CN108419229A - A kind of cut-in method and equipment - Google Patents
A kind of cut-in method and equipment Download PDFInfo
- Publication number
- CN108419229A CN108419229A CN201810063193.3A CN201810063193A CN108419229A CN 108419229 A CN108419229 A CN 108419229A CN 201810063193 A CN201810063193 A CN 201810063193A CN 108419229 A CN108419229 A CN 108419229A
- Authority
- CN
- China
- Prior art keywords
- communication terminal
- urgency
- device identification
- urgency communication
- communications system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
A kind of cut-in method provided by the present application and equipment, including:Urgency traffic is received, the identity of the user is verified according to the account information for including in urgency traffic and the urgency communication terminal is verified according to the device identification for including in urgency traffic;And in the case where passing through by and to the urgency communication terminal authentication to the authentication of the user, respond the urgency traffic.In this way, the urgency traffic or disabled user that either validated user is sent using urgency communication terminal utilize the urgency traffic that urgency communication terminal is sent, it is verified by the relationship between user identity, user and urgency communication terminal, user's malice can be avoided to send urgency traffic to negative consequence caused by Critical Communications System using urgency communication terminal, effectively promote the treatment effeciency of urgency traffic.
Description
Technical field
This application involves wireless communication and urgency communication technical field more particularly to a kind of cut-in method and equipment.
Background technology
Urgent or public safety department generally requires multiple department's joint actions, here when processing happens suddenly emergency
Sector member may be from multiple functional departments such as public security, People's Armed Police, special policeman, fire-fighting, safety supervision, traffic, medical treatment and unit.In reality
In the application of border, urgent accident can set up interim reply mechanism or command system after occurring, realize the system to multiple departments
One leader, in order to effectively handle burst emergency.In this case, communication is ensured in each interagency coordination
It is particularly important in terms of orderly work.
3GPP(3rd Generation Partnership Project;Third generation partner program) group is woven in
It is introduced respectively in Release14 to urgent video traffic (Mission Critical Video;MC Video) and urgent number
According to business (Mission Critical Data;MC data) support.Wherein, will include the urgent video traffics of MCPTT and tight
Anxious data service is referred to as urgency communication service (Mission Critical Services;MCs);There is provided it is above-mentioned whole or
The system of part urgency communication service is referred to as Critical Communications System.
In Critical Communications System, when user initiates urgency traffic, Critical Communications System is receiving the user
When the urgency traffic sent by urgency communication terminal, believed according to the account for the user for including in the urgency traffic
Pre-configuration data corresponding with the account information of the user obtained is ceased, the identity of the user is verified.Urgency communication system
System responds the urgency traffic in the case where authentication passes through.
That is, as long as user has legal account information, then any one urgency communication terminal can be used
Send urgency traffic.So when urgency communication terminal is stolen or loses the case where, once occur user's malice use it is tight
Anxious communication terminal sends the case where urgency traffic, this takes the urgency communication that Critical Communications System is provided is seriously affected
Business.
Invention content
In view of this, the embodiment of the present application provides a kind of cut-in method and equipment, it is urgent logical for solving how to realize
The problem of letter terminal device efficiently accesses Critical Communications System.
A kind of cut-in method provided by the embodiments of the present application, including:
Critical Communications System receives the urgency traffic that urgency communication terminal is sent, and includes in the urgency traffic
Use the device identification of the account information and the urgency communication terminal of the user of the urgency communication terminal;
The Critical Communications System verifies the identity of the user according to the account information and according to described
The urgency communication terminal is verified in device identification;
The Critical Communications System leads to the authentication of the user by and to the urgency communication terminal authentication
In the case of crossing, the urgency traffic is responded.
A kind of access device that the embodiment of the present application also provides, including:
Receiving unit, the urgency traffic for receiving the transmission of urgency communication terminal wrap in the urgency traffic
The device identification of account information and the urgency communication terminal containing the user for using the urgency communication terminal;
Processing unit, for being verified to the identity of the user according to the account information and according to the equipment
Mark verifies the urgency communication terminal;And to the authentication of the user by and to the urgency communication it is whole
In the case that end is verified, the urgency traffic is responded.
What at least one embodiment provided by the present application was reached has the beneficial effect that:
Critical Communications System provided by the embodiments of the present application receives urgency traffic, includes according in urgency traffic
Account information the identity of the user is verified and according to the device identification for including in urgency traffic to described
Urgency communication terminal is verified;And pass through by and to the urgency communication terminal authentication to the authentication of the user
In the case of, respond the urgency traffic.In this way, either validated user utilizes the urgent logical of urgency communication terminal transmission
Communication service or disabled user utilize the urgency traffic that urgency communication terminal is sent, and Critical Communications System can be to user's body
Relationship between part, user and urgency communication terminal is verified, and user's malice can be avoided to be sent using urgency communication terminal
Urgency traffic effectively promotes the treatment effeciency of urgency traffic to negative consequence caused by Critical Communications System.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly introduced, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present application, for this
For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these attached drawings
His attached drawing.
Fig. 1 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 3 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 5 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 6 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 7 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram of access device provided by the embodiments of the present application.
Specific implementation mode
In order to keep the purpose, technical scheme and advantage of the application clearer, the embodiment of the present application provides a kind of access
Method and apparatus, Critical Communications System receives urgency traffic, according to the account information for including in urgency traffic to institute
The identity for stating user verify and according to the device identification for including in urgency traffic to the urgency communication terminal into
Row verification;And in the case where passing through by and to the urgency communication terminal authentication to the authentication of the user, response
The urgency traffic.In this way, either validated user utilizes the urgency traffic also right and wrong that urgency communication terminal is sent
Method user utilizes the urgency traffic that urgency communication terminal is sent, Critical Communications System can to user identity, user with it is urgent
Relationship between communication terminal is verified, can avoid user malice using urgency communication terminal send urgency traffic to
Negative consequence caused by Critical Communications System effectively promotes the treatment effeciency of urgency traffic.
The each embodiment of the application is described in further detail with reference to the accompanying drawings of the specification, it is clear that described
Embodiment is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field
All other embodiment that those of ordinary skill is obtained without making creative work belongs to the application protection
Range.
Fig. 1 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.The method can be as follows.
The executive agent of the embodiment of the present application can be Critical Communications System, or urgency communication server can also be to have
Other servers for handling urgency traffic, are not specifically limited here.
Step 101:Critical Communications System receives the urgency traffic that urgency communication terminal is sent.
Wherein, comprising the account information of user using the urgency communication terminal and described in the urgency traffic
The device identification of urgency communication terminal.
In the embodiment of the present application, urgency communication terminal can be by Register message or Publish message to SIP
Core sends urgency traffic, and the urgency traffic is sent to Critical Communications System by SIP Core.
It should be noted that the key (Token) for verifying user identity can also be carried in urgency traffic.
Step 102:The Critical Communications System identity of the user is verified according to the account information and
The urgency communication terminal is verified according to the device identification.
In applying for embodiment, Critical Communications System not only verifies the identity of user, but also to urgency communication
Terminal is verified.Here it is to first carry out the operation verified to the identity of user, still first carries out to urgency communication terminal
The operation verified, the two operation services are still performed simultaneously, in the embodiment of the present application can, do not do specific limit
It is fixed.
Specifically, the Critical Communications System verifies the identity of the user according to the account information, including:
The Critical Communications System obtains pre-configuration data corresponding with the account information according to the account information;
The Critical Communications System verifies the identity of the user using the pre-configuration data.
Assuming that comprising the key for verifying user identity in urgency traffic, then the data being pre-configured can be utilized
It is verified with the identity of key pair user.
Specifically, the Critical Communications System verifies the urgency communication terminal according to the device identification, packet
It includes:
The Critical Communications System determines the access state of the communication device for emergency according to the device identification, described
Access state includes one kind in interim disabled status, permanent disabled status, enabled state;
And/or
The Critical Communications System judges whether the urgency communication terminal allows by the account according to the device identification
Family information uses.
In the embodiment of the present application, Critical Communications System can determine first when being verified to urgency communication terminal
The access state of urgency communication terminal can determine pair if access state is interim disabled status/permanent disabled status
Urgency communication terminal authentication does not pass through, and step 104 is executed then can trigger;
If access state is enabled state, it can determine and urgency communication terminal authentication is passed through, execute step
103;It can also further execute and judge whether the urgency communication terminal allows the operation used by the account information.
Secondly, the Critical Communications System judges whether the urgency communication terminal allows quilt according to the device identification
The account information uses.
Specifically, the Critical Communications System obtains the correspondence between the device identification being pre-configured and account information
(correspondence illustrates that the corresponding user of account information is allowed to use the corresponding urgency communication terminal of the device identification) judges
Whether the corresponding account information of the device identification is consistent with the account information carried in urgency traffic, if inconsistent, really
It is fixed that the verification of urgency communication terminal is not passed through;If consistent, it is determined that be verified to urgency communication terminal.
Step 103:The Critical Communications System to the authentication of the user by and to the urgency communication it is whole
In the case that end is verified, the urgency traffic is responded.
Step 104:The Critical Communications System to the authentication of the user not by and/or to described urgent logical
In the case that letter terminal authentication does not pass through, response failed message is sent to the urgency communication terminal.
Based on the same inventive concept, Fig. 2 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute
The method of stating can be as follows.
Step 201:The Critical Communications System receives access state configuring request, is wrapped in the access state configuring request
The device identification of the terminal containing urgency communication and access state.
In the embodiment of the present application, access state configuring request can be that user is sent by configuration management client,
It can also be to be sent by other matched equipment, be not specifically limited here.
The device identification of urgency communication terminal described in the embodiment of the present application can be including but not limited to:IMEI
(International Mobile Equipment Identity;International mobile equipment identification number), access identification code, UUID
(Universally Unique Identifier;Universally Unique Identifier) or digital certificates etc..
Here access state includes one kind in interim disabled status, permanent disabled status, enabled state.
Step 202:The Critical Communications System stores the correspondence between the device identification and the access state.
Step 203:The Critical Communications System is according to the device identification, to the corresponding urgency communication of the device identification
Terminal sends configuration-direct, and the configuration-direct is used to indicate the urgency communication terminal and completes to access according to the access state
State configures.
In the embodiment of the present application, urgency communication terminal can also send configuration response message to configuration management client,
The configuration response message is for informing configuration management client access state configuration result (success/failure).
Based on the same inventive concept, Fig. 3 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute
The method of stating can be as follows.
Step 301:The Critical Communications System receives access state new information, is wrapped in the access state new information
The device identification of the terminal containing urgency communication and updated access state.
Step 302:The Critical Communications System is after the current access state and update for determining the urgency communication terminal
Access state difference when, store the correspondence between the device identification and the updated access state.
In the embodiment of the present application, the Critical Communications System is in the current access state for determining the urgency communication terminal
When identical as updated access state, response message is sent, the access of urgency communication terminal can be included in the response message
State.
Step 303:The Critical Communications System is according to the device identification, to the corresponding urgency communication of the device identification
Terminal sends configuration-direct, and the configuration-direct is used to indicate the urgency communication terminal according to the updated access state
Complete access state configuration.
If the access state for including in configuration-direct is permanent disabling, urgency communication terminal is by the access shape of itself
State is set as permanently disabling, in addition, urgency communication terminal deletion is all having preserved relevant with confidence with Critical Communications System
Breath;
If the access state for including in configuration-direct is interim disabling, urgency communication terminal is by the access shape of itself
State is set as disabling temporarily;
If the access state for including in configuration-direct is enabled state, if the current state of urgency communication terminal is
Permanent disabling, then will be unable to respond the configuration-direct, and to Critical Communications System feedback configuration failed message;If urgency communication
The current state of terminal is interim disabling, then urgency communication terminal sets the access state of itself to normal operating conditions.
Based on the same inventive concept, Fig. 4 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute
The method of stating can be as follows.
Step 401:The Critical Communications System receives access state inquiry request, is wrapped in the access state inquiry request
The device identification of the terminal containing urgency communication.
In the embodiment of the present application, the equipment for sending access state inquiry request can be the urgent of access state to be checked
Communication terminal oneself can also be other urgency communication terminals or other equipment of search access right, not do specific limit here
It is fixed.
Step 402:The Critical Communications System is according to the correspondence between the device identification and access state of storage, really
Fixed access state corresponding with the device identification for including in the access state inquiry request, and send and carry the access state
Response message.
In the embodiment of the present application, Critical Communications System is obtaining the access shape of the corresponding urgency communication terminal of device identification
After state, the response message for carrying access state is sent to sender.
Based on the same inventive concept, Fig. 5 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute
The method of stating can be as follows.
In the embodiment of the present application, for urgency communication terminal, access state may be dynamic change, that is to say, that
User can be adjusted the access state of urgency communication terminal by configuring client.
It, can also be by wake-up mechanism, by it but for the urgency communication terminal that access state is interim disabled status
Interim disabled status is adjusted to enabled state.
Step 501:The Critical Communications System receives wakeup message, includes urgency communication terminal in the wakeup message
Device identification, the wakeup message are used to the access state of urgency communication terminal being adjusted to enabled shape by interim disabled status
State.
It should be noted that the equipment for sending wakeup message can be other urgency communications end of installation configuration client
End can also be the urgency communication terminal that access state is interim disabled status, can also be other equipment, not do here specific
It limits.
Step 502:The Critical Communications System stores the correspondence between the device identification and enabled state.
In the embodiment of the present application, Critical Communications System determines the device identification in the case where receiving wakeup message
The access state of corresponding urgency communication terminal, if access state is interim disabled status, then executing step 502;Such as access
State is permanent disabled status, then feedback wakes up failed message.
Step 503:The Critical Communications System is according to the device identification, to the corresponding urgency communication of the device identification
Terminal sends configuration-direct, and the configuration-direct is used to indicate the urgency communication terminal and completes access state according to enabled state
Configuration.
Based on the same inventive concept, Fig. 6 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute
The method of stating can be as follows.
If it is not by promptly leading to the configurations operation such as to be configured, update, waking up to the access state of urgency communication terminal
Letter system is completed, but has configuration server completion, then in the embodiment of the present application, Critical Communications System can take from configuration
The access state of urgency communication terminal is obtained in business device in time.
Step 601:Critical Communications System receives the access that configuration server is sent and controls configuration data.
Wherein, comprising the device identification of at least one urgency communication terminal and described in the access control configuration data
The access state of urgency communication terminal.
In the embodiment of the present application, configuration server can be that different urgency communications is whole according to the configuring request received
End configuration access state, and store device identification urgency communication terminal corresponding with the device identification access state it
Between correspondence.Configuration server is when reaching the time arranged with Critical Communications System, by what is stored in the time cycle
Correspondence carrying between the access state of device identification urgency communication terminal corresponding with the device identification is connecing
Enter to control and is sent to Critical Communications System in configuration data.
Step 602:Critical Communications System stores device identification urgency communication terminal corresponding with the device identification
Access state between correspondence.
Based on the same inventive concept, Fig. 7 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute
The method of stating can be as follows.
Step 701:Critical Communications System receives the access that configuration client is sent and disables message.
Wherein, the device identification comprising urgency communication terminal and disabling type, disabling here in access disabling message
Type includes one kind in interim disabling and permanent disabling.
Step 702:Critical Communications System is according to the device identification, to the corresponding urgency communication terminal of the device identification
Send disabling instruction.
Step 703:Urgency communication terminal receives urgency traffic, includes forbidden institute in the urgency traffic
State the device identification of urgency communication terminal.
Step 704:Urgency communication terminal send urgency traffic failed message, and to configuration client send disabling at
Work(response message.
By technical solution provided by the embodiments of the present application, urgency traffic is received, is wrapped according in urgency traffic
The account information contained is verified the identity of the user and according to the device identification for including in urgency traffic to institute
Urgency communication terminal is stated to be verified;And lead to by and to the urgency communication terminal authentication to the authentication of the user
In the case of crossing, the urgency traffic is responded.In this way, either validated user utilizes the urgent of urgency communication terminal transmission
Communication service or disabled user utilize the urgency traffic that urgency communication terminal is sent, by user identity, Yong Huyu
Relationship between urgency communication terminal is verified, and user's malice can be avoided to send urgency communication industry using urgency communication terminal
It is engaged in, to negative consequence caused by Critical Communications System, effectively promoting the treatment effeciency of urgency traffic.
Fig. 8 is a kind of structural schematic diagram of access device provided by the embodiments of the present application.The access device includes:Access
Unit 801 and processing unit 802, wherein:
Access unit 801, the urgency traffic for receiving the transmission of urgency communication terminal, in the urgency traffic
Including using the device identification of the account information and the urgency communication terminal of the user of the urgency communication terminal;
Processing unit 802, for being verified to the identity of the user according to the account information and according to described
The urgency communication terminal is verified in device identification;And to the authentication of the user by and to described urgent logical
In the case that letter terminal authentication passes through, the urgency traffic is responded.
In another embodiment of the application, the processing unit 802 is additionally operable in the authentication to the user
Not by and/or in the case that the urgency communication terminal authentication do not pass through, sending response to the urgency communication terminal and lose
Lose message.
In another embodiment of the application, the processing unit 802 is according to the account information to the user's
Identity is verified, including:
According to the account information, pre-configuration data corresponding with the account information is obtained;
The identity of the user is verified using the pre-configuration data.
In another embodiment of the application, the processing unit 802 is according to the device identification to described urgent logical
Letter terminal is verified, including:
According to the device identification, determine that the access state of the communication device for emergency, the access state include interim
One kind in disabled status, permanent disabled status, enabled state;
And/or
According to the device identification, judge whether the urgency communication terminal allows to be used by the account information.
In another embodiment of the application, the access device further includes:Transmission unit 803, wherein:
The access unit 801 is additionally operable to receive access state configuring request, includes in the access state configuring request
The device identification of urgency communication terminal and access state;
The processing unit 802 is additionally operable to store the correspondence between the device identification and the access state;
The transmission unit 803 is used for according to the device identification, to the corresponding urgency communication terminal of the device identification
Configuration-direct is sent, the configuration-direct is used to indicate the urgency communication terminal and completes access state according to the access state
Configuration.
In another embodiment of the application, the access unit 801 is additionally operable to receive access state new information,
Device identification comprising urgency communication terminal and updated access state in the access state new information;
The processing unit 802, be additionally operable to the current access state for determining the urgency communication terminal with it is updated
When access state difference, the correspondence between the device identification and the updated access state is stored;
The transmission unit 803 is used for according to the device identification, to the corresponding urgency communication terminal of the device identification
Configuration-direct is sent, the configuration-direct is used to indicate the urgency communication terminal and is completed according to the updated access state
Access state configures.
In another embodiment of the application, the receiving unit 801 is additionally operable to receive access state inquiry request,
Include the device identification of urgency communication terminal in the access state inquiry request;
The processing unit 802, the correspondence being additionally operable between the device identification and access state according to storage determine
Access state corresponding with the device identification for including in the access state inquiry request, and send and carry the access state
Response message.
In another embodiment of the application, the receiving unit 801 is additionally operable to receive wakeup message, the wake-up
Include the device identification of urgency communication terminal in message, the wakeup message is used for the access state of urgency communication terminal by facing
When disabled status be adjusted to enabled state;
The processing unit 802, is additionally operable to store the correspondence between the device identification and enabled state, and according to
The device identification sends configuration-direct to the corresponding urgency communication terminal of the device identification, and the configuration-direct is for referring to
Show that the urgency communication terminal completes access state configuration according to enabled state.
It should be noted that access device provided by the embodiments of the present application can be realized by software mode, can also lead to
Hardware mode realization is crossed, is not specifically limited here.Access device receives urgency traffic, is wrapped according in urgency traffic
The account information contained is verified the identity of the user and according to the device identification for including in urgency traffic to institute
Urgency communication terminal is stated to be verified;And lead to by and to the urgency communication terminal authentication to the authentication of the user
In the case of crossing, the urgency traffic is responded.In this way, either validated user utilizes the urgent of urgency communication terminal transmission
Communication service or disabled user utilize the urgency traffic that urgency communication terminal is sent, by user identity, Yong Huyu
Relationship between urgency communication terminal is verified, and user's malice can be avoided to send urgency communication industry using urgency communication terminal
It is engaged in, to negative consequence caused by Critical Communications System, effectively promoting the treatment effeciency of urgency traffic.
Based on the same inventive concept, the embodiment of the present application also provides a kind of access devices, including at least one processing
Device and memory, the memory have program stored therein, and are configured to execute following steps by least one processor:
The urgency traffic that urgency communication terminal is sent is received, includes using described urgent in the urgency traffic
The device identification of the account information of the user of communication terminal and the urgency communication terminal;
The identity of the user is verified according to the account information and according to the device identification to described tight
Anxious communication terminal is verified;
In the case where passing through by and to the urgency communication terminal authentication to the authentication of the user, institute is responded
State urgency traffic.
It should be noted that the processor described in the embodiment of the present application can be central processing unit, other are can also be
Has the equipment of processing capacity, processor here can implement the function described in above-described embodiment, no longer go to live in the household of one's in-laws on getting married one by one here
It states.
It will be understood by those skilled in the art that embodiments herein can be provided as method, apparatus (equipment) or computer
Program product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardware
Embodiment form.Moreover, the application can be used in one or more wherein include computer usable program code meter
The computer journey implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of sequence product.
The application is flow chart of the reference according to method, apparatus (equipment) and computer program product of the embodiment of the present application
And/or block diagram describes.It should be understood that each flow in flowchart and/or the block diagram can be realized by computer program instructions
And/or the combination of the flow and/or box in box and flowchart and/or the block diagram.These computer programs can be provided to refer to
Enable the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate
One machine so that by the instruction that computer or the processor of other programmable data processing devices execute generate for realizing
The device for the function of being specified in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out the application essence of the various modification and variations without departing from the application
God and range.In this way, if these modifications and variations of the application belong to the range of the application claim and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
Claims (10)
1. a kind of cut-in method, which is characterized in that including:
Critical Communications System receives the urgency traffic that urgency communication terminal is sent, and includes use in the urgency traffic
The device identification of the account information of the user of the urgency communication terminal and the urgency communication terminal;
The Critical Communications System verifies the identity of the user according to the account information and according to the equipment
Mark verifies the urgency communication terminal;
The Critical Communications System to the authentication of the user by and to the urgency communication terminal authentication by
In the case of, respond the urgency traffic.
2. cut-in method according to claim 1, which is characterized in that the method further includes:
The Critical Communications System to the authentication of the user not by and/or to the urgency communication terminal authentication not
In the case of, response failed message is sent to the urgency communication terminal.
3. cut-in method according to claim 1, which is characterized in that the Critical Communications System is according to the account information
The identity of the user is verified, including:
The Critical Communications System obtains pre-configuration data corresponding with the account information according to the account information;
The Critical Communications System verifies the identity of the user using the pre-configuration data.
4. cut-in method according to claim 1 or 3, which is characterized in that the Critical Communications System is according to the equipment
Mark verifies the urgency communication terminal, including:
The Critical Communications System determines the access state of the communication device for emergency, the access according to the device identification
State includes one kind in interim disabled status, permanent disabled status, enabled state;
And/or
The Critical Communications System judges whether the urgency communication terminal allows to be believed by the account according to the device identification
Breath uses.
5. cut-in method according to claim 1, which is characterized in that the method further includes:
The Critical Communications System receives access state configuring request, includes urgency communication end in the access state configuring request
The device identification at end and access state;
The Critical Communications System stores the correspondence between the device identification and the access state;
The Critical Communications System sends configuration according to the device identification, to the corresponding urgency communication terminal of the device identification
Instruction, the configuration-direct are used to indicate the urgency communication terminal and complete access state configuration according to the access state.
6. cut-in method according to claim 1, which is characterized in that the method further includes:
The Critical Communications System receives access state new information, includes urgency communication end in the access state new information
The device identification at end and updated access state;
The Critical Communications System the current access state that determines the urgency communication terminal with updated access state not
Meanwhile storing the correspondence between the device identification and the updated access state;
The Critical Communications System sends configuration according to the device identification, to the corresponding urgency communication terminal of the device identification
Instruction, the configuration-direct are used to indicate the urgency communication terminal and complete access state according to the updated access state
Configuration.
7. cut-in method according to claim 1, which is characterized in that the method further includes:
The Critical Communications System receives access state inquiry request, includes urgency communication end in the access state inquiry request
The device identification at end;
The Critical Communications System determines and the access according to the correspondence between the device identification and access state of storage
The corresponding access state of device identification for including in status query request, and send the response message for carrying the access state.
8. access state according to claim 1 or claim 7, which is characterized in that the method further includes:
The Critical Communications System receives wakeup message, and the device identification of urgency communication terminal, institute are included in the wakeup message
Wakeup message is stated for the access state of urgency communication terminal to be adjusted to enabled state by interim disabled status;
The Critical Communications System stores the correspondence between the device identification and enabled state, and according to the equipment mark
Know, sends configuration-direct to the corresponding urgency communication terminal of the device identification, the configuration-direct is used to indicate described urgent
Communication terminal completes access state configuration according to enabled state.
9. a kind of access device, which is characterized in that including:
Receiving unit, the urgency traffic for receiving the transmission of urgency communication terminal, comprising making in the urgency traffic
With the device identification of the account information and the urgency communication terminal of the user of the urgency communication terminal;
Processing unit, for being verified to the identity of the user according to the account information and according to the device identification
The urgency communication terminal is verified;And it is tested by and to the urgency communication terminal to the authentication of the user
In the case that card passes through, the urgency traffic is responded.
10. a kind of access device, which is characterized in that including at least one processor and memory, the memory is stored with journey
Sequence, and be configured to execute following steps by least one processor:
The urgency traffic that urgency communication terminal is sent is received, includes to use the urgency communication in the urgency traffic
The device identification of the account information of the user of terminal and the urgency communication terminal;
The identity of the user is verified according to the account information and according to the device identification to described urgent logical
Letter terminal is verified;
In the case where passing through by and to the urgency communication terminal authentication to the authentication of the user, respond described tight
Anxious communication service.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810063193.3A CN108419229B (en) | 2018-01-23 | 2018-01-23 | Access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810063193.3A CN108419229B (en) | 2018-01-23 | 2018-01-23 | Access method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108419229A true CN108419229A (en) | 2018-08-17 |
CN108419229B CN108419229B (en) | 2020-08-11 |
Family
ID=63126258
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810063193.3A Active CN108419229B (en) | 2018-01-23 | 2018-01-23 | Access method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108419229B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030140223A1 (en) * | 2002-01-23 | 2003-07-24 | Robert Desideri | Automatic configuration of devices for secure network communication |
CN101637003A (en) * | 2007-03-12 | 2010-01-27 | 诺基亚公司 | System and method for authentication for wireless emergency services |
CN103686651A (en) * | 2012-09-12 | 2014-03-26 | 中兴通讯股份有限公司 | Emergency call based authentication method, device and system |
CN104901796A (en) * | 2015-06-02 | 2015-09-09 | 杭州华三通信技术有限公司 | Authentication method and equipment |
CN106211152A (en) * | 2015-04-30 | 2016-12-07 | 杭州华三通信技术有限公司 | A kind of wireless access authentication method and device |
-
2018
- 2018-01-23 CN CN201810063193.3A patent/CN108419229B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030140223A1 (en) * | 2002-01-23 | 2003-07-24 | Robert Desideri | Automatic configuration of devices for secure network communication |
CN101637003A (en) * | 2007-03-12 | 2010-01-27 | 诺基亚公司 | System and method for authentication for wireless emergency services |
CN103686651A (en) * | 2012-09-12 | 2014-03-26 | 中兴通讯股份有限公司 | Emergency call based authentication method, device and system |
CN106211152A (en) * | 2015-04-30 | 2016-12-07 | 杭州华三通信技术有限公司 | A kind of wireless access authentication method and device |
CN104901796A (en) * | 2015-06-02 | 2015-09-09 | 杭州华三通信技术有限公司 | Authentication method and equipment |
Non-Patent Citations (2)
Title |
---|
LO-YAO YEH ET: "ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks", 《IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》 * |
曹志威等: "基于视频安全接入的道路紧急事件响应机制", 《计算机技术与发展》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108419229B (en) | 2020-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9426132B1 (en) | Methods and apparatus for rules-based multi-factor verification | |
EP3259928B1 (en) | Establishing and managing identities for constrained devices | |
CN111355723B (en) | Single sign-on method, device, equipment and readable storage medium | |
CN104767713B (en) | Account binding method, server and system | |
CN109561429B (en) | Authentication method and device | |
CN108023881B (en) | Application login method, device, medium and electronic equipment | |
JP2014150392A (en) | Server device, group key notification method, and program therefor | |
CN110602216A (en) | Method and device for using single account by multiple terminals, cloud server and storage medium | |
EP3206422A1 (en) | Method and device for creating subscription resource | |
WO2018205148A1 (en) | Data packet checking method and device | |
US10375753B2 (en) | Method and device for associating user with group | |
US20230328805A1 (en) | Policy control for redundant transmissions | |
CN108632037A (en) | The public-key process method and device of Public Key Infrastructure | |
CN108738015B (en) | Network security protection method, equipment and system | |
CN112751800B (en) | Authentication method and device | |
CN110891270B (en) | Selection method and device of authentication algorithm | |
WO2019196963A1 (en) | Method and device for accessing network slice, storage medium, electronic device | |
CN108419229A (en) | A kind of cut-in method and equipment | |
CN104580098B (en) | A kind of service sharing method and device | |
CN113709729B (en) | Data processing method, device, network equipment and terminal | |
WO2022067831A1 (en) | Method and apparatus for establishing secure communication | |
ES2892155T3 (en) | Method for enhanced detection of a user equipment type | |
WO2019205895A1 (en) | Paging method, network device and terminal | |
CN112153580B (en) | Method, equipment and system for setting MCPTT group | |
WO2022041923A1 (en) | Network slice connection method, terminal, and computer-readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |