A Perceptual Layer Data Fidelity Method for Local Internet of Things
A technology for perceiving data and local objects, which is applied in the field of data fidelity of the perception layer for the local Internet of Things, and can solve the problems that verification information is easily changed by a third party, and identity verification results are tampered with.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] according to figure 1 As shown, this embodiment provides a data fidelity method of the perception layer for the local Internet of Things. This fidelity method includes:
[0040] A trusted execution environment processor 200 is set between the sensing node 100 and the gateway 300 in the local Internet of Things. In the prior art, the verification of the sensing node 100 is carried out in an open environment. Although the identity of the sensing node 100 can be identified, the verification method has untrustworthy risks such as tampering and intrusion. Therefore, authentication of the sensing node 100 in an open environment may easily cause illegal sensing data to flow in the network together with normal sensing data. Specifically, first, this will increase the risk of illegal sensing data tampering with normal sensing data and cause normal sensing data to be distorted; The difficulty increases significantly as the number of sensing nodes 100 increases; thirdly, the se...
Embodiment 2
[0060] This embodiment may be a further improvement and / or replacement of Embodiment 1, and repeated content will not be repeated here. This embodiment discloses that the whole and / or part of the preferred implementation manners of other embodiments may be used as a supplement to this embodiment under the condition that no conflict or contradiction is caused.
[0061] Such as image 3 As shown, preferably, the trusted execution environment processor 200 identifies at least two sensing nodes 100 requesting access in the specified local area network, and allows the sensing data collected by the sensing nodes 100 after successful identification verification to be transmitted. To the fog end FC and / or after being preprocessed by the fog end FC, it is transmitted to the cloud CC. 1. Set up a trusted execution environment processor 200 between the fog end FC and the cloud CC. On the premise that the credibility of the data generated in the local area Internet of Things has been ens...
Embodiment 3
[0063] This embodiment discloses a system for performing the relevant steps and methods in Embodiment 1 and / or 2.
[0064] A kind of perceptual layer data fidelity system oriented to the local Internet of Things in this embodiment, such as figure 1 shown. A trusted execution environment processor is set between the sensing node and the gateway in the local Internet of Things. The trusted execution environment processor is configured to extract the identity attribute set of the sensing node before the sensing node accesses the gateway, and based on the identity attribute The set identifies the identity of the sensing node, so that the trusted execution environment processor can be used to intercept the risk sensing node with suspected identity before the sensing data collected by the sensing node passes through the gateway.
[0065] Preferably, the trusted execution environment processor composes at least one identity attribute element of the sensing node into an identity attr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com