Internet-of-Things platform software authorization control system and method based on multistage deployment

An IoT platform and software authorization technology, applied in the field of IoT authorization, can solve the problems of uncontrollable technical difficulty and reliability, increased operation and maintenance costs, and insufficient flexibility, so as to reduce operation and maintenance costs, improve availability, and improve security. sexual effect

Active Publication Date: 2021-10-19
北京飞利信电子技术有限公司
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] First of all, the premise of using the authorization code to independently authorize the terminal is that the unique identification of the terminal can be accurately obtained. With the popularization of cloud computing and virtual technology, the acquisition of the unique identification of the terminal needs to rely on the support of third-party middleware, and this method is technically difficult. and uncontrollable reliability
[0008] Secondly, traditional software authorization is more dependent on obtaining the information identification of the running device, such as hard disk serial number, network card MAC address, etc., but with the upgrading of hardware technology, one server can install multiple hard disks, and, with the virtual machine software and With the maturity and popularization of cloud service technology, it has become very difficult to obtain the unique identification of the device or ensure the uniqueness and non-tamperability of the software operating environment
[0009] Furthermore, with changes in user business volume and network structure, when system terminals and their software functions are added or replaced, additional authorization configurations are required, which is insufficient in flexibility and increases operation and maintenance costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-Things platform software authorization control system and method based on multistage deployment
  • Internet-of-Things platform software authorization control system and method based on multistage deployment
  • Internet-of-Things platform software authorization control system and method based on multistage deployment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, this embodiment provides a method for controlling software authorization of the Internet of Things platform based on multi-level deployment. This method is applicable to the software authorization of the Internet of Things platform to the operating unit. Run an authenticated control node.

[0032] In this embodiment, the operating unit is the minimum form of IoT platform software deployment, and one or more operating units can be deployed according to the business volume and network structure. Each operating unit works relatively independently and provides services, and the operation of the entire IoT platform will not be affected by the failure of individual operating units.

[0033] Specifically, such as figure 2 As shown, the engineer uses the Internet of Things platform to authorize the software of the operating unit, which is completed by the cooperation of the authorization management node on the Internet of Things platform and the au...

Embodiment 2

[0080] On the basis of the above embodiments, this embodiment also provides a software authorization control system for the Internet of Things platform based on multi-level deployment. The system includes an Internet of Things platform and at least one operating unit, and an authorization management node runs on the Internet of Things platform. , an authentication control node runs on the operation unit, and the authorization management node and the authentication control node authorize the operation unit through the Internet of Things platform software authorization control method based on multi-level deployment as in the above embodiment.

[0081] In this embodiment, the operation unit also provides the following services during the authorization control process of the IoT platform software: controlled business services, monitoring and listening services, and master control configuration services.

[0082] Controlled business services, providing specific data access, calculat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet-of-Things platform software authorization control system and method based on multistage deployment, and the method comprises the steps: an authorization management node inserts a special character according to authorization information, generates an identification code of an Internet of Things platform, and converts the identification code into an identification code ciphertext; the authentication control node decodes the received identification code ciphertext, inserts a special character according to a decoding result and analysis time, generates an application code and converts the application code into an application code ciphertext; the authorization management node analyzes and verifies the received application code ciphertext, when the application code ciphertext is legal, a special character is inserted, an authorization code is generated and encrypted according to an analysis result and authorization information, and an authorization code ciphertext is generated; and the authentication control node analyzes and verifies the received authorization code ciphertext, and authorizes the operation unit according to the authorization information at the moment. According to the technical scheme, the flexibility of authorization management of the software system is improved, and the technical risk and vulnerability of obtaining the independent identification of the terminal are avoided.

Description

technical field [0001] The present application relates to the technical field of Internet of Things authorization, in particular, to a multi-level deployment-based Internet of Things platform software authorization control system and a multi-level deployment-based Internet of Things platform software authorization control method. Background technique [0002] With the maturity of Internet, cloud computing, wireless communication and other technologies, the informatization and digitalization of the whole society are constantly improving. Traditional collection and monitoring software can no longer meet the strong demand of government enterprises for data integration and value mining. The Internet of Things platform that has emerged in recent years has played a key role in eliminating the phenomenon of data islands and opening up the information flow between the industry and the upstream and downstream of the industrial chain. At the same time, the survival and development of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/121
Inventor 杨振华程华建商毅夫袁浩杰
Owner 北京飞利信电子技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products