CN113381871B - Mobile edge service arrangement method, arrangement device and mobile edge computing system - Google Patents

Mobile edge service arrangement method, arrangement device and mobile edge computing system Download PDF

Info

Publication number
CN113381871B
CN113381871B CN202010159590.8A CN202010159590A CN113381871B CN 113381871 B CN113381871 B CN 113381871B CN 202010159590 A CN202010159590 A CN 202010159590A CN 113381871 B CN113381871 B CN 113381871B
Authority
CN
China
Prior art keywords
oss
mobile edge
information
meao
connection authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010159590.8A
Other languages
Chinese (zh)
Other versions
CN113381871A (en
Inventor
朱红梅
林奕琳
刘洁
何宇锋
曹磊
杨峰义
张建敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202010159590.8A priority Critical patent/CN113381871B/en
Publication of CN113381871A publication Critical patent/CN113381871A/en
Application granted granted Critical
Publication of CN113381871B publication Critical patent/CN113381871B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The disclosure provides a mobile edge service arranging method, and relates to the technical field of communication. The disclosed mobile edge service arranging method includes: after the validity authentication of the user identity of the operation support system OSS is successful, the mobile edge service orchestrator MEAO sends a connection authentication instruction to the OSS, wherein the OSS comprises an OSS independently constructed by a third party and an OSS belonging to an operator; receiving connection authentication information from the OSS; according to the user identity in the connection authentication information, instantiation is executed so as to configure the authority corresponding to the user identity for the OSS; the management information is sent to the mobile edge platform manager MEPM. By the method, the MEAO can authenticate the OSS trying to access and configure the corresponding authority for the OSS, thereby realizing the flexible access of the OSS and providing personalized service for diversified OSSs.

Description

Mobile edge service arrangement method, arrangement device and mobile edge computing system
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a mobile edge service orchestration method, an orchestrator, and a mobile edge computing system.
Background
The MEC (Mobile Edge Computing) migrates the cloud Computing platform from the inside of the Mobile core network to the Edge of the Mobile access network, thereby realizing the elastic utilization of Computing and storage resources. Since the MEC runs at the edge of the network, it is logically independent of other parts of the network and is more suitable for applications with higher security requirements; and the MEC server usually has higher computing power and is suitable for analyzing and processing a large amount of data. In addition, because the MEC is very close to the user or the information source geographically, the time delay of the network responding to the user request is greatly reduced, and the possibility of network congestion occurring in the transmission network and the core network part is also reduced.
The current MEC solution and deployment is based on the MEC specifications of ETSI (European Telecommunications Standards Institute), which is also an industry default specification and standard.
Disclosure of Invention
It is an object of the present disclosure to improve flexibility of MEC deployment and services.
According to an aspect of some embodiments of the present disclosure, a mobile edge service orchestration method is provided, including: after the validity of the user identity of an OSS (Operation Support Systems) is successfully authenticated, the measo (Mobile Edge Application organizer) sends a connection authentication instruction to the OSS, wherein the OSS includes an OSS independently constructed by a third party and an OSS belonging to an operator; receiving connection authentication information from the OSS; according to the user identity in the connection authentication information, instantiation is executed so as to configure the authority corresponding to the user identity for the OSS; the management information is sent to the MEPM (ME platform manager).
In some embodiments, the MEAO receives the connection authentication information over an Mm1 interface, the MEAO comprising a plurality of Mm1 interfaces, each Mm1 interface interacting with one OSS.
In some embodiments, the MEAO sends management information to the MEPM over the Mm3 interface.
In some embodiments, the management information includes lifecycle information and application rules.
In some embodiments, configuring the OSS with the right corresponding to the user identity includes determining and configuring at least one of a function, a bandwidth limitation, or a QoS that the OSS is capable of using based on the user identity.
By the method, the MEAO can perform identity verification on the OSS trying to access and configure corresponding authority for the OSS, so that flexible access of the OSS is realized, and personalized service is provided for diversified OSSs.
According to an aspect of further embodiments of the present disclosure, there is provided a MEAO, comprising: the instruction sending unit is configured to send a connection authentication instruction to the OSS after the legality authentication of the user identity of the OSS is successful, wherein the OSS comprises an OSS independently constructed by a third party and an OSS belonging to an operator; an information receiving unit configured to receive connection authentication information from the OSS; the instantiation unit is configured to execute instantiation according to the user identity in the connection authentication information so as to configure the authority corresponding to the user identity for the OSS; a management information transmitting unit configured to transmit the management information to the MEPM.
In some embodiments, the MEAO complies with at least one of: the authentication information receiving unit receives connection authentication information through the Mm1 interface, the authentication information receiving unit comprises a plurality of Mm1 interfaces, and each Mm1 interface is interacted with one OSS; the management information sending unit sends management information to a Mobile Edge Platform Manager (MEPM) through an Mm3 interface; or the management information includes lifecycle information and application rules.
In some embodiments, configuring the OSS with the right corresponding to the user identity includes determining and configuring at least one of a function, a bandwidth limitation, or a QoS that the OSS is capable of using based on the user identity.
According to an aspect of still other embodiments of the present disclosure, a mobile edge service orchestrator is provided, comprising: a memory; and a processor coupled to the memory, the processor configured to perform any of the above mobile edge orchestration methods based on instructions stored in the memory.
The MEAO can perform identity authentication on the OSS trying to access and configure corresponding authority for the OSS, thereby realizing flexible access of the OSS and providing personalized service for diversified OSSs.
According to an aspect of still further embodiments of the present disclosure, a computer-readable storage medium is proposed, on which computer program instructions are stored, which instructions, when executed by a processor, implement the steps of any of the above mobile edge service orchestration methods.
By executing the instruction on the computer-readable storage medium, the identity of the OSS trying to access the MEC can be verified, and the corresponding authority is configured for the OSS, so that the flexible access of the OSS is realized, and the personalized service is provided for the diversified OSS.
Further, according to an aspect of some embodiments of the present disclosure, there is provided a mobile edge computing system, including: OSSs respectively configured to perform one or more of network management, system management, billing, operation, accounting or customer service for own traffic, including an OSS independently constructed by a third party and an OSS belonging to an operator; any of the above mentioned MEAOs; and an MEPM configured to perform mobile edge platform element management, application lifecycle management, and application rule and requirements management.
The system comprises a plurality of OSSs with various identities, and the MEAO can carry out identity verification on the OSSs and configure corresponding authorities for the OSSs, thereby realizing flexible access of the OSSs and providing personalized services for diversified OSSs.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this disclosure, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure and not to limit the disclosure. In the drawings:
fig. 1 is a flow diagram of some embodiments of a mobile edge business orchestration method of the present disclosure.
Fig. 2 is a signaling flow diagram of some embodiments of a mobile edge services orchestration method according to the present disclosure.
Fig. 3 is a schematic diagram of some embodiments of a mobile edge service orchestrator of the present disclosure.
Fig. 4 is a schematic diagram of other embodiments of a mobile edge service orchestrator of the present disclosure.
Fig. 5 is a schematic diagram of still other embodiments of a mobile edge service orchestrator according to the present disclosure.
FIG. 6 is a schematic diagram of some embodiments of a moving edge computing system of the present disclosure.
Detailed Description
The technical solution of the present disclosure is further described in detail by the accompanying drawings and examples.
A flow diagram of some embodiments of a mobile edge business orchestration method of the present disclosure is shown in fig. 1.
In step 101, the MEAO sends a connection authentication command to the OSS attempting to access, which may be an OSS independently constructed by a third party or an OSS belonging to an operator. In some embodiments, when the OSS tries to access the measo, the measo may authenticate the validity of the OSS first, and if the authentication passes, the connection authentication instruction is sent again, so as to improve the integration degree with the related art, and at the same time, reduce the workload of connection authentication.
In some embodiments, the MEAO may receive the connection authentication information over an Mm1 interface, the MEAO comprising a plurality of Mm1 interfaces, each Mm1 interface interacting with one OSS.
In step 102, the MEAO receives connection authentication information from the OSS. In some embodiments, the connection authentication information may include specific port information, a user name, a key, and the like.
In step 103, instantiation is performed according to the user identity in the connection authentication information, so as to configure the authority corresponding to the user identity for the OSS. In some embodiments, the MEAO may determine its corresponding authority according to the user identity, and then send an instantiation instruction to the NFVO.
In step 104, the management information is sent to the MEPM. In some embodiments, the MEAO may send management information to the mobile edge platform manager MEPM over an Mm3 interface.
By the method, the MEAO can perform identity verification on the OSS trying to access and configure corresponding authority for the OSS, so that flexible access of the OSS is realized, personalized service is provided for diversified OSS, and diversified requirements of clients are met.
The signaling flow diagram of some embodiments of the mobile edge traffic orchestration method of the present disclosure is shown in fig. 2.
In 201, after an unaccessed OSS goes online, an identity authentication is requested from the MEAO. The MEAO determines the legitimacy of the OSS. In some embodiments, the authentication information provided by the OSS may be a pre-negotiated key or the like.
At 202, the MEAO initiates a connection authentication after determining that the OSS is a legitimate, secure OSS. In some embodiments, a connection authentication instruction may be sent to the OSS, and identity information, key information, etc. may be provided by the OSS. In some embodiments, an account name and corresponding key may be provided. And the MEAO determines whether the account name is matched with the secret key or not according to the pre-stored information, and determines the user authority corresponding to the account name under the condition of matching.
In 203, when the OSS connection authentication is successful, authority information corresponding to the account name is determined, and an instantiation instruction is sent to the NFVO based on the authority information. In some embodiments, the permissions may include functions that the OSS is able to use (e.g., online viewing, downloading, etc.), bandwidth limitations, and QoS, among others. In some embodiments, some or all of the rights may be opened based on the payment of the OSS.
At 204, the NFVO schedules the resource to perform the instantiation operation of the application.
In 205 the MEAO sends management information including management of lifecycle, application rules, etc. to the MEPM over the Mm3 interface.
By the method, the MEC system can accommodate and manage the OSS self-built by the third party besides the OSS of the operator, so that the third party client is supported to independently build the OSS, partial control and management of self services are facilitated, and compared with the current ETSI MEC specification which only considers a single OSS, the method reduces the limitation of the MEC system, improves the flexibility of use and improves user experience.
A schematic diagram of some embodiments of the mobile edge traffic orchestrator of the present disclosure is shown in fig. 3.
The instruction transmitting unit 301 can initiate connection authentication for the OSS attempting access. The OSS may be an OSS independently constructed by a third party or an OSS belonging to an operator. In some embodiments, when an OSS attempts to access a measo, the measo may first authenticate the validity of the OSS and, if the authentication is passed, send a connection authentication command.
The information receiving unit 302 can receive connection authentication information from the OSS. In some embodiments, the connection authentication information may include specific port information, a user name, a key, and the like.
The instantiation unit 303 can perform instantiation according to the user identity in the connection authentication information, so as to configure the authority corresponding to the user identity for the OSS. In some embodiments, the instantiation unit 303 may determine the corresponding authority according to the user identity, and further send an instantiation instruction to the NFVO, so that the NFVO performs an instantiation operation.
The management information transmitting unit 304 can transmit the management information to the MEPM. In some embodiments, the management information sending unit 304 may send the management information to the mobile edge platform manager MEPM through the Mm3 interface.
The MEAO can perform identity authentication on the OSS trying to access and configure corresponding authority for the OSS, thereby realizing flexible access of the OSS and providing personalized service for diversified OSSs.
A schematic diagram of an embodiment of the mobile edge service orchestrator of the present disclosure is shown in fig. 4. The mobile edge service orchestrator comprises a memory 401 and a processor 402. Wherein: the memory 401 may be a magnetic disk, flash memory, or any other non-volatile storage medium. The memory is used for storing the instructions in the corresponding embodiments of the mobile edge orchestration method above. The processor 402 is coupled to the memory 401 and may be implemented as one or more integrated circuits, such as a microprocessor or microcontroller. The processor 402 is configured to execute instructions stored in the memory, so as to enable flexible access of OSS and provide personalized services for diversified OSS.
In some embodiments, as also shown in FIG. 5, the mobile edge service orchestrator 500 may include a memory 501 and a processor 502. The processor 502 is coupled to the memory 501 by a BUS 503. The mobile edge service orchestrator 500 may also be connected to external storage 505 via storage interface 504 for invoking external data, and may also be connected to a network or another computer system (not shown) via network interface 506. And will not be described in detail herein.
In the embodiment, the data instruction is stored in the memory, and the instruction is processed by the processor, so that the flexible access of the OSS can be realized, and the personalized service is provided for diversified OSSs.
In another embodiment, a computer-readable storage medium has stored thereon computer program instructions which, when executed by a processor, implement the steps of the method in the corresponding embodiment of the mobile edge orchestration method. As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, apparatus, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
A schematic diagram of some embodiments of a moving edge computing system of the present disclosure is shown in fig. 6. A plurality of OSSs can be included in the mobile edge computing system, for example, OSSs 611 to 61n, wherein n is a positive integer. OSS interacts with MEAO 62 through the Mm1 interface. The OSS may be an OSS belonging to an operator or an OSS independently constructed by a third party. The OSS may be capable of performing one or more of network management, system management, billing, operations, accounting, or customer service for its own traffic. MEPM 63 is capable of performing mobile edge platform element management, application lifecycle management, and application rules and requirements management, interacting with MEAO 62 through an Mm3 interface.
The system supports the third-party client to independently construct the OSS, partial control and management of the self service are facilitated, the OSS comprises a plurality of OSSs with various identities, and the MEAO can carry out identity verification on the OSS and configure corresponding authority for the OSS, so that flexible access of the OSS is realized, and personalized service is provided for diversified OSSs.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Thus far, the present disclosure has been described in detail. Some details well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
The methods and apparatus of the present disclosure may be implemented in a number of ways. For example, the methods and apparatus of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
Finally, it should be noted that: the above examples are intended only to illustrate the technical solutions of the present disclosure and not to limit them; although the present disclosure has been described in detail with reference to preferred embodiments, those of ordinary skill in the art will understand that: modifications to the specific embodiments of the disclosure or equivalent substitutions for parts of the technical features may be made; all such modifications are intended to be included within the scope of the claims of this disclosure without departing from the spirit thereof.

Claims (11)

1. A mobile edge service orchestration method, comprising:
after an operation support system OSS which is not accessed is on line, the MEAO requests a mobile edge service orchestrator (MEAO) for identity authentication so as to determine the legality of the OSS, wherein the OSS comprises an OSS independently constructed by a third party and an OSS belonging to an operator, and identity authentication information comprises a pre-negotiated secret key;
after the validity authentication of the user identity of the OSS is successful, the MEAO sends a connection authentication instruction to the OSS;
receiving connection authentication information from an OSS, wherein the connection authentication information comprises user identity and key information;
according to the user identity in the connection authentication information, instantiation is executed so as to configure the authority corresponding to the user identity for the OSS;
the management information is sent to the mobile edge platform manager MEPM.
2. The method of claim 1, wherein,
the MEAO receives the connection authentication information through an Mm1 interface, the MEAO comprises a plurality of Mm1 interfaces, and each Mm1 interface interacts with one OSS.
3. The method of claim 1, wherein said MEAO sends management information to the MEPM over an Mm3 interface.
4. The method of claim 1, wherein the management information includes lifecycle information and application rules.
5. The method of claim 1, wherein the configuring the OSS with permissions corresponding to user identities comprises determining and configuring at least one of functions, bandwidth limitations or QoS that an OSS can use according to the user identities.
6. A mobile edge service orchestrator comprising:
the device comprises an instruction sending unit, a connection authentication instruction sending unit and a connection authentication unit, wherein the instruction sending unit is configured to send a connection authentication instruction to an Operation Support System (OSS) after the legality authentication of the user identity of the OSS is successful, after the unaccessed OSS is on line, the connection authentication instruction requests a mobile edge service orchestrator (MEAO) for identity authentication so that the MEAO can determine the legality of the OSS, the OSS comprises an OSS independently constructed by a third party and an OSS belonging to an operator, and the identity authentication information comprises a pre-negotiated secret key;
an information receiving unit configured to receive connection authentication information from an OSS, the connection authentication information including a user identity and key information;
the instantiation unit is configured to execute instantiation according to the user identity in the connection authentication information so as to configure the authority corresponding to the user identity for the OSS;
a management information transmitting unit configured to transmit the management information to the mobile edge platform manager MEPM.
7. The mobile edge service orchestrator according to claim 6, wherein the mobile edge service orchestrator conforms to at least one of:
the information receiving unit receives the connection authentication information through an Mm1 interface, the information receiving unit comprises a plurality of Mm1 interfaces, and each Mm1 interface is interacted with one OSS;
the management information sending unit sends management information to the MEPM through an Mm3 interface; or
The management information includes lifecycle information and application rules.
8. The mobile edge service orchestrator according to claim 6, wherein the configuring the OSS with the right corresponding to the user identity comprises determining and configuring at least one of a function, a bandwidth limitation or a QoS that an OSS can use according to the user identity.
9. A mobile edge service orchestrator comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of any of claims 1-5 based on instructions stored in the memory.
10. A computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of any one of claims 1 to 5.
11. A mobile edge computing system, comprising:
a plurality of operation support systems OSS each configured to perform one or more of network management, system management, billing, business, accounting, or customer service for its own traffic, including an OSS independently constructed by a third party and an OSS belonging to an operator;
mobile edge service orchestrator MEAO according to any one of claims 6 to 9; and
a mobile edge platform manager MEPM configured to perform mobile edge platform element management, application lifecycle management, and application rules and requirements management.
CN202010159590.8A 2020-03-10 2020-03-10 Mobile edge service arrangement method, arrangement device and mobile edge computing system Active CN113381871B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010159590.8A CN113381871B (en) 2020-03-10 2020-03-10 Mobile edge service arrangement method, arrangement device and mobile edge computing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010159590.8A CN113381871B (en) 2020-03-10 2020-03-10 Mobile edge service arrangement method, arrangement device and mobile edge computing system

Publications (2)

Publication Number Publication Date
CN113381871A CN113381871A (en) 2021-09-10
CN113381871B true CN113381871B (en) 2023-04-07

Family

ID=77568606

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010159590.8A Active CN113381871B (en) 2020-03-10 2020-03-10 Mobile edge service arrangement method, arrangement device and mobile edge computing system

Country Status (1)

Country Link
CN (1) CN113381871B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447842A (en) * 2008-09-27 2009-06-03 百视通网络电视技术发展有限责任公司 Distributed digital rights management (DRM) system adopting 2-level framework
WO2018215046A1 (en) * 2017-05-22 2018-11-29 Telefonaktiebolaget Lm Ericsson (Publ) Edge cloud broker and method therein for allocating edge cloud resources
CN109358967A (en) * 2018-09-26 2019-02-19 中国联合网络通信集团有限公司 A kind of ME platform APP instantiation moving method and server
CN109818867A (en) * 2017-11-21 2019-05-28 华为技术有限公司 A kind of configuration method and device
CN110417849A (en) * 2019-06-05 2019-11-05 浙江工业大学 Insertion type industrial equipment edge calculations system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10104672B2 (en) * 2016-08-09 2018-10-16 Wipro Limited Method and a system for identifying operating modes of communications in mobile edge computing environment
US11096036B2 (en) * 2019-09-12 2021-08-17 Intel Corporation Multi-access Edge Computing service for mobile User Equipment method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447842A (en) * 2008-09-27 2009-06-03 百视通网络电视技术发展有限责任公司 Distributed digital rights management (DRM) system adopting 2-level framework
WO2018215046A1 (en) * 2017-05-22 2018-11-29 Telefonaktiebolaget Lm Ericsson (Publ) Edge cloud broker and method therein for allocating edge cloud resources
CN109818867A (en) * 2017-11-21 2019-05-28 华为技术有限公司 A kind of configuration method and device
CN109358967A (en) * 2018-09-26 2019-02-19 中国联合网络通信集团有限公司 A kind of ME platform APP instantiation moving method and server
CN110417849A (en) * 2019-06-05 2019-11-05 浙江工业大学 Insertion type industrial equipment edge calculations system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ETSI.Multi-access Edge Computing (MEC) *
MEC Management ; Part 2: Application lifecycle, rules and requirements management.《ETSI GS MEC 010-2 V2.1.1》.2019, *

Also Published As

Publication number Publication date
CN113381871A (en) 2021-09-10

Similar Documents

Publication Publication Date Title
US11457070B2 (en) Virtual hosting device and service to provide software-defined networks in a cloud environment
CN110944330B (en) MEC platform deployment method and device
US10757225B2 (en) Secure client-server communication
US10824454B2 (en) 5G dynamic slice and network identity instantiation, termination, and access management system and method
US9210173B2 (en) Securing appliances for use in a cloud computing environment
CN109429272B (en) Shunting method in roaming scene and related equipment
WO2018202284A1 (en) Authorizing access to user data
CN110569638B (en) API authentication method and device, storage medium and computing equipment
US10659441B2 (en) Dynamically managing, from a centralized service, valid cipher suites allowed for secured sessions
KR20070114839A (en) Limited supply access to mobile terminal features
KR20190017997A (en) Security configuration of cloud computing nodes
CN111526111B (en) Control method, device and equipment for logging in light application and computer storage medium
CN113727369A (en) Management method of network component and network equipment
JP2020514863A (en) Certificate acquisition method, authentication method and network device
CN113647113A (en) Network-based media processing security
CN111901285A (en) Credibility verification method, system, equipment and storage medium
CN114616807B (en) Method and system for managing and controlling a communication network
CN112953986B (en) Edge application management method and device
CN113381871B (en) Mobile edge service arrangement method, arrangement device and mobile edge computing system
CN111262819A (en) VOIP SDK access control method and device
CN113596082A (en) Method and system for determining equipment data and electronic device
EP4073994A1 (en) Providing cybersecurity services by a network and automated provisioning thereof
CN111988263B (en) Container service management method, container manager, virtual network function instance and virtual network function manager
EP4340297A1 (en) Service function authorization
KR102664180B1 (en) Network-based media processing security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant