CN115102764B - Access method and device of Internet of things edge computing equipment, computer equipment and storage medium - Google Patents

Access method and device of Internet of things edge computing equipment, computer equipment and storage medium Download PDF

Info

Publication number
CN115102764B
CN115102764B CN202210711898.8A CN202210711898A CN115102764B CN 115102764 B CN115102764 B CN 115102764B CN 202210711898 A CN202210711898 A CN 202210711898A CN 115102764 B CN115102764 B CN 115102764B
Authority
CN
China
Prior art keywords
application layer
cloud
layer
embedded database
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210711898.8A
Other languages
Chinese (zh)
Other versions
CN115102764A (en
Inventor
李子龙
潘文博
韩金尅
肖益平
郭思彬
李灵勇
罗威
彭静
黄建明
李靖文
张驰俊
胡红
王永强
王杜鑫
王远雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Meizhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Meizhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Meizhou Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN202210711898.8A priority Critical patent/CN115102764B/en
Publication of CN115102764A publication Critical patent/CN115102764A/en
Application granted granted Critical
Publication of CN115102764B publication Critical patent/CN115102764B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Automation & Control Theory (AREA)
  • Computational Linguistics (AREA)
  • Medical Informatics (AREA)
  • Biomedical Technology (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses an access method and device of an edge computing device of the Internet of things, a computer device and a storage medium. Collecting current user characteristic information through an application layer; comparing the current user characteristic information with legal user characteristic information in the system layer through the system layer, allowing the application layer to access the system layer under the condition of consistent comparison, and feeding back an index establishment instruction to the application layer; responding to feedback information of an index establishment instruction of an application layer, and generating a retrieval request; searching an embedded database by adopting a search request through an index driving unit in a system layer; if the cloud search result is not searched in the embedded database, searching the cloud share to obtain the cloud search result; and feeding back cloud retrieval results to the application layer. According to the application, after the identity is identified, the retrieved information is synchronized into the local cache for calling and use, so that the cost requirement of the data acquisition terminal equipment of the Internet of things and the computing capacity requirement of the edge server are reduced, the efficiency is high, and the computing resource occupancy rate is small.

Description

Access method and device of Internet of things edge computing equipment, computer equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of cloud computing, in particular to an access method and device of edge computing equipment of the Internet of things, computer equipment and a storage medium.
Background
The internet of things is an important component part of a new generation of information technology and is also an important development stage of an information age, one of core technologies of the internet of things is cloud computing, which is an increase, use and delivery mode of internet-based related services, and generally relates to providing a resource which is dynamically and easily expanded and is often virtualized through the internet. At present, servers of the Internet of things are deployed at a cloud end, and various services of an application layer are provided through cloud computing.
However, with the gradual development of the internet of things service, the rapid increase of the sensing data volume and the development of low-delay and high-reliability services such as intelligent traffic, electronic medical treatment and the like, challenges are presented to the traditional internet of things architecture based on cloud computing, and unlike the traditional centralized cloud data center, edge computing is considered as a network edge type data processing platform, namely, the traditional data center is cut into various small data centers and placed at the edge of an access network to provide network services for users.
Therefore, the computing power provided by the edge cloud is limited, how to reasonably allocate resources in the edge computing has become a hotspot problem, and from the development of the current internet of things, the internet of things architecture based on the traditional cloud computing cannot meet the requirements of the current internet of things service on low delay, high reliability and safety.
Disclosure of Invention
The application provides an access method, an access device, a computer device and a storage medium of an Internet of things edge computing device, and aims to solve the problem that the Internet of things architecture based on traditional cloud computing cannot meet the demands of the Internet of things service on low delay, high reliability and safety at present in the development of the Internet of things in the prior art.
In a first aspect, an embodiment of the present application provides an access method for an edge computing device of an internet of things, where the edge computing device includes an application layer, a system layer, and an embedded database; the method comprises the following steps:
collecting current user characteristic information through the application layer;
comparing the current user characteristic information with legal user characteristic information in the application layer through the application layer, allowing the application layer to access the system layer under the condition of consistent comparison, and receiving an index establishment instruction fed back to the application layer by the system layer;
responding to feedback information of the index establishment instruction by the application layer, and generating a retrieval request;
searching in the embedded database by adopting the search request through an index driving unit in the system layer; if the cloud search result is not searched in the embedded database, searching the cloud share to obtain the cloud search result;
and feeding back the cloud retrieval result to the application layer.
In a second aspect, an embodiment of the present application provides an access apparatus for an edge computing device of an internet of things, where the edge computing device includes an application layer, a system layer, and an embedded database; the device comprises:
the information acquisition module is used for acquiring the characteristic information of the current user through the application layer;
the identity verification module is used for comparing the current user characteristic information with legal user characteristic information in the application layer through the application layer, allowing the application layer to access the system layer under the condition of consistent comparison, and receiving an index establishment instruction fed back to the application layer by the system layer;
the retrieval establishing module is used for responding to feedback information of the index establishing instruction by the application layer and generating a retrieval request;
the data retrieval module is used for retrieving the embedded database by adopting the retrieval request through an index driving unit in the system layer; if the cloud search result is not searched in the embedded database, searching the cloud share to obtain the cloud search result;
and the retrieval feedback module is used for feeding back the cloud retrieval result to the application layer.
In a third aspect, an embodiment of the present application provides a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, and further including: the camera is used for collecting images; the microphone is used for collecting sound, and the fingerprint sensor is used for collecting fingerprints; the method for accessing the edge computing device of the internet of things according to any one of the embodiments of the present application is implemented when the processor executes the program.
In a fourth aspect, embodiments of the present application further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform an access method of an internet of things edge computing device according to any of the embodiments of the present application.
According to the technical scheme provided by the embodiment of the application, the retrieved information is synchronized into the local cache for calling and use, so that the cost requirement of the data acquisition terminal equipment of the Internet of things and the computing capacity requirement of the edge server in the Internet of things system are reduced, the efficiency is high, the computing resource occupancy rate is small, and compared with the construction of a transaction proposal on the edge server, the data is safer.
Drawings
Fig. 1 is a flow chart of an access method of an edge computing device of the internet of things according to a first embodiment of the present application;
fig. 2 is a schematic structural diagram of an edge computing device of the internet of things according to a first embodiment of the present application;
fig. 3 is an exemplary diagram of an access device of an edge computing device of the internet of things according to a second embodiment of the present application;
fig. 4 is a schematic structural diagram of an edge computing device of the internet of things according to a second embodiment of the present application;
fig. 5 is a schematic structural diagram of a computer device according to a third embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting thereof.
It should be further noted that, for convenience of description, only some, but not all of the matters related to the present application are shown in the accompanying drawings. Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Example 1
Fig. 1 is a flow chart of an access method of an internet of things edge computing device according to an embodiment of the present application, where the embodiment of the present application is applicable to a case of classifying garbage, and the method may be performed by an access apparatus of an internet of things edge computing device according to the embodiment of the present application, where the apparatus may be implemented in a software and/or hardware manner, and may be generally integrated in a computer device. Such as a server, computer, etc.
The method specifically comprises the following steps:
s110, collecting the current user characteristic information through the application layer.
Fig. 2 is a schematic structural diagram of an edge computing device of an internet of things according to an embodiment of the present application, where, as shown in fig. 2, the edge computing device includes an application layer, a system layer, and a hardware layer, and the output of the application layer is connected to the system layer, and the system layer is bi-directionally connected to the hardware layer. And acquiring the characteristic information of the current user through the application layer. Specifically, the application layer may include an identification module, which is configured to collect current user feature information. For example, the application layer may include an instruction input tool for inputting a feature information acquisition instruction, waiting for acquisition of the current user feature information; the application layer may include a display window for prompting the current user to collect feature information and waiting for the current user to collect feature information.
It should be noted that the above-mentioned process may be controlled by a computer program, and the steps are sequentially performed, which are conventional knowledge of current automation control, and are not described in detail in this embodiment. And the hardware layer utilizes a hardware register to load programs on the application layer, and the hardware layer supports the operation of the application layer.
Specifically, referring to fig. 2, the hardware layer may include a main controller and a monitoring module, where the main controller is connected to the monitoring module and executes instructions to control the operation of the monitoring module. Preferably, the monitoring module may include a monitoring unit, a communication unit, a video storage unit, and the like, where the units are electrically connected. The monitoring unit may include a camera, a microphone, a fingerprint sensor, etc., where the camera may be capable of collecting pupil information of a user, or may be capable of collecting head image information of a user, such as facial three-dimensional feature information, auricle feature information, video information of a head image of a user, etc., the microphone may be used to collect voice information of a user, and the fingerprint sensor is used to collect fingerprint information of a user.
It should be noted that the monitoring unit may configure the user characteristic information collecting device for collecting the user characteristic information based on the user's requirement, which is not limited in the embodiment of the present application. The monitoring unit is also not configured with user characteristic information acquisition equipment, a user can acquire user characteristic information through other equipment, and the user characteristic information is transmitted to the edge computing equipment of the Internet of things in an infinite transmission or wired transmission mode. For example, the application layer of the internet of things edge device may be configured with a data transmission module, which may be configured to enable the application layer to perform data communication with an external device, collect user feature information through other devices, and establish a communication connection through the data transmission module to transmit the user feature information to the application layer. It should be noted that, the operation of the data transmission module needs support of hardware, and in an exemplary embodiment, the hardware layer of the edge device of the internet of things may be configured with a wireless module, where the wireless module is connected to the main controller, and the wireless module includes a wireless transmitting unit and a wireless receiving unit, where the wireless receiving unit is used to receive a wireless signal sent by the external device, and the wireless transmitting unit is used to send the signal sent by the main controller to the external terminal.
In the embodiment of the application, the monitoring unit can collect user characteristic information and is used for controlling the camera, the microphone or the fingerprint sensor to capture images, intercept sound, acquire fingerprints and the like, and for example, the current user pupil and head portrait information are identified and all images are collected through the camera, and the current user fingerprint information is identified and all fingerprints are collected through the fingerprint sensor; the communication unit is used for data communication between the monitoring unit and the video storage unit, and the video storage unit is used for storing the collected user characteristic information, and it should be noted that the user characteristic information stored in the video storage unit is actually stored in the storage hardware of the hardware layer.
In the embodiment of the present application, the current user characteristic information may include at least two of the following characteristic information: pupil, voice, fingerprint and head portrait, which has the advantages that various characteristic information can be provided for identity verification, flexibility and safety of identity verification are improved, and the required current user characteristic information can be customized based on safety requirements. For example, at least two types of current user feature information may be collected, in one embodiment, the monitoring unit controls the collection unit to collect feature information of a certain current user, then buffer the feature information, collect next item of current user feature information, and after the current user feature information is collected, collect and store the current user feature information in the storage unit. In one embodiment, after the monitoring unit controls the acquisition unit to acquire the characteristic information of a certain current user, the characteristic information is stored in the storage unit, and the acquisition of the characteristic information of the next current user is performed until the acquisition of the characteristic information of the current user is completed.
In one embodiment, the collecting the current user feature information includes collecting legal user feature information, where the collecting the legal user feature information may refer to the method described above, and after collecting, the legal user feature information is stored in the application layer, where, by way of example, an encryptable independent storage unit may be disposed for storing the collected legal user feature information, where it should be noted that the legal user feature information of the legal user is actually stored in the storage hardware of the hardware layer through a hardware register, and the application is described in the following in which the feature information is stored in the application layer.
S120, comparing the current user characteristic information with legal user characteristic information in the application layer through the application layer, allowing the application layer to access the system layer under the condition of consistent comparison, and receiving an index establishment instruction fed back to the application layer by the system layer.
After the application layer collects the user characteristic information, the embodiment of the application can be compared with the legal user characteristic information originally collected in the application layer. Specifically, referring to fig. 2, an application layer of the internet of things edge computing device may be configured with an identity recognition module and a feature comparison module, where the identity recognition module and the feature comparison module cooperatively recognize whether the current user is a legal user. The identity recognition module may be divided into a pupil recognition unit, a voice recognition unit, a fingerprint recognition unit, a head portrait recognition unit, etc., where the pupil recognition unit is used to detect, in cooperation with the feature comparison module, whether the pupil of the user is consistent with pupil information of a legal user stored in the application layer in advance, the voice recognition unit is used to detect, in cooperation with the feature comparison module, whether the voice of the user is consistent with voice information of the legal user stored in the application layer in advance, and the fingerprint recognition unit and the head portrait recognition unit are respectively used to detect, in cooperation with the feature comparison module, whether the fingerprint of the user is consistent with the head portrait of the legal user stored in advance in the application layer in advance. The feature comparison module may compare the collected current user feature information with a plurality of legal user feature information stored in the application layer, where the feature comparison module identifies an identity corresponding to the current user feature information based on the current user feature information, identities corresponding to the plurality of legal user feature information, and a comparison result.
In a preferred embodiment of the present application, at least two types of user characteristic information are set to be identical in comparison to indicate that the user is a legal user, and the at least two types of user characteristic information may be any two types of combinations of the user characteristic information. For example, when the fingerprint and pupil information are both compared and consistent, the user is judged to be a legal user. The method has the advantages that the identification performance is greatly enhanced, the identity accurate identification performance of the edge computing equipment terminal at the access cloud platform is guaranteed, and the safety of data is also guaranteed.
In the embodiment of the application, after at least two items of user characteristic information are compared and consistent and the identity of the user is verified to be a legal user, the application layer can be accessed into the system layer. Specifically, in the application layer, if the feature comparison is passed, the application layer automatically transmits data to the system layer, and for example, the internet of things edge computing device system interrupts data transmission to enable the application layer to access the system layer. Preferably, referring to fig. 2, in an embodiment of the present application, the application layer may include a data transmission module, where the data transmission module is configured to perform data transmission between the application layer and the system, so that the application layer accesses the system layer.
In the embodiment of the application, after the characteristic comparison, the verification content is output for the user to check. Specifically, in the application layer, if the feature comparison is passed, verifying that the user who outputs the content displays the passing information; further, if the feature comparison is not passed, the program is stopped after the output content is verified until the user displays the failed information, and the verification program is automatically circulated when the user uses the program again. Specifically, referring to fig. 2, the application layer of the edge computing device according to the embodiment of the present application may further include a verification output module, configured to verify, after the feature comparison, the passing or non-passing information output to the user.
Preferably, in the application layer, if the feature comparison is passed, the application layer automatically transmits data to the system layer for connection, and verifies that the user outputting the content displays the passing information. Further, if the feature comparison is not passed, the application layer does not transmit data to the system layer, and the program is stopped after the verification output content is displayed to the user and the failed information is displayed, and the verification program is automatically circulated when the user uses the program again.
In the embodiment of the application, after the application layer accesses the system layer, the system layer is activated, and after the system layer is activated, an index establishment instruction fed back to the application layer can be an instruction for indicating the application layer to prompt the current user to input index content. Specifically, the application layer may receive the index establishment instruction through the data transmission module, prompt a user to input index content, and establish an index instruction according to the index content. By way of example, a user may index content input through a Web page, creating forms and data points, e.g., the forms may include: gateway ID, device type, device ID, device address, data format, data type, data unit, data read-write attribute, data validity, data description, etc.
S130, responding to feedback information of the index establishment instruction by the application layer, and generating a retrieval request.
In the embodiment of the application, the feedback information can be index content input by a user, and the application layer performs code conversion on the index content based on the index content input by the user to generate a search request; or the feedback information can comprise an index database, index time and the like designated by the user, and the program can generate different retrieval requests according to different requirements of the user. Specifically, the application layer may transmit the search request to a system layer through a data transmission module, so as to prompt the system layer to perform data search based on the search request. For example, the application layer extracts information from the contents of the form, converts the extracted information into a unique serial search code, generates a search request based on the serial search code, and transmits the search request to the system layer through a data transmission module, and preferably, the serial search code is completely reversible.
S140, searching in the embedded database by adopting the search request through an index driving unit in the system layer; and if the cloud search result is not searched in the embedded database, searching the cloud share to obtain the cloud search result.
Specifically, referring to fig. 2, the system layer may include an index driving unit, an embedded data database, and a cloud sharing module. The index driving unit may first search the embedded database, if the data is not searched in the embedded database, and then search the docking cloud sharing, for example, the embedded database may store frequently used data, the index driving unit analyzes the search request to obtain a sequence search code, and searches the required data from the local embedded database based on the sequence search code, for example, the data in the embedded database may have a unique feature identifier, and the required data is searched through the identifier comparison.
If the cloud sharing is not searched in the embedded database, searching the cloud sharing to obtain a cloud searching result, and for example, the cloud sharing module may be an interface for interfacing the distributed cloud server, and the index driving unit accesses the cloud sharing and interfaces the distributed cloud server when the cloud sharing is not searched in the embedded database. The index driving unit analyzes the search request to obtain a sequence search code, and searches required data from the distributed cloud server through cloud sharing based on the sequence search code, for example, the data in the distributed cloud server can have unique characteristic identifiers, the required data is searched through identification comparison, and a search result is obtained, wherein the search result can be searched or not searched, and if the search result is searched, the search result can also comprise a search range or a set of searched information.
It should be noted that, the above process may be controlled by a computer program, and the steps are implemented sequentially, where the hardware layer uses a hardware register to load a program on a system layer, and the hardware layer supports operation of the system layer, and referring to fig. 2, in an embodiment of the present application, the hardware layer of the edge device of the internet of things is provided with a main controller and a wireless module, where the wireless module includes a wireless transmitting module and a wireless receiving module, the wireless receiving module is used to receive a wireless signal transmitted by an external device, and the wireless transmitting module is used to transmit a signal transmitted by the main controller to the external terminal. In another embodiment, the distributed cloud server may also be accessed through a wired manner, and for example, the wireless module may be replaced by a wired module.
Preferably, the distributed cloud server is a private cloud server, and the scheduling server and the storage server are distributed according to the number of specific servers. The distributed cloud server combines a plurality of servers to provide balanced computing service and disaster recovery backup functions, wherein any server fails and the overall service function is not affected. The software of the server side is deployed in a private cloud mode, the data communication is stable and reliable, the enterprise-level distributed measurement and control task can be rapidly realized, and further development progress of enterprises in the field of industrial Internet of things is promoted.
And S150, feeding back the cloud retrieval result to the application layer.
Specifically, the distributed cloud server may feed back a cloud search result through a cloud sharing module, the edge computing device of the internet of things transmits the cloud search result to the user through the application layer, the cloud feedback result may be a message, the system layer receives the message to analyze, and transmits the analysis result to the application layer to display. For example, the application layer may display a pop-up message, which is configured to display the cloud search result, and if the cloud search result indicates that the required data is retrieved, the application layer may prompt the user whether to obtain the data from the cloud share, and wait for instruction information of the user, and if the user selects to obtain the data from the cloud share, the application layer transfers an instruction to the system layer, so that the system layer sends a request to obtain the required data through the cloud share.
Specifically, the feeding back the cloud search result to the application layer includes: classifying the cloud search results, and storing the cloud search results into the embedded database according to the classification results; and feeding back the classification result to the application layer. In one embodiment, the system layer may automatically send a request to cache corresponding data locally after receiving the cloud search results and determining that there is required search data in the cloud server. Referring to fig. 2, in the embodiment of the present application, the system layer further includes a cache module, where the cache module is configured to retrieve content in the embedded database or carry information transmitted to the local area for a user to retrieve, specifically, data may be first stored in the cache module, and the data may be sorted and stored in the local embedded database, for example, the data may be sorted and stored according to the foregoing form. Further, after the data is sorted, the corresponding data in the cache module can be deleted, the sorted data is output to the cache module from the local embedded database for viewing by a user, for example, the user can call the data in the cache module through the system interface by the application layer.
In one embodiment, after the generating the search request, the method further includes: acquiring a progress query request of the search request through the application layer; and generating the query progress of the search request according to the query progress of the embedded database and/or the cloud sharing, and feeding back the query progress to the application layer. Referring to fig. 2, in the embodiment of the present application, the system layer further includes a process scheduling module, and the user may call the system layer process scheduling module through the system interface by using the application layer to perform retrieval degree retrieval, where the user may directly read the retrieved range or the retrieved set of information, and the transmission status of the related content.
In the embodiment of the present application, referring to fig. 2, the system layer further includes a file system, and the file system supports the division operation of the rest operation units of the system layer. In the application, the operations performed at the system layer are all performed by computer programs, so that the file system in the edge computing device detects whether the program instructions in the system layer are accurate, the running fluency of the system layer is ensured, or whether the program instructions of the local running unit are accurate, and the file system can perform self-checking at set time or set condition or receive detection commands of users through command tools, and has a certain function of automatically repairing errors.
In the embodiment of the present application, referring to fig. 2, the hardware layer further includes a storage module and a power module, where the main controller is connected to the storage module and the power module, respectively, it should be noted that the embedded database and the cache are actually located in the storage module, the embedded database stores the search information transmitted to the local in the cloud sharing, and the cache is used to call the content in the embedded database or bear the information transmitted to the local for the user to call. The main controller is respectively provided with a voltage detection unit and a current detection unit, the voltage detection unit and the current detection unit are connected with a power supply module, and the power supply module can give an alarm when the current and the voltage are abnormal during energy supply. The voltage detection unit and the current detection unit respectively acquire the voltage value or the current value in the main controller in real time through the voltage transformer and the current transformer.
Compared with the prior art, the access method of the edge computing equipment of the Internet of things has the following beneficial effects:
1. through activating the system layer after the identity recognition, a user outputs and establishes a required index, the index is established and then drives to search and output, firstly, an embedded database is searched, the user can retrieve the search degree at any time, the embedded database does not search to enter the cloud sharing for sequential search, and the searched information is synchronized to a local cache for retrieval and use, so that the cost requirement of the data terminal equipment collected by the Internet of things and the computing capacity requirement of an edge server in the Internet of things system are reduced, the efficiency is high, the computing resource occupancy rate is small, compared with the process of constructing a transaction proposal on the edge server, the data is safer, the cache can be stored in the embedded database, and therefore, the quick retrieval can be carried out when the search is carried out, and the searching efficiency of the edge computing equipment of the Internet of things is improved.
2. The identification module enhances the identity recognition performance of the application layer, the user can unlock the application layer only by conforming to the two pieces of characteristic information, the recognition performance is greatly enhanced, the pupil and head portrait are recognized by the camera to be taken, the main controller compares the taken image with the characteristics in the application layer, the sound collection module collects the sound of the user, and the main controller compares the collected sound with the information in the application layer, so that the accurate identity recognition performance of the edge computing equipment of the Internet of things in the cloud platform is ensured.
Example two
Fig. 3 is an exemplary diagram of an access device of an internet of things edge computing device according to a second embodiment of the present application. The device specifically comprises: the device comprises an information acquisition module 310, an identity verification module 320, a retrieval establishing module 330, a data retrieval module 340 and a retrieval feedback module 350, wherein the device comprises an application layer, a system layer and an embedded database of the Internet of things edge equipment.
Fig. 4 is a schematic structural diagram of an edge computing device of the internet of things according to a second embodiment of the present application, where, as shown in fig. 4, the output of the application layer is connected to a system layer, and the system layer is bi-directionally connected to a hardware layer.
The information acquisition module is used for acquiring the characteristic information of the current user through the application layer;
the identity verification module is used for comparing the current user characteristic information with legal user characteristic information in the application layer through the application layer, allowing the application layer to access the system layer under the condition that the comparison is consistent, and receiving an index establishment instruction fed back to the application layer by the system layer;
the search establishing module is used for responding to the feedback information of the index establishing instruction by the application layer and generating a search request;
the data retrieval module is used for retrieving the embedded database by adopting the retrieval request through an index driving unit in the system layer; if the cloud search result is not searched in the embedded database, searching the cloud share to obtain the cloud search result;
and the search feedback module is used for feeding back the cloud search result to the application layer.
The embodiment of the application provides an access device of an Internet of things edge computing device, which synchronizes the searched information into a local cache for retrieval and use after identity recognition, reduces the cost requirement of the Internet of things acquisition data terminal device and the computing capacity requirement of an edge server, and has high efficiency and small computing resource occupancy rate.
Based on the above embodiments, the access device of the internet of things edge computing device may further include: progress inquiry module, is used for:
acquiring a progress query request of the search request through the application layer;
generating a query progress of the search request according to the query progress of the embedded database and/or the cloud sharing;
and feeding back the query progress to the application layer.
On the basis of the above embodiments, the search feedback module is specifically configured to:
classifying the cloud search results, and storing the cloud search results into the embedded database according to the classification results; and feeding back the classification result to the application layer.
The access device of the internet of things edge computing equipment can execute the access method of the internet of things edge computing equipment provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of executing the access method of the internet of things edge computing equipment.
Example III
Fig. 5 is a schematic structural diagram of a computer device according to a third embodiment of the present application. Fig. 5 illustrates a block diagram of an exemplary computer device 12 suitable for use in implementing embodiments of the present application. The computer device 12 shown in fig. 5 is merely an example and should not be construed as limiting the functionality and scope of use of embodiments of the present application.
As shown in fig. 5. Components of computer device 12 may include, but are not limited to: one or more processors 16, a memory 28, a bus 18 that connects the various system components, including the memory 28 and the processor 16. The processor 16 includes, but is not limited to, an AI processor.
Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, micro channel architecture (MAC) bus, enhanced ISA bus, video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 12 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache memory 32. The computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, commonly referred to as a "hard disk drive"). Although not shown in fig. 5, a magnetic disk drive for reading from and writing to a removable non-volatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable non-volatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be coupled to bus 18 through one or more data medium interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of embodiments of the application.
A program/utility 40 having a set (at least one) of program modules 42 may be stored in, for example, memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules 42 generally perform the functions and/or methods of the embodiments described herein.
The computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, camera, microphone, fingerprint sensor, display 24, etc.), one or more devices that enable a user to interact with the computer device 12, and/or any devices (e.g., network card, modem, etc.) that enable the computer device 12 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 22. Moreover, computer device 12 may also communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet, through network adapter 20. As shown, network adapter 20 communicates with other modules of computer device 12 via bus 18. It should be appreciated that although not shown in fig. 5, other hardware and/or software modules may be used in connection with computer device 12, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
The processor 16 of the computer device 12 executes programs stored in the memory 28 to perform various functional applications and data processing, such as implementing the method for accessing an edge computing device of the internet of things provided by the embodiments of the present application. The method specifically comprises the following steps: collecting current user characteristic information through the application layer; comparing the current user characteristic information with legal user characteristic information in the system application layer through the system application layer, allowing the application layer to access the system layer under the condition of consistent comparison, and receiving an index establishment instruction fed back to the application layer by the system layer; responding to feedback information of the index establishment instruction by the application layer, and generating a retrieval request; searching in the embedded database by adopting the search request through an index driving unit in the system layer; if the cloud search result is not searched in the embedded database, searching the cloud share to obtain the cloud search result; and feeding back the cloud retrieval result to the application layer.
Example IV
A fourth embodiment of the present application also provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a method for accessing an edge computing device of the internet of things, the method comprising:
collecting current user characteristic information through the application layer;
comparing the current user characteristic information with legal user characteristic information in the system application layer through the system application layer, allowing the application layer to access the system layer under the condition of consistent comparison, and receiving an index establishment instruction fed back to the application layer by the system layer;
responding to feedback information of the index establishment instruction by the application layer, and generating a retrieval request;
searching in the embedded database by adopting the search request through an index driving unit in the system layer; if the cloud search result is not searched in the embedded database, searching the cloud share to obtain the cloud search result;
and feeding back the cloud retrieval result to the application layer.
Of course, the storage medium containing the computer executable instructions provided by the embodiment of the present application is not limited to the above-mentioned method operations, and may also perform related operations in the access method of the internet of things edge computing device provided by any embodiment of the present application.
From the above description of embodiments, it will be clear to a person skilled in the art that the present application may be implemented by means of software and necessary general purpose hardware, but of course also by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, etc., and include several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments of the present application.
It should be noted that, in the embodiment of the access device of the internet of things edge computing device, each unit and module included are only divided according to the functional logic, but not limited to the above division, so long as the corresponding function can be realized; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the present application.
Note that the above is only a preferred embodiment of the present application and the technical principle applied. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the application, which is set forth in the following claims.

Claims (9)

1. An access method of an edge computing device of the Internet of things is characterized in that the edge computing device comprises an application layer, a system layer and an embedded database; the method comprises the following steps:
collecting current user characteristic information through the application layer;
comparing the current user characteristic information with legal user characteristic information in the application layer through the application layer, allowing the application layer to access the system layer under the condition of consistent comparison, and receiving an index establishment instruction fed back to the application layer by the system layer;
responding to feedback information of the index establishment instruction by the application layer, and generating a retrieval request;
searching in the embedded database by adopting the search request through an index driving unit in the system layer; if the cloud search result is not searched in the embedded database, searching the cloud share to obtain the cloud search result;
the cloud retrieval results are fed back to the application layer, classified, and stored into the embedded database according to the classification results;
wherein the embedded database stores frequently used data; the data in the embedded database has unique characteristic identification, and the required data is searched through identification comparison.
2. The method of claim 1, wherein the current user characteristic information comprises at least two of the following characteristic information: pupil, voice, fingerprint, and head portrait.
3. The method of claim 1, wherein after generating the search request, further comprising:
acquiring a progress query request of the search request through the application layer;
generating a query progress of the search request according to the query progress of the embedded database and/or the cloud sharing;
and feeding back the query progress to the application layer.
4. The method according to claim 1, wherein the method further comprises:
and detecting whether program instructions in the system layer are accurate or not through a file system in the edge computing device.
5. An access device of an edge computing device of the internet of things is characterized in that the edge computing device comprises an application layer, a system layer and an embedded database; the device comprises:
the information acquisition module is used for acquiring the characteristic information of the current user through the application layer;
the identity verification module is used for comparing the current user characteristic information with legal user characteristic information in the application layer through the application layer, allowing the application layer to access the system layer under the condition of consistent comparison, and receiving an index establishment instruction fed back to the application layer by the system layer;
the retrieval establishing module is used for responding to feedback information of the index establishing instruction by the application layer and generating a retrieval request;
the data retrieval module is used for retrieving the embedded database by adopting the retrieval request through an index driving unit in the system layer; if the cloud search result is not searched in the embedded database, searching the cloud share to obtain a cloud search result, wherein the embedded database stores frequently used data; the data in the embedded database has unique characteristic identification, and the required data is searched through identification comparison;
and the search feedback module is used for feeding back the cloud search result to the application layer, classifying the cloud search result and storing the cloud search result into the embedded database according to the classification result.
6. The apparatus of claim 5, wherein the search feedback module is specifically configured to:
classifying the cloud search results, and storing the cloud search results into the embedded database according to the classification results; and feeding back the classification result to the application layer.
7. The apparatus of claim 5, further comprising a progress query module to:
acquiring a progress query request of the search request through the application layer;
generating a query progress of the search request according to the query progress of the embedded database and/or the cloud sharing;
and feeding back the query progress to the application layer.
8. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, further comprising: the camera is used for collecting images; the microphone is used for collecting sound, and the fingerprint sensor is used for collecting fingerprints; the processor, when executing the program, implements the method for accessing the internet of things edge computing device according to any one of claims 1-4.
9. A storage medium containing computer executable instructions, which when executed by a computer processor, are for performing the access method of the internet of things edge computing device of any of claims 1-4.
CN202210711898.8A 2022-06-22 2022-06-22 Access method and device of Internet of things edge computing equipment, computer equipment and storage medium Active CN115102764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210711898.8A CN115102764B (en) 2022-06-22 2022-06-22 Access method and device of Internet of things edge computing equipment, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210711898.8A CN115102764B (en) 2022-06-22 2022-06-22 Access method and device of Internet of things edge computing equipment, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115102764A CN115102764A (en) 2022-09-23
CN115102764B true CN115102764B (en) 2023-10-20

Family

ID=83292149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210711898.8A Active CN115102764B (en) 2022-06-22 2022-06-22 Access method and device of Internet of things edge computing equipment, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115102764B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108446680A (en) * 2018-05-07 2018-08-24 西安电子科技大学 A kind of method for secret protection in face authentication system based on edge calculations
CN109447048A (en) * 2018-12-25 2019-03-08 苏州闪驰数控系统集成有限公司 A kind of artificial intelligence early warning system
CN111212023A (en) * 2019-10-30 2020-05-29 浙江中控自动化仪表有限公司 Remote inter-station data communication method based on edge computing gateway
CN112927464A (en) * 2020-11-23 2021-06-08 北京宏链科技有限公司 Job site macro-chain safety management and control system based on edge intelligence
CN113767609A (en) * 2019-05-03 2021-12-07 微软技术许可有限责任公司 Controlling access to resources of an edge device
CN114026834A (en) * 2019-04-30 2022-02-08 英特尔公司 Multi-entity resource, security, and service management in edge computing deployments

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108446680A (en) * 2018-05-07 2018-08-24 西安电子科技大学 A kind of method for secret protection in face authentication system based on edge calculations
CN109447048A (en) * 2018-12-25 2019-03-08 苏州闪驰数控系统集成有限公司 A kind of artificial intelligence early warning system
CN114026834A (en) * 2019-04-30 2022-02-08 英特尔公司 Multi-entity resource, security, and service management in edge computing deployments
CN113767609A (en) * 2019-05-03 2021-12-07 微软技术许可有限责任公司 Controlling access to resources of an edge device
CN111212023A (en) * 2019-10-30 2020-05-29 浙江中控自动化仪表有限公司 Remote inter-station data communication method based on edge computing gateway
CN112927464A (en) * 2020-11-23 2021-06-08 北京宏链科技有限公司 Job site macro-chain safety management and control system based on edge intelligence

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
校园网网络用户安全身份认证体系分析;张毅;高东怀;许卫中;许浩;;医疗卫生装备(第04期);全文 *

Also Published As

Publication number Publication date
CN115102764A (en) 2022-09-23

Similar Documents

Publication Publication Date Title
CN108833131A (en) System, method, equipment and the computer storage medium of distributed data base cloud service
JP6756079B2 (en) Artificial intelligence-based ternary check method, equipment and computer program
WO2021175019A1 (en) Guide method for audio and video recording, apparatus, computer device, and storage medium
KR20200007946A (en) Save metadata related to captured images
US20160132866A1 (en) Device, system, and method for creating virtual credit card
US11282002B2 (en) Method and apparatus for secure check-in
WO2018205468A1 (en) Biometric transaction processing method, electronic device and storage medium
US11521209B2 (en) Systems and methods for automated identity verification
CN109346074A (en) A kind of method of speech processing and system
CN113254969A (en) Service data processing method and device, electronic equipment and storage medium
CN115102764B (en) Access method and device of Internet of things edge computing equipment, computer equipment and storage medium
CN114268461A (en) User identity authentication method, device, server, terminal and storage medium
US20150178346A1 (en) Using biometric data to identify data consolidation issues
JP5107157B2 (en) Character recognition program, character recognition device, and character recognition method
CN112926059A (en) Data processing method, device, equipment and storage medium
CN103186408A (en) Management method of operated virtual machine, system and device thereof
CN112131903B (en) Equipment data analysis method, device, service platform, system and medium
CN110569178A (en) interface early warning method and system based on big data platform
CN108228101B (en) Method and system for managing data
CN112202850B (en) Intelligent cabinet after-sale maintenance work order system and processing method
CN115437500A (en) Service handling method and device based on gesture interaction and self-service equipment
CN115330335A (en) SAAS personalization system for serving hunting enterprises
CN112818204B (en) Service processing method, device, equipment and storage medium
CN114895775A (en) Service data processing method and device and intelligent counter
CN110764931A (en) Processing method, system, equipment and storage medium for OTA website uploading certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant