WO2024021088A1 - 设备管理方法、网络设备和物联网设备 - Google Patents
设备管理方法、网络设备和物联网设备 Download PDFInfo
- Publication number
- WO2024021088A1 WO2024021088A1 PCT/CN2022/109165 CN2022109165W WO2024021088A1 WO 2024021088 A1 WO2024021088 A1 WO 2024021088A1 CN 2022109165 W CN2022109165 W CN 2022109165W WO 2024021088 A1 WO2024021088 A1 WO 2024021088A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- internet
- things
- things device
- message
- authorization
- Prior art date
Links
- 238000007726 management method Methods 0.000 title claims abstract description 84
- 238000000034 method Methods 0.000 claims abstract description 178
- 238000013475 authorization Methods 0.000 claims description 202
- 235000008331 Pinus X rigitaeda Nutrition 0.000 claims description 82
- 235000011613 Pinus brutia Nutrition 0.000 claims description 82
- 241000018646 Pinus brutia Species 0.000 claims description 82
- 230000008569 process Effects 0.000 claims description 52
- 230000004044 response Effects 0.000 claims description 49
- 230000015654 memory Effects 0.000 claims description 32
- 238000004590 computer program Methods 0.000 claims description 24
- 238000004891 communication Methods 0.000 description 53
- 238000010586 diagram Methods 0.000 description 23
- 230000006870 function Effects 0.000 description 22
- 238000001228 spectrum Methods 0.000 description 11
- 230000011664 signaling Effects 0.000 description 9
- 230000003993 interaction Effects 0.000 description 6
- 230000007774 longterm Effects 0.000 description 5
- 238000010295 mobile communication Methods 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 230000002776 aggregation Effects 0.000 description 2
- 238000004220 aggregation Methods 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 240000005020 Acaciella glauca Species 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000010187 selection method Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/30—Control
Definitions
- the present application relates to the field of communications, and more specifically, to a device management method, network equipment and Internet of Things equipment.
- PIN Personal IoT Network
- PINE Personal IoT Device with Management Capability
- PIN Element the signaling interaction between PEMC and other remotely deployed personal IoT devices
- PINE PIN Element
- 5G core network which increases the signaling interaction delay.
- multiple PEMCs need to be deployed in PIN to support the needs of multiple managers.
- the embodiment of the present application provides a device management method, which can manage the operation of Internet of Things devices.
- An embodiment of the present application provides a device management method, including: a first network device sending a first message to a first Internet of Things device, where the first message is used to instruct the operation of the first Internet of Things device.
- An embodiment of the present application provides a device management method, including: a first Internet of Things device receiving a first message, where the first message is used to instruct an operation of the first Internet of Things device.
- Embodiments of the present application provide a device management method, including: the third Internet of Things device sends an authorization success indication or an authorization failure indication for the operation of the first Internet of Things device.
- Embodiments of the present application provide a device discovery method, including: a fourth Internet of Things device receives an Internet of Things device discovery response, and the Internet of Things device discovery response carries information about all or part of the Internet of Things devices in the Internet of Things.
- An embodiment of the present application provides a network device, including: a first sending module, configured to send a first message to a first Internet of Things device, where the first message is used to instruct the operation of the first Internet of Things device.
- An embodiment of the present application provides an Internet of Things device, including: a fourth receiving module configured to receive a first message, where the first message is used to instruct the operation of the Internet of Things device.
- An embodiment of the present application provides an Internet of Things device, including: a fifth sending module, configured to send an authorization success indication or an authorization failure indication for the operation of the first Internet of Things device.
- An embodiment of the present application provides a fourth Internet of Things device, including: a seventh receiving module, configured to receive an Internet of Things device discovery response, where the Internet of Things device discovery response carries information about all or part of the Internet of Things devices in the Internet of Things.
- An embodiment of the present application provides a device, including a processor, a memory, and a transceiver.
- the memory is used to store computer programs
- the processor is used to call and run the computer programs stored in the memory, and control the transceiver so that the device performs the above method.
- An embodiment of the present application provides a chip for implementing the above method.
- the chip includes: a processor, configured to call and run a computer program from a memory, so that the device installed with the chip executes the above method.
- Embodiments of the present application provide a computer-readable storage medium for storing a computer program, which when the computer program is run by a device, causes the device to perform the above method.
- An embodiment of the present application provides a computer program product, which includes computer program instructions, and the computer program instructions cause a computer to execute the above method.
- An embodiment of the present application provides a computer program that, when run on a computer, causes the computer to execute the above method.
- the operation of the Internet of Things device can be managed by sending the first network device to the first Internet of Things device a first message for managing its operation.
- Figure 1 is a schematic diagram of an application scenario according to an embodiment of the present application.
- Figure 2A is a PIN diagram.
- Figure 2B is a flow diagram of PIN management.
- Figure 3 is a schematic flow chart of a device management method 300 according to an embodiment of the present application.
- Figure 4 is an implementation flow chart of specific embodiment 1 of the present application.
- Figure 5 is an implementation flow chart of the second specific embodiment of the present application.
- Figure 6 is an implementation flow chart of the third specific embodiment of the present application.
- Figure 7 is an implementation flow chart of the fourth specific embodiment of the present application.
- Figure 8 is an implementation flow chart of the fifth specific embodiment of the present application.
- Figure 9 is an implementation flow chart of the sixth specific embodiment of the present application.
- Figure 10 is an implementation flow chart of the seventh specific embodiment of the present application.
- Figure 11 is a schematic flow chart of a device management method 1100 according to an embodiment of the present application.
- Figure 12 is a schematic flow chart of a device management method 1200 according to an embodiment of the present application.
- Figure 13 is a schematic flowchart of a device discovery method 1300 according to an embodiment of the present application.
- Figure 14 is a schematic block diagram of a network device 1400 according to an embodiment of the present application.
- Figure 15 is a schematic block diagram of a network device 1500 according to an embodiment of the present application.
- Figure 16 is a schematic block diagram of an Internet of Things device 1600 according to an embodiment of the present application.
- Figure 17 is a schematic block diagram of an Internet of Things device 1700 according to an embodiment of the present application.
- Figure 18 is a schematic block diagram of an Internet of Things device 1800 according to an embodiment of the present application.
- Figure 19 is a schematic block diagram of an Internet of Things device 1900 according to an embodiment of the present application.
- Figure 20 is a schematic block diagram of an Internet of Things device 2000 according to an embodiment of the present application.
- Figure 21 is a schematic block diagram of an Internet of Things device 2100 according to an embodiment of the present application.
- Figure 22 is a schematic structural diagram of a communication device 2200 according to an embodiment of the present application.
- Figure 23 is a schematic structural diagram of a chip 2300 according to an embodiment of the present application.
- GSM Global System of Mobile communication
- CDMA Code Division Multiple Access
- WCDMA broadband code division multiple access
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- LTE-A Advanced long term evolution
- NR New Radio
- NTN Non-Terrestrial Networks
- UMTS Universal Mobile Telecommunication System
- WLAN Wireless Local Area Networks
- WiFi wireless fidelity
- 5G fifth-generation communication
- the communication system in the embodiment of the present application can be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, or a standalone (Standalone, SA)Network scene.
- Carrier Aggregation, CA Carrier Aggregation, CA
- DC Dual Connectivity
- SA Standalone
- the communication system in the embodiment of the present application can be applied to unlicensed spectrum, where the unlicensed spectrum can also be considered as shared spectrum; or, the communication system in the embodiment of the present application can also be applied to licensed spectrum , among which, licensed spectrum can also be considered as non-shared spectrum.
- the embodiments of this application describe various embodiments in combination with network equipment and terminal equipment.
- the terminal equipment may also be called user equipment (User Equipment, UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
- User Equipment User Equipment
- the terminal device can be a station (ST) in the WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, or a personal digital processing unit.
- ST station
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- the terminal device can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; it can also be deployed on water (such as ships, etc.); it can also be deployed in the air (such as aircraft, balloons and satellites). superior).
- the terminal device may be a mobile phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (Virtual Reality, VR) terminal device, or an augmented reality (Augmented Reality, AR) terminal.
- Equipment wireless terminal equipment in industrial control, wireless terminal equipment in self-driving, wireless terminal equipment in remote medical, wireless terminal equipment in smart grid , wireless terminal equipment in transportation safety, wireless terminal equipment in smart city, or wireless terminal equipment in smart home, etc.
- the terminal device may also be a wearable device.
- Wearable devices can also be called wearable smart devices. It is a general term for applying wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes, etc.
- a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not just hardware devices, but also achieve powerful functions through software support, data interaction, and cloud interaction.
- wearable smart devices include full-featured, large-sized devices that can achieve complete or partial functions without relying on smartphones, such as smart watches or smart glasses, and those that only focus on a certain type of application function and need to cooperate with other devices such as smartphones.
- the network device may be a device used to communicate with mobile devices.
- the network device may be an access point (Access Point, AP) in WLAN, or a base station (Base Transceiver Station, BTS) in GSM or CDMA.
- BTS Base Transceiver Station
- it can be a base station (NodeB, NB) in WCDMA, or an evolutionary base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and an NR network network equipment (gNB) or network equipment in the future evolved PLMN network or network equipment in the NTN network, etc.
- AP Access Point
- BTS Base Transceiver Station
- NodeB, NB base station
- Evolutional Node B, eNB or eNodeB evolution base station
- gNB NR network network equipment
- the network device may have mobile characteristics, for example, the network device may be a mobile device.
- the network device can be a satellite or balloon station.
- the satellite can be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geosynchronous orbit (geostationary earth orbit, GEO) satellite, a high elliptical orbit (High Elliptical Orbit, HEO) satellite ) satellite, etc.
- the network device may also be a base station installed on land, water, etc.
- network equipment can provide services for a cell, and terminal equipment communicates with the network equipment through transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell.
- the cell can be a network equipment ( For example, the cell corresponding to the base station), the cell can belong to the macro base station, or it can belong to the base station corresponding to the small cell (Small cell).
- the small cell here can include: urban cell (Metro cell), micro cell (Micro cell), pico cell ( Pico cell), femto cell (Femto cell), etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-rate data transmission services.
- Figure 1 illustrates a communication system 100.
- the communication system includes a network device 110 and two terminal devices 120.
- the communication system 100 may include multiple network devices 110 , and the coverage of each network device 110 may include other numbers of terminal devices 120 , which is not limited in this embodiment of the present application.
- the communication system 100 may also include other network entities such as Mobility Management Entity (MME), Access and Mobility Management Function (AMF), etc.
- MME Mobility Management Entity
- AMF Access and Mobility Management Function
- network equipment may include access network equipment and core network equipment. That is, the wireless communication system also includes multiple core networks used to communicate with access network equipment.
- the access network equipment can be a long-term evolution (long-term evolution, LTE) system, a next-generation (mobile communication system) (next radio, NR) system or authorized auxiliary access long-term evolution (LAA- Evolutionary base station (evolutional node B, abbreviated as eNB or e-NodeB) macro base station, micro base station (also known as "small base station"), pico base station, access point (access point, AP), Transmission point (TP) or new generation base station (new generation Node B, gNodeB), etc.
- LTE long-term evolution
- NR next-generation
- LAA- Evolutionary base station evolutional node B, abbreviated as eNB or e-NodeB
- eNB next-generation
- NR next-generation
- LAA- Evolutionary base station evolutional node B, abbre
- the communication equipment may include network equipment and terminal equipment with communication functions.
- the network equipment and terminal equipment may be specific equipment in the embodiments of the present application, which will not be described again here; the communication equipment also It may include other devices in the communication system, such as network controllers, mobility management entities and other network entities, which are not limited in the embodiments of this application.
- the "instruction” mentioned in the embodiments of this application may be a direct instruction, an indirect instruction, or an association relationship.
- a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association between A and B. relation.
- correlate can mean that there is a direct correspondence or indirect correspondence between the two, it can also mean that there is an associated relationship between the two, or it can mean indicating and being instructed, configuration and being. Configuration and other relationships.
- IoT devices can be divided into wearable devices (such as cameras, headphones, watches, headphones, health monitors), home life devices (such as smart lights, cameras, thermostats, door sensors, voice assistants, speakers, refrigerators, washing machines, lawn mowers, robots), office or factory equipment (such as printers, meters, sensors). Users can use these IoT devices to create (e.g., plan, change topology) personal networks in their homes, offices, factories, or around their bodies.
- wearable devices such as cameras, headphones, watches, headphones, health monitors
- home life devices such as smart lights, cameras, thermostats, door sensors, voice assistants, speakers, refrigerators, washing machines, lawn mowers, robots
- office or factory equipment such as printers, meters, sensors.
- the Personal IoT Network created by the user consists of three types of devices: ordinary personal IoT devices (PINE, PIN Element), personal IoT devices with gateway capabilities (PEGC , PIN Element with Gateway Capability), personal IoT device with management capabilities (PEMC, PIN Element with Management Capability).
- PINE ordinary personal IoT devices
- PEGC personal IoT devices with gateway capabilities
- PEMC personal IoT device with management capabilities
- the common PINE has basic communication capabilities, and can communicate with each other directly through WiFi, Bluetooth, etc. or through PEGC.
- PEGC and PEMC have the ability to access the 5G system and can use the 5G system to provide data forwarding services and management services for other PINEs.
- Step 1-3 PINE (such as PINE, PEGC, PEMC) registers with the PIN server, including PINE authentication and authorization, PINE ID, and reporting of PINE configuration information.
- PINE such as PINE, PEGC, PEMC
- Step 4 After successful registration, PEMC sends a request to the PIN server to establish a PIN and completes the allocation of PIN ID.
- PEMC requests the PIN server (PIN AS) to add PEGC to the PIN. If PEGC agrees to add the PIN, the PIN server will update the PIN configuration file and context parameters. The PIN server then sends the configuration parameters used for PIN communication to PEGC.
- PIN AS PIN AS
- Step 6 The PIN server provides the PIN service specific parameters to the Unified Data Repository (UDR) through the Network Exposure Function (NEF) for PEGC policy control.
- the PIN service specific parameters include PIN identification (ID), default quality of service (QoS, Quality of Service) requirements and validity time of PIN communication.
- PEMC requests the PIN server to add PINE to the PIN, including PINE's communication requirements, associated PEGC, whether PINE is authorized to access the 5G system (5GS, 5G Syetem) through PEGC, and QoS requirements. If PINE agrees to join the PIN, the PIN server updates the PIN profile and context data. The PIN server sends configuration and parameters to PINE and PEGC for PIN communication.
- Step 8 The PIN server provides PIN service-specific parameters to the UDR through NEF for association between PINE and PEGC.
- the PIN service specific parameters include PINE ID, default QoS requirements, and the validity time of PINE and 5GS communication.
- PIN Personal IoT Network
- PEMC Personal IoT Network
- FIG 3 is a schematic flow chart of a device management method 300 according to an embodiment of the present application. This method can optionally be applied to the system shown in Figure 1 or Figure 2A, but is not limited thereto. The method includes at least part of the following.
- the first network device sends a first message to the first Internet of Things device, where the first message is used to instruct the operation of the first Internet of Things device.
- the operation of the first IoT device may include the operation of the first IoT device on the IoT, such as the operation of the first IoT device on other IoT devices in the IoT, such as adding an IoT device, deleting an IoT device, Modify the configuration of IoT devices, modify the association relationships of IoT devices, etc.
- the first IoT device may include PEMC.
- the first network device may be an existing core network element (such as UDM/UDR), a new network element used for PIN management, or a third-party application.
- UDM/UDR existing core network element
- a new network element used for PIN management or a third-party application.
- the first network device may send a first message for instructing the operation of the first IoT device to the PEMC, and the first message may be configured for the first IoT device. Operations are managed; through unified scheduling and management of the first network device, conflicts in the operations of multiple IoT devices (such as PEMC) on the IoT can be avoided.
- a new IoT device such as PEMC
- the first network device may send a first message for instructing the operation of the first IoT device to the PEMC, and the first message may be configured for the first IoT device.
- Operations are managed; through unified scheduling and management of the first network device, conflicts in the operations of multiple IoT devices (such as PEMC) on the IoT can be avoided.
- Embodiments of the present invention may adopt at least two methods to achieve management of multiple Internet of Things devices (such as PEMC).
- the first type of method can be considered as a static scheduling method, that is, the first network device configures the operation permissions for the Internet of Things for each PEMC (such as the effective time and/or priority of the operation of the Internet of Things; where the effective time can be Specific duration, it can also be a specific time period)
- Each PEMC can operate the devices in the PIN based on the operation permissions.
- the second type of method can be considered as a dynamic scheduling method, that is, every time PEMC operates an IoT device, it needs to negotiate with the first network device or other PEMC in the same PIN. After obtaining the first network device and/or With authorization from other PEMCs in the same PIN, IoT devices can be operated.
- the first network device may send a PIN to the first IoT device.
- a first message the first message is used to instruct the operation of the first Internet of Things device.
- the first message may carry the operation permission of the first Internet of Things device, and the operation permission may include the operation permission of the first Internet of Things device to other devices in the Internet of Things.
- the operation permission may include at least one of a valid time of the operation and a priority of the operation.
- this operation may include at least one of the following:
- the first network device may also send first indication information, where the first indication information is used to indicate that the first Internet of Things device has been authorized to operate the Internet of Things.
- the first indication information is equivalent to a token and is used to prove to the device in the PIN that the first Internet of Things device is authorized by the first network device.
- the first indication information may be carried by the above-mentioned first message and sent by the first network device to the first Internet of Things device.
- the configuration update notification can carry the identification of the first Internet of Things device, the identification of the Internet of Things, and the operation of the first Internet of Things device on the Internet of Things.
- At least one of the permissions and the above-mentioned first instruction information is used to notify other devices in the Internet of Things that a new Internet of Things device has joined the Internet of Things.
- the first indication information serves as a Token, which can prove to other devices in the Internet of Things that the first Internet of Things device is authorized by the first network device.
- the original second IoT device in the IoT can broadcast a configuration update notification to notify other devices in the IoT that a new IoT device has joined the IoT; because the security of the second IoT device can previously is guaranteed, therefore the configuration update notification may not carry the first indication information.
- the first network device can be a core network device or a third-party application.
- the core network device can be an existing core network device (or called a core network element, such as UDM, UDR, etc.), or it can be a new core network device. network equipment.
- the first network device may receive a request message from the first Internet of Things device, and the request message may be used to request the first network device to join the Internet of Things.
- the method of receiving the request message may include at least one of receiving through the application layer, receiving through the registration process, and receiving through the service request process. For example, when the first network device is a third-party application, the request message can be received through the application layer; when the first network device is a core network element, the request message can be received through a registration process or a service request process.
- the first network device may also send the second permission information to an original IoT device in the IoT (called a second IoT device in this example, and the second IoT device may be a PEMC).
- the first network device may be a PEMC.
- the second permission information may include the operation permission of the first IoT device, so as to inform the original IoT device in the IoT of the operation permission of the newly added IoT device to the IoT.
- the first IoT device may send first permission information to the second IoT device.
- the first permission information includes the operation permission of the second IoT device, and may be used to update the operation permission of the second IoT device.
- first permission information and second permission information may be sent using the same message, or may be sent using different messages.
- FIG 4 is an implementation flow chart of specific embodiment 1 of the present application.
- PEMC-1 represents the original IoT device in the PIN (i.e., the above-mentioned second IoT device)
- PEMC-2 represents the newly added IoT device in the PIN (i.e., the above-mentioned first IoT device).
- the first network device is used to assign operation permissions to PEMC (such as the validity time of operations on PINE/PEGC, the priority of operations on PINE/PEGC, etc.), and PEMC-1 is used to notify the device in the PIN that there is a new PEMC-2 added PIN.
- the PIN network has been established and assigned a PIN ID.
- One or more devices among PINE, PEGC, and PEMC in the network have also been assigned corresponding IDs.
- PEMC-2 initiates a PEMC join request message to the first network device.
- the message includes the target PIN ID requested to join, and the type of device requested to join is PEMC.
- the message is sent through the application layer.
- the message may be reported to the first network device through a registration process or a service request process.
- the first network device authenticates and authorizes PEMC-2. If the join request of PEMC-2 is allowed, it is assigned one of the PEMC-2 ID, the validity time of the management network, and the priority of PEMC-2, or Multiple.
- the valid time can be a specific duration, such as 1 hour, or a specific time period, such as 1:00-2:00.
- PEMC-2 can only perform one or more management operations such as searching, adding, deleting and modifying the device in the PIN within the valid time specified by the first network device.
- the priority of PEMC is used to indicate the authority level of PEMC and is used to solve the problem of multiple PEMC control signaling conflicts. When a PIN device receives multiple PEMC control signalings at the same time, it can select the PEMC control signaling with a higher priority to execute. In addition, due to the new PEMC access PIN, the original PEMC configuration information (including validity time, priority, etc.) needs to be updated.
- the first network device sends a join response message to PEMC-2 to notify PEMC-2 whether the request is allowed. If the authentication and authorization are successful, the message contains one or more of the PIN ID, PEMC-2 ID, PEMC-2 validity time and priority. If authentication and authorization fail, the message contains a failure indication or failure reason.
- the first network device sends a PIN configuration update notification message to PEMC-1.
- the message contains one or more of the PIN ID, PEMC-1 ID, PEMC-1 validity time, and updated PEMC-1 priority.
- the message also contains one or more of the PEMC-2 ID, the validity time of PEMC-2 and the priority of PEMC-2, which is used to inform PEMC-1 that a new PEMC-2 has joined its PIN. .
- PEMC-1 broadcasts a PIN configuration update notification to PINE and PEGC in the PIN, informing the devices in the PIN of its updated configuration information.
- the message contains one or more of the PIN ID, PEMC-1 ID, PEMC-1 validity time, and updated PEMC-1 priority.
- the message also contains one or more of the PEMC-2 ID, PEMC-2 validity time and PEMC-2 priority, which is used to inform the device in the PIN that a new PEMC-2 has joined its location. PIN.
- FIG 5 is an implementation flow chart of the second specific embodiment of the present application.
- PEMC-1 represents the original IoT device in the PIN (that is, the above-mentioned second IoT device)
- PEMC-2 represents the newly added IoT device in the PIN (that is, the above-mentioned first IoT device).
- the first network device is used to assign operation permissions to PEMC (such as the validity time of operations on PINE/PEGC, the priority of operations on PINE/PEGC, etc.), and PEMC-2 is used to notify the device in the PIN of its actions.
- New PEMC added PIN.
- step 0 Same as step 0 in the specific embodiment.
- the first network device sends a join response message to PEMC-2 to notify PEMC-2 whether the request is allowed. If the authentication and authorization are successful, the message contains one or more of the PIN ID, PEMC-2 ID, PEMC-2 validity time and PEMC-2 priority, and may also contain a Token that allows the addition of a PIN. This Token is used to prove to the device in the PIN that PEMC-2 is authorized by the first network device. If authentication and authorization fail, the message contains a failure indication or failure reason.
- the first network device sends a PIN configuration update notification message to PEMC-1.
- the message contains one or more of the PIN ID, PEMC-1 ID, PEMC-1 validity time, and updated PEMC-1 priority.
- PEMC-1 broadcasts a PIN configuration update notification to the PINE and/or PEGC in the PIN to inform the devices in the PIN of its updated configuration information.
- the message contains one or more of the PIN ID, PEMC-1 ID, PEMC-1 validity time, and updated PEMC-1 priority.
- PEMC-2 broadcasts a PEMC joining notification to the PINE and/or PEGC in the PIN, informing the devices in the PIN that it has joined the PIN as a new PEMC.
- the message contains one or more of the PIN ID, PEMC-2 ID, PEMC-2 validity time and PEMC-2 priority, and may also contain a Token that allows the PIN to be added.
- the third IoT device can be a PEMC to negotiate, and can operate the IoT device after being authorized by the first network device and/or other PEMC (such as a third IoT device) in the same PIN .
- the third IoT device and the second IoT device in the first category above refer to devices in the Internet of Things other than the first IoT device.
- the second IoT device and the third IoT device can be exactly the same or partially Same or completely different.
- the first message sent by the first network device to the first IoT device may carry an authorization success indication or an authorization failure indication;
- the authorization success indication is used to indicate that the first network device allows the first Internet of Things device to operate;
- the authorization failure indication is used to indicate that the first network device refuses the first Internet of Things device to operate.
- the authorization success indication is used to instruct the first network device to allow the first IoT device to operate one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the authorization failure indication is used to instruct the first network device to deny the first IoT device to operate one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the first message may also carry authorization information
- the authorization information may include at least one of the identification of the first Internet of Things device, the identification of the Internet of Things, the type of operation, and the identification of the target device of the operation.
- the authorization information can be transmitted in the form of ciphertext, which is invisible to the first Internet of Things device; when the first Internet of Things device operates other devices, it can carry the encrypted form of authorization information in the operation request, and other devices can authorize it.
- the information is decrypted to confirm whether the operation request is authorized.
- the first network device may receive a second message, where the second message carries the first operation request.
- the second message may be sent by the first IoT device, and the first operation request may be used to request that the first IoT device is allowed to operate the IoT device.
- the first operation request may include at least one of the following:
- the identification of the first IoT device is the identification of the first IoT device
- the first network device can directly manage and/or control the operation of the first IoT device; or, the first network device can, based on feedback from other IoT devices in the PIN (called the third IoT device in this example), Manage and/or control the operation of the first IoT device.
- the first network device may send a third message to at least one third IoT device, the third IoT device
- the Internet of Things device includes other Internet of Things devices except the first Internet of Things device (such as other Internet of Things devices in the Internet of Things where the first Internet of Things device is located), and the third message carries the first operation request.
- the first operation request can be sent directly from the first IoT device to the third IoT device.
- the first IoT device sends a fourth message to the third IoT device, and the fourth message carries the first operation request. .
- the first network device Before the first network device sends the first message to the first IoT device, it may also include:
- the first network device receives an authorization success indication or an authorization failure indication for the operation from at least one third Internet of Things device;
- the first network device determines whether to allow the first Internet of Things device to perform the operation based on at least one third Internet of Things device's authorization success indication or authorization failure indication for the operation. For example, if all third Internet of Things devices allow authorization of the operation of the first Internet of Things device, the first network device determines to allow the operation; or, if all third Internet of Things devices allow authorization of the operation of the first Internet of Things device, If the proportion of the number of networked devices to the total number is equal to or greater than the predetermined proportion, the first network device determines to allow the operation.
- the first network device may not be provided, but each third IoT device may manage and/or control the operation of the first IoT device.
- the first IoT device can send a first operation request to each third IoT device respectively, and each third IoT device feeds back an authorization success indication or authorization failure indication for the operation to the first IoT device, respectively.
- the operation includes an operation of the first Internet of Things device on the Internet of Things.
- the first Internet of Things device determines whether to perform an operation based on the received authorization success indication or authorization failure indication of each third Internet of Things device.
- the first Internet of Things device determines that the operation can be performed; or if authorization of the operation of the first Internet of Things device is allowed; If the proportion of the number of the third Internet of Things devices to the total number is equal to or greater than the predetermined proportion, then the first Internet of Things device determines that the operation can be performed. Further, the third Internet of Things device may also send authorization information to the first Internet of Things device.
- the authorization information may include at least one of the identification of the first Internet of Things device, the identification of the Internet of Things, the type of operation, and the identification of the target device of the operation. one.
- the authorization information can be transmitted in the form of ciphertext and is invisible to the first IoT device.
- the first operation request sent by the first IoT device to the third IoT device may include at least one of the following:
- the identification of the first IoT device is the identification of the first IoT device
- the first IoT device may send a management operation request to the target device of the operation, and the management operation request carries at least one of the following:
- the identification of the first IoT device is the identification of the first IoT device
- the target device of the operation can decrypt the authorization information in the management operation request and obtain the clear text of the authorization information; then compare the clear text of the authorization information with the type of operation and other information in the management operation request. , if the comparison results are consistent, it is confirmed that the operation of the first Internet of Things device has been authorized, and the target device of the operation can perform the operation.
- the type of operation includes at least one of the following:
- FIG. 6 is an implementation flow chart of the third specific embodiment of the present application.
- PEMC represents a newly added PIN IoT device (ie, the above-mentioned first IoT device).
- the first network device is used to authorize PEMC's real-time request to manage the PIN.
- the request message includes one or more of PIN ID, PINE ID, PEGC ID, PEMC ID and operation type.
- the operation types include adding IoT devices (such as PINE and/or PEGC), deleting IoT devices (such as PINE and/or PEGC), modifying the configuration of IoT devices (such as PINE and/or PEGC), and modifying IoT devices.
- One or more of the associations between devices (such as PINE and/or PEGC).
- the association relationship may refer to the communication and connectivity status between devices, such as the communication and connectivity status between PINE and PINE, the communication and connectivity status between PINE and PEGC, etc.
- the first network device sends a PIN management operation authorization response to PEMC. If the first network device agrees to the authorization, the PIN management operation authorization response includes the authorization identifier (or authorization indication, authorization success indication). Further, the PIN management operation authorization response may also include authorization information.
- the authorization information may include one or more of PIN ID, PEMC ID, management operation type, and operation target device PINE ID, PEGC ID. The authorization information can be sent in cipher text and is invisible to PEMC. If the first network device does not agree to the authorization, the PIN management operation authorization response includes an authorization failure indication and may also include the reason for the authorization failure.
- the PIN management operation authorization response message received by PEMC contains the authorization identifier, it can perform one or more management operations such as deletion, addition, and modification of PINE and/or PEGC. Specifically, PEMC will send a PIN management operation request to the target device, which request contains one or more of PIN ID, PEMC ID, PINE/PEGC ID, operation type, authorization identification, and authorization information. If the PIN management operation authorization response message received by PEMC contains an authorization failure indication, the PIN management operation request will not be sent to the target device. A PEMC that fails to request authorization can re-initiate the authorization request after a period of time.
- the target device PINE/PEGC can decrypt the authorization information in the PIN management operation request to obtain the clear text of the authorization information, and combine the clear text of the authorization information with the clear text information part of the message (such as ID information, operation type, etc.), if they are consistent, the corresponding operation will be performed according to the PEMC request, otherwise the update request will be refused.
- the target device then sends a PIN management operation response to PEMC to inform it whether the requested management operation was successfully performed.
- only part of the steps in the above process may be performed, such as performing the above step 1 and step 2.
- FIG. 7 is an implementation flow chart of the fourth specific embodiment of the present application.
- PEMC-1 represents the IoT device newly added to the PIN (i.e., the above-mentioned first IoT device)
- PEMC-2 and PEMC-3 represent other IoT devices in the PIN (i.e., the above-mentioned third IoT device).
- the first network device and other PEMCs in the PIN are used to jointly authorize real-time requests for newly added PEMCs in the PIN, so as to manage the PIN.
- the first network device sends a PIN management operation authorization request message to all other PEMCs in the PIN indicated in the authorization request message.
- the request message includes one or more of PIN ID, PINE ID, PEGC ID, PEMC-1 ID, and operation type.
- the operation types include adding IoT devices (such as PINE and/or PEGC), deleting IoT devices (such as PINE and/or PEGC), modifying the configuration of IoT devices (such as PINE and/or PEGC), and modifying IoT devices.
- One or more of the associations between devices (such as PINE and/or PEGC).
- Each PEMC returns a PIN management operation authorization response message to the first network device. If other PEMC agrees to PEMC-1's request, the response message contains an authorization success indication. If other PEMCs do not agree to PEMC-1's request, the response message contains an authorization failure indication.
- the first network device Send a PIN management operation authorization response to PEMC-1.
- the PIN management operation authorization response contains the authorization identification (or authorization indication, authorization success indication). Further, the PIN management operation authorization response may also include authorization information.
- the authorization information may include one or more of PIN ID, PEMC ID, management operation type, and identification of the operation target device (such as PINE ID or PEGC ID). indivual. The authorization information can be sent in cipher text and is invisible to PEMC. If the first network device does not agree to the authorization, the PIN management operation authorization response includes an authorization failure indication and may also include the reason for the authorization failure.
- FIG 8 is an implementation flow chart of the fifth specific embodiment of the present application.
- PEMC-1 represents the IoT device newly added to the PIN (i.e., the above-mentioned first IoT device)
- PEMC-2 and PEMC-3 represent other IoT devices in the PIN (i.e., the above-mentioned third IoT device).
- other PEMCs in the PIN are used to jointly authorize the real-time request of the newly added PEMC in the PIN to manage the PIN.
- the request message includes one or more of PIN ID, PINE ID and/or PEGC ID, PEMC-1 ID, and operation type.
- the operation types include adding IoT devices (such as PINE and/or PEGC), deleting IoT devices (such as PINE and/or PEGC), modifying the configuration of IoT devices (such as PINE and/or PEGC), and modifying IoT devices.
- One or more of the associations between devices such as PINE and/or PEGC).
- Each PEMC (PEMC-2 and PEMC-3 in Figure 8) returns a PIN management operation authorization response message to PEMC-1. If other PEMC agrees to PEMC-1's request, the response message contains an authorization success indication. If other PEMCs do not agree to PEMC-1's request, the response message contains an authorization failure indication. If the authorization is successful, the response message may also include authorization information; the authorization information includes one or more of PIN ID, PEGC ID, management operation type, and identification of the operation target device (such as PINE ID or PEGC ID). The authorization information can be sent in cipher text and is invisible to PEMC. If authorization fails, the response message can also include the reason for the failure.
- only part of the steps in the above process may be performed, such as performing the above step 1 and step 2.
- Embodiments 1 to 5 mainly describe how multiple PEMCs cooperatively manage devices within a PIN from the perspective of PEMC.
- PINE or PEGC can also actively request PEMC to add it to the PIN, exit the PIN, or provide it with configuration information.
- PINE or PEGC actively initiates a request, it needs to first find a suitable PEMC to provide services for it.
- the device management method proposed in the embodiment of this application may also include:
- the first network device receives the IoT device discovery request
- the first network device sends an Internet of Things device discovery response, and the Internet of Things device discovery response carries information about all or part of the Internet of Things devices in the Internet of Things.
- the IoT device discovery request may carry at least one of an identifier of the IoT device and an identifier of the Internet of Things.
- the information of the Internet of Things device may include at least one of the IP address of the PEMC, the location of the PEMC, the operation authority of the PEMC, and the remaining power of the PEMC.
- PINE and PEGC can directly initiate a PEMC discovery request to the first network device through the application layer (as in the following specific embodiment 6); when the first network device is a core network element , PINE can initiate a PEMC discovery request through PEGC (as shown in the following specific embodiment 7).
- FIG. 9 is an implementation flow chart of the sixth specific embodiment of the present application.
- PINE/PEGC can directly initiate a PEMC discovery request to the first network device to select a suitable PEMC to serve it.
- the specific process is as follows.
- PINE/PEGC initiates a PEMC discovery request message to the first network device.
- the message includes PINE/PEGC ID and PIN ID.
- the message may be sent through the application layer.
- the message can be carried through the registration process or the service request process.
- the first network device returns a PEMC discovery response message to PINE/PEGC.
- the message includes PINE/PEGC ID, PIN ID, and PEMC list.
- the PEMC list contains all or part of the PEMC information in the PIN, such as one or more of the PEMC ID, PEMC IP address, PEMC location information, PEMC operation permissions (such as validity time, priority, etc.) and remaining power.
- the PINE can determine the availability, reachability, and stability of each PEMC based on the received information about each PEMC in the PEMC list, so as to select the appropriate PEMC to serve it.
- the message may be sent through the application layer.
- the message can be carried through the registration process or the service request process.
- step 2 in the above process may be performed.
- FIG. 10 is an implementation flow chart of the seventh specific embodiment of the present application.
- PINE can initiate a PEMC discovery request to the first network device through PEGC.
- the specific process is as follows:
- 1.PINE/PEGC initiates a PEMC discovery request message to PEGC. Included in the message is the PINE ID and/or PIN ID.
- PEGC returns PEMC discovery response information to PINE, which includes one or more of PINE ID, PEGC ID, PIN ID, and PEMC list.
- This application solves the problem of PIN management with multiple PEMCs.
- the scheduling method based on effective time and/or priority proposed in this application ensures that only one PEMC manages PINE, PEGC and other equipment in the network at the same time by allocating the effective time and priority of Internet of Things operations, thereby ensuring that Conflicts between multiple PEMC control signalings are avoided.
- the static scheduling method proposed in the embodiments of this application (such as Embodiments 1 and 2) is mainly suitable for scenarios such as smart factories where managers take turns to work.
- this solution also proposes a scheduling method based on control center authorization (such as Embodiment 3) to solve scenarios such as smart homes where management time of managers overlaps.
- Joint authorization scheduling based on PEMC can solve the control signaling consistency problem in scenarios involving user privacy and social security such as intelligent monitoring. In such scenarios, the management operation of one PEMC often requires other PEMCs. All agreed.
- the embodiments of this application also propose two PEMC discovery and selection methods (such as Embodiments 6 and 7) for PINE or PEGC to select appropriate PEMC to serve them.
- FIG 11 is a schematic flow chart of a device management method 1100 according to an embodiment of the present application. This method can optionally be applied to the system shown in Figure 1 or Figure 2A, but is not limited thereto. The method includes at least part of the following.
- the first Internet of Things device receives a first message, where the first message is used to instruct the operation of the first Internet of Things device.
- the first IoT device may receive the first message from the first network device.
- the first message carries the operation permission of the first Internet of Things device.
- the device management method may further include: the first IoT device sends a request message of the first IoT device.
- the first Internet of Things device may send the request message to the first network device to request permission to operate the Internet of Things.
- the first IoT device sends the request message of the first IoT device in at least one of the following ways:
- the first IoT device can send the request through the application layer; if the first network device is a core network element, the first IoT device can make a registration process or service request. The process accepts the request.
- the device management method may further include: the first Internet of Things device receiving first indication information, the first indication information being used to indicate that the first Internet of Things device has been authorized to operate the Internet of Things.
- the first indication information may be carried by the first message.
- the device management method may further include the first Internet of Things device broadcasting a configuration update notification to a device in the Internet of Things, where the configuration update notification carries at least one of the following:
- the identification of the first IoT device is the identification of the first IoT device
- the operating authority of the first IoT device is the operating authority of the first IoT device
- the operation permission includes at least one of a valid time of the operation and a priority of the operation.
- the operations include at least one of the following:
- the first message carries an authorization success indication or an authorization failure indication
- Authorization success indication used to indicate that the first network device allows the first Internet of Things device to operate
- the authorization failure indication is used to indicate that the first network device refuses the first Internet of Things device to operate.
- the authorization success indication can be used to indicate that the first IoT device is allowed to operate one, multiple, a group, multiple groups or all IoT devices in the Internet of Things;
- the authorization failure indication may be used to instruct the first IoT device to refuse to operate one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the first message also carries authorization information
- the authorization information includes at least one of the following:
- the identification of the first IoT device is the identification of the first IoT device
- the authorization information is ciphertext information.
- the first message is sent by the first network device.
- the first network device includes a core network device or a third-party application.
- the first message is sent by at least one third IoT device, and the third IoT device includes other IoT devices in the Internet of Things except the first IoT device.
- the device management method further includes: the first Internet of Things device determines whether to operate the Internet of Things according to the first message sent by at least one third Internet of Things device.
- the first Internet of Things device before the first Internet of Things device receives the first message, it may further include: the first Internet of Things device sending a second message to the first network device, the second message carrying the first operation request.
- the first IoT device before the first IoT device receives the first message, it may also include: the first IoT device sends a fourth message to the third IoT device, the fourth message carrying the first operation request. .
- the first operation request includes at least one of the following:
- the identification of the first IoT device is the identification of the first IoT device
- the device management method may further include the first Internet of Things device sending a management operation request to the target device of the operation, and the management operation request carries at least one of the following:
- the identification of the first IoT device is the identification of the first IoT device
- the type of operation includes at least one of the following:
- the first IoT device includes PEMC.
- Figure 12 is a schematic flow chart of a device management method 1200 according to an embodiment of the present application. This method can optionally be applied to the system shown in Figure 1 or Figure 2A, but is not limited thereto. The method includes at least part of the following.
- the third Internet of Things device sends an authorization success indication or authorization failure indication for the operation of the first Internet of Things device.
- the authorization success indication is used to indicate that the first IoT device is allowed to operate one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the authorization failure indication is used to indicate that the first IoT device is refused to operate one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the third Internet of Things device sends an authorization success indication or an authorization failure indication to the first network device.
- the third Internet of Things device before the third Internet of Things device sends an authorization success indication or an authorization failure indication to the first network device, it may also include: the third Internet of Things device receives a third message from the first network device, and the third message is To carry the first operation request.
- the third Internet of Things device sends an authorization success indication or an authorization failure indication to the first Internet of Things device.
- the third Internet of Things device before the third Internet of Things device sends an authorization success indication or an authorization failure indication to the first Internet of Things device, it may also include: the third Internet of Things device receives a fourth message from the first Internet of Things device, and the fourth The message is used to carry the first operation request.
- the third IoT device can also send authorization information to the first IoT device, where the authorization information includes at least one of the following:
- the identification of the first IoT device is the identification of the first IoT device
- the authorization information can be carried in the authorization success indication and sent.
- the authorization information is ciphertext information.
- Figure 13 is a schematic flowchart of a device discovery method 1300 according to an embodiment of the present application. This method can optionally be applied to the system shown in Figure 1 or Figure 2A, but is not limited thereto. The method includes at least part of the following.
- the fourth Internet of Things device receives an Internet of Things device discovery response.
- the Internet of Things device discovery response carries information about all or part of the Internet of Things devices in the Internet of Things.
- the fourth Internet of Things device before the fourth Internet of Things device receives the Internet of Things device discovery response, it may further include: the fourth Internet of Things device sends an Internet of Things device discovery request.
- the IoT device discovery request carries at least one of an identifier of the fourth IoT device and an identifier of the Internet of Things.
- the information of the Internet of Things device includes at least one of the IP address of the PEMC, the location of the PEMC, the operating authority of the PEMC, and the remaining power of the PEMC.
- the fourth IoT device includes PINE or PEGC.
- the fourth IoT device when the fourth IoT device includes PEGC, before the fourth IoT device sends the IoT device discovery request, it may also include: the fourth IoT device receives the PINE's IoT device discovery request;
- the fourth Internet of Things device After the fourth Internet of Things device receives the Internet of Things device discovery response, it may also include: the fourth Internet of Things device sends the Internet of Things device discovery response to the PINE.
- the Internet of Things may refer to the Personal Internet of Things (PIN), and the Internet of Things devices may refer to devices in the Personal Internet of Things, such as PEGC, PEMC, PINE, etc.
- PIN Personal Internet of Things
- the Internet of Things devices may refer to devices in the Personal Internet of Things, such as PEGC, PEMC, PINE, etc.
- FIG. 14 is a schematic block diagram of a network device 1400 according to an embodiment of the present application.
- the network device 1400 may include:
- the first sending module 1410 is configured to send a first message to the first Internet of Things device, where the first message is used to indicate the operation of the first Internet of Things device.
- the first message carries the operating authority of the first Internet of Things device to the Internet of Things.
- Figure 15 is a schematic block diagram of a network device 1500 according to an embodiment of the present application. As shown in Figure 15, in some implementations, the network device may also include:
- the first receiving module 1520 is configured to receive a request message from the first Internet of Things device.
- the first receiving module 1520 receives the request message of the first Internet of Things device in at least one of the following ways:
- the first sending module 1410 is further configured to send first indication information, where the first indication information is used to indicate that the first Internet of Things device has been authorized to operate the Internet of Things.
- the first indication information is carried by the first message.
- the network device further includes a second sending module 1530, configured to send a first operation authority to a second Internet of Things device, where the first operation authority is used to operate the second Internet of Things device. Permissions are updated.
- the second sending module 1530 is also configured to send the operation permission of the first IoT device to the second IoT device.
- the operation permission includes at least one of a valid time of the operation and a priority of the operation.
- the operations include at least one of the following:
- the first message carries an authorization success indication or an authorization failure indication
- the authorization success indication is used to indicate that the first network device allows the first Internet of Things device to perform the operation
- the authorization failure indication is used to indicate that the first network device refuses the first Internet of Things device to perform the operation.
- the authorization success indication is used to indicate that the first IoT device is allowed to perform the operation on one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the authorization failure indication is used to indicate that the first IoT device is refused to perform the operation on one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the first message also carries authorization information
- the authorization information includes at least one of the following:
- the identification of the first Internet of Things device is the identification of the first Internet of Things device
- the authorization information is ciphertext information.
- the network device may further include: a second receiving module 1540, configured to receive a second message, where the second message carries the first operation request.
- the network device may further include: a third sending module 1550, configured to send a third message to at least one third Internet of Things device, the third Internet of Things device including the first Internet of Things device.
- the third message is used to carry the first operation request.
- the network device may also include:
- the third receiving module 1560 is configured to receive an authorization success indication or an authorization failure indication for the operation from at least one third Internet of Things device.
- the third Internet of Things device includes other Internet of Things devices other than the first Internet of Things device. equipment;
- the decision-making module 1570 is configured to decide whether to allow the first Internet of Things device to perform the operation based on the authorization success indication or authorization failure indication of the at least one third Internet of Things device for the operation.
- the operation request includes at least one of the following:
- the identification of the first Internet of Things device is the identification of the first Internet of Things device
- the type of operation includes at least one of the following:
- IoT devices include PINE and/or PEGC.
- the first IoT device includes PEMC.
- the second IoT device includes a PEMC.
- the third IoT device includes PEMC.
- the network device may also include:
- Request receiving module 1580 used to receive Internet of Things device discovery requests
- the response module 1590 is configured to send an Internet of Things device discovery response, where the Internet of Things device discovery response carries information about all or part of the Internet of Things devices in the Internet of Things.
- the Internet of Things device discovery request carries at least one of an identification of the Internet of Things device and an identification of the Internet of Things.
- the information of the IoT device includes at least one of the IP address of the PEMC, the location of the PEMC, the PEMC's operating authority for the IoT, and the remaining power of the PEMC.
- the network equipment includes core network equipment or third-party applications.
- the network devices 1400 and 1500 in the embodiment of the present application can implement the corresponding functions of the first network device in the foregoing method embodiment.
- each module (sub-module, unit or component, etc.) in the network devices 1400 and 1500 please refer to the corresponding description in the above method embodiment, and will not be described again here.
- the functions described with respect to each module (sub-module, unit or component, etc.) in the network devices 1400 and 1500 of the application embodiment can be implemented by different modules (sub-module, unit or component, etc.), or can be implemented by Implemented by the same module (submodule, unit or component, etc.).
- FIG. 16 is a schematic block diagram of an Internet of Things device 1600 according to an embodiment of the present application.
- the IoT device 1600 may include:
- the fourth receiving module 1610 is configured to receive a first message, where the first message is used to indicate the operation of the first Internet of Things device.
- the first message carries the operation permission of the first Internet of Things device.
- FIG 17 is a schematic block diagram of an Internet of Things device 1700 according to an embodiment of the present application. As shown in Figure 17, in some implementations, the IoT device may also include:
- the fourth sending module 1720 is used to send the request message of the first Internet of Things device.
- the fourth sending module 1720 sends the request message of the first Internet of Things device in at least one of the following ways:
- the fourth receiving module 1610 is further configured to receive first indication information, where the first indication information is used to indicate that the first Internet of Things device has been authorized to operate.
- the first indication information is carried by the first message.
- the IoT device further includes a broadcast module 1730, configured to broadcast a configuration update notification to the device in the IoT, where the configuration update notification carries at least one of the following:
- the identification of the first Internet of Things device is the identification of the first Internet of Things device
- the operating authority of the first Internet of Things device is the operating authority of the first Internet of Things device
- the operation permission includes at least one of a valid time of the operation and a priority of the operation.
- the operations include at least one of the following:
- the first message carries an authorization success indication or an authorization failure indication
- the authorization success indication is used to indicate that the first network device allows the first Internet of Things device to perform the operation
- the authorization failure indication is used to indicate that the first network device refuses the first Internet of Things device to perform the operation.
- the authorization success indication is used to indicate that the first IoT device is allowed to perform the operation on one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the authorization failure indication is used to indicate that the first IoT device is refused to perform the operation on one, multiple, a group, multiple groups or all IoT devices in the Internet of Things.
- the first message also carries authorization information
- the authorization information includes at least one of the following:
- the identification of the first Internet of Things device is the identification of the first Internet of Things device
- the authorization information is ciphertext information.
- the first message is sent by the first network device.
- the first network device includes a core network device or a third-party application.
- the first message is sent by at least one third IoT device, including other IoT devices other than the first IoT device.
- the IoT device also includes:
- Determining module 1731 configured to determine whether to operate the Internet of Things according to the first message.
- the Internet of Things device further includes: a first request module 1740, configured to send a second message to the first network device, where the second message carries a first operation request. .
- the IoT device further includes: a second request module 1750, configured to send a fourth message to the third IoT device, where the fourth message carries the first operation request; wherein the third The Internet of Things device includes other Internet of Things devices except the first Internet of Things device.
- the first operation request includes at least one of the following:
- the identification of the first Internet of Things device is the identification of the first Internet of Things device
- the IoT device also includes:
- the management request module 1760 is configured to send a management operation request to the target device of the first operation, where the management operation request carries at least one of the following:
- the identification of the first Internet of Things device is the identification of the first Internet of Things device
- the authorization information is the authorization information.
- the type of operation includes at least one of the following:
- the IoT device includes PEMC.
- the IoT devices 1600 and 1700 in the embodiment of the present application can implement the corresponding functions of the first IoT device in the foregoing method embodiment.
- each module (sub-module, unit or component, etc.) in the IoT devices 1600 and 1700 please refer to the corresponding description in the above method embodiment, and will not be described again here.
- the functions described in each module (sub-module, unit or component, etc.) in the Internet of Things devices 1600 and 1700 in the application embodiment can be implemented by different modules (sub-module, unit or component, etc.), or they can Implemented by the same module (submodule, unit or component, etc.).
- FIG. 18 is a schematic block diagram of an Internet of Things device 1800 according to an embodiment of the present application.
- the IoT device 1800 may include:
- the fifth sending module 1810 is configured to send an authorization success indication or authorization failure indication for the operation of the first Internet of Things device.
- the authorization success indication is used to indicate that the first IoT device is allowed to perform the operation on one, multiple, a group, multiple groups or all IoT devices in the IoT.
- the authorization failure indication is used to indicate that the first Internet of Things device is refused to perform the operation on one, multiple, a group, multiple groups or all Internet of Things devices in the Internet of Things.
- the fifth sending module 1810 sends the authorization success indication or authorization failure indication to the first network device.
- FIG 19 is a schematic block diagram of an Internet of Things device 1900 according to an embodiment of the present application.
- the IoT device may also include:
- the fifth receiving module 1920 is configured to receive a third message from the first network device, where the third message is used to carry the first operation request.
- the fifth sending module 1810 sends the authorization success indication or authorization failure indication to the first Internet of Things device.
- the IoT device may also include:
- the sixth receiving module 1930 is configured to receive a fourth message from the first Internet of Things device, where the fourth message is used to carry a first operation request.
- the IoT device may also include:
- Authorization module 1940 configured to send authorization information to the first Internet of Things device, where the authorization information includes at least one of the following:
- the identification of the first Internet of Things device is the identification of the first Internet of Things device
- the authorization information is ciphertext information.
- the IoT devices 1800 and 1900 in the embodiment of the present application can implement the corresponding functions of the third IoT device in the foregoing method embodiment.
- each module (sub-module, unit or component, etc.) in the IoT devices 1800 and 1900 please refer to the corresponding description in the above method embodiment, and will not be described again here.
- the functions described by each module (sub-module, unit or component, etc.) in the Internet of Things devices 1800 and 1900 in the application embodiment can be implemented by different modules (sub-module, unit or component, etc.), or they can Implemented by the same module (submodule, unit or component, etc.).
- FIG. 20 is a schematic block diagram of an Internet of Things device 2000 according to an embodiment of the present application.
- the IoT device 2000 may include:
- the seventh receiving module 2010 is configured to receive an Internet of Things device discovery response, where the Internet of Things device discovery response carries information about all or part of the Internet of Things devices in the Internet of Things.
- FIG. 21 is a schematic block diagram of an Internet of Things device 2100 according to an embodiment of the present application. As shown in Figure 21, in some implementations, the Internet of Things device may also include:
- the sixth sending module 2120 is used to send an Internet of Things device discovery request.
- the IoT device discovery request carries at least one of an identifier of the fourth IoT device and an identifier of the Internet of Things.
- the information of the Internet of Things device includes at least one of the IP address of the PEMC, the location of the PEMC, the operating authority of the PEMC, and the remaining power of the PEMC.
- the IoT device includes PINE or PEGC.
- the IoT device may also include:
- the eighth receiving module 2130 is used to receive PINE's Internet of Things device discovery request
- the seventh sending module 2140 is used to send the Internet of Things device discovery response to the PINE.
- the IoT devices 2000 and 2100 in the embodiment of the present application can implement the corresponding functions of the fourth IoT device in the foregoing method embodiment.
- each module (sub-module, unit or component, etc.) in the IoT devices 2000 and 2100 please refer to the corresponding description in the above method embodiment, and will not be described again here.
- the functions described in each module (sub-module, unit or component, etc.) in the Internet of Things devices 2000 and 2100 in the application embodiment can be implemented by different modules (sub-module, unit or component, etc.), or they can Implemented by the same module (submodule, unit or component, etc.).
- Figure 22 is a schematic structural diagram of a communication device 2200 according to an embodiment of the present application.
- the communication device 2200 includes a processor 2210, and the processor 2210 can call and run a computer program from the memory, so that the communication device 2200 implements the method in the embodiment of the present application.
- communication device 2200 may also include memory 2220.
- the processor 2210 can call and run the computer program from the memory 2220, so that the communication device 2200 implements the method in the embodiment of the present application.
- the memory 2220 may be a separate device independent of the processor 2210, or may be integrated into the processor 2210.
- the communication device 2200 may also include a transceiver 2230, and the processor 2210 may control the transceiver 2230 to communicate with other devices. Specifically, the communication device 2200 may send information or data to other devices, or receive information sent by other devices. information or data.
- the transceiver 2230 may include a transmitter and a receiver.
- the transceiver 2230 may further include an antenna, and the number of antennas may be one or more.
- the communication device 2200 may be a network device according to the embodiment of the present application, and the communication device 2200 may implement the corresponding processes implemented by the network device in the various methods of the embodiment of the present application. For the sake of brevity, the communication device 2200 will not be mentioned here. Again.
- the communication device 2200 can be an Internet of Things device according to the embodiment of the present application, and the communication device 2200 can implement the corresponding processes implemented by the Internet of Things device in each method of the embodiment of the present application. For simplicity, in This will not be described again.
- Figure 23 is a schematic structural diagram of a chip 2300 according to an embodiment of the present application.
- the chip 2300 includes a processor 2310, and the processor 2310 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- chip 2300 may also include memory 2320.
- the processor 2310 can call and run the computer program from the memory 2320 to implement the method executed by the Internet of Things device or network device in the embodiment of the present application.
- the memory 2320 may be a separate device independent of the processor 2310, or may be integrated into the processor 2310.
- the chip 2300 may also include an input interface 2330.
- the processor 2310 can control the input interface 2330 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
- the chip 2300 may also include an output interface 2340.
- the processor 2310 can control the output interface 2340 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
- the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the network device in the various methods of the embodiment of the present application. For the sake of simplicity, they will not be described again. .
- the chip can be applied to the Internet of Things devices in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the Internet of Things devices in the various methods of the embodiments of the present application. For the sake of brevity, this is not mentioned here. Again.
- the chips used in network devices and IoT devices can be the same chip or different chips.
- chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
- the processor mentioned above can be a general-purpose processor, a digital signal processor (DSP), an off-the-shelf programmable gate array (FPGA), an application specific integrated circuit (ASIC), or Other programmable logic devices, transistor logic devices, discrete hardware components, etc.
- DSP digital signal processor
- FPGA off-the-shelf programmable gate array
- ASIC application specific integrated circuit
- the above-mentioned general processor may be a microprocessor or any conventional processor.
- non-volatile memory may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
- non-volatile memory can be read-only memory (ROM), programmable ROM (PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically removable memory. Erase electrically programmable read-only memory (EPROM, EEPROM) or flash memory.
- Volatile memory can be random access memory (RAM).
- the memory in the embodiment of the present application can also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, memories in embodiments of the present application are intended to include, but are not limited to, these and any other suitable types of memories.
- the computer program product includes one or more computer instructions.
- the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted over a wired connection from a website, computer, server, or data center (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means to transmit to another website, computer, server or data center.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
- the available media may be magnetic media (eg, floppy disk, hard disk, tape), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), etc.
- the size of the sequence numbers of the above-mentioned processes does not mean the order of execution.
- the execution order of each process should be determined by its functions and internal logic, and should not be used in the embodiments of the present application.
- the implementation process constitutes any limitation.
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请涉及一种设备管理方法、网络设备和物联网设备,其中方法包括:第一网络设备向第一物联网设备发送第一消息,第一消息用于指示第一物联网设备的操作。
Description
本申请涉及通信领域,更具体地,涉及一种设备管理方法、网络设备和物联网设备。
目前个人物联网(PIN,Personal IoT Network)中仅有一个管理设备,如具有管理能力的个人物联网设备(PEMC,PIN Element with Gateway Capability)。当PIN跨地域部署时,PEMC与其他异地部署的个人物联网设备(PINE,PIN Element)之间的信令交互只能通过5G核心网进行转发,这增加了信令交互的时延。某些场景下,PIN中需要部署多个PEMC以支持多个管理人员的需求。当PIN中有多个PEMC时,需要避免多个PEMC的管理控制指令产生矛盾。
发明内容
本申请实施例提供设备管理方法,可以对物联网设备的操作进行管理。
本申请实施例提供一种设备管理方法,包括:第一网络设备向第一物联网设备发送第一消息,该第一消息用于指示第一物联网设备的操作。
本申请实施例提供一种设备管理方法,包括:第一物联网设备接收第一消息,该第一消息用于对指示该第一物联网设备的操作。
本申请实施例提供一种设备管理方法,包括:第三物联网设备发送对第一物联网设备的操作的授权成功指示或授权失败指示。
本申请实施例提供一种设备发现方法,包括:第四物联网设备接收物联网设备发现响应,该物联网设备发现响应中携带物联网中全部或部分物联网设备的信息。
本申请实施例提供一种网络设备,包括:第一发送模块,用于向第一物联网设备发送第一消息,该第一消息用于指示第一物联网设备的操作。
本申请实施例提供一种物联网设备,包括:第四接收模块,用于接收第一消息,该第一消息用于指示该物联网设备的操作。
本申请实施例提供一种物联网设备,包括:第五发送模块,用于发送对第一物联网设备的操作的授权成功指示或授权失败指示。
本申请实施例提供一种第四物联网设备,包括:第七接收模块,用于接收物联网设备发现响应,该物联网设备发现响应中携带物联网中全部或部分物联网设备的信息。
本申请实施例提供一种设备,包括处理器、存储器和收发器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序、并控制该收发器,以使该设备执行上述的方法。
本申请实施例提供一种芯片,用于实现上述的方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的方法。
本申请实施例提供一种计算机可读存储介质,用于存储计算机程序,当该计算机程序被设备运行时使得该设备执行上述的方法。
本申请实施例提供一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的方法。
本申请实施例提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述的方法。
本申请实施例,通过第一网络设备向第一物联网设备发送用于管理其操作的第一消息,可以对物联网设备的操作进行管理。
图1是根据本申请实施例的应用场景的示意图。
图2A是PIN示意图。
图2B是PIN管理的流程示意图。
图3是根据本申请一实施例的设备管理方法300的示意性流程图。
图4是本申请具体实施例一的实现流程图。
图5是本申请具体实施例二的实现流程图。
图6是本申请具体实施例三的实现流程图。
图7是本申请具体实施例四的实现流程图。
图8是本申请具体实施例五的实现流程图。
图9是本申请具体实施例六的实现流程图。
图10是本申请具体实施例七的实现流程图。
图11是根据本申请一实施例的设备管理方法1100的示意性流程图。
图12是根据本申请一实施例的设备管理方法1200的示意性流程图。
图13是根据本申请一实施例的设备发现方法1300的示意性流程图。
图14是根据本申请一实施例的网络设备1400的示意性框图。
图15是根据本申请一实施例的网络设备1500的示意性框图。
图16是根据本申请一实施例的物联网设备1600的示意性框图。
图17是根据本申请一实施例的物联网设备1700的示意性框图。
图18是根据本申请一实施例的物联网设备1800的示意性框图。
图19是根据本申请一实施例的物联网设备1900的示意性框图。
图20是根据本申请一实施例的物联网设备2000的示意性框图。
图21是根据本申请一实施例的物联网设备2100的示意性框图。
图22是根据本申请实施例的通信设备2200示意性结构图。
图23是根据本申请实施例的芯片2300的示意性结构图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、非授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、非地面通信网络(Non-Terrestrial Networks,NTN)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、第五代通信(5th-Generation,5G)系统或其它通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),车辆间(Vehicle to Vehicle,V2V)通信,或车联网(Vehicle to everything,V2X)通信等,本申请实施例也可以应用于这些通信系统。
在一种实施方式中,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。
在一种实施方式中,本申请实施例中的通信系统可以应用于非授权频谱,其中,非授权频谱也可以认为是共享频谱;或者,本申请实施例中的通信系统也可以应用于授权频谱,其中,授权频谱也可以认为是非共享频谱。
本申请实施例结合网络设备和终端设备描述了各个实施例,其中,终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。
终端设备可以是WLAN中的站点(STAION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、下一代通信系统例如NR网络中的终端设备,或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端设备等。
在本申请实施例中,终端设备可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。
在本申请实施例中,终端设备可以是手机(Mobile Phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工 业控制(industrial control)中的无线终端设备、无人驾驶(self driving)中的无线终端设备、远程医疗(remote medical)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备或智慧家庭(smart home)中的无线终端设备等。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
在本申请实施例中,网络设备可以是用于与移动设备通信的设备,网络设备可以是WLAN中的接入点(Access Point,AP),GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA中的基站(NodeB,NB),还可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的网络设备(gNB)或者未来演进的PLMN网络中的网络设备或者NTN网络中的网络设备等。
作为示例而非限定,在本申请实施例中,网络设备可以具有移动特性,例如网络设备可以为移动的设备。可选地,网络设备可以为卫星、气球站。例如,卫星可以为低地球轨道(low earth orbit,LEO)卫星、中地球轨道(medium earth orbit,MEO)卫星、地球同步轨道(geostationary earth orbit,GEO)卫星、高椭圆轨道(High Elliptical Orbit,HEO)卫星等。可选地,网络设备还可以为设置在陆地、水域等位置的基站。
在本申请实施例中,网络设备可以为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。
图1示例性地示出了一种通信系统100。该通信系统包括一个网络设备110和两个终端设备120。在一种实施方式中,该通信系统100可以包括多个网络设备110,并且每个网络设备110的覆盖范围内可以包括其它数量的终端设备120,本申请实施例对此不做限定。
在一种实施方式中,该通信系统100还可以包括移动性管理实体(Mobility Management Entity,MME)、接入与移动性管理功能(Access and Mobility Management Function,AMF)等其它网络实体,本申请实施例对此不作限定。
其中,网络设备又可以包括接入网设备和核心网设备。即无线通信系统还包括用于与接入网设备进行通信的多个核心网。接入网设备可以是长期演进(long-term evolution,LTE)系统、下一代(移动通信系统)(next radio,NR)系统或者授权辅助接入长期演进(authorized auxiliary access long-term evolution,LAA-LTE)系统中的演进型基站(evolutional node B,简称可以为eNB或e-NodeB)宏基站、微基站(也称为“小基站”)、微微基站、接入站点(access point,AP)、传输站点(transmission point,TP)或新一代基站(new generation Node B,gNodeB)等。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统为例,通信设备可包括具有通信功能的网络设备和终端设备,网络设备和终端设备可以为本申请实施例中的具体设备,此处不再赘述;通信设备还可包括通信系统中的其它设备,例如网络控制器、移动管理实体等其它网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本申请的实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。
在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例的相关技术进行说明,以下相关技术作为可选方案与本申请实施例的技术方案可以进行任意结合,其均属于本申请实施例的保护范围。
物联网设备可以分为可穿戴设备,(如相机、耳机、手表、耳机、健康监视器),家居生活设备(如智能灯、相机、恒温器、门传感器、语音助手、扬声器、冰箱、洗衣机、割草机、机器人),办公或者工厂设备(例如打印机、仪表、传感器)。用户可以在他们的家中、办公室、工厂或者他们的身体周围使用这些物联网设备创建(例如,规划、更改拓扑)个人的网络。
目前除了一些可穿戴设备,其它类型的物联网设备只能通过中继设备、网关接入互联网或者通过移动手机接入移动网络。在这两种情况下,移动核心网是无法意识到物联网设备接入到了移动网络中。然而,为了充分利用移动通信网络(如5G系统)来对物联网设备进行辅助管理与业务支持,赋能移动通信网络参与个人物联网是不可或缺的。如图2A所示,用户创建的个人物联网(PIN,Personal IoT Network)由三种类型的设备组成:普通的个人物联网设备(PINE,PIN Element),具有网关能力的个人物联网设备(PEGC,PIN Element with Gateway Capability),具有管理能力的个人物联网设备(PEMC,PIN Element with Management Capability)。其中,普遍的PINE具有基本的通信能力,相互之间可以通过WiFi、蓝牙等直接进行通信或者通过PEGC进行通信。PEGC与PEMC具有接入5G系统的能力,可以利用5G系统为其它的PINE提供数据转发服务和管理服务。
PIN管理的基本流程如图2B所示,详细描述如下。
步骤1-3,PINE(例如PINE、PEGC、PEMC)注册到PIN服务器,包括PINE的认证与授权,PINE ID、PINE配置信息的上报。
步骤4,成功注册后,PEMC向PIN服务器发送请求建立PIN,并完成PIN ID的分配。
步骤5,PEMC向PIN服务器(PIN AS)请求将PEGC加入PIN,如果PEGC同意加入PIN,PIN服务器将会更新PIN配置文件和上下文参数。然后PIN服务器将用于PIN通信的配置参数发送给PEGC。
步骤6,PIN服务器通过网络开放功能(NEF,Network Exposure Funtion),将PIN服务特定参数提供给统一数据仓储功能(UDR,Unified Data Repository),用于PEGC的策略控制。该PIN服务特定参数包括PIN标识(ID)、默认服务质量(QoS,Quality of Service)要求和PIN通信的有效时间。
步骤7,PEMC请求PIN服务器将PINE添加到PIN中,包括PINE的通信要求、关联的PEGC、PINE是否被授权通过PEGC访问5G系统(5GS,5G Syetem)、以及QoS要求。如果PINE同意加入PIN,则PIN服务器更新PIN配置文件和上下文数据。PIN服务器向PINE和PEGC发送配置和参数以进行PIN通信。
步骤8,PIN服务器通过NEF向UDR提供PIN服务特定参数,用于PINE与PEGC的关联。该PIN服务特定参数包括PINE ID、默认QoS要求、PINE与5GS通信的有效时间。
目前个人物联网(PIN,Personal IoT Network)中仅有一个管理设备,如PEMC。当PIN跨地域部署时,PEMC与其它异地部署的PINE之间的信令交互只能通过5GS进行转发,这增加了信令交互的时延。此外,在一些场景中,例如智能家居、智能工厂等,有多个人员需要获取PIN的控制权。此时,PIN中需要部署多个PEMC以支持多个管理人员的需求。当PIN中有多个PEMC时,需要避免多个PEMC的管理控制指令产生矛盾。
图3是根据本申请一实施例的设备管理方法300的示意性流程图。该方法可选地可以应用于图1或图2A所示的系统,但并不仅限于此。该方法包括以下内容的至少部分内容。
S310、第一网络设备向第一物联网设备发送第一消息,该第一消息用于指示该第一物联网设备的操作。
第一物联网设备的操作可以包括第一物联网设备对物联网的操作,例如第一物联网设备对所在的物联网中其他物联网设备的操作,如增加物联网设备、删除物联网设备、修改物联网设备的配置、修改物联网设备的关联关系等。
在一种实施方式中,第一物联网设备可以包括PEMC。
在一种实施方式中,第一网络设备可以是现有的核心网网元(如UDM/UDR)、新的用于PIN管理的网元或者第三方应用。
当新的物联网设备(如PEMC)加入PIN网络时,第一网络设备可以向PEMC发送用于指示第一物联网设备的操作的第一消息,该第一消息可以对第一物联网设备的操作进行管理;通过第一网络设备的统一调度管理,能够避免多个物联网设备(如PEMC)对物联网的操作的矛盾。
本发明实施例可以采用至少两类方式,实现对多个物联网设备(如PEMC)的管理。第一类方式可以认为是静态的调度方式,即第一网络设备为各个PEMC配置对物联网的操作权限(例如对物联网的操作的有效时间和/或优先级等信息;其中有效时间可以是具体的时长,也可以是某一特定的时间段)各个PEMC可以根据该操作权限来对PIN中的设备进行操作。第二类方式可以认为是动态调度的方式,即PEMC每次对物联网设备进行操作时都需要与第一网络设备或者同一个PIN中其它的PEMC进行协商,在得到第一网络设备和/或同一个PIN中其它的PEMC授权的情况下,可以对物联网设备进行操作。
以下参照附图,分别介绍上述两类方式,并介绍每类方式的具体实施例。
第一类:
在第一类示例中,新的物联网设备(本例中称为第一物联网设备,第一物联网设备可以为PEMC)加入PIN时,第一网络设备可以向该第一物联网设备发送第一消息,该第一消息用于指示第一物联网设备的操作。例如,第一消息中可以携带第一物联网设备的操作权限,该操作权限可以包括第一物联网设备对物联网中其他设备的操作权限。
在一些实施方式中,操作权限可以包括操作的有效时间和操作的优先级中的至少之一。其中,该操作可以包括以下至少之一:
对物联网中的一个物联网设备的操作;
对物联网中的多个物联网设备的操作;
对物联网中的一组物联网设备的操作;
对物联网中的多组物联网设备的操作;
对物联网中的所有物联网设备的操作。
第一网络设备还可以发送第一指示信息,该第一指示信息用于表示第一物联网设备已得到对物联网进行操作的授权。第一指示信息相当于一个令牌(Token),用于向PIN中的设备证明第一物联网设备得到了第一网络设备的授权。在一些实施方式中,该第一指示信息可以由上述第一消息携带,由第一网络设备发送至第一物联网设备。第一物联网设备加入物联网之后,可以在该物联网中广播配置更新通知,配置更新通知可以携带第一物联网设备的标识、该物联网的标识、第一物联网设备对物联网的操作权限和上述第一指示信息中的至少一项,以通知物联网中的其它设备有新的物联网设备加入了该物联网。其中,第一指示信息作为Token,可以向物联网中的其它设备证明第一物联网设备得到了第一网络设备的授权。或者,可以由物联网中原有的第二物联网设备广播配置更新通知,以通知物联网中的其它设备有新的物联网设备加入了该物联网;由于此前第二物联网设备的安全性能够得到保证,因此该配置更新通知中可以不携带第一指示信息。
第一网络设备可以为核心网设备、或者为第三方应用,其中核心网设备可以为现有的核心网设备(或称为核心网网元,如UDM、UDR等),也可以是新的核心网设备。
在发送第一消息之前,第一网络设备可以接收第一物联网设备的请求消息,该请求消息可以用于向第一网络设备请求加入物联网。接收该请求消息的方式可以包括通过应用层接收、通过注册流程接收和通过服务请求流程接收中的至少之一。例如,当第一网络设备为第三方应用时,可以通过应用层接收该请求消息;当第一网络设备为核心网网元时,可以通过注册流程或者服务请求流程接收该请求消息。
在一些实施方式中,第一网络设备还可以向物联网中原有的物联网设备(本例中称为第二物联网设备,第二物联网设备可以为PEMC)发送第二权限信息,该第二权限信息可以包含第一物联网设备操作权限,以将新加入的物联网设备对物联网的操作权限告知物联网中原有的物联网设备。
在一些实施方式中,如果在对新的物联网设备(第一物联网设备)的操作权限进行配置时,改变了原有的物联网设备(第二物联网设备)的操作权限,则第一网络设备可以向第二物联网设备发送第一权限信息,该第一权限信息包含该第二物联网设备的操作权限,可以用于对第二物联网设备的操作权限进行更新。
上述第一权限信息、以及第二权限信息可以采用同一个消息进行发送,也可以采用不同的消息进行发送。
具体实施例一:
图4是本申请具体实施例一的实现流程图。在图4中,PEMC-1表示PIN中原有的物联网设备(即上述第二物联网设备),PEMC-2表示新加入PIN的物联网设备(即上述第一物联网设备)。在本示例中,采用第一网络设备为PEMC分配操作权限(如对PINE/PEGC的操作的有效时间、对PINE/PEGC的操作的优先级等),采用PEMC-1通知PIN中的设备有新的PEMC-2加入PIN。
具体流程如下:
0.PIN网络已经建立,并被分配了PIN ID,网络中的PINE、PEGC和PEMC中的一种或多种设备也被分配了相应的ID。
1.PEMC-2向第一网络设备发起PEMC加入请求消息,该消息包括请求加入的目标PIN ID,请求加入的设备类型为PEMC。当第一网络设备为第三方应用时,该消息通过应用层发送。当第一网络设备为核心网网元时,该消息可以通过注册流程或者服务请求流程上报第一网络设备。
2.第一网络设备对PEMC-2进行认证和授权,如果PEMC-2的加入请求被允许,则为其分配PEMC-2 ID、管理网络的有效时间和PEMC-2的优先级中的一个或多个。该有效时间可以是具体的时长,例如1小时,也可以是某一特定的时间段,例如1:00~2:00。PEMC-2只有在第一网络设备指定的有效 时间内,才能对PIN中的设备进行查找、增加、删除和修改等管理操作中的一种或多种。PEMC的优先级用于指示PEMC的权限等级,用于解决多个PEMC控制信令冲突的问题。当一个PIN设备同时收到多个PEMC控制信令时,可以选择优先级高的PEMC的控制信令执行。此外,由于有新的PEMC接入PIN,需要对原有的PEMC的配置信息(包括有效时间、优先级等)进行更新。
3.第一网络设备将加入响应消息发送至PEMC-2,用于通知PEMC-2的请求是否被允许。若认证授权成功,则该消息中包含PIN ID、PEMC-2 ID、PEMC-2的有效时间和优先级中的一个或多个。若认证授权失败,则该消息中包含失败指示或者失败原因。
4.第一网络设备向PEMC-1发送PIN配置更新通知消息。该消息中包含PIN ID、PEMC-1 ID、PEMC-1的有效时间和更新的PEMC-1的优先级中的一个或多个。此外,该消息中还包含PEMC-2 ID、PEMC-2的有效时间和PEMC-2的优先级中的一个或多个,用于告知PEMC-1有新的PEMC-2加入了其所在的PIN。
5.PEMC-1向PIN中的PINE、PEGC广播PIN配置更新通知,告知PIN中的设备其更新后的配置信息。该消息包含PIN ID、PEMC-1 ID、PEMC-1的有效时间和更新的PEMC-1的优先级中的一个或多个。此外,该消息中还包含PEMC-2 ID、PEMC-2的有效时间和PEMC-2的优先级中的一个或多个,用于告知PIN中的设备有新的PEMC-2加入了其所在的PIN。
在一些实施方式中,可以只执行上述流程中的部分步骤,如执行上述步骤1、3、4和5。
具体实施例二:
图5是本申请具体实施例二的实现流程图。在图5中,PEMC-1表示PIN中原有的物联网设备(即上述第二物联网设备),PEMC-2表示新加入PIN的物联网设备(即上述第一物联网设备)。在本示例中,采用第一网络设备为PEMC分配操作权限(如对PINE/PEGC的操作的有效时间、对PINE/PEGC的操作的优先级等),采用PEMC-2通知PIN中的设备其作为新的PEMC加入PIN。
具体流程如下:
0.同具体实施例一步骤0。
1.同具体实施例一步骤1。
2.同具体实施例一步骤2。
3.第一网络设备将加入响应消息发送至PEMC-2,用于通知PEMC-2的请求是否被允许。若认证授权成功,则该消息中包含PIN ID、PEMC-2 ID、PEMC-2的有效时间和PEMC-2的优先级中的一个或多个,还可以包含允许加入PIN的Token。该Token用于向PIN中的设备证明PEMC-2得到了第一网络设备的授权。若认证授权失败,则该消息中包含失败指示或者失败原因。
4.第一网络设备向PEMC-1发送PIN配置更新通知消息。该消息中包含PIN ID、PEMC-1 ID、PEMC-1的有效时间和更新的PEMC-1的优先级中的一个或多个。
5.PEMC-1向PIN中的PINE和/或PEGC广播PIN配置更新通知,告知PIN中的设备其更新后的配置信息。该消息包含PIN ID、PEMC-1 ID、PEMC-1的有效时间和更新的PEMC-1的优先级中的一个或多个。
6.PEMC-2向PIN中的PINE和/或PEGC广播PEMC加入通知,告知PIN中的设备其作为新的PEMC加入了PIN。该消息包含PIN ID、PEMC-2 ID、PEMC-2的有效时间和PEMC-2的优先级中的一个或多个,还可以包含允许加入PIN的Token。
在一些实施方式中,可以只执行上述流程中的部分步骤,如执行上述步骤1、3和6。
第二类:
第一物联网设备(如PEMC)每次对物联网中的设备进行操作时,都需要与第一网络设备和/或同一个PIN中其它的物联网设备(本例中称为第三物联网设备,第三物联网设备可以为PEMC)进行协商,在得到第一网络设备和/或同一个PIN中其它的PEMC(如第三物联网设备)授权的情况下,可以对物联网设备进行操作。第三物联网设备与上述第一类方式中的第二物联网设备,都是指物联网中除第一物联网设备以外的设备,第二物联网设备和第三物联网设备可以完全相同、部分相同或完全不同。
在一些实施方式中,第一网络设备向第一物联网设备发送的第一消息中可以携带授权成功指示或授权失败指示;其中,
该授权成功指示,用于表示第一网络设备允许第一物联网设备进行操作;
该授权失败指示,用于表示第一网络设备拒绝第一物联网设备进行操作。
在一些示例中,该授权成功指示,用于指示第一网络设备允许第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行操作。
在一些示例中,该授权失败指示,用于指示第一网络设备拒绝第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行操作。
进一步地,该第一消息中还可以携带授权信息,授权信息可以包括第一物联网设备的标识、物联网的标识、操作的类型和操作的目标设备的标识中的至少之一。授权信息可以采用密文的形式传输,对第一物联网设备不可见;第一物联网设备对其它设备进行操作时,可以在操作请求中携带该加密形式的授权信息,其它设备能够对该授权信息进行解密,以确认该操作请求是否得到授权。
在发送第一消息之前,第一网络设备可以接收第二消息,该第二消息中携带第一操作请求。该第二消息可以由第一物联网设备发送,该第一操作请求可以用于请求允许该第一物联网设备对物联网设备的操作。
第一操作请求中可以包括以下至少之一:
第一物联网设备的标识;
物联网的标识;
操作的类型;
操作的目标设备的标识。
第一网络设备可以直接对第一物联网设备的操作进行管理和/或控制;或者,第一网络设备可以基于PIN中其它物联网设备(本例中称为第三物联网设备)的反馈,对第一物联网设备的操作进行管理和/或控制。
如果第一网络设备基于第三物联网设备的反馈对第一物联网设备的操作进行管理和/或控制,则第一网络设备可以向至少一个第三物联网设备发送第三消息,该第三物联网设备包括除第一物联网设备以外的其它物联网设备(如第一物联网设备所在物联网中的其他物联网设备),该第三消息携带该第一操作请求。或者,该第一操作请求可以由第一物联网设备直接发送至第三物联网设备,例如,第一物联网设备向第三物联网设备发送第四消息,第四消息中携带第一操作请求。
第一网络设备向第一物联网设备发送第一消息之前,还可以包括:
第一网络设备接收至少一个第三物联网设备对该操作的授权成功指示或授权失败指示;
第一网络设备根据至少一个第三物联网设备对该操作的授权成功指示或授权失败指示,决定是否允许该第一物联网设备进行该操作。例如,如果所有第三物联网设备均允许对第一物联网设备的操作进行授权,则第一网络设备确定允许该操作;或者,如果允许对第一物联网设备的操作进行授权的第三物联网设备的数量占总数量的比例等于或大于预定比例,则第一网络设备确定允许该操作。
或者,本申请实施例可以不设置第一网络设备,而是由各个第三物联网设备对第一物联网设备的操作进行管理和/或控制。这种情况下,第一物联网设备可以分别向各个第三物联网设备发送第一操作请求,各个第三物联网设备分别向第一物联网设备反馈对操作的授权成功指示或授权失败指示,该操作包括第一物联网设备对物联网的操作。第一物联网设备根据接收到的各个第三物联网设备的授权成功指示或授权失败指示,确定是否进行操作。例如,如果所有第三物联网设备均允许对第一物联网设备的操作进行授权,则第一物联网设备确定出可以进行该操作;或者,如果允许对第一物联网设备的操作进行授权的第三物联网设备的数量占总数量的比例等于或大于预定比例,则第一物联网设备确定出可以进行该操作。进一步地,第三物联网设备还可以向第一物联网设备发送授权信息,授权信息可以包括第一物联网设备的标识、物联网的标识、操作的类型和操作的目标设备的标识中的至少之一。授权信息可以采用密文的形式传输,对第一物联网设备不可见。
上述过程中,第一物联网设备向第三物联网设备发送的第一操作请求,可以包括以下至少之一:
第一物联网设备的标识;
物联网的标识;
操作的类型;
操作的目标设备的标识。
在获得对操作的授权之后,第一物联网设备可以向该操作的目标设备发送管理操作请求,该管理操作请求中携带以下至少之一:
第一物联网设备的标识;
物联网的标识;
操作的类型;
操作的目标设备的标识;
授权信息。
操作的目标设备在接收到该管理操作请求后,可以解密管理操作请求中的授权信息,得到授权信息的明文;再将授权信息的明文与该管理操作请求中的操作的类型等信息进行比对,在比对结果一致的情况下,确认第一物联网设备的操作已经得到授权,则操作的目标设备可以执行该操作。
其中,该操作的类型包括以下至少之一:
添加物联网设备;
删除物联网设备;
修改物联网设备的配置;
修改物联网设备的关联关系。
具体实施例三:
图6是本申请具体实施例三的实现流程图。在图6中,PEMC表示新加入PIN的物联网设备(即上述第一物联网设备)。在本示例中,采用第一网络设备为PEMC的实时请求进行授权,以实现对PIN进行管理。
具体流程如下:
0.PIN网络建立成功,PIN中的PINE、PEGC、PEMC完成了认证授权。
1.当PEMC需要对PIN中的PINE、PEGC进行管理操作时,需要先向第一网络设备发送PIN管理操作授权请求。该请求消息包括PIN ID、PINE ID、PEGC ID、PEMC ID和操作类型中的一个或多个。这里,操作类型包括添加物联网设备(如PINE和/或PEGC)、删除物联网设备(如PINE和/或PEGC)、修改物联网设备(如PINE和/或PEGC)的配置、以及修改物联网设备(如PINE和/或PEGC)的关联关系中的一种或多种。其中,关联关系可以指设备之间的通信联通状态,如PINE与PINE之间的通信联通状态、PINE与PEGC之间的通信联通状态等。
2.第一网络设备向PEMC发送PIN管理操作授权响应。如果第一网络设备同意授权,则该PIN管理操作授权响应包含授权标识(或授权指示、授权成功指示)。进一步地,该PIN管理操作授权响应中还可以包含授权信息,该授权信息可以包含PIN ID、PEMC ID、管理操作类型、以及操作目标设备PINE ID、PEGC ID中的一个或多个。该授权信息可以密文形式发送,对PEMC不可见。如果第一网络设备不同意授权,则在PIN管理操作授权响应中包含授权失败指示,还可以包含授权失败的原因。
3.若PEMC收到的PIN管理操作授权响应消息中包含授权标识,则可以对PINE和/或PEGC进行删除、添加、修改等管理操作中的一种或多种。具体地,PEMC会向目标设备发送PIN管理操作请求,该请求包含PIN ID、PEMC ID、PINE/PEGC ID、操作类型、授权标识、授权信息中的一个或多个。若PEMC收到的PIN管理操作授权响应消息中包含授权失败指示,则不向目标设备发送PIN管理操作请求。请求授权失败的PEMC可以在一段时间后重新发起授权请求。
4.目标设备PINE/PEGC收到请求后,可以对PIN管理操作请求中的授权信息进行解密,得到授权信息的明文,并将授权信息的明文与消息中的明文信息部分(如ID信息、操作类型等)进行比对,如果二者一致则按照PEMC请求执行相应操作,否则拒绝执行该更新请求。然后,目标设备向PEMC发送PIN管理操作响应,用于告知其请求的管理操作是否成功执行。
在一些实施方式中,可以只执行上述流程中的部分步骤,如执行上述步骤1和步骤2。
具体实施例四:
图7是本申请具体实施例四的实现流程图。在图7中,PEMC-1表示新加入PIN的物联网设备(即上述第一物联网设备),PEMC-2和PEMC-3表示PIN中其它的物联网设备(即上述第三物联网设备)。在本示例中,采用第一网络设备和PIN中其它的PEMC,为PIN中新加入的PEMC的实时请求进行联合授权,以实现对PIN进行管理。
具体流程如下:
0.同实施例三步骤0。
1.同实施例三步骤1。
2.第一网络设备向授权请求消息中指示的PIN中的其它所有PEMC发送PIN管理操作授权请求消息。该请求消息包括PIN ID、PINE ID、PEGC ID、PEMC-1 ID、操作类型中的一个或多个。这里,操作类型包括添加物联网设备(如PINE和/或PEGC)、删除物联网设备(如PINE和/或PEGC)、修改物联网设备(如PINE和/或PEGC)的配置、以及修改物联网设备(如PINE和/或PEGC)的关联关系中的一种或多种。
3.各个PEMC向第一网络设备返回PIN管理操作授权响应消息。若其它的PEMC同意PEMC-1的请求,则在响应消息中包含授权成功指示。若其它的PEMC不同意PEMC-1的请求,则在响应消息中包含授权失败指示。
4.当同一PIN中的其它PEMC都同意PEMC-1的授权请求、或者同一PIN中同意PEMC-1的授权请求的其它PEMC的数量占总数量的比例大于或等于预定比例时,第一网络设备向PEMC-1发送PIN管理操作授权响应,该PIN管理操作授权响应包含授权标识(或授权指示、授权成功指示)。进一步地,该PIN管理操作授权响应中还可以包含授权信息,该授权信息可以包含PIN ID、PEMC ID、管理操作类型、以及操作目标设备的标识(如PINE ID或PEGC ID)中的一个或多个。该授权信息可以密文形 式发送,对PEMC不可见。如果第一网络设备不同意授权,则在PIN管理操作授权响应中包含授权失败指示,还可以包含授权失败的原因。
5.同实施例三步骤3。
6.同实施例三步骤4。
在一些实施方式中,可以只执行上述流程中的部分步骤,如执行上述步骤1、3和4。
具体实施例五:
图8是本申请具体实施例五的实现流程图。在图8中,PEMC-1表示新加入PIN的物联网设备(即上述第一物联网设备),PEMC-2和PEMC-3表示PIN中其它的物联网设备(即上述第三物联网设备)。在本示例中,采用PIN中其它的PEMC,为PIN中新加入的PEMC的实时请求进行联合授权,以实现对PIN进行管理。
具体流程如下:
0.同实施例三步骤0。
1.当PEMC-1需要对PIN中的PINE、PEGC进行管理操作时,需要向同一PIN内的其它PEMC(如图8中的PEMC-2和PEMC-3)发送PIN管理操作授权请求。该请求消息包括PIN ID、PINE ID和/或PEGC ID、PEMC-1 ID、操作类型中的一个或多个。这里,操作类型包括添加物联网设备(如PINE和/或PEGC)、删除物联网设备(如PINE和/或PEGC)、修改物联网设备(如PINE和/或PEGC)的配置、以及修改物联网设备(如PINE和/或PEGC)的关联关系中的一种或多种。
2.各个PEMC(如图8中的PEMC-2和PEMC-3)向PEMC-1返回PIN管理操作授权响应消息。若其它的PEMC同意PEMC-1的请求,则在响应消息中包含授权成功指示。若其它的PEMC不同意PEMC-1的请求,则在响应消息中包含授权失败指示。如果授权成功,响应消息中还可以包括授权信息;该授权信息包含PIN ID、PEGC ID、管理操作类型、以及操作目标设备的标识(如PINE ID或PEGC ID)中的一个或多个。该授权信息可以密文形式发送,对PEMC不可见。如果授权失败,响应消息中还可以包括失败原因。
3.同实施例三步骤3。
4.同实施例三步骤4。
在一些实施方式中,可以只执行上述流程中的部分步骤,如执行上述步骤1和步骤2。
实施例一至五主要从PEMC的角度来描述多个PEMC如何协同管理PIN内的设备。除了PEMC发起的PIN管理操作之外,PINE或PEGC也可以主动请求PEMC将其加入PIN、退出PIN或者为其提供配置信息。当PINE或PEGC主动发起请求时,需要先发现合适的PEMC为其提供服务。
在一些实施方式中,本申请实施例提出的设备管理方法还可以包括:
第一网络设备接收物联网设备发现请求;
第一网络设备发送物联网设备发现响应,该物联网设备发现响应中携带该物联网中全部或部分物联网设备的信息。
例如,物联网设备发现请求携带可以物联网设备的标识和物联网的标识中的至少之一。
在一些示例中,物联网设备的信息可以包括PEMC的IP地址、PEMC的位置、PEMC的操作权限和PEMC的剩余电量中的至少之一。
具体地,当第一网络设备为第三方应用时,PINE和PEGC可以通过应用层直接向第一网络设备发起PEMC发现请求(如以下具体实施例六);当第一网络设备为核心网网元时,PINE可以通过PEGC发起PEMC发现请求(如以下具体实施例七)。
具体实施例六:
图9是本申请具体实施例六的实现流程图。在图9中,PINE/PEGC可以直接向第一网络设备发起PEMC发现请求,来选择合适的PEMC为其服务。具体流程如下。
1.PINE/PEGC向第一网络设备发起PEMC发现请求消息。该消息中包括PINE/PEGC ID、PIN ID。当第一网络设备为第三方应用时,该消息可以通过应用层发送。当第一网络设备为核心网网元时,该消息可以通过注册流程或者服务请求流程携带。
2.第一网络设备向PINE/PEGC返回PEMC发现响应消息。该消息中包括PINE/PEGC ID、PIN ID、PEMC列表。该PEMC列表包含PIN内所有或部分PEMC的信息,例如PEMC ID、PEMC IP地址、PEMC的位置信息、PEMC的操作权限(如有效时间、优先级等)和剩余电量中的一个或多个。
PINE可以根据收到的PEMC列表中各个PEMC的信息来判断其可用性、可达性、稳定性,从而选择合适的PEMC为其服务。当第一网络设备为第三方应用时,该消息可以通过应用层发送。当第一网络设备为核心网网元时,该消息可以通过注册流程或者服务请求流程携带。
在一些实施方式中,可以只执行上述流程中步骤2。
具体实施例七:
图10是本申请具体实施例七的实现流程图。在图10中,PINE可以通过PEGC来向第一网络设备发起PEMC发现请求,具体流程如下:
1.PINE/PEGC向PEGC发起PEMC发现请求消息。该消息中包括PINE ID和/或PIN ID。
2.同实施例六步骤1。
3.同实施例六步骤2。
4.PEGC向PINE返回PEMC发现响应信息,该消息中包括PINE ID、PEGC ID、PIN ID、PEMC列表中的一个或多个。
在一些实施方式中,可以只执行上述流程中的部分步骤,如执行上述步骤3和步骤4。
本申请解决了具有多个PEMC的PIN管理问题。本申请所提出的基于有效时间和/或优先级的调度方式通过对物联网操作的有效时间、优先级的分配,保证了同一时刻只有一个PEMC对网络中的PINE、PEGC等设备进行管理,从而避免了多PEMC控制信令之间的矛盾。同时也解决了新的PEMC加入PIN的问题。本申请实施例提出的静态的调度方式(如实施例一、二)主要适用于智能工厂这类管理人员轮流上岗的场景。此外,本方案还提出了基于控制中心授权的调度的方式(如实施例三)用于解决智能家居等管理人员管理时间较为重叠的场景。而基于PEMC联合授权调度(如实施例四、五)则可以解决智能监控等涉及用户隐私与社会安全的场景中的控制信令一致性问题,此类场景中一个PEMC的管理操作往往需要其它PEMC全部同意。此外,本申请实施例还提出两种PEMC发现与选择方式(如实施例六、七),用于PINE或者PEGC选择合适的PEMC为其服务。
图11是根据本申请一实施例的设备管理方法1100的示意性流程图。该方法可选地可以应用于图1或图2A所示的系统,但并不仅限于此。该方法包括以下内容的至少部分内容。
S1110、第一物联网设备接收第一消息,该第一消息用于指示该第一物联网设备的操作。
第一物联网设备可以从第一网络设备接收该第一消息。
在一些实施方式中,该第一消息中携带第一物联网设备的操作权限。
在一些实施方式中,第一物联网设备接收第一消息之前,该设备管理方法还可以包括:第一物联网设备发送第一物联网设备的请求消息。第一物联网设备可以向该第一网络设备发送该请求消息,用于请求允许对物联网进行操作。
在一些实施方式中,第一物联网设备通过以下方式中的至少之一,发送第一物联网设备的请求消息:
通过应用层发送;
通过注册流程发送;
通过服务请求流程发送。
例如,如果第一网络设备为第三方应用,则第一物联网设备可以通过应用层发送该请求;如果第一网络设备为核心网网元,则第一物联网设备可以通过注册流程或者服务请求流程接收该请求。
在一些实施方式中,该设备管理方法还可以包括,第一物联网设备接收第一指示信息,该第一指示信息用于表示第一物联网设备已得到对物联网进行操作的授权。
具体地,该第一指示信息可以由第一消息携带。
在一些实施方式中,该设备管理方法还可以包括,第一物联网设备向物联网中的设备广播配置更新通知,该配置更新通知携带以下至少之一:
第一物联网设备的标识;
物联网的标识;
第一物联网设备的操作权限;
第一指示信息。
在一些实施方式中,操作权限包括操作的有效时间和操作的优先级中的至少一项。
在一些实施方式中,操作包括以下至少之一:
对物联网中的一个物联网设备的操作;
对物联网中的多个物联网设备的操作;
对物联网中的一组物联网设备的操作;
对物联网中的多组物联网设备的操作;
对物联网中的所有物联网设备的操作。
在一些实施方式中,该第一消息中携带授权成功指示或授权失败指示;其中,
授权成功指示,用于表示第一网络设备允许第一物联网设备进行操作;
授权失败指示,用于表示第一网络设备拒绝第一物联网设备进行操作。
具体地,该授权成功指示,可以用于指示允许第一物联网设备对物联网中的一个、多个、一组、多 组或全部物联网设备进行操作;
该授权失败指示,可以用于指示拒绝第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行操作。
在一些实施方式中,该第一消息中还携带授权信息,授权信息包括以下至少之一:
第一物联网设备的标识;
物联网的标识;
操作的类型;
操作的目标设备的标识。
在一些实施方式中,该授权信息为密文信息。
在一些实施方式中,第一消息由第一网络设备发送。
在一些实施方式中,第一网络设备包括核心网设备或第三方应用。
在一些实施方式中,该第一消息由至少一个第三物联网设备发送,第三物联网设备包括物联网中除第一物联网设备以外的其它物联网设备。
在一些实施方式中,该设备管理方法还包括:第一物联网设备根据由至少一个第三物联网设备发送的第一消息,确定是否对物联网进行操作。
在一些实施方式中,第一物联网设备接收第一消息之前,还可以包括:第一物联网设备向第一网络设备发送第二消息,该第二消息中携带第一操作请求。
或者,在另一些实施方式中,第一物联网设备接收第一消息之前,还可以包括:第一物联网设备向第三物联网设备发送第四消息,该第四消息中携带第一操作请求。
具体地,该第一操作请求中包括以下至少之一:
第一物联网设备的标识;
物联网的标识;
操作的类型;
操作的目标设备的标识。
在一些实施方式中,该设备管理方法还可以包括,第一物联网设备向操作的目标设备发送管理操作请求,该管理操作请求中携带以下至少之一:
第一物联网设备的标识;
物联网的标识;
操作的类型;
操作的目标设备的标识;
授权信息。
在一些实施方式中,操作的类型包括以下至少之一:
添加物联网设备;
删除物联网设备;
修改物联网设备的配置;
修改物联网设备的关联关系。
在一些实施方式中,该第一物联网设备包括PEMC。
本实施例的第一物联网设备执行方法1100的具体示例可以参见上述方法300的中关于第一物联网设备的相关描述,为了简洁,在此不再赘述。
图12是根据本申请一实施例的设备管理方法1200的示意性流程图。该方法可选地可以应用于图1或图2A所示的系统,但并不仅限于此。该方法包括以下内容的至少部分内容。
S1210、第三物联网设备发送对第一物联网设备的操作的授权成功指示或授权失败指示。
在一些实施方式中,该授权成功指示,用于指示允许第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行操作。
在一些实施方式中,该授权失败指示,用于指示拒绝第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行操作。
在一些实施方式中,第三物联网设备向第一网络设备发送授权成功指示或授权失败指示。
在一些实施方式中,第三物联网设备向第一网络设备发送授权成功指示或授权失败指示之前,还可以包括:第三物联网设备从第一网络设备接收第三消息,该第三消息用于携带第一操作请求。
在另一些实施方式中,第三物联网设备向第一物联网设备发送授权成功指示或授权失败指示。
在一些实施方式中,第三物联网设备向第一物联网设备发送授权成功指示或授权失败指示之前,还可以包括:第三物联网设备从第一物联网设备接收第四消息,该第四消息用于携带第一操作请求。
在一些实施方式中,第三物联网设备还可以向第一物联网设备发送授权信息,该授权信息包括以下至少之一:
第一物联网设备的标识;
物联网的标识;
操作的类型;
操作的目标设备的标识。
该授权信息可以携带在授权成功指示中进行发送。
在一些实施方式中,该授权信息为密文信息。
本实施例的第三物联网设备执行方法1200的具体示例可以参见上述方法300的中关于第三物联网设备的相关描述,为了简洁,在此不再赘述。
图13是根据本申请一实施例的设备发现方法1300的示意性流程图。该方法可选地可以应用于图1或图2A所示的系统,但并不仅限于此。该方法包括以下内容的至少部分内容。
S1310、第四物联网设备接收物联网设备发现响应,该物联网设备发现响应中携带物联网中全部或部分物联网设备的信息。
在一些实施方式中,第四物联网设备接收物联网设备发现响应之前,还可以包括:第四物联网设备发送物联网设备发现请求。
在一些实施方式中,该物联网设备发现请求携带第四物联网设备的标识和物联网的标识中的至少之一。
在一些实施方式中,物联网设备的信息包括PEMC的IP地址、PEMC的位置、PEMC的操作权限和PEMC的剩余电量中的至少之一。
在一些实施方式中,该第四物联网设备包括PINE或PEGC。
在一些实施方式中,第四物联网设备包括PEGC的情况下,第四物联网设备发送物联网设备发现请求之前,还可以包括:第四物联网设备接收PINE的物联网设备发现请求;
第四物联网设备接收物联网设备发现响应之后,还可以包括:第四物联网设备将物联网设备发现响应发送至该PINE。
本实施例的第四物联网设备执行方法1300的具体示例可以参见上述方法300的中关于物联网中PINE或PEGC的相关描述,为了简洁,在此不再赘述。
在本申请各个实施例中,物联网可以指个人物联网(PIN),物联网设备可以指个人物联网中的设备,如PEGC、PEMC、PINE等。
图14是根据本申请一实施例的网络设备1400的示意性框图。该网络设备1400可以包括:
第一发送模块1410,用于向第一物联网设备发送第一消息,该第一消息用于指示第一物联网设备的操作。
在一些实施方式中,第一消息中携带所述第一物联网设备对所述物联网的操作权限。
图15是根据本申请一实施例的网络设备1500的示意性框图。如图15所示,在一些实施方式中,该网络设备还可以包括:
第一接收模块1520,用于接收所述第一物联网设备的请求消息。
在一些实施方式中,第一接收模块1520通过以下方式中的至少之一,接收所述第一物联网设备的请求消息:
通过应用层接收;
通过注册流程接收;
通过服务请求流程接收。
在一些实施方式中,该第一发送模块1410还用于,发送第一指示信息,所述第一指示信息用于表示所述第一物联网设备已得到对所述物联网进行操作的授权。
在一些实施方式中,第一指示信息由所述第一消息携带。
在一些实施方式中,该网络设备还包括,第二发送模块1530,用于向第二物联网设备发送第一操作权限,所述第一操作权限用于对所述第二物联网设备的操作权限进行更新。
在一些实施方式中,该第二发送模块1530还用于向所述第二物联网设备发送所述第一物联网设备的操作权限。
在一些实施方式中,操作权限包括操作的有效时间和操作的优先级中的至少一项。
在一些实施方式中,操作包括以下至少之一:
对所述物联网中的一个物联网设备的操作;
对所述物联网中的多个物联网设备的操作;
对所述物联网中的一组物联网设备的操作;
对所述物联网中的多组物联网设备的操作;
对所述物联网中的所有物联网设备的操作。
在一些实施方式中,第一消息中携带授权成功指示或授权失败指示;其中,
所述授权成功指示,用于表示所述第一网络设备允许所述第一物联网设备进行所述操作;
所述授权失败指示,用于表示所述第一网络设备拒绝所述第一物联网设备进行所述操作。
在一些实施方式中,授权成功指示,用于指示允许所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
在一些实施方式中,授权失败指示,用于指示拒绝所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
在一些实施方式中,第一消息中还携带授权信息,所述授权信息包括以下至少之一:
所述第一物联网设备的标识;
所述物联网的标识;
所述操作的类型;
所述操作的目标设备的标识。
在一些实施方式中,授权信息为密文信息。
如图15所示,在一些实施方式中,该网络设备还可以包括:第二接收模块1540,用于接收第二消息,所述第二消息中携带第一操作请求。
在一些实施方式中,该网络设备还可以包括:第三发送模块1550,用于向至少一个第三物联网设备发送第三消息,所述第三物联网设备包括除所述第一物联网设备以外的其他物联网设备,所述第三消息用于携带所述第一操作请求。
在一些实施方式中,该网络设备还可以包括:
第三接收模块1560,用于接收至少一个第三物联网设备对所述操作的授权成功指示或授权失败指示,所述第三物联网设备包括除所述第一物联网设备以外的其他物联网设备;
决策模块1570,用于根据所述至少一个第三物联网设备对所述操作的授权成功指示或授权失败指示,决定是否允许所述第一物联网设备进行所述操作。
在一些实施方式中,操作的请求中包括以下至少之一:
所述第一物联网设备的标识;
所述物联网的标识;
所述操作的类型;
所述操作的目标设备的标识。
在一些实施方式中,操作的类型包括以下至少之一:
添加物联网设备;
删除物联网设备;
修改物联网设备的配置;
修改物联网设备的关联关系。
在一些实施方式中,物联网设备包括PINE和/或PEGC。
在一些实施方式中,第一物联网设备包括PEMC。
在一些实施方式中,第二物联网设备包括PEMC。
在一些实施方式中,第三物联网设备包括PEMC。
在一些实施方式中,该网络设备还可以包括:
请求接收模块1580,用于接收物联网设备发现请求;
响应模块1590,用于发送物联网设备发现响应,所述物联网设备发现响应中携带所述物联网中全部或部分物联网设备的信息。
在一些实施方式中,物联网设备发现请求携带所述物联网设备的标识和所述物联网的标识中的至少之一。
在一些实施方式中,物联网设备的信息包括PEMC的IP地址、所述PEMC的位置、所述PEMC对所述物联网的操作权限和所述PEMC的剩余电量中的至少之一。
在一些实施方式中,该网络设备包括核心网设备或第三方应用。
本申请实施例的网络设备1400和1500能够实现前述的方法实施例中的第一网络设备的对应功能。该网络设备1400和1500中的各个模块(子模块、单元或组件等)对应的流程、功能、实现方式以及有益效果,可参见上述方法实施例中的对应描述,在此不再赘述。需要说明,关于申请实施例的网络设备 1400和1500中的各个模块(子模块、单元或组件等)所描述的功能,可以由不同的模块(子模块、单元或组件等)实现,也可以由同一个模块(子模块、单元或组件等)实现。
图16是根据本申请一实施例的物联网设备1600的示意性框图。该物联网设备1600可以包括:
第四接收模块1610,用于接收第一消息,该第一消息用于指示第一物联网设备的操作。
在一些实施方式中,第一消息中携带所述第一物联网设备的操作权限。
图17是根据本申请一实施例的物联网设备1700的示意性框图。如图17所示,在一些实施方式中,该物联网设备还可以包括:
第四发送模块1720,用于发送所述第一物联网设备的请求消息。
在一些实施方式中,第四发送模块1720通过以下方式中的至少之一,发送所述第一物联网设备的请求消息:
通过应用层发送;
通过注册流程发送;
通过服务请求流程发送。
在一些实施方式中,该第四接收模块1610还用于,接收第一指示信息,所述第一指示信息用于表示所述第一物联网设备已得到操作的授权。
在一些实施方式中,第一指示信息由所述第一消息携带。
如图17所示,在一些实施方式中,该物联网设备还包括广播模块1730,用于所述物联网中的设备广播配置更新通知,所述配置更新通知携带以下至少之一:
所述第一物联网设备的标识;
所述物联网的标识;
所述第一物联网设备的操作权限;
所述第一指示信息。
在一些实施方式中,操作权限包括操作的有效时间和操作的优先级中的至少一项。
在一些实施方式中,操作包括以下至少之一:
对所述物联网中的一个物联网设备的操作;
对所述物联网中的多个物联网设备的操作;
对所述物联网中的一组物联网设备的操作;
对所述物联网中的多组物联网设备的操作;
对所述物联网中的所有物联网设备的操作。
在一些实施方式中,第一消息中携带授权成功指示或授权失败指示;其中,
所述授权成功指示,用于表示所述第一网络设备允许所述第一物联网设备进行所述操作;
所述授权失败指示,用于表示所述第一网络设备拒绝所述第一物联网设备进行所述操作。
在一些实施方式中,授权成功指示,用于指示允许所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
在一些实施方式中,授权失败指示,用于指示拒绝所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
在一些实施方式中,第一消息中还携带授权信息,所述授权信息包括以下至少之一:
所述第一物联网设备的标识;
所述物联网的标识;
所述操作的类型;
所述操作的目标设备的标识。
在一些实施方式中,授权信息为密文信息。
在一些实施方式中,第一消息由第一网络设备发送。
在一些实施方式中,第一网络设备包括核心网设备或第三方应用。
在一些实施方式中,第一消息由至少一个第三物联网设备发送,所述第三物联网设备包括除所述第一物联网设备以外的其他物联网设备。
如图17所示,在一些实施方式中,该物联网设备还包括:
确定模块1731,用于根据所述第一消息,确定是否对所述物联网进行操作。
如图17所示,在一些实施方式中,该物联网设备还包括:第一请求模块1740,用于向所述第一网络设备发送第二消息,所述第二消息中携带第一操作请求。
在一些实施方式中,该物联网设备还包括:第二请求模块1750,用于向第三物联网设备发送第四消息,所述第四消息中携带第一操作请求;其中,所述第三物联网设备包括除所述第一物联网设备以外 的其他物联网设备。
在一些实施方式中,第一操作请求中包括以下至少之一:
所述第一物联网设备的标识;
所述物联网的标识;
操作的类型;
操作的目标设备的标识。
如图17所示,在一些实施方式中,该物联网设备还包括:
管理请求模块1760,用于向所述第一操作的目标设备发送管理操作请求,所述管理操作请求中携带以下至少之一:
所述第一物联网设备的标识;
所述物联网的标识;
操作的类型;
操作的目标设备的标识;
所述授权信息。
在一些实施方式中,操作的类型包括以下至少之一:
添加物联网设备;
删除物联网设备;
修改物联网设备的配置;
修改物联网设备的关联关系。
在一些实施方式中,该物联网设备包括PEMC。
本申请实施例的物联网设备1600和1700能够实现前述的方法实施例中的第一物联网设备的对应功能。该物联网设备1600和1700中的各个模块(子模块、单元或组件等)对应的流程、功能、实现方式以及有益效果,可参见上述方法实施例中的对应描述,在此不再赘述。需要说明,关于申请实施例的物联网设备1600和1700中的各个模块(子模块、单元或组件等)所描述的功能,可以由不同的模块(子模块、单元或组件等)实现,也可以由同一个模块(子模块、单元或组件等)实现。
图18是根据本申请一实施例的物联网设备1800的示意性框图。该物联网设备1800可以包括:
第五发送模块1810,用于发送对第一物联网设备的操作的授权成功指示或授权失败指示。
在一些实施方式中,授权成功指示,用于指示允许所述第一物联网设备对所述物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
在一些实施方式中,授权失败指示,用于指示拒绝所述第一物联网设备对所述物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
在一些实施方式中,第五发送模块1810向第一网络设备发送所述授权成功指示或授权失败指示。
图19是根据本申请一实施例的物联网设备1900的示意性框图。如图19所示,在一些实施方式中,该物联网设备还可以包括:
第五接收模块1920,用于从所述第一网络设备接收第三消息,所述第三消息用于携带第一操作请求。
在一些实施方式中,第五发送模块1810向所述第一物联网设备发送所述授权成功指示或授权失败指示。
在一些实施方式中,该物联网设备还可以包括:
第六接收模块1930,用于从所述第一物联网设备接收第四消息,所述第四消息用于携带第一操作请求。
在一些实施方式中,该物联网设备还可以包括:
授权模块1940,用于向所述第一物联网设备发送授权信息,所述授权信息包括以下至少之一:
所述第一物联网设备的标识;
所述物联网的标识;
操作的类型;
操作的目标设备的标识。
在一些实施方式中,授权信息为密文信息。
本申请实施例的物联网设备1800和1900能够实现前述的方法实施例中的第三物联网设备的对应功能。该物联网设备1800和1900中的各个模块(子模块、单元或组件等)对应的流程、功能、实现方式以及有益效果,可参见上述方法实施例中的对应描述,在此不再赘述。需要说明,关于申请实施例的物联网设备1800和1900中的各个模块(子模块、单元或组件等)所描述的功能,可以由不同的模块(子 模块、单元或组件等)实现,也可以由同一个模块(子模块、单元或组件等)实现。
图20是根据本申请一实施例的物联网设备2000的示意性框图。该物联网设备2000可以包括:
第七接收模块2010,用于接收物联网设备发现响应,该物联网设备发现响应中携带物联网中全部或部分物联网设备的信息。
图21是根据本申请一实施例的物联网设备2100的示意性框图,如图21所示,在一些实施方式中,该物联网设备还可以包括:
第六发送模块2120,用于发送物联网设备发现请求。
在一些实施方式中,物联网设备发现请求携带所述第四物联网设备的标识和所述物联网的标识中的至少之一。
在一些实施方式中,物联网设备的信息包括PEMC的IP地址、所述PEMC的位置、所述PEMC的操作权限和所述PEMC的剩余电量中的至少之一。
在一些实施方式中,该物联网设备包括PINE或PEGC。
在一些实施方式中,如图21所示,该物联网设备还可以包括:
第八接收模块2130,用于接收PINE的物联网设备发现请求;
第七发送模块2140,用于将所述物联网设备发现响应发送至所述PINE。
本申请实施例的物联网设备2000和2100能够实现前述的方法实施例中的第四物联网设备的对应功能。该物联网设备2000和2100中的各个模块(子模块、单元或组件等)对应的流程、功能、实现方式以及有益效果,可参见上述方法实施例中的对应描述,在此不再赘述。需要说明,关于申请实施例的物联网设备2000和2100中的各个模块(子模块、单元或组件等)所描述的功能,可以由不同的模块(子模块、单元或组件等)实现,也可以由同一个模块(子模块、单元或组件等)实现。
图22是根据本申请实施例的通信设备2200示意性结构图。该通信设备2200包括处理器2210,处理器2210可以从存储器中调用并运行计算机程序,以使通信设备2200实现本申请实施例中的方法。
在一种实施方式中,通信设备2200还可以包括存储器2220。其中,处理器2210可以从存储器2220中调用并运行计算机程序,以使通信设备2200实现本申请实施例中的方法。
其中,存储器2220可以是独立于处理器2210的一个单独的器件,也可以集成在处理器2210中。
在一种实施方式中,通信设备2200还可以包括收发器2230,处理器2210可以控制该收发器2230与其它设备进行通信,具体地,可以向其它设备发送信息或数据,或接收其它设备发送的信息或数据。
其中,收发器2230可以包括发射机和接收机。收发器2230还可以进一步包括天线,天线的数量可以为一个或多个。
在一种实施方式中,该通信设备2200可为本申请实施例的网络设备,并且该通信设备2200可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
在一种实施方式中,该通信设备2200可为本申请实施例的物联网设备,并且该通信设备2200可以实现本申请实施例的各个方法中由物联网设备实现的相应流程,为了简洁,在此不再赘述。
图23是根据本申请实施例的芯片2300的示意性结构图。该芯片2300包括处理器2310,处理器2310可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
在一种实施方式中,芯片2300还可以包括存储器2320。其中,处理器2310可以从存储器2320中调用并运行计算机程序,以实现本申请实施例中由物联网设备或者网络设备执行的方法。
其中,存储器2320可以是独立于处理器2310的一个单独的器件,也可以集成在处理器2310中。
在一种实施方式中,该芯片2300还可以包括输入接口2330。其中,处理器2310可以控制该输入接口2330与其它设备或芯片进行通信,具体地,可以获取其它设备或芯片发送的信息或数据。
在一种实施方式中,该芯片2300还可以包括输出接口2340。其中,处理器2310可以控制该输出接口2340与其它设备或芯片进行通信,具体地,可以向其它设备或芯片输出信息或数据。
在一种实施方式中,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
在一种实施方式中,该芯片可应用于本申请实施例中的物联网设备,并且该芯片可以实现本申请实施例的各个方法中由物联网设备实现的相应流程,为了简洁,在此不再赘述。
应用于网络设备和物联网设备的芯片可以是相同的芯片或不同的芯片。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
上述提及的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、现成可编程门阵列(field programmable gate array,FPGA)、专用集成电路(application specific integrated circuit,ASIC)或者其它可编程逻辑器件、晶体管逻辑器件、分立硬件组件等。其中,上述提到的通用处理器可以是微处理器或者也可以是任何常规的处理器等。
上述提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行该计算机程序指令时,全部或部分地产生按照本申请实施例中的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络、或者其它可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,该计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(Digital Subscriber Line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以该权利要求的保护范围为准。
Claims (76)
- 一种设备管理方法,包括:第一网络设备向第一物联网设备发送第一消息,所述第一消息用于指示所述第一物联网设备的操作。
- 根据权利要求1所述的方法,其中,所述第一消息中携带所述第一物联网设备的操作权限。
- 根据权利要求2所述的方法,所述第一网络设备向第一物联网设备发送第一消息之前,还包括:所述第一网络设备接收所述第一物联网设备的请求消息。
- 根据权利要求3所述的方法,所述第一网络设备通过以下方式中的至少之一,接收所述第一物联网设备的请求消息:通过应用层接收;通过注册流程接收;通过服务请求流程接收。
- 根据权利要求2-4中任一所述的方法,还包括,所述第一网络设备发送第一指示信息,所述第一指示信息用于表示所述第一物联网设备已得到所述操作的授权。
- 根据权利要求5所述的方法,其中,所述第一指示信息由所述第一消息携带。
- 根据权利要求2-6中任一所述的方法,还包括,所述第一网络设备向第二物联网设备发送第一权限信息,所述第一权限信息包含所述第二物联网设备的操作权限。
- 根据权利要求7所述的方法,还包括,所述第一网络设备向所述第二物联网设备发送第二权限信息,所述第二权限信息包含所述第一物联网设备操作权限。
- 根据权利要求2-8中任一所述的方法,其中,所述操作权限包括操作的有效时间和操作的优先级中的至少一项。
- 根据权利要求9所述的方法,其中,所述操作包括以下至少之一:对物联网中的一个物联网设备的操作;对物联网中的多个物联网设备的操作;对物联网中的一组物联网设备的操作;对物联网中的多组物联网设备的操作;对物联网中的所有物联网设备的操作。
- 根据权利要求1所述的方法,其中,所述第一消息中携带授权成功指示或授权失败指示;其中,所述授权成功指示,用于表示所述第一网络设备允许所述第一物联网设备进行所述操作;所述授权失败指示,用于表示所述第一网络设备拒绝所述第一物联网设备进行所述操作。
- 根据权利要求11所述的方法,其中,所述授权成功指示,用于指示允许所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
- 根据权利要求11所述的方法,其中,所述授权失败指示,用于指示拒绝所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
- 根据权利要求11-13中任一所述的方法,其中,所述第一消息中还携带授权信息,所述授权信息包括以下至少之一:所述第一物联网设备的标识;物联网的标识;所述操作的类型;所述操作的目标设备的标识。
- 根据权利要求14所述的方法,其中,所述授权信息为密文信息。
- 根据权利要求11-15中任一所述的方法,所述第一网络设备向第一物联网设备发送第一消息之前,还包括:所述第一网络设备接收第二消息,所述第二消息中携带第一操作请求。
- 根据权利要求16所述的方法,还包括:所述第一网络设备向至少一个第三物联网设备发送第三消息,所述第三物联网设备包括除所述第一物联网设备以外的其他物联网设备,所述第三消息用于携带所述第一操作请求。
- 根据权利要求11-17中任一所述的方法,所述第一网络设备向第一物联网设备发送第一消息之前,还包括:所述第一网络设备接收至少一个第三物联网设备对所述操作的授权成功指示或授权失败指示,所述第三物联网设备包括除所述第一物联网设备以外的其他物联网设备;所述第一网络设备根据所述至少一个第三物联网设备对所述操作的授权成功指示或授权失败指示, 决定是否允许所述第一物联网设备执行所述操作。
- 根据权利要求16或17所述的方法,其中,所述操作的请求中包括以下至少之一:所述第一物联网设备的标识;所述物联网的标识;所述操作的类型;所述操作的目标设备的标识。
- 根据权利要求14、15或19所述的方法,其中,所述操作的类型包括以下至少之一:添加物联网设备;删除物联网设备;修改物联网设备的配置;修改物联网设备的关联关系。
- 根据权利要求20所述的方法,其中,所述物联网设备包括PINE和/或PEGC。
- 根据权利要求1-21中任一所述的方法,其中,所述第一物联网设备包括具有管理能力的个人物联网设备PEMC。
- 根据权利要求7或8所述的方法,其中,第二物联网设备包括PEMC。
- 根据权利要求15或16所述的方法,其中,第三物联网设备包括PEMC。
- 根据权利要求1-24中任一所述的方法,还包括,所述第一网络设备接收物联网设备发现请求;所述第一网络设备发送物联网设备发现响应,所述物联网设备发现响应中携带物联网中全部或部分物联网设备的信息。
- 根据权利要求25所述的方法,其中,所述物联网设备发现请求携带所述物联网设备的标识和物联网的标识中的至少之一。
- 根据权利要求25或26所述的方法,其中,所述物联网设备的信息包括PEMC的IP地址、所述PEMC的位置、所述PEMC的操作权限和所述PEMC的剩余电量中的至少之一。
- 根据权利要求1-27中任一所述的方法,其中,所述第一网络设备包括核心网设备或第三方应用。
- 一种设备管理方法,包括:第一物联网设备接收第一消息,所述第一消息用于指示所述第一物联网设备的操作。
- 根据权利要求29所述的方法,其中,所述第一消息中携带所述第一物联网设备的操作权限。
- 根据权利要求30所述的方法,所述第一物联网设备接收第一消息之前,还包括:所述第一物联网设备发送所述第一物联网设备的请求消息。
- 根据权利要求31所述的方法,所述第一物联网设备通过以下方式中的至少之一,发送所述请求消息:通过应用层发送;通过注册流程发送;通过服务请求流程发送。
- 根据权利要求30-32中任一所述的方法,还包括,所述第一物联网设备接收第一指示信息,所述第一指示信息用于表示所述第一物联网设备已得到所述操作的授权。
- 根据权利要求33所述的方法,其中,所述第一指示信息由所述第一消息携带。
- 根据权利要求33或34所述的方法,还包括,所述第一物联网设备广播配置更新通知,所述配置更新通知携带以下至少之一:所述第一物联网设备的标识;物联网的标识;所述第一物联网设备操作权限;所述第一指示信息。
- 根据权利要求30-35中任一所述的方法,其中,所述操作权限包括操作的有效时间和操作的优先级中的至少一项。
- 根据权利要求36所述的方法,其中,所述操作包括以下至少之一:对物联网中的一个物联网设备的操作;对物联网中的多个物联网设备的操作;对物联网中的一组物联网设备的操作;对物联网中的多组物联网设备的操作;对物联网中的所有物联网设备的操作。
- 根据权利要求29所述的方法,其中,所述第一消息中携带授权成功指示或授权失败指示;其中,所述授权成功指示,用于表示所述第一网络设备允许所述第一物联网设备进行所述操作;所述授权失败指示,用于表示所述第一网络设备拒绝所述第一物联网设备进行所述操作。
- 根据权利要求38所述的方法,其中,所述授权成功指示,用于指示允许所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
- 根据权利要求38所述的方法,其中,所述授权失败指示,用于指示拒绝所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
- 根据权利要求38-40中任一所述的方法,其中,所述第一消息中还携带授权信息,所述授权信息包括以下至少之一:所述第一物联网设备的标识;物联网的标识;所述操作的类型;所述操作的目标设备的标识。
- 根据权利要求41所述的方法,其中,所述授权信息为密文信息。
- 根据权利要求38-42中任一所述的方法,所述第一消息由第一网络设备发送。
- 根据权利要求43所述的方法,其中,所述第一网络设备包括核心网设备或第三方应用。
- 根据权利要求38-42中任一所述的方法,所述第一消息由至少一个第三物联网设备发送,所述第三物联网设备包括除所述第一物联网设备以外的其他物联网设备。
- 根据权利要求45所述的方法,还包括:所述第一物联网设备根据所述第一消息,确定是否对所述物联网进行操作。
- 根据权利要求38-44中任一所述的方法,所述第一物联网设备接收第一消息之前,还包括:所述第一物联网设备向所述第一网络设备发送第二消息,所述第二消息中携带第一操作请求。
- 根据权利要求38-46中任一所述的方法,所述第一物联网设备接收第一消息之前,还包括:所述第一物联网设备向第三物联网设备发送第四消息,所述第四消息中携带第一操作请求;其中,所述第三物联网设备包括除所述第一物联网设备以外的其他物联网设备。
- 根据权利要求47或48所述的方法,其中,所述第一操作请求中包括以下至少之一:所述第一物联网设备的标识;所述物联网的标识;所述操作的类型;所述操作的目标设备的标识。
- 根据权利要求38-49中任一所述的方法,还包括,所述第一物联网设备向所述操作的目标设备发送管理操作请求,所述管理操作请求中携带以下至少之一:所述第一物联网设备的标识;物联网的标识;所述操作的类型;所述操作的目标设备的标识;所述授权信息。
- 根据权利要求49或50所述的方法,其中,所述操作的类型包括以下至少之一:添加物联网设备;删除物联网设备;修改物联网设备的配置;修改物联网设备的关联关系。
- 根据权利要求29-51中任一所述的方法,其中,所述第一物联网设备包括PEMC。
- 一种设备管理方法,包括:第三物联网设备发送对第一物联网设备的操作的授权成功指示或授权失败指示。
- 根据权利要求53所述的方法,其中,所述授权成功指示,用于指示允许所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
- 根据权利要求53所述的方法,其中,所述授权失败指示,用于指示拒绝所述第一物联网设备对物联网中的一个、多个、一组、多组或全部物联网设备进行所述操作。
- 根据权利要求53-55中任一所述的方法,其中,所述第三物联网设备向第一网络设备发送所述授权成功指示或授权失败指示。
- 根据权利要求56所述的方法,所述第三物联网设备向第一网络设备发送所述授权成功指示或授 权失败指示之前,还包括:所述第三物联网设备从所述第一网络设备接收第三消息,所述第三消息用于携带第一操作请求。
- 根据权利要求53-55中任一所述的方法,其中,所述第三物联网设备向所述第一物联网设备发送所述授权成功指示或授权失败指示。
- 根据权利要求58所述的方法,所述第三物联网设备向所述第一物联网设备发送所述授权成功指示或授权失败指示之前,还包括:所述第三物联网设备从所述第一物联网设备接收第四消息,所述第四消息用于携带第一操作请求。
- 根据权利要求58或59所述的方法,还包括:所述第三物联网设备向所述第一物联网设备发送授权信息,所述授权信息包括以下至少之一:所述第一物联网设备的标识;物联网的标识;所述操作的类型;所述操作的目标设备的标识。
- 根据权利要求60所述的方法,其中,所述授权信息为密文信息。
- 一种设备发现方法,包括:第四物联网设备接收物联网设备发现响应,所述物联网设备发现响应中携带物联网中全部或部分物联网设备的信息。
- 根据权利要求62所述的方法,所述第四物联网设备接收物联网设备发现响应之前,还包括:所述第四物联网设备发送物联网设备发现请求。
- 根据权利要求62或63所述的方法,其中,所述物联网设备发现请求携带所述第四物联网设备的标识和物联网的标识中的至少之一。
- 根据权利要求62-64中任一所述的方法,其中,所述物联网设备的信息包括PEMC的IP地址、所述PEMC的位置、所述PEMC的操作权限和所述PEMC的剩余电量中的至少之一。
- 根据权利要求62-65中任一所述的方法,其中,所述第四物联网设备包括PINE或PEGC。
- 根据权利要求66所述的方法,其中,在所述第四物联网设备包括PEGC的情况下,所述第四物联网设备发送物联网设备发现请求之前,还包括:所述第四物联网设备接收PINE的物联网设备发现请求;所述第四物联网设备接收物联网设备发现响应之后,还包括:所述第四物联网设备将所述物联网设备发现响应发送至所述PINE。
- 一种网络设备,包括:第一发送模块,用于向第一物联网设备发送第一消息,所述第一消息用于指示所述第一物联网设备的操作。
- 一种物联网设备,包括:第四接收模块,用于接收第一消息,所述第一消息用于指示所述物联网设备的操作。
- 一种物联网设备,包括:第五发送模块,用于发送对第一物联网设备的操作的授权成功指示或授权失败指示。
- 一种物联网设备,包括:第七接收模块,用于接收物联网设备发现响应,所述物联网设备发现响应中携带物联网中全部或部分物联网设备的信息。
- 一种设备,包括:处理器、存储器和收发器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序、并控制所述收发器,以使所述网络设备执行如权利要求1至28、29至52、53至61或62至67中任一项所述的方法。
- 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至28、29至52、53至61或62至67中任一项所述的方法。
- 一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被设备运行时使得所述设备执行如权利要求1至28、29至52、53至61或62至67中任一项所述的方法。
- 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至28、29至52、53至61或62至67中任一项所述的方法。
- 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至28、29至52、53至61或62至67中任一项所述的方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/109165 WO2024021088A1 (zh) | 2022-07-29 | 2022-07-29 | 设备管理方法、网络设备和物联网设备 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/109165 WO2024021088A1 (zh) | 2022-07-29 | 2022-07-29 | 设备管理方法、网络设备和物联网设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024021088A1 true WO2024021088A1 (zh) | 2024-02-01 |
Family
ID=89705076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/109165 WO2024021088A1 (zh) | 2022-07-29 | 2022-07-29 | 设备管理方法、网络设备和物联网设备 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024021088A1 (zh) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104135378A (zh) * | 2013-05-03 | 2014-11-05 | 北京优联实科信息科技有限公司 | 对物联网网关进行管理控制的方法及物联网网关管控实体 |
US20180139286A1 (en) * | 2016-03-08 | 2018-05-17 | China United Network Communications Group Company Limited | Method and apparatus for controlling internet of things devices |
CN113765987A (zh) * | 2021-02-20 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | 一种物联网设备管理、处理信息的方法、装置和系统 |
-
2022
- 2022-07-29 WO PCT/CN2022/109165 patent/WO2024021088A1/zh unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104135378A (zh) * | 2013-05-03 | 2014-11-05 | 北京优联实科信息科技有限公司 | 对物联网网关进行管理控制的方法及物联网网关管控实体 |
US20180139286A1 (en) * | 2016-03-08 | 2018-05-17 | China United Network Communications Group Company Limited | Method and apparatus for controlling internet of things devices |
CN113765987A (zh) * | 2021-02-20 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | 一种物联网设备管理、处理信息的方法、装置和系统 |
Non-Patent Citations (1)
Title |
---|
VIVO MOBILE COM. (CHONGQING): "PIN Element definition update and abbreviations added", 3GPP TSG-SA1 MEETING #94-BIS-E S1-212024, 29 June 2021 (2021-06-29), XP052029242 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102456859B1 (ko) | 5g 시스템에서 제공하는 서비스 파라미터를 단말과 네트워크에 프로비져닝하는 방법 | |
WO2022126563A1 (zh) | 网络资源选择方法、终端设备和网络设备 | |
US20220408162A1 (en) | Multicast service transmission method and apparatus | |
WO2020150876A1 (zh) | 会话建立方法、终端设备和网络设备 | |
WO2021136211A1 (zh) | 授权结果的确定方法及装置 | |
WO2021196185A1 (zh) | 无线通信方法、终端设备和网络设备 | |
US20230388756A1 (en) | Communication method and apparatus for multicast/broadcast service | |
WO2023160199A1 (zh) | 一种接入通信网络的方法和装置 | |
US20220263879A1 (en) | Multicast session establishment method and network device | |
TW202015440A (zh) | 無線通訊的方法和設備 | |
TW202014032A (zh) | 無線通訊方法和終端設備 | |
WO2022095047A1 (zh) | 无线通信的方法、终端设备和网络设备 | |
WO2024041288A1 (zh) | 一种切片请求方法和终端设备 | |
WO2023124875A1 (zh) | 一种通信方法及装置 | |
WO2021088007A1 (zh) | 无线通信的方法、终端设备和网络设备 | |
TW202015482A (zh) | 通訊方法和設備 | |
WO2023020481A1 (zh) | 用于传输数据的方法和装置 | |
WO2024021088A1 (zh) | 设备管理方法、网络设备和物联网设备 | |
WO2022155825A1 (zh) | 用于建立通信连接的方法、通信设备和网络功能实体 | |
US20210266816A1 (en) | Method and device for establishing data channel | |
WO2022160205A1 (zh) | 一种数据传输方法、终端设备和网络设备 | |
WO2022141309A1 (zh) | 授权配置方法、终端设备和网络设备 | |
WO2021056142A1 (zh) | 无线通信的方法和设备 | |
WO2023050828A1 (zh) | 一种通信方法及装置 | |
WO2024099230A1 (zh) | 广播安全通信的方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22952535 Country of ref document: EP Kind code of ref document: A1 |