CN115062350B - Correlation matching system of Internet of things and security chip - Google Patents

Correlation matching system of Internet of things and security chip Download PDF

Info

Publication number
CN115062350B
CN115062350B CN202210651394.1A CN202210651394A CN115062350B CN 115062350 B CN115062350 B CN 115062350B CN 202210651394 A CN202210651394 A CN 202210651394A CN 115062350 B CN115062350 B CN 115062350B
Authority
CN
China
Prior art keywords
transfer
pattern
data
transfer area
baseline
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210651394.1A
Other languages
Chinese (zh)
Other versions
CN115062350A (en
Inventor
陈燕
柳建勇
陈魁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yizhuo Technology Co ltd
Original Assignee
Shenzhen Yizhuo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yizhuo Technology Co ltd filed Critical Shenzhen Yizhuo Technology Co ltd
Priority to CN202210651394.1A priority Critical patent/CN115062350B/en
Publication of CN115062350A publication Critical patent/CN115062350A/en
Application granted granted Critical
Publication of CN115062350B publication Critical patent/CN115062350B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an association matching system of an Internet of things and a security chip, which comprises an Internet of things acquisition device, wherein the Internet of things acquisition device is used for acquiring data stored by the Internet of things device matched with the Internet of things acquisition device; the data association module is used for associating the transfer graph for generating the data with the security graph of the security chip; the transfer selection module is used for matching the transfer pattern with the safety pattern, and when the transfer pattern is matched with the safety pattern, the safety chip corresponding to the safety pattern is the transfer chip; the path selection module is used for selecting a path for transferring data to the transfer chip, so that association matching is completed, a proper security chip can be selected for the data of the Internet of things more accurately through the association matching of the security chip and the Internet of things, and the selected process can be quantified through constructing the transfer graph and the security graph, so that the security chip selected each time is guaranteed to be the most proper.

Description

Correlation matching system of Internet of things and security chip
Technical Field
The invention relates to the field of security chips, in particular to an association matching system of the Internet of things and a security chip.
Background
In the related art, the security chip is used for storing data or operation data generated by the internet of things, but the security chip cannot actively select the data or operation data generated by the internet of things, so that the data storage or operation efficiency is low.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art.
According to the association matching system of the Internet of things and the security chip, which is provided by the embodiment of the invention, the association matching system of the Internet of things and the security chip comprises:
the system comprises an Internet of things acquisition device, a storage device and a storage device, wherein the Internet of things acquisition device is used for acquiring data stored by the Internet of things device matched with the Internet of things acquisition device;
the data association module is used for associating the transfer graph for generating the data with the security graph of the security chip;
the transfer selection module is used for matching the transfer pattern with the safety pattern, and when the transfer pattern is matched with the safety pattern, the safety chip corresponding to the safety pattern is the transfer chip;
and the path selection module is used for selecting a path for transferring the data to the transfer chip and completing the association matching.
Further, the data association for generating a transfer pattern of data includes:
acquiring type codes of data, wherein the type codes comprise a first type code, a second type code and a third type code;
acquiring a storage value of data, wherein the storage value is obtained by multiplying the byte number of the data and the occupation coefficient of the data;
acquiring the preset storage days of the data;
and sequentially filling the type codes, the storage values and the storage days corresponding to the data into the placement points corresponding to the transfer templates, and connecting the placement points corresponding to the type codes, the storage values and the storage days to obtain the transfer graph.
Further, the transfer template includes:
constructing a first baseline and a second baseline, wherein the first baseline and the second baseline are vertical in the same plane, and the first baseline intersects at the midpoint of the second baseline to divide the second baseline into a left second baseline and a right second baseline;
the left second base line and the right second base line are arranged symmetrically along the first base line axis in the same plane;
the left second base line is provided with placement points corresponding to the first type code, the second type code and the third type code;
the first base line is provided with a placement point corresponding to the storage value;
and the second baseline on the right is provided with a placement point corresponding to the storage days.
Further, the occupation coefficients of the data include:
acquiring a type code of data, acquiring the byte number of data corresponding to the same type code in a security chip, and marking the byte number as a first byte number;
acquiring the byte number of the data corresponding to the same type code in the Internet of things equipment, and marking the byte number as a second byte number;
wherein the ratio of the first byte number to the second byte number is an occupancy coefficient.
Further, before generating the security pattern of the security chip, the method further includes:
constructing a third baseline, wherein the third baseline and the second baseline are vertical in the same plane, and the third baseline and the first baseline intersect at the midpoint of the second baseline;
the third baselines are parallel to the first baselines in the same plane, and the left second baselines and the right second baselines are axially symmetrically arranged along the third baselines in the same plane;
and a placement point corresponding to the storage space value is arranged on the first base line, wherein the third base line, the left second base line and the right second base line form a safety template together.
Further, generating the security pattern of the security chip includes
Acquiring a type code of a security chip, wherein the type code comprises a first type code, a second type code and a third type code;
acquiring a storage space value of a security chip;
acquiring an update time value of the security chip;
and sequentially filling the type code, the storage space value and the update time value corresponding to the security chip into the placement points corresponding to the security template, and connecting the placement points corresponding to the type code, the storage value and the storage days to obtain the security pattern.
Further, the transfer selection module for matching the transfer pattern and the security pattern includes:
acquiring a transfer pattern of data, wherein the pattern between a first baseline and a left second baseline is a first transfer pattern, and the area of the first transfer pattern is a first transfer area;
the pattern between the first base line and the right second base line is a second transfer pattern, and the area of the second transfer pattern is a second transfer area;
the method comprises the steps of obtaining a safety pattern of a safety chip, wherein the pattern between a third baseline and a left second baseline is a third transfer pattern, and the area of the third transfer pattern is a third transfer area;
the pattern between the third baseline and the right second baseline is a fourth transfer pattern, and the area of the fourth transfer pattern is a fourth transfer area.
Further, when the transfer pattern and the security pattern are matched, the security chip corresponding to the security pattern is the transfer chip, which includes:
acquiring a second transfer area and a fourth transfer area, and if the second transfer area is larger than the fourth transfer area, the transfer pattern and the security pattern are not matched;
if the second transfer area is smaller than the fourth transfer area, acquiring a first transfer area and a third transfer area, and if the third transfer area is larger than the first transfer area, matching the transfer pattern with the security pattern, otherwise, not matching;
if the second transfer area is smaller than the fourth transfer area, acquiring a first transfer area and a third transfer area, if the third transfer area is equal to the first transfer area, acquiring a type code of data and a type code of a security chip, and if the type code of the data is the same as the type code of the security chip, matching a transfer pattern with the security pattern, otherwise, not matching;
if the second transfer area is equal to the fourth transfer area, acquiring a first transfer area and a third transfer area, and if the third transfer area is smaller than the first transfer area, the transfer pattern and the security pattern are not matched;
and if the second transfer area is equal to the fourth transfer area, acquiring a first transfer area and a third transfer area, if the third transfer area is greater than or equal to the first transfer area, acquiring a storage value and a storage space value, and if the storage space value is greater than the storage value, matching the transfer pattern with the safety pattern, otherwise, not matching.
Further, the path selection module is configured to select a path for transferring data to the transfer chip, and includes:
obtaining the uploading rate, the downloading rate and the using times of a circuit corresponding to the transfer chip, and obtaining a path value corresponding to the transfer chip through a screening formula;
the screening formula is specifically obtained by multiplying the ratio of the uploading rate to the downloading rate and the using times;
and selecting the line with the largest path value as the path.
Further, the data corresponding to the first type code is text data, and the corresponding security chip is used for storing the text data;
the data corresponding to the second type code is voice data, and the corresponding security chip is used for storing the voice data;
the data corresponding to the second type code is video data, and the corresponding security chip is used for storing the video data.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
FIG. 1 is a flow chart according to an embodiment of the invention;
FIG. 2 is a first baseline schematic according to an embodiment of the invention;
FIG. 3 is a schematic illustration of a left second baseline and a right second baseline according to an embodiment of the invention;
FIG. 4 is a third baseline schematic according to an embodiment of the invention;
fig. 5 is a schematic diagram of a transfer pattern and a security pattern according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
In the description of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", "axial", "radial", "circumferential", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the device or element being referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present invention.
In the description of the invention, "a first feature" may include one or more such features, and "a plurality" may mean two or more, and that a first feature "above" or "below" a second feature may include both the first and second features being in direct contact, or may include both the first and second features not being in direct contact but being in contact with each other through additional features therebetween, with the first feature "above", "over" and "above" the second feature including both the first feature being directly above and obliquely above the second feature, or simply indicating that the first feature is higher in level than the second feature.
An association matching system for the internet of things and a security chip according to an embodiment of the present invention is described below with reference to fig. 1 to 5 of the accompanying drawings.
The Internet of things acquisition equipment is used for acquiring data stored by Internet of things equipment matched with the Internet of things acquisition equipment, wherein the Internet of things equipment is a nonstandard computing equipment which can be connected to a network in a wireless mode and has the capability of transmitting the data, and the equipment can communicate and interact through the Internet and can be monitored and controlled remotely;
the data stored by the internet of things device can be data acquired by the internet of things device or data generated by operation of the internet of things device, the data stored by the internet of things device is not specifically limited here, and the data stored by the internet of things device can be flexibly set according to scenes.
When the data are acquired by the Internet of things acquisition equipment, the data are associated to generate a transfer graph of the data, and specifically, a first base line and a second base line are constructed, wherein the first base line and the second base line are vertical in the same plane, and the first base line intersects at the midpoint of the second base line to divide the second base line into a left second base line and a right second base line;
the left second base line and the right second base line are arranged symmetrically along the first base line axis in the same plane;
the first base line is provided with a first class code, a second class code and a third class code, for example, the length of the first base line is obtained, and the first class code, the second class code and the third class code are divided equally, wherein each point in the third class corresponds to one class code, preferably, the equally divided point corresponding to the first class code is close to the first base line, the second class code is inferior, and the third class code is far away from the first base line; more preferably, the types of the class codes are not limited to three, and can be flexibly set according to the environment.
The first base line is provided with a placement point corresponding to a storage value, for example, the storage value with the largest data corresponding to the acquisition equipment of the internet of things is obtained, the length of the first base line is obtained, the storage value is equally divided according to the value corresponding to the storage value, each equal division point corresponds to one placement point, for example, the largest storage value is 10 units, the length of the first base line is 20 units, and one placement point is correspondingly arranged on each 2 units, and the units can be flexibly arranged.
The placement points corresponding to the storage days are arranged on the right second base line, for example, the storage days with the largest data corresponding to the acquisition equipment of the Internet of things are acquired, the length of the right second base line is divided equally according to the numerical value corresponding to the storage days, each equal division point corresponds to one placement point, for example, the largest storage days are 10 units, the length of the right second base line is 20 units, one placement point is correspondingly arranged on each 2 units, and the units can be flexibly arranged.
After the transfer template is constructed, the type codes of the data are obtained, wherein the type codes comprise a first type code, a second type code and a third type code, the data corresponding to the first type code are text data, and the corresponding security chip is used for storing the text data; the data corresponding to the second type code is voice data, and the corresponding security chip is used for storing the voice data; the data corresponding to the second type code is video data, and the corresponding security chip is used for storing the video data.
Acquiring a storage value of data, wherein the storage value is obtained by multiplying the byte number of the data and the occupation coefficient of the data, acquiring a type code of the data, acquiring the byte number of the data corresponding to the same type code in a security chip, and marking the byte number as a first byte number; and acquiring the byte number of the data corresponding to the same type code in the Internet of things equipment, and marking the byte number as a second byte number, wherein the ratio of the first byte number to the second byte number is an occupation coefficient.
Acquiring the preset storage days of the data;
and sequentially filling the type codes, the storage values and the storage days corresponding to the data into the placement points corresponding to the transfer templates, and connecting the placement points corresponding to the type codes, the storage values and the storage days to obtain the transfer graph.
Meanwhile, the data association module builds a security pattern for the security chip, and specifically builds a third baseline, wherein the third baseline and the second baseline are vertical in the same plane, and the third baseline and the first baseline intersect at the midpoint of the second baseline;
the third baselines are parallel to the first baselines in the same plane, and the left second baselines and the right second baselines are axially symmetrically arranged along the third baselines in the same plane;
and a placement point corresponding to a storage space value is arranged on the first base line, wherein the third base line, the left second base line and the right second base line form a security template together, and the storage space value is the number of available storage bytes of the security chip.
Subsequently, the type code of the security chip is obtained, wherein the type code comprises a first type code, a second type code and a third type code;
and acquiring a storage space value and an update time value of the security chip, wherein the update time value is the maximum storage time corresponding to the security chip.
And sequentially filling the type code, the storage space value and the update time value corresponding to the security chip into the placement points corresponding to the security template, and connecting the placement points corresponding to the type code, the storage value and the storage days to obtain the security pattern.
The transfer selection module is used for matching a transfer pattern with a security pattern, and for example, the transfer pattern of the data is obtained, wherein the pattern between the first base line and the left second base line is a first transfer pattern, and the area of the first transfer pattern is a first transfer area;
the pattern between the first base line and the right second base line is a second transfer pattern, and the area of the second transfer pattern is a second transfer area;
the method comprises the steps of obtaining a safety pattern of a safety chip, wherein the pattern between a third baseline and a left second baseline is a third transfer pattern, and the area of the third transfer pattern is a third transfer area;
the pattern between the third baseline and the right second baseline is a fourth transfer pattern, and the area of the fourth transfer pattern is a fourth transfer area.
The method comprises the following steps:
acquiring a second transfer area and a fourth transfer area, and if the second transfer area is larger than the fourth transfer area, the transfer pattern and the security pattern are not matched;
if the second transfer area is smaller than the fourth transfer area, acquiring a first transfer area and a third transfer area, and if the third transfer area is larger than the first transfer area, matching the transfer pattern with the security pattern, otherwise, not matching;
if the second transfer area is smaller than the fourth transfer area, acquiring a first transfer area and a third transfer area, if the third transfer area is equal to the first transfer area, acquiring a type code of data and a type code of a security chip, and if the type code of the data is the same as the type code of the security chip, matching a transfer pattern with the security pattern, otherwise, not matching;
if the second transfer area is equal to the fourth transfer area, acquiring a first transfer area and a third transfer area, and if the third transfer area is smaller than the first transfer area, the transfer pattern and the security pattern are not matched;
and if the second transfer area is equal to the fourth transfer area, acquiring a first transfer area and a third transfer area, if the third transfer area is greater than or equal to the first transfer area, acquiring a storage value and a storage space value, and if the storage space value is greater than the storage value, matching the transfer pattern with the safety pattern, otherwise, not matching.
After the security chip is selected, the path selection module obtains the uploading rate, the downloading rate and the using times of the circuit corresponding to the transfer chip, and obtains the path value corresponding to the transfer chip through a screening formula; the screening formula is specifically obtained by multiplying the ratio of the uploading rate to the downloading rate and the using times; and selecting the line with the largest path value as the path.
The method has the advantages that the proper security chip can be selected for the data of the Internet of things more accurately through the association matching of the security chip and the Internet of things, the selected process can be quantified through constructing the transfer graph and the security graph, the security chip selected each time is guaranteed to be the most proper, the security and the high efficiency of data storage are guaranteed, and the proper line can be selected for data transmission through path selection.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
In the description herein, reference to the terms "embodiment," "specific embodiment," "example," and the like, means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.

Claims (6)

1. The association matching system of thing networking and security chip, its characterized in that includes:
the system comprises an Internet of things acquisition device, a storage device and a storage device, wherein the Internet of things acquisition device is used for acquiring data stored by the Internet of things device matched with the Internet of things acquisition device;
the data association module is used for generating a transfer graph of data and a security graph of the security chip;
the transfer selection module is used for matching the transfer pattern with the safety pattern, and when the transfer pattern is matched with the safety pattern, the safety chip corresponding to the safety pattern is the transfer chip;
the path selection module is used for selecting a path for transferring data to the transfer chip and completing association matching;
the transfer pattern for generating data includes:
acquiring type codes of data, wherein the type codes comprise a first type code, a second type code and a third type code;
acquiring a storage value of data, wherein the storage value is obtained by multiplying the byte number of the data and the occupation coefficient of the data;
acquiring the preset storage days of the data;
sequentially filling type codes, storage values and storage days corresponding to the data into the placement points corresponding to the transfer templates, and connecting the placement points corresponding to the type codes, the storage values and the storage days to obtain a transfer graph;
the transfer template comprises:
constructing a first baseline and a second baseline, wherein the first baseline and the second baseline are vertical in the same plane, and the first baseline intersects at the midpoint of the second baseline to divide the second baseline into a left second baseline and a right second baseline;
the left second base line and the right second base line are arranged symmetrically along the first base line axis in the same plane;
the left second base line is provided with placement points corresponding to the first type code, the second type code and the third type code;
the first base line is provided with a placement point corresponding to the storage value;
the second baseline is provided with placement points corresponding to the storage days;
the method further comprises the following steps of:
constructing a third baseline, wherein the third baseline and the second baseline are vertical in the same plane, and the third baseline and the first baseline intersect at the midpoint of the second baseline;
the third baselines are parallel to the first baselines in the same plane, and the left second baselines and the right second baselines are axially symmetrically arranged along the third baselines in the same plane;
the first base line is provided with a placement point corresponding to the storage space value, wherein the third base line, the left second base line and the right second base line form a safety template together;
generating a security pattern for a security chip includes
Acquiring a type code of a security chip, wherein the type code comprises a first type code, a second type code and a third type code;
acquiring a storage space value of a security chip;
acquiring an update time value of the security chip;
and sequentially filling the type code, the storage space value and the update time value corresponding to the security chip into the placement points corresponding to the security template, and connecting the placement points corresponding to the type code, the storage value and the storage days to obtain the security pattern.
2. The association matching system of the internet of things and the security chip as claimed in claim 1, wherein the occupation coefficients of the data include:
acquiring a type code of data, acquiring the byte number of data corresponding to the same type code in a security chip, and marking the byte number as a first byte number;
acquiring the byte number of the data corresponding to the same type code in the Internet of things equipment, and marking the byte number as a second byte number;
wherein the ratio of the first byte number to the second byte number is an occupancy coefficient.
3. The association matching system of the internet of things and the security chip as claimed in claim 1, wherein the transfer selection module for matching the transfer pattern and the security pattern comprises:
acquiring a transfer pattern of data, wherein the pattern between a first baseline and a left second baseline is a first transfer pattern, and the area of the first transfer pattern is a first transfer area;
the pattern between the first base line and the right second base line is a second transfer pattern, and the area of the second transfer pattern is a second transfer area;
the method comprises the steps of obtaining a safety pattern of a safety chip, wherein the pattern between a third baseline and a left second baseline is a third transfer pattern, and the area of the third transfer pattern is a third transfer area;
the pattern between the third baseline and the right second baseline is a fourth transfer pattern, and the area of the fourth transfer pattern is a fourth transfer area.
4. The association matching system of the internet of things and the security chip according to claim 3, wherein when the transfer pattern and the security pattern are matched, the security chip corresponding to the security pattern is the transfer chip comprising:
acquiring a second transfer area and a fourth transfer area, and if the second transfer area is larger than the fourth transfer area, the transfer pattern and the security pattern are not matched;
if the second transfer area is smaller than the fourth transfer area, acquiring a first transfer area and a third transfer area, and if the third transfer area is larger than the first transfer area, matching the transfer pattern with the security pattern, otherwise, not matching;
if the second transfer area is smaller than the fourth transfer area, acquiring a first transfer area and a third transfer area, if the third transfer area is equal to the first transfer area, acquiring a type code of data and a type code of a security chip, and if the type code of the data is the same as the type code of the security chip, matching a transfer pattern with the security pattern, otherwise, not matching;
if the second transfer area is equal to the fourth transfer area, acquiring a first transfer area and a third transfer area, and if the third transfer area is smaller than the first transfer area, the transfer pattern and the security pattern are not matched;
and if the second transfer area is equal to the fourth transfer area, acquiring a first transfer area and a third transfer area, if the third transfer area is greater than or equal to the first transfer area, acquiring a storage value and a storage space value, and if the storage space value is greater than the storage value, matching the transfer pattern with the safety pattern, otherwise, not matching.
5. The association matching system of the internet of things and the security chip as claimed in claim 4, wherein the path selection module for selecting a path for transferring data to the transfer chip comprises:
obtaining the uploading rate, the downloading rate and the using times of a circuit corresponding to the transfer chip, and obtaining a path value corresponding to the transfer chip through a screening formula;
the screening formula is specifically obtained by multiplying the ratio of the uploading rate to the downloading rate and the using times;
and selecting the line with the largest path value as the path.
6. The association matching system of the internet of things and the security chip according to claim 4, wherein the data corresponding to the first type code is text data, and the corresponding security chip is used for storing the text data;
the data corresponding to the second type code is voice data, and the corresponding security chip is used for storing the voice data;
the data corresponding to the second type code is video data, and the corresponding security chip is used for storing the video data.
CN202210651394.1A 2022-06-10 2022-06-10 Correlation matching system of Internet of things and security chip Active CN115062350B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210651394.1A CN115062350B (en) 2022-06-10 2022-06-10 Correlation matching system of Internet of things and security chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210651394.1A CN115062350B (en) 2022-06-10 2022-06-10 Correlation matching system of Internet of things and security chip

Publications (2)

Publication Number Publication Date
CN115062350A CN115062350A (en) 2022-09-16
CN115062350B true CN115062350B (en) 2023-11-24

Family

ID=83199791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210651394.1A Active CN115062350B (en) 2022-06-10 2022-06-10 Correlation matching system of Internet of things and security chip

Country Status (1)

Country Link
CN (1) CN115062350B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700085A (en) * 2015-03-10 2015-06-10 华中科技大学 Template matching-based chip positioning method
CN106982257A (en) * 2017-04-01 2017-07-25 重庆邮电大学 The management system and method for a kind of sensor network data
CN107316169A (en) * 2017-06-30 2017-11-03 合肥贺财工程项目管理有限公司 A kind of workshop storage compartmentalization transfer purging system
CN112313640A (en) * 2019-11-01 2021-02-02 深圳市大疆创新科技有限公司 Data storage and processing method, related device and storage medium
CN113903481A (en) * 2021-09-29 2022-01-07 安德鲁.浚宇.毛 Internet of things application processing method and system based on artificial intelligence and virtual chip

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700085A (en) * 2015-03-10 2015-06-10 华中科技大学 Template matching-based chip positioning method
CN106982257A (en) * 2017-04-01 2017-07-25 重庆邮电大学 The management system and method for a kind of sensor network data
CN107316169A (en) * 2017-06-30 2017-11-03 合肥贺财工程项目管理有限公司 A kind of workshop storage compartmentalization transfer purging system
CN112313640A (en) * 2019-11-01 2021-02-02 深圳市大疆创新科技有限公司 Data storage and processing method, related device and storage medium
CN113903481A (en) * 2021-09-29 2022-01-07 安德鲁.浚宇.毛 Internet of things application processing method and system based on artificial intelligence and virtual chip

Also Published As

Publication number Publication date
CN115062350A (en) 2022-09-16

Similar Documents

Publication Publication Date Title
CN108631945B (en) Method, apparatus and equipment for Polarization Coding
CN107592181B (en) Polar code encoding method and device
JP6925450B2 (en) Data transmission methods, base stations, and terminal devices
US11489617B2 (en) Data transmission method and communication device
JP6968889B2 (en) Data transmission method, terminal equipment and network equipment
EP2571224B1 (en) Method for processing messages on m2m platform and m2m platform system
KR102533095B1 (en) Resource configuration method, device and computer storage medium
CN108123777A (en) A kind of coding mode determines method and device
CN103490962A (en) Internet of Things access platform system and Internet of Things access method
US11616601B2 (en) Information transmission method, terminal device, and network device
CN112886969B (en) Polarization code encoding method and device
CN109240739A (en) A kind of method, apparatus and controlled terminal of rapid configuration BIOS option
CN115062350B (en) Correlation matching system of Internet of things and security chip
KR101116495B1 (en) Mobile terminal with reduced components
CN108880565B (en) Coding and decoding method of polarization code and communication equipment
CN109391358A (en) The method and apparatus of polarization code coding
CN116470987A (en) Encoding method, decoding method, and communication device
KR20230084587A (en) Communication method and device
EP3190847B1 (en) Capability cost signalling
CN110445784A (en) The display methods and device of operation data, energy resource system
CN108809498A (en) Communication means and communication device
CN112312519B (en) Equipment identification method and related device
KR100777880B1 (en) Method For Transmitting Short Message Using Sending Node Grouping
CN112422233A (en) Device communication method, communication device, and computer-readable storage medium
CN113472476A (en) Rate de-matching method, rate de-matching device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant