the proxy service on the server hardware through the data.
Claims (7)
1. A method for realizing the proxy service of an industrial Internet identification analysis system is characterized in that: the flow of the method is as follows,
the method for realizing the proxy service comprises the steps that firstly, a proxy server of a Handle system is built at a 8000 port of a server, then an interface provided by the proxy server is called at the front end of the Handle system, an HTTP protocol is used for registering and managing an identifier in a programming mode, a user sends out a corresponding RESTAPI request, after identity verification, the proxy server gives out a corresponding HTTP response, the response is a JSON object and comprises a 'responseCode', if the value is 1, the response represents success, and the others represent failure;
for the four basic functions of the Handle system, namely identifier analysis, identifier registration, identifier modification and identifier deletion, on the basis of the above process, only the corresponding interface needs to be called for realization.
2. The method for implementing the proxy service of the industrial internet identity resolution system according to claim 1, wherein:
the flow of the identification analysis comprises the following steps: (1) inputting an identifier in the proxy service system; (2) judging whether the identification is in a local database; (3) if so, sending a RESTAPI request to the proxy server: GET/api/handles/{ handle }; (4) displaying the returned result at the front end; identity authentication is not required for identity resolution.
3. The method for implementing the proxy service of the industrial internet identity resolution system according to claim 1, wherein: the flow of the identification registration comprises the following steps: (1) inputting identification and an identification result in a Handle system; (2) judging whether the input identification and the identification result meet the format requirement; (3) and if the request is satisfied, sending a RESTAPI request to the proxy server: PUT/api/handles/{ handle }; (4) the proxy server carries out identity authentication on the user; (5) after the authentication is passed, the identification is registered in the Handle system and is stored in a local database.
4. The method for implementing the proxy service of the industrial internet identity resolution system according to claim 1, wherein: the process of identity modification is the same as the principle of identity creation, and a user sends a request to directly replace an identity record by using RESTAPI.
5. The method for implementing the proxy service of the industrial internet identity resolution system according to claim 1, wherein: the flow of deleting the mark comprises the following steps: (1) the user selects the mark to be deleted; (2) the user sends a RESTAPI request to the proxy server: DELETE/api/handles/{ handle }; (3) the proxy server carries out identity authentication on the user; (4) and deleting the identifier and the corresponding content by the Handle system and the local database after the verification is passed.
6. The method for implementing the proxy service of the industrial internet identity resolution system according to claim 1, wherein: the Handle system relates to put, get and delete methods of HTTP, and specifically comprises the following steps: (1) put, formulate url and send a replacement document or upload a new document; (2) delete, delete a document uniquely identified by the request url; (3) get, request a resource from the web.
7. The method for implementing the proxy service of the industrial internet identity resolution system according to claim 6, wherein: the Handle system develops an identification fuzzy query function, an identification analysis quantity counting function, a batch registration identification function and a server state monitoring function;
fuzzy query function
In a database of the agent service, information of each identifier is counted in a data table, the information comprises an identifier prefix, identifier registration time, a user name of an identifier owner and identifier resolution, the agent service adopts a Django fuzzy query method to realize a fuzzy query function of the identifier in the database, and query conditions comprise the identifier prefix, the identifier registration time and the user name of the identifier owner;
tag resolution amount statistic function
After the identification in the agent service database is analyzed each time, the analysis amount corresponding to the data table where the identification in the agent service database is located is added to obtain data, the data is also placed at the front end to be checked by a user, and the user judges the practicability of the identification by using the data;
batch registration function
The proxy service realizes the function of batch creation based on the basic function of identification registration, the function of batch creation requires a user to input identification information in Excel according to a required format and submits the identification information to a Handle system, and the Handle system can traverse data in an Excel table and call an interface of identification registration for many times to realize the function of batch creation;
server state monitoring function
The proxy service is connected with a server where the proxy service is located in a programming mode through an SSH command, the hard disk occupancy rate and the memory occupancy rate of the server are obtained, and a user knows the actual requirement of the proxy service on the server hardware through the data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910968241.8A CN110708322A (en) | 2019-10-12 | 2019-10-12 | Method for realizing proxy service of industrial internet identification analysis system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910968241.8A CN110708322A (en) | 2019-10-12 | 2019-10-12 | Method for realizing proxy service of industrial internet identification analysis system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110708322A true CN110708322A (en) | 2020-01-17 |
Family
ID=69198692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910968241.8A Pending CN110708322A (en) | 2019-10-12 | 2019-10-12 | Method for realizing proxy service of industrial internet identification analysis system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110708322A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111026567A (en) * | 2020-03-11 | 2020-04-17 | 西南交通大学 | Handle identification coding system and method based on block chain |
CN111186334A (en) * | 2020-02-17 | 2020-05-22 | 江苏中天互联科技有限公司 | Intelligent charging system |
CN111367245A (en) * | 2020-03-18 | 2020-07-03 | 贵阳块数据城市建设有限公司 | Production equipment monitoring system based on identification analysis technology |
CN111935328A (en) * | 2020-07-01 | 2020-11-13 | 国家工业信息安全发展研究中心 | Cross-region and cross-industry industrial internet entity identification method |
CN112200502A (en) * | 2020-11-19 | 2021-01-08 | 苏州协同创新智能制造装备有限公司 | Industrial internet identification analysis method |
CN112491960A (en) * | 2020-10-30 | 2021-03-12 | 中国科学院计算机网络信息中心 | SCM (Single chip microcomputer) -oriented industrial internet identifier registration and analysis method, identifier connection platform and system |
CN112765117A (en) * | 2021-01-26 | 2021-05-07 | 中国船级社 | Industrial internet identification analysis system based on micro-service architecture |
CN113114619A (en) * | 2021-03-02 | 2021-07-13 | 杭州海康威视数字技术股份有限公司 | Video identification analysis method, device and system based on Handle system |
CN113259504A (en) * | 2021-06-29 | 2021-08-13 | 北京信源电子信息技术有限公司 | Data management system based on DOA/handle identification analysis technology |
CN113507531A (en) * | 2021-06-15 | 2021-10-15 | 山东伏羲智库互联网研究院 | Internet of things identification analysis method, edge gateway, electronic equipment and storage medium |
CN113572844A (en) * | 2021-07-27 | 2021-10-29 | 中国电子技术标准化研究院 | Industrial internet identification analysis method |
CN113965615A (en) * | 2021-10-29 | 2022-01-21 | 重庆信息通信研究院 | Identification analysis method and system based on industrial Internet |
CN114531486A (en) * | 2020-10-30 | 2022-05-24 | 中移物联网有限公司 | Industrial internet data processing method, device, equipment and storage medium |
CN114666197A (en) * | 2022-03-09 | 2022-06-24 | 中信科移动通信技术股份有限公司 | Network management system and method based on industrial internet identification analysis |
CN114662814A (en) * | 2020-12-22 | 2022-06-24 | 中国石油化工股份有限公司 | Hazardous chemical identification analysis method |
CN114884973A (en) * | 2022-03-25 | 2022-08-09 | 徐工汉云技术股份有限公司 | Batch registration method and device for vehicle positioning data and storage medium |
CN115001760A (en) * | 2022-05-20 | 2022-09-02 | 中国船级社 | Industrial Internet fusion code sending service system and method |
CN116318994A (en) * | 2023-03-17 | 2023-06-23 | 北京信源电子信息技术有限公司 | Identity entrusting authentication method and related device of handle system of DOA |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050058144A1 (en) * | 2000-02-18 | 2005-03-17 | Arun Ayyagari | Extending access to a device in a limited connectivity network to devices residing outside the limited connectivity network |
CN101647253A (en) * | 2007-01-29 | 2010-02-10 | 诺基亚公司 | Submit report handling in SMSIP |
US20150200817A1 (en) * | 2014-01-15 | 2015-07-16 | Cisco Technology, Inc. | Method for Solving Coherency Lock Issues in Proxy Services |
US20170006106A1 (en) * | 2015-07-01 | 2017-01-05 | Dell Products, Lp | Sensor Data Advertisement via Network Identifier in Shared Spaces |
US10152718B1 (en) * | 2015-07-14 | 2018-12-11 | Ujet, Inc. | Agent initiated actions |
CN110716941A (en) * | 2019-10-18 | 2020-01-21 | 网络通信与安全紫金山实验室 | HANDLE identifier analysis system and data query method |
-
2019
- 2019-10-12 CN CN201910968241.8A patent/CN110708322A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050058144A1 (en) * | 2000-02-18 | 2005-03-17 | Arun Ayyagari | Extending access to a device in a limited connectivity network to devices residing outside the limited connectivity network |
CN101647253A (en) * | 2007-01-29 | 2010-02-10 | 诺基亚公司 | Submit report handling in SMSIP |
US20150200817A1 (en) * | 2014-01-15 | 2015-07-16 | Cisco Technology, Inc. | Method for Solving Coherency Lock Issues in Proxy Services |
US20170006106A1 (en) * | 2015-07-01 | 2017-01-05 | Dell Products, Lp | Sensor Data Advertisement via Network Identifier in Shared Spaces |
US10152718B1 (en) * | 2015-07-14 | 2018-12-11 | Ujet, Inc. | Agent initiated actions |
CN110716941A (en) * | 2019-10-18 | 2020-01-21 | 网络通信与安全紫金山实验室 | HANDLE identifier analysis system and data query method |
Non-Patent Citations (3)
Title |
---|
李颖: "中文DOI系统在影视行业的扩展应用", 《数字图书馆论坛》 * |
胡章丰: "面向新型互联网架构的移动性管理关键技术研究", 《中国博士学位论文全文数据库 信息科技辑》 * |
邹慧: "Handle系统与域名系统互联互通机制:一种基于标记语言描述协议数据单元的实现", 《计算机应用研究》 * |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111186334A (en) * | 2020-02-17 | 2020-05-22 | 江苏中天互联科技有限公司 | Intelligent charging system |
CN111026567A (en) * | 2020-03-11 | 2020-04-17 | 西南交通大学 | Handle identification coding system and method based on block chain |
CN111367245A (en) * | 2020-03-18 | 2020-07-03 | 贵阳块数据城市建设有限公司 | Production equipment monitoring system based on identification analysis technology |
CN111935328A (en) * | 2020-07-01 | 2020-11-13 | 国家工业信息安全发展研究中心 | Cross-region and cross-industry industrial internet entity identification method |
CN111935328B (en) * | 2020-07-01 | 2023-05-12 | 国家工业信息安全发展研究中心 | Cross-region and cross-industry industrial Internet entity identification method |
CN112491960A (en) * | 2020-10-30 | 2021-03-12 | 中国科学院计算机网络信息中心 | SCM (Single chip microcomputer) -oriented industrial internet identifier registration and analysis method, identifier connection platform and system |
CN112491960B (en) * | 2020-10-30 | 2023-06-30 | 中国科学院计算机网络信息中心 | SCM-oriented industrial Internet identification registration and analysis method and identification connection platform and system |
CN114531486B (en) * | 2020-10-30 | 2023-08-15 | 中移物联网有限公司 | Industrial Internet data processing method, device, equipment and storage medium |
CN114531486A (en) * | 2020-10-30 | 2022-05-24 | 中移物联网有限公司 | Industrial internet data processing method, device, equipment and storage medium |
CN112200502A (en) * | 2020-11-19 | 2021-01-08 | 苏州协同创新智能制造装备有限公司 | Industrial internet identification analysis method |
CN114662814A (en) * | 2020-12-22 | 2022-06-24 | 中国石油化工股份有限公司 | Hazardous chemical identification analysis method |
CN114662814B (en) * | 2020-12-22 | 2023-06-16 | 中国石油化工股份有限公司 | Dangerous chemical identification analysis method |
CN112765117A (en) * | 2021-01-26 | 2021-05-07 | 中国船级社 | Industrial internet identification analysis system based on micro-service architecture |
CN113114619B (en) * | 2021-03-02 | 2022-03-25 | 杭州海康威视数字技术股份有限公司 | Video identification analysis method, device and system based on Handle system |
CN113114619A (en) * | 2021-03-02 | 2021-07-13 | 杭州海康威视数字技术股份有限公司 | Video identification analysis method, device and system based on Handle system |
CN113507531A (en) * | 2021-06-15 | 2021-10-15 | 山东伏羲智库互联网研究院 | Internet of things identification analysis method, edge gateway, electronic equipment and storage medium |
CN113259504B (en) * | 2021-06-29 | 2021-10-29 | 北京信源电子信息技术有限公司 | Data management system based on DOA/handle identification analysis technology |
CN113259504A (en) * | 2021-06-29 | 2021-08-13 | 北京信源电子信息技术有限公司 | Data management system based on DOA/handle identification analysis technology |
CN113572844A (en) * | 2021-07-27 | 2021-10-29 | 中国电子技术标准化研究院 | Industrial internet identification analysis method |
CN113965615A (en) * | 2021-10-29 | 2022-01-21 | 重庆信息通信研究院 | Identification analysis method and system based on industrial Internet |
CN114666197A (en) * | 2022-03-09 | 2022-06-24 | 中信科移动通信技术股份有限公司 | Network management system and method based on industrial internet identification analysis |
CN114666197B (en) * | 2022-03-09 | 2023-10-31 | 中信科移动通信技术股份有限公司 | Network management system and method based on industrial Internet identification analysis |
CN114884973A (en) * | 2022-03-25 | 2022-08-09 | 徐工汉云技术股份有限公司 | Batch registration method and device for vehicle positioning data and storage medium |
CN114884973B (en) * | 2022-03-25 | 2023-11-17 | 徐工汉云技术股份有限公司 | Batch registration method and device for vehicle positioning data and storage medium |
CN115001760A (en) * | 2022-05-20 | 2022-09-02 | 中国船级社 | Industrial Internet fusion code sending service system and method |
CN116318994A (en) * | 2023-03-17 | 2023-06-23 | 北京信源电子信息技术有限公司 | Identity entrusting authentication method and related device of handle system of DOA |
CN116318994B (en) * | 2023-03-17 | 2024-01-26 | 北京信源电子信息技术有限公司 | Identity entrusting authentication method and related device of handle system of DOA |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110708322A (en) | Method for realizing proxy service of industrial internet identification analysis system | |
CN111488595B (en) | Method for realizing authority control and related equipment | |
KR102514325B1 (en) | Model training system and method, storage medium | |
US9536070B2 (en) | Access requests at IAM system implementing IAM data model | |
US6665674B1 (en) | Framework for open directory operation extensibility | |
US6192405B1 (en) | Method and apparatus for acquiring authorized access to resources in a distributed system | |
CN107465692B (en) | Unified user identity authentication method, system and storage medium | |
CN1941718B (en) | Method for managing instant-telecommunication group | |
CN108134764B (en) | Distributed data sharing and exchanging method and system | |
CN107656981A (en) | A kind of data sharing and management method and system based on identification technology | |
JP5342020B2 (en) | Group definition management system | |
AU2016332203B2 (en) | Encryption deployment discovery | |
CN110661670A (en) | Network equipment configuration management method and device | |
JP2009054086A (en) | Information providing device | |
CN112906029A (en) | Method and system for controlling user authority through identification analysis | |
US20170270602A1 (en) | Object manager | |
US20190066012A1 (en) | Enterprise customer website | |
CN117527568A (en) | Data access method and system of data integration platform | |
CN111542001B (en) | Network system with distributed server clusters and construction method thereof | |
JP5531659B2 (en) | Attribute information exchange system, attribute information exchange method, attribute information exchange program | |
CN113810415A (en) | Method for operation and maintenance of unmanaged host account through bastion machine | |
JP4230677B2 (en) | Information management system, information management apparatus, information management method, information use client, information use client program, and information recording medium on which information use client program is recorded | |
CN106656965B (en) | Universal client management system based on distributed cloud computing | |
CN110213294A (en) | By means of the community data cochain method and its equipment of block chain | |
CN108768965A (en) | A kind of education cloud open service application integrating system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200117 |