WO2021143025A1 - 物联网数据传输方法、装置、介质及电子设备 - Google Patents

物联网数据传输方法、装置、介质及电子设备 Download PDF

Info

Publication number
WO2021143025A1
WO2021143025A1 PCT/CN2020/093594 CN2020093594W WO2021143025A1 WO 2021143025 A1 WO2021143025 A1 WO 2021143025A1 CN 2020093594 W CN2020093594 W CN 2020093594W WO 2021143025 A1 WO2021143025 A1 WO 2021143025A1
Authority
WO
WIPO (PCT)
Prior art keywords
internet
things
data
target
verification data
Prior art date
Application number
PCT/CN2020/093594
Other languages
English (en)
French (fr)
Inventor
江洪洋
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021143025A1 publication Critical patent/WO2021143025A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • G06F16/275Synchronous replication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Definitions

  • This application relates to the field of cloud transmission technology, and in particular to an Internet of Things data transmission method, device, medium, and electronic equipment.
  • an IoT platform When an IoT platform interacts with an IoT device, it must be based on a specific IoT protocol, such as CoAP (Constrained Application Protocol, Restricted Application Protocol).
  • CoAP Consstrained Application Protocol, Restricted Application Protocol
  • This type of transmission protocol stipulates that a specific message belongs to a specific topic. We can call it topic (topic).
  • the information corresponding to the topic is processed by the service corresponding to the Internet of Things protocol.
  • the general method used to process the information corresponding to the topic is based on a tree-like structure.
  • the inventor realizes that this approach has at least the following shortcomings: Since the service corresponding to the IoT protocol needs to be connected to the IoT platform, the number of topics to be processed by the service may increase rapidly, and the topic processing requires corresponding object instances. Therefore, the corresponding object instantiation for all topics will cause a huge burden on memory, and as the number of topics increases, the efficiency of querying topics will decrease.
  • the purpose of this application is to provide a data transmission method, device, medium and electronic equipment for the Internet of Things to solve that the corresponding object instantiation of all topics will cause a huge burden on memory, and as the number of topics increases, it will lead to topic querying. The problem of reduced efficiency.
  • an IoT data transmission method the method is executed by a first IoT server among a plurality of IoT server, and the method includes: receiving a target uploaded by a target IoT device Data, the target data includes Internet of Things data and first permission verification data, the target data is sent by the target Internet of Things device according to a preset Internet of Things protocol; based on the data that has been stored in the first Internet of Things service At least one second permission verification data and the first permission verification data in the terminal memory are used to determine whether the upload of the target data is legal, and the second permission verification data is determined by The second Internet of Things server is synchronized to the first Internet of Things server in advance; if it is determined that the upload of the target data is legal, the Internet of Things data in the target data is sent to the data processing center of the Internet of Things platform.
  • an Internet of Things data transmission device the device is located at a first Internet of Things server of a plurality of Internet of Things server, and the device includes: a receiving module configured to receive a target Target data uploaded by an Internet of Things device, the target data including Internet of Things data and first permission verification data, the target data is sent by the target Internet of Things device according to a preset Internet of Things protocol; the determining module is configured In order to determine whether the upload of the target data is legal based on the at least one second permission verification data stored in the memory of the first Internet of Things server and the first permission verification data, the second permission verification Data is pre-synchronized to the first Internet of Things server from the second Internet of Things server among the plurality of Internet of Things server; the sending module is configured to send the upload of the target data to the first Internet of Things server if it is determined that the upload of the target data is legal.
  • the IoT data in the target data is sent to the data processing center of the IoT platform.
  • a computer-readable storage medium which stores computer program instructions, and when the computer program instructions are executed by a computer, the computer executes the aforementioned method.
  • an electronic device comprising: a processor; a memory, the memory is stored with computer readable instructions, when the computer readable instructions are executed by the processor , Realization: receiving target data uploaded by a target Internet of Things device, the target data including Internet of Things data and first permission verification data, the target data is sent by the target Internet of Things device according to a preset Internet of Things protocol; Based on the at least one second permission verification data stored in the memory of the first Internet of Things server and the first permission verification data, it is determined whether the upload of the target data is legal, and the second permission verification data The second Internet of Things server of the plurality of Internet of Things server is pre-synchronized to the first Internet of Things server; if it is determined that the upload of the target data is legal, then the Internet of Things data in the target data Send to the data processing center of the IoT platform.
  • the Internet of Things data transmission method provided by the present application is executed by the first Internet of Things server among a plurality of Internet of Things server terminals, which can reduce the time consumption of querying the database or the server, thereby improving the verification efficiency.
  • Fig. 1 is a schematic diagram showing a system architecture of an application of an Internet of Things data transmission method according to an exemplary embodiment.
  • Fig. 2 is a flow chart showing a method for data transmission of the Internet of Things according to an exemplary embodiment.
  • FIG. 3 is a detailed flowchart of step 230 of an embodiment shown according to the embodiment corresponding to FIG. 2.
  • FIG. 4 is a flowchart of steps before step 230 of an embodiment shown in the embodiment corresponding to FIG. 2.
  • Fig. 5 is a flow chart showing that a second Internet of Things server obtains second permission verification data according to an exemplary embodiment.
  • Fig. 6 is a block diagram showing an Internet of Things data transmission device according to an exemplary embodiment.
  • Fig. 7 is a block diagram showing an example of an electronic device that implements the foregoing Internet of Things data transmission method according to an exemplary embodiment.
  • Fig. 8 is a computer-readable storage medium for implementing the above-mentioned Internet of Things data transmission method according to an exemplary embodiment.
  • the Internet of Things data transmission method provided in the embodiments of the present application is also applicable to the field of big data, and is used to verify data in the Internet of Things data collection process.
  • the Internet of things IoT, Internet of things
  • IoT Internet of things
  • It is an information carrier based on the Internet and traditional telecommunications networks. It allows all ordinary physical objects that can be independently addressed to form an interconnected network. It is an extended and expanded network based on the Internet. It combines various information sensing devices with the Internet to form a huge network, which realizes the interconnection of people, machines, and things at any time and any place.
  • the implementation terminal of this application can be any device with arithmetic processing and communication functions.
  • the device can be connected to an external device to receive or send data.
  • it can be a portable mobile device, such as a smart phone, a tablet computer, a notebook computer, or a PDA. (Personal Digital Assistant), etc., can also be fixed devices, such as computer equipment, field terminals, desktop computers, servers, workstations, etc., or a collection of multiple devices, such as cloud computing physical infrastructure or server clusters.
  • the implementation terminal of this application may be a server or a physical infrastructure of cloud computing.
  • Fig. 1 is a schematic diagram showing a system architecture of an application of an Internet of Things data transmission method according to an exemplary embodiment.
  • the system architecture includes an Internet of Things platform 120, a user terminal 150, and an Internet of Things device 140.
  • the Internet of Things platform 120 includes multiple Internet of Things server terminals 130 and an Internet of Things control center 110.
  • the Internet of Things control center 110 includes a control center 111 and a database 112.
  • the database 112 may be a data processing center of the Internet of Things platform 110.
  • the implementation terminal of this application is one of multiple Internet of Things server 130. It can be seen that, in this embodiment, the Internet of Things device 140 is a smart thermometer.
  • a specific process may be as follows: the user uses the user terminal 150 to access the control center 111 of the IoT platform to register the data and obtain the product identification (ProductKey), device name (DeviceName) and secret key (secret), and create multiple topics (topics) corresponding to the product identification.
  • the control center 111 of the IoT platform will write these data into the database 112 for storage. After the user obtains these data, they will write the data into the Internet of Things device 140; one of the multiple Internet of Things server 130 of the Internet of Things platform will randomly initiate an Internet of Things device to each Internet of Things device.
  • the device performs a permission authentication request.
  • the IoT device 140 When the IoT device 140 receives such a request, it will respond to the IoT server, including the product identification, device name, and time stamp data, as well as the use key and these three data.
  • the first signature generated by a specific encryption method is sent to the Internet of Things server.
  • the Internet of Things server will parse all the obtained data to obtain the product identification, device name, timestamp and the first signature.
  • the Internet of Things server will Pull the previously stored key corresponding to the product ID from the database 112, and use the same encryption method to encrypt the product ID, device name, and time stamp from the IoT device 140 to obtain the second signature
  • the first signature and the second signature are consistent, it means that the Internet of Things device 140 is the owner of the product ID sent by it and it has the key corresponding to the product ID sent by it, which means that the Internet of Things device 140
  • the authority authentication of has passed, at this time, the IoT server will generate a time-effective token, return the password to the IoT device 140, and send the password and the product identifier to the database 112 for corresponding storage;
  • the Internet of Things server will synchronize the token, product identification, and corresponding theme of the Internet of Things device 140 that has passed the authorization authentication to the memory of other Internet of Things server of the plurality of Internet of Things server 130 through the message queue, so Other Internet of Things server has the ability to verify the authority of the Internet of Things device 140.
  • the Internet of Things device 140 When the Internet of Things device 140 receives a request from one of the other Internet of Things server to obtain collected data, the Internet of Things device 140 It will respond by returning the token, subject and collected data to the IoT server that sent the request.
  • the IoT server that sent the request will first confirm whether the token has expired, and then determine the product corresponding to the token Identification, and then determine the theme corresponding to the product identifier, and compare these themes with the theme sent by the Internet of Things device 140 to determine whether there is a theme consistent with the theme sent by the Internet of Things device 140 among these themes, When the token has not expired and there is a theme that is consistent with the theme returned by the Internet of Things device 140 among these themes, the permission verification of the Internet of Things device 140 is completed, and the thing can be allowed to
  • the networked device 140 is sent to the data processing center of the Internet of Things platform 120 through a message queue, and the data processing center may be, for example, the database 112. In this way, the entire process of sending the data collected by the I
  • Figure 1 is only an embodiment of this application.
  • multiple Internet of Things server terminals belong to the Internet of Things platform
  • the data finally collected by the Internet of Things devices is sent to the Internet of Things platform.
  • the Internet of Things server sends data to the Internet of Things platform through a message queue, and one Internet of Things server synchronizes the three data of token, product identification and corresponding theme to other Internet of Things server, but in other embodiments or
  • multiple IoT servers can be located outside the IoT platform, and the data finally collected by IoT devices can be sent to any database and data warehouse in the IoT platform.
  • the IoT server does not need to pass messages
  • the queue sends data to the Internet of Things platform, and an Internet of Things server can only synchronize the two data of the product identification and the corresponding subject to other Internet of Things server. Therefore, this application does not make any restrictions on this, and the protection scope of this application should not be Therefore, it is subject to any restrictions.
  • Fig. 2 is a flow chart showing a method for data transmission of the Internet of Things according to an exemplary embodiment.
  • the Internet of Things data transmission method in this embodiment is executed by the first Internet of Things server among the multiple Internet of Things server.
  • the first Internet of Things server can be the same type of device as the other Internet of Things server, or it can be a different type.
  • the first Internet of Things server can be a server, as shown in Figure 2, including the following steps.
  • Step 220 Receive target data uploaded by the target IoT device.
  • the target data includes Internet of Things data and first permission verification data, and the target data is sent by the target Internet of Things device according to a preset Internet of Things protocol.
  • the target Internet of Things device is an Internet of Things device that wants to send data to the Internet of Things platform. It can be any device that can sense and transmit information, such as a smart desk lamp, a smart thermometer, etc.
  • the behavior of the target IoT device uploading target data may be performed by the target IoT device by actively sending the target data, or it may be performed by making a corresponding response according to an external request.
  • the preset Internet of Things protocol can be any Internet of Things protocol, such as CoAP (Constrained Application Protocol, Restricted Application Protocol), MQTT (Message Queuing Telemetry Transport, message queue telemetry transmission protocol) and so on.
  • CoAP Consstrained Application Protocol, Restricted Application Protocol
  • MQTT Message Queuing Telemetry Transport, message queue telemetry transmission protocol
  • the Internet of Things data is data generated when the target Internet of Things device is running, for example, it can be temperature data sensed by a smart thermometer.
  • the first permission verification data is data used to perform permission verification on the data uploaded by the target Internet of Things device. For example, it may include data such as tokens and topics.
  • Step 230 Determine whether the upload of the target data is legal based on the at least one second permission verification data that has been stored in the memory of the first Internet of Things server and the first permission verification data.
  • the second permission verification data is pre-synchronized from the second Internet of Things server among the plurality of Internet of Things server to the first Internet of Things server.
  • At least one second permission verification data is pre-stored in the memory of the first Internet of Things server.
  • the at least one second permission verification data is stored in a queue in the memory of the first Internet of Things server.
  • the queue follows the principle of FIFO (First Input First Output).
  • the at least one second permission verification data is stored in a ConcurrentHashMap in the memory of the first Internet of Things server.
  • ConcurrentHashMap is a concurrent container that uses arrays, segments, and segment locks to achieve efficient data retrieval.
  • the advantage of this embodiment is that by storing the second permission verification data in ConcurrentHashMap, since the query time complexity of the hash is usually O(1), the query matching time is reduced, and the permission verification efficiency is improved. This can greatly improve the performance of the system.
  • Determining whether the upload of the target data is legal is a process of determining whether to allow the upload of the target data.
  • the second permission verification data includes a second token, a second product identifier corresponding to the second token, and at least one second theme category corresponding to the second product identifier, and the first
  • the authorization verification data includes the first token, the first product identification, and the first subject.
  • FIG. 3 is a detailed flowchart of step 230 of an embodiment shown according to the embodiment corresponding to FIG. 2, referring to FIG. 3, which includes the following steps.
  • Step 230' if there is one second permission verification data in the at least one second permission verification data that satisfies the first matching condition with the first permission verification data, it is determined that the upload of the target data is legal, Otherwise, it is determined that the upload of the target data is illegal.
  • the first matching condition with the first permission verification data is: the second token is consistent with the first token, and the second product identification corresponding to the second token is consistent with the first product identification and is consistent with At least one second theme category corresponding to the second product identifier has a second theme category corresponding to the first theme.
  • the at least one second authority verification data may include one second authority verification data, or may include a plurality of second authority verification data, for each second authority verification in the at least one second authority verification data Data, it can be judged whether the first matching condition with the first permission verification data is satisfied.
  • the token is a randomly generated character string
  • the product identifier (ProductKey) is a globally unique identifier issued by the IoT platform for the product
  • the topic category is a topic corresponding to the product identifier.
  • the collection of topics (topic) is a UTF-8 string, which represents a message transmission intermediary.
  • the subject category includes a product identification parameter value, a device name parameter, and an authority part
  • the subject corresponding to the subject category includes a product identification parameter value, a device name parameter value, and an authority part.
  • /0WFDSF9324JQ /$ ⁇ YourDeviceName ⁇ /user/update can be a theme class, where 0WFDSF9324JQ is the product identification parameter value corresponding to the product identification (ProductKey), and $ ⁇ YourDeviceName ⁇ is the device name parameter, which corresponds to a Device name, /user/update is the authority part; /0WFDSF9324JQ/device1/user/update can be a theme corresponding to the theme class, where device1 is the device name parameter value corresponding to the device name (DeviceName), and a theme corresponds to Whether the Internet of Things device has the authority to operate the message on this topic, "ADFKK45WERJ9SOD92" can be a token.
  • the correspondence between the theme category and the theme means that, if the product identifiers are consistent, the authority part in the theme category is the same as the authority part in the theme.
  • /0WFDSF9324JQ/$ ⁇ YourDeviceName ⁇ /user/update is a subject class
  • /0WFDSF9324JQ/device1/user/update is a subject
  • the permission part in the subject class is the same as the subject
  • the permission part in is /user/update, that is, the permission part in the subject class is the same as the permission part in the subject, so the subject class corresponds to the subject.
  • the second subject category includes product identification parameters, device name parameters, and authority parts.
  • /$ ⁇ YourProductKey ⁇ /device1/user/update can be a second theme category.
  • the second product identifier (ProductKey) is a separate part in the second permission verification data
  • the part corresponding to the ProductKey in the second subject category can be replaced by $ ⁇ YourProductKey ⁇ without losing the second permission verification data Information.
  • the second token is a character string randomly generated by the second Internet of Things server.
  • matching is performed based on the token, product identifier, and subject category stored in the memory of the first Internet of Things server with the token, product identifier, and subject in the first permission verification data.
  • To determine whether the upload of the target data is legal because the information required to determine whether the upload of the target data is legal has been pre-stored in the memory of the first Internet of Things server, there is no need to query or request this information from an external terminal, so the verification is improved. Efficiency.
  • the second permission verification data is stored in the memory, there is no need for the virtual machine to create too many objects when the second permission verification data is used for verification, which reduces memory consumption.
  • the second authorization verification data includes a second product identifier and at least one second theme category corresponding to the second product identifier
  • the first authorization verification data includes a first token and a first product identifier
  • the determining whether the upload of the target data is legal based on at least one second permission verification data and the first permission verification data stored in the memory of the first Internet of Things server includes : Pull the product identification stored in advance corresponding to the first token from the Internet of Things platform; if the included second product identification is consistent with the product identification, the second permission verification data meets the first permission verification According to the second matching condition of the data, it is determined that the uploading of the target data is legal, otherwise it is determined that the uploading of the target data is illegal, wherein the second matching condition with the first permission verification data is: In the at least one second theme category corresponding to the second product identifier, there is a second theme category corresponding to the first theme.
  • the second permission verification data pre-synchronized by the second Internet of Things server only includes the second product identifier and the corresponding at least one theme category, and the corresponding data needs to be pulled from the Internet of Things platform during verification.
  • the product identification of the second IoT server achieves a compromise between the amount of data synchronized by the second Internet of Things server and the efficiency of verification.
  • Step 240 If it is determined that the upload of the target data is legal, then the Internet of Things data in the target data is sent to the data processing center of the Internet of Things platform.
  • the data processing center of the Internet of Things platform can be any one or more modules or units that can store data in the Internet of Things platform.
  • the IoT data can be sent to the IoT platform, and the IoT platform will perform further operations such as statistics, processing, and processing.
  • sending the IoT data in the target data to the data processing center of the IoT platform includes: if it is determined that the upload of the target data is legal , The Internet of Things data in the target data is sent to a second message queue, and the Internet of Things data is sent to the data processing center of the Internet of Things platform via the second message queue.
  • the advantage of this embodiment is that by using a message queue to send data, the processing pressure of the data processing center of the Internet of Things platform is alleviated, and the reliability and stability of the Internet of Things platform are ensured.
  • the data processing center of the Internet of Things platform is a Redis server of the Internet of Things platform.
  • the method further includes: receiving, through a third message queue, a theme update request sent by the Internet of Things platform, wherein the theme update request includes a second product identifier and a corresponding item corresponding to the second product identifier.
  • the theme category update request is sent by the IoT platform to the plurality of IoT service ends through the third message queue, and the second update theme category is identified by the second product.
  • the user of the target Internet of Things device submits to the Internet of Things platform through the user terminal; in the locally stored at least one second theme category corresponding to the second product identifier in the theme category update request, it is determined that the at least one second update At least one second theme category corresponding to the theme category is used as the second target theme category; the second target theme category is replaced with a corresponding second updated theme category.
  • the topic structure tree is generally loaded through Resource when the service is initialized, the topic type that the service can handle cannot be changed during the service operation. If the change needs to be restarted, the service processing efficiency is reduced.
  • the dynamic update of the topic is realized through the message queue, and the update operation is triggered by the user, and the topic update can be performed without restarting the service, and at the same time, it is convenient for subsequent business expansion operations.
  • the IoT data in the above target data can also be stored in the blockchain, and the data information can be shared between different platforms through the storage of the blockchain, and the data can also be prevented from being tampered with.
  • Blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • the blockchain is essentially a decentralized database, which is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information to verify the validity of the information. (Anti-counterfeiting) and generate the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • the time consumption of querying the database or server is reduced, thereby improving the verification efficiency and the Internet of Things data transmission efficiency, and reducing the consumption of memory at the same time.
  • FIG. 4 is a flowchart of steps before step 230 of an embodiment shown in the embodiment corresponding to FIG. 2. As shown in FIG. 4, it includes the following steps: Step 210, receiving the second permission verification data synchronized by a second Internet of Things server of the plurality of Internet of Things server.
  • the second permission verification data is obtained by the second Internet of Things server, it is synchronized from the second Internet of Things server to the plurality of Internet of Things server ends except for the second Internet of Things server.
  • the external at least one Internet of Things server is received by the first Internet of Things server as one of the at least one Internet of Things server.
  • step 210 is located before step 220 in this embodiment, as described in the description of FIG. 4, step 210 can be performed at any step or time before step 230, for example, after step 220 , It can even be executed simultaneously with step 220, which is not limited in this application.
  • the receiving the second permission verification data synchronized by the second Internet of Things server among the plurality of Internet of Things server includes: receiving the data from the plurality of Internet of Things server through the first message queue.
  • the second permission verification data synchronized by the second Internet of Things server in the Internet of Things server includes: receiving the data from the plurality of Internet of Things server through the first message queue.
  • Fig. 5 is a flow chart showing the acquisition of second permission verification data by the second Internet of Things server according to an exemplary embodiment. As shown in Fig. 5, it includes the following steps: Step 510: Receive permission from the target Internet of Things device Authentication data to perform authority authentication on the target Internet of Things device.
  • the authority authentication data includes a product identification, a device name, a time stamp, and a password
  • the password is obtained by encrypting the hash parameter by the target Internet of Things device using a predetermined hash algorithm and a device key obtained in advance.
  • the hash parameter is generated based on the product identification, device name, and time stamp.
  • the product identification, device name, and pre-obtained device key are used by the user to send a registration request to the Internet of Things platform through the user terminal.
  • the platform is generated and written by the user to the target IoT device after obtaining the product identification, device name, and pre-obtained device key.
  • the steps shown in FIG. 5 are a process in which the second Internet of Things server obtains the second permission verification data, the embodiment in FIG. 5 is executed by the second Internet of Things server.
  • the authorization authentication data sent by the target Internet of Things device to the second Internet of Things server may be actively sent by the target Internet of Things device, or may be sent by the target Internet of Things device in response to a request from the second Internet of Things server.
  • the predetermined hash algorithm may include, but is not limited to, MD5, SHA-1, SHA-2, SHA-256, etc.
  • MD5 SHA-1
  • SHA-2 SHA-256
  • a variety of ways can be used to generate hash parameters based on the product identification, device name, and time stamp.
  • the product identification, device name, and time stamp can be combined in a predetermined manner as the hash parameter.
  • Step 520 Parse the authority authentication data to obtain the product identifier in the authority authentication data.
  • the product identification is organized in the authority authentication data according to a certain format, and the product identification can be obtained from the authority authentication data by parsing in a specific manner.
  • Step 530 Use the product identifier to send a device key acquisition request to the Internet of Things platform to obtain a device key corresponding to the product identifier.
  • Step 540 Use the obtained device key and a predetermined hash algorithm to encrypt the hash parameter to obtain an encryption result.
  • Step 550 If the encryption result is consistent with the password, after the product identifier is used as the second product identifier, a second token corresponding to the second product identifier is randomly generated.
  • the encryption result indicates that the product identification sent by the target IoT device corresponds to the device key obtained legally at the time of registration, and further indicates that the target IoT device is a legal device.
  • Step 560 Pull the theme category stored in advance corresponding to the second product identifier from the Internet of Things platform as at least one second theme category corresponding to the second product identifier.
  • the second product identifier, the theme category stored corresponding to the second product identifier, and the device key corresponding to the second product identifier are after the user sends a registration request to the IoT platform through the user terminal, Generated and stored by the IoT platform.
  • Step 570 Use the second product identifier, at least one second theme category corresponding to the second product identifier, and a second token corresponding to the second product identifier as second authority verification data.
  • security is ensured by allowing the second Internet of Things server to obtain the second permission verification data after the permission authentication is passed.
  • the method may further include: determining whether the second Internet of Things server pre-stores a theme category corresponding to the second product identifier, wherein, from the Internet of Things The platform pulls the theme category stored in advance corresponding to the second product identifier when it is determined that the second Internet of Things server does not store the theme category corresponding to the second product identifier in advance.
  • the theme class is pulled from the Internet of Things platform when the corresponding theme class is not stored, and when the corresponding theme class has been stored , There is no need to pull topic classes from the Internet of Things platform, which reduces resource overhead to a certain extent.
  • This application also provides an Internet of Things data transmission device.
  • the following are device embodiments of this application.
  • Fig. 6 is a block diagram showing an Internet of Things data transmission device according to an exemplary embodiment.
  • the apparatus 600 includes a receiving module 610 configured to receive target data uploaded by a target Internet of Things device, the target data including Internet of Things data and first permission verification data, and the target data is the The target Internet of Things device is sent according to a preset Internet of Things protocol; the determining module 620 is configured to be based on at least one second permission verification data stored in the memory of the first Internet of Things server and the first permission calibration Verification data to determine whether the upload of the target data is legal, and the second permission verification data is pre-synchronized from the second Internet of Things server of the plurality of Internet of Things server to the first Internet of Things server;
  • the sending module 630 is configured to send the Internet of Things data in the target data to the data processing center of the Internet of Things platform if it is determined that the upload of the target data is legal.
  • an electronic device capable of implementing the above method.
  • the electronic device 700 according to this embodiment of the present application will be described below with reference to FIG. 7.
  • the electronic device 700 shown in FIG. 7 is only an example, and should not bring any limitation to the functions and scope of use of the embodiments of the present application.
  • the electronic device 700 is represented in the form of a general-purpose computing device.
  • the components of the electronic device 700 may include, but are not limited to: the aforementioned at least one processing unit 710, the aforementioned at least one storage unit 720, and a bus 730 connecting different system components (including the storage unit 720 and the processing unit 710).
  • the storage unit stores a program code
  • the program code can be executed by the processing unit 710, so that the processing unit 710 executes the various exemplary methods described in the above-mentioned "Embodiment Method" section of this specification. Steps of implementation.
  • the storage unit 720 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 721 and/or a cache storage unit 722, and may further include a read-only storage unit (ROM) 723.
  • RAM random access storage unit
  • ROM read-only storage unit
  • the storage unit 720 may also include a program/utility tool 724 having a set of (at least one) program modules 725, such program modules 725 including but not limited to: an operating system, one or more application programs, other program modules, and program data, Each of these examples or some combination may include the implementation of a network environment.
  • a program/utility tool 724 having a set of (at least one) program modules 725, such program modules 725 including but not limited to: an operating system, one or more application programs, other program modules, and program data, Each of these examples or some combination may include the implementation of a network environment.
  • the bus 730 may represent one or more of several types of bus structures, including a storage unit bus or a storage unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or a local area using any bus structure among multiple bus structures. bus.
  • the electronic device 700 may also communicate with one or more external devices 900 (such as keyboards, pointing devices, Bluetooth devices, etc.), and may also communicate with one or more devices that enable a user to interact with the electronic device 700, and/or communicate with Any device (eg, router, modem, etc.) that enables the electronic device 700 to communicate with one or more other computing devices. This communication can be performed through an input/output (I/O) interface 750.
  • the electronic device 700 may also communicate with one or more networks (for example, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through the network adapter 760.
  • networks for example, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet
  • the network adapter 760 communicates with other modules of the electronic device 700 through the bus 730. It should be understood that although not shown in the figure, other hardware and/or software modules can be used in conjunction with the electronic device 700, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives And data backup storage system, etc.
  • the example embodiments described here can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , Including several instructions to make a computing device (which can be a personal computer, a server, a terminal device, or a network device, etc.) execute the method according to the embodiment of the present application.
  • a computing device which can be a personal computer, a server, a terminal device, or a network device, etc.
  • a computer-readable storage medium on which is stored a program product capable of implementing the above-mentioned method in this specification.
  • the computer-readable storage medium may be non-volatile or volatile.
  • each aspect of the present application can also be implemented in the form of a program product, which includes program code.
  • the program product runs on a terminal device, the program code is used to make the The terminal device executes the steps according to various exemplary embodiments of the present application described in the above-mentioned "Exemplary Method" section of this specification.
  • a program product 800 for implementing the above method according to an embodiment of the present application is described. It can adopt a portable compact disk read-only memory (CD-ROM) and include program code, and can be installed in a terminal device, For example, running on a personal computer.
  • CD-ROM compact disk read-only memory
  • the program product of this application is not limited to this.
  • the readable storage medium can be any tangible medium that contains or stores a program, and the program can be used by or in combination with an instruction execution system, device, or device.
  • the program product can use any combination of one or more readable media.
  • the readable medium may be a readable signal medium or a readable storage medium.
  • the readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above. More specific examples (non-exhaustive list) of readable storage media include: electrical connections with one or more wires, portable disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Type programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Computational Linguistics (AREA)
  • Computer And Data Communications (AREA)

Abstract

一种物联网数据传输方法、装置、介质及电子设备。该方法由多个物联网服务端中的第一物联网服务端执行,该方法包括:接收目标物联网设备上传的目标数据(220);基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法(230);若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心(240)。该方法提高了物联网数据传输时的权限校验效率和数据传输效率,减少了内存消耗。

Description

物联网数据传输方法、装置、介质及电子设备
本申请要求于2020年1月15日提交中国专利局,申请号为2020100449961、发明名称为“物联网数据传输方法、装置、介质及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及云传输技术领域,特别涉及一种物联网数据传输方法、装置、介质及电子设备。
背景技术
在物联网平台与物联网设备进行交互时,都要基于特定的物联网协议,例如CoAP(Constrained Application Protocol,受限应用协议)。这类传输协议规定某个具体的消息属于一个具体的主题,我们可称之为topic(主题),由物联网协议对应的服务对topic对应的信息进行处理。为了对不同topic的消息进行区分处理,一般要构建相应的实体化对象。目前,对topic对应的信息进行处理时采用的一般方式是基于类似于树(tree)的结构。发明人意识到,这种方式至少存在以下缺陷:由于物联网协议对应的服务要对接物联网平台,那么服务要处理的topic的数量可能会迅速增长,而对topic进行处理要进行相应的对象实例化,因此若对所有topic进行相应的对象实例化会给内存造成巨大负担,并且随着topic数量的增多会导致查询topic效率降低。
技术问题
本申请的目的在于提供一种物联网数据传输方法、装置、介质及电子设备,以解决对所有topic进行相应的对象实例化会给内存造成巨大负担,并且随着topic数量的增多会导致查询topic效率降低的问题。
技术解决方案
根据本申请的一方面,提供了一种物联网数据传输方法,所述方法由多个物联网服务端中的第一物联网服务端执行,所述方法包括:接收目标物联网设备上传的目标数据,所述目标数据包括物联网数据和第一权限校验数据,所述目标数据是所述目标物联网设备根据预设的物联网协议发送的;基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,所述第二权限校验数据由所述多个物联网服务端中的第二物联网服务端预先同步至所述第一物联网服务端;若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心。
根据本申请的另一方面,提供了一种物联网数据传输装置,所述装置位于多个物联网服务端中的第一物联网服务端,所述装置包括:接收模块,被配置为接收目标物联网设备上传的目标数据,所述目标数据包括物联网数据和第一权限校验数据,所述目标数据是所述目标物联网设备根据预设的物联网协议发送的;确定模块,被配置为基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,所述第二权限校验数据由所述多个物联网服务端中的第二物联网服务端预先同步至所述第一物联网服务端;发送模块,被配置为若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心。
根据本申请的另一方面,提供了一种计算机可读存储介质,其存储有计算机程序指令,当所述计算机程序指令被计算机执行时,使计算机执行如前所述的方法。
根据本申请的另一方面,提供了一种电子设备,所述电子设备包括:处理器;存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,实现:接收目标物联网设备上传的目标数据,所述目标数据包括物联网数据和第一权限校验数据,所述目标数据是所述目标物联网设备根据预设的物联网协议发送的;基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,所述第二权限校验数据由所述多个物联网服务端中的第二物联网服务端预先同步至所述第一物联网服务端;若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心。
有益效果
本申请所提供的物联网数据传输方法由多个物联网服务端中的第一物联网服务端执行,可减少了对数据库或服务器的查询的时间消耗,从而提高了校验效率。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并与说明书一起用于解释本申请的原理。
图1是根据一示例性实施例示出的一种物联网数据传输方法应用的系统架构示意图。
图2是根据一示例性实施例示出的一种物联网数据传输方法的流程图。
图3是根据图2对应实施例示出的一实施例的步骤230的细节流程图。
图4是根据图2对应实施例示出的一实施例的步骤230之前步骤的流程图。
图5是根据一示例性实施例示出的第二物联网服务端获取第二权限校验数据的流程图。
图6是根据一示例性实施例示出的一种物联网数据传输装置的框图。
图7是根据一示例性实施例示出的一种实现上述物联网数据传输方法的电子设备示例框图。
图8是根据一示例性实施例示出的一种实现上述物联网数据传输方法的计算机可读存储介质。
本发明的实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。
此外,附图仅为本申请的示意性图解,并非一定是按比例绘制。图中相同的附图标记表示相同或类似的部分,因而将省略对它们的重复描述。附图中所示的一些方框图是功能实体,不一定必须与物理或逻辑上独立的实体相对应。
本申请实施例提供的物联网数据传输方法还可适用于大数据领域,用于在物联网数据收集过程中对数据进行校验。其中,物联网( IoT ,Internet of things )即“万物相连的互联网”,是一个基于互联网、传统电信网等的信息承载体,它让所有能够被独立寻址的普通物理对象形成互联互通的网络,是互联网基础上的延伸和扩展的网络,它将各种信息传感设备与互联网结合起来而形成的一个巨大网络,实现了在任何时间、任何地点,人、机、物的互联互通。
本申请的实施终端可以是任何具有运算处理和通信功能的设备,该设备可以与外部设备相连,用于接收或者发送数据,具体可以是便携移动设备,例如智能手机、平板电脑、笔记本电脑、PDA(Personal Digital Assistant)等,也可以是固定式设备,例如,计算机设备、现场终端、台式电脑、服务器、工作站等,还可以是多个设备的集合,比如云计算的物理基础设施或者服务器集群。
优选地,本申请的实施终端可以为服务器或者云计算的物理基础设施。
图1是根据一示例性实施例示出的一种物联网数据传输方法应用的系统架构示意图。如图1所示,该系统架构包括物联网平台120、用户终端150以及物联网设备140,其中,物联网平台120又包括多个物联网服务端130和物联网控制中心110,物联网控制中心110包括控制中心111和数据库112,数据库112可以为物联网平台110的数据处理中心,本申请的实施终端为多个物联网服务端130中的一个服务端。可以看到,在本实施例中,物联网设备140为智能温度计。当本申请提供的物联网数据传输方法应用于图1所示的系统架构中时,一个具体过程可以是这样的:用户使用用户终端150访问物联网平台的控制中心111以注册数据,得到产品标识(ProductKey)、设备名(DeviceName)和密钥(secret),并创建与产品标识对应的多个主题(topic),物联网平台的控制中心111会将这些数据写入到数据库112中进行存储,用户在获得这些数据后,会将这些数据写入到物联网设备140中;物联网平台的多个物联网服务端130中的一个物联网服务端会随机向各物联网设备发起对这些物联网设备进行权限认证的请求,当物联网设备140接收到这样的请求后,会向该物联网服务端作出响应,将产品标识、设备名、时间戳三项数据以及利用密钥和这三项数据用特定加密方式生成的第一签名发送至该物联网服务端,该物联网服务端会解析所有获得的数据,得到产品标识、设备名、时间戳和第一签名,然后该物联网服务端会向数据库112拉取之前已经存储的且与该产品标识对应的密钥,并用同样的加密方式对来自物联网设备140的产品标识、设备名、时间戳这三项数据进行加密,得到第二签名,当第一签名和第二签名一致时,就说明物联网设备140正是其发来的产品标识的拥有者且它拥有与其发来的产品标识对应的密钥,这样就说明物联网设备140的权限认证已经通过,此时该物联网服务端会生成有时效的令牌(token),将该口令返回给物联网设备140,还会将该口令与该产品标识发送至数据库112对应存储;接下来,该物联网服务端会通过消息队列将通过权限认证的该物联网设备140的令牌、产品标识和对应的主题同步至多个物联网服务端130中的其他物联网服务端的内存,这样其他物联网服务端均具备了对物联网设备140进行权限校验的能力,当物联网设备140接收到其他物联网服务端中的一个发来的获取采集的数据的请求后,物联网设备140会作出响应,向发来请求的物联网服务端返回令牌、主题以及所采集的数据,发来请求的物联网服务端会先确认该令牌是否过期,然后确定与该令牌对应的产品标识,进而确定出与该产品标识对应的主题,并对这些主题与物联网设备140发来的主题进行比对,确定这些主题中是否存在与物联网设备140发来的主题相一致的主题,当该令牌没有过期且这些主题中存在与物联网设备140返回的主题相一致的主题时,就完成了对物联网设备140的权限校验工作,此时即可允许将物联网设备140通过消息队列发送至物联网平台120的数据处理中心,该数据处理中心比如可以是数据库112。这样就实现了物联网设备140采集的数据向物联网平台120发送的整个过程。
值得一提的是,图1仅为本申请的一个实施例,虽然在图1所示实施例中多个物联网服务端属于物联网平台,物联网设备最终采集的数据被发送至物联网平台的数据库中,物联网服务端通过消息队列向物联网平台发送数据并且一个物联网服务端向其他物联网服务端同步了令牌、产品标识和对应的主题三项数据,但在其他实施例或者具体应用中,多个物联网服务端可以位于物联网平台之外,物联网设备最终采集的数据可以被发送至物联网平台中的任意一个数据库和数据仓库中,物联网服务端可以不通过消息队列向物联网平台发送数据,且一个物联网服务端可以向其他物联网服务端仅同步产品标识和对应的主题两项数据,因此本申请对此不作任何限定,本申请的保护范围也不应因此而受到任何限制。
图2是根据一示例性实施例示出的一种物联网数据传输方法的流程图。本实施例的物联网数据传输方法由多个物联网服务端中的第一物联网服务端执行,第一物联网服务端可以与其他物联网服务端是相同类型的设备,也可以是不同类型的设备,第一物联网服务端可以是服务器,如图2所示,包括以下步骤。
步骤220,接收目标物联网设备上传的目标数据。
所述目标数据包括物联网数据和第一权限校验数据,所述目标数据是所述目标物联网设备根据预设的物联网协议发送的。
目标物联网设备为要向物联网平台发送数据的物联网设备,可以是任意能够感知信息并传递信息的设备,比如可以是智能台灯、智能温度计等。目标物联网设备上传目标数据这一行为可以是目标物联网设备通过主动发送目标数据来进行的,也可以是通过根据外部请求做出相应的响应来进行。
预设的物联网协议可以是任意的物联网协议,比如可以是CoAP(Constrained Application Protocol,受限应用协议)、MQTT(Message Queuing Telemetry Transport,消息队列遥测传输协议)等。
物联网数据是目标物联网设备运行时生成的数据,比如可以是智能温度计感知的温度数据。第一权限校验数据是用于对目标物联网设备上传数据的进行权限校验的数据,比如可以包括令牌(token)、主题(topic)等数据。
步骤230,基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法。
所述第二权限校验数据由所述多个物联网服务端中的第二物联网服务端预先同步至所述第一物联网服务端。
可以明确,至少一个第二权限校验数据是预先存储在所述第一物联网服务端的内存中的。
在一个实施例中,所述至少一个第二权限校验数据存储在所述第一物联网服务端内存的队列之中。
在一个实施例中,所述队列遵循FIFO(First Input First Output,先进先出)的原则。
在一个实施例中,所述至少一个第二权限校验数据存储在所述第一物联网服务端内存的ConcurrentHashMap中。
ConcurrentHashMap是一种采用了数组、Segment、分段锁等方式实现高效数据检索的并发容器。
本实施例的好处在于,通过将第二权限校验数据存储在ConcurrentHashMap中,由于hash的查询时间复杂度通常为O(1),因此减少了查询匹配的时间,提高了权限的校验效率,从而可以大大提高系统的性能。
确定所述目标数据的上传是否合法是确定是否允许将目标数据上传的过程。
在一个实施例中,所述第二权限校验数据包括第二令牌、与第二令牌对应的第二产品标识和与第二产品标识对应的至少一个第二主题类,所述第一权限校验数据包括第一令牌、第一产品标识和第一主题,步骤230的具体步骤可以如图3所示。
图3是根据图2对应实施例示出的一实施例的步骤230的细节流程图,参见图3所示,包括以下步骤。
步骤230',若所述至少一个第二权限校验数据中存在一个第二权限校验数据满足与所述第一权限校验数据的第一匹配条件,则确定所述目标数据的上传合法,否则确定所述目标数据的上传不合法。
其中,所述与所述第一权限校验数据的第一匹配条件为:第二令牌与第一令牌一致、与第二令牌对应的第二产品标识与第一产品标识一致且与第二产品标识对应的至少一个第二主题类中存在一个第二主题类与所述第一主题对应。
所述至少一个第二权限校验数据可以包括一个第二权限校验数据,也可以包括多个第二权限校验数据,对于至少一个第二权限校验数据中的每一个第二权限校验数据,都可以判断是否满足与所述第一权限校验数据的第一匹配条件。
在一个实施例中,令牌(token)为随机生成的字符串,产品标识(ProductKey)为物联网平台为产品颁发的全局唯一标识,主题(topic)类为与产品标识对应的主题(topic)的集合,主题(topic)为UTF-8字符串,代表了消息传输中介。
在一个实施例中,主题类包括产品标识参数值、设备名参数和权限部分,与主题类对应的主题包括产品标识参数值、设备名参数值和权限部分。
比如, /0WFDSF9324JQ /${YourDeviceName}/user/update可以为一个主题类,其中,0WFDSF9324JQ为与产品标识(ProductKey)对应的产品标识参数值,${YourDeviceName}为设备名参数,该参数对应了一个设备名,/user/update 为权限部分;/0WFDSF9324JQ/device1/user/update可以为一个与该主题类对应的主题,其中device1为与设备名(DeviceName)对应的设备名参数值,一个主题对应了物联网设备是否有对该主题的消息进行操作的权限,“ADFKK45WERJ9SOD92”可以为一个令牌。
在一个实施例中,主题类与主题对应是指,在产品标识一致的情况下,主题类中的权限部分与主题中的权限部分相同。
比如,/0WFDSF9324JQ/${YourDeviceName}/user/update为一个主题类,/0WFDSF9324JQ/device1/user/update为一个主题,由于两者的设备名“0WFDSF9324JQ”一致,且主题类中的权限部分与主题中的权限部分都为/user/update,即该主题类中的权限部分与该主题中的权限部分相同,所以该主题类与该主题对应。
在一个实施例中,第二主题类包括产品标识参数、设备名参数和权限部分。
比如,/${YourProductKey}/device1/user/update可以为一个第二主题类。
由于第二产品标识(ProductKey)在第二权限校验数据中是单独的一个部分,所以第二主题类中与ProductKey对应的部分可以由${YourProductKey}代替而不损失第二权限校验数据中的信息。
在一个实施例中,所述第二令牌为由所述第二物联网服务端随机生成的字符串。
在图3所示实施例中,通过根据已存储至所述第一物联网服务端内存的令牌、产品标识和主题类与第一权限校验数据中的令牌、产品标识和主题进行匹配来确定目标数据的上传是否合法,由于确定目标数据的上传是否合法所需的信息已预先存储至第一物联网服务端的内存中,无需向外部终端查询或请求获取这些信息,因此提高了校验效率,另外,由于第二权限校验数据被存储至内存中,在利用第二权限校验数据进行校验时无需虚拟机创建太多对象,减少了内存的消耗。
在一个实施例中,第二权限校验数据包括第二产品标识和与第二产品标识对应的至少一个第二主题类,所述第一权限校验数据包括第一令牌、第一产品标识和第一主题,所述基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,包括:从物联网平台拉取预先与所述第一令牌对应存储的产品标识;若包括的第二产品标识与所述产品标识一致的第二权限校验数据满足与所述第一权限校验数据的第二匹配条件,则确定所述目标数据的上传合法,否则确定所述目标数据的上传不合法,其中,所述与所述第一权限校验数据的第二匹配条件为:与第二产品标识对应的至少一个第二主题类中存在一个第二主题类与所述第一主题对应。
在本实施例中,由第二物联网服务端预先同步来的第二权限校验数据仅包括第二产品标识和对应的至少一个主题类,在进行校验时需要从物联网平台拉取对应的产品标识,在第二物联网服务端同步的数据量与校验效率之间实现了折中。
步骤240,若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心。
物联网平台的数据处理中心可以是物联网平台中任意一个或多个能够存储数据的模块或者单元。
当确定目标数据的上传合法后,即可将物联网数据发送至物联网平台,由物联网平台进行进一步的统计、加工、处理等操作。
在一个实施例中,所述若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心,包括:若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至第二消息队列,经由所述第二消息队列将所述物联网数据发送至物联网平台的数据处理中心。
本实施例的好处在于,通过使用消息队列来发送数据,缓和了物联网平台的数据处理中心的处理压力,保证了物联网平台的可靠性和稳定性。
在一个实施例中,所述物联网平台的数据处理中心为物联网平台的Redis服务器。
在一个实施例中,所述方法还包括:通过第三消息队列接收物联网平台发来的主题类更新请求,其中,所述主题类更新请求包括第二产品标识和与第二产品标识对应的至少一个第二更新主题类,所述主题类更新请求被所述物联网平台通过所述第三消息队列发送至所述多个物联网服务端,所述第二更新主题类由第二产品标识的目标物联网设备的用户通过用户终端提交至物联网平台;在本地存储的与所述主题类更新请求中第二产品标识对应至少一个第二主题类中确定出与所述至少一个第二更新主题类对应的至少一个第二主题类,作为第二目标主题类;将所述第二目标主题类替换为对应的第二更新主题类。
目前,由于主题的结构树一般是在服务初始化的时候通过Resource(资源)加载的,那么在服务运行过程中,服务能够处理的topic类型无法进行变更,若变更需要重启服务,降低了服务处理效率,在本实施例中,通过消息队列实现了topic的动态更新,并且更新操作由用户触发,无需重启服务即可进行topic的更新,同时可以便于后续业务的扩展操作。
在一个实施例中,还可将上述目标数据中的物联网数据存储至区块链,通过区块链存储,实现数据信息在不同平台之间的共享,也可防止数据被篡改。
区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层。
综上所述,根据图2实施例提供的物联网数据传输方法,减少了对数据库或服务器的查询的时间消耗,从而提高了校验效率和物联网数据传输效率,同时还减少了内存的消耗。
图4是根据图2对应实施例示出的一实施例的步骤230之前步骤的流程图。如图4所示,包括以下步骤:步骤210,接收由所述多个物联网服务端中的第二物联网服务端同步的所述第二权限校验数据。
所述第二权限校验数据为所述第二物联网服务端获得后,由所述第二物联网服务端同步至所述多个物联网服务端中除所述第二物联网服务端之外的至少一个物联网服务端并由所述第一物联网服务端作为所述至少一个物联网服务端中的一个物联网服务端接收得到。
需要指出的是,虽然在本实施例中步骤210位于步骤220之前,但正如对图4的描述所述的那样,步骤210可以在步骤230之前的任意步骤或时刻执行,比如可以在步骤220之后、甚至还可以与步骤220同时执行,本申请对此不作限定。
在一个实施例中,所述接收由所述多个物联网服务端中的第二物联网服务端同步的所述第二权限校验数据,包括:通过第一消息队列接收由所述多个物联网服务端中的第二物联网服务端同步的所述第二权限校验数据。
在一个实施例中,第二物联网服务端获取第二权限校验数据的过程可以如图5所示。图5是根据一示例性实施例示出的第二物联网服务端获取第二权限校验数据的流程图,如图5所示,包括以下步骤:步骤510,接收目标物联网设备发来的权限认证数据,以对所述目标物联网设备进行权限认证。
其中,所述权限认证数据包括产品标识、设备名、时间戳和口令,所述口令由所述目标物联网设备利用预定哈希算法和预先获得的设备密钥对哈希参数加密得到,所述哈希参数基于所述产品标识、设备名和时间戳而生成,所述产品标识、设备名和预先获得的设备密钥为用户通过用户终端向所述物联网平台发送注册请求后,由所述物联网平台生成并由所述用户在获得所述产品标识、设备名和预先获得的设备密钥后,写入所述目标物联网设备。
由于图5示出的步骤为第二物联网服务端获取第二权限校验数据的过程,因此图5实施例由第二物联网服务端执行。
目标物联网设备向第二物联网服务端发送权限认证数据可以是目标物联网设备主动发送的,也可以是目标物联网设备根据第二物联网服务端的请求作出响应而发送的。
预定哈希算法可以包括但不限于MD5, SHA-1, SHA-2, SHA-256等。可以采用多种方式基于所述产品标识、设备名和时间戳来生成哈希参数,比如可以将所述产品标识、设备名和时间戳按照预定的方式组合起来作为哈希参数。
步骤520,解析所述权限认证数据以获得所述权限认证数据中的产品标识。
产品标识在所述权限认证数据按照一定格式组织,通过按照特定方式解析可以从权限认证数据中获得产品标识。
步骤530,利用所述产品标识向物联网平台发送设备密钥获取请求以获取与所述产品标识对应的设备密钥。
步骤540,利用获取的所述设备密钥和预定哈希算法对所述哈希参数加密,以得到加密结果。
步骤550,若所述加密结果与所述口令一致,则在将所述产品标识作为第二产品标识后,随机生成与所述第二产品标识对应的第二令牌。
当所述加密结果与所述口令一致时,说明目标物联网设备发来的产品标识与当初注册时合法获得的设备密钥相对应,进而说明目标物联网设备是合法设备。
步骤560,从所述物联网平台拉取预先与所述第二产品标识对应存储的主题类,作为与所述第二产品标识对应的至少一个第二主题类。
其中,所述第二产品标识、与所述第二产品标识对应存储的主题类、与所述第二产品标识对应的设备密钥为用户通过用户终端向所述物联网平台发送注册请求后,由所述物联网平台生成并存储。
步骤570,将所述第二产品标识、与所述第二产品标识对应的至少一个第二主题类和与所述第二产品标识对应的第二令牌作为第二权限校验数据。
在图5实施例中,通过在权限认证通过后才允许第二物联网服务端获取第二权限校验数据,保证了安全性。
在一个实施例中,在步骤560之前,所述方法还可以包括:确定所述第二物联网服务端是否预先存储了与所述第二产品标识对应的主题类,其中,从所述物联网平台拉取预先与所述第二产品标识对应存储的主题类是在确定所述第二物联网服务端没有预先存储与所述第二产品标识对应的主题类的情况下进行的。
在本实施例中,通过先判断是否已经存储了相应的主题类,在没有存储相应的主题类的情况下才去物联网平台拉取主题类,而在已经存储了相应的主题类的情况下,无需再从物联网平台拉取主题类,在一定程度上降低了资源开销。
本申请还提供了一种物联网数据传输装置,以下是本申请的装置实施例。
图6是根据一示例性实施例示出的一种物联网数据传输装置的框图。如图6所示,装置600包括:接收模块610,被配置为接收目标物联网设备上传的目标数据,所述目标数据包括物联网数据和第一权限校验数据,所述目标数据是所述目标物联网设备根据预设的物联网协议发送的;确定模块620,被配置为基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,所述第二权限校验数据由所述多个物联网服务端中的第二物联网服务端预先同步至所述第一物联网服务端;发送模块630,被配置为若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心。
根据本申请的第三方面,还提供了一种能够实现上述方法的电子设备。
下面参照图7来描述根据本申请的这种实施方式的电子设备700。图7显示的电子设备700仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。
如图7所示,电子设备700以通用计算设备的形式表现。电子设备700的组件可以包括但不限于:上述至少一个处理单元710、上述至少一个存储单元720、连接不同系统组件(包括存储单元720和处理单元710)的总线730。
其中,所述存储单元存储有程序代码,所述程序代码可以被所述处理单元710执行,使得所述处理单元710执行本说明书上述“实施例方法”部分中描述的根据本申请各种示例性实施方式的步骤。
存储单元720可以包括易失性存储单元形式的可读介质,例如随机存取存储单元(RAM)721和/或高速缓存存储单元722,还可以进一步包括只读存储单元(ROM)723。
存储单元720还可以包括具有一组(至少一个)程序模块725的程序/实用工具724,这样的程序模块725包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。
总线730可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。
电子设备700也可以与一个或多个外部设备900(例如键盘、指向设备、蓝牙设备等)通信,还可与一个或者多个使得用户能与该电子设备700交互的设备通信,和/或与使得该电子设备700能与一个或多个其它计算设备进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口750进行。并且,电子设备700还可以通过网络适配器760与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图所示,网络适配器760通过总线730与电子设备700的其它模块通信。应当明白,尽管图中未示出,可以结合电子设备700使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。
通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本申请实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、终端装置、或者网络设备等)执行根据本申请实施方式的方法。
根据本申请的第四方面,还提供了一种计算机可读存储介质,其上存储有能够实现本说明书上述方法的程序产品。其中,该计算机可读存储介质可以是非易失性,也可以是易失性。在一些可能的实施方式中,本申请的各个方面还可以实现为一种程序产品的形式,其包括程序代码,当所述程序产品在终端设备上运行时,所述程序代码用于使所述终端设备执行本说明书上述“示例性方法”部分中描述的根据本申请各种示例性实施方式的步骤。
参考图8所示,描述了根据本申请的实施方式的用于实现上述方法的程序产品800,其可以采用便携式紧凑盘只读存储器(CD-ROM)并包括程序代码,并可以在终端设备,例如个人电脑上运行。然而,本申请的程序产品不限于此,在本文件中,可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
所述程序产品可以采用一个或多个可读介质的任意组合。可读介质可以是可读信号介质或者可读存储介质。可读存储介质例如可以为但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。
此外,上述附图仅是根据本申请示例性实施例的方法所包括的处理的示意性说明,而不是限制目的。易于理解,上述附图所示的处理并不表明或限制这些处理的时间顺序。另外,也易于理解,这些处理可以是例如在多个模块中同步或异步执行的。
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围执行各种修改和改变。本申请的范围仅由所附的权利要求来限制。

Claims (20)

  1. 一种物联网数据传输方法,其中,所述方法由多个物联网服务端中的第一物联网服务端执行,所述方法包括:
    接收目标物联网设备上传的目标数据,所述目标数据包括物联网数据和第一权限校验数据,所述目标数据是所述目标物联网设备根据预设的物联网协议发送的;
    基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,所述第二权限校验数据由所述多个物联网服务端中的第二物联网服务端预先同步至所述第一物联网服务端;
    若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心。
  2. 根据权利要求1所述的方法,其中,所述至少一个第二权限校验数据存储在所述第一物联网服务端内存的ConcurrentHashMap中。
  3. 根据权利要求1所述的方法,其中,所述第二权限校验数据包括第二令牌、与第二令牌对应的第二产品标识和与第二产品标识对应的至少一个第二主题类,所述第一权限校验数据包括第一令牌、第一产品标识和第一主题,所述基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,包括:
    若所述至少一个第二权限校验数据中存在一个第二权限校验数据满足与所述第一权限校验数据的第一匹配条件,则确定所述目标数据的上传合法,否则确定所述目标数据的上传不合法,其中,所述与所述第一权限校验数据的第一匹配条件为:第二令牌与第一令牌一致、与第二令牌对应的第二产品标识与第一产品标识一致且与第二产品标识对应的至少一个第二主题类中存在一个第二主题类与所述第一主题对应。
  4. 根据权利要求1所述的方法,其中,第二权限校验数据包括第二产品标识和与第二产品标识对应的至少一个第二主题类,所述第一权限校验数据包括第一令牌、第一产品标识和第一主题,所述基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,包括:
    从物联网平台拉取预先与所述第一令牌对应存储的产品标识;
    若包括的第二产品标识与所述产品标识一致的第二权限校验数据满足与所述第一权限校验数据的第二匹配条件,则确定所述目标数据的上传合法,否则确定所述目标数据的上传不合法,其中,所述与所述第一权限校验数据的第二匹配条件为:与第二产品标识对应的至少一个第二主题类中存在一个第二主题类与所述第一主题对应。
  5. 根据权利要求1-4任意一项所述的方法,其中,在基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法之前,所述方法还包括:
    接收由所述多个物联网服务端中的第二物联网服务端同步的所述第二权限校验数据,所述第二权限校验数据为所述第二物联网服务端获得后,由所述第二物联网服务端同步至所述多个物联网服务端中除所述第二物联网服务端之外的至少一个物联网服务端并由所述第一物联网服务端作为所述至少一个物联网服务端中的一个物联网服务端接收得到。
  6. 根据权利要求1所述的方法,其中,所述第二权限校验数据为所述第二物联网服务端通过如下方式获得的:
    接收目标物联网设备发来的权限认证数据,以对所述目标物联网设备进行权限认证,其中,所述权限认证数据包括产品标识、设备名、时间戳和口令,所述口令由所述目标物联网设备利用预定哈希算法和预先获得的设备密钥对哈希参数加密得到,所述哈希参数基于所述产品标识、设备名和时间戳而生成,所述产品标识、设备名和预先获得的设备密钥为用户通过用户终端向所述物联网平台发送注册请求后,由所述物联网平台生成并由所述用户在获得所述产品标识、设备名和预先获得的设备密钥后,写入所述目标物联网设备;
    解析所述权限认证数据以获得所述权限认证数据中的产品标识;
    利用所述产品标识向物联网平台发送设备密钥获取请求以获取与所述产品标识对应的设备密钥;
    利用获取的所述设备密钥和预定哈希算法对所述哈希参数加密,以得到加密结果;
    若所述加密结果与所述口令一致,则在将所述产品标识作为第二产品标识后,随机生成与所述第二产品标识对应的第二令牌;
    从所述物联网平台拉取预先与所述第二产品标识对应存储的主题类,作为与所述第二产品标识对应的至少一个第二主题类,其中,所述第二产品标识、与所述第二产品标识对应存储的主题类、与所述第二产品标识对应的设备密钥为用户通过用户终端向所述物联网平台发送注册请求后,由所述物联网平台生成并存储;
    将所述第二产品标识、与所述第二产品标识对应的至少一个第二主题类和与所述第二产品标识对应的第二令牌作为第二权限校验数据。
  7. 根据权利要求1所述的方法,其中,所述若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心,包括:
    若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至第二消息队列,经由所述第二消息队列将所述物联网数据发送至物联网平台的数据处理中心。
  8. 根据权利要求3-6所述的方法,其中,所述方法还包括:
    通过第三消息队列接收所述物联网平台发送的主题类更新请求,其中,所述主题类更新请求包括所述第二产品标识和与所述第二产品标识对应的至少一个第二更新主题类,所述主题类更新请求被所述物联网平台通过所述第三消息队列发送至所述多个物联网服务端,所述第二更新主题类由所述目标物联网设备的用户通过用户终端提交至所述物联网平台;
    在本地存储的与所述主题类更新请求中所述第二产品标识对应至少一个第二主题类中确定出与所述至少一个第二更新主题类对应的至少一个第二主题类,作为第二目标主题类;
    将所述第二目标主题类替换为对应的第二更新主题类。
  9. 根据权利要求5所述的方法,其中,所述接收由所述多个物联网服务端中的第二物联网服务端同步的所述第二权限校验数据,包括:
    通过第一消息队列接收由所述多个物联网服务端中的第二物联网服务端同步的所述第二权限校验数据。
  10. 一种物联网数据传输装置,其中,所述装置位于多个物联网服务端中的第一物联网服务端,所述装置包括:
    接收模块,被配置为接收目标物联网设备上传的目标数据,所述目标数据包括物联网数据和第一权限校验数据,所述目标数据是所述目标物联网设备根据预设的物联网协议发送的;
    确定模块,被配置为基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,所述第二权限校验数据由所述多个物联网服务端中的第二物联网服务端预先同步至所述第一物联网服务端;
    发送模块,被配置为若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心。
  11. 一种电子设备,其中,所述电子设备包括:
    处理器;
    存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,实现:
    接收目标物联网设备上传的目标数据,所述目标数据包括物联网数据和第一权限校验数据,所述目标数据是所述目标物联网设备根据预设的物联网协议发送的;
    基于已存储至所述第一物联网服务端内存的至少一个第二权限校验数据和所述第一权限校验数据,确定所述目标数据的上传是否合法,所述第二权限校验数据由所述多个物联网服务端中的第二物联网服务端预先同步至所述第一物联网服务端;
    若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至物联网平台的数据处理中心。
  12. 根据权利要求11所述的电子设备,其中,所述至少一个第二权限校验数据存储在所述第一物联网服务端内存的ConcurrentHashMap中。
  13. 根据权利要求11所述的电子设备,其中,所述第二权限校验数据包括第二令牌、与第二令牌对应的第二产品标识和与第二产品标识对应的至少一个第二主题类,所述第一权限校验数据包括第一令牌、第一产品标识和第一主题,所述计算机可读指令被所述处理器执行时,实现:
    若所述至少一个第二权限校验数据中存在一个第二权限校验数据满足与所述第一权限校验数据的第一匹配条件,则确定所述目标数据的上传合法,否则确定所述目标数据的上传不合法,其中,所述与所述第一权限校验数据的第一匹配条件为:第二令牌与第一令牌一致、与第二令牌对应的第二产品标识与第一产品标识一致且与第二产品标识对应的至少一个第二主题类中存在一个第二主题类与所述第一主题对应。
  14. 根据权利要求11所述的电子设备,其中,第二权限校验数据包括第二产品标识和与第二产品标识对应的至少一个第二主题类,所述第一权限校验数据包括第一令牌、第一产品标识和第一主题,所述计算机可读指令被所述处理器执行时,实现:
    从物联网平台拉取预先与所述第一令牌对应存储的产品标识;
    若包括的第二产品标识与所述产品标识一致的第二权限校验数据满足与所述第一权限校验数据的第二匹配条件,则确定所述目标数据的上传合法,否则确定所述目标数据的上传不合法,其中,所述与所述第一权限校验数据的第二匹配条件为:与第二产品标识对应的至少一个第二主题类中存在一个第二主题类与所述第一主题对应。
  15. 根据权利要求11-14任意一项所述的电子设备,其中,所述计算机可读指令被所述处理器执行时,实现:
    接收由所述多个物联网服务端中的第二物联网服务端同步的所述第二权限校验数据,所述第二权限校验数据为所述第二物联网服务端获得后,由所述第二物联网服务端同步至所述多个物联网服务端中除所述第二物联网服务端之外的至少一个物联网服务端并由所述第一物联网服务端作为所述至少一个物联网服务端中的一个物联网服务端接收得到。
  16. 根据权利要求11所述的电子设备,其中,所述计算机可读指令被所述处理器执行时,实现:
    接收目标物联网设备发来的权限认证数据,以对所述目标物联网设备进行权限认证,其中,所述权限认证数据包括产品标识、设备名、时间戳和口令,所述口令由所述目标物联网设备利用预定哈希算法和预先获得的设备密钥对哈希参数加密得到,所述哈希参数基于所述产品标识、设备名和时间戳而生成,所述产品标识、设备名和预先获得的设备密钥为用户通过用户终端向所述物联网平台发送注册请求后,由所述物联网平台生成并由所述用户在获得所述产品标识、设备名和预先获得的设备密钥后,写入所述目标物联网设备;
    解析所述权限认证数据以获得所述权限认证数据中的产品标识;
    利用所述产品标识向物联网平台发送设备密钥获取请求以获取与所述产品标识对应的设备密钥;
    利用获取的所述设备密钥和预定哈希算法对所述哈希参数加密,以得到加密结果;
    若所述加密结果与所述口令一致,则在将所述产品标识作为第二产品标识后,随机生成与所述第二产品标识对应的第二令牌;
    从所述物联网平台拉取预先与所述第二产品标识对应存储的主题类,作为与所述第二产品标识对应的至少一个第二主题类,其中,所述第二产品标识、与所述第二产品标识对应存储的主题类、与所述第二产品标识对应的设备密钥为用户通过用户终端向所述物联网平台发送注册请求后,由所述物联网平台生成并存储;
    将所述第二产品标识、与所述第二产品标识对应的至少一个第二主题类和与所述第二产品标识对应的第二令牌作为第二权限校验数据。
  17. 根据权利要求11所述的电子设备,其中,所述计算机可读指令被所述处理器执行时,实现:
    若确定所述目标数据的上传合法,则将所述目标数据中的物联网数据发送至第二消息队列,经由所述第二消息队列将所述物联网数据发送至物联网平台的数据处理中心。
  18. 根据权利要求13-16所述的电子设备,其中,所述计算机可读指令被所述处理器执行时,实现:
    通过第三消息队列接收所述物联网平台发送的主题类更新请求,其中,所述主题类更新请求包括所述第二产品标识和与所述第二产品标识对应的至少一个第二更新主题类,所述主题类更新请求被所述物联网平台通过所述第三消息队列发送至所述多个物联网服务端,所述第二更新主题类由所述目标物联网设备的用户通过用户终端提交至所述物联网平台;
    在本地存储的与所述主题类更新请求中所述第二产品标识对应至少一个第二主题类中确定出与所述至少一个第二更新主题类对应的至少一个第二主题类,作为第二目标主题类;
    将所述第二目标主题类替换为对应的第二更新主题类。
  19. 根据权利要求15所述的电子设备,其中,所述计算机可读指令被所述处理器执行时,实现:
    通过第一消息队列接收由所述多个物联网服务端中的第二物联网服务端同步的所述第二权限校验数据。
  20. 一种计算机可读存储介质,其中,其存储有计算机程序指令,当所述计算机程序指令被计算机执行时,使计算机执行根据权利要求1至9中任一项所述的方法。
PCT/CN2020/093594 2020-01-15 2020-05-30 物联网数据传输方法、装置、介质及电子设备 WO2021143025A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010044996.1 2020-01-15
CN202010044996.1A CN111274268B (zh) 2020-01-15 2020-01-15 物联网数据传输方法、装置、介质及电子设备

Publications (1)

Publication Number Publication Date
WO2021143025A1 true WO2021143025A1 (zh) 2021-07-22

Family

ID=70997246

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/093594 WO2021143025A1 (zh) 2020-01-15 2020-05-30 物联网数据传输方法、装置、介质及电子设备

Country Status (2)

Country Link
CN (1) CN111274268B (zh)
WO (1) WO2021143025A1 (zh)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114401289A (zh) * 2021-12-31 2022-04-26 深圳市麦谷科技有限公司 任务分批上传方法及系统
CN114443748A (zh) * 2022-01-29 2022-05-06 中国农业银行股份有限公司 一种数据处理方法、装置、电子设备及存储介质
CN114726918A (zh) * 2022-02-15 2022-07-08 深圳Tcl新技术有限公司 一种物联网跨网通信方法、装置、设备及存储介质
CN115002228A (zh) * 2022-05-31 2022-09-02 杭州数梦工场科技有限公司 服务级联调用方法、装置、电子设备及存储介质
CN115034347A (zh) * 2022-06-21 2022-09-09 成都秦川物联网科技股份有限公司 用于二维码数据溯源的工业物联网及其控制方法
CN115242499A (zh) * 2022-07-21 2022-10-25 中国平安人寿保险股份有限公司 网络请求方法、网络请求装置、电子设备、存储介质
CN115883648A (zh) * 2021-08-09 2023-03-31 中移物联网有限公司 一种数据集成方法、装置、设备及存储介质
CN117668934A (zh) * 2023-11-15 2024-03-08 江苏星期七数字科技有限公司 一种基于大数据的区块链数据存储方法和装置

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114629821B (zh) * 2020-12-10 2023-11-10 新智云数据服务有限公司 物联网用量数据生成方法、装置、设备和介质
CN112820366B (zh) * 2020-12-23 2024-08-30 京东方科技集团股份有限公司 数据处理方法、装置、系统、设备和存储介质
CN113852639B (zh) * 2021-09-29 2023-05-26 中国电信股份有限公司 数据处理方法、装置、电子设备和计算机可读存储介质
CN116232616A (zh) * 2021-12-02 2023-06-06 中兴通讯股份有限公司 基于mqtt协议的设备通信方法及装置
CN115357000B (zh) * 2022-10-19 2023-01-17 东方合智数据科技(广东)有限责任公司 生产参数的下发方法、装置、设备及存储介质
CN116055137A (zh) * 2022-12-28 2023-05-02 天翼物联科技有限公司 物联网系统认证授权适配系统、方法、装置及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209522A (zh) * 2015-04-30 2016-12-07 东莞市星东升实业有限公司 基于令牌协议的令牌组网构建方法
CN110113207A (zh) * 2019-05-08 2019-08-09 广州创想云科技有限公司 一种基于物联网的协议更新方法、装置、设备和存储介质
US20190266278A1 (en) * 2018-02-26 2019-08-29 Altibase Corp. IoT Data Management System and Method
CN110300114A (zh) * 2019-07-04 2019-10-01 苏州大学 一种基于NB-IoT通信的综合气象数据采集系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9860241B2 (en) * 2014-04-15 2018-01-02 Level 3 Communications, Llc Device registration, authentication, and authorization system and method
US20170345006A1 (en) * 2016-05-27 2017-11-30 Mastercard International Incorporated Systems and methods for location data verification
CN108632231A (zh) * 2017-03-24 2018-10-09 中移(杭州)信息技术有限公司 一种物联网设备、物联网认证平台、认证方法及系统
CN108509156B (zh) * 2018-04-04 2021-06-11 腾讯科技(深圳)有限公司 数据读取方法、装置、设备及系统
CN109474606B (zh) * 2018-12-04 2022-12-30 平安科技(深圳)有限公司 文件传输方法、装置、计算机设备及存储介质
CN110598431A (zh) * 2019-09-05 2019-12-20 彩讯科技股份有限公司 一种物联网数据处理方法、装置、服务器及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209522A (zh) * 2015-04-30 2016-12-07 东莞市星东升实业有限公司 基于令牌协议的令牌组网构建方法
US20190266278A1 (en) * 2018-02-26 2019-08-29 Altibase Corp. IoT Data Management System and Method
CN110113207A (zh) * 2019-05-08 2019-08-09 广州创想云科技有限公司 一种基于物联网的协议更新方法、装置、设备和存储介质
CN110300114A (zh) * 2019-07-04 2019-10-01 苏州大学 一种基于NB-IoT通信的综合气象数据采集系统

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115883648A (zh) * 2021-08-09 2023-03-31 中移物联网有限公司 一种数据集成方法、装置、设备及存储介质
CN114401289A (zh) * 2021-12-31 2022-04-26 深圳市麦谷科技有限公司 任务分批上传方法及系统
CN114443748A (zh) * 2022-01-29 2022-05-06 中国农业银行股份有限公司 一种数据处理方法、装置、电子设备及存储介质
CN114726918A (zh) * 2022-02-15 2022-07-08 深圳Tcl新技术有限公司 一种物联网跨网通信方法、装置、设备及存储介质
CN114726918B (zh) * 2022-02-15 2024-04-02 深圳Tcl新技术有限公司 一种物联网跨网通信方法、装置、设备及存储介质
CN115002228A (zh) * 2022-05-31 2022-09-02 杭州数梦工场科技有限公司 服务级联调用方法、装置、电子设备及存储介质
CN115002228B (zh) * 2022-05-31 2023-12-26 杭州数梦工场科技有限公司 服务级联调用方法、装置、电子设备及存储介质
CN115034347A (zh) * 2022-06-21 2022-09-09 成都秦川物联网科技股份有限公司 用于二维码数据溯源的工业物联网及其控制方法
CN115034347B (zh) * 2022-06-21 2024-05-28 成都秦川物联网科技股份有限公司 用于二维码数据溯源的工业物联网及其控制方法
CN115242499A (zh) * 2022-07-21 2022-10-25 中国平安人寿保险股份有限公司 网络请求方法、网络请求装置、电子设备、存储介质
CN115242499B (zh) * 2022-07-21 2024-03-01 中国平安人寿保险股份有限公司 网络请求方法、网络请求装置、电子设备、存储介质
CN117668934A (zh) * 2023-11-15 2024-03-08 江苏星期七数字科技有限公司 一种基于大数据的区块链数据存储方法和装置

Also Published As

Publication number Publication date
CN111274268A (zh) 2020-06-12
CN111274268B (zh) 2023-09-05

Similar Documents

Publication Publication Date Title
WO2021143025A1 (zh) 物联网数据传输方法、装置、介质及电子设备
CN110612697B (zh) 用于高效信息检索的数据存储层索引的方法和系统
CN111881129B (zh) 用于数据库的索引管理
CN109361517B (zh) 一种基于云计算的虚拟化云密码机系统及其实现方法
CN106549750B (zh) 以计算机实施的方法与使用其的系统、及计算机程序产品
CN110543545B (zh) 基于区块链的档案管理方法、装置及存储介质
US7702906B1 (en) Securing kernel metadata communication in environments employing distributed software services
CN111783075A (zh) 基于密钥的权限管理方法、装置、介质及电子设备
US20020141588A1 (en) Data security for digital data storage
US10530752B2 (en) Efficient device provision
CN111917552B (zh) 一种基于标识密钥的句柄权限控制方法、装置和系统
WO2018017609A1 (en) Secure asynchronous communications
US11356445B2 (en) Data access interface for clustered devices
CN112615847B (zh) 基于区块链的数据共享和隐私保护方法
US10621055B2 (en) Adaptive data recovery for clustered data devices
US8341417B1 (en) Data storage using encoded hash message authentication code
WO2022095518A1 (zh) 接口自动化测试方法、装置、计算机设备及存储介质
JP4087149B2 (ja) ディスク装置共有システム、及び計算機
US20230231698A1 (en) Privately querying a database with private set membership using succinct filters
CN111756684B (zh) 传输关键数据的方法、系统和非暂时性计算机可读存储介质
CN110990863A (zh) 一种通过时间戳与加密算法实现文件范文控制的方法
WO2020000491A1 (zh) 一种文件存储方法、装置及存储介质
US10268832B1 (en) Streaming authenticated encryption
WO2024027665A1 (zh) 一种数据融合方法、设备、系统及存储介质
WO2022193494A1 (zh) 权限控制方法及服务器、终端、存储介质和计算机程序

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20914308

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20914308

Country of ref document: EP

Kind code of ref document: A1