CN113722768A - File security storage equipment RFID middleware system based on 5g Internet of things - Google Patents

File security storage equipment RFID middleware system based on 5g Internet of things Download PDF

Info

Publication number
CN113722768A
CN113722768A CN202111038197.4A CN202111038197A CN113722768A CN 113722768 A CN113722768 A CN 113722768A CN 202111038197 A CN202111038197 A CN 202111038197A CN 113722768 A CN113722768 A CN 113722768A
Authority
CN
China
Prior art keywords
data
equipment
rfid middleware
list
detection data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111038197.4A
Other languages
Chinese (zh)
Inventor
李光明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Renhe Intelligent Manufacturing Co ltd
Original Assignee
Anhui Renhe Intelligent Manufacturing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Renhe Intelligent Manufacturing Co ltd filed Critical Anhui Renhe Intelligent Manufacturing Co ltd
Priority to CN202111038197.4A priority Critical patent/CN113722768A/en
Publication of CN113722768A publication Critical patent/CN113722768A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file security storage device RFID middleware system based on a 5g Internet of things, relates to the technical field of Internet of things communication, and solves the technical problem that data is tampered due to potential safety hazards existing in data reading and writing and data processing of the RFID middleware in the existing scheme; according to the invention, the data acquisition equipment is identified and analyzed through the equipment management unit, and the credibility of the data acquisition equipment is ensured through various modes, so that the safety of the detection data is ensured, the detection data abnormity caused by tampering of the data acquisition equipment is avoided, and the reliability of the detection data is improved; after receiving the detection data, the invention analyzes and screens the detection data; according to the reporting period data, the abnormal detection data are eliminated, filtering is carried out by a de-duplication method, and the data processing capacity of the RFID middleware is improved by removing redundant data; the invention introduces the block chain technology, ensures the safety of the detection data and avoids the detection data from being tampered.

Description

File security storage equipment RFID middleware system based on 5g Internet of things
Technical Field
The invention belongs to the technical field of communication of the Internet of things, and relates to a file security storage device RFID middleware technology based on a 5g Internet of things, in particular to a file security storage device RFID middleware system based on the 5g Internet of things.
Background
The RFID middleware can automatically identify and collect the electronic tag data of the RFID equipment, and is widely applied to the fields of various logistics, manufacturing, important article tracking and the like. The RFID middleware bridges data communication between the automatic identification device and the application system, and functions to collect and filter the electronic tags.
The RFID middleware is used as an intermediary for quality inspection of the RFID tag and the application program, provides a group of general interfaces for the application program, connects the application program and the RFID reader-writer, and reads data of the RFID tag. However, most of the RFID middleware is deployed in an outdoor environment, and potential safety hazards exist in data acquisition, data transmission and data filtering, so that an RFID middleware system capable of ensuring data safety in data acquisition and data application processes is urgently needed.
Disclosure of Invention
The invention provides a file security storage device RFID middleware system based on a 5g Internet of things, which is used for solving the technical problem that data is falsified due to potential safety hazards existing in data reading and writing and data processing of the RFID middleware in the existing scheme.
The purpose of the invention can be realized by the following technical scheme: the file security storage device RFID middleware system based on the 5g Internet of things comprises an RFID middleware, an application layer and data acquisition equipment, wherein the application layer and the data acquisition equipment are connected with the RFID middleware; the data acquisition equipment comprises an RFID reader-writer;
the RFID middleware comprises a device management unit, a data processing unit and a load balancing unit;
the RFID middleware identifies and analyzes the data acquisition equipment through the equipment management unit, acquires detection data through the data acquisition equipment after the data acquisition equipment is trusted equipment, and sends the detection data to the data processing unit for analysis and screening; the detection data comprises RFID tag data and corresponding reporting period data;
the load balancing unit is used for coordinating data acquisition amount of the RFID middleware;
encrypting the detection data before analysis and screening and the detection data after analysis and screening, and storing the encryption processing result in an intelligent contract of a block chain; the encryption processing comprises hash encryption and homomorphic encryption.
Preferably, the device management unit identifies and analyzes the data acquisition device through a device list, and includes:
acquiring an equipment list; the equipment list comprises the equipment model of the data acquisition equipment which allows data interaction with the RFID middleware;
reading the equipment model of the data acquisition equipment, searching the read equipment model in an equipment list, and judging the data acquisition equipment to be credible equipment when the equipment model which is consistent with the equipment model is searched in the equipment list; otherwise, the data acquisition device is judged to be an untrusted device.
Preferably, the device list is obtained in an active manner or a passive manner.
Preferably, the obtaining the device list in the passive manner includes:
uploading the set equipment list to an intelligent contract of the RFID middleware and the block chain for storage;
and when the change of the equipment list in the RFID middleware is detected, acquiring the equipment list in the intelligent contract to carry out coverage updating on the equipment list in the RFID middleware.
Preferably, the obtaining the device list in the passive manner includes:
uploading the set equipment list to an intelligent contract of the RFID middleware and the block chain for storage;
acquiring an equipment list in the intelligent contract according to a set period, marking the equipment list as a target list, and performing coverage updating on the equipment list in the RFID middleware through the target list; wherein the set period includes one second, one minute, and one quarter.
Preferably, the acquiring the device list in the active mode includes:
uploading the set equipment list to an intelligent contract of the block chain for storage;
when the data acquisition equipment acquires detection data, generating and sending an identification analysis signal to the equipment management unit;
the equipment management unit acquires the equipment list in the intelligent contract after receiving the identification analysis signal.
Preferably, the analysis and screening of the detection data comprises:
after the data processing unit receives the detection data, the detection data is encrypted;
extracting reporting period data in the detection data; wherein, the data of the reporting period is obtained by at least 10 reporting periods;
sequentially judging whether an RFID label appears in each reporting period in the reporting period data, if so, setting the period code corresponding to the reporting period to be 1, otherwise, setting the period code corresponding to the reporting period to be 0;
sequentially connecting the periodic codes to generate reporting periodic codes; the reporting period data corresponds to the reporting period codes one by one;
when N RFID tags continuously appear in the reporting periodic code, judging that the RFID tag data in the corresponding detection data is normal; otherwise, judging that the RFID label data in the corresponding detection data is abnormal; wherein N is an integer of 2 or more and 8 or less;
rejecting detection data with RFID label data abnormity;
filtering the normal detection data of the RFID label data by a duplicate removal method; the duplication eliminating method comprises an event list method and an event coding method.
Preferably, the load balancing unit is configured to coordinate data acquisition of the RFID middleware, and includes:
acquiring the total data amount of the memory of the RFID middleware and the received detection data, and respectively marking the total data amount as NC and SZ;
acquiring a processing evaluation coefficient CPX by a formula CPX ═ alpha × NC/SZ; wherein alpha is a proportionality coefficient, and alpha is a real number greater than 0;
when the processing evaluation coefficient CPX is larger than or equal to the processing evaluation threshold value, judging that the data processing capacity of the RFID middleware is enough; otherwise, judging that the data processing capacity of the RFID middleware is insufficient, tentatively receiving the detection data acquired by the data acquisition equipment, and re-receiving the detection data acquired by the data acquisition equipment when the data processing capacity of the RFID middleware is changed from insufficient to sufficient; wherein the process evaluation threshold is a real number greater than 0.
Compared with the prior art, the invention has the beneficial effects that:
1. the data acquisition equipment is identified and analyzed through the equipment management unit; acquiring an equipment list in an active mode or a passive mode, identifying and analyzing data acquisition equipment according to the equipment list, acquiring detection data through the data acquisition equipment when the data acquisition equipment is credible equipment, and sending the detection data to a data processing unit; the credibility of the data acquisition equipment is ensured through various modes, so that the safety of the detection data is ensured, the detection data abnormity caused by tampering of the data acquisition equipment is avoided, and the reliability of the detection data is improved.
2. After receiving the detection data, the invention analyzes and screens the detection data; judging whether the RFID label data in the detection data is normal or not through reporting the periodic data, and filtering the detection data with normal RFID label data through a duplication elimination method; and eliminating abnormal detection data according to the reported periodic data, filtering by a de-duplication method, and improving the data processing capacity of the RFID middleware by removing redundant data.
3. The invention introduces the block chain technology, and stores the equipment list, the detection data before the analysis and screening and the detection data after the analysis and screening through the intelligent contract of the block chain, thereby ensuring the safety of the detection data and avoiding the detection data from being tampered.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of the principles of the present invention;
FIG. 2 is a schematic diagram of the working steps of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used herein is for the purpose of describing embodiments and is not intended to be limiting and/or limiting of the present disclosure; it should be noted that the singular forms "a," "an," and "the" include the plural forms as well, unless the context clearly indicates otherwise; also, although the terms first, second, etc. may be used herein to describe various elements, the elements are not limited by these terms, which are only used to distinguish one element from another.
Referring to fig. 1-2, the application provides a file security storage device RFID middleware system based on a 5g internet of things, which includes an RFID middleware, and an application layer and a data acquisition device connected to the RFID middleware.
In this embodiment, the functions of the application layer include file warehousing, file borrowing, file screening, and the like; the data acquisition device comprises an RFID reader-writer.
The RFID middleware comprises a device management unit, a data processing unit and a load balancing unit.
The working steps of the file safety storage device RFID middleware system based on the 5g Internet of things comprise: the data acquisition equipment is identified and analyzed through the equipment management unit, and when the data acquisition equipment is credible equipment, the detection data is acquired through the data acquisition equipment and is sent to the data processing unit for analysis and screening.
In this embodiment, the identifying and analyzing of the data acquisition device by the device management unit through the device list includes:
acquiring an equipment list, reading the equipment model of the data acquisition equipment, searching the read equipment model in the equipment list, and judging the data acquisition equipment to be credible equipment when the equipment model which is consistent with the equipment model is searched in the equipment list; otherwise, the data acquisition device is judged to be an untrusted device.
The device list in this embodiment includes device models of data acquisition devices that allow data interaction with the RFID middleware, that is, each data acquisition device in the device list corresponds to a unique device model.
It should be noted that the device list in this embodiment can be obtained in an active manner, and can also be obtained in a passive manner.
Obtaining a device manifest in a passive manner, comprising:
uploading the set equipment list to an intelligent contract of the RFID middleware and the block chain for storage;
and when the change of the equipment list in the RFID middleware is detected, acquiring the equipment list in the intelligent contract to carry out coverage updating on the equipment list in the RFID middleware.
After the RFID middleware is built, the equipment list is set, the equipment list is stored in the RFID middleware and the intelligent contract of the block chain respectively, and when the equipment list in the RFID middleware is changed, the equipment list stored in the intelligent contract is taken as the standard, so that the detection data collected by the untrusted equipment caused by tampering of the equipment list is prevented from being transmitted into the RFID middleware.
In some other preferred embodiments, obtaining the device list in a passive manner includes:
uploading the set equipment list to an intelligent contract of the RFID middleware and the block chain for storage;
and acquiring the equipment list in the intelligent contract according to a set period, marking the equipment list as a target list, and updating the equipment list in the RFID middleware in a covering manner through the target list.
After the RFID middleware is constructed, setting an equipment list, respectively storing the equipment list in the RFID middleware and an intelligent contract of the block chain, and updating the equipment list in the RFID middleware in a covering manner through the equipment list in the intelligent contract according to a set period.
In this embodiment, acquiring the device list in an active manner includes:
uploading the set equipment list to an intelligent contract of the block chain for storage;
when the data acquisition equipment acquires detection data, generating and sending an identification analysis signal to the equipment management unit;
the equipment management unit acquires the equipment list in the intelligent contract after receiving the identification analysis signal.
After the RFID middleware is constructed, an equipment list is set, the equipment list is directly stored in an intelligent contract of the block chain, and when the data acquisition equipment acquires detection data, the equipment list is used for identifying and analyzing the data acquisition equipment to acquire credible equipment.
In the file security storage device RFID middleware system based on the 5g Internet of things, the detection data is analyzed and screened, and the detection data comprises the following components:
after the data processing unit receives the detection data, the detection data is encrypted;
extracting reporting period data in the detection data; wherein, the data of the reporting period is obtained by at least 10 reporting periods;
sequentially judging whether an RFID label appears in each reporting period in the reporting period data, if so, setting the period code corresponding to the reporting period to be 1, otherwise, setting the period code corresponding to the reporting period to be 0;
sequentially connecting the periodic codes to generate reporting periodic codes; the reporting period data corresponds to the reporting period codes one by one;
when N RFID tags continuously appear in the reporting periodic code, judging that the RFID tag data in the corresponding detection data is normal; otherwise, judging that the RFID label data in the corresponding detection data is abnormal;
and rejecting the detection data with the RFID label data abnormity.
The method specifically comprises the following steps: when the reporting cycle code of certain detection data is 0000111100, and N is 3, the RFID tag data corresponding to the detection data is normal.
In the embodiment, the detection data with normal RFID tag data is filtered by a duplicate removal method; the duplication eliminating method comprises an event list method and an event coding method.
Event list method: and detecting each new tag data, if a new tag is added into the corresponding list and the tag already exists in the list, updating the state data such as time of the corresponding tag only without newly creating a tag data record so as to achieve the effect of removing repeated information.
An event coding method: the change of the state of the label is coded, the appearance code of the label is 0, the disappearance code of the label is 1, then a timer mechanism is added, the state jump of the same label in the effective time of the timer is ignored, and therefore the data is deduplicated in 2 aspects of state definition and time dimension.
In a file security storage device RFID middleware system based on 5g thing networking that the application provided, load balancing unit is used for coordinating the data acquisition of RFID middleware, includes:
acquiring the total data amount of the memory of the RFID middleware and the received detection data, and respectively marking the total data amount as NC and SZ;
acquiring a processing evaluation coefficient CPX by a formula CPX ═ alpha × NC/SZ; when the total data amount SZ is zero, the coordination of data acquisition is not needed, so the total data amount SZ in the formula is not zero;
when the processing evaluation coefficient CPX is larger than or equal to the processing evaluation threshold value, judging that the data processing capacity of the RFID middleware is enough; otherwise, judging that the data processing capacity of the RFID middleware is insufficient, tentatively receiving the detection data acquired by the data acquisition equipment, and re-receiving the detection data acquired by the data acquisition equipment when the data processing capacity of the RFID middleware is changed from insufficient to sufficient.
The method specifically comprises the following steps: when the memory is 1, the total data amount is 1, alpha is 1 and CPX is 1, determining that the data processing capacity of the RFID middleware is sufficient; when the memory is 1, the total data amount is 1, alpha is 1, and CPX is 2, it is determined that the data processing capability of the RFID middleware is insufficient.
In other preferred embodiments, the data collection of the RFID middleware can be coordinated only by the internal memory of the RFID middleware, including:
acquiring a memory of the RFID middleware, and judging that the data processing capacity of the RFID middleware is sufficient when the memory is larger than a memory set threshold value; otherwise, judging that the data processing capacity of the RFID middleware is insufficient, tentatively receiving the detection data acquired by the data acquisition equipment, and re-receiving the detection data acquired by the data acquisition equipment when the data processing capacity of the RFID middleware is changed from insufficient to sufficient; the memory setting threshold is larger than 0, and the memory setting threshold is obtained according to the actual situation of the RFID middleware or a large amount of data simulation.
In the file security storage device RFID middleware system based on the 5g Internet of things, detection data before analysis and screening and detection data after analysis and screening are encrypted, and an encryption processing result is stored in an intelligent contract of a block chain; the encryption processing comprises hash encryption and homomorphic encryption.
It is noted that the block chain is introduced in the present application, and the data interaction device of the RFID middleware and the data security of the interaction are ensured by using the characteristics of the block chain.
The data in the above formulas are all calculated by removing dimensions and taking numerical values thereof, the formulas are obtained by acquiring a large amount of data and performing software simulation to obtain the formulas closest to the real conditions, and the preset parameters and the preset threshold values in the formulas are set by the technicians in the field according to the actual conditions or obtained by simulating a large amount of data.
The working principle of the invention is as follows:
the equipment management unit acquires the equipment list in an active mode or a passive mode, identifies and analyzes the data acquisition equipment according to the equipment list, acquires detection data through the data acquisition equipment when the data acquisition equipment is credible equipment, and sends the detection data to the data processing unit.
After the data processing unit receives the detection data, whether the RFID label data in the detection data is normal is judged through reporting periodic data, and the detection data with normal RFID label data is filtered through a deduplication method.
The load balancing unit judges whether the data processing capacity of the RFID middleware is enough or not through the memory of the RFID middleware and the total data amount of the received detection data, and controls the data acquisition equipment to acquire the detection data according to the data processing capacity; and encrypting the detection data before the analysis screening and the detection data after the analysis screening, and storing the encryption processing result in the intelligent contract of the block chain.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (8)

1. The file security storage device RFID middleware system based on the 5g Internet of things comprises an RFID middleware, an application layer and data acquisition equipment, wherein the application layer and the data acquisition equipment are connected with the RFID middleware;
the RFID middleware identifies and analyzes the data acquisition equipment through the equipment management unit, acquires detection data through the data acquisition equipment after the data acquisition equipment is trusted equipment, and sends the detection data to the data processing unit for analysis and screening; the detection data comprises RFID tag data and corresponding reporting period data;
the load balancing unit is used for coordinating data acquisition amount of the RFID middleware;
encrypting the detection data before analysis and screening and the detection data after analysis and screening, and storing the encryption processing result in an intelligent contract of a block chain; the encryption processing comprises hash encryption and homomorphic encryption.
2. The RFID middleware system of the file security storage device based on the 5g Internet of things of claim 1, wherein the device management unit identifies and analyzes the data acquisition device through a device list, and comprises:
acquiring an equipment list; the equipment list comprises the equipment model of the data acquisition equipment which allows data interaction with the RFID middleware;
reading the equipment model of the data acquisition equipment, searching the read equipment model in an equipment list, and judging the data acquisition equipment to be credible equipment when the equipment model which is consistent with the equipment model is searched in the equipment list; otherwise, the data acquisition device is judged to be an untrusted device.
3. The RFID middleware system of the file security storage device based on the 5g Internet of things as claimed in claim 2, wherein the device list is obtained in an active mode or a passive mode.
4. The RFID middleware system of the file security storage device based on the 5g Internet of things of claim 3, wherein the obtaining of the device list in the passive mode comprises:
uploading the set equipment list to an intelligent contract of the RFID middleware and the block chain for storage;
and when the change of the equipment list in the RFID middleware is detected, acquiring the equipment list in the intelligent contract to carry out coverage updating on the equipment list in the RFID middleware.
5. The RFID middleware system of the file security storage device based on the 5g Internet of things of claim 3, wherein the obtaining of the device list in the passive mode further comprises:
uploading the set equipment list to an intelligent contract of the RFID middleware and the block chain for storage;
acquiring an equipment list in the intelligent contract according to a set period, marking the equipment list as a target list, and performing coverage updating on the equipment list in the RFID middleware through the target list; wherein the set period includes one second, one minute, and one quarter.
6. The RFID middleware system of the file security storage device based on the 5g Internet of things of claim 3, wherein the obtaining of the device list in the active mode comprises:
uploading the set equipment list to an intelligent contract of the block chain for storage;
when the data acquisition equipment acquires detection data, generating and sending an identification analysis signal to the equipment management unit;
the equipment management unit acquires the equipment list in the intelligent contract after receiving the identification analysis signal.
7. The RFID middleware system of the file security storage device based on the 5g Internet of things of claim 1, wherein the analyzing and screening the detection data comprises:
after the data processing unit receives the detection data, the detection data is encrypted;
extracting reporting period data in the detection data; wherein, the data of the reporting period is obtained by at least 10 reporting periods;
sequentially judging whether an RFID label appears in each reporting period in the reporting period data, if so, setting the period code corresponding to the reporting period to be 1, otherwise, setting the period code corresponding to the reporting period to be 0;
sequentially connecting the periodic codes to generate reporting periodic codes; the reporting period data corresponds to the reporting period codes one by one;
when N RFID tags continuously appear in the reporting periodic code, judging that the RFID tag data in the corresponding detection data is normal; otherwise, judging that the RFID label data in the corresponding detection data is abnormal; wherein N is an integer of 2 or more and 8 or less;
rejecting detection data with RFID label data abnormity;
filtering the normal detection data of the RFID label data by a duplicate removal method; the duplication eliminating method comprises an event list method and an event coding method.
8. The file secure storage device RFID middleware system based on 5g Internet of things according to claim 1, wherein the load balancing unit is used for coordinating data acquisition of RFID middleware and comprises:
acquiring the total data amount of the memory of the RFID middleware and the received detection data, and respectively marking the total data amount as NC and SZ;
acquiring a processing evaluation coefficient CPX by a formula CPX ═ alpha × NC/SZ; wherein alpha is a proportionality coefficient, and alpha is a real number greater than 0;
when the processing evaluation coefficient CPX is larger than or equal to the processing evaluation threshold value, judging that the data processing capacity of the RFID middleware is enough; otherwise, judging that the data processing capacity of the RFID middleware is insufficient, tentatively receiving the detection data acquired by the data acquisition equipment, and re-receiving the detection data acquired by the data acquisition equipment when the data processing capacity of the RFID middleware is changed from insufficient to sufficient; wherein the process evaluation threshold is a real number greater than 0.
CN202111038197.4A 2021-09-06 2021-09-06 File security storage equipment RFID middleware system based on 5g Internet of things Pending CN113722768A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111038197.4A CN113722768A (en) 2021-09-06 2021-09-06 File security storage equipment RFID middleware system based on 5g Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111038197.4A CN113722768A (en) 2021-09-06 2021-09-06 File security storage equipment RFID middleware system based on 5g Internet of things

Publications (1)

Publication Number Publication Date
CN113722768A true CN113722768A (en) 2021-11-30

Family

ID=78681934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111038197.4A Pending CN113722768A (en) 2021-09-06 2021-09-06 File security storage equipment RFID middleware system based on 5g Internet of things

Country Status (1)

Country Link
CN (1) CN113722768A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103631600A (en) * 2013-12-10 2014-03-12 中山大学深圳研究院 Data processing method and system for embedded RFID (radio frequency identification) middleware
CN106125627A (en) * 2016-08-25 2016-11-16 浪潮电子信息产业股份有限公司 A kind of credible Internet of Things implementation method based on TPM chip
CN106776685A (en) * 2016-11-09 2017-05-31 深圳市独尊科技开发有限公司 A kind of information collecting method and system
CN113141388A (en) * 2020-12-16 2021-07-20 国网河北省电力有限公司建设公司 Engineering detection management method based on block chain technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103631600A (en) * 2013-12-10 2014-03-12 中山大学深圳研究院 Data processing method and system for embedded RFID (radio frequency identification) middleware
CN106125627A (en) * 2016-08-25 2016-11-16 浪潮电子信息产业股份有限公司 A kind of credible Internet of Things implementation method based on TPM chip
CN106776685A (en) * 2016-11-09 2017-05-31 深圳市独尊科技开发有限公司 A kind of information collecting method and system
CN113141388A (en) * 2020-12-16 2021-07-20 国网河北省电力有限公司建设公司 Engineering detection management method based on block chain technology

Similar Documents

Publication Publication Date Title
CN111475804A (en) Alarm prediction method and system
CN107885642A (en) Business monitoring method and system based on machine learning
CN108256793B (en) Method and system for generating identification codes of stored grains and acquiring associated information
CA2604475A1 (en) Method and system for ac power grid monitoring
CN109858244A (en) Process exception behavioral value method and system in a kind of container
CN113934720A (en) Data cleaning method and equipment and computer storage medium
CN115358155A (en) Power big data abnormity early warning method, device, equipment and readable storage medium
CN116226894B (en) Data security treatment system and method based on meta bin
CN113132311A (en) Abnormal access detection method, device and equipment
CN115935286A (en) Abnormal point detection method, device and terminal for railway bearing state monitoring data
CN112839014A (en) Method, system, device and medium for establishing model for identifying abnormal visitor
CN116986246A (en) Intelligent inspection system and method for coal conveying belt
CN115883163A (en) Network safety alarm monitoring method
CN113938306B (en) Trusted authentication method and system based on data cleaning rule
CN110166972B (en) Intelligent sensing system with block chain module
CN115049410A (en) Electricity stealing behavior identification method and device, electronic equipment and computer readable storage medium
CN109743224A (en) Electrically-charging equipment data processing method and device
CN117240522A (en) Vulnerability intelligent mining method based on attack event model
CN113722768A (en) File security storage equipment RFID middleware system based on 5g Internet of things
CN117176441A (en) System and method for detecting security log event of network equipment
CN114862372B (en) Intelligent education data tamper-proof processing method and system based on block chain
CN113806343B (en) Evaluation method and system for Internet of vehicles data quality
EP4099659B1 (en) Adaptive security level of wireless sensors
CN117540372B (en) Database intrusion detection and response system for intelligent learning
CN115544541B (en) Processing method, equipment and storage medium for target object behavior data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211130