WO2020048194A1 - 用于在通用服务实体上进行任务处理的方法、通用服务实体、进行任务处理的装置和介质 - Google Patents
用于在通用服务实体上进行任务处理的方法、通用服务实体、进行任务处理的装置和介质 Download PDFInfo
- Publication number
- WO2020048194A1 WO2020048194A1 PCT/CN2019/093084 CN2019093084W WO2020048194A1 WO 2020048194 A1 WO2020048194 A1 WO 2020048194A1 CN 2019093084 W CN2019093084 W CN 2019093084W WO 2020048194 A1 WO2020048194 A1 WO 2020048194A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- request
- entity
- service entity
- resource list
- task processing
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5051—Service on demand, e.g. definition and deployment of services in real time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/08—Allotting numbers to messages; Counting characters, words or messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5019—Ensuring fulfilment of SLA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5058—Service discovery by the service manager
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/63—Routing a service request depending on the request content or context
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5019—Ensuring fulfilment of SLA
- H04L41/5022—Ensuring fulfilment of SLA by giving priorities, e.g. assigning classes of service
Definitions
- the present disclosure relates to the field of the Internet of Things, and in particular, to a method for performing task processing on a general service entity, a general service entity, a device and a medium for performing task processing.
- the Internet of Things uses local networks or communication technologies such as the Internet to connect sensors, controllers, machines, people, and objects in new ways, forming a connection between people and things, and between things.
- the Internet of Things technology in various application fields, more and more devices are connected to the Internet of Things.
- the task processing may be requesting authentication, notification, update, deletion, etc. to complete the authentication between the Internet of Things entities. , Scheduling, security management and other functions.
- a method for performing task processing on a general service entity including: receiving a request for task processing, determining whether the general service entity itself performs the task processing request, and determining itself If the task processing request is not executed, the request is forwarded to another general service entity, where the general service entity has an association relationship with the other general service entity; when it is determined that the task processing request is performed by itself Next, the general service entity executes the request processed by the task.
- a first resource list is stored in the universal service entity, and the first resource list includes information of all universal service entities associated with the universal service entity.
- the universal service entity determines whether other universal service entities in the first resource list meet the first standard, and moves the universal service entities that do not meet the first standard out of the first resource list, thereby updating the first List of resources.
- the general service entity determines whether the general service entity itself performs the task processing request based on at least one of its own computing capability, storage capability, and security level.
- the universal service entity stores the received request processed by the task into a request queue: when the number of requests included in the request queue is less than a first threshold, it determines that the request to perform the task processing itself, in When the number of requests included in the request queue is greater than or equal to the first threshold, it is determined that the request does not execute the task processing itself.
- the task processing request includes an authentication request: determining whether an entity sending the authentication request meets a second criterion, and storing information of the authenticated entity in a second resource list to update the second resource A list, sending an updated second resource list to a universal service entity in the first resource list, and sending an authentication identifier to an entity in the second resource list.
- the method for performing task processing on a universal service entity further includes removing entity information from the second resource list to update the second resource list; moving the second resource toward The list entity sends a notification message; and sends an updated second resource list to the universal service entity in the first resource list.
- the first standard and the second standard are determined based on at least one of a computing capability, a storage capability, and a security level.
- the universal service entity is configured to be able to manage entities in the first resource list and the second resource list.
- the task processing request further includes at least one of a creation request, an update request, an acquisition request, a notification request, and a deletion request.
- the method further includes: receiving a response corresponding to the request by the another general service entity, receiving data corresponding to the request from the requester, and The data is forwarded to the other general service entity, and the requester is sent the processing result corresponding to the request received from the other service subject.
- a universal service entity including: a receiving unit configured to receive a request for task processing; and a processing unit configured to determine whether the universal service entity itself performs the task processing request: When it is determined that it does not execute the task processing request, it forwards the request to another general service entity; when it determines that it performs the task processing request, the general service entity executes the task processing request, where , The universal service entity has an associated relationship with the other universal service entity.
- a first resource list is stored in the universal service entity, and the first resource list includes information of all universal service entities associated with the universal service entity, and the processing unit is further configured to determine the first Whether other general service entities in the resource list meet the first standard, and the general service entities that do not meet the first standard are removed from the first resource list, thereby updating the first resource list.
- the universal service entity determines whether to perform the task processing request based on at least one of its own computing capability, storage capability, and security level.
- the processing unit is further configured to store the received request for processing the task into a request queue, and when the number of requests included in the request queue is less than a first threshold, determine that it has performed the task processing itself. Requests; when the number of requests included in the request queue is greater than or equal to the first threshold, it is determined that it does not execute requests processed by the task.
- the task processing request includes an authentication request
- the processing unit is further configured to determine whether an entity sending the authentication request meets a second criterion, and store information of the authenticated entity in a second resource list, To update the second resource list; send an updated second resource list to a universal service entity in the first resource list; and send an authentication identifier to an entity in the second resource list.
- the processing unit is further configured to remove the information of the entity from the second resource list to update the second resource list; send a notification message to the entity removed from the second resource list; and The general service entity in the first resource list sends the updated second resource list.
- the processing unit is further configured to: in a case where it is determined that the processing is not performed, receive a response corresponding to the request by the other general service entity; and receive data corresponding to the request from the requester, The data is forwarded to the other general service entity; and the requester is sent the processing result corresponding to the request received from the other service subject.
- an apparatus for performing task processing including: one or more processors; and one or more memories in which computer-readable code is stored, where the computer-readable code is in The method for performing task processing on a general service entity as described above is performed when executed by the one or more processors.
- a computer storage medium in which computer-readable code is stored, which when executed by the one or more processors performs the above-mentioned method for Method for performing task processing on a general service entity.
- FIG. 1A shows a schematic diagram of a centralized block framework according to an embodiment of the present disclosure
- FIG. 1B shows a flowchart of a method for performing task processing on a universal service entity according to an embodiment of the present disclosure
- FIG. 2 illustrates a schematic diagram of a centralized block according to an embodiment of the present disclosure
- 3A and 3B illustrate a flowchart of task processing performed by a centralized block according to an embodiment of the present disclosure
- FIG. 5 illustrates a schematic diagram of an apparatus for performing task processing according to an embodiment of the present disclosure
- FIG. 6 shows a schematic block diagram of a universal service entity according to an embodiment of the present disclosure.
- a flowchart is used in this application to illustrate the steps of a method according to an embodiment of the application. It should be understood that the preceding or following steps are not necessarily performed in order. Instead, the steps can be processed in reverse order or simultaneously. At the same time, other actions can be added to or removed from these processes.
- the Internet of Things can be used as an extension of the Internet. It includes the Internet and all resources on the Internet and is compatible with all Internet applications. With the application of the Internet of Things technology in various fields, various new application fields such as smart home, intelligent transportation, and smart health have appeared.
- oneM2M entities are required to have certain computing and storage capabilities.
- different oneM2M entities have differences in their operational capabilities.
- the operating capability of the general service entity CSE may be strong, while the operating capability of some application entities AE may be weak.
- the operating capability of the CSE as a general service entity may be stronger than the physical AE such as a smart speaker, a rice cooker, and the like.
- entity described in this article may be an IoT terminal device, or may be a software module in the device.
- an entity with a stronger operational capability such as CSE
- an entity with a weaker operational capability such as AE
- the strong entity has a stronger running capability than the weak entity.
- an entity's ability to run can be judged based on its computing resources, network resources, storage resources, and security functions to determine whether the entity is a strong entity or a weak entity.
- an entity with a storage space of more than 10M can be implemented as a strong entity, and the remaining entities with a storage capacity of less than 10M can also be implemented as weak entities.
- 800M CPU which can support IPV6 (Internet Protocol Version 6)
- IPV6 Internet Protocol Version 6
- CSE functions can be efficiently run, and it can be used as a common general service entity CSE to perform the weak connection to it.
- the entity's task processing operations such as resource operations.
- the weak entity does not have the function to complete all resource management operations.
- these weak entities are simply used as common entities AE and connected to a common common service entity CSE, and all tasks related to them are implemented with the common CSE, the weak entity's own capacity will be wasted.
- the CSE function is completely run on such a weak entity, the implementation of the CSE function will also be limited by its own operating capabilities, resulting in slowing down the overall work efficiency of the system.
- the weak entity may be unable to complete operations on some sensitive data, or the speed of generating its own key is too slow, which will affect the operating efficiency of the weak entity itself and the operating efficiency of the overall system including the weak entity.
- the present disclosure provides a method for performing task processing on a general service entity.
- the common service entity CSE may be implemented by the strong entity described above.
- the centralized block may include a core block and a non-core block, the core block includes the strong entity, and the non-core block includes the weak entity.
- the strong entities in the core block can be managed by creating a first resource list, and the weak entities in the non-core block can be managed by creating a second resource list.
- the first resource list and the second resource list The entities in the resource list together form a centralized block.
- the centralized block may be a collection of entities within a certain range.
- FIG. 1A A schematic diagram of a centralized block according to an embodiment of the present disclosure is shown in FIG. 1A.
- a centralized block it can include strong entities with strong operating capabilities and weak entities with weak operating capabilities.
- general service entities can implement management functions for all entities in the centralized block.
- the universal service entity may be implemented by a strong entity with a strong computing capability in a core block.
- several strong entities can be simultaneously implemented as general service entities to achieve management functions for all entities.
- a first entity list and a second resource list are stored in a strong entity implemented as a general service entity CSE, and an association relationship between entities in the centralized block is established through the list.
- the first resource list has information of all strong entities included in the core block in the centralized block, for example, the strong entity 1CSE1 and the strong entity 2CSE2 shown in FIG. 1A.
- the universal service entity can implement task scheduling request scheduling. For example, upon receiving a request that it does not execute itself, the general service entity may forward the request to other strong entities (such as CSE1) in the first resource list to execute the request.
- the second resource list has information on weak entities included in non-core blocks in the centralized block, for example, weak entity 1AE1 and weak entity 2AE2 shown in FIG. 1A.
- the universal service entity can implement security management of entities within the centralized block.
- entities such as gateways, smart speakers, lamps, and rice cookers can be included.
- gateways and smart speakers with strong operating capabilities can be used as core block members, that is, as strong entities.
- the information of the gateway and the smart speaker may be stored in the first resource list to be associated with each other.
- the entities such as lamps and rice cookers in the smart home have weaker operating capabilities, they cannot complete the operation of some sensitive data, or the speed of generating their own keys is too slow.
- the operating capabilities of entities such as a capable gateway can complete the above processing tasks.
- Weak entities such as lamps and rice cookers in a smart home scene may be used as non-core block members, and information of the weak entities may be stored in a second resource list.
- the strong entity in the core block can be used as a general service entity for the weak entity in the non-core block to complete processing tasks related to the weak entity.
- the strong entity in the core block can also implement management of other strong entities in the core block, such as security authentication. Therefore, in this centralized block, the management and resource scheduling of all entities in the entire centralized block by the entities in the core block can be achieved, thereby improving the overall operating efficiency of the centralized block.
- FIG. 1B shows a flowchart of a method for performing task processing on a general service entity according to an embodiment of the present disclosure. The task processing method according to the embodiment of the present disclosure will be described in detail below with reference to FIG. 1B.
- the general service entity receives a request for task processing.
- the task processing request may include an authentication request, a creation request, an update request, an acquisition request, a notification request, a deletion request, and the like.
- the universal service entity may be any strong entity in the core block, such as CSE1.
- the task processing request may be issued by a weak entity in a non-core block in the same centralized block as the strong entity. For example, in the scenario of a smart home, when a weak entity needs to perform security authentication, it can send a security authentication request to a strong entity, which requests to use the strong entity to generate the authentication key of the weak entity, thereby obtaining Access to related data in the centralized block of the smart home.
- the general service entity CSE1 may determine whether it executes the request for task processing itself. For example, the general service entity CSE1 may determine whether it executes the received task processing request based on its own computing capability, storage capability, and security level. For example, in the centralized block of the smart home scenario, when the gateway receives an authentication request issued by a rice cooker that is a weak entity, the gateway may be processing a processing task requested by another weak entity, or the gateway It can judge the running capability required for this authentication request, and can determine whether it executes the authentication request itself according to its current computing capacity and storage capacity. For example, when the gateway determines that it takes a long time to complete the authentication request itself, it may affect the operating efficiency of the overall system.
- the gateway may determine that it does not execute the authentication request itself.
- the relationship between the running time and the running efficiency may be set artificially. For example, the gateway may be set. When it takes more than 1 minute to execute a processing task, it is determined that it does not perform the task itself. This time setting is only exemplary, and can be adjusted accordingly according to the specific scene in which the centralized block is located.
- the general service entity CSE1 forwards the request to another general service entity, such as CSE2.
- the general service entity CSE 1 has an association relationship with the other general service entity CSE 2.
- the common service entity CSE1 may store a resource list, and determine other common service entities CSEs associated with the resource list through the resource list.
- a strong entity 1 in the core block may forward the task request to other strong entities in the core block, such as strong entity 2, to request that the strong entity 2 process the task request.
- the information of the strong entity 1 and the strong entity 2 may be recorded together in the first resource list, and the strong entities in the centralized block all store the first resource list.
- the strong entity 1 may determine other strong entities that have an association relationship with the strong resource 1 by querying the first resource list, so as to forward the task request to the strong entity 2.
- Both the strong entity 1 and the strong entity 2 in the core block shown can be implemented as a common service entity CSE due to their strong operational capabilities.
- step S104 the general service entity CSE1 executes the task processing request.
- the request processed by the task is a resource operation, and the general service entity CSE1 judges that it is capable of performing the task processing request based on its remaining storage capacity and computing capacity, and then executes the request corresponding to the request Processing operations without forwarding requests for processing of this task to other general service entities such as CSE2.
- the present disclosure provides a method for managing the functions of an entity and a task processing mode based on the operating capabilities of the entity (including a general service entity and an application entity).
- a plurality of entities belonging to the same network may be divided into a centralized block, wherein the running capabilities of the plurality of entities are different, such as that the plurality of entities may include one or more Strong entities and one or more weak entities, etc.
- a strong entity capable of running all functions of the oneM2M architecture may be used as a core block entity member, for example, a common service entity CSE may be used as a core block entity.
- a weak entity with a weaker running capability can be represented as a non-core block member, for example, a general AE can be used as a non-core block entity.
- the core block may be implemented by means of group resources.
- information of entities in the core block may be stored in, for example, a member ID sequence of the ⁇ group> resource, thereby establishing associations between core block members.
- entities within the core block can also establish associations between core block members in the form of resource indexes.
- a gateway, a smart speaker, a lamp, a rice cooker, and the like belonging to the same network constitute a centralized block.
- a strong entity capable of running as a general service entity is represented as a core block member, and other entities with weaker operating capability than the strong entity are represented as non-core block members.
- Members in the core block are managed by a first resource list, and members in the non-core block are managed by a second resource list.
- the members in the core block all store the first resource list and the second resource list to receive requests for processing tasks of weak entities in the second resource list, and to determine that they do not perform the task processing requests themselves , The request is forwarded to other strong entities in the first resource list to complete the task processing.
- a strong entity in a centralized block can be implemented as a CSE to manage the task processing of the entire centralized block.
- the core block and non-core block members cooperate with each other to improve the operation efficiency of the entire centralized block and ensure the concentration. Stability and security within the block.
- FIG. 2 illustrates a schematic diagram of a centralized block according to an embodiment of the present disclosure.
- the OneM2M device group may include one or more centralized blocks, such as centralized block 1 and centralized block 2. Entities may be divided into core block or non-core block members in the centralized block.
- the common service entity CSE may serve as a core block member
- the weak entity may serve as a non-core block member.
- the core block in centralized block 1 may include the three general service entities represented by circles in the left dotted box
- the non-core block may include the three weak entities represented by triangles in the right dotted box. .
- the number of entities in the core block and the non-core block in the centralized block 2 may be the same as or different from the centralized block 1.
- the core block in the centralized block 2 may include the two general service entities represented by circles in the dotted box on the left, and the non-core block may include the triangles represented in the dotted box on the right. 4 weak entities.
- the weak entities in the centralized block can request the common service entity CSE in the core block to perform the corresponding task processing.
- the task processing may include entity authentication, entity authorization, and the like.
- the management positions of the universal service entities in the core block are equal, and other universal service entities belonging to the same core block can be managed.
- the universal service entity in the core block may store a first resource list, and the first resource list includes information of all universal service entities associated with the universal service entity.
- the first resource list stored in the general service entity CSE 1 includes information of the general service entity CSE 2.
- CSE1 can forward the request processed by this task to the general service entity CSE2.
- the information in the first resource list may include an identity of the general service entity, an operation capability, and the like, and may further include other information of the general service entity.
- the universal service entity in the core block not only needs to have strong computing power and storage capacity, etc., but also needs to have a high security level.
- the information in the first resource list corresponds to the information of the universal service entity included in the core block. After running for a period of time, each universal service entity in the resource list can update the information in the first resource list.
- the universal service entity may manage other entities in the first resource list.
- the management may, for example, periodically update information of entities in the first resource list.
- the management may further include an adding operation, such as assigning an authentication identifier to a new strong entity that has passed security verification, and adding the information of the entity to the first resource list.
- the management may further include a removal operation, for example, information of a strong entity that does not meet the security level may be removed from the first resource list.
- the universal service entity in the core block may determine whether other universal service entities in the first resource list meet the first standard, and move the universal service entities that do not meet the first standard out of the first resource. List, thereby updating the first resource list.
- the first criterion is used as a criterion for judging whether an entity has strong entity capabilities.
- the first criterion may be determined based on at least one of an entity's computing capability, storage capability, and security level. For example, the ability of an entity can be judged based on computing resources, network resources, storage resources, and security functions.
- an 800M CPU with strong storage capacity can be implemented as a strong entity in a centralized block.
- the general service entity in the core block not only needs to have strong computing power and storage capacity, etc., but also needs to have a higher security level.
- each universal service entity in the resource list may update the information in the first resource list, for example, removing information of universal service entities that do not meet the core block entity security standards from the first resource list.
- the time interval may be set based on the security requirements of the centralized block. For example, if the core block has higher security requirements for a strong entity therein, the time interval may be shortened .
- the time interval can also be set based on the business needs of the manager of the centralized block, and it changes as the demand changes, and there is no limitation on the time interval here.
- FIG. 3A and FIG. 3B show a flowchart of task processing performed by a centralized block according to an embodiment of the present disclosure.
- the strong entity in the core block can be implemented as a general service entity CSE1.
- CSE1 first determines whether it performs the task processing itself. For example, CSE1 may determine whether to execute the processing task based on its current status. For example, CSE1 can determine whether to execute the processing task based on its own CPU occupancy rate, bandwidth occupancy rate, and free storage space. If CSE1 determines that it has the ability to perform the task processing, it executes the task processing directly; if it determines that it does not perform the task processing, CSE1 sends the task to other common service entities CSE2 that belong to the core block. The request processed by the task. For example, as shown in FIG.
- the weak entity may send a task processing request to the general service entity CSE1.
- the request processed by the task may be a request using a CSE function.
- the request for using the CSE function may be a request sent by a weak entity to the CSE1 to request the CSE1 to perform the corresponding data processing, and the weak entity cannot perform the CSE function due to a limitation of its own running capability.
- the CSE1 can determine whether it processes the request processed by the task itself. According to the embodiment of the present disclosure, when the general service entity CSE1 receives a request for using the CSE function from an entity in a non-core block, it may store the received request in a request queue.
- the CSE1 can automatically adjust the assignment of task processing, for example, it can determine whether to process the request itself based on the number of requests in the request queue. For example, when the number of requests included in the request queue is less than the first threshold, it determines that the request itself performs the task processing; when the number of requests included in the request queue is greater than or equal to the first threshold, it determines itself The request processed by this task is not executed.
- the first threshold may be set based on the requirement of the centralized block for task processing efficiency. For example, if the centralized block has a higher requirement for the efficiency of task processing, a first threshold with a smaller value may be set.
- the first threshold value can be set to 3 (only for example). That is, when the gateway serving as CSE1 receives an authentication request, if it determines that the number of requests in its own request queue is greater than or equal to 3, for example, 5 (only exemplary), the CSE1 determines that it completes the The authentication processing request takes a long time, because the CSE1 still needs to process 5 outstanding requests in its own request queue before executing the authentication processing request. In this case, the CSE1 may determine that it does not execute the authentication request, and forward the authentication request to other general service entities CSE2, such as smart speakers, that belong to the same core block as the CSE1.
- CSE2 general service entities
- the universal service entity may also determine whether to execute the request according to the content of the request processed by the task. For example, if it is an authentication request, it is executed by itself, and if it is a request about updating data, it is forwarded.
- the general service entity in the core block can perform operation management and allocation according to the content of the request processed by the task. For example, in the centralized block of the smart home scene, it can be set that the gateway performs requests for authentication, addition, etc., and the smart speaker performs requests for data processing, etc. Therefore, after the gateway receives the data update request sent by the rice cooker, it can determine that it does not execute the request itself, and forward the request to the smart speaker. Similarly, when the smart speaker receives the request for authentication, it can determine that it does not execute the request itself and forward the request to the gateway.
- step S2 the CSE 1 determines that it can process the currently received request. Then in step S3, the CSE1 may send a response request to the weak entity, allowing it to use the CSE function. After receiving the response message, in step S4, the weak entity can put data into the message and use the CSE function of CSE1. In step S5, the CSE 1 performs a CSE function operation corresponding to the request. Finally, in step S6, the CSE1 processing is completed, and the processing result is returned to the weak entity.
- step S7 the weak entity requests the CSE 1 to use the CSE function.
- step S8 the CSE 1 may store the request in a message queue and determine the number of unprocessed requests in the message queue. For example, if the number of unprocessed requests exceeds the first threshold, the system may confirm the request. CSE1 does not execute the request itself. In order to avoid congestion of requests in CSE1, it is necessary to forward the request to other general service entities in the core block, for example, CSE2.
- CSE1 can forward the request to CSE2.
- the CSE1 may further determine a request to be forwarded based on the priority of the request in the request queue. For example, a request sent by an entity in a non-core block to the CSE has a priority attribute, such as a QOS (quality of service) parameter, which is used to identify the priority of the current request.
- the CSE1 can determine the order of processing each message according to the priority of these requests. For example, when CSE1 determines that the number of requests in the request queue exceeds the first threshold, it may forward the highest priority request in the request queue to the idle CSE2.
- CSE1 and CSE2 belong to the same core block. For example, CSE1 can confirm the member CSE2 that belongs to the same core block through the first resource list.
- step S10 CSE2 determines that it can handle the request, and responds to CSE1 with a request to allow the use of the CSE function at step S11.
- the CSE 1 may send the information that the CSE 2 allows the CSE function to be used to the weak entity as the requester.
- step S13 the weak entity puts data into the message to use the CSE function.
- step S14 CSE1 forwards the data to CSE2 after receiving it.
- step S15 CSE2 allows the weak entity to use its CSE function to perform CSE function operations, and sends the processing result to CSE1 in step S16.
- step S17 CSE1 forwards the processing result to the weak entity of the requester.
- the centralized block includes a core block and a non-core block.
- the core block may include a strong entity with strong processing capability, and the strong entity may be implemented as a general service entity to provide CSE functions to other entities.
- the non-core blocks may include weak entities with weaker processing capabilities.
- the entities in the core block can manage all entities in the centralized block and process task requests that cannot be processed by the weak entities in the non-core block or are time-consuming.
- the core block and the non-core block cooperate with each other to complete the tasks in the centralized block, and the task scheduling is performed automatically by the request shown in FIG. 3B above, so that the task requirements of the entire centralized block do not pile up, thereby improving the concentration Block processing power and efficiency.
- each communication between the initiator and receiver requires registration of the corresponding resource and the declared version of the OneM2M resource on both sides, and then these resources will be synchronized to the remote resource declaration after the local change Version to implement data submission. Therefore, during these message passing processes, an identity authentication process is performed first, and a data encryption and decryption process may also be included.
- the task processing request may further include an authentication request, that is, an entity in a non-core block sends an authentication request to a general service entity in the core block to obtain an authentication identifier, and the authentication identifier is passed.
- the entity can communicate with other entities in the centralized block without having to authenticate again.
- FIG. 4 shows a flowchart of performing an authentication request according to an embodiment of the present disclosure.
- the entities in the core block may include gateways and smart speakers, and the entities in the non-core blocks may include lamps and rice cookers.
- a rice cooker may send a request for authentication to a smart speaker, which determines that it can perform an authentication request for a rice cooker by itself based on its own computing space, and then it directly processes the authentication request.
- the smart speaker determines whether the entity that sent the authentication request, that is, the rice cooker, meets the second criterion. If so, it can be considered that the rice cooker has passed the safety certification, and the information of the certified rice cooker is stored in the second resource list. Updating the second resource list.
- the second resource list may also be referred to as a white list, in which information about entities that have passed security authentication in a non-core block is stored. Then, the smart speaker may send the updated second resource list to other universal service entities in the first resource list, and send an authentication identifier to the rice cooker.
- the rice cooker can communicate with other entities in the centralized block according to the authentication ID. Specifically, a "token resource" can be created in the rice cooker to identify that it has passed the authentication, which means that it meets the security standards.
- the second standard is used as a criterion for judging whether an entity is secure, and the universal service entity may determine the second standard based on a security level of a weak entity.
- the second resource list may have information about all authenticated entities in the centralized block, that is, it may include both strong entities in the core block and weak entities in non-core blocks. Information. In this way, a strong entity that is a general service entity can manage all the security entities in the centralized block through the second resource list.
- information of the core block entity may exist in the second resource list by default. In other words, in the centralized block of the smart home, the strong entity in the core block associated with the first resource list defaults to a security certification standard (such as a second standard) that complies with the second resource list.
- the smart speaker determines that it does not execute the authentication request based on its insufficient computing space.
- the smart speaker can then forward the authentication request to a gateway that belongs to the same core block as the smart speaker.
- the smart speaker may optionally forward a higher priority request in its request queue to the gateway for processing.
- the gateway may process the authentication request, and if it is determined that the lamp meets the second criterion, the information of the lamp is added to the second resource list.
- the smart speaker forwards the authentication identification to the lamp to identify that it has passed the authentication.
- the smart speaker or gateway may determine the second standard based on at least one of a computing capability, a storage capability, and a security level. For example, in the authentication request, the security level of a non-core entity can be evaluated, and an authentication mark is only sent to the entity that meets the security level standard to maintain the overall security of the system.
- the universal service entity in the core block can also manage the entity in the second resource list.
- the information of the rice cooker may be periodically removed from the second resource list to Updating the second resource list. For example, after a period of time, the rice cooker will again verify whether the rice cooker meets the second standard, and if it does not, then remove it from the second resource list. Then, the smart speaker may send a notification message to the entity that has moved out of the second resource list, that is, the rice cooker, and send an updated second resource list to the universal service entity in the first resource list. For example, in a centralized block of a smart home, a smart speaker as a general service entity may implement a regular update process of information in the second resource list.
- the weak entity passed the security authentication by sending an authentication request to the smart speaker, and has a token resource for communicating with other entities. After 10 days (only for example), the smart speaker can automatically send the weak speaker The entity's information is removed from the second resource list and the validity of the token resource is released.
- an entity in the non-core block may receive a notification message from a smart speaker to move its information out of the second resource list. After receiving the notification message, the rice cooker may send an authentication request to the universal service entity in the first resource list to obtain the authentication identifier again.
- the weak entity needs to send a security authentication request to the smart speaker again. If the smart speaker determines that the weak entity does not meet the second criterion at this time, it does not pass the entity's authentication request. In this way, the security management function in the centralized block can be implemented to prevent leakage of sensitive data, thereby ensuring the security and stability of the entire centralized block.
- the universal service entity in the core block may also change the second standard according to changes in the management requirements of the centralized block.
- the cooperation between core blocks and non-core blocks can effectively improve the efficiency of system operation, and give full play to the operating capabilities of weak entities. Strong entities to perform tasks that they cannot achieve or take a long time (such as the operation of sensitive data or too slow to generate their own keys).
- the general service entities in the core block can also cooperate with each other to automatically schedule tasks to effectively avoid problems such as task request blocking. In this way, the individual's operating speed and the overall system's operating efficiency are greatly improved.
- FIG. 5 shows a schematic diagram of an apparatus for performing task processing according to an embodiment of the present disclosure.
- the apparatus 500 may include one or more processors 501 and one or more memories 502. Wherein, the processor 501 stores computer-readable code, which, when executed by the one or more processors, can perform the task processing on the general service entity as described above. The method is not repeated here.
- FIG. 6 shows a schematic block diagram of the universal service entity 600 according to an embodiment of the present disclosure.
- the universal service entity may include a receiving unit 601 and a processing unit 602.
- the receiving unit 601 may be configured to receive a request for task processing.
- the processing unit 602 may be configured to determine whether the general service entity itself performs the task processing request: if it determines that it does not perform the task processing request, forward the request to another general service entity; after determining itself
- the universal service entity executes the task processing request, wherein the universal service entity has an association relationship with the other universal service entity. For example, an association relationship between the universal service entity and another universal service entity may be established through a resource list.
- the universal service entity 600 stores a first resource list, and the first resource list includes information of all universal service entities associated with the universal service entity.
- the processing unit 602 may be further configured to determine whether other general service entities in the first resource list meet the first standard, and move general service entities that do not meet the first standard out of the first resource list, thereby updating the first resource. List.
- the universal service entity 600 determines whether to perform the task processing request based on at least one of its own computing capability, storage capability, and security level. For example, in the centralized block of the smart home scenario, when the gateway receives an authentication request issued by a rice cooker that is a weak entity, the gateway may be processing a processing task requested by another weak entity, or the gateway It can judge the running capability required for this authentication request, and can determine whether it executes the authentication request itself according to its current computing capacity and storage capacity.
- the processing unit 602 may be further configured to store the received request processed by the task into a request queue, and determine that it executes the task when the number of requests included in the request queue is less than the first threshold. Requests processed; when the number of requests included in the request queue is greater than or equal to the first threshold, it is determined that it does not execute requests processed by the task.
- the first threshold may be set based on the requirements of the centralized block for task processing efficiency, and details are not described herein again.
- the request for task processing may include an authentication request.
- the processing unit 602 may be further configured to determine whether the entity sending the authentication request meets the second criterion, and store the information of the authenticated entity in the second resource list, To update the second resource list; send an updated second resource list to a universal service entity in the first resource list; and send an authentication identifier to an entity in the second resource list.
- the processing unit 602 may be further configured to remove the information of the entity from the second resource list to update the second resource list; send a notification message to the entity removed from the second resource list; and Sending the updated second resource list to the universal service entity in the first resource list.
- the strong entities in the core block can be managed by creating a first resource list
- the weak entities in the non-core block can be managed by creating a second resource list.
- the resource list and the entities in the second resource list together form a centralized block.
- the centralized block is a collection of entities within a certain range.
- the processing unit 602 may be further configured to: receive a response corresponding to the request from the other general service entity when it is determined that the processing is not performed by itself; and receive a response corresponding to the request from the requester Data, which is forwarded to the other general service entity; and sends to the requesting party the processing result corresponding to the request received from the other service subject.
- a centralized block-type task processing method can be realized, and the cooperation between core blocks and non-core blocks can effectively improve the operating efficiency in the centralized block, and give full play to the weak entity's own operating capabilities
- a strong entity such as a general service entity
- it can achieve tasks that it cannot achieve or take a long time (such as the operation of sensitive data or the speed of generating its own key is too slow).
- the general service entities in the core block can also cooperate with each other to automatically schedule tasks to effectively avoid problems such as task request blocking. In this way, the individual's operating speed and the overall system's operating efficiency are greatly improved.
- a computer storage medium stores computer readable code, and when the computer readable code is executed by one or more processors, the method for performing task processing on a general service entity as described above can be performed. , Will not repeat them here.
- the present disclosure provides a method for managing a large-scale oneM2M architecture in a centralized block manner.
- the centralized block may include a core block and a non-core block.
- the core block may include a strong entity with a strong running capability.
- the strong entity may be implemented as a general service entity that performs a task request of other entities.
- the non-core block May include weak entities with weaker operational capabilities.
- a method for task processing on a general service entity is proposed, which includes: the general service entity may receive a request for task processing from a non-core block entity; and determine whether the general service entity itself performs the task processing.
- Request if it is determined that it does not execute the task processing request, it forwards the request to another universal service entity that has an association relationship with the universal service entity; in the case of determining itself request to perform the task processing, the request The general service entity itself executes the request processed by the task.
- the universal service entity performs the task processing method described above, and the core block entity and the non-core block cooperate with each other to efficiently run task management in the entire centralized block.
- the core block may include a strong entity with a strong operating capability
- the strong entity may be implemented as a general service entity to provide CSE functions to other entities
- the non-core block may include a weaker processing capability. Weak entities, the strong entities have stronger operation capabilities than the weak entities.
- the weak entity in the non-core block may send a task request to a strong entity implemented as a general service entity in the core block, and use the strong processing capability of the general service entity to solve task processing that the weak entity does not perform, such as the weak
- the computing power of the entity cannot process or take a long task request.
- the general service entity may also determine whether to perform processing corresponding to the request based on its current capabilities. To avoid request congestion or optimize task processing flow, the general service entity may The received request is forwarded to other idle general service entities in the core block to implement task scheduling between core block members.
- the core block members can also manage the entities in the entire centralized block. For example, they can send authentication identifiers to non-core block entities to improve the security level of the centralized block. Utilizing the method for task processing according to the present disclosure can greatly improve the operating efficiency of the overall system and the operating speed of each entity.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (20)
- 一种用于在通用服务实体上进行任务处理的方法,包括:接收进行任务处理的请求,确定该通用服务实体自身是否执行该任务处理的请求,在确定自身不执行该任务处理的请求的情况下,将该请求转发给另一通用服务实体,其中,该通用服务实体与该另一通用服务实体具有关联关系;在确定自身执行该任务处理的请求的情况下,该通用服务实体执行该任务处理的请求。
- 根据权利要求1所述的方法,其中,在该通用服务实体中存储有第一资源名单,该第一资源名单中包含与该通用服务实体相关联的所有通用服务实体的信息。
- 根据权利要求1或2所述的方法,其中,该通用服务实体确定第一资源名单中的其他通用服务实体是否满足第一标准,并且将不满足第一标准的通用服务实体移出所述第一资源名单,从而更新第一资源名单。
- 根据权利要求1-3中任一项所述的方法,其中,该通用服务实体基于自身的运算能力、存储能力和安全等级中的至少一种来确定该通用服务实体自身是否执行该任务处理的请求。
- 根据权利要求1-4中任一项所述的方法,还包括:该通用服务实体将接收到的该任务处理的请求存入请求队列:在请求队列中包括的请求的数目小于第一阈值时,确定其自身执行该任务处理的请求,在请求队列中包括的请求的数目大于或等于该第一阈值时,确定其自身不执行该任务处理的请求。
- 根据权利要求2所述的方法,其中,所述任务处理的请求包括认证请求,所述方法还包括:确定发送该认证请求的实体是否满足第二标准,将通过认证的实体的信息存入第二资源名单,以更新所述第二资源名单,向所述第一资源名单中的通用服务实体发送更新的第二资源名单,向第二资源名单中的实体发送认证标识。
- 根据权利要求6所述的方法,还包括,从所述第二资源名单中移出实体的信息,以更新所述第二资源名单;向移出第二资源名单的实体发送通知消息;和向所述第一资源名单中的通用服务实体发送更新的第二资源名单。
- 根据权利要求3或6所述的方法,其中,基于运算能力、存储能力和安全等级中的至少一种来确定所述第一标准或第二标准。
- 根据权利要求1-8中任一项所述的方法,其中,所述通用服务实体配置成能够对所述第一资源名单或第二资源名单中的实体进行管理。
- 根据权利要求6所述的方法,其中,所述任务处理的请求还包括创建请求、更新请求、获取请求、通知请求、删除请求中的至少一种。
- 根据权利要求1-10中任一项所述的方法,其中,在确定自身不执行该处理的情况下,所述方法还包括:接收该另一通用服务实体对应于该请求的回应,从请求方接收对应于该请求的数据,将该数据转发给该另一通用服务实体,向请求方发送从该另一服务主体接收的对应于该请求的处理结果。
- 一种通用服务实体,包括:接收单元,配置成接收进行任务处理的请求;处理单元,配置成确定该通用服务实体自身是否执行该任务处理的请求:在确定自身不执行该任务处理的请求的情况下,将该请求转发给另一通用服务实体;在确定自身执行该任务处理的请求的情况下,该通用服务实体执行该任务处理的请求,其中,该通用服务实体与该另一通用服务实体具有关联关系。
- 根据权利要求12所述的通用服务实体,其中,该通用服务实体中存储有第一资源名单,该第一资源名单中包含与该通用服务实体相关联的所有通用服务实体的信息,所述处理单元还配置成确定第一资源名单中的其他通用服务实体是否满足第一标准,并且将不满足第一标准的通用服务实体移出所述第一资源名单,从而更新第一资源名单。
- 根据权利要求12或13所述的通用服务实体,其中,该通用服务实体基于自身的运算能力、存储能力和安全等级中的至少一种来确定其自身是否执行该任务处理的请求。
- 根据权利要求12-14中任一项所述的通用服务实体,所述处理单元还配置成将接收到的该任务处理的请求存入请求队列,在请求队列中包括的请求的数目小于第一阈值时,确定其自身执行该任务处理的请求;在请求队列中包括的请求的数目大于或等于该第一阈值时,确定其自身不执行该任务处理的请求。
- 根据权利要求12-15中任一项所述的通用服务实体,其中,所述任务处理的请求包括认证请求,所述处理单元还配置成确定发送该认证请求的实体是否满足第二标准,将通过认证的实体的信息存入第二资源名单,以更新所述第二资源名单;向所述第一资源名单中的通用服务实体发送更新的第二资源名单;以及向第二资源名单中的实体发送认证标识。
- 根据权利要求16所述的通用服务实体,所述处理单元还配置成从所述第二资源名单中移出实体的信息,以更新所述第二资源名单;向移出第二资源名单的实体发送通知消息;和向所述第一资源名单中的通用服务实体发送更新的第二资源名单。
- 根据权利要求12-17中任一项所述的通用服务实体,其中,所述处理单元还配置成:在确定自身不执行该处理的情况下,接收该另一通用服务实体对应于该请求的回应;从请求方接收对应于该请求的数据,将该数据转发给该另一通用服务实体;向请求方发送从该另一服务主体接收的对应于该请求的处理结果。
- 一种用于进行任务处理的装置,包括:一个或多个处理器;一个或多个存储器,其中存储了计算机可读代码,所述计算机可读代码在由所述一个或多个处理器执行时进行如权利要求1-11中任一项所述的方法。
- 一种计算机存储介质,其中存储有计算机可读代码,所述计算机可读代码在由一个或多个处理器执行时进行如权利要求1-11中任一项所述的方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/272,539 US11700189B2 (en) | 2018-09-04 | 2019-06-26 | Method for performing task processing on common service entity, common service entity, apparatus and medium for task processing |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811022263.7 | 2018-09-04 | ||
CN201811022263.7A CN110875945B (zh) | 2018-09-04 | 2018-09-04 | 用于在通用服务实体上进行任务处理的方法、装置和介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020048194A1 true WO2020048194A1 (zh) | 2020-03-12 |
Family
ID=69716770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/093084 WO2020048194A1 (zh) | 2018-09-04 | 2019-06-26 | 用于在通用服务实体上进行任务处理的方法、通用服务实体、进行任务处理的装置和介质 |
Country Status (3)
Country | Link |
---|---|
US (1) | US11700189B2 (zh) |
CN (1) | CN110875945B (zh) |
WO (1) | WO2020048194A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110971533B (zh) * | 2018-09-30 | 2023-02-03 | 京东方科技集团股份有限公司 | 用于数据通信的方法、服务器装置、客户端装置和介质 |
CN116250219A (zh) * | 2020-08-04 | 2023-06-09 | 北京大学深圳研究生院 | 一种面向网内算力或资源服务的通信方法 |
CN114417870B (zh) * | 2021-11-30 | 2024-06-21 | 北京天融信网络安全技术有限公司 | 一种安全实体的检测方法、装置、电子设备及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015096012A1 (zh) * | 2013-12-23 | 2015-07-02 | 华为终端有限公司 | 一种会话处理方法及设备 |
WO2015106382A1 (zh) * | 2014-01-14 | 2015-07-23 | 华为技术有限公司 | 一种服务质量的协商方法、设备及系统 |
CN105516271A (zh) * | 2015-11-30 | 2016-04-20 | 电子科技大学 | 业务处理系统、业务处理方法及装置 |
CN108075908A (zh) * | 2016-11-11 | 2018-05-25 | 京东方科技集团股份有限公司 | 处理操作请求的方法及装置 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2110732A3 (en) * | 1995-02-13 | 2009-12-09 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
CN101009640B (zh) * | 2005-11-05 | 2011-04-06 | 华为技术有限公司 | 服务网络中网关间业务转发的方法及其服务网关 |
CN103023935B (zh) * | 2011-09-23 | 2018-06-26 | 中兴通讯股份有限公司 | M2m平台云系统及其处理m2m服务的方法 |
CN103516744A (zh) * | 2012-06-20 | 2014-01-15 | 阿里巴巴集团控股有限公司 | 一种数据处理的方法和应用服务器及集群 |
KR20150063906A (ko) * | 2013-11-29 | 2015-06-10 | 주식회사 케이티 | M2m 환경에서 사용 가능한 장치를 검색하는 방법 및 장치 |
CN107567006A (zh) * | 2016-06-30 | 2018-01-09 | 中兴通讯股份有限公司 | M2m应用的信息方法、cse及ae |
-
2018
- 2018-09-04 CN CN201811022263.7A patent/CN110875945B/zh active Active
-
2019
- 2019-06-26 US US17/272,539 patent/US11700189B2/en active Active
- 2019-06-26 WO PCT/CN2019/093084 patent/WO2020048194A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015096012A1 (zh) * | 2013-12-23 | 2015-07-02 | 华为终端有限公司 | 一种会话处理方法及设备 |
WO2015106382A1 (zh) * | 2014-01-14 | 2015-07-23 | 华为技术有限公司 | 一种服务质量的协商方法、设备及系统 |
CN105516271A (zh) * | 2015-11-30 | 2016-04-20 | 电子科技大学 | 业务处理系统、业务处理方法及装置 |
CN108075908A (zh) * | 2016-11-11 | 2018-05-25 | 京东方科技集团股份有限公司 | 处理操作请求的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN110875945A (zh) | 2020-03-10 |
US11700189B2 (en) | 2023-07-11 |
CN110875945B (zh) | 2023-05-09 |
US20210328887A1 (en) | 2021-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108769150B (zh) | 区块链网络的数据处理方法、装置、集群节点和存储介质 | |
JP7432686B2 (ja) | ブロックチェーンネットワークにおける効率的な伝播のための確率的リレー | |
US20160072843A1 (en) | Policy-Based Control Layer in a Communication Fabric | |
WO2020048194A1 (zh) | 用于在通用服务实体上进行任务处理的方法、通用服务实体、进行任务处理的装置和介质 | |
US11252196B2 (en) | Method for managing data traffic within a network | |
US20200177473A1 (en) | Network component management method and network device | |
JP2018509827A (ja) | アクセスポイントステアリング | |
US9960998B2 (en) | Forwarding packet in stacking system | |
WO2018219148A1 (zh) | 一种管理传输网切片的方法、装置及系统 | |
WO2019196451A1 (zh) | 无线多联机系统的组网方法和装置 | |
CN111953655B (zh) | 一种通信系统中服务器响应请求消息的方法及设备 | |
WO2021115270A1 (zh) | 一种边缘应用的管理方法及装置 | |
US10511494B2 (en) | Network control method and apparatus | |
CN109981462B (zh) | 一种报文处理方法及装置 | |
WO2023197529A1 (zh) | 针对输电线路的在线监测系统、方法、装置和主站 | |
WO2020258099A1 (zh) | 配置物联网设备的方法和物联网设备 | |
WO2016139911A1 (ja) | 情報処理装置、情報処理方法及びプログラムを格納した非一時的なコンピュータ可読媒体 | |
US8730811B2 (en) | Managing network traffic | |
CN107959584B (zh) | 信息配置方法及装置 | |
US11546251B2 (en) | System and method for securing communication between devices on a network with multiple access points | |
CN111917683B (zh) | 安全交互方法、计算节点、控制中心、云平台及存储介质 | |
CN110933591B (zh) | 认证方法、设备及系统 | |
WO2024093640A1 (zh) | 配置网络方法和设备 | |
WO2023080278A1 (en) | Whitelisting security method and system for iot-based multi-framework smart lighting system | |
CN114616564A (zh) | 用于保护虚拟无线基站的网络的基于区块链的方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19857413 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19857413 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19857413 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18/06/2021) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19857413 Country of ref document: EP Kind code of ref document: A1 |