What's New
The tables below describe the functions released in each IoT Device Access version and corresponding documentation updates. New features will be successively launched in each region.
March, 2024
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
Automatic device registration |
You can set a self-registration template, with which the device can connect to the platform without registering on the platform in advance. The platform parses the template content based on the device connection information and automatically registers the settings. |
Commercial use |
February, 2024
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
Stacked forwarding data clearance |
When the rule engine forwards messages to a third-party application, if the application cannot process the data in real time, the data will be stacked on the platform. You can clear the data stacked in the forwarding channel for timely processing. |
Commercial use |
January, 2024
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
SMN notification templates for linkage rules |
When setting a device linkage rule and selecting notification sending as the rule action, you can use the template defined by Simple Message Notification (SMN). |
Commercial use |
December, 2023
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
Authentication credential switchover |
You need to update a device access credential in some scenarios, for example, when an X.509 certificate is about to expire. IoTDA provides master/sub fingerprints and secrets to prevent device authentication failure and service interruption during credential update and resetting. For example, when you add a new certificate fingerprint, the platform sets the fingerprint as a backup (sub fingerprint). In this way, the corresponding device can use both the old certificate (if not updated on the device side timely) and the new certificate to connect to the platform smoothly. |
Commercial use |
November, 2023
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
M2M communications |
IoTDA supports MQTT-based M2M communications among devices. |
Commercial use |
April, 2023
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
Message Broadcasting |
This API is used by an application to broadcast a message to all online devices that subscribe to a specified topic. |
Commercial use |
March, 2023
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
Remote Device Configuration |
The platform allows you to perform remote configuration. You can remotely update device configuration items such as system and running parameters without interrupting device running. |
Commercial use |
February, 2023
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
Restrictions on device shadow specifications |
Added limitations on device shadow specifications to the Message communications category. |
Commercial use |
January, 2023
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
Monitoring and O&M |
IoTDA allows you to remotely log in to devices from the console over the Secure Shell Protocol (SSH). You can enter commands supported by devices to debug functions and locate faults. This facilitates device management and remote O&M. |
Commercial use |
December, 2022
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
AMQP subscription/push |
You can use a Python 3 SDK to connect to IoTDA and receive subscribed messages from the platform based on AMQP. |
Commercial use |
|
2 |
AMQP subscription/push |
You can use a Go SDK to connect to IoTDA and receive subscribed messages from the platform based on AMQP. |
Commercial use |
|
3 |
Device-side rules |
Cloud rules are parsed and executed on the cloud. IoTDA determines whether triggering conditions are met and triggers corresponding device linkage actions. Device-side rules are device linkage rules delivered to devices, where the device-side rule engine parses and executes the rules. Device-side rules can still run on devices when the network is interrupted or devices cannot communicate with the platform. |
Commercial use |
November, 2022
No. |
Feature |
Description |
Phase |
Related Documents |
---|---|---|---|---|
1 |
Rules |
If the forwarding target (such as a third-party application server) cannot process data forwarded by IoTDA in a timely manner due to insufficient performance, unprocessed data will be stacked (cached) on IoTDA. By default, the maximum stack (cache) size of data to forward for a single forwarding rule is 1 GB, and the maximum stack duration is 24 hours. If the maximum stack size or stack duration is exceeded, the earliest unprocessed data will be discarded to meet the stack size and duration requirements. |
Commercial use |
|
2 |
Rules |
You can create flow control policies in different dimensions on IoTDA based on your service scenarios and performance of the forwarding target (such as a third-party application server) to control data forwarding flows. |
Commercial use |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot