Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things terminal access monitoring method, computer program and storage medium

An Internet of Things terminal and Internet of Things technology, applied in the field of Internet of Things, can solve problems such as personal privacy exposure and personal information security problems

Active Publication Date: 2022-08-09
深圳市百佳华网络科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

RFID is another key implementation technology, which is to put electronic tags into items in advance to achieve real-time monitoring. This will inevitably cause some personal privacy exposure for some tagged item owners, and there are problems with the security of personal information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things terminal access monitoring method, computer program and storage medium
  • Internet of Things terminal access monitoring method, computer program and storage medium
  • Internet of Things terminal access monitoring method, computer program and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] like figure 1 As shown, the Internet of Things terminal accesses the monitoring method, and the method performs the following steps:

[0029] Step 1: Perform a first classification of entities in the Internet of Things according to their location distribution, the entities include: Internet of Things terminal equipment, Internet of Things sensing equipment, Internet of Things data processing equipment, and Internet of Things routing equipment; the first classification Including: taking the IoT routing device as the center point, constructing a circular domain with a set radius, and dividing all entities covered in the circular domain into same-domain entity groups;

[0030] Step 2: Set a weight value for each entity according to the level of authority of the entity. The entity with higher authority has a higher corresponding weight value;

[0031] Step 3: Perform a second classification on the same-domain entity group divided after the first classification according to...

Embodiment 2

[0036] On the basis of the previous embodiment, in step 3, the method for identifying the features of other entities in the same-domain entity group by the IoT routing device includes: a list of legal entity information preset in the IoT routing device; the IoT routing device The routing device is used to control the security of the Internet of Things routing device connected to it, and the list of legal entity information includes the unique identification of the entity that is allowed to access; when the Internet of Things routing device monitors the access of the entity, the calculation The unique identification of the entity; the unique identification is sent to the Internet of Things routing device, and the Internet of Things routing device determines whether the unique identification exists in the list of legal entity information, and if so, allows the entity the access of the entity; if not, the access of the entity is rejected; when the Internet of Things routing device...

Embodiment 3

[0039] On the basis of the previous embodiment, if the operation of writing the feature identifier into the entity fails, the information about the failure of the writing operation is sent to the Internet of Things routing device; the Internet of Things routing device according to the writing If the entry operation fails, the entity's access is denied.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of the Internet of Things, and in particular relates to a terminal access monitoring method for the Internet of Things, a computer program and a storage medium. The method executes the following steps: Step 1: Perform a first classification of the entities in the Internet of Things according to their location distribution, so that the The entities mentioned above include: IoT terminal devices, IoT sensing devices, IoT data processing devices, and IoT routing devices; it realizes multi-level management of IoT by classifying all devices in IoT twice. Access control of features and identities in the same-domain entity group to ensure that the access devices are legal and compliant. Between different levels of the same-domain entity group, the monitoring server is used to monitor sensitive behavior and sensitive content to ensure that the The compliance and legality of devices connected to the Internet during operation improves the overall security of the physical network and improves the management efficiency of IoT access.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and in particular relates to a terminal access monitoring method, a computer program and a storage medium of the Internet of Things. Background technique [0002] The Internet of Things (IOT) refers to the real-time collection of any information that needs to be monitored, connected, and interacted through various devices and technologies such as information sensors, radio frequency identification technology, global positioning systems, infrared sensors, and laser scanners. An object or process collects various required information such as sound, light, heat, electricity, mechanics, chemistry, biology, location, etc., and realizes the ubiquitous connection between objects and objects and between objects and people through various possible network access. Realize intelligent perception, identification and management of items and processes. The Internet of Things is an information c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G16Y30/10
CPCH04L63/10H04L63/08H04L63/1425G16Y30/10Y02D30/70
Inventor 庄小雄
Owner 深圳市百佳华网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products