WO2022215086A1 - System and method for containerization of internet of things devices - Google Patents
System and method for containerization of internet of things devices Download PDFInfo
- Publication number
- WO2022215086A1 WO2022215086A1 PCT/IN2022/050336 IN2022050336W WO2022215086A1 WO 2022215086 A1 WO2022215086 A1 WO 2022215086A1 IN 2022050336 W IN2022050336 W IN 2022050336W WO 2022215086 A1 WO2022215086 A1 WO 2022215086A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- processing unit
- devices
- data
- module
- iot
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000004891 communication Methods 0.000 claims abstract description 50
- 238000003909 pattern recognition Methods 0.000 claims abstract description 22
- 238000010801 machine learning Methods 0.000 claims abstract description 15
- 230000005540 biological transmission Effects 0.000 claims abstract description 13
- 230000008569 process Effects 0.000 claims abstract description 12
- 238000012545 processing Methods 0.000 claims description 45
- 239000000523 sample Substances 0.000 claims description 9
- 238000012549 training Methods 0.000 claims description 9
- 238000013500 data storage Methods 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 6
- 238000004458 analytical method Methods 0.000 claims description 5
- 230000003287 optical effect Effects 0.000 claims description 4
- 238000013179 statistical model Methods 0.000 claims description 4
- 230000036544 posture Effects 0.000 claims description 3
- 238000004140 cleaning Methods 0.000 claims 1
- 238000013075 data extraction Methods 0.000 abstract description 9
- 238000012546 transfer Methods 0.000 abstract description 4
- 238000013473 artificial intelligence Methods 0.000 abstract description 3
- 230000001419 dependent effect Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 4
- 230000009466 transformation Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000002776 aggregation Effects 0.000 description 2
- 238000004220 aggregation Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000010420 art technique Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000007670 refining Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y30/00—IoT infrastructure
Definitions
- the present invention generally relates to information technology and more particularly, to a system and a method for containerization of internet of things devices for secure and standardized data extraction and transmission.
- IOT Internet of Things
- IoT devices like smart utility meters and smart sensors are usually connected to an intermediate gateway for data aggregation. From these gateways, the aggregated data is sent to cloud servers. The data can be analyzed within the IoT device, the gateway or in the cloud based the architecture.
- the key barriers that need to be eliminated for IoT adoption are security and standardized data transmission protocols. Security of systems and data can be compromised due to the large number of potential entry points that are laid bare by IoT devices. It is hence very essential that data as it is extracted from the IOT devices is encrypted so that it cannot be tampered with.
- An object of the present invention is to achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission in containerization of Internet of Things (IOT) devices.
- IOT Internet of Things
- Another object of the present invention is to deploy data transfer from the IoT devices in an efficient manner without being dependent on user knowledge.
- Another object of the present invention is to provide a cost effective and efficient method for containerization of Internet of Things (IOT) devices. Yet, another object of the present invention is to provide a system and a method that are independent of the skills and knowledge of the personnel’s involved in transformation.
- IOT Internet of Things
- a system for containerization of Internet of Things (IOT) devices comprises a communication module linked to a communication network and facilitate data connectivity with a network server; a computing device, communicatively coupled to the communication network, the computing device having, at least one processing unit communicatively coupled to the communication module, a plurality of input devices and output devices and a computer-readable storage medium.
- the storage medium is configured with an application module configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module.
- the computing device by means of the application module upon executed by the processing unit, is configured to identify a node group from a plurality of IoT devices in a communication network, receive and process data therefrom and create containers for each of the plurality of IoT devices in the communication network.
- a method for containerization of Internet of Things (IOT) devices comprises processing unit implemented steps of identifying, the node group of a plurality of IoT devices distributed in the communication network; locating, the node groups of a plurality of IoT devices distributed in the communication network and initiates communication therewith; attaching a respective probe to the located IoT device that runs an application to be containerized; receiving, data from the IoT device and process them to remove the probes attached for identification of the sender; analyzing, the received data according to machine learning algorithm stored therein; creating, containers for IoT devices based on the analysed data; creating a blueprint of the containers for IoT devices.
- IOT Internet of Things
- the blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed during transmission from the IoT devices.
- the containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers.
- FIG 1 illustrates a block diagram depicting a system for containerization of internet of things devices, in accordance with the present invention
- the figure 2 illustrates a flow diagram depicting a method for containerization of internet of things devices, in accordance with the present invention
- the figure 3 illustrates a flow diagram depicting a method of pattern recognition in the method for containerization of internet of things devices, in accordance with the present invention.
- the present invention provides a system and a method for containerization of Internet of Things (IOT) devices.
- the system and the method facilitate to achieve containerization of IoT device and achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission.
- IOT Internet of Things
- some embodiments may be implemented by a processing unit that executes program instructions so as to cause the processing unit to perform operations involved in one or more of the methods described herein.
- the program instructions may be computer-readable code, such as compiled or non-compiled program logic and/or machine code, stored in a data storage unit that takes the form of a non-transitory computer-readable medium, such as a magnetic, optical, and/or flash data storage unit.
- processing unit and/or data storage may be implemented using a single computer system or may be distributed across multiple computer systems (e.g., servers) that are communicatively linked through a network to allow the computer systems to operate in a coordinated manner.
- the present invention provides a system and a method for containerization of Internet of Things (IOT) devices (100).
- the system comprises a computing device communicatively connected to a communication network (‘network’ hereinafter) by means of a communication module.
- the computing device having a processing unit coupled to input devices, output devices and a non-transitory computer- readable storage medium that is configured with an application module.
- the communication module is linked to the communication network to facilitate data connectivity with a network server.
- the communication module facilitates an uninterrupted communication between the computing device and a plurality of IoT devices over the communication network, wherein the communication module is configured to establish a connection between the computing device and a plurality of IoT devices in a network.
- the communication module is configured to connect the computing device with a cloud network.
- the storage medium is a computer-readable medium implemented using devices such as a single computer system, or multiple computer systems distributed across a communication network that is communicatively linked through the network allowing it to be operated in a coordinated manner.
- Each of the storage unit in the storage medium is a computer-readable medium, such as a magnetic, optical, and/or flash data storage devices.
- the computer-readable storage medium is configured with an application module containing a set of instructions that can be executed by the programing unit.
- the application module stored in the storage medium upon execution by the processing unit is capable of receiving and processing a plurality of data from the IoT devices distributed over the communication network.
- the computing device is configured for receiving and processing the data from the plurality of IoT devices distributed in the network.
- the computing device by means of the application module after execution is capable of creating a plurality of containers for the data from the plurality of IoT devices.
- containerization refers to a layer of abstraction that resides either in the IoT devices or in a network gateway (‘gateway’ hereinafter). The choice of the layer at which this abstraction is deployed depends upon the hardware capability and the operating system of the IoT device and/or the gateway.
- the containers created for the data from each of the plurality of IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers. While deploying the containers, a deployment blueprint is created in such a way that the data layer/plane is secured from end to end using a variety of security techniques. Thus the security techniques ensure no data is exposed while transmitting to and from the plurality of IoT devices that collects data from the sensors. However, the communication between IoT devices and sensors is not under the purview of this security technique.
- the computing device divides the plurality of IoT devices and the gateway into a plurality of micro-services.
- This plurality of micro-services is logical micro-services that facilitate encryption and protocol conversion.
- the deployment of containerization strategy modernizes the plurality of IoT devices network by fragmenting the monolithic offerings into convenient micro-services that are deployed on each of the plurality of IoT devices or gateway (Fog).
- the IoT devices include the devices that can control the data path/exchange and are capable of communicating with cloud/edge cloud/Fog.
- the micro services are created based on the analysis of patterns of data during the data transactions such as data access and data transfer and analyzing data path to make sure that the related functionalities are segregated as the different domains of functionality and further refined through a set of assisted leaming/customizations.
- the application module is normally provided with the capability of analyzing the pattems/anti-pattems of data, by using the source code, which gives access to the IoT device software. This also relies on a machine learning model that is continuously refined based on feedback from the new datasets/pattems collected by the software system.
- the process of containerization includes pattern recognition wherein the application module is configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module.
- the pattern recognition module is configured to detect new applications/new application postures.
- the pattern recognition module inspects and analyses new unknown information for identifying new applications.
- the training module is configured to receive new patterns identified along with old patterns from the pattern recognition module and generates rules and a statistical model to recognize the applications.
- the feature generation module is configured to generate new capabilities for detecting new applications/refining existing understanding of applications based on the new statistical model and training data.
- the feedback module is configured to apply machine learning from upcoming data inputs and programs the data inputs into application transformation.
- the pattern recognition module also comprises a database having a training set that is seeded using base model and a machine learning model generated in the pattern recognition module using machine learning techniques.
- the training set is continuously updated based on the new data feedback from the feedback module to the system and the model is refined through an assisted machine learning program.
- the IoT devices such as smart utility meters and smart sensors are connected to an intermediate gateway for data aggregation. From these gateways, the aggregated data is sent to cloud network servers. These datasets may be analyzed within the IoT device, the gateway, or in the cloud-based architecture.
- the process of containerization refers to a layer of abstraction that can reside either on the IoT device or in the gateway. The choice of the layer at which this abstraction is deployed depends on the hardware capability and the operating system of the IoT device and/or the gateway.
- the process of containerization can be implemented by using minimal hardware resources in terms of storage medium and processing unit.
- the data is encrypted at a point of deployment thereof. Also, the data is transmitted in the right standard protocol that is dictated by the concerned application modules.
- the present invention provides a method for the containerization of IoT devices (200).
- the procedures of containerization are deployed through an automated process that uses pattern recognition that in turn uses machine learning and artificial intelligence algorithms.
- the method for containerization of IoT devices is explained in conjunction with diagrams 2 and 3 and the method progresses through the following processing unit implemented method steps.
- the application module when executed by the processing unit identifies the node group of a plurality of IoT devices distributed in the communication network. Further, in the second step, these identified node groups are taken for finding a location of the IoT device. Thereafter, in the third step, the processing unit locates the node groups and initiates communication therewith. The communication progresses through the data transfer therebetween and collects the required data by the processing unit. Thereafter, in the fourth step, the processing unit attaches respective probes to the IoT device that runs an application to be containerized.
- the probes are attached to the applications corresponding to the IoT devices.
- the probe is a piece of intelligent programs capable of performing tasks to collect discovery and assessment data that will be used as part of the containerization process.
- receives data attached with the probes by the processing unit.
- the processing unit removes the probes attached for identification of the sender.
- the received data are analyzed by the processing unit according to an algorithm stored therein.
- the analysis involves pattern recognition procedures, where the data is given for applying pattems/antipattems wherein, the pattern recognition is based on a machine -learning algorithm.
- the analyzed data is transferred for containerization.
- the containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers.
- the processing unit creates a blueprint of the containers.
- a deployment blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed while transmitting from the IoT device that collects data from the sensors, however, communication between IoT device and sensor is not under the purview of this security techniques due to limitation of the sensor capabilities.
- the present invention provides a method for the detection of patterns (250) in an application stored for every IoT device and applying those patterns for automated application transformation.
- the method steps of pattern detection are explained in conjunction with figure 3.
- the processing unite by means of the application module discovers the application under observation and verifies the discovered information.
- the programming unit classifies and cleans the data received from a monitoring module of the pattern recognition module configured therein.
- the programming unit analyses the cleaned data to determine patterns and anti -patterns.
- the programming unit detect new applications/new application postures.
- the programming unit receives new patterns identified along with old patterns to generate/refme rules and produce a statistical model.
- the programming unit generates new capabilities for detecting new applications in the IoT devices in the network.
- the programming unit applies a machine learning algorithm from the updated data points and codes the data points into an application containerization model as described in figure 2.
- the application module stored in the computing device is capable of capturing and storing the information discovered from the nodes and would be available in the form of recommendations that can be tweaked/customized such that it gives users more control and the ability to override/refme the recommendations provided.
- the method of the present invention is applicable to all IoT devices having an operating system (OS). Alternatively, the method can be applied to devices that do not have operating systems with a required hardware component.
- OS operating system
- the programming instructions can be, for example, computer-executable and/or logic implemented instructions.
- a computing device is configured to provide various operations, functions, or actions in response to the programming instructions conveyed to the computing device by one or more of the computer-readable medium, the computer recordable medium, and/or the communications medium.
- the non-transitory computer-readable medium can also be distributed among multiple data storage elements, which could be remotely located from each other.
- the computing device that executes some or all of the stored instructions can be a microfabrication controller or another computing platform. Alternatively, the computing device that executes some or all of the stored instructions could be a remotely located computer system, such as a server.
- the system and the method facilitate achievement of the dual goal of security in data extraction and transmission and adoption of evolving standards of data extraction and transmission.
- the system and the method are cost effective and efficient in operation.
- the system employs an automated process for containerization, which uses pattern recognition that in turn uses machine learning and artificial intelligence. This makes deployment quick, efficient and not dependent on individual user skills and knowledge.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Disclosed is a system (100) and method (200) for containerization of internet of things (IoT) devices that helps to achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission. The system (100) comprises a computing device communicatively coupled to a communication network, wherein the computing device by means of an application module configured therein is capable of identifying a node group from a plurality of IoT devices in the communication network, receive and process data therefrom and create containers of each of the plurality of IoT devices in the communication network. Thus system (100) performs an automated process for containerization, which uses pattern recognition that in turn uses machine learning and artificial intelligence. This makes a quick deployment of data transfer from the IoT devices in an efficient manner without being dependent on user knowledge.
Description
SYSTEM AND METHOD FOR CONTAINERIZATION OF INTERNET
OF THINGS DEVICES
FIELD OF THE INVENTION
The present invention generally relates to information technology and more particularly, to a system and a method for containerization of internet of things devices for secure and standardized data extraction and transmission. BACKGROUND OF THE INVENTION
Internet of Things (IOT) has an exponential growth rate and adoption in multiple industries. IoT devices like smart utility meters and smart sensors are usually connected to an intermediate gateway for data aggregation. From these gateways, the aggregated data is sent to cloud servers. The data can be analyzed within the IoT device, the gateway or in the cloud based the architecture. The key barriers that need to be eliminated for IoT adoption are security and standardized data transmission protocols. Security of systems and data can be compromised due to the large number of potential entry points that are laid bare by IoT devices. It is hence very essential that data as it is extracted from the IOT devices is encrypted so that it cannot be tampered with. As IOT devices proliferate, the protocols that they deploy for the data transmission differ widely leading to an exponentially cascading difficulty of protocol management and interpretations. It is hence necessary to keep adapting to the changing and evolving protocol standards as the field of IoT evolves. In order to have a seamless connection between the IoT devices and the IoT gateways in a communication network, multi-layer applications, resource virtualization are necessary at all the layers. To achieve this, a hypervisor based virtualization (HW) is heavily used in the cloud networks. However, the HVV is not portable, flexible, programmable and lightweight enough for edge and aggregator layers, practically. As a result, an alternative to the hypervisors a
container-based virtualization is required in the IoT context which seems appropriate for addressing the above-mentioned shortcomings in the network.
Accordingly, there exists a need to provide a system and a method for containerization of Internet of Things (IoT) devices that achieves the dual goal of security and standardization and overcomes the above mentioned drawbacks of the existing systems.
OBJECT OF THE INVENTION
An object of the present invention is to achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission in containerization of Internet of Things (IOT) devices.
Another object of the present invention is to deploy data transfer from the IoT devices in an efficient manner without being dependent on user knowledge.
Yet, another object of the present invention is to provide a cost effective and efficient method for containerization of Internet of Things (IOT) devices. Yet, another object of the present invention is to provide a system and a method that are independent of the skills and knowledge of the personnel’s involved in transformation.
SUMMARY OF THE INVENTION
A system for containerization of Internet of Things (IOT) devices comprises a communication module linked to a communication network and facilitate data connectivity with a network server; a computing device, communicatively coupled to the communication network, the computing device having, at least one processing unit communicatively coupled to the communication module, a plurality of input devices and output devices and a computer-readable storage medium. The storage medium is configured with an application module configured with a pattern recognition module having a monitoring module, a
training module, a feature recognition module, and a feedback module. The computing device, by means of the application module upon executed by the processing unit, is configured to identify a node group from a plurality of IoT devices in a communication network, receive and process data therefrom and create containers for each of the plurality of IoT devices in the communication network.
A method for containerization of Internet of Things (IOT) devices comprises processing unit implemented steps of identifying, the node group of a plurality of IoT devices distributed in the communication network; locating, the node groups of a plurality of IoT devices distributed in the communication network and initiates communication therewith; attaching a respective probe to the located IoT device that runs an application to be containerized; receiving, data from the IoT device and process them to remove the probes attached for identification of the sender; analyzing, the received data according to machine learning algorithm stored therein; creating, containers for IoT devices based on the analysed data; creating a blueprint of the containers for IoT devices. The blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed during transmission from the IoT devices. The containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers.
DETAILED DESCRIPTION OF THE DRAWINGS
The objects and advantages of the present invention will become apparent when the disclosure is read in conjunction with the following figures, wherein The figure 1 illustrates a block diagram depicting a system for containerization of internet of things devices, in accordance with the present invention,
The figure 2 illustrates a flow diagram depicting a method for containerization of internet of things devices, in accordance with the present invention, and
The figure 3 illustrates a flow diagram depicting a method of pattern recognition in the method for containerization of internet of things devices, in accordance with the present invention.
DETAILED DESCRIPTION OF THE INVENTION The foregoing objects of the invention are accomplished and the problems and shortcomings associated with prior art techniques and approaches are overcome by the present invention described in the present embodiments.
The present invention provides a system and a method for containerization of Internet of Things (IOT) devices. The system and the method facilitate to achieve containerization of IoT device and achieve security in data extraction and transmission and adoption of evolving standards of data extraction and transmission.
The present invention is illustrated with reference to the accompanying drawings, throughout which reference numbers indicate corresponding parts in the various figures. These reference numbers are shown in brackets in the following description.
Parts of the description may be presented in terms of operations performed by at least one electrical / electronic circuit, a computer system, using terms such as data, state, link, fault, packet, and the like, consistent with the manner commonly employed by those skilled in the art to convey the substance of their work to others skilled in the art. As is well understood by those skilled in the art, these quantities take the form of data stored/transferred in the form of nontransitory, computer-readable electrical, magnetic, or optical signals capable of being stored, transferred, combined, and otherwise manipulated through mechanical and electrical components of the computer system; and the term computer system includes general purpose as well as special purpose data processing devices, switches, and the like, that are standalone, adjunct or embedded. For instance, some embodiments may be implemented by a processing unit that executes
program instructions so as to cause the processing unit to perform operations involved in one or more of the methods described herein. The program instructions may be computer-readable code, such as compiled or non-compiled program logic and/or machine code, stored in a data storage unit that takes the form of a non-transitory computer-readable medium, such as a magnetic, optical, and/or flash data storage unit. Moreover, such processing unit and/or data storage may be implemented using a single computer system or may be distributed across multiple computer systems (e.g., servers) that are communicatively linked through a network to allow the computer systems to operate in a coordinated manner. The present invention provides a system and a method for containerization of Internet of Things (IOT) devices (100). The system comprises a computing device communicatively connected to a communication network (‘network’ hereinafter) by means of a communication module. The computing device having a processing unit coupled to input devices, output devices and a non-transitory computer- readable storage medium that is configured with an application module.
The communication module is linked to the communication network to facilitate data connectivity with a network server. The communication module facilitates an uninterrupted communication between the computing device and a plurality of IoT devices over the communication network, wherein the communication module is configured to establish a connection between the computing device and a plurality of IoT devices in a network. In an exemplary embodiment, the communication module is configured to connect the computing device with a cloud network.
In the exemplary embodiments of the invention, the storage medium is a computer-readable medium implemented using devices such as a single computer system, or multiple computer systems distributed across a communication network that is communicatively linked through the network allowing it to be operated in a coordinated manner. Each of the storage unit in the storage medium
is a computer-readable medium, such as a magnetic, optical, and/or flash data storage devices.
The computer-readable storage medium is configured with an application module containing a set of instructions that can be executed by the programing unit. The application module stored in the storage medium, upon execution by the processing unit is capable of receiving and processing a plurality of data from the IoT devices distributed over the communication network. Thus the computing device is configured for receiving and processing the data from the plurality of IoT devices distributed in the network. The computing device by means of the application module after execution is capable of creating a plurality of containers for the data from the plurality of IoT devices. Specifically, containerization refers to a layer of abstraction that resides either in the IoT devices or in a network gateway (‘gateway’ hereinafter). The choice of the layer at which this abstraction is deployed depends upon the hardware capability and the operating system of the IoT device and/or the gateway.
The containers created for the data from each of the plurality of IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers. While deploying the containers, a deployment blueprint is created in such a way that the data layer/plane is secured from end to end using a variety of security techniques. Thus the security techniques ensure no data is exposed while transmitting to and from the plurality of IoT devices that collects data from the sensors. However, the communication between IoT devices and sensors is not under the purview of this security technique.
In accordance with the present invention, the computing device divides the plurality of IoT devices and the gateway into a plurality of micro-services. This plurality of micro-services is logical micro-services that facilitate encryption and protocol conversion. The deployment of containerization strategy modernizes the
plurality of IoT devices network by fragmenting the monolithic offerings into convenient micro-services that are deployed on each of the plurality of IoT devices or gateway (Fog). In the preferred embodiment, the IoT devices include the devices that can control the data path/exchange and are capable of communicating with cloud/edge cloud/Fog.
The micro services are created based on the analysis of patterns of data during the data transactions such as data access and data transfer and analyzing data path to make sure that the related functionalities are segregated as the different domains of functionality and further refined through a set of assisted leaming/customizations. The application module is normally provided with the capability of analyzing the pattems/anti-pattems of data, by using the source code, which gives access to the IoT device software. This also relies on a machine learning model that is continuously refined based on feedback from the new datasets/pattems collected by the software system. The process of containerization includes pattern recognition wherein the application module is configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module. The pattern recognition module is configured to detect new applications/new application postures. The pattern recognition module inspects and analyses new unknown information for identifying new applications. The training module is configured to receive new patterns identified along with old patterns from the pattern recognition module and generates rules and a statistical model to recognize the applications. The feature generation module is configured to generate new capabilities for detecting new applications/refining existing understanding of applications based on the new statistical model and training data. The feedback module is configured to apply machine learning from upcoming data inputs and programs the data inputs into application transformation.
The pattern recognition module also comprises a database having a training set that is seeded using base model and a machine learning model generated in the
pattern recognition module using machine learning techniques. The training set is continuously updated based on the new data feedback from the feedback module to the system and the model is refined through an assisted machine learning program. In the exemplary embodiment of the invention, the IoT devices such as smart utility meters and smart sensors are connected to an intermediate gateway for data aggregation. From these gateways, the aggregated data is sent to cloud network servers. These datasets may be analyzed within the IoT device, the gateway, or in the cloud-based architecture. The process of containerization refers to a layer of abstraction that can reside either on the IoT device or in the gateway. The choice of the layer at which this abstraction is deployed depends on the hardware capability and the operating system of the IoT device and/or the gateway.
Thus the process of containerization can be implemented by using minimal hardware resources in terms of storage medium and processing unit. Once the container is deployed, the data is encrypted at a point of deployment thereof. Also, the data is transmitted in the right standard protocol that is dictated by the concerned application modules.
In another aspect, the present invention provides a method for the containerization of IoT devices (200). In the invention, the procedures of containerization are deployed through an automated process that uses pattern recognition that in turn uses machine learning and artificial intelligence algorithms.
The method for containerization of IoT devices (200) is explained in conjunction with diagrams 2 and 3 and the method progresses through the following processing unit implemented method steps. In the first step, the application module when executed by the processing unit identifies the node group of a plurality of IoT devices distributed in the communication network. Further, in the second step, these identified node groups are taken for finding a location of the IoT device. Thereafter, in the third step, the processing unit locates the node groups and initiates communication therewith. The communication progresses
through the data transfer therebetween and collects the required data by the processing unit. Thereafter, in the fourth step, the processing unit attaches respective probes to the IoT device that runs an application to be containerized. The probes are attached to the applications corresponding to the IoT devices. In the implementation, the probe is a piece of intelligent programs capable of performing tasks to collect discovery and assessment data that will be used as part of the containerization process. In the fifth step, by the processing unit, receives data attached with the probes. In the seventh step, the processing unit removes the probes attached for identification of the sender. Thereafter, in the eighth step, the received data are analyzed by the processing unit according to an algorithm stored therein. The analysis involves pattern recognition procedures, where the data is given for applying pattems/antipattems wherein, the pattern recognition is based on a machine -learning algorithm. Thereafter, in the seventh step, the analyzed data is transferred for containerization. The containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers. Thereafter, in the ninth step, the processing unit creates a blueprint of the containers. Here, a deployment blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed while transmitting from the IoT device that collects data from the sensors, however, communication between IoT device and sensor is not under the purview of this security techniques due to limitation of the sensor capabilities.
In another aspect, the present invention provides a method for the detection of patterns (250) in an application stored for every IoT device and applying those patterns for automated application transformation. The method steps of pattern detection are explained in conjunction with figure 3. In the first step, the processing unite by means of the application module discovers the application under observation and verifies the discovered information. In the second step, the programming unit classifies and cleans the data received from a monitoring module of the pattern recognition module configured therein. Further, in the third
step, the programming unit analyses the cleaned data to determine patterns and anti -patterns. Thereafter, in the fourth step, detect new applications/new application postures. Thereafter in the fifth step, the programming unit receives new patterns identified along with old patterns to generate/refme rules and produce a statistical model. Thereafter in the sixth step, the programming unit generates new capabilities for detecting new applications in the IoT devices in the network. Thereafter, in the seventh step, the programming unit applies a machine learning algorithm from the updated data points and codes the data points into an application containerization model as described in figure 2.
The application module stored in the computing device is capable of capturing and storing the information discovered from the nodes and would be available in the form of recommendations that can be tweaked/customized such that it gives users more control and the ability to override/refme the recommendations provided. The method of the present invention is applicable to all IoT devices having an operating system (OS). Alternatively, the method can be applied to devices that do not have operating systems with a required hardware component.
The programming instructions can be, for example, computer-executable and/or logic implemented instructions. In some examples, a computing device is configured to provide various operations, functions, or actions in response to the programming instructions conveyed to the computing device by one or more of the computer-readable medium, the computer recordable medium, and/or the communications medium. The non-transitory computer-readable medium can also be distributed among multiple data storage elements, which could be remotely located from each other. The computing device that executes some or all of the stored instructions can be a microfabrication controller or another computing platform. Alternatively, the computing device that executes some or all of the stored instructions could be a remotely located computer system, such as a server.
Further, while one or more operations have been described as being performed by or otherwise related to certain modules, devices or entities, the operations may be
performed by or otherwise related to any module, device, or entity. Further, the operations need not be performed in the disclosed order, although in some examples, an order may be preferred. Also, not all functions need to be performed to achieve the desired advantages of the disclosed system and method, and therefore not all functions are required.
Advantages of the invention
1. The system and the method facilitate achievement of the dual goal of security in data extraction and transmission and adoption of evolving standards of data extraction and transmission. 2. The system and the method are cost effective and efficient in operation.
3. The system and the method are independent of the skills and knowledge of the personnel involved in transformation.
4. The system employs an automated process for containerization, which uses pattern recognition that in turn uses machine learning and artificial intelligence. This makes deployment quick, efficient and not dependent on individual user skills and knowledge.
The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the present invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the present invention and its practical application, and to thereby enable others skilled in the art to best utilize the present invention and various embodiments with various modifications as are suited to the particular use contemplated. It is understood that various omissions and substitutions of equivalents are contemplated as circumstances may suggest or render expedient, but such omissions and substitutions are intended to cover the application or
implementation without departing from the scope of the claims of the present invention.
Claims
1. A system for containerization of Internet of Things (IOT) devices (100), the system comprises: a communication module, the communication module is linked to a communication network and facilitate data connectivity with a network server; a computing device, the computing device is communicatively coupled to the communication network, the computing device having, at least one processing unit, the processing unit is communicatively coupled to the communication module, a plurality of input devices and output devices coupled to the processing unit; and a computer-readable storage medium, the storage medium is communicatively coupled to the processing unit and communication module, the storage unit is configured with an application module, wherein the application module upon executed by the processing unit is capable of extracting and containerizing data from the lot devices in the communication devices; wherein the computing device, by means of the application module upon executed by the processing unit, is configured to identify a node group from a plurality of IoT devices in a communication network, receive and process data therefrom and create containers for each of the plurality of IoT devices in the communication network.
2. The system as claimed in claim 1, the computing device includes general purpose as well as special purpose data processing devices.
3. The system as claimed in claim 1, the communication module is configured to connect the computing device with a cloud network.
4. The system as claimed in claim 1, the storage medium is a computer- readable medium implemented using devices such as a single computer system, or multiple computer systems distributed across a communication network that is communicatively linked through the network allowing it to be operated in a coordinated manner.
5. The system as claimed in claim 1, the storage medium is a device selected from magnetic, optical, flash data storage devices and like.
6. The system as claimed in claim 1, the application module is configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module.
7. The system as claimed in claim 1, the pattern recognition module also comprises a database having a training set that is seeded using base model and a machine learning model generated in the pattern recognition module using machine learning techniques.
8. A method for containerization of Internet of Things (IOT) devices, having a communication module linked to a communication network and facilitate data connectivity with a network server; a computing device, communicatively coupled to the communication network, the computing device having, at least one processing unit communicatively coupled to the communication module, a plurality of input devices and output devices and a computer-readable storage medium, wherein the storage medium is configured with an application module configured with a pattern recognition module having a monitoring module, a training module, a feature recognition module, and a feedback module, that upon executed by the processing unit is capable of extracting and containerizing the lot devices in the communication network, the method comprises processing unit implemented steps of: identifying, by the processing unit, the node group of a plurality of IoT devices distributed in the communication network;
locating by the processing unit, the node groups of a plurality of IoT devices distributed in the communication network and initiates communication therewith; attaching by the processing unit, a respective probe to the located IoT device that runs an application to be containerized; receiving, by the processing unit, data from the IoT device and process them to remove the probes attached for identification of the sender; analyzing, by the processing unit, the received data according to machine learning algorithm stored therein; creating, by the processing unit, containers for IoT devices based on the analyzed data, wherein the containers thus created for IoT devices are deployed using a common control plane that has the ability to connect to IoT devices and is capable of running the containers; creating, by the processing unit, a blueprint of the containers for IoT devices, wherein the blueprint is created in such a way that the data layer/plane is secured end to end using security techniques that will ensure no data is exposed during transmission from the IoT devices.
9. The method as claimed in claim 8, wherein the analysis includes, pattern recognition procedures (250) based on machine-learning algorithm, the pattern recognition procedures (250) include, finding the application corresponding to the lot devices under observation and verifies the discovered information by the processing unit; classifying and cleaning the data received from a monitoring module of the pattern recognition module configured therein; analyzing, by the processing unit, the cleaned data and determine patterns and anti-patterns therein;
detecting, by the processing unit, new applications/new application postures of IoT devices; generating, by the processing unit, a statistical model from the identified patterns along with old patterns; detecting, by the processing unit, new applications of the IoT devices in the communication network; applying, by the processing unit, machine learning algorithm on an updated data point and coding the data points into an application container.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN202021043718 | 2021-04-07 | ||
IN202021043718 | 2021-04-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022215086A1 true WO2022215086A1 (en) | 2022-10-13 |
Family
ID=83546661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IN2022/050336 WO2022215086A1 (en) | 2021-04-07 | 2022-04-07 | System and method for containerization of internet of things devices |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2022215086A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170099176A1 (en) * | 2015-09-22 | 2017-04-06 | Mobile Iron, Inc. | Containerized architecture to manage internet-connected devices |
US20180285234A1 (en) * | 2017-03-31 | 2018-10-04 | Commvault Systems, Inc. | Management of internet of things devices |
US20190014048A1 (en) * | 2017-07-05 | 2019-01-10 | Wipro Limited | Method and system for processing data in an internet of things (iot) environment |
-
2022
- 2022-04-07 WO PCT/IN2022/050336 patent/WO2022215086A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170099176A1 (en) * | 2015-09-22 | 2017-04-06 | Mobile Iron, Inc. | Containerized architecture to manage internet-connected devices |
US20180285234A1 (en) * | 2017-03-31 | 2018-10-04 | Commvault Systems, Inc. | Management of internet of things devices |
US20190014048A1 (en) * | 2017-07-05 | 2019-01-10 | Wipro Limited | Method and system for processing data in an internet of things (iot) environment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jagatheesaperumal et al. | The duo of artificial intelligence and big data for industry 4.0: Applications, techniques, challenges, and future research directions | |
EP3720051B1 (en) | Anomaly detection and troubleshooting system for a network using machine learning and/or artificial intelligence | |
JP6983328B2 (en) | Features Unsupervised cross-domain distance metric adaptation by forwarding network | |
US11113397B2 (en) | Detection of malicious executable files using hierarchical models | |
US20210359901A1 (en) | Data driven systems and methods to isolate network faults | |
US11443230B2 (en) | Intrusion detection model for an internet-of-things operations environment | |
WO2020256732A1 (en) | Domain adaptation and fusion using task-irrelevant paired data in sequential form | |
CN112711603B (en) | Cloud-based workpiece detection method and system and computer-readable storage medium | |
US11611488B2 (en) | AI machine learning technology based fault management system for network equpment that supports SDN open flow protocol | |
US11121952B2 (en) | Device health assessment data summarization using machine learning | |
EP3751486A1 (en) | Electronic label management apparatus and method | |
Mai et al. | Deep learning to predict the feasibility of priority-based Ethernet network configurations | |
Mozo et al. | B5GEMINI: Digital twin network for 5G and beyond | |
CN114615088A (en) | Terminal service flow abnormity detection model establishing method and abnormity detection method | |
WO2022215086A1 (en) | System and method for containerization of internet of things devices | |
CN116926241B (en) | Immune cell culture control method and system | |
Strufe et al. | Design of a 5G Ready and Reliable Architecture for the Smart Factory of the Future | |
US20230409983A1 (en) | Customizable federated learning | |
CN105429825B (en) | Monitoring method and device for data flow system | |
US11765179B2 (en) | Modifying network relationships using a heterogenous network flows graph | |
US11961099B2 (en) | Utilizing machine learning for optimization of planning and value realization for private networks | |
CN114342321B (en) | Communication control device and system | |
CN114266723A (en) | Image processing method, image processing device, storage medium and computer terminal | |
Scholze et al. | Reliable self-learning production systems based on context aware services | |
Ganesh et al. | The Industry 4.0 for Secure and Smarter Manufacturing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22784285 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22784285 Country of ref document: EP Kind code of ref document: A1 |