Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted system suitable for sensing computing layer of industrial Internet of Things

An industrial Internet of Things and computing layer technology, applied in the field of Internet of Things, can solve problems such as high computing pressure at the receiving end, difficulty in ensuring transmission security, and information security issues, and achieve the effects of improving computing efficiency, increasing the difficulty of cracking, and using it safely

Pending Publication Date: 2022-03-01
ZHENGZHOU NORMAL UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The Internet of Things uses various sensors as sensing terminals to collect information, and then transmit and process it. The large-scale thing-to-thing connection network has a large number of scattered sensing nodes, which are easy to become the attack target of information data and bring a lot of information. safe question
At present, the credible way of IoT sensory computing mostly adopts encryption algorithm to encrypt and transmit the collected data. However, due to the large number of sensory nodes and their dispersal, when the encryption algorithm is more complex, a large amount of real-time data will make the calculation pressure of the receiving end greater, and The general encryption algorithm is easy to be cracked, and it is difficult to guarantee the security of transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted system suitable for sensing computing layer of industrial Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] Such as figure 1 As shown, a trusted system suitable for the perception computing layer of the Industrial Internet of Things, including a cache unit configured as a connection association unit for temporary pre-existing detection information; a policy library configured as a connection association unit for storing association policies The association unit is configured to connect the acquisition end, the policy library and the cache unit, and is used to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted system suitable for an industrial Internet of Things sensing computing layer, comprising a cache unit configured to be connected with an association unit and used for temporarily storing pre-detection information; the strategy library is configured to be connected with the association unit and used for storing association strategies; the association unit is configured to be connected with the acquisition end, the strategy library and the cache unit, and is used for receiving the post-detection information of the acquisition end, associating the pre-cached pre-detection information and the newly detected post-detection information into transmission information according to an association strategy of the strategy library, and transmitting the transmission information to the acquisition end; and caching the later detection information as the previous detection information of the next group of detection information. According to the invention, the prior detection information and the later detection information are associated into the transmission information to be sent, so that the prior received detection information can be verified, the cracking difficulty in the transmission process can be improved, the operation efficiency of the receiving end can be improved, and the method has the advantages of safety in use and high credibility.

Description

technical field [0001] The invention relates to the field of the Internet of Things, in particular to a trusted system suitable for the perception computing layer of the Industrial Internet of Things. Background technique [0002] The Industrial Internet of Things is to continuously integrate various acquisition and control sensors or controllers with perception and monitoring capabilities, as well as mobile communication, intelligent analysis and other technologies into all aspects of the industrial production process, thereby greatly improving manufacturing efficiency, improving product quality, and reducing product quality. Cost and resource consumption, and finally realize the upgrading of traditional industries to a new stage of intelligence. In terms of application form, the application of industrial Internet of Things has the characteristics of real-time, automation, embedded (software), security, and information interoperability and interconnection. [0003] The Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/0631
CPCH04L63/1441H04L63/1466H04L63/1416H04L41/0631
Inventor 崔驰杨艳艳贾志娟
Owner ZHENGZHOU NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products