Internet-of-things equipment identity recognition method, system, equipment and computer readable medium

An Internet of Things device and identification technology, which is applied in the direction of instruments, safety devices, electrical components, etc., can solve the problems of increasing application software duplication costs, inconsistent matching, easy loss of identity coding information, etc. Inheritance and consistency, the effect of improving management efficiency

Active Publication Date: 2021-11-16
HUAZHI RICE BIO TECH CO LTD
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As long as the node device obtains the server address from the user, it can exchange information with the data center. This method causes the data center to passively receive invalid data or even illegal data; more seriously, it may even download core data and confidential data from the server in an unauthorized way. , resulting in information security incidents
[0007] 2) The unique management method of node device identity code is complex
In order to ensure the uniqueness of the identity codes of massive node devices in the data center, it is necessary to continuously perform back-end processing through manual maintenance during use, which is inefficient, poor in inheritance, prone to errors and leads to repeated codes, resulting in loss and confusion of data calls
[0008] 3) The physical addresses in the network are not uniformly planned
With the increase of node devices, due to the lack of unified management, it is easy to cause Ethernet MAC address conflicts,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-things equipment identity recognition method, system, equipment and computer readable medium
  • Internet-of-things equipment identity recognition method, system, equipment and computer readable medium
  • Internet-of-things equipment identity recognition method, system, equipment and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] When used in the factory (such as image 3 shown), the identification and management of IoT devices in the factory are as follows:

[0095] When the device is assembled in the factory and enters debugging, the debugging software reads the ID data of the FLASH chip inside the IoT device. Based on the default MAC address and fixed IP address, the device activates 4G communication through the SIM card and sends the ID data to the data center. Server, the server generates the private key and ciphertext; and generates the device ID number of 1, 2, ..., n according to the order received; generates the MAC address reserved field data according to the random algorithm. The server packs these three types of information into overall data and sends it back to the IoT device. The IoT device forms a new complete MAC address according to the reserved field data configuration, and stores the device ID and ciphertext data in the FLASH chip. After the debugger completes the above steps...

Embodiment 2

[0098] When used in the field of application (such as Figure 4 shown), the identification and management of IoT devices on the application site are as follows:

[0099] When the IoT device is put into use on site, the application software will also read the FLASH chip ID data inside the device, combine the AES algorithm and private key to generate ciphertext, and compare it with the pre-stored ciphertext. If the comparison passes, it will be determined as a device efficient. If the device is valid, send the ciphertext and device ID to the central server to apply for communication access. The server queries the corresponding ciphertext according to the received device ID, and compares it with the received ciphertext. If the comparison is successful, the communication is allowed. After admission, IoT devices can transmit application data to the data center through established channels.

[0100] After the IoT device is used on site, the device automatically connects to the Be...

Embodiment 3

[0103] When used during the maintenance phase (such as Figure 5 shown), the identification and management of IoT devices in the maintenance phase are as follows:

[0104] During the use of the IoT device, when the device fails due to random hardware failure and is returned to the factory for repair, the identity information of the device needs to be maintained simultaneously. First of all, it is necessary to check whether the FLASH chip is damaged, and if it is damaged, update the FLASH. Use the device ID information backed up in EEPROM to find the identity data of the device in the data center server, update the ciphertext and re-apply for device access according to the new FLASH chip ID, and keep other information unchanged. If the EEPROM is faulty, the identity information stored in the FLASH needs to be backed up again in the replaced EEPROM.

[0105] Compared with the prior art, the IoT device identification method of the present invention has the following advantages ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Internet-of-things equipment identity recognition method, a system, equipment and a computer readable medium. The method comprises the following steps: acquiring chip ID data in the Internet-of-things equipment in real time; generating a public key, a private key and ciphertext data according to the acquired chip ID data; sending the private key and the ciphertext data back to the Internet-of-things equipment, the Internet-of-things equipment forms a new complete MAC address according to reserved field data configuration, and storing the Internet-of-things equipment ID and the ciphertext data in a chip; and obtaining verification information of the Internet-of-things equipment in real time, querying the Internet-of-things equipment ID and the ciphertext data stored in the corresponding chip according to the verification information of the Internet-of-things equipment, comparing the Internet-of-things equipment ID and the ciphertext data with the received ciphertext, and if the comparison succeeds, judging that the equipment registration succeeds. The method is suitable for users to collect and control the states of various agricultural objects in digital agriculture, is also suitable for equipment suppliers to self-network to form a large database, and provides a data analysis and processing platform for various application software developers or users.

Description

technical field [0001] The present invention relates to the technical field of identification of agricultural Internet of Things equipment, in particular to a method, system, equipment and computer-readable medium for identification of Internet of Things equipment. Background technique [0002] With the rapid development of digital agriculture, various solutions for crop seed storage, real-time monitoring and control of crop growth, and traceability management solutions for agricultural products all use the Internet of Things to integrate different types, regions, and stages through node devices. The information is analyzed and processed centrally. These IoT devices will exchange data with the central server in a wireless manner. [0003] At present, digital agriculture solutions are more and more integrated, and more and more node devices need to be managed at the same time; users hope to connect nodes and LANs in different periods to a unified data center; they also hope ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/041H04W12/06H04W12/71G16Y10/05G16Y20/40G16Y40/20G16Y40/30G16Y40/50
CPCH04W12/041H04W12/06H04W12/71G16Y10/05G16Y20/40G16Y40/20G16Y40/30G16Y40/50
Inventor 龙晓波
Owner HUAZHI RICE BIO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products