Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Analytic method for multi-root peer-to-peer identity of internet of things

A technology of IoT identification and analysis methods, applied in user identity/authority verification, data exchange through path configuration, electrical components, etc., can solve the problem of equality, intercommunication and information sharing without the basic resource services of the Internet of Things, and the independence of item analysis cannot be guaranteed. rights, failure to achieve peer-to-peer analysis, etc., to achieve the effect of ensuring legitimacy and security, improving single point of failure, and maintaining political authority

Active Publication Date: 2013-08-14
COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this mapping table is centrally controlled by the GS1 Global Office, so the message forwarding rules between peer root nodes still depend on a single organization, which does not achieve peer-to-peer resolution in the true sense
[0009] It can be seen that none of the existing peer-to-peer resolution technical solutions can effectively improve the problem of single-root control on the basis of the existing ONS / DNS, cannot guarantee the independence and autonomy of item resolution between countries and different resolution agencies, and have not truly realized the foundation of the Internet of Things Resource service equal interoperability and information sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Analytic method for multi-root peer-to-peer identity of internet of things
  • Analytic method for multi-root peer-to-peer identity of internet of things
  • Analytic method for multi-root peer-to-peer identity of internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following describes the present invention in detail through specific embodiments and accompanying drawings.

[0036] The Internet of Things identification peer-to-peer analysis architecture proposed in the present invention transforms a single root node into multiple peer root nodes with equal status, consistent functions, and mutual cooperation at the top level of the analysis system. These root nodes are respectively managed and controlled by the corresponding country or organization, and jointly process item object identification query requests on the basis of ensuring that each root node has the resolution autonomy. The specific implementation content is described below.

[0037] 1. System Architecture

[0038] 1) As attached figure 1 As shown, the client that initiates the Internet of Things identification resolution request is the resolver, which is responsible for receiving RFID encoding and other object identifications and converting them into FQDN (Fully Qualifie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an analytic method for multi-root peer-to-peer identity of internet of things, which comprises the steps that peer-to-peer authorization files are established and stored into analytic root nodes, and each analytic root node edits a DNAME record in a root area space according to the corresponding peer-to-peer authorization file; a client side acquires the object identity code of an item, converts the object identity code of the item into a URI in a standard FQDN form and sends an item object identity code query message to a local analytic root node NX; the NX extracts a country code from the message, and forwards the message to a root node NY having the right to analyze the message according to the DNAME record; the NY carries out layer-by-layer analysis based on a DNS (domain name system) until a certain authoritative server feeds back a name authority pointer record containing an information server address; and finally, the client side is communicated with a corresponding information server to acquire the detailed attribute information of the item. The analytic method can overcome the defect of single point failure existing in the existing analytic system and improve the query efficiency of the object identity of the item.

Description

Technical field [0001] The invention belongs to the technical field of the Internet of Things. Aiming at the safety and performance problems of the single-root service in the existing Internet of Things identity analysis service, an Internet of Things identity analysis method that satisfies multiple roots is proposed. Background technique [0002] With the maturity of information collection, storage, transmission, and processing technologies, the Internet of Things has gradually become an important development trend at present and in the future. The Internet of Things generally refers to the use of information sensing devices and wireless communication technology to construct a network covering all things in the world on the basis of the Internet to realize the intelligent identification of items and the interconnection and sharing of item information. [0003] Every IoT resource has a unique name to identify it. This kind of identification includes not only object identification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/12H04L9/32H04L12/28
CPCH04L61/4552H04L2101/30H04L61/4511
Inventor 李馨迟田野孔宁刘阳王妍
Owner COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products