IoT device identification method, system, device and computer readable medium

An IoT device and identification technology, applied in instruments, electrical components, safety devices, etc., can solve the problems of inconsistent matching, increased application software repetitive overhead, easy loss of identity code information, etc., to achieve good inheritance and consistency , Save repetitive resource overhead and improve management efficiency

Active Publication Date: 2022-03-04
HUAZHI RICE BIO TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As long as the node device obtains the server address from the user, it can exchange information with the data center. This method causes the data center to passively receive invalid data or even illegal data; more seriously, it may even download core data and confidential data from the server in an unauthorized way. , resulting in information security incidents
[0007] 2) The unique management method of node device identity code is complex
In order to ensure the uniqueness of the identity codes of massive node devices in the data center, it is necessary to continuously perform back-end processing through manual maintenance during use, which is inefficient, poor in inheritance, prone to errors and leads to repeated codes, resulting in loss and confusion of data calls
[0008] 3) The physical addresses in the network are not uniformly planned
With the increase of node devices, due to the lack of unified management, it is easy to cause Ethernet MAC address conflicts, resulting in communication loss or congestion
[0009] 4) The identification information and inherent feature information of IoT devices are not bound for management
However, in the current system, only the manually defined device number is used as the identity information, and the identity information related to other devices is transferred to the application layer, which is reorganized, summarized and matched by the application software, which not only increases the repeated overhead of the application software , it is also easy to cause the loss, error or inconsistent matching of these binding information, which directly affects the application analysis
[0010] 5) It is easy to lose the identity code information when the equipment is repaired due to failure
If an IoT device breaks down and enters for repair, if the fault point is the identity information storage chip, the original manually set identity code will be lost directly; Identity code information lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT device identification method, system, device and computer readable medium
  • IoT device identification method, system, device and computer readable medium
  • IoT device identification method, system, device and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] When used in the factory (such as image 3 shown), the identification and management of IoT devices in the factory are as follows:

[0095] When the device is assembled in the factory and enters debugging, the debugging software reads the ID data of the FLASH chip inside the IoT device. Based on the default MAC address and fixed IP address, the device activates 4G communication through the SIM card and sends the ID data to the data center. Server, the server generates the private key and ciphertext; and generates the device ID number of 1, 2, ..., n according to the order received; generates the MAC address reserved field data according to the random algorithm. The server packs these three types of information into overall data and sends it back to the IoT device. The IoT device forms a new complete MAC address according to the reserved field data configuration, and stores the device ID and ciphertext data in the FLASH chip. After the debugger completes the above steps...

Embodiment 2

[0098] When used in the field of application (such as Figure 4 shown), the identification and management of IoT devices on the application site are as follows:

[0099] When the IoT device is put into use on site, the application software will also read the FLASH chip ID data inside the device, combine the AES algorithm and private key to generate ciphertext, and compare it with the pre-stored ciphertext. If the comparison passes, it will be determined as a device efficient. If the device is valid, send the ciphertext and device ID to the central server to apply for communication access. The server queries the corresponding ciphertext according to the received device ID, and compares it with the received ciphertext. If the comparison is successful, the communication is allowed. After admission, IoT devices can transmit application data to the data center through established channels.

[0100] After the IoT device is used on site, the device automatically connects to the Be...

Embodiment 3

[0103] When used during the maintenance phase (such as Figure 5 shown), the identification and management of IoT devices in the maintenance phase are as follows:

[0104] During the use of the IoT device, when the device fails due to random hardware failure and is returned to the factory for repair, the identity information of the device needs to be maintained simultaneously. First of all, it is necessary to check whether the FLASH chip is damaged, and if it is damaged, update the FLASH. Use the device ID information backed up in EEPROM to find the identity data of the device in the data center server, update the ciphertext and re-apply for device access according to the new FLASH chip ID, and keep other information unchanged. If the EEPROM is faulty, the identity information stored in the FLASH needs to be backed up again in the replaced EEPROM.

[0105] Compared with the prior art, the IoT device identification method of the present invention has the following advantages ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a method, system, equipment and computer-readable medium for identifying an Internet of Things device. The method includes the following steps: acquiring chip ID data inside the Internet of Things device in real time; generating a public key, a private key and a private key according to the acquired chip ID data Ciphertext data; send the private key and ciphertext data back to the IoT device, the IoT device forms a new complete MAC address according to the reserved field data configuration, and stores the IoT device ID and ciphertext data in the chip; obtains the IoT device in real time The verification information of the device, according to the verification information of the IoT device, query the IoT device ID and ciphertext data stored in the corresponding chip, and compare it with the received ciphertext. If the comparison is successful, it is determined that the device registration is successful. The invention is suitable for users' state collection and control of various agricultural objects in digital agriculture, and also for equipment suppliers to form a large database through self-organization, providing data analysis and processing platforms for various application software developers or users.

Description

technical field [0001] The present invention relates to the technical field of identification of agricultural Internet of Things equipment, in particular to a method, system, equipment and computer-readable medium for identification of Internet of Things equipment. Background technique [0002] With the rapid development of digital agriculture, various solutions for crop seed storage, real-time monitoring and control of crop growth, and traceability management solutions for agricultural products all use the Internet of Things to integrate different types, regions, and stages through node devices. The information is analyzed and processed centrally. These IoT devices will exchange data with the central server in a wireless manner. [0003] At present, digital agriculture solutions are more and more integrated, and more and more node devices need to be managed at the same time; users hope to connect nodes and LANs in different periods to a unified data center; they also hope ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/041H04W12/06H04W12/71G16Y10/05G16Y20/40G16Y40/20G16Y40/30G16Y40/50
CPCH04W12/041H04W12/06H04W12/71G16Y10/05G16Y20/40G16Y40/20G16Y40/30G16Y40/50
Inventor 龙晓波
Owner HUAZHI RICE BIO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products