CN113037621B - Edge gateway, edge gateway dynamic policy service implementation method, device and system - Google Patents

Edge gateway, edge gateway dynamic policy service implementation method, device and system Download PDF

Info

Publication number
CN113037621B
CN113037621B CN202110271087.6A CN202110271087A CN113037621B CN 113037621 B CN113037621 B CN 113037621B CN 202110271087 A CN202110271087 A CN 202110271087A CN 113037621 B CN113037621 B CN 113037621B
Authority
CN
China
Prior art keywords
policy
edge gateway
module
updated
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110271087.6A
Other languages
Chinese (zh)
Other versions
CN113037621A (en
Inventor
李旭滨
陈吉胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unisound Intelligent Technology Co Ltd
Xiamen Yunzhixin Intelligent Technology Co Ltd
Original Assignee
Unisound Intelligent Technology Co Ltd
Xiamen Yunzhixin Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unisound Intelligent Technology Co Ltd, Xiamen Yunzhixin Intelligent Technology Co Ltd filed Critical Unisound Intelligent Technology Co Ltd
Priority to CN202110271087.6A priority Critical patent/CN113037621B/en
Publication of CN113037621A publication Critical patent/CN113037621A/en
Application granted granted Critical
Publication of CN113037621B publication Critical patent/CN113037621B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention provides an edge gateway, and a method, a device and a system for realizing dynamic policy service of the edge gateway, wherein the edge gateway comprises a policy module, a digital signature module, a pull module and a drive registration module; the strategy module is embedded with script vm and directly executes the strategy module when a new strategy is updated; the digital signature module is used for recording the md5 signature of the service subfile; the pull module is used for sending md5 signatures of all files to the policy verification service by the edge gateway when an updated policy exists, calculating subfiles needing to be updated and pushing the policy needing to be updated; and the driving registration module is used for interacting the edge gateway and the equipment based on the updated new strategy. The method has the advantages of high updating speed and high fault-tolerant rate to the weak network environment, does not need full updating through issuing of a dynamic strategy, reduces updating volume and only updates necessary parts; fast iteration is supported; the policy verification service is simple, control and data separation can be achieved only by a control end, and the problem of multi-version compatibility is not needed.

Description

Edge gateway, edge gateway dynamic policy service implementation method, device and system
Technical Field
One or more embodiments of the present invention relate to the technical field of edge gateways, and in particular, to an edge gateway, and a method, an apparatus, and a system for implementing an edge gateway dynamic policy.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein may include concepts that could be pursued, but are not necessarily ones that have been previously conceived or pursued. Thus, unless otherwise indicated herein, what is described in this section is not prior art to the description and claims in this application and is not admitted to be prior art by inclusion in this section.
1. The noun explains:
edge gateway: the edge gateway is a gateway deployed at the edge of a network, and is connected with a physical world and a digital world through functions of network connection, protocol conversion and the like, so that light connection management, real-time data analysis and application management functions are provided.
IOT: the abbreviation of Internet of Things, the meaning of the Internet of Things.
2. The prior art is as follows:
in the iot scenario, there is typically an edge gateway role to control thousands of devices. Thereby controlling the device through the gateway. And then the control equipment interacts with the central control service through the interface, as long as the control equipment is connected with the edge gateway firstly and controls iot equipment finally, so that scene actions such as lighting, window opening and the like are completed.
The existing edge gateway has the following problems in use: (1) the updating speed is slow: the full amount is replaced by a new version, the new version occupies too much space and is easy to fail in a weak network environment, and the precious equipment space is required to be considered for failure rollback;
(2) the iteration speed is slow: the new version is large in size, so that ota is easy to be too long, the edge gateway needs to be upgraded for a long time, and the new function cannot be applied at a later time;
(3) the central service is complex: the server needs to consider multiple versions and multiple policies in relation to the situation of the edge gateway.
In view of the above, a new edge gateway processing technology is needed to solve the above existing technical problems.
Disclosure of Invention
One or more embodiments of the present specification describe an edge gateway, and a method, an apparatus, and a system for implementing an edge gateway dynamic policy, which solve the problems of a slow update speed, a slow iteration speed, and a complex central service of an edge gateway in the prior art.
The technical scheme provided by one or more embodiments of the specification is as follows:
in a first aspect, the present invention provides an edge gateway, where the edge gateway includes a policy module, a digital signature module, a pull module, and a driver registration module; wherein the content of the first and second substances,
the strategy module is embedded with script vm and directly executes when a new strategy is updated;
the digital signature module is used for recording the md5 signature of the service subfile;
the pull module is used for sending md5 signatures of all files to the policy verification service by the edge gateway when an updated policy exists, calculating subfiles needing to be updated, and pushing the policy needing to be updated;
and the drive registration module is used for interacting the edge gateway and the equipment based on the updated new strategy.
In a second aspect, the present invention provides an edge gateway dynamic policy service implementation apparatus, where the apparatus includes, for example, an operation system module, a policy service module, a policy verification service module, and an edge gateway according to claim 1; wherein the content of the first and second substances,
the operation system module is used for editing and recording the strategy;
the policy service module is used for translating the recorded policies into scripts for the edge gateway to directly execute;
the policy verification service module is used for verifying the md5 value sent by the edge gateway and is responsible for pushing the dynamic policy;
and the edge gateway is used for interacting with the equipment according to the script corresponding to the pushed dynamic policy file.
In a possible implementation manner, the policy verification service module is specifically configured to check md5 values of md5 values of all files sent by the edge gateway, and if it is determined that the file is a new policy file, push the updated new policy to vm in the edge gateway for execution.
In a third aspect, the present invention provides a method for implementing an edge gateway dynamic policy service, where the method is used for an edge gateway as described in the first aspect, and the method includes:
editing a new strategy;
translating the new policy into a script for direct execution by an edge gateway;
pushing the updated new strategy to the edge gateway;
the edge gateway sends md5 signatures of all policy files to the policy verification service module;
based on the md5 signature, the policy verification service module calculates the subfiles needing to be updated and pushes the new policies needing to be updated;
the edge gateway interacts with the device based on the script translated by the updated new policy.
In one possible implementation, before the edge gateway controls the device based on the script translated by the updated new policy, it needs to wait for a preset time period.
In a possible implementation manner, based on the md5 signature, the policy verification service module calculates a subfile that needs to be updated, and pushes a new policy that needs to be updated, specifically:
based on the md5 signature, the policy verification service module computes a difference set;
obtaining subfiles needing to be updated based on the difference set;
and pushing the updated new strategy based on the subfiles needing to be updated.
In a fourth aspect, the present invention provides an edge gateway dynamic policy service implementation system, including at least one processor and a memory;
the memory to store one or more program instructions;
the processor is configured to execute one or more program instructions to perform the method according to the third aspect.
In a fifth aspect, the present invention provides a chip, which is coupled to a memory in a system, so that the chip calls program instructions stored in the memory when running to implement the method according to the third aspect.
In a sixth aspect, the invention provides a computer readable storage medium comprising one or more program instructions executable by the system of claim 7 to implement the method of the third aspect.
The invention adopts the modes of dynamic strategy issuing and adding new functions, only needing to generate a new script for the edge gateway to directly execute, strategy verification service and the like, and solves the problems of low updating speed and iteration speed of the edge gateway and complex medium and small services.
Drawings
Fig. 1 is a schematic structural diagram of an edge gateway according to an embodiment of the present invention;
fig. 2 is a diagram illustrating the status of lamps during the interaction between the edge gateway and iot lamps;
fig. 3 is a schematic structural diagram of an edge gateway dynamic policy service implementation apparatus;
FIG. 4 is a second schematic structural diagram of an edge gateway dynamic policy service implementation apparatus;
fig. 5 is a schematic flow chart of a method for implementing dynamic policy service of an edge gateway;
fig. 6 is a second schematic flowchart of a method for implementing dynamic policy service of an edge gateway;
fig. 7 is a third schematic flowchart of a method for implementing dynamic policy service of an edge gateway;
fig. 8 is a schematic structural diagram of an edge gateway dynamic policy service implementation system.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be further noted that, for the convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 shows a schematic structural diagram of an edge gateway according to an embodiment, and as shown in fig. 1, an edge gateway 1 provided by the present invention is composed of several modules: the system comprises a policy module 11, a digital signature module 12, a pull module 13 and a drive registration module 14; each module is described in detail below:
the strategy module 11 is embedded with script vm and directly executes when a new strategy is updated.
Specifically, a script vm is embedded in the policy module 11. vm, on the basis of complying with certain security, comprises a basic library and an extended library, wherein the basic library comprises libs commonly used by programming, and the extended library has service and business functions of the edge gateway 1. When a new version policy is updated, a new vm can be newly established. And closing the vm when the old vm strategy is executed completely. vm is a runtime mechanism, and is directly executed when a policy system has a new function to issue.
The digital signature module 12 is configured to record an md5 signature of the service subfile.
Specifically, when the edge gateway 1 is deployed on a machine for the first time, md5 signatures of all service subfiles are recorded, when a service is running, a policy similar to CSMA can be selected here at intervals, and when a service is selected to be inactive in a time period, a policy similar to CSMA is selected here, and when a service is running, a signature is stopped to be calculated, and the state of the process is monitored. If no service is operated, the signature can be calculated, the above process is circulated, the signature is synchronously calculated when the file is updated, and finally, the complete file signature is obtained.
The pull module 13 is configured to, when there is an updated policy, the edge gateway sends md5 signatures of all files to the policy verification service, calculates subfiles that need to be updated, and pushes the policy that needs to be updated.
Specifically, when there is an update. The edge gateway sends the signatures of all files to the policy verification service first. The policy verification service calculates the subfiles that need to be updated and then pushes the policy files that need to be updated.
The driver registration module 14 is configured to interact with the edge gateway 1 and the device based on the updated new policy.
Specifically, the edge gateway 1 interacts with specific devices, the edge gateway designs a standard iot protocol, and the capability and metadata of each device are registered on the edge gateway. Each device has its own device id. For example, the device id of the lamp is 01 and the device id of the shade is 02. Each iot device has its standard actions such as whether the lights are on or off. Taking the example of a light, the light has only two standard actions, on and off. Each standard action is referred to below as a slot, and multiple events may be mounted below each slot, as shown in FIG. 2. Where the registration module 14 is driven to handle the specific event and also the event source of the event. Such as 9 lights per day, which is a time-based source of events. There is a special trigger control. Other strategies are added into the slot position, and if another strategy is added, a person turns on the light again every night. It is checked first that the metadata of the lamp supports the infrared device, and if supported, this event can be added to the slot. And triggering by infrared time, detecting the event below the lamp, and executing when the condition is met.
Fig. 3 and 4 show the structure of the edge gateway dynamic policy service implementation apparatus, and as shown in fig. 3 and 4, the edge gateway dynamic policy service implementation apparatus 2 includes, for example, an operation system module 21, a policy service module 22, a policy verification service module 23, and the edge gateway 1 as described above; wherein the content of the first and second substances,
the operation system module 21 is configured to edit and record a policy.
Specifically, the operation system module 21 mainly manages policies on the services. The policies recorded here are human friendly. Such as turning on lights, closing curtains, etc.
The policy service module 22 is configured to translate the recorded policy into a script for the edge gateway 1 to directly execute.
Specifically, in this module, the policy in the operation system module 21 is generated into a script that can be directly executed by vm in the edge gateway 1. Such as turning on the lights:
func openLight()(deviceID int){
return 0x1234
}
the policy service is a mini programming language that uses a go-like DSL design to implement variables, assignment statements, and if else, for, function.
In fig. 4, the policy processing refers to transmitting the script generated by the policy service module 22 to the policy verification module 23 through an interface call to perform MD5 encryption and comparison.
The policy verification service module 23 is configured to verify the md5 value sent by the edge gateway 1, and is responsible for pushing the dynamic policy.
Specifically, the policy validation service mainly validates the md5 value sent by the edge gateway. And md5 for the policy service version, taking the intersection part of them. And then responsible for the pushing of dynamic policies.
In other words, the policy verification service mainly checks the MD5 value of the file, encrypts the file according to the open-source MD5 algorithm, then takes the encrypted value to compare whether the file and the original file are modified, and if the file is determined to be the modified file, pushes the new policy file with modification update to vm in the edge gateway 1 for execution.
And the edge gateway 1 is used for interacting with the equipment according to the script corresponding to the pushed dynamic policy file.
In the process of using the edge gateway dynamic policy service implementation device, the overall framework data flow is as follows:
the user uses the operation system module 21 to add the control strategy on the new service, and clicks and applies the corresponding strategy to send to the strategy service module 22, and compiles into a specific script. Clicking on the operating system module 21 will push the grey scale to the corresponding edge gateway 1.
The technical scheme of the invention has the advantages that:
(1) the updating speed block has high fault-tolerant rate to the weak network environment, is issued through a dynamic strategy, does not need full updating, reduces the updating volume and updates only necessary parts;
(2) fast iteration is supported, and generally, only one new script needs to be generated by adding a new function. The vm runs the new script without updating the complete binary file;
(3) advantages of the "policy validation" service: the central service is simple, only a control end is needed, the control and data separation can be achieved, and therefore the problem of multi-version compatibility is not needed.
Corresponding to the above embodiment device, the present invention further provides a method for implementing an edge gateway dynamic policy service, where fig. 5 is a schematic flow chart, and as shown in fig. 5, the flow roughly includes: editing strategy → generating script → pushing strategy → calculating md5 signature → pushing increment strategy → returning result after the edge gateway vm completes execution → generating device strategy. In one example, as shown in fig. 6, to prevent system congestion, a step of "waiting" may be added after the incremental policy is pushed, and the waiting time may be set so that after a certain time interval, the next file is pushed to execute.
Referring to fig. 5 and fig. 6, and by way of example, briefly stated is a flow of an edge gateway dynamic policy service implementation method, as shown in fig. 7:
and step 10, editing the new strategy.
Firstly, a strategy is edited on an operation platform, such as 'if the strategy is in the dark and someone passes through, night light is turned on'.
And 20, translating the new strategy into a script for the direct execution of the edge gateway.
Through the policy service, the new policy 'if it is at night and someone passes through, turn on night light' is translated into a corresponding script which can be directly executed by the edge gateway vm:
if gw.Isnight()&&gw.HavePeople(){
gw.OnNightLight()
}
and step 30, pushing the updated new policy to the edge gateway.
Step 40, the edge gateway sends md5 signatures of all policy files to the policy verification service module.
And step 50, based on the md5 signature, the policy verification service module calculates the subfile needing to be updated and pushes the new policy needing to be updated.
md5 is an irreversible set of encryption algorithm which is open at present, it is easy to compare whether two files are consistent, if not, it is determined as the modified file, the modified and updated file is pushed continuously, and the following operation flow is continued.
Step 60, the edge gateway interacts with the device based on the script translated by the updated new policy.
In one example, to prevent system congestion, the edge gateway may also need to wait for a preset period of time before interacting with the device based on the script translated from the updated new policy. And then the script is executed by the edge gateway vm, a result is returned after the execution is finished, then the equipment strategy takes effect, and the edge gateway interacts with the equipment. In this example, the device policy takes effect: infrared-enabled devices will only turn on the light at night.
The steps involved in the method and the used device components provided by the embodiment of the present invention are described in detail in the edge gateway and the device, and therefore, are not described in detail herein.
Corresponding to the above embodiments, the embodiment of the present invention further provides an edge gateway dynamic policy service implementation system, specifically as shown in fig. 8, where the system includes at least one processor 81 and a memory 82;
a memory 810 for storing one or more program instructions;
a processor 820 configured to execute one or more program instructions to perform any method steps of the edge gateway dynamic policy service implementation method as described in the above embodiments.
Corresponding to the foregoing embodiment, an embodiment of the present invention further provides a chip, where the chip is coupled to a memory in the system, so that when the chip runs, the chip calls a program instruction stored in the memory, and implements the method for implementing a dynamic policy service of a base edge gateway as described in the foregoing embodiment.
Corresponding to the above embodiments, the present invention further provides a computer storage medium, where the computer storage medium includes one or more programs, where the one or more program instructions are used to be executed by the edge gateway dynamic policy service implementation system to implement the edge gateway dynamic policy service implementation method as described above.
According to the scheme provided by the application, the modes of dynamic strategy issuing and adding new functions, namely only generating a new script which can be directly executed by the edge gateway, strategy verification service and the like are adopted, so that the problems of low updating speed and iteration speed of the edge gateway and complex medium and small services are solved.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, it should be understood that the above embodiments are merely exemplary embodiments of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. An edge gateway dynamic policy service implementation device is characterized in that the device comprises an operation system module, a policy service module, a policy verification service module and an edge gateway; wherein the content of the first and second substances,
the operation system module is used for editing and recording the strategy;
the policy service module is used for translating the recorded policies into scripts for the edge gateway to directly execute;
the policy verification service module is used for verifying the md5 value sent by the edge gateway and is responsible for pushing the dynamic policy;
the edge gateway is used for interacting with the equipment according to the script corresponding to the pushed dynamic policy file;
the edge gateway comprises a strategy module, a digital signature module, a pull module and a drive registration module; wherein the content of the first and second substances,
the strategy module is embedded with script vm and directly executes when a new strategy is updated;
the digital signature module is used for recording the md5 signature of the service subfile;
the pull module is used for sending md5 signatures of all files to the policy verification service module by the edge gateway when an updated policy exists, calculating subfiles needing to be updated by the policy verification service module, and pushing the policy needing to be updated to the drive registration module;
and the drive registration module is used for enabling the edge gateway to interact with the equipment based on the updated new strategy.
2. The apparatus of claim 1, wherein the policy validation service module is specifically configured to check md5 values of md5 values of all files sent by the edge gateway, and if it is determined that the file is a new policy file, push the updated new policy to vm in the edge gateway for execution.
3. An edge gateway dynamic policy service implementation method for the edge gateway dynamic policy service implementation apparatus according to claim 1, the method comprising:
editing a new strategy;
translating the new policy into a script for direct execution by an edge gateway;
pushing the updated new strategy to the edge gateway;
the edge gateway sends md5 signatures of all policy files to the policy verification service module;
based on the md5 signature, the policy verification service module calculates the subfiles needing to be updated and pushes the new policies needing to be updated;
and enabling the edge gateway to interact with the equipment based on the script translated by the updated new strategy.
4. The method of claim 3, wherein the edge gateway further waits for a preset period of time before interacting with the device based on the updated new policy translated into the script.
5. The method according to claim 3, wherein based on the md5 signature, the policy verification service module calculates a subfile that needs to be updated and pushes a new policy that needs to be updated, specifically:
based on the md5 signature, the policy verification service module computes a difference set;
obtaining subfiles needing to be updated based on the difference set;
and pushing the updated new strategy based on the subfiles needing to be updated.
6. An edge gateway dynamic policy service implementation system, the system comprising at least one processor and a memory;
the memory to store one or more program instructions;
the processor is configured to execute one or more program instructions to perform the method of at least one of claims 3 to 5.
7. A chip, characterized in that the chip is coupled to a memory in a system such that the chip, when running, invokes program instructions stored in the memory implementing the method according to at least one of claims 3 to 5.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises one or more program instructions that are executable by the system of claim 6 to implement the method of at least one of claims 3 to 5.
CN202110271087.6A 2021-03-12 2021-03-12 Edge gateway, edge gateway dynamic policy service implementation method, device and system Active CN113037621B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110271087.6A CN113037621B (en) 2021-03-12 2021-03-12 Edge gateway, edge gateway dynamic policy service implementation method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110271087.6A CN113037621B (en) 2021-03-12 2021-03-12 Edge gateway, edge gateway dynamic policy service implementation method, device and system

Publications (2)

Publication Number Publication Date
CN113037621A CN113037621A (en) 2021-06-25
CN113037621B true CN113037621B (en) 2022-08-02

Family

ID=76470369

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110271087.6A Active CN113037621B (en) 2021-03-12 2021-03-12 Edge gateway, edge gateway dynamic policy service implementation method, device and system

Country Status (1)

Country Link
CN (1) CN113037621B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113904924A (en) * 2021-10-19 2022-01-07 吴枚兰 Efficient operation and maintenance method for local area network system of Internet of things

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933052A (en) * 2019-11-18 2020-03-27 杭州电子科技大学 Encryption and policy updating method based on time domain in edge environment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3030846C (en) * 2008-06-05 2022-03-15 Camiant, Inc. Method and system for providing mobility management in network
CN103677869B (en) * 2012-09-06 2017-10-10 中国科学院计算技术研究所 Wireless sensor network node remote-code-update system and method
US20140109176A1 (en) * 2012-10-15 2014-04-17 Citrix Systems, Inc. Configuring and providing profiles that manage execution of mobile applications
CN111131170A (en) * 2019-12-02 2020-05-08 西安交大捷普网络科技有限公司 Client policy processing method of host auditing system
CN111176723B (en) * 2019-12-31 2020-11-06 上海道客网络科技有限公司 Service grid and link version based service multi-version release system and method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933052A (en) * 2019-11-18 2020-03-27 杭州电子科技大学 Encryption and policy updating method based on time domain in edge environment

Also Published As

Publication number Publication date
CN113037621A (en) 2021-06-25

Similar Documents

Publication Publication Date Title
US9588752B2 (en) Performing unattended software installation
US9489189B2 (en) Dynamically generate and execute a context-specific patch installation procedure on a computing system
US7805707B2 (en) System and method for preparing runtime checks
US8397210B2 (en) Evolving the architecture of a software application
US8898627B2 (en) Systems and methods for applying rules to transform objects of an application
US8572566B2 (en) Systems and methods for analyzing changes in application code from a previous instance of the application code
US20110296391A1 (en) Systems and Methods for Dynamically Replacing Code Objects Via Conditional Pattern Templates
KR100918116B1 (en) SCA system, file parsing method and application create method thereof
US20160274870A1 (en) Design framework for an iot system
Prehofer et al. From internet of things mashups to model-based development
US8332356B2 (en) NFS agent upgrade
CN113037621B (en) Edge gateway, edge gateway dynamic policy service implementation method, device and system
CN106843995B (en) A kind of file compiling method and device
CN110399159A (en) Dispositions method, device, computer equipment and the storage medium of operating system
US8543975B2 (en) Behavior-first event programming model
US7376935B2 (en) Design-time system and method to enable programming assistance across languages and compilation boundaries
Stevens Connecting software build with maintaining consistency between models: towards sound, optimal, and flexible building from megamodels
CN111880804A (en) Application program code processing method and device
US7730468B1 (en) System and method providing on-demand generation of specialized executables
CN101571801A (en) Service expansion system and method
US11537418B2 (en) Simulated change of immutable objects during execution runtime
CN109086048A (en) Multiple modules individually issue the implementation method of AAR under a kind of Android client project
CN110673961A (en) Remote debugging method based on NFS service
WO2015196524A1 (en) Software upgrade processing method and device, terminal and server
CN113553068B (en) Method and device for downloading application package and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant