WO2022215086A1 - System and method for containerization of internet of things devices - Google Patents

System and method for containerization of internet of things devices Download PDF

Info

Publication number
WO2022215086A1
WO2022215086A1 PCT/IN2022/050336 IN2022050336W WO2022215086A1 WO 2022215086 A1 WO2022215086 A1 WO 2022215086A1 IN 2022050336 W IN2022050336 W IN 2022050336W WO 2022215086 A1 WO2022215086 A1 WO 2022215086A1
Authority
WO
WIPO (PCT)
Prior art keywords
processing unit
devices
data
module
iot
Prior art date
Application number
PCT/IN2022/050336
Other languages
French (fr)
Inventor
Sameer Madhusudan KARMARKAR
Joshi ABHIJIT ANANT
Original Assignee
Karmarkar Sameer Madhusudan
Abhijit Anant Joshi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Karmarkar Sameer Madhusudan, Abhijit Anant Joshi filed Critical Karmarkar Sameer Madhusudan
Publication of WO2022215086A1 publication Critical patent/WO2022215086A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure

Definitions

  • the present invention generally relates to information technology and more particularly, to a system and a method for containerization of internet of things devices for secure and standardized data extraction and transmission.
  • IOT Internet of Things
  • IoT devices like smart utility meters and smart sensors are usually connected to an intermediate gateway for data aggregation. From these gateways, the aggregated data is sent to cloud servers. The data can be analyzed within the IoT device, the gateway or in the cloud based the architecture.
  • the key barriers that need to be eliminated for IoT adoption are security and standardized data transmission protocols. Security of systems and data can be compromised due to the large number of potential entry points that are laid bare by IoT devices. It is hence very essential that data as it is extracted from the IOT devices is encrypted so that it cannot be tampered with.
  • An object of the present invention is to achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission in containerization of Internet of Things (IOT) devices.
  • IOT Internet of Things
  • Another object of the present invention is to deploy data transfer from the IoT devices in an efficient manner without being dependent on user knowledge.
  • Another object of the present invention is to provide a cost effective and efficient method for containerization of Internet of Things (IOT) devices. Yet, another object of the present invention is to provide a system and a method that are independent of the skills and knowledge of the personnel’s involved in transformation.
  • IOT Internet of Things
  • a system for containerization of Internet of Things (IOT) devices comprises a communication module linked to a communication network and facilitate data connectivity with a network server; a computing device, communicatively coupled to the communication network, the computing device having, at least one processing unit communicatively coupled to the communication module, a plurality of input devices and output devices and a computer-readable storage medium.
  • the storage medium is configured with an application module configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module.
  • the computing device by means of the application module upon executed by the processing unit, is configured to identify a node group from a plurality of IoT devices in a communication network, receive and process data therefrom and create containers for each of the plurality of IoT devices in the communication network.
  • a method for containerization of Internet of Things (IOT) devices comprises processing unit implemented steps of identifying, the node group of a plurality of IoT devices distributed in the communication network; locating, the node groups of a plurality of IoT devices distributed in the communication network and initiates communication therewith; attaching a respective probe to the located IoT device that runs an application to be containerized; receiving, data from the IoT device and process them to remove the probes attached for identification of the sender; analyzing, the received data according to machine learning algorithm stored therein; creating, containers for IoT devices based on the analysed data; creating a blueprint of the containers for IoT devices.
  • IOT Internet of Things
  • the blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed during transmission from the IoT devices.
  • the containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers.
  • FIG 1 illustrates a block diagram depicting a system for containerization of internet of things devices, in accordance with the present invention
  • the figure 2 illustrates a flow diagram depicting a method for containerization of internet of things devices, in accordance with the present invention
  • the figure 3 illustrates a flow diagram depicting a method of pattern recognition in the method for containerization of internet of things devices, in accordance with the present invention.
  • the present invention provides a system and a method for containerization of Internet of Things (IOT) devices.
  • the system and the method facilitate to achieve containerization of IoT device and achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission.
  • IOT Internet of Things
  • some embodiments may be implemented by a processing unit that executes program instructions so as to cause the processing unit to perform operations involved in one or more of the methods described herein.
  • the program instructions may be computer-readable code, such as compiled or non-compiled program logic and/or machine code, stored in a data storage unit that takes the form of a non-transitory computer-readable medium, such as a magnetic, optical, and/or flash data storage unit.
  • processing unit and/or data storage may be implemented using a single computer system or may be distributed across multiple computer systems (e.g., servers) that are communicatively linked through a network to allow the computer systems to operate in a coordinated manner.
  • the present invention provides a system and a method for containerization of Internet of Things (IOT) devices (100).
  • the system comprises a computing device communicatively connected to a communication network (‘network’ hereinafter) by means of a communication module.
  • the computing device having a processing unit coupled to input devices, output devices and a non-transitory computer- readable storage medium that is configured with an application module.
  • the communication module is linked to the communication network to facilitate data connectivity with a network server.
  • the communication module facilitates an uninterrupted communication between the computing device and a plurality of IoT devices over the communication network, wherein the communication module is configured to establish a connection between the computing device and a plurality of IoT devices in a network.
  • the communication module is configured to connect the computing device with a cloud network.
  • the storage medium is a computer-readable medium implemented using devices such as a single computer system, or multiple computer systems distributed across a communication network that is communicatively linked through the network allowing it to be operated in a coordinated manner.
  • Each of the storage unit in the storage medium is a computer-readable medium, such as a magnetic, optical, and/or flash data storage devices.
  • the computer-readable storage medium is configured with an application module containing a set of instructions that can be executed by the programing unit.
  • the application module stored in the storage medium upon execution by the processing unit is capable of receiving and processing a plurality of data from the IoT devices distributed over the communication network.
  • the computing device is configured for receiving and processing the data from the plurality of IoT devices distributed in the network.
  • the computing device by means of the application module after execution is capable of creating a plurality of containers for the data from the plurality of IoT devices.
  • containerization refers to a layer of abstraction that resides either in the IoT devices or in a network gateway (‘gateway’ hereinafter). The choice of the layer at which this abstraction is deployed depends upon the hardware capability and the operating system of the IoT device and/or the gateway.
  • the containers created for the data from each of the plurality of IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers. While deploying the containers, a deployment blueprint is created in such a way that the data layer/plane is secured from end to end using a variety of security techniques. Thus the security techniques ensure no data is exposed while transmitting to and from the plurality of IoT devices that collects data from the sensors. However, the communication between IoT devices and sensors is not under the purview of this security technique.
  • the computing device divides the plurality of IoT devices and the gateway into a plurality of micro-services.
  • This plurality of micro-services is logical micro-services that facilitate encryption and protocol conversion.
  • the deployment of containerization strategy modernizes the plurality of IoT devices network by fragmenting the monolithic offerings into convenient micro-services that are deployed on each of the plurality of IoT devices or gateway (Fog).
  • the IoT devices include the devices that can control the data path/exchange and are capable of communicating with cloud/edge cloud/Fog.
  • the micro services are created based on the analysis of patterns of data during the data transactions such as data access and data transfer and analyzing data path to make sure that the related functionalities are segregated as the different domains of functionality and further refined through a set of assisted leaming/customizations.
  • the application module is normally provided with the capability of analyzing the pattems/anti-pattems of data, by using the source code, which gives access to the IoT device software. This also relies on a machine learning model that is continuously refined based on feedback from the new datasets/pattems collected by the software system.
  • the process of containerization includes pattern recognition wherein the application module is configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module.
  • the pattern recognition module is configured to detect new applications/new application postures.
  • the pattern recognition module inspects and analyses new unknown information for identifying new applications.
  • the training module is configured to receive new patterns identified along with old patterns from the pattern recognition module and generates rules and a statistical model to recognize the applications.
  • the feature generation module is configured to generate new capabilities for detecting new applications/refining existing understanding of applications based on the new statistical model and training data.
  • the feedback module is configured to apply machine learning from upcoming data inputs and programs the data inputs into application transformation.
  • the pattern recognition module also comprises a database having a training set that is seeded using base model and a machine learning model generated in the pattern recognition module using machine learning techniques.
  • the training set is continuously updated based on the new data feedback from the feedback module to the system and the model is refined through an assisted machine learning program.
  • the IoT devices such as smart utility meters and smart sensors are connected to an intermediate gateway for data aggregation. From these gateways, the aggregated data is sent to cloud network servers. These datasets may be analyzed within the IoT device, the gateway, or in the cloud-based architecture.
  • the process of containerization refers to a layer of abstraction that can reside either on the IoT device or in the gateway. The choice of the layer at which this abstraction is deployed depends on the hardware capability and the operating system of the IoT device and/or the gateway.
  • the process of containerization can be implemented by using minimal hardware resources in terms of storage medium and processing unit.
  • the data is encrypted at a point of deployment thereof. Also, the data is transmitted in the right standard protocol that is dictated by the concerned application modules.
  • the present invention provides a method for the containerization of IoT devices (200).
  • the procedures of containerization are deployed through an automated process that uses pattern recognition that in turn uses machine learning and artificial intelligence algorithms.
  • the method for containerization of IoT devices is explained in conjunction with diagrams 2 and 3 and the method progresses through the following processing unit implemented method steps.
  • the application module when executed by the processing unit identifies the node group of a plurality of IoT devices distributed in the communication network. Further, in the second step, these identified node groups are taken for finding a location of the IoT device. Thereafter, in the third step, the processing unit locates the node groups and initiates communication therewith. The communication progresses through the data transfer therebetween and collects the required data by the processing unit. Thereafter, in the fourth step, the processing unit attaches respective probes to the IoT device that runs an application to be containerized.
  • the probes are attached to the applications corresponding to the IoT devices.
  • the probe is a piece of intelligent programs capable of performing tasks to collect discovery and assessment data that will be used as part of the containerization process.
  • receives data attached with the probes by the processing unit.
  • the processing unit removes the probes attached for identification of the sender.
  • the received data are analyzed by the processing unit according to an algorithm stored therein.
  • the analysis involves pattern recognition procedures, where the data is given for applying pattems/antipattems wherein, the pattern recognition is based on a machine -learning algorithm.
  • the analyzed data is transferred for containerization.
  • the containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers.
  • the processing unit creates a blueprint of the containers.
  • a deployment blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed while transmitting from the IoT device that collects data from the sensors, however, communication between IoT device and sensor is not under the purview of this security techniques due to limitation of the sensor capabilities.
  • the present invention provides a method for the detection of patterns (250) in an application stored for every IoT device and applying those patterns for automated application transformation.
  • the method steps of pattern detection are explained in conjunction with figure 3.
  • the processing unite by means of the application module discovers the application under observation and verifies the discovered information.
  • the programming unit classifies and cleans the data received from a monitoring module of the pattern recognition module configured therein.
  • the programming unit analyses the cleaned data to determine patterns and anti -patterns.
  • the programming unit detect new applications/new application postures.
  • the programming unit receives new patterns identified along with old patterns to generate/refme rules and produce a statistical model.
  • the programming unit generates new capabilities for detecting new applications in the IoT devices in the network.
  • the programming unit applies a machine learning algorithm from the updated data points and codes the data points into an application containerization model as described in figure 2.
  • the application module stored in the computing device is capable of capturing and storing the information discovered from the nodes and would be available in the form of recommendations that can be tweaked/customized such that it gives users more control and the ability to override/refme the recommendations provided.
  • the method of the present invention is applicable to all IoT devices having an operating system (OS). Alternatively, the method can be applied to devices that do not have operating systems with a required hardware component.
  • OS operating system
  • the programming instructions can be, for example, computer-executable and/or logic implemented instructions.
  • a computing device is configured to provide various operations, functions, or actions in response to the programming instructions conveyed to the computing device by one or more of the computer-readable medium, the computer recordable medium, and/or the communications medium.
  • the non-transitory computer-readable medium can also be distributed among multiple data storage elements, which could be remotely located from each other.
  • the computing device that executes some or all of the stored instructions can be a microfabrication controller or another computing platform. Alternatively, the computing device that executes some or all of the stored instructions could be a remotely located computer system, such as a server.
  • the system and the method facilitate achievement of the dual goal of security in data extraction and transmission and adoption of evolving standards of data extraction and transmission.
  • the system and the method are cost effective and efficient in operation.
  • the system employs an automated process for containerization, which uses pattern recognition that in turn uses machine learning and artificial intelligence. This makes deployment quick, efficient and not dependent on individual user skills and knowledge.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed is a system (100) and method (200) for containerization of internet of things (IoT) devices that helps to achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission. The system (100) comprises a computing device communicatively coupled to a communication network, wherein the computing device by means of an application module configured therein is capable of identifying a node group from a plurality of IoT devices in the communication network, receive and process data therefrom and create containers of each of the plurality of IoT devices in the communication network. Thus system (100) performs an automated process for containerization, which uses pattern recognition that in turn uses machine learning and artificial intelligence. This makes a quick deployment of data transfer from the IoT devices in an efficient manner without being dependent on user knowledge.

Description

SYSTEM AND METHOD FOR CONTAINERIZATION OF INTERNET
OF THINGS DEVICES
FIELD OF THE INVENTION
The present invention generally relates to information technology and more particularly, to a system and a method for containerization of internet of things devices for secure and standardized data extraction and transmission. BACKGROUND OF THE INVENTION
Internet of Things (IOT) has an exponential growth rate and adoption in multiple industries. IoT devices like smart utility meters and smart sensors are usually connected to an intermediate gateway for data aggregation. From these gateways, the aggregated data is sent to cloud servers. The data can be analyzed within the IoT device, the gateway or in the cloud based the architecture. The key barriers that need to be eliminated for IoT adoption are security and standardized data transmission protocols. Security of systems and data can be compromised due to the large number of potential entry points that are laid bare by IoT devices. It is hence very essential that data as it is extracted from the IOT devices is encrypted so that it cannot be tampered with. As IOT devices proliferate, the protocols that they deploy for the data transmission differ widely leading to an exponentially cascading difficulty of protocol management and interpretations. It is hence necessary to keep adapting to the changing and evolving protocol standards as the field of IoT evolves. In order to have a seamless connection between the IoT devices and the IoT gateways in a communication network, multi-layer applications, resource virtualization are necessary at all the layers. To achieve this, a hypervisor based virtualization (HW) is heavily used in the cloud networks. However, the HVV is not portable, flexible, programmable and lightweight enough for edge and aggregator layers, practically. As a result, an alternative to the hypervisors a container-based virtualization is required in the IoT context which seems appropriate for addressing the above-mentioned shortcomings in the network.
Accordingly, there exists a need to provide a system and a method for containerization of Internet of Things (IoT) devices that achieves the dual goal of security and standardization and overcomes the above mentioned drawbacks of the existing systems.
OBJECT OF THE INVENTION
An object of the present invention is to achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission in containerization of Internet of Things (IOT) devices.
Another object of the present invention is to deploy data transfer from the IoT devices in an efficient manner without being dependent on user knowledge.
Yet, another object of the present invention is to provide a cost effective and efficient method for containerization of Internet of Things (IOT) devices. Yet, another object of the present invention is to provide a system and a method that are independent of the skills and knowledge of the personnel’s involved in transformation.
SUMMARY OF THE INVENTION
A system for containerization of Internet of Things (IOT) devices comprises a communication module linked to a communication network and facilitate data connectivity with a network server; a computing device, communicatively coupled to the communication network, the computing device having, at least one processing unit communicatively coupled to the communication module, a plurality of input devices and output devices and a computer-readable storage medium. The storage medium is configured with an application module configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module. The computing device, by means of the application module upon executed by the processing unit, is configured to identify a node group from a plurality of IoT devices in a communication network, receive and process data therefrom and create containers for each of the plurality of IoT devices in the communication network.
A method for containerization of Internet of Things (IOT) devices comprises processing unit implemented steps of identifying, the node group of a plurality of IoT devices distributed in the communication network; locating, the node groups of a plurality of IoT devices distributed in the communication network and initiates communication therewith; attaching a respective probe to the located IoT device that runs an application to be containerized; receiving, data from the IoT device and process them to remove the probes attached for identification of the sender; analyzing, the received data according to machine learning algorithm stored therein; creating, containers for IoT devices based on the analysed data; creating a blueprint of the containers for IoT devices. The blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed during transmission from the IoT devices. The containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers.
DETAILED DESCRIPTION OF THE DRAWINGS
The objects and advantages of the present invention will become apparent when the disclosure is read in conjunction with the following figures, wherein The figure 1 illustrates a block diagram depicting a system for containerization of internet of things devices, in accordance with the present invention,
The figure 2 illustrates a flow diagram depicting a method for containerization of internet of things devices, in accordance with the present invention, and The figure 3 illustrates a flow diagram depicting a method of pattern recognition in the method for containerization of internet of things devices, in accordance with the present invention.
DETAILED DESCRIPTION OF THE INVENTION The foregoing objects of the invention are accomplished and the problems and shortcomings associated with prior art techniques and approaches are overcome by the present invention described in the present embodiments.
The present invention provides a system and a method for containerization of Internet of Things (IOT) devices. The system and the method facilitate to achieve containerization of IoT device and achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission.
The present invention is illustrated with reference to the accompanying drawings, throughout which reference numbers indicate corresponding parts in the various figures. These reference numbers are shown in brackets in the following description.
Parts of the description may be presented in terms of operations performed by at least one electrical / electronic circuit, a computer system, using terms such as data, state, link, fault, packet, and the like, consistent with the manner commonly employed by those skilled in the art to convey the substance of their work to others skilled in the art. As is well understood by those skilled in the art, these quantities take the form of data stored/transferred in the form of nontransitory, computer-readable electrical, magnetic, or optical signals capable of being stored, transferred, combined, and otherwise manipulated through mechanical and electrical components of the computer system; and the term computer system includes general purpose as well as special purpose data processing devices, switches, and the like, that are standalone, adjunct or embedded. For instance, some embodiments may be implemented by a processing unit that executes program instructions so as to cause the processing unit to perform operations involved in one or more of the methods described herein. The program instructions may be computer-readable code, such as compiled or non-compiled program logic and/or machine code, stored in a data storage unit that takes the form of a non-transitory computer-readable medium, such as a magnetic, optical, and/or flash data storage unit. Moreover, such processing unit and/or data storage may be implemented using a single computer system or may be distributed across multiple computer systems (e.g., servers) that are communicatively linked through a network to allow the computer systems to operate in a coordinated manner. The present invention provides a system and a method for containerization of Internet of Things (IOT) devices (100). The system comprises a computing device communicatively connected to a communication network (‘network’ hereinafter) by means of a communication module. The computing device having a processing unit coupled to input devices, output devices and a non-transitory computer- readable storage medium that is configured with an application module.
The communication module is linked to the communication network to facilitate data connectivity with a network server. The communication module facilitates an uninterrupted communication between the computing device and a plurality of IoT devices over the communication network, wherein the communication module is configured to establish a connection between the computing device and a plurality of IoT devices in a network. In an exemplary embodiment, the communication module is configured to connect the computing device with a cloud network.
In the exemplary embodiments of the invention, the storage medium is a computer-readable medium implemented using devices such as a single computer system, or multiple computer systems distributed across a communication network that is communicatively linked through the network allowing it to be operated in a coordinated manner. Each of the storage unit in the storage medium is a computer-readable medium, such as a magnetic, optical, and/or flash data storage devices.
The computer-readable storage medium is configured with an application module containing a set of instructions that can be executed by the programing unit. The application module stored in the storage medium, upon execution by the processing unit is capable of receiving and processing a plurality of data from the IoT devices distributed over the communication network. Thus the computing device is configured for receiving and processing the data from the plurality of IoT devices distributed in the network. The computing device by means of the application module after execution is capable of creating a plurality of containers for the data from the plurality of IoT devices. Specifically, containerization refers to a layer of abstraction that resides either in the IoT devices or in a network gateway (‘gateway’ hereinafter). The choice of the layer at which this abstraction is deployed depends upon the hardware capability and the operating system of the IoT device and/or the gateway.
The containers created for the data from each of the plurality of IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers. While deploying the containers, a deployment blueprint is created in such a way that the data layer/plane is secured from end to end using a variety of security techniques. Thus the security techniques ensure no data is exposed while transmitting to and from the plurality of IoT devices that collects data from the sensors. However, the communication between IoT devices and sensors is not under the purview of this security technique.
In accordance with the present invention, the computing device divides the plurality of IoT devices and the gateway into a plurality of micro-services. This plurality of micro-services is logical micro-services that facilitate encryption and protocol conversion. The deployment of containerization strategy modernizes the plurality of IoT devices network by fragmenting the monolithic offerings into convenient micro-services that are deployed on each of the plurality of IoT devices or gateway (Fog). In the preferred embodiment, the IoT devices include the devices that can control the data path/exchange and are capable of communicating with cloud/edge cloud/Fog.
The micro services are created based on the analysis of patterns of data during the data transactions such as data access and data transfer and analyzing data path to make sure that the related functionalities are segregated as the different domains of functionality and further refined through a set of assisted leaming/customizations. The application module is normally provided with the capability of analyzing the pattems/anti-pattems of data, by using the source code, which gives access to the IoT device software. This also relies on a machine learning model that is continuously refined based on feedback from the new datasets/pattems collected by the software system. The process of containerization includes pattern recognition wherein the application module is configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module. The pattern recognition module is configured to detect new applications/new application postures. The pattern recognition module inspects and analyses new unknown information for identifying new applications. The training module is configured to receive new patterns identified along with old patterns from the pattern recognition module and generates rules and a statistical model to recognize the applications. The feature generation module is configured to generate new capabilities for detecting new applications/refining existing understanding of applications based on the new statistical model and training data. The feedback module is configured to apply machine learning from upcoming data inputs and programs the data inputs into application transformation.
The pattern recognition module also comprises a database having a training set that is seeded using base model and a machine learning model generated in the pattern recognition module using machine learning techniques. The training set is continuously updated based on the new data feedback from the feedback module to the system and the model is refined through an assisted machine learning program. In the exemplary embodiment of the invention, the IoT devices such as smart utility meters and smart sensors are connected to an intermediate gateway for data aggregation. From these gateways, the aggregated data is sent to cloud network servers. These datasets may be analyzed within the IoT device, the gateway, or in the cloud-based architecture. The process of containerization refers to a layer of abstraction that can reside either on the IoT device or in the gateway. The choice of the layer at which this abstraction is deployed depends on the hardware capability and the operating system of the IoT device and/or the gateway.
Thus the process of containerization can be implemented by using minimal hardware resources in terms of storage medium and processing unit. Once the container is deployed, the data is encrypted at a point of deployment thereof. Also, the data is transmitted in the right standard protocol that is dictated by the concerned application modules.
In another aspect, the present invention provides a method for the containerization of IoT devices (200). In the invention, the procedures of containerization are deployed through an automated process that uses pattern recognition that in turn uses machine learning and artificial intelligence algorithms.
The method for containerization of IoT devices (200) is explained in conjunction with diagrams 2 and 3 and the method progresses through the following processing unit implemented method steps. In the first step, the application module when executed by the processing unit identifies the node group of a plurality of IoT devices distributed in the communication network. Further, in the second step, these identified node groups are taken for finding a location of the IoT device. Thereafter, in the third step, the processing unit locates the node groups and initiates communication therewith. The communication progresses through the data transfer therebetween and collects the required data by the processing unit. Thereafter, in the fourth step, the processing unit attaches respective probes to the IoT device that runs an application to be containerized. The probes are attached to the applications corresponding to the IoT devices. In the implementation, the probe is a piece of intelligent programs capable of performing tasks to collect discovery and assessment data that will be used as part of the containerization process. In the fifth step, by the processing unit, receives data attached with the probes. In the seventh step, the processing unit removes the probes attached for identification of the sender. Thereafter, in the eighth step, the received data are analyzed by the processing unit according to an algorithm stored therein. The analysis involves pattern recognition procedures, where the data is given for applying pattems/antipattems wherein, the pattern recognition is based on a machine -learning algorithm. Thereafter, in the seventh step, the analyzed data is transferred for containerization. The containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers. Thereafter, in the ninth step, the processing unit creates a blueprint of the containers. Here, a deployment blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed while transmitting from the IoT device that collects data from the sensors, however, communication between IoT device and sensor is not under the purview of this security techniques due to limitation of the sensor capabilities.
In another aspect, the present invention provides a method for the detection of patterns (250) in an application stored for every IoT device and applying those patterns for automated application transformation. The method steps of pattern detection are explained in conjunction with figure 3. In the first step, the processing unite by means of the application module discovers the application under observation and verifies the discovered information. In the second step, the programming unit classifies and cleans the data received from a monitoring module of the pattern recognition module configured therein. Further, in the third step, the programming unit analyses the cleaned data to determine patterns and anti -patterns. Thereafter, in the fourth step, detect new applications/new application postures. Thereafter in the fifth step, the programming unit receives new patterns identified along with old patterns to generate/refme rules and produce a statistical model. Thereafter in the sixth step, the programming unit generates new capabilities for detecting new applications in the IoT devices in the network. Thereafter, in the seventh step, the programming unit applies a machine learning algorithm from the updated data points and codes the data points into an application containerization model as described in figure 2.
The application module stored in the computing device is capable of capturing and storing the information discovered from the nodes and would be available in the form of recommendations that can be tweaked/customized such that it gives users more control and the ability to override/refme the recommendations provided. The method of the present invention is applicable to all IoT devices having an operating system (OS). Alternatively, the method can be applied to devices that do not have operating systems with a required hardware component.
The programming instructions can be, for example, computer-executable and/or logic implemented instructions. In some examples, a computing device is configured to provide various operations, functions, or actions in response to the programming instructions conveyed to the computing device by one or more of the computer-readable medium, the computer recordable medium, and/or the communications medium. The non-transitory computer-readable medium can also be distributed among multiple data storage elements, which could be remotely located from each other. The computing device that executes some or all of the stored instructions can be a microfabrication controller or another computing platform. Alternatively, the computing device that executes some or all of the stored instructions could be a remotely located computer system, such as a server.
Further, while one or more operations have been described as being performed by or otherwise related to certain modules, devices or entities, the operations may be performed by or otherwise related to any module, device, or entity. Further, the operations need not be performed in the disclosed order, although in some examples, an order may be preferred. Also, not all functions need to be performed to achieve the desired advantages of the disclosed system and method, and therefore not all functions are required.
Advantages of the invention
1. The system and the method facilitate achievement of the dual goal of security in data extraction and transmission and adoption of evolving standards of data extraction and transmission. 2. The system and the method are cost effective and efficient in operation.
3. The system and the method are independent of the skills and knowledge of the personnel involved in transformation.
4. The system employs an automated process for containerization, which uses pattern recognition that in turn uses machine learning and artificial intelligence. This makes deployment quick, efficient and not dependent on individual user skills and knowledge.
The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the present invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the present invention and its practical application, and to thereby enable others skilled in the art to best utilize the present invention and various embodiments with various modifications as are suited to the particular use contemplated. It is understood that various omissions and substitutions of equivalents are contemplated as circumstances may suggest or render expedient, but such omissions and substitutions are intended to cover the application or implementation without departing from the scope of the claims of the present invention.

Claims

We claim:
1. A system for containerization of Internet of Things (IOT) devices (100), the system comprises: a communication module, the communication module is linked to a communication network and facilitate data connectivity with a network server; a computing device, the computing device is communicatively coupled to the communication network, the computing device having, at least one processing unit, the processing unit is communicatively coupled to the communication module, a plurality of input devices and output devices coupled to the processing unit; and a computer-readable storage medium, the storage medium is communicatively coupled to the processing unit and communication module, the storage unit is configured with an application module, wherein the application module upon executed by the processing unit is capable of extracting and containerizing data from the lot devices in the communication devices; wherein the computing device, by means of the application module upon executed by the processing unit, is configured to identify a node group from a plurality of IoT devices in a communication network, receive and process data therefrom and create containers for each of the plurality of IoT devices in the communication network.
2. The system as claimed in claim 1, the computing device includes general purpose as well as special purpose data processing devices.
3. The system as claimed in claim 1, the communication module is configured to connect the computing device with a cloud network.
4. The system as claimed in claim 1, the storage medium is a computer- readable medium implemented using devices such as a single computer system, or multiple computer systems distributed across a communication network that is communicatively linked through the network allowing it to be operated in a coordinated manner.
5. The system as claimed in claim 1, the storage medium is a device selected from magnetic, optical, flash data storage devices and like.
6. The system as claimed in claim 1, the application module is configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module.
7. The system as claimed in claim 1, the pattern recognition module also comprises a database having a training set that is seeded using base model and a machine learning model generated in the pattern recognition module using machine learning techniques.
8. A method for containerization of Internet of Things (IOT) devices, having a communication module linked to a communication network and facilitate data connectivity with a network server; a computing device, communicatively coupled to the communication network, the computing device having, at least one processing unit communicatively coupled to the communication module, a plurality of input devices and output devices and a computer-readable storage medium, wherein the storage medium is configured with an application module configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module, that upon executed by the processing unit is capable of extracting and containerizing the lot devices in the communication network, the method comprises processing unit implemented steps of: identifying, by the processing unit, the node group of a plurality of IoT devices distributed in the communication network; locating by the processing unit, the node groups of a plurality of IoT devices distributed in the communication network and initiates communication therewith; attaching by the processing unit, a respective probe to the located IoT device that runs an application to be containerized; receiving, by the processing unit, data from the IoT device and process them to remove the probes attached for identification of the sender; analyzing, by the processing unit, the received data according to machine learning algorithm stored therein; creating, by the processing unit, containers for IoT devices based on the analyzed data, wherein the containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers; creating, by the processing unit, a blueprint of the containers for IoT devices, wherein the blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed during transmission from the IoT devices.
9. The method as claimed in claim 8, wherein the analysis includes, pattern recognition procedures (250) based on machine-learning algorithm, the pattern recognition procedures (250) include, finding the application corresponding to the lot devices under observation and verifies the discovered information by the processing unit; classifying and cleaning the data received from a monitoring module of the pattern recognition module configured therein; analyzing, by the processing unit, the cleaned data and determine patterns and anti-patterns therein; detecting, by the processing unit, new applications/new application postures of IoT devices; generating, by the processing unit, a statistical model from the identified patterns along with old patterns; detecting, by the processing unit, new applications of the IoT devices in the communication network; applying, by the processing unit, machine learning algorithm on an updated data point and coding the data points into an application container.
PCT/IN2022/050336 2021-04-07 2022-04-07 System and method for containerization of internet of things devices WO2022215086A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202021043718 2021-04-07
IN202021043718 2021-04-07

Publications (1)

Publication Number Publication Date
WO2022215086A1 true WO2022215086A1 (en) 2022-10-13

Family

ID=83546661

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2022/050336 WO2022215086A1 (en) 2021-04-07 2022-04-07 System and method for containerization of internet of things devices

Country Status (1)

Country Link
WO (1) WO2022215086A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170099176A1 (en) * 2015-09-22 2017-04-06 Mobile Iron, Inc. Containerized architecture to manage internet-connected devices
US20180285234A1 (en) * 2017-03-31 2018-10-04 Commvault Systems, Inc. Management of internet of things devices
US20190014048A1 (en) * 2017-07-05 2019-01-10 Wipro Limited Method and system for processing data in an internet of things (iot) environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170099176A1 (en) * 2015-09-22 2017-04-06 Mobile Iron, Inc. Containerized architecture to manage internet-connected devices
US20180285234A1 (en) * 2017-03-31 2018-10-04 Commvault Systems, Inc. Management of internet of things devices
US20190014048A1 (en) * 2017-07-05 2019-01-10 Wipro Limited Method and system for processing data in an internet of things (iot) environment

Similar Documents

Publication Publication Date Title
Jagatheesaperumal et al. The duo of artificial intelligence and big data for industry 4.0: Applications, techniques, challenges, and future research directions
EP3720051B1 (en) Anomaly detection and troubleshooting system for a network using machine learning and/or artificial intelligence
JP6983328B2 (en) Features Unsupervised cross-domain distance metric adaptation by forwarding network
US11113397B2 (en) Detection of malicious executable files using hierarchical models
US20210359901A1 (en) Data driven systems and methods to isolate network faults
US11443230B2 (en) Intrusion detection model for an internet-of-things operations environment
WO2020256732A1 (en) Domain adaptation and fusion using task-irrelevant paired data in sequential form
CN112711603B (en) Cloud-based workpiece detection method and system and computer-readable storage medium
US11611488B2 (en) AI machine learning technology based fault management system for network equpment that supports SDN open flow protocol
US11121952B2 (en) Device health assessment data summarization using machine learning
EP3751486A1 (en) Electronic label management apparatus and method
Mai et al. Deep learning to predict the feasibility of priority-based Ethernet network configurations
Mozo et al. B5GEMINI: Digital twin network for 5G and beyond
CN114615088A (en) Terminal service flow abnormity detection model establishing method and abnormity detection method
WO2022215086A1 (en) System and method for containerization of internet of things devices
CN116926241B (en) Immune cell culture control method and system
Strufe et al. Design of a 5G Ready and Reliable Architecture for the Smart Factory of the Future
US20230409983A1 (en) Customizable federated learning
CN105429825B (en) Monitoring method and device for data flow system
US11765179B2 (en) Modifying network relationships using a heterogenous network flows graph
US11961099B2 (en) Utilizing machine learning for optimization of planning and value realization for private networks
CN114342321B (en) Communication control device and system
CN114266723A (en) Image processing method, image processing device, storage medium and computer terminal
Scholze et al. Reliable self-learning production systems based on context aware services
Ganesh et al. The Industry 4.0 for Secure and Smarter Manufacturing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22784285

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22784285

Country of ref document: EP

Kind code of ref document: A1