CN115396396A - Intelligent distribution system for unique identifier of security equipment - Google Patents
Intelligent distribution system for unique identifier of security equipment Download PDFInfo
- Publication number
- CN115396396A CN115396396A CN202211016666.7A CN202211016666A CN115396396A CN 115396396 A CN115396396 A CN 115396396A CN 202211016666 A CN202211016666 A CN 202211016666A CN 115396396 A CN115396396 A CN 115396396A
- Authority
- CN
- China
- Prior art keywords
- unique identifier
- equipment
- unique
- management module
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013507 mapping Methods 0.000 claims abstract description 19
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- 238000004064 recycling Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
- H04L61/3005—Mechanisms for avoiding name conflicts
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention relates to the technical field of security equipment, in particular to an intelligent distribution system for unique identification of security equipment, which comprises: the unique identifier allocating module is used for storing the mapping relation between the equipment token and the unique identifier management module; the device is used for acquiring the unique identifier request message, acquiring the mapping relation between the device token and the unique identifier management module from the unique identifier deployment module, determining the unique identifier management module based on the mapping relation, and forwarding the unique identifier request message to the unique identifier management module from the unique identifier deployment module to request for acquiring the unique identifier; and the unique identifier management module is used for determining a corresponding unique identifier set according to the equipment token and sending the unique identifier in the unique identifier set to the equipment. The invention can ensure that the equipment corresponds to the unique identifier, ensure that the equipment and the unique identifier have unique corresponding relation, and solve the technical problem that the identifier is possibly reused.
Description
Technical Field
The invention relates to the technical field of security equipment, in particular to an intelligent distribution system for unique identification of security equipment.
Background
Nowadays, the internet gradually develops towards the trend of the internet of things, and the existing security devices on the market are all fixed with identifiers during production, which is not beneficial to maintenance and recycling management. At present, if the identifier of the device is burned in during the chip burning program, the identifier may be repeatedly used in a manual operation environment, which may result in that the device cannot be used.
Disclosure of Invention
The invention provides an intelligent distribution system for unique identifiers of security equipment, which solves the technical problem that the identifiers are reused in the prior art.
The basic scheme provided by the invention is as follows: the utility model provides a unique sign intelligent distribution system of security protection equipment, includes:
the unique identifier allocating module is used for storing the mapping relation between the equipment token and the unique identifier management module;
the device is used for acquiring the unique identifier request message, acquiring the mapping relation between the device token and the unique identifier management module from the unique identifier deployment module, determining the unique identifier management module based on the mapping relation, and forwarding the unique identifier request message to the unique identifier management module from the unique identifier deployment module to request for acquiring the unique identifier;
and the unique identifier management module is used for determining a corresponding unique identifier set according to the equipment token and sending the unique identifier in the unique identifier set to the equipment.
The working principle and the advantages of the invention are as follows: in the scheme, considering that if the identifiers are burned in together during a chip burning program, the situation that the identifiers are reused possibly occurs in manual operation and the device cannot be used, therefore, a mapping relation between a device token and the unique identifier management module is obtained from the unique identifier deployment module, the unique identifier management module is determined based on the mapping relation, a unique identifier request message is forwarded to the unique identifier management module from the unique identifier deployment module to request to obtain the unique identifier, the unique identifier management module determines a corresponding unique identifier set according to the device token and sends the unique identifier in the unique identifier set to the device, the device can be ensured to correspond to the unique identifier set and the device and the unique identifier, the device and the unique identifier are ensured to have unique corresponding relation, the identifier is prevented from being reused, and the situation that the device cannot be used is avoided; meanwhile, when the equipment returns to the factory for recycling, the identifier of the equipment can be recycled and reused.
The method and the device can ensure that the device corresponds to the unique identifier set and the device corresponds to the unique identifier, ensure that the device and the unique identifier have unique corresponding relation, and solve the technical problem that the identifier is reused possibly in the prior art.
Further, when receiving a request of acquiring the unique identifier from the device, the unique identifier allocating module selects a server which is closest to the device and works normally according to the IP address of the device, and forwards the request to the unique identifier management module; the unique identifier management module determines a unique identifier from the device token and returns the unique identifier to the device.
Has the advantages that: the device is directly connected with the unique identification management module according to the mapping relation established by the unique identification allocation module, when the device needs to access the unique identification allocation module, the device token of the device is sent, the unique identification allocation module allocates the unique identification management module closest to the device, and the unique identifier is obtained from the unique identification management module.
Furthermore, the number of the unique identification management modules is multiple, and the unique identification management modules are located in different regions.
The beneficial effects are that: corresponding unique identification management modules are arranged in different regions, so that the nearest server which works normally is selected to manage and distribute the identifiers according to the IP address of the equipment.
Further, the unique identifier includes a unique ID, an enterprise identifier, a protocol type, and a device type.
Has the advantages that: the enterprise identifier is added for distinguishing different enterprises, so that different enterprises can conveniently manage equipment and recover a unique identifier, the protocol type can be defined by one character, the equipment is mainly distinguished by using different audio and video transmission protocols, a client can conveniently transmit audio and video by using a corresponding protocol, the equipment type can be numbered by types defined by different equipment, and then the equipment type is transcoded into a 16-system type, so that the management is facilitated.
Further, the unique identifier comprises 14-bit string data, the unique ID comprises 6-bit string data, the enterprise identifier comprises 3-bit string data, the protocol type comprises 1-bit string data, and the device type comprises 4-bit string data.
Has the advantages that: it is ensured that the unique identifier can contain sufficient information.
Further, the string data of the unique ID, the enterprise identifier and the protocol type is 36-system, and the string data of the device type is 16-system.
The beneficial effects are that: the implementation is simple, and errors are not easy to occur.
Further, when the unique identifier allocating module receives a request of acquiring the unique identifier from the device and selects a server which works normally and is closest to the device according to the IP address of the device, the unique identifier allocating module selects the number of the servers which work normally and is closest to the device to be one according to the IP address of the device.
Has the advantages that: the mutual interference among a plurality of servers is prevented, and the repeated use of identifiers is avoided.
Drawings
Fig. 1 is a system structure block diagram of an embodiment of an intelligent distribution system for unique identifiers of security devices according to the present invention.
Fig. 2 is a schematic diagram of a unique identifier of an embodiment of an intelligent distribution system for unique identifiers of security devices according to the present invention.
Detailed Description
The following is further detailed by the specific embodiments:
example 1
An embodiment is substantially as shown in figure 1, comprising:
the unique identifier allocating module is used for storing the mapping relation between the equipment token and the unique identifier management module;
the device is used for acquiring the unique identifier request message, acquiring the mapping relation between the device token and the unique identifier management module from the unique identifier deployment module, determining the unique identifier management module based on the mapping relation, and forwarding the unique identifier request message to the unique identifier management module from the unique identifier deployment module to request for acquiring the unique identifier;
and the unique identifier management module is used for determining a corresponding unique identifier set according to the equipment token and sending the unique identifier in the unique identifier set to the equipment.
As one of the preferable scheme: when the unique identifier allocating module receives a request of acquiring the unique identifier from the equipment, the unique identifier allocating module selects a server which is closest to the equipment and works normally according to the IP address of the equipment, and forwards the request to the unique identifier management module; the unique identifier management module determines a unique identifier from the device token and returns the unique identifier to the device. The device token is a unique identifier which is generated and stored in the device when the device leaves a factory, so that the device is directly connected with the unique identifier management module according to a mapping relation established by the unique identifier deployment module, when the device needs to access the unique identifier deployment module, the device token of the device can be sent to the unique identifier deployment module, the unique identifier deployment module is used for allocating the unique identifier management module which is closest to the device, namely, the device has an IP address after being configured with a network, the server can allocate the closest server resource to the device according to the position of the IP address, and acquire the unique identifier from the unique identifier management module.
As a second preferred aspect: the unique identifier comprises a unique ID, an enterprise identifier, a protocol type and a device type, wherein the enterprise identifier is characters added for distinguishing different enterprises, so that the management of the different enterprises on the device and the recovery of the unique identifier are facilitated, the protocol type can be defined by one character, the device is mainly distinguished to use different audio and video transmission protocols, so that a client can conveniently transmit audio and video by using the corresponding protocol, and the device type can be numbered by types defined by different devices and then is transcoded into a 16-system format so as to be convenient for management. For example, the unique identifier includes 14-bit string data, as shown in fig. 2, the unique ID has 6-bit string data, the enterprise identifier has 3-bit string data, the protocol type has 1-bit string data, and the device type has 4-bit string data, which ensures that the unique identifier can contain sufficient information; moreover, the character string data of the unique ID, the enterprise identifier and the protocol type adopts a 36-system, and the character string data of the equipment type adopts a 16-system, so that the implementation is simple, and errors are not easy to occur.
Example (c): step one, distributing a device token when the device leaves a factory, wherein the device token is a certificate for accessing a unique identification distribution module when the device does not acquire a unique identifier; secondly, the unique identifier allocating module receives a unique identifier request initiated by the equipment, selects a normally working unique identifier management module closest to the equipment according to the IP address of the equipment, and forwards the unique identifier request to the unique identifier management module; thirdly, the unique identifier management module determines a unique identifier according to the equipment token and returns the unique identifier to the unique identifier deployment module; fourthly, the unique identification allocating module receives the returned data, establishes a mapping relation between the equipment token and the unique identification management module, and returns the URL address and the unique identifier of the unique identification management module to the equipment; fifthly, receiving data return, and storing the unique identifier and the URL address of the unique identifier management module; sixthly, the URL address of the unique identification management module initiates a request to update the equipment information. In this embodiment, a mapping relationship between the device token and the unique identifier management module is obtained from the unique identifier deployment module, the unique identifier management module is determined based on the mapping relationship, and a unique identifier request message is forwarded to the unique identifier management module by the unique identifier deployment module to request to obtain a unique identifier, the unique identifier management module determines a corresponding unique identifier set according to the device token, and sends the unique identifier in the unique identifier set to the device, so that the device and the unique identifier set can be ensured to correspond to each other and the device and the unique identifier correspond to each other, and the device and the unique identifier are ensured to have a unique corresponding relationship, thereby preventing the identifier from being reused and avoiding the situation that the device cannot be used; meanwhile, when the equipment returns to the factory for recycling, the identifier of the equipment can be recycled and reused.
Example 2
The difference from the embodiment 1 is only that there are a plurality of unique identifier management modules, and the unique identifier management modules are located in different regions, for example, a region in asia named as a unique identifier management module a and a region in europe named as a unique identifier management module B, so that the corresponding unique identifier management modules are arranged in different regions, and the nearest normally-working server is selected to manage and distribute identifiers according to the IP address of the equipment.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.
Claims (7)
1. The utility model provides a unique sign intelligent distribution system of security protection equipment which characterized in that includes:
the unique identifier allocating module is used for storing the mapping relation between the equipment token and the unique identifier management module;
the device is used for acquiring the unique identifier request message, acquiring the mapping relation between the device token and the unique identifier management module from the unique identifier deployment module, determining the unique identifier management module based on the mapping relation, and forwarding the unique identifier request message to the unique identifier management module from the unique identifier deployment module to request for acquiring the unique identifier;
and the unique identifier management module is used for determining a corresponding unique identifier set according to the equipment token and sending the unique identifier in the unique identifier set to the equipment.
2. The intelligent distribution system for the unique identifier of the security equipment according to claim 1, wherein the unique identifier allocating module selects a server which is closest to the equipment and works normally according to the IP address of the equipment when receiving a request of acquiring the unique identifier of the equipment, and forwards the request to the unique identifier management module; the unique identification management module determines a unique identifier according to the device token and returns the unique identifier to the device.
3. The intelligent distribution system for the unique identifier of the security equipment as claimed in claim 2, wherein the number of the unique identifier management modules is multiple, and the unique identifier management modules are located in different regions.
4. The security device unique identification intelligent distribution system of claim 3, wherein the unique identifier comprises a unique ID, an enterprise identifier, a protocol type, and a device type.
5. The intelligent distribution system for unique identification of security devices according to claim 4, wherein the unique identifier comprises 14-bit string data, the unique ID comprises 6-bit string data, the enterprise identifier comprises 3-bit string data, the protocol type comprises 1-bit string data, and the device type comprises 4-bit string data.
6. The intelligent distribution system for unique identification of security equipment as recited in claim 5, wherein the unique ID, enterprise identifier and protocol type string data is 36-system, and the device type string data is 16-system.
7. The intelligent distribution system for the unique identifier of the security equipment according to claim 6, wherein when the unique identifier allocating module receives a request of the equipment for obtaining the unique identifier, and selects a server which works normally and is closest to the equipment according to the IP address of the equipment, the unique identifier allocating module selects the number of the servers which work normally and are closest to the equipment according to the IP address of the equipment as one server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211016666.7A CN115396396A (en) | 2022-08-24 | 2022-08-24 | Intelligent distribution system for unique identifier of security equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211016666.7A CN115396396A (en) | 2022-08-24 | 2022-08-24 | Intelligent distribution system for unique identifier of security equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115396396A true CN115396396A (en) | 2022-11-25 |
Family
ID=84120870
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211016666.7A Pending CN115396396A (en) | 2022-08-24 | 2022-08-24 | Intelligent distribution system for unique identifier of security equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115396396A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5680456A (en) * | 1995-03-31 | 1997-10-21 | Pitney Bowes Inc. | Method of manufacturing generic meters in a key management system |
US20090198997A1 (en) * | 2006-11-20 | 2009-08-06 | Tet Hin Yeap | System and method for secure electronic communication services |
CN104700261A (en) * | 2013-12-10 | 2015-06-10 | 中国银联股份有限公司 | Security network access initialization method and system for POS terminal |
CN112181772A (en) * | 2020-09-29 | 2021-01-05 | 珠海安士佳电子有限公司 | Intelligent test system of equipment |
US20210256464A1 (en) * | 2018-09-04 | 2021-08-19 | Second Thought Oy | System for generating and maintaining unique identifier data |
-
2022
- 2022-08-24 CN CN202211016666.7A patent/CN115396396A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5680456A (en) * | 1995-03-31 | 1997-10-21 | Pitney Bowes Inc. | Method of manufacturing generic meters in a key management system |
US20090198997A1 (en) * | 2006-11-20 | 2009-08-06 | Tet Hin Yeap | System and method for secure electronic communication services |
CN104700261A (en) * | 2013-12-10 | 2015-06-10 | 中国银联股份有限公司 | Security network access initialization method and system for POS terminal |
US20210256464A1 (en) * | 2018-09-04 | 2021-08-19 | Second Thought Oy | System for generating and maintaining unique identifier data |
CN112181772A (en) * | 2020-09-29 | 2021-01-05 | 珠海安士佳电子有限公司 | Intelligent test system of equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5991828A (en) | System for automatically connecting portable device to network using network environment information including domain name of naming device and community name of network management protocol | |
US20230018257A1 (en) | Alias management method and device | |
CN102281333B (en) | Method and system for avoiding IP address conflict, DHCP server and DHCP client | |
CN104348873A (en) | Virtual network element automatic loading method and system and virtual machine IP (Internet Protocol) address acquisition method and system | |
CN107105050B (en) | Storage and downloading method and system for service objects | |
CN105357328A (en) | DNS method, DNS recursive server and DNS system | |
CN114070822B (en) | Kubernetes Overlay IP address management method | |
CN101883090A (en) | Client access method, equipment and system | |
CN101552788B (en) | A session management system and a control method thereof | |
US5740422A (en) | Method and apparatus for resource management for a lan server enterprise | |
WO2020249345A1 (en) | Method for providing control applications, and configuration controller | |
CN105792247B (en) | data pushing method and device | |
CN105049546A (en) | Client terminal IP address allocation method through DHCP server and device thereof | |
CN103607410A (en) | Content access method and equipment | |
CN115396396A (en) | Intelligent distribution system for unique identifier of security equipment | |
CN111953931A (en) | Data sharing method and device and storage medium | |
CN110008006B (en) | Container-based big data tool deployment method and system | |
CN110427759B (en) | Network resource browsing control method and system supporting service security mark | |
CN1771713A (en) | Method and arrangement for configuring a device in a data network | |
CN111010425A (en) | Server connection method, load balancing equipment and electronic equipment | |
CN106411928A (en) | Authentication method and device of client access server and VDI system | |
CN110213180B (en) | Network resource management method and device and cloud platform | |
CN110191041B (en) | Management method and device for equipment of local area network | |
CN102420731A (en) | Network access control method and system | |
JP2002300166A (en) | Method for automatically setting ip address and computer name |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20221125 |
|
RJ01 | Rejection of invention patent application after publication |