CN108419229A - A kind of cut-in method and equipment - Google Patents

A kind of cut-in method and equipment Download PDF

Info

Publication number
CN108419229A
CN108419229A CN201810063193.3A CN201810063193A CN108419229A CN 108419229 A CN108419229 A CN 108419229A CN 201810063193 A CN201810063193 A CN 201810063193A CN 108419229 A CN108419229 A CN 108419229A
Authority
CN
China
Prior art keywords
communication terminal
urgency
device identification
urgency communication
communications system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810063193.3A
Other languages
Chinese (zh)
Other versions
CN108419229B (en
Inventor
焦斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zte Trunking Technology Corp
Original Assignee
Beijing Zte Trunking Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zte Trunking Technology Corp filed Critical Beijing Zte Trunking Technology Corp
Priority to CN201810063193.3A priority Critical patent/CN108419229B/en
Publication of CN108419229A publication Critical patent/CN108419229A/en
Application granted granted Critical
Publication of CN108419229B publication Critical patent/CN108419229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

A kind of cut-in method provided by the present application and equipment, including:Urgency traffic is received, the identity of the user is verified according to the account information for including in urgency traffic and the urgency communication terminal is verified according to the device identification for including in urgency traffic;And in the case where passing through by and to the urgency communication terminal authentication to the authentication of the user, respond the urgency traffic.In this way, the urgency traffic or disabled user that either validated user is sent using urgency communication terminal utilize the urgency traffic that urgency communication terminal is sent, it is verified by the relationship between user identity, user and urgency communication terminal, user's malice can be avoided to send urgency traffic to negative consequence caused by Critical Communications System using urgency communication terminal, effectively promote the treatment effeciency of urgency traffic.

Description

A kind of cut-in method and equipment
Technical field
This application involves wireless communication and urgency communication technical field more particularly to a kind of cut-in method and equipment.
Background technology
Urgent or public safety department generally requires multiple department's joint actions, here when processing happens suddenly emergency Sector member may be from multiple functional departments such as public security, People's Armed Police, special policeman, fire-fighting, safety supervision, traffic, medical treatment and unit.In reality In the application of border, urgent accident can set up interim reply mechanism or command system after occurring, realize the system to multiple departments One leader, in order to effectively handle burst emergency.In this case, communication is ensured in each interagency coordination It is particularly important in terms of orderly work.
3GPP(3rd Generation Partnership Project;Third generation partner program) group is woven in It is introduced respectively in Release14 to urgent video traffic (Mission Critical Video;MC Video) and urgent number According to business (Mission Critical Data;MC data) support.Wherein, will include the urgent video traffics of MCPTT and tight Anxious data service is referred to as urgency communication service (Mission Critical Services;MCs);There is provided it is above-mentioned whole or The system of part urgency communication service is referred to as Critical Communications System.
In Critical Communications System, when user initiates urgency traffic, Critical Communications System is receiving the user When the urgency traffic sent by urgency communication terminal, believed according to the account for the user for including in the urgency traffic Pre-configuration data corresponding with the account information of the user obtained is ceased, the identity of the user is verified.Urgency communication system System responds the urgency traffic in the case where authentication passes through.
That is, as long as user has legal account information, then any one urgency communication terminal can be used Send urgency traffic.So when urgency communication terminal is stolen or loses the case where, once occur user's malice use it is tight Anxious communication terminal sends the case where urgency traffic, this takes the urgency communication that Critical Communications System is provided is seriously affected Business.
Invention content
In view of this, the embodiment of the present application provides a kind of cut-in method and equipment, it is urgent logical for solving how to realize The problem of letter terminal device efficiently accesses Critical Communications System.
A kind of cut-in method provided by the embodiments of the present application, including:
Critical Communications System receives the urgency traffic that urgency communication terminal is sent, and includes in the urgency traffic Use the device identification of the account information and the urgency communication terminal of the user of the urgency communication terminal;
The Critical Communications System verifies the identity of the user according to the account information and according to described The urgency communication terminal is verified in device identification;
The Critical Communications System leads to the authentication of the user by and to the urgency communication terminal authentication In the case of crossing, the urgency traffic is responded.
A kind of access device that the embodiment of the present application also provides, including:
Receiving unit, the urgency traffic for receiving the transmission of urgency communication terminal wrap in the urgency traffic The device identification of account information and the urgency communication terminal containing the user for using the urgency communication terminal;
Processing unit, for being verified to the identity of the user according to the account information and according to the equipment Mark verifies the urgency communication terminal;And to the authentication of the user by and to the urgency communication it is whole In the case that end is verified, the urgency traffic is responded.
What at least one embodiment provided by the present application was reached has the beneficial effect that:
Critical Communications System provided by the embodiments of the present application receives urgency traffic, includes according in urgency traffic Account information the identity of the user is verified and according to the device identification for including in urgency traffic to described Urgency communication terminal is verified;And pass through by and to the urgency communication terminal authentication to the authentication of the user In the case of, respond the urgency traffic.In this way, either validated user utilizes the urgent logical of urgency communication terminal transmission Communication service or disabled user utilize the urgency traffic that urgency communication terminal is sent, and Critical Communications System can be to user's body Relationship between part, user and urgency communication terminal is verified, and user's malice can be avoided to be sent using urgency communication terminal Urgency traffic effectively promotes the treatment effeciency of urgency traffic to negative consequence caused by Critical Communications System.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly introduced, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present application, for this For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these attached drawings His attached drawing.
Fig. 1 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 3 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 5 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 6 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 7 is a kind of flow diagram of cut-in method provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram of access device provided by the embodiments of the present application.
Specific implementation mode
In order to keep the purpose, technical scheme and advantage of the application clearer, the embodiment of the present application provides a kind of access Method and apparatus, Critical Communications System receives urgency traffic, according to the account information for including in urgency traffic to institute The identity for stating user verify and according to the device identification for including in urgency traffic to the urgency communication terminal into Row verification;And in the case where passing through by and to the urgency communication terminal authentication to the authentication of the user, response The urgency traffic.In this way, either validated user utilizes the urgency traffic also right and wrong that urgency communication terminal is sent Method user utilizes the urgency traffic that urgency communication terminal is sent, Critical Communications System can to user identity, user with it is urgent Relationship between communication terminal is verified, can avoid user malice using urgency communication terminal send urgency traffic to Negative consequence caused by Critical Communications System effectively promotes the treatment effeciency of urgency traffic.
The each embodiment of the application is described in further detail with reference to the accompanying drawings of the specification, it is clear that described Embodiment is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field All other embodiment that those of ordinary skill is obtained without making creative work belongs to the application protection Range.
Fig. 1 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.The method can be as follows. The executive agent of the embodiment of the present application can be Critical Communications System, or urgency communication server can also be to have Other servers for handling urgency traffic, are not specifically limited here.
Step 101:Critical Communications System receives the urgency traffic that urgency communication terminal is sent.
Wherein, comprising the account information of user using the urgency communication terminal and described in the urgency traffic The device identification of urgency communication terminal.
In the embodiment of the present application, urgency communication terminal can be by Register message or Publish message to SIP Core sends urgency traffic, and the urgency traffic is sent to Critical Communications System by SIP Core.
It should be noted that the key (Token) for verifying user identity can also be carried in urgency traffic.
Step 102:The Critical Communications System identity of the user is verified according to the account information and The urgency communication terminal is verified according to the device identification.
In applying for embodiment, Critical Communications System not only verifies the identity of user, but also to urgency communication Terminal is verified.Here it is to first carry out the operation verified to the identity of user, still first carries out to urgency communication terminal The operation verified, the two operation services are still performed simultaneously, in the embodiment of the present application can, do not do specific limit It is fixed.
Specifically, the Critical Communications System verifies the identity of the user according to the account information, including:
The Critical Communications System obtains pre-configuration data corresponding with the account information according to the account information;
The Critical Communications System verifies the identity of the user using the pre-configuration data.
Assuming that comprising the key for verifying user identity in urgency traffic, then the data being pre-configured can be utilized It is verified with the identity of key pair user.
Specifically, the Critical Communications System verifies the urgency communication terminal according to the device identification, packet It includes:
The Critical Communications System determines the access state of the communication device for emergency according to the device identification, described Access state includes one kind in interim disabled status, permanent disabled status, enabled state;
And/or
The Critical Communications System judges whether the urgency communication terminal allows by the account according to the device identification Family information uses.
In the embodiment of the present application, Critical Communications System can determine first when being verified to urgency communication terminal The access state of urgency communication terminal can determine pair if access state is interim disabled status/permanent disabled status Urgency communication terminal authentication does not pass through, and step 104 is executed then can trigger;
If access state is enabled state, it can determine and urgency communication terminal authentication is passed through, execute step 103;It can also further execute and judge whether the urgency communication terminal allows the operation used by the account information.
Secondly, the Critical Communications System judges whether the urgency communication terminal allows quilt according to the device identification The account information uses.
Specifically, the Critical Communications System obtains the correspondence between the device identification being pre-configured and account information (correspondence illustrates that the corresponding user of account information is allowed to use the corresponding urgency communication terminal of the device identification) judges Whether the corresponding account information of the device identification is consistent with the account information carried in urgency traffic, if inconsistent, really It is fixed that the verification of urgency communication terminal is not passed through;If consistent, it is determined that be verified to urgency communication terminal.
Step 103:The Critical Communications System to the authentication of the user by and to the urgency communication it is whole In the case that end is verified, the urgency traffic is responded.
Step 104:The Critical Communications System to the authentication of the user not by and/or to described urgent logical In the case that letter terminal authentication does not pass through, response failed message is sent to the urgency communication terminal.
Based on the same inventive concept, Fig. 2 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute The method of stating can be as follows.
Step 201:The Critical Communications System receives access state configuring request, is wrapped in the access state configuring request The device identification of the terminal containing urgency communication and access state.
In the embodiment of the present application, access state configuring request can be that user is sent by configuration management client, It can also be to be sent by other matched equipment, be not specifically limited here.
The device identification of urgency communication terminal described in the embodiment of the present application can be including but not limited to:IMEI (International Mobile Equipment Identity;International mobile equipment identification number), access identification code, UUID (Universally Unique Identifier;Universally Unique Identifier) or digital certificates etc..
Here access state includes one kind in interim disabled status, permanent disabled status, enabled state.
Step 202:The Critical Communications System stores the correspondence between the device identification and the access state.
Step 203:The Critical Communications System is according to the device identification, to the corresponding urgency communication of the device identification Terminal sends configuration-direct, and the configuration-direct is used to indicate the urgency communication terminal and completes to access according to the access state State configures.
In the embodiment of the present application, urgency communication terminal can also send configuration response message to configuration management client, The configuration response message is for informing configuration management client access state configuration result (success/failure).
Based on the same inventive concept, Fig. 3 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute The method of stating can be as follows.
Step 301:The Critical Communications System receives access state new information, is wrapped in the access state new information The device identification of the terminal containing urgency communication and updated access state.
Step 302:The Critical Communications System is after the current access state and update for determining the urgency communication terminal Access state difference when, store the correspondence between the device identification and the updated access state.
In the embodiment of the present application, the Critical Communications System is in the current access state for determining the urgency communication terminal When identical as updated access state, response message is sent, the access of urgency communication terminal can be included in the response message State.
Step 303:The Critical Communications System is according to the device identification, to the corresponding urgency communication of the device identification Terminal sends configuration-direct, and the configuration-direct is used to indicate the urgency communication terminal according to the updated access state Complete access state configuration.
If the access state for including in configuration-direct is permanent disabling, urgency communication terminal is by the access shape of itself State is set as permanently disabling, in addition, urgency communication terminal deletion is all having preserved relevant with confidence with Critical Communications System Breath;
If the access state for including in configuration-direct is interim disabling, urgency communication terminal is by the access shape of itself State is set as disabling temporarily;
If the access state for including in configuration-direct is enabled state, if the current state of urgency communication terminal is Permanent disabling, then will be unable to respond the configuration-direct, and to Critical Communications System feedback configuration failed message;If urgency communication The current state of terminal is interim disabling, then urgency communication terminal sets the access state of itself to normal operating conditions.
Based on the same inventive concept, Fig. 4 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute The method of stating can be as follows.
Step 401:The Critical Communications System receives access state inquiry request, is wrapped in the access state inquiry request The device identification of the terminal containing urgency communication.
In the embodiment of the present application, the equipment for sending access state inquiry request can be the urgent of access state to be checked Communication terminal oneself can also be other urgency communication terminals or other equipment of search access right, not do specific limit here It is fixed.
Step 402:The Critical Communications System is according to the correspondence between the device identification and access state of storage, really Fixed access state corresponding with the device identification for including in the access state inquiry request, and send and carry the access state Response message.
In the embodiment of the present application, Critical Communications System is obtaining the access shape of the corresponding urgency communication terminal of device identification After state, the response message for carrying access state is sent to sender.
Based on the same inventive concept, Fig. 5 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute The method of stating can be as follows.
In the embodiment of the present application, for urgency communication terminal, access state may be dynamic change, that is to say, that User can be adjusted the access state of urgency communication terminal by configuring client.
It, can also be by wake-up mechanism, by it but for the urgency communication terminal that access state is interim disabled status Interim disabled status is adjusted to enabled state.
Step 501:The Critical Communications System receives wakeup message, includes urgency communication terminal in the wakeup message Device identification, the wakeup message are used to the access state of urgency communication terminal being adjusted to enabled shape by interim disabled status State.
It should be noted that the equipment for sending wakeup message can be other urgency communications end of installation configuration client End can also be the urgency communication terminal that access state is interim disabled status, can also be other equipment, not do here specific It limits.
Step 502:The Critical Communications System stores the correspondence between the device identification and enabled state.
In the embodiment of the present application, Critical Communications System determines the device identification in the case where receiving wakeup message The access state of corresponding urgency communication terminal, if access state is interim disabled status, then executing step 502;Such as access State is permanent disabled status, then feedback wakes up failed message.
Step 503:The Critical Communications System is according to the device identification, to the corresponding urgency communication of the device identification Terminal sends configuration-direct, and the configuration-direct is used to indicate the urgency communication terminal and completes access state according to enabled state Configuration.
Based on the same inventive concept, Fig. 6 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute The method of stating can be as follows.
If it is not by promptly leading to the configurations operation such as to be configured, update, waking up to the access state of urgency communication terminal Letter system is completed, but has configuration server completion, then in the embodiment of the present application, Critical Communications System can take from configuration The access state of urgency communication terminal is obtained in business device in time.
Step 601:Critical Communications System receives the access that configuration server is sent and controls configuration data.
Wherein, comprising the device identification of at least one urgency communication terminal and described in the access control configuration data The access state of urgency communication terminal.
In the embodiment of the present application, configuration server can be that different urgency communications is whole according to the configuring request received End configuration access state, and store device identification urgency communication terminal corresponding with the device identification access state it Between correspondence.Configuration server is when reaching the time arranged with Critical Communications System, by what is stored in the time cycle Correspondence carrying between the access state of device identification urgency communication terminal corresponding with the device identification is connecing Enter to control and is sent to Critical Communications System in configuration data.
Step 602:Critical Communications System stores device identification urgency communication terminal corresponding with the device identification Access state between correspondence.
Based on the same inventive concept, Fig. 7 is a kind of flow diagram of cut-in method provided by the embodiments of the present application.Institute The method of stating can be as follows.
Step 701:Critical Communications System receives the access that configuration client is sent and disables message.
Wherein, the device identification comprising urgency communication terminal and disabling type, disabling here in access disabling message Type includes one kind in interim disabling and permanent disabling.
Step 702:Critical Communications System is according to the device identification, to the corresponding urgency communication terminal of the device identification Send disabling instruction.
Step 703:Urgency communication terminal receives urgency traffic, includes forbidden institute in the urgency traffic State the device identification of urgency communication terminal.
Step 704:Urgency communication terminal send urgency traffic failed message, and to configuration client send disabling at Work(response message.
By technical solution provided by the embodiments of the present application, urgency traffic is received, is wrapped according in urgency traffic The account information contained is verified the identity of the user and according to the device identification for including in urgency traffic to institute Urgency communication terminal is stated to be verified;And lead to by and to the urgency communication terminal authentication to the authentication of the user In the case of crossing, the urgency traffic is responded.In this way, either validated user utilizes the urgent of urgency communication terminal transmission Communication service or disabled user utilize the urgency traffic that urgency communication terminal is sent, by user identity, Yong Huyu Relationship between urgency communication terminal is verified, and user's malice can be avoided to send urgency communication industry using urgency communication terminal It is engaged in, to negative consequence caused by Critical Communications System, effectively promoting the treatment effeciency of urgency traffic.
Fig. 8 is a kind of structural schematic diagram of access device provided by the embodiments of the present application.The access device includes:Access Unit 801 and processing unit 802, wherein:
Access unit 801, the urgency traffic for receiving the transmission of urgency communication terminal, in the urgency traffic Including using the device identification of the account information and the urgency communication terminal of the user of the urgency communication terminal;
Processing unit 802, for being verified to the identity of the user according to the account information and according to described The urgency communication terminal is verified in device identification;And to the authentication of the user by and to described urgent logical In the case that letter terminal authentication passes through, the urgency traffic is responded.
In another embodiment of the application, the processing unit 802 is additionally operable in the authentication to the user Not by and/or in the case that the urgency communication terminal authentication do not pass through, sending response to the urgency communication terminal and lose Lose message.
In another embodiment of the application, the processing unit 802 is according to the account information to the user's Identity is verified, including:
According to the account information, pre-configuration data corresponding with the account information is obtained;
The identity of the user is verified using the pre-configuration data.
In another embodiment of the application, the processing unit 802 is according to the device identification to described urgent logical Letter terminal is verified, including:
According to the device identification, determine that the access state of the communication device for emergency, the access state include interim One kind in disabled status, permanent disabled status, enabled state;
And/or
According to the device identification, judge whether the urgency communication terminal allows to be used by the account information.
In another embodiment of the application, the access device further includes:Transmission unit 803, wherein:
The access unit 801 is additionally operable to receive access state configuring request, includes in the access state configuring request The device identification of urgency communication terminal and access state;
The processing unit 802 is additionally operable to store the correspondence between the device identification and the access state;
The transmission unit 803 is used for according to the device identification, to the corresponding urgency communication terminal of the device identification Configuration-direct is sent, the configuration-direct is used to indicate the urgency communication terminal and completes access state according to the access state Configuration.
In another embodiment of the application, the access unit 801 is additionally operable to receive access state new information, Device identification comprising urgency communication terminal and updated access state in the access state new information;
The processing unit 802, be additionally operable to the current access state for determining the urgency communication terminal with it is updated When access state difference, the correspondence between the device identification and the updated access state is stored;
The transmission unit 803 is used for according to the device identification, to the corresponding urgency communication terminal of the device identification Configuration-direct is sent, the configuration-direct is used to indicate the urgency communication terminal and is completed according to the updated access state Access state configures.
In another embodiment of the application, the receiving unit 801 is additionally operable to receive access state inquiry request, Include the device identification of urgency communication terminal in the access state inquiry request;
The processing unit 802, the correspondence being additionally operable between the device identification and access state according to storage determine Access state corresponding with the device identification for including in the access state inquiry request, and send and carry the access state Response message.
In another embodiment of the application, the receiving unit 801 is additionally operable to receive wakeup message, the wake-up Include the device identification of urgency communication terminal in message, the wakeup message is used for the access state of urgency communication terminal by facing When disabled status be adjusted to enabled state;
The processing unit 802, is additionally operable to store the correspondence between the device identification and enabled state, and according to The device identification sends configuration-direct to the corresponding urgency communication terminal of the device identification, and the configuration-direct is for referring to Show that the urgency communication terminal completes access state configuration according to enabled state.
It should be noted that access device provided by the embodiments of the present application can be realized by software mode, can also lead to Hardware mode realization is crossed, is not specifically limited here.Access device receives urgency traffic, is wrapped according in urgency traffic The account information contained is verified the identity of the user and according to the device identification for including in urgency traffic to institute Urgency communication terminal is stated to be verified;And lead to by and to the urgency communication terminal authentication to the authentication of the user In the case of crossing, the urgency traffic is responded.In this way, either validated user utilizes the urgent of urgency communication terminal transmission Communication service or disabled user utilize the urgency traffic that urgency communication terminal is sent, by user identity, Yong Huyu Relationship between urgency communication terminal is verified, and user's malice can be avoided to send urgency communication industry using urgency communication terminal It is engaged in, to negative consequence caused by Critical Communications System, effectively promoting the treatment effeciency of urgency traffic.
Based on the same inventive concept, the embodiment of the present application also provides a kind of access devices, including at least one processing Device and memory, the memory have program stored therein, and are configured to execute following steps by least one processor:
The urgency traffic that urgency communication terminal is sent is received, includes using described urgent in the urgency traffic The device identification of the account information of the user of communication terminal and the urgency communication terminal;
The identity of the user is verified according to the account information and according to the device identification to described tight Anxious communication terminal is verified;
In the case where passing through by and to the urgency communication terminal authentication to the authentication of the user, institute is responded State urgency traffic.
It should be noted that the processor described in the embodiment of the present application can be central processing unit, other are can also be Has the equipment of processing capacity, processor here can implement the function described in above-described embodiment, no longer go to live in the household of one's in-laws on getting married one by one here It states.
It will be understood by those skilled in the art that embodiments herein can be provided as method, apparatus (equipment) or computer Program product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, the application can be used in one or more wherein include computer usable program code meter The computer journey implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of sequence product.
The application is flow chart of the reference according to method, apparatus (equipment) and computer program product of the embodiment of the present application And/or block diagram describes.It should be understood that each flow in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the flow and/or box in box and flowchart and/or the block diagram.These computer programs can be provided to refer to Enable the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that computer or the processor of other programmable data processing devices execute generate for realizing The device for the function of being specified in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out the application essence of the various modification and variations without departing from the application God and range.In this way, if these modifications and variations of the application belong to the range of the application claim and its equivalent technologies Within, then the application is also intended to include these modifications and variations.

Claims (10)

1. a kind of cut-in method, which is characterized in that including:
Critical Communications System receives the urgency traffic that urgency communication terminal is sent, and includes use in the urgency traffic The device identification of the account information of the user of the urgency communication terminal and the urgency communication terminal;
The Critical Communications System verifies the identity of the user according to the account information and according to the equipment Mark verifies the urgency communication terminal;
The Critical Communications System to the authentication of the user by and to the urgency communication terminal authentication by In the case of, respond the urgency traffic.
2. cut-in method according to claim 1, which is characterized in that the method further includes:
The Critical Communications System to the authentication of the user not by and/or to the urgency communication terminal authentication not In the case of, response failed message is sent to the urgency communication terminal.
3. cut-in method according to claim 1, which is characterized in that the Critical Communications System is according to the account information The identity of the user is verified, including:
The Critical Communications System obtains pre-configuration data corresponding with the account information according to the account information;
The Critical Communications System verifies the identity of the user using the pre-configuration data.
4. cut-in method according to claim 1 or 3, which is characterized in that the Critical Communications System is according to the equipment Mark verifies the urgency communication terminal, including:
The Critical Communications System determines the access state of the communication device for emergency, the access according to the device identification State includes one kind in interim disabled status, permanent disabled status, enabled state;
And/or
The Critical Communications System judges whether the urgency communication terminal allows to be believed by the account according to the device identification Breath uses.
5. cut-in method according to claim 1, which is characterized in that the method further includes:
The Critical Communications System receives access state configuring request, includes urgency communication end in the access state configuring request The device identification at end and access state;
The Critical Communications System stores the correspondence between the device identification and the access state;
The Critical Communications System sends configuration according to the device identification, to the corresponding urgency communication terminal of the device identification Instruction, the configuration-direct are used to indicate the urgency communication terminal and complete access state configuration according to the access state.
6. cut-in method according to claim 1, which is characterized in that the method further includes:
The Critical Communications System receives access state new information, includes urgency communication end in the access state new information The device identification at end and updated access state;
The Critical Communications System the current access state that determines the urgency communication terminal with updated access state not Meanwhile storing the correspondence between the device identification and the updated access state;
The Critical Communications System sends configuration according to the device identification, to the corresponding urgency communication terminal of the device identification Instruction, the configuration-direct are used to indicate the urgency communication terminal and complete access state according to the updated access state Configuration.
7. cut-in method according to claim 1, which is characterized in that the method further includes:
The Critical Communications System receives access state inquiry request, includes urgency communication end in the access state inquiry request The device identification at end;
The Critical Communications System determines and the access according to the correspondence between the device identification and access state of storage The corresponding access state of device identification for including in status query request, and send the response message for carrying the access state.
8. access state according to claim 1 or claim 7, which is characterized in that the method further includes:
The Critical Communications System receives wakeup message, and the device identification of urgency communication terminal, institute are included in the wakeup message Wakeup message is stated for the access state of urgency communication terminal to be adjusted to enabled state by interim disabled status;
The Critical Communications System stores the correspondence between the device identification and enabled state, and according to the equipment mark Know, sends configuration-direct to the corresponding urgency communication terminal of the device identification, the configuration-direct is used to indicate described urgent Communication terminal completes access state configuration according to enabled state.
9. a kind of access device, which is characterized in that including:
Receiving unit, the urgency traffic for receiving the transmission of urgency communication terminal, comprising making in the urgency traffic With the device identification of the account information and the urgency communication terminal of the user of the urgency communication terminal;
Processing unit, for being verified to the identity of the user according to the account information and according to the device identification The urgency communication terminal is verified;And it is tested by and to the urgency communication terminal to the authentication of the user In the case that card passes through, the urgency traffic is responded.
10. a kind of access device, which is characterized in that including at least one processor and memory, the memory is stored with journey Sequence, and be configured to execute following steps by least one processor:
The urgency traffic that urgency communication terminal is sent is received, includes to use the urgency communication in the urgency traffic The device identification of the account information of the user of terminal and the urgency communication terminal;
The identity of the user is verified according to the account information and according to the device identification to described urgent logical Letter terminal is verified;
In the case where passing through by and to the urgency communication terminal authentication to the authentication of the user, respond described tight Anxious communication service.
CN201810063193.3A 2018-01-23 2018-01-23 Access method and device Active CN108419229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810063193.3A CN108419229B (en) 2018-01-23 2018-01-23 Access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810063193.3A CN108419229B (en) 2018-01-23 2018-01-23 Access method and device

Publications (2)

Publication Number Publication Date
CN108419229A true CN108419229A (en) 2018-08-17
CN108419229B CN108419229B (en) 2020-08-11

Family

ID=63126258

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810063193.3A Active CN108419229B (en) 2018-01-23 2018-01-23 Access method and device

Country Status (1)

Country Link
CN (1) CN108419229B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030140223A1 (en) * 2002-01-23 2003-07-24 Robert Desideri Automatic configuration of devices for secure network communication
CN101637003A (en) * 2007-03-12 2010-01-27 诺基亚公司 System and method for authentication for wireless emergency services
CN103686651A (en) * 2012-09-12 2014-03-26 中兴通讯股份有限公司 Emergency call based authentication method, device and system
CN104901796A (en) * 2015-06-02 2015-09-09 杭州华三通信技术有限公司 Authentication method and equipment
CN106211152A (en) * 2015-04-30 2016-12-07 杭州华三通信技术有限公司 A kind of wireless access authentication method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030140223A1 (en) * 2002-01-23 2003-07-24 Robert Desideri Automatic configuration of devices for secure network communication
CN101637003A (en) * 2007-03-12 2010-01-27 诺基亚公司 System and method for authentication for wireless emergency services
CN103686651A (en) * 2012-09-12 2014-03-26 中兴通讯股份有限公司 Emergency call based authentication method, device and system
CN106211152A (en) * 2015-04-30 2016-12-07 杭州华三通信技术有限公司 A kind of wireless access authentication method and device
CN104901796A (en) * 2015-06-02 2015-09-09 杭州华三通信技术有限公司 Authentication method and equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LO-YAO YEH ET: "ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks", 《IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》 *
曹志威等: "基于视频安全接入的道路紧急事件响应机制", 《计算机技术与发展》 *

Also Published As

Publication number Publication date
CN108419229B (en) 2020-08-11

Similar Documents

Publication Publication Date Title
US9426132B1 (en) Methods and apparatus for rules-based multi-factor verification
EP3259928B1 (en) Establishing and managing identities for constrained devices
CN111355723B (en) Single sign-on method, device, equipment and readable storage medium
CN104767713B (en) Account binding method, server and system
CN109561429B (en) Authentication method and device
CN108023881B (en) Application login method, device, medium and electronic equipment
JP2014150392A (en) Server device, group key notification method, and program therefor
CN110602216A (en) Method and device for using single account by multiple terminals, cloud server and storage medium
EP3206422A1 (en) Method and device for creating subscription resource
WO2018205148A1 (en) Data packet checking method and device
US10375753B2 (en) Method and device for associating user with group
US20230328805A1 (en) Policy control for redundant transmissions
CN108632037A (en) The public-key process method and device of Public Key Infrastructure
CN108738015B (en) Network security protection method, equipment and system
CN112751800B (en) Authentication method and device
CN110891270B (en) Selection method and device of authentication algorithm
WO2019196963A1 (en) Method and device for accessing network slice, storage medium, electronic device
CN108419229A (en) A kind of cut-in method and equipment
CN104580098B (en) A kind of service sharing method and device
CN113709729B (en) Data processing method, device, network equipment and terminal
WO2022067831A1 (en) Method and apparatus for establishing secure communication
ES2892155T3 (en) Method for enhanced detection of a user equipment type
WO2019205895A1 (en) Paging method, network device and terminal
CN112153580B (en) Method, equipment and system for setting MCPTT group
WO2022041923A1 (en) Network slice connection method, terminal, and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant