CN117527860B - Internet of things communication method, system and medium based on distributed system - Google Patents
Internet of things communication method, system and medium based on distributed system Download PDFInfo
- Publication number
- CN117527860B CN117527860B CN202410016036.2A CN202410016036A CN117527860B CN 117527860 B CN117527860 B CN 117527860B CN 202410016036 A CN202410016036 A CN 202410016036A CN 117527860 B CN117527860 B CN 117527860B
- Authority
- CN
- China
- Prior art keywords
- data
- transmission
- user
- database
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000006854 communication Effects 0.000 title claims abstract description 118
- 238000004891 communication Methods 0.000 title claims abstract description 98
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000011897 real-time detection Methods 0.000 claims abstract description 43
- 230000005540 biological transmission Effects 0.000 claims description 265
- 230000008859 change Effects 0.000 claims description 62
- 230000002159 abnormal effect Effects 0.000 claims description 44
- 238000004458 analytical method Methods 0.000 claims description 26
- 238000010586 diagram Methods 0.000 claims description 12
- 230000005856 abnormality Effects 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 4
- 230000011218 segmentation Effects 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims description 3
- 230000006855 networking Effects 0.000 claims 2
- 238000012544 monitoring process Methods 0.000 description 12
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000002547 anomalous effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000003062 neural network model Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1805—Append-only file systems, e.g. using logs or journals to store data
- G06F16/1815—Journaling file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y10/00—Economic sectors
- G16Y10/75—Information technology; Communication
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/20—Analytics; Diagnosis
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Medical Informatics (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Biomedical Technology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application relates to the technical field of internet of things communication, in particular to an internet of things communication method, system and medium based on a distributed system, wherein the method comprises the following steps: based on a preset agreement, acquiring real-time detection data and equipment data, binding the preset agreement and the real-time detection data according to a time node to obtain log storage data, respectively storing the equipment data and the log storage data into a first database and a second database, analyzing the data request instruction after receiving the data request instruction sent by a user client, obtaining a read data requirement corresponding to the data request instruction, calling the equipment data and the log storage data corresponding to the first database and the second database based on the read data requirement, and sending the real-time detection data and the log history data to the user client. The method and the device improve the drawing efficiency of the user on the real-time running condition of the equipment.
Description
Technical Field
The application relates to the technical field of internet of things communication, in particular to an internet of things communication method, system and medium based on a distributed system.
Background
Distributed systems refer to splitting a system into different services, each of which is responsible for performing a particular function, so that a large system can be split into multiple small, independent services. This helps to decouple the system and allows each service to be extended and upgraded independently. The internet of things refers to connecting any object with a network through information sensing equipment according to a stipulated protocol, and carrying out information exchange and communication on the object through an information transmission medium so as to realize functions of intelligent identification, supervision and the like.
At present, the existing implementation mode of the internet of things is only applied to the internet of things equipment of respective systems. And the method is not applicable to other systems or self-developed internet of things equipment. Therefore, when a user acquires other systems or self-developed Internet of things equipment, the user needs to manually acquire the equipment in the field, so that the drawing efficiency of the user on the real-time running condition of the equipment is reduced.
Disclosure of Invention
In order to solve at least one technical problem, the application provides an internet of things communication method, system and medium based on a distributed system.
In a first aspect, the present application provides a communication method of the internet of things based on a distributed system, which adopts the following technical scheme:
Acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, the preset agreement is a communication protocol corresponding to the different sensors of different equipment when uploading the real-time detection data and acquiring the equipment data, and the equipment data are configuration data of the equipment;
binding the preset agreement and the real-time detection data according to a time node to obtain log storage data;
respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in preset time;
after receiving a data request instruction sent by a user client, analyzing the data request instruction to obtain a read data requirement corresponding to the data request instruction;
and calling corresponding device data and log storage data in the first database and the second database based on the read data requirement, and sending the device data and the log storage data to the user client.
In one possible implementation manner, the sending the device data and log storage data to the user client further includes:
after receiving a data configuration instruction sent by a user client, analyzing the data configuration instruction to obtain data configuration information corresponding to the data configuration instruction;
adjusting and configuring the real-time data of the storage device in the first database based on the data configuration information, and updating the log storage data in the second database according to the configured device data by a time node;
and generating a device configuration instruction based on the configured device data, and controlling the device to adjust according to the configured device data.
In one possible implementation manner, after receiving the data request instruction sent by the user client, the method further includes:
when the user client is monitored to establish connection through a communication protocol, acquiring flow transmission information of the user client in real time;
the traffic transmission information is arranged according to the transmission time node, and a transmission wave diagram of the user client for data transmission is obtained;
Fitting the transmission fluctuation graph and a preset flow transmission graph according to the transmission time nodes, judging whether flow transmission data corresponding to different transmission time nodes are abnormal, if so, acquiring historical flow transmission data, and carrying out data transmission abnormality analysis on the user client based on the historical flow transmission data to obtain abnormal access degree of the user client, wherein the historical flow transmission data are flow transmission data of different types of user clients in data communication;
and comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
In one possible implementation manner, performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an abnormal access degree of the user client, including:
determining the highest traffic transmission rate and the lowest traffic transmission rate of user clients of different models in the data communication process according to the historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission molecules, and taking the time used in the data communication process as a transmission denominator;
Obtaining a transmission rate change value of each data communication process according to the ratio of the transmission numerator to the transmission denominator;
the transmission rate change values are arranged according to a time sequence to obtain a transmission sequence of historical flow transmission data;
obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients with different models in the transmission sequence and the numerical value of each transmission rate;
segmenting the transmission sequences according to all segmentation points, obtaining the similarity of the change value sequences corresponding to every two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, and obtaining two or more transmission data segments;
carrying out anomaly analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in the future preset time, so as to obtain the anomaly degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time;
and obtaining the abnormal access degree of the transmission data segment corresponding to the user client and the transmission time node with abnormal traffic transmission data based on the abnormal degree.
In one possible implementation manner, the performing exception analysis on each change value corresponding to each transmission data segment according to the data security condition that each change value corresponding to each transmission data segment occurs in a future preset time to obtain exception degrees of different change values corresponding to different transmission data segments in each data communication process of user clients of different models includes:
respectively acquiring the data security condition of each change value corresponding to each transmission data segment in the future preset time;
judging whether each change value corresponding to each transmission data segment has the data security condition, if so, inputting the data security condition into a traffic transmission abnormal model for identification, and obtaining the abnormal degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
In a second aspect, the present application provides a communication method of the internet of things based on a distributed system, which adopts the following technical scheme:
acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
if the user identity data in the user request data is preset identity data, generating a data request instruction based on the read data requirement in the user request data, and sending the data request instruction to a device communication end, so that the device communication end calls corresponding device data and log storage data in a first database and a second database based on the data request instruction;
And receiving the device data transmitted by the device communication terminal and the log storage data.
In one possible implementation manner, the receiving the device data and the log storage data that are sent by the device communication end transmission further includes:
when a user configuration requirement is detected, determining configuration adjustment data according to the user configuration requirement, the equipment data and log storage data;
generating a data configuration instruction according to the configuration adjustment data, and sending the data configuration instruction to the equipment communication terminal.
In a third aspect, the present application provides an internet of things communication system based on a distributed system, which adopts the following technical scheme:
an internet of things communication system based on a distributed system, which is applied to a user client, comprises:
the data acquisition module is used for acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, and the preset agreement is a communication protocol corresponding to the different sensors when uploading the real-time detection data and acquiring the equipment data;
the data binding module is used for binding the preset agreement protocol and the real-time detection data according to a time node to obtain log storage data;
The data storage module is used for respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in preset time;
the instruction analysis module is used for analyzing the data request instruction after receiving the data request instruction sent by the user client, so as to obtain a read data requirement corresponding to the data request instruction;
and the data return module is used for calling the corresponding device data and log storage data in the first database and the second database based on the read data requirement and sending the device data and the log storage data to the user client.
In one possible implementation, the system further includes: a configuration analysis module, a configuration updating module and a device adjusting module, wherein,
the configuration analysis module is used for analyzing the data configuration instruction after receiving the data configuration instruction sent by the user client to obtain data configuration information corresponding to the data configuration instruction;
The configuration updating module is used for adjusting and configuring the real-time data of the storage device in the first database based on the data configuration information, and updating the log storage data in the second database according to the configured device data by a time node;
the device adjusting module is used for generating a device configuration instruction based on the configured device data, and controlling the device to adjust according to the configured device data.
In another possible implementation, the system further includes: the system comprises a flow acquisition module, an information arrangement module, an abnormality monitoring module and a trust degree adjustment module, wherein,
the flow acquisition module is used for acquiring flow transmission information of the user client in real time when monitoring that the user client establishes connection through a communication protocol;
the information arrangement module is used for arranging the flow transmission information according to the transmission time node to obtain a transmission wave diagram of the user client for data transmission;
the anomaly monitoring module is used for fitting the transmission fluctuation graph and a preset flow transmission graph according to the transmission time nodes, judging whether flow transmission data corresponding to different transmission time nodes are anomalous or not, acquiring historical flow transmission data if the flow transmission data are anomalous, carrying out data transmission anomaly analysis on the user client based on the historical flow transmission data to obtain the anomaly access degree of the user client, wherein the historical flow transmission data are flow transmission data of the user client with different types when carrying out data communication;
The trust degree adjusting module is used for comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
In another possible implementation manner, the anomaly monitoring module is specifically configured to, when performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an anomaly access degree of the user client:
determining the highest traffic transmission rate and the lowest traffic transmission rate of user clients of different models in the data communication process according to the historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission molecules, and taking the time used in the data communication process as a transmission denominator;
obtaining a transmission rate change value of each data communication process according to the ratio of the transmission numerator to the transmission denominator;
the transmission rate change values are arranged according to a time sequence to obtain a transmission sequence of historical flow transmission data;
obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients with different models in the transmission sequence and the numerical value of each transmission rate;
Segmenting the transmission sequences according to all segmentation points, obtaining the similarity of the change value sequences corresponding to every two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, and obtaining two or more transmission data segments;
carrying out anomaly analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in the future preset time, so as to obtain the anomaly degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time;
and obtaining the abnormal access degree of the transmission data segment corresponding to the user client and the transmission time node with abnormal traffic transmission data based on the abnormal degree.
In another possible implementation manner, the anomaly monitoring module performs anomaly analysis on each change value corresponding to each transmission data segment according to a data security condition that each change value corresponding to each transmission data segment occurs in a future preset time, so as to obtain anomaly degrees of different change values corresponding to different transmission data segments in each data communication process of user clients of different models, wherein the anomaly monitoring module is specifically configured to:
Respectively acquiring the data security condition of each change value corresponding to each transmission data segment in the future preset time;
judging whether each change value corresponding to each transmission data segment has the data security condition, if so, inputting the data security condition into a traffic transmission abnormal model for identification, and obtaining the abnormal degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
In a fourth aspect, the present application provides an internet of things communication system based on a distributed system, which adopts the following technical scheme:
an internet of things communication system based on a distributed system, which is applied to a user client, comprises:
the request acquisition module is used for acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
the instruction sending module is used for generating a data request instruction based on the read data requirement in the user request data when the user identity data in the user request data is preset identity data, and sending the data request instruction to the equipment communication end;
and the data receiving module is used for receiving the equipment data transmitted by the equipment communication terminal and the log storage data.
In one possible implementation, the system further includes: the configuration determining module and the instruction sending module, wherein,
the configuration determining module is used for determining configuration adjustment data according to the user configuration requirement, the equipment data and the log storage data when the user configuration requirement is detected;
the instruction sending module is used for generating a data configuration instruction according to the configuration adjustment data and sending the data configuration instruction to the equipment communication end.
In a fifth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer readable storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform the distributed system based internet of things communication method according to any of the first or second aspects.
In summary, the present application includes at least one of the following beneficial technical effects:
when a user requests to access equipment data corresponding to different equipment, acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting the different equipment in real time by a sensor, the preset agreement is a communication protocol corresponding to the different sensors of the different equipment when uploading the real-time detection data and acquiring the equipment data, the preset agreement and the real-time detection data are bound according to a time node to obtain log storage data, the equipment data and the log storage data are respectively stored in a first database and a second database, the first database is a database for storing the equipment data, the second database is a database for storing the log storage data in preset time, then after a data request instruction sent by a user client is received, the data request instruction is analyzed to obtain read data requirements corresponding to the data request instruction, the equipment data and the log storage data corresponding to the equipment data in the first database and the second database are called based on the read data requirements, the equipment data and the log storage data are sent to a user client, and the user client can see the real-time running condition of the equipment corresponding to the user client through the user client.
Drawings
Fig. 1 is a schematic flow chart of a communication method of the internet of things based on a distributed system according to an embodiment of the present application.
Fig. 2 is a second flow diagram of an internet of things communication method based on a distributed system according to an embodiment of the present application.
Fig. 3 is a third flow diagram of an internet of things communication method based on a distributed system according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below in conjunction with figures 1-3.
The present embodiment is merely illustrative of the present application and is not intended to be limiting, and those skilled in the art, after having read the present specification, may make modifications to the present embodiment without creative contribution as required, but is protected by patent laws within the scope of the present application.
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In this context, unless otherwise specified, the term "/" generally indicates that the associated object is an "or" relationship.
Embodiments of the present application are described in further detail below with reference to the drawings attached hereto.
The embodiment of the application discloses an Internet of things communication method based on a distributed system based on a device communication end side.
Referring to fig. 1, an internet of things communication method based on a distributed system is applied to a device communication end, and includes:
and step S10, acquiring real-time detection data and equipment data based on a preset agreement protocol.
The real-time detection data are data obtained by detecting different devices in real time by the sensor, the preset agreement protocol is a communication protocol corresponding to the different sensors of the different devices when uploading the real-time detection data and acquiring the device data, and the device data are configuration data of the device.
And S11, binding a preset appointment protocol and the real-time detection data according to a time node to obtain log storage data.
Step S12, respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in a preset time.
And S13, after receiving a data request instruction sent by the user client, analyzing the data request instruction to obtain a read data requirement corresponding to the data request instruction.
And step S14, calling the corresponding device data and the log storage data in the first database and the second database based on the read data requirement, and sending the device data and the log storage data to the user client.
Based on the above embodiment, when a user requests to access device data corresponding to different devices, real-time detection data and device data are acquired based on a preset agreement, wherein the real-time detection data are data obtained by detecting the different devices in real time by a sensor, the preset agreement is a communication protocol corresponding to the different sensors of the different devices when uploading the real-time detection data and acquiring the device data, then the preset agreement and the real-time detection data are bound according to a time node to obtain log storage data, then the device data and the log storage data are respectively stored in a first database and a second database, the first database is a database for storing the device data, the second database is a database for storing the log storage data in preset time, then after receiving a data request instruction sent by a user client, the data request instruction is analyzed, a read data requirement corresponding to the data request instruction is obtained, the device data and the log storage data corresponding to the first database and the second database are called based on the read data requirement, and the log storage data are sent to the user client, so that the real-time efficiency of the user can be improved when the user client is looking up the user device corresponding to the user device.
Further, in the embodiment of the present application, the device data and the log storage data are sent to the user client, and then further include: and after receiving the data configuration instruction sent by the user client, analyzing the data configuration instruction to obtain data configuration information corresponding to the data configuration instruction, adjusting and configuring real-time data of the storage device in the first database based on the data configuration information, updating log storage data in the second database according to the time node by the configured device data, generating the device configuration instruction based on the configured device data, and adjusting the control device according to the configured device data.
Referring to fig. 2, in the embodiment of the present application, after receiving a data request instruction sent by a user client, the method further includes:
step 201, when monitoring that a user client establishes a connection through a communication protocol, acquiring traffic transmission information of the user client in real time;
step 202, arranging the traffic transmission information according to the transmission time node to obtain a transmission wave diagram of the data transmission of the user client;
step 203, fitting the transmission fluctuation graph and a preset flow transmission graph according to the transmission time nodes, and judging whether the flow transmission data corresponding to the different transmission time nodes are abnormal or not;
If yes, executing step 204, obtaining historical traffic transmission data, and carrying out data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain the anomaly access degree of the user client, wherein the historical traffic transmission data are traffic transmission data of different types of user clients in data communication;
and 205, comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
For the embodiment of the application, a coordinate system is established, wherein an X axis is time information, a Y axis is flow rate information, the time information corresponding to the X axis is distributed in unit time nodes, the unit time nodes are each minute, the flow rate of the flow rate information corresponding to the Y axis in the current time is marked, then the corresponding flow rate marks of each minute are connected to form a flow rate curve of a user client, the curve is a transmission wave diagram of data transmission, a preset flow rate transmission diagram is a flow rate range diagram corresponding to different unit time, and whether the data transmission abnormality exists or not can be known by fitting the transmission wave diagram with the preset flow rate transmission diagram.
Specifically, performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an anomaly access degree of the user client, including: determining the highest traffic transmission rate and the lowest traffic transmission rate in the data communication process of user clients of different types according to historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission numerator, taking the time used in the data communication process of each time as transmission denominator, obtaining the transmission rate change value of the data communication process of each time according to the ratio of the transmission numerator to the transmission denominator, arranging the transmission rate change values according to time sequence to obtain the transmission sequence of the historical traffic transmission data, obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients of different types in the transmission sequence and the numerical value of each transmission rate, segmenting the transmission sequence according to all division points, obtaining the similarity of the change value sequence corresponding to each two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, obtaining two or more transmission data segments, analyzing each change value corresponding to each transmission data segment according to the data security condition occurring in the future time, obtaining the abnormal data security condition corresponding to each transmission data segment, obtaining the abnormal data transmission sequence corresponding to the abnormal data transmission sequence of different types in the user clients, and obtaining the abnormal data transmission nodes of different abnormal data transmission nodes according to the abnormal data access degree of different types in the data communication process of different user clients.
Further, in this embodiment of the present application, according to a data security condition that each change value corresponding to each transmission data segment occurs in a future preset time, performing exception analysis on each change value corresponding to each transmission data segment, to obtain exception degrees of different change values corresponding to different transmission data segments in each data communication process of a user client of different models, where the exception degrees include: and respectively acquiring the data security conditions of each change value corresponding to each transmission data segment in a future preset time, judging whether each change value corresponding to each transmission data segment has the data security conditions, and if so, inputting the data security conditions into a traffic transmission abnormal model for identification to obtain the abnormal degrees of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
For the embodiment of the application, the traffic transmission anomaly model is a pre-trained neural network model.
The embodiment of the application also discloses an Internet of things communication system based on the distributed system based on the equipment communication end side.
An internet of things communication system based on a distributed system is applied to a device communication end, and comprises:
The data acquisition module is used for acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, and the preset agreement is a communication protocol corresponding to the uploading of the real-time detection data by different sensors and the acquisition of the equipment data;
the data binding module is used for binding the preset appointment protocol and the real-time detection data according to the time node to obtain log storage data;
the data storage module is used for respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in a preset time;
the instruction analysis module is used for analyzing the data request instruction after receiving the data request instruction sent by the user client to obtain a read data requirement corresponding to the data request instruction;
and the data return module is used for calling the corresponding device data and the log storage data in the first database and the second database based on the read data requirement and sending the device data and the log storage data to the user client.
One possible implementation manner in the embodiments of the present application, the system further includes: a configuration analysis module, a configuration updating module and a device adjusting module, wherein,
the configuration analysis module is used for analyzing the data configuration instruction after receiving the data configuration instruction sent by the user client to obtain data configuration information corresponding to the data configuration instruction;
the configuration updating module is used for adjusting and configuring the real-time data of the storage device in the first database based on the data configuration information, and updating the log storage data in the second database according to the configured device data by the time node;
and the device adjusting module is used for generating a device configuration instruction based on the configured device data, and controlling the device to adjust according to the configured device data.
One possible implementation manner in the embodiments of the present application, the system further includes: the system comprises a flow acquisition module, an information arrangement module, an abnormality monitoring module and a trust degree adjustment module, wherein,
the flow acquisition module is used for acquiring flow transmission information of the user client in real time when monitoring that the user client establishes connection through the IPv6 network;
the information arrangement module is used for arranging the flow transmission information according to the transmission time node to obtain a transmission wave diagram of data transmission of the user client;
The abnormality monitoring module is used for fitting the transmission fluctuation graph and the preset flow transmission graph according to the transmission time nodes, judging whether the flow transmission data corresponding to the different transmission time nodes are abnormal or not, if yes, acquiring historical flow transmission data, and carrying out data transmission abnormality analysis on the user client based on the historical flow transmission data to obtain abnormal access degree of the user client, wherein the historical flow transmission data are flow transmission data of the user client with different types in data communication;
the trust degree adjusting module is used for comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
In one possible implementation manner of the embodiment of the present application, when performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an abnormal access degree of the user client, the anomaly monitoring module is specifically configured to:
determining the highest traffic transmission rate and the lowest traffic transmission rate of user clients of different models in the data communication process according to the historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission molecules, and taking the time used in the data communication process as a transmission denominator;
Obtaining a transmission rate change value of each data communication process according to the ratio of the transmission numerator to the transmission denominator;
the transmission rate change values are arranged in time sequence to obtain a transmission sequence of historical traffic transmission data;
obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients with different models in the transmission sequence and the numerical value of each transmission rate;
segmenting the transmission sequences according to all segmentation points, obtaining the similarity of the change value sequences corresponding to every two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, and obtaining two or more transmission data segments;
carrying out anomaly analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in the future preset time, so as to obtain the anomaly degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time;
based on the abnormality degree, an abnormality access degree of the transmission data segment corresponding to the transmission time node where the traffic transmission data abnormality exists at the user client is obtained.
In one possible implementation manner of the embodiment of the present application, when performing anomaly analysis on each change value corresponding to each transmission data segment according to a data security condition that each change value corresponding to each transmission data segment occurs in a preset time in the future, the anomaly monitoring module is specifically configured to:
respectively acquiring the data security condition of each change value corresponding to each transmission data segment in the future preset time;
judging whether each change value corresponding to each transmission data segment has a data security condition, if so, inputting the data security condition into a traffic transmission abnormal model for identification, and obtaining the abnormal degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
The embodiment of the application also discloses an Internet of things communication method based on the distributed system based on the user client side.
Referring to fig. 3, a communication method of internet of things based on a distributed system is applied to a user client, and includes:
step S301, user request data are obtained, and whether user identity data in the user request data are preset identity data or not is checked;
Step S302, if the user identity data in the user request data is preset identity data, generating a data request instruction based on the read data requirement in the user request data, and sending the data request instruction to the equipment communication end, so that the equipment communication end can call corresponding equipment data and log storage data in the first database and the second database based on the data request instruction;
for the embodiment of the application, the preset identity data is the identity data pre-stored in the identity database, and in order to prevent data information leakage, whether the current user has the qualification of acquiring data can be known by comparing the user identity data with the preset identity data.
In step S303, the receiving device communication end transmits the transmitted device data and log storage data.
Based on the above embodiment, when a user obtains different device data, the user request data is obtained, then whether the user identity data in the user request data is preset identity data is checked, if the user identity data in the user request data is preset identity data, a data request instruction is generated based on the read data requirement in the user request data, the data request instruction is sent to the device communication end, and the device communication end is received to transmit the sent device data and log storage data. Therefore, the user identity can be checked to ensure the safety of the data, the user can obtain the equipment data corresponding to the equipment and the log storage data in time, and the data acquisition efficiency of the user is improved.
Further, in the embodiment of the present application, the receiving device communication end transmits the sent device data and the log storage data, and then further includes: when the user configuration requirement is detected, configuration adjustment data are determined according to the user configuration requirement, the equipment data and the log storage data, a data configuration instruction is generated according to the configuration adjustment data, and the data configuration instruction is sent to the equipment communication end.
The embodiment of the application also discloses an Internet of things communication system based on the distributed system based on the user client side.
An internet of things communication system based on a distributed system, which is applied to a user client, comprises:
the request acquisition module is used for acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
the instruction sending module is used for generating a data request instruction based on the read data requirement in the user request data when the user identity data in the user request data is preset identity data, and sending the data request instruction to the equipment communication end;
and the data receiving module is used for receiving the device data transmitted by the device communication end and the log storage data.
One possible implementation manner in the embodiments of the present application, the system further includes: the configuration determining module and the instruction sending module, wherein,
The configuration determining module is used for determining configuration adjustment data according to the user configuration requirement, the equipment data and the log storage data when the user configuration requirement is detected;
the instruction sending module is used for generating a data configuration instruction according to the configuration adjustment data and sending the data configuration instruction to the equipment communication terminal.
A computer readable storage medium provided in the embodiments of the present application is described below, and the computer readable storage medium described below and the method described above may be referred to correspondingly.
The embodiment of the application provides a computer readable storage medium, and a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the communication method of the internet of things based on a distributed system are realized.
Since embodiments of the computer-readable storage medium portion and embodiments of the method portion correspond to each other, embodiments of the computer-readable storage medium portion are described with reference to embodiments of the method portion.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The foregoing is only a partial embodiment of the present application and it should be noted that, for a person skilled in the art, several improvements and modifications can be made without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.
Claims (10)
1. The Internet of things communication method based on the distributed system is characterized by being applied to a device communication end and comprising the following steps:
acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, and the preset agreement is a communication protocol corresponding to the uploading of the real-time detection data by different sensors of different equipment and the acquisition of the equipment data;
binding the preset agreement and the real-time detection data according to a time node to obtain log storage data, wherein the equipment data are configuration data of equipment;
respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in preset time;
After receiving a data request instruction sent by a user client, analyzing the data request instruction to obtain a read data requirement corresponding to the data request instruction;
and calling corresponding device data and log storage data in the first database and the second database based on the read data requirement, and sending the device data and the log storage data to the user client.
2. The internet of things communication method based on a distributed system according to claim 1, wherein the sending the device data and log storage data to the user client further comprises:
after receiving a data configuration instruction sent by a user client, analyzing the data configuration instruction to obtain data configuration information corresponding to the data configuration instruction;
adjusting and configuring the storage device data in the first database based on the data configuration information, and updating the log storage data in the second database according to the configured device data by a time node;
and generating a device configuration instruction based on the configured device data, and controlling the device to adjust according to the configured device data.
3. The internet of things communication method based on a distributed system according to claim 1, wherein after receiving the data request instruction sent by the user client, the method further comprises:
when the user client is monitored to establish connection through a communication protocol, acquiring flow transmission information of the user client in real time;
the traffic transmission information is arranged according to the transmission time node, and a transmission wave diagram of the user client for data transmission is obtained;
fitting the transmission fluctuation graph and a preset flow transmission graph according to the transmission time nodes, judging whether flow transmission data corresponding to different transmission time nodes are abnormal, if so, acquiring historical flow transmission data, and carrying out data transmission abnormality analysis on the user client based on the historical flow transmission data to obtain abnormal access degree of the user client, wherein the historical flow transmission data are flow transmission data of different types of user clients in data communication;
and comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
4. The internet of things communication method based on a distributed system according to claim 3, wherein performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an anomaly access degree of the user client comprises:
determining the highest traffic transmission rate and the lowest traffic transmission rate of user clients of different models in the data communication process according to the historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission molecules, and taking the time used in the data communication process as a transmission denominator;
obtaining a transmission rate change value of each data communication process according to the ratio of the transmission numerator to the transmission denominator;
the transmission rate change values are arranged according to a time sequence to obtain a transmission sequence of historical flow transmission data;
obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients with different models in the transmission sequence and the numerical value of each transmission rate;
segmenting the transmission sequences according to all segmentation points, obtaining the similarity of the change value sequences corresponding to every two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, and obtaining two or more transmission data segments;
Carrying out anomaly analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in the future preset time, so as to obtain the anomaly degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time;
and obtaining the abnormal access degree of the transmission data segment corresponding to the user client and the transmission time node with abnormal traffic transmission data based on the abnormal degree.
5. The internet of things communication method according to claim 4, wherein the performing exception analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in a preset future time to obtain exception degrees of different change values corresponding to different transmission data segments in each data communication process of user clients of different models comprises:
respectively acquiring the data security condition of each change value corresponding to each transmission data segment in the future preset time;
judging whether each change value corresponding to each transmission data segment has the data security condition, if so, inputting the data security condition into a traffic transmission abnormal model for identification, and obtaining the abnormal degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
6. The Internet of things communication method based on the distributed system is characterized by being applied to a user client and comprising the following steps:
acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
if the user identity data in the user request data is preset identity data, generating a data request instruction based on the read data requirement in the user request data, and sending the data request instruction to a device communication end, so that the device communication end calls corresponding device data and log storage data in a first database and a second database based on the data request instruction;
the device communication terminal acquires real-time detection data and device data by a preset agreement based on the device data stored in the first database, wherein the real-time detection data are obtained by a sensor for detecting different devices in real time, and the preset agreement is a communication protocol corresponding to the uploading of the real-time detection data by different sensors of different devices and the acquisition of the device data; binding the preset agreement and the real-time detection data according to a time node to obtain log storage data, wherein the equipment data are obtained in a mode of configuration data of equipment;
And receiving the device data transmitted by the device communication terminal and the log storage data.
7. The internet of things communication method based on the distributed system according to claim 6, wherein the receiving the device data and the log storage data that are transmitted by the device communication end transmission further includes:
when a user configuration requirement is detected, determining configuration adjustment data according to the user configuration requirement, the equipment data and log storage data;
generating a data configuration instruction according to the configuration adjustment data, and sending the data configuration instruction to the equipment communication terminal.
8. The utility model provides a thing networking communication system based on distributed system which characterized in that is applied to equipment communication end includes:
the data acquisition module is used for acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, and the preset agreement is a communication protocol corresponding to the different sensors when uploading the real-time detection data and acquiring the equipment data;
the data binding module is used for binding the preset agreement protocol and the real-time detection data according to a time node to obtain log storage data;
The data storage module is used for respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in preset time;
the instruction analysis module is used for analyzing the data request instruction after receiving the data request instruction sent by the user client, so as to obtain a read data requirement corresponding to the data request instruction;
and the data return module is used for calling the corresponding device data and log storage data in the first database and the second database based on the read data requirement and sending the device data and the log storage data to the user client.
9. The utility model provides a thing networking communication system based on distributed system which characterized in that is applied to user's customer end, includes:
the request acquisition module is used for acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
the instruction sending module is used for generating a data request instruction based on the read data requirement in the user request data when the user identity data in the user request data is preset identity data, and sending the data request instruction to the equipment communication end so that the equipment communication end can call the corresponding equipment data and log storage data in the first database and the second database based on the data request instruction;
The device communication terminal acquires real-time detection data and device data by a preset agreement based on the device data stored in the first database, wherein the real-time detection data are obtained by a sensor for detecting different devices in real time, and the preset agreement is a communication protocol corresponding to the uploading of the real-time detection data by different sensors of different devices and the acquisition of the device data; binding the preset agreement and the real-time detection data according to a time node to obtain log storage data, wherein the equipment data are obtained in a mode of configuration data of equipment;
and the data receiving module is used for receiving the equipment data transmitted by the equipment communication terminal and the log storage data.
10. A computer-readable storage medium, characterized by: a computer program being stored which can be loaded by a processor and which performs the method according to any one of claims 1 to 5 or the method according to any one of claims 6 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410016036.2A CN117527860B (en) | 2024-01-05 | 2024-01-05 | Internet of things communication method, system and medium based on distributed system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410016036.2A CN117527860B (en) | 2024-01-05 | 2024-01-05 | Internet of things communication method, system and medium based on distributed system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117527860A CN117527860A (en) | 2024-02-06 |
CN117527860B true CN117527860B (en) | 2024-04-09 |
Family
ID=89745978
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410016036.2A Active CN117527860B (en) | 2024-01-05 | 2024-01-05 | Internet of things communication method, system and medium based on distributed system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117527860B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118364151B (en) * | 2024-06-20 | 2024-08-20 | 南京梓洺科技有限公司 | Data display method and system based on Internet of things |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10423493B1 (en) * | 2015-12-21 | 2019-09-24 | Amazon Technologies, Inc. | Scalable log-based continuous data protection for distributed databases |
CN111628967A (en) * | 2020-04-20 | 2020-09-04 | 深圳市广和通无线股份有限公司 | Log data transmission method and device, computer equipment and storage medium |
CN113297176A (en) * | 2021-05-27 | 2021-08-24 | 焦作大学 | Database access method based on Internet of things |
WO2021217637A1 (en) * | 2020-04-30 | 2021-11-04 | 上海华东汽车信息技术有限公司 | Terminal policy configuration method and apparatus, and computer device and storage medium |
CN113608907A (en) * | 2021-07-21 | 2021-11-05 | 阿里巴巴(中国)有限公司 | Database auditing method, device, equipment, system and storage medium |
CN114640548A (en) * | 2022-05-18 | 2022-06-17 | 宁波市镇海区大数据投资发展有限公司 | Network security sensing and early warning method and system based on big data |
CN115396200A (en) * | 2022-08-25 | 2022-11-25 | 康峰 | Cross-platform data security management application method, device and system |
CN115426375A (en) * | 2022-08-30 | 2022-12-02 | 上海徐毓智能科技有限公司 | Data processing method and data processing system |
CN116383753A (en) * | 2023-05-26 | 2023-07-04 | 深圳市博昌智控科技有限公司 | Abnormal behavior prompting method, device, equipment and medium based on Internet of things |
CN116702110A (en) * | 2023-06-15 | 2023-09-05 | 深圳千岸科技股份有限公司 | Method, device, equipment and storage medium for sharing big data of supply chain |
CN116760822A (en) * | 2023-07-24 | 2023-09-15 | 杭州萤石软件有限公司 | Method, system and device for transmitting files of Internet of things equipment |
CN117194338A (en) * | 2023-09-26 | 2023-12-08 | 中国联合网络通信集团有限公司 | Processing method, device, equipment and storage medium for distributed log data |
-
2024
- 2024-01-05 CN CN202410016036.2A patent/CN117527860B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10423493B1 (en) * | 2015-12-21 | 2019-09-24 | Amazon Technologies, Inc. | Scalable log-based continuous data protection for distributed databases |
CN111628967A (en) * | 2020-04-20 | 2020-09-04 | 深圳市广和通无线股份有限公司 | Log data transmission method and device, computer equipment and storage medium |
WO2021217637A1 (en) * | 2020-04-30 | 2021-11-04 | 上海华东汽车信息技术有限公司 | Terminal policy configuration method and apparatus, and computer device and storage medium |
CN113297176A (en) * | 2021-05-27 | 2021-08-24 | 焦作大学 | Database access method based on Internet of things |
CN113608907A (en) * | 2021-07-21 | 2021-11-05 | 阿里巴巴(中国)有限公司 | Database auditing method, device, equipment, system and storage medium |
CN114640548A (en) * | 2022-05-18 | 2022-06-17 | 宁波市镇海区大数据投资发展有限公司 | Network security sensing and early warning method and system based on big data |
CN115396200A (en) * | 2022-08-25 | 2022-11-25 | 康峰 | Cross-platform data security management application method, device and system |
CN115426375A (en) * | 2022-08-30 | 2022-12-02 | 上海徐毓智能科技有限公司 | Data processing method and data processing system |
CN116383753A (en) * | 2023-05-26 | 2023-07-04 | 深圳市博昌智控科技有限公司 | Abnormal behavior prompting method, device, equipment and medium based on Internet of things |
CN116702110A (en) * | 2023-06-15 | 2023-09-05 | 深圳千岸科技股份有限公司 | Method, device, equipment and storage medium for sharing big data of supply chain |
CN116760822A (en) * | 2023-07-24 | 2023-09-15 | 杭州萤石软件有限公司 | Method, system and device for transmitting files of Internet of things equipment |
CN117194338A (en) * | 2023-09-26 | 2023-12-08 | 中国联合网络通信集团有限公司 | Processing method, device, equipment and storage medium for distributed log data |
Non-Patent Citations (1)
Title |
---|
基于Spark Streaming的海量日志实时处理系统的设计;陆世鹏;;电子产品可靠性与环境试验;20171020(第05期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN117527860A (en) | 2024-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN117527860B (en) | Internet of things communication method, system and medium based on distributed system | |
US20200302054A1 (en) | Method for detecting physical intrusion attack in industrial control system based on analysis of signals on serial communication bus | |
CN109347880A (en) | A kind of safety protecting method, apparatus and system | |
EP3306868A1 (en) | Relay device, network monitoring system, and program | |
CN116980958B (en) | Radio equipment electric fault monitoring method and system based on data identification | |
CN110892675B (en) | Method and apparatus for monitoring block chains | |
KR20210155244A (en) | A method of secure monitoring for multi network devices | |
CN111130912A (en) | Abnormal location method, server and storage medium for content distribution network | |
CN110505220B (en) | Method and device for supporting OPC protocol to realize dual-computer hot standby and communication terminal | |
US12160440B2 (en) | Method and system to detect abnormal message transactions on a network | |
CN113760634A (en) | A data processing method and device | |
CN117834301B (en) | Internet of things-based network security communication control method and system | |
CN118227410A (en) | Block chain-based intelligent monitoring method and device and computer equipment | |
CN116980202B (en) | Network security operation and maintenance monitoring method and system | |
CN118158678A (en) | Wireless network monitoring method and computer equipment | |
CN117729039A (en) | Message detection method and device | |
CN114826788B (en) | Equipment management and control system based on information security | |
KR102369991B1 (en) | Integrated management system for iot multi network secure | |
CN116668315A (en) | Communication health analysis method and system for foundation fieldbus | |
CN109803301B (en) | Offline identification management system for wireless network | |
CN112866172A (en) | Safety protection method and device, smart home system and computer readable medium | |
CN114339949B (en) | Method, equipment and storage medium for realizing intelligent gateway | |
CN115051922B (en) | Link control method, device, electronic equipment and storage medium | |
CN115361256B (en) | Edge computing intelligent gateway oriented to intelligent security monitoring field and implementation method | |
CN119232745A (en) | Data processing method and system based on communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |