[go: up one dir, main page]

WO2016015477A1 - Architecture de commande de ressources basée sur un identifiant de service d'identité, et procédé d'utilisation de ladite architecture - Google Patents

Architecture de commande de ressources basée sur un identifiant de service d'identité, et procédé d'utilisation de ladite architecture Download PDF

Info

Publication number
WO2016015477A1
WO2016015477A1 PCT/CN2015/074959 CN2015074959W WO2016015477A1 WO 2016015477 A1 WO2016015477 A1 WO 2016015477A1 CN 2015074959 W CN2015074959 W CN 2015074959W WO 2016015477 A1 WO2016015477 A1 WO 2016015477A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
acceptor
management center
control center
donor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2015/074959
Other languages
English (en)
Chinese (zh)
Inventor
沈玉将
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2016015477A1 publication Critical patent/WO2016015477A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities

Definitions

  • the present invention belongs to the field of resource control, and in particular, to a resource control architecture based on identity service identity and a method for applying the architecture.
  • the bearer control device first acquires the bearer device.
  • the resource management rules are supported, and the resource operation commands are issued according to the resource management rules.
  • the attribute describing the resource management rule may be added to the audit capability command request, and the resource management rule supported by the bearer device is represented by the value of the corresponding attribute in the audit capability command response.
  • the resource management rule supported by the bearer device may be pre-configured on the bearer control device, and the bearer control device obtains the resource management rule from the device. If there are multiple resource management rules supported by the bearer device, one of the bearer control devices may be selected to indicate that the bearer device subsequently uses the resource management rule.
  • Applicant ZTE Corporation applied for an article on June 24, 2009: the application number is 200910146754.7, the patent name is the policy control architecture of the converged network and the method of implementing policy control, including application functional entity AF, fixed network policy decision An entity and a mobile network policy decision entity, wherein: the AF is configured to provide the fixed network policy decision entity with service information required for the decision, where the service information includes fixed user service information or mobile user service information;
  • the fixed network policy decision entity is configured to receive service information sent by the AF, and determine the service information, and if it is fixed user service information, formulate a fixed network resource control policy according to the fixed user service information; Mobile user service information is forwarded to the mobile network policy decision entity;
  • the mobile network policy decision entity is configured to receive mobile user service information forwarded by the fixed network policy decision entity, and formulate a mobile network resource control policy according to the mobile user service information.
  • the present invention provides an identity-based resource control architecture and a method of applying the architecture to solve the above problems.
  • the present invention also provides a resource control architecture method using the above identity based service identity.
  • the above method includes the following steps:
  • the resource donor and the resource receiver obtain their corresponding identity identifiers from the identity management center in advance; meanwhile, the identity management center synchronizes the resource donors, the resource recipients, and their corresponding identity identifiers to the resource control center;
  • the resource control center obtains the resource control strategy
  • the resource control center controls the interaction of resources between resource donors, resource recipients, resource management centers, and identity management centers according to the acquired resource control policies.
  • the resource control architecture based on the identity service identity provided by the present invention and the application of the architecture method implement fine management of resources.
  • resource donors and resource receptors in the scheme can be mutually transformed, which makes the application of the scheme wider and enhances the user experience.
  • the resource management center controls the issuance of the authorization credential and the centralized management of the resources or the resource control center controls the issuance of the authorization credential and the resource control, instead of managing the authorization credential by a separate third party entity, which greatly reduces the system signaling.
  • the interaction between the two saves system resources, improves the communication efficiency of the system, and greatly enhances the user experience.
  • the resource acceptor obtains the fee by paying a certain fee to the resource management center.
  • the way in which the credentials are authorized increases the revenue of the system operator.
  • the resource receptor behavior is monitored to avoid the loss of resource receptor behavior to the resource receptor management.
  • non-target resource receptors acquire new resources, which greatly enhances the user experience.
  • FIG. 1 is a schematic diagram of a resource control architecture based on an identity service identifier according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic diagram showing a method and a flow chart of applying an identity-based service identity-based resource control architecture shown in FIG. 1 according to Embodiment 2 of the present invention
  • FIG. 3 is a flowchart of resource interaction provided by Embodiment 3 of the present invention.
  • Embodiment 4 is a flowchart of resource interaction provided by Embodiment 4 of the present invention.
  • FIG. 5 is a flowchart of resource interaction provided by Embodiment 5 of the present invention.
  • FIG. 6 is a flowchart of resource interaction provided by Embodiment 6 of the present invention.
  • FIG. 7 is a flowchart of resource interaction provided by Embodiment 7 of the present invention.
  • FIG. 8 is a flowchart of resource interaction provided by Embodiment 8 of the present invention.
  • FIG. 9 is a flowchart of resource interaction provided by Embodiment 9 of the present invention.
  • FIG. 10 is a flowchart of resource interaction provided by Embodiment 10 of the present invention.
  • FIG. 11 is a flowchart of resource interaction provided by Embodiment 11 of the present invention.
  • FIG. 12 is a flowchart of resource interaction provided by Embodiment 12 of the present invention.
  • FIG. 13 is a flowchart of resource interaction provided by Embodiment 13 of the present invention.
  • FIG. 14 is a flowchart of resource interaction provided by Embodiment 14 of the present invention.
  • FIG. 15 is a flowchart of resource interaction provided by Embodiment 15 of the present invention.
  • Embodiment 16 is a flowchart of resource interaction provided by Embodiment 16 of the present invention.
  • FIG. 17 is a flowchart of resource interaction provided by Embodiment 17 of the present invention.
  • FIG. 18 is a flowchart of resource interaction provided by Embodiment 18 of the present invention.
  • FIG. 19 is a flowchart of resource interaction provided by Embodiment 19 of the present invention.
  • FIG. 20 is a flowchart of resource interaction provided by Embodiment 20 of the present invention.
  • Embodiment 21 is a flowchart of resource interaction provided by Embodiment 21 of the present invention.
  • FIG. 22 is a flowchart of resource interaction provided by Embodiment 22 of the present invention.
  • FIG. 1 is a schematic diagram of a resource control architecture based on an identity service identifier according to Embodiment 1 of the present invention, including: a resource donor, a resource acceptor, a resource management center, a resource control center, and an identity management center; wherein, a resource donor, Resource receptors and resource management centers are connected to each other; resource control centers are connected to resource donors, resource receptors, and resource management centers; and identity management centers are connected to resource control centers, resource donors, and resource recipients.
  • the resource donor is one or more; the resource acceptor is one or more.
  • the resource donor refers to: the resource provider; the resource receptor is the resource receiver; the resource management center is the entity that manages the resource; and the resource control center is the entity that controls the resource interaction.
  • resource donors can become resource receptors under certain conditions; resource receptors can become resource donors under certain conditions.
  • the identity management center provides a resource donor, a resource identifier, and a service identifier.
  • the service identifier is, for example, a modification type identifier (permanent identifier, temporary identifier).
  • FIG. 2 is a schematic diagram of a method and a flow chart of applying the identity-based resource control architecture shown in FIG. 1 according to Embodiment 2 of the present invention, including the following steps:
  • Step 201 The resource donor and the resource receiver obtain their corresponding identity identifiers from the identity management center in advance; at the same time, the identity management center uses the resource donors, the resource recipients, and their corresponding identity identifiers. Synchronizing to the resource control center;
  • the process for the resource provider and the resource receiver to obtain the corresponding identity identifier from the identity management center in advance is: the resource donor and the resource receiver respectively send an identity identification request to the identity management center; the identity management center feeds the identity And identifying, by the identity response message, the identity identifier information of the resource donor or the resource identifier.
  • Step 202 The resource control center acquires a resource control policy.
  • the resource control center obtains the resource control policy by the resource control center itself or the resource control center to obtain the resource control policy from a third-party entity (for example, a policy controller).
  • a third-party entity for example, a policy controller
  • Step 203 The resource control center controls resource interaction between the resource donor, the resource acceptor, the resource management center, and the identity management center according to the acquired resource control policy.
  • the resource control center controls the interaction of resources between the resource donor, the resource acceptor, the resource management center, and the identity management center according to the acquired resource control policy:
  • the resource control center is triggered to send a resource credential request to the resource acceptor, where the resource credential request carries the resource Address information of the management center;
  • the resource acceptor After receiving the resource credential request, the resource acceptor obtains an authorization credential from the resource management center and notifies the resource control center;
  • the resource control center instructs the resource management center to provide the resource resource with the resource that the resource donor has updated
  • the resource identifier modifies the resource that has been updated by the resource provider, acquiring a corresponding modification type identifier from the identifier management center, and carrying the modified type identifier in the modification result information, and sending the identifier to the resource control center.
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously reports to the resource The management center and the resource acceptor send a modification result response message;
  • the resource acceptor uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the resource acceptor sends a modify type identifier request to the identifier management center; The management center feeds back to the resource receptor to modify the type identification response message.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center encapsulates the modification result information, the corresponding modification type identifier, and the reject reception identifier information provided by the resource receiver into a data packet, and encapsulates the data.
  • a packet is sent to the resource management center to instruct the resource management center to refuse to receive the modification result provided by the resource recipient.
  • the method for obtaining the authorization credential from the resource management center by the resource acceptor is: obtaining the authorization credential by paying a certain fee to the resource management center.
  • the process of triggering the resource control center to send the resource credential request to the resource acceptor is:
  • the resource donor updates the resource that has been provided to the resource acceptor and puts the updated resource into the resource management center, sends a resource credential request to the resource control center;
  • the resource control center sends the resource credential request to the resource acceptor.
  • the process of triggering the resource control center to send the resource credential request to the resource acceptor is:
  • the resource acceptor manager After receiving the resource credential request, the resource acceptor manager obtains an authorization credential from the resource management center and notifies the resource control center;
  • the resource identifier modifies the resource that has been updated by the resource provider, acquiring a corresponding modification type identifier from the identifier management center, and carrying the modified type identifier in the modification result information, and sending the identifier to the resource control center.
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the resource acceptor;
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the resource acceptor sends a modify type identifier request to the identifier management center; The management center feeds back to the resource receptor to modify the type identification response message.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the process of triggering the resource control center to send the resource credential request to the resource acceptor is:
  • the resource control center encapsulates the modification result information, the corresponding modification type identifier, and the reject reception identifier information provided by the resource receiver into a data packet, and encapsulates the data. Sending a packet to the resource management center to instruct the resource management center to reject The result of the modification provided by the resource receptor is never received.
  • the resource control center instructs the resource donor to provide the resource resource with the resource that the resource donor has updated
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the resource acceptor;
  • the resource acceptor uploads the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource donor provides the resource recipient with the updated resource of the resource donor
  • the updated resources are provided to the resource management center store.
  • the resource control center controls the interaction of resources between the resource donor, the resource receptor, the resource management center, and the identity management center according to the acquired resource control policy:
  • the resource control center is directly triggered to send a resource credential request to the resource acceptor;
  • the resource identifier After receiving the resource credential request, the resource identifier sends the resource credential request to the resource acceptor manager, where the resource credential request carries the address information of the resource management center;
  • the resource acceptor manager After receiving the resource credential request, the resource acceptor manager obtains an authorization credential from the resource management center and notifies the resource control center;
  • the resource control center instructs the resource donor to provide the resource resource with the resource that the resource donor has updated
  • the resource identifier modifies the resource that has been updated by the resource provider, acquiring a corresponding modification type identifier from the identifier management center, and carrying the modified type identifier in the modification result information, and sending the identifier to the resource control center.
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the resource acceptor;
  • the resource acceptor uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the resource acceptor sends a modify type identifier request to the identifier management center; The management center feeds back to the resource receptor to modify the type identification response message.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource donor After the resource donor updates the resources that have been provided to the resource acceptor, it sends an update completion notification to the resource control center, triggering the resource control center to send a resource credential request to the resource acceptor.
  • the updated resource is provided to the resource management center for storage.
  • the process of controlling resource interaction between a resource donor, a resource acceptor, a resource management center, and an identity management center according to the acquired resource control policy is:
  • the resource control center instructs the non-target resource acceptor to send a resource credential request to the resource management center;
  • the resource management center After receiving the resource credential request, the resource management center feeds back the resource credential response message to the non-target resource acceptor; wherein the response message carries the authorization credential information.
  • the resource control center instructing the resource management center to provide the new resource to the non-target resource recipient
  • the target resource acceptor modifies the new resource
  • the corresponding modification type identifier is obtained from the identifier management center, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the target resource receiver;
  • the target resource recipient uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identity management center is: target resource receptor to the identity management center Sending a modification type identification request; the identification management center feeds back a modified type identification response message to the target resource receptor.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the target resource receiver.
  • the manner in which the resource management center obtains the resource donor and resource recipient comparison table is: the resource management center itself configures a resource donor and resource receptor comparison table or acquires resources through a third-party entity (map relationship server) Donor and resource receptor comparison table.
  • the resource donor and resource recipient comparison table obtained by the resource management center is sent to the resource control center for real-time or timing synchronization.
  • the process of controlling resource interaction between a resource donor, a resource acceptor, a resource management center, and an identity management center according to the acquired resource control policy is:
  • the target resource receptor is determined and the new resource is sent to the target resource recipient;
  • the resource control center instructs the non-target resource acceptor to send a resource credential request to the resource management center;
  • the resource management center After receiving the resource credential request, the resource management center feeds back the resource credential response message to the non-target resource acceptor; wherein the response message carries the authorization credential information.
  • the resource control center instructing the resource donor to provide the new resource to the non-target resource acceptor
  • the target resource acceptor modifies the new resource
  • the corresponding modification type identifier is obtained from the identifier management center, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the target resource receiver;
  • the target resource recipient uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the target resource acceptor sends a modified type identifier request to the identifier management center.
  • the identification management center feeds back a modified type identification response message to the target resource receptor.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the target resource receiver.
  • the new resource is sent to the resource management center and stored by the resource management center.
  • the manner in which the resource donor obtains the resource donor and resource receptor comparison table is: the resource donor acquires the resource donor and resource receptor comparison table or the resource donor from the resource management center
  • the resource donor and resource receptor comparison table is stored by itself.
  • Resource donor Target resource receptor Resource donor 1 Resource receptor A Resource donor 2 Resource receptor B Resource donor 3 Resource receptor C : : Resource donor n Resource receptor Z
  • the process of controlling resource interaction between a resource donor, a resource acceptor, a resource management center, and an identity management center according to the acquired resource control policy is:
  • the resource management center After the resource donor provides a new resource to the resource management center, triggering the resource management center Determining a target resource receptor and transmitting the new resource to the target resource receptor according to the obtained resource donor and resource receptor comparison table;
  • the resource control center instructs the resource acceptor manager to send a resource credential request to the resource management center
  • the resource management center After receiving the resource credential request, the resource management center feeds back a resource credential response message to the resource acceptor manager, where the response message carries the authorization credential information;
  • the resource control center instructing the resource management center to provide the new resource to the non-target resource recipient
  • the target resource acceptor modifies the new resource
  • the corresponding modification type identifier is obtained from the identifier management center, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the target resource receiver;
  • the target resource recipient uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the target resource acceptor sends a modified type identifier request to the identifier management center.
  • the identification management center feeds back a modified type identification response message to the target resource receptor.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center indicates the The resource management center refuses to receive the modified result provided by the resource receptor.
  • the process of controlling resource interaction between a resource donor, a resource acceptor, a resource management center, and an identity management center according to the acquired resource control policy is:
  • the target resource receptor is determined and the new resource is sent to the target resource recipient;
  • the resource control center instructs the resource acceptor manager to send a resource credential request to the resource management center
  • the resource management center After receiving the resource credential request, the resource management center feeds back a resource credential response message to the resource acceptor manager, where the response message carries the authorization credential information;
  • the resource control center instructing the resource donor to provide the new resource to the non-target resource acceptor
  • the target resource acceptor modifies the new resource
  • the corresponding modification type identifier is obtained from the identifier management center, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the target resource receiver;
  • the target resource recipient uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the target resource acceptor sends a modified type identifier request to the identifier management center. ; the identification management center feeds back to the target resource receptor to modify the type identification response Message.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the new resource is sent to the resource management center for storage.
  • the resource control center controls the interaction of resources between the resource donor, the resource acceptor, the resource management center, and the identity management center according to the acquired resource control policy:
  • the resource acceptor After the resource donor updates the resources that have been provided to the resource acceptor and puts the updated resources into the resource management center, the resource acceptor is triggered to send a resource credential request to the resource control center;
  • the resource control center feeds back a resource credential response message to the resource acceptor and simultaneously instructs the resource management center to provide the updated resource to the resource acceptor;
  • the resource identifier modifies the resource that has been updated by the resource provider, acquiring a corresponding modification type identifier from the identifier management center, and carrying the modified type identifier in the modification result information, and sending the identifier to the resource control center.
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the resource acceptor;
  • the resource acceptor uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the resource acceptor sends a modify type identifier request to the identifier management center; The management center feeds back to the resource receptor to modify the type identification response message.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the method further includes: the resource acceptor paying a certain fee to the resource control center.
  • the resource credential response message carries the authorization credential information.
  • the process of triggering the resource acceptor to send the resource credential request to the resource control center is:
  • the resource management center After the resource donor updates the resources that have been provided to the resource acceptor and puts the updated resources into the resource management center, the resource management center sends a resource credential request to the resource acceptor;
  • the resource acceptor sends the resource credential request to the resource control center.
  • the process of controlling resource interaction between a resource donor, a resource acceptor, a resource management center, and an identity management center according to the acquired resource control policy is:
  • the resource acceptor After the resource donor updates the resources that have been provided to the resource acceptor and puts the updated resources into the resource management center, the resource acceptor is triggered to send a resource credential request to the resource acceptor manager;
  • the resource acceptor manager sends a resource credential request to the resource control center
  • the resource control center feeds back a resource credential response message to the resource acceptor manager and instructs the resource management center to provide the updated resource to the resource acceptor; wherein the resource credential response message carries the credential credential information ;
  • the resource identifier modifies the resource that has been updated by the resource provider, acquiring a corresponding modification type identifier from the identifier management center, and carrying the modified type identifier in the modification result information, and sending the identifier to the resource control center.
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the resource acceptor;
  • the resource acceptor uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the resource acceptor sends a modify type identifier request to the identifier management center; The management center feeds back to the resource receptor to modify the type identification response message.
  • the process of triggering the resource acceptor to send the resource credential request to the resource acceptor manager is:
  • the resource management center After the resource donor updates the resources that have been provided to the resource acceptor and puts the updated resources into the resource management center, the resource management center sends an update completion notification to the resource acceptor, triggering the resource acceptor to send a resource credential request to the resource acceptor manager. .
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the resource control center controls the interaction of resources between the resource donor, the resource receptor, the resource management center, and the identity management center according to the acquired resource control policy:
  • the resource acceptor After the resource donor updates the resources that have been provided to the resource acceptor, the resource acceptor is triggered to send a resource credential request to the resource control center;
  • the resource control center feeds back a resource credential response message to the resource acceptor and simultaneously instructs the resource donor to provide the updated resource to the resource acceptor;
  • the resource identifier modifies the resource that has been updated by the resource provider, acquiring a corresponding modification type identifier from the identifier management center, and carrying the modified type identifier in the modification result information, and sending the identifier to the resource control center.
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the resource acceptor;
  • the resource acceptor uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the resource acceptor sends a modify type identifier request to the identifier management center; The management center feeds back to the resource receptor to modify the type identification response message.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • an update completion notification is sent to the resource acceptor, triggering the resource acceptor to send a resource credential request to the resource control center.
  • the resource completion center address information is carried in the update completion notification.
  • the updated resource is provided to the resource management center for storage.
  • the resource control center controls the interaction of resources between the resource donor, the resource receptor, the resource management center, and the identity management center according to the acquired resource control policy:
  • the resource donor updates the resources that have been provided to the resource acceptor, triggering the resource acceptor to send a resource credential request to the resource acceptor manager;
  • the resource acceptor manager sends a resource credential request to the resource control center
  • the resource control center feeds back a resource credential response message to the resource acceptor manager and instructs the resource donor to provide the updated resource to the resource acceptor; wherein the resource credential response message carries the credential credential information ;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously reports to the resource The management center and the resource acceptor send a modification result response message;
  • the resource acceptor uploads the modification result to the resource management center.
  • an update completion notification is sent to the resource acceptor, triggering the resource acceptor to send a resource credential request to the resource acceptor manager.
  • the resource completion manager address information is carried in the update completion notification.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the resource acceptor sends a modify type identifier request to the identifier management center; The management center feeds back to the resource receptor to modify the type identification response message.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the resource receiver.
  • the updated resource is provided to the resource management center for storage.
  • the process of controlling resource interaction between a resource donor, a resource acceptor, a resource management center, and an identity management center according to the acquired resource control policy is:
  • the resource control center feeds back a resource credential response message to the non-target resource acceptor and instructs the resource management center to provide the new resource to the non-target resource acceptor;
  • the target resource acceptor modifies the new resource
  • the corresponding modification type identifier is obtained from the identifier management center, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the target resource receiver;
  • the target resource recipient uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the target resource acceptor sends a modified type identifier request to the identifier management center.
  • the identification management center feeds back a modified type identification response message to the target resource receptor.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the target resource receiver.
  • the resource credential response message carries the authorization credential information.
  • the process of controlling resource interaction between a resource donor, a resource acceptor, a resource management center, and an identity management center according to the acquired resource control policy is:
  • the target resource receptor is determined and the new resource is sent to the target resource recipient;
  • the resource control center feeds back a resource credential response message to the non-target resource acceptor and instructs the resource donor to provide the new resource to the non-target resource acceptor;
  • the target resource acceptor modifies the new resource
  • the corresponding modification type identifier is obtained from the identifier management center, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the target resource receiver;
  • the target resource recipient uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the target resource acceptor sends a modified type identifier request to the identifier management center.
  • the identification management center feeds back a modified type identification response message to the target resource receptor.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the target resource receiver.
  • the resource credential response message carries the authorization credential information.
  • the new resource is sent to the resource management center for storage.
  • the resource control center controls the interaction of resources between the resource donor, the resource acceptor, the resource management center, and the identity management center according to the acquired resource control policy:
  • the resource acceptor manager sends a resource credential request to the resource control center
  • the resource control center feeds back a resource credential response message to the resource acceptor manager and instructs the resource management center to provide the new resource to the resource acceptor; wherein the resource credential response message carries the credential credential information ;
  • the resource control center sends the modification result information to the resource donor;
  • the target resource recipient uploads the modification result to the resource management center.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the target resource receiver.
  • the process of controlling resource interaction between a resource donor, a resource acceptor, a resource management center, and an identity management center according to the acquired resource control policy is:
  • the target resource receptor is determined and the new resource is sent to the target resource recipient;
  • the resource acceptor manager sends a resource credential request to the resource control center
  • the target resource acceptor modifies the new resource
  • the corresponding modification type identifier is obtained from the identifier management center, and the modified type identifier is carried in the modification result information and sent to the resource control center;
  • the resource control center sends the modification result information to the resource donor;
  • the resource control center After receiving the modification result response message, the resource control center simultaneously sends a modification result response message to the resource management center and the target resource receiver;
  • the target resource recipient uploads the modification result to the resource management center.
  • the process of obtaining the corresponding modified type identifier from the identifier management center is: the target resource acceptor sends a modified type identifier request to the identifier management center.
  • the identification management center feeds back a modified type identification response message to the target resource receptor.
  • the modification type includes: a permanent modification and a temporary modification; and the modification type identifier includes: a permanent modification identifier and a temporary modification identifier.
  • the resource control center instructs the resource management center to refuse to receive the modification result provided by the target resource receiver.
  • resource donors are teachers, resource recipients are students, resource management centers are educational resource management platforms, and resource control centers are educational resource controllers.
  • the resource donor can also be the main classroom, and the resource receptor can also be the auxiliary classroom. It is not limited here, and can be determined according to the actual situation.
  • the educational resource controller after receiving the notification, the educational resource controller instructs the teacher to provide the student with the answer to the value-added test question. If the student modifies the answer provided by the teacher to the student for the value-added test question, the modification result information is sent to the education resource controller; if the modification is permanent, the education resource controller sends the modification result information to the teacher; if the teacher agrees to modify As a result, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If In a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the teacher updates the answer to the value-added test questions that have been provided to the student through the teacher and puts it into the educational resource management platform, triggering the educational resource controller to send a resource credential request to the student's parent client (resource receptor manager).
  • the parent obtains the authorization certificate from the educational resource management platform and notifies the educational resource controller through the resource receptor manager; after receiving the notification, the educational resource controller instructs the educational resource management platform to provide the student with the student The answer to the value-added test questions.
  • the program may also trigger the educational resource controller to send a resource credential request to the student's parent client (resource receptor manager) through the teacher to update the answer to the value-added test question that has been provided to the student, in the case of obtaining parental consent.
  • the education resource management platform determines the students belonging to the class according to the obtained teacher and student comparison table, and sends the brand new to the class. Quiz questions and answers. If the non-class student sends the new test question and answer request to the education resource controller, the education resource controller instructs the non-class student to send the resource certificate request to the educational resource management platform; after the non-class student pays a certain fee, Obtain authorization credentials from the educational resource management platform and notify the educational resource controller; the educational resource controller instructs the educational resource management platform to provide the new quiz questions and answers to the non-class students.
  • the program can also provide a set of new test questions and answers, and directly determine the students who belong to the class according to the teacher and student comparison table, then send the new test questions and answers to the students. If the non-class student sends the new test question and answer request to the education resource controller, the education resource controller instructs the non-class student to the educational resource.
  • the management platform sends a resource certificate request; after the non-class student pays a certain fee, the authorization resource is obtained from the education resource management platform and the education resource controller is notified; the education resource controller instructs the teacher to provide the new test question to the non-class student. And the answer.
  • the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the education resource management platform determines the students belonging to the class according to the obtained teacher and student comparison table, and sends the brand new to the class. Quiz questions and answers. If the class does not receive the new test questions and answers, the parent client sends a new resource request through the parent client. If the parent agrees and pays a certain fee to obtain the authorization certificate from the education resource management platform, notify the education resource controller.
  • the educational resource controller instructs the educational resource management platform to provide the new quiz questions and answers to non-class students.
  • the program can also provide a set of new test questions and answers, and directly determine the students who belong to the class according to the teacher and student comparison table, then send the new test questions and answers to the students.
  • the authorization certificate is obtained from the educational resource controller; the educational resource controller instructs the educational resource management platform to provide the student with the updated value-added test answer. If the student modifies the answer provided by the teacher to the student for the value-added test question, the modification result information is sent to the education resource controller; if the modification is permanent, the education resource controller sends the modification result information to the teacher; if the teacher agrees to modify As a result, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student
  • the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the modification result information is sent to the education resource controller; if the modification is permanent, the education resource controller sends the modification result information to the teacher; if the teacher agrees to modify As a result, the modification result response message is fed back to the education resource controller; after the education resource controller receives the modification result response message, the control student will modify The results are uploaded to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student
  • the program can also be: if the teacher provides a new set of test questions and answers and obtain a teacher-student comparison table to determine the students belonging to the class, then send the set of new test questions and answers to the class. If the non-class student obtains the new set of quiz questions and answers, the resource resource request is sent to the educational resource controller; the non-class student obtains the authorization voucher from the educational resource controller after paying a certain fee; the educational resource control The instructor instructs the teacher to provide the student with the new set of quizzes and answers.
  • the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the teacher provides a new set of quiz questions and answers and obtains a teacher-student comparison table to determine the students who belong to the class, send the new quiz questions and answers to the class. If the non-class students obtain the new test questions and answers, they will send a resource certificate request to the parents through the parent client, and obtain the authorization certificate from the education resource controller on the premise that the parents agree and the parents pay a certain fee.
  • Education capital instructs the teacher to provide the student with the new set of quiz questions and answers.
  • the modified result information is sent to the educational resource controller; if it is a permanent modification, the educational resource controller sends the modified result information to the teacher; if the teacher agrees to modify the result, Then, the modification result response message is fed back to the educational resource controller; after receiving the modification result response message, the educational resource controller controls the student to upload the modification result to the educational resource management platform. If it is a temporary modification, the educational resource controller instructs the educational resource management platform to refuse to receive the modified result provided by the student.
  • the resource receiver After receiving the resource upload response message, the resource receiver uploads the modified resource to the resource management center.
  • the rejection response message is fed back to the resource control center.
  • the content of the resource usage rights in Table 2 can be flexibly set, and the scope of protection of the present invention is not limited herein.
  • the resource authority M and the resource receptor N are used as accessible charging intervals.
  • the resource accessor P has the access rights of resources that are greater than 10 yuan and less than or equal to 100 yuan.
  • the resource receptor W is used. Permissions are resources that have access to a toll interval of less than or equal to $10.
  • the resource superiority factor is calculated according to the number of times the resource is referenced and the number of times the resource is modified.
  • the resource superiority factor is a ratio between the number of times the resource is referenced and the number of times the resource is modified.
  • the method for obtaining the resource superiority factor of the resource receptor may be:
  • n i is the number of times the resource is modified
  • p i is the resource superiority factor
  • 2 is in the interval b ⁇ X ⁇ a, and the resource receptor P can obtain the qualification to push the resources uploaded by senior teachers and ordinary teachers.
  • the resource usage rights of the resource receptor P are resources that can only be accessed 2 months ago.
  • the resource control center acquires a resource evaluation factor of each resource according to the number of times of reference and the number of times of modification of each resource; and the resource according to the resource evaluation factor of each resource
  • the evaluation factor interval is used to divide the resources; the resource management center sets different usage levels for resources in different resource evaluation factor intervals, and different usage levels correspond to different levels of resource receptors, as shown in Table 3:
  • the division of resource receptors in Table 3 can be set according to actual conditions, and the scope of protection of the present invention is not limited herein.
  • X ⁇ c for resource 0 and resource P
  • it can be set to obtain a national-level competition.
  • the resource resource of the prize has the right to use; when d ⁇ X ⁇ c, for the resource Z, the resource recipient who can obtain the first prize of the provincial competition can be set to use; when X ⁇ d, for the resource K, It is possible to set the resource recipient who has obtained the first prize of the municipal competition to use it.
  • Resource Control Center can obtain resource assessment factors for each resource according to the following formula:
  • x i is the number of times the resource is referenced
  • y i is the number of times the resource is modified
  • p i is the resource evaluation factor of any resource
  • n is the total number of resources.
  • the resource usage level corresponding to resource A and resource B is one level, and only resource recipients with an annual average score greater than 90 points can use resource A.
  • resource B The resource usage level corresponding to resource C is two-level, and only resource recipients whose annual average score is greater than 80 points and less than or equal to 90 points can use resource C.
  • fractional interval level is divided into a first fractional interval level, a second fractional interval level, a third fractional interval level, and a fourth fractional interval level; wherein, the first fractional interval level>the second fractional interval level>the third fractional interval level > fourth score interval level;
  • the resource receptor group corresponding to the first fractional interval level is combined with the resource receptor group corresponding to the fourth fractional interval level to form a mutual aid group, and the resource receptor group corresponding to the second fractional interval level and the resource corresponding to the third fractional interval level are subject to
  • the body group is combined to form a mutual aid group; or the resource receptor group corresponding to the second fractional interval level is combined with the resource receptor group corresponding to the fourth fractional interval level to form a mutual aid group, and the resource group corresponding to the first fractional interval level
  • the resource receptor group corresponding to the third fraction interval level is combined to form a mutual aid group; or the resource receptor group corresponding to the first fractional interval level is combined with the resource receptor group corresponding to the second fractional interval level to form a mutual aid group, and the third score is formed.
  • the resource receptor group corresponding to the interval level is combined with the resource receptor group corresponding to the fourth fraction interval level to form a mutual aid group.
  • the resource receptor group corresponding to the first fractional interval level is combined with the resource receptor group corresponding to the fourth fractional interval level to form a mutual aid group, and the resource receptor group corresponding to the second fractional interval level and the resource corresponding to the third fractional interval level are formed.
  • the receptor groups are combined to form a mutual help group, as shown in Table 5 below:
  • the score evaluation value of the resource receptor is, for example, the student's test score, and the student is divided into a plurality of student groups according to the preset test score interval level, as shown in Table 6:
  • the statistics are re-stated. It is possible that the students in the student group D may enter the student group B or C, and the students in the student group C may enter the student group A.
  • the resource management center pushes the resource evaluation factor to students in student group A that is greater than R (R).
  • R The value of the resource can be set according to the actual situation.
  • the resource resource in the resource receptor group corresponding to the high-score interval level may be obtained the highest resource usage authority, or when there is a new resource or the optimal resource is updated, the new resource or the updated optimal resource is pushed to the resource.
  • the resource management center transmits the collected score evaluation values of the respective resource receptors to the resource control center; the resource control center divides each resource receptor into multiple according to preset different score interval levels. Resource acceptor groups, resource receptor groups corresponding to high-score interval levels are matched with resource receptor groups corresponding to low-score interval levels to obtain mutual help groups; and resource control centers are statistically selected in the mutual help groups during the preset time period.
  • the resource acceptor in the resource acceptor group corresponding to the inter-level corresponds to the highest resource access right and pushes the permission setting result to the resource management center; the resource management center controls the resource acceptor group corresponding to the high-divided interval level according to the permission setting result.
  • Resource Recipients access resources in the Resource Management Center.
  • resource donors and resource receptors in the scheme can be mutually transformed, which makes the application of the scheme wider and enhances the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne une architecture de commande de ressources basée sur l'identité, et un procédé d'utilisation de ladite architecture. Ladite architecture comprend un donneur de ressources, un récepteur de ressources, un centre de gestion de ressources, un centre de commande de ressources et un centre de gestion d'identité. Le donneur de ressources, le récepteur de ressources et le centre de gestion de ressources sont tous interconnectés. Le centre de commande de ressources est connecté séparément au donneur de ressources, au récepteur de ressources et au centre de gestion de ressources. Le centre de gestion d'identité est connecté séparément au centre de commande de ressources, au donneur de ressources et au récepteur de ressources. En comparaison avec l'état de la technique, l'architecture de commande de ressources basée sur un identifiant de service d'identité, et le procédé reposant sur ladite architecture, selon la présente invention, effectuent une gestion détaillée des ressources.
PCT/CN2015/074959 2014-08-01 2015-03-24 Architecture de commande de ressources basée sur un identifiant de service d'identité, et procédé d'utilisation de ladite architecture Ceased WO2016015477A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201410376942 2014-08-01
CN201410376942.X 2014-08-01
CN201410525055.4A CN104243219B (zh) 2014-08-01 2014-10-08 一种基于身份业务标识的资源控制架构及应用该架构方法
CN201410525055.4 2014-10-08

Publications (1)

Publication Number Publication Date
WO2016015477A1 true WO2016015477A1 (fr) 2016-02-04

Family

ID=52230619

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2014/084403 Ceased WO2016015366A1 (fr) 2014-08-01 2014-08-14 Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture
PCT/CN2015/074959 Ceased WO2016015477A1 (fr) 2014-08-01 2015-03-24 Architecture de commande de ressources basée sur un identifiant de service d'identité, et procédé d'utilisation de ladite architecture

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/084403 Ceased WO2016015366A1 (fr) 2014-08-01 2014-08-14 Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture

Country Status (2)

Country Link
CN (1) CN104243219B (fr)
WO (2) WO2016015366A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016015366A1 (fr) * 2014-08-01 2016-02-04 苏州阔地网络科技有限公司 Architecture de contrôle de ressources basée sur un identifiant de service d'identités, et procédé utilisant cette architecture
WO2016127471A1 (fr) * 2015-02-10 2016-08-18 沈玉将 Système de commande de flux de données, dispositif de commande de flux de données et terminal
CN107809371B (zh) * 2016-09-09 2020-01-10 腾讯科技(深圳)有限公司 共享资源显示方法及装置
CN109087222A (zh) * 2018-08-01 2018-12-25 阔地教育科技有限公司 课堂数据分析方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174326A (zh) * 2007-11-16 2008-05-07 广东工业大学 工程训练管理系统
CN101968932A (zh) * 2010-09-19 2011-02-09 深圳市摩拓触摸科技有限公司 多媒体智能互动教学系统及其实现方法
CN104243219A (zh) * 2014-08-01 2014-12-24 苏州阔地网络科技有限公司 一种基于身份业务标识的资源控制架构及应用该架构方法
CN104320380A (zh) * 2014-08-01 2015-01-28 苏州阔地网络科技有限公司 一种资源控制架构及应用该架构的方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100525284C (zh) * 2005-08-10 2009-08-05 华为技术有限公司 对用户的业务提供承载控制的方法
CN101064609A (zh) * 2007-05-25 2007-10-31 上海众恒信息产业有限公司 一种信息系统的访问控制方法及装置
CN101388811B (zh) * 2007-09-10 2015-03-18 上海中兴软件有限责任公司 基于无线接入网的接入控制方法
US8266284B2 (en) * 2008-05-16 2012-09-11 Microsoft Corporation System from reputation shaping a peer-to-peer network
DE112010004284T5 (de) * 2009-11-06 2013-01-24 International Business Machines Corporation Verfahren und System zum Verwalten von Sicherheitsobjekten
WO2011134154A1 (fr) * 2010-04-29 2011-11-03 华为技术有限公司 Procédé et dispositif permettant une commande de ressources de réseau de liaison multiutilisateur
US10135831B2 (en) * 2011-01-28 2018-11-20 F5 Networks, Inc. System and method for combining an access control system with a traffic management system
CN103078859B (zh) * 2012-12-31 2016-03-02 普天新能源有限责任公司 业务系统权限管理方法、设备及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174326A (zh) * 2007-11-16 2008-05-07 广东工业大学 工程训练管理系统
CN101968932A (zh) * 2010-09-19 2011-02-09 深圳市摩拓触摸科技有限公司 多媒体智能互动教学系统及其实现方法
CN104243219A (zh) * 2014-08-01 2014-12-24 苏州阔地网络科技有限公司 一种基于身份业务标识的资源控制架构及应用该架构方法
CN104320380A (zh) * 2014-08-01 2015-01-28 苏州阔地网络科技有限公司 一种资源控制架构及应用该架构的方法

Also Published As

Publication number Publication date
CN104243219A (zh) 2014-12-24
WO2016015366A1 (fr) 2016-02-04
CN104243219B (zh) 2015-09-30

Similar Documents

Publication Publication Date Title
US9578574B2 (en) Replacement system and method for broadband wireless network
US9148487B2 (en) Method and system for managing device profiles
CN103596272B (zh) 一种固定宽带网络的资源分配方法、装置及系统
WO2016015477A1 (fr) Architecture de commande de ressources basée sur un identifiant de service d'identité, et procédé d'utilisation de ladite architecture
US20120072971A1 (en) Data sharing system, shared data management aparatus, and control method of shared data management apparatus
CN109417731A (zh) 用于用户平面路径选择、重选和通知用户平面变化的系统和方法
US20240098631A1 (en) Filters for bulk subscriptions
CN102362539A (zh) 设备辅助服务的服务质量
CN105897442A (zh) 无线通信系统中的经客户端管理的群组通信会话
CA2745898A1 (fr) Structure hierarchique d'un systeme de notification comprenant des droits bases sur des roles
WO2023150609A2 (fr) Fonctionnement de client de facilitateur de bord intelligent
WO2016015498A1 (fr) Architecture de commande de ressources et procédé utilisant ladite architecture
Ruiz-Barrera et al. Developing a web-based congress: the 2020 international web-based neurosurgery congress method
Koné et al. Network resource management and core network slice implementation: A testbed for rural connectivity
Das et al. Mixed-methods study to validate and refine the'Strategic Healthcare Implementation Framework for Task Shifting, Sharing and Resource Enhancement'(SHIFT-SHARE)
Kelly Social Media: An Effective Tool for Risk and Crisis Communication?
Gusev et al. Integrating practical CISCO CCNA courses in the Computer Networks' curriculum
CN115328994B (zh) 一种数据共享系统及其数据共享方法、存储介质
CN104854607A (zh) 协议签署的实现方法、服务器
Chen et al. Design and practice of virtual simulation experiment for broadband wireless communication
Hovden Autonomous Operation of Mission Critical Base Stations in 5G
Shinde International Planners Network off to a flying start
Shi et al. EventMe: Location-Based Event Content Distribution through Human Centric Device-to-Device Communications
Fotheringham Smarter planning for Tasmania?
Cook The Challenges and Opportunities for Public Safety Communications: The Adams County Case Study

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15827541

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15827541

Country of ref document: EP

Kind code of ref document: A1