CN112714119A - Internet of things data transmission method and system - Google Patents

Internet of things data transmission method and system Download PDF

Info

Publication number
CN112714119A
CN112714119A CN202011553388.XA CN202011553388A CN112714119A CN 112714119 A CN112714119 A CN 112714119A CN 202011553388 A CN202011553388 A CN 202011553388A CN 112714119 A CN112714119 A CN 112714119A
Authority
CN
China
Prior art keywords
transmission
plug
authentication service
internet
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011553388.XA
Other languages
Chinese (zh)
Inventor
丰磊
李云祥
王文霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011553388.XA priority Critical patent/CN112714119A/en
Publication of CN112714119A publication Critical patent/CN112714119A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides a method and a system for transmitting data of the internet of things. Because the difference between the adjacent transmission objects is small, the differential transmission data in the current transmission object is obtained by comparing the current transmission object with the corresponding associated key transmission object, and only the differential transmission data between the current transmission object and the corresponding associated key transmission object is edited to be sent to obtain the edited transmission node data, so that the size of the whole transmission candidate data can be reduced.

Description

Internet of things data transmission method and system
Technical Field
The application relates to the technical field of Internet of things, in particular to a data transmission method and system of the Internet of things.
Background
Since the transmission object is a continuous transmission process, how to reduce the size of the transmission candidate data and improve the transmission efficiency is an urgent technical problem to be solved.
Disclosure of Invention
In order to overcome at least the above disadvantages in the prior art, the present application aims to provide a method and a system for transmitting data of the internet of things, wherein a transmission object is a continuous transmission process, and edited transmission node data corresponding to the transmission object is obtained by editing differential transmission data to be transmitted, so that the size of transmission candidate data can be reduced. Because the difference between the adjacent transmission objects is small, the differential transmission data in the current transmission object is obtained by comparing the current transmission object with the corresponding associated key transmission object, and only the differential transmission data between the current transmission object and the corresponding associated key transmission object is edited to be sent to obtain the edited transmission node data, so that the size of the whole transmission candidate data can be reduced.
In a first aspect, the application provides an internet of things data transmission method, which is applied to a server, wherein the server is in communication connection with a plurality of internet of things terminal devices, and the method includes:
acquiring an updated authentication service after an authentication service plug-in is updated for the target authentication service of each internet of things authentication project partition;
acquiring a transmission object set corresponding to a task to be transmitted of the terminal equipment of the Internet of things on the basis of the update authentication service;
when the transmission object in the transmission object set is a non-key transmission object, performing to-be-sent editing on the differential transmission data between the transmission object and the corresponding associated key transmission object to obtain edited transmission node data corresponding to the transmission object, and generating transmission candidate data corresponding to the task to be transmitted according to the edited transmission node data corresponding to each transmission object in the transmission object set;
and when the transmission object in the transmission object set is a key transmission object, directly carrying out to-be-sent editing on the transmission object to obtain edited transmission node data corresponding to the transmission object.
In one possible design, the obtaining a set of transmission objects corresponding to the task to be transmitted includes:
acquiring a task to be transmitted, and analyzing the task to be transmitted;
and intercepting the transmission object fragments corresponding to the tasks to be transmitted in sequence to obtain a transmission object set corresponding to the tasks to be transmitted.
In one possible embodiment, the differential transmission data is obtained by:
acquiring transmission fragment data of each transmission fragment in an associated key transmission object corresponding to the transmission object;
acquiring transmission fragment data of each transmission fragment in the transmission object;
comparing the transmission fragment data of the transmission fragments at the same position, and determining the difference transmission fragments in the transmission object;
and determining the difference transmission data in the transmission object according to the difference transmission segment.
In one possible design, the distinct transmission data is a structured transmission segment region, and the method further includes:
when the difference between the fragment data amount of the structured transmission fragment region and the fragment data amount of the transmission object is smaller than a preset threshold value, determining that the transmission object is a key transmission object;
when the difference between the fragment data amount of the structured transmission fragment region and the fragment data amount of the transmission object is greater than a preset threshold value, determining that the transmission object is a non-key transmission object.
In one possible design, the method further includes:
selecting a first transmission object in the transmission object set as a key transmission object;
and taking the first transmission object as an initial transmission object, and taking the transmission objects with preset quantity at intervals as key transmission objects in the transmission object set.
In one possible design, the distinct transmission data is a structured transmission segment region, and the method further includes:
determining a transmission fragment data field, a transmission fragment data partition and a transmission node position of an initial transmission fragment in the structured transmission fragment region corresponding to the structured transmission fragment region;
and storing the transmission fragment data field, the transmission fragment data partition and the transmission node position of the initial transmission fragment into transmission node data information corresponding to the editing transmission node data.
In one possible design, the method further includes:
dividing the transmission object into an application program transmission object and a program data channel transmission object;
synthesizing the application program transmission object and the program data channel transmission object to obtain a synthesized transmission object;
and editing the composite transmission object to be sent to obtain edited transmission node data corresponding to the transmission object.
In one possible design, the method further includes:
task characteristic data of the task to be transmitted are obtained, wherein the task characteristic data comprise task label attribute data and task content data;
and storing the task label attribute data and the task content data according to a data structure of a target format to obtain transmission candidate data corresponding to the task to be transmitted.
In one possible design, the step of obtaining an updated authentication service after an authentication service plug-in is updated for a target authentication service of each internet of things authentication project partition includes:
acquiring a target-initiated IOT authentication service plug-in and a target-comparison IOT authentication service plug-in of a target authentication service added by the IOT terminal device, wherein the target-initiated IOT authentication service plug-in comprises a comparison IOT authentication service plug-in a comparison IOT authentication service plug-in set of the target authentication service, the target-comparison IOT authentication service plug-in comprises a comparison IOT authentication service plug-in selected by the target authentication service from the comparison IOT authentication service plug-in set according to the target-initiated IOT authentication service plug-in, plug-in adaptation information is predefined between any adaptation IOT authentication service plug-in the adaptation IOT authentication service plug-in set and any comparison IOT authentication service plug-in the comparison IOT authentication service plug-in set, and the plug-in adaptation information is used for identifying the comparison IOT authentication service plug-in the adaptation authentication service plug-in and plug-in adaptation degree;
determining candidate cooperation information of the target authentication business service based on plug-in adaptation information between the selected target comparison Internet of things authentication business plug-in and the target initiation Internet of things authentication business plug-in, wherein the candidate cooperation information represents plug-in adaptation degree of the selected first similar comparison Internet of things authentication business plug-in, and the first similar comparison Internet of things authentication business plug-in is the comparison Internet of things authentication business plug-in meeting plug-in adaptation degree requirement with plug-in adaptation degree of the target initiation Internet of things authentication business plug-in;
determining an internet of things authentication project partition to which the target authentication service belongs based on the candidate collaborative information of the target authentication service;
and updating the authentication service plug-in for the target authentication service of each authentication project partition of the Internet of things based on the acquired authentication service plug-in updating information.
In a second aspect, an embodiment of the present application further provides an internet of things data transmission device, which is applied to a server, where the server is in communication connection with a plurality of terminal devices of the internet of things, and the device includes:
the first acquisition module is used for acquiring an updated authentication service after an authentication service plug-in is updated for a target authentication service of each Internet of things authentication project partition;
the second acquisition module is used for acquiring a transmission object set corresponding to a task to be transmitted of the terminal equipment of the internet of things based on the update authentication service;
the first editing module is used for editing to-be-sent difference transmission data between the transmission object and the corresponding associated key transmission object when the transmission object in the transmission object set is a non-key transmission object, so as to obtain edited transmission node data corresponding to the transmission object, and generating transmission candidate data corresponding to the task to be transmitted according to the edited transmission node data corresponding to each transmission object in the transmission object set;
and the second editing module is used for directly editing the transmission object to be sent when the transmission object in the transmission object set is a key transmission object, so as to obtain the edited transmission node data corresponding to the transmission object.
In a third aspect, an embodiment of the present application further provides an internet of things data transmission system, where the internet of things data transmission system includes a server and a plurality of internet of things terminal devices in communication connection with the server;
the server is configured to:
acquiring an updated authentication service after an authentication service plug-in is updated for the target authentication service of each internet of things authentication project partition;
acquiring a transmission object set corresponding to a task to be transmitted of the terminal equipment of the Internet of things on the basis of the update authentication service;
when the transmission object in the transmission object set is a non-key transmission object, performing to-be-sent editing on the differential transmission data between the transmission object and the corresponding associated key transmission object to obtain edited transmission node data corresponding to the transmission object, and generating transmission candidate data corresponding to the task to be transmitted according to the edited transmission node data corresponding to each transmission object in the transmission object set;
and when the transmission object in the transmission object set is a key transmission object, directly carrying out to-be-sent editing on the transmission object to obtain edited transmission node data corresponding to the transmission object.
In a fourth aspect, an embodiment of the present application further provides a server, where the server includes a processor, a machine-readable storage medium, and a network interface, where the machine-readable storage medium, the network interface, and the processor are connected through a bus system, the network interface is configured to be communicatively connected with at least one terminal device of the internet of things, the machine-readable storage medium is configured to store a program, an instruction, or a code, and the processor is configured to execute the program, the instruction, or the code in the machine-readable storage medium to perform the data transmission method of the internet of things in any one of the possible implementations of the first aspect or the first aspect.
In a fifth aspect, an embodiment of the present application provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed, the computer is caused to execute the data transmission method of the internet of things in the first aspect or any one of the possible implementation manners of the first aspect.
Based on any one of the above aspects, in the present application, since the transmission object is a continuous transmission process, the edited transmission node data corresponding to the transmission object is obtained by performing to-be-sent editing on the differential transmission data, and the size of the transmission candidate data can be reduced. Because the difference between the adjacent transmission objects is small, the differential transmission data in the current transmission object is obtained by comparing the current transmission object with the corresponding associated key transmission object, and only the differential transmission data between the current transmission object and the corresponding associated key transmission object is edited to be sent to obtain the edited transmission node data, so that the size of the whole transmission candidate data can be reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that need to be called in the embodiments are briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic view of an application scenario of an internet of things data transmission system provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of a data transmission method of the internet of things according to an embodiment of the present application;
fig. 3 is a schematic functional module diagram of an internet of things data transmission device provided in the embodiment of the present application;
fig. 4 is a schematic block diagram of structural components of a server for implementing the data transmission method of the internet of things according to the embodiment of the present application.
Detailed description of the invention
The present application will now be described in detail with reference to the drawings, and the specific operations in the method embodiments may also be applied to the apparatus embodiments or the system embodiments.
Fig. 1 is an interaction diagram of an internet of things data transmission system 10 according to an embodiment of the present application. The internet of things data transmission system 10 can include a server 100 and an internet of things terminal device 200 communicatively connected to the server 100. The internet of things data transmission system 10 shown in fig. 1 is only one possible example, and in other possible embodiments, the internet of things data transmission system 10 may include only a part of the components shown in fig. 1 or may also include other components.
In this embodiment, the server 100 and the internet of things terminal device 200 in the internet of things data transmission system 10 may execute the internet of things data transmission method described in the following method embodiment in a matching manner, and the detailed description of the execution steps of the server 100 and the internet of things terminal device 200 may be compared with the following method embodiment.
In order to solve the technical problem in the foregoing background, fig. 2 is a schematic flow chart of the data transmission method of the internet of things provided in the embodiment of the present application, and the data transmission method of the internet of things provided in the embodiment may be executed by the server 100 shown in fig. 1, and the data transmission method of the internet of things is described in detail below.
Step S110, obtaining the updated authentication service after the authentication service plug-in is updated for the target authentication service of each Internet of things authentication project partition.
And step S120, acquiring a transmission object set corresponding to the task to be transmitted of the terminal equipment of the Internet of things based on the updating authentication service.
Step S130, when the transmission object in the transmission object set is a non-key transmission object, the difference transmission data between the transmission object and the corresponding associated key transmission object is edited to be sent, the edited transmission node data corresponding to the transmission object is obtained, and the transmission candidate data corresponding to the task to be transmitted is generated according to the edited transmission node data corresponding to each transmission object in the transmission object set.
Step S140, when the transmission object in the transmission object set is a key transmission object, directly performing to-be-sent editing on the transmission object to obtain edited transmission node data corresponding to the transmission object.
Based on the above steps, since the transmission object is a continuous transmission process, the edited transmission node data corresponding to the transmission object is obtained by editing the differential transmission data to be sent, so that the size of the transmission candidate data can be reduced. Because the difference between the adjacent transmission objects is small, the differential transmission data in the current transmission object is obtained by comparing the current transmission object with the corresponding associated key transmission object, and only the differential transmission data between the current transmission object and the corresponding associated key transmission object is edited to be sent to obtain the edited transmission node data, so that the size of the whole transmission candidate data can be reduced.
In a possible design, in the process of obtaining the transmission object set corresponding to the task to be transmitted, the task to be transmitted may be specifically obtained, the task to be transmitted is analyzed, and then the transmission object segments corresponding to the task to be transmitted are sequentially intercepted, so as to obtain the transmission object set corresponding to the task to be transmitted.
In one possible embodiment, the differential transmission data is obtained by:
the method comprises the steps of obtaining transmission fragment data of each transmission fragment in an associated key transmission object corresponding to a transmission object, then obtaining the transmission fragment data of each transmission fragment in the transmission object, comparing the transmission fragment data of the transmission fragments at the same position, determining a difference transmission fragment in the transmission object, and accordingly determining the difference transmission data in the transmission object according to the difference transmission fragment.
In one possible design, in the process of determining the key transmission object, the transmission data is distinguished as a structured transmission segment region, so that when a difference between a segment data amount of the structured transmission segment region and a segment data amount of the transmission object is less than a preset threshold value, the transmission object is determined as the key transmission object. And when the difference between the fragment data amount of the structured transmission fragment region and the fragment data amount of the transmission object is greater than a preset threshold value, determining that the transmission object is a non-key transmission object.
In one possible design, in the process of determining the key transmission object, the first transmission object in the transmission object set may also be selected as the key transmission object. Then, the first transmission object is taken as the initial transmission object, and the transmission objects with preset quantity at intervals are taken as the key transmission objects in the transmission object set.
In a possible design, the differentiated transmission data may specifically be a structured transmission segment region, and therefore, a transmission segment data field, a transmission segment data partition, and a transmission node position of an initial transmission segment in the structured transmission segment region corresponding to the structured transmission segment region may also be determined, and then the transmission node positions of the transmission segment data field, the transmission segment data partition, and the initial transmission segment are stored in transmission node data information corresponding to the edited transmission node data.
In a possible design, the embodiment may further divide the transmission object into an application transmission object and a program data channel transmission object, and then synthesize the application transmission object and the program data channel transmission object to obtain a synthesized transmission object, so as to perform to-be-sent editing on the synthesized transmission object to obtain edited transmission node data corresponding to the transmission object.
In a possible design, the embodiment may further obtain task characteristic data of the task to be transmitted, where the task characteristic data includes task tag attribute data and task content data. And then, storing the task label attribute data and the task content data according to a data structure of a target format to obtain transmission candidate data corresponding to the task to be transmitted.
In a possible design, for step S110, when obtaining an updated authentication service after performing authentication service plug-in update on the target authentication service of each internet of things authentication project partition, the following sub-steps may be implemented.
And a substep S111, obtaining a target initiating Internet of things authentication service plug-in of the target authentication service added by the Internet of things terminal equipment and comparing the target initiating Internet of things authentication service plug-in with the target.
In this embodiment, the target-initiated internet-of-things authentication service plug-in may include an adaptation internet-of-things authentication service plug-in an adaptation internet-of-things authentication service plug-in set of the target-initiated internet-of-things authentication service plug-in. The target-specific internet of things authentication service plug-in may include a specific internet of things authentication service plug-in selected by the target authentication service from a specific set of specific internet of things authentication service plug-ins according to the target. The target authentication business service may refer to a program used in the cloud for performing care monitoring. In some possible embodiments, the process of selecting, by the target authentication service, the comparative internet-of-things authentication service plugin from the comparative internet-of-things authentication service plugin set according to the target initiating internet-of-things authentication service plugin may be a process of matching, by the target authentication service, the comparative internet-of-things authentication service plugin according to a service plugin update requirement or a service plugin update condition of the target initiating internet-of-things authentication service plugin.
In this embodiment, an internet of things authentication service plug-in may refer to an operation example of an information calling process related to various nursing functions, for example, an information calling process of one-time function operation, which may be understood as an internet of things authentication service plug-in.
In this embodiment, plug-in adaptation information is predefined between any one of the adaptation internet of things authentication service plug-in sets and any one of the comparison internet of things authentication service plug-in sets, and the plug-in adaptation information can be used to identify a plug-in adaptation degree between the adaptation internet of things authentication service plug-in and the comparison internet of things authentication service plug-in. For example, the plug-in adaptation degree may refer to a degree of similarity of the operation logic between the adapted internet of things authentication service plug-in and the comparable internet of things authentication service plug-in under the relevant functional protocol, such as a degree of similarity of the operation resources, and the definition of the specific degree of similarity may determine a coincidence rate of some parameters (e.g., a coincidence rate of the operation resources), or a proximity (e.g., a difference of the operation resources, etc.), which is not limited in detail herein.
Step S112, determining candidate cooperative information of the target authentication business service based on the plug-in adaptation information between the selected target comparison IOT authentication business plug-in and the target initiation IOT authentication business plug-in, wherein the candidate cooperative information represents the plug-in adaptation degree of the selected first similar comparison IOT authentication business plug-in.
In this embodiment, the first similar comparison internet of things authentication service plug-in is a comparison internet of things authentication service plug-in meeting the plug-in adaptation requirement with the plug-in adaptation degree of the target initiating internet of things authentication service plug-in. The plug-in suitability requirement may refer to whether the plug-in suitability reaches a relevance threshold.
Step S113, based on the candidate collaborative information of the target authentication service, determining the Internet of things authentication project partition to which the target authentication service belongs.
In this embodiment, by determining the internet of things authentication project partition to which the target authentication service belongs, a subsequent developer can perform targeted data comparison based on the internet of things authentication project partitions of different initiation protocol intervals, for example, compare a large amount of authentication service plug-in update information, so as to perform authentication service plug-in update on the target authentication service subsequently.
And step S114, updating the authentication service plug-in for the target authentication service of each Internet of things authentication project partition based on the acquired authentication service plug-in updating information.
In this embodiment, the compared update information of the authentication service plug-in may be obtained by performing data screening after the data comparison template configured by the developer is based on, and the specific obtaining manner may be compared with related technologies, which is not a technical problem to be solved in the embodiments of the present application, and is not described herein again.
Based on the steps, on one hand, the internet of things authentication service plug-in is initiated based on the target selected according to the target comparison internet of things authentication service plug-in, candidate cooperation information of the target authentication service is determined, the dimension of the first similar adaptation internet of things authentication service plug-in similar to the target comparison internet of things authentication service plug-in is selected from the target authentication service to carry out agreement on the target authentication service, and under the condition that the running adaptation degrees of the plug-ins of the target authentication service are detected to be similar through the related technology, the target authentication service can be further compared through the candidate cooperation information of the target authentication service, so that the detection accuracy of the running adaptation condition of the plug-ins of the target authentication service is improved; on the other hand, based on pre-calibrated plug-in adaptation information between the selected target initiating IOT authentication service plug-in and the target comparing IOT authentication service plug-in, candidate cooperation information of the target authentication service is determined, and the relation between the selected target initiating IOT authentication service plug-in and the target comparing IOT authentication service plug-in is not required to be marked manually, so that the detection time consumption is reduced, and the detection efficiency of the target authentication service is improved; and the detection result is not limited by knowledge and experience of developers, the quality fluctuation of the detection result is reduced, and the plug-in adaptation degree of the detection target authentication business service is improved.
In one possible implementation, for step S111, adapting the internet of things authentication service plug-in set and the comparison internet of things authentication service plug-in set may be obtained by:
(1) the method comprises the steps of obtaining a preset Internet of things authentication service plug-in list used for protocol target authentication service, and clustering the preset Internet of things authentication service plug-ins with plug-in adaptation degrees reaching the target set plug-in adaptation degrees into an Internet of things authentication service plug-in list.
(2) And calibrating plug-in adaptation information between every two preset internet-of-things authentication service plug-ins in each internet-of-things authentication service plug-in list into target plug-in adaptation information corresponding to each internet-of-things authentication service plug-in list.
(3) And taking part of preset Internet of things authentication service plug-ins in each cluster as adaptation Internet of things authentication service plug-ins in the adaptation Internet of things authentication service plug-ins set to obtain an adaptation Internet of things authentication service plug-in set.
(4) And taking other preset Internet of things authentication service plug-ins except the preset Internet of things authentication service plug-ins in each cluster as comparison Internet of things authentication service plug-ins to obtain a comparison Internet of things authentication service plug-in set.
Next, with respect to step S112, the following several alternative examples will be given for explanation.
In a possible implementation manner, for step S112, the target-initiated internet-of-things authentication service plug-in may include a plurality of plug-ins, and based on this, step S112 may be implemented by the following sub-steps, which are described in detail below.
And a substep S1121, determining that the target authentication service initiates an Nth target comparison IOT authentication service plug-in selected by the IOT authentication service plug-in according to each target, wherein N is a positive integer.
In the substep S1122, based on the plug-in adaptation information between each target-initiated internet-of-things authentication service plug-in and the corresponding selected nth target-compared internet-of-things authentication service plug-in, the reference degree of the nth target-compared internet-of-things authentication service plug-in, of the nth target-compared internet-of-things authentication service plug-ins selected according to each target-initiated internet-of-things authentication service plug-in, is determined, where the plug-in adaptation degree of the corresponding target-initiated internet-of-things authentication service plug-in reaches the first set plug-in adaptation degree.
And a substep S1123 of determining candidate cooperative information of the target authentication service according to the ratio of the determined Nth target to the reference degree of the IOT authentication service plug-in and the total reference degree of the target initiated IOT authentication service plug-in.
In another possible implementation manner, for step S112, when one target-initiated internet-of-things authentication service plug-in is included, the first selected plug-in adaptation degree of the target-initiated internet-of-things authentication service plug-in may be determined as the candidate collaboration information of the target authentication service.
For another example, when the target-initiated internet-of-things authentication service plug-in includes a plurality of target-initiated internet-of-things authentication service plug-ins, the candidate collaboration information of the target-initiated internet-of-things authentication service may be determined based on the first selected plug-in adaptation degrees of the plurality of target-initiated internet-of-things authentication service plug-ins.
The method comprises the following steps of obtaining the adaptation degree of a first selected plug-in of a plug-in of which a target initiates the Internet of things authentication service in the following mode:
(1) based on the plug-in adaptation information between each target comparison IOT authentication service plug-in selected according to a target initiation IOT authentication service plug-in and a target initiation IOT authentication service plug-in, determining a first reference degree of the target comparison IOT authentication service plug-in, of the target comparison IOT authentication service plug-ins selected according to a target initiation IOT authentication service plug-in, of which the plug-in adaptation degree with the target initiation IOT authentication service plug-in reaches a second set plug-in adaptation degree.
(2) And determining the first reference degree and the ratio of the target selected according to the target initiating the IOT authentication service plug-in to the total reference degree of the IOT authentication service plug-in as the first selected plug-in adaptation degree of the target initiating the IOT authentication service plug-in.
In another possible implementation manner, for step S112, when one target-initiated internet-of-things authentication service plug-in is included, the second selected plug-in adaptation degree of the target-initiated internet-of-things authentication service plug-in may be determined as the candidate collaboration information of the target authentication service.
For another example, when the target-initiated internet-of-things authentication service plug-in includes a plurality of plug-ins, the candidate collaboration information of the target authentication service may be determined based on the adaptation degree of the second selected plug-in of the plurality of target-initiated internet-of-things authentication service plug-ins.
The adaptation degree of a second selected plug-in of the internet of things authentication service initiated by a target can be obtained in the following manner:
(1) and determining a second reference degree of the target contrast IOT authentication service plug-in with which the plug-in adaptation degree with the target initiation IOT authentication service plug-in reaches a third set plug-in adaptation degree in the target contrast IOT authentication service plug-in selected according to the target initiation IOT authentication service plug-in based on plug-in adaptation information between each contrast IOT authentication service plug-in the contrast IOT authentication service plug-in set and the target initiation IOT authentication service plug-in.
(2) And determining a third reference degree of the comparison Internet of things authentication service plug-in, wherein the plug-in adaptation degree of the comparison Internet of things authentication service plug-in the comparison Internet of things authentication service plug-in set and the plug-in of the target initiating the Internet of things authentication service plug-in reach a third set plug-in adaptation degree.
(3) And determining the occupation ratio of the second reference degree and the third reference degree as a second selected plug-in adaptation degree of the target initiating the internet of things authentication service plug-in.
In another possible implementation manner, for step S112, when the target-initiated internet-of-things authentication service plug-in includes one plug-in, the plug-in position adaptation degree of the target-initiated internet-of-things authentication service plug-in may be determined as candidate collaboration information of the target authentication service.
For another example, when there are multiple target-initiated internet-of-things authentication service plug-ins, candidate collaboration information of the target-initiated internet-of-things authentication service may be determined based on plug-in location adaptation degrees of the multiple target-initiated internet-of-things authentication service plug-ins.
The plug-in position adaptation degree of the target-initiated Internet of things authentication service plug-in can be obtained in the following manner:
(1) and determining a second similar comparison IOT authentication service plug-in from the target comparison IOT authentication service plug-ins selected according to the target initiation IOT authentication service plug-in based on plug-in adaptation information between each target comparison IOT authentication service plug-in selected according to the target initiation IOT authentication service plug-in and one target initiation IOT authentication service plug-in, wherein the second similar comparison IOT authentication service plug-in comprises a target comparison IOT authentication service plug-in the adaptation degree of which the plug-in adaptation degree with the target initiation IOT authentication service plug-in reaches a fourth set plug-in adaptation degree.
(2) And determining a first plug-in position node of each second similar comparison IOT authentication service plug-in the second similar comparison IOT authentication service plug-in. And determining second plug-in position nodes of the second similar comparison IOT authentication service plug-ins in the target comparison IOT authentication service plug-ins selected according to the target initiation IOT authentication service plug-in.
(3) And determining the sum of the ratio of the first plug-in position node and the second plug-in position node of each second similar comparison IOT authentication service plug-in as the plug-in position adaptation degree of the target initiating IOT authentication service plug-in.
In another possible implementation manner, for step S112, when the target-initiated internet-of-things authentication service plugin includes one plugin, a plugin position node loss value of the target-initiated internet-of-things authentication service plugin may be determined as candidate collaboration information of the target authentication service.
For another example, when there are multiple target-initiated internet-of-things authentication service plug-ins, candidate collaboration information of the target-initiated internet-of-things authentication service may be determined based on plug-in location node loss values of the multiple target-initiated internet-of-things authentication service plug-ins.
The method comprises the following steps of obtaining a plug-in position node loss value of a plug-in of a target initiating the internet of things authentication service through the following method:
(1) and determining the third plug-in position node in each target comparison Internet of things authentication service plug-in selected according to each target initiating Internet of things authentication service plug-in.
(2) And determining a first selected loss reference value based on plug-in adaptation information between each target comparison IOT authentication service plug-in selected according to one target initiation IOT authentication service plug-in and one target initiation IOT authentication service plug-in, and a third plug-in position node of each target comparison IOT authentication service plug-in selected according to one target initiation IOT authentication service plug-in.
For example, according to plug-in adaptation information between each target comparison internet-of-things authentication service plug-in selected by one target initiation internet-of-things authentication service plug-in and one target initiation internet-of-things authentication service plug-in, the target comparison internet-of-things authentication service plug-ins are ranked, and the ranking result is compared with the difference of the third plug-in position node of each target comparison internet-of-things authentication service plug-in to obtain a first selected loss reference value.
(3) And determining a fourth plug-in position node corresponding to each target selected by the target initiated Internet of things authentication service plug-in to the Internet of things authentication service plug-in.
The fourth plug-in location node is determined based on the size of plug-in adaptation information between each target comparison IOT authentication service plug-in selected according to one target initiation IOT authentication service plug-in and one target initiation IOT authentication service plug-in.
(4) And determining a second selected loss reference value based on the plug-in adaptation information between each target comparison IOT authentication service plug-in selected according to one target initiation IOT authentication service plug-in and one target initiation IOT authentication service plug-in, and the fourth plug-in position node of each target comparison IOT authentication service plug-in selected according to one target initiation IOT authentication service plug-in.
Similarly, the target comparison internet of things authentication service plug-ins can be sorted according to plug-in adaptation information between each target comparison internet of things authentication service plug-in selected by one target initiation internet of things authentication service plug-in and one target initiation internet of things authentication service plug-in, and the sorting result is compared with the position node of the fourth plug-in of each target comparison internet of things authentication service plug-in a difference mode to obtain a second selected loss reference value.
(5) And determining the ratio of the first selected loss reference value and the second selected loss reference value as a plug-in position node loss value of a target initiating the internet of things authentication service plug-in.
In a possible implementation manner, for step S113, the following exemplary sub-steps may be implemented in the process of determining the internet of things authentication item partition to which the target authentication business service belongs based on the candidate collaboration information of the target authentication business service, which is described in detail below.
And a substep S1131, acquiring a target adaptation parameter range corresponding to the candidate collaboration information of the target authentication service.
In this embodiment, candidate cooperative information ranges corresponding to different adaptation parameter ranges may be preconfigured, so that a target adaptation parameter range corresponding to candidate cooperative information of a target authentication service may be obtained according to the correspondence.
And a substep S1132, determining an Internet of things authentication project partition pre-associated with the target adaptation parameter range, and using the Internet of things authentication project partition as the Internet of things authentication project partition to which the target authentication service belongs.
Therefore, subsequent developers can conveniently perform targeted data comparison based on the Internet of things authentication project partitions of different initiation protocol intervals, for example, a large amount of authentication service plug-in updating information is compared, so that the subsequent authentication service plug-in updating is performed on the target authentication service.
In a possible implementation manner, with respect to step S114, in the process of updating the authentication service plug-in for the target authentication service of each internet of things authentication project partition based on the obtained authentication service plug-in update information, the following exemplary sub-steps may be implemented, which are described in detail below.
And a substep S1141 of obtaining update link service data corresponding to the authentication service plug-in update information of each target authentication service in the target Internet of things authentication project partition, and positioning update link service components based on the update link service data.
In the substep S1142, update link service component information corresponding to each update link service component in the preset reference degree update link service components is obtained.
In this embodiment, the update linkage service component information may specifically include an associated internet of things authentication service plug-in, an internet of things authentication service plug-in tag, and service plug-in update positioning information. For example, the associated internet of things authentication service plug-in may be used to update the internet of things authentication service plug-in covered by the link service component, the internet of things authentication service plug-in label is used to indicate an update label for updating the link service component, the update label may be a category label corresponding to the internet of things authentication service plug-in the service plug-in updating process, and the service plug-in update positioning information is used to indicate plug-in resource analysis for updating the service plug-in update element in the link service component. The service plug-in update element may be an element used for controlling a service plug-in update object and a service plug-in update parameter (such as a service plug-in update action, a service plug-in update speed, a service plug-in update range, and the like) in a service plug-in update process.
And a substep S1143 of generating the update information of the authentication service plug-in corresponding to each update linkage service component according to the update linkage service component information corresponding to each update linkage service component.
In this embodiment, the authentication service plug-in update information is used to perform plug-in unit data replacement processing or plug-in unit data mapping association processing on the current plug-in update unit, and the authentication service plug-in update information and the update link service component have a one-to-one correspondence relationship. The replacement of the unit plug-in data of the current plug-in updating unit may mean that the unit plug-in data of the current plug-in updating unit needs to be adaptively optimized, so as to adapt to the information of the update link service component corresponding to the current update link service component. The processing of mapping and associating the unit plug-in data of the current plug-in updating unit may mean that the unit plug-in data of the current plug-in updating unit needs to be mapped and associated adaptively, and the mapping and associating may be performed on a data table related to the unit plug-in data.
And a substep S1144 of processing the current plug-in updating unit corresponding to each update link service component by adopting the authentication service plug-in updating information corresponding to each update link service component to obtain a target plug-in updating unit corresponding to each update link service component, and generating the target authentication service for updating the application service plug-in through the service plug-in updating script according to the target plug-in updating unit corresponding to each update link service component.
The authentication service plug-in updating information, the current plug-in updating unit and the target plug-in updating unit have one-to-one correspondence relationship. Therefore, experience of updating the subsequent cloud computing service plug-in can be improved by generating the final target authentication service.
Based on the above steps, the present embodiment can generate the authentication service plug-in update information corresponding to each update link service component according to the update link service component information corresponding to each update link service component, and then process the current plug-in update unit corresponding to each update link service component to obtain the target plug-in update unit corresponding to each update link service component, thereby generating the target authentication service for updating the application service plug-in through the service plug-in update script. By adopting the mode, the information of the plug-in updating units from different dimensions is processed in parallel based on the plurality of updating link service components, and then under the scene of the multi-plug-in updating unit, the plug-in updating unit data can be updated on the information of the plug-in updating units in different dimensions through the authentication service plug-in updating information, so that the information of the plug-in updating units can be optimized in real time, and the subsequent application plug-in operation adaption degree can be promoted.
For example, in a possible implementation manner, for step S1142, in the process of obtaining the updated link service component information corresponding to each updated link service component in the preset reference degree updated link service components, the following exemplary sub-steps may be implemented, and are described in detail below.
And a substep S11421 of detecting each update link service component in the update link service components with the preset reference degree to obtain an update detection result of the service plug-in corresponding to each update link service component.
And a substep S11422, determining the service plug-in update positioning information corresponding to each update link service component according to the service plug-in update detection result corresponding to each update link service component.
And a substep S11423, determining error information corresponding to each updated linkage service component according to the service plug-in update detection result corresponding to each updated linkage service component.
For example, for any one of the update link service components with the preset reference degree, if the service plug-in update detection result is that the service plug-in update node information with an error in the update link service component space, the information of the error process of the service plug-in update node information in the update link service component is determined as the error information corresponding to each update link service component.
And a substep S11424 of obtaining the associated internet of things authentication service plug-in corresponding to each update link service component and the internet of things authentication service plug-in label corresponding to each update link service component.
And a substep S11425 of generating updated linking service component information corresponding to each updated linking service component according to the service plug-in update positioning information corresponding to each updated linking service component, the error information corresponding to each updated linking service component, the associated internet of things authentication service plug-in corresponding to each updated linking service component, and the internet of things authentication service plug-in tag corresponding to each updated linking service component.
For example, on this basis, as a possible implementation manner, in the step S1143, in the process of generating the authentication service plug-in update information corresponding to each update link service component according to the update link service component information corresponding to each update link service component, the following exemplary sub-steps may be implemented, and the following detailed description is given below.
And a substep S11431 of obtaining plug-in label matching information corresponding to the plug-in label of the internet of things authentication service from the pre-configured plug-in history calling information corresponding to the associated internet of things authentication service plug-in.
And a substep S11432 of extracting the feature of the plug-in tag matching information according to the service plug-in updating positioning information to obtain service plug-in updating scene information in which the plug-in tag matching information is respectively matched with the service plug-in updating positioning information.
And a substep S11433 of determining global authentication service plug-in update information based on the service plug-in update scenario information of the plug-in tag matching information.
And a substep S11434 of determining, according to the error information, plug-in tag matching error region information in the plug-in tag matching information, and determining service plug-in update scene information corresponding to the plug-in tag matching error region information.
And a substep S11435 of fusing the global authentication service plug-in updating information and the service plug-in updating scene information corresponding to the plug-in tag matching error area information to obtain the authentication service plug-in updating information corresponding to each updating link service component.
In this embodiment, the authentication service plug-in update information includes plug-in unit data that needs to perform plug-in unit data replacement processing or plug-in unit data mapping association processing on the current plug-in update unit.
The service plug-in updating positioning information comprises service plug-in updating element distribution, the service plug-in updating element distribution comprises a plurality of service plug-in updating elements and plug-in calling behaviors connected between two service plug-in updating elements, the plug-in calling behaviors comprise characteristic branch updating information and configuration attribute index information of the plug-in calling behaviors, and the service plug-in updating elements comprise plug-in label matching updating segments and updating objects.
On this basis, for the sub-step S11432, it can be realized by the following exemplary design.
(1) And determining a plug-in tag matching updating section corresponding to the plug-in tag matching information in the service plug-in updating element distribution.
(2) And determining selected configuration attribute index parameters and optimized configuration attribute index parameters of the plug-in tag matching update section in a plurality of service plug-in update elements distributed in the service plug-in update elements according to the characteristic branch update information.
For example, the plug-in tag matching update segment may refer to a time update segment or a space update segment in an update control process of different configuration attribute hierarchies in a scene of a service plug-in update.
(3) And calculating the updating optimization scene of the first service plug-in generated by the matching information of the selected configuration attribute index parameter to the plug-in tag according to the configuration attribute index information of the plug-in calling behavior between the connecting plug-in tag matching update segment and the selected configuration attribute index parameter.
(4) And calculating the second service plug-in updating optimization scene generated by the matching information of the selected configuration attribute index parameter to the plug-in tag according to the configuration attribute index information of the plug-in calling behavior between the connection plug-in tag matching updating segment and the selected configuration attribute index parameter.
(5) And determining service plug-in updating scene information of the plug-in tag matching information according to the first service plug-in updating optimization scene and the second service plug-in updating optimization scene.
In a possible implementation manner, still referring to step S1144, in the process of generating a target authentication service for applying a service plug-in update through a service plug-in update script according to a target plug-in update unit corresponding to each update linkage service component, the following exemplary sub-steps may be implemented, which are described in detail below.
And a substep S11443 of determining a dynamic link library index parameter corresponding to each updated link service component according to the target plug-in updating unit corresponding to each updated link service component.
It should be noted that the index parameter of the dynamic link library is an index parameter of the dynamic link library of the target plugin updating unit on each service plugin updating and loading channel.
And a substep S11444 of determining the business plug-in update control information of the business plug-in update control template corresponding to each update link service component according to the index parameter of the dynamic link library corresponding to each update link service component.
And a substep S11445, updating and configuring the current target authentication service based on the service plug-in updating control information of the service plug-in updating control template corresponding to each updating link service component, so as to obtain the target authentication service corresponding to each updating link service component.
For example, the service plug-in update control information of the service plug-in update control template corresponding to each update link service component may be acquired to update control associated information for the service plug-in of each link skip information in the current target authentication service, and update and configure the current target authentication service based on the service plug-in update control associated information of each link skip information in the current target authentication service, so as to obtain the target authentication service corresponding to each update link service component.
Fig. 3 is a schematic diagram of functional modules of the data transmission device 300 of the internet of things according to the embodiment of the present disclosure, in this embodiment, the data transmission device 300 of the internet of things may be divided into the functional modules according to the method embodiment executed by the server 100, that is, the following functional modules corresponding to the data transmission device 300 of the internet of things may be used to execute the method embodiments executed by the server 100. The functions of the functional modules of the data transmission device 300 for internet of things are described in detail below.
A first obtaining module 310, configured to obtain an updated authentication service after an authentication service plug-in is updated for a target authentication service of each internet of things authentication project partition;
a second obtaining module 320, configured to obtain, based on the update authentication service, a transmission object set corresponding to a task to be transmitted of the internet of things terminal device;
the first editing module 330 is configured to, when a transmission object in the transmission object set is a non-key transmission object, perform to-be-sent editing on differential transmission data between the transmission object and a corresponding associated key transmission object to obtain edited transmission node data corresponding to the transmission object, and generate transmission candidate data corresponding to the to-be-transmitted task according to the edited transmission node data corresponding to each transmission object in the transmission object set;
the second editing module 340 is configured to, when a transmission object in the transmission object set is a key transmission object, directly perform to-be-sent editing on the transmission object to obtain edited transmission node data corresponding to the transmission object.
It should be noted that the division of the modules of the above apparatus is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules may all be implemented in software invoked by a processing element. Or may be implemented entirely in hardware. And part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the obtaining module 310 may be a processing element separately set up, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and the processing element of the apparatus calls and executes the functions of the obtaining module 310. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
Fig. 4 is a hardware schematic diagram of a server 100 for implementing the internet of things data transmission method, where the server 100 may include a processor 110, a machine-readable storage medium 120, a bus 130, and a transceiver 140, as shown in fig. 4.
In a specific implementation process, the at least one processor 110 executes computer-executable instructions stored in the machine-readable storage medium 120, so that the processor 110 may execute the method for transmitting data of the internet of things according to the above method embodiment, where the processor 110, the machine-readable storage medium 120, and the transceiver 140 are connected through the bus 130, and the processor 110 may be configured to control the transceiver action of the transceiver 140, so as to perform data transceiving with the internet of things terminal device 200.
For a specific implementation process of the processor 110, reference may be made to the above-mentioned method embodiments executed by the server 100, which implement similar principles and technical effects, and this embodiment is not described herein again.
In the embodiment shown in fig. 4, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The machine-readable storage medium 120 may comprise high-speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus 130 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus 130 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
In addition, an embodiment of the present application further provides a readable storage medium, where a computer executes instructions are stored in the readable storage medium, and when a processor executes the computer executes the instructions, the method for transmitting data of the internet of things is implemented.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some designs, multitasking and parallel processing may also be possible or may be advantageous.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Reference to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or contexts, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, located in one or more computer-readable media, that includes a computer-readable program to be sent for editing.
The computer storage medium may comprise a propagated data signal with the computer program embodied thereon for transmission, e.g., on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, or device. The program to be sent for editing located on the computer storage medium may propagate through any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or a combination of any of the above.
The computer program to be sent for editing required for the operations of the various parts of the present specification can be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, vb.net, Python, etc., a conventional programming language such as C, visual basic, Fortran2003, Perl, COBOL2002, PHP, ABAP, a dynamic programming language such as Python, Ruby and Groovy, or other programming languages, etc. The program to be sent for editing may run entirely on the user's computer, or as a stand-alone software package on the user's computer, or partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which the elements and sequences are processed, the use of alphanumeric characters, or the use of other designations in this specification is not intended to limit the order of the processes and methods in this specification, unless otherwise specified in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the present specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to imply that more features than are expressly recited in a claim. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Finally, it should be understood that the examples in this specification are only intended to illustrate the principles of the examples in this specification. Other variations are also possible within the scope of this description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.

Claims (10)

1. The data transmission method of the Internet of things is applied to a server, the server is in communication connection with a plurality of terminal devices of the Internet of things, and the method comprises the following steps:
acquiring an updated authentication service after an authentication service plug-in is updated for the target authentication service of each internet of things authentication project partition;
acquiring a transmission object set corresponding to a task to be transmitted of the terminal equipment of the Internet of things on the basis of the update authentication service;
when the transmission object in the transmission object set is a non-key transmission object, performing to-be-sent editing on the differential transmission data between the transmission object and the corresponding associated key transmission object to obtain edited transmission node data corresponding to the transmission object, and generating transmission candidate data corresponding to the task to be transmitted according to the edited transmission node data corresponding to each transmission object in the transmission object set;
and when the transmission object in the transmission object set is a key transmission object, directly carrying out to-be-sent editing on the transmission object to obtain edited transmission node data corresponding to the transmission object.
2. The internet of things data transmission method according to claim 1, wherein the obtaining of the transmission object set corresponding to the task to be transmitted comprises:
acquiring a task to be transmitted, and analyzing the task to be transmitted;
and intercepting the transmission object fragments corresponding to the tasks to be transmitted in sequence to obtain a transmission object set corresponding to the tasks to be transmitted.
3. The data transmission method of the internet of things according to claim 1, wherein the differential transmission data is obtained by the following steps:
acquiring transmission fragment data of each transmission fragment in an associated key transmission object corresponding to the transmission object;
acquiring transmission fragment data of each transmission fragment in the transmission object;
comparing the transmission fragment data of the transmission fragments at the same position, and determining the difference transmission fragments in the transmission object;
and determining the difference transmission data in the transmission object according to the difference transmission segment.
4. The data transmission method of the internet of things according to claim 1, wherein the differential transmission data is a structured transmission segment region, and the method further comprises:
when the difference between the fragment data amount of the structured transmission fragment region and the fragment data amount of the transmission object is smaller than a preset threshold value, determining that the transmission object is a key transmission object;
when the difference between the fragment data amount of the structured transmission fragment region and the fragment data amount of the transmission object is greater than a preset threshold value, determining that the transmission object is a non-key transmission object.
5. The data transmission method of the internet of things as claimed in claim 1, wherein the method further comprises:
selecting a first transmission object in the transmission object set as a key transmission object;
and taking the first transmission object as an initial transmission object, and taking the transmission objects with preset quantity at intervals as key transmission objects in the transmission object set.
6. The data transmission method of the internet of things according to claim 1, wherein the differential transmission data is a structured transmission segment region, and the method further comprises:
determining a transmission fragment data field, a transmission fragment data partition and a transmission node position of an initial transmission fragment in the structured transmission fragment region corresponding to the structured transmission fragment region;
and storing the transmission fragment data field, the transmission fragment data partition and the transmission node position of the initial transmission fragment into transmission node data information corresponding to the editing transmission node data.
7. The data transmission method of the internet of things as claimed in claim 1, wherein the method further comprises:
dividing the transmission object into an application program transmission object and a program data channel transmission object;
synthesizing the application program transmission object and the program data channel transmission object to obtain a synthesized transmission object;
and editing the composite transmission object to be sent to obtain edited transmission node data corresponding to the transmission object.
8. The data transmission method of the internet of things as claimed in claim 1, wherein the method further comprises:
task characteristic data of the task to be transmitted are obtained, wherein the task characteristic data comprise task label attribute data and task content data;
and storing the task label attribute data and the task content data according to a data structure of a target format to obtain transmission candidate data corresponding to the task to be transmitted.
9. The internet of things data transmission method according to any one of claims 1 to 8, wherein the step of obtaining an updated authentication service after an authentication service plug-in is updated for a target authentication service of each internet of things authentication project partition includes:
acquiring a target-initiated IOT authentication service plug-in and a target-comparison IOT authentication service plug-in of a target authentication service added by the IOT terminal device, wherein the target-initiated IOT authentication service plug-in comprises a comparison IOT authentication service plug-in a comparison IOT authentication service plug-in set of the target authentication service, the target-comparison IOT authentication service plug-in comprises a comparison IOT authentication service plug-in selected by the target authentication service from the comparison IOT authentication service plug-in set according to the target-initiated IOT authentication service plug-in, plug-in adaptation information is predefined between any adaptation IOT authentication service plug-in the adaptation IOT authentication service plug-in set and any comparison IOT authentication service plug-in the comparison IOT authentication service plug-in set, and the plug-in adaptation information is used for identifying the comparison IOT authentication service plug-in the adaptation authentication service plug-in and plug-in adaptation degree;
determining candidate cooperation information of the target authentication business service based on plug-in adaptation information between the selected target comparison Internet of things authentication business plug-in and the target initiation Internet of things authentication business plug-in, wherein the candidate cooperation information represents plug-in adaptation degree of the selected first similar comparison Internet of things authentication business plug-in, and the first similar comparison Internet of things authentication business plug-in is the comparison Internet of things authentication business plug-in meeting plug-in adaptation degree requirement with plug-in adaptation degree of the target initiation Internet of things authentication business plug-in;
determining an internet of things authentication project partition to which the target authentication service belongs based on the candidate collaborative information of the target authentication service;
and updating the authentication service plug-in for the target authentication service of each authentication project partition of the Internet of things based on the acquired authentication service plug-in updating information.
10. The data transmission system of the Internet of things is characterized by comprising a server and a plurality of terminal devices of the Internet of things, wherein the terminal devices of the Internet of things are in communication connection with the server;
the server is configured to:
acquiring an updated authentication service after an authentication service plug-in is updated for the target authentication service of each internet of things authentication project partition;
acquiring a transmission object set corresponding to a task to be transmitted of the terminal equipment of the Internet of things on the basis of the update authentication service;
when the transmission object in the transmission object set is a non-key transmission object, performing to-be-sent editing on the differential transmission data between the transmission object and the corresponding associated key transmission object to obtain edited transmission node data corresponding to the transmission object, and generating transmission candidate data corresponding to the task to be transmitted according to the edited transmission node data corresponding to each transmission object in the transmission object set;
and when the transmission object in the transmission object set is a key transmission object, directly carrying out to-be-sent editing on the transmission object to obtain edited transmission node data corresponding to the transmission object.
CN202011553388.XA 2020-12-24 2020-12-24 Internet of things data transmission method and system Withdrawn CN112714119A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011553388.XA CN112714119A (en) 2020-12-24 2020-12-24 Internet of things data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011553388.XA CN112714119A (en) 2020-12-24 2020-12-24 Internet of things data transmission method and system

Publications (1)

Publication Number Publication Date
CN112714119A true CN112714119A (en) 2021-04-27

Family

ID=75544326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011553388.XA Withdrawn CN112714119A (en) 2020-12-24 2020-12-24 Internet of things data transmission method and system

Country Status (1)

Country Link
CN (1) CN112714119A (en)

Similar Documents

Publication Publication Date Title
EP3285170B1 (en) Application profiling job management system, program, and method
US20220156053A1 (en) Software dependency management
CN112394942B (en) Distributed software development compiling method and software development platform based on cloud computing
US11651272B2 (en) Machine-learning-facilitated conversion of database systems
CN112221155B (en) Game data identification method based on artificial intelligence and big data and game cloud center
CN114531477B (en) Method and device for configuring functional components, computer equipment and storage medium
CN112115162A (en) Big data processing method based on e-commerce cloud computing and artificial intelligence server
CN115964646A (en) Heterogeneous graph generation for application microservices
US8448194B2 (en) Value container propagation in development tools, business process management, and business rules management solutions
CN115525534A (en) Test case generation method and platform based on swagger interface test
CN111897864A (en) Expert database data extraction method and system based on Internet AI outbound
CN112506999A (en) Cloud computing and artificial intelligence based big data mining method and digital content center
CN112714119A (en) Internet of things data transmission method and system
CN112633379A (en) Internet of things data fusion method and system
CN112380771B (en) Soil erosion assessment method and device and server
CN112395199B (en) Distributed software instance testing method based on cloud computing and software development platform
CN113391795A (en) Method and system for realizing self-adaptive mapping of application scene and software development kit
CN112671775A (en) Internet of things service authentication method and system
CN112637213A (en) Method and system for carrying out network security protection on Internet of things system
CN112150282B (en) Intelligent contract processing mechanism based on event library
US20220035527A1 (en) Method, electronic device and computer program product for processing operation commands
CN112328286A (en) Software development application updating processing method based on cloud computing and software development platform
CN106055625A (en) Method and device for performing business
CN115495061A (en) Operation template script for industrial simulation software and implementation method
CN112463122A (en) Software development application data processing method based on cloud computing and software development platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210427

WW01 Invention patent application withdrawn after publication