Security detection method and device for laboratory internet-of-things management system

A management system and security detection technology, applied in the field of laboratory management, which can solve the problems of few Internet of Things and no in-depth research.

Active Publication Date: 2019-03-08
北京戴纳实验科技有限公司
View PDF11 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the Internet of Things technology has not been widely used in the construction process of the smart campus, and there has not been an in-depth study. It is still in the preliminary conception or exploration situation. Related examples of the use of the Internet of Things in the smart campus very few

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method and device for laboratory internet-of-things management system
  • Security detection method and device for laboratory internet-of-things management system
  • Security detection method and device for laboratory internet-of-things management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] combine figure 1 , the present invention specifically relates to a safety detection method of a laboratory Internet of Things management system. Usually, the laboratory Internet of Things management system includes the equipment numbers i1, i2, i3...in that the laboratory requires to manage, such as various laboratory equipment, testing equipment, demonstration equipment, processing equipment, etc., where n represents the number of equipment Serial number, laboratory relay system A, laboratory IoT management system server B, and server connection terminal C connected to each other through network information or radio information. It should be noted that: server connection terminal C includes but not limited to: server connection WEB Handheld terminals connected to terminals and servers, including but not limited to: tablets, mobile phones, etc. For the above-mentioned laboratory IoT management system, for example, in a separate laboratory room, a computer host or tablet...

Embodiment 2

[0102] Same as Embodiment 1, further, the server B of the laboratory Internet of Things management system performs real-time classification, processing and storage of the data fed back by the equipment required by the laboratory and the data fed back by the server connection terminal C; the data includes laboratory requirements management The report information of the equipment, the environmental information of the reference location, the physiological information of the user, and the positioning information; among them, the report information of the equipment that the laboratory requires management is the network access information that is prompted after the equipment that the laboratory requires management is successfully connected to the network; the positioning information is the network access information. After success, the network ID and the corresponding physical address ID obtained automatically by server B of the laboratory Internet of Things management system, the net...

Embodiment 3

[0106] Same as Embodiment 1, further, the laboratory requires the managed equipment to monitor the location through the laboratory relay system A and the laboratory Internet of Things management system server B, so as to obtain the location of the lost equipment iu. The specific methods include:

[0107] (2.1) Let the coordinates of the lost device iu be (X iu , Y iu ), let the coordinates of the m devices associated with the missing device iu be (X 1 , Y 1 ), (X 2 , Y 2 )…(X m , Y m ), m≥3;

[0108] (2.2) The Euclidean distance R between the lost device iu and the associated m devices j for:

[0109]

[0110] Wherein, j=1,2,...,m; The above formula is deduced:

[0111]

[0112] Calculate the coordinates of the lost device iu by using the simplified structure:

[0113]

[0114]

[0115]

[0116]

[0117] The above parameters all have specific coordinate calculation methods, which are symbolic parameters set for the convenience of formulation;

[01...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of laboratory management, and particularly relates to a security detection method and device for a laboratory internet-of-things management system. The laboratory internet-of-things management system comprises devices with serial numbers i1, i2, i3.....in, required to be managed by a laboratory, wherein n represents the serial number of the device; anda laboratory relay system A, a laboratory internet-of-things management system server B, and a server connection terminal C are mutually connected through network information and radio information. According to the method, the stability of the whole security system is judged creatively by detecting permission information of various programs in the laboratory system; the overall implementation of the method is simple and convenient; the program design complexity is low; and so far, no any related files record a technology for judging the security of the laboratory system through permission information.

Description

technical field [0001] The invention belongs to the technical field of laboratory management, and in particular relates to a safety detection method and detection equipment of a laboratory Internet of Things management system. Background technique [0002] Today, in the process of today's society moving towards intelligence and informationization, the Internet of Things technology occupies a dominant position. Among them, the most critical RFID technology of the Internet of Things technology, that is, the scope of application of radio frequency identification technology is becoming wider and wider. In response to my country's call for "Smart China", various colleges and universities are also further realizing the "Smart Campus", aiming to establish an informatized and intelligent smart campus. Under this environmental background, the further development of education has been promoted to a large extent. The country and localities have begun to pay attention to education, esp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/12H04W12/121H04W12/128
CPCH04L63/1416H04L63/145H04W12/12
Inventor 迟海鹏张怀东张京军龚长华邢希学
Owner 北京戴纳实验科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products