[go: up one dir, main page]

WO2016015366A1 - Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture - Google Patents

Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture Download PDF

Info

Publication number
WO2016015366A1
WO2016015366A1 PCT/CN2014/084403 CN2014084403W WO2016015366A1 WO 2016015366 A1 WO2016015366 A1 WO 2016015366A1 CN 2014084403 W CN2014084403 W CN 2014084403W WO 2016015366 A1 WO2016015366 A1 WO 2016015366A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
donor
acceptor
control center
modification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2014/084403
Other languages
English (en)
Chinese (zh)
Inventor
沈玉将
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Codyy Network Technology Co Ltd
Original Assignee
Suzhou Codyy Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Codyy Network Technology Co Ltd filed Critical Suzhou Codyy Network Technology Co Ltd
Publication of WO2016015366A1 publication Critical patent/WO2016015366A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities

Definitions

  • the present invention belongs to the field of resource control, and in particular, to a resource control architecture based on identity service identity and a method for applying the architecture.
  • the bearer control device first acquires the bearer device.
  • the resource management rules are supported, and the resource operation commands are issued according to the resource management rules.
  • the attribute describing the resource management rule may be added to the audit capability command request, and the resource management rule supported by the bearer device is represented by the value of the corresponding attribute in the audit capability command response.
  • the resource management rule supported by the bearer device may be pre-configured on the bearer control device, and the bearer control device obtains the resource management rule from the device. If there are multiple resource management rules supported by the bearer device, one of the bearer control devices may be selected to indicate that the bearer device subsequently uses the resource management rule.
  • Applicant ZTE Corporation applied for an article on June 24, 2009: the application number is 200910146754.7, the patent name is the policy control architecture of the converged network and the method of implementing policy control, including application functional entity AF, fixed network policy decision An entity and a mobile network policy decision entity, wherein: the AF is configured to provide the fixed network policy decision entity with service information required for the decision, where the service information includes fixed user service information or mobile user service information;
  • the fixed network policy decision entity is configured to receive service information sent by the AF, and determine the service information, and if it is fixed user service information, formulate a fixed network resource control policy according to the fixed user service information; Mobile user service information is forwarded to the mobile network policy decision entity;
  • the mobile network policy decision entity is configured to receive mobile user service information forwarded by the fixed network policy decision entity, and formulate a mobile network resource control policy according to the mobile user service information.
  • the present invention provides an identity-based resource control architecture and a method of applying the architecture to solve the above problems.
  • the invention provides a resource control architecture based on identity service identity.
  • the above-mentioned architecture includes: resource donor, resource receptor, resource management center, resource control center, and identity management center; among them, resource donors, resource receptors, and resource management centers are connected to each other; resource control centers and resources respectively The donor, resource receptor, and resource management center are connected; the identity management center is connected to the resource control center, the resource donor, and the resource receptor.
  • the present invention also provides a resource control architecture method using the above identity based service identity.
  • the above method includes the following steps:
  • the resource donor and the resource receiver obtain their corresponding identity identifiers from the identity management center in advance; meanwhile, the identity management center synchronizes the resource donors, the resource recipients, and their corresponding identity identifiers to the resource control center;
  • the resource control center obtains the resource control strategy
  • the resource control center controls the interaction of resources between resource donors, resource recipients, resource management centers, and identity management centers according to the acquired resource control policies.
  • the resource control architecture based on the identity service identity provided by the present invention and the application of the architecture method implement fine management of resources.
  • resource donors and resource receptors in the scheme can be mutually transformed, which makes the application of the scheme wider and enhances the user experience.
  • the resource management center controls the issuance of the authorization credential and the centralized management of the resources or the resource control center controls the issuance of the authorization credential and the resource control, instead of managing the authorization credential by a separate third party entity, which greatly reduces the system signaling.
  • the interaction between the two saves system resources, improves the communication efficiency of the system, and greatly enhances the user experience.
  • the resource acceptor obtains the fee by paying a certain fee to the resource management center.
  • the way in which the credentials are authorized increases the revenue of the system operator.
  • the resource receptor behavior is monitored to avoid the loss of resource receptor behavior to the resource receptor management.
  • non-target resource receptors acquire new resources, which greatly enhances the user experience.
  • FIG. 1 is a schematic diagram of a resource control architecture based on an identity service identifier according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic diagram showing a method and a flow chart of applying a resource control architecture based on identity service identity shown in FIG. 1 according to Embodiment 2 of the present invention.
  • FIG. 1 is a schematic diagram of a resource control architecture based on an identity service identifier according to Embodiment 1 of the present invention, including: a resource donor, a resource acceptor, a resource management center, a resource control center, and an identity management center; wherein, a resource donor, Resource receptors and resource management centers are connected to each other; resource control centers are connected to resource donors, resource receptors, and resource management centers; and identity management centers are connected to resource control centers, resource donors, and resource recipients.
  • the resource donor is one or more; the resource acceptor is one or more.
  • the resource donor refers to: the resource provider; the resource receptor is the resource receiver; the resource management center is the entity that manages the resource; and the resource control center is the entity that controls the resource interaction.
  • resource donors can become resource receptors under certain conditions; resource receptors can become resource donors under certain conditions.
  • the identity management center provides a resource donor, a resource identifier, and a service identifier.
  • FIG. 2 is a schematic diagram of a method and a flow chart of applying the identity-based resource control architecture shown in FIG. 1 according to Embodiment 2 of the present invention, including the following steps:
  • Step 201 The resource donor and the resource receiver obtain their corresponding identity identifiers from the identity management center in advance; at the same time, the identity management center synchronizes the resource donors, the resource recipients, and their corresponding identity identifiers to the Resource control center;
  • the process for the resource provider and the resource receiver to obtain the corresponding identity identifier from the identity management center in advance is: the resource donor and the resource receiver respectively send an identity identification request to the identity management center; the identity management center feeds the identity And identifying, by the identity response message, the identity identifier information of the resource donor or the resource identifier.
  • Step 202 The resource control center acquires a resource control policy.
  • the resource control center obtains the resource control policy by the resource control center itself or the resource control center to obtain the resource control policy from a third-party entity (for example, a policy controller).
  • a third-party entity for example, a policy controller
  • Step 203 The resource control center controls resource interaction between the resource donor, the resource acceptor, the resource management center, and the identity management center according to the acquired resource control policy.
  • the process of controlling the resource interaction between the resource donor, the resource receptor, the resource management center, and the identity management center according to the acquired resource control policy is:
  • the resource control center is triggered to send a resource credential request to the resource acceptor;
  • the resource acceptor After receiving the resource credential request, the resource acceptor obtains an authorization credential from the resource management center and notifies the resource control center;
  • the resource control center instructs the resource management center to provide the resource resource with the resource that the resource donor has updated
  • the resource identifier modifies the resource that has been updated by the resource provider, acquiring a corresponding modification type identifier from the identifier management center according to the modification type, and carrying the modified type identifier in the modification node.
  • the information is sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the method for obtaining the authorization credential from the resource management center by the resource acceptor is: obtaining the authorization credential by paying a certain fee to the resource management center.
  • the process of triggering the resource control center to send the resource credential request to the resource acceptor is:
  • the resource donor updates the resource that has been provided to the resource acceptor and puts the updated resource into the resource management center, sends a resource credential request to the resource control center;
  • the resource control center sends the resource credential request to the resource acceptor.
  • the process of triggering the resource control center to send the resource credential request to the resource acceptor is:
  • the resource management center After the resource donor updates the resources that have been provided to the resource acceptor and puts the updated resources into the resource management center, the resource management center sends a resource credential request to the resource control center;
  • the resource control center sends the resource credential request to the resource acceptor.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource control center is triggered to send a resource credential request to the resource acceptor;
  • the resource acceptor After receiving the resource credential request, the resource acceptor sends the resource to a resource acceptor manager Voucher request
  • the resource acceptor manager After receiving the resource credential request, the resource acceptor manager obtains an authorization credential from the resource management center and notifies the resource control center;
  • the resource control center instructs the resource management center to provide the resource resource with the resource that the resource donor has updated
  • the resource acceptor modifies the resource that has been updated by the resource provider, obtain the corresponding modification type identifier from the identifier management center according to the modification type, and carry the modified type identifier in the modification result information and send it to the Resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource control center is directly triggered to send a resource credential request to the resource acceptor;
  • the resource acceptor After receiving the resource credential request, the resource acceptor obtains an authorization credential from the resource management center and notifies the resource control center;
  • the resource control center instructs the resource donor to provide the resource resource with the resource that the resource donor has updated
  • the resource identifier modifies the resource that has been updated by the resource provider, acquiring a corresponding modification type identifier from the identifier management center according to the modification type, and carrying the modified type identifier in the modification node.
  • the information is sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the updated resource is provided to the resource management center for storage.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource control center is directly triggered to send a resource credential request to the resource acceptor;
  • the resource acceptor After receiving the resource credential request, the resource acceptor sends the resource credential request to the resource acceptor manager;
  • the resource acceptor manager After receiving the resource credential request, the resource acceptor manager obtains an authorization credential from the resource management center and notifies the resource control center;
  • the resource control center instructs the resource donor to provide the resource resource with the resource that the resource donor has updated
  • the resource acceptor modifies the resource that has been updated by the resource provider, obtain the corresponding modification type identifier from the identifier management center according to the modification type, and carry the modified type identifier in the modification result information and send it to the Resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the updated resource is provided to the resource management center for storage.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource control center instructs the non-target resource acceptor to send a resource credential request to the resource management center;
  • the resource management center After receiving the resource credential request, the resource management center feeds back a resource credential response message to the non-target resource acceptor; wherein the message carries the authorization credential information.
  • the resource control center instructing the resource management center to provide the new resource to the non-target resource recipient
  • the resource resource modifies the new resource
  • the corresponding modification type identifier is obtained from the identity management center according to the modification type, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the manner in which the resource management center obtains the resource donor and resource recipient comparison table is: the resource management center itself configures a resource donor and resource receptor comparison table or acquires resources through a third-party entity (map relationship server) Donor and resource receptor comparison table.
  • the resource donor and resource recipient comparison table obtained by the resource management center is sent to the resource control center for real-time or timing synchronization.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the target resource receptor is determined and the new resource is sent to the target resource recipient;
  • the resource control center instructs the non-target resource acceptor to send a resource credential request to the resource management center;
  • the resource management center After receiving the resource credential request, the resource management center feeds back a resource credential response message to the non-target resource acceptor; wherein the message carries the authorization credential information.
  • the resource control center instructing the resource donor to provide the new resource to the non-target resource acceptor
  • the resource resource modifies the new resource
  • the corresponding modification type identifier is obtained from the identity management center according to the modification type, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the new resource is sent to the resource management center and stored by the resource management center.
  • the manner in which the resource donor obtains the resource donor and resource receptor comparison table is: the resource donor acquires the resource donor and resource receptor comparison table or the resource donor from the resource management center
  • the resource donor and resource receptor comparison table is stored by itself.
  • Resource donor Target resource receptor Resource donor 1 Resource receptor A Resource donor 2 Resource receptor B Resource donor 3 Resource receptor c : : Resource donor n Resource receptor Z
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource control center instructs the resource acceptor manager to send a resource credential request to the resource management center
  • the resource management center After receiving the resource credential request, the resource management center feeds back a resource credential response message to the resource acceptor manager, where the message carries the credential credential information;
  • the resource control center instructing the resource management center to provide the new resource to the non-target resource recipient
  • the resource resource modifies the new resource
  • the corresponding modification type identifier is obtained from the identity management center according to the modification type, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the target resource receptor is determined and the new resource is sent to the target resource recipient;
  • the resource control center instructs the resource acceptor manager to send a resource credential request to the resource management center
  • the resource management center After receiving the resource credential request, the resource management center feeds back a resource credential response message to the resource acceptor manager, where the message carries the credential credential information;
  • the resource control center instructing the resource donor to provide the new resource to the non-target resource acceptor
  • the resource resource modifies the new resource
  • the corresponding modification type identifier is obtained from the identity management center according to the modification type, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the new resource is sent to the resource management center for storage.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource acceptor After the resource donor updates the resources that have been provided to the resource acceptor and puts the updated resources into the resource management center, the resource acceptor is triggered to send a resource credential request to the resource control center;
  • the resource control center feeds back a resource credential response message to the resource acceptor and simultaneously instructs the resource management center to provide the updated resource to the resource acceptor;
  • the resource acceptor modifies the resource that has been updated by the resource provider, obtain the corresponding modification type identifier from the identifier management center according to the modification type, and carry the modified type identifier in the modification result information and send it to the Resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the method further includes: the resource acceptor paying a certain fee to the resource control center.
  • the resource credential response message carries the authorization credential information.
  • the process of triggering the resource acceptor to send the resource credential request to the resource control center is:
  • the resource donor updates the resource that has been provided to the resource acceptor and puts the updated resource into the resource management center, sends a resource credential request to the resource acceptor;
  • the resource acceptor sends the resource credential request to the resource control center.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource acceptor After the resource donor updates the resources that have been provided to the resource acceptor and puts the updated resources into the resource management center, the resource acceptor is triggered to send a resource credential request to the resource acceptor manager;
  • the resource acceptor manager sends a resource credential request to the resource control center
  • the resource control center feeds back a resource credential response message to the resource acceptor manager and instructs the resource management center to provide the resource resource with updated resources; wherein the resource credential response
  • the message carries the authorization credential information
  • the resource acceptor modifies the resource that has been updated by the resource provider, obtain the corresponding modification type identifier from the identifier management center according to the modification type, and carry the modified type identifier in the modification result information and send it to the Resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource acceptor After the resource donor updates the resources that have been provided to the resource acceptor, the resource acceptor is triggered to send a resource credential request to the resource control center;
  • the resource control center feeds back a resource credential response message to the resource acceptor and simultaneously instructs the resource donor to provide the updated resource to the resource acceptor;
  • the resource acceptor modifies the resource that has been updated by the resource provider, obtain the corresponding modification type identifier from the identifier management center according to the modification type, and carry the modified type identifier in the modification result information and send it to the Resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource after receiving the modification result response message. Uploading the modified result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the updated resource is provided to the resource management center for storage.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource donor updates the resources that have been provided to the resource acceptor, triggering the resource acceptor to send a resource credential request to the resource acceptor manager;
  • the resource acceptor manager sends a resource credential request to the resource control center
  • the resource control center feeds back a resource credential response message to the resource acceptor manager and instructs the resource donor to provide the updated resource to the resource acceptor; wherein the resource credential response message carries the credential credential information ;
  • the resource acceptor modifies the resource that has been updated by the resource provider, obtain the corresponding modification type identifier from the identifier management center according to the modification type, and carry the modified type identifier in the modification result information and send it to the Resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the updated resource is provided to the resource management center for storage.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource control center feeds back a resource credential response message to the non-target resource acceptor and instructs the resource management center to provide the new resource to the non-target resource acceptor;
  • the resource resource modifies the new resource
  • the corresponding modification type identifier is obtained from the identity management center according to the modification type, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource credential response message carries the authorization credential information.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the target resource is determined. Responding to the recipient and transmitting the new resource to the target resource receptor;
  • the resource control center feeds back a resource credential response message to the non-target resource acceptor and instructs the resource donor to provide the new resource to the non-target resource acceptor;
  • the resource resource modifies the new resource
  • the corresponding modification type identifier is obtained from the identity management center according to the modification type, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource credential response message carries the authorization credential information.
  • the new resource is sent to the resource management center for storage.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the resource acceptor manager sends a resource credential request to the resource control center
  • the resource control center feeds back a resource credential response message to the resource acceptor manager and instructs the resource management center to provide the new resource to the resource acceptor; wherein the resource credential response message carries the credential credential information ;
  • the resource resource modifies the new resource
  • the corresponding modification type identifier is obtained from the identity management center according to the modification type, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource control center controls the interaction of resources between resource donors, resource receptors, resource management centers, and identity management centers as follows:
  • the target resource receptor is determined and the new resource is sent to the target resource recipient;
  • the resource acceptor manager sends a resource credential request to the resource control center
  • the resource control center feeds back a resource credential response message to the resource acceptor manager and instructs the resource donor to provide the new resource to the non-target resource acceptor; wherein the resource credential response message carries an authorization Voucher information;
  • the resource acceptor modifies the new resource, according to the modification type, from the identity management center Obtaining a corresponding modification type identifier, and carrying the modification type identifier in the modification result information, and sending the identifier to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the modification result response message is fed back to the resource control center.
  • the resource control center controls the resource receiver to upload the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • resource donors are teachers, resource recipients are students, resource management centers are educational resource management platforms, and resource control centers are educational resource controllers.
  • the resource donor can also be the main classroom, and the resource receptor can also be the auxiliary classroom. It is not limited here, and can be determined according to the actual situation.
  • the teacher updates the answers to the value-added test questions that have been provided to the students through the teacher and puts them into the educational resource management platform, triggering the educational resource controller to send the resource certificate request to the students; after the students pay a certain fee, the authorization is obtained from the educational resource management platform.
  • the voucher is notified to the educational resource controller; after receiving the notification, the educational resource controller instructs the educational resource management platform to provide the student with the answer to the value-added test question.
  • the program can also directly trigger the educational resource controller to send a resource credential request to the student through the teacher to update the answer of the value-added test question that has been provided to the student; after the student pays a certain fee, the authorization certificate is obtained from the educational resource management platform and notified.
  • the educational resource controller after receiving the notification, the educational resource controller instructs the teacher to provide the student with the answer to the value-added test question. If the student modifies the answer provided by the teacher to the student for the value-added test question, the modification result information is sent to the education resource controller; if the modification is permanent, the education resource controller sends the modification result information to the teacher; if the teacher agrees to modify As a result, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If In a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the teacher updates the answer to the value-added test questions that have been provided to the student through the teacher and puts it into the educational resource management platform, triggering the educational resource controller to send a resource credential request to the student's parent client (resource receptor manager).
  • the parent obtains the authorization certificate from the educational resource management platform and notifies the educational resource controller through the resource receptor manager; after receiving the notification, the educational resource controller instructs the educational resource management platform to provide the student with the student The answer to the value-added test questions.
  • the program may also trigger the educational resource controller to send a resource credential request to the student's parent client (resource receptor manager) through the teacher to update the answer to the value-added test question that has been provided to the student, in the case of obtaining parental consent.
  • the parent obtains the authorization credential from the educational resource management platform and notifies the educational resource controller through the resource receptor manager; after receiving the notification, the educational resource controller instructs the teacher to provide the student with the answer to the value-added test question. If the student modifies the answer provided by the teacher to the student for the value-added test question, the modification result information is sent to the education resource controller; if the modification is permanent, the education resource controller sends the modification result information to the teacher; if the teacher agrees to modify As a result, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the education resource management platform determines the students belonging to the class according to the obtained teacher and student comparison table, and sends the brand new to the class. Quiz questions and answers. If the non-class student sends the new test question and answer request to the education resource controller, the education resource controller instructs the non-class student to send the resource certificate request to the educational resource management platform; after the non-class student pays a certain fee, Obtain authorization credentials from the educational resource management platform and notify the educational resource controller; the educational resource controller instructs the educational resource management platform to provide the new quiz questions and answers to the non-class students.
  • the program can also provide a set of new test questions and answers, and directly determine the students who belong to the class according to the teacher and student comparison table, then send the new test questions and answers to the students. If the non-class student sends the new test question and answer request to the education resource controller, the education resource controller instructs the non-class student to the educational resource.
  • the management platform sends a resource certificate request; after the non-class student pays a certain fee, the authorization resource is obtained from the education resource management platform and the education resource controller is notified; the education resource controller instructs the teacher to provide the new test question to the non-class student. And the answer.
  • the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the education resource management platform determines the students belonging to the class according to the obtained teacher and student comparison table, and sends the brand new to the class. Quiz questions and answers. If the class does not receive the new test questions and answers, the parent client sends a new resource request through the parent client. If the parent agrees and pays a certain fee to obtain the authorization certificate from the education resource management platform, notify the education resource controller.
  • the educational resource controller instructs the educational resource management platform to provide the new quiz questions and answers to non-class students.
  • the program can also provide a set of new test questions and answers, and directly determine the students who belong to the class according to the teacher and student comparison table, then send the new test questions and answers to the students.
  • the parent client sends a new resource request through the parent client. If the parent agrees and pays a certain fee to obtain the authorization certificate from the education resource management platform, notify the education resource controller.
  • the educational resource controller instructs the teacher to provide the new quiz and answers to the non-class students. If the student modifies the new test questions and answers provided by the teacher, the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the teacher has updated the answer to the value-added test questions provided to the student and uploads it to the educational resource management platform
  • the student is triggered to send a resource certificate request to the educational resource controller, and the student pays a certain amount.
  • Cost after obtaining the authorization certificate from the educational resource controller, the education resource controller instructs the educational resource management platform to provide the student with the updated value-added test answer.
  • the program may also trigger a student to send a resource credential request to the parent through the parent client if the teacher has updated the answer to the value-added test question provided to the student and uploads it to the educational resource management platform, and the parent agrees and the parent pays a fee.
  • the authorization certificate is obtained from the educational resource controller; the educational resource controller instructs the educational resource management platform to provide the student with the updated value-added test answer. If the student modifies the answer provided by the teacher to the student for the value-added test question, the modification result information is sent to the education resource controller; if the modification is permanent, the education resource controller sends the modification result information to the teacher; if the teacher agrees to modify As a result, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student
  • the student is triggered to send a resource credential request to the educational resource controller, and the student obtains the authorization voucher from the educational resource controller by paying a certain fee, and the educational resource controller Instruct the teacher to provide the student with an updated value-added test answer.
  • the program may also trigger a student to send a resource credential request to the parent through the parent client if the teacher has updated the answer to the value-added test question provided to the student, and obtain the parental consent and the parent pays a certain fee, from the educational resource.
  • the controller obtains an authorization credential; the educational resource controller instructs the teacher to provide the student with an updated value-added test answer.
  • the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the modification result information is sent to the education resource controller; if the modification is permanent, the education resource controller sends the modification result information to the teacher; if the teacher agrees to modify As a result, the modification result response message is fed back to the education resource controller; after the education resource controller receives the modification result response message, the control student will modify The results are uploaded to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student
  • the education resource management platform determines the students belonging to the class according to the obtained teacher and student comparison table, and sends the brand new to the class. Quiz questions and answers. If the non-class student obtains the new set of quiz questions and answers, the resource resource request is sent to the educational resource controller; the non-class student obtains the authorization voucher from the educational resource controller after paying a certain fee; the educational resource control Instructs the educational resource management platform to provide students with the new set of quizzes and answers.
  • the program can also be: if the teacher provides a new set of test questions and answers and obtain a teacher-student comparison table to determine the students belonging to the class, then send the set of new test questions and answers to the class. If the non-class student obtains the new set of quiz questions and answers, the resource resource request is sent to the educational resource controller; the non-class student obtains the authorization voucher from the educational resource controller after paying a certain fee; the educational resource control The instructor instructs the teacher to provide the student with the new set of quizzes and answers.
  • the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the education resource management platform determines the students belonging to the class according to the obtained teacher and student comparison table, and sends the brand new to the class. Quiz questions and answers. If the non-class students obtain the new test questions and answers, they will send a resource certificate request to the parents through the parent client, and obtain the authorization certificate from the education resource controller on the premise that the parents agree and the parents pay a certain fee.
  • the educational resource controller instructs the educational resource management platform to provide the student with the new set of quizzes and answers.
  • the teacher provides a new set of quiz questions and answers and obtains a teacher-student comparison table to determine the students who belong to the class, send the new quiz questions and answers to the class. If the non-class students obtain the new test questions and answers, they will send a resource certificate request to the parents through the parent client, and obtain the authorization certificate from the education resource controller on the premise that the parents agree and the parents pay a certain fee.
  • Education capital instructs the teacher to provide the student with the new set of quiz questions and answers.
  • the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the resource control architecture based on the identity service identity provided by the present invention and the application of the architecture method implement fine management of resources.
  • resource donors and resource receptors in the scheme can be mutually transformed, which makes the application of the scheme wider and enhances the user experience.
  • the resource management center controls the issuance of the authorization credential and the centralized management of the resources or the resource control center controls the issuance of the authorization credential and the resource control, instead of managing the authorization credential by a separate third party entity, which greatly reduces the system signaling.
  • the interaction between the two saves system resources, improves the communication efficiency of the system, and greatly enhances the user experience.
  • the resource receiver increases the revenue of the system operator by paying a certain fee to the resource management center and obtaining the authorization certificate.
  • the resource receptor behavior is monitored to avoid the loss of resource receptor behavior to the resource receptor management.
  • non-target resource receptors acquire new resources, which greatly enhances the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne une architecture de contrôle de ressources basée sur l'identité, et un procédé utilisant cette architecture. Elle concerne un donneur de ressources, un récepteur de ressources, un centre de gestion des ressources, un centre de contrôle des ressources et un centre de gestion des identités. Le donneur de ressources, le récepteur de ressources et le centre de gestion des ressources sont tous interconnectés. Le centre de contrôle des ressources est connecté séparément au donneur de ressources, au récepteur de ressources et au centre de gestion des ressources. Le centre de gestion des identités est connecté séparément au centre de contrôle des ressources, au donneur de ressources et au récepteur de ressources. En comparaison avec la technique antérieure, l'architecture de contrôle des ressources basée sur un identifiant de service d'identités et le procédé de l'invention mettant en oeuvre cette architecture permettent d'effectuer une gestion détaillée des ressources.
PCT/CN2014/084403 2014-08-01 2014-08-14 Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture Ceased WO2016015366A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410376942 2014-08-01
CN201410376942.X 2014-08-01

Publications (1)

Publication Number Publication Date
WO2016015366A1 true WO2016015366A1 (fr) 2016-02-04

Family

ID=52230619

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2014/084403 Ceased WO2016015366A1 (fr) 2014-08-01 2014-08-14 Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture
PCT/CN2015/074959 Ceased WO2016015477A1 (fr) 2014-08-01 2015-03-24 Architecture de commande de ressources basée sur un identifiant de service d'identité, et procédé d'utilisation de ladite architecture

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/074959 Ceased WO2016015477A1 (fr) 2014-08-01 2015-03-24 Architecture de commande de ressources basée sur un identifiant de service d'identité, et procédé d'utilisation de ladite architecture

Country Status (2)

Country Link
CN (1) CN104243219B (fr)
WO (2) WO2016015366A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016015366A1 (fr) * 2014-08-01 2016-02-04 苏州阔地网络科技有限公司 Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture
WO2016127471A1 (fr) * 2015-02-10 2016-08-18 沈玉将 Système de commande de flux de données, dispositif de commande de flux de données et terminal
CN107809371B (zh) * 2016-09-09 2020-01-10 腾讯科技(深圳)有限公司 共享资源显示方法及装置
CN109087222A (zh) * 2018-08-01 2018-12-25 阔地教育科技有限公司 课堂数据分析方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064609A (zh) * 2007-05-25 2007-10-31 上海众恒信息产业有限公司 一种信息系统的访问控制方法及装置
US20090287819A1 (en) * 2008-05-16 2009-11-19 Microsoft Corporation System from reputation shaping a peer-to-peer network
CN102598021A (zh) * 2009-11-06 2012-07-18 国际商业机器公司 用于管理安全对象的方法和系统
CN103078859A (zh) * 2012-12-31 2013-05-01 普天新能源有限责任公司 业务系统权限管理方法、设备及系统
CN103404103A (zh) * 2011-01-28 2013-11-20 F5网络公司 将访问控制系统与业务管理系统相结合的系统和方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100525284C (zh) * 2005-08-10 2009-08-05 华为技术有限公司 对用户的业务提供承载控制的方法
CN101388811B (zh) * 2007-09-10 2015-03-18 上海中兴软件有限责任公司 基于无线接入网的接入控制方法
CN101174326A (zh) * 2007-11-16 2008-05-07 广东工业大学 工程训练管理系统
WO2011134154A1 (fr) * 2010-04-29 2011-11-03 华为技术有限公司 Procédé et dispositif permettant une commande de ressources de réseau de liaison multiutilisateur
CN101968932A (zh) * 2010-09-19 2011-02-09 深圳市摩拓触摸科技有限公司 多媒体智能互动教学系统及其实现方法
WO2016015363A1 (fr) * 2014-08-01 2016-02-04 苏州阔地网络科技有限公司 Architecture de contrôle de ressources, et procédé mettant en oeuvre cette architecture
WO2016015366A1 (fr) * 2014-08-01 2016-02-04 苏州阔地网络科技有限公司 Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064609A (zh) * 2007-05-25 2007-10-31 上海众恒信息产业有限公司 一种信息系统的访问控制方法及装置
US20090287819A1 (en) * 2008-05-16 2009-11-19 Microsoft Corporation System from reputation shaping a peer-to-peer network
CN102598021A (zh) * 2009-11-06 2012-07-18 国际商业机器公司 用于管理安全对象的方法和系统
CN103404103A (zh) * 2011-01-28 2013-11-20 F5网络公司 将访问控制系统与业务管理系统相结合的系统和方法
CN103078859A (zh) * 2012-12-31 2013-05-01 普天新能源有限责任公司 业务系统权限管理方法、设备及系统

Also Published As

Publication number Publication date
CN104243219A (zh) 2014-12-24
CN104243219B (zh) 2015-09-30
WO2016015477A1 (fr) 2016-02-04

Similar Documents

Publication Publication Date Title
US9148487B2 (en) Method and system for managing device profiles
KR101888323B1 (ko) 단말 장치 제어 방법, 단말 장치 및 시스템, 컴퓨터 저장매체
PH12019501743A1 (en) Blockchain node communication method and apparatus
JP2019208218A (ja) モバイル通信システム、ネットワーク及びue並びにそれらのディスカバリ方法
US20240098631A1 (en) Filters for bulk subscriptions
WO2016015366A1 (fr) Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture
US9992202B2 (en) Access control through dynamic grouping
CN104219094A (zh) 一种ap分组配置的方法和设备
CN109842535B (zh) 一种接入本地网络的方法和设备
CN108022469A (zh) 一种智能教学配置方法和系统
CN104581725B (zh) 一种Wi-Fi接入动态认证系统及其认证方法
US20170324694A1 (en) Method for Streamlining Communications Between Groups of Users
WO2018126980A1 (fr) Procédé et système de mise en œuvre d'un service d'adressage de rôles
CN105761180A (zh) 一种家校互动方法
WO2016015363A1 (fr) Architecture de contrôle de ressources, et procédé mettant en oeuvre cette architecture
WO2016101579A1 (fr) Procédé de négociation de clé et système, entité de réseau et support de stockage informatique
CN105791361A (zh) 远程协助设置的方法、服务器、终端及系统
CN107154187A (zh) 网络课程互动方法和系统
JP2009147554A (ja) グループ通信サーバ、グループ通信端末およびグループ通信システム
Koné et al. Network resource management and core network slice implementation: A testbed for rural connectivity
KR102613601B1 (ko) 미션 크리티컬 서비스의 연속성을 제공하는 무선 통신 방법 및 시스템
CN106686582B (zh) 一种实现固定电话号码移动性的方法及系统
WO2017148104A1 (fr) Procédé et appareil de gestion collective de bande passante de terminal de réseau optique passif
ATE449484T1 (de) Rundfunk von dienstinformation an benutzergeräte, die an ein pstn angeschlossen sind, mit hilfe einer ngn-infrastruktur
KR20200063813A (ko) 블록체인을 활용한 학생출결정보 관리 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14898688

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14898688

Country of ref document: EP

Kind code of ref document: A1