CN113518072B - Big data analysis method based on Internet of things - Google Patents

Big data analysis method based on Internet of things Download PDF

Info

Publication number
CN113518072B
CN113518072B CN202110417087.2A CN202110417087A CN113518072B CN 113518072 B CN113518072 B CN 113518072B CN 202110417087 A CN202110417087 A CN 202110417087A CN 113518072 B CN113518072 B CN 113518072B
Authority
CN
China
Prior art keywords
internet
things
information
reference information
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110417087.2A
Other languages
Chinese (zh)
Other versions
CN113518072A (en
Inventor
程博
张咏
杨慧
徐华根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongqian Si Chuang Beijing Technology Co Ltd
Original Assignee
Zhongqian Si Chuang Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongqian Si Chuang Beijing Technology Co ltd filed Critical Zhongqian Si Chuang Beijing Technology Co ltd
Priority to CN202110417087.2A priority Critical patent/CN113518072B/en
Publication of CN113518072A publication Critical patent/CN113518072A/en
Application granted granted Critical
Publication of CN113518072B publication Critical patent/CN113518072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a big data analysis method based on the Internet of things, and relates to the technical field of the Internet of things. In the application, firstly, an equipment control instruction is sent to the target internet of things equipment based on first equipment identification information of the target internet of things equipment, wherein an equipment operation program installed on the target internet of things equipment operates according to the equipment control instruction so as to generate equipment operation data. Secondly, whether storage request information for storing the equipment operation data is received or not is judged. Then, if the storage request information is received, the device operation data of the target internet of things device is obtained, and timestamp information is generated based on the time information of the obtained device operation data. And finally, sending the equipment operation data and the timestamp information to a target block chain constructed for the target Internet of things equipment in advance for storage. Based on the method, the problem of low safety of data storage in the prior art can be solved.

Description

Big data analysis method based on Internet of things
Technical Field
The application relates to the technical field of Internet of things, in particular to a big data analysis method based on the Internet of things.
Background
The internet of things is an important component of a new generation of information technology and refers to the internet with connected objects. This has two layers: firstly, the core and the foundation of the internet of things are still the internet, and the internet is an extended and expanded network on the basis of the internet; and secondly, the user side extends and expands to any article to perform information exchange and communication.
The internet of things is widely applied to network fusion through communication sensing technologies such as intelligent sensing, identification technology and pervasive computing, and is called as the third wave of development of the world information industry after computers and the internet. The internet of things is an application expansion of the internet, and is not a network, but a business and an application. However, the inventor researches and discovers that the existing internet of things technology has the problem of poor control effect on the internet of things equipment.
Disclosure of Invention
In view of this, an object of the present application is to provide a big data analysis method based on the internet of things, so as to improve the security of data storage existing in the prior art.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
a big data analysis method based on the Internet of things is applied to Internet of things control equipment, the Internet of things control equipment is connected with the Internet of things equipment, and the big data analysis method comprises the following steps:
sending a device control instruction to a target Internet of things device based on first device identification information of the target Internet of things device, wherein a device operation program installed on the target Internet of things device operates according to the device control instruction to generate device operation data;
judging whether storage request information for storing the equipment operation data is received or not;
if the storage request information is received, acquiring equipment operation data of the target Internet of things equipment, and generating timestamp information based on the time information of the acquired equipment operation data;
and sending the equipment operation data and the timestamp information to a target block chain constructed in advance for the target Internet of things equipment for storage.
In a possible embodiment, in the big data analysis method based on the internet of things, the step of obtaining device operation data of the target internet of things device and generating timestamp information based on time information of the obtained device operation data includes:
generating equipment verification information and sending the equipment verification information to block chain node equipment, wherein the target block chain is deployed on the block chain node equipment, and the block chain node equipment is used for verifying the equipment verification information so as to send verification success information to the Internet of things control equipment after verification is passed;
and when the verification success information is received, acquiring the equipment operation data of the target Internet of things equipment, and generating timestamp information based on the time information of the acquired equipment operation data.
In a possible embodiment, in the big data analysis method based on the internet of things, the step of generating the device verification information includes:
acquiring second equipment identification information of the Internet of things control equipment;
generating device authentication information including the second device identification information.
In a possible embodiment, in the big data analysis method based on the internet of things, the step of generating the device verification information includes:
generating device authentication information based on the first device identification information, wherein the device authentication information includes the first device identification information.
In a possible embodiment, in the big data analysis method based on the internet of things, the step of generating the device verification information includes:
acquiring second equipment identification information of the Internet of things control equipment;
generating device authentication information based on the first device identification information and the second device identification information, wherein the device authentication information includes the first device identification information and the second device identification information.
In a possible embodiment, in the big data analysis method based on the internet of things, the step of sending the device operation data and the timestamp information to a target block chain constructed in advance for the target internet of things device for storage includes:
generating equipment verification information and sending the equipment verification information to block chain node equipment, wherein the target block chain is deployed on the block chain node equipment, and the block chain node equipment is used for verifying the equipment verification information so as to send verification success information to the Internet of things control equipment after verification is passed;
and when the verification success information is received, sending the equipment operation data and the timestamp information to a target block chain constructed in advance for the target Internet of things equipment for storage.
In a possible embodiment, in the internet of things-based big data analysis method, the step of sending a device control instruction to the target internet of things device based on the first device identification information of the target internet of things device includes:
obtaining a device control instruction for controlling the target Internet of things device;
determining first equipment identification information of target Internet of things equipment based on the equipment control instruction;
and sending the device control instruction to the target Internet of things device based on the first device identification information of the target Internet of things device.
In a possible embodiment, in the method for analyzing big data based on the internet of things, the step of obtaining a device control instruction for controlling a target device of the internet of things includes:
generating Internet of things equipment control data in response to target control operation of a target user based on control requirements on target Internet of things equipment;
acquiring Internet of things equipment control reference information of the Internet of things equipment control data, and converting the Internet of things equipment control data into a corresponding target hash value;
performing a lookup operation based on the target hash value to determine a target reference information table entry corresponding to the internet of things device control data from reference information table entries included in a pre-established reference information mapping table, wherein the target reference information table entry is used for storing historical internet of things device control reference information of historical internet of things device control data for historically controlling the target internet of things device;
if the target reference information table entry is determined by executing the search operation on the reference information mapping table, determining internet of things device control feature information of the internet of things device control data based on the internet of things device control reference information and each piece of historical internet of things device control reference information stored in the target reference information table entry;
if the target reference information table item is not determined by executing the search operation on the reference information mapping table, adding a new reference information table item corresponding to the Internet of things equipment control data in the reference information mapping table, storing the Internet of things equipment control reference information in the new reference information table item, and determining Internet of things equipment control characteristic information of the Internet of things equipment control data based on the Internet of things equipment control reference information;
and obtaining a device control instruction for controlling the target Internet of things device based on the Internet of things device control characteristic information.
In a possible embodiment, in the big data analysis method based on the internet of things, the big data analysis method further includes:
acquiring the device operating data and the timestamp information from the target block chain;
acquiring locally stored equipment operating data based on the timestamp information;
performing data consistency verification on the device operation data acquired from the target blockchain based on locally stored device operation data;
if the locally stored device operation data is consistent with the device operation data acquired from the target block chain, determining that the device operation data acquired from the target block chain passes verification;
if the locally stored device operation data is inconsistent with the device operation data acquired from the target block chain, determining that the device operation data acquired from the target block chain is not verified, and sending correction notification information generated based on the locally stored device operation data to the target block chain to correct the device operation data stored in the target block chain.
According to the big data analysis method based on the Internet of things, when storage request information for storing equipment operation data of target Internet of things equipment is received, timestamp information is generated, the timestamp information and the equipment operation data can be sent to a target block chain to be stored, storage safety of the equipment operation data is guaranteed, the problem that safety of data storage existing in the prior art is low is solved, and the big data analysis method based on the Internet of things has high practical value.
In order to make the aforementioned objects, features and advantages of the present application comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
Fig. 1 is a block diagram of a structure of an internet of things control device provided in an embodiment of the present application.
Fig. 2 is a schematic flow chart illustrating steps included in the internet of things-based big data analysis method according to the embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides a big data analysis system based on the Internet of things. The big data analysis system based on the Internet of things can comprise Internet of things control equipment and Internet of things equipment (such as an intelligent air conditioner, an intelligent refrigerator and the like) connected with the Internet of things control equipment.
As shown in fig. 1, the internet of things control device may include a memory and a processor.
In detail, the memory and the processor are electrically connected directly or indirectly to realize data transmission or interaction. For example, they may be electrically connected to each other via one or more communication buses or signal lines. The memory can have stored therein at least one software function (computer program) which can be present in the form of software or firmware. The processor may be configured to execute the executable computer program stored in the memory, so as to implement the big data analysis method based on the internet of things provided in the embodiment (described later) of the present application.
Alternatively, the Memory may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), a System on Chip (SoC), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components.
Also, the structure shown in fig. 1 is only an illustration, and the internet of things control device may further include more or fewer components than those shown in fig. 1, or have a different configuration from that shown in fig. 1, for example, may include a communication unit for information interaction with other devices.
In an alternative example, the internet of things control device may be a server with data processing capability.
With reference to fig. 2, an embodiment of the present application further provides a big data analysis method based on the internet of things, which is applicable to the internet of things control device. The method steps defined by the relevant processes of the big data analysis method based on the internet of things can be realized by the internet of things control equipment. The specific process shown in fig. 2 will be described in detail below.
Step S110, a device control instruction is sent to the target Internet of things device based on the first device identification information of the target Internet of things device.
In this embodiment, the internet of things control device may determine the target internet of things device based on the first device identification information of the target internet of things device, and then send the device control instruction to the target internet of things device. And the equipment operation program installed on the target Internet of things equipment operates according to the equipment control instruction so as to generate equipment operation data.
Step S120, determining whether storage request information for storing the device operation data is received.
In this embodiment, after the device control instruction is sent to the target internet of things device based on step S120, so that the target internet of things device operates to generate device operation data, the internet of things control device may determine whether to receive storage request information for storing the device operation data (if the target internet of things device meets a certain condition, the storage request information is sent if the stored data amount is greater than a preset data amount or a certain time interval is obtained).
If it is determined that the storage request information is received, step S130 may be performed.
Step S130, obtaining device operation data of the target internet of things device, and generating timestamp information based on the time information of the obtained device operation data.
In this embodiment, after determining that the storage request information is received based on step S120, the internet of things control device may obtain device operation data of the target internet of things device, and generate timestamp information based on time information of obtaining the device operation data.
And step S140, sending the equipment operation data and the timestamp information to a target block chain which is constructed for the target Internet of things equipment in advance for storage.
In this embodiment, after the device operation data is acquired and the timestamp information is generated based on step S130, the internet of things control device may send the device operation data and the timestamp information to a target block chain constructed in advance for the target internet of things device for storage.
Based on the method, when the storage request information for storing the equipment operation data of the target Internet of things equipment is received, the timestamp information is generated, so that the timestamp information and the equipment operation data can be sent to the target block chain for storage, the storage safety of the equipment operation data is ensured, and the problem of low safety of data storage in the prior art is solved.
In the first aspect, it should be noted that, in step S110, a specific manner of sending the device control instruction to the target internet of things device is not limited.
For example, in an alternative example, step S110 may include step S111, step S112, and step S113, as described below.
And step S111, obtaining a device control instruction for controlling the target Internet of things device.
In this embodiment, the internet of things control device may obtain a device control instruction for controlling a target internet of things device (such as an intelligent water heater, an intelligent air conditioner, and the like). Wherein, this thing networking control equipment and this target thing networking equipment communication connection.
Step S112, determining device identification information of the target internet of things device based on the device control instruction.
In this embodiment, after obtaining the device control instruction based on step S111, the internet of things control device may determine device identification information (such as an IP address, a MAC address, or a device fingerprint, etc.) of the target internet of things device based on the device control instruction.
Step S113, the device control instruction is sent to the target Internet of things device based on the device identification information.
In this embodiment, after determining the device identification information based on step S112, the internet of things control device may determine the target internet of things device based on the device identification information, so that the device control instruction may be sent to the target internet of things device.
And the target Internet of things equipment is provided with an equipment running program, and the equipment running program is used for controlling the running of the target Internet of things equipment based on the equipment control instruction. That is, the device control instruction may serve as an operation trigger condition of the device operation program or an operation trigger condition of a specified operation mode of the device operation program.
In the first aspect, it should be noted that, in step S111, a specific manner of obtaining the device control instruction is not limited, and may be selected according to actual application requirements.
For example, in a first alternative example, step S111 includes sub-step 11, sub-step 12, and sub-step 13, as described below.
And a substep 11, generating control notification information, and sending the control notification information to the target internet of things device.
In this embodiment, the control notification information may be generated first, and then the control notification information may be sent to the target internet of things device.
The target internet of things device is used for locating a target user based on the control notification information, so as to collect user environment state information of the environment where the target user is located based on the location (for example, a camera is used for rotating to shoot an image, then, human body recognition is carried out on the image, so that the position where the target user is located in the space is determined, the target user is located, the user environment state information of the environment where the target user is located is collected, such as temperature, humidity, sound loudness and the like, so that whether the sound loudness is too large or too small when the played audio reaches the position where the user is located can be determined based on the distance, and then the sound loudness is reduced or increased).
And a substep 12, obtaining the user environment state information sent by the target internet of things equipment.
In this embodiment, after the control notification information is sent to the target internet of things device based on substep 11, user environment state information acquired by the target internet of things device based on the control notification information may be acquired.
And a substep 13, analyzing the user environment state information to obtain an equipment control instruction for controlling the target internet of things equipment.
In this embodiment, after obtaining the ue status information based on the sub-step 12, the ue status information may be parsed (for example, the obtained sound loudness information may be compared with the sound loudness threshold information), so that a device control instruction for controlling the target internet of things device may be obtained, such as reducing the sound loudness of the played audio.
For another example, in a second alternative example, step S111 includes sub-step 21, sub-step 22, sub-step 23, sub-step 24, sub-step 25, and sub-step 26, which are described in detail below.
And a substep 21 of generating internet of things device control data in response to a target control operation performed by the target user based on the control demand for the target internet of things device.
In this embodiment, when the target user needs to control the target internet of things device, if the sound of the audio playing device needs to be adjusted, the target user may directly perform a target control operation on the internet of things control device or the internet of things control device through other devices, so that internet of things device control data corresponding to the target control operation may be generated.
And a substep 22 of obtaining the internet of things device control reference information of the internet of things device control data and converting the internet of things device control data into a corresponding target hash value.
In this embodiment, when the internet of things device control data is obtained based on the substep 21, the internet of things device control reference information of the internet of things device control data may be obtained, and then, the hash processing may be performed on the internet of things device control data to obtain a corresponding target hash value.
The control reference information of the internet of things equipment can be obtained by analyzing and processing the control data of the internet of things equipment, and if the amplitude increase reference value required for increasing the loudness of sound is obtained.
And a substep 23, performing a lookup operation based on the target hash value to determine a target reference information table entry corresponding to the internet of things device control data from reference information table entries included in a pre-established reference information mapping table.
In this embodiment, after the target hash value is obtained based on substep 22, a lookup operation may be performed based on the target hash value, so that the reference information table entry corresponding to the internet of things device control data may be determined from the reference information table entries included in the pre-established reference information mapping table, that is, the corresponding target reference information table entry is obtained.
The target reference information table entry is used for storing historical internet of things device control reference information of historical internet of things device control data for historically controlling the target internet of things device, for example, historical amplitude of sound loudness is increased by a reference value historically.
It can be understood that, in order to facilitate accurate search, when generating the control data of the internet of things device, specific information (such as a device fingerprint or an IP address) may be configured on the basis of the corresponding internet of things device in the front portion of the data, so that different pieces of control data of the internet of things device generated on the basis of controlling the same internet of things device have the same value at a specific position after being converted into a hash value, and thus, it is possible to ensure that a target reference information entry of the historical control reference information of the internet of things device for storing historical control data of the internet of things device for historically controlling the target internet of things device can be found.
And a substep 24, if the target reference information table entry is determined by performing the lookup operation on the reference information mapping table, determining internet of things device control feature information of the internet of things device control data based on the internet of things device control reference information and each piece of historical internet of things device control reference information stored in the target reference information table entry (for example, performing weighted summation processing on an amplitude increase reference value of sound loudness increase and a historical amplitude increase reference value of sound loudness increase to obtain internet of things device control feature information, where a weight coefficient of the amplitude increase reference value of sound loudness increase may be greater than the historical amplitude increase reference value of sound loudness increase, for example, the former may be 0.05, and the latter may be 0.95, and the determination is performed according to a specific precision requirement).
In this embodiment, after the search operation is performed based on substep 23, if the target reference information entry is determined, the internet of things device control feature information of the internet of things device control data may be determined based on the internet of things device control reference information and each piece of historical internet of things device control reference information stored in the target reference information entry.
And a substep 25, if the target reference information table item is not determined by executing the search operation on the reference information mapping table, adding a new reference information table item corresponding to the internet of things device control data in the reference information mapping table, storing the internet of things device control reference information in the new reference information table item, and determining the internet of things device control characteristic information of the internet of things device control data based on the internet of things device control reference information.
In this embodiment, after the search operation is performed based on substep 23, if the target reference information entry is not determined, it indicates that the possibly stored historical internet of things device control reference information is lost or the historical internet of things device control reference information is not yet stored, so a new reference information entry corresponding to the internet of things device control data may be added to the reference information mapping table. The internet of things device control reference information may then be stored in the new reference information entry (and thus the new reference information entry may be used as the target reference entry the next time substep 23 is performed). Finally, since there is no historical internet of things device control reference information, the internet of things device control feature information of the internet of things device control data may be determined based on the internet of things device control reference information.
And a substep 26 of obtaining a device control instruction for controlling the target internet of things device based on the internet of things device control characteristic information.
In this embodiment, after the internet of things device control feature information is obtained based on substep 24 or substep 25, a device control instruction for controlling the target internet of things device may be obtained based on the internet of things device control feature information (for example, the internet of things device control feature information may be converted into information that can be recognized by the target internet of things device, that is, the device control instruction is obtained, so that the target internet of things device may operate based on the device control instruction).
Alternatively, in the first example described above, the specific manner of generating the control notification information based on the sub-step 11 is not limited, and may be selected according to the actual application requirement.
For example, in one alternative example, sub-step 11 may include the steps of:
firstly, acquiring time information of a device control instruction generated for a target Internet of things device at the latest time to obtain corresponding historical time information;
secondly, calculating a time difference between the historical time information and the current time information (and judging whether the time difference is greater than a preset time difference or not (wherein the specific value of the preset time difference is not limited and can be generated based on configuration operation of a user according to actual requirements);
then, if the time difference is greater than or equal to the preset time difference, generating control notification information;
finally, if the time difference is smaller than the preset time difference, the step of obtaining the time information of the device control instruction generated for the target internet of things device at the latest time is executed again (so that the loop may be continuously performed, so that the control notification information may be generated according to a certain time interval, that is, according to the preset time difference, for example, when the control notification information is applied to an environment with higher control precision, the preset time difference may be smaller, for example, 1s, and when the control notification information is applied to an environment with lower control precision, to avoid the problem of resource waste, the preset time difference may be larger, for example, 1mi n).
For another example, in another alternative example, the substep 11 may comprise the steps of:
firstly, judging whether control starting information sent by an internet of things remote control device based on target control operation of a target user is received (namely, when the target user has a control demand on the target internet of things device, the target user can carry out target control operation on the internet of things remote control device, so that the internet of things remote control device can send control starting information to the internet of things control device), wherein the internet of things remote control device is in communication connection with the internet of things control device;
and secondly, if the control starting information is received, generating control notification information based on the control starting information, wherein the control starting information and the control notification information carry equipment identification information of the target Internet of things equipment.
Optionally, in the second example described above, the specific manner of generating the internet of things device control data based on the sub-step 21 is not limited, and may be selected according to actual application requirements.
For example, in an alternative example, the substep 21 may comprise the steps of:
responding to target control sliding operation of a target user on a screen of the Internet of things control equipment based on the control requirement on the target Internet of things equipment, and generating Internet of things equipment control data;
the internet of things device control data is sliding track data, for example, the length of the sliding track data can be identified, and an amplitude value for adjusting the loudness of sound is obtained.
For another example, in another alternative example, the substep 21 may comprise the steps of:
and responding to target control sound input operation (such as the target user outputting voice and making the sound tone large) performed by the target user on a microphone of the IOT control equipment based on the control requirement on the target IOT equipment, performing voice recognition processing, and generating IOT equipment control data.
For another example, in another alternative example, the substep 21 may comprise the steps of:
the method comprises the steps of responding to a target control body action (such as head left-right shaking which indicates that the currently played music is not satisfied and control data for switching the music can be generated) of a target user on an image acquisition device of the Internet of things control equipment based on a control demand of the target Internet of things equipment, carrying out image recognition processing, and generating Internet of things equipment control data.
Optionally, in the second example, the specific manner of determining the internet of things device control characteristic information of the internet of things device control data based on the sub-step 24 is not limited, and may be selected according to actual application requirements.
For example, in one alternative example, sub-step 24 may include the steps of:
a first step of determining a plurality of pieces of candidate historical internet-of-things device control reference information and a reference information interval time between each piece of candidate historical internet-of-things device control reference information and the next piece of candidate historical internet-of-things device control reference information (i.e., a time interval between generation time information of two adjacent pieces of candidate historical internet-of-things device control reference information) based on occurrence frequency information of the historical internet-of-things device control reference information in the target reference information entry, wherein the occurrence frequency information is determined based on a number of the pieces of historical internet-of-things device control reference information, earliest generation time information and latest generation time information (i.e., a quotient of the number and a time difference between the earliest generation time information and the latest generation time information is the occurrence frequency information, wherein the occurrence frequency information is larger, the multiple pieces of historical internet of things equipment control reference information can be sampled based on smaller sampling intervals, so that a larger number of candidate historical internet of things equipment control reference information can be obtained);
a second step of determining, for each piece of the candidate historical internet-of-things device control reference information (excluding the last candidate historical internet-of-things device control reference information, that is, one candidate historical internet-of-things device control reference information whose generation time information is the latest), a target historical internet-of-things device control reference information for which the generation time information of the next candidate historical internet-of-things device control reference information satisfies a preset condition within a reference information interval time (for example, a difference between the generation time information of the target historical internet-of-things device control reference information and the generation time information of the next candidate historical internet-of-things device control reference information) based on a reference information interval time corresponding to the candidate historical internet-of-things device control reference information (that is, a time interval between the generation time information of the next candidate historical internet-of-things device control reference information), a ratio of the number of the historical internet-of-things device control reference information to the number of the historical internet-of-things device control reference information between the target historical internet-of-things device control reference information and the next candidate historical internet-of-things device control reference information is greater than a preset ratio threshold, wherein the preset ratio threshold can be generated based on configuration operation performed by a user according to actual application requirements, and when there are a plurality of pieces of historical internet-of-things device control reference information satisfying the preset condition, a piece with the largest corresponding ratio can be selected as the target historical internet-of-things device control reference information, and when there is no historical internet-of-things device control reference information satisfying the preset condition, a piece with the largest corresponding ratio can be selected as the target historical internet-of-things device control reference information), and based on the plurality of pieces of internet-of historical device control reference information from the target historical internet-of-things device control reference information to the next candidate internet-of-things device control reference information, combining to form an IOT equipment control reference information set, wherein the IOT equipment control reference information set does not include the target historical IOT control reference information and the next candidate historical IOT equipment control reference information;
thirdly, according to a preset time interval length, determining a plurality of pieces of intermediate historical internet-of-things equipment control reference information from each internet-of-things equipment control reference information set (that is, sampling can be carried out based on the time interval length to obtain the plurality of pieces of intermediate historical internet-of-things equipment control reference information, namely, the earliest piece of intermediate historical internet-of-things equipment control reference information is taken as the intermediate historical internet-of-things equipment control reference information, then the time for generation is added to the time interval length to obtain time information, and then the latest piece of intermediate historical internet-of-things equipment control reference information after the time information is taken as the intermediate historical internet-of-things equipment control reference information; wherein, the time interval length and the quantity threshold value can be generated based on the configuration operation of the user according to the actual application requirement);
fourthly, traversing the plurality of pieces of intermediate historical internet-of-things equipment control reference information for a plurality of pieces of intermediate historical internet-of-things equipment control reference information corresponding to each piece of candidate historical internet-of-things equipment control reference information to obtain a plurality of sets of two pieces of candidate intermediate historical internet-of-things equipment control reference information with a generation time difference smaller than a preset time difference (from the plurality of pieces of intermediate historical internet-of-things equipment control reference information corresponding to one piece of candidate historical internet-of-things equipment control reference information to obtain a set of two pieces of candidate intermediate historical internet-of-things equipment control reference information with a generation time difference smaller than a preset time difference, so that for the plurality of pieces of candidate intermediate historical internet-of-things equipment control reference information, the two pieces of candidate intermediate historical internet-of-things equipment control reference information with a generation time difference smaller than a preset time difference can be obtained in a plurality of sets, wherein, if a plurality of groups of two candidate intermediate historical internet-of-things device control reference information with a generation time difference value smaller than a preset time difference value exist in the plurality of intermediate historical internet-of-things device control reference information corresponding to one candidate historical internet-of-things device control reference information, selecting two candidate intermediate historical internet-of-things device control reference information with a group of generation time difference value with the minimum time difference value smaller than the preset time difference value, and generating the preset time difference value based on configuration operation of a user according to actual application requirements);
fifthly, selecting one piece of the candidate intermediate historical internet of things equipment control reference information to obtain target intermediate historical internet of things equipment control reference information (for example, one piece with later generation time information can be selected as the target intermediate historical internet of things equipment control reference information);
sixthly, adding the candidate historical IOT equipment control reference information, the target historical IOT equipment control reference information corresponding to the candidate historical IOT equipment control reference information and the target intermediate historical IOT equipment control reference information corresponding to the candidate historical IOT equipment control reference information into the same set aiming at each candidate historical IOT equipment control reference information to obtain a target IOT equipment control reference information set corresponding to the candidate historical IOT equipment control reference information;
seventhly, traversing each piece of historical internet-of-things equipment control reference information in each target internet-of-things equipment control reference information set to obtain primarily selected historical internet-of-things equipment control reference information with the maximum similarity to the internet-of-things equipment control reference information of the internet-of-things equipment control data (wherein the similarity between the internet-of-things equipment control reference information and the positive-negative correlation of the difference between the amplitude of adjusting the operating parameters of the target internet-of-things equipment are smaller, and the corresponding similarity is larger);
eighthly, detecting information similarity between each piece of primarily selected historical internet-of-things equipment control reference information and internet-of-things equipment control reference information of the internet-of-things equipment control data, and judging whether the information similarity is greater than a first preset similarity (the first preset similarity can be generated based on configuration operation performed by a user according to actual application requirements);
ninth, if the information similarity is greater than the first preset similarity, determining corresponding primary selection history internet of things equipment control reference information as representative history internet of things equipment control reference information (namely, each piece of primary selection history internet of things equipment control reference information with the information similarity greater than the first preset similarity is used as the representative history internet of things equipment control reference information);
tenth, if the information similarity is smaller than the first preset similarity, selecting a plurality of pieces (for example, two pieces or other pieces, which may be configured according to actual application requirements) of historical internet-of-things device control reference information, of which the information similarity between the corresponding primarily selected historical internet-of-things device control reference information and the internet-of-things device control reference information is greater than a second preset similarity, as representative historical internet-of-things device control reference information, where the second preset similarity is smaller than the first preset similarity (the second preset similarity may be generated based on configuration operations performed by a user according to actual application requirements);
eleventh, modifying the internet of things device control reference information based on the representative historical internet of things device control reference information (for example, weighting and summing the representative historical internet of things device control reference information and the internet of things device control reference information may be performed, as described above), so as to obtain internet of things device control feature information of the internet of things device control data.
In the second aspect, it should be noted that, in step S130, a specific manner of obtaining the device operation data of the target internet of things device and generating the timestamp information based on the time information of the obtained device operation data is not limited, and may be selected according to actual application requirements.
For example, in an alternative example, step S130 may include the steps of:
firstly, generating equipment verification information and sending the equipment verification information to block chain node equipment, wherein the target block chain is deployed on the block chain node equipment, and the block chain node equipment is used for verifying the equipment verification information so as to send verification success information to the Internet of things control equipment after verification is passed; and secondly, when the verification success information is received, acquiring the equipment operation data of the target Internet of things equipment, and generating timestamp information based on the time information of the acquired equipment operation data.
Optionally, in the above example, a specific manner of generating the device verification information is not limited, and may be selected according to an actual application requirement.
For example, in one alternative example, the device authentication information may be generated based on: firstly, second equipment identification information of the Internet of things control equipment is obtained; generating device authentication information including the second device identification information.
That is, the blockchain node device may determine whether the verification is passed based on the second device identification information and a preconfigured device authorization list. For example, if the device authorization list has the second device identification information, the authentication may be passed.
For another example, in another alternative example, the device authentication information may be generated based on: generating device authentication information based on the first device identification information, wherein the device authentication information includes the first device identification information.
That is, the blockchain node device may determine whether the verification is passed based on the first device identification information and a preconfigured device authorization list. For example, if the device authorization list has the first device identification information, the authentication may be passed.
For another example, in another alternative example, the device authentication information may be generated based on: firstly, second equipment identification information of the Internet of things control equipment is obtained; secondly, generating device verification information based on the first device identification information and the second device identification information, wherein the device verification information comprises the first device identification information and the second device identification information.
That is, the blockchain node device may determine whether the verification is passed based on the first device identification information, the second device identification information, and a preconfigured device authorization list. For example, if the device authorization list has the first device identification information and the second device identification information, the authentication may be passed.
In the third aspect, it should be noted that, in step S140, a specific manner of sending the device operation data and the timestamp information to a target block chain constructed in advance for the target internet of things device for storage is not limited, and may be selected according to actual application requirements.
For example, in an alternative example, step S140 may include the steps of:
firstly, generating device verification information (as described above), and sending the device verification information to a block chain node device, wherein the target block chain is deployed on the block chain node device, and the block chain node device is configured to verify the device verification information, so as to send verification success information to the internet of things control device after verification is passed; and secondly, when the verification success information is received, the equipment operation data and the timestamp information are sent to a target block chain which is constructed for the target Internet of things equipment in advance for storage.
On the basis of the above example, in order to improve the security of the data, the big data analysis method further includes the following steps:
the first step, acquiring the device operation data and the timestamp information from the target block chain;
secondly, acquiring locally stored equipment operation data based on the timestamp information;
thirdly, performing data consistency verification on the equipment operation data acquired from the target block chain based on locally stored equipment operation data;
step four, if the locally stored device operation data is consistent with the device operation data acquired from the target block chain, determining that the device operation data acquired from the target block chain passes verification;
and fifthly, if the locally stored device operation data is inconsistent with the device operation data acquired from the target block chain, determining that the device operation data acquired from the target block chain is not verified, and sending correction notification information generated based on the locally stored device operation data to the target block chain so as to correct the device operation data stored in the target block chain.
To sum up, the big data analysis method based on the internet of things generates the timestamp information when receiving the storage request information for storing the equipment operation data of the target internet of things equipment, so that the timestamp information and the equipment operation data can be sent to the target block chain for storage, the storage safety of the equipment operation data is ensured, the problem of low safety of data storage in the prior art is solved, and the big data analysis method based on the internet of things has high practical value.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist alone, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, an electronic device, or a network device) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (7)

1. The big data analysis method based on the Internet of things is characterized by being applied to Internet of things control equipment, the Internet of things control equipment is connected with the Internet of things equipment, and the big data analysis method comprises the following steps:
sending a device control instruction to a target Internet of things device based on first device identification information of the target Internet of things device, wherein a device operation program installed on the target Internet of things device operates according to the device control instruction to generate device operation data;
judging whether storage request information for storing the equipment operation data is received or not;
if the storage request information is received, acquiring equipment operation data of the target Internet of things equipment, and generating timestamp information based on the time information of the acquired equipment operation data;
sending the equipment operation data and the timestamp information to a target block chain constructed for the target Internet of things equipment in advance for storage;
the step of sending a device control instruction to the target internet of things device based on the first device identification information of the target internet of things device includes:
acquiring a device control instruction for controlling target Internet of things devices;
determining first equipment identification information of target Internet of things equipment based on the equipment control instruction;
sending the device control instruction to the target Internet of things device based on the first device identification information of the target Internet of things device;
the step of obtaining a device control instruction for controlling the target internet of things device includes:
generating Internet of things equipment control data in response to target control operation of a target user based on control requirements on target Internet of things equipment;
acquiring the IOT equipment control reference information of the IOT equipment control data, and converting the IOT equipment control data into a corresponding target hash value;
performing a lookup operation based on the target hash value to determine a target reference information table entry corresponding to the internet of things device control data from reference information table entries included in a pre-established reference information mapping table, wherein the target reference information table entry is used for storing historical internet of things device control reference information of historical internet of things device control data for historically controlling the target internet of things device;
if the target reference information table entry is determined by executing the search operation on the reference information mapping table, determining internet of things device control feature information of the internet of things device control data based on the internet of things device control reference information and each piece of historical internet of things device control reference information stored in the target reference information table entry;
if the target reference information table item is not determined by executing the search operation on the reference information mapping table, adding a new reference information table item corresponding to the Internet of things equipment control data in the reference information mapping table, storing the Internet of things equipment control reference information in the new reference information table item, and determining Internet of things equipment control characteristic information of the Internet of things equipment control data based on the Internet of things equipment control reference information;
obtaining a device control instruction for controlling the target Internet of things device based on the Internet of things device control characteristic information;
wherein the step of determining the internet of things device control feature information of the internet of things device control data based on the internet of things device control reference information and each piece of historical internet of things device control reference information stored in the target reference information table entry includes:
determining a plurality of pieces of candidate historical internet-of-things device control reference information and reference information interval time between each piece of candidate historical internet-of-things device control reference information and the next piece of candidate historical internet-of-things device control reference information based on the occurrence frequency information of the historical internet-of-things device control reference information in the target reference information table item, wherein the occurrence frequency information is determined based on the number of the historical internet-of-things device control reference information, the earliest generation time information and the latest generation time information;
for each piece of candidate historical internet-of-things equipment control reference information, determining target historical internet-of-things equipment control reference information, the generation time information of which and the next piece of candidate historical internet-of-things equipment control reference information meet preset conditions in the reference information interval time, based on reference information interval time corresponding to the candidate historical internet-of-things equipment control reference information, and combining to form an internet-of-things equipment control reference information set based on a plurality of pieces of historical internet-of-things equipment control reference information from the target historical internet-of-things equipment control reference information to the next piece of candidate historical internet-of-things equipment control reference information, wherein the internet-of-things equipment control reference information set does not include the target historical internet-of-things control reference information and the next piece of candidate historical internet-of-things equipment control reference information;
determining a plurality of pieces of intermediate historical internet-of-things equipment control reference information from each internet-of-things equipment control reference information set according to a preset time interval length;
traversing the plurality of pieces of intermediate historical internet-of-things equipment control reference information corresponding to each piece of candidate historical internet-of-things equipment control reference information to obtain a plurality of groups of two pieces of candidate intermediate historical internet-of-things equipment control reference information of which the generation time difference is smaller than a preset time difference;
selecting one piece of the two candidate intermediate historical Internet of things equipment control reference information to obtain target intermediate historical Internet of things equipment control reference information;
for each piece of candidate historical IOT equipment control reference information, adding the candidate historical IOT equipment control reference information, the target historical IOT equipment control reference information corresponding to the candidate historical IOT equipment control reference information and the target intermediate historical IOT equipment control reference information corresponding to the candidate historical IOT equipment control reference information into the same set to obtain a target IOT equipment control reference information set corresponding to the candidate historical IOT equipment control reference information;
for each target internet of things equipment control reference information set, traversing each piece of history internet of things equipment control reference information in the target internet of things equipment control reference information set to obtain primarily selected history internet of things equipment control reference information with the maximum similarity to the internet of things equipment control reference information of the internet of things equipment control data;
detecting information similarity between each piece of primarily selected historical IOT equipment control reference information and IOT equipment control reference information of the IOT equipment control data, and judging whether the information similarity is greater than a first preset similarity or not;
if the information similarity is greater than the first preset similarity, determining corresponding primarily selected historical internet of things equipment control reference information as representative historical internet of things equipment control reference information;
if the information similarity is smaller than the first preset similarity, selecting a plurality of pieces of historical internet-of-things equipment control reference information with the information similarity larger than a second preset similarity from a target internet-of-things equipment control reference information set where the corresponding primarily selected historical internet-of-things equipment control reference information is located as representative historical internet-of-things equipment control reference information, wherein the second preset similarity is smaller than the first preset similarity;
and modifying the control reference information of the internet of things equipment based on the representative historical control reference information of the internet of things equipment to obtain the control characteristic information of the internet of things equipment of the control data of the internet of things equipment.
2. The Internet of things-based big data analysis method according to claim 1, wherein the step of acquiring device operation data of the target Internet of things device and generating timestamp information based on the time information of the acquired device operation data comprises:
generating equipment verification information and sending the equipment verification information to block chain node equipment, wherein the target block chain is deployed on the block chain node equipment, and the block chain node equipment is used for verifying the equipment verification information so as to send verification success information to the Internet of things control equipment after verification is passed;
and when the verification success information is received, acquiring the equipment operation data of the target Internet of things equipment, and generating timestamp information based on the time information of the acquired equipment operation data.
3. The big data analysis method based on the internet of things as claimed in claim 2, wherein the step of generating the device verification information comprises:
acquiring second equipment identification information of the Internet of things control equipment;
generating device authentication information including the second device identification information.
4. The big data analysis method based on the internet of things according to claim 2, wherein the step of generating the device verification information comprises:
generating device authentication information based on the first device identification information, wherein the device authentication information includes the first device identification information.
5. The big data analysis method based on the internet of things as claimed in claim 2, wherein the step of generating the device verification information comprises:
acquiring second equipment identification information of the Internet of things control equipment;
generating device authentication information based on the first device identification information and the second device identification information, wherein the device authentication information includes the first device identification information and the second device identification information.
6. The big data analysis method based on the internet of things of claim 1, wherein the step of sending the device operation data and the timestamp information to a target block chain constructed in advance for the target internet of things device for storage comprises:
generating equipment verification information and sending the equipment verification information to block chain node equipment, wherein the target block chain is deployed on the block chain node equipment, and the block chain node equipment is used for verifying the equipment verification information so as to send verification success information to the Internet of things control equipment after verification is passed;
and when the verification success information is received, sending the equipment operation data and the timestamp information to a target block chain constructed in advance for the target Internet of things equipment for storage.
7. The big data analysis method based on the Internet of things according to any one of claims 1 to 6, wherein the big data analysis method further comprises the following steps:
obtaining the device operating data and the timestamp information from the target blockchain;
acquiring locally stored equipment operating data based on the timestamp information;
performing data consistency verification on the device operation data acquired from the target blockchain based on locally stored device operation data;
if the locally stored device operation data is consistent with the device operation data acquired from the target block chain, determining that the device operation data acquired from the target block chain passes verification;
and if the locally stored device operation data is inconsistent with the device operation data acquired from the target block chain, determining that the device operation data acquired from the target block chain is not verified, and sending correction notification information generated based on the locally stored device operation data to the target block chain so as to correct the device operation data stored in the target block chain.
CN202110417087.2A 2021-04-19 2021-04-19 Big data analysis method based on Internet of things Active CN113518072B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110417087.2A CN113518072B (en) 2021-04-19 2021-04-19 Big data analysis method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110417087.2A CN113518072B (en) 2021-04-19 2021-04-19 Big data analysis method based on Internet of things

Publications (2)

Publication Number Publication Date
CN113518072A CN113518072A (en) 2021-10-19
CN113518072B true CN113518072B (en) 2022-08-30

Family

ID=78062646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110417087.2A Active CN113518072B (en) 2021-04-19 2021-04-19 Big data analysis method based on Internet of things

Country Status (1)

Country Link
CN (1) CN113518072B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550403A (en) * 2022-09-16 2022-12-30 中国科学院地理科学与资源研究所 Internet of things equipment management method and system based on block chain and readable storage medium
CN116150186B (en) * 2022-12-02 2023-08-08 深圳市艾奥科技有限公司 Communication Internet of things management method and system based on big data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019062304A1 (en) * 2017-09-26 2019-04-04 上海点融信息科技有限责任公司 Method, device and system for managing computing resources of block chain node
WO2019081434A1 (en) * 2017-10-23 2019-05-02 Siemens Aktiengesellschaft Method and control system for controlling and/or monitoring devices

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108366120A (en) * 2018-02-13 2018-08-03 宁夏灵智科技有限公司 A kind of internet-of-things terminal management method and device
CN108830088A (en) * 2018-04-26 2018-11-16 张莉 A kind of big data analysis method and system based on Internet of Things
EP3654603A1 (en) * 2018-11-15 2020-05-20 Giesecke+Devrient Mobile Security GmbH Trusted timestamping for iot devices
CN109922162B (en) * 2019-04-26 2021-09-28 山东建筑大学 Flat building equipment Internet of things monitoring system and method based on block chain
CN110247965A (en) * 2019-06-13 2019-09-17 食品安全与营养(贵州)信息科技有限公司 A kind of storage method and system of the IoT data-storage system based on block chain
CN111835842B (en) * 2020-07-02 2023-02-28 远景智能国际私人投资有限公司 Gateway resource updating method and device and Internet of things control platform
CN112600821A (en) * 2020-12-09 2021-04-02 国网四川省电力公司电力科学研究院 Data storage system and method based on Internet of things and block chain technology
CN112600904A (en) * 2020-12-09 2021-04-02 阳博 Smart city Internet of things equipment control method and device and control center

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019062304A1 (en) * 2017-09-26 2019-04-04 上海点融信息科技有限责任公司 Method, device and system for managing computing resources of block chain node
WO2019081434A1 (en) * 2017-10-23 2019-05-02 Siemens Aktiengesellschaft Method and control system for controlling and/or monitoring devices

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
" 基于区块链的物联网设备标识研究[";陈美娟等;《物联网学报》;20180913;全文 *

Also Published As

Publication number Publication date
CN113518072A (en) 2021-10-19

Similar Documents

Publication Publication Date Title
CN113518072B (en) Big data analysis method based on Internet of things
AU2017200437B2 (en) Periodic ambient waveform analysis for dynamic device configuration
CN107819631B (en) Equipment anomaly detection method, device and equipment
TWI734375B (en) Image processing method, proposal evaluation method, and related devices
CN110798426A (en) Method and system for detecting flood DoS attack behavior and related components
CN111163072A (en) Method and device for determining characteristic value in machine learning model and electronic equipment
CN110209925A (en) Using method for pushing, device, computer equipment and storage medium
CN111400542A (en) Audio fingerprint generation method, device, equipment and storage medium
CN113691483B (en) Method, device and equipment for detecting abnormal user equipment and storage medium
CN107548125B (en) Wireless network access method, wireless network processing device, storage medium and computer equipment
CN113132481B (en) Method for controlling equipment of Internet of things
CN113163007B (en) Networking display method of equipment in Internet of things
JP5072880B2 (en) Metadata extraction server, metadata extraction method and program
CN113114537A (en) Visual monitoring method for nodes of Internet of things
CN111901324B (en) Method, device and storage medium for flow identification based on sequence entropy
Lee et al. High reliable in-network data verification in wireless sensor networks
WO2022253454A2 (en) Dimensioning of telecommunication infrastructure
CN114564516A (en) Business object classification method, device, equipment and storage medium
CN113381891A (en) Internet of things configuration information processing method
CN111951791A (en) Voiceprint recognition model training method, recognition method, electronic device and storage medium
CN113724023B (en) Media resource pushing method and device, electronic equipment and storage medium
CN111835541A (en) Model aging detection method, device, equipment and system
CN116866006A (en) GAN attack detection method and device, and parameter sharing method and device
CN118113905A (en) Data processing method, device, electronic equipment, medium and program product
CN117113088A (en) Model generation method, characterization generation method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220810

Address after: 102303 DT0613, Floor 1-2, Building 2, Yuhuangmiao Sales Office, Datai Trading Company, Mentougou District, Beijing (cluster registration)

Applicant after: Zhongqian Si Chuang (Beijing) Technology Co., Ltd.

Address before: 650500 Building 5, yunshang Town, Chenggong Information Industrial Park, Chenggong District, Kunming City, Yunnan Province

Applicant before: Cheng Bo

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant