CN114710305A - Data processing method, data processing device, computer readable storage medium and processor - Google Patents

Data processing method, data processing device, computer readable storage medium and processor Download PDF

Info

Publication number
CN114710305A
CN114710305A CN202011636400.3A CN202011636400A CN114710305A CN 114710305 A CN114710305 A CN 114710305A CN 202011636400 A CN202011636400 A CN 202011636400A CN 114710305 A CN114710305 A CN 114710305A
Authority
CN
China
Prior art keywords
illegal
equipment
request
centralized control
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011636400.3A
Other languages
Chinese (zh)
Inventor
罗家林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shizhen Information Technology Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shizhen Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd, Guangzhou Shizhen Information Technology Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN202011636400.3A priority Critical patent/CN114710305A/en
Publication of CN114710305A publication Critical patent/CN114710305A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a data processing method, a data processing device, a computer readable storage medium and a processor. The method is applied to a gateway component and comprises the following steps: detecting that an illegal device exists in the target management space; collecting target data of illegal equipment, and reporting the target data to a centralized control background to schedule strategy information; receiving an equipment operation instruction determined by the master control system based on the strategy information; and responding to the equipment operation instruction, and at least forbidding the illegal equipment from operating and/or giving an early warning to the illegal equipment. The invention solves the technical problem of low efficiency of the gateway in controlling the equipment.

Description

Data processing method, data processing device, computer readable storage medium and processor
Technical Field
The present invention relates to the field of internet, and in particular, to a data processing method, apparatus, computer-readable storage medium, and processor.
Background
At present, a gateway is mostly used for data forwarding between networks, for example, the gateway is used for data forwarding between a wide area network, a local area network and a metropolitan area network, and the gateway lacks a management and management scheme and intelligence, lacks a certain security management and control strategy, does not perform authentication and rejection processing for some illegal devices, and has the technical problem of low efficiency of managing and controlling the devices by the gateway.
Aiming at the technical problem of low efficiency of managing and controlling equipment by the gateway, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the invention provides a data processing method, a data processing device, a computer readable storage medium and a processor, which are used for at least solving the technical problem of low efficiency of management and control of equipment by a gateway.
According to an aspect of an embodiment of the present invention, there is provided a data processing method. The method is applied to a gateway component and comprises the following steps: detecting that an illegal device exists in the target management space; collecting target data of illegal equipment, and reporting the target data to a centralized control background to schedule strategy information; receiving an equipment operation instruction determined by the master control system based on the strategy information; and responding to the equipment operation instruction, and at least forbidding the illegal equipment from operating and/or giving an early warning to the illegal equipment.
In the data processing method of this embodiment, when the gateway component detects that an illegal device is present in the target management space, the gateway component reports target data for the illegal device to the centralized control background to schedule policy information through the centralized control background, and sends the policy information to the master control system, and the master control system manages and controls the illegal device based on the device operation instruction issued by the policy information, thereby avoiding that the gateway lacks a security management and control policy, and does not perform authentication and rejection processing for some illegal devices, and also avoiding that the gateway is used for data forwarding among networks, thereby solving the technical problem of low efficiency of managing and controlling the device by the gateway, and achieving the technical effect of improving the efficiency of managing and controlling the device by the gateway.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic diagram of a data processing system according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method of data processing according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a network topology according to the related art;
FIG. 4 is a schematic diagram of another data processing system according to an embodiment of the present invention;
FIG. 5 is an interaction diagram of an intelligent gateway rejoining method in accordance with an embodiment of the present invention;
fig. 6 is a schematic diagram of a data processing apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
According to an embodiment of the present invention, a data processing system is provided.
FIG. 1 is a schematic diagram of a data processing system according to an embodiment of the present invention. As shown in FIG. 1, the data processing system 10 may include: gateway component 11, centralized control background 12 and total control system 13.
A gateway component 11, configured to detect target data of an illegal device in case that the illegal device exists in the target management space, wherein the target data may be used to indicate that the illegal device exists in the target management space.
In this embodiment, the gateway component 11 is an executor of a command, and may be configured to detect whether an illegal device exists in the target management space, and if it is detected that an illegal device exists in the target management space, may detect target data of the illegal device, where the target data may be used to indicate that an illegal device exists in the target management space, where the illegal device includes a suspected illegal device, and the gateway component 11 may report the target data to the centralized control background 12.
And the centralized control background 12 is connected with the gateway component 11 and is used for scheduling the policy information based on the target data.
In this embodiment, the centralized control back-stage 12 may be a crawling (Spider) centralized control back-stage, which belongs to a remote control center, and may perform two-way communication with the gateway component 11 and the master control system 13, so as to keep data between the three consistent with cloud data. The centralized control background 12 of this embodiment may verify the target data sent by the gateway component 11, that is, verify whether an illegal device indicated by the target data is really abnormal, and may schedule policy information based on the target data, or receive a feedback instruction corresponding to the policy information based on the target data, and send the feedback instruction to the master control system 13.
And the master control system 13 is connected with the centralized control background 12 and is used for determining an equipment operation instruction based on the strategy information, wherein the gateway component 11 is connected with the master control system 13 and is used for responding to the equipment operation instruction and at least forbidding the operation of illegal equipment and/or early warning the illegal equipment.
In this embodiment, the master control system 13 may also be referred to as a user master control system, and is a data presentation center, and may receive policy information sent by the centralized control background 12, and make a decision on an illegal device based on the policy information, which may be to determine a device operation instruction, so that the master control system 13 may send the device operation instruction to the gateway component 11, and after receiving the device operation instruction, the gateway component 11 may respond to the device operation instruction, at least prohibit the operation of the illegal device, that is, implement rejection of the illegal device, and/or perform early warning on the illegal device. Optionally, the gateway component 11 may further perform operations such as closing, timing, and the like on the illegal device in response to the device operation instruction, so as to implement effective management and control on the illegal device.
Optionally, the final decision-making right of the embodiment for the illegal device is in the user.
The embodiment can realize the authentication function of illegal equipment through signal positioning technology and heuristic strategy, thereby greatly providing the safety in the space range and the space range of equipment use.
The above-described data processing system of this embodiment is further described below.
Optionally, the gateway component comprises: and the centralized control module is used for detecting target data.
In this embodiment, the gateway component may be pre-installed with a centralized control module, where the centralized control module may be a Spider centralized control module, and the gateway component may detect the target data through the centralized control module.
Optionally, the gateway component further comprises: and the positioning equipment module is connected with the centralized control module and is used for determining the area of the illegal equipment in the target management space.
In this embodiment, the gateway component may further pre-install a positioning device module, which may be connected to the centralized control module and may be activated by the centralized control module, so as to determine the area of the illegal device in the target management space, for example, the area of the illegal device in the target management space is drawn by a red ray coil. Optionally, the embodiment may ensure a normal operating state of the device according to the information and spatial positioning of the device.
Optionally, the gateway component further comprises: and the signal detection component is used for detecting signal sources with different functions and transmitting the signal sources to a gateway core component of the gateway component, wherein the gateway core component is used for isolating the signal sources.
In this embodiment, the gateway component may further be pre-installed with a signal detection component, where the signal detection component is configured to detect signal sources with different functions, such as Wireless Fidelity (WIFI), bluetooth, Ultra Wideband (UWB), infrared, and transmit the signal sources to a gateway core component, where the gateway core component may be a relay station, and is configured to perform policy auditing and decision-making for the signal sources, and the central control module may perform policy auditing and decision-making.
It should be noted that, other components may also be attached according to the needs of the user, and are not limited in particular here.
Optionally, the master control system is configured to receive a notification message sent by the centralized control background and/or display data sent by the centralized control background; and/or issuing a first operation instruction to the centralized control module in the local area network.
In this embodiment, the master control system may be further configured to receive a notification message issued by the centralized control background, and may further display data issued by the centralized control background, for example, the user master control system is configured to receive a notification of the Spider centralized control background and display the data. Optionally, the master control system in this embodiment may also directly issue the first operation instruction to the centralized control module in the gateway component in the local area network, so as to implement a part of operations, for example, performing operations such as device switching, device state feedback, and device timing.
Optionally, the centralized control background is configured to issue a second operation instruction to the centralized control module.
In this embodiment, the second operation instruction may also be directly issued to the centralized control module in the gateway component through the centralized control background to execute the corresponding operation.
Optionally, the system further comprises: and the cloud server is connected with the centralized control background and used for issuing a third operation instruction to the centralized control background and receiving the state information of the centralized control background.
The data processing system of this embodiment may further include a cloud server, where the cloud server is connected to the centralized control background, and may issue a third operation instruction to the centralized control background, where the third operation instruction is also a cloud instruction, so that the centralized control background may effectively execute the cloud instruction in real time. In addition, the centralized control background has a time feedback function of the self state, so that the cloud server of the embodiment can receive the state information of the centralized control background, the situation that the gateway lacks a management and management scheme, cannot freely communicate with the cloud server, receives, transmits or executes a cloud instruction, and does not provide a channel which can be managed and controlled by the cloud.
The data processing system of the embodiment can provide the authentication function of illegal equipment, can be realized by a signal positioning technology and a heuristic strategy, and greatly provides the safety in the use and space range of the equipment; the centralized control background of the embodiment can be communicated with the cloud server, can effectively execute the cloud instructions in real time, and has time feedback of the self state, so that the situation that a gateway lacks a management and management scheme, cannot freely communicate with the cloud server, receives, transmits or executes the cloud instructions, and does not provide a channel which can be managed and controlled by the cloud is avoided; the data processing system of the embodiment is diversified and humanized in design, can provide dual mode management of a local area network and a wide area network, can immediately send a feedback instruction to the user master control system after the centralized control background receives the corresponding feedback instruction, and has the final decision right on the user, so that the situation that the gateway is used for data forwarding among networks is avoided, the gateway uniqueness is strong, and each complete system can only bear one set of corresponding gateway system and cannot realize diversification; the data processing system of this embodiment can provide efficient early warning function, carry out equipment operation maintenance, can ensure the normal operating condition of equipment according to the information of equipment, space location, also have corresponding feedback, early warning function if equipment has become invalid, avoided along with the access of many equipment, can't accomplish unified configuration, intelligent configuration to the technical problem that the gateway carries out the inefficiency of management and control to equipment has been solved, the technological effect of the efficiency that the improvement gateway carries out the management and control to equipment has been reached.
Example 2
According to an embodiment of the present invention, there is provided an embodiment of a data processing method, it should be noted that the data processing method of the embodiment is applied to a gateway component, and can be executed by a data processing system of embodiment 1 of the present application, steps shown in a flowchart of the drawings can be executed in a computer system such as a set of computer executable instructions, and although a logical order is shown in the flowchart, in some cases, the steps shown or described can be executed in an order different from that here.
Fig. 2 is a flow chart of a data processing method according to an embodiment of the present invention. As shown in fig. 2, the method may include the steps of:
in step S202, the presence of an illegal device in the target management space is detected.
In the technical solution provided in step S202 of the present invention, the gateway component may be configured to detect whether an illegal device exists in the target management space, where the illegal device includes a suspected illegal device, and may report the target data to the centralized control background.
And step S204, collecting target data of illegal equipment, and reporting the target data to a centralized control background to schedule strategy information.
In the technical solution provided in step S204 of the present invention, after the gateway component detects that the target management space has the illegal device, the gateway component may collect target data of the illegal device, where the target data is used to indicate that the target management space has the illegal device, and the gateway component may report the target data to the centralized control background, and the centralized control background may verify the target data reported by the gateway component, that is, verify whether the illegal device indicated by the target data is really abnormal, and may schedule policy information based on the target data, or receive a feedback instruction corresponding to the policy information based on the target data, so as to send the feedback instruction to the master control system.
Optionally, the final decision-making right of the embodiment for the illegal device is in the user.
The embodiment can realize the authentication function of illegal equipment through signal positioning technology and heuristic strategy, thereby greatly providing the safety in the space range and the space range of equipment use.
And step S206, receiving the equipment operation instruction determined by the master control system based on the strategy information.
In the technical solution provided in the above step S206 of the present invention, after the gateway component reports the target data to the centralized control background to schedule the policy information, the centralized control background may send the policy information to the master control system, and the master control system may make a decision on an illegal device based on the policy information, which may be a device operation instruction, and then issue the device operation instruction to the gateway component.
And S208, responding to the equipment operation instruction, and at least forbidding illegal equipment from running and/or early warning the illegal equipment.
In the technical solution provided in step S208 of the present invention, after the gateway component receives the device operation instruction determined by the master control system based on the policy information, the gateway component may at least prohibit the operation of the illegal device in response to the device operation instruction, that is, implement rejection of the illegal device, and/or perform early warning on the illegal device. Optionally, the gateway component 11 may respond to the device operation instruction, and further perform operations such as closing and timing on the illegal device, so as to implement effective management and control on the illegal device.
Through the steps S202 and S208 described above, it is detected that an illegal device exists in the target management space; collecting target data of illegal equipment, and reporting the target data to a centralized control background to schedule strategy information; receiving an equipment operation instruction determined by the master control system based on the strategy information; and responding to the equipment operation instruction, and at least forbidding illegal equipment from operating and/or giving an early warning to the illegal equipment. That is to say, when the gateway component detects that an illegal device appears in the target management space, the gateway component reports target data for the illegal device to the centralized control background so as to dispatch the policy information through the centralized control background, and sends the policy information to the master control system, and the master control system manages and controls the illegal device based on the device operation instruction issued by the policy information, thereby avoiding the situation that the gateway lacks a security management and control policy, and does not discriminate and reject some illegal devices, and also avoiding the situation that the gateway is used for data forwarding among networks, thereby solving the technical problem of low efficiency of managing and controlling the device by the gateway, and achieving the technical effect of improving the efficiency of managing and controlling the device by the gateway.
The above-described data processing method of this embodiment is further described below.
As an optional implementation manner, after the illegal device is collected in step S204, the method further includes: the area of the illegal device in the target management space is determined.
In this embodiment, the gateway component may determine the area in the target management space where the illegal device is located after detecting the target data, i.e. locate the illegal device in the target management space through the gateway component.
As an alternative embodiment, the determining the area of the illegal device in the target management space includes: the region is circled in the target management space with the target ray.
In this embodiment, when determining the area of the illegal device in the target management space is implemented, the area where the illegal device is located may be circled with a red ray in the target management space, and the positioning device module may be started, and the area where the illegal device is located may be circled with a red ray in the target management space.
As an alternative embodiment, the determining the area of the illegal device in the target management space includes: detecting a signal source of illegal equipment; the region is determined based on the signal source.
In this embodiment, when the gateway component determines the area of the illegal device in the target management space, the signal source of the illegal device may be detected by the signal detection component, and the signal source may be a signal source with different functions, for example, the signal source is WIFI, bluetooth, UWB, infrared, and the like, and then the signal source is transmitted to the gateway core component for data isolation, and finally the centralized control module performs policy audit and decision to determine the area where the illegal device is located, thereby implementing the positioning of the illegal device.
Optionally, in this embodiment, the positioning may be implemented by a propagation model method of signal strength, which may be that a certain channel fading model assumed in the current environment is used, and a distance between the terminal and a Wireless Access Point (AP) in a known location is estimated according to a mathematical relationship thereof, and if a user receives a plurality of AP signals, location information may be obtained by a trilateral positioning algorithm.
Alternatively, in this embodiment, the positioning may be performed by a fingerprinting method, which may be to combine the detection data of multiple APs into fingerprint information based on the propagation characteristics of WiFi signals, and estimate the possible location of the mobile object by comparing with the reference data.
Optionally, in this embodiment, an access point may be deployed through bluetooth positioning, and a corresponding network connection mode and communication mode may be configured, for example, broadcast communication or connection communication. After each node is accessed, a special data packet can be sent to the outside, a Received Signal Strength (RSSI) mechanism can be added in the data packet transmission, the approximate position information of illegal equipment can be obtained by forming a tree structure according to the strength of signals, and the spatial distance can be calculated by using the RSSI value in the signals, so that the aim of positioning the illegal equipment can be fulfilled.
Alternatively, in this embodiment, positioning may also be implemented based on a positioning algorithm of Angle of arrival positioning (AOA), positioning may also be implemented based on a positioning algorithm of Time of arrival positioning (TOA), positioning may also be implemented based on a positioning algorithm of Time Difference of arrival positioning (TDOA), and positioning may also be implemented based on a positioning algorithm of Received Signal Strength positioning (RSS).
As an optional implementation manner, in step S204, collecting target data of an illegal device includes: sending a first request to a centralized control background, wherein the first request is used for requesting a device list, the device list comprises information of a plurality of devices, and the plurality of devices comprise illegal devices; acquiring a device list sent by a centralized control background in response to a first request; sending a second request to each device in the device list, wherein the second request is used for requesting to determine whether each device is illegal; and in the case that at least one first device which does not return response information to the second request exists, determining the at least one first device as an illegal device, and generating target data based on the at least one first device.
In this embodiment, when the gateway component detects the target data, the gateway component may send a first request to the centralized control background, where the first request may be used to request an up-to-date device list from the centralized control background, where the device list, that is, the device information list, may include information of multiple devices. After the gateway component sends the first request to the centralized control background, the device list sent by the centralized control background in response to the first request may be obtained. Optionally, the gateway component of this embodiment detects the signal and then sends a second request, i.e., a probe request, to each device in the device list, which may be used to request a determination of whether each device is illegitimate. Optionally, when there is at least one first device that does not return response information to the second request, that is, there is at least one first device that cannot identify and respond to the second request, the at least one first device may be determined as an illegal device, and then target data indicating that the illegal device exists in the target management space is generated based on the at least one first device.
As an optional implementation manner, in the presence of at least one first device that does not return response information to the second request, determining the at least one first device as an illegal device includes: under the condition that at least one first device which does not return response information to the second request exists, sending the second request to each device in the device list again at intervals of a first time length; and determining the at least one first device as an illegal device under the condition that the at least one first device which does not return response information to the second request still exists.
In this embodiment, in the case that there is at least one first device that does not return response information to the second request, the second request may be sent again to each device in the device list at intervals of the first duration, that is, each device in the device list is probed again by the second request as to whether it is an illegal device, and if there is still at least one first device that does not return response information to the second request, that is, the gateway component still does not receive response information, the at least one first device may be determined as an illegal device, a device location signal may be sent, and an area of the illegal device may be drawn by a red emitter in the target management space. Optionally, the gateway component of this embodiment may also feed back information of the illegal device to the centralized control background.
As an optional implementation manner, after sending the second request to each device in the device list, the method further includes: in the case where there is at least one second device that returns response information to the second request, the device list is updated based on the at least one second device.
In this embodiment, after the gateway component sends the second request to each device in the device list, if there is at least one second device returning response information to the second request, a registration record registering a state of the device may be queried, and a record of updating the device list may be saved further based on the at least one second device synchronously updating the device list.
As an optional implementation manner, after obtaining the device list sent by the centralized control background in response to the first request, the method further includes: and receiving the equipment state information and the position information reported by each equipment every second time length.
In the related art, after the device is used for a period of time, the name of the device fails and cannot receive device feedback in time, and the device only waits for artificial discovery and treatment. In this embodiment, the registered device reports its own device state information and location information to the gateway component at a second time interval, which may be consistent with the information recorded by the master control system, so that the gateway component may control the state of the registered device in real time and effectively.
The data processing method of the embodiment can provide the authentication function of illegal equipment, can be realized by a signal positioning technology and a heuristic strategy, and greatly provides the safety of the equipment in use and in a space range; the centralized control background of the embodiment can be communicated with the cloud server, can effectively execute the cloud instructions in real time, and has time feedback of the self state, so that the situation that a gateway lacks a management and management scheme, cannot freely communicate with the cloud server, receives, transmits or executes the cloud instructions, and does not provide a channel which can be managed and controlled by the cloud is avoided; the data processing method of the embodiment is diversified and humanized in design, can provide dual mode management of a local area network and a wide area network, can immediately send a feedback instruction to the user master control system after the centralized control background receives the corresponding feedback instruction, and has the final decision right on the user, so that the situation that the gateway is used for data forwarding among networks is avoided, the gateway uniqueness is strong, and each complete system can only bear one set of corresponding gateway system and cannot realize diversification; the data processing method of the embodiment can provide an efficient early warning function, perform equipment operation maintenance, and ensure the normal operation state of the equipment according to the information and space positioning of the equipment, and if the equipment fails, the corresponding feedback and early warning functions can be provided, so that the problem that unified configuration and intelligent configuration cannot be realized along with the access of multiple equipment is avoided, the technical problem of low efficiency of managing and controlling the equipment by the gateway is solved, and the technical effect of improving the efficiency of managing and controlling the equipment by the gateway is achieved.
Example 3
The above-described method of embodiments of the present invention is described below by way of example with reference to the preferred embodiments.
In the related art, the gateway is used for data forwarding between networks, such as a wide area network, a local area network, and a metropolitan area network.
Fig. 3 is a schematic diagram of a network topology according to the related art. As shown in fig. 3, data between a Domain Name System (DNS) and a D device can be forwarded through a gateway among an a network, a B network, and a C network. The DNS can correspond to 210.5.9.88, and the intranet card corresponds to 192.168.1.1/24.
In addition, the uniqueness of the gateways on the market is strong, each complete system can only bear one set of corresponding gateway system, the customization is similar, and the diversification cannot be realized.
The gateway system in the market lacks a management scheme, cannot freely communicate with the cloud, receives, transmits or executes cloud instructions, and does not provide a channel capable of being managed and controlled by the cloud.
The gateways on the market lack intellectualization, the development of the internet of things technology-everything interconnection, and unified configuration and intelligent configuration cannot be achieved along with the access of multiple devices.
Gateways on the market lack certain security management and control strategies, and do not perform measures such as identification rejection processing and early warning prompting aiming at some illegal devices.
FIG. 4 is a schematic diagram of another data processing system according to an embodiment of the present invention. As shown in fig. 4, the data processing system includes: a Spider centralized control background 41, a gateway component 42 and a user general control system 43. Among other things, gateway component 42 includes: spider central control 421, signal detection component 422, positioning device apparatus 423, and gateway core component 424.
The Spider centralized control background 41 belongs to a remote control center, and can perform bidirectional communication with the Spider centralized control 421 in the gateway component 42 and the user master control system 43, so that data among the Spider centralized control background, the Spider centralized control background and the user master control system are consistent with cloud data. The Spider centralized control background 41 can also directly issue an instruction to the Spider centralized control 421 in the gateway component 42 to execute the corresponding operation. For example, when discovering abnormal devices, when the Spider centralized control 421 in the gateway component 42 discovers that suspected illegal devices are present in the management space, the data is reported to the Spider centralized control background 41 for verification, a corresponding policy is scheduled, and the user master control system 43 is notified; the Spider central 421 in the gateway component 42 will activate the pointing device module to draw the area of illegal devices in space with a red-emitting coil.
The gateway component 42, which is the executor of the command, is pre-installed with the Spider central control 421, the signal detection component 422, the positioning device 423 and the gateway core component 424, and other components may be attached according to the user's requirements. The signal detection component 422 is configured to detect signal sources with different functions, for example, an iBeacon signal, WIFI, UWB, bluetooth, infrared ray, and the like, and then transmit the signal to the gateway core component 424 (the gateway core component 424 is only a transfer station and is configured to perform data isolation), and finally, policy auditing and decision making are performed by the Spider centralized control 421.
The user master control system 43 and the data presentation center are configured to receive notification and data display of the Spider centralized control background 41, and may directly issue an instruction to the Spider centralized control in the gateway component 42 in the local area network, so as to implement partial operations, such as switching on and off of devices, feedback of device states, timing of devices, and the like.
The intelligent gateway rejection method of this embodiment is described below.
Fig. 5 is an interaction diagram of an intelligent gateway rejection method according to an embodiment of the present invention. As shown in fig. 5, the method may include the steps of:
step S501, the gateway component requests the latest device list from the Spider centralized control background.
Step S502, the gateway component acquires the latest equipment list sent by the Spider centralized control background.
In step S503, the gateway component detects the signal.
In step S504, the gateway component sends a probe request to device N in the device list.
In step S505, the gateway component receives the response information returned by the device N to the probe request.
In step S506, the gateway component queries the registration record.
Step S507, the gateway component synchronizes the latest device information list to the Spider centralized control background.
In step S508, the gateway component updates the registration record of the device.
In step S509, device N cannot recognize the probe request and does not send a response message to the gateway component.
In step S510, the gateway component sends the probe request again to device N in the device list.
In step S511, the gateway component still does not receive the response information returned by the device N to the probe request.
In step S512, the gateway component sends out device location information.
The device location information of this embodiment may be used to request location of a device N that is an illegitimate device.
Step S513, the gateway component feeds back the information that the device N is an illegal device to the Spider centralized control background.
In step S514, the gateway component draws the area of illegal devices in space with a red ray coil.
The above steps S509 to S514 of this embodiment are methods for equipment rejection.
The following describes the intelligent gateway signal positioning method according to this embodiment.
When the signal source is WIFI, gateway signal positioning can be realized by adopting a signal intensity propagation model method, a certain channel fading model can be assumed in the current environment, the distance between the terminal and the AP at the known position is estimated according to the mathematical relationship, and if a user hears a plurality of AP signals, the position information of the user can be obtained through a trilateral positioning algorithm; the gateway signal positioning can also be realized by adopting a fingerprint identification method, and the detection data of a plurality of APs can be combined into fingerprint information based on the propagation characteristics of WiFi signals, and the possible position of the moving object can be estimated by comparing the fingerprint information with reference data.
When the signal source is bluetooth, the bluetooth positioning technology needs to deploy an access point and configure a corresponding network connection mode and communication mode, for example, the communication mode is broadcast communication or connection communication. After each node is accessed, a special data packet can be externally sent, an RSSI mechanism is added into the data packet in transmission, a tree structure can be formed according to the strength of signals, further, approximate position information of equipment can be obtained, and the space distance is calculated by using the RSSI value in the signals, so that the positioning effect is achieved.
When the signal source is UWB, the positioning effect can be achieved by an AOA-based positioning algorithm, a TOA-based positioning algorithm, a TDOA-based positioning algorithm, and an RSS-based positioning algorithm.
For example, take indoor intelligent house as an example, in the intelligent house field, some business hotels also begin to develop toward intelligent house, promote customer experience. Optionally, in order to ensure the security and the effectiveness of the devices, if some illegal devices are installed in a certain room by illegal personnel, the method of the embodiment can report the illegal devices to the Spider centralized control background in time and then directly issue the illegal devices to the user master control system, thereby effectively ensuring the privacy of the client.
Alternatively, this embodiment may effectively control the status of the registered device in real time. Some devices fail in their name after a period of use, but cannot receive device feedback in time and only wait for human discovery and processing. By the method of the embodiment, the registered equipment can report the state and the position information of the equipment at intervals and keep synchronous with the user master control system.
The gateway component of the embodiment can be connected with the cloud service, can effectively execute the cloud instruction in real time, and has the time feedback of the self state; the system is diversified and humanized in design, can provide dual mode management of a local area network and a wide area network, can immediately send a feedback instruction to a user master control system after a Spider centralized control background receives the corresponding feedback instruction, and has the final decision right of a user; the embodiment can provide the authentication function of illegal equipment, and can greatly provide the safety of equipment in use and space range by a signal positioning technology and a heuristic strategy; this embodiment can provide efficient early warning function, equipment operation maintenance, can guarantee the normal operating condition of equipment according to information, the space location of equipment, if also there are corresponding feedback, early warning function invalid to solved the gateway and carried out the technical problem of the inefficiency of management and control to equipment, reached the technological effect that improves the efficiency that the gateway carries out the management and control to equipment.
Example 3
The embodiment of the invention also provides a data processing device which is applied to the gateway component. It should be noted that the data processing apparatus of this embodiment may be used to execute the data processing method of the embodiment of the present invention.
Fig. 6 is a schematic diagram of a data processing apparatus according to an embodiment of the present invention. As shown in fig. 6, the data processing device 60 may include: a detection unit 61, an acquisition unit 62, a receiving unit 63 and a processing unit 64.
A detection unit 61 for detecting the presence of an illegal device in the target management space;
the acquisition unit 62 is configured to acquire target data of the illegal device, and report the target data to the centralized control background to schedule policy information;
the receiving unit 63 is configured to receive an equipment operation instruction determined by the master control system based on the policy information;
the processing unit 64 is configured to at least prohibit the illegal device from operating and/or perform an early warning on the illegal device in response to the device operation instruction.
In the data processing apparatus in this embodiment, when the gateway component detects that an illegal device occurs in the target management space, the gateway component reports target data for the illegal device to the centralized control background to schedule policy information through the centralized control background, and sends the policy information to the master control system, and the master control system manages and controls the illegal device based on a device operation instruction issued by the policy information, thereby avoiding that the gateway lacks a security management and control policy, avoiding that some illegal devices are not identified and rejected, and also avoiding that the gateway is used for data forwarding among networks, thereby solving the technical problem of low efficiency of managing and controlling the device by the gateway, and achieving the technical effect of improving the efficiency of managing and controlling the device by the gateway.
Example 4
According to an embodiment of the present invention, there is also provided a computer-readable storage medium, wherein the computer-readable storage medium includes a stored program, and when the program is executed by a processor, the computer-readable storage medium is controlled by a device to execute the data processing method according to the embodiment of the present invention.
Example 5
According to the embodiment of the invention, the processor is used for running the program, wherein the data processing method of the embodiment of the invention is executed when the program runs.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or models, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention, which is substantially or partly contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (12)

1. A data processing method applied to a gateway component comprises the following steps:
detecting that an illegal device exists in the target management space;
collecting target data of the illegal equipment, and reporting the target data to a centralized control background to schedule strategy information;
receiving an equipment operation instruction determined by the master control system based on the strategy information;
and responding to the equipment operation instruction, and at least forbidding the illegal equipment from running and/or early warning the illegal equipment.
2. The method of claim 1, wherein after collecting target data for the illegitimate device, the method further comprises:
determining a region of the illegitimate device in the target management space.
3. The method of claim 2, wherein determining the area of the illegitimate device in the target management space comprises:
the region is circled in the target management space with a target ray.
4. The method of claim 2, wherein determining the area of the illegitimate device in the target management space comprises:
detecting a signal source of the illegal device;
the region is determined based on the signal source.
5. The method of claim 1, wherein collecting target data for the illegitimate device comprises:
sending a first request to the centralized control background, wherein the first request is used for requesting a device list, the device list comprises information of a plurality of devices, and the plurality of devices comprise the illegal device;
acquiring the equipment list sent by the centralized control background in response to the first request;
sending a second request to each of the devices in the device list, wherein the second request is used for requesting to determine whether each of the devices is illegal;
and in the case that at least one first device which does not return response information to the second request exists, determining the at least one first device as the illegal device, and generating the target data based on the at least one first device.
6. The method according to claim 5, wherein determining at least one first device as the illegal device in case that there is at least one first device that does not return response information to the second request comprises:
under the condition that at least one first device which does not return the response information to the second request exists, sending the second request to each device in the device list again at a first time interval;
determining at least one first device as the illegal device if there is still at least one first device that does not return the response information to the second request.
7. The method of claim 5, wherein after sending the second request to each of the devices in the device list, the method further comprises:
in the case where there is at least one second device that returns the response information to the second request, updating the device list based on the at least one second device.
8. The method of claim 5, wherein after obtaining the list of devices sent by the centralized control background in response to the first request, the method further comprises:
and receiving the equipment state information and the position information reported by each equipment every second time length.
9. A data processing system, comprising:
a gateway component for detecting target data of an illegal device in the case where the illegal device exists in a target management space;
the centralized control background is connected with the gateway component and used for scheduling the strategy information based on the target data;
the master control system is connected with the centralized control background and used for determining an equipment operation instruction based on the strategy information;
the gateway component is connected with the master control system and used for responding to the equipment operation instruction, at least forbidding the illegal equipment to operate and/or early warning the illegal equipment.
10. A data processing apparatus, applied to a gateway component, comprising:
a detection unit for detecting existence of an illegal device in the target management space;
the acquisition unit is used for acquiring target data of the illegal equipment and reporting the target data to a centralized control background to schedule strategy information;
the receiving unit is used for receiving the equipment operation instruction determined by the master control system based on the strategy information;
and the processing unit is used for responding to the equipment operation instruction, at least forbidding the illegal equipment from operating and/or giving an early warning to the illegal equipment.
11. A computer-readable storage medium, comprising a stored program, wherein the program, when executed by a processor, controls an apparatus in which the computer-readable storage medium is located to perform the method of any of claims 1-8.
12. A processor, characterized in that the processor is configured to run a program, wherein the program when running performs the method of any of claims 1 to 8.
CN202011636400.3A 2020-12-31 2020-12-31 Data processing method, data processing device, computer readable storage medium and processor Pending CN114710305A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011636400.3A CN114710305A (en) 2020-12-31 2020-12-31 Data processing method, data processing device, computer readable storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011636400.3A CN114710305A (en) 2020-12-31 2020-12-31 Data processing method, data processing device, computer readable storage medium and processor

Publications (1)

Publication Number Publication Date
CN114710305A true CN114710305A (en) 2022-07-05

Family

ID=82167357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011636400.3A Pending CN114710305A (en) 2020-12-31 2020-12-31 Data processing method, data processing device, computer readable storage medium and processor

Country Status (1)

Country Link
CN (1) CN114710305A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012151900A1 (en) * 2011-08-29 2012-11-15 中兴通讯股份有限公司 Method, system and device for positioning mobile terminal
CN104994077A (en) * 2015-06-08 2015-10-21 北京奇虎科技有限公司 Wireless local area network access equipment identity marking method and device
CN105847234A (en) * 2016-03-11 2016-08-10 中国联合网络通信集团有限公司 Suspicious terminal access pre-warning method, gateway management platform and gateway device
CN106899584A (en) * 2017-02-17 2017-06-27 深圳怡化电脑股份有限公司 Management method and its device that a kind of hardware device is accessed
CN107666464A (en) * 2016-07-28 2018-02-06 腾讯科技(深圳)有限公司 A kind of information processing method and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012151900A1 (en) * 2011-08-29 2012-11-15 中兴通讯股份有限公司 Method, system and device for positioning mobile terminal
CN104994077A (en) * 2015-06-08 2015-10-21 北京奇虎科技有限公司 Wireless local area network access equipment identity marking method and device
CN105847234A (en) * 2016-03-11 2016-08-10 中国联合网络通信集团有限公司 Suspicious terminal access pre-warning method, gateway management platform and gateway device
CN107666464A (en) * 2016-07-28 2018-02-06 腾讯科技(深圳)有限公司 A kind of information processing method and server
CN106899584A (en) * 2017-02-17 2017-06-27 深圳怡化电脑股份有限公司 Management method and its device that a kind of hardware device is accessed

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
欧冬秀: "《交通信息技术 第2版》", 31 December 2014, 同济大学出版社, pages: 200 - 202 *
田景熙: "《物联网概论 第2版》", 31 December 2017, 东南大学出版社, pages: 146 - 148 *
贺雅慧: "基于 WiFi 技术的无线探测与定位系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 10 - 49 *
邓中亮: "《室内外无线定位与导航》", 31 December 2013, pages: 29 - 34 *

Similar Documents

Publication Publication Date Title
US10417888B2 (en) Intruder detection using a wireless service mesh network
CN105981419B (en) Resident systems
US8457656B2 (en) Wireless tracking system and method utilizing multiple location algorithms
CN107820253A (en) Simultaneously using the method and apparatus of multiple channels in dynamic frequency selection frequency range in wireless network
CN107251623A (en) Position mobile device
CN107258087A (en) Position determines the time-multiplexed transmission of beacon signal and control coherent signal
KR101363586B1 (en) System offering information of user at close range
CN104113861A (en) A System And Method For Registering Network Information Strings
CN101540034A (en) Room management system and room management method
US9086469B2 (en) Low frequency magnetic induction positioning system and method
WO2023126380A1 (en) Remotely monitored premises security monitoring systems
US20200112633A1 (en) Method for using intercom to perform intelligent calling process, intelligent calling apparatus and system thereof
US11816524B2 (en) Indoor tag location detection system
JP7314435B1 (en) Devices, networks, methods and computer programs for controlling presence detection using radio frequency sensing in networks
CN114710305A (en) Data processing method, data processing device, computer readable storage medium and processor
US20230326612A1 (en) Methods and Software for Contact Tracing and Exposure-Event Suppression Using Indoor Positioning
EP4207123A1 (en) Premises security monitoring system
US12108360B2 (en) Dual-band real-time location tracking
US10986518B2 (en) Monitoring and tracking non-cooperative devices
EP4207124A1 (en) Security monitoring systems
EP4207117A1 (en) Sensor node for security monitoring systems
EP4207127A1 (en) Distraction burglary detection
EP4207120A1 (en) Security monitoring system
KR100885297B1 (en) System and Method for prevention of personal belongings loosing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination