CN111274268A - Internet of things data transmission method, device, medium and electronic equipment - Google Patents

Internet of things data transmission method, device, medium and electronic equipment Download PDF

Info

Publication number
CN111274268A
CN111274268A CN202010044996.1A CN202010044996A CN111274268A CN 111274268 A CN111274268 A CN 111274268A CN 202010044996 A CN202010044996 A CN 202010044996A CN 111274268 A CN111274268 A CN 111274268A
Authority
CN
China
Prior art keywords
internet
things
data
target
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010044996.1A
Other languages
Chinese (zh)
Other versions
CN111274268B (en
Inventor
江洪洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202010044996.1A priority Critical patent/CN111274268B/en
Priority to PCT/CN2020/093594 priority patent/WO2021143025A1/en
Publication of CN111274268A publication Critical patent/CN111274268A/en
Application granted granted Critical
Publication of CN111274268B publication Critical patent/CN111274268B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • G06F16/275Synchronous replication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Abstract

The disclosure relates to the field of cloud transmission, and discloses a method, a device, a medium and electronic equipment for transmitting data of an internet of things. The method is executed by a first internet of things server side in a plurality of internet of things server sides, and comprises the following steps: receiving target data uploaded by target Internet of things equipment; determining whether the uploading of the target data is legal or not based on at least one second permission check data stored in the memory of the first internet of things server and the first permission check data; and if the uploading of the target data is determined to be legal, transmitting the Internet of things data in the target data to a data processing center of an Internet of things platform. Under the method, the permission verification efficiency and the data transmission efficiency during data transmission of the Internet of things are improved, and the memory consumption is reduced.

Description

Internet of things data transmission method, device, medium and electronic equipment
Technical Field
The disclosure relates to the technical field of cloud transmission, and in particular relates to a method, a device, a medium and electronic equipment for data transmission of an internet of things.
Background
When the internet of things platform interacts with the internet of things device, the platform is based on a specific internet of things Protocol, such as CoAP (Constrained Application Protocol). Such a transmission protocol specifies that a specific message belongs to a specific topic, which may be referred to as topic, and the service corresponding to the internet of things protocol processes information corresponding to the topic. In order to distinguish and process messages of different topics, corresponding materialized objects are generally constructed. At present, a general method adopted when processing information corresponding to topic is based on a structure similar to a tree (tree), and the method has at least the following defects: because the service corresponding to the internet of things protocol needs to be connected with the internet of things platform, the number of topics to be processed by the service may be rapidly increased, and corresponding object instantiation needs to be performed on the topics, so that a huge burden is caused to a memory if corresponding object instantiation is performed on all the topics, and the efficiency of querying the topics is reduced as the number of the topics increases.
Disclosure of Invention
In the technical field of cloud transmission, in order to solve the technical problems, the present disclosure aims to provide a method, an apparatus, a medium and an electronic device for transmitting data of an internet of things.
According to an aspect of the present disclosure, there is provided an internet of things data transmission method, the method being performed by a first internet of things server in a plurality of internet of things servers, the method including:
receiving target data uploaded by target Internet of things equipment, wherein the target data comprise Internet of things data and first permission verification data, and the target data are sent by the target Internet of things equipment according to a preset Internet of things protocol;
determining whether uploading of the target data is legal or not based on at least one second permission check data and the first permission check data which are stored in the memory of the first internet of things server, wherein the second permission check data are synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers;
and if the uploading of the target data is determined to be legal, transmitting the Internet of things data in the target data to a data processing center of an Internet of things platform.
According to another aspect of the present disclosure, there is provided an internet of things data transmission device, the device being located at a first internet of things server among a plurality of internet of things servers, the device including:
the receiving module is configured to receive target data uploaded by target Internet of things equipment, wherein the target data comprise Internet of things data and first permission verification data, and the target data are sent by the target Internet of things equipment according to a preset Internet of things protocol;
the determining module is configured to determine whether uploading of the target data is legal or not based on at least one second permission check data and the first permission check data, wherein the at least one second permission check data is stored in the memory of the first internet of things server, and the second permission check data is synchronized to the first internet of things server by a second internet of things server in the plurality of internet of things servers in advance;
the sending module is configured to send the internet of things data in the target data to a data processing center of an internet of things platform if the uploading of the target data is determined to be legal.
According to another aspect of the present disclosure, there is provided a computer readable program medium storing computer program instructions which, when executed by a computer, cause the computer to perform the method as previously described.
According to another aspect of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory having computer readable instructions stored thereon which, when executed by the processor, implement the method as previously described.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
the method for transmitting the data of the internet of things provided by the disclosure is executed by a first internet of things server side in a plurality of internet of things server sides, and comprises the following steps: receiving target data uploaded by target Internet of things equipment, wherein the target data comprise Internet of things data and first permission verification data, and the target data are sent by the target Internet of things equipment according to a preset Internet of things protocol; determining whether uploading of the target data is legal or not based on at least one second permission check data and the first permission check data which are stored in the memory of the first internet of things server, wherein the second permission check data are synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers; and if the uploading of the target data is determined to be legal, transmitting the Internet of things data in the target data to a data processing center of an Internet of things platform.
According to the method, after the target data are received, whether the uploading of the target data is legal or not is verified by utilizing second authority verification data which is synchronized in advance by the second internet-of-things server and stored in the memory of the first internet-of-things server, so that the time consumption of inquiring a database or a server is reduced, the verification efficiency is improved, on the basis, if the uploading of the target data is legal, namely the verification is passed, the internet-of-things data can be sent to an internet-of-things platform, the internet-of-things data transmission efficiency is improved, in addition, as the second authority verification data are stored in the memory, a virtual machine is not needed to create too many objects when the verification is carried out by utilizing the second authority verification data, and the consumption of the memory is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic diagram of a system architecture of an application of a data transmission method of the internet of things according to an exemplary embodiment;
fig. 2 is a flow chart illustrating a method of data transmission for the internet of things according to an example embodiment;
FIG. 3 is a flowchart detailing step 230 according to one embodiment shown in a corresponding embodiment in FIG. 2;
FIG. 4 is a flowchart illustrating steps prior to step 230 according to one embodiment illustrated in a corresponding embodiment in FIG. 2;
fig. 5 is a flowchart illustrating a second networking service end obtaining second permission check data according to an exemplary embodiment;
fig. 6 is a block diagram illustrating an internet of things data transmission device in accordance with an exemplary embodiment;
fig. 7 is a block diagram illustrating an example of an electronic device implementing the data transmission method for the internet of things according to an example embodiment;
fig. 8 illustrates a computer-readable storage medium for implementing the data transmission method of the internet of things according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
The disclosure first provides a data transmission method of the internet of things. The Internet of things (IoT), i.e., "Internet of things," is an information bearer based on the Internet, traditional telecommunication network, etc., which enables all common physical objects capable of being addressed independently to form an interconnected network, and is an extended and expanded network based on the Internet, and combines various information sensing devices with the Internet to form a huge network, thereby realizing the interconnection of people, machines and things at any time and any place. The data of the internet of things is data generated by common physical objects which can be independently addressed in the internet of things in a sensing, identifying and other modes. The common physical object is generally an internet of things device, such as an intelligent thermometer, an intelligent washing machine, an intelligent desk lamp and other internet of things devices with a data transmission function. The internet of things data transmission is a process of transmitting sensed or collected data to other terminals or equipment by the internet of things equipment, the internet of things data transmission method provided by the disclosure is a process of transmitting the sensed or collected data of the internet of things equipment to the internet of things platform, and the internet of things platform can provide support for a series of internet of things services such as connection communication among equipment, cloud collection of equipment data, data analysis and statistics, identity security authentication, equipment management and the like.
The implementation terminal of the present disclosure may be any device having an operation processing and communication function, which may be connected to an external device for receiving or sending data, and specifically may be a portable mobile device, such as a smart phone, a tablet computer, a notebook computer, a pda (personal Digital assistant), or the like, or may be a fixed device, such as a computer device, a field terminal, a desktop computer, a server, a workstation, or the like, or may be a set of multiple devices, such as a physical infrastructure of cloud computing or a server cluster.
Preferably, the implementation terminal of the present disclosure may be a physical infrastructure of a server or cloud computing.
Fig. 1 is a schematic diagram of a system architecture of an application of a data transmission method of the internet of things according to an exemplary embodiment. As shown in fig. 1, the system architecture includes an internet of things platform 120, a user terminal 150, and an internet of things device 140, where the internet of things platform 120 includes a plurality of internet of things servers 130 and an internet of things control center 110, the internet of things control center 110 includes a control center 111 and a database 112, the database 112 may be a data processing center of the internet of things platform 110, and an implementation terminal of the present disclosure is one of the plurality of internet of things servers 130. It can be seen that in this embodiment, the internet of things device 140 is an intelligent thermometer. When the data transmission method of the internet of things provided by the present disclosure is applied to the system architecture shown in fig. 1, a specific process may be as follows: a user accesses the control center 111 of the internet of things platform by using the user terminal 150 to register data, so as to obtain a product identifier (ProductKey), a device name (DeviceName) and a secret key (secret), and create a plurality of topics (topic) corresponding to the product identifier, the control center 111 of the internet of things platform writes the data into the database 112 for storage, and the user writes the data into the internet of things device 140 after obtaining the data; one of the internet of things servers 130 of the internet of things platform randomly sends a request for authority authentication of the internet of things devices to each internet of things device, when the internet of things device 140 receives the request, the internet of things server responds to the internet of things server, and sends three items of data including a product identifier, a device name and a timestamp and a first signature generated by using a secret key and the three items of data in a specific encryption manner to the internet of things server, the internet of things server analyzes all obtained data to obtain the product identifier, the device name, the timestamp and the first signature, then the internet of things server pulls the secret key which is stored before and corresponds to the product identifier from the database 112, encrypts the three items of data including the product identifier, the device name and the timestamp from the internet of things device 140 in the same encryption manner to obtain a second signature, when the first signature and the second signature are consistent, it is indicated that the internet of things device 140 is the owner of the product identifier sent by the internet of things device 140 and the internet of things device 140 has the secret key corresponding to the product identifier sent by the internet of things device, so that the authority authentication of the internet of things device 140 is passed, at this time, the internet of things server generates a time-efficient token (token), returns the token to the internet of things device 140, and sends the token and the product identifier to the database 112 for corresponding storage; next, the internet of things server synchronizes the token, the product identifier and the corresponding theme of the internet of things device 140 that passes the authority authentication to the memories of other internet of things servers in the plurality of internet of things servers 130 through the message queue, so that all the other internet of things servers have the ability to perform the authority verification on the internet of things device 140, when the internet of things device 140 receives a request for acquiring the acquired data from one of the other internet of things servers, the internet of things device 140 responds to the request, the token, the theme and the acquired data are returned to the requested internet of things server, the requested internet of things server determines whether the token is expired or not, then determines the product identifier corresponding to the token, further determines the theme corresponding to the product identifier, and compares the theme with the theme sent by the internet of things device 140, whether a theme consistent with the theme sent by the internet of things device 140 exists in the themes is determined, when the token is not expired and a theme consistent with the theme returned by the internet of things device 140 exists in the themes, the permission verification work on the internet of things device 140 is completed, and at this time, the internet of things device 140 is allowed to be sent to a data processing center of the internet of things platform 120 through a message queue, wherein the data processing center may be the database 112, for example. In this way, the whole process of sending the data collected by the internet of things device 140 to the internet of things platform 120 is realized.
In the related technology, tokens, themes, product identifiers and the like are all generally stored on an internet of things platform, for example, in a database of the internet of things platform, so that data acquired by internet of things equipment is acquired each time, when authority verification is performed, data (such as topic) used for verification is acquired from the internet of things platform, and a theme (topic) object is created and instantiated, so that a large amount of memory resources are occupied, the topic query efficiency is reduced, and the authority verification efficiency is further reduced due to increased time consumption for querying data from the internet of things platform; in the process, the data used for verification is synchronized into the memory of the corresponding internet of things server side, so that on one hand, a large number of theme objects do not need to be created and instantiated, and occupation of memory resources is reduced, and on the other hand, due to the fact that permission verification can be directly carried out in the memory, inquiry to an internet of things platform is not needed, inquiry time consumption is reduced, and permission verification efficiency is improved.
It should be noted that fig. 1 is only one embodiment of the disclosure, and although in the embodiment shown in fig. 1, a plurality of internet of things servers belong to an internet of things platform, data finally acquired by an internet of things device is sent to a database of the internet of things platform, the internet of things server sends the data to the internet of things platform through a message queue and one internet of things server synchronizes three items of data including a token, a product identifier and a corresponding theme with other internet of things servers, in other embodiments or specific applications, the plurality of internet of things servers may be located outside the internet of things platform, the data finally acquired by the internet of things device may be sent to any unit or module in the internet of things platform that can store data, the internet of things server may not send the data to the internet of things platform through the message queue, and one internet of things server may synchronize only two items of data including the product identifier and the corresponding theme with other internet of things servers, therefore, the present disclosure is not limited thereto, and the scope of the present disclosure should not be limited thereby.
Fig. 2 is a flowchart illustrating a data transmission method of the internet of things according to an exemplary embodiment. The internet of things data transmission method of the embodiment is executed by a first internet of things server in a plurality of internet of things servers, the first internet of things server may be a device of the same type as other internet of things servers or a device of a different type, the first internet of things server may be a server, as shown in fig. 2, and the method includes the following steps:
and step 220, receiving target data uploaded by the target Internet of things equipment.
The target data comprise internet of things data and first permission verification data, and the target data are sent by the target internet of things equipment according to a preset internet of things protocol.
The target internet of things equipment is the internet of things equipment which is used for sending data to the internet of things platform, and can be any equipment which can sense information and transmit the information, such as an intelligent desk lamp, an intelligent thermometer and the like. The action of uploading the target data by the target internet of things device can be performed by the target internet of things device actively sending the target data or by making a corresponding response according to an external request.
The preset internet of things Protocol may be any internet of things Protocol, for example, CoAP (constrained application Protocol), MQTT (Message queue Telemetry Transport Protocol), and the like.
The data of the internet of things is data generated when the target device of the internet of things runs, and for example, the data of the temperature sensed by the intelligent thermometer can be used. The first permission verification data is data used for performing permission verification on data uploaded by the target internet of things device, and may include data such as a token (token), a topic (topic), and the like.
Step 230, determining whether the uploading of the target data is legal or not based on at least one second permission check data stored in the memory of the first internet of things server and the first permission check data.
And the second permission verification data is synchronized to the first Internet of things server side in advance by a second Internet of things server side in the plurality of Internet of things server sides.
It may be clear that at least one second permission check data is pre-stored in the memory of the first internet of things server.
In one embodiment, the at least one second permission check data is stored in a queue of the first internet of things server memory.
In one embodiment, the queue follows the principle of FIFO (First Input First Output).
In one embodiment, the at least one second permission verification data is stored in a ConcurrentHashMap of the first internet of things server memory.
The ConcurrentHashMap is a concurrency container which realizes efficient data retrieval by adopting arrays, segments, segmented locks and the like.
The embodiment has the advantages that the second authority verification data is stored in the ConcurrentHashMap, and the query time complexity of the hash is O (1), so that the query matching time is reduced, the authority verification efficiency is improved, and the system performance can be greatly improved.
Determining whether the upload of the target data is legitimate is a process of determining whether to allow the upload of the target data.
In one embodiment, the second permission verification data includes a second token, a second product identifier corresponding to the second token, and at least one second topic class corresponding to the second product identifier, and the first permission verification data includes a first token, a first product identifier, and a first topic, and the specific steps of step 230 may be as shown in fig. 3.
Fig. 3 is a detailed flowchart of step 230 according to an embodiment shown in a corresponding embodiment of fig. 2, and referring to fig. 3, the method includes the following steps:
step 230', if there is one second permission check data in the at least one second permission check data that meets the first matching condition with the first permission check data, determining that the uploading of the target data is legal, otherwise, determining that the uploading of the target data is illegal.
Wherein the first matching condition with the first permission check data is: the second token is consistent with the first token, the second product identification corresponding to the second token is consistent with the first product identification, and one second theme class corresponding to the first theme exists in at least one second theme class corresponding to the second product identification.
The at least one second permission check data may include one second permission check data, or may include a plurality of second permission check data, and for each second permission check data in the at least one second permission check data, it may be determined whether a first matching condition with the first permission check data is satisfied.
In one embodiment, the token (token) is a randomly generated character string, the product identifier (ProductKey) is a globally unique identifier issued by the internet of things platform for the product, the topic (topic) class is a set of topics (topic) corresponding to the product identifier, and the topic (topic) is a UTF-8 character string and represents a message transmission intermediary.
In one embodiment, the topic class includes a product identification parameter value, a device name parameter, and a rights portion, and the topic corresponding to the topic class includes a product identification parameter value, a device name parameter value, and a rights portion.
For example,/0 WFDSF9324JQ/$ { YourDeviceName }/user/update may be a topic class, where 0WFDSF9324JQ is a product identification parameter value corresponding to a product identification (ProductKey), $ { YourDeviceName } is a device name parameter, which corresponds to a device name, and/user/update is a rights part; the/0 WFDSF9324JQ/device1/user/update may be a topic corresponding to the topic class, wherein the device1 is a device name parameter value corresponding to a device name (DeviceName), a topic corresponds to whether the internet of things device has a right to operate on the message of the topic, and the "ADFKK 45WERJ9SOD 92" may be a token.
In one embodiment, the theme class corresponds to the theme, that is, in the case that the product identifiers are consistent, the permission part in the theme class is the same as the permission part in the theme.
For example,/0 WFDSF9324JQ/$ { YourDeviceName }/user/update is a topic class,/0 WFDSF9324JQ/device1/user/update is a topic, since the device names of the two are "0 WFDSF9324 JQ" consistent, and the rights part in the topic class and the rights part in the topic are both/user/update, i.e., the rights part in the topic class is the same as the rights part in the topic, the topic class corresponds to the topic.
In one embodiment, the second theme class includes a product identification parameter, a device name parameter, and a rights component.
For example,/$ { YourProductKey }/device1/user/update may be a second topic class.
Since the second product identification (ProductKey) is a separate part in the second rights check data, the part in the second subject class corresponding to the ProductKey can be replaced by $ { youproductkey } without losing information in the second rights check data.
In one embodiment, the second token is a character string randomly generated by the second networking service end.
In the embodiment shown in fig. 3, whether the uploading of the target data is legal is determined by matching the token, the product identifier, and the topic class stored in the memory of the first internet of things server with the token, the product identifier, and the topic in the first permission check data, and since the information required for determining whether the uploading of the target data is legal is stored in the memory of the first internet of things server in advance, it is not necessary to query or request an external terminal to obtain the information, so that the check efficiency is improved.
In one embodiment, the determining whether the uploading of the target data is legal based on at least one second permission check data and the first permission check data stored in the memory of the first internet of things server side includes:
pulling a product identifier stored in advance corresponding to the first token from an Internet of things platform;
if the second product identification and the second right verification data which are consistent with the product identification meet a second matching condition with the first right verification data, determining that the target data are uploaded legally, otherwise, determining that the target data are not uploaded legally, wherein the second matching condition with the first right verification data is as follows: and one second theme class corresponding to the first theme exists in at least one second theme class corresponding to the second product identification.
In this embodiment, the second permission verification data synchronized in advance by the second internet-of-things server only includes the second product identifier and the corresponding at least one topic class, the corresponding product identifier needs to be pulled from the internet-of-things platform during verification, and compromise is achieved between the synchronized data amount of the second internet-of-things server and verification efficiency.
And 240, if the uploading of the target data is determined to be legal, sending the internet of things data in the target data to a data processing center of an internet of things platform.
The data processing center of the platform of the internet of things can be any one or more modules or units capable of storing data in the platform of the internet of things.
When the uploading of the target data is legal, the Internet of things data can be sent to the Internet of things platform, and the Internet of things platform carries out further operations such as statistics, processing and treatment.
In one embodiment, if it is determined that the uploading of the target data is legal, sending the internet of things data in the target data to a data processing center of an internet of things platform includes:
and if the uploading of the target data is determined to be legal, sending the Internet of things data in the target data to a second message queue, and sending the Internet of things data to a data processing center of an Internet of things platform through the second message queue.
The benefit of this embodiment is that, sending data through using the message queue, has alleviated the processing pressure of the data processing center of the platform of the internet of things, has guaranteed the reliability and the stability of the platform of the internet of things.
In one embodiment, the data processing center of the internet of things platform is a Redis server of the internet of things platform.
In one embodiment, the method further comprises:
receiving a theme class updating request sent by an internet of things platform through a third message queue, wherein the theme class updating request comprises a second product identifier and at least one second updating theme class corresponding to the second product identifier, the theme class updating request is sent to the plurality of internet of things servers by the internet of things platform through the third message queue, and the second updating theme class is submitted to the internet of things platform through a user terminal by a user of a target internet of things device identified by a second product;
determining at least one second theme class corresponding to the at least one second update theme class as a second target theme class in at least one second theme class corresponding to a second product identifier in the theme class update request stored locally;
and replacing the second target theme class with a corresponding second updating theme class.
At present, because a structure tree of a theme is generally loaded through Resource when a service is initialized, a topic type that can be processed by the service cannot be changed in a service running process, and if the service needs to be restarted, service processing efficiency is reduced.
In summary, according to the data transmission method of the internet of things provided in the embodiment of fig. 2, time consumption for querying the database or the server is reduced, so that verification efficiency and data transmission efficiency of the internet of things are improved, and consumption of the memory is reduced.
Fig. 4 is a flowchart illustrating steps prior to step 230 according to one embodiment illustrated in a corresponding embodiment of fig. 2. As shown in fig. 4, the method comprises the following steps:
step 210, receiving the second permission check data synchronized by a second internet of things server in the plurality of internet of things servers.
After the second permission verification data is obtained by the second internet-of-things server, the second internet-of-things server synchronizes to at least one internet-of-things server except the second internet-of-things server in the plurality of internet-of-things servers and is received by the first internet-of-things server as one internet-of-things server in the at least one internet-of-things server.
It should be noted that, although step 210 is located before step 220 in the present embodiment, as described in the description of fig. 4, step 210 may be performed at any step or time before step 230, such as after step 220, or even simultaneously with step 220, which is not limited by the present disclosure.
In one embodiment, the receiving the second permission check data synchronized by a second internet-of-things server of the plurality of internet-of-things servers includes:
receiving the second permission check data synchronized by a second networking server of the plurality of networking servers through a first message queue.
In an embodiment, the process of the second networking service end acquiring the second permission verification data may be as shown in fig. 5. Fig. 5 is a flowchart illustrating a second networked server side acquiring second permission check data according to an exemplary embodiment, where as shown in fig. 5, the method includes the following steps:
step 510, receiving authority authentication data sent by a target internet of things device, so as to perform authority authentication on the target internet of things device.
The authority authentication data comprises a product identifier, a device name, a timestamp and a password, the password is obtained by encrypting a hash parameter by target Internet of things equipment by using a preset hash algorithm and a pre-obtained device key, the hash parameter is generated based on the product identifier, the device name and the timestamp, and the product identifier, the device name and the pre-obtained device key are generated by the Internet of things platform after a user sends a registration request to the Internet of things platform through a user terminal and are written into the target Internet of things equipment after the user obtains the product identifier, the device name and the pre-obtained device key.
Since the steps shown in fig. 5 are a process for the second networked server to obtain the second permission check data, the embodiment of fig. 5 is executed by the second networked server.
The target internet of things equipment sends the authority authentication data to the second internet of things server side, wherein the authority authentication data can be sent by the target internet of things equipment actively, or can be sent by the target internet of things equipment responding to the request of the second internet of things server side.
The predetermined hashing algorithm may include, but is not limited to, MD5, SHA-1, SHA-2, SHA-256, and the like. The hash parameter may be generated based on the product identification, the device name, and the timestamp in a variety of ways, such as the product identification, the device name, and the timestamp may be combined in a predetermined manner as the hash parameter.
Step 520, parsing the authority authentication data to obtain a product identifier in the authority authentication data.
The product identification is organized in the authority authentication data according to a certain format, and the product identification can be obtained from the authority authentication data through analysis according to a specific mode.
Step 530, sending an equipment key obtaining request to the internet of things platform by using the product identifier to obtain an equipment key corresponding to the product identifier.
And 540, encrypting the hash parameter by using the acquired device key and a predetermined hash algorithm to obtain an encryption result.
And 550, if the encryption result is consistent with the password, randomly generating a second token corresponding to the second product identifier after the product identifier is taken as the second product identifier.
And when the encryption result is consistent with the password, the product identification sent by the target Internet of things equipment corresponds to the equipment key legally obtained during initial registration, and then the target Internet of things equipment is legal equipment.
And 560, pulling the theme class which is stored in advance and corresponds to the second product identifier from the internet of things platform to serve as at least one second theme class corresponding to the second product identifier.
And the second product identifier, the theme class stored corresponding to the second product identifier and the device key corresponding to the second product identifier are generated and stored by the internet of things platform after a user sends a registration request to the internet of things platform through a user terminal.
Step 570, using the second product identifier, at least one second topic class corresponding to the second product identifier, and a second token corresponding to the second product identifier as second permission check data.
In the embodiment of fig. 5, the second networking service end is allowed to acquire the second permission check data after the permission authentication is passed, so that the security is ensured.
In one embodiment, prior to step 560, the method may further comprise:
and determining whether the second networking service end stores the theme class corresponding to the second product identifier in advance, wherein the pulling of the theme class stored in advance corresponding to the second product identifier from the networking platform is performed under the condition that the second networking service end does not store the theme class corresponding to the second product identifier in advance.
In the embodiment, whether the corresponding theme class is stored or not is judged, the theme class is pulled from the internet of things platform under the condition that the corresponding theme class is not stored, and the theme class does not need to be pulled from the internet of things platform under the condition that the corresponding theme class is stored, so that the resource overhead is reduced to a certain extent.
The utility model also provides an thing networking data transmission device, the following is the device embodiment of this disclosure.
Fig. 6 is a block diagram illustrating an internet of things data transmission device according to an example embodiment. As shown in fig. 6, the apparatus 600 includes:
the receiving module 610 is configured to receive target data uploaded by a target internet of things device, where the target data includes internet of things data and first permission verification data, and the target data is sent by the target internet of things device according to a preset internet of things protocol;
a determining module 620, configured to determine whether uploading of the target data is legal or not based on at least one second permission check data and the first permission check data, which are stored in the memory of the first internet of things server, where the second permission check data is synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers;
the sending module 630 is configured to send the internet of things data in the target data to a data processing center of an internet of things platform if it is determined that the uploading of the target data is legal.
According to a third aspect of the present disclosure, there is also provided an electronic device capable of implementing the above method.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 700 according to this embodiment of the invention is described below with reference to fig. 7. The electronic device 700 shown in fig. 7 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 7, electronic device 700 is embodied in the form of a general purpose computing device. The components of the electronic device 700 may include, but are not limited to: the at least one processing unit 710, the at least one memory unit 720, and a bus 730 that couples various system components including the memory unit 720 and the processing unit 710.
Wherein the storage unit stores program code that can be executed by the processing unit 710 such that the processing unit 710 performs the steps according to various exemplary embodiments of the present invention described in the section "example methods" above in this specification.
The storage unit 720 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)721 and/or a cache memory unit 722, and may further include a read only memory unit (ROM) 723.
The memory unit 720 may also include programs/utilities 724 having a set (at least one) of program modules 725, such program modules 725 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 730 may be any representation of one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 700 may also communicate with one or more external devices 900 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 700, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 700 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 750. Also, the electronic device 700 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 760. As shown, the network adapter 760 communicates with the other modules of the electronic device 700 via the bus 730. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 700, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
According to a fourth aspect of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-mentioned method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above section "exemplary methods" of the present description, when said program product is run on the terminal device.
Referring to fig. 8, a program product 800 for implementing the above method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Furthermore, the above-described figures are merely schematic illustrations of processes involved in methods according to exemplary embodiments of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. An Internet of things data transmission method is characterized in that the method is executed by a first Internet of things server side in a plurality of Internet of things server sides, and the method comprises the following steps:
receiving target data uploaded by target Internet of things equipment, wherein the target data comprise Internet of things data and first permission verification data, and the target data are sent by the target Internet of things equipment according to a preset Internet of things protocol;
determining whether uploading of the target data is legal or not based on at least one second permission check data and the first permission check data which are stored in the memory of the first internet of things server, wherein the second permission check data are synchronized to the first internet of things server in advance by a second internet of things server in the plurality of internet of things servers;
and if the uploading of the target data is determined to be legal, transmitting the Internet of things data in the target data to a data processing center of an Internet of things platform.
2. The method of claim 1, wherein the at least one second permission check data is stored in a ConcurrentHashMap in the first IOT server.
3. The method of claim 1, wherein the second permission check data includes a second token, a second product identifier corresponding to the second token, and at least one second topic class corresponding to the second product identifier, the first permission check data includes a first token, a first product identifier, and a first topic, and the determining whether the uploading of the target data is legal based on the at least one second permission check data and the first permission check data stored in the first internet of things server memory comprises:
if one second permission verification data in the at least one second permission verification data meets a first matching condition with the first permission verification data, determining that the target data is uploaded legally, otherwise, determining that the target data is uploaded illegally, wherein the first matching condition with the first permission verification data is as follows: the second token is consistent with the first token, the second product identification corresponding to the second token is consistent with the first product identification, and one second theme class corresponding to the first theme exists in at least one second theme class corresponding to the second product identification.
4. The method of claim 1, wherein the second permission check data includes a second product identifier and at least one second topic class corresponding to the second product identifier, the first permission check data includes a first token, a first product identifier and a first topic, and the determining whether the uploading of the target data is legal based on the at least one second permission check data and the first permission check data stored in the first internet of things server side memory comprises:
pulling a product identifier stored in advance corresponding to the first token from an Internet of things platform;
if the second product identification and the second right verification data which are consistent with the product identification meet a second matching condition with the first right verification data, determining that the target data are uploaded legally, otherwise, determining that the target data are not uploaded legally, wherein the second matching condition with the first right verification data is as follows: and one second theme class corresponding to the first theme exists in at least one second theme class corresponding to the second product identification.
5. The method according to any one of claims 1 to 4, wherein before determining whether the uploading of the target data is legal based on the at least one second permission check data stored in the first IOT server memory and the first permission check data, the method further comprises:
receiving second permission check data synchronized by a second networking server in the plurality of Internet of things servers, wherein the second permission check data are obtained by the second networking server, are synchronized to at least one Internet of things server except the second networking server in the plurality of Internet of things servers by the second networking server, and are received by the first Internet of things server as one Internet of things server in the at least one Internet of things server.
6. The method according to claim 1, wherein the second permission verification data is obtained by the second networking service end by:
receiving authority authentication data sent by target Internet of things equipment to perform authority authentication on the target Internet of things equipment, wherein the authority authentication data comprise a product identifier, an equipment name, a timestamp and a password, the password is obtained by encrypting a hash parameter by the target Internet of things equipment by using a preset hash algorithm and a pre-obtained equipment key, the hash parameter is generated based on the product identifier, the equipment name and the timestamp, the product identifier, the equipment name and the pre-obtained equipment key are generated by an Internet of things platform after a user sends a registration request to the Internet of things platform through a user terminal, and the product identifier, the equipment name and the pre-obtained equipment key are written into the target Internet of things equipment by the user after the user obtains the product identifier, the equipment name and the pre-obtained equipment key;
analyzing the authority authentication data to obtain a product identifier in the authority authentication data;
sending an equipment key acquisition request to an Internet of things platform by using the product identifier so as to acquire an equipment key corresponding to the product identifier;
encrypting the hash parameter by using the acquired device key and a preset hash algorithm to obtain an encryption result;
if the encryption result is consistent with the password, after the product identification is taken as a second product identification, a second token corresponding to the second product identification is randomly generated;
pulling a theme class which is stored in advance and corresponds to the second product identification from the Internet of things platform to serve as at least one second theme class corresponding to the second product identification, wherein the second product identification, the theme class which is stored in correspondence to the second product identification and an equipment key corresponding to the second product identification are generated and stored by the Internet of things platform after a user sends a registration request to the Internet of things platform through a user terminal;
and taking the second product identification, at least one second subject class corresponding to the second product identification and a second token corresponding to the second product identification as second permission verification data.
7. The method of claim 1, wherein if it is determined that the uploading of the target data is legal, sending the internet of things data in the target data to a data processing center of an internet of things platform comprises:
and if the uploading of the target data is determined to be legal, sending the Internet of things data in the target data to a second message queue, and sending the Internet of things data to a data processing center of an Internet of things platform through the second message queue.
8. The utility model provides a thing networking data transmission device, its characterized in that, the device is located the first thing networking service end in a plurality of thing networking service ends, the device includes:
the receiving module is configured to receive target data uploaded by target Internet of things equipment, wherein the target data comprise Internet of things data and first permission verification data, and the target data are sent by the target Internet of things equipment according to a preset Internet of things protocol;
the determining module is configured to determine whether uploading of the target data is legal or not based on at least one second permission check data and the first permission check data, wherein the at least one second permission check data is stored in the memory of the first internet of things server, and the second permission check data is synchronized to the first internet of things server by a second internet of things server in the plurality of internet of things servers in advance;
the sending module is configured to send the internet of things data in the target data to a data processing center of an internet of things platform if the uploading of the target data is determined to be legal.
9. A computer-readable program medium, characterized in that it stores computer program instructions which, when executed by a computer, cause the computer to perform the method according to any one of claims 1 to 7.
10. An electronic device, characterized in that the electronic device comprises:
a processor;
a memory having stored thereon computer readable instructions which, when executed by the processor, implement the method of any of claims 1 to 7.
CN202010044996.1A 2020-01-15 2020-01-15 Internet of things data transmission method and device, medium and electronic equipment Active CN111274268B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010044996.1A CN111274268B (en) 2020-01-15 2020-01-15 Internet of things data transmission method and device, medium and electronic equipment
PCT/CN2020/093594 WO2021143025A1 (en) 2020-01-15 2020-05-30 Internet-of-things data transmission method and apparatus, and medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010044996.1A CN111274268B (en) 2020-01-15 2020-01-15 Internet of things data transmission method and device, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN111274268A true CN111274268A (en) 2020-06-12
CN111274268B CN111274268B (en) 2023-09-05

Family

ID=70997246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010044996.1A Active CN111274268B (en) 2020-01-15 2020-01-15 Internet of things data transmission method and device, medium and electronic equipment

Country Status (2)

Country Link
CN (1) CN111274268B (en)
WO (1) WO2021143025A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113852639A (en) * 2021-09-29 2021-12-28 中国电信股份有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN114629821A (en) * 2020-12-10 2022-06-14 新智云数据服务有限公司 Internet of things usage data generation method, device, equipment and medium
CN115357000A (en) * 2022-10-19 2022-11-18 东方合智数据科技(广东)有限责任公司 Production parameter issuing method, device, equipment and storage medium
WO2023098816A1 (en) * 2021-12-02 2023-06-08 中兴通讯股份有限公司 Device communication method and apparatus based on mqtt protocol

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114726918B (en) * 2022-02-15 2024-04-02 深圳Tcl新技术有限公司 Internet of things cross-network communication method, device, equipment and storage medium
CN115002228B (en) * 2022-05-31 2023-12-26 杭州数梦工场科技有限公司 Service cascade calling method and device, electronic equipment and storage medium
CN115242499B (en) * 2022-07-21 2024-03-01 中国平安人寿保险股份有限公司 Network request method, network request device, electronic device, and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150295930A1 (en) * 2014-04-15 2015-10-15 Level 3 Communications, Llc Device registration, authentication, and authorization system and method
WO2017204961A1 (en) * 2016-05-27 2017-11-30 Mastercard International Incorporated Systems and methods for location data verification
CN108509156A (en) * 2018-04-04 2018-09-07 腾讯科技(深圳)有限公司 Method for reading data, device, equipment and system
CN108632231A (en) * 2017-03-24 2018-10-09 中移(杭州)信息技术有限公司 A kind of internet of things equipment, Internet of Things authentication platform, authentication method and system
CN109474606A (en) * 2018-12-04 2019-03-15 平安科技(深圳)有限公司 Document transmission method, device, computer equipment and storage medium
CN110598431A (en) * 2019-09-05 2019-12-20 彩讯科技股份有限公司 Internet of things data processing method and device, server and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209522B (en) * 2015-04-30 2019-08-02 东莞市星东升实业有限公司 Token networking construction method based on token protocol
US20190266278A1 (en) * 2018-02-26 2019-08-29 Altibase Corp. IoT Data Management System and Method
CN110113207A (en) * 2019-05-08 2019-08-09 广州创想云科技有限公司 A kind of method for updating protocol based on Internet of Things, device, equipment and storage medium
CN110300114A (en) * 2019-07-04 2019-10-01 苏州大学 A kind of synthesis Design of meteorological data collection based on NB-IoT communication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150295930A1 (en) * 2014-04-15 2015-10-15 Level 3 Communications, Llc Device registration, authentication, and authorization system and method
WO2017204961A1 (en) * 2016-05-27 2017-11-30 Mastercard International Incorporated Systems and methods for location data verification
CN108632231A (en) * 2017-03-24 2018-10-09 中移(杭州)信息技术有限公司 A kind of internet of things equipment, Internet of Things authentication platform, authentication method and system
CN108509156A (en) * 2018-04-04 2018-09-07 腾讯科技(深圳)有限公司 Method for reading data, device, equipment and system
CN109474606A (en) * 2018-12-04 2019-03-15 平安科技(深圳)有限公司 Document transmission method, device, computer equipment and storage medium
CN110598431A (en) * 2019-09-05 2019-12-20 彩讯科技股份有限公司 Internet of things data processing method and device, server and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114629821A (en) * 2020-12-10 2022-06-14 新智云数据服务有限公司 Internet of things usage data generation method, device, equipment and medium
CN114629821B (en) * 2020-12-10 2023-11-10 新智云数据服务有限公司 Internet of things consumption data generation method, device, equipment and medium
CN113852639A (en) * 2021-09-29 2021-12-28 中国电信股份有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN113852639B (en) * 2021-09-29 2023-05-26 中国电信股份有限公司 Data processing method, device, electronic equipment and computer readable storage medium
WO2023098816A1 (en) * 2021-12-02 2023-06-08 中兴通讯股份有限公司 Device communication method and apparatus based on mqtt protocol
CN115357000A (en) * 2022-10-19 2022-11-18 东方合智数据科技(广东)有限责任公司 Production parameter issuing method, device, equipment and storage medium

Also Published As

Publication number Publication date
WO2021143025A1 (en) 2021-07-22
CN111274268B (en) 2023-09-05

Similar Documents

Publication Publication Date Title
CN111274268B (en) Internet of things data transmission method and device, medium and electronic equipment
US10073916B2 (en) Method and system for facilitating terminal identifiers
CN108289098B (en) Authority management method and device of distributed file system, server and medium
CN110933163A (en) Block chain contract deployment method, device, equipment and storage medium
CN111783075A (en) Authority management method, device and medium based on secret key and electronic equipment
EP4216077A1 (en) Blockchain network-based method and apparatus for data processing, and computer device
CN111460394A (en) Copyright file verification method and device and computer readable storage medium
CN111629063A (en) Block chain based distributed file downloading method and electronic equipment
US20110154015A1 (en) Method For Segmenting A Data File, Storing The File In A Separate Location, And Recreating The File
CN114428661A (en) Mirror image management method and device
CN111339193B (en) Category encoding method and device
CN111444542A (en) Data processing method, device and storage medium for copyright file
CN110502888A (en) A kind of mobile office method of the mobile software white list mechanism based on credible measurement
CN110851853A (en) Data isolation method and device, computer equipment and storage medium
CN113784354B (en) Request conversion method and device based on gateway
CN112448909A (en) Electronic lock management method, device, system and storage medium
CN113434824B (en) Software service authorization management method, device, equipment and storage medium
WO2022245291A2 (en) Method and apparatus for managing resources, computer device and storage medium
CN113595962B (en) Safety control method and device and safety control equipment
CN113364821B (en) Function service access method, equipment and storage medium
CN111950031A (en) Block chain-based distributed data management method, terminal device and storage medium
CN112732789A (en) Searchable encryption method based on block chain and electronic equipment
CN115086958A (en) Equipment identity authentication method, device, terminal, authentication node and storage medium
CN112565211B (en) Block chain network service platform, information processing method, equipment and storage medium
CN116032519B (en) Data processing method, apparatus and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant