CN114697364A - Internet of things security method supporting multiple transmission protocols based on TCP link - Google Patents

Internet of things security method supporting multiple transmission protocols based on TCP link Download PDF

Info

Publication number
CN114697364A
CN114697364A CN202210339772.2A CN202210339772A CN114697364A CN 114697364 A CN114697364 A CN 114697364A CN 202210339772 A CN202210339772 A CN 202210339772A CN 114697364 A CN114697364 A CN 114697364A
Authority
CN
China
Prior art keywords
data
equipment
timer
alarm
recursion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210339772.2A
Other languages
Chinese (zh)
Other versions
CN114697364B (en
Inventor
张绪礼
田新盟
党鹏松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Hua Fan Technology Co ltd
Original Assignee
Xi'an Hua Fan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Hua Fan Technology Co ltd filed Critical Xi'an Hua Fan Technology Co ltd
Priority to CN202210339772.2A priority Critical patent/CN114697364B/en
Publication of CN114697364A publication Critical patent/CN114697364A/en
Application granted granted Critical
Publication of CN114697364B publication Critical patent/CN114697364B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/12Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
    • G08B21/14Toxic gas alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/12Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
    • G08B21/16Combustible gas alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/30Construction
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/143Termination or inactivation of sessions, e.g. event-controlled end of session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/143Termination or inactivation of sessions, e.g. event-controlled end of session
    • H04L67/145Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/18Multiprotocol handlers, e.g. single devices capable of handling multiple protocols

Abstract

The invention discloses an Internet of things security method and system supporting multiple transmission protocols based on TCP (Transmission control protocol) links, which are used for receiving the first connection with equipment, periodically issuing an instruction set generated according to the preset transmission protocol type and an analysis rule to read equipment data; according to the mapping relation of the equipment data and the set parameters, the periodic timer calls a first recursion timer, and the recursion timer sends an instruction to the equipment to wait for the return of the data; after the data returns, whether trigger alarm and automatic control conditions are met or not is judged according to the current data, if yes, the alarm channel is set to send, the equipment is connected to the network, the bottom layer transmission adopts a mature and stable industrial transmission protocol, the upper layer supports multiple equipment display multi-channel alarm, the device is simple and easy to use, runs in a full-automatic mode, is safe and reliable, large in access scale, low in cost, low in manpower dependence degree, not prone to make mistakes, fast in intervention treatment of risks, capable of giving out multi-channel alarm, and naturally different from a traditional mode.

Description

Internet of things security method supporting multiple transmission protocols based on TCP link
Technical Field
The application relates to the technical field of internet of things security, in particular to a method, a system, computer equipment and a storage medium for internet of things security supporting multiple transmission protocols based on TCP links.
Background
In industrial production or daily life, a plurality of scenes with higher requirements on safety, such as mines, gas stations, tunnels, kitchens and the like, have the requirements of monitoring toxic, harmful, flammable and explosive gases in real time and eliminating risks in time.
The traditional mode needs that someone is present and receive the factor that all ring edge borders influences constantly more, like noisy construction environment, many and the detection point position of dispersion, personnel's knowledge deposit and personnel are equipped for safe patrol and examine, and the risk is intervene timeliness etc. and all can influence final result, receives the influence of external multiple factor easily, and is high to the manpower degree of dependence, and is with high costs and easy mistake.
Disclosure of Invention
Based on the above, in order to solve the technical problem, an internet of things security method, system, computer device and storage medium supporting multiple transmission protocols based on TCP link are provided.
In a first aspect, a security method for internet of things supporting multiple transmission protocols based on TCP link includes:
receiving a first connection with a device; after the connection is established, a first information authorization code sent by the receiving equipment is subjected to validity verification; if the data is legal, initializing the equipment, running the required data, generating a periodic timer and waiting for execution;
periodically issuing an instruction set generated according to a preset transmission protocol type and an analysis rule to read equipment data; converting the equipment data into lower limit/level 1 alarm, upper limit/level 2 alarm, range, unit, gas type and real-time concentration data and storing the data in a database according to the mapping relation of the equipment data and the set parameters;
disconnecting the connection with the equipment, reconnecting and loading the latest data;
the periodic timer calls a first recursion timer, and the recursion timer sends an instruction to the equipment and waits for data to return; after the data is returned, judging whether the triggering alarm and automatic control conditions are met or not according to the current data;
if the condition is met, sending the alarm information through the set alarm channel, and issuing a preset equipment control instruction to eliminate risks.
In the foregoing scheme, optionally, the receiving the first connection with the device further includes:
if the connection is illegal, the connection with the equipment is disconnected, and the equipment which is repeatedly connected for many times in a short time can be temporarily pulled into a blacklist and cannot be connected.
In the foregoing solution, further optionally, the validity verification includes: the authorization code needs to be bound to the transport protocol of the enterprise and in a written non-disabled state.
In the foregoing scheme, further optionally, after the device initialization is completed, the initialization parameters are saved.
In the above scheme, further optionally, the periodic timer is a permanent timer, a life cycle of the permanent timer is the same as an access time of the device, the periodic timer is initialized when the device is accessed, and is destroyed when the device is disconnected, and the periodic timer is mainly responsible for driving data interaction, controlling an interaction period interval, and having a parent-child relationship with the recursive timer.
In the foregoing scheme, further optionally, the recursion timer is generated by a period timer, and the implementation principle of the recursion timer is a hand-in-hand mode, i.e., the lifetime is destroyed only after the data is read in this round and after the next recursion timer is generated, and the next recursion timer is generated after the retry number is exhausted regardless of whether the reading is successful or not.
In the above scheme, further optionally, after the data is returned, the data is processed according to the set precision, and written text files are periodically pushed to the inflixdb in batches for storage.
In a second aspect, an internet of things security system supporting multiple transmission protocols based on TCP link, the system comprising:
a verification module to receive a first connection with a device; after the connection is established, a first information authorization code sent by the receiving equipment is subjected to validity verification; if the data is legal, initializing the equipment, running the required data, generating a periodic timer and waiting for execution;
the matching module is used for periodically issuing an instruction set generated according to a preset transmission protocol type and an analysis rule to read equipment data; converting the equipment data into lower limit/level 1 alarm, upper limit/level 2 alarm, range, unit, gas type and real-time concentration data and storing the data in a database according to the mapping relation of the equipment data and the set parameters;
disconnecting the connection with the equipment, reconnecting and loading the latest data;
the synchronization module is used for calling a first recursion timer by the periodic timer, and the recursion timer sends an instruction to the equipment to wait for data to return; after the data is returned, judging whether the triggering alarm and automatic control conditions are met according to the current data;
if the condition is met, sending the alarm information through the set alarm channel, and issuing a preset equipment control instruction to eliminate risks.
In a third aspect, a computer device comprises a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving a first connection with a device; after the connection is established, a first information authorization code sent by the receiving equipment is subjected to validity verification; if the data is legal, initializing the equipment, running the required data, generating a periodic timer and waiting for execution;
periodically issuing an instruction set generated according to a preset transmission protocol type and an analysis rule to read equipment data; converting the equipment data into data such as range, gas, unit, upper limit/2-level alarm, lower limit/1-level alarm and the like to be stored in mysql according to the mapping relation of the equipment data and the set parameters;
disconnecting the connection with the equipment, reconnecting and loading the latest data;
the periodic timer calls a first recursion timer, and the recursion timer sends an instruction to the equipment and waits for data to return; after the data is returned, judging whether the triggering alarm and automatic control conditions are met according to the current data;
if the condition is met, sending the alarm information through the set alarm channel, and issuing a preset equipment control instruction to eliminate risks.
In a fourth aspect, a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the steps of:
receiving a first connection with a device; after the connection is established, a first information authorization code sent by the receiving equipment is subjected to validity verification; if the data is legal, initializing the equipment, running the required data, generating a periodic timer and waiting for execution;
periodically issuing an instruction set generated according to a preset transmission protocol type and an analysis rule to read equipment data; converting the equipment data into data such as range, gas, unit, upper limit/2-level alarm, lower limit/1-level alarm and the like to be stored in mysql according to the mapping relation of the equipment data and the set parameters;
disconnecting the connection with the equipment, reconnecting and loading the latest data;
the periodic timer calls a first recursion timer, and the recursion timer sends an instruction to the equipment and waits for data to return; after the data is returned, judging whether the triggering alarm and automatic control conditions are met according to the current data;
if the condition is met, sending the alarm information through the set alarm channel, and issuing a preset equipment control instruction to eliminate risks.
The invention has at least the following beneficial effects:
the method adopts the technology of the Internet of things, receives the first connection with the equipment through the equipment server, and receives the first information authorization code sent by the equipment after the connection is established to carry out validity verification; if the data is legal, initializing the equipment, operating the required data, generating a periodic timer, waiting for execution, and periodically issuing an instruction set according to a preset transmission protocol type and an instruction set generated by an analysis rule to read the equipment data; and converting the equipment data into lower limit/level 1 alarm, upper limit/level 2 alarm, measuring range, unit, gas type and real-time concentration data and storing the data in a database according to the mapping relation of the equipment data and the set parameters. Disconnecting the connection with the equipment, reconnecting, loading the latest data, calling a first recursion timer by the cycle timer, sending an instruction to the equipment by the recursion timer, and waiting for the data to return; and after the data is returned, judging whether the triggering alarm and automatic control conditions are met according to the current data, if so, sending the data through a plurality of alarm channels which are set, and issuing a preset equipment control instruction to eliminate risks. The device is connected to the network, a mature and stable industrial transmission protocol is adopted for bottom layer transmission, multiple devices are supported on the upper layer to display multi-channel alarm, the device is simple and easy to use, fully automatically operates, is safe and reliable, large in connection scale, low in cost, low in manpower dependence degree, not easy to make mistakes, fast in intervention treatment of risks, capable of giving an alarm through multiple channels and different from the traditional mode.
Drawings
Fig. 1 is a schematic flowchart of a security method of an internet of things supporting multiple transport protocols based on a TCP link according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an internet of things security system supporting multiple transmission protocols based on a TCP link according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In an embodiment, as shown in fig. 1, the internet of things security method based on TCP link supporting multiple transmission protocols includes the following steps:
receiving a first connection with a device; after connection is established, a first information authorization code sent by receiving equipment is used for carrying out validity verification, if the first information authorization code is legal, the equipment is initialized, required data are operated, a periodic timer is generated, execution is waited, if the first information authorization code is illegal, connection with the equipment is disconnected, and the equipment which is repeatedly connected for many times in a short time can be temporarily pulled into a blacklist and cannot be connected.
Wherein, the equipment through many times of repeated connections in the short time can be drawn into the blacklist temporarily and can't connect, can avoid a large amount of equipment to connect the condition that the server leads to the abnormal function together at the same time, and the legitimacy is verified: the authorization code needs to be bound with the transmission protocol of the enterprise and is in a written non-forbidden state, and after the initialization of the equipment is completed, the initialization parameters are saved.
Periodically issuing an instruction set generated according to a preset transmission protocol type and an analysis rule to read equipment data; and converting the equipment data into lower limit/level 1 alarm, upper limit/level 2 alarm, measuring range, unit, gas type and real-time concentration data and storing the data in a database according to the mapping relation of the equipment data and the set parameters.
Disconnecting the connection with the equipment, reconnecting and loading the latest data;
the periodic timer calls a first recursion timer, and the recursion timer sends an instruction to the equipment and waits for data to return; after the data is returned, judging whether the triggering alarm and automatic control conditions are met according to the current data; in the above scheme, further optionally, after the data is returned, the data is processed according to the set precision, and written text files are periodically pushed to the inflixdb in batches for storage. If the condition is met, sending the alarm information through the set alarm channel, and issuing a preset equipment control instruction to eliminate risks. The alarm channel can be a short message, a mail, an App push, a WeChat public number and the like.
The periodic timer is a permanent timer, the life cycle of the periodic timer is the same as the access time of the equipment, the periodic timer is initialized when the equipment is accessed, the periodic timer is destroyed when the equipment is disconnected, the periodic timer is mainly responsible for driving data interaction and controlling interaction period intervals, and a parent-child relationship exists between the periodic timer and the recursive timer.
The recursion timer is generated by a period timer, the realization principle of the recursion timer is a hand-in-hand mode, the life cycle is destroyed only after the data is read in the current round and the next recursion timer is generated, and the next recursion timer is generated after the retry times are exhausted regardless of whether the reading is successful or not.
In the Internet of things security method supporting multiple transmission protocols based on the TCP link, the purposes that the Internet of things security is less affected by external factors, risk intervention is quicker, error probability is low, cost is lower, the Internet of things technology is adopted, equipment is connected to a network to enable science and technology, a mature and stable industrial transmission protocol is adopted for bottom transmission, multiple equipment display multi-channel alarm is supported on the upper layer, full-automatic operation is achieved, safety and reliability are achieved, and the method is different from the traditional mode in nature.
In one embodiment, the device server is mainly responsible for data synchronization with the device, alarming, data persistence and automatic control of related functions, the device server is a core module responsible for data interaction with the device, the device connected with the device server sends a first information authorization code within five seconds after the device is successfully connected for the first time to carry out validity verification, if the device is legal, the device initializes data required by system operation, generates a periodic timer, waits for execution, if the device is illegal, the device is disconnected, repeated connection for many times within a short time can be temporarily pulled into a blacklist and cannot be connected, the system is internally provided with a limiting function, the condition that a large number of devices are connected with the server at the same time to cause abnormal functions can be avoided, after the device initialization is completed, all initialization parameters can be stored in a memory, and then two logic branches exist, one is a matching mode and the other is a synchronization mode, the difference between the two modes is that the matching mode does not generate a cycle timer and only initializes a part of system parameters, long links are maintained by heartbeats, the data initialization of the rest part can be completed after the device sends out a matching instruction and responses are carried out, the read data can be converted into data of range, gas, unit, upper limit/2 level alarm, lower limit/1 level alarm and the like by combining the mapping relation of the set parameters and stored in mysql, the parameter part is the same as the synchronization mode but does not have the cycle timer, after the device is matched and stored, the device can be disconnected and reconnected to load the latest data, the matching logic branch is completed, and the synchronization logic branch is executed all the required data preparation work during the data initialization, then, the periodic timer can periodically run according to the time set by the acquisition periodic parameter, the first recursive timer can be called by the periodic timer, the recursive timer sends an instruction to the equipment to wait for data to return, if the data is not returned within the set time, retry is carried out according to the set retry number until the number is consumed, the slave in the current round is skipped, the next slave in the current round is read, after the data is returned, the data is processed according to the set precision, the text file is written in periodically and pushed in batches to the inflixdb for storage, whether trigger alarm and automatic control conditions are met or not is judged according to the current concentration, if yes, the trigger alarm and automatic control conditions are sent through the set alarm channel, preset equipment control instructions are issued to eliminate risks, after the slave in the current round is completely read, the synchronous logic in the current round is ended, the next execution period is waited, and the process is repeated.
The data server is divided into an individual part and an enterprise part, and the enterprise completes the functions related to the configuration of the communication protocol and the control protocol with stronger speciality, the individual part mainly comprises data display, alarm message receiving and the like, and the functions which are jointly completed by the enterprise and the individual comprise a message center, value-added service, bill management, a safety center, help and the like; personal, equipment management, monitoring large screen; the display devices are respectively a web terminal, an android app, an apple app, a WeChat public number and a WeChat applet; and verifying the legality, namely the authorization code needs to be bound with the transmission protocol of the enterprise and is in a written non-forbidden state. The period timer comprises authorization codes and equipment, the period timers are in a one-to-one correspondence relationship, each authorized code which is legally accessed has one equipment as a carrier, each accessed equipment corresponds to one period timer, the period timers are permanent timers, the life cycles of the authorized codes are the same as the access time of the equipment, the period timers are initialized when the equipment is accessed, the period timers are destroyed when the equipment is disconnected, the period timers are mainly responsible for driving data interaction and controlling interaction period intervals, and the period timers and the recursion timers have a parent-child relationship. And the recursion timer is generated by a period timer, the realization principle of the recursion timer is a hand-in-hand mode, the life cycle is only after the data is read in the current round, the recursion timer is destroyed after the next recursion timer is generated, and the next recursion timer is generated after the retry times are exhausted regardless of whether the reading is successful or not. Initialization parameters 1) the overall partial structure is as follows:
{
auth _ status:1,// authorization status
close _ client:402523,// device number
connection _ time 1645495128,// Online timestamp
cycle _ number 23,// number of collected rounds
success _ percentage: 1,// Overall success Rate
success _ total 414,// number of acquisitions
retry _ total:1,// number of retries
fail _ total 0,// number of failures
run _ mode:1,// mode of operation
matching _ file _ dot _ addr of 0,// matching slave address
remeber _ matching _ file _ dot _ addr of 0,// last matching slave address
cycle _ lock 0,// cycle lock
remeber _ sync _ fill _ dot _ addr 0,// last synchronous slave address
Sync _ fill _ dot _ addr 0,// synchronous slave address
sync _ fill _ dot _ time 0,// Sync time
variity _ pool { },// System parameter
modbus { },// modbus rules
dot { },// Equipment
commands { }// command
}
2) The structure of the equipment part is as follows:
{
dot _ id "000S-05Q4RWGE 7R"// device authorization code
gps: 109.0105147334941,34.253006683473004,// location
wait _ reply: "1500",// retry interval
repeat _ num: "3",// number of retries
company _ authorization _ group _ id: "19",// authorization code packet
company _ ID: "28",// binding Enterprise ID
customers: [72items ],// bound user IDS
customer _ contacts [ ],// contact IDS
transport _ protocol _ type _ ID: "1",// transport protocol type ID
transport _ protocol _ type _ Name: "MBRTU",// transport protocol type Name
transport _ protocol _ ID: "54",// transport protocol ID
control _ protocol _ IDs [ ]// control protocol ID
storage _ type: "0",// storage mode [ from/to ]
sham _ num: "0",// virtual slave number [ immutable ]
Collection _ cycle 20,// Collection cycle
bad [ ],// abnormal slave
danger { },// alarm slave
slave { },// slave
prev _ danger _ time { }// last alarm time
}
3) The slave part structure is as follows:
{
slave _ name: "CO gas Detector"// slave name
position: "117 m west of building in attempted times"// position of slave
unit is in ppm and/unit
gas: "CO",// gas
danger _ type: "0",// alarm type [12 level/upper and lower limits ]
upper _ limit: "150",// upper limit/level 2 alarms
nether _ limit: "50",// lower limit/level 1 alarm
max: "1000",// measuring range
coefficient: "0",// coefficient
Current: "1280"// Current concentration
is _ danger: "02",// is alarm or not
timestamp 1645496334,// Sync timestamp
dynamic_pool:{
hour _ max: "1280"// hour maximum
hour _ min: "1274"// min
continue _ fail:0,// number of continuous failures
flow _ letter: "YYYYYYYYYYY"// communication flow
},
current_rule:{
pos _ format 7012,// storage location
accuracy: "2",// precision
accuracy _ change: "0",// precision processing principle
byte _ order: "ABCD",// byte order
data _ Format "32float",// data Format
32,// digit number of bit
symbol: "float"// type
readnum 2// read length
}
}
Alarm and automatic control conditions, namely an alarm mode (12-level mode (0)/upper and lower limit mode (1)/no alarm (2)); class 1:12 alarm mode, class 1 alarm; class 12 alarm mode, class 2 alarm; a 00:12 level alarm mode, no alarm; 11, upper and lower limit alarm modes and lower limit alarm; 12, upper limit alarm mode and lower limit alarm mode; 10, upper and lower limit alarm mode, no alarm; no alarm mode 20; 6. and the alarm channel comprises short messages, mails, App push and WeChat public numbers.
In one embodiment, as shown in fig. 2, there is provided an internet of things security system supporting multiple transmission protocols based on TCP link, including the following program modules: a module a, a module B, and a module C, wherein:
a verification module to receive a first connection with a device; after the connection is established, a first information authorization code sent by the receiving equipment is used for carrying out validity verification; if the data is legal, initializing the equipment, running the required data, generating a periodic timer, and waiting for execution;
the matching module is used for periodically issuing an instruction set generated according to a preset transmission protocol type and an analysis rule to read equipment data; converting the equipment data into data such as range, gas, unit, upper limit/2-level alarm, lower limit/1-level alarm and the like to be stored in mysql according to the mapping relation of the equipment data and the set parameters;
disconnecting the connection with the equipment, reconnecting and loading the latest data;
the synchronization module is used for calling a first recursion timer by the periodic timer, and the recursion timer sends an instruction to the equipment to wait for data to return; after the data is returned, judging whether the triggering alarm and automatic control conditions are met according to the current data;
if the condition is met, sending the alarm information through the set alarm channel, and issuing a preset equipment control instruction to eliminate risks.
For specific limitations of the internet of things security system supporting multiple transmission protocols based on the TCP link, reference may be made to the above limitations of the internet of things security method supporting multiple transmission protocols based on the TCP link, and details are not described herein again. All or part of each module in the internet of things security system supporting multiple transmission protocols based on the TCP link can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a device, the internal structure of which may be as shown in fig. 3. The computer device includes a processor, a memory, a communication interface, a display screen, and an input system connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with external devices, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to realize an Internet of things security method supporting multiple transmission protocols based on TCP link. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input system of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 3 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, which includes a memory and a processor, the memory storing a computer program, and relates to all or part of the flow of the method of the above embodiment.
In one embodiment, a computer-readable storage medium having a computer program stored thereon is provided, which relates to all or part of the processes of the above-described embodiment methods.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An Internet of things security method supporting multiple transmission protocols based on TCP links is characterized by comprising the following steps:
receiving a first connection with a device; after the connection is established, a first information authorization code sent by the receiving equipment is subjected to validity verification; if the data is legal, initializing the equipment, running the required data, generating a periodic timer and waiting for execution;
periodically issuing an instruction set generated according to a preset transmission protocol type and an analysis rule to read equipment data; converting the equipment data into lower limit/level 1 alarm, upper limit/level 2 alarm, range, unit, gas type and real-time concentration data according to the equipment data and the mapping relation of the set parameters, and storing the data in a database;
disconnecting the connection with the equipment, reconnecting and loading the latest data;
the periodic timer calls a first recursion timer, and the recursion timer sends an instruction to the equipment and waits for data to return; after the data is returned, judging whether the triggering alarm and automatic control conditions are met according to the current data;
if the condition is met, the alarm channel is set to send the alarm channel, and a preset equipment control instruction is issued to eliminate risks.
2. The method of claim 1, wherein receiving the first connection with the device further comprises:
if the connection is illegal, the connection with the equipment is disconnected, and the equipment which is repeatedly connected for many times in a short time is temporarily pulled into a blacklist and cannot be connected;
the number of the devices is at least 1.
3. The method of claim 1, wherein the authorization code in the validity verification needs to be bound with a transport protocol of an enterprise and in a written non-disabled state.
4. The method of claim 1, wherein initialization parameters are saved after initialization of the device is completed.
5. The method of claim 1, wherein the periodic timer is a permanent timer, the lifetime of the permanent timer is the same as the access time of the device, the periodic timer is initialized when the device is accessed, the periodic timer is destroyed when the device is disconnected, the periodic timer is responsible for driving data interaction and controlling interaction period intervals, and a parent-child relationship exists between the periodic timer and the recursive timer.
6. The method of claim 1, wherein the recursion timer is generated by a periodic timer, the recursion timer is implemented in a hand-in-hand mode, the life cycle is destroyed only after the current round of data reading and after the next recursion timer is generated, and the next recursion timer is generated after the retry number is exhausted regardless of whether the current reading is successful or not.
7. The method according to claim 1, wherein after the data is returned, the data is processed according to the set precision, and written text files are periodically pushed to the inflixdb in batch for storage;
the plurality of alarm channels are: short messages, mails, App push and WeChat public numbers.
8. An internet of things security system supporting multiple transmission protocols based on TCP link, the system comprising:
a verification module to receive a first connection with a device; after the connection is established, a first information authorization code sent by the receiving equipment is subjected to validity verification; if the data is legal, initializing the equipment, running the required data, generating a periodic timer and waiting for execution;
the matching module is used for periodically issuing an instruction set generated according to a preset transmission protocol type and an analysis rule to read equipment data; converting the equipment data into lower limit/1 level alarm, upper limit/2 level alarm, range, unit, gas type and real-time concentration data and storing the data in a database according to the mapping relation of the equipment data and the set parameters;
disconnecting the connection with the equipment, reconnecting and loading the latest data;
the synchronization module is used for calling a first recursion timer by the periodic timer, and the recursion timer sends an instruction to the equipment to wait for data to return; after the data is returned, judging whether the triggering alarm and automatic control conditions are met according to the current data;
if the condition is met, sending the alarm information through the set alarm channel, and issuing a preset equipment control instruction to eliminate risks.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202210339772.2A 2022-04-01 2022-04-01 Internet of things security method supporting multiple transmission protocols based on TCP (Transmission control protocol) link Active CN114697364B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210339772.2A CN114697364B (en) 2022-04-01 2022-04-01 Internet of things security method supporting multiple transmission protocols based on TCP (Transmission control protocol) link

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210339772.2A CN114697364B (en) 2022-04-01 2022-04-01 Internet of things security method supporting multiple transmission protocols based on TCP (Transmission control protocol) link

Publications (2)

Publication Number Publication Date
CN114697364A true CN114697364A (en) 2022-07-01
CN114697364B CN114697364B (en) 2024-03-22

Family

ID=82141365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210339772.2A Active CN114697364B (en) 2022-04-01 2022-04-01 Internet of things security method supporting multiple transmission protocols based on TCP (Transmission control protocol) link

Country Status (1)

Country Link
CN (1) CN114697364B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104345717A (en) * 2014-10-17 2015-02-11 武汉华大优能信息有限公司 Intelligent remote data acquisition system based on Internet of Things
CN104410662A (en) * 2014-10-23 2015-03-11 山东大学 Parallel mass data transmitting middleware of Internet of things and working method thereof
CN105137926A (en) * 2015-07-24 2015-12-09 电子科技大学 Data acquisition system applied to wireless industrial interconnection
US10735370B1 (en) * 2019-02-28 2020-08-04 International Business Machines Corporation Name based internet of things (IoT) data discovery
CN112468488A (en) * 2020-11-25 2021-03-09 杭州安恒信息技术股份有限公司 Industrial anomaly monitoring method and device, computer equipment and readable storage medium
CN112714153A (en) * 2020-12-10 2021-04-27 广东省安心加科技有限公司 Processing method and device compatible with multiple TCPs (Transmission control protocol) based on Internet of things system
US20210385304A1 (en) * 2017-09-13 2021-12-09 Hefei Boe Display Technology Co., Ltd. Method for management of intelligent internet of things, system and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104345717A (en) * 2014-10-17 2015-02-11 武汉华大优能信息有限公司 Intelligent remote data acquisition system based on Internet of Things
CN104410662A (en) * 2014-10-23 2015-03-11 山东大学 Parallel mass data transmitting middleware of Internet of things and working method thereof
CN105137926A (en) * 2015-07-24 2015-12-09 电子科技大学 Data acquisition system applied to wireless industrial interconnection
US20210385304A1 (en) * 2017-09-13 2021-12-09 Hefei Boe Display Technology Co., Ltd. Method for management of intelligent internet of things, system and server
US10735370B1 (en) * 2019-02-28 2020-08-04 International Business Machines Corporation Name based internet of things (IoT) data discovery
CN112468488A (en) * 2020-11-25 2021-03-09 杭州安恒信息技术股份有限公司 Industrial anomaly monitoring method and device, computer equipment and readable storage medium
CN112714153A (en) * 2020-12-10 2021-04-27 广东省安心加科技有限公司 Processing method and device compatible with multiple TCPs (Transmission control protocol) based on Internet of things system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈丽芬;叶迅凯;赵鹏;周中良;储成诚;李禹翔;: "一种多协议互操作智能网关的实现", 家电科技, no. 02 *

Also Published As

Publication number Publication date
CN114697364B (en) 2024-03-22

Similar Documents

Publication Publication Date Title
CN101350797B (en) Website logging method capable of simplifying user operation, system, client and server
CN115457709B (en) Intelligent cabinet-based cabinet opening processing method, device and system
CN105139204B (en) A kind of method and system carrying out safety certification
CN110601819B (en) Processing method for random number, block chain link point device and storage medium
CN102821084A (en) Method for identifying open platform, open platform and open system
CN104348578B (en) The method and device of data processing
CN109254914A (en) Software development kit test method, system, computer installation and readable storage medium storing program for executing
CN112039664B (en) Data communication method and system suitable for intelligent ammeter
CN114697364A (en) Internet of things security method supporting multiple transmission protocols based on TCP link
CN108989298A (en) A kind of equipment safety monitoring method and device
CN111063183A (en) Bluetooth-based electric energy meter statistical method and device and storage medium
CN114205325B (en) Message sending method, device, server and storage medium
CN102316076A (en) Method, device and system for recognizing cross-network system user
CN102005001B (en) Login method, device and system of internet bank
CN112765597A (en) Software installation package detection method and device
CN110365831B (en) Incoming call response method, device, system, storage medium and electronic device
CN112835635A (en) Equipment replacement method, device, system, server and storage medium
CN113221151A (en) Data processing method and device based on block chain and storage medium
CN116132097B (en) System login method and device, electronic equipment and storage medium
CN110213200B (en) Risk behavior interception method and related equipment
CN111415506A (en) Safety encryption method of multimedia control system and multimedia terminal
JP2002271874A (en) Data communication system and terminal network controller
CN113691593B (en) Internet of things monitoring equipment and Internet of things monitoring method
CN110351293B (en) Method, device and system for sending information
CN113824727B (en) Webpage login verification method and device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant