CN109560893B - Data verification method and device and server - Google Patents
Data verification method and device and server Download PDFInfo
- Publication number
- CN109560893B CN109560893B CN201811322299.7A CN201811322299A CN109560893B CN 109560893 B CN109560893 B CN 109560893B CN 201811322299 A CN201811322299 A CN 201811322299A CN 109560893 B CN109560893 B CN 109560893B
- Authority
- CN
- China
- Prior art keywords
- internet
- data verification
- server
- data
- things
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013524 data verification Methods 0.000 title claims abstract description 156
- 238000000034 method Methods 0.000 title claims abstract description 56
- 125000004122 cyclic group Chemical group 0.000 claims description 10
- 238000012795 verification Methods 0.000 description 31
- 238000010586 diagram Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000004590 computer program Methods 0.000 description 5
- 230000000875 corresponding effect Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000007405 data analysis Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000013403 standard screening design Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention provides a data verification method, a data verification device and a server. The method comprises the following steps: counting the number of the Internet of things devices accessed to the server; and adjusting the number of data verification containers according to the counted number of the Internet of things equipment accessed to the server, wherein the data verification containers are used for verifying the data collected by at least one Internet of things equipment. According to the method provided by the embodiment of the invention, the number of the data verification containers can be adaptively adjusted according to the number of the accessed Internet of things devices, and the mass data verification requirement when mass Internet of things devices are simultaneously accessed to the network is met.
Description
Technical Field
The embodiment of the invention relates to the technical field of application of the Internet of things, in particular to a data verification method, a data verification device and a server.
Background
In order to ensure the integrity and the legality of data, in various application scenarios, a receiver needs to perform data verification on received data to ensure the integrity of the data and avoid illegal data attacks.
With the rapid development of the internet industry and the rise of the internet of things industry, internet of things equipment has been widely used for data acquisition. The data acquisition is based on a data transmission protocol, data transmission acquisition is carried out through a host port, and after the server receives data acquired by the Internet of things equipment, data verification needs to be carried out on the received data. Only the complete, legitimate data that passes the data verification is passed to the downstream system for further analysis processing. Data verification can occupy host resources of a server, and particularly under various big data application scenes, the access amount of the internet of things equipment is increased suddenly, so that the data verification speed is slow, and data collected by the internet of things equipment cannot be analyzed and processed timely and effectively.
In summary, the existing data verification method cannot support mass internet of things devices to access a network simultaneously, and cannot meet the requirement of mass data verification.
Disclosure of Invention
The embodiment of the invention provides a data verification method, a data verification device and a server, which are used for solving the problem that the prior art cannot meet the requirement of mass data verification.
In a first aspect, an embodiment of the present invention provides a data verification method, including:
counting the number of the Internet of things devices accessed to the server;
and adjusting the number of data verification containers according to the counted number of the Internet of things equipment accessed to the server, wherein the data verification containers are used for verifying the data collected by at least one Internet of things equipment.
In one possible implementation manner, adjusting the number of the data verification containers according to the counted number of the internet of things devices accessing the server includes:
if the counted number of the internet of things equipment accessed to the server is larger than a first threshold value, the number of the data verification containers is increased according to the counted number of the internet of things equipment accessed to the server, and the first threshold value is determined according to the number of the data verification containers in the current server.
In one possible implementation manner, adjusting the number of the data verification containers according to the counted number of the internet of things devices accessing the server includes:
if the counted number of the internet of things equipment accessed to the server is smaller than a second threshold value, the number of the data verification containers is reduced according to the counted number of the internet of things equipment accessed to the server, and the second threshold value is determined according to the number of the data verification containers in the current server.
In one possible implementation, the method further includes:
and if the number of the Internet of things devices connected with the data verification container is reduced to a preset number, destroying the data verification container.
In one possible implementation manner, the verifying the data collected by the at least one internet of things device by the data verifying container includes:
the data verification container is used for sequentially carrying out conventional verification, digital signature verification and cyclic redundancy verification on data acquired by at least one piece of Internet of things equipment, and the conventional verification is used for verifying the record number, the size, the line number and the coding information of the data.
In one possible implementation, the method further includes:
and if the data acquired by the Internet of things equipment does not pass the data verification, sending a failure notification message to the Internet of things equipment, wherein the failure notification message comprises retransmission strategy indication information and is used for indicating the Internet of things equipment to retransmit the data according to the retransmission strategy indicated by the failure notification message.
In one possible implementation, before counting the number of internet of things devices accessing the server, the method further includes:
receiving an access request message sent by the Internet of things equipment, wherein the access request message comprises equipment coding information of the Internet of things equipment;
and determining whether the Internet of things equipment is allowed to access the server or not according to the equipment coding information.
In a second aspect, an embodiment of the present invention provides a data verification apparatus, including:
the statistical module is used for counting the number of the Internet of things equipment accessed to the server;
and the adjusting module is used for adjusting the number of the data verification containers according to the counted number of the Internet of things equipment accessed to the server, and the data verification containers are used for verifying the data collected by at least one piece of Internet of things equipment.
In a third aspect, an embodiment of the present invention provides a server, including:
at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executes computer-executable instructions stored by the memory to cause the at least one processor to perform the data verification method of any one of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where computer-executable instructions are stored, and when executed by a processor, the computer-executable instructions are configured to implement the data verification method according to any one of the first aspect.
According to the data verification method, the data verification device and the server provided by the embodiment of the invention, the number of the internet of things equipment accessed to the server is counted, and the number of the data verification containers is adjusted according to the counted number of the internet of things equipment accessed to the server. Therefore, the number of the data verification containers can be adaptively adjusted according to the number of the accessed Internet of things devices, the data verification requirement when massive Internet of things devices are simultaneously accessed to the network can be met, the response speed is high, and the data verification speed is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow chart of an embodiment of a data verification method provided by the present invention;
FIG. 2 is a schematic diagram illustrating an application of an embodiment of a data verification method according to the present invention;
FIG. 3 is a schematic structural diagram of an embodiment of a data verification apparatus according to the present invention;
fig. 4 is a schematic structural diagram of a server according to an embodiment of the present invention.
With the above figures, certain embodiments of the invention have been illustrated and described in more detail below. The drawings and the description are not intended to limit the scope of the inventive concept in any way, but rather to illustrate it by those skilled in the art with reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terms "comprising" and "having," and any variations thereof, in the description and claims of this invention are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The terms "first" and "second" in the present application are used for identification purposes only and are not to be construed as indicating or implying a sequential relationship, relative importance, or implicitly indicating the number of technical features indicated. "plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
Fig. 1 is a flowchart of a data verification method according to an embodiment of the present invention. The method provided by the embodiment can be executed by a network side device, such as a server. As shown in fig. 1, the data verification method provided in this embodiment may include:
s101, counting the number of the Internet of things devices accessing the server.
In this embodiment, the internet of things device can be accessed into the server in a wireless communication manner such as bluetooth, infrared, wireless local area network, mobile communication network, and can also be accessed into the server in a wired communication manner, and this embodiment does not have special limitation on the manner in which the internet of things device is accessed into the server, and various access manners are all suitable for this embodiment.
The internet of things device in this embodiment may be various sensors, such as a temperature sensor, a water level sensor, a wind speed sensor, a pressure sensor, and the like. In this embodiment, the internet of things devices accessing the server may be the same kind of internet of things devices, or different kinds of internet of things devices.
In this embodiment, the server may count the number of the internet of things devices accessing the server in real time, or may count the number of the internet of things devices accessing the server once every 30 seconds, for example, by using a preset time interval as a counting period.
S102, adjusting the number of data verification containers according to the counted number of the Internet of things devices accessing the server, wherein the data verification containers are used for verifying data collected by at least one Internet of things device.
The data verification container in this embodiment may be used to verify data collected by at least one internet of things device, and verifying the data may include verifying integrity and/or validity of the data. The embodiment does not limit the specific implementation manner of data verification.
In this embodiment, the number of the data verification containers is positively correlated with the number of the internet of things devices accessing the server. That is, when the number of the internet of things devices accessing the server increases, the number of the data verification containers also increases; when the number of the internet of things devices accessing the server is reduced, the number of the data verification containers is also reduced.
The data check container in this embodiment may be implemented by using a virtualization container technology, for example, may be implemented by using a Docker, and is small in occupied resources, fast in deployment, and fast in start.
According to the data verification method provided by the embodiment, the number of the data verification containers is adjusted by counting the number of the internet of things devices accessing the server and according to the counted number of the internet of things devices accessing the server. Therefore, the number of the data verification containers can be adaptively adjusted according to the number of the accessed Internet of things devices, the data verification requirement when massive Internet of things devices are simultaneously accessed to the network can be met, the response speed is high, and the data verification speed is improved.
In some embodiments, one implementation manner of adjusting the number of data verification containers according to the counted number of internet of things devices accessing the server may be:
if the counted number of the internet of things equipment accessed to the server is larger than a first threshold value, the number of the data verification containers is increased according to the counted number of the internet of things equipment accessed to the server, and the first threshold value is determined according to the number of the data verification containers in the current server.
The first threshold in this embodiment may be determined according to the number of data check containers in the current server. For example, if 10 data verification containers are started in the current server, and each data verification container may be used to verify data collected by 3 internet of things devices, the first threshold in this embodiment may be set to 30(10 × 3). That is, when the counted number of the internet of things devices accessing the server is greater than 30, the number of the data verification containers needs to be increased. If the counted number of the internet of things devices currently accessing the server at the same time is 40, the number of the data verification containers to be added may beI.e. 4 data check containers need to be added. The above numerical values are only examples and do not limit the present invention in any way.
It should be noted that, in this embodiment, the number of the internet of things devices accessing the data verification container may also be determined according to the data verification capacity of the data verification container and the data acquisition rate of a single internet of things device. For example, if the data verification capacity of the data verification container is 10MB/s and the data acquisition rate of a single internet of things device is 1MB/s, the data verification container may be used to verify data acquired by 10 internet of things devices. The data acquisition rate of each piece of internet of things equipment can be different, for example, the acquisition rate of the photo and video data acquired by the piece of internet of things equipment for aerial photography is greater than the acquisition rate of the temperature data acquired by the piece of internet of things equipment for temperature monitoring.
Optionally, the number of the data verification containers may be adjusted according to the amount of data to be verified of the internet of things device accessing the server. And when the data volume to be verified of the Internet of things equipment accessed to the server is larger than a preset threshold value, increasing the number of the data verification containers.
In the data verification method provided by this embodiment, the number of the data verification containers is increased according to the counted number of the internet of things devices accessing the server by the fact that the number of the internet of things devices accessing the server is greater than the first threshold. So, when the quantity through the thing networking equipment that inserts the server increases, in time increase the quantity of data check-up container for the data that thing networking equipment gathered can carry out the check-up fast, has improved data check-up speed.
In some embodiments, one implementation manner of adjusting the number of data verification containers according to the counted number of internet of things devices accessing the server may be:
if the counted number of the internet of things equipment accessed to the server is smaller than a second threshold value, the number of the data verification containers is reduced according to the counted number of the internet of things equipment accessed to the server, and the second threshold value is determined according to the number of the data verification containers in the current server.
For example, if the number of the data verification containers in the current server is enough to be used for verifying the data collected by 100 pieces of internet of things devices, and the number of the internet of things devices accessing the server is only 50 at this time, a large number of data verification containers are idle, which results in waste of system resources. Therefore, in order to avoid waste of system resources and improve resource utilization rate, in this embodiment, when the number of the internet of things devices accessing the server is smaller than the second threshold, the number of the data verification containers is reduced according to the counted number of the internet of things devices accessing the server. The specific value of the second threshold may be set according to actual needs, and this embodiment does not limit this. So, through the quantity that in time reduces data check container, avoided making data check container be in idle state, cause the wasting of resources, improved resource utilization, can also release more resources simultaneously and be provided with the thing networking device use that has the data check demand, and then improved the speed of data check.
In some embodiments, on the basis of any of the above embodiments, the method provided by this embodiment may further include:
and if the number of the Internet of things devices connected with the data verification container is reduced to a preset number, destroying the data verification container.
In this embodiment, after the data transmission that internet of things equipment will gather finishes, then can break off the connection with the server, release corresponding resource so that other equipment can use, also can reduce internet of things equipment's consumption simultaneously.
The data verification container in this embodiment can be connected with a plurality of internet of things devices simultaneously for the data that a plurality of internet of things devices gathered are verified. If the data transmission is completed by the plurality of internet of things devices connected with the data verification container, the data verification container can be destroyed and corresponding resources are released when the data verification container is in an offline state.
The preset number in this embodiment may be set to 0, that is, when the number of the internet of things devices connected to the data verification container is reduced to 0, the data verification container may be destroyed.
According to the data verification method provided by the embodiment, when the number of the internet of things devices connected with the data verification container is reduced to the preset number, the data verification container is destroyed. Therefore, by destroying the redundant data verification container in time, more resources are released, the resource utilization rate is improved, the response speed of the server can be improved, and the data verification speed is improved.
In some embodiments, one implementation manner in which the data verification container is used to verify the data collected by the at least one internet of things device may be: the data verification container is used for sequentially carrying out conventional verification, digital signature verification and cyclic redundancy verification on data acquired by at least one piece of Internet of things equipment, and the conventional verification is used for verifying the record number, the size, the line number and the coding information of the data.
The conventional verification in this embodiment is used to verify the recording number, size, line number, and encoding information of data. Specifically, the number of records, the size, the number of lines, and the encoding information recorded in the received data file are compared with the actual number of records, the size, the number of lines, and the encoding information of the received data file, and if the actual number of records, the size, the number of lines, and the encoding information are the same, the verification is passed, and if the actual number of records, the size, the number of lines, and the encoding information are different, the verification fails. For data that fails verification, it may be discarded; only data that passes the regular verification will be verified for the digital signature.
The digital signature verification in this embodiment may use at least one of a Message Digest Algorithm (MD), a Secure Hash Algorithm (SHA), and a Message Authentication Code Algorithm (MAC) to perform digital signature verification, for example. For example, the MD5 algorithm may be selected to calculate a message digest of the received data, and compare the message digest with the message digest recorded in the received data, and if the message digest is the same, the digital signature passes the verification; if not, the verification fails. For data that fails verification, it may be discarded; only data that passes the digital signature check will a cyclic redundancy check be performed.
In this embodiment, a Cyclic Redundancy Check (CRC) calculates a Check code of the received receipt according to a preset algorithm, and compares the Check code with a Check code recorded in the received data. If the CRC information is the same as the CRC information, the CRC check is passed; if not, the verification fails.
In the embodiment, the data acquired by the internet of things equipment is subjected to conventional verification, digital signature verification and cyclic redundancy verification in sequence, and the integrity and the legality of the data entering a subsequent data analysis processing flow are ensured by screening layer by layer.
According to the data verification method provided by the embodiment, the number of the internet of things devices accessing the server is counted, and the number of the data verification containers is adjusted according to the counted number of the internet of things devices accessing the server, so that sufficient resources are ensured for data verification. The data collected by the Internet of things equipment are subjected to conventional verification, digital signature verification and cyclic redundancy verification in sequence, so that the safety is further improved.
In some embodiments, on the basis of the previous embodiment, the method provided in this embodiment may further include: and if the data acquired by the Internet of things equipment does not pass the data verification, sending a failure notification message to the Internet of things equipment, wherein the failure notification message comprises retransmission strategy indication information and is used for indicating the Internet of things equipment to retransmit the data according to the retransmission strategy indicated by the failure notification message.
The data collected by the internet of things device in this embodiment that fails the data check may fail any one of the conventional check, the digital signature check, and the cyclic redundancy check.
Optionally, when data fails to pass data verification, the server may further generate a log record for recording detailed information of data failed to pass data verification, which may specifically include, for example, identification information of the internet of things device that collects the data, time information of the data verification, a reason of data verification failure, data type information, and the like.
In this embodiment, when data acquired by the internet of things device fails to pass data verification, the server sends a failure notification message to the internet of things device, where the failure notification message includes retransmission policy indication information for indicating the internet of things device to retransmit the data according to a retransmission policy indicated by the failure notification message. Optionally, the retransmission policy indication information may be determined according to at least one of a reason for the check failure, a type of the data, and a priority of the data, for example. For example, if the reason that the data check fails is network congestion and the priority of the data indicates that the data has a low requirement on timeliness, the retransmission policy may be set to peak-shift transmission to reduce network pressure, and for example, the network idle period information counted according to the history record and the peak-shift transmission retransmission policy indication information may be sent to the internet of things device together.
Fig. 2 is a schematic application diagram of an embodiment of a data verification method provided in the present invention. As shown in fig. 2, in this embodiment, each data verification container is used to perform data verification on data collected by three pieces of internet-of-things equipment. The data check container carries out conventional check, digital signature check and cyclic redundancy check on the data acquired by the internet of things equipment in sequence, and only the data passing through all the checks can enter a subsequent data analysis processing flow. When new Internet of things equipment is accessed, and the existing data verification container cannot meet the data verification requirement, the data verification container is added to verify the data acquired by the Internet of things equipment; when the data acquired by the internet of things equipment connected with the data verification container is transmitted completely and is in an off-line state, the data verification container can be destroyed, and corresponding resources are released. It should be noted that fig. 2 is only one possible implementation manner of the embodiment of the present invention, and the numerical values are only examples and do not limit the present application.
In some embodiments, on the basis of any of the above embodiments, before counting the number of the internet of things devices accessing the server, the method provided by this embodiment may further include:
receiving an access request message sent by the Internet of things equipment, wherein the access request message comprises equipment coding information of the Internet of things equipment.
And determining whether the Internet of things equipment is allowed to access the server or not according to the equipment coding information.
In this embodiment, the server may store relevant information of the legitimate internet of things device in advance. The legal internet of things equipment can comprise the internet of things equipment which is legally registered, the internet of things equipment which is authorized by the server and the like. The related information may include device coding information, access right information, and the like of the internet of things device.
When the server receives the access request message of the internet of things equipment, the server acquires the equipment coding information contained in the internet of things equipment, compares the equipment coding information with the equipment coding information of the prestored legal internet of things equipment, and if the matching is successful, the internet of things equipment can be determined to be legal and can be accessed to the server; if the matching fails, the internet of things equipment can be determined to be illegal, and the internet of things equipment is refused to access the server.
In the data verification method provided by this embodiment, when the internet of things device accesses the server, an access request message including device coding information of the internet of things device and sent by the internet of things device is received, and whether the internet of things device is allowed to access the server is determined according to the device coding information in the access request message. Therefore, access of illegal Internet of things equipment can be effectively avoided, further illegal data attack can be effectively avoided, meanwhile, the data volume needing to be checked by the data checking server is reduced by filtering the illegal Internet of things equipment, and the efficiency and the speed of data checking are improved.
Fig. 3 is a schematic diagram of a data verification apparatus according to an embodiment of the present invention, which is only illustrated in fig. 3, and the embodiment of the present invention is not limited thereto. Fig. 3 is a schematic structural diagram of an embodiment of a data verification apparatus provided in the present invention. The data verification apparatus provided in this embodiment may be a network side device, such as a server, or may be a component used in the network side device, such as a chip, an integrated circuit, and the like. As shown in fig. 3, the data verification apparatus 30 provided in this embodiment may include a statistics module 301 and an adjustment module 302.
The counting module 301 is configured to count the number of internet of things devices accessing the server.
An adjusting module 302, configured to adjust the number of data verification containers according to the counted number of the internet of things devices accessing the server, where the data verification containers are used to verify data collected by at least one internet of things device.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 1, and the implementation principle and the technical effect are similar, which are not described herein again.
Optionally, the adjusting module 302 may be specifically configured to:
if the counted number of the internet of things equipment accessed to the server is larger than a first threshold value, the number of the data verification containers is increased according to the counted number of the internet of things equipment accessed to the server, and the first threshold value is determined according to the number of the data verification containers in the current server.
Optionally, the adjusting module 302 may be specifically configured to:
if the counted number of the internet of things equipment accessed to the server is smaller than a second threshold value, the number of the data verification containers is reduced according to the counted number of the internet of things equipment accessed to the server, and the second threshold value is determined according to the number of the data verification containers in the current server.
Optionally, the adjusting module 302 may be further specifically configured to:
and if the number of the Internet of things devices connected with the data verification container is reduced to a preset number, destroying the data verification container.
Optionally, the data verification container may be configured to perform, in sequence, conventional verification, digital signature verification, and cyclic redundancy verification on data acquired by at least one internet of things device, where the conventional verification is used to verify the record number, size, line number, and encoding information of the data.
Optionally, the data verification apparatus 30 may further include a sending module, configured to send a failure notification message to the internet of things device when the data acquired by the internet of things device fails in data verification, where the failure notification message includes retransmission policy indication information, and is used to instruct the internet of things device to perform data retransmission according to the retransmission policy indicated by the failure notification message.
Optionally, the data verification apparatus 30 may further include a receiving module and a verification module, where the receiving module is configured to receive an access request message sent by the internet of things device before counting the number of the internet of things devices accessing the server, where the access request message includes device coding information of the internet of things device; and the verification module is used for determining whether the Internet of things equipment is allowed to access the server or not according to the equipment coding information.
Fig. 4 is a schematic diagram of a server according to an embodiment of the present invention, which is only illustrated in fig. 4, and the embodiment of the present invention is not limited thereto. Fig. 4 is a schematic structural diagram of a server according to an embodiment of the present invention. As shown in fig. 4, the server 40 provided in this embodiment may include: memory 401, processor 402, and bus 403. The bus 403 is used for connecting the elements.
The memory 401 stores a computer program, and when the computer program is executed by the processor 402, the technical solution of the data verification method provided by any of the above-mentioned method embodiments can be implemented.
Wherein the memory 401 and the processor 402 are electrically connected directly or indirectly to realize data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines, such as bus 403. The memory 401 stores therein a computer program for implementing the data verification method, which includes at least one software functional module that can be stored in the memory 401 in the form of software or firmware, and the processor 402 executes various functional applications and data processing by running the software program and the module stored in the memory 401.
The Memory 401 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 401 is used for storing programs, and the processor 402 executes the programs after receiving the execution instructions. Further, the software programs and modules in the memory 401 may also include an operating system, which may include various software components and/or drivers for managing system tasks (e.g., memory management, storage device control, power management, etc.), and may communicate with various hardware or software components to provide an operating environment for other software components.
The processor 402 may be an integrated circuit chip having signal processing capabilities. The Processor 402 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and so on. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. It will be appreciated that the configuration of fig. 4 is merely illustrative and may include more or fewer components than shown in fig. 4 or have a different configuration than shown in fig. 4. The components shown in fig. 4 may be implemented in hardware and/or software.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, can implement the data verification method provided in any of the above method embodiments. The computer-readable storage medium in this embodiment may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, etc. that is integrated with one or more available media, and the available media may be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media (e.g., DVDs), or semiconductor media (e.g., SSDs), etc.
In the above embodiments, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules is only one logical division, and other divisions may be realized in practice, for example, a plurality of modules may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each module may exist alone physically, or two or more modules are integrated into one unit. The unit formed by the modules can be realized in a hardware form, and can also be realized in a form of hardware and a software functional unit.
The integrated module implemented in the form of a software functional module may be stored in a computer-readable storage medium. The software functional module is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present application.
The storage medium may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuits (ASIC). Of course, the processor and the storage medium may reside as discrete components in a terminal or server.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (9)
1. A method for data verification, comprising:
counting the number of the Internet of things devices accessed to the server; the statistics are performed in real time; or the method is carried out by taking a preset time interval as a statistical period;
adjusting the number of data verification containers according to the counted number of the Internet of things devices accessing the server, wherein the data verification containers are used for verifying data collected by at least one Internet of things device;
and if the number of the Internet of things devices connected with the data verification container is reduced to a preset number, destroying the data verification container.
2. The method of claim 1, wherein adjusting the number of data verification containers according to the counted number of internet of things devices accessing the server comprises:
if the counted number of the internet of things equipment accessed to the server is larger than a first threshold value, increasing the number of the data verification containers according to the counted number of the internet of things equipment accessed to the server, wherein the first threshold value is determined according to the number of the data verification containers in the server at present.
3. The method of claim 1, wherein adjusting the number of data verification containers according to the counted number of internet of things devices accessing the server comprises:
if the counted number of the internet of things equipment accessing the server is smaller than a second threshold value, reducing the number of the data verification containers according to the counted number of the internet of things equipment accessing the server, wherein the second threshold value is determined according to the number of the data verification containers in the server at present.
4. The method of claim 1, wherein the data verification container is configured to verify data collected by at least one internet of things device, and comprises:
the data check container is used for sequentially carrying out conventional check, digital signature check and cyclic redundancy check on data acquired by at least one Internet of things device, and the conventional check is used for checking the record number, the size, the line number and the coding information of the data.
5. The method according to any one of claims 1-4, further comprising:
if the data collected by the Internet of things equipment does not pass the data verification, sending a failure notification message to the Internet of things equipment, wherein the failure notification message comprises retransmission strategy indication information and is used for indicating the Internet of things equipment to retransmit the data according to the retransmission strategy indicated by the failure notification message.
6. The method of any of claims 1-4, wherein prior to the counting the number of Internet of things devices accessing the server, the method further comprises:
receiving an access request message sent by an Internet of things device, wherein the access request message comprises device coding information of the Internet of things device;
and determining whether the Internet of things equipment is allowed to access the server or not according to the equipment coding information.
7. A data verification apparatus, comprising:
the statistical module is used for counting the number of the Internet of things equipment accessed to the server; the statistics are performed in real time; or the method is carried out by taking a preset time interval as a statistical period;
the adjusting module is used for adjusting the number of data verification containers according to the counted number of the Internet of things devices accessed to the server, and the data verification containers are used for verifying data collected by at least one Internet of things device;
the adjustment module is further configured to: and if the number of the Internet of things devices connected with the data verification container is reduced to a preset number, destroying the data verification container.
8. A server, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the memory-stored computer-executable instructions causes the at least one processor to perform the data verification method of any of claims 1-6.
9. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, perform a data verification method as claimed in any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811322299.7A CN109560893B (en) | 2018-11-08 | 2018-11-08 | Data verification method and device and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811322299.7A CN109560893B (en) | 2018-11-08 | 2018-11-08 | Data verification method and device and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109560893A CN109560893A (en) | 2019-04-02 |
CN109560893B true CN109560893B (en) | 2022-04-15 |
Family
ID=65865805
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811322299.7A Active CN109560893B (en) | 2018-11-08 | 2018-11-08 | Data verification method and device and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109560893B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110310512B (en) * | 2019-07-10 | 2021-02-19 | 中国联合网络通信集团有限公司 | Parking lot positioning management method and system based on 5g Internet of things container technology |
CN110718052B (en) * | 2019-10-21 | 2020-12-29 | 上海米尺网络技术有限公司 | Wireless acquisition device and data acquisition method |
CN114980119B (en) * | 2020-12-02 | 2024-06-11 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for connecting equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764671A (en) * | 2008-12-23 | 2010-06-30 | 北大方正集团有限公司 | File transmission method and business processing method, equipment and system in server |
CN103237045A (en) * | 2013-02-22 | 2013-08-07 | 北方工业大学 | Parallel processing system and parallel processing method for large-scale real-time traffic data |
CN103068052B (en) * | 2013-01-17 | 2016-03-02 | 中国联合网络通信集团有限公司 | Dynamic resource allocation method, system and Portal server |
KR20170042946A (en) * | 2015-10-12 | 2017-04-20 | 에스케이텔레콤 주식회사 | Method for managing of buffer memory size and apparatus thereof |
CN107590632A (en) * | 2017-09-19 | 2018-01-16 | 北京瑞格瑞特生物科技有限公司 | A kind of management system and method, server for the transport of cell production inventory |
CN108345512A (en) * | 2018-03-19 | 2018-07-31 | 重庆金融资产交易所有限责任公司 | Data verification method, server and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453564B (en) * | 2016-10-18 | 2019-11-05 | 北京京东尚科信息技术有限公司 | The method, apparatus and system of elastic cloud distribution magnanimity request processing |
CN107666525B (en) * | 2017-09-08 | 2020-11-24 | 北京京东尚科信息技术有限公司 | Method and device for IP allocation of cluster container |
CN108427992B (en) * | 2018-03-16 | 2020-09-01 | 济南飞象信息科技有限公司 | Machine learning training system and method based on edge cloud computing |
-
2018
- 2018-11-08 CN CN201811322299.7A patent/CN109560893B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764671A (en) * | 2008-12-23 | 2010-06-30 | 北大方正集团有限公司 | File transmission method and business processing method, equipment and system in server |
CN103068052B (en) * | 2013-01-17 | 2016-03-02 | 中国联合网络通信集团有限公司 | Dynamic resource allocation method, system and Portal server |
CN103237045A (en) * | 2013-02-22 | 2013-08-07 | 北方工业大学 | Parallel processing system and parallel processing method for large-scale real-time traffic data |
KR20170042946A (en) * | 2015-10-12 | 2017-04-20 | 에스케이텔레콤 주식회사 | Method for managing of buffer memory size and apparatus thereof |
CN107590632A (en) * | 2017-09-19 | 2018-01-16 | 北京瑞格瑞特生物科技有限公司 | A kind of management system and method, server for the transport of cell production inventory |
CN108345512A (en) * | 2018-03-19 | 2018-07-31 | 重庆金融资产交易所有限责任公司 | Data verification method, server and storage medium |
Non-Patent Citations (1)
Title |
---|
"一种基于容器编排技术的资源运维系统的设计与实现";张勋等;《电信科学》;20180620(第6期);162-170 * |
Also Published As
Publication number | Publication date |
---|---|
CN109560893A (en) | 2019-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111414334B (en) | File fragment uploading method, device, equipment and storage medium based on cloud technology | |
CN109560893B (en) | Data verification method and device and server | |
CN110784461B (en) | Safe 6LoWPAN communication method and system based on block chain | |
US20220272105A1 (en) | Blockchain-based data detection method, apparatus, and computer-readable storage medium | |
CN109617824B (en) | Data acquisition method and device and server | |
CN111490981B (en) | Access management method and device, bastion machine and readable storage medium | |
CN111131221B (en) | Interface checking device, method and storage medium | |
WO2014106489A1 (en) | Method and system for processing browser crash information | |
WO2019179384A1 (en) | Communication method and related device | |
CN108390856B (en) | DDoS attack detection method and device and electronic equipment | |
CN110086780B (en) | Method and device for processing tampered transaction based on Ether house and storage medium | |
CN111371772A (en) | Intelligent gateway current limiting method and system based on redis and computer equipment | |
CN110661656B (en) | Block chain rapid consensus method and device | |
CN111159195A (en) | Data storage control method and equipment in block chain system | |
CN110049028A (en) | Monitor method, apparatus, computer equipment and the storage medium of domain control administrator | |
CN112232957A (en) | Transaction consensus method and device and electronic equipment | |
CN114788199A (en) | Data verification method and device | |
CN111586059B (en) | Block chain machine, block chain data access authentication method and computer readable storage medium | |
KR102393913B1 (en) | Apparatus and method for detecting abnormal behavior and system having the same | |
CN116455974A (en) | Transaction caching and ordering method, device, electronic equipment and storage medium | |
CN115081017A (en) | Large-field data calling method and system | |
CN113596600A (en) | Security management method, device, equipment and storage medium for live broadcast embedded program | |
CN109120714B (en) | Security data recovery method and system, and node server | |
CN107885618B (en) | Data monitoring method, device, equipment and storage medium based on network game | |
CN113591137B (en) | Block chain-based management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |