Internet of Things operating system and method based on MQTT

An operating method and operating system technology, which is applied in the field of MQTT-based IoT operating systems, and can solve problems such as undefined communication methods for IoT devices.

Pending Publication Date: 2022-07-29
杭州指令集智能科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The MQTT protocol is an application layer protocol of the Internet of Things, which realizes data interaction between devices, but how the Internet of Things devices use the MQTT protocol to communicate with the Internet of Things operating system is still undefined

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things operating system and method based on MQTT
  • Internet of Things operating system and method based on MQTT
  • Internet of Things operating system and method based on MQTT

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] This embodiment provides an MQTT-based IoT operation method, including the following steps:

[0036] S1 publisher device initialization, configuring device identity authentication information and operating system connection information;

[0037] S2 obtains the authentication information from the IoT operating system and performs MQTT authentication. If the authentication fails, the access is rejected and returns to S1; if the authentication is successful, it enters S3;

[0038] S3 judges whether the authentication passed information is the first authentication, if so, the device is activated, if not, it goes to S4;

[0039] S4 is connected to the proxy server by MQTT to realize the device online, and online keep alive through the keep alive logic of MQTT, and then carry out data interaction.

[0040] In this embodiment, after the device is initialized and configured, if the authentication is not successful and the authentication is not passed for the first time, the de...

Embodiment 2

[0045] On the basis of Embodiment 1, this embodiment is further refined, as follows:

[0046] There are three roles in the MQTT protocol in this embodiment: a proxy server, a publisher, and a subscriber. In iSysCoreOS, the device is both a publisher and a subscriber of messages. MQTT sends data upward to iSysCoreOS (proxy server) through the "upstream topic", that is, the device (publisher); and then through the "downstream topic", that is, iSysCoreOS (proxy server) sends data to each subscription that subscribes to the "Topic" , including the device.

[0047] Topic in this embodiment is a transmission medium for devices to publish (Pub) and subscribe (Sub) messages.

[0048] In this embodiment, the upstream topic format is up / dev / {pk} / {devId};

[0049] In this embodiment, the downlink topic format is down / dev / {pk} / {devId};

[0050] In the topic format of this embodiment, the upstream up / dev and downstream down / dev of the first and second levels of the topic are the prefix...

Embodiment 3

[0056]On the basis of Embodiment 1, in this embodiment, in the IoT operating system, different types of states are defined for each device according to the characteristics of the MQTT protocol itself, which are activated state and online state respectively. figure 1 shown.

[0057] The inactive state in the activation state in this embodiment means that after the device is created and has not been authenticated successfully, the default is the inactive state.

[0058] The activation state in the activation state of this embodiment is that the device authentication is performed by authority authentication through the connection parameters (username, password) of MQTT. Therefore, as long as the MQTT connection is successful, the device passes the authentication. Passing the authentication means that the platform activates the device, the device and the system. Data can only be transmitted, and the activation state of the device is irreversible.

[0059] The online status of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of Internet of Things, in particular to an Internet of Things operating system and method based on MQTT, and the method comprises the following steps: initializing publisher equipment, and configuring equipment identity authentication information and operating system connection information; the method comprises the following steps: acquiring authentication information by an Internet of Things operating system, performing MQTT authentication, judging whether authentication passing information is first authentication or not, if so, activating equipment, and if not, connecting the MQTT with a proxy server to realize online equipment, and performing online keep-alive through keepalive logic of the MQTT so as to perform data interaction. According to the invention, a computer tool of an MQTT client is used to send test data in accordance with an iLink protocol for debugging; when an engineer at the equipment end writes a code for the single-chip microcomputer, the test data conforming to the iLink protocol is directly organized, so that the test data can be issued without depending on an operating system of the Internet of Things, the equipment authentication and equipment online functions are automatically completed, the equipment access difficulty of the operating system is reduced, and the equipment access specification is unified.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an MQTT-based Internet of Things operating system and method. Background technique [0002] The MQTT protocol is an application layer protocol of the Internet of Things, which realizes data interaction between devices, but how the Internet of Things devices communicate with the Internet of Things operating system using the MQTT protocol is still undefined. [0003] The iLink protocol is a data communication method based on the MQTT protocol designed for the field of IoT operating systems. The data format is JSON, which is used for two-way communication between the device and the IoT operating system. [0004] The iLink protocol utilizes the characteristics of MQTT itself to automatically complete device authentication and device online functions, reduce the difficulty of operating system access to devices, and unify device access specifications. [0005] The exist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/12
CPCH04L67/12H04L63/08H04L63/10H04L63/0884
Inventor 宋杨叶运生花京武
Owner 杭州指令集智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products